F I D O N E W S --       Volume 14, Number  9          3 March 1997
    +----------------------------+-----------------------------------------+
    |  The newsletter of the     |   ISSN 1198-4589 Published by:          |
    |    FidoNet community       |   "FidoNews"                            |
    |          _                 |        1-904-409-7040    [1:1/23]       |
    |         /  \               |                                         |
    |        /|oo \              |                                         |
    |       (_|  /_)             |                                         |
    |        _`@/_ \    _        |                                         |
    |       |     | \   \\       |   Editor:                               |
    |       | (*) |  \   ))      |        Christopher Baker  1:18/14       |
    |       |__U__| /  \//       |                                         |
    |        _//|| _\   /        |                                         |
    |       (_/(_|(____/         |                                         |
    |             (jm)           |     Newspapers should have no friends.  |
    |                            |                    -- JOSEPH PULITZER   |
    +----------------------------+-----------------------------------------+
    |               Submission address: FidoNews Editor 1:1/23             |
    +----------------------------------------------------------------------+
    |  MORE addresses:                                                     |
    |                                                                      |
    |    submissions=> [email protected]                                |
    +----------------------------------------------------------------------+
    |    For  information,   copyrights,   article   submissions,          |
    |    obtaining copies of FidoNews or the internet gateway FAQ          |
    |    please refer to the end of this file.                             |
    +----------------------------------------------------------------------+


         WANT YOUR MESSAGE IN THIS SPACE? SEND IT IN!


                       Table of Contents
    1. EDITORIAL  ................................................  1
       No responses to last week's Questions  ....................  1
    2. ARTICLES  .................................................  2
       Net 1:231 Has a New Web Page  .............................  2
       'Anarchy' in Region 50 Russia - no RC?  ...................  2
       An Innocent Bystander  ....................................  3
    3. GETTING TECHNICAL  ........................................  6
       FSC-0044 - Improved method of duplicate message detecti  ..  6
    4. COORDINATORS CORNER  ...................................... 20
       Nodelist-statistics as seen from Zone-2 for day 059  ...... 20
    5. WE GET EMAIL  ............................................. 21
       Another Internet-FidoNet query  ........................... 21
    6. NET HUMOR  ................................................ 24
       Computer riddles?  ........................................ 24
    7. NOTICES  .................................................. 25
       Future History  ........................................... 25
    8. FIDONET SOFTWARE LISTING  ................................. 26
       Latest Greatest Software Versions  ........................ 26
    9. FIDONEWS PUBLIC-KEY  ...................................... 32
       FidoNews PGP public-key listing  .......................... 32
    10. FIDONET BY INTERNET  ..................................... 33
    11. FIDONEWS INFORMATION  .................................... 35
    FIDONEWS 14-09               Page 1                    3 Mar 1997


    =================================================================
                                EDITORIAL
    =================================================================


    Quando Omni Flunkus Moritati strikes again. [See FidoNews 1351.]

    Seems to be a little uproar in Russia.

    USR is finally releasing the X2 firmware download for those who
    have V34s and haven't heard.

    The FSC in this week's Issue was written by Jack Decker who left
    FidoNet about three years ago but still reads the FidoNews and
    wanted to say 'hi' to those who remember him. His contact info
    appears at the end of his FSC today.

    We have a couple new FidoNet sites in the Internet section.

    There are no Headlines or film at eleven this week.

    C.B.

    -----------------------------------------------------------------

    FIDONEWS 14-09               Page 2                    3 Mar 1997


    =================================================================
                                ARTICLES
    =================================================================


    Net 1:231 Has a New Web Page
    by Richard Bash - 1:231/0
    Internet: [email protected]

         FidoNet 1:231 in Indianapolis, Indiana, is pleased to announce
    the creation of a web page for the Net. The URL is:

                           http://www.oaktree.net/net231

         While no astounding creation of art, the page lists all of the
    members of Net 231, their BBS names, BBS phone numbers and also
    provides links to web pages of the members of the Net.  Documents
    such as POLICY4.DOC, the local Net operating guidelines and a node
    application form are also available via the web page.  You are
    invited to visit the site and provide your constructive comments on
    ways to improve the page.

    -----------------------------------------------------------------


    Elections of R50C went crazy

    By Mikhail Ramendik, 2:5020/145.43, [email protected]

    WARNING: this question caused much flame in the Russian sysop areas.
    I am not into it either side, in fact I'm not a Node at all. I just
    want to communicate an interesting story.

    It all started as usual. R50C, Basil Dolmatov 2:5020/140, has quietly
    resigned. Elections were announced, Kostya Boyko 2:5020/37 became
    Returning Officer.

    The elections were to end somewhere like February 17. But some mail
    was lost on the way to the RO. So the senders (an entire Net)
    requested a prolongation. The RO granted it to 22 Feb. Then...

    On 19 Feb he announced the results. Dmitry Zavalishin, 2:5020/32, won.

    He claimed that as the mail from the requestors has arrived, the vote
    was over, despite the public announcement of prolongation. Flame
    started here.

    But it did not end here. For the winner got only 44% of the votes
    that came, with Mikel Lavrentyev 2:5020/35 second with 23%. A second
    run - between these two was requested from the RO and finally granted
    by him. But...

    BY THIS TIME, THE OLD RC AND THE ZC HAVE RECOGNIZED THE NEW RC!!!

    So now we have no publicly accepted RC. Anarchy? ;)

    FIDONEWS 14-09               Page 3                    3 Mar 1997


    This situation is very dynamic. In fact it may change by the time
    this article reaches Fidonews. And I hold NO opinion on what side is
    right. But it calls us to some thoughts.

    What has become of the Net which started as just a union of friendly
    SysOps?

    Why has the Founding Father Tom Jennings left his creation? I have
    his answer here in a letter of July 1994. The text of the letter
    makes it clear that this information is not confidential.

    8<

    Personally, I consider "policy4" to be a smelly old crock of shit.
    You can quote me on that, only you will find many people have heard
    me say it before... :-)

    Note that "POLICY4" contains valid procedural advice and information
    -- how to assign numbers, how to define a functional system, and
    such. For that it's fine. Otherwise, the actual policy is intended to
    let a small number of people control the behavior and speech of
    another, larger group of people. I immediately mistrust people who
    propose such things. If they are young enough, I give them time to
    get over it :-)

    8<

    Do we NEED to have this structure, so that the RC elections become
    something like Presidential ones with all the necessary scandals?
    Surely the *backbone* needs management, but then the Net and the
    backbone are not the same, and one theoretically can be a node and
    not link to a backbone.

    I'm NOT proposing anything here. It's just food for thought. And - I
    apologize to Tom Jennings if it was not good to quote his letter.

    In fact, my secret desire is that he would show up here with an
    article explaining his thoughts. Perhaps we have grown old enough to
    understand.

    Mikhail Ramendik. Moscow, Russia. Team OS/2.

    -----------------------------------------------------------------


    An Innocent Bystander
    Robert "Not a Sysop" Parson
    Jackalope Junction 1:3822/1


    I've been reading Fidonews with great interest over the past several
    months (actually years, but that's another matter).  Quite a few
    things have sparked my interest, and I thought I'd comment as an
    "interested bystander." (It's true, I'm really not a sysop.)

    I noticed a disturbing trend in the Coordinator's Corner that Zone 1
    FIDONEWS 14-09               Page 4                    3 Mar 1997


    was losing roughly 200 nodes a week, so I started keeping my own stats
    on the Nodelist.  There are some differences, which I attribute mainly
    to the differences in which we are compiling our stats, but generally
    turned up the same thing.  At this rate, Zone 1 will cease to exist in
    midsummer 1998.  By the way, according to the latest report published
    in Fidonews, the number of nodes in North America has now slipped
    below 10,000.  My hat's off to Ward Dossche for compiling and making
    this analysis available.

    On this subject, someone noted a couple months ago that most of the
    nodes in Zone 2 are not BBSs.  His description sounded like most of
    them were glorified points.  If someone could explain this a bit
    better or clear up any misunderstanding on my part, I'd appreciate it.

    Someone else noted (I really should keep Fidonews archived on my
    computer and give these people the appropriate credit.  But again, I'm
    not a Sysop) that a "State of the Network" message/address/whatever
    would be of interest.  There are significant problems with Fidonet
    both technically and internally.  He's in charge, at least nominally,
    and we should demand he say something.

    Election underway for IC and pending for Z1C?  Without notice in
    Fidonews?  After consulting Policy 4, it appears notice of elections
    is not necessary.  Looks like something that needs to be fixed.

    And about that Policy 4...  forget it.  P4 doesn't work.  It's
    outdated and the only reason it's pulled out is when somebody has some
    griping to do.  Should The Powers That Are ever decide to update
    Fidonet Policy, don't bother with P4.whatever.  Scrap the darn thing
    entirely, start fresh, skip a P5 even and go on to P6.  My first
    recommendation is to split it into two documents.  One that is
    specific to technical standards, the other for personnel matters
    (moderators, coordinators, and the ubiquitous etc).  I also think a
    Fidonet Users' Guide for non-sysops would be very helpful.

    Since the latest Big Controversy seems to be Chris Baker's editorship
    of Fidonews, I thought I'd comment on that as well.

    I contacted Donald Tees about taking over the reigns about two years
    ago when he originally announced he was considering resigning.  My
    vision was somewhat different from his and the (unwritten) mission of
    Fidonews.  So, I opted out.  Nobody else picked up the standard.  Late
    last year, Donald disappeared from Fidonet.  After several weeks
    hiatus, and apparently quite a bit of non-action on the part of those
    who had responsibility, Chris began publishing Fidonews.  There are
    some things I would not have done, and a few things I wish I'd thought
    of.  But generally, I think he's doing a good job with this thankless
    position.

    If there's somebody upset enough with Chris' editorship, there's
    nothing to stop them from publishing a competing Fidonews, as long as
    it doesn't actually call itself "Fidonews" or represent itself as the
    "Official Publication of Fidonet."  I think anyone who tries will find
    out exactly how difficult it is.

    Now that I've rattled on a bit, I guess I should tell you what I bring
    FIDONEWS 14-09               Page 5                    3 Mar 1997


    to the table since I've noted I'm not a sysop:  nothing.  I'm just a
    user of a local BBS.  And isn't bringing us users together what
    Fidonet is all about?  I'm keenly interested in the continued
    viability of Fidonet.  And frankly, it looks pretty shaky.


                          Robert Parson 1:3822/1

    -----------------------------------------------------------------

    FIDONEWS 14-09               Page 6                    3 Mar 1997


    =================================================================
                            GETTING TECHNICAL
    =================================================================


    [This is part of a continuing series of FTSC Standards and Proposals
    and the FidoNet History series. These docs have been reformatted to 70
    columns where necessary. Node numbers that appear in these docs are
    often no longer in service. Check your Nodelist for current listings
    of authors.] Ed.


    Document: FSC-0044
    Version:  002
    Date:     07-Oct-1990

       An improved method of duplicate message detection and prevention

                                      Jack Decker
                                    1:154/8@Fidonet

    Status of this document:

         This FSC suggests a proposed protocol for the FidoNet(r)
         community, and requests discussion and suggestions for
         improvements.  Distribution of this document is subject to the
         restrictions stated in the copyright paragraph below.

         Fido and FidoNet are registered marks of Tom Jennings and Fido
         Software.

    Purpose:

    The purpose of this document is to present a proposal for an improved
    method of duplicate message detection and prevention, that could
    eventually replace the existing PATH and SEEN-BY lines currently used
    within Fidonet.  The principal advantages of this method over previous
    schemes is that it is fully Domain-, Zone-, and Point-aware, and that
    it adds far fewer bytes to a message than the current combination of
    SEEN-BY and PATH lines.  It can also be run in parallel with existing
    SEEN-BY and PATH lines for an indefinite period, thus allowing a
    "transition period" of as long as is necessary for software to be
    converted.

    Copyright:

    This document is Copyright 1990 by Jack Decker.  However, permission
    is granted for any and all non-commercial use, providing the contents
    of this document are not altered in any way.  Also, permission is
    expressly granted for any use by developers of software primarily
    intended to be used in the Fidonet amateur communications network, or
    in any similar amateur communications network that primarily uses
    Fidonet technology and protocols, whether that software is commercial
    or not.

    Comments on this proposal, and suggestions for improvement are
    FIDONEWS 14-09               Page 7                    3 Mar 1997


    welcomed by the author.  In particular, suggestions on how this
    proposal might be reworded to make the meaning clearer are especially
    welcome.

    A. Definition:

    In this document the characters ^A (caret and capital A) will be used
    to represent a 0x01 (SOH) byte.  It will be most commonly used in
    reference to the "^APTH line", which will be a line that begins with a
    0x01 byte immediately followed by the letters "PTH" (and then by
    additional data as specified below).

    B. Why a new method of duplicate message detection is needed:

    Most of the methods of duplicate message detection currently used in
    Fidonet echomail processing operate by trying to find some
    distinguishing characteristic of an echomail message (whether it be
    something deliberately included in the message, such as an EID, MSGID,
    etc. type of "kludge line", or something which is contained in all
    echomail messages, such as the message header).  Typically, either the
    item being used for duplicate detection itself or a checksum of that
    item is then saved in a data file, and if another item comes in with
    that same distinguishing characteristic, the message is considered to
    be a duplicate message.  The data files used to store previously-seen
    message data can occupy a significant amount of disk space if many
    conferences are carried on a system.

    Unfortunately, all such schemes seem to suffer from the drawback that
    under the proper circumstances, messages that are not duplicates of
    each other may be created with identifying characteristics that are
    similar enough to be falsely recognized as duplicates.  The
    circumstances under which this can happen may differ from method to
    method, but none are totally foolproof.  Thus, it's possible that
    messages may be deleted as duplicates even though in reality they are
    not duplicates, but rather they are simply messages that contain data
    that make them appear to be duplicates.

    The most common cause of duplicate messages is improper echomail
    topology (also known as the infamous "dupe loop").  While there are
    certainly other ways that duplicates can be generated, improper
    topology is far and away the leading cause.  Further, many of the
    current duplicate elimination schemes will NOT catch most of the
    duplicates that are NOT generated as a result of improper topology
    (which is why duplicate messages are seen occasionally, even though
    duplicate message detection schemes are currently in use).

    Unfortunately, if a duplicate killer is to be effective, it must store
    the identifying characteristics for the last several thousand messages
    that have passed through a particular system.  This not only uses up
    disk storage space, it consumes extra processing time during echomail
    processing, since each new arriving message must be compared to the
    data list in the attempt to determine if it is, indeed, a duplicate.

    A better approach would be to store within a message itself data that
    identifies it as having already been received by a particular system,
    before sending it on to another system.  Then, if the same message
    FIDONEWS 14-09               Page 8                    3 Mar 1997


    came back to a given system in a "dupe loop", it would be possible to
    positively identify it as one that has already been seen on that
    particular system.  And, since the data necessary to identify the
    message as a duplicate is stored within the message itself, it is
    possible to use this method without the necessity of storing great
    amounts of data on previously-seen messages (in many implementations
    this alone would save 10K or more of disk space per conference
    carried!).

    Were it not for the fact that the PATH line present in most echomail
    messages does not contain Zone or Point information, we could use it
    for that purpose.  However, since it does not contain that
    information, it cannot and should not be used in that manner.  Another
    drawback of the PATH line is that because it is physically located at
    the end of a message (after the SEEN-BY lines), if only the last part
    of a message is scrambled or deleted, the PATH line information will
    be lost.

    C. Proposal:

    1) A new type of kludge line (commonly known within FIDONET as an
    "IFNA kludge line"), which combines certain characteristics of the
    existing PATH and SEEN-BY lines, will be placed into each echomail
    message.  This line, known as the ^APTH line, will be placed at the
    TOP of the message (not necessarily the first line, but prior to the
    body of the message text).  IMPORTANT: Support for the existing PATH
    and SEEN-BY lines will be retained as long as is necessary to
    accommodate everyone in Fidonet, but eventually the ^APTH line could
    possibly replace both the current PATH and SEEN-BY lines.

    2) The ^APTH line will contain full five-dimensional addressing
    (Zone:Net/Node.Point@Domain), BUT elements that are the same as the
    previous entry in the line need not be repeated (except when a message
    passes to a new domain, in which case the full address of the first
    node in the new domain shall be given).  When the "point" portion of
    an address stands alone, it shall be preceded by at least a "."
    character (to distinguish it from a node address).

    3) If a system is importing messages and finds a message with its own
    address already in the ^APTH line, it will discard the message (unless
    that address is in the very last position on the line... this allows
    for the odd situation where a point or another task on the same system
    has already inserted the system's address in the ^APTH line, or where
    it is desirable to process the same message a second time).

    4) One (and only one) modifier character may appear just AFTER any
    address on the ^APTH line.  When using the ^APTH for duplicate message
    checking only, you may just skip past any such address, unless it's
    your own address (see examples later in this document).  In that case,
    strip the address and the modifier character (in other words, if you
    see your own address but it's immediately followed by a modifier
    character, remove that address, add yours to the end of the ^APTH
    line, and toss the message anyway).  The reason for doing this is to
    allow the design of an echomail processor that doesn't rely on SEEN-
    BY's.  Such a processor could append a modifier character (such as a
    "!") to an address, in order to indicate that "this message hasn't
    FIDONEWS 14-09               Page 9                    3 Mar 1997


    really passed through this node, but don't send it back there" (which
    would be the equivalent of a SEEN-BY statement for that node,
    indicating that this message has already been sent to that node).
    Thus the ^APTH line could eventually take the place of SEEN-BY lines,
    but you could still have a "fully coupled" triangular or rectangular
    topology.  In this case, you'd add the nodes that are part of that
    fully coupled topology to the ^APTH line BEFORE sending the message to
    them, but with the special character after the address.  The receiver
    would know that the message didn't really pass through that node yet,
    but it should NOT send it to that node under any circumstances.

    (Please note that during the initial design of software to create
    ^APTH lines, you would not have to worry about generating the special
    case with the trailing modifier characters, you'd just have to be able
    to handle them as shown in the examples below if you came across one).

    D. Specifications and examples:

    The general specifications for a ^APTH line, and a general outline of
    how an incoming message might be processed follows.

    A valid ^APTH line will contain at a minimum the string ^APTH followed
    by a single space character and the network address of the system that
    created the ^APTH line, in Zone:Net/Node[.Point]@Domain format, where
    ^A is a 0x01 byte (SOH) and the point address is required only if the
    system is a point (specifically, a system that is NOT a point should
    not use .0).

    Once again, the FIRST Fidonet-technology address specified in a ^APTH
    line is expected to contain, at a minimum, Zone, Net, and Node
    numbers, and a valid Domain string preceded by the "@" character.  If
    any of these are missing from the FIRST address, the line should be
    considered defective (exception: See Note 5, "Messages sent to/from
    non-Fidonet-technology networks").  It will be left to the discretion
    of the software author as to how to handle a message with a defective
    ^APTH line.

    Subsequent addresses in the ^APTH line are delimited by spaces and
    should contain only that information that is different from the
    previous entry on the line, except when a message passes into a new
    domain (in which case the full address of the first system in the new
    domain shall be given) or when a bossnode receives a message from a
    point, in which case the bossnode should append its node number only.
    Specific examples follow:

         a. If the Domain and Zone are the same as the previous address,
            but the net is different, then only Net/Node[.Point] should be
            used.

         b. If the Domain, Zone and Net are the same as the previous
            address, but the node is different, then only Node[.Point]
            should be used.

         c. If the Domain, Zone, Net, and Node are the same as the
            previous address, but the point is different, then only .Point
            should be used.  Note that in this case, the period is
    FIDONEWS 14-09               Page 10                   3 Mar 1997


            included.

         d. If the Domain, Zone, Net, and Node are the same as the
            previous address, but the previous address contains a point
            specifier and the receiving system is not a point (i.e., it IS
            the bossnode), then only Node should be used.  .0 (point zero)
            might also be a valid entry in this case, but only if the
            bossnode consistently identifies itself to other systems using
            a full five-dimensional address.  For example, a message that
            originated on 1:234/5.6@Fidonet and went from there to 1:234/5
            would contain a ^APTH line in this format:
                            ^APTH 1:234/5.6@Fidonet 5
            If the bossnode is also considered to be point zero, then
                            ^APTH 1:234/5.6@Fidonet .0
            Would be equally valid.

    In the case of a "fully connected" topology, nodes may be added to the
    ^APTH line even though a message has not actually passed through those
    nodes, to prevent the message from being sent to those nodes.  Such
    nodes should have an exclamation point character ("!") appended to the
    end of the entry, immediately following the node or point number.
    These nodes should be added to the very end of a new or existing ^APTH
    line, after the address of the node which added them.

    For example, suppose that 157/200, 154/9, and 228/6 were in a "fully
    connected" topology.  When a message was received by 157/200 and then
    sent to 154/9 and 228/6, the ^APTH line might look something like
    this:

         ^APTH: 3:711/431.5@Fidonet 431 403 1:124/4210 4115 157/200 154/9!
    228/6!

    When a message arrives on one of the nodes indicated by the
    exclamation point, the exclamation point entry should be removed, and
    the node should add itself to the end of the line in the normal
    manner.  For example, after the message containing the above ^APTH
    line were received at 154/9, it would be modified to read:

         ^APTH: 3:711/431.5@Fidonet 431 403 1:124/4210 4115 157/200 228/6!
    154/9

    Please note that at the time of this proposal, the exclamation point
    (!) is the ONLY "officially recognized" modifier character that can be
    expected to be appended to a ^APTH line address (except for the
    @Domain string, of course), however, the possibility remains that
    someone may figure out a good reason to use a different trailing
    character for some other (but similar) purpose, so I am allowing for
    that possibility by using the generic terminology "modifier character"
    rather than the more specific "exclamation point" throughout this
    document.

    The ^APTH line must be terminated with a carriage return and/or
    linefeed (a carriage return followed by a linefeed is preferred, and
    should be used by all systems capable of generating a carriage
    return/linefeed combination).

    FIDONEWS 14-09               Page 11                   3 Mar 1997


    There is no specified limit on the length of a ^APTH line.  Each
    message should contain only one ^APTH line, even if it extends beyond
    the typical 80 column screen width.  The ^APTH line is primarily
    intended for use by the conference mail processing software, so
    primary consideration is being given to ease of processing the line,
    rather than making it easily human-readable (most software will not
    display kludge lines hidden behind a ^A character in any event).

    E. Pseudo-outline of message processing

    Here is a suggested flow pseudo-outline showing one way that messages
    might be processed in a standalone program that runs between the
    import and export cycles of an existing conference mail processor such
    as ConfMail (this outline assumes that the standard Fido/Opus style
    *.msg files are used, though obviously that need not be the case):

    1.  Open *.msg file for input

    2.  Open temporary file for output

    3.  Copy header (first 190 bytes) from input to output file.  The
        following operations begin immediately following this header.

    4.  Examine each line of input file (a line is delimited by a carriage
        return, linefeed, or any combination thereof) for one of the
        following:

        a.  A blank line - Write to output and examine next line.

        b.  A line containing spaces only - Write to output and examine
            next line.

        c.  A line that begins with a 01 byte (SOH) - GoTo 5.

        d.  A line that does not meet any of the above specifications.

            I.   Create a line containing the string ^APTH followed by a
                 single space character and your network address, in
                 Zone:Net/Node[.Point]@Domain format, where ^A is a 0x01
                 byte (SOH) and the point address is required only if you
                 are a point (specifically, a system that is NOT a point
                 should not necessarily use .0).  This line should be
                 terminated with a carriage return and/or linefeed (a
                 carriage return followed by a linefeed is preferred).

            II.  Write the line created in 4.d.I. to the output file.

            III. Write the line input in 4. to the output file.

            IV.  Goto 9.

    5.  If a line begins with a 0x01 (SOH) byte, examine the keyword
        immediately following it.

        a.  If the keyword is NOT "PTH", write the entire line to output
            and examine the next line (go back to 4).
    FIDONEWS 14-09               Page 12                   3 Mar 1997


    6.  If a line begins with ^APTH, examine each address in the line in
        turn.  Addresses start immediately following the characters "PTH "
        (note the space).

        a.  The FIRST Fidonet-technology address (not counting any
            pseudo-addresses consisting solely of "@Domain") is expected
            to contain, at a minimum, Zone, Net, and Node numbers, and a
            valid Domain string preceded by the "@" character.  If any of
            these are missing from the FIRST Fidonet-technology address,
            the line should be considered defective (See Note 5, "Messages
            sent to/from non-Fidonet-technology networks", for information
            on "@Domain" entries).  It will be left to the discretion of
            the software author as to how to handle a message with a
            defective ^APTH line.

        b.  As each address is found, any Zone, Net, and Node numbers and
            Domain strings found should be stored in temporary variables,
            to be used as defaults for subsequent addresses when only a
            partial address is given.  For example, the first address will
            contain a Zone number.  This should be stored in a temporary
            variable and used as the default Zone for all subsequent
            addresses, until and unless another Zone number is seen in the
            line, at which time that Zone number should be stored in the
            temporary variable and used as the default Zone.

        c.  If an address is found that consists entirely of the "@"
            character (as the first character of the address) followed by
            a domain name (with or without punctuation), all temporary
            variables (defaults) should be cleared (since any subsequent
            Fidonet-technology address should contain full
            Zone:Net/Node[.Point]@Domain information).  Otherwise, such
            pseudo-addresses (consisting solely of @Domain) may be ignored
            at systems that do not serve as inter-network gateways (such
            entries are maintained only by inter-network "gateway"
            software).  However, they should not under any circumstances
            be removed from the ^APTH line.

    7. As each address is found, it should be compared against the
       system's address.  If a match is found:

         a. Check to make sure that the address is not a point address if
            the system's address does not contain a point specifier.  If
            the system's address is given without a point specifier, then
            it should not be considered a match if ANY point address is
            found in the ^APTH line address that is being compared (not
            even .0 - for example, if the address 1:234/5.0 is seen in the
            ^APTH line, and 1:234/5 is the given system address, then it
            is NOT a match).

         b. If the address does match exactly, check to see if a modifier
            character (specifically the "!" character) immediately follows
            the address.  If it does, then that address must be removed
            from the line at that point.

            I.   When removing an address, please make sure that you do
                 not change the address of subsequent entries.  This may
    FIDONEWS 14-09               Page 13                   3 Mar 1997


                 require modification of the next entry on the line, if
                 one exists.  For example, suppose you had a "fully
                 connected" topology where 1:157/200 sent an echo to both
                 1:154/9 and 1:154/970. The ^APTH line might end
                 as follows:
                                 ..... 157/200 154/9! 970!
                 However, after modification of the ^APTH line, it should
                                 read: ..... 157/200 154/970! 9
                 You can see that if 154/9 were simply deleted without
                 regard to what follows on the line, the following
                 (incorrect) line might result:
                                 ..... 157/200 970! 154/9  (THIS IS
                 INCORRECT)
                 The above is incorrect because 154/970 has been
                 transformed into 157/970.

            II.  After removing an address followed by a modifier
                 character, continue to scan any remaining addresses in
                 the ^APTH line in case a match is found later in the
                 line.  If no other matches are found, proceed as if no
                 match had been found.  Goto 8.

         c.  Check to see if the address is the last one on the line (not
             counting addresses that have a modifier character immediately
             following them).  If this address is followed only by the end
             of the line, or ONLY by addresses that have a modifier
             trailing character, then there is a very high probability
             that we have either inadvertently or deliberately processed
             this message twice, and it is not really a duplicate.  In
             this case, the original *.msg file should be left untouched.

             I.   Close both the input and output files.

             II.  Delete the temporary output file.  END.

         d.  If a match is found, and it is not followed by a modifier
             character, and it is not the last address on the ^APTH line,
             then the message is a duplicate message and should be treated
             as such (either by deleting it, or moving it to a "bad
             messages" area or the netmail area).

             I.   Close both the input and output files.

             II.  Delete the temporary output file.

             III. Either delete or move the original .msg input file, as
                  appropriate.  END.

    8.  If the end of the ^APTH line is reached and a match has not been
        found, then add the system's address to the end of the ^APTH line.
        Then write the modified ^APTH line to the output file.

             I.   If one or more addresses with an appended modifier
                  character (used within "fully-coupled" topologies) are
                  to be added to the ^APTH line, they should be added at
                  the very end of the line, after the address of the
    FIDONEWS 14-09               Page 14                   3 Mar 1997


                  system currently processing the message).

    9.  Copy the remainder of the input file to the output file.  Close
        both files.

    10. Delete the input file.

    11. Rename the temporary output filename to the old input filename.
        END.

    [End of outline]

    F.  Additional notes and clarifications:

    Note 1:  In section 7.b.I. I mentioned the necessity of not simply
    deleting a node from the ^APTH line without checking to see if the
    next address in the ^APTH line needs to be modified.  This can easily
    be accomplished if TWO sets of temporary variables are kept, for the
    CURRENT and PREVIOUS Domain, Zone, Net, and Node information (Point
    addresses are NOT kept as defaults, thus there is no need to store
    Point information).  When reading the FIRST address in the ^APTH line,
    the Domain, Zone, Net, and Node information of that address would be
    stored in both the CURRENT and PREVIOUS variables.  Thereafter,
    whenever a new Domain string or  Zone, Net, or Node number is
    explicitly specified in a ^APTH line address, the new value(s) are
    stored in the CURRENT variables, but first the CURRENT values are
    moved to the PREVIOUS values.

    To help visualize this, let's again suppose we have a ^APTH line that
    ends as follows (all of these addresses are in Fidonet Zone 1):

         ..... 157/200 154/9! 970!

    Let's suppose that we are processing this message on 154/9, and will
    need to remove the 154/9! address.  When we encounter 157/200, our
    variables will be set as follows:

           Previous | Current
    Domain  Fidonet | Fidonet
    Zone      1     |    1
    Net       ?     |   157
    Node      ?     |   200

    Now, when we read 154/9, our current values will be moved to the
    previous:

           Previous | Current
    Domain  Fidonet | Fidonet
    Zone      1     |    1
    Net      157    |   154
    Node     200    |    9

    We now have the data we need to determine what needs to be added to
    the next address, after we delete 154/9.  In this case, we need only
    compare the Previous and Current addresses to determine which are
    UNEQUAL.  In this case, the Zone and Domain are the same, but the Net
    FIDONEWS 14-09               Page 15                   3 Mar 1997


    and Node are not.  So, if the following address lacks either the Net
    or Node, we'll have to add those.  Now we delete the 154/9! and look
    at the next address, 970.  At this point our variables will look like
    this:

           Previous | Current
    Domain  Fidonet | Fidonet
    Zone      1     |    1
    Net      154    |   154
    Node      9     |   970

    Again, we compare to see which addresses are UNEQUAL.  In this case,
    only the NODE address is.  So we know we do NOT have to add the NODE
    address, nor do we have to add the Zone or Domain information (because
    they were not different on the first compare).  We only need add those
    address components which were unequal on the first compare, but equal
    on the second compare.  So, in this case, the Net address must be
    added to the next address in the ^APTH line, leaving as a result:

         ..... 157/200 154/970!

    The current system address is then added back in at the end of the
    line, thus:

         ..... 157/200 154/970! 9

    Note that whenever a new Domain is specified, the full address (four-
    or five-dimensional, depending on whether a point address is given)
    must be used.  In other words, an address that includes an "@Domain"
    string but that does not also include the Zone, Net, and Node
    components of the address is considered invalid (it does not meet
    specifications).

    Note 2:  In section 4.d it is suggested that, when a line that is
    neither blank nor a kludge line (that begins with a ^A character) is
    found, a ^APTH line be added at that point.  However, there are
    reports that under certain circumstances (particularly when messages
    are "forwarded" or "hurled"), certain software may insert a non-kludge
    line prior to previously-existing kludge lines in a message.  It
    should be recognized by software authors that a non-kludge line should
    NEVER be inserted in front of existing kludge lines located at the
    start of a message, if those kludge lines are still valid (and if they
    are NOT still valid, they should be removed.  When a message is
    forwarded or hurled, it is probably desirable to remove duplicate
    control information since what is essentially happening is that the
    text of a previous message is being inserted into a NEW message.
    Since the message is new, the "old" duplicate control information is
    no longer valid).

    Software authors that are implementing the ^APTH line in their
    software should never search beyond the first text line of a message
    for the ^APTH line, because if one is found later in the text, it is
    in all probability an old ^APTH line that was inadvertently copied
    over from another message, and is not relevant to the current message.

    Note 3:  This is an optional suggestion, for use during the transition
    FIDONEWS 14-09               Page 16                   3 Mar 1997


    period in which the ^APTH line has to coexist with more traditional
    PATH and SEEN-BY lines.  If ^APTH line checking is being used during
    the import phase of echomail processing in a conference mail
    processor, it might be a good idea to optionally check to make sure
    that all ^APTH line addresses that are in the system's home Zone and
    Domain (including those with an appended modifier character) have been
    properly included in the SEEN-BY lines, and to add any that have not
    been so included.  It should be obvious that ^APTH line addresses that
    are NOT in the system's home Zone and Domain should NOT be added to
    the SEEN-BY lines.  If this feature is implemented, it may be a good
    idea to give the sysop the ability to enable or disable it by means of
    a command line switch or a configuration file option.

    Note 4:  If nodes with trailing modifier characters are inserted into
    a ^APTH line for the purpose of indicating "SEEN-BY" nodes in a fully
    coupled topology, it is permissible (but not required) to include
    those nodes ONLY in the ^APTH lines of messages actually exported to
    the nodes participating in the circular topology.  In other words,
    it's permissible to add such nodes to the ^APTH lines of messages
    during the import cycle, in which case messages with ^APTH lines
    containing the added nodes would be exported to all nodes.  However,
    it's also permissible to add those nodes to the ^APTH line during the
    export cycle, including them only in the ^APTH lines of the nodes that
    need to see them.  Please keep in mind that such nodes are added only
    to the END of the ^APTH line, AFTER the address of the system
    processing the message.  In any event, it's up to the software author
    to implement this feature in such a manner that duplicates will not be
    created.

    Similarly, if a node RECEIVES a message containing a ^APTH line that
    lists nodes with trailing modifier characters, it is permissible to
    remove those nodes from the ^APTH line if it can be positively
    ascertained that they are no longer required.  Generally speaking,
    this should NOT be done unless there is absolutely NO possibility of
    the message being exported to one of the nodes in question.  Note that
    in most situations, if a ^APTH line contains a node with a trailing
    modifier character, but it is followed by a node number (other than
    your own) that does NOT have a trailing modifier character (that is,
    the node with the trailing modifier character is not one of the last
    nodes on the line), then it can usually be safely removed since it
    will have already "passed through" the fully-coupled topology.

    Using the previous example of 157/200, 154/9, and 154/970
    participating in a fully-coupled topology, the ^APTH line as received
    at 154/9 and 154/970 might end as follows:

         ..... 157/200 154/9! 970!

    However, please note that if 157/200 also feeds other nodes that are
    NOT part of this particular fully coupled topology, there is no real
    reason they would have to see the "154/9! 970!" at the end of the
    line.  However, there is no prohibition against including those nodes
    in the ^APTH lines of messages exported to other nodes.

    Once this example message arrives at 154/9, the ^APTH line would be
    changed to look like this:
    FIDONEWS 14-09               Page 17                   3 Mar 1997


         ..... 157/200 154/970! 9

    Now, when this message is exported from 154/9 to another node (154/111
    for example), that node may remove the "154/970!" as long as 154/9
    remains in the ^APTH line, since as long as the message cannot be sent
    back to 154/9, it cannot re-enter the fully-coupled topology.  The
    ^APTH line at this point (after the message is received on 154/111)
    might look like this:

         ..... 157/200 154/9 111

    It would probably not be advisable to remove the "154/970!" at 154/9
    in this example, even if the message has already been exported,
    because the message might need to be re-exported (such as when a new
    board picks up an echo feed).

    When in doubt, nodes with trailing modifier characters (other than
    your own) should be left in the ^APTH line.  While there is a cost of
    a few extra bytes per message if you leave them in, it does not
    compare to the cost of the duplicate messages that could be generated
    if they are removed indiscriminately.

    Note 5:  Messages sent to/from non-Fidonet-technology networks:  When
    a message originates in, or is sent to, a non-Fidonet-technology
    network (a network that does not use the Zone:Net/Node.Point
    addressing format), it is permissible to indicate this in the ^APTH
    line by using the syntax "@Domain" standing alone.  For example, a
    message that comes into Fidonet via a gateway from the Internet might
    show a ^APTH line as follows:

         ^APTH: @Internet 1:114/15@Fidonet 5 ...

    Note that in the above example, the first Fidonet-technology address
    must still contain, at a minimum, Zone, Net, Node, and Domain
    information.

    It's also permissible to show a non-Fidonet-technology network at some
    point in the ^APTH line other than at the beginning, if for some odd
    reason a conference starts out in a Fidonet-technology network, passes
    through a non-Fidonet-technology network, and then is picked up by
    another Fidonet-technology network.  For example,

         ^APTH: [Fidonet addresses] ..... 114/5 15 @Internet
    200:5000/400@Metronet

    Note that "@Internet" stands alone in the above example, meaning that
    the conference originated in Fidonet, passed into the Internet (where
    the ^APTH line was not maintained), and then back into a Fidonet-
    technology network (Metronet in this case).  Note that any Fidonet-
    technology address that follows a standalone Domain specifier must
    contain, at a minimum, Zone, Net, Node, and Domain information.

    The question immediately arises, how do you maintain the original
    Fidonet-technology ^APTH line while the message passes through another
    (non-Fidonet-technology) network?  This could be left solely to the
    discretion of the designers of the gateway software, but in order to
    FIDONEWS 14-09               Page 18                   3 Mar 1997


    maintain a standard that can be followed by authors of different
    gateway software packages, I suggest that the ^APTH line be converted
    to one or more lines that start with the keyword FtnPth (For "Fidonet-
    technology ^APTH line), with the @Domain address of the non-Fidonet-
    technology network to which the message is being passed inserted as
    the last entry in the list.  For example, the following ^APTH line

         ^APTH: 3:711/431.5@Fidonet 431 403 1:124/4210 4115 114/5 15

    ... would be converted to the following ASCII text line in the message
    as sent to the Internet:

         FtnPth: 3:711/431.5@Fidonet 431 403 1:124/4210 4115 114/5 15
    @Internet

    If the receiving network has a line length limitation, then it may be
    necessary to break the ^APTH line into multiple FtnPth lines.

    If the message is later passed back into a Fidonet-technology network,
    the gateway software should ideally be able to take the FtnPth
    information and convert it back to proper ^APTH line syntax, adding
    the name of the network that the message was received from if not the
    same as the last network indicated in the FtnPth line(s).  Of course,
    if no FtnPth lines exist in message, then the gateway software should
    ideally create one, showing the network that the message was received
    from as the first entry in the ^APTH line.

    If this is done correctly (and if non-Fidonet-technology networks can
    be persuaded to leave the FtnPth lines intact), duplicate message
    detection can be maintained even if a message passes through a non-
    Fidonet network.  In addition, those in the other network will have
    access to information showing where the message originated, which
    systems it passed through, and where it entered their network, which
    can be a big help in tracking problem messages.  Finally, this
    information can be used to prevent undesirable message paths (for
    example, a message that enters Fidonet from a non-Fidonet-technology
    network and then is later sent back into that same network at a
    different gateway point, thus causing a potential duplicate message in
    the other network).

    Please note that in the above examples, references to @Internet are
    for example purposes only, and are not intended to specify the
    "correct" domain name (in preference to "UseNet" or "UUCP", for
    example).  Determination of the "correct" domain name for non-Fidonet-
    technology networks may be left to those who operate the domain
    gateways.

    Jack Decker
    October 7, 1990

    Change History:

    Version 001: 04/01/90 - Original document
    Version 002: 10/07/90 - Added support for Domains, and other minor
                 modifications to the text (mostly error correction).

    FIDONEWS 14-09               Page 19                   3 Mar 1997


    [Jack Decker is still around and wishes me to include his greeting to
    FidoNet and give his Internet address for anyone who wishes to say
    hello or discuss his FSC. He may be reached at:

       [email protected]  or  [email protected]

       or his homepage at: http://www.novagate.com/~jack

    He also recommends http://www.techknowtimes.com for tech types.] Ed.

     -30-

    -----------------------------------------------------------------

    FIDONEWS 14-09               Page 20                   3 Mar 1997


    =================================================================
                           COORDINATORS CORNER
    =================================================================


    Nodelist-statistics as seen from Zone-2 for day 059
    By Ward Dossche, 2:292/854
       ZC/2

     +----+------+------------+------------+------------+------------+--+
     |Zone|Nl-031|Nodelist-038|Nodelist-045|Nodelist-052|Nodelist-059|%%|
     +----+------+------------+------------+------------+------------+--+
     |  1 |  9877| 9729  -148 | 9527  -202 | 9527     0 | 9405  -122 |34|
     |  2 | 16078|16067   -11 |16074     7 |16051   -23 |16116    65 |57|
     |  3 |   863|  863     0 |  846   -17 |  812   -34 |  807    -5 | 3|
     |  4 |   550|  549    -1 |  538   -11 |  541     3 |  541     0 | 2|
     |  5 |    87|   87     0 |   87     0 |   87     0 |   87     0 | 0|
     |  6 |  1072| 1072     0 | 1071    -1 | 1071     0 | 1088    17 | 4|
     +----+------+------------+------------+------------+------------+--+
          | 28527|28367  -160 |28143  -224 |28089   -54 |28044   -45 |
          +------+------------+------------+------------+------------+

    -----------------------------------------------------------------

    FIDONEWS 14-09               Page 21                   3 Mar 1997


    =================================================================
                              WE GET EMAIL
    =================================================================


    --- Following message extracted from NETMAIL @ 1:18/14 ---
        By Christopher Baker on Sat Mar 01 19:57:39 1997

    From: Christopher Baker @ 1:18/14
    To: Bob Satti @ 1:1/0
    Date: 01 Mar 97  19:54:10
    Subj: looking for Internet links to FidoNet ops

    CC: Bob Kohl, Martin Belcke, Dave Beach, Phillip Dampier
    CC: Dave Miller, Marv Carson, B Becker, Dallas Hinton, Ken Tuley
    CC: James Ray, Ward Dossche, David Nugent, Ariel Nardelli
    CC: Henk Wolsink, Kazuyoshi Shinada, Bruce Bodger, Jason Steck
    CC: Adrian Walker, Ed Georgen, Ken Wilson, Sid Balcom
    CC: Marge Robbins, Brandon Carnahan, Brian Bonfietti, John Mudge
    CC: Dave Anderson, Ben Hamilton, John Souvestre, George Peace
    CC: Roy Timberman, Peter Witschi

    in case you hadn't noticed, there is a new section in FidoNews that
    lists FidoNet-related webpages and websites for Zones, Regions, and
    Nets. these listings also appear on the official FidoNews webpage at:

       http://ddi.digital.net/~cbaker84/fidonews.html

    and at the FidoNews HTML page listed in the Masthead each week.

    i would appreciate all ZCs and RCs passing this request down their
    chain of command and to their ECs down the chain as well.

    i would like to know about any and all FidoNet-related pages out
    there. the only way i can get that info after little response to
    FidoNews requests is to send you and your downlinks this Netmail.

    for example, i have a listing for REC19 at ccove that no longer seems
    to exist.  REC19? did you drop or change your webpage?

    Zones 4 and 5 don't have any links at all in the fidonet.org section.
    ZC4 and ZC5, do you have webpages down and over there?

    here is the current list as it appears in FidoNews:

    This is a list of all FidoNet-related sites reported to the Editor as
    of this appearance.

    ============

    FidoNet:

      Homepage     http://www.fidonet.org
      FidoNews     http://ddi.digital.net/~cbaker84/fidonews.html
      HTML FNews   http://www.geocities.com/Athens/6894/
      WWW sources  http://www.scms.rgu.ac.uk/students/cs_yr94/lk/fido.html
    FIDONEWS 14-09               Page 22                   3 Mar 1997


      FTSC page    http://www2.blaze.net.au/ftsc.html
      Echomail     http://www.portal.ca/~awalker/index.html
      WebRing      http://ddi.digital.net/~cbaker84/fnetring.html

    ============

    Zone 1:        http://www.z1.fidonet.org

      Region 10:
                   http://www.psnw.com/~net205/region10.html

                   http://www.dharmanet.org/BDO/net125.html

      Region 15:
                   http://www.smrtsys.com/region15/

      Region 16:
                   http://www.tiac.net/users/satins/region16.htm

                   http://www.tiac.net/users/satins/net330.htm

      Region 17:
                   http://www.portal.ca/~awalker/region17.htm

      Region 18:
                   http://www.citicom.com/fido.html

      Region 19:
                   http://ccove.n-link.com/

    ============

    Zone 2:        http://www.z2.fidonet.org
            ZEC2   http://fidoftp.paralex.co.uk/zec.htm

      Region 25:
                   http://members.aol.com/Net254/

      Region 29:   http://www.rtfm.be/fidonet/  (in French)

      Region 34:   http://www.pobox.com/cnb/r34.htm  (in Spanish)

      Region 36:   http://www.geocities.com/SiliconValley/7207/

    ============

    Zone 3:        http://www.z3.fidonet.org

    ============

    Zone 4:        (not yet listed)

    ============

    Zone 5:        (not yet listed)

    FIDONEWS 14-09               Page 23                   3 Mar 1997


    ============

    Zone 6:        http://www.z6.fidonet.org

    ============

     -30-

    would any of you care to add your Internet info for publication in
    FidoNews and on the FidoNews webpage?

    please pass this request along.

    thanks.

    QOFM.
    Chris
    FidoNews Editor [in case you've been out of touch for 8 months] [grin]

     -30-

    -----------------------------------------------------------------

    FIDONEWS 14-09               Page 24                   3 Mar 1997


    =================================================================
                                NET HUMOR
    =================================================================


    From: "Mike Riddle" <[email protected]>
    To: "Baker, Christopher" <[email protected] (Christopher Baker)>,
    Date: Thu, 20 Feb 97 08:15:31 -0600
    Reply-To: "Mike Riddle" <[email protected]>
    Subject: From another list....

                     PC Humour

             Q. What lizards like to sit on PCs?
             A. Monitors.

             Q. How do cold PC programmers feel?
             A. IC.

             Q. What do Wiccan computer experts ride in?
             A. A hex bus.

             Q. How do memory chip experts want their payment?
             A. In cache.

             Q. How do programmers write a debt notice?
             A. I/O U.

             Q. How did the Hunchback of Notre Dame surf the Net?
             A. With a quasi-modem.

             Q. How is Seagate like a rutted road?
             A. They both make hard drives.

             Q. What kind of lingerie do lady programmers like?
             A. Softwear.

    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

    United States of A-moo-rica's state of the week:

    Moonesota

     -30-








    -----------------------------------------------------------------

    FIDONEWS 14-09               Page 25                   3 Mar 1997


    =================================================================
                                 NOTICES
    =================================================================

                               Future History

    17 May 1997
       Independence Day, Norway.

    25 May 1997
       Independence Day, Argentina.

     6 Jun 1997
       National Commemoration Day, Sweden.

    11 Jun 1997
       Independence Day, Russia.

     1 Jul 1997
       Canada Day - Happy Birthday Canada.

    13 Oct 1997
       Thanksgiving Day, Canada.

     1 Dec 1997
       World AIDS Day.

    10 Dec 1997
       Nobel Day, Sweden.

    12 Jan 1998
       HAL 9000 is one year old today.

    22 May 1998
       Expo '98 World Exposition in Lisbon (Portugal) opens.

     1 Dec 1998
       Fifteenth Anniversary of release of Fido version 1 by
       Tom Jennings.

    31 Dec 1999
       Hogmanay, Scotland. The New Year that can't be missed.

     1 Jan 2000
       The 20th Century, C.E., is still taking place thru 31 Dec.

    15 Sep 2000
       Sydney (Australia) Summer Olympiad opens.

     1 Jan 2001
       This is the actual start of the new millennium, C.E.

    -- If YOU have something which you would like to see in this
       Future History, please send a note to the FidoNews Editor.

    -----------------------------------------------------------------
    FIDONEWS 14-09               Page 26                   3 Mar 1997


    =================================================================
                        FIDONET SOFTWARE LISTING
    =================================================================


    Latest Greatest Software Versions
    by Peter E. Popovich, 1:363/264

    All right, I admit it. I've been slacking off. I didn't get anything
    done this week. Sigh.

    The good news is that the old info section is down to under 40
    percent, so we're seeing some real progress there.

    Phased out this week: "OS/2 Systems" Section

    Phase-out highlights:
      This week: "Amiga" Section
            Deadline for info: 14 Mar 1997.
      Last week: "Atari ST/TT" Section
            Deadline for info: 7 Mar 1997.

    -=- Snip -=-

    Submission form for the Latest Greatest Software Versions column

    OS Platform                             :
    Software package name                   :
    Version                                 :
    Function(s) - BBS, Mailer, Tosser, etc. :
    Freeware / Shareware / Commercial?      :
    Author / Support staff contact name     :
    Author / Support staff contact node     :
    Magic name (at the above-listed node)   :

    Please include a sentence describing what the package does.

    Please send updates and suggestions to: Peter Popovich, 1:363/264

    -=- Snip -=-

    MS-DOS:
    Program Name   Version  F C Contact Name      Node        Magic Name
    ----------------------------------------------------------------------
    Act-Up         4.6      G D Chris Gunn        1:15/55     ACT-UP
    ALLFIX         4.40     T S Harald Harms      2:281/415   ALLFIX
    Announcer      1.1      O S Peter Karlsson    2:206/221   ANNOUNCE
    BGFAX          1.60     O S B.J. Guillot      1:106/400   BGFAX
    Binkley Docs   2.60     M F Bob Juge          1:1/102     BDOC_260.ZIP
    BinkleyTerm    2.60     M F Bob Juge          1:1/102     BDOS_260.ZIP
    BinkleyTerm-XE XR4      M F Thomas Waldmann   2:2474/400  BTXE_DOS
    CFRoute        0.92     O G C. Fernandez Sanz 2:341/70    CFR
    CheckPnt       1.0      O G Michiel vd Vlist  2:500/9     CHECKPNT
    FastEcho       1.45a    T S Tobias Burchhardt 2:2448/400  FASTECHO
    FastEcho/16    1.45a    T S Tobias Burchhardt 2:2448/400  FE16
    FidoBBS (tm)   12u      B S Ray Brown         1:1/117     FILES
    FIDONEWS 14-09               Page 27                   3 Mar 1997


    FrontDoor      2.12     M S JoHo              2:201/330   FD
    FrontDoor      2.20c    M C JoHo              2:201/330   FDINFO
    GIGO           07-14-96 G S Jason Fesler      1:1/141     INFO
    GoldED         2.50     O S Len Morgan        1:203/730   GED
    GoldED Docs    2.50     O S Len Morgan        1:203/730   GEM
    GoldNODE       2.50     O S Len Morgan        1:203/730   GEN
    Imail          1.75     T S Michael McCabe    1:1/121     IMAIL
    ImCrypt        1.04     O G Michiel vd Vlist  2:500/9     IMCRYPT
    InfoMail       1.11     O F Damian Walker     2:2502/666  INFOMAIL
    InfoMail/386   1.20     O F Damian Walker     2:2502/666  INFO386
    InterEcho      1.19     T C Peter Stewart     1:369/35    IEDEMO
    InterMail      2.29k    M C Peter Stewart     1:369/35    IMDEMO
    InterPCB       1.52     O S Peter Stewart     1:369/35    INTERPCB
    IPNet          1.11     O S Michele Stewart   1:369/21    IPNET
    JD's CBV       1.4      O S John Dailey       1:363/277   CBV
    Jelly-Bean     1.01     T S Rowan Crowe       3:635/727   JELLY
    Jelly-Bean/386 1.01     T S Rowan Crowe       3:635/727   JELLY386
    JMail-Hudson   2.81     T S Jason Steck       1:285/424   JMAIL-H
    JMail-Goldbase 2.81     T S Jason Steck       1:285/424   JMAIL-G
    MakePl         1.9      N G Michiel vd Vlist  2:500/9     MAKEPL
    Marena         1.1 beta O G Michiel vd Vlist  2:500/9     MARENA
    Maximus        3.01     B P Tech              1:249/106   MAX
    McMail         1.0      M S Michael McCabe    1:1/148     MCMAIL
    MDNDP          1.18     N S Bill Doyle        1:388/7     MDNDP
    Msged          4.10     O G Andrew Clarke     3:635/728   MSGED41D.ZIP
    Msged/386      4.10     O G Andrew Clarke     3:635/728   MSGED41X.ZIP
    Opus CBCS      1.73a    B P Christopher Baker 1:374/14    OPUS
    O/T-Track      2.63a    O S Peter Hampf       2:241/1090  OT
    PcMerge        2.7      N G Michiel vd Vlist  2:500/9     PCMERGE
    PlatinumXpress 1.3      M C Gary Petersen     1:290/111   PX13TD.ZIP
    QuickBBS       2.81     B S Ben Schollnick    1:2613/477  QUICKBBS
    RAR            2.00     C S Ron Dwight        2:220/22    RAR
    RemoteAccess   2.50     B S Mark Lewis        1:3634/12   RA
    Silver Xpress
      Door         5.4      O S Gary Petersen     1:290/111   FILES
      Reader       4.4      O S Gary Petersen     1:290/111   SXR44.ZIP
    Spitfire       3.51     B S Mike Weaver       1:3670/3    SPITFIRE
    Squish         1.11     T P Tech              1:249/106   SQUISH
    StealTag UK    1.c...   O F Fred Schenk       2:284/412   STEAL_UK
    StealTag NL    1.c...   O F Fred Schenk       2:284/412   STEAL_NL
    T-Mail         2.599I   M S Ron Dwight        2:220/22    TMAIL
    Terminate      4.00     O S Bo Bendtsen       2:254/261   TERMINATE
    Tobruk         0.33     T G Paul Edwards      3:711/934   TOBRUK
    TriBBS         10.0     B S Patrick Driscoll  1:372/19    TRIBBS
    TriDog         10.0     M S Patrick Driscoll  1:372/19    TRIDOG
    TriToss        10.0     T S Patrick Driscoll  1:372/19    TRITOSS
    WaterGate      0.92     G S Robert Szarka     1:320/42    WTRGATE
    WWIV           4.24a    B S Craig Dooley      1:376/126   WWIV
    WWIVTOSS       1.36     T S Craig Dooley      1:376/126   WWIVTOSS
    xMail          2.00     T S Thorsten Franke   2:2448/53   XMAIL
    XRobot         3.01     O S JoHo              2:201/330   XRDOS

    OS/2:
    Program Name   Version  F C Contact Name      Node        Magic Name
    ----------------------------------------------------------------------
    ALLFIX/2       1.10     T S Harald Harms      2:281/415   AFIXOS2
    FIDONEWS 14-09               Page 28                   3 Mar 1997


    BGFAX          1.60     O S B.J. Guillot      1:106/400   BGFAX
    Binkley Docs   2.60     M F Bob Juge          1:1/102     BDOC_260.ZIP
    BinkleyTerm    2.60     M F Bob Juge          1:1/102     BOS2_260.ZIP
    BinkleyTerm-XE XR4      M F Thomas Waldmann   2:2474/400  BTXE_OS2
    CFRoute        0.92     O G C. Fernandez Sanz 2:341/70    CFR
    FastEcho       1.45a    T S Tobias Burchhardt 2:2448/400  FE2
    FleetStreet    1.19     O S Michael Hohner    2:2490/2520 FLEET
    GIGO           07-14-96 G S Jason Fesler      1:1/141     INFO
    GoldED         2.50     O S Len Morgan        1:203/730   GEO
    GoldED Docs    2.50     O S Len Morgan        1:203/730   GEM
    GoldNODE       2.50     O S Len Morgan        1:203/730   GEN
    ImCrypt        1.04     O G Michiel vd Vlist  2:500/9     IMCRYPT
    Maximus        3.01     B P Tech              1:249/106   MAXP
    Msged/2        4.10     O G Andrew Clarke     3:635/728   MSGED41O.ZIP
    PcMerge        2.3      N G Michiel vd Vlist  2:500/9     PCMERGE
    RAR            2.00     C S Ron Dwight        2:220/22    RAR2
    Squish         1.11     T P Tech              1:249/106   SQUISHP
    T-Mail         2.599I   M S Ron Dwight        2:220/22    TMAIL2
    Tobruk         0.33     T G Paul Edwards      3:711/934   TOBRUK
    XRobot         3.01     O S JoHo              2:201/330   XROS2

    Windows (16-bit apps):
    Program Name   Version  F C Contact Name      Node        Magic Name
    ----------------------------------------------------------------------
    BeeMail        1.0      M C Andrius Cepaitis  2:470/1     BEEMAIL
    FrontDoor APX  1.10     P S Mats Wallin       2:201/329   FDAPXW

    Windows (32-bit apps):
    Program Name   Version  F C Contact Name      Node        Magic Name
    ----------------------------------------------------------------------
    BeeMail        1.0      M C Andrius Cepaitis  2:470/1     BEEMAIL
    Binkley Docs   2.60     M F Bob Juge          1:1/102     BDOC_260.ZIP
    BinkleyTerm    2.60     M F Bob Juge          1:1/102     BW32_260.ZIP
    CFRoute        0.92     O G C. Fernandez Sanz 2:341/70    CFR
    GoldED         2.50     O S Len Morgan        1:203/730   GEO
    GoldED Docs    2.50     O S Len Morgan        1:203/730   GEM
    Maximus        3.01     B P Tech              1:249/106   MAXN
    Msged/NT       4.10     O G Andrew Clarke     3:635/728   MSGED41W.ZIP
    PlatinumXpress 2.00     M C Gary Petersen     1:290/111   PXW-INFO
    T-Mail         2.599I   M S Ron Dwight        2:220/22    TMAILNT
    WinFOSSIL/95   1.12 r4  F S Bryan Woodruff    1:343/294   WNFOSSIL.ZIP
    WinFOSSIL/NT   1.0 beta F S Bryan Woodruff    1:343/294   NTFOSSIL.ZIP

    Unix:
    Program Name   Version  F C Contact Name      Node        Magic Name
    ----------------------------------------------------------------------
    ifmail         2.9      M G Eugene Crosser    2:293/2219  IFMAIL
    ifmail-tx      ...tx7.9 M G Pablo Saratxaga   2:293/2219  IFMAILTX
    Msged          4.00     O G Paul Edwards      3:711/934   MSGED
    Tobruk         0.33     T G Paul Edwards      3:711/934   TOBRUK

    Amiga:
    Program Name   Version  F C Contact Name      Node        Magic Name
    ----------------------------------------------------------------------
    CrashMail      1.23     T X Fredrik Bennison  2:205/324   CRASHMAIL
    CrashTick      1.1      O F Fredrik Bennison  2:205/324   CRASHTICK
    FIDONEWS 14-09               Page 29                   3 Mar 1997


    DLG Pro BBOS   1.15     B C Holly Sullivan    1:202/720   DLGDEMO
    GMS            1.1.85   M S Mirko Viviani     2:331/213   GMS
    Msged          4.00     O G Paul Edwards      3:711/934   MSGED
    Tobruk         0.33     T G Paul Edwards      3:711/934   TOBRUK

    Atari:
    Program Name   Version  F C Contact Name      Node        Magic Name
    ----------------------------------------------------------------------
    BinkleyTerm/ST 3.18pl1  M F Bill Scull        1:363/112   BINKLEY

    Function: B-BBS, P-Point, M-Mailer, N-Nodelist, G-Gateway, T-Tosser,
              C-Compression, F-Fossil, O-Other. Note: Multifunction will
              be listed by the first match.

    Cost: P-Free for personal use, F-Freeware, S-Shareware, C-Commercial,
          X-Crippleware, D-Demoware, G-Free w/ Source

    Old info from: 01/27/92
    ---------------------------------------------------------------------

      MS-DOS Systems        Other Utilities         Other Utilities
      --------------        Name         Version    Name         Version
                            --------------------    --------------------
    Network Mailers         2DAPoint        1.50*   Netsex         2.00b
    Name         Version    4Dog/4DMatrix   1.18    OFFLINE         1.35
    --------------------    ARCAsim         2.31    Oliver          1.0a
    D'Bridge        1.30    ARCmail         3.00*   OSIRIS CBIS     3.02
    Dreamer         1.06    Areafix         1.20    PKInsert        7.10
    Dutchie        2.90c    ConfMail        4.00    PolyXarc        2.1a
    Milqtoast       1.00    Crossnet         1.5    QM             1.00a
    PreNM           1.48    DOMAIN          1.42    QSort           4.04
    SEAdog          4.60    DEMM            1.06    RAD Plus        2.11
    SEAmail         1.01    DGMM            1.06    Raid            1.00
    TIMS       1.0(mod8)    DOMAIN          1.42    RBBSMail        18.0
                            EEngine         0.32    ScanToss        1.28
    Compression             EMM             2.11*   ScMail          1.00
    Utilities               EZPoint          2.1    ScEdit          1.12
    Name         Version    FGroup          1.00    Sirius          1.0x
    --------------------    FidoPCB         1.0s@   SLMail         2.15C
    ARC             7.12    FNPGate         2.70    StarLink        1.01
    ARJ             2.20    GateWorks      3.06e    TagMail         2.41
    LHA             2.13    GMail           2.05    TCOMMail         2.2
    PAK             2.51    GMD             3.10    Telemail         1.5*
    PKPak           3.61    GMM             1.21    TGroup          1.13
    PKZip           1.10    GROUP           2.23    TIRES           3.11
                            GUS             1.40    TMail           1.21
    NodeList Utilities      Harvey's Robot  4.10    TosScan         1.00
    Name         Version    HeadEdit        1.18    UFGATE          1.03
    --------------------    HLIST           1.09    VPurge         4.09e
    EditNL          4.00    ISIS            5.12@   WEdit            2.0@
    FDND            1.10    Lola           1.01d    WildMail        2.00
    MakeNL          2.31    Mosaic         1.00b    WMail            2.2
    Parselst        1.33    MailBase       4.11a@   WNode            2.1
    Prune           1.40    MSG              4.5*   XRS             4.99
    SysNL           3.14    MsgLnk          1.0c    XST             2.3e
    XlatList        2.90    MsgMstr        2.03a    YUPPIE!         2.00
    FIDONEWS 14-09               Page 30                   3 Mar 1997


    XlaxNode/Diff   2.53    MsgNum         4.16d    ZmailH          1.25
                            MSGTOSS          1.3    ZSX             2.40

        - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    BBS Software            Macintosh               Other Software
    Name         Version    ---------               Name         Version
    --------------------                            --------------------
    FBBS            0.91    Network Mailers         MacArd          0.04
    Hermes         1.6.1    Name         Version    Mantissa        3.21
    Mansion         7.15    --------------------    Mehitable        2.0
    Precision Sys. 0.95b    Copernicus       1.0    OriginatorII     2.0
    Red Ryder Host   2.1    Tabby            2.2    PreStamp         3.2
    Telefinder Host                                 StuffIt Classic  1.6
                 2.12T10    Other Software          SunDial          3.2
                            Name         Version    TExport         1.92
                            --------------------    TimeStamp        1.6
    Point System            ArcMac           1.3    TImport         1.92
    Software                AreaFix          1.6    Tset             1.3
    Name         Version    Compact Pro     1.30    TSort            1.0
    --------------------    EventMeister     1.0    UNZIP          1.02c
    Copernicus      1.00    Export          3.21    Zenith           1.5
    CounterPoint    1.09    Import           3.2    Zip Extract     0.10
    MacWoof          1.1    LHARC           0.41

        - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

        Amiga               Network Mailers         Other Software
        -----               Name         Version    Name         Version
                            --------------------    --------------------
    BBS Software            BinkleyTerm     1.00    Areafix         1.48
    Name         Version    TrapDoor        1.80    AReceipt         1.5
    --------------------    WelMat          0.44    ChameleonEdit   0.11
    4D-BBS          1.65                            ConfMail        1.12
    Falcon CBCS     1.00                            ElectricHerald  1.66
    Starnet         1.0q@   Compression             FFRS             1.0@
    TransAmiga      1.07    Utilities               FileMgr         2.08
    XenoLink         1.0    Name         Version    Fozzle           1.0@
                            --------------------    Login           0.18
                            AmigArc         0.23    MessageFilter   1.52
    NodeList Utilities      booz            1.01    Message View    1.12
    Name         Version    LHARC           1.30    oMMM            1.50
    --------------------    LhA             1.10    PolyXAmy        2.02
    ParseLst        1.66    LZ              1.92    RMB             1.30
    Skyparse        2.30    PkAX            1.00    Roof           46.15
    TrapList        1.40    UnZip            4.1    RoboWriter      1.02
                            Zippy (Unzip)   1.25    Rsh            4.07a
                            Zoo             2.01    Tick            0.75
                                                    TrapToss        1.20
    |Contact: Maximilian Hantsch 2:310/6|           Yuck!           2.02

        - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    BBS Software            Atari ST/TT
    Name         Version    -----------
    --------------------
    FIDONEWS 14-09               Page 31                   3 Mar 1997


    FIDOdoor/ST    2.5.1    Network Mailers         Other Utilities
    FiFo            2.1v    Name         Version    Name         Version
    LED ST          1.00    --------------------    --------------------
    QuickBBS/ST     1.06*   The Box         1.95*   ApplyList       1.00@
                                                    Burep            1.1
    Compression                                     ComScan         1.04
    Utilities               NodeList  Utilities     ConfMail        4.10
    Name         Version    Name         Version    Echoscan        1.10
    --------------------    --------------------    FDrenum        2.5.2
    ARC             6.02    ParseList       1.30    FastPack        1.20
    LHARC          2.01i    EchoFix         1.20    Import          1.14
    PackConvert             sTICK/Hatch     5.50    oMMM            1.40
    STZip            1.1*                           Pack            1.00
    UnJARST         2.00                            Trenum          0.10
    WhatArc         2.02

    --  --  --  --  --  --  --  --  --  --  --  --  --  --  --  --  --
    Key to old info:
          + - Netmail Capable (Doesn't Require Additional Mailer Software)
          * - Recently Updated Version
          @ - New Addition
    --  --  --  --  --  --  --  --  --  --  --  --  --  --  --  --  --

    Please send updates and suggestions to: Peter Popovich, 1:363/264

    -----------------------------------------------------------------

    FIDONEWS 14-09               Page 32                   3 Mar 1997


    =================================================================
                           FIDONEWS PUBLIC-KEY
    =================================================================


    [this must be copied out to a file starting at column 1 or
     it won't process under PGP as a valid public-key]


    -----BEGIN PGP PUBLIC KEY BLOCK-----
    Version: 2.6.2
    Comment: Clear-signing is Electronic Digital Authenticity!

    mQCNAzINVLcAAAEEAM5dZN6t6j5Yc0kl7qegVFfiBeVoteuhDg4ay8h43u38Q4kO
    eJ9Mm7J89wXFb9vgouBVb4biIN6bTWCwcXTbGhBe5OIceLvluuxuEKsaIs/UwXNe
    Ogx5azIPhRfC7MJDe41Z8tMEBuHY/NE88cuxQ8yXWO126IRttavu6L/U5BwRAAUR
    tCRGaWRvTmV3cyBFZGl0b3IgPDE6MS8yM0BmaWRvbmV0Lm9yZz6JAJUDBRAyGwFS
    JZMgw7eCKz0BAZl0A/9xrfhpsEOqGiPfjy2qd9dv6tvSVPPVFu+Wy1lGTHYtuTtg
    FIN3fQ47AM3XzqHxWRWvp/xZYgR6sRICL7UFx94ShYBQc7CyqBBZKA0IvIWqXP/g
    c4Br+gQJR6CLiQK7TUyjUbqNbs6QAxuNUi4xFQM+O2Gene5/iTjHFmmSDj2C9YkB
    FQMFEDIOmHDTQ6/52IG1SQEBQ78H/Rz/mleIrtZwFIOhzy3JH4Z6FUTfZuM9nPcs
    1ZLjZCPptHvY7wEYJWGr03lPPJ6tj1VBXwTrWJTf/hOLsoi00GKV8t1thjqGDo23
    O91/bSQ+Vn0vBQ2vOEJys8ftxdoLJAyI5YLzHVT+RsMTQLIXVuPyrNcKs1vC2ql+
    UDHpU1R+9cG9JUEHpGI6z0DPnQ74SKbQH3fiVBpHhYx4BmvcBC4gWQzKMkDWFiq3
    8AssIZ7b9lWl3OBgQ4UM1OIDKoJyjRewIdKyl7zboKSt6Qu8LrcsXO3kb81YshOW
    ZpSS3QDIqfZC4+EElnB15l4RcVwnPHBaQY0FxUr4Vl4UWM36jbuJAJUDBRAyDpgY
    q+7ov9TkHBEBAQGoA/sFfN07IFQcir456tJfBfB9R5Z6e6UKmexaFhWOsLHqbCq6
    3FGXDLeivNn6NTz81QeqLIHglTuM3NP1mu8sw215klAG8G3M1NA2xLw7Eqhspze2
    raGvNeEwxl8e+PY9aZwBj4UWU+CmIm6QNiP0MtvR7QYDIKn5mZCDc3CLmr942IkB
    FQMFEDIOh0O8AhTPqRipPQEB4EYH/1gkDmdHL6lbEkFuQLrylF+weBl0XQ+kv7ER
    vWXYrvIrkppxtc4VAge6CXXEbOGJnvkFHgyNZzO9Q9O64QsmZvjip+4lhDLeNrdH
    X9DizS4YKXxkSKr9Yltmn2/AlBCx6jwcDIfkqy/P1tNWcikxZZMd6KryK0Wsres9
    Ik12OmVmJjQSxb5bS6Q8aYUbV3qwosGXTqy+BzYh/UYAX/XJIWa5kxFVSPKFSZ+5
    toiSzANd9SpHPEogGvQDHJlJ23lmsMx/6uHsR1LTsQ8su8zIk92XyqePJTjlMx2j
    D7KJWNR7Zzu4QHCXBkga5W8l2FfPk7D3+o7bXTLRuR1yTYGdNoiJAJUCBRAyDhwt
    SlKLwP4OFW0BAdaMA/9rcWQlSq44K9JuJ7fZUgt9fwxGreTud9fC8DvlbUW79+CA
    AHLTLLagcEF1OKsWzVBWcA2JEAp+TUTqktRN0oD8vnaw3uNJd1G5KK59hw0WR8x1
    v4ivypbSjiq95Y3gBunb7WjpyiFRWDlm0PrKrWHtbWzjnpPIpetln1UuqsSfbokB
    FQIFEDIOG9C3N61ZQ4Dr/QEBIzMH/1VxxztmBPBszbjZLDO8Svcax9Ng8IcWpcDy
    WqHCAA2Hoe5VtMD0v6w31ZgVqTPIvCark2Y/aTR1GofiuN9NUqbVV534AgAYLzYk
    DMT1swsPvqDTpOYgQl6PCGh6A5JGAbWJfKkX9XCUHJAAmiTsEVRNnjOgL+p6qjoh
    EfIG8CGehghWSRKl5eGeDAtbXupZKNjFI1t2XV+ks0RFQ/RPuTH7pF7pk7WO6Cyg
    +Dk2ZMgua0HRL1fXvHKb5Xzr3MVgsbAl5gP8ooIiD9MI/x5Irh3oo58VyoEZNBs/
    Kz+drGFDPljcS6fdiVCFtYIzMrshY6YsfLi0aB8fwOvFtxgBqli0J0NocmlzdG9w
    aGVyIEJha2VyIDwxOjE4LzE0QGZpZG9uZXQub3JnPrQoQ2hyaXN0b3BoZXIgQmFr
    ZXIgPGNiYWtlcjg0QGRpZ2l0YWwubmV0Pg==
    =61OQ
    -----END PGP PUBLIC KEY BLOCK-----


    File-request FNEWSKEY from 1:1/23 [1:18/14] or download it from the
    Rights On! BBS at 1-904-409-7040 anytime except 0100-0130 ET and Zone
    1 ZMH at 1200-9600+ HST/V32B. The FidoNews key is also available on
    the FidoNews homepage listed in the Masthead information.

    -----------------------------------------------------------------
    FIDONEWS 14-09               Page 33                   3 Mar 1997


    =================================================================
                           FIDONET BY INTERNET
    =================================================================

    This is a list of all FidoNet-related sites reported to the Editor as
    of this appearance.

    ============

    FidoNet:

      Homepage     http://www.fidonet.org
      FidoNews     http://ddi.digital.net/~cbaker84/fidonews.html
      HTML FNews   http://www.geocities.com/Athens/6894/
      WWW sources  http://www.scms.rgu.ac.uk/students/cs_yr94/lk/fido.html
      FTSC page    http://www2.blaze.net.au/ftsc.html
      Echomail     http://www.portal.ca/~awalker/index.html
      WebRing      http://ddi.digital.net/~cbaker84/fnetring.html

    ============

    Zone 1:        http://www.z1.fidonet.org

      Region 10:
                   http://www.psnw.com/~net205/region10.html

                   http://www.dharmanet.org/BDO/net125.html

      Region 15:
                   http://www.smrtsys.com/region15/

      Region 16:
                   http://www.tiac.net/users/satins/region16.htm

                   http://www.tiac.net/users/satins/net330.htm

      Region 17:
                   http://www.portal.ca/~awalker/region17.htm

      Region 18:
                   http://www.citicom.com/fido.html

      Region 19:
                   http://ccove.n-link.com/

    ============

    Zone 2:        http://www.z2.fidonet.org
            ZEC2   http://fidoftp.paralex.co.uk/zec.htm

      Region 25:
                   http://members.aol.com/Net254/

      Region 29:   http://www.rtfm.be/fidonet/  (in French)

      Region 34:   http://www.pobox.com/cnb/r34.htm  (in Spanish)
    FIDONEWS 14-09               Page 34                   3 Mar 1997


      Region 36:   http://www.geocities.com/SiliconValley/7207/

    ============

    Zone 3:        http://www.z3.fidonet.org

    ============

    Zone 4:        (not yet listed)

    ============

    Zone 5:        (not yet listed)

    ============

    Zone 6:        http://www.z6.fidonet.org

    ============

    -----------------------------------------------------------------

    FIDONEWS 14-09               Page 35                   3 Mar 1997


    =================================================================
                          FIDONEWS INFORMATION
    =================================================================

    ------- FIDONEWS MASTHEAD AND CONTACT INFORMATION -------

    Editor: Christopher Baker

    Editors Emeritii: Tom Jennings, Thom Henderson, Dale Lovell,
                      Vince Perriello, Tim Pozar, Sylvia Maxwell,
                      Donald Tees

    "FidoNews Editor"
        FidoNet  1:1/23
        BBS  1-904-409-7040,  300/1200/2400/14400/V.32bis/HST(ds)

     more addresses:
        Christopher Baker -- 1:18/14, [email protected]
                                      [email protected]
                                      [email protected]

    (Postal Service mailing address)
        FidoNews Editor
        P.O. Box 471
        Edgewater, FL 32132-0471
        U.S.A.


    voice:  1-904-409-3040 [1400-2100 ET only, please]
                           [1800-0100 UTC/GMT]

    ------------------------------------------------------

    FidoNews is published weekly by and for the members of the FIDONET
    INTERNATIONAL AMATEUR ELECTRONIC MAIL system.  It is a compilation
    of individual articles contributed by their authors or their
    authorized agents.  The contribution of articles to this compilation
    does not diminish the rights of the authors.  OPINIONS EXPRESSED in
    these articles ARE THOSE OF THE AUTHORS and not necessarily those of
    FidoNews.

    Authors retain copyright on individual works; otherwise FidoNews is
    Copyright 1997 Christopher Baker.  All rights reserved.  Duplication
    and/or distribution permitted for noncommercial purposes only.  For
    use in other circumstances, please contact the original authors, or
    the Editor.

                           =*=*=*=*=*=*=*=*=

    OBTAINING COPIES: The most recent issue of FidoNews in electronic
    form may be obtained from the FidoNews Editor via manual download or
    file-request, or from various sites in the FidoNet and Internet.
    PRINTED COPIES may be obtained by sending SASE to the above postal
    address.  File-request FIDONEWS for the current Issue.  File-request
    FNEWS for the current month in one archive.  Or file-request specific
    back Issue filenames in distribution format [FNEWSEnn.ZIP] for a
    FIDONEWS 14-09               Page 36                   3 Mar 1997


    particular Issue.  Monthly Volumes are available as FNWSmmmy.ZIP
    where mmm = three letter month [JAN - DEC] and y = last digit of the
    current year [7], i.e., FNWSFEB7.ZIP for all the Issues from Feb 97.

    Annual volumes are available as FNEWSn.ZIP where n = the Volume number
    1 - 14 for 1984 - 1997, respectively. Annual Volume archives range in
    size from 48K to 1.4M.


    INTERNET USERS: FidoNews is available via:

                         http://www.fidonet.org/fidonews.htm
                         ftp://ftp.fidonet.org/pub/fidonet/fidonews/
                         ftp://ftp.aminet.org/pub/aminet/comm/fido/

                                     *=*=*

    You may obtain an email subscription to FidoNews by sending email to:

                         [email protected]

    with a Subject line of: subscribe fnews-edist

    and no message in the message body. To remove your name from the email
    distribution use a Subject line of: unsubscribe fnews-edist with no
    message to the same address above.

                                     *=*=*

    You can read the current FidoNews Issue in HTML format at:

                         http://www.geocities.com/Athens/6894/

    STAR SOURCE for ALL Past Issues via FTP and file-request -
    Available for FReq from 1:396/1 or by anonymous FTP from:

                         ftp://ftp.sstar.com/fidonet/fnews/

    Each yearly archive also contains a listing of the Table-of-Contents
    for that year's issues.  The total set is currently about 11 Megs.

                                =*=*=*=

    The current week's FidoNews and the FidoNews public-key are now also
    available almost immediately after publication on the Editor's new
    homepage on the World Wide Web at:

                 http://ddi.digital.net/~cbaker84/fidonews.html

    There are also links there to jim barchuk's HTML FidoNews source and
    to John Souvestre's FTP site for the archives. There is also an email
    link for sending in an article as message text. Drop on over.

                           =*=*=*=*=*=*=*=*=

    A PGP generated public-key is available for the FidoNews Editor from
    FIDONEWS 14-09               Page 37                   3 Mar 1997


    1:1/23 [1:18/14] by file-request for FNEWSKEY or by download from
    Rights On! BBS at 1-904-409-7040 as FIDONEWS.ASC in File Area 18.  It
    is also posted twice a month into the PKEY_DROP Echo available on the
    Zone 1 Echomail Backbone.

                               *=*=*=*=*

    SUBMISSIONS: You are encouraged to submit articles for publication in
    FidoNews. Article submission requirements are contained in the file
    ARTSPEC.DOC, available from the FidoNews Editor, or file-requestable
    from 1:1/23 [1:18/14] as file "ARTSPEC.DOC".  ALL Zone Coordinators
    also have copies of ARTSPEC.DOC. Please read it.

    "Fido", "FidoNet" and the dog-with-diskette are U.S. registered
    trademarks of Tom Jennings, P.O. Box 410923, San Francisco, CA 94141,
    and are used with permission.

            "Disagreement is actually necessary,
             or we'd all have to get in fights
             or something to amuse ourselves
             and create the requisite chaos."
                               -Tom Jennings

     -30-

    -----------------------------------------------------------------