Volume 3, Number  7                         17 February 1986
      +----------------------------------------------------------+
      |                                             _            |
      |                                            /  \          |
      |    - Fidonews -                           /|oo \         |
      |                                          (_|  /_)        |
      |  Fido and FidoNet                         _`@/_ \    _   |
      |    Users  Group                          |     | \   \\  |
      |     Newsletter                           | (*) |  \   )) |
      |                             ______       |__U__| /  \//  |
      |                            / FIDO \       _//|| _\   /   |
      |                           (________)     (_/(_|(____/    |
      |                                                (jm)      |
      +----------------------------------------------------------+
      Editor in Chief:                              Thom Henderson
      Chief Procrastinator Emeritus:                  Tom Jennings

      Fidonews is published weekly by  SEAdog  Leader,  node  1/1.
      You  are  encouraged  to  submit articles for publication in
      Fidonews.  Article submission standards are contained in the
      file FIDONEWS.DOC, available from node 1/1.

      Disclaimer or don't-blame-us:

      The contents of the articles  contained  here  are  not  our
      responsibility,  nor  do  we  necessarily  agree  with them.
      Everything here is subject to debate.




                           Table of Contents

      1. EDITORIAL
         IFNA and You
      2. ARTICLES
         Software Tools in Pascal available on Fido 143/12
         Exploring MSDOS file structures
         Where Oh Where Can that Interrupt Be?
         Announcing two new newsletters
         Encryption, Public Keys and Otherwise
         XMODEM protocol benchmark
      3. COLUMNS
         Notes from Abroad
      4. FOR SALE
         DEC 11/23 Minicomputer for sale
         Entertainment Software for your PC!
         File Security and Secret*File
      5. NOTICES
         The Interrupt Stack
         Higher Education Net proposed
         New Host for MetroNet
         Orange County is no longer part of SoCalNet
         New Version of Rovermsg Available












      ============================================================
                               EDITORIAL
      ============================================================

                              IFNA and You


      IFNA?  Wazzat?  Well, maybe I should explain a bit first.

      There's been some idle chatter (idle typing?)  lately  about
      IFNA,  but  most  people  probably  don't know what it's all
      about.  For that matter,  nobody really knows what it's  all
      about yet,  because it doesn't exist yet.  At the moment, it
      is nothing more than a dream.

      Ken Kaplan and Ben  Baker  have  been  coordinating  FidoNet
      activities  for  quite some time now.  I'm not sure just how
      long,  since they started doing it before I joined the  net,
      and  well  before I started editing this newsletter.  In all
      that time they've seen it grow from a handful  of  hobbyists
      to a major electronic mail system.


      Yes,  yes,  I'm  talking  about  the FidoNet we all know and
      love.  You may not realize it,  but we (all of us,  you too)
      are  now  running  an  international network on par with the
      major commercial nets.  We're getting  noticed,  too.  Refer-
      ences  to Fido and FidoNet are becoming more and more common
      in the trade journals.

      We're also a  public  service,  now.  Those  articles  about
      FidoNet  for the deaf and blind weren't just hot air.  There
      are deaf people right  now  using  FidoNet  as  a  means  to
      contact the rest of the world.

      Even  this modest little publication is becoming widely read
      among those in the know,  much to my surprise.  Awhile  back
      an article here stimulated,  in a matter of days, a response
      by phone from the president of a major corporation (I  won't
      say  who,  except  to note that it's a Fortune 500 company),
      just to mention one incident.  I must admit that  I  am  not
      used to having my words quite so widely read, immortal prose
      though they may be.


      But back to Ken and Ben.  They've watched all this grow, and
      have  been thinking (and worrying) about how to handle it if
      it keeps growing.  Perhaps I should say "when it grows  even
      larger", as it shows every sign of growing bigger and bigger
      as time goes by.

      One thing they saw right off.  FidoNet would soon (say about
      last  Tuesday)  get big enough that it would require someone
      working full time to hold it all together.  This is  no  sur-
      prise  to  me;  I've  seen  much the same situation in other
      groups I belong to.  The big question, of course,  is how to
      finance  such  a  thing,  particularly  without  reducing or
      charging for the many services we already enjoy.


      Fidonews                   Page  2               17 Feb 1986





      This is where the International FidoNet  Association  (IFNA)
      comes  in.  The  general  idea is to set up a not-for-profit
      service organization to provide services to  FidoNet  sysops
      and  users.  There  are  three  main  ways  that this can be
      financed:

      1.  Voluntary contributions  from  individuals  and  corpora-
          tions.  There  is  a  trickle  of  this now,  and we can
          expect it to grow once IFNA  is  registered  as  a  non-
          profit organization.

      2.  Fees  for  new services not currently provided,  such as
          the printed FidoNet magazine.

      3.  Fees  for  providing  commercial  services  to   outside
          companies.


      As  you  can  see,  they're  trying  to come up with ways of
      paying for our hobby that don't  call  for  coercing  anyone
      into paying for things they don't want.

      Probably  all  three methods will be used,  but the one that
      really interests me is number three.  One example I've heard
      of it is collecting data for market research companies.  The
      general idea is that participating sysops use  the  question-
      naire  ability  of  Fido to collect the data,  which is then
      sent to a central collection point that  bills  the  outside
      company.  Participating sysops get money back,  depending on
      the amount of data  collected.  Sysops  who  don't  want  to
      participate don't have to.

      And THAT I like.  Nobody is forced to do anything they don't
      want,  and  everybody has a chance to make a few bucks while
      helping out.  All winners,  no  losers.  That's  really  the
      whole point of IFNA,  to figure out ways to benefit everyone
      on the net.

      ------------------------------------------------------------





















      Fidonews                   Page  3               17 Feb 1986





      ============================================================
                                ARTICLES
      ============================================================

                              Programs From
                       "Software Tools in Pascal"
                          Now Available on the
                       Wyrld Wyrm BBS, Fido 143/12

        "Software Tools  in  Pascal",  by  Kernighan  and  Plauger
      (Addison-Wesley,  1981,  $16.95)  is  a  book on programming
      techniques that demonstrates good coding by  building  up  a
      set of useful programming tools.  These include an editor, a
      find-and-replace utility,  a text formatter, and a number of
      smaller utilities, all useful.

        The authors have granted permission for noncommercial  use
      and  distribution  of the software presented in the book.  A
      version of the software,  modified  slightly  to  run  under
      Turbo Pascal,  appeared on the USENET (in mod.sources) a few
      months ago.

        These files,  (edited slightly by me to  eliminate  a  few
      glaring  bugs) are available on my BBS,  the Wyrld Wyrm BBS,
      Fido 143/12 (408) 263-8134.  My BBS run 22  hours  per  day,
      with  the  two  hours  between  00:30  and  2:30 taken up by
      FidoNet.  The file is about 50k long,  and can be downloaded
      in under ten minutes at 1200 baud.

        While  the  programs  are  useful  in themselves,  they're
      invaluable as a Pascal source code  library.  Many  routines
      that  people  tend  to reinvent (sorting,  string searching,
      etc.) are right there for the taking.

        I should warn you,  though,  that you'll need the book  if
      you  want  to  use these programs.  The command line syntax,
      while simple, isn't obvious, and the person who typed in all
      the code left out the comments (assuming that  you  had  the
      book in front of you,  I suppose).  The book is really good,
      though, so it's money well spent.

              -- Robert Plamondon
                 Sysop, Wyrld Wyrm BBSs
                 Fido 143/12

      ------------------------------------------------------------














      Fidonews                   Page  4               17 Feb 1986





      Richard A. Karas
      Fido 107/29

                     Exploring MSDOS File Structures

      Disks  (floppy as well as hard) are formatted or initialized
      under MSDOS Version 2.0 to allow fast and convenient  access
      to  files.  MSDOS  supports  several  methods  of  accessing
      files.  The handle method,  the File Control  Block  method,
      and  the direct access method through directory and the File
      Allocation Table (FAT) search.  The handle and  FCB  methods
      require you to access files through the operating system and
      their  respective  function  calls,  while the direct method
      enables you to access files  as  it  implies,  directly.  To
      access  files directly,  a little knowledge of the way MSDOS
      formats the disk is required.  MSDOS disks after  formatting
      contain the following structures in sequence:

      o  Reserve boot loader area.

      o  First copy of the FAT.

      o  Second copy of the FAT (for recovery purposes).

      o  Root directory.

      o  Data area.

      Utility  programs  read  the  reserved  boot area where disk
      media data may be found. This data provides the program with
      information about the  device.  Typically  byte  offsets  11
      through  29  have been set aside to define all the necessary
      attributes required.

      Disk space is allocated in the data area only when  required
      and  is  accomplished  in one allocation unit at a time.  An
      allocation unit is referred to as a cluster and is  represen-
      ted by one or more consecutive sectors.  A sector is usually
      512 bytes.  A cluster will contain from 1 to x sectors depen-
      ding upon the media. Some typical allocations are:

      o  Double sided floppies 2 sectors/cluster.

      o  10mb hard 8 sectors/cluster.

      o  20mb hard 16 sectors/cluster.

      This method of storage presents some problems  to  the  user
      (especially  those running BBS systems) who store many small
      files.  Consider storing 100 files  of  text  containing  ap-
      proximately  200  bytes  each file on a 10mb hard disk (Like
      Fido stores messages).  Figuring  8  sectors/cluster  X  512
      bytes/sector  =  4096 bytes per allocation unit.  100 alloca-
      tion units would be needed (providing each file  only  needs
      one  allocation unit each) at 4K per representing 400K bytes
      of storage for 100 files.  You are only actually storing 200
      bytes X 100 files or 20K bytes of data ( a very big waste of
      space).  DOS 3.1 attempts to solve this problem by  allowing


      Fidonews                   Page  5               17 Feb 1986





      the user to define the cluster size.  Enough about problems,
      back to file storage  techniques  using  the  direct  method
      (reference back Fido news issue).

      When  information  is written to the disk,  the system looks
      for the cluster that is closest to the beginning of the data
      area and available.  This criteria can easily  be  fulfilled
      by checking the FAT.  The FAT maps every cluster of the data
      area and is in fact a large linked list to  files  occupying
      more  than  one  cluster.  FAT  data is stored 1.5 bytes per
      cluster,  with cluster #2 defined as the start of  the  data
      area. The first two FAT entries represent system data, entry
      3 through X actually map the entire disk.  The value of each
      FAT entry could be one of the following:

      o  000H       Unused cluster.

      o  002H-ff6H  Next cluster of data.

      o  ff7H       Bad cluster.

      o  ff8H-fffH  Last cluster of file.

      The  root  directory  is initially built at the time of disk
      format.  It is a fixed value of clusters depending upon  the
      size  of  the  media.  Each  directory  entry is 32 bytes in
      length and contains information required by  the  system  to
      locate  files.  Since  directories other than the root direc-
      tory are actual files,  there is no limit to the  number  of
      entries  they  may  contain.  Reference the DOS manual for a
      complete description of the fields  of  a  directory  entry.
      For  now  all  that  you  should  know is that fields 00-07H
      contain the file name, 08-0aH contain the extension, and 1a-
      1bH contain the starting cluster number.

      The following brief discussion describes file  access  using
      the direct method (assume root directory only):

      1.  The  media  data is read to obtain the necessary informa-
          tion as to number of sectors, where the root dir starts,
          how big it is, etc.

      2.  The Root directory is read.

      3.  Each 32 byte entry is scanned until the correct file  is
          located.

      4.  The  starting  cluster  number  at offset 1a/1bH of that
          directory entry is obtained  and  converted  to  logical
          sector number.

      5.  X number of sectors per allocation is read to a transfer
          address  starting  at  the  sector calculated above.  (X
          sect/allocation unit is a function of the media).

      6.  Next the  FAT  map  is  checked  to  see  if  additional
          clusters  must  be read.  This is accomplished by conver-
          ting the cluster just read from the directory  entry  to


      Fidonews                   Page  6               17 Feb 1986





          an offset value into the FAT.  If the 1.5 bytes represen-
          ting the starting  cluster  contains  data  pointing  to
          additional clusters,  the system will read that cluster.
          This next mapped cluster entry will be checked  and  the
          process will continue until the last cluster is read.


      The following visually represents the process:

                        DIRECTORY (Entry #3)
          ___________________________________________________
         |     |     | Name.ext      |                   |    |
         |  1  |  2  | start cluster----                 | X  |
         |_____|_____|_____etc.______|_|_________________|____|
                                       |
                            ___________|______
                           |                  |
                  _________|  Routine to      |
                 |         |  access data     |
                 |         |__________________|
                 |
        _________|_
       |          |
       |          |         FILE ALLOCATION TABLE
       |  ______2_|_____________5__________________________X__
       | |     |     |        |    |                     |    |
       | | sys |  5  |        | FFF|                     |    |
       | |_____|_____|________|____|_____________________|____|
       |           |_____________|
       |
       |____             DATA AREA
       |  _|__________________________________________________
       | |     |     |           |  _ |                  |    |
       | |  2  |  3  |           |  5 |                  | X  |
       | |_____|_____|___________|____|__________________|____|
       |___________________________|


      The  conversion  of  cluster  number  to  logical sector and
      determining the byte offest into  the  FAT  is  simple.  The
      method  is  written  in any DOS manual near the system calls
      section.  One trick which  is  not  mentioned  is  that  the
      formula  to  determine  offset  into the FAT table will only
      work if you operate on the table as if  each  byte  were  an
      entry  (  that  is  if you read the table as bytes,  and not
      words).

      I hope this small article has  been  of  some  help  to  the
      readers in understanding some of the file storage techniques
      of  the  MSDOS  operating system.  One example of using this
      method of file access is depicted in the public  domain  'C'
      program DSKRPK.ARC located on Fido 107/29.

      ------------------------------------------------------------






      Fidonews                   Page  7               17 Feb 1986





                  Where Oh Where Can that Interrupt Be?

      I need some help,  please.  Maybe I am looking at the  wrong
      elements   in   my  system,   but  I  have  had  a  rash  of
      communications problems lately.

      My system is a PCXT with a Hayes 1200b and  fully  populated
      Quadram  Quadboard  installed.  My  comm  port  is COM2:  My
      problems is this:

      Since installing the Quadboard,  I have  had  problems  with
      telecommunications.   I  had  installed  the  Quadram  print
      spooler and clock device driver.  When I would connect,  the
      modem would return strange baud rate values,  such as 20, or
      120,  etc.  I am using Pibterm as a comm  program.  Removing
      the print spooler from CONFIG.SYS solved this, I think.

      Now,  I  occasionally will have connection problems.  Connec-
      tion is made,  the remote tone is  audible,  but  my  system
      doesn't  respond.  This  is rare and may be an artifact of a
      noisy  non-Bell  long  distance   service.   Modem   testing
      revealed  no problems.  Could it be a problem with the clock
      driver?

      I have removed it from CONFIG.SYS  and  am  only  using  the
      clock  setting  .EXE  file  in my AUTOEXEC.BAT.  A colleague
      thinks it is a conflict between the interrupts used  in  the
      clock device driver and the communications system.

      If  you have any ideas please let me know.  If you know of a
      print spooler that doesn't  cause  problems  with  communica-
      tions, please let me know about it, too.

      Thanks for your help.
      Bill Allbritten, 11/301

      ------------------------------------------------------------























      Fidonews                   Page  8               17 Feb 1986





                     Two New Newsletters for Fidonet
                             Fidonet PCNews
                                   and
                            Fidonet Languages

      Fidonews is an excellent way of getting news and information
      across the network to both the  sysops  and  users  of  Fido
      boards.  The  nature  of the articles though usually relates
      to Fido itself or to BBS's  in  general.  The  articles  are
      also  written  primarily  by sysops,  perhaps because of the
      restriction of file attaches to users with  sysop  or  extra
      privileges.  There  is  nothing really wrong with this focus
      of Fidonews,  the newsletter serves a very needed purpose in
      the network.  Something more is needed though.

      What  I  propose  is a concept similar to the news groups of
      Usenet.  I would like to see one  or  more  new  newsletters
      built  from  netmail messages instead of from file attaches,
      thus making the newsletters more accessible  to  all  users.
      The  content  of  each  newsletter  would  be focused on one
      specific subject, not necessarily having anything to do with
      computers.  As an experiment,  I am going to try and get the
      first  of  these  going  from  The  Ark  Tangent.   The  two
      newsletters I'm going to be  putting  together  are  Fidonet
      PCNews  and  Fidonet Languages.  The first will be concerned
      with IBM  PC's  and  clones,  while  the  second  will  have
      programming languages as its focus.

      Getting  information  into  the  newsletters will be simple.
      Send a netmail message to node 137/19 addressed to the  name
      of  the  newsletter you are contributing to,  either Fidonet
      PCNews or Fidonet Languages.  Weekly,  on  Tuesday  morning,
      the  mail  for each newsletter will be converted to straight
      text and concatenated into a text  file  to  be  distributed
      across  the  network.  Responses  to  the  messages  in  the
      newsletters could be directed back to the newsletter or  the
      author of the message, whichever suits.

      In  order  to  receive  the newsletter on your node you will
      need to poll The Ark Tangent (137/19) to pickup an  archived
      copy  of the file.  Send me a note requesting one or both of
      the newsletters and I'll set you up to pick up the files  on
      a weekly basis.

      Wes Cowley
      Sysop, The Ark Tangent
      Fido 137/19
      ------------------------------------------------------------












      Fidonews                   Page  9               17 Feb 1986





                  Encryption, Public Keys and Otherwise

      PART One.

          If you know what "Public Key Encryption"  is  then  feel
      free to skip to part two.

          Public  Key  Encryption  is a special form of encryption
      which uses different keys for encryption (or scrambling)  of
      a   message   and  decryption  (unscrambling,   the  reverse
      operation).

          The  separate  keys  for  each  operation  have  several
      advantages.  The  first  is  that  the encryption key can be
      distributed much more easily by less  secure  means  without
      compromising  the  security  of  future  encrypted messages.
      Simple knowledge of  the  encryption  key  does  not  enable
      decryption  of  encrypted  messages.  The  decryption key is
      required to recreate the original message.  For this  reason
      the  encryption  key is commonly called the "public key" and
      the decryption key is the "private key".

          In operation,  everyone  who  wants  to  receive  secret
      messages creates their own pair of keys, one private and one
      public.  The public key is them communicated to everyone who
      may want to send them a secret message.  Perhaps  a  central
      key  distribution  center could be established.  The private
      key is kept secret and never told to anyone.

          For example ... Art wants to send Beth a secret message.
      He would look up Beth's public key or ask her  to  send  him
      one  (in the clear).  He would then use Beth's public key to
      encrypt his message and send her the encrypted message. Beth
      receives the message and decodes it with her private key. No
      one else can decrypt the message even if they get a copy  of
      the  encrypted  message  AND  the public key.  They need the
      private key.

          In 1978 the CACM journal published a way of  doing  this
      on computers. The system they described has come to be known
      as the "RSA" encryption system.

          The  RSA  system  has  an additional property beyond the
      general Public Key Encryption system described so far.  With
      the RSA system the keys are interchangeable so you can use a
      private   key  to  encrypt  a  message  and  then  only  the
      corresponding public key will unscramble the  message.  This
      is  in  effect a "digital signature" which "signs" a message
      showing that the encrypted  message  could  only  have  been
      created with knowledge of the private key.

          Messages  can  also  be  encrypted  more than once.  For
      example you can sign a message with  your  private  key  and
      then  encrypt  the result again with the intended receiver's
      public key to make a signed,  secret message.  The  receiver
      would  then  need to do the reverse two steps in the reverse
      order to get the original message back.



      Fidonews                   Page 10               17 Feb 1986





          Even more complex interaction can be  used  for  special
      purposes.  Articles  have appeared on how to play poker over
      the phone and how to hold a secret ballot election over  the
      phone and others.


      PART Two.

          I have recently completed a Public Key Encryption system
      based  on the RSA system.  It runs on MS-DOS using files for
      keys  and  messages.   I  am  distributing  the  system   as
      freeware/shareware. (PKSCrypt 0.0 or 0.01)

          There  may  be some legal or political considerations in
      this.

          I have heard rumors that this sort of stuff comes  under
      certain  restrictions for export of high tech (or something)
      from the USA. I don't think this quite applies to me because
      I am exporting the system TO the USA. (I live in Canada).

          I  have  also  heard  rumors  that   some   intelligence
      organization  (unnamed)  is  discouraging  public discussion
      (let alone utilization) of these  systems.  I  have  trouble
      believing  this  because  I  had  no trouble finding all the
      information I could ever desire on the  subject.  There  was
      even  an  article  in  Byte  magazine and a couple follow-up
      letters.

          Anyone who has any solid info on this,  I would like  to
      hear from you. I especially would like to hear directly from
      any  government  organization(s)  (in  any  country) who may
      think they are involved.


      Interested parties may contact me via Fido node 134/1.

      Lloyd Miller
      Calgary, Alberta
      1986 Janualry 16

      ------------------------------------------------------------


















      Fidonews                   Page 11               17 Feb 1986





      Thom Henderson, node 107/8
      System Enhancement Associates

                        XMODEM protocol benchmark


      SEA recently performed  a  series  of  benchmarks  aimed  at
      producing  a  formula  for  the realistic prediction of file
      transfer times.  This report presents the  results  of  that
      benchmark,  along  with  some  conclusions  about the XMODEM
      protocol and file transfer protocols in general.

      The raw data for the benchmark was collected by transferring
      files of different sizes at different baud rates over  local
      phone  lines  and  timing  the transfer periods.  Files were
      transferred between a Fido  BBS  system  and  a  PC  running
      Minitel,  using  the  XMODEM file transfer protocol with CRC
      error  detection.   No  errors  were  reported  during   the
      transfers  used in the benchmark study.  The raw data may be
      summarized as follows:


                        Transfer Times in Seconds

                              50 Blocks           100 Blocks
                              =========           ==========
                300 Baud        236.3                472.3
               1200 Baud         71.1                142.5
               2400 Baud         39.5                 80.2


      From this data we deduced the following formula  for  predic-
      ting file transfer times using integer variables:


                              Blocks*1340         Blocks
          Time in seconds =   -----------    +    ------
                               Baud rate             4


      For 50 blocks at 300 baud this would yield 50*1340/300 = 223
      seconds, plus 50/4 = 12 seconds, for a total of 235 seconds.
      The formula varies with the measured times from  being  2.6%
      low  to being 3.8% high,  with an average error of 0.5% low.
      This is considered to be within observational errors.


      Construction  of  the  formula  was  primarily based on this
      assumption:  that file transfer time will be  split  between
      the  time  required to send the 134 bytes per block that the
      protocol requires (we are including  the  ACK  sent  by  the
      receiver), plus overhead time required for each block.

      This gives us a variable time dependent on baud rate, plus a
      fixed overhead which is independent of baud rate.  The above
      formula  is  based on an overhead of 0.25 seconds per block.
      (The actual calculated figure was 0.27 seconds,  but this is
      within  observational  error.)   This  overhead  time can be


      Fidonews                   Page 12               17 Feb 1986





      attributed to processing delays at either end,  line "purge"
      time,  and  propagation delays.  Propagation delays would be
      minimal in a local connection such as this,  but would  grow
      significant   in   a   long  distance  connection  involving
      satellite relays (at least an additional 0.25 seconds).

      Using a larger block size would help reduce this by reducing
      the number of blocks being transferred,  as well as reducing
      the   percentage  of  bytes  used  for  the  protocol.   The
      percentage of slack time (based on  the  above  formula)  at
      different baud rates follows:


               Baud      128 byte blocks     1024 byte blocks
               ====      ===============     ================
                300            5.3%                 0.7%
               1200           18.3%                 2.8%
               2400           30.9%                 5.5%
               4800*          47.3%                10.5%
               9600*          64.3%                18.9%

          * Formula not backed by benchmark data at this speed.


      As  you  can see,  the 128 byte block size is well suited to
      300 baud transmission, and even acceptable at 1200 baud, but
      rapidly becomes onerous at higher baud rates.

      At  first  glance  a  larger block size seems to be an ideal
      solution, since time spent on overhead is acceptable even at
      the higher baud rates.  It is my opinion  that  this  is  at
      least  partly  illusory.  The  above  figures are calculated
      assuming a zero  error  rate.  A  connection  that  is  even
      moderately  noisy  will produce enough "hits" to quickly eat
      up any improvements.


      Conclusion:  If you can't lick 'em, join 'em.

      XMODEM protocol with CRC error detection  achieves  a  trans-
      mission  reliability  on par with the best of the major data
      network services, but it suffers in transmission time at the
      higher baud rates.  A solution that would be viable  at  any
      baud  rate  would be a "sliding window" protocol,  something
      like the X.PC protocol.

      However,  X.PC suffers from being  excessively  complicated,
      but  it  does  have  the  advantage that TymNet has released
      sources for its implementation.

      It may not be necessary to go as far as a  full  X.PC  imple-
      mentation.  A  sliding  window  algorithm  based  on a fixed
      block size should not be difficult to implement.

      ------------------------------------------------------------





      Fidonews                   Page 13               17 Feb 1986





      ============================================================
                                COLUMNS
      ============================================================

                            Notes from Abroad


      As I'm sure all you sysops have already found out, this Fido
      lark consumes a lot of time.  On top of Fido I also run  the
      Compulink User Group,  this takes up most of my time,  but I
      hope to be able to spend more time on the Fido side  in  the
      future.  I  started  Compulink just over a year ago and from
      then I have been spending as much time as  possible  working
      for the group, promoting the public domain software concept,
      and also running Fido.  There has always been more work than
      I  could squeeze into a day,  but,  unfortunately not enough
      money was coming in to pay  for  itself.  I  have  therefore
      been  forced  to go out to work in the day to subsidize Fido
      and the user group.  I have got some pretty  big  plans  for
      Fido  and  the user group (I consider the two inseparable!),
      but I don't have the money to see them through.

      When I have to go out to work I don't have  enough  time  to
      work on both projects.  Fortunately I have received a little
      press  coverage  in the last few months and this has brought
      in enough money for me to give up my day job.  Now  I'm  not
      making a fortune, in fact most of the money that comes in is
      going   straight  out  again,   this  is  mainly  because  I
      underpriced all the  fees  I  charge  for  the  user  group.
      Unfortunately I have to put up my prices for 86,  if I don't
      do this I wont be here this time next  year.  It's  still  a
      very  good  deal  joining Compulink,  but next year I simply
      can't afford to subsidize membership out of my  own  pocket.
      In  return for my higher fees I hope to be able to plow even
      more of my time into the project and everyone will benefit.

      The next major step I will take is  to  move  into  a  small
      office.  At  the  moment  I  am  renting  my  house  and the
      landlord won't allow me to install any more telephone lines.
      I  am  running  two  Fido's  concurrently  at  the   moment,
      eventually  I  hope  to  have about 6 incoming lines,  a PSS
      data-line and a true  multi-user  Fido.  This  will  cost  a
      fortune but I'm going to do it,  when I look at the services
      offered by Telecom Gold, Easylink, et al;  I think, Hell,  I
      could do better than that!

      As  Fido  gets  more  and  more powerful (which of course it
      will!) I will be able to offer subscribers more and more for
      their money.  What I'm waiting for now  is  true  multi-user
      Fido,  one that can support more than one input stream.  The
      RBBS-PC bulletin board software  (also  public  domain)  has
      just  gone multi-user,  and I hope Fido will follow shortly.
      I am not expecting Tom Jennings to do this, TJ has done more
      than his share already,  and if you haven't done so already;
      I  think  you  should  buy  the  Fido  software  from Tom as
      detailed in the new manual.

      Any further innovation has to come from us, the Fido sysops,


      Fidonews                   Page 14               17 Feb 1986





      and of  course  our  users.  When  a  Fido  clone  has  been
      officially  accepted  as  the  public domain Fido we can all
      start customizing our own Fido's to  our  own  requirements.
      Till then we take what we get and thank our lucky stars that
      someone  cares  enough  about  what  we  are  doing  to make
      improvements.

      I'm sorry for going on like this, but I thought I'd tell you
      all how I feel.  What I'm really trying to say is this; OK I
      charge people a fee or full access to  my  system,  sure;  I
      charge  people  a  fee  for  copying  disks.  If you read on
      you'll see the charges I make, they're reasonable, I've also
      sent a copy of the disk magazine I write to all the  country
      coordinators  to do with what they will,  I've also sent out
      my disk catalog.

      I REALLY believe in what I'm doing.  If I could afford to do
      all the things I've been talking about I wouldn't be writing
      all this because I would  have  already  done  it!  I  don't
      think  it's wrong to charge people for what I'm doing.  It's
      the only way I can raise the capital needed  to  fulfill  my
      plans.

      If  you have any comments (good or bad) on the above I would
      welcome them.

      ------------------------------------------------------------

































      Fidonews                   Page 15               17 Feb 1986





      ============================================================
                                FOR SALE
      ============================================================

      FOR SALE OR TRADE!

      DEC 11/23 Minicomputer as follows:

              11T23 Computer
              CPU card has MMU and FPU
              (2)  RL01 5MB Removable Disk Drives
              (4)  Disk Packs for RL01
              LA-120 "DECwriter" printing terminal
              (2) 4 serial port "J" cards
              Latest version of RT-11M+ (5.1)
              Misc documentation


      This computer is about six years old, but was only used for
      about a year of that time, so it's had VERY little use.

      I'd be interested in:

              A cash offer

              Trade for:
                      (1) ea IBM-PC/AT system or
                      (2) ea DEC Rainbow (w/hard disk) systems or
                      (1) ea grand piano

      This is available in Portland, OR and shipping would
      probably be prohibitive (extremely heavy, like a small
      refrig), but it's your nickel (FOB Portland).

      Contact me for further information:

              Doug Forman, Sysop
              MacSystem/NW 105/8

              (503) 233-6583 BBS
              (503) 236-8160 Eves
              (503) 357-6151 x2295 Days

      ------------------------------------------------------------
















      Fidonews                   Page 16               17 Feb 1986





                   ENTERTAINMENT SOFTWARE FOR YOUR PC!

                           SUPERDOTS!  KALAH!

      Professional quality games include PASCAL source!  From  the
      author of KALAH Version 1.6,  SuperDots,  a variation of the
      popular pencil/paper DOTS game,  has MAGIC  and  HIDDEN  DOT
      options.  KALAH  1.7  is  an African strategy game requiring
      skill to manipulate pegs around a playing board.  Both games
      use the ANSI Escape sequences  provided  with  the  ANSI.SYS
      device driver for the IBM-PC,  or built into the firmware on
      the DEC  Rainbow.  Only  $19.95  each  or  $39.95  for  both
      exciting  games!  Please  specify  version  and disk format.
      These games have been written in standard  TURBO-PASCAL  and
      run on the IBM-PC,  DEC Rainbow 100 (MSDOS and CPM), CPM/80,
      CPM/86,  and PDP-11.  Other disk formats are available,  but
      minor customization may be required.

                              BSS Software
                              P.O. Box 3827
                          Cherry Hill, NJ 08034


      For every order placed,  a donation will be made to the Fido
      coordinators!  Also, if you have a previous version of KALAH
      and send me a donation, a portion of that donation will also
      be sent to the coordinators.  When you place  an  order,  BE
      CERTAIN  TO  MENTION  WHERE  YOU  SAW  THE  AD since it also
      appears in PC Magazine and Digital Review.

      Questions and comments can be sent to:

                       Brian Sietz at  Fido 107/17
                       (609) 429-6630    300/1200/2400 baud

      ------------------------------------------------------------
























      Fidonews                   Page 17               17 Feb 1986





      Daniel D. Stuhlman
      BYLS Fido (no node number yet)

                      File Security and Secret*File

      Security is a frequent problem with computer use.  If you
      have a large number of personal computer users who need to
      share files how do they insure that only the intended
      receiver reads the file?

      Secret*File from BYLS Press is a file encryption program for
      everyone who wants to share secure MS-DOS files. Secret*File
      is menu-driven and easy-to-use. Program  requires an IBM-PC
      compatible computer with  MS-DOS 2.1 or higher, 128K RAM,
      and one 5" disk drive.

      Examples of uses:
        1. Send a coded file to a friend via modem.
        2. Upload a coded file.  Let a friend download it.
        3. Put a coded file on a disk.  Send disk to a friend.
        4. Send coded messages from field offices to home office.

      Secret*File offers the following security features:
        1. User name and password required to operate program.
        2. User and receiver must know exact file name.
        3. Two types of coding.
        4. User may change random number files needed for coding.
        5. File's password is not stored.
        6. Decoy bytes and check digits make cryptoanalysis
           difficult.

      Secret*File codes and decodes at the rate of 50 bytes per
      second. Disk is not copy protected and may be used on a hard
      disk.

      Single copies of Secret*File cost only $75 and include a
      free copy of Print*File.  Print*File is a printer control
      utility to allow use of the fonts offered on an Epson
      compatible printer.

      Quantity and dealer discounts and  site licenses are
      available.  A demo version and more information may be
      downloaded from BYLS Fido board 312-262-8959 (11 PM - 9 AM
      weekdays, all day Saturdays Central Time zone)

      Order or request more information from:

                               BYLS Press
                            6247 N Francisco
                           Chicago, IL  60659

      ------------------------------------------------------------








      Fidonews                   Page 18               17 Feb 1986





      ============================================================
                                NOTICES
      ============================================================

                           The Interrupt Stack


      22 Feb 1986
         Submissions deadline for the CROBOTS competition.  Ask
         Andy Foray at 107/7 for details.

       1 Mar 1986
         The Next Occasional MetroNet Sysop Meeting, to be held at
         Matt Kanter's apartment.  Check with Matt at 107/3 for
         details.

       1 Mar 1986
         European mail hour shifts to 0230-0330 GMT.  Summer time
         will no longer be observed.

      11 Apr 1986
         Halley's Comet reaches perigee.

      19 May 1986
         Steve Lemke's next birthday.

      24 Aug 1989
         Voyager 2 passes Neptune.





      If you have something which you would like to see on this
      calendar, please send a message to Fido 1/1.

      ------------------------------------------------------------

      Fido 11/301, Fido Racer,  Murray State University,  and Fido
      144/2,  Fido CSU,  Colorado State University, are interested
      in forming a network of FIDO's at institutions  involved  in
      advanced  education  --  colleges,   universities,   medical
      schools,  institutes,  and the like.  If you are interested,
      drop a line to 11/301 expressing interest.

      We may be able to get some interesting exchanges going in an
      area  that  doesn't  seem to be represented in a net at this
      time.  We look forward to hearing from you.

              Bill Allbritten, sysop, 11/301

      ------------------------------------------------------------

                         Net 107 has a New Host


      Due to our previous host's serious and ongoing phone line
      problems,  Don Daniels is now the host for net 107, as of


      Fidonews                   Page 19               17 Feb 1986





      node list #038.

      ------------------------------------------------------------

      The Orange County section of NET 102 has  broken  out  to  a
      separate net. This change is effective as of node list 031.

      Our  new  net is 103.  All the 500 series nodes from new 102
      are now addressed as net 103 with the same node numbers.

      103/501, Host of net 103

      ------------------------------------------------------------

                    New Version of Rovermsg Available

                                   by
                               Bob Hartman
                           Sysop Fido 132/101
                            The UN*X Gateway
                          and Home of Rovermsg


      Once again there is a new version of ROVERMSG available  for
      downloading  from  my  board.  The  new  version is Revision
      2.16.  This version has  some  small  bug  fixes,  and  also
      allows faster video display on IBM PC's,  DEC Rainbows,  and
      Sanyos.  The new video display is  about  2-3  times  faster
      than  it used to be.  Anyone who is using a previous version
      of Rovermsg should update to the new version if possible.

      ------------------------------------------------------------




























      Fidonews                   Page 20               17 Feb 1986