Volume 3, Number 36                             22 September 1986
    +---------------------------------------------------------------+
    |                                                  _            |
    |                                                 /  \          |
    |                                                /|oo \         |
    |        - FidoNews -                           (_|  /_)        |
    |                                                _`@/_ \    _   |
    |        International                          |     | \   \\  |
    |     FidoNet Association                       | (*) |  \   )) |
    |         Newsletter               ______       |__U__| /  \//  |
    |                                 / FIDO \       _//|| _\   /   |
    |                                (________)     (_/(_|(____/    |
    |                                                     (jm)      |
    +---------------------------------------------------------------+
    Editor in Chief:                                   Thom Henderson
    Chief Procrastinator Emeritus:                       Tom Jennings

    FidoNews is the official newsletter of the International  FidoNet
    Association,  and is published weekly by SEAdog Leader, node 1/1.
    You  are  encouraged  to  submit  articles  for  publication   in
    FidoNews.  Article submission standards are contained in the file
    ARTSPEC.DOC,  available from  node  1/1.

    Copyright (C) 1986,  by the  International  FidoNet  Association.
    All  rights  reserved.  Duplication and/or distribution permitted
    for noncommercial purposes only.  For use in other circumstances,
    please contact IFNA.

    The   contents  of  the  articles  contained  here  are  not  our
    responsibility,   nor  do  we  necessarily   agree   with   them.
    Everything here is subject to debate.




                            Table of Contents

    1. ARTICLES
       HELP!!! Copyright Violation
       OUTER is here!  A new program for the "O" command
       Pittsburgh Area BBS Picnic
       Sweden and their Vikings!
       An Unsolicited Testimonial
       Shareware Authors: Under Attack?!
       Who Reads FidoNews?
    2. COLUMNS
       MS-DOS Directory Trees
       Computer Industry Spotlight
       FidoUtil ver 1.10 review
    3. FOR SALE
       DataCare Hard Disk Utility
       Public Domain Software Library Sale!!
    4. NOTICES
       The Interrupt Stack
       ListGen warning!
       Pixie and Sched update
    Fidonews                     Page 2                   22 Sep 1986


    =================================================================
                                ARTICLES
    =================================================================

    By: Brian Walsh
        Sysop 109/640

                                COPYRIGHT VIOLATION
                                -------------------

                             MOVBASIC.COM,MOVBASIC.ARC

         I have recently noticed a program called MOVBASIC.COM and I
    also noticed that it was very similar to a piece of commercial
    software that my company is currently beta testing. I then
    downloaded the file MOVBASIC.ARC. When I unarced it and checked
    it out I relized that it was the beta test version of our
    package with the messages changed a bit. I then called all the
    people that we had beta testing and asked them about it and I
    found that one person had inadvertantly uploaded it to a RBBS-PC
    system. I was given a copy of the message left to the sysop of
    the Board after he relized what he did but couldn't "kill" the
    file. I will list it below. (Names Changed for our security)


        TO:SYSOP
      FROM:John Doe
      Subj:PAKBASIC

           sysop,
                 Please delete the file PAKBASIC.COM From your
                 file listing and you hard disk as in it was
                 mistakenly uploaded and is a beta test version
                 of a commercial package that I am testing.
                 Thank You VERY much!

          John Doe

       The Sysop Did delete it but somewhere someone must have
    gotten it before he could delete it.


       The Only Thing I ask Is that All Fido Sysops PLEASE delete it
    from your board and put in you files.bbs:

    MOVBASIC.ARC NOT P.D. Commercial Software

       I Thank You For This and Hope that you will call out BBS
    Soon.


    -----------------------------------------------------------------

    Fidonews                     Page 3                   22 Sep 1986


       OUTER is here!  A new program for the "O" command

    There has been a program floating around for some time
    now called OUTSIDE that was a "mini BBS" and could be
    used in conjunction with the "O" command from FIDO's
    main menu.  The problem was that OUTSIDE was unreliable -
    it would occasionally cause the system to hang up, and it
    was hard to use.  Upon contacting the author, I found out
    the program was written in what he called "an antiquated
    language" and he was not willing to release the source.

    I realized it was time to re-write the whole thing.  Jim
    Fullton did most of the work, and I've been making fixes
    and small improvements from the beginning.  The program
    is called OUTER, and we believe that it will soon replace
    OUTSIDE.

    From Grant Fengstad (134/0) Alberta Fido Coordinator:

    DATE: 10 Sep 86  23:32:12
    TO:   Ron Bemis
    SUB:  Howdy
    Hi Ron.  I recently rec'd your Outer program and I must
    say "Fantastic".  I had used Outside previously, but your
    program puts it to shame...

    The comments are rolling in, and the program hasn't even
    been released yet!  Some of the advantages:

    o Single keystroke execution of commands
    o SysOp-selectable access by privilege level - no passwords
    o Built-in watchdog timer/carrier detect monitor
    o Control-C and Control-Break disabled
    o Absolute security when used with IBMAUX
    o Checks SCHED.BBS so a user can't "over-run" an event
    o Displays "time left" each time a user sees the menu
    o Easy to understand and set up command file for control
    o Optional help and welcome messages may be displayed
    o Complete accountability of user activity

    The program can be downloaded from file area #5 on Fido
    151/104 Nibbles and Bytes.  A first-time user can download
    it.  C source code is available for "registered" users.
    Oh, and for the folks that got the program before it was
    released - we're now in version 1.15 and there are quite
    a few goodies in the ARC that you probably don't have.

    Ron Bemis
    Fido 151/104
    (919) 942-9267

    -----------------------------------------------------------------

    Fidonews                     Page 4                   22 Sep 1986


    Clay Zahrobsky
    FIDO 129/26 Sounding Board
    Pittsburgh, Pa.

                        Pittsburgh Area BBS Picnic

      Recently the Pittsburgh Area BBS SysOps got together and
    organized the 1st BBS picnic for all FIDO users in the
    area. Before the SysOps had SysOp picnics but they decided
    to have one that involved everyone. A nearby picnic area
    was chosen and directions and info was distributed
    through out the net. Not being a SysOp (Hoping to be one
    soon) I was excited about this type of gathering. I was
    wondering about the people I would meet. Would they
    meet my expectations that I have associated their
    messages with their personality? Then the day came, and
    to say the least I was not disappointed!!! It was very
    interesting to meet all the people that I have typed to
    and have had discussions (sometimes arguments) with.
    Some met their type of messages and some even over
    my expectations. All day people ate, drank, played and
    of course talked SHOP. SysOps gave info on how to run
    FIDO more efficiently and correctly. Some also brought
    defective equipment to see if anyone could figure out
    how to fix it. There was one Tandon Hard drive that even
    Tandon would not want to fix.
      I would advise all other nets and such to try to
    organize something of this nature. All the users that
    showed up did not go home disappointed. This is a great
    way to get people closer together and to make new friends.
    I can't wait for the next one.


    -----------------------------------------------------------------

    Fidonews                     Page 5                   22 Sep 1986


    By Joaquim Homrighausen
    Sysop at Future Hacker Central 501/4609
    September 7th, 1986 at 3:49 am!

    Hello all people out there. This should be an unusual place
    to receive an article from. Here in Sweden, things are growing
    rapidly, and as times goes by it gets colder. But what the heck
    we're vikings right?! And we're born from a packet of ice with
    a label on it telling wether it's a female or a male.

    Let's get serious. The main reason for this article is to let
    people (mainly FIDO sysops of course) listen to the voice from
    this part of the foreign world. And don't worry, Tjernobyl has
    not poluted these bytes in which this letter resides! But
    anyway, I've just finished a "hot" dispute with my fellow sysop
    (or co-sysop). And we've come up with some (from a "poor" guy
    like me) interesting facts. Fido started all up as a Public
    Domain and there weren't any problems opening a new BBS because
    it was all free. Sure great, I can just download the CORE files
    and then open a FIDO BBS of my own, and then eventually join
    the net. Sounds good to me, except for the terrifying "news"
    from the "good-old-US" (yes, I've been working at both Apple,
    Commodore, and IBM in the United States of America, so I'm not
    a total outsider) that Fido probably won't be "Public Domain"
    anymore.

    What's this (my co-sysop said BULLS??? about it), we're getting
    greedy aren't we? OK, let's look at it from this angle. How
    many hours do you think people have spent all over the world
    creating new FIDO utilities to make life easier for users/sysops
    of a FIDO BBS? Several (me included), and how many hours
    compared to that do you think the developer(s) of FIDO have
    spent? About a ten to one ratio would be very close. So let's
    start charging all users/hosts and sysops all over the world so
    we could get something in return for all the work we have put in
    to it. THINK (yes with those gray things called cells)! WHY do
    "we" have to start charging people for this GREAT service? Huh?

    This is not IBM nor is it DEC, or IS IT? Since when did Public
    Domain BBS go off the market? Well, I guess it started with a
    program called FIDO, or something like it uh? This is really
    a "John Cleese" (M.Python) classic. I mean BE SERIOUS.

    Well, I'd like to have some FEEDBACK on this, my Net/Node number
    was at the top of this article, so start typing. And to the
    author(s) of FIDO I'd like to dedicate this last line. If a
    machine isn't anything without good software what good is the
    core of an apple without the "goodies" around it?



    -----------------------------------------------------------------

    Fidonews                     Page 6                   22 Sep 1986


    Christopher Baker
    Metro-Fire Fido, 135/14(0)


                           SEAdog, I Love It!


    This is an unsolicited testimonial. I have no financial interest
    in SEAdog or in S.E.A. I have never met Thom Henderson or any of
    his S.E.A. cohorts. I am writing this to encourage other Sysops
    to become SEAdog capable (XP:) and make their systems much more
    flexible.

    SEAdog is a stand-alone, E-Mail processing program. It sells, on
    the open market, for $100.00. It is designed to provide a method
    for corporate users to automate their message and file handling
    between branches or offices during regular business hours or
    after the offices close for the day. It allows corporate users
    to get more value from their computer installations by making
    them work nights when they might otherwise be idle.

    SEAdog has an added benefit for Fido system operators. In
    addition to its mail and file handling abilities, SEAdog can
    invoke a BBS by setting a command line and executing a batch
    file. When run in front of a Fido board, SEAdog becomes a 24
    hour, mail handling system and allows your system to send or
    receive mail at any time. With SEAdog on-line, you are no longer
    restricted to the National FidoNet window for message or file
    transfers.

    The SEAdog package comes with several utility programs that
    further enhance the operation. Included are two powerful file
    handling utilities; GET and SEND. With these programs, it is
    possible to send or request files to or from other SEAdogs at
    any time. The MAIL program also allows you to request updates of
    files you already have and the files will only be transferred if
    the remote SEAdog has a NEWER version of the file than you do.
    If you are in a hurry, you can send mail or make file transfers
    immediately by invoking a CRASH event. The MAIL program is also
    a sophisticated message editor that allows you to FORWARD
    messages to other Nodes, operate under different Net/Node
    numbers (useful for Hosts and private Net participants), print
    messages, write messages to files, send 'Carbon Copies' of
    messages to other Nodes while writing the message to one Node,
    enter messages by entering the name of the person you are
    sending it to while SEAdog adds the appropriate Net/Node number,
    and many other features.

    This Node has been operating under SEAdog 3.80 for several
    months and the support from S.E.A. has been terrific, both by
    telephone and by Net mail. I have had several weird problems in
    fully implementing SEAdog due to my peculiar hardware and Thom
    has been patient with my myriad questions and helped me at every
    turn. I've also received a lot of help from the IBM HELP, SEADOG
    HELP and MODEMS EAST HELP Nodes in resolving some of the more
    arcane problems.
    Fidonews                     Page 7                   22 Sep 1986


    SEAdog is available to Fido Sysops for the ridiculously low
    price of $50.00. This is a special offer to Fido Sysops only.
    SEAdog requires an IBM or compatible computer and a Hayes or
    compatible modem. There is a DEC version in beta-test on 1/0,
    even as I write.

    I suggest you send for the program as soon as possible. You will
    find it much more valuable than the fifty dollars it costs and
    your system will be tied into the growing number of SEAdog
    capable Nodes and become a 24 hour NetMail system. Your system's
    efficiency and capabilities will be dramatically enhanced.

    I love it. If you are into NetMail, you will too!


    -----------------------------------------------------------------

    Fidonews                     Page 8                   22 Sep 1986


    From:  Mark J. Welch, Fido 161/459 [WelchNet, Berkeley, CA]


                  Shareware Authors: Under Attack

    [Even if you skip the article, please read the request at the
    end.-mjw]

    I have just been notified that PC-SIG's attorney is sending
    threatening letters to a number of firms engaged in the
    business of selling disks that contain Shareware and public
    domain programs.

    For those who don't realize, PC-SIG is not a user group. It
    is a profitable business, owned by an individual. It has a
    rapidly-growing staff of paid employees, and is planning to
    release a CD-ROM disk soon with its entire library on it. Its
    main business is selling disks with MS-DOS Shareware and
    public domain programs on them for $6 each.

    I have not yet seen the letter, but was told it makes the
    following demands:

    a) The recipient firm must cease using the PC-SIG numbering
       scheme. (Trivia question: where did PC-SIG get its
       numbering scheme?)

    b) The recipient firm may not include the PC-SIG disk summary
       files on disks being resold or in their own catalogs. PC-
       SIG is claiming copyright ownership of that text, despite
       the lack of any copyright notice on the disk or file.

    c) The recipient firm is ordered to put a notice in its
       newsletter or other brochures advising all its customers
       that it is not PC-SIG, does not represent PC-SIG, and
       including PC-SIG's address and phone number.

    Several firms, not having the financial resources to
    investigate their legal options or resist this intimidation,
    have complied with the first two demands, adopting new
    numbering schemes and creating their own "disk summary"
    files.

    In my opinion, these letters are intended to intimidate
    legitimate individuals and companies who wish to assist
    Shareware authors and their customers, and who usually want
    to make a few dollars from that enterprise. The immediate
    effect is that several such companies have pulled GAGS and
    other programs from their software libraries until they can
    review the disks to create their own summary files.

    In other words, fewer copies of GAGS are being sold, and PC-
    SIG is thus attempting to monopolize the market for my
    program (and others).

    [This is not to say that all of the folks out there selling
    Fidonews                     Page 9                   22 Sep 1986


    disks are good guys. Many are themselves selling GAGS
    (and other programs) illegally, since they haven't requested
    my permission to do so, as required in the documentation. But
    at least one firm that properly asked for my permission was
    later forced to pull the disk while he re-did the summary
    file.]

    I would like to gather as much information about all of this
    as possible.

    REQUEST:

    I am trying to gather information on the facts and legal
    issues surrounding all of this.

    1) Please send me the names and addresses of any organization
       (commercial or non-profit, user group, individual, or
       business) which sells disks containing public domain and
       Shareware programs.

    2) Please let me know if you, as a Shareware author or
       vendor, have been treated in an unexpected way by any
       vendor or author. (In other words, have any authors been
       screwed over, or vendors received threatening letters?
       Also, has anyone been exceptionally nice to you?)

    3) Please point me to any legal authorities, articles, or
       such, which discuss the legal issues involved in
       Shareware. Have there been any legal actions yet?

    4) Please let me know of other authors who have placed a
       price-per-disk restriction on PC-SIG's right to sell their
       programs. (Their CD-ROM disk will sell for considerably
       more than the $8 maximum I allow.)

    PLEASE: Don't assume that "someone else" will provide me with
    information you know about! Every little piece of information
    will help! Thanks.

    I will try to gather the information together and will
    summarize the results in a future issue of FidoNews.

                            Mark J. Welch
                            P.O. Box 2409
                            San Francisco, CA 94126
                            (415) 845-2430 [voice: Berkeley CA]
                            Fido: 161/459  [private]
                            BIX: 'mwelch'


    [Disclaimer no longer needed: as noted earlier, I no longer
    work for InfoWorld or BYTE. I am now a law student and
    freelance writer. -mjw]


    -----------------------------------------------------------------
    Fidonews                     Page 10                  22 Sep 1986


    Robert A. Rudolph
    FIDO 109/628

                     Who Reads FidoNews out there?

    A few weeks ago I wrote an article for FidoNews enthusiastically
    praising a product I know and have come to love, DataCare. I did
    this because I thought it to be a good, worthwhile product, and
    had learned that not many people out there in FidoLand have ever
    heard anything at all about it, good or bad. So I wrote this
    article, and it appeard, and I looked at it, found a misspelled
    word and asked myself, "If I read this, would it interest me?",
    and myself replied "It sure would!".

    The reason for the rhetorical question that is the title is that
    the author of the product read the review (he probably got it off
    my board, wlthough I am not sure) and left me mail thanking me
    for my effort, as he had not known of my intentions to review
    his product. HE liked the review. He also found the misspelled
    that I thought nobody would find.

    I ran into him at lunch today and asked "Have you had any feed-
    back from that review?", expecting that he had been inundated
    with inquiries as a consequence of having had his product re-
    viewed in FidoNews. He responded that he had had ONE inquiry.

    So I thought I would write this article soliciting FidoMail from
    anyone reading it, just to see if the response I get is about
    the same in quantity as the inquiry volume he got.

    Please do not misunderstand - I look forward to each new issue
    of FidoNews - I really enjoy reading them, and just made the
    dumb assumption that everyone else did.  With the number of
    Fidos that we know about, the network connections, the number
    of potential users and readers, FidoNews readership should be
    eclipsed only by the readership of the Wall Street Journal.

    I will continue to write articles to FidoNews as long as they
    continue to be published. I would like to think they were being
    read, but most folks who write would, as I do, write for their
    own amusement only if there were no other audience. But I would
    like to hear from folks out there in FidoLand, as to who reads
    FidoNews, and what they seek in it.

    We have a very powerful vehicle here for the dissemination of
    ideas and information - an idea and medium that exists nowhere
    else in the (known) universe - a totally unorganized network,
    amorphous in topology, largely unmanaged, that actually works.
    FidoNet sets historical precedent on a daily basis. With the
    vehicle of FidoNews there is not any excuse for us not to be
    informed about any issue that impacts our precious BBSes.

    But two things are needed -
         1. Someone's gotta write the stuff;
         2. Someone ELSE has got to read it.

    Fidonews                     Page 11                  22 Sep 1986


            is anybody out there???

             s

    -----------------------------------------------------------------

    Fidonews                     Page 12                  22 Sep 1986


    =================================================================
                                 COLUMNS
    =================================================================

                              CLIMBING TREES

                               By Bill Ross

    The only advantage to the study of history is that it might allow
    us to learn from past mistakes.  In this regard,  MS-DOS  is  the
    child  of  CP/M.  Like  most  children  though,  it does things a
    little differently than its parent.  And in many cases,  a little
    better.

    For  some  of  us,  one  of the greatest irritants to CP/M is the
    limitation of 64 floppy disk directory entries,  even on a double
    sided  disk.  If we keep copies of short correspondence,  such as
    letters,  on a disk,  we usually run out of directory space  long
    before we exhaust disk file storage capacity.  MS-DOS is a little
    better;  a  single sided disk provides 64 directory entries and a
    double sided disk allows 112.  The  availability  of  hard  disks
    muddied  the  water.  Although  there  was  no longer a realistic
    problem on directory space,  they presented another problem:  how
    to keep track of so many directory entries.

    For  CP/M somebody,  I'm not sure who,  finally wrote LIBRARY,  a
    program that allows you to keep track of numerous files under one
    directory space.  And for  hard  disks,  CP/M  resorted  to  User
    Areas.  These  are  both  good solutions,  with only minor flaws.
    LIBRARY is a program external to the operating  system  and  User
    Areas   are   awkward  and  still  limited.   MS-DOS  utilizes  a
    combination of both ideas.  Technically,  it's called pathing but
    most of us commonly refer to it as Trees.

    The  term  trees comes from the fact that the main directory of a
    disk under MS-DOS is,  in fact,  only the  root  of  a  potential
    structure  of inumerable subdirectories that spread out much like
    the branches of a tree.  Each directory space may be utilized  to
    build  a  completely  isolated  "user" area with as many files as
    necessary to fill its particular needs.  The advantages of such a
    system are immediately apparent.  We now can have as many  "user"
    areas  as we are allowed directory entries on a disk (SS-64,  DS-
    112, or Hard Disks-512), and the size of the area is limited only
    by the total capacity of the disk on which it resides.

    As an illustration,  let us suppose that we might wish  to  place
    all MicroPro programs in one area utilizing a root directory name
    of  STAR.  Each  program  would  then be listed under the root as
    follows:

         WORDSTAR
         DATASTAR
         CALCSTAR
         REPORTSTAR

    These programs would not,  in actuality,  lie one under the other
    Fidonews                     Page 13                  22 Sep 1986


    of course; each would be directly acccessible from the root as in
    the following illustration:

                                   STAR

         WORDSTAR/       DATASTAR/      \CALCSTAR    \REPORTSTAR

    and  the  subfiles under these programs would reside in a similar
    manner:

                                   STAR

               /            /               \             \


         WORDSTAR        DATASTAR        CALCSTAR     REPORTSTAR

         /   \            /   \           /  \          /  \

       WS.1  WS.2       DS.1  DS.2      CS.1 CS.2     RS.1 RS.2

    The subfiles  above  might  include  any  of  the  program  files
    required  to make the named programs functional (i.e.  WSMSG.OVR,
    WINSTALL.COM,  etc.)  and  were  limited  to  two  here  just  to
    illustrate  the  tree like structure that pathing generates.  For
    those of you who fail to see any semblance of a  tree,  turn  the
    page upside down.

    Pathing  is  accomplished  with  the aid of three internal MS-DOS
    commands:  MKDIR (MAKE DIRECTORY), CHDIR (CHANGE DIRECTORY),  and
    RMDIR   (REMOVE   DIRECTORY).   More   commonly  used  but  fully
    functional short forms for these commands are  MD,  CD,  and  RD.
    They are relatively simple to use.

    Let's  generate  the  pathway directory structure of the previous
    illustration.   Utilizing  MD  we   first   generate   the   STAR
    subdirectory listing in the disk root directory.

         A>MD STAR(Return)

    We can view the results by calling up the disk directory.

         A>DIR(Return)

    DOS shows the file STAR:

        Volume in drive X has no label
        Directory of X:\

        STAR       <DIR>    07-23-85  8:15a
                1 File(s)   360448 bytes free

    If we want to view the contents of a subdirectory we address
    it specifically:

         A>DIR STAR(Return)
    Fidonews                     Page 14                  22 Sep 1986


    and will see the following:

         Volume in drive X has no label
         Directory of X:\star

         .        <DIR>    07-23-85  8:15a
         ..       <DIR>    07-23-85  8:15A
              2 File(s)   360448 bytes free

    Even though we just created this subdirectory, it would seem that
    two  files  all ready exist in it.  These <DIR> subdirectory file
    entries are reference files only and are generated for the use of
    the subdirectory functions.  For the moment,  note their presence
    but don't worry about them.

    We can,  if we desire, now copy each of the programs we want into
    the subdirectory,  but in this case it would not be a good  idea.
    The  reason for this is that each program is composed of multiple
    files and,  after we transfered them in,  they  would  be  listed
    amongst  the files of the other programs,  as well as any working
    files we might generate as we use them.  Gad! how confusing.  No,
    the purpose of this system is to maintain order so let's  go  one
    step  further by generating additional subdirectories for each of
    the programs to occupy.  In this way,  we  can  actually  provide
    each  with  its  own  private  "user" area in which to reside and
    work.

    We do that in a similar manner in which we made  the  first  one.
    The  primary  difference is that these subdirectories will reside
    at a lower level and we must use specific instructions to  MS-DOS
    so  they  will  appear  where we want them.  In this case we want
    them all to reside within the area commanded by  STAR.  In  order
    to place them there, we give the command:

         A>MD \STAR\WS(Return)

    This  command instructs MS-DOS to (MD) Make a Directory (\) below
    STAR (\) under the name WS.  Since we still physically reside  in
    the  Root Directory,  we utilize these \ (reverse slash) marks to
    show the PATH to the place in which the new subdirectory is to be
    generated.  We generate subdirectories  for  each  of  the  other
    programs by repeating this procedure with appropriate titles and,
    to save space, will not repeat it here.  and, if we perform a DIR
    STAR, we will then see:

         Volume in drive X has no label
         Directory of X:\star

         .         <DIR>     07-23-85  8:15a
         ..        <DIR>     07-23-85  8:15a
         WS        <DIR>     07-23-85  8:15a
         DS        <DIR>     07-23-85  8:15a
         CS        <DIR>     07-23-85  8:15a
         RS        <DIR>     07-23-85  8:15a
              6 File(s)   358304 bytes free

    Fidonews                     Page 15                  22 Sep 1986


    Well now that we have this orderly layout  of  directories  under
    which  to  organize  our programs,  how do we get the programs in
    them so that  we  can  utilize  them?  We  simply  use  the  same
    commands  that  we  have  always  used,  except  that we add Path
    directions.  For the purposes of  illustration,  we  will  assume
    that we have generated STAR on the Drive B.  In order to copy our
    WordStar   program   and   its   supporting  files  into  the  WS
    subdirectory,  place the disk with these files  in  Drive  A  and
    issue the command:

         A>COPY *.* B:\STAR\WS/V(Return)

    and  MS-DOS  will  echo each file as it copies and then state how
    many files were copied.

    We can check our work by requesting a directory listing of the WS
    subdirectory.  Using path directions we enter:

         A>DIR B:\STAR\WS(Return)

    and MS-DOS displays the following directory:

         Volume in drive B has no label
         Directory of B:\star\ws

         .         <DIR>     07-23-85  8:23a
         ..        <DIR>     07-23-85  8:23a
         WS       COM  21375 01-01-80 11:02a
         WSOVLY1  OVR  41216 03-16-84  8:02a
         WSMSGS   OVR  29056 03-16-84  8:02a
                5 File(s)   7726496 bytes free

    And of course we repeat this procedure for each of the programs.

    All right, now that we have everything where we want them, how do
    we use them?

    Up to now,  we have done everything from the root  directory.  We
    have  generated  subdirectories,   copied  files  into  them  and
    examined the directory listings without moving ourselves  at  any
    time.  This  is  all  well  and good for disk maintenance and the
    like,   but  things  become  very  awkward  if  we  try  to   use
    subpositioned  programs  from  such  a  lofty position.  To begin
    with,  program functions seldom recognize the  path  instructions
    that  would  be  necessary  under  such  conditions.  So,  if the
    mountain can't come to Mohammad,  then Mohammad must  go  to  the
    mountain.  Our  magic  carpet  in  this  case  is CHDIR or,  more
    simply, just CD.

    -----------------------------------------------------------------

    Fidonews                     Page 16                  22 Sep 1986


    William/Eunhee Hunter
    Fido 109/626
                           Computer Industry Spotlight on:

    COMPUTER SCIENCES CORPORATION -- CSC is one of the world's
    largest, most diversified information service companies.  Clients
    range from NASA to  FORTUNE 500 companies around the world.  CSC
    experts are responsible for the analysis, design, and
    implementation of large-scale communications and  management
    information systems for government and commercially based
    clients. There are ongoing entry-level positions for programmers,
    systems analysts, computer scientists, and customer service
    representatives.  There is also  tuition reimbursement for
    company-approved courses.
         Contact:  Corporate College Relations, Computer Sciences
    Corporation, 650 N. Sepulveda Blvd., El Segundo, CA  90245.

    -----------------------------------------------------------------

    Fidonews                     Page 17                  22 Sep 1986


    Jerry Hindle
    123/6


         In this article i will attempt to give you a synapse of the
    features of FidoUtility version 1.10. This program was written by
    Benn Mann and Marshall Presnell of Fido 151/10 and 151/2.

         I found the first version of this amazing utility on the Region
    18 coordinators system and after toying around with it for a few days
    I decided to go ahead and send the message to the author (sneaky
    wasn't he). I discovered that the first version used a hidden read-
    only file as the key to testing for the message send prompt. He has
    since changed this.

         Ok on to the good stuff.

         In version 1.10 he has implemented the following utilities:

         Killsrvr          Lastuser          Twituser
         Bounce            Ricochet          Killto
         Killfrom          Waittime          Month
         Userlist          Wait              Weekday
         Killrobt          Status            Password
         Setpriv           Adopt             Twix
         Robot             Sched

         Although all of the programs reside in this utility, some are
    limited in scope (and in my opinion, use). Marshell and Benn have
    done an admirable job of implementing those that are there however
    and they are to be commended for their efforts.

         I will take the utilities one-at-a-time from the top of the
    above list.
                                   Killsrvr
                                   --------

         This will follow the fidomail message path and kill ALL messages
    generated by server whether they have been sent or not. If you run
    server on your system then you can run this as a scheduled event
    after sending the messages to insure that the same message is not
    sent twice. This program has limited application in that it is NOT
    selective as to which server messages it kills. An improvement here
    would be to add the ability to kill only those messages that have
    been sent, or all messages, selectable by switchline command.

                                   Lastuser
                                   --------

         This will tell you the name of the lastuser and print it to the
    standard output device. While there may be a need to know this
    information sometime I find no valid use for this program as all the
    system operator need do it TYPE the "lastuser.bbs" file to see who
    was the last one on the system. The authors do however make
    provisions for generating an errorlevel if the lastuser on the system
    matches a name entered on the command line. The only use I can think
    Fidonews                     Page 18                  22 Sep 1986


    of for this would be remote triggering of a non-standard event by the
    sysop by placing a call to the system. One could have the RUNBBS.BAT
    file trap an errorlevel 2 and if the last user to call before a
    specified time was in fact the sysop (or some other user specified on
    the command line) then this errorlevel could trip a non- standard
    event to run.

                                   Twituser
                                   --------

         This is useful for those of us who like to "lurk" on our side of
    the keyboard. I have occasion to have to RAPIDLY twit a user if they
    are the type that likes to call right before midnight use up all
    their time and log off at 23:59, only to call right back at 00:01 to
    go to it again. This type person  can be taught a QUICK lesson by
    simply breaking out of Fido typing the command to TWIT him and re-
    booting Fido. When the user calls back they are surprised to find
    they can do little other then get off. The command line again
    contains the name of the user (exactly as shown in the userlog) to
    twit.

                                    Bounce
                                    ------

         This sends the message back to it's originator, why I don't
    know. If a person sends a message to me that I do not care to get I
    simply kill it when I read it. Why bother (not to mention the cost)
    to send their own message back to them. I find this utility totally
    useless, and will not go into any detail here on it.

                                   Ricochet
                                   --------

         This one is GREAT. Kind of like call forwarding for messages!
    The command line contains the net/node to forward to and if
    applicable the name to send it to. If no name is specified then it is
    sent as a message to ALL. The only flaw with this utility is that if
    the message being forwarded is from out of town then the REPLY link
    is broken since the from line in the header is changed to read
    FIDOUTIL RICOCHET and the net/node number is changed to read your
    net/node number instead of the original senders. I suggest the
    authors change this to keep the original senders name and net/node
    number.

                               Killto & Killfrom
                               -----------------

         These utilities will kill any messages either to or from the
    username specified on the command line. You must also specify the
    area # to kill messages in. This is handy for cleaning up after a
    user has gone berserk and left illegal (or profane) messages all over
    your system. You simply kill them all with one fell swoop. I suggest
    that the author make a switch to kill messages either to or from a
    user in ALL areas at one time (very handy). I also suggest that you
    TWITuser immediately after running this utility.

    Fidonews                     Page 19                  22 Sep 1986


                                Waittime & Wait
                                ---------------
         These two do just what the names imply. Waittime will stall a
    batch file until a specified time and then resume execution, while
    wait (if invoked without any switches) will wait till the next
    minute. If Wait is invoked with a number after it (ie WAIT 15) then
    it will stall that many seconds and then resume. This is nice for
    those 1 minute events that actually take 15 or 20 seconds to execute,
    thus keeping Fido from cycling thru the same thing over and over till
    the next minute when the window closes.

                                     Month
                                     -----

         Month if used in conjunction with the runbbs.bat file will
    return an errorlevel based on the month of the year (ie 0 for January
    and 8 for September...etc.). While this may be useful for certain
    things, I have yet to find any of these to use this particular item
    on.

                                   Userlist
                                   --------

         This one is used to get a listing of certain information from
    the userlog. It will list either:

          Username, password, times called  (command switch  "/p")
          Username, last date on, times called     ( "       "/d")
          Username, Privilege level, times called  ( "       "/r")
          Username, Fidomail credit, times called  ( "       "/$")

         With no command line switches it will list the username, city,
    and times called. Handy for a quick printout.

                                    Weekday
                                    -------

         Like month this will return an errorlevel based on the day of
    the week. I find this one more useful the month since I run different
    things on different days at odd hours.

                                   Killrobt
                                   --------

         This one acts like Killsrvr and kills any messages from ROBOT
    found in the network message area. Again I suggest a switch to kill
    only SENT messages.

                                    Status
                                    ------

         Probably the BEST status report layout and information content I
    have ever seen! This utility is GREAT. The information it lists is
    EVERY system?.bbs file you have showing the path for u/l and files
    and messages and privilege, etc. It also list the info set with the 4
    command (ie net/node # , alt net/node #, etc). It will also list out
    Fidonews                     Page 20                  22 Sep 1986


    the schedule file showing all events you have whether enabled or
    disabled. The whole program is worth it for this utility alone. I
    forgot to mention it will also list out your route?.bbs files and
    what they contain. A GREAT UTILITY guys !

                                   Password
                                   --------

         This one as the name implies allows you to change a users
    password. You invoke it with the NEW password and the username on the
    command line, in that order. Handy for changing the sysop password
    easily.

                                    Setpriv
                                    -------

         This will allow you to change the privilege level of any user
    from the command line. You use the first letter of the privilege and
    the username to change. Handy for reversing Twituser.

                                     Adopt
                                     -----

         Allows you to adopt those orphan messages for a retry at sending
    them out. Simple straightforward and easy to use.

                                     Twix
                                     ----

         Works exactly like the free-standing utility. This will list to
    the printer messages that are NEW. It is also able to list to the
    screen.

                                     Robot
                                     -----

         This is a limited use version of Thom famous automated file
    transfer utility. The author of FidoUtil says it operates in the
    interactive mode. I say it operates PERIOD. It does what it is
    supposed to do when it is supposed to do it.

                                     Sched
                                     -----

         This one allows you to change the scheduler from outside Fido.
    While this is not a bad idea I think most of us dummies would like to
    have a printout on the screen to look at while we make the changes
    needed. As it is not you must either use the status to get a hard
    copy printout and work from that, or go into Fido to make the
    changes, or use some other utility. Suggestion here is to add a
    switch to list the entire scheduler to the screen, then allow the
    sysop to change as he needs.

         There are a number of other things about FidoUtil that make it
    nice. These are the savings in disk space as mentioned by the
    authors, due to the smaller size of the file as opposed to the size
    Fidonews                     Page 21                  22 Sep 1986


    of the combined utilities. Also this program has a config file that
    takes the place of the config files of the other programs that make
    use of one. This file is also smaller then the config files of the
    rest combined.

         The authors have gone to great trouble to put EXTENSIVE help
    files into the setup for each utility involved with such info as the
    syntax for the command line, what switches are available, and the
    version number of the individual utility involved. They have also
    done a good job on the documentation included in the ARC file of
    their program. I commend them for a job well done. I also say that
    they continue to do the job as they are making every effort to ad at
    least one new utility a month to the package. Pretty soon we can use
    one program to do it ALL.

         The authors request that any bug reports be sent to Fido 151/10.
    Although I haven't as yet found any I will pass this info along. The
    latest version of FidoUtil is available from either 151/2 (the
    authors system) or mine (123/6). Again I take my hat off to these two
    men for an excellent job. (Benn and Marshall....I believe bows are in
    order here gentlemen)

    Jerry Hindle
    123/6
    (901)353-4563
    300/1200/2400
    24hrs 365 days

    -----------------------------------------------------------------

    Fidonews                     Page 22                  22 Sep 1986


    =================================================================
                                FOR SALE
    =================================================================

    Ellicott Software
    Fido 109/628

    DataCare, a PC Magazine choice  in its recent review of hard
    disk products, is available at a new low price - $49.95, down
    from $129.95. This is the same product that has been favorably
    reviewed. The price is for a limited time only.

    This product is used by a number of Fido BBS's in net 109, and
    has found favor with many people that are not SYSOPS in the
    Baltimore - DC - Virginia area.

    Three-week trials are available from any user of the product.
    The review can be read in the PC magazine issue that had as its
    emphasis EGA boards. A review has also appeared in FidoNews
    Volume 3 Issue 29, written by the Sysop of Fido 109/628, the
    Reindeer Shed in Reisterstown, who uses and loves the product.

    DataCare is published by:

         Ellicott Software, Inc.
         3777 Plum Hill Court
         Ellicott City, MD   21043

         (301) 465-2690



    -----------------------------------------------------------------

    Fidonews                     Page 23                  22 Sep 1986


          Now available from Micro Consulting Associates!!

    Public Domain collection - 550+ "ARC" archives - 20+ megs of
    software  and  other  goodies,  and  that's "archived" size!
    When unpacked,  you get approximately 28 megabytes worth  of
    all  kinds  of  software,  from  text  editors  to  games to
    unprotection schemes to communications programs,  compilers,
    interpreters,   etc...   Over   66  DS/DD   diskettes!! This
    collection is the result of more than 15 months of intensive
    downloads  from  just about  150  or  more  BBS's  and other
    sources,  all  of  which  have  been  examined, indexed  and
    archived for your convenience.  Starting  a  Bulletin  Board
    System?  Want  to  add  on  to  your  software  base without
    spending thousands of dollars? This is the answer!!!

    To order the library,  send $100 (personal or company check,
    postal money order or company purchase order) to:

                   Micro Consulting Associates, Fido 166/1
                   Post Office Box 4296
                   200-1/2 E. Balboa Boulevard
                   Balboa, Ca. 92661-4296

    Please allow 3 weeks for delivery of your order.

    Note:  No  profit is made from the sale of the Public Domain
    software in this collection.  The price is applied  entirely
    to  the  cost  of  downloading  the  software over the phone
    lines,  running a  BBS  to  receive  file  submissions,  and
    inspecting,   cataloguing,  archiving  and  maintaining  the
    files. Obtaining this software yourself through the use of a
    computer with a modem using commercial  phone  access  would
    cost you much more than what we charge for the service...

    The following format choices are available:

          - IBM PC-DOS Backup utility
          - Zenith MS-DOS 2.11 Backup Utility
          - DSBackup
          - Fastback
          - ACS INTRCPT 720k format (Requires a 1.2m floppy
              drive and PC-DOS 3.2)
          - Plain  ol' files (add $50)

    Add  $30  if  you want the library on 1.2 meg AT disks (more
    expensive  disks).   There  are  no  shipping  or   handling
    charges.  California residents add 6% tax.

    For each sale, $10 will go to the FidoNet Administrators.

    -----------------------------------------------------------------

    Fidonews                     Page 24                  22 Sep 1986


    =================================================================
                                 NOTICES
    =================================================================

                         The Interrupt Stack


    24 Aug 1989
       Voyager 2 passes Neptune.


    If you have something which you would like to see on this
    calendar, please send a message to FidoNet node 1/1.

    -----------------------------------------------------------------


                       I.P.R. Echomail

              ( Interpersonal Relationships )


       Are you interested in the discussing the moral,social,
    and ethical issuses of our time? I have had quite a bit of
    success offering such a message sig on my B.B.S. It has
    encouraged a great deal of intelligent interaction. Have
    several issues often passed through your board on today's
    controversial subjects like Euthinasia, Divorce, Abortion,
    public aide programs, Genetic Engineering Etc.? Well then
    you may be interested in hooking your users into I.P.R.
    National Echomail. This forum is assured to spur users to
    engage in stating the various viewpoints in an interesting
    fashion that will get all involved. It is an enjoyable sig
    for everyone.

    For information on how to hookup please Netmail a note to:

                Randall Kobetich   150/130

                 Wilmington, Delaware

    -----------------------------------------------------------------

    The ListGen program,  used to translate  node  lists  into  Fido-
    usable form, currently has a limit of 1400 node list entries.  As
    of next week, the FidoNet node list will be too large for ListGen
    to  handle.  You  are  advised  to  make  other  arrangements for
    translating your node list.

    -----------------------------------------------------------------


    I've recently received several notes from people who are
    using old versions of these utilities.   Because of this
    I think an update notice is in order.

    Fidonews                     Page 25                  22 Sep 1986


    Pixie's latest version is 1.31.   This is much faster than
    older versions and depending on the version you have may
    have several new features, as well as a few bug fixes.
    This will be the last major release in a while as major
    changes are planned for Pixie.

    The latest version of Sched is 5.0.   This version allows
    completely initialization of a file and specification of
    the filename to work on.  Both of these changes were made
    to facilitate Sched's use with a stand-alone scheduler
    which is currently on the back burner here at the Ark.

    Both of these utilities may be File Requested or downloaded
    from node 137/19.  Pre-registration is required if you come
    in person so send me a password first.

    Wes Cowley
    Ark Tangent
    Fido/SEAdog 137/19

    -----------------------------------------------------------------