Volume 3, Number 16                                 21 April 1986
    +---------------------------------------------------------------+
    |                                                  _            |
    |                                                 /  \          |
    |    - FidoNews -                                /|oo \         |
    |                                               (_|  /_)        |
    |  Fido and FidoNet                              _`@/_ \    _   |
    |    Users  Group                               |     | \   \\  |
    |     Newsletter                                | (*) |  \   )) |
    |                                  ______       |__U__| /  \//  |
    |                                 / FIDO \       _//|| _\   /   |
    | (C) Copyright 1986 by IFNA     (________)     (_/(_|(____/    |
    |                                                     (jm)      |
    +---------------------------------------------------------------+
    Editor in Chief:                                   Thom Henderson
    Chief Procrastinator Emeritus:                       Tom Jennings

    FidoNews is the official newsletter of the International  FidoNet
    Association,  and is published weekly by SEAdog Leader, node 1/1.
    You  are  encouraged  to  submit  articles  for  publication   in
    FidoNews.  Article submission standards are contained in the file
    FNEWSART.DOC,  available from  node  1/1.

    The   contents  of  the  articles  contained  here  are  not  our
    responsibility,   nor  do  we  necessarily   agree   with   them.
    Everything here is subject to debate.




                            Table of Contents

    1. EDITORIAL
       Spaghetti Coding
    2. ARTICLES
       Information needed on Fidonet compatible clones
       Automated File Relays
       Fido lives on a Zenith Z-100
    3. COLUMNS
       Notes from Abroad
       The World of Computing:  Copy protection and book reviews
       PC Week reviews ARC
    4. WANTED
       Texarkana Regional Coordinator
    5. FOR SALE
       Entertainment Software for your PC!
       Public Domain Software Library Sale!!
       Special Offer to FidoNet Sysops
    6. NOTICES
       The Interrupt Stack
       FidoNet does NOT observe Daylight Savings Time




    Fidonews                     Page 2                   21 Apr 1986


    =================================================================
                                EDITORIAL
    =================================================================

    Jim Butterfield
                             Spaghetti Coding

            I recently received a letter from  Syd  Bolton,  who  was
    most  enthusiastic  about  "free-form" programming.  You know the
    sort of thing -- the first step is to turn the computer  on.  The
    next is to write a dozen lines or so; after that, decide what you
    want to do.  Under no circumstances is any planning to take place
    before   switching  on,   and  work  with  pencil  and  paper  is
    unthinkable.

            I'm overstating the case, of course.  The point is -- and
    several writers have pointed this out lyrically -- it's great fun
    to  horse around with code and see how (or if) you can get things
    to come out.  I've even been quoted myself as saying that one  of
    the  marks  of  a  virtuoso programmer is the ability to convince
    people that the program you ended up with  was  really  what  you
    intended  to  do  in  the  first place,  more or less.  To put it
    poetically,  it's a heck of a hacker who can hook  the  hawks  of
    hoke code for hicks.

            Fooling around can be a lot of fun,  whether you do it in
    school, at the beach, or while programming.  If your object is to
    have a good time, go ahead,  with my blessing.  If your object is
    to have a good program, well...

            It's  a  lot of fun to eat a good meal:  it's not so much
    fun to plan and prepare it beforehand,  or  to  wash  the  dishes
    afterward.  I  suspect  it's  the same thing with programs.  It's
    more fun to dive in and chop at the code:  it's much less fun  to
    plan  before  and  document  afterward.   When  I  look  at  some
    programs,  I sometimes wish that the programmer had  worn  a  bib
    when writing it.  I can see the litter of leftover and patched-up
    code in there.

            If  you  are writing a one-shot program for your own use,
    go to it.  If it slugs away for  two  minutes  and  then  reports
    ?SYNTAX  ERROR  IN LINE 5870,  chop in a repair and run it again.
    And if the  repair  doesn't  work,  try  another  chop.  If  THAT
    doesn't  work,  sit down and think.  Sound familiar?  That's what
    you get when you hack at a program, and it can be lots of fun.

            But be aware  that  free  flight  coding  does  have  its
    problems.  Such as:  (i) you drag the program out six weeks later
    and can't read it yourself;  (ii) you make a small change and the
    whole thing collapses for no apparent reason; (iii) you give away
    or  sell  copies,  and  people  phone you telling you things that
    don't work properly;  (iv) your program wins a  prize  in  "worst
    code of the year";  (v) somebody sends you a "cleaned up" rewrite
    of your program that uses one-third of the lines;  (vi) you wrote
    it  for  ten  provinces,  and  it  turns  out  that  it cannot be
    converted to fifty states without a total rewrite.
    Fidonews                     Page 3                   21 Apr 1986


            It's okay to write green slime coding.  But keep in  mind
    the  following  thoughts.  If  you  want  to  publish or sell it,
    you'll also want to do massive  cleaning  up.  Also,  well-shaped
    coding  gives you a good feeling;  you feel proud of not just the
    program,  but also the coding it contains.  Moreover,  if you get
    into trouble, you can scrap the old program and start over.  When
    you rewrite it you may have nothing written down, but you'll have
    a  plan:  the  organization of the program as you perceived it on
    the previous write.

            If you write "natcheral" code and enjoy it,  and if  your
    programs  work,  good  for  you!  It's  hard  to  knock a working
    program.  But  there's  another  factor:  pride  of  workmanship.
    Sometimes  you  just  feel  good  about  a  program that you have
    written.  You may not know why, but you'd like to show the coding
    to others because the parts fit together  so  neatly.  When  this
    happens,  it's usually a question of style.  Often, you've solved
    a specific program in a general way.  For example, you might have
    calculated the average value of five numbers,  but you've done it
    in  such  a  way  that  a  minor  change  would  perform the same
    calculation for a hundred values.  You've gone from the  specific
    task  to  a general solution,  and that makes you a more powerful
    programmer.

            You might have heard a lot of  talk  about  "structured",
    "goto-less",  or  "top-down"  programming.  These are essentially
    concerned  with  planning,   rather  than  programming  as   such
    (although  it's  easy  to  be  misled  by  the mechanics).  Their
    general objective  is  to  encourage  you  (or  shove  you)  into
    creating  a  program  that  flows in an orderly way,  rather than
    hopping around.  A program should be  something  like  a  railway
    line,  with main line, spurs, and sidings clearly identified;  it
    shouldn't be like a city map with no clear path from one point to
    another.  I see programs in which the programmer  seems  to  have
    arrived in a maze of twisting little passages, all the same.

            You  might  think that you write only one line at a time,
    but it's not so.  If you write FOR J=1 TO 10 in a program, you're
    engaged in planning ahead.  You  plan  to  repeat  the  next  new
    statement ten times,  and you've committed yourself to eventually
    writing a NEXT  J.  There's  no  such  thing  as  truly  barefoot
    programming  --  your  mind is always thinking a few lines ahead,
    and you're always planning.  The real danger is to write IF  X>10
    GOTO  575  hoping  that when you get to 575 you will have figured
    out what to do when X is greater than 10.

            But whether or not you admit to planning,  whether or not
    you  do  more  of it or less of it,  do continue to have fun with
    your programming.  And if you can break the rules and still  come
    up with a neat program that works well, more power to you.

    Copyright  (c)  1985  Jim  Butterfield.  Permission to reprint is
    hereby granted, provided this notice is included in the reprinted
    material.

    -----------------------------------------------------------------
    Fidonews                     Page 4                   21 Apr 1986


    =================================================================
                                ARTICLES
    =================================================================

    Bill Allbritten, 11/301

             Information needed on Fidonet compatible clones


    As  a  not  too  technically  sophisticated  user,  I  find  that
    documentation  is  a necessity to get anything done.  It was good
    to see Tom Jennings call for an  udpdate  on  Fidonet  protocols.
    One  other  area that,  if it has not already been updated,  that
    could stand some attention is compatibility between Fido and  the
    proliferation of clones, PC,XT, and AT, that have hit the market.
    Ditto  for all of the so-called Hayes compatible modem clones out
    there.  If you live in the boonies and do most of your purchasing
    mail order, you need to hit things right the first time or suffer
    a lot of inconvenience if not expense.  Therefore,  I would  like
    to update the documenation on compatible computers and modems.

    If  you  are running FIDO on a machine NOT listed in the original
    documentation and/or using a modem NOT described in the  original
    FIDO  documentation,  would you send the following information to
    me at 11/301?  I will then compile the list and send in  to  this
    journal.  Please set up your information as follows so I can read
    it  into  my  database.  A  carriage  return and line feed should
    appear between fields.  I think  this  will  help  a  lot  of  us
    looking  at  the  very  inexpensive  machines  now on the market.
    Specific machines being sought are the  generic  clones,  the  AT
    clones,  and  any exotics such as the Apricot that folks have had
    some luck with.

    For computers,  please send the following:  (no commas in fields,
    please)

    BRAND NAME
    DEALER NAME
    DEALER ADDRESS (City State ZIP)
    DEALER PHONE
    RAM currently installed
    ACCESSORY BOARDS (up to 65 characters)
    ACCESSORY BOARDS (up to 65 characters)
    TYPE of VIDEO card
    MULTITASKING SOFTWARE (if appropriate)
    COMMENTS
    COMMENTS
    COMMENTS
    COMMENTS
    COMMENTS (each comment line up to 65 characters
    YOUR NAME
    YOUR ADDRESS
    YOUR PHONE (data or voice,  please indicate--Last three items are
    optional)

    For modems,  please send the following:  (no  commas  in  fields,
    Fidonews                     Page 5                   21 Apr 1986


    please)

    BRAND NAME
    DEALER NAME
    DEALER ADDRESS (City State Zip)
    PROTOCOLS SUPPORTED
    MODEM MASK SWITCH SETTING (16, 32, 64, 128, etc)
    OTHER SWITCH SETTINGS ( 1U 2D; 1ON 2OFF as appropriate)
    COMMENTS
    COMMENTS
    COMMENTS
    COMMENTS
    COMMENTS (each comment line up to 65 characters)
    YOUR NAME
    YOUR ADDRESS
    YOUR  PHONE  (date  or  voice-please  indicate--Last  three items
    optional)

    You do not need to respond to all  fields.  Just  enter  a  blank
    line for any field not use.  Thanks.

    I  look  forward  to  hearing from you on 11/301.  I will collect
    this material until MAY 1, 1986, and then send it in.  It will be
    available sooner on my board in file area 4 as COMPAT.TXT.

    -----------------------------------------------------------------

    Fidonews                     Page 6                   21 Apr 1986


    Thom Henderson, 107/8
    System Enhancement Associates

                          Automated File Relays


    A common problem faced by  FidoNet  sysops  is  how  to  reliably
    automate  the  relaying of files,  particularly the node list and
    newsletter.  Our Robot program has assisted greatly in this task,
    but problems sometime arise when file mailings are delayed.

    In a typical case,  a sysop will expect to receive the node  list
    on,  say,  Sunday morning, and will pass it on by placing entries
    in the Robot control file like so:

        Sun input\nodelist.a* 107/4
        Sun input\nodelist.a* 107/5
        Sun input\nodelist.a* 107/6


    This works,  but has a drawback.  If the node list isn't received
    when  expected,  then  the  relay  messages  are  still  sent.  A
    somewhat better approach makes use of the EXIST keyword, like so:

        Sun exist input\nodelist.a* 107/4
        Sun exist input\nodelist.a* 107/5
        Sun exist input\nodelist.a* 107/6


    This is a bit better because the relay  messages  won't  be  sent
    unless  there  is  a node list to be relayed.  In most cases this
    will work properly.  But consider the case where the node list is
    delayed a day,  for  whatever  reason.  Robot  won't  create  the
    messages because the node list wasn't there on Sunday.

    A more reliable method involves two directories, and makes use of
    Robot's "demand mode".  Assuming two directories called INPUT and
    OUTPUT, an external event can be set to run immediately after the
    national mail hour, like so:

        :relay
        if not exist input\nodelist.a* goto nolist
        del output\nodelist.a*
        copy input\nodelist.a* output
        del input\nodelist.a*
        robot list

        :nolist
        if not exist input\fnews*.arc goto nonews
        del output\fnews*.arc
        copy input\fnews*.arc output
        del input\fnews*.arc
        robot news

        :nonews

    Fidonews                     Page 7                   21 Apr 1986


    The  Robot control file to go with this would look something like
    this:

        list: output\nodelist.a* 107/3
        list: output\nodelist.a* 107/4
        list: output\nodelist.a* 107/5
        news: output\fnews*.arc 107/3
        news: output\fnews*.arc 107/4
        news: output\fnews*.arc 107/5


    The advantage to this approach is that the  file  relay  messages
    are  triggered  by  the  receipt  of the file to be relayed.  The
    outgoing messages will be sent ONLY when a new file is  received,
    regardless  of  when  that  happens.  If a node list is delayed a
    day, or two, or four, it will still be properly sent.


    Special note: In DOS 2.0 and 2.1 and IF EXIST cannot take a path.
    If you do not have DOS 3.0 or 3.1,  then it will be necessary  to
    change directories to test for the presence or absence of a file.

    -----------------------------------------------------------------

    Fidonews                     Page 8                   21 Apr 1986


    Joseph E Rock, Jr; 128/15

                        Z-Fido.  Z-Fido?  Z-Fido!

    From  what I have seen,  most of the Fido BBS's are hosted on IBM
    PCs or clones.  I was  not  much  of  a  BBS  person  until  very
    recently.  When  I  went  to  the  local  Heath Users Group (HUG)
    meeting the sysop of the local  Fido  Host  (Richard  Evers)  was
    there.  During the discussion,  he brought up the idea of getting
    Fido to run on a Z-100.  He said that the necessary software  (an
    interrupt  handler)  was not available for the Z-100.  I thought:
    "that can't be very difficult to write." And promptly volunteered
    to produce the driver on my Z at home. Well, the warning that Tom
    Jennings gives in the Generic.doc and Generic.asm files is true -
    writing the driver is not a piece of cake.  However, I did manage
    to  write  and debug the software within one week.  Now,  my Z is
    running as a FidoNode (128/15) except the times when  I  need  to
    use it for other things (like writing articles or trying to chase
    the bugs out of programs).

    Writing  the interrupt handler was a very interesting experience.
    The first attempt was written in C.  This is a "great"  idea  and
    almost  (as in not quite) worked.  The bugs that it had are those
    frustrating type.  You load the driver, run your test program and
    if  you  run  the test program once or twice it appears to be all
    right.  But run it three or four times and look out - I would get
    the  "WILD  INTERRUPT"  message  scrolling  all  over the screen.
    After spending three fourths of an entire weekend working on  the
    C  version of the handler I decided that it was time to learn how
    to use assembler (I  had  some  experience,  but  not  more  than
    changing 10 lines in an already working routine).  From the first
    attempt,  I had a good feel for what the driver had to do to  get
    the job done.  The second attempt was then underway.  I wrote the
    driver, assembled it,  corrected all the dumb mistakes,  and then
    debugged it. The debugging process used simple test programs that
    called  the handler for one function at a time and a borrowed DEC
    VT-100 terminal (it's real difficult to see what  characters  are
    sent by watching the modem lights).  Anyway, I got it working and
    had Richard Evers call in to  test  the  handler  when  Fido  was
    running. It worked!!!

    I  was  feeling  real good when Richard asks "What about the 0 or
    Outside command?" We tried it and no, it didn't work. So, back to
    the editor I went and within two hours I had the  problem  solved
    and  when  we  tested  it  and everything worked fine it "made my
    day." I did run into a  few  minor  problems  after  the  initial
    success, but they were all easily corrected (like using the right
    /J switch for Fido).

    So  now  all  you Z-100 owners need not despair - you too can run
    Fido.  The interrupt handler and documentation can  be  retrieved
    from  the Colorado Springs HUG board (128/11).  All you need then
    is  Fido_gen  and   all   the   necessary   support   files   and
    documentation. Good luck and long live Z-Fido!!!

    -----------------------------------------------------------------
    Fidonews                     Page 9                   21 Apr 1986


    =================================================================
                                 COLUMNS
    =================================================================

                            Notes from Abroad
                        The Continuing Modem Saga

    As I'm sure you all know we have a modem crisis in  Europe.  Here
    are my latest contributions to the saga.

    After hearing reports that the Dataflex modem was finally working
    with Fido, I decided I would try it out for myself.  I had a very
    early  version of this modem,  and had been testing it six months
    ago,  but no joy.  Then I heard that Helge  Vindenes  (4703)  had
    been  so  exited  by  the  Dataflex modem that he had jumped on a
    plane and flew over to London just to pick one up!

    I went to see Dataflex and they seemed very keen to help  out.  I
    spoke  at  length  to  Bob  Manekshaw,  the guy who wrote the ROM
    software for the modem,  and he demonstrated  the  modem  calling
    Jersey_Fido  (formerly  Hughs_Fido  4406).  The Dataflex supports
    300 and 1200/75 and as far as  I  can  tell  it  is  fully  Hayes
    compatible.  It's an internal (card) modem,  but there is a boxed
    version coming shortly.

    We called Jersey_Fido at 1200/75 and 300 baud but the 12/75  link
    was a bit shaky.  We got through a couple of times at 1200/75 but
    other  times we weren't so lucky.  As I said Dataflex seemed keen
    to help and in fact are going to run a Fido of their own  shortly
    (4412).

    After  spending  the whole day at Dataflex I went home and set up
    the Dataflex modem on the Compulink Board.  I had a few  problems
    but  it was my fault.  I had another Dataflex multi-function card
    in my machine which had two COM ports  attached.  When  I  fitted
    the modem card it clashed with the existing COM ports.  The modem
    can  be  set  up  as either a modem on startup,  or a COM port (a
    standard 25 way D type is provided).  After realizing my  mistake
    with  the  clashing  COM ports I set the modem to COM2,  and as a
    modem on startup and plugged it in.

    The modem needs a full length slot and took a little fiddling  to
    get it in straight.  The telephone lead (British Telecom modular)
    is  at the top of the mounting plate,  and there is a volume knob
    at the  bottom.  Between  these  two  is  the  25  way  "D"  type
    connector when the board is used as a COM port.

    Once  fitted  in  my  Compaq  I booted up and ran the QMODEM comm
    program to do some testing.  The modem is actually supplied  with
    PC-TALK  but I prefer QMODEM.  I had a preliminary version of the
    manual which had known mistakes.  None the less the manual proved
    very informative and gave good coverage to the "AT" command  set.
    The manual also contains the complete PC-TALK manual.

    So far so good!  Now came the big test, I had spoken earlier with
    Hugh Ashborn (Jersey_Fido) and he suggested I use his FIDOMDM.BBS
    Fidonews                     Page 10                  21 Apr 1986


    string.  I did this and sure enough it worked fine.

    The first few callers came in at 300 which worked OK,  and then I
    got a call from Bob Manekshaw to test the modem at 1200/75.  This
    worked also much to my  relief  and  I  happily  left  the  modem
    running all night.  I set the volume pot to full (very loud!) and
    let  it  get  on  with  it.  The first few calls were OK but then
    things went a little strange.  I could hear the  modem  auto-baud
    rate  selecting but the tones seemed to be shorter in length that
    before.  I sat watching and listening for the  next  few  minutes
    and  the  same  thing  happened  time  after  time.  Of  course I
    couldn't tell what baud rate the caller was using  as  he  didn't
    actually get in, but I suspect it was 1200/75.

    I  then  got  a  call  from  Martin  Read (LaserMail 4410) and we
    decided to test the modem at 1200/75.  We had various problems at
    1200/75 ranging  from  no  connection  to  problems  I  can  best
    describe  as  "strange".  The  modem  seemed  fairly  reliable at
    detecting an incoming call at  1200/75  but  it  did  not  always
    trigger  Fido  at  the  correct baud rate.  I could hear that the
    tones  were  1200/75  but  Fido  had  connected  at   300   baud.
    Occasionally  Fido  did connect at 1200 and things went smoothly.
    More often than not though callers at 1200/75 were  connected  at
    300 baud.

    This  is  an  improvement over my other modems that refused point
    blank to even work at 1200/75 with the Compaq.  From the  callers
    point  of  view  a  connection  even at 300 baud when he is using
    1200/75 is better than failing to connect.

    I'm sure that all the modem manufacturers are extremely upset  at
    IBM's  lack of support for split baud rates as it has caused them
    (and us) a lot  of  unnecessary  aggravation.  I  think  Dataflex
    should  be congratulated an making their modem operate as well as
    it does at 1200/75.  It is a full-fledged  computer  in  its  own
    right.  Unfortunately,  in  the fickle world of computing nothing
    but the best is good enough,  and even  then  it's  probably  too
    expensive.  I  see  the  Dataflex IDM modem as one of the best so
    far,  and I'm going to stick with it.  Sure it has a few problems
    but it performs pretty well even though.

    From  the  sysops  point of view the fact that it doesn't work at
    1200/75 properly is an aggravation.  You can  of  course  disable
    the  auto-baud rate selection (as I have done for the time being)
    and just let it work at 300.  I have had it on line for  about  a
    week  and  apart  from  the  problems I had when I was testing at
    1200/75 it has connected and worked very well for about  95%  off
    the time.

    From  the  non-sysop's point of view it works (almost) perfectly.
    Most people will be using it to originate calls,  which  it  does
    very  well.  I  think  I  have struck up a good relationship with
    Dataflex and with their cooperation (and ours through feedback) I
    think we all could be onto a winner.

    -----------------------------------------------------------------
    Fidonews                     Page 11                  21 Apr 1986


                          THE WORLD OF COMPUTING
                       written by Reuven M. Lerner
                             FidoMail 107/33


        Hello,  and welcome to The World of Computing #4!  This  week
    will  be  devoted  to  a  new  copy-protection  scheme as well as
    reviews of two books that I read recently.

        About mail:  I love to get mail about what I'm writing, be it
    positive  or  negative.  Unless  I'm  absolutely  overwhelmed  by
    FidoMail,  which hasn't happened yet,  I promise to reply  within
    two days of my reading it.



        Copy Protection....sometimes

        What  is  one  of  the  most  interesting  new forms of copy-
    protection  has  been  introduced  by  MECA,  whose  best-selling
    program  "Managing  Your Money" has received good reviews by most
    magazines.  I read about "Russian Roulette Pirating" in  Personal
    Computing  magazine,  and  was  intrigued by the problems that it
    causes while solving old ones.

        To understand their form of protection,  let me review one of
    the  similar  types  of copy-protection,  the key-disk technique.
    The idea is that you can make as many copies as  you  want  of  a
    product,  but  you  must show the original disk when you start up
    the program.  Many software companies  have  started  using  this
    system recently, mostly on the IBM and Macintosh computers.

        The  idea  is  that  it  allows you to make copies,  and thus
    prevent trashing the original disk,  without actually letting you
    roam   free   handing   copies   out   to  your  friends  (which,
    unfortunately,  some people do when there  is  no  protection  at
    all).  It  does  its job well,  but there is still the problem of
    what happens when you spill coffee on the original disk and  have
    to wait two weeks for a new copy.

        The  new MECA system is similar to the key-disk,  except that
    it doesn't ask you for the key disk every time.  Every few  uses,
    from  1  to  300,  the  computer asks you to insert the key disk.
    That allows for copies to be functional,  and the originals to be
    safe most of the time.

        If  you  don't  have the key disk,  you can either run out to
    your friend who copied it for you,  or buy  a  new  copy  of  the
    program  for  $200  from  MECA,  no questions asked (they must be
    pretty confident that this is going to work if they won't  ask  a
    single question about why the person needs a new key disk).

        Of   course,   random   key-disk   protection  is  much  less
    objectionable that regular  key-disk  protection,  and  it  shows
    remarkable  caring  on  the  part  of  the  company  for what the
    consumer wants.  The only problem is that it still doesn't  allow
    Fidonews                     Page 12                  21 Apr 1986


    the  person  to  make  fully functional backups,  something which
    keeps me from wholeheartedly recommending the system.

        As I said before,  it means that the companies are trying  to
    make the consumers happy, and are willing to lose a few customers
    in order to do so.  MECA is a company to be emulated,  especially
    by the companies that put out those terrible  worm-code  programs
    that destroy disks physically.

        One  such  worm program was written up in a recent InfoWorld,
    and it's such an example that I'll share it with you here.

        A company executive recently bought a package for his company
    that used the Hard  Disk  Prolok  scheme,  one  which  physically
    damages  disks if copies are made,  but allows you to make copies
    onto hard disks.  Unfortunately,  the company had several copies,
    and  their  entire  hard disk was wiped out because of the Prolok
    protection.

        That is not only terrible to hear  about,  but  is  downright
    unethical  as  well.  How can a company such as Vault,  who makes
    the Prolok program, eithically distribute programs that they know
    might damage hard disks containing literally megabytes of crucial
    data?

        If I were handing out awards as  some  other  columnists  do,
    Vault would get the Crumpled Diskette Award.



        Whole Earth Software Catalog

        I  don't  remember  where  I first read about the Whole Earth
    Software Catalog.  I do remember, though, that it didn't get such
    great reviews.  Well, despite all that's been said,  I bought the
    catalog for 1986, interestingly called the 2.0 edition.

        First off,  I don't know why they call it a software catalog.
    It's primarily software, but they have hardware reviews, magazine
    and book reviews,  predictions for this year,  and a lot of other
    things  that,  in my mind,  don't exactly fit into the "software"
    category.

        Stuart Brand,  the Editor in Chief of the catalog,  obviously
    spent  time on this book,  but in my mind,  not enough.  The book
    reads more like a long magazine than  a  real  book,  with  short
    reviews,  lots of pictures,  and slick magazine-type pages.  Each
    review is preceeded by a cute,  but unnecessary  quip  about  the
    product.

        The  way  that  it  is  organized  is  one  of  the catalog's
    redeeming factors.  It has eleven main chapters,  each devoted to
    another  kind of activity (e.g.  writing,  playing,  programming,
    learning), which makes it easy to look up products that you need.
    There is an index for most major computers,  as well  as  a  full
    index  for those of us who like to browse through indexes and see
    Fidonews                     Page 13                  21 Apr 1986


    what's in the book.

        Can I recommend this book?  Not unless you get  it  for  much
    less  than  the  recommended $17.95.  I can't see its value being
    much more than $9 or so.  Better luck next time, in 1987.



        The Complete Handbook of Personal Computer Communications

        This is the best book  of  its  kind  that  I've  ever  seen,
    anywhere!  From plugging in your modem, to understanding bits and
    baud,  to error-checking protocols,  to a two-page description of
    Fido,  Alfred Glossbrenner deserves  to  charge  more  than  just
    $14.95 for this masterpiece of a book.

        In  a  huge book that details everything that you'd ever want
    to know about telecommunicating,  Mr.  Glossbrenner  has  done  a
    fine job in his research and in his writing.

        I  saw  the first edition of the book (the second edition has
    been out only about four months), and used it constantly whenever
    I didn't  know  what  was  happening.  The  second  one  corrects
    mistakes that were in the first edition, gives more hints (called
    "Online Tips"), and much more!

        It's  almost  impossible to describe this book,  but once you
    get it, I think that you'll agree that it's the ultimate resource
    material for people like you and me.



        Next time

        That's about it for this week.  Next time,  I'm going to talk
    about  educational  programs that I've tested,  and the future of
    computers in schools.  Until next week, happy computing!


        (c)1986 Reuven M.  Lerner.  All Rights  Reserved.  Permission
    is given to copy this column so long as it is for non-profit use.
    If you wish to use it for other than non-profit use, write to the
    author  at 21 Old Westbury Road,  Old Westbury,  NY 11568,  or at
    FidoMail 107/33.

    -----------------------------------------------------------------

    Fidonews                     Page 14                  21 Apr 1986


    REPRINTED FROM PC Week, March 04, 1986
    Copyright (C)  1986 Ziff Davis Publishing Company

    License and permission to reprint per terms of contract number
    PCW2-198 dated March 13, 1986 have been granted to Ken Kaplan,
    Executive Director, International FidoNet Association.

                  File-Compression Program Lowers User's
                Connect Costs While Increasing Disk Space

                               By Garry Ray


    One of the problems with PC disk files is they never stop coming.
    The more floppies you have, the more you need. The larger your
    hard disk, the smaller it seems to get. And it probably goes
    without saying that adding a modem to any PC system at least
    doubles the monthly telephone bill.

    ARC, a unique utility program from System Enhancement Associates,
    of Wayne, N.J., solves many of these problems. Originally
    released in early 1985, the program has quickly become a standard
    on the PC bulletin-board circuit, replacing other popular "public
    domain" programs such as Squeeze (SQ), Unsqueeze (USQ) and
    Library Utility 86 (LU86).

    The primary function of all these utilities is to compress and
    link disparate files into a single, smaller whole. The immediate
    and most significant benefit passes to those who regularly
    transfer files from one PC to another via telephone lines. With
    ARC, you can lop off excessive telephone-connection charges by
    converting, for example, 300K bytes of text files into a single
    file of less than 160K bytes.

    The result? A simple 1,200-bit-per-second file transfer between
    the East and West coasts would cost about $7 less than otherwise
    (based on AT&T day-rate charges). Do that just a few times and
    you've paid for the program. A few more and you're making money.

    Connect charges aren't the only things you'll save with ARC.
    Floppy- and hard-disk space can be vastly increased by storing
    like files in archives. It's fairly evident that converting that
    same 300K bytes of files into a 160K-byte archive file will pay
    off in two ways_better disk organization and more optimal use of
    the storage device.

    Using ARC is about as simple as anything could be. The program is
    invoked from the DOS command line by typing "ARC," with a series
    of command-line switches and file specifications determining the
    action the program will take.

    When invoked without any commands, ARC will merely display a
    copyright notice and a command summary, and then return the user
    to DOS. The command summary is the only "on-line help" the
    program displays, though it certainly is sufficient, given the
    simplicity of ARC.
    Fidonews                     Page 15                  21 Apr 1986


    The most important program commands are Add, Move and Extract.
    Like the rest of the ARC commands, these are invoked by typing
    the first letter of the command on the DOS command line,
    immediately after the command "ARC."

    A typical command sequence might be "ARC A TEXT *.TXT," which
    means "add to an archive file called `TEXT.ARC' all the files on
    the current subdirectory and drive with the file-name extension
    `.TXT'."  The Move command, specified on the command line with
    the letter "M," would simply delete all the desired files from
    the DOS directory after they had been added to the archive file.

    While it's creating and adding to archive files, ARC performs a
    number of additional tricks. Every file is individually examined
    to determine its type and structure, at which point ARC selects
    one of three built-in file-compression techniques. The
    compression algorithms are extremely complex, but suffice it to
    say that text files are usually reduced in size by 40 to 60
    percent, and binary files by anywhere from 15 to 35 percent.

    Files can be added to an archive with no compression at all
    (using the "suppress" command), and later packed and squeezed by
    invoking the "convert" command switch.

    Finally, the Extract command (invoked with either "x" or "e" on
    the command line) is the tool that allows users to remove files
    from the archive. Using the above example, the entire contents of
    an archived file can be extracted to original form by typing "ARC
    X TEXT," in which case all files are "uncompressed" and placed in
    the current subdirectory as individual files.

    Users can also use standard DOS file-specification commands to
    select individual or groups of files for extraction. For
    instance, all 1-2-3 worksheet files could be extracted by the
    command "ARC X LOTUS *.WKS".

    In any case, the original archive file retains all its original
    contents, though unneeded files can be subsequently deleted with
    the ARC "delete" command.

    If you've forgotten which archive file contains what, two ARC
    commands allow you to get either short or long archive
    directories. The short listing displays the file name, length,
    original file creation date, and the uncompressed length of each
    file.

                            Inherent Verbosity

    The long listing (available through the "verbose" command), shows
    more detailed information, such as each file's compressed size,
    the compression technique used, the creation date and time, and
    the Cyclical Redundancy Check (CRC) value for each file. The CRC
    value is used by ARC to determine the integrity of the file
    during compression and extraction, though a user command, "test,"
    also uses the CRC value for the same purpose.

    Fidonews                     Page 16                  21 Apr 1986


    In addition to all the primary archiving and compression
    commands, ARC allows the archived file contents to be either
    viewed, printed or even executed with the "run" and "print"
    commands. Run does exactly that -- it runs the .COM, .EXE, .BAT
    or .BAS file specified on the ARC command line.

    This did not seem to us a highly useful command, since the
    processing overhead required by ARC just didn't seem to be worth
    the trouble. Instead, it seems easier just to "unarchive" the
    appropriate file and run it in the normal manner. Additionally,
    the "run" command does not accept command-line parameters for the
    program being invoked.

    Last but not least is ARC's "garble" command, which allows the
    user to encrypt files as they are added to the archive. A user-
    supplied password of any length can be used for encryption and
    must be subsequently supplied for any other ARC operation
    regarding the file(s).

                            Excellent Support

    System Enhancement Associates' technical support for ARC is
    outstanding. The program is regularly updated to incorporate new
    features, or to repair bugs that may have entered into previous
    versions. A $50 maintainance fee provides five annual update
    disks.

    Program documentation, license policies and revision histories
    are included in a DOS text file distributed with the program in
    ARC format. Those who purchase ARC directly from the developer
    also receive a number of "free" utility programs and the source
    code (in both C and 8086 assembler) for all programs.

    In sum, ARC is a fairly sophisticated and eminently useful
    product for which savvy users will find a number of applications.
    The fact that it is distributed as a "shareware" program and that
    reasonable site licenses are available makes this a good
    candidate for at least a trial run.

    -----------------------------------------------------------------

    Fidonews                     Page 17                  21 Apr 1986


    =================================================================
                                 WANTED
    =================================================================

                               HELP WANTED
                     REGION 19 TEXARKANA COORDINATOR

    We are now looking for a Fido sysop to  assume  the  position  as
    Region  19 Coordinator supporting the states of Oklahoma,  Texas,
    Arkansas, and Louisiana.  This person will be responsible for all
    of the duties of a Region Coordinator as described in the current
    POLICY1.DOC.  This sysop must have adequate  time  to  devote  to
    supporting Region 19.

    This  Fido  will  be  the  first  to  receive  the  NODEDIFF.Ann,
    FidoNews, etc. and will be expected to make them available to the
    other Networks in Region 19.  This Fido will be  responsible  for
    taking applications for and encouraging the formation of new Nets
    in  Region 19.  This Fido will be expected to resolve disputes in
    Region 19 so she/he must be a good problem solver.

    We would prefer someone with a 2400 baud modem, and that has been
    up and running for no less than  three  months.  We  will  accept
    applicants  from  any  node within the Region 19 area.  Please do
    NOT apply if you are already a Net coordinator.

    Please submit your qualifications,  including a paragraph on  why
    you  think  you would do a good job as the Region 19 Coordinator,
    to Ken Kaplan at Fido 1/0.

    -----------------------------------------------------------------

    Fidonews                     Page 18                  21 Apr 1986


    =================================================================
                                FOR SALE
    =================================================================

                 ENTERTAINMENT SOFTWARE FOR YOUR PC!

                         SUPERDOTS!  KALAH!

    Professional quality games include PASCAL source!  From  the
    author of KALAH Version 1.6,  SuperDots,  a variation of the
    popular pencil/paper DOTS game,  has MAGIC  and  HIDDEN  DOT
    options.  KALAH  1.7  is  an African strategy game requiring
    skill to manipulate pegs around a playing board.  Both games
    use the ANSI Escape sequences  provided  with  the  ANSI.SYS
    device driver for the IBM-PC,  or built into the firmware on
    the DEC  Rainbow.  Only  $19.95  each  or  $39.95  for  both
    exciting  games!  Please  specify  version  and disk format.
    These games have been written in standard  TURBO-PASCAL  and
    run on the IBM-PC,  DEC Rainbow 100 (MSDOS and CPM), CPM/80,
    CPM/86,  and PDP-11.  Other disk formats are available,  but
    minor customization may be required.

                            BSS Software
                            P.O. Box 3827
                        Cherry Hill, NJ 08034


    For every order placed,  a donation will be made to the Fido
    coordinators!  Also, if you have a previous version of KALAH
    and send me a donation, a portion of that donation will also
    be sent to the coordinators.  When you place  an  order,  BE
    CERTAIN  TO  MENTION  WHERE  YOU  SAW  THE  AD since it also
    appears in PC Magazine and Digital Review.

    Questions and comments can be sent to:

                     Brian Sietz at  Fido 107/17
                     (609) 429-6630    300/1200/2400 baud

    -----------------------------------------------------------------

    Fidonews                     Page 19                  21 Apr 1986


             Now available from Micro Consulting Associates!!

    Public Domain collection - 300+  "ARC"  archives  -  10  megs  of
    software  and  other  goodies,  and that's "archived" size!  When
    unpacked,  you get approximately 17 megabytes worth of all  kinds
    of  software,  from text editors to games to unprotection schemes
    to communications programs, compilers, interpreters, etc...

    This collection is the result of more than 10 months of intensive
    downloads from just about 100 or more BBS's  and  other  sources,
    all  of  which have been examined,  indexed and archived for your
    convenience.  Starting a Bulletin Board System?  Want to  add  on
    to your software base without spending thousands of dollars? This
    is the answer!!!

    To  order  the  library,  send  $100  (personal or company check,
    postal money order or company purchase order) to:

                   Micro Consulting Associates, Fido 103/511
                   Post Office Box 4296
                   200-1/2 E. Balboa Boulevard
                   Balboa, Ca. 92661-4296

    Please allow 3 weeks for delivery of your order.

    Note:  No profit is made from  the  sale  of  the  Public  Domain
    software  in  this  collection.  The price is applied entirely to
    the cost of  downloading  the  software  over  the  phone  lines,
    running  a  BBS  to  receive  file  submissions,  and inspecting,
    cataloguing, archiving and maintaining the files.  Obtaining this
    software  yourself  through  the  use  of a computer with a modem
    using commercial phone access would cost you much more than  what
    we charge for the service...

    Please specify what type of format you would like the disks to be
    prepared on.  The following choices are available:

            IBM PC-DOS Backup utility
            Zenith MS-DOS 2.11 Backup Utility
            DSBackup
            Fastback
            Plain  ol' files (add $50,  though,  it's a lot  of
            work and takes more diskettes...)

    Add  $30  if  you  want  the  library  on  1.2 meg AT disks (more
    expensive disks).  There are no  shipping  or  handling  charges.
    California residents add 6% tax.

    For each sale, $10 will go to the FidoNet Administrators.

    -----------------------------------------------------------------

    Fidonews                     Page 20                  21 Apr 1986


                      SEAdog Electronic Mail System
                     Special Offer for FidoNet Sysops


    System Enhancement Associates, the makers of the popular ARC file
    archive utility,  are proud to announce the release of the SEAdog
    electronic mail system.

    SEAdog  is  a  PC-based  electronic  mail  system  which is fully
    FidoNet compatible.  In addition  to  all  the  functionality  of
    FidoNet mail, SEAdog adds the following:

    o   User directory support, for automatic lookup of node numbers

    o   Return receipts

    o   Audit trails

    o   Message forwarding, with or without a retained copy

    o   Twenty four hour mail reception

    o   High priority mail for immediate delivery

    o   The ability to request files and updates of files from  other
        SEAdog systems.

    o   No route files needed!

    o   A full screen user interface that our beta test sites fell in
        love with!

    SEAdog  is  NOT a bulletin board system,  but it can be used as a
    "front end" for Fido (version 11q or later),  allowing you to add
    the full functionality of SEAdog to your existing system.

    SEAdog normally sells for $100/node, but for a limited time only
    we are offering SEAdog to registered FidoNet sysops for only $50!
    Orders may be placed by sending a check or money order to:

                      System Enhancement Associates
                      21 New Street, Wayne NJ 07470

    Or by calling (201) 473-5153 (VISA and MasterCard accepted).

    -----------------------------------------------------------------

    Fidonews                     Page 21                  21 Apr 1986


    =================================================================
                                 NOTICES
    =================================================================

                         The Interrupt Stack


    27 Apr 1986
       2 AM - Beginning if Daylight Savings Time; DO NOT change your
       clock!

     3 May 1986
       FidoBaby's first birthday.

    19 May 1986
       Steve Lemke's next birthday.

    24 Aug 1989
       Voyager 2 passes Neptune.


    If you have something which you would like to see on this
    calendar, please send a message to FidoNet node 1/1.

    -----------------------------------------------------------------

                          Daylight Savings Time

    This coming Sunday,  the 27th of April,  most of the country goes
    on  Daylight  Savings  Time.  FidoNet  does  NOT observe Daylight
    Savings Time, so do NOT advance your system clock.

    If you want to advance your system clock anyway,  then  you  must
    also advance all of your mail events.

    -----------------------------------------------------------------