Volume 2, Number 38                          4 November 1985
         +----------------------------------------------------------+
         |                                             _            |
         |                                            /  \          |
         |    - Fidonews -                           /|oo \         |
         |                                          (_|  /_)        |
         |  Fido and Fidonet                         _`@/_ \    _   |
         |    Users  Group                          |     | \   \\  |
         |     Newsletter                           | (*) |  \   )) |
         |                             ______       |__U__| /  \//  |
         |                            / FIDO \       _//|| _\   /   |
         |                           (________)     (_/(_|(____/    |
         |                                                (jm)      |
         +----------------------------------------------------------+

         Publisher:                                          Fido 1/1
         Editor in Chief:                              Thom Henderson
         Review Editor:                                   Matt Kanter
         Chief Procrastinator Emeritus:                  Tom Jennings

         Fidonews is published weekly by SEAboard, Fido 1/1.  You are
         encouraged  to  submit articles for publication in Fidonews.
         Article submission  standards  are  contained  in  the  file
         FIDONEWS.DOC, available from Fido 1/1.

         Disclaimer or don't-blame-us:

         The contents of the articles  contained  here  are  not  our
         responsibility,  nor  do  we  necessarily  agree  with them;
         everything here is subject to debate.  We publish EVERYTHING
         received.





                              Table of Contents


         1. EDITORIAL
            Settling In
         2. NEWS
            The Dirty Dozen
            Ripping off Tom Jennings, and all of us
            Any Libertarians out there?
         3. COLUMNS
            FidoNet Route Files Explained, Part 1
         4. WANTED
            Kurzweil 4000 computer wanted
         5. NOTICES
            The Interrupt Stack
            Death and Corporate Politics
            A Warning to Quadram Owners













         ============================================================
                                  EDITORIAL
         ============================================================

                                  Settling In

         Well,  I'm finally getting settled in my  new  location.  We
         recently  sold  our house and ended up not buying a new one,
         but that's another story (and a very long  one).  We're  now
         living in an apartment.

         It still doesn't feel like home, but it's getting there.  At
         least  I  no longer have to mow the lawn or shovel the snow.
         I won't really  be  comfortable  though  until  I  get  some
         shelves up and unpack all my books.  One thing moving proved
         to me -- I own too darn many books.

         Moving  my  hardware was less of a hassle than I'd expected.
         I backed up everything,  ran SHIPDISK,  and took  the  whole
         thing  apart.  After  trucking  it  across  town I set it up
         again and turned it on.  Everything was  fine.  I  was  down
         about two hours.

         We  had some hassle with the phone numbers,  but 1/1 has the
         right number in the new node list (I checked it personally).
         I know at least one person out there is trying to send us an
         article -- my phone has been  ringing  off  the  wall  every
         night  from  four  to  five for a week.  Maybe now he'll get
         through.

         I hope so.  This change of phone numbers has  had  it's  bad
         points.  We've  gotten  almost no submissions this week.  We
         had a couple on file,  and Ben Baker starts  his  column  on
         routing  this  week,  so it's not a total loss,  but I'll be
         glad when things get back to normal.

         That's right,  folks!  We need  your  input.  Start  writing
         those  articles and sending them in.  Get your hands on node
         list 305 and mail your article to node 1/1.  If you  want  a
         copy  of the technical specs,  drop us a line and we'll mail
         it to you.

         We're not really a bulletin board here,  so don't  count  on
         much  if you call.  We've got a little thing running to pass
         out the newsletter and such,  but it isn't up often.  We  do
         all our work by netmail, generally.

         So go write something and netmail it to us!

         ------------------------------------------------------------










         Fidonews                   Page  2                4 Nov 1985





         ============================================================
                                     NEWS
         ============================================================

                                THE DIRTY DOZEN
                           Issue #3: Oct 30th, 1985
                             Compiled by Tom Neff

         Recently, many unlawfully copied or modified programs have
         appeared on various IBM PC bulletin boards across the
         country.  THE DIRTY DOZEN is a list of known examples.

         There are three major categories of "bogusware": commercial
         pirate jobs, unauthorized "hacks" of otherwise legitimate
         freeware programs, and malicious "TROJAN" programs which
         damage your system.  A more detailed explanation of each
         category is given below.

         Sysops: Please be careful with the files you post in your
         download libraries!  Be suspicious when an uploaded game or
         disk utility appears to be of professional quality, yet
         doesn't include the author's name, address, and distribution
         policy.  Such programs are probably NOT public domain!

         The BBS community is already under legislative threat at the
         State and Federal level.  We cannot fight this trend
         effectively while our directories sit stocked with "cracked"
         Sega games, 1-2-3 copiers and Wargames dialers!  Let's
         demonstrate a little social responsibility by cleaning up
         our download libraries.  If you have any of these files on
         your system, please delete them and post "blocking" dummy
         file entries like this one:

                 ZAXXON.COM        DELETED!! NOT PUBLIC DOMAIN!!

         A final word on TROJANS: I have been hearing more and more
         reports of these "worm" programs, from all directions.
         While I don't doubt their existence (and all that I have
         heard of are listed below), let's not get hysterical.
         Remember, a Trojan rumor is a lot easier to START than it is
         to STOP.  Some people have accused "legitimate" *joke*
         programs, like DRAIN (which pretends to be gurgling excess
         water out of your A drive) of being "killers." Even if a
         program locks up your system, it isn't necessarily Trojan;
         it might not like co-residing with Superkey, or your
         graphics card.  Ask around a little before you announce
         something as Trojan.  I would appreciate a bagged specimen
         of any Real trojan program you find.


         Name             Category  Notes
         --------------   --------  ---------------------------------
         1DIR.COM         PIRATED   This is "The ONE Dir," a
                                    commercial shell sold with a Hard
                                    Disk subsystem.
         21C.EXE          PIRATED   From the IBM Game Library
         ARC.COM          HACKED    Someone keeps running SPACEMAKER
                                    or a similar EXE squeezer on SEA,


         Fidonews                   Page  3                4 Nov 1985





         Inc.'s ARC archive program, then
                                    uploading the resulting COM file
                                    to BBS's without the author's
                                    permission.  Not kosher, whoever
                                    you are.  SEA won't support the
                                    COM version -- this is an
                                    unauthorized modification.
         AXX.EXE          PIRATED   really AUTODEX, a commercial file
                                    manager
         BUSHIDO          PIRATED
         COPYRITE         PIRATED   Really Quaid Software's COPYWRITE
         DEB88.EXE        PIRATED   DeSmet "C" debugger
         DIGGER.COM       PIRATED
         DOSKNOWS.EXE     *TROJAN*  I'm still tracking this one down
                                    -- apparently someone wrote a FAT
                                    killer and renamed it
                                    DOSKNOWS.EXE, so it would be
                                    confused with the real, harmless
                                    DOSKNOWS system-status utility.
                                    All I know for sure is that the
                                    REAL DOSKNOWS.EXE is 5376 bytes
                                    long.  If you see something
                                    called DOSKNOWS that isn't close
                                    to that size, sound the alarm.
                                    More info on this one is welcomed
                                    -- a bagged specimen especially.
         EGABTR           *TROJAN*  BEWARE! Description says
                                    something like "improve your EGA
                                    display," but when run it deletes
                                    everything in sight and prints
                                    "Arf! Arf!  Got you!"
         F15              PIRATED
         FILER.EXE        *TROJAN*  Labelled "Great new filing
                                    system" - wiped out 20 meg HD.
                                    Looking for confirmation on this.
         GREMLINS         PIRATED
         HARDHAT          PIRATED
         JOUST            PIRATED
         KONG             PIRATED
         LIST60           HACKED    Vern Buerg's LIST 5.1, patched to
                                    read 6.0.
         NOVATRON         PIRATED
         PCBOSS           PIRATED
         POOL.ARC         PIRATED   Really PC-POOL, commercial game
         PSHIFT           PIRATED   really MEMORY SHIFT
         PSRD.ARC         PIRATED   IBM utility (redirects PrtSc)
         QMDM110.ARC      HACKED    ONLY versions 1.10 and 1.10A!
         QMDM110A.ARC               They are copies of 1.09, hacked
                                    to read 1.10.  There have been
                                    rumors of a worm in 1.10, but I
                                    haven't seen any evidence of it.
                                    Other versions are OK.
         ROBOTRON         PIRATED
         ROGUE.EXE        PIRATED
         SECRET.BAS       *TROJAN*  BEWARE!! This may be posted with
                                    a note saying it doesn't seem to
                                    work, and would someone please
                                    try it; when you do, it formats


         Fidonews                   Page  4                4 Nov 1985





         your disks.
         SEE              PIRATED   DeSmet editor
         SFX              PIRATED   really AUTODEX (again!)
         SM.COM           PIRATED   Realia's SPACEMAKER utility
         SMAP             PIRATED   IBM Internal utility, with the
                                    copyright notice blanked out and
                                    real author's name () replaced by
                                    "Dorn W. Stickle".
         SPYHUNT          PIRATED
         STARGATE.EXE     PIRATED   Hacked to say "PUBLIC DOMAIN BY
                                    ATARI," but don't you believe it!
                                    Don't confuse this 57K EXE file
                                    with the public domain STARGATE
                                    MERCHANT game, which is a little
                                    12K BASIC program by G. E.
                                    Wolfworth.
         STRIPES.EXE      *TROJAN*  BEWARE SYSOPS!! This one draws an
                                    American flag (nice touch), but
                                    meanwhile it's busy copying your
                                    RBBS-PC.DEF to another file
                                    (STRIPES.BQS) so Bozo can log in
                                    later, download STRIPES.BQS, and
                                    steal all your passwords.  Nice,
                                    huh!
         TREED.COM        PIRATED   Really DOS TREE DISPLAY (IBM utility)
         VDIR.EXE         *TROJAN*  This is the disk killer Jerry
                                    Pournelle told us about in BYTE
                                    Magazine.  I have never seen it.
         XDIR             PIRATED   Pre-release version of DOS FILE
                                    TRACKER, an IBM "Personally
                                    Developed" program.
         ZAXXON           PIRATED


         If you have any additions or corrections for this list, send
         them to me (Tom Neff) at any of the following places:

            * CompuServe User ID [76556,2536]
                  (via Easyplex electronic mail or
                  the IBM Novice Forum, GO IBMNOV)

            * Atlantic Palisades RBBS (718-238-7855)

            * DEC-WARE Fido (Net 107/Node 1)

         ------------------------------------------------------------














         Fidonews                   Page  5                4 Nov 1985





         Paula Giese
         Fido 14/999

                    Ripping off Tom Jennings, and all of us

         Billion-dollar corporations are ripping off Tom Jennings,
         author of the Fido software that all of us are beneficiaries
         of.  This software was written by Jennings and is
         copyrighted by him, and a great deal of work was done by a
         small number of others, some of whom have copyrighted
         utilities, some of whom just pitched in.  Moreover, one
         billion-dollar corporation is ripping off hundreds of
         SysOps, potentially everyone who has put his or her own
         time, effort and money into running a BBS, and, for bad
         measure, everyone who's ever shared a utility or program
         they worked on by uploading it to a BBS library, and
         everyone who's helped just by "passing on" good things to
         make them available on BBSes other than where you got them.

         I'm going to give two examples of this.  Both of the
         corporations involved have revenues in the billions, and
         neither of them has contacted Jennings for permission,
         license, or paid any fees to him.  Neither has the first
         giant pirate contacted any of *us* or offered us any say in
         whether we want to be raw material--the only raw material it
         has to market.

         I want to encourage every Fido SysOp and every Fido user to
         collect transcripts from any corporate users they know
         about, so that Jennings and his lawyers may collect fees and
         damages from them.  Secondly, I want to encourage everyone
         with a modem to spread this article and its associated files
         to every BBS in the country, in particular all of those
         which are listed as raw material, the products, that GTE is
         marketing; but every other BBS is fair game as well.

                                  GTE TELENET

         If you subscribe to Byte or PC Magazine (and many others)
         you can see the ad that rips off both Jennings and every
         SysOp.  In the October Byte it's on page 365.  In the
         October 29 PC Magazine, it's on Page 90.  Full-page ads
         both.

         They show a guy touching the ground and say "Now you don't
         have to pay this much to access information with your home
         computer."  How much?  "Now for only $25 a month (plus a
         one-tme installation fee of $25) you'll be able to reach
         othr PC subscribers free.  Free local databases and bulletin
         boards..."

         When I accessed the number given--800-835-3001--I made a
         transcript of my interaction.  It shows Fido 10m in use,
         with several thousand callers already.  I was mad already on
         Jennings' behalf.

         But when I examined the limited files area i could access
         without paying those fees, I really hit the ceiling.  What


         Fidonews                   Page  6                4 Nov 1985





         are these free databases?  Boys and girls, it's us they're
         selling for $25 a month and a $25 installation fee.  If
         you're a SysOp, they want you.  You may not want a bunch of
         users who are paying a billion-dollar company for all the
         work you do maintaining your BBS, you may not want a bunch
         of freeloaders who'll siphon off all your downloads and
         block your regular and valued users from access.  But, see,
         you're part of the merchandise.  I'd have no hesitation at
         all about suing GTE if LawSIG, predecessor to Fido LawCAT,
         were on that list.  No doubt they'll catch up to Minnesota
         soon.  PC Pursuit is what General Tel and El calls their
         service, and folks, they're after us.

         Now, how about you BBS users who *aren't* sysops?  Quite a
         few of you are the "communicators" who make BBSes the
         overwhelming *private* and *person-to-person* communications
         successes they are.  You are always willing (and often able)
         to help out another user with hardware and software tips,
         advice, encouragement.  You often upload aids and utilities
         you developed yourself, just because you want to share them
         with others, for the general good of computing.  Sometimes
         you've written fairly elaborate applications, which you
         distribute through BBSes, relying on fairness of those who
         find your package useful to pay you a fair fee--and you
         don't think Lotus, MicroSoft, and the Big Money software
         giants are charging fair fees, in the big bks$ that pay for
         all their ad campaigns.

         Okay, so your software is part of what GTE is marketing for
         just $25 a month and a $25 "installation fee" whatever that
         means.  Do you suppose many GTE subscribers will also pay
         you?  I am damn sure that no GTE subscribers who access my
         system will ever send me any little sums "to help out with
         your costs and to thank you for doing this for all of us,"
         and I'm pretty damn sure I won't get any thankyous from the
         GTE crowd whose corporations are paying that tiny fee for
         them.

         I don't like having my hard work and love of these systems
         exploited by a multibillion dollar corporation.  So how do
         you feel about it, fellow SysOps?  Users who upload as well
         as download, how do you folks feel about this violation and
         exploitation of our community?

         Now let's look at another problem, the private corporate
         piracy that's ripping off someone all we Fido users have
         greatly benefitted from.  Dozens, perhaps hundreds, of
         corporations have picked upthe Fido software and set up
         their own private in-house nets.  Did they contact Tom
         Jennings, whose copyright and address cannot be avoided when
         you run Fido? They did not.  Did they pay the modest $100 he
         initially asked for "commercial" use of Fido?  Don't be
         silly.

         There is some financial institution in the Twin Cities which
         is using Fido; the banker proudly boasted on Fido LawCAT
         that he is a follower of Ayn Rand's "money=goodness"
         philosophy.  "Why should I pay for what others get for


         Fidonews                   Page  7                4 Nov 1985





         free?" he said.  I can't give his transcript, because he
         left it in a message, which he later snuck back on and
         killed.

         I do have a transcript of my interaction with a private
         corporate Fidonet.  This one's operated by Honeywell, Inc.,
         a multibillion-dollar corporation headquartered in
         Minneapolis, which, unlike many of them, has extended a
         periscope into our national Fidonet--although you can't get
         onto it, and they don't reply to Fidomail sent to them.

         Unless you've been authorized by company security, you get
         shunted right off that system.  They have the nerve even to
         use the trademarked "Fido" hound John Madill drew.  The
         Military Avionics Division of Honeywell, which pirated this
         software, is responsible for approximately $390,000,000 of
         Honeywell's annual revenues.  You'd think they could afford
         to pay for it, instead of stealing it, as they have done.

         Jennings told me that he and others know of scores of
         corporate ripoffs.  These include Southwestern Bell, which
         attempted to charge a 15-year-old $100 a month, because he
         had a modem on his home phone to run a BBS two years ago.
         They include 3M, another multibillion-dollar Minnesota
         giant, whose corporate employees contacted local Fido SysOps
         for setup help, because they didn't know enough to earn
         their salaries carrying out their theft unaided by their
         victims.

         Because we're all their victims, victims of these corporate
         thieves.  How long can the BBS culture, which we created
         ourselves, last in the face of this massive exploitation?
         Who will want to give away his or her work, only to see
         gross profits racked up from it by giant corporate
         exploiters?

                           WHAT WE CAN AND SHOULD DO

         First collect any information you can get about commercial
         users.  Jennings knows who has paid him (all 11 of them) and
         who hasn't, so don't attempt to find that out; just collect
         their names and phone numbers.  If possible, collect
         evidentiary transcripts, as I have done, as complete as
         possible, if you can get on the system at all.  Send these,
         together with a statement as to how you know who the
         corporate or government users are to me at Fido LawCAT
         14/999.  The statement should be like mine; it should ID
         yourself, and give contact information (address/phone).  If
         Jennings can afford to hire a lawyer, the lawyer can use
         such transcripts as evidence to collect for the unauthorized
         use of the copyrighted software.

         What is a "commercial user"?  Jennings defined for me what
         he had in mind as "Who can use it for free," it is those who
         are creating Fidos "in the public interest."  In general,
         anyone who operates a BBS accessible to the general public
         is doing that, whether there is a registration fee or
         "special interest group" limitation. A store that runs a


         Fidonews                   Page  8                4 Nov 1985





         public BBS, a company that operates a public BBS as a good-
         will gesture, are examples of "public interest" users who
         can use it free.

         A government agency, a corporation, or an individual who
         expects to make a profit from the use of a private Fido, or
         Fidonet, or to use it for internal convenience of its staff,
         or in the carrying out of its mission or duties--these are
         examples of Fido users who must pay a license fee for the
         first node, and another for each additional node, as set by
         Fido Marketing.  Both GTE, which intends to make a profit
         from using Fido to exploit all the rest of us, and
         Honeywell, which intends "for the convenience of its
         employees" to maintain a private Fidonet, are excellent
         examples of users who must and should be made to pay Fido
         Software's fees.

         Any group which is in doubt about its status should apply to
         Jennings at Fido 125/1 for clarification as to whether it
         qualifies as a public interest group, or not.  In general,
         every "private" Fido, to which access cannot be gained by
         "normal" registration by responsible users should probably
         apply to Jennings, and should expect to pay a reasonable fee
         for its use of his software.

         In fact, the issues raised by widespread corporate and
         perhaps governmental piracy of Jennings' copyrighted
         software are relatively simple to resolve.  All he needs is
         money to hire a lawyer; there would be no problem collecting
         fees (and costs and perhaps damages) from both Honeywell and
         GTE--if Jennings could afford to hire the help he'd need to
         do it.

         Some of you who've enjoyed and benefited from your use of
         Fido might think about that and send Jennings a little money
         to help do that.  Lawyers don't come cheap.

                                THE OTHER ISSUE

         There is a much more difficult issue raised by GTE's
         commercial exploitation of all BBSes and of virtually
         everyone who uses a BBS.  We are all resources for each
         other, in BBSes, whether networked like Fido or not.  The
         knowledge and talents of each user are part of a pool of
         resources we all share by means of these systems.  It is
         exactly that--US--that GTE is selling.  I'm not sure what I
         can do about it, unless and until they list my Fido LawCAT.
         Should they do so, whatever it costs in time and money, I'll
         sue them.

         How do the rest of you feel?  Let's have some discussion of
         this exploitation, while there are still BBSes alive to do
         it on.  I feel that this commercial exploitation of our work
         will so disgust a great many SysOps that the system will be
         destroyed by these sharks who are moving in to profiteer off
         of it.

         It should be discussed on all BBSes. I invite SysOps and


         Fidonews                   Page  9                4 Nov 1985





         users to contribute ideas to the "Issues" message/discussion
         section (Msg Area 10) on Fido LawCAT, 612-872-2352; or
         FMAIL--I'll see if I can recopy it and post it--at 14/999.
         Though there are relatively few modem-using lawyers, it has
         been my intention since 1982 to educate them to "computer
         law issues" by involving them in discussions with the
         computer community, and exposing them to specific legal
         problems computers raise.  Software piracy is an issue
         LawSIG has done a lot of educating on over the years.  Now
         we have a new one, I don't even know how to describe it.
         GTE wants to steal *all of us* in effect, and piracy of Tom
         Jennings' software is a means to that larger theft.  What
         kind of a crime is that?  How can lawyers help us prevent
         it?

         I appologise for the length of this piece; I feel the issues
         are urgent, and the matter needs to be spread around
         quickly.

         (Paula Giese, aka SysOp Fuzzy, Fido LawCAT, 14/999; 612-872-2352)

         ------------------------------------------------------------






































         Fidonews                   Page 10                4 Nov 1985





         Any Libertarians out there?

         Daniel Tobias, FIDO 129/13


         I am presently attempting to put together, for future
         publication, a directory of Libertarians who are reachable
         by electronic mail.  Someday, computerized communication may
         take its place alongside the telephone and the postal system
         as a commonplace form of communication, butcurrently only a
         select group of forward-thinking individuals enjoys this
         powerful communication tool.  Since those supporting the
         Libertarian philosophy of personal and economic freedom and
         drastically limited government are also forward-thinking
         people, it is reasonable to suppose that many of them are
         already making use of computerized communications.  The
         intent of the directory is to put all such people's names
         and computer mail addresses together in one place, to
         facilitate communication and informal networking among them.
         If you wish to be listed, please send me the following
         information, in the order given:

         a) Your name.

         b) Your computer mail address(es).  Include here the
            addresses which can be used to send you computer mail.
            These can be on any computer system or network, including
            FidoNet, ArpaNet, UUCP, BitNet, or CompuServe.  If you
            have computer addresses on several different networks,
            include all of them.

         c) Include, if you wish, a single line describing your
            occupation, position in Libertarian organizations,
            special interests, or anything else you feel is
            descriptive of yourself so that prospective electronic
            "pen-pals" who do not know you by name can find people
            who share common interests.

         You have several ways of getting this information to me.
         You can send it by FidoMail to 'Daniel Tobias' at FIDO
         129/13.  I also can be reached as [email protected] on the
         Arpanet.  Or, if you prefer a more old-fashioned means of
         communication, you may send it on paper to:

              Daniel Tobias
              4730 Centre Ave. Apt. 212
              Pittsburgh, PA  15213

         Thank you for helping make this project a success!

         Disclaimer:

         Although this post originates from a Fido BBS run by a
         member of the L-5 Society, the L-5 Society is not a
         Libertarian organization and does not in any way endorse the
         content of this post.  I am just a user of this BBS; I'm not
         the sysop, although I hope to someday start a Libertarian-
         oriented BBS when I have the proper equipment.


         Fidonews                   Page 11                4 Nov 1985





         ------------------------------------------------------------



























































         Fidonews                   Page 12                4 Nov 1985





         ============================================================
                                   COLUMNS
         ============================================================

                        FidoNet Route Files Explained
                     Part 1 -- The Many Faces of FidoNet

                          by Ben Baker, Fido 100/76

              There  is  no  aspect  of FidoNet more universally mis-
         understood than routing.  It is the  intent  of  this  foru-
         part series to clear some of the fog.

              The   justification  for  nets  and  routing  has  been
         discussed many times and will NOT be  discussed again  here.
         Given  that  routing  is  good,  how is it done?  What's the
         meaning of the various statements that go into route  files?
         Indeed, what's the meaning of route files?

              Let's first take a look at "the network." But how do we
         do that?  In reality, there is no "the network." FidoNet  is
         a  different  thing when viewed by each different Fido!  The
         only formal definition of FidoNet is the node list,  and  it
         serves  as  an  adaquate  view  of  "the  network"  for most
         independent Fidos but only the members of some nets.

              Consider  the  hypothetical  node,  Fido 21/7.  He's an
         independent member of a "Region." To him, "the network" is a
         couple  of  hundred other independent nodes to whom he sends
         messages directly and another couple of hundred to which  he
         has  access  through  36  defined  "Hosts." If he receives a
         message not addressed to his node, his  Fido  "orphans"  it.
         He has no intention of forwarding someone else's mail.  They
         can pay their own phone bills!  When he sends a  message  to
         18/3,  Fido  knows  (from  the  node  list)  that is another
         independent and sends the message direct.  When he  sends  a
         message to 100/76, Fido knows (from the node list) that is a
         member of net 100 and sends it to 100/0.  Fido 21/7 executes
         only  schedule A during the national mail window.  He has no
         use for ANY route files.

              Another hypothetical node, Fido 201/4 is a member of an
         "inbound  only"  net.   Since  the  sysop  has  used the '4'
         command properly, Fido knows he is a member of net  201  and
         will  treat  other  members  of that net as though they were
         independent nodes.  When he sends a message to  201/5,  Fido
         will  send it direct and not to 201/0.  Messages headed out-
         side net 201 will be handled for 201/4 just as they were for
         21/7.   Fido  201/4  executes  two  schedules,  A during the
         national window followed immediatly by B when he  just  sits
         quietly  and  waits  for  201/0  to  send  him  any  mail he
         received.  He has no use for ANY route files.

              Everyone   else  has  a  view  of  "the  network"  more
         complicated than Fido can discover from just the node  list.
         If  you're a Southern California Hub, or a local node in the
         New York Megalopolis, or maybe the host of a modest  network
         in  Memphis  "the  network"  looks  different to you than to


         Fidonews                   Page 13                4 Nov 1985





         other sysops.  It is the function of route files  to  modify
         Fido's view of "the network" to conform to yours.

              If your Fido is executing any mail event and any  other
         Fido calls it up and offers it a mail packet, your Fido will
         graciously receive that packet and at the end  of  the  mail
         event,  he will unpack it into messages.  These actions have
         nothing whatever to do with route files!

              Reread  that last paragraph two or three times until it
         sinks in.  It is a very important, very misunderstood point.
         Route  files  do  not and cannot control the way you receive
         mail.  ROUTE FILES CONTROL ONLY THE  WAY  YOU  SEND  MAIL!!!
         After all, that's when you're paying the phone bill.

              Furthermore,  what  you  say  in ROUTE.B has absolutely
         nothing to do with how Fido behaves in schedule C.   I  will
         come back to this point later.

              Ever since we first began routing FidoNet  messages  to
         places  other than their final destination, route files have
         used three basic commands to mold Fido's view of FidoNet  to
         correspond  with  your  view.   In  part  2  we will look at
         SCHEDULE, ROUTE-TO and ACCEPT-FROM and  see  just  how  they
         influence Fido.

              Part  3  will  examine  a  bevy of new routing commands
         available with Fido V11 and see how they have made automatic
         distribution at last possible.

              LISTGEN  V2  is capable of generating route files auto-
         matically.  Part 4 will discuss how ROUTE.CTL statements map
         to route file commands.

              Stay  with  me  for the next few weeks and maybe we can
         burn off the fog and find a bright sky, a calm sea and clear
         sailing.   (And  don't  throw  away your newsletters, you'll
         want to refer back from time to time.)

         ------------------------------------------------------------




















         Fidonews                   Page 14                4 Nov 1985





         ============================================================
                                    WANTED
         ============================================================

         Hello to all the Fido News readers south of the border !!

         I am writing this in an attempt to find out if there is a
         chance that there might be a similar machine to the one that
         we are looking at purchasing (and or leasing.)

         I guess I should explain what it is that I am planning on
         leasing (or purchasing, I can dream I guess!) The system is
         called the Kurzweil 4000 and comes from Kurzweil Computer
         Products in Massachusetts and is an excellent optical
         character recogntion system that uses artificial
         intelligence software.

         The person running the system "teaches" the system the font
         or type style in a learning session, (the learning session
         can take from 5 to 30 mins depending on the type style or
         condition of the document read). Once the learning session
         has taken place the system can retain what it has learned
         for future use on the hard drive that comes with the system.
         The 4000 can handle type setting or word processing codes,
         ligatures, and special formatting instructions. The 4000
         analyzes each character by analyzing its shape, it can
         recognize any type font in sizes ranging from 6 to 24 point,
         including multiple fonts within a single document.

         Now that you know what the system is capable of (and no I am
         not a Kurzweil salesman!!!) You might know of a similar
         system ( I cant really say clone system with its power!)
         that is slightly lower priced!

         You see Xerox Canada has grabbed this and have priced the
         system at approx $85,000 with all the bells and whistles!
         In the States it is priced at about $40,000 U.S. !!!!!  Even
         with the exchange Xerox is taking myself and other
         interested parties for a ride!!!!

         Would you believe they want $7,550 for a *&*&!!@ sheet
         feeder !! Well you get the point I will not bitch any
         longer.

         You say why not buy it from Kurzweil directly! Well Kurzweil
         stands firm on Xerox and will not sell one to us as it under
         contractual obligation to Xerox !!!

         If you have any information about a similar product in the
         States or anywhere else for that matter I would appreciate
         you dropping me a line at Fido 111/608.

         (please note that the system has changed its number and has
         yet be updated in the latest nodelist. The number is
         1-416-231-7113.)

         Thanks for your time



         Fidonews                   Page 15                4 Nov 1985





         Rob Benner
         Sysop DiSC2: The Information Exchange
         Net 111 Node 608

         ------------------------------------------------------------























































         Fidonews                   Page 16                4 Nov 1985





         ============================================================
                                   NOTICES
         ============================================================

                              The Interrupt Stack


         23 Nov 1985
            European sysop conference -- Utrecht, The Netherlands.
            Contact node 3101 for details.

         27 Nov 1985
            Halley's Comet passes closest to Earth before perihelion.

         24 Jan 1986
            Voyager 2 passes Uranus.

          9 Feb 1986
            Halley's Comet reaches perihelion.

          9 Feb 1986
            Diana Overholt (109/74) has another birthday.

         11 Apr 1986
            Halley's Comet reaches perigee.

         19 May 1986
            Steve Lemke's next birthday.

         24 Aug 1989
            Voyager 2 passes Neptune.





         If you have something which you would like to see on this
         calendar, please send a message to Fido 1/1.

         ------------------------------------------------------------


         Am sad to report the death of fido 17/2 on Monday  the  27th
         of  October.  The  death  will  be  caused by an overdose of
         corporate oversight. Said impending death was reported to me
         by the DJ today.  The company could no longer see any profit
         other than goodwill and so issued the notice of execution.

                            Neal Curtin, BECS FIDO

         ------------------------------------------------------------

                          A Warning to Quadram Owners

         If you own a Quadram board with an on-board  clock  that  is
         over  a  year  old,  BEWARE!  The batteries on some of these
         boards have been reported to go bad and leak,  dripping acid
         on the motherboard.


         Fidonews                   Page 17                4 Nov 1985





         The  batteries to worry about are those with a green stripe.
         The batteries with a black stripe are okay.

         Quadram is reportedly aware of the problem, and taking steps
         to deal with it.

         ------------------------------------------------------------





















































         Fidonews                   Page 18                4 Nov 1985