Volume 4, Number 26                                  13 July 1987
    +---------------------------------------------------------------+
    |                                                  _            |
    |                                                 /  \          |
    |                                                /|oo \         |
    |        - FidoNews -                           (_|  /_)        |
    |                                                _`@/_ \    _   |
    |        International                          |     | \   \\  |
    |     FidoNet Association                       | (*) |  \   )) |
    |         Newsletter               ______       |__U__| /  \//  |
    |                                 / FIDO \       _//|| _\   /   |
    |                                (________)     (_/(_|(____/    |
    |                                                     (jm)      |
    +---------------------------------------------------------------+
    Editor in Chief:                                   Thom Henderson
    Chief Procrastinator Emeritus:                       Tom Jennings

    FidoNews  is  published  weekly  by  the  International   FidoNet
    Association  as  its  official newsletter.  You are encouraged to
    submit articles for publication in FidoNews.  Article  submission
    standards  are contained in the file ARTSPEC.DOC,  available from
    node 1:1/1.

    Copyright 1987 by  the  International  FidoNet  Association.  All
    rights  reserved.  Duplication  and/or distribution permitted for
    noncommercial purposes only.  For  use  in  other  circumstances,
    please contact IFNA.


                         Five Weeks to FidoCon!

                            Table of Contents

    1. ARTICLES  .................................................  1
       Hotline! (1)  .............................................  1
       2400 Baud At The Right Price  .............................  4
       Talking ASSEMBLER (Number #3)  ............................  5
       THE DIRTY DOZEN -- An Uploaded Program Alert List  ........ 11
       Running 2 BBS's, or CHOOSEr.exe to have FUN!  ............. 20
       International Vietnam Veterans EchoConference Anniversa  .. 23
    2. COLUMNS  .................................................. 25
       Borland's Turbo C: Review, part 2  ........................ 25
       From the Broadcasters Booth - routing  .................... 29
       The Regular Irregular Column  ............................. 32
    3. WANTED  ................................................... 37
       INFORMATION "FEEDS" WANTED  ............................... 37
    4. NOTICES  .................................................. 38
       The Interrupt Stack  ...................................... 38
       Latest Software Versions  ................................. 38
       International FidoNet Conference Registration Form  ....... 39
       IFNA Board of Directors Ballot  ........................... 40
    FidoNews 4-26                Page 1                   13 Jul 1987


    =================================================================
                                ARTICLES
    =================================================================

    James Zachary
    Fido 115/537

                               Hotline! (1)
                                 (c) 1987
                              James Zachary

    On any given day, at any given moment, the phone at the water and
    sewage department can ring with a crisis call.

    Southeast Treatment Plant, this is Zack.

    "Ahem, err, why are ... uhhh are you adding ... uhhhmmm, why are
    you putting ammonia in our drinking water ...?"

    Pardon me?

    "Uhhh, in my drinking water ... in my fish-tank ..."

    You drink the water from your fish-tank?

    "Uhhhh, errr, nooooo, I uh ..."

    Sir, we have a terrible connection, sounds like you're talking
    into a garbage can ...

    "Hold on a sec ...  THERE!  IS THAT BETTER?  I WAS ON MY NEW
    SPEAKER PHONE!"

    What else are you on?

    "'SCUSE ME?"

    Never mind.  Don't shout, I can hear ya fine now.  You said your
    fish-tank tastes funny?

    "Uhhhh, nooooo.  All my fish died so I tested the water and it
    has ammonia in it."

    What's your point?

    "The water in my fish-tank came from our faucet ... it's regular
    drinking water from you.  Your ammonia killed my fish!"

    We don't add ammonia to our water.  Some of the large systems do,
    to form chloramines so they can carry a chlorine residual for
    great distances, but we don't do that.

    "Now wait a minute!  I tested the water, both in the fish tank
    and from the faucet and it has ammonia in it!"

    I see.  How much ammonia?.
    FidoNews 4-26                Page 2                   13 Jul 1987


    "Five."

    Five ...?  Five what?  Five parts per million, parts per billion,
    parts per trillion...?

    "Uhhhhh, it just says five."

    What kind of equipment are you using?

    "Well, I dunno but it cost me PLENTY!  I spent $12 on it to find
    out YOU killed my fish!  It has test tubes and a color chart!  I
    went to college, you know!"

    Uh huh, I'm sure your mother is proud.  Look, friend, let me
    assure you our lab, as well as the EPA lab, cost a tad more than
    $12.  Both labs are certified for technique and accuracy and
    their results show the drinking water has barely enough ammonia
    to measure.

    "You mean I wasted $12?"

    Looks that way.

    "But my fish are all dead! The tank even smells like ammonia!"

    How big was the tank and how many fish were in it?

    "It was a 10 gallon tank and I had 50 black mollies in it."

    Wonderful.  You had 50 fish in a 10 gallon tank?

    "Sure!  The book that came with the tank said ..."

    Whoa!  Listen, ammonia may have played a part in bumping your
    fish off but the ammonia came from their own waste.

    "Their own waste? I don't understand!"

    Waste ... excrement ... in college terms, your fish made wee wee
    in the water...

    "Oooooh......."

    ... and they made big poo poo ...

    "Ahhhh, but my filter removes all that!"

    Right.  When was the last time you cleaned your filter?

    "Why, NEVER!  This filter turns the waste into air by rotifer
    reaction so it never needs cleaning.  It worked fine for a
    month!"

    Sir, have you ever considered changing hobbies to something other
    than tropical fish?

    FidoNews 4-26                Page 3                   13 Jul 1987


    "Well, I USED to raise tropical plants until YOUR water killed
    them!"

    How often did you water them?

    "At least four times a day ..."

    Maybe you'd consider raising hydroponic pet rocks.

    "C L I C K ! ! "

    Sometimes it doesn't pay to be helpful ...

    -----------------------------------------------------------------

    FidoNews 4-26                Page 4                   13 Jul 1987


    Jean Coppola 107/201

                       2400 Baud At The Right Price


    Recently I was looking for a new 2400 baud modem and  decided  to
    look around a bit.  After seeing the prices on Hayes and Courier,
    I knew I had to go with a clone if I wanted  2400  baud  at  this
    time!

    After  searching  around  I  found the MAXUM 2400 baud modem at a
    very reasonable $199.95 from a rather large discount store in the
    area. (47th Street Photo)

    So, I plunked down the green and took this little joy home to see
    if I had been ripped off or not. To my surprise, it turned out to
    be a rather good purchase!

    It claimed to be Hayes compatible,  but many of us have seen that
    before,  and  I  for  one  was a little wary.  But I was wrong to
    worry!  I opened the box,  plugged it in,  and set Opus for Hayes
    2400  and  away we went.  Both Opus and SEAdog recognized it as a
    Hayes 2400,  and all the command sequences built into both pieces
    of software work fine with it!

    I  have  tested  it  now with both normal communications and file
    transfers with all the popular protocols,  and have not found any
    increase in errors over 1200 baud transfers. But of course, it is
    much  quicker,  especially  when  you  use  the  SEAlink transfer
    protocol and even faster when using some of the newer protocols.

    In all fairness,  there was one problem that I could not solve by
    normal  methods.  For  some  unexplained  reason,  no matter what
    command sequence I fed it,  I could not shut off the speaker,  or
    lower the volume.  Unlike most other external modems, there is no
    outside volume control.  So a quick call to the dealer who was as
    stumped as I was.

    Being handy with tools, the speaker is now shut off!

    All  in  all,  a  very  good  purchase for someone looking for an
    inexpensive 2400 baud external modem.

    -----------------------------------------------------------------

    FidoNews 4-26                Page 5                   13 Jul 1987


                           TALKING ASSEMBLER 3
                              by Ned Sturzer
                          Chattanooga, Tennessee
                              OpusNODE 362/1

     The machine instructions are the soul of Assembler and  we  will
    examine  them  in  great  detail.  Each  instruction may have two
    operands,  one operand,  or even no operands.  Most  instructions
    refer  to  memory  locations,   registers,   port  addresses,  or
    immediate data.  The manner in which these locations are referred
    to  are  known  as addressing modes.  Some instructions allow for
    implied operands and the operand is not indicated.  For  example,
    the instruction

                                   cbw

    takes  the  high-order bit in the AL register and places the same
    value in all the bits of AH.  In effect,  cbw extends the sign of
    AL  to  AH.  In  this instruction the operands are in the implied
    addressing mode.

     Immediate data is allowed in the operands of  many  instructions
    as in

                   int 9    or in     mov pointer,417H

    where  pointer is a label for a memory address.  In direct memory
    addressing the operand is in the form

                             segment:offset

    an example being

                            test di,ss:4ee7H

    Based operands refer to the memory location computed by adding  a
    displacement,  disp,  to  the value in DS:BX,  CS:BX,  SS:BX,  or
    ES:BX. You may also use DS:BP, CS:BP, SS:BP, or ES:BP.  DS:BX may
    be written simply as BX,  while SS:BP may be expressed as BP.  If
    the displacement resolves to 0 it is  not  written.  Among  valid
    ways of writing based operands are

                                disp.[BX]
                              ES:[BP]+disp
                               [disp][BX]

    Now consider the instruction xchg [bx-3],di where bx contains the
    value a06b.  Our instruction will exchange the contents of the di
    register with whatever value  is  in  the  two  bytes  of  memory
    ds:a069  and  ds:a06a.  If  the  displacement is 0 it need not be
    indicated.

    Indexed operands are treated similarly to based  operands  except
    the  si  and  di  registers  are  used.  With either si or di the
    default segment register is ds.  An exception to this is that  if
    di  is used in string instructions such as stos or lodsw then the
    FidoNews 4-26                Page 6                   13 Jul 1987


    default segment register used with di is  es.  In  this  case  es
    cannot be overriden.

    Based indexed operands use a displacement in conjunction with one
    register  from either bp or bx and one register from either si or
    di. As you would expect by now the default segment register if bp
    used is ss and otherwise the default segment register is ds. Also
    if based indexed operands are used in string instructions then di
    forces the segment register to be es. As an illustration consider
    the instruction

                     cmp byte ptr es:[bp+6][di],0feH

    where es:bp has the value  b800:0147  and  ds:di  has  the  value
    0000:0200.  This  instruction  then  compares the contents of the
    memory location b800:034d with fe.

    If based indexed operands seem complicated - they  are.  However,
    they  allow you to do some fancy footwork through memory.  Before
    moving on to examine the individual instructions I need to tie up
    a loose end.  Whenever register IP is used to refer to  a  memory
    location the reference is always to location cs:ip.  Similarly if
    register SP is used to refer to  memory  the  location  ss:sp  is
    intended.

    I'll  group  the  machine  op  codes according to their function,
    indicate the flags affected after  the  operation  is  performed,
    give the nature and size of the operands, and give examples.

                          I. Logical Operators

    The  logical  operators  AND,  NOT,  OR,  and  XOR (exclusive or)
    perform the bit-by-bit logical operations their names imply.  The
    result  is  stored  in  the first operand.  They are used to gain
    access to the individual bits of a byte or word.

    A. AND ax/al,immed
                 Flags:C=0, P, A=?, Z, S, O=0
    B. AND r/m,immed
                 8 or 16 bits
                 Flags:C=0, P, A=?, Z, S, O=0
    C. AND r,r
                 8 or 16 bits
                 Flags:C=0, P, A=?, Z, S, O=0
    D. AND m,r
                 8 or 16 bits
                 Flags:C=0, P, A=?, Z, S, O=0
    E. AND r,m
                 8 or 16 bits
                 Flags:C=0, P, A=?, Z, S, O=0

    To explain the shorthand I'll use:  In the operand area r is  any
    register other than a segment register, m is any memory location,
    and  immed stands for immediate data.  Should a specific register
    be used it will be indicated as in form A.  If the  size  of  the
    operands  (8  or  16  bits)  is  not  implied  by the form of the
    FidoNews 4-26                Page 7                   13 Jul 1987


    instruction I have  indicated  it.  The  flags  are  affected  as
    indicated where =? means the flag may be changed arbitrarily.

    Consider AND al,01101000B where ax contains 01000011B.  After the
    instruction is performed al will  contain  01000000B,  C=0,  P=0,
    Z=0,  S=0, O=0, and A is arbitrary.  Form A is distinguished from
    form B since it requires one less byte in  memory  to  store  the
    instruction.  AND  is  used  to  clear  specific  bits to 0 while
    keeping the other bits intact.

    F. NOT r/m
                 8 or 16 bits
                 Flags: none

    NOT simply interchanges all the bits of the operand.  Thus in NOT
    word  ptr  [bp+di]  if  bp  contains 0050,  di contains 0017,  ss
    contains 0040,  and 0040:0067 to 0040:0068 contain the word a51c,
    then  after the operation this word will contain 5ae3.  Note that
    it  is  here  necessary  to  tell  the  Assembler  that  we   are
    considering  a  word  since  there  is nothing in the instruction
    which otherwise indicates the length of the operand.

    G. OR ax/al,immed
                 Flags:C=0, P, A=?, Z, S, O=0
    H. OR r/m,immed
                 8 or 16 bits
                 Flags:C=0, P, A=?, Z, S, O=0
    I. OR r,r
                 8 or 16 bits
                 Flags:C=0, P, A=?, Z, S, O=0
    J. OR m,r
                 8 or 16 bits
                 Flags:C=0, P, A=?, Z, S, O=0
    K. OR r,m
                 8 or 16 bits
                 Flags:C=0, P, A=?, Z, S, O=0
    L. XOR ax/al,immed
                 Flags:C=0, P, A=?, Z, S, O=0
    M. XOR r/m,immed
                 8 or 16 bits
                 Flags:C=0, P, A=?, Z, S, O=0
    N. XOR r,r
                 8 or 16 bits
                 Flags:C=0, P, A=?, Z, S, O=0
    O. XOR m,r
                 8 or 16 bits
                 Flags:C=0, P, A=?, Z, S, O=0
    P. XOR r,m
                 8 or 16 bits
                 Flags:C=0, P, A=?, Z, S, O=0

    The OR instruction allows you to set specific bits to 1 while the
    other bits are unchanged.  XOR is used to reverse  specific  bits
    keeping  the  others  as  they  were.  Also  the  XOR instruction
    provides an  efficient  way  of  setting  a  register  or  memory
    location to 0. For example XOR bx,bx sets bx to 0.
    FidoNews 4-26                Page 8                   13 Jul 1987


    II. Other Bit Manipulators

    The  TEST  instruction  and the various shift and rotate commands
    are akin to  to  logical  operators  in  that  they  perform  bit
    manipulation.

    A. TEST ax/al,immed
                 Flags:C=0, P, A=?, Z, S, O=0
    B. TEST r/m,immed
                 8 or 16 bits
                 Flags:C=0, P, A=?, Z, S, O=0
    C. TEST r,r
                 8 or 16 bits
                 Flags:C=0, P, A=?, Z, S, O=0
    D. TEST m,r
                 8 or 16 bits
                 Flags:C=0, P, A=?, Z, S, O=0
    E. TEST r,m
                 8 or 16 bits
                 Flags:C=0, P, A=?, Z, S, O=0

    TEST  is  similar  to AND in that it performs an AND but does not
    alter either operand.  Only the flags are adjusted.  TEST may  be
    used to determine the bit settings of specific bits.

    F. SHL r/m,1
                 8 or 16 bits
                 Flags:C, O
    G. SHL r/m,cl
                 8 or 16 bits
                 Flags:C, O

    The  SHL  command shifts the contents of the first operand either
    one bit left or by  the  number  of  bits  indicated  in  the  cl
    register.  The  low  order  bits  vacated  by  this operation are
    replaced by zeros.  Should cl contain a  value  greater  than  or
    equal  to  the  length of the first operand then the operand will
    become 0.  As long as no ones  bits  are  shifted  out  then  SHL
    multiplies by powers of two. For example,

                          mov cl,3
                          shl byte ptr ds:0143

    multiplies  the  contents  of the byte at ds:0143 by 8 if ds:0143
    originally has zeros in its high order three bits.  Be aware that
    the  Macro  Assembler,  MASM,  accepts  the  mnemonic  SAL  which
    performs the same function as SHL. Oddly, SYMDEB and DEBUG do not
    recognize SAL in the -a command.  The convention used by the 8088
    chip is that if an integer is regarded as signed  then  the  high
    order  bit is the sign bit.  A 1 in the sign bit means a negative
    number and a 0 means a positive number.  With this in mind we can
    understand  the  rules  used  to  set  the flag bits in shift and
    rotate operations.  The carry flag is set to the last bit  pushed
    out of the end of the operand.  The overflow flag is undefined if
    the second operand is a cl and cl has a value other  than  1.  if
    the  second  operand is 1 or if it is cl with a value of 1,  then
    FidoNews 4-26                Page 9                   13 Jul 1987


    the overflow flag is set to 1 if the sign bit changes.  Otherwise
    the overflow flag is cleared to 0.

    H. SHR r/m,1
                 8 or 16 bits
                 Flags:C, O
    I. SHR r/m,cl
                 8 or 16 bits
                 Flags:C, O

    This is a shift right with the vacated bits  replaced  by  zeros.
    SHR acts as an integer divide by powers of two as long as no ones
    bits are shifted out.

    J. SAR r/m,1
                 8 or 16 bits
                 Flags:C, P, A=?, Z, S, O
    K. SAR r/m,cl
                 8 or 16 bits
                 Flags:C, P, A=?, Z, S, O

    This  is  an  arithmetic  shift right instruction which functions
    similarly to SHR.  The difference,  besides  the  effect  on  the
    flags, is that the vacated bits are filled by the sign bit.  Thus
    the result of the sequence

                                mov al,8f
                                mov cl,3
                                sar al,cl

    is that al will contain f1.

    L. ROL r/m,1
                 8 or 16 bits
                 Flags:C, O
    M. ROL r/m,cl
                 8 or 16 bits
                 Flags:C, O

    This rotate left instruction acts like  the  SHL  command  except
    that  the  value  in  the  high  order  bit  of the first operand
    replaces the value vacated in bit 0.  Therefore if dh contains 7e
    and cl contains 2 then ROL dh,cl will leave dh with f9.

    N. ROR r/m,1
                 8 or 16 bits
                 Flags:C, O
    O. ROR r/m,cl
                 8 or 16 bits
                 Flags:C, O

    The  rotate right instruction,  ROR,  is the analog of ROL except
    that the value in bit 0 replaces the value vacated  in  the  high
    order bit of the first operand.

    P. RCR r/m,1
    FidoNews 4-26                Page 10                  13 Jul 1987


                 8 or 16 bits
                 Flags:C, O
    Q. RCR r/m,cl
                 8 or 16 bits
                 Flags:C, O

    Rotate right through carry,  RCR,  is similar to ROR but here the
    value in bit 0 is placed in the carry flag and the value  in  the
    carry flag is placed in the high order bit of the first operand.

    R. RCL r/m,1
                 8 or 16 bits
                 Flags:C, O
    S. RCL r/m,cl
                 8 or 16 bits
                 Flags:C, O

    RCL is the left rotating version of RCR.

    -----------------------------------------------------------------
    IFNA,  FIDONEWS, FIDO AND OPUS SYSOPS ARE GRANTED A NON-EXCLUSIVE
    LICENSE TO COPY,  PROCESS,  AND DISTRIBUTE THIS  ARTICLE  IN  ANY
    MATTER  THEY  SEE FIT.  COMMERCIAL RIGHTS GRANTED AT NO COST UPON
    WRITTEN REQUEST TO THE AUTHOR.  REQUESTS MY BE SENT BY FIDO  MAIL
    TO   362/1,   CHATTANOOGA,   TENNESSEE   OR   BY  LOGGING  ON  AT
    (615) 892-7773.

    -----------------------------------------------------------------

    FidoNews 4-26                Page 11                  13 Jul 1987


            THE DIRTY DOZEN -- An Uploaded Program Alert List
                    Issue #7 Compiled by Eric Newhouse


     Recently,  many unlawfully  copied  or  modified  programs  have
    appeared  on  various  IBM PC bulletin boards across the country.
    THE DIRTY DOZEN is a list of known examples.

     There are four major  categories  of  bad  software:  commercial
    pirate jobs, unauthorized copies of otherwise legitimate freeware
    programs,  malicious  "TROJAN" programs which damage your system,
    and  miscellaneous  illegal  software.   Please   look   in   the
    definitions   section  of  this  document  for  a  more  detailed
    explanation of these terms.

     SysOps:  Please be careful with  the  files  you  post  in  your
    download  libraries!  An  professional  quality  uploaded game or
    disk utility should arouse  your  suspicions,  especially  if  it
    doesn't  include  the  author's name,  address,  and distribution
    policy.  Such programs are probably NOT public  domain!  The  BBS
    community  is  already  under legislative threat at the State and
    Federal level.  We cannot fight this trend effectively while  our
    directories  sit  stocked  with  cracked  Sega  games,   wargames
    dialers,  and malicious  "trojan  horses!"  Let's  demonstrate  a
    little   social   responsibility  by  cleaning  up  our  download
    libraries.

    If you as a SysOp have any of these files on your system,  please
    delete them and post "blocking" dummy file entries like this one:


            ZAXXON.COM        DELETED!! NOT PUBLIC DOMAIN!!


     If  everyone works together to fight this new brand of software,
    the growing numbers of piraters and trojan horse writers may well
    be put 'out of business!'

     The idea behind THE DIRTY DOZEN is to bring this important issue
    to the attention of  more  SysOps  and  users  -  to  act  as  an
    information  "clearing  -house"  for the latest known examples of
    "bogusware," so that an educated public can fight effectively for
    safe downloadable files.

      The Dirty Dozen is a big project,  and it needs  your  help  to
    succeed!  Please  call  in  any  updates of bad software that you
    know of,  but DO NOT modify this article  yourself.  If  everyone
    who  discovers  a pirated program starts modifying the DD,  there
    would be hundreds of issues in circulation.

      Also,  I think it's quite unfair,  especially considering  that
    I've spent over a hundred hours of my time on this list, for just
    anyone to put their name at the top of the list and say that they
    write,  or  helped  write,  the  DD.  For example,  someone named
    Gerhard Barth added two files,  both of which were already listed
    in  the  DD,  and  proceeded  to write "Updated by Gerhard Barth,
    FidoNews 4-26                Page 12                  13 Jul 1987


    please send all  further  updates  to  Gerhard  Barth,"  etc.  If
    everyone does this, how will anyone know which file is the latest
    and TRUE Dirty Dozen?  If you have an update,  please see the end
    of this article for information on  how  to  reach  me  with  new
    information.

     A word on TROJANS:  I have been hearing more and more reports of
    these "worm" programs,  from all directions.  While I don't doubt
    their existence, do not get hysterical.  Remember, a Trojan rumor
    is  much  easier  to  START than it is to STOP.  Some people have
    accused legitimate *joke* programs, like DRAIN (which pretends to
    be gurgling excess water out of your A drive) of being "killers."

    If a program locks up your system,  it isn't necessarily  Trojan;
    it  might  not  like co-residing with Superkey,  or your graphics
    card.  Ask around a  little  before  you  announce  something  as
    Trojan.  I  would appreciate a bagged specimen of any real Trojan
    program that you might have the (un)luck to find.

     A word on Pirated programs:  Recently many pirated programs such
    as  AUTODEX have been going under many different names.  Although
    I will try to keep all these names current in the  DD,  the  best
    way to check for piracy in a file is to run that file yourself --
    checking  for  (C)opyright  notices  of  commercial manufactures,
    similarities in looks and operations of commercial programs,  and
    of course whether the name is in this list.

      Finally  I want to thank all BBS SysOps and users that notified
    me of updates,  additions,  and/or corrections  to  DIRTYDOZ.006.
    It's  great  to  see  so much support!  In this issue more people
    than ever called in with updates.  Everyone else who  reads  this
    list, along with myself, really appreciates the effort!


    NOTE:  If  I do not supply a file extension,  that means that the
    file circulates under many different  extensions.  For  instance,
    users  commonly  upload  with extensions of either:  .EXE,  .COM,
    .EQE, .CQM, .LBR, .LQR, and .ARC.


    TROJAN HORSE PROGRAMS:

    Name            Category  Notes

    ANTI-PCB        *TROJAN*  The story behind this trojan horse is
                              sickening.  Apparently one RBBS-PC
                              sysop and one PC-BOARD sysop started
                              feuding about which BBS system is
                              better, and in the end the PC-BOARD
                              sysop wrote a trojan and uploaded it to
                              the rbbs SysOp under ANTI-PCB.COM.  Of
                              course the RBBS-PC SysOp ran it, and
                              that led to quite a few accusations and
                              a big mess in general.  Let's grow up!
                              Every SysOp has the right to run the
                              type of BBS that they please, and the
    FidoNews 4-26                Page 13                  13 Jul 1987


                              fact that a SysOp actually wrote a
                              trojan intended for another simply
                              blows my mind.

    ARC513.EXE      *TROJAN*  This hacked version of arc appears
                              normal, so beware!  It will write over
                              track 0 of your [hard] disk upon usage,
                              destroying the disk.

    ARC514.COM      *TROJAN*  This is totally similar to arc version
                              5.13 in that it will overwrite track 0
                              (FAT Table) of your hard disk.  Also, I
                              have yet to see an .EXE version of this
                              program..

    BACKTALK        *TROJAN*  This program used to be a good PD
                              utility, but some one changed it to be
                              trojan.  Now this program will
                              write/destroy sectors on your [hard]
                              disk drive.  Use this with caution if
                              you acquire it, because it's more than
                              likely that you got a bad copy.

    CDIR.COM        *TROJAN*  This program is supposed to give you a
                              color directory of files on disk, but
                              it in fact will scramble your disks FAT
                              table.

    DANCERS.BAS     *TROJAN*  This trojan shows some animated dancers
                              in color, and then proceeds to wipe out
                              your [hard] disk's FAT table.  There is
                              another perfectly good copy of
                              DANCERS.BAS on BBS's around the
                              country; apparently the idiot author in
                              question altered a legitimate program
                              to do his dirty work.

    DISKSCAN.EXE    *TROJAN*  This was a PC-MAGAZINE program to scan
                              a (hard) disk for bad sectors, but then
                              a joker edited it to WRITE bad sectors.
                              Also look for this under other names
                              such as SCANBAD.EXE and BADDISK.EXE...

    DMASTER         *TROJAN*  This is yet another FAT scrambler..

    DOSKNOWS.EXE    *TROJAN*  I'm still tracking this one down --
                              apparently someone wrote a FAT killer
                              and renamed it DOSKNOWS.EXE, so it
                              would be confused with the real,
                              harmless DOSKNOWS system-status
                              utility.  All I know for sure is that
                              the REAL DOSKNOWS.EXE is 5376 bytes
                              long.  If you see something called
                              DOSKNOWS that isn't close to that size,
                              sound the alarm.  More info on this one
                              is welcomed -- a bagged specimen
    FidoNews 4-26                Page 14                  13 Jul 1987


                              especially.

    DPROTECT        *TROJAN*  Apparently someone tampered with the
                              original, legitimate version of
                              DPROTECT and turned it into a FAT table
                              eater.

    DROID.EXE       *TROJAN*  This trojan appears under the guise of
                              a game.  You are supposedly an
                              architect that controls futuristic
                              droids in search of relics.  In fact,
                              PC-Board sysops, if they run this
                              program from C:\PCBOARD, will find that
                              it copies C:\PCBOARD\PCBOARD.DAT to
                              C:\PCBOARD\HELP\HLPX.  In case you were
                              wondering, the file size of the .EXE
                              file is 54,272 bytes.

    EGABTR          *TROJAN*  BEWARE! Description says something like
                              "improve your EGA display," but when
                              run it deletes everything in sight and
                              prints "Arf! Arf!  Got you!"

    EMMCACHE        *CAREFUL* This program is not exactly a trojan,
                              but it may have the capability of
                              destroying hard disks by:
                                 A) Scrambling every file modified
                                    after running the program,
                                 B) Destroying boot sectors.
                              This program has damaged at least two
                              hard disks, yet there is a base of
                              happily registered users.  Therefore, I
                              advise extreme caution if you decide to
                              use this program.

    FILER.EXE       *TROJAN*  One SysOp complained a while ago that
                              this program wiped out his 20 Megabyte
                              HD.  I'm not so sure that he was
                              correct and/or telling the truth any
                              more.  I have personally tested an
                              excellent file manager also named
                              FILER.EXE, and it worked perfectly.
                              Also, many other SysOp's have written
                              to tell me that they have like me used
                              a FILER.EXE with no problems.  If you
                              get a program named FILER.EXE, it is
                              probably alright, but better to test it
                              first using some security measures.


    FINANCE4.ARC    *CAREFUL* This program is not a verified trojan;
                              there is simply a file going around
                              BBS's warning that it may be trojan.
                              In any case, execute extreme care with
                              it.

    FidoNews 4-26                Page 15                  13 Jul 1987


    FUTURE.BAS      *TROJAN*  This "program" starts out with a very
                              nice color picture (of what I don't
                              know) and then proceeds to tell you
                              that you should be using your computer
                              for better things than games and
                              graphics.  After making that point it
                              trashes your A: drive, B:, C:, D:, and
                              so on until it has erased all drives.
                              It does not go after the FAT alone, but
                              it also erases all of your data.  As
                              far as I know, however, it erases only
                              one sub-directory tree level deep, thus
                              hard disk users should only be
                              seriously affected if they are in the
                              "root" directory.  I'm not sure about
                              this on either, though.

    NOTROJ.COM      *TROJAN*  This "program" is the most
                              sophisticated trojan horse that I've
                              seen to date.  All outward appearances
                              indicate that the program is a useful
                              utility used to FIGHT other trojan
                              horses.  Actually, it is a time bomb
                              that erases any hard disk FAT table
                              that IT can find, and at the same time
                              it warns: "another program is
                              attempting a format, can't abort!"
                              After erasing the FAT(s), NOTROJ then
                              proceeds to start a low level format.
                              One extra thing to note: NOTROJ only
                              damages FULL hard drives; if a hard
                              disk is under 50% filled, this program
                              won't touch it!  If you are interested
                              in reading a thorough report on
                              NOTROJ.COM, James H.  Coombes has
                              written an excellent text file on the
                              matter named NOTROJ.TXT.  If you have
                              trouble finding it, you can get it from
                              my board.

    TIRED           *TROJAN*  Another scramble the FAT trojan by Dorn
                              W.Stickle.

    TSRMAP          *TROJAN*  This program does what it's supposed to
                              do: give a map outlining the location
                              (in RAM) of all TSR programs, but it
                              also erases the boot sector of drive
                              "C:".

    PACKDIR         *TROJAN*  This utility is supposed to "pack"
                              (sort and optimize) the files on a
                              [hard] disk, but apparently it
                              scrambles FAT tables.

    PCW271xx.ARC    *TROJAN*  A modified version of the popular PC-
                              WRITE word processor (v. 2.71) has now
    FidoNews 4-26                Page 16                  13 Jul 1987


                              scrambled at least 10 FAT tables that I
                              know of.  If you want to download
                              version 2.71 of PC-WRITE be very
                              careful!  The bogus version can be
                              identified by its size; it uses 98,274
                              bytes whereas the good version uses
                              98,644.  For reference, version 2.7 of
                              PC-WRITE occupies 98,242 bytes.

    QUIKREF        *TROJAN*   This ARChive claims that it will load
                              RBBS-PC's message file into memory 2
                              times faster than normal.  What it
                              really does is copy RBBS-PC.DEF into an
                              ASCII file named HISCORES.DAT...

    RCKVIDEO         *TROJAN* This is another trojan that does what
                              it's supposed to do, then wipes out
                              hard disks.  After showing some simple
                              animation of a rock star ("Madonna," I
                              think), the program will go to work on
                              erasing every file it can lay it's
                              hands on.  After about a minute of
                              this, it will create 3 ascii files that
                              say "You are stupid to download a video
                              about rock stars," or something of the
                              like.

    SECRET.BAS       *TROJAN* BEWARE!! This may be posted with a note
                              saying it doesn't seem to work, and
                              would someone please try it; when you
                              do, it formats your disks.

    SIDEWAYS.COM     *TROJAN* Be careful with this trojan; there is a
                              perfectly legitimate version of
                              SIDEWAYS.EXE circulating.  Both the
                              trojan and the good SIDEWAYS advertise
                              that they can print sideways, but
                              SIDEWAYS.COM will trash a [hard] disk's
                              boot sector instead.  The trojan .COM
                              file is about 3 KB, whereas the
                              legitimate .EXE file is about 30 KB
                              large.

    STAR.EXE         *TROJAN* Beware RBBS-PC SysOps!  This file puts
                              some stars on the screen while copying
                              RBBS-PC.DEF to another name that can be
                              downloaded later!

    STRIPES.EXE      *TROJAN* Similar to STAR.EXE, this one draws an
                              American flag (nice touch), while it's
                              busy copying your RBBS-PC.DEF to
                              another file (STRIPES.BQS) so Bozo can
                              log in later, download STRIPES.BQS, and
                              steal all your passwords.  Nice, huh!


    FidoNews 4-26                Page 17                  13 Jul 1987


    TOPDOS           *TROJAN* This is a simple high level [hard] disk
                              formatter.

    VDIR.COM         *TROJAN* This is a disk killer that Jerry
                              Pournelle wrote about in BYTE Magazine.
                              I have never seen it, although a
                              responsible friend of mine has.

     This is the end of the  "bad  files  list."  The  rest  of  this
    document  contains instructions on what to do if YOU run a trojan
    horse, an update history, a glossary,  and information on how and
    where to contact me with updates.

     If you run a trojan horse..

     While reading this,  bear in mind that there is no better remedy
    for a drive that has run a trojan horse than a recent backup..

     The first thing to do after running  what  you  think  to  be  a
    trojan  horse  is  diagnose  the  damage.  Was  your [hard] drive
    formatted?  Did the trojan scramble your  FAT  table?  Did  every
    file  get  erased?  Did  your boot sector on the [hard] drive get
    erased/formatted?  Odds are that the trojan incurred one of these
    four disasters..  After the initial diagnosis,  you are ready  to
    remedy the problem.


     1) If the trojan low-level formatted your [hard] disk: Hope that
        you have a recent backup;  that's the only  remedy  for  this
        disease.

     2) If the trojan high-level formatted your [hard] disk: There is
        only  one way out of this mess,  and that is to use the MACE+
        utilities by Paul Mace.  MACE+  has  two  devices  in  it  to
        recover formatted disks,  and believe me,  they work!  I will
        talk more about the MACE+ utilities later.

     3) If the trojan scrambled your FAT table:  Once again, there is
        nothing   to   do.   However,   there  is  a  program  called
        FATBACK.COM (available on my  board  named  as  FATBCK11.ARC)
        that will back up your FAT table in under a minute to floppy.
        Using  FATBACK,  it is easy and non time consuming to back up
        your FAT regularly.

     4) If the trojan erased file(s), and the FAT table is undamaged:
        There are many packages to  undelete  deleted  files.  Norton
        Utilities,  PC-tools,  MACE+,  and  UNDEL.COM will all do the
        job.   I  recommend  the  first  three,  but  they  are  more
        expensive than the Public Domain program UNDEL.COM.  When you
        are  undeleting,  be  sure  to undelete files in the order of
        last  time  written   to   disk.   I   know   that   PC-tools
        automatically  lists  undeletable files in the correct order,
        but the other three may not.

     5) If the boot sector on your [hard] disk gets erased/formatted:
        There are four things to do if this happens,  and  the  worst
    FidoNews 4-26                Page 18                  13 Jul 1987


        that can happen is that you will go without a [hard] disk for
        a while.  To be on the safest side, back up everything before
        even  proceeding  to  step "A," although I can not see why it
        would be necessary.

        A) Try doing a "SYS C:" (or "SYS A:") from your original  DOS
           disk,  and  copy  COMMAND.COM  back  onto the [hard] drive
           after that.  Try booting and if that doesn't work try step
           B.

        B) If  you  have  the  MACE+  utilities  go  to  the   "other
           utilities"  section and "restore boot sector." This should
           do the job if you have been using MACE+ correctly.

        C) If you are still stuck,  BACK EVERYTHING UP and proceed to
           do  a  low level format.  Instructions on how to perform a
           low-level  format  should  come  with  your  [hard]   disk
           controller  card.  Be  sure  to  map out bad sectors using
           either SCAV.COM by Chris Dunford or by  manually  entering
           the  locations  of  bad  sectors into the low level format
           program.  After the low level format,  if your have a hard
           disk,  run  FDISK.COM (it comes with DOS) and create a DOS
           partition.  Refer to your DOS manual  for  help  in  using
           FDISK.  Then  put  your  original DOS diskette in drive A:
           and do a FORMAT  <drive  letter>:/S/V.  Drive  letter  can
           stand  for  "C"  or  "B"  depending  on  whether  you  are
           reformatting a hard disk or not.  Finally you are ready to
           attempt a reboot.

        D) If you are still stuck,  either employ  some  professional
           computer repairmen to fix your drive,  or live with a non-
           bootable [hard] drive..



     By now you may be saying to yourself:

    "How  can  I  get a hold of a 'MACE+' utilities package so that I
    can guard against trojans?  Why,  MACE+ can recover  a  formatted
    drive, undelete files, restore boot sectors, optimize a disk, and
    provide a disk cache!

     Anyone  can obtain these marvelous utilities in one of two ways:
    one is to call up the Paul Mace Software Company (tm)  and  order
    them  at  a  retail  of $ 79.95.  The other is place an order for
    them at the WEST LOS ANGELES PC-STORE,  which supports  next  day
    UPS  shipping!  The BBS phone # for the PC-STORE is at the end of
    this document.

    Finally:

    If you have any additions or corrections for this list, send them
    to  Eric  Newhouse  at any of the following places:  (in order of
    most frequented)


    FidoNews 4-26                Page 19                  13 Jul 1987


       * The Crest RBBS (213-471-2518) (1200/2400) (80 MB)
       * The West LA PC-STORE  (213-559-6954)(300/1200/2400)

    -----------------------------------------------------------------

    FidoNews 4-26                Page 20                  13 Jul 1987


    Are you tired of the same old thing, are you catering to the same
    old users and tired of maintaining the same old BBS?  Well have
    you ever thought of putting up a whole new BBS, cater to a new
    group of users, but haven't wanted to lose the established crowd
    you have worked so hard for?  Well have I go a deal for you!

    Why not leave your old BBS as it is and put up a second one and
    use the same phone line for both?  This was a problem presented
    to me when one of the local syslops had to give up an adult board
    when his parents found it.

    The idea of two BBS's isn't new and I don't lay claim to it.  The
    OTHER Side was originally a second BBS that was invoked with the
    'O' command.

    This worked okay but had some definite problems. First when the
    second BBS was called up it loaded one on top of the other and
    used all available memory (DoubleDOS was out of the question).
    It also had the tendency to screw up the on line time if you
    switched back and forth.

    I approached Randy Bush with the problem and after some gentle
    reminding he built a little program called CHOOSER.   What
    CHOOSER does is sit between SeaDOG  or Dutchie and the BBS.
    SeaDOG answers the phone and then passes control to CHOOSER,
    CHOOSER then asks the caller what he wants to do.  Currently
    there are 10 possibilities,  depending on a reply of 0,1,,,,,9
    CHOOSER passes the error level to a small batch file that then
    invokes your regular BBS command line.

    This has enabled me to effectively run two BBS's off of one phone
    line. SeaDOG now calls up OSWEGO OPERA (Chooser) that then asks
    you if you want OSWEGO OPUS (1) or OSWEGO's OTHER Side (2).

    Think of the possibilities, you can run your regular BBS (OSWEGO
    OPUS) and beta test another software package (FIDO V12) or maybe
    run the same BBS but with two different bbs packages (Opus and
    Fido, same files areas and message areas) or possibly become
    demented like I have and run the same software but each side has
    two different themes. (the OTHER Side is a sexually oriented BBS)

    I have two sperate user.bbs and am able to keep OSWEGO OPUS at
    the same level it has always been (whatever that is).

    CHOOSER.ARC is file requestable from DawGone Disgusted 105/6. It
    doesn't like X00 as a fossil driver and really requires the most
    current version of OPUSCOMM.

    I'm including my runbbs.bat and also the complete DOCs file for
    CHOOSER.
    so you can see just how simple the setup is.


    ;        Chooser 0.04: Select a function via a FOSSIL driver
    ;
    ;      Copyright 1987, Pacific Systems Group.  All rights
    FidoNews 4-26                Page 21                  13 Jul 1987


    ;      reserved.
    ;
    ;   This program may be used by any member of IFNA, Inc. without
    ;   further obligation to the author.  Members of IFNA, Inc. may
    ;   give it to other  members as long as no fee is charged in any
    ;   way.
    ;
    ;   For use or distribution by or to others (e.g. non-m,embers of
    ;   IFNA, Inc.), you must contact the author:
    ;       Randy Bush
    ;       Fido 105/6
    ;       9501 SW Westhaven Drive
    ;       Portland, Oregon  US-97225
    ;   But, it will probably be easier to just join IFNA, Inc.
    ;
    ;
    ; The command line MUST look like
    ;
    ;    CHOOSER <port> <prompt>
    ;
    ; where
    ;
    ;   <port>    is 1, 2, 3, or 4
    ;   <prompt>  is the string to be shown to the caller."~" will be
    ;             translated to <cr><lf>.
    ;
    ; For example:
    ;
    ;   CHOOSER 1 Welcome~ 1 - Randy's Fido~ 2 - Other Side~Choose
    ;   one :
    ;
    ;   will cause the caller on port 1 to be prompted as follows:
    ;
    ;   Welcome
    ;    1 - Randy's Fido
    ;    2 - Other Side
    ;   Choose one :
    ;
    ;
    ; A FOSSIL driver must have been installed to run this program.
    ;
    ; Returned errorlevels are:
    ;    12 - Bad command line or FOSSIL driver
    ;    11 - Carrier lost
    ;    10 - Response was <cr>
    ;  0..9 - Service 0..9 selected by caller
    ;


    :Restart
    CHOOSER %1   OSWEGO OPERA~~ 1 for OSWEGO OPUS~ 2 for OSWEGO's
    OTHER Side~~~
    IF ERRORLEVEL 11 GOTO End
    IF ERRORLEVEL 10 GOTO Normal
    IF ERRORLEVEL  2 GOTO Other
    IF ERRORLEVEL  1 GOTO Normal
    FidoNews 4-26                Page 22                  13 Jul 1987


    :Normal
    OPUS DAY -p%1 -b%2 -t%3
    GOTO End
    :Other
    cd\other
    OPUS OTHER -p%1 -b%2 -t%3
    cd\opus
    GOTO End
    :
    :End

    It should also be noted for any syslops not currently using a
    front end like SeaDog of Dutchie that the events and maintenance
    is handled by the your SEADOG/DUTCHIE.BAT Remember that the front
    end answers the phone not CHOOSER or OPUS.


    Bill

    President and Chairman of the Board of FUN, an elite organization
    for the elimination of UN_FUN.


    -----------------------------------------------------------------

    FidoNews 4-26                Page 23                  13 Jul 1987


    Todd Looney
    Vietnam Veterans' Valhalla IFNA 143/27

      INTERNATIONAL VIETNAM VETERANS' ECHOCONFERENCE ANNIVERSARY!!!

         Well, here I am again,  this makes about the fifth article I
    published  in  this distinguished (?) newsletter over the past 12
    months.  Many of you probably at least recognize my name  if  not
    already  know  who  I  am.  But,  for  those  of  you who are not
    familiar with my not-so-illustrious personage,  I am the SysOp of
    the Vietnam Veterans' Valhalla Opus BBS in San Jose,  California.
    I am also  the  founder  and  international  coordinator  of  the
    Vietnam Veterans' EchoConference.  Without the indefatigable help
    and support from the several dozen Fido/Opus/TBBS SysOps who host
    the   conference   on  their  own  bulletin  boards  making  it's
    intelligent and mature debates and  communications  available  to
    hundreds of readers across the continent.  The conference network
    has  grown  steadily  from  the  one  lonely  BBS  in  San  Jose,
    California (then know only as the  LooneyBin),  to  an  organized
    cluster  of  some  40  bulletin  boards  located from the far-off
    islands of Hawaii,  clear across the central United States to New
    York   and   Canada.   The   ever-increasing  visibility  of  the
    International Vietnam Veterans' EchoConference offered  by  these
    doughty   SysOps   contributes   greatly   to  it's  overwhelming
    popularity and undeniable success.

         It has been said that the Vietnam  Veterans'  EchoConference
    has  become  "one  of  the most important and productive echomail
    conferences available in the Untited States today."  Frankly,  my
    own  modesty  makes me question the validity of that declaration,
    but the  depth  and  maturity  of  the  conference  message  base
    substantially  demonstrates  is  the  need for a support resourse
    like  it  in  todays  often  mis-directed,  largely  mis-informed
    society  whose  level  of  collective  familiarity  with  the era
    surrounding the Vietnam conflict is practically non-existent.

         A short while back I  conducted  a  survey  of  the  various
    SysOps hosting the International Vietnam Veterans' EchoConference
    in  an  attemp  to  gather  statistical  data  related  to  their
    individual caller bases.  The results  of  my  analysis  indicate
    upwards to 2000 people have read the conference message base, and
    that  approximately  40%  of  those  are  military veterans.  The
    remaining 60% are composed of a diverse variety of ex-protesters,
    ex-supporters,   ex-Vietnamese  civilians  and  military,   draft
    dodgers, etc.

         A  significant  number  of  vets  have  found  solace in the
    International Vietnam Veterans' EchoConference  during  the  year
    the  echomail project has been in place.  They have found a place
    where they can "bare their souls" wihtout fear of having to  deal
    with  someone  else' reaction to what they have to say.  They can
    also take their time inputting their messages in the comfort  and
    safety  of  their  own  homes.  They  can also respond to sincere
    questions placed in the conference by the numerous  non-vets  who
    are  interested  in  knowing about the Vietnam conflict and those
    who served in the war.  Some very  meaningful  communication  has
    FidoNews 4-26                Page 24                  13 Jul 1987


    taken place between the vets and non-vets, as well as every other
    combination  of  the  two.  A lot of vets have found their way to
    professional therapy and guidance through the VA Vietnam Era  Vet
    Centers.  The  entire  continent-wide  network  acts like the one
    massive support network it has become.  We all lend  comfort  and
    support  to  one  another,  even  if  our problem is not directly
    related to Vietnam.  We all need emotional encouragement at times
    and many people have found  a  niche  in  the  Vietnam  Veterans'
    EchoConference.  And not all of them are veterans.

         Last  month the conference celebrated its first anniversary.
    We were a year old on the 16th of June!  We have  grown.  We  are
    stable.  We  are  productive.  We  are a valuable service in this
    country where most everything comes at a cost.

         We are still trying to spread,  too.  If you are a sysop and
    would  like to host this conference,  either contact me direct at
    143/27,  or contact one of  the  regional  coordinators  for  the
    Vietnam Veterans EchoConference listed below.  Any one of us will
    help you get aboard (with a full message base to boot!).

                       123/6    Memphis, TN
                       107/105  Staten Island, NY
                       17/43    Tacoma, WA
                       200/100  Redondo Beach, CA
                       113/1    Hawaii
                       143/27   San Jose, CA

         If  you  are  not  a sysop of a Fido or Opus bulletin board,
    please give us a call.  You should be able to find a local  sysop
    carrying  the  conference  listed in the ORIGIN statements listed
    below  each  message,  or  ask  your  local  sysop  to  host  the
    conference on his or her board!

         We are looking forward to hearing from you!

    -----------------------------------------------------------------

    FidoNews 4-26                Page 25                  13 Jul 1987


    =================================================================
                                 COLUMNS
    =================================================================

    Eric Ewanco, private SEAdog 130/3

                            Borland's Turbo C:
                              Review, part 2
                        (continued from last week)

    HARDWARE INTERFACE

        Turbo offers more than you could ever imagine in the  way  of
    interfacing with assembler,  other languages, interrupts (calling
    and being), TSRing, and everything else.  Turbo offers (via MASM)
    inline   ASSEMBLY   source  which  can  reference  any  C  symbol
    accessible  at  that  point  (provided  it  makes  sense  in  the
    context),  even labels to C statements.  If that's not enough, or
    is too much,  all registers  can  be  accessed  through  "pseudo-
    variables,"  like  _AX,  _BX,  etc.,  for all the general purpose
    variables,   not  including  IP  and  flags  (which  aren't  very
    accessible  in assembler,  either).  If you need more power,  the
    documentation for writing your own assembler programs  is  clear,
    complete,  easy  to understand,  and all-encompassing.  It is the
    best I have ever seen,  and I've seen a lot.  In addition,  Turbo
    allows  you  to  generate  interrupts,  write interrupt routines,
    terminate  and  stay  resident  (and  Turbo  C  programs  can  be
    converted into .COM files),  call bios routines very easily,  set
    interrupt vectors,  set a control break handler,  set a  hardware
    error  handler  ("Abort,  Retry,  Ignore?"),  and a million other
    things.  MS C style DOS calls are offered,  too.  One example  of
    these  routines  is  bioscom(),   call  the  BIOS  communications
    routines.  With this call,  IT IS POSSIBLE TO  INTERFACE  TO  ANY
    FOSSIL  DRIVER WITH NO ASSEMBLER PROGRAM SUPPORT!  I have in fact
    written a program dependant only on Turbo C's  libraries  to  use
    Opus!Comm,  without the need of external assembler routines.  One
    statement does it all.  THIS is  POWER.  Turbo  Lighting  can  be
    called  just  as  easily  using  the bioskey().  And Turbo C also
    offers Pascal-style parameter passing for those "older"  routines
    you've written.

    DOCUMENTATION

        The  documentation  for Turbo C,  contained in two voluminous
    manuals, is the User's Guide (300 pages, 2 centimeters thick) and
    the Reference Manual (385 pages,  2.5 centimeters).  Both are the
    usual  paperback,  and  are written so that beginners and experts
    alike  will  love  it.   It  offers  an  excellent   step-by-step
    introduction to the integrated environment for beginners, as well
    as a short two-chapter coverage of the C language.  There are two
    chapters  for  interfacing  with  Turbo  Prolog  and  a  thorough
    comparison  with  Turbo Pascal,  complete with side-by-side code,
    and,  my  favorite,  caveats  to  avoid.   Borland's  insight  is
    incredible in the two sections they devote to "Common Pitfalls of
    Programmers  Using  C,"  one for programmers in general,  one for
    Turbo Pascal programmers.  They cover the usual  screw-ups,  like
    FidoNews 4-26                Page 26                  13 Jul 1987


    using  assignment for comparison,  the difference between strings
    and arrays, zero based arrays, leaving semicolons off last block,
    case sensitivity,  multi-dimensional  arrays,  omitting  required
    parens  on  function calls,  using \ in constant path names,  and
    forgetting  to  pass  addresses.  All  utilities  are  thoroughly
    explained  in plain language.  Also included is a reference to C,
    similar to the appendix in  the  C  bible,  with  C  bible  cross
    reference.  Also included is a figure of C constructs, again like
    the tail end  of  the  C  bible.  It  covers  the  ANSI  C  draft
    implementation, too.  In general, the documentation is the best I
    have ever seen,  covering  everything  you  wanted  to  know.  It
    handles  beginner  to operating system developer.  The very best,
    written in the wonderful Borland style.

    ENVIRONMENT

        Let's start with the environment.  There are two programs  on
    the Turbo C set; TCC.EXE and TC.EXE.  One is the usual integrated
    enviroment, close to but slightly different from Turbo Prolog and
    Turbo  BASIC.   The  other  is  the  long-awaited  command   line
    environment  that  the  traditional  compiler  is written as,  an
    example of Philippe's insight for the programmers of C  and  care
    for  the customers who asked for it.  Although Turbo C keeps much
    of Borland's magic,  they seemed to have lost the  compiler  code
    size magic:

        TC       EXE   231257   5-20-87   1:00a
        TCC      EXE   169098   5-20-87   1:00a

    As  you  can  C,  Turbo C is HUGE.  So is Turbo BASIC and Prolog.
    Borland has moved into hard  disk  territory.  But  the  features
    gained  well  outweigh  it.  Both programs put together beat MS C
    whose 5 or 6 different files add up to more than a disk, although
    they work in overlays (something  we  may  expect  from  Borland,
    hopefully).

        The  integrated  environment  is  much  like  the  other  new
    generation Borland programs,  with an interface very  similar  to
    TB's. There are two primary windows; one for editing, and one for
    messages.  All  functions are available anyplace in the compiler.
    However,  the old familiar and much-praised compile to memory  is
    gone.  It  has  been  replaced  by a shell-to-dos-and-run scheme,
    which is functionally equivalent, but takes up a lot of memory.

        One of the unique features of Turbo C is the  multiple  error
    message capability, something long awaited.  The Turbo C compiler
    will compile and flag as many errors as you select  then  proceed
    to  put  you,  in  Borland style,  into the source code where the
    first error is.  Hitting F8 will move to the next place  and  the
    next  error  found,  and  so  forth.  Editing the source does not
    invalidate the error positions;  further errors will  always  put
    you in the correct place.

        One  unique  thing about Borland's compiling:  as you compile
    and link, it keeps track of how many warnings and errors flagged,
    source lines compiled,  and amount of memory left,  displayed  in
    FidoNews 4-26                Page 27                  13 Jul 1987


    real time.  When it finishes, it displays all errors and warnings
    and steps through the source code.

        The environment also offers an extensive  "project"  utility,
    similar to make,  but simpler and easier to use.  (A full-fledged
    UNIX make is included as a standalone.)  The  included  MicroCalc
    has an example of a control file for this project manager:

        mcalc (mcalc.h)
        mcparser (mcalc.h)
        mcdisply (mcalc.h)
        mcinput (mcalc.h)
        mcommand (mcalc.h)
        mcutil (mcalc.h)
        mcmvsmem.obj

    This indicates that the source files on the left are dependent on
    the file in parens. There is also an implicit dependency that all
    executable  files  are  dependent  on  all  object  files and the
    project file itself.

        Also included is a  small  CPP  C  Pre-Processor  utility  to
    preprocess  to  a  file (strictly no-frills).  A Touch utility is
    included to update a file's date and time;  used to force a  make
    to occur.

        Turbo  C comes with its own linker.  This linker is about 1/5
    the size of the MicroSoft Linker (that comes with MS  C)  and  is
    much faster:

        TLINK    EXE     9753   5-20-87   1:00a
        LINK     EXE    47896   3-14-86   3:16p

    As  the  manual puts it,  "As we said earlier,  TLINK is lean and
    mean; it does not have an excessive supply of options. . .  .  it
    is not a general replacement for MS Link." Boy, for 1/5 the size,
    it  sure  packs  an  awful  lot.  Let me stress again the Turbo C
    object modules are supposed to be compatible with  every  IBM  or
    MicroSoft  linker,  although  in one instance I ran into problems
    using a non-TLINK linker.  Borland is working on the problem,  as
    well as a bigger linker.

    CODE SIZE and BENCHMARKS

        I  am very impressed with Turbo C's "extensive properties," a
    phrase I just invented to apply to  such  things  as  compilation
    speed,  code size,  execution speed,  and the like.  For the most
    part Turbo C is tight in it's code generation,  the most  notable
    exception being floating point object (but not .EXE) files. Turbo
    C  always optimizes at least space.  You can switch that to speed
    or  turn  on  various  other  optimizations  aforementioned.  The
    compiler is FAST as usual;  a moderately long floating-point low-
    comment program (164  lines,  4329  bytes)  took  48  seconds  to
    compile and link in TC,  but 2 minutes 9 seconds to compile in MS
    C.  The same program had a TC OBJ size of 4191 and EXE size 28140
    emulation,  18236  8087  only;   MSC  OBJ  was  3648,  EXE  29126
    FidoNews 4-26                Page 28                  13 Jul 1987


    emulation, 22214 8087, and 3567/24812 for altmath,  which Turbo C
    doesn't  offer,  but  neither have I found a need for it.  As for
    runtime  execution,  Turbo  C  wins.   The  same  program  (which
    generates hi-res 3-d surfaces, see 80 Micro, May 83, p. 236) took
    4:22 minutes TC and 5:45 minutes MS C (for reference, it takes 15
    minutes  TPascal 8087,  3 hours C without 8087,  15 hours TPascal
    w/o 8087, and well near 24 hours in BASICA). It used square roots
    and sines.

        Other benchmarks:  a UNIX grep utility,  no  floating  point,
    compiled in 49 seconds TC no options,  46 seconds no warnings, 41
    seconds no floating point link search, and 40 seconds no warnings
    or floating point link search;  code size  (obj/exe)  7025/12864.
    MSC  took  2  minutes 50 seconds,  with code size 6795/13608.  My
    favorite,  the null program ("main (){}"),  took 28 seconds in TC
    and  50  seconds in MS C;  code size was 160/1694 TC and 276/1986
    MSC. All times are for both compile and link.

        I have had only one problem in the week or two I've had Turbo
    C,  and that was the handling of floating point exceptions.  This
    is the only problem I've seen; other than that it's flawless.

        In  conclusion,  Turbo  C is 99% the functionality of MS C in
    some places,  101% in others,  but at 20%  the  price  (discount;
    reference:  PC  Connection),  and besides that,  it took them one
    version,  not three or four.  It is fast in  both  compiling  and
    executing,  produces  tight code,  offers advanced warnings,  can
    produce .COM files,  can be  used  to  write  TSRs,  has  several
    optimization  settings,  and  will be very well supported.  Every
    programmer should have a copy.  However,  if you do want to get a
    copy,  I recommend expedience, because Borland does not guarantee
    the current price beyond July 1st,  and Turbo C is sure  worth  a
    heck of a lot more than $99.

    -----------------------------------------------------------------

    FidoNews 4-26                Page 29                  13 Jul 1987


    Glen Jackson
    Broadcast Software BBS
    Fido/SEAdog 100/517

                            Echo mail routing

    It's been 5 months now since I have been into Echo Mail.  I run a
    backbone  on  one  echo  (*plug on* - the Broadcast echos ,  also
    including the Request Line for the Public  -  *plug  off*),  feed
    another  node  across  the  country,  and am down line on several
    others.  Because of this, I have run into several combinations of
    software (SEAdog/TBBS,  SEAdog/OPUS,  SEAdog/FIDO, FIDO/OPUS, and
    of course, FIDO by itself).

    The biggest problem that most of the mail  systems  run  into  is
    this:

        Node  A  polls  or  sends  some  mail  to Node B.  Node B has
        messages waiting for Node A, but when Node A calls,  he isn't
        given any mail packets.

    Let's start with the route files. Here's how we want our route to
    look every night:

        at 1:00 AM we will poll 1000/1 for any mail
        at 3:30 AM we will route outgoing mail to our host
        at 4:00 AM we run National Mail hour
        at 5:00 AM we will hold mail for 1000/2 to pick up.

    This takes 4 seperate routes.  If you run SEAdog, they can all go
    into your one ROUTE.DOG file. Here's how they should look:

        Schedule E                      ; (route.e)  polls 1000/1
        HOLD     ALL except 1000/1
        SEND-TO  ALL
        GIVE-TO  ALL
        POLL     1000/1

    - the HOLD statement places all mail in a  hold  status  in  case
      another  node  calls  in looking for his mail.  DO NOT HOLD any
      mail packets to nodes you are sending to or polling.

    - the SEND-TO statement allows HOLD mail to  be  released  if  an
      incoming call comes in.

    - the  GIVE-TO  will  give the mail you have for 1000/1 to 1000/1
      when you call him.

    - the POLL statement makes sure that you will call 1000/1 whether
      or not you have mail for him.  If you only want to call  1000/1
      IF you have mail for him, don't use the POLL statement.

    Next, we want to route our mail to our host.  But, in case we did
    not connect with 1000/1,  we still want to keep it here  and  not
    route it. Run a route that looks like this:

    FidoNews 4-26                Page 30                  13 Jul 1987


        Schedule G                      ; (route.g) local routing
        ROUTE-TO  [your host net/node]  ALL
        NO-ROUTE  1000/1 1000/2
        SEND-TO   [your host net/node]
        PICKUP    [your host net/node]
        GIVE-TO   ALL

    - the ROUTE-TO will route ALL to [your host net/node].

    - the  NO-ROUTE  keeps  mail  you hold at a later time from being
      sent over to your host for routing.

    - the SEND-TO and PICKUP are here for you to be able to make  the
      call to your host if you have mail to send out.

    - the  GIVE-TO statement gives mail to incoming callers that have
      mail waiting.

    Next, we want to run the National Mail hour.  Remember,  we don't
    want  to send or route any of 1000/1 or 1000/2 mail,  as they are
    dealt with later. Here's the sample route file:

        Schedule A                      ; (route.a) natl mail hour
        NO-ROUTE  1000/1 1000/2
        HOLD      1000/1 1000/2
        SEND-TO   ALL
        GIVE-TO   ALL

    - the NO-ROUTE makes sure that the mail  for  1000/1  and  1000/2
      stays at your node.

    - the HOLD keeps your node from calling these nodes directly.

    - the  SEND-TO calls the nodes you have not routed mail for,  and
      that you have mail at your location for.

    - the GIVE-TO gives the mail to any incoming calls that have  any
      mail waiting.

    You  could  also add a PICKUP ALL in the route so when you call a
    node to drop off mail,  you can pick up any mail for you that  he
    may have waiting.

    Confused YET ? If not, I'll try harder.

    Now, we're going to hold some mail for 1000/2.  Here's where most
    nodes get into trouble- the ability to actually give mail  to  an
    incoming caller that has messages there.

    Here's out holding route for 1000/2:

        Schedule F                      ; (route.f) hold for 1000/2
        HOLD     ALL
        SEND-TO  ALL
        GIVE-TO  ALL

    FidoNews 4-26                Page 31                  13 Jul 1987


    - the HOLD keeps your system from calling out.

    - the  SEND-TO  releases  packets  to an incoming caller that has
      mail waiting.

    - the GIVE-TO actually gives the packet to the caller.

    Ahhhhh, finished. Just remember this important rule:

    * you MUST BE IN A MAIL EVENT TO GIVE MAIL TO A POLLING NODE,  no
      matter what type of system you run. *

    Next week.  we'll take a look at the schedule configurations, and
    if you run SEAdog,  how to put up a true 24 hour mail system with
    your BBS.

    Don't  forget  to call in and request our latest utility - MSGDB.
    It can be requested by filename MSGDB.ARC .  The  arc  file  also
    contains  FIXDATE  - a simple utility that corrects those off the
    wall dates we see in the echo areas.

    That's all for now.  If you have any  broadcasters  calling  into
    your BBS,  you may want to join one of our Broadcast Echos.  Just
    Net_Mail me at 100/517...
                                    And that's the way it was...
                                    from the Broadcast Booth,
                                    Glen Jackson

    -----------------------------------------------------------------

    FidoNews 4-26                Page 32                  13 Jul 1987


                   -- The Regular Irregular Column --
                               Dale Lovell
                                 157/504

         Well, things  have gone  somewhat better  this week. The new
    system has been performing flawlessly, and  I actually  enjoy the
    new keyboard.  Things are looking up here, if things keep working
    out I may even become a public access board again  (right now I'm
    a private node, so mail to me has to be routed). This has made it
    necessary for me to look into a few new things,  so I'm  going to
    start off by asking for your help.

    -- What's a LAN? --

         As you  may recall,  last week's  problems were  caused by a
    keyboard failure and a lack of my old XT clone.  In an  effort to
    prevent that  from ever happening again, I bought a stripped down
    clone at a hamfest this weekend  (someone else  had just upgraded
    to an AT and wanted to get rid of their old machine). After I got
    it home, I dug up some old cards and brought it up to 640K with a
    20 meg  hard disk.  While this  is primarily intended as a backup
    machine, I've been thinking about using  it as  a public bulletin
    board.  After  I  got  everything  hooked  up and tested, an idea
    occurred to me. Instead of having two separate  machines; one for
    me to work on, and another dedicated to a bulletin board; why not
    attach the two with  a local  area network.  This way  I could go
    over  my  mail,  maintain  the  board,  and not have to duplicate
    message bases on two different machines. There's only one problem
    with this, I don't know the first thing about LANs.

         This  isn't  to  say  I  don't approve of (or rather haven't
    approved of) local area  networks. It  has always  sounded like a
    great way  to do some things (like sharing an expensive printer).
    I've just never been in an environment where it was practical. At
    my current  job, there's exactly one PC in the office and it sits
    on my desk. It's a small office and no one else really  knows how
    to use  a computer.  I got  the AT  at the office because my boss
    noticed  how  long  it  took  the  computer  to  recalculate some
    spreadsheets and  re-index a database. He asked me if there was a
    way to speed it up, and the company ended up buying an  AT for me
    to work  on. Most  of what  I've learned  has come through actual
    experience, and I've just never has a chance  to install  or work
    on a LAN. Since I now have a situation where one might be useful,
    I'm going to look into buying  one. In  this endeavor,  I ask for
    your help.

         I currently have an AT clone running at 10 mhz with a 42 meg
    MiniScribe hard disk (using SpeedStor to make it  look like three
    drives; a 21 meg drive for my work, a 10 meg drive for files, and
    a 10 meg drive for messages with 1K clusters). The "new" XT clone
    is running  at 4.77  mhz and  has a  20 meg  Seagate ST225 with a
    Western Digital controller. What I'd like to do is set  up the XT
    as  a  bulletin  board,  with  all  BBS programs, utilities, file
    areas, and message bases residing on it's own hard drive.  The AT
    should  ideally  be  able  to  read  the  message  bases (through
    SEAdog's user interface), and be able to do  the bulletin board's
    FidoNews 4-26                Page 33                  13 Jul 1987


    maintenance. If  possible I  would also like the AT to be able to
    use the modem in the XT  for  dialing  out  (mainly  to  the Unix
    machine I  use occasionally)  although it  wouldn't be necessary.
    Since I don't expect any LAN to fill  these needs  perfectly, I'd
    appreciate hearing from your own experiences with ANY LAN. At the
    end of the column  there are  several different  adresses for me,
    just make  certain you  specify which  LAN you're  using and what
    software is being used to run  it. I'll  sum up  the opinions and
    advantages between the different networks sometime in the future.

    -- The AT clone --

         My first comment on the new AT clone is WOW! Unless you have
    ever  worked  on  an  AT  before,  you  would  never  believe the
    difference  in   speed.  As  an  example  of  this,  my  echomail
    processing has dropped to an unbelievably short time. In spite of
    my private status, I pass along echomail to 5 nodes in net 157. I
    start processing  the echomail  at 6:30  every morning  (NMH + 30
    minutes). As  soon as  it's done, I send it out to the four nodes
    that are running SEAdog. In the past, my  system usually finished
    up the echomail processing between 7:30 and 8:30 depending on the
    amount of mail being sent out.  Since I  switched everything over
    to the  AT, the  mail has gone out by 7:00 every day (at least it
    starts calling out at 7:00). I'm using this as a  comparison only
    because it will hopefully mean something to most of the sysops in
    FidoNet, at least I think  it  means  more  than  a  straight out
    benchmark  (Norton's  SI  of  9.8,  just  in  case  you like that
    "benchmark").

    -- Speedstor (Storage Dimensions, $99.95) --

         The Miniscribe 6053 hard disk came with SpeedStor,  which is
    a partitioning "program." With any drive over 32 meg you run into
    a problem, DOS won't recognize a larger hard drive (PC-DOS 3.3 is
    supposed to  "fix" this, but I've heard that it has problems with
    non-IBM equipment). While it is  possible  to  do  strange things
    with FDISK  and your  controller card to make these larger drives
    act like several different hard drives  (C,D,E,etc) it  was never
    that easy.  Speedstor makes  this task  easy, while also allowing
    you to use a "non-standard drive." In an AT, all  the information
    on the type of hard drive is stored in non-volatile memory. There
    are at least 14 different types of hard drives that  the AT knows
    about (IBM  started off  with 14  and everyone  supports at least
    those same  drive  types)  that  can  be  used  with  no trouble.
    Unfortunately the  Miniscribe 6053  isn't usually one of them. In
    the past this meant part of the hard disk was  wasted, as  the AT
    didn't  know  how  to  address  the  extra  cylinders  or  heads.
    Speedstor gets around this by keeping it's own information on the
    type of  hard drive  being used (I think in the non-volatile RAM,
    but I'm not certain). When the  system  boots  up,  it  loads the
    Speedstor software  (one line  in the CONFIG.SYS) and your system
    now knows about this non-standard drive.

         In addition to letting use your drive to it's full capacity,
    Speedstor let's you do some more unusual things. While I'm fairly
    certain that it will let you get past the 32 meg limit  of DOS, I
    FidoNews 4-26                Page 34                  13 Jul 1987


    didn't try  it. What  it does  do very  easily is allow each hard
    drive partition act like a separate drive. Right  now I  have one
    physical hard  disk in  the AT.  But DOS "knows" about drives C,D
    and E; and I don't have any RAM disks installed.  Using Speedstor
    I made  three partitions on the hard disk. The first partition is
    using one half of the hard drive and is a bootable DOS partition.
    The other  two partitions each have one quarter of the hard drive
    and are usable by DOS (although I may  change this  in the future
    to support XENIX). The nice thing is that the third partition has
    a 1K cluster size. Under DOS 3.x cluster sizes are  normally 2048
    bytes (2K),  this means  your two line batch file is going to use
    2K of your hard disk. If you're running a DOS  2.x it  get's even
    worse as  those versions  of DOS  use an  8K (8192 bytes) cluster
    size. Under Speedstor I  can move  the cluster  size down  to 512
    bytes, although when I tried that with a 10 meg partition it gave
    me some warning about not  enough  space  in  the  FAT  table and
    CHKDSK would  have problems  (I chickened  out and moved it up to
    the next choice). Fido and Opus sysops take note, you  don't have
    to lose insufferable amounts of disk space (due to slack) because
    of your message bases.  I "gained"  over 1  meg of  disk space by
    putting my message bases on this partition with it's 1K clusters.
    If I had felt like spending a little more time I may  have played
    around  with  the  partition  size  and  cluster  size and gotten
    something with no warnings and a 512 byte  cluster size, although
    I don't think the space savings would have been as great.

         If  you  aren't  doing  anything  unusual,  like  I  did, it
    installs very quickly. I initially ran Speedstor's semi-automated
    installation and  ended up  with two 21 meg partitions. All I had
    to do was tell it what type of drive I was using. On the  menu it
    had a  choice called  manufacturer. After I choose it, I was able
    to pick the drive out of a list  of the  three current Miniscribe
    drives. Since my copy is the "Miniscribe version" I'd assume that
    the full version would  include  a  fuller  list  of  drives from
    several manufacturers.  Other than that, about all I had to enter
    was the bad track table for the drive. Almost everything else was
    completely automatic.  Miniscribe is now including Speedstor with
    all of their larger drives, and  from  what  my  dealer  tells me
    Seagate  is  doing  something  similar with a program called Disk
    Manager by OnTrack  (Although  he  says  it  is  nowhere  near as
    powerful  as   Speedstor).  It's  nice  to  see  the  hard  drive
    manufacturers are interested in  the end  user, not  just getting
    their money.  While including  Speedstor or Disk Manager with the
    drive may kick up the price a few dollars, I  feel better getting
    everything  I  need  at  once  rather  than getting the drive and
    finding out a need something else to really use it.

    -- SYSEDIT and SuperKey --

         After I got all the data transferred over to the AT, it came
    time to change all my SYSTEM*.BBS files. Because of the different
    way I set up the new system, I needed to change a  lot of message
    and file  paths. In  the past  everything was on the same logical
    drive (as opposed to a physical drive, of which I have only one),
    while now  it was on two logical drives. This wasn't too bad as I
    dug up a copy of Eric Ewanco's SYSEDIT.  SYSEDIT let's  you go in
    FidoNews 4-26                Page 35                  13 Jul 1987


    and edit  the system  files from  DOS. It  has a nice full screen
    display and is very  easy to  use. I  started doing  every change
    manually but  quickly decided there had to be an easier way to do
    things (I have over  20  echomail  conferences  going  through my
    machine).  Enter  SuperKey  from  Borland  (list  price $69.95) a
    keyboard macro program. I  quickly installed  SuperKey and taught
    it what  needed to be done on all the message bases. I had to put
    in what  Borland refers  to as  a keyboard  delay because SYSEDIT
    didn't  use   the  keyboard   buffers,  but  that  was  the  only
    difficulty. In under five  minutes  I  had  all  my  system files
    changed and  was ready  to go,  or so  I thought. I tried running
    some of the echomail programs, but  it couldn't  find some needed
    directories.  After  puzzling  over  this and checking the system
    files I finally realized what I had forgotten. I had  changed all
    the system  files, but  had forgotten  about SEAdog's CONFIG.DOG,
    AREAS.DOG, and the Fido/Opus  MAIL.SYS file.  After correcting my
    oversight  it  was  finally  changed over and everything has been
    running fine  since.  SYSEDIT  and  SuperKey  are  both excellent
    programs and  helped make this switch over much easier than I had
    anticipated. I've seen I  program  similar  to  SYSEDIT  for OPUS
    systems,  but  I  haven't  managed  to  find it in the Opus files
    directory. Programs like SYSEDIT do a lot to make a  sysop's life
    easier, I'd  encourage you to dig up a program like this (SYSEDIT
    in particular  for Fido  sysops) if  you are  currently running a
    bulletin board.

    -- Winding down... --

         Since I  became interested  in local area networks this past
    week, the book I'm going to  recommend  is  going  to  reflect my
    current  concerns.  "Networking  IBM  PCs,  A Practical Guide" by
    Michael Durr (QUE books, $18.95) has  provided me  with a  lot of
    information on  how a LAN works. While the copy I got ($10 at the
    hamfest I attended) is somewhat out of date, many of the specific
    LANs mentioned  are still  with us.  It provides a description on
    several different LANs (probably most of  the one's  available in
    1984,  the  year  it  was  written)  and  goes  over the features
    available under the network software. It covers many  topics that
    I  have   found  to   be  of  interest  such  as  administration,
    performance, maintenance and such. It has helped explain a lot of
    what goes  on in  a LAN,  and has helped me decide what I'll want
    included in the LAN I buy (Such as a non-dedicated server). While
    the book  has raised  many questions  for me, it has gotten me to
    start thinking about more than the  brand name.  I think  I could
    now shop  intelligently for  a LAN, and have a much better chance
    of  coming  out  with  something  that  will  do  the  job versus
    something the  salesman wanted  to sell me. After all, isn't that
    the whole idea behind  learning a  little about  something before
    you go out and buy it?

         I once again welcome your comments, even ask for them if you
    can help me out with information on LANs. Down below  you'll find
    several addresses for me. Some of you have asked about Compuserve
    or The Source mailboxes or account numbers. Unfortunately I don't
    maintain an  account on  any of  these systems,  only on the more
    public access networks. Since I'm a private node in the nodelist,
    FidoNews 4-26                Page 36                  13 Jul 1987


    all FidoNet  mail to  me should  be routed through 157/1 or 157/0
    (same  board really). If  you send  me anything  through US mail,
    please  make  sure  I  have  some sort of return address (are you
    hearing this "Ender Wiggin?")  in order to send you a reply. Next
    week I  should be  looking at  a game,  so all  you fellow gaming
    people who have sent me mail be patient. I haven't forgotten you.

    -- Late Breaking News --

         Couple of  quickies  here  that  "came  in"  just  as  I was
    finishing this  column. First, the latest version of the echomail
    conference list is now  available from  Thomas Kenny  at 107/316.
    You can file request under the name "ECHOLIST.ARC." Also, Hewlett
    Packard Laser  Jet printer  owners will  be pleased  to hear that
    Hewlett  Packard  hopes  to  have  a PostScript update for all of
    their laser printers available by the  end  of  the  year.  I'm a
    strong  supporter  of  PostScript,  even  if  IBM has endorsed it
    (Whadda mean Thom? I thought everybody who wrote  on the computer
    scene was  supposed ta  hate IBM. You mean I can actually support
    an IBM decision? S'Allright....)


    Dale Lovell
    3266 Vezber Drive
    Seven Hills, OH  44131

    FidoNet: 157/504 (or 1:157/504.1 for an extended address)
    uucp:
    decvax\
           >!cwruecmp!hal\
    cbosgd/               >!ncoast!lovell
               /--!necntc/
    ames---\  /
    talcott \/
    harvard /
    sri-nic/

    -----------------------------------------------------------------

    FidoNews 4-26                Page 37                  13 Jul 1987


    =================================================================
                                 WANTED
    =================================================================

                         INFORMATION FEEDS WANTED

    I  am  currently involved in a project in which I have a need for
    "information providers" who are willing to do the following.

    1) Write to their State Lottery Commission and request a complete
       history of all numbers drawn for each of the game(s) played in
       that state.

    2) Send a daily "crash mail" message containing a listing of  the
       game(s)  played  that  day,  and the number(s) drawn for those
       games AS SOON AFTER THE DRAWING AS POSSIBLE!

    At this time I am willing to pay $10 to the first person in  each
    of the following states who sends me the "history" listed in  (1)
    above.  (Please  send  a  "crashmail" message before you send the
    data to insure that you are indeed the first.)

        ARIZONA,  CALIFORNIA,  CONNECTICUT, DELAWARE, D.C., ILLINOIS,
        IOWA,  MARYLAND,  MASSACHUSETTS,  MICHIGAN,   MISSOURI,   NEW
        JERSEY,  NEW  YORK,  "N.NEW  ENGLAND,"  OHIO,  OREGON,  RHODE
        ISLAND, WASHINGTON & WEST VIRGINIA

    As for (2) I am unable to  promise  any  payment  at  this  time,
    however,  if  the  concept  is  sold it may mean payment for this
    information in the near future!

    Please direct all inquiries to me,  John  Penberthy  at  129/200,
    129/28, or voice 412-364-3951.

    -----------------------------------------------------------------

    FidoNews 4-26                Page 38                  13 Jul 1987


    =================================================================
                                 NOTICES
    =================================================================

                         The Interrupt Stack


     1 Aug 1987
       Third Annual BBS Picnic in Edison, NJ.  Please register before
       July 10th.  Admission is $7 for adults, $4 for 12 and under,
       free for 5 and under.  Contact John Kelley at 107/331 for
       details.

    20 Aug 1987
       Start of the Fourth International FidoNet Conference, to be
       held at the Radisson Mark Plaza Hotel in Alexandria, VA.
       Contact Brian Hughes at 109/634 for more information.  This is
       FidoNet's big annual get-together, and is your chance to meet
       all the people you've been talking with all this time.  We're
       hoping to see you there!

    24 Aug 1989
       Voyager 2 passes Neptune.


    If you have something which you would like to see on this
    calendar, please send a message to FidoNet node 1:1/1.

    -----------------------------------------------------------------

                         Latest Software Versions

    BBS Systems            Node List              Other
    & Mailers   Version    Utilities   Version    Utilities   Version

    Dutchie        2.51    EDITNL          3.3    ARC            5.21
    Fido            11w    LISTGEN    05.25.86    ARCmail        0.60
    Opus           0.00    Prune          1.40    EchoMail       1.31
    SEAdog         4.00    TestList        8.3    FastEcho       2.00
    TBBS           2.0M    XlatList       2.81    Renum          3.30

    * Recently changed

    Utility authors:  Please  help  keep  this  list  as  current  as
    possible  by  reporting  new  versions  to  1:1/1.  It is not our
    intent to list all utilities here,  only  those  which  verge  on
    necessity.

    -----------------------------------------------------------------

    FidoNews 4-26                Page 39                  13 Jul 1987


                        OFFICIAL REGISTRATION FORM
                 FOURTH INTERNATIONAL FIDONET CONFERENCE
                        RADISSON MARK PLAZA HOTEL
                             ALEXANDRIA, VA.
                           AUGUST 20 - 23, 1987

        Name _________________________________     Date _____________
        Address ______________________________
        City & State _________________________
        Phone (Voice) ________________________
        Net/Node Number ______________________
        Phone (Data) _________________________

        Number in Your Party _________________
        Staying at the Radisson? _____________
        Number of Rooms? _____________________
        Arrival Date? ________________________
        Departure Date? ______________________

    Registration Fees:                         How Many        Total

        Full Conference        $60.00 each     ________    $________
        Late registration      $10.00 each     ________    $________
             (after Aug. 1)

        Friday Night Banquet   $30.00 each     ________    $________
        Saturday Luncheon      $16.50 each     ________    $________

        Total Amount Included (Registration and Meals)     $________

    IFNA MEMBERS ONLY:
        How many in your party will
        be attending the Sunday morning
        Board of Directors meeting?            ________

    Send your registration form and a check or money order to:

                 Fourth International FidoNet Conference
                212 E. Capitol St., Washington, D.C. 20003
              Attn: Brian H. Hughes -- voice: (202) 543-4200

    This registration form does not include hotel  accomodations.  If
    you wish to stay at the Radisson Mark Plaza Hotel, please contact
    them  directly  and  mention you are with the FidoNet Conference.
    Conference  room  rates  are  $80/night  for  single  or   double
    occupancy, and $20/night for an extra cot.

                        Radisson Mark Plaza Hotel
                5000 Seminary Rd., Alexandria, Va.  22311
                              1-800-228-9822

    -----------------------------------------------------------------

    FidoNews 4-26                Page 40                  13 Jul 1987


    Bob Morris 141/333
    Chairman, Elections and Nominations Committee

    The next two pages are your Official ballot for the  Election  of
    the  IFNA  Board  of  Directors.  The following are the few rules
    which must prevail in this election:

    1. You must send a legible copy of this  ballot  to  the  address
       listed  on  the  ballot.  It  must  be  signed  and  bear your
       net/node number.

    2. You  may  vote  for  any  one  person  in  your region for the
       position of Regional Director.  This vote is to be cast in the
       LEFT column of the ballot.

    3. You may vote for any eleven people  in  any  regions  for  the
       position  of Director at Large.  These votes are to be cast in
       the RIGHT column of the ballot.

    4. Voting will continue until the  end  of  registration  at  the
       Conference  in  August.  The  results  will be read during the
       opening of the business  meeting  on  the  first  day  of  the
       conference.

    5. Write-in Votes will be accepted and are requested during  this
       election.



    FidoNews 4-26                Page 41                  13 Jul 1987


                         IFNA Board Of Directors
                                  Ballot

                             Regional         At Large
    Region 10:
        Steve Jordan         _________        ________


    Region 11:
        Ryugen Fisher        _________        ________
        Theodore Polczynski  _________        ________


    Region 12:


    Region 13:
        Don Daniels          _________        ________
        John Penberthy       _________        ________
        Thom Henderson       _________        ________
        Gee Wong             _________        ________
        Brian Hughes         _________        ________


    Region 14:
        Ben Baker            _________        ________
        Ken Kaplan           _________        ________
        Brad Hicks           _________        ________


    Region 15:
        David Dodell         _________        ________
        Larry Wall           _________        ________


    Region 16:
        Bob Hartman          _________        ________
        Hal Duprie           _________        ________


    Region 17:
        Rob Barker           _________        ________
        Bob Swift            _________        ________


    Region 18:
        Wes Cowley           _________        ________
    FidoNews 4-26                Page 42                  13 Jul 1987


    Region 19:
        Mark Grennan         _________        ________
        Wynn Wagner          _________        ________


    Region 2:
        Henk Wevers          _________        ________


    Write-in candidates:
        ___________________  _________        ________
        ___________________  _________        ________





       Name ______________________________  Net/Node ___________

       Signature______________________________  Date ___________


    Please complete this and mail it to:

             Robert Morris
             IFNA Elections Committee
             210 Church Street
             West Haven, Ct.   06516

    or bring it with you when you come to the conference in August.


    These  ballots  will  be counted by myself since with 200 members
    the charges for a CPA would be very high.  Hard  copies  will  be
    made  available  to  anyone wishing to insure that their vote was
    included.

                              Thank You

                              Bob Morris
                              Elections and Nominations Committee

    -----------------------------------------------------------------