Volume 4, Number 28                                  27 July 1987
    +---------------------------------------------------------------+
    |                                                  _            |
    |                                                 /  \          |
    |                                                /|oo \         |
    |        - FidoNews -                           (_|  /_)        |
    |                                                _`@/_ \    _   |
    |        International                          |     | \   \\  |
    |     FidoNet Association                       | (*) |  \   )) |
    |         Newsletter               ______       |__U__| /  \//  |
    |                                 / FIDO \       _//|| _\   /   |
    |                                (________)     (_/(_|(____/    |
    |                                                     (jm)      |
    +---------------------------------------------------------------+
    Editor in Chief:                                   Thom Henderson
    Chief Procrastinator Emeritus:                       Tom Jennings

    FidoNews  is  published  weekly  by  the  International   FidoNet
    Association  as  its  official newsletter.  You are encouraged to
    submit articles for publication in FidoNews.  Article  submission
    standards  are contained in the file ARTSPEC.DOC,  available from
    node 1:1/1.

    Copyright 1987 by  the  International  FidoNet  Association.  All
    rights  reserved.  Duplication  and/or distribution permitted for
    noncommercial purposes only.  For  use  in  other  circumstances,
    please contact IFNA at (314) 576-4067.


                         Three Weeks to FidoCon!

                            Table of Contents

    1. EDITORIAL  ................................................  1
       Is Echomail Doomed?  ......................................  1
    2. ARTICLES  .................................................  2
       The Maxum Turbo XE - A Serious Computer  ..................  2
       FidoNet in Japan  .........................................  6
       MegaList: A Cross-System File Listing  .................... 10
       Public Key Encryption for FidoNet Mail  ................... 11
       Sirius 0.50 - A Review  ................................... 18
       Sports Net ECHO Conference  ............................... 23
    3. COLUMNS  .................................................. 24
       Broadcast Booth - In The Network  ......................... 24
       The Regular Irregular Column  ............................. 25
    4. NOTICES  .................................................. 30
       The Interrupt Stack  ...................................... 30
       Latest Software Versions  ................................. 30
       International FidoNet Conference Registration Form  ....... 31
       IFNA Board of Directors Ballot  ........................... 32
    FidoNews 4-28                Page 1                   27 Jul 1987


    =================================================================
                                EDITORIAL
    =================================================================

                           Is Echomail Doomed?


    For some time now,  and even more so lately,  we've been watching
    the consequences of our regrettable lack of security.  FidoNet is
    reasonably secure about sending mail to the right people (if  you
    don't look too closely at mail pickups),  but it's wide open when
    it comes to receiving mail.  In normal network  mail  this  isn't
    all  that much of a problem,  but with echomail we find ourselves
    holding a kettle of fish of quite a different color.  I have seen
    two major conferences whither and almost die under what amount to
    terrorist attacks.

    Can we defend ourselves?  Security  measures  can  be  developed,
    surely,  but  will  they do the trick?  I suspect not,  for a few
    reasons.

     1) Most of the measures proposed  are  for  securing  predefined
        conference links, which leaves normal network mail wide open.

     2) For  good  reason.  Securing normal netmail is not practical.
        How can you prearrange security  measures  with  a  new  node
        across the country that you didn't even know existed?

     3) Even  if we secured all links between all systems everywhere,
        that still  won't  stop  people  from  willingly  linking  in
        a known terrorist.

     4) Besides, anyone could fabricate messages for propagation over
        a secure line that appear to originate anywhere at all.

    It starts to look pretty  hopeless.  Is  echomail  doomed?  Well,
    not quite.  When one looks at which conferences were attacked, it
    becomes   apparent   that  it  is  only  the  large  national  or
    international conferences that  really  present  a  good  target.
    Terrorists thrive on attention and  response,  which  they  don't
    really  get in the smaller conferences.  Not to mention that in a
    smaller conference it is correspondingly easier to identify where
    the terrorist is linking in.

    Echomail will thrive.  People  will  continue  to  establish  new
    conferences  for  every topic under the sun.  Echomail is far too
    important a part of our subculture to die out now.  But I suspect
    that the heydey of the  large  international  conference  may  be
    drawing to a close.

    -----------------------------------------------------------------

    FidoNews 4-28                Page 2                   27 Jul 1987


    =================================================================
                                ARTICLES
    =================================================================

    From 107/246

                 The Maxum Turbo XE - A Serious Computer

    The following is an in-depth review of  a  fine  clone  that  you
    should  consider  in  your shopping list if you are looking for a
    new computer in the near future.

        Data Sheet For MAXUM TURBO XE Personal Computer
        -----------------------------------------------

        MAXUM TURBO XE COMPUTER
        Sold by 47th Street Photo.

        The basic unit comes configured as follows:

        Maxum Turbo XE system unit.
        Phoenix type fast Ram test BIOS.
        AT style keyboard with indicator lights built in.
        256k Ram (256k Chips)-(Expandable to 1024k).
        One full height 5 1/2 inch 360k floppy drive.
        One disk controller for up to 2 floppy drives.
        Built in game port.
        8 Expansion Slots (2 Half - 6 Full Size Slots)
        FCC approved slide type case.
        Approved as Class B computing device.
        180 Watt Power Supply.
        MS-DOS 3.2 And GW-BASIC are included.
        Dual speed (4.77/8 Mhz 8088-2) processor.
        Socket for 8087 co-processor chip.
        Built in (battery powered) clock/calendar card.  Keyboard
        (key operated) lock-out switch.
        Power, Turbo, Hard Disk indicator lights.
        Built in reset switch in rear of machine.
        Internal speaker in front of system unit.
        4 power plugs coming out of power supply.

    Price as configured above is $499.00 plus tax.

    The unit comes securely packed in a double carton and  each  unit
    is tested before being released for sale.

    There  is  a  sticker  attached  to  the rear of each unit with a
    number to call for service and/or  advice  (not  toll  free)  you
    might need.  We called twice and each time the phone was answered
    by a polite technician  who  had  a  thorough  knowledge  of  the
    computer  and  was a great help in setting up the computer.  Each
    unit comes with a 5  book  set  of  documentation  complete  with
    excellent  instructions for the novice as well as the experienced
    user.

    I would judge that anyone could have this unit unpacked and fully
    FidoNews 4-28                Page 3                   27 Jul 1987


    operational inside of 25 minutes from opening the carton for  the
    first time.

    The documentation is from Microsoft for the most part and is well
    written  and  should  be a great help in setting up the system as
    well as utilizing the Ram from 640k to 1024k should you decide to
    install the extra Ram yourself at the time of purchase  or  at  a
    later date.

    The  system  as  tested  had  some extra features that were user-
    installed at the time of purchase. They were:

        Full 1024k Ram on the motherboard.
        IBM type RGB color card from Maxum.
        RS-232 card from Honeywell.
        One extra 5 1/2 inch floppy drive.
        One 22 Megabyte Miniscribe hard drive.
        Orchid Turbo 286E Card with 2 Megabytes Of Ram.
        Copy II Pc copy board.

    Approximate cost of system as tested is: $ 2399.00

    The system  runs  all  the  usual  PC  software  such  as  Lotus,
    Wordstar,  Flight Simulator,  dBase III+,  as well as Fido, Opus,
    SEAdog, Telix, PC-TALK, Qmodem and Crosstalk XVI.

    Lattice C,  Turbo Basic,  Quick Basic,  Microsoft Cobol,  and the
    Microsoft  Assembler  were  all  tested  and ran with no problems
    whatsoever.

    The system appears to be 100% compatible,  as we have  not  found
    any  software  that  will not run on this system at the time this
    article was written.

    Below  you will find some data we compiled from the various tests
    we ran on the system. There are 3 results reported for each test.

     1) Normal speed mode is the mode in which the computer  boots  up
        and  according  to  Norton's Sysinfo is slightly faster than a
        normal PC.

     2) Turbo speed is the user selectable speed  increase  gained  by
        typing  the  Cntrl-Alt-2 combination of keys.  This IS NOT the
        Orchid turbo speed which follows.

     3) 286 Turbo speed is when the Orchid 286E card is activated  and
        running.  In  this  mode  you  are  running  for all intensive
        purposes an IBM AT clone at 8 Mhz with  an  Intel  80286  chip
        handling  the processing.  Please note that in this mode it is
        possible to access 704k for DOS to run in,  as  opposed  to  a
        maximum 640k for the other two modes we tested.




        Maxum Turbo XE In Normal Speed Mode
    FidoNews 4-28                Page 4                   27 Jul 1987


        -----------------------------------
        SI-System Information, Version 3.10, (C) 1984-86

        IBM/PC
        Built-in BIOS programs dated Monday, September 15, 1986
        Operating under DOS 3.20
        5 logical disk drives, A: through E:
        DOS reports 640 K-bytes of memory:
        68 K-bytes used by DOS and resident programs
        572 K-bytes available for application programs
        A search for active memory finds:
        640 K-bytes main memory    (at hex 0000-A000)
        32 K-bytes display memory (at hex B800-C000)
        BIOS signature found at hex paragraph C800

        Computing performance index relative to IBM/PC: 1.7

        Maxum Turbo XE In Turbo Speed Mode
        ----------------------------------
        SI-System Information, Version 3.10, (C) 1984-86

        IBM/PC
        Built-in BIOS programs dated Monday, September 15, 1986
        Operating under DOS 3.20
        5 logical disk drives, A: through E:
        DOS reports 640 K-bytes of memory:
        68 K-bytes used by DOS and resident programs
        572 K-bytes available for application programs
        A search for active memory finds:
        640 K-bytes main memory    (at hex 0000-A000)
        32 K-bytes display memory (at hex B800-C000)
        BIOS signature found at hex paragraph C800

        Computing performance index relative to IBM/PC: 3.0

        Maxum Turbo XE With Orchid Turbo 286E Card Installed
        ----------------------------------------------------
        SI-System Information, Version 3.10, (C) 1984-86

        This computer might be identified by this:
        (C) Copyright 1986 More Computing. All Rights Reserved.
        Built-in BIOS programs dated Monday, November 8, 1982
        Operating under DOS 3.20
        5 logical disk drives, A: through E:
        DOS reports 704 K-bytes of memory:
        87 K-bytes used by DOS and resident programs
        617 K-bytes available for application programs
        A search for active memory finds:
        640 K-bytes main memory    (at hex 0000-A000)
        127 K-bytes display memory (at hex A040-C000)

        Computing performance index relative to IBM/PC: 9.2


    So  as  you can see from the test results above the stock machine
    in TURBO mode is much faster than a normal PC and of course  when
    FidoNews 4-28                Page 5                   27 Jul 1987


    the 286E co-processing board is added the speed jumps from 3.0 to
    9.2.

    The  Maxum  XE  in  my  Benchmark Test using PKARC to archive the
    following group of files used in my ARC tests.

        Filename        Length   Method   Size   Ratio
        --------        ------   ------  ------  -----
        AUTOEXEC.BAT       33  Crunched     31    7%
        COMMAND.COM     17664  Crunched  14787   17%
        CORRSTAR.OVR    57344  Crunched  28768   50%
        INTERNAL.DCT     35584 Squeezed  33871    5%
        LF.COM            512  Crunched    382   26%
        MAILMRGE.OVR    11520  Crunched   7533   35%
        PROKEY.EXE      13824  Crunched   6360   54%
        WC.EXE          12288  Crunched   8315   33%
        WINSTALL.COM     1152  Crunched    746   36%
        WINSTALL.OVR     38528 Crunched  22784   41%
        WPE.COM         21376  Crunched  16622   23%
        WPEMSGS.OVR     29056  Crunched  16072   45%
        WPEOVLY1.OVR    41216  Crunched  33172   20%
        WS1.PRO            29  Stored       29    0%
        WSCOLOR.BAS      6656  Crunched   2967   56%
        ----           ------           ------  -----
        0015           286782           192439   33%

    The following results were recorded when PKARC was used to create
    an archive file from the above files.

        Normal Speed   Turbo Speed   286 Turbo Speed
        --------------------------------------------
          01:12:43       00:44:99       00:20:00
        --------------------------------------------

    Using Wordstar and  Nodelist.184  I  performed  a  standard  move
    cursor  to end of file test.  The length of the nodelist used was
    149436 bytes.

        Normal Speed   Turbo Speed   286 Turbo Speed
        --------------------------------------------
          00:33:33       00:16:12       00:14:75
        --------------------------------------------

    Using PC Lab's Bench02 test which basically finds  prime  numbers
    the following results occurred.

        Normal Speed   Turbo Speed   286 Turbo Speed
        --------------------------------------------
          00:27:00       00:17:00       00:05:00
        --------------------------------------------

    All in all, a fine computer.

    -----------------------------------------------------------------

    FidoNews 4-28                Page 6                   27 Jul 1987


    Yoshi Mikami, November 26, 1986


                             FidoNet in Japan


    [Editor's note:  Sorry for  the  unusually  long  delay  on  this
    article.  It came to us via a very circuitous route.]


                          *** DOMESTIC NEWS ***

    FIDO/COLLIE SYSOPS' MEETING

    The  November  Fido/Collie  Sysops'  meeting  was   attended   by
    Tatsuyuki Arai,  Yoshi Mikami,  Maki Ohtoh and Junsei Yamada.  It
    was held on 11/14/86 at 7:00,  at Renoir coffee shop  (phone  03-
    493-1454)  near  the  east exit of Osaki Station in Tokyo.  Arai,
    Jun Moriya, John Takiguchi and Yamada had started this meeting on
    every second Friday of the month  from  last  August  to  discuss
    common FidoNet issues and concerns.  For Mikami and Ohtoh, it was
    the first time to meet these people.

    We  jointly  decided  that we will write to International FidoNet
    Association,  St.  Louis,  Missouri,  to get the  FidoNet  region
    number  for  Japan.  We  do  not  want  a host node under Pacific
    Region  12,  out  of  Honolulu,  Hawaii,  as  other  Asia-Pacific
    countries  such  as  Australia  and  New  Zealand  are operating.
    Mikami will write the letter.

    Arai wants to use the POLL and PICKUP functions on  the  receive-
    only  FIDO  node in Tokyo from his FIDO at home.  Those functions
    do not work properly for him.  Tom Jenning's  8/85  documentation
    that  he  has  does  not  explain in sufficient detail how to use
    these functions.  We will get assistance from Fido  operators  in
    U.S.

    We  know that there is a Usenet gateway,  run by Bob Hartman,  on
    FidoNet 101/101,  according to the 8/86 Fido documentation.  Does
    anyone know how to contact a Usenet node in Japan?

    Before switching to Fido, Arai ran Collie in October to find that
    Collie  handles the Japanese Kanji characters nicely.  (Ohtoh and
    Mikami have some Japanese messages in  their  systems.)  However,
    Collie  has  a minor problem in handling Japanese characters,  in
    the sense  that  some  Japanese  characters  are  interpreted  as
    Collie's  control characters.  We will write to D.  Plunkett when
    Jun Moriya returns from his trip to Australia to get the author's
    help (because he knows the technical details).

    Arai wanted to confirm,  and all the  meeting  attendees  agreed,
    that  FidoNet  in  Japan  will be operated on a non-profit basis,
    without discrimination of any kind.

    The  name  of  FidoNet  Japan  was  authorized  to  be  used   on
    Takiguchi's Fido BBS by Tom Jennings earlier this year, according
    FidoNews 4-28                Page 7                   27 Jul 1987


    to  Arai.   (The  Newsletter  Editor  doubt  that  this  has  any
    significance,  but it is documented here as this was discussed at
    the meeting.)

    Any  would-be  Fido/Collie  sysops  are  welcome  to  attend this
    monthly meeting.  The next meeting is on December 12, at the same
    time,  at the same place.  If English assistance is needed,  help
    will be provided.


    COLLIE NET TEST IN KANSAI AREA

    After some pioneering work in April and May 1986, the Fido/Collie
    activities  picked up in the Kansai area recently.  Geki Hagiwara
    provided the following experience report:

        *         *         *         *         *         *         *

        A BBS network FidoNet was formed and tested in Kansai area in
        Sep/Oct 1986.  Actually the software  was  Collie  (Colossus)
        which simulates FidoNet packet transfer protocol.  One of the
        reasons we chose Collie, not Fido, was that Collie resets the
        modem  every  time  the session is over.  It is believed that
        some  modems  cannot  detect  1200/300  and   CCITT/BELL   in
        particular  sequences.  In  such case resetting the modem may
        be effective.  Through our experience Hi-Modem  1200C  looked
        working satisfactorily.

        The members of TMCNET and their equipments are:

        NET NODE  Name          Area  Phone         H/W
        --- ----  ------------- ----- ------------  --------
        001  001  Joe Takemura  Osaka 06-674-1933   JX-5+HDD
             002  K.  Sawaguchi Osaka 06-XXX-XXXX   JX-4
        002  001  Geki Hagiwara Yasu  0775-86-0919  JX-4+HDD
             002  Ken Iwamoto   Kyoto 075-XXX-XXXX  JX-5
             003  Junji Tanaka  Shiga 0778-XX-XXXX  JX-5

        First, each node operator entered messages to several members
        and  the other sysops;  then we set Net mail time and watched
        how Collie sends and receives packets.  We had a hard time to
        find the best combination of  modem  initialization  commands
        and DIP switch setting. (We were helped by Maki Ohtoh.)

        We used the following MODMINIT.BBS file:

                ATX1
                ATH1
                (one blank line - wait 2 seconds)
                ATS0=1
                ATV0
                ATH0

    FidoNews 4-28                Page 8                   27 Jul 1987


        The Collie startup command was:

                A>COLLIE /2 /M2 /I1200 /C32
                         |   |   |      |____ Carrier mask bit
                         |   |   |____ Modem init. baud rate
                         |   |____ Modem type
                         |____ COM2 port

        The modem DIP switch setting was:

                SW1 DTR          OFF
                SW2 Result       no effective
                SW3 Return       ON (should have no effect)
                SW4 Echo         no effective
                SW5 Answer       no effective
                SW6 CD           OFF
                SW7 Tel.line     OFF (depends on phone line)
                SW8 Command      ON

        Although the modem operation was unstable like trying to call
        while  the  modem  is off hook,  the test resulted in a great
        success.  We just tested the network formed  by  JX  systems,
        but  this  network would not be open to public until the mail
        charge system is established.

        *         *         *         *         *         *         *

    For other details,  contact Hagiwara or Joe Takemura at  the  BBS
    sytem number (at night only) listed above.


    FIDO/COLLIE SYSTEMS IN OPERATION

    To our knowledge,  the following five Fido/Collie BBS systems are
    currently operating on regular basis:

        017-653-5181 ext. 226-7408, Loki BBS (Fido), by Jon
           Spelbring, 24 hours, 1200/300 (CCITT & Bell)
        045-761-9406, SurfSide Net (Fido), by Tatsuyuki Arai,
           24 hours, 2400/1200/300 bps (CCITT & Bell)
        045-894-7656, Collie Yokohama, by Maki Ohtoh,
           24 hours, 1200/300 bps (CCITT & Bell)
        0466-27-2077, Big Blue BBS (Collie), by Yoshi Mikami,
           10:00-11:30 PM Japan Std Time, 1200/300 (C&B)
        082-842-6401, Strawberry Doughnut Net (Collie), by
           Hitoshi Sugimoto, 10:30-11:55 PM JST, 200/300 (C&B)

    Fido Japan 03-432-0185 by John Takiguchi is temporarily closed.

    Mikami, Ohtoh and Sugimoto have been exchanging net messages very
    successfully at 10:45-11:00 PM time slot,  since  early  October,
    between Fujisawa/Yokohama and Hiroshima, a distance of 500 miles.
    After  much  experiment,  Infotech's  Hi-Modem  1200C  among  the
    several JATE-approved  Hayes-compatible  (AT-command  compatible)
    modems   was   found   to  handle  the  Fido/Collie  net  message
    transmission.  They would like to hear other people's experiences
    FidoNews 4-28                Page 9                   27 Jul 1987


    on other modems, because there definitely is a need here for good
    modem competition.

    Ken Sugimoto has translated most of the Collie  .MNU  files  into
    Japanese for easier operator interface,  and has been operating a
    Collie node since October,  somewhere near  the  Fish  Market  in
    Tsukiji, Tokyo.  We'll get his phone number shortly.

    We  do  not claim to know everything happening in Japan regarding
    Fido or Collie.  Please contact anyone of us to let  others  know
    what's going on.


    LETTER TO REQUEST JAPANESE REGION NUMBER SENT

    A  letter  was  sent  11/16/86 by Mikami to International FidoNet
    Association requesting a region number for Japan,  with copies to
    Tom  Jennings  (author  of  Fido  BBS  software) and Dan Plunkett
    (author of Colossus  BBS  sofware).  A  fifty  dollar  check  was
    enclosed  as  our  donation.  Copies  were  also  sent  to people
    mentioned in Item 1.a. above.


                        *** INTERNATIONAL NEWS ***


    MESSAGE EXCHANGE WITH HONG KONG

    Katsu Shintani called FIDO BBS in Hong Kong  00852-5-893-7856  in
    October.  This  is  the  nearest Fido/Collie BBS overseas that we
    know of.  In return,  Fido Japan and Collie Yokohama  received  a
    few messages from Hong Kong.


    ASSISTANCE TO OTHER ASIAN COUNTRIES

    There  are  several  FidoNet  systems  running  in  Australia and
    Indonesia according to  the  3/86  nodelist.  We  would  like  to
    identify  other Fido systems that may be operating in this region
    of the world.  We also offer assistance if help is needed to  set
    up Fido or Collie BBS in the Asia-Pacific countries.

    For  those  who  may  not  know,  Colossus  ("Collie")  is  Fido-
    compatible software that is beginning to be used this year.

    -----------------------------------------------------------------

    FidoNews 4-28                Page 10                  27 Jul 1987


    Chris Irwin
    Miami Shareware, 135/68

                                 MegaList
                       A Cross-System File Listing
                          (YOU can easily join!)


         I was in one of my more creative moods the other  day;  I've
    finally  written a system that I've wanted to for quite some time
    now:  MegaList.  The "MegaList" is an alphabetized  file  listing
    that combines the files from ALL PARTICIPATING Fido/Opus systems.
    If  you've ever needed a file,  but didn't know where to find it,
    the MegaList is a good place to look;  scan down the list for the
    file  you  need,  and listed next to it are the BBSs that have it
    online.

         The MegaList  is  available  for  download  or  SEAdog  file
    request from 135/68.  The following files are online now:

         MEGALIST.ARC/TXT    The National (unfiltered) MegaList
         MEGA-ARC.ARC/TXT    The National ARChive MegaList
         MEGA-TXT.ARC/TXT    The National TXT/DOC MegaList
         ML-UPD.ARC          MegaList Update Software

         YOUR  system  can  be  added to the NATIONAL MegaList if you
    simply run the update program,  ML-UPD.  This program will create
    an  update  file  based  on YOUR system information and FILES.BBS
    contents.  This data is then ARCed and Net-mailed to  135/68  for
    central collection.  The NATIONAL MegaList is updated each day at
    6:15AM and posted for download or file request.

         Placing your system in the MegaList will let the rest of the
    world  know what's on your system without everyone having to call
    and look.  The ML-UPD program is easy and only  takes  about  1-2
    minutes  to  run.  All  you  must do is send a MegaList update to
    Miami at least once every 45 days,  and you will be in the  daily
    MegaList update.

         As  of this writing,  I haven't released ML-COL,  the "host"
    processing/collection program.  I will be releasing  this  system
    in  its  entirety before the end of August.  If you're interested
    in creating a LOCAL MegaList for YOUR area, please contact me for
    the list creation software.


            Chris Irwin, Miami Shareware, 135/68
            (305) 232-9365  (300/1200/2400/9600-HST)

            Other Miami Shareware releases:  (as of July 14th)

            ARCMSG17.ARC    ARC and Purge message bases (Fido/Opus)
            MS-AR25.ARC     Accounts Receivable System
            MS-IC25.ARC     Inventory Control System

    -----------------------------------------------------------------
    FidoNews 4-28                Page 11                  27 Jul 1987


       AUTHENTIC SECURE SECRET FIDO MAIL WITH PUBLIC KEY ENCRYPTION

    INTRODUCTION
    ============
    This article was written by  Prodex  Labs,  for  examination  and
    comment  by  IFNA  (International  Fidonet  Association)  Sysops,
    members, Fidonet users,  and others interested in electronic mail
    and  security.  Prodex  Labs  (Lee  Rothstein,  Phil Zimmermann &
    Steve Welch)  is  very  much  interested  in  your  comments  and
    suggestions.

    PRODEX LABS, PUBLIC KEY ENCRYPTION & FIDO
    -----------------------------------------
    We  are now about ready to deliver C-based modules that can carry
    out public key encryption.

    We are writing this article because of the extreme  relevance  we
    see  of  public  key  cryptography to electronic mail.  We assume
    electronic mail is near and dear to your hearts, and we think you
    might be interested in the application of public  key  encryption
    to  Fidomail  and Fidonet transfers.  The discussion,  we provide
    here,  on public key cryptography aims specifically at electronic
    mail applications.

    Public   key   encryption   technology   allows   the  convenient
    distribution of messages through an electronic mail system secure
    against other  users,  sysops  ("superusers")  and  even  systems
    programmers.  It  allows  this security in the face of inherently
    insecure networks and hosts.  This we think is  a  feature  whose
    time has come.  We think it lends itself well to the expansion of
    Fidonet  services,  as well as the opportunity for Fido sysops to
    unobtrusively draw revenue  from  a  subset  of  Fido  services--
    specifically  those  that  have to do with private and commercial
    mail.

    Specifically,  we suspect the lack of privacy of  messages  (from
    Sysops  and  technotwits)  has  discouraged  the use of Fido as a
    national distribution medium  for  personal  mail,  and  business
    mail.  Second,  the  lack  of  an  authentication  mechanism  has
    discouraged  commercial  concerns  from  using  Fidomail   as   a
    distribution  mechanism  for  authentic  marketing  programs  and
    documents such as ads,  coupons and purchase  orders.  By  adding
    these commercial services to Fido,  the revenue produced could be
    used to subsidize  other  Fido  services  such  as  mass  storage
    (downloads) and Techline distribution (long distance charges).

    The authentication capability mentioned in the previous paragraph
    might   also   be  of  use  directly  to  Fidonet  as  it  grows.
    Authentication would allow nodes that are operating  in  a  store
    and  forward  sub-net  to prove their legitimacy prior to a relay
    operation.  Since we are not familiar with the daily  operational
    problems of Hosts,  we do not know if we have proposed a solution
    to a non-existent problem.

    Finally,  we think that the recent introduction of "Dutchie"  may
    be  one of the key ingredients to the success of the introduction
    FidoNews 4-28                Page 12                  27 Jul 1987


    and use of public key encryption in Fidonet.  For  those  of  you
    not  yet familiar with it,  Dutchie is the private delivery point
    implementation for Fidonet by Henk Wevers.

    SINGLE KEY ENCRYPTION: WHY PUBLIC KEY ENCRYPTION IS REQUIRED!
    --------------------------------------------------------------
    Public key encryption technology differs from the more well-known
    single key technology in that each person has two keys associated
    with  him/her--a  public  key,  and  a  private  key.  (DES--Data
    Encryption Standard--is the most well-known example of single key
    encryption.)

    In public key encryption, the public key is known by everyone and
    either  can  be looked up by the user from a table of keys versus
    user  names  or  automatically  looked  up  by  the  applications
    software (e.g., electronic mail software).

    In single key encryption,  Fred encrypts file 'nerd.msg' with the
    key "secret_potion".  When Bill wants to  decrypt  the  file,  he
    must  have  been  told by Fred what the key for decrypting (i.e.,
    encrypting) 'nerd.msg' is.  Specifically,  Bill must  supply  the
    key "secret_potion" to decrypt 'nerd.msg'.  If "secret_potion" is
    always associated with Fred's files,  then Bill knows the key for
    those files that Fred does not want him to see.  More succinctly,
    the decryption and encryption  functions  are  inverses  of  each
    other.  Symbolically:

        (1)  encrypted_file <- sk_encrypt(file, key)
        (2)  file <- sk_encrypt(encrypted_file, key) i.e., decryption
                                                     is encryption
                                                     and the key is
                                                     the same going
                                                     in both
                                                     directions

         The  above  notation assumes that objects with the same name
         and only objects with the same name are identical.

    Let's look at  the  consequences  of  the  logic  of  single  key
    encryption  within  an electronic mail system.  Anyone that wants
    to send secret messages to someone  else  must  either  know  the
    recipient's  one  and  only  secret key,  or relinquish their own
    secret key,  or maintain a list of secret keys  by  recipient  or
    file; not a very attractive alternative.

    What's  worse,  if  the  key  information  is  exchanged by users
    through the mail system,  then the sysop has a crack at the  key.
    This  seems  very likely when you consider that you probably want
    the mail system itself to  automatically  monitor,  maintain  and
    administer the keys because of the previously described problems.

    PUBLIC KEY ENCRYPTION
    =====================

    PUBLIC KEY ENCRYPTION EXPLAINED
    -------------------------------
    FidoNews 4-28                Page 13                  27 Jul 1987


    These  and  other problems can be made to disappear with a public
    key encryption  system.  The  public  and  private  keys  make  a
    matched, idiosyncratic set.  A file encrypted with the public key
    can  only  be  decrypted by the private key.  A file encrypted by
    the private key can only be decrypted by the  public  key.  These
    properties  can be used to significant advantage in an electronic
    mail system.  The obvious advantage of the public key  technology
    over  the  more normal single private key technology such as DES,
    is that a user does not have to give away his/her private key.

    Secrecy
    -------
    If you want secrecy in a message that you send  us,  you  encrypt
    the  message  with our public key and then we decrypt it with our
    private key.

    Signature Function
    ------------------
    If you want to authenticate a message as really coming from  you,
    you  encrypt it with your private key and then we decrypt it with
    your public key.  If your public key does not  make  the  message
    intelligible  then  it wasn't encrypted with your private key and
    therefore it didn't come from you--the one and  only  person  who
    has access to your private key.

    Secrecy & Authentication
    ------------------------
    The  secrecy and authentication encryptions outlined above can be
    combined sequentially to provide a complete framework of security
    for electronic mail.

    Symbolically, we could describe these properties as:

    If A were sending a message to B:

         (1)  encrypted_file <- pk_encrypt(file, public_key_B)
         (2)  file           <- pk_decrypt(encrypted_file,
              private_key_B)

              (1)  Would be used by the sender to achieve privacy.
              (2)  Would be used by the receiver to achieve
                   "legibility."

              AND

         (3)  encrypted_file <- pk_encrypt(file, private_key_A)
         (4)  file           <- pk_decrypt(encrypted_file,
              public_key_A)

              (3)  Would be used by the sender to achieve
                   authentication.
              (4)  Would be used by the receiver to prove
                   authentication and achieve "legibility."

    If we wished privacy and authentication in a message from A to B:

    FidoNews 4-28                Page 14                  27 Jul 1987


         (5)  double_encrypted_file <-
                   pk_encrypt(pk_encrypt(file, public_key_B),
                   private_key_A)
         (6)  file <- pk_decrypt(pk_decrypt(double_encrypted_file,
                   private_key_B), public_key_A)

              (5)  Would be used by the sender to achieve privacy and
                   authentication.
              (6)  Would be used by the receiver to achieve
                   "legibility", and prove authentication.

         In the above notation we again assume that objects with  the
         same   name   and  only  objects  with  the  same  name  are
         equivalent.

    OTHER REQUIREMENTS & PROPERTIES
    -------------------------------
    Several  other  properties  of  public  key  encryption   require
    explanation  to  fully  understand how security can be maintained
    and how a mail system can work.

    First,  the program that generates the key pairs  can  be  widely
    distributed  so  that  it  can be used by each user privately and
    securely.

    Second,  the algorithm that generates the  public  key  from  the
    private key is not reversible either by the generating program or
    by any other program a hacker would write.

    Third,  the kinds of keys generated and required by the encrypt /
    decrypt function(s) are on the order of  a  1000  bits.  This  is
    what  makes  trial  and  error  computation  of  the  private key
    extremely unlikely to the point of impossibility,  and also  what
    makes users generating like public keys unlikely.

    Fourth, the electronic mail nodes (for Fidonet, Fido nodes) would
    have  to  provide  a  key  server  function.   Once  a  user  had
    calculated his public key from a private key  he  would  have  to
    submit  it  to  a  node  to  be paired with his/her user ID.  The
    server function would also have  to  supply  the  public  key  to
    private  mail  sent  to the corresponding user ID.  Another major
    function of the key server is an automatic certification  process
    that  is  beyond  the  scope  of  a first release product or this
    paper.

    Finally,  for performance sake,  any reasonable implementation of
    public  key  cryptography  would transparently (unknown to users)
    invoke an internal method of single key encryption.  However, all
    user and crackers would ever (or could ever) see  is  the  public
    key mechanisms.

    IMPLEMENTING PUBLIC KEY ENCRYPTION WITHIN THE FIDO ENVIRONMENT
    ==============================================================

    THE IMPOSSIBLE DREAM
    --------------------
    FidoNews 4-28                Page 15                  27 Jul 1987


    If  we  were  to  directly  implement  an  automatic,  public key
    cryptography security system into  Fido  mail  that  would  avoid
    sysops  having  any  possibility of access to the private keys or
    the mail prior to encryption,  we would have  to  accomplish  the
    following:

    (a)  We  would  have  to add a secure mail option to the terminal
         emulation program.  We would  further  have  to  modify  the
         user's  terminal  emulation  program  so  that all mail text
         entered was encrypted before each line was sent by the  user
         to the mail edit/entry function on the BBS.

         There  are  some  outs  here,   but  they  are  pretty  well
         invalidated by several properties of  BBS  software.  First,
         mail  entry  is  designed  to  be an online editing activity
         rather than via upload.  Second,  the mail entry function is
         designed  to  handle pure text and not the binary files that
         result from encryption.  Third,  most  mail  input  software
         strongly  limits  the length and format (e.g.,  line length,
         blank lines,  use of tabs) of input messages.  If  one  uses
         "ASCII  transfer" capability there is a possibility the file
         will fail the length test  or  be  modified  by  the  format
         assumptions,  because  it was not edited with the length and
         format tests operative.  Fourth,  the prompting  feature  of
         the mail editor very often interferes with ASCII upload.

    (b)  We  would  have  to  make  modifications  to  the  BBS  mail
         edit/entry function  so  that  some  text  was  accepted  in
         unencrypted format (i.e., 'To:' and 'From:' information) and
         the remainder was in encrypted format (i.e.,  'Subject:' and
         body of message. ('From:' can be hidden if BBS Sysops do not
         object.)

    (c)  We would have to add a public key server function to the BBS
         that would maintain and  service  public  keys.  This  would
         also have to allow for the distribution of keys from node to
         node.

    (d)  We would have to make sure that encryption did not interfere
         with Fidomail routing line additions to the text body.

    This  theory  will  not  work  or  rather will not work without a
    ground swell of support for private mail.  We cannot get  control
    of  all  of  the  following  simultaneously:  (a)  user  terminal
    emulation software,  (b)  Fido  mail  entry  software,  (c)  Fido
    general  BBS  software,  (d)  Fido  networking  and mail exchange
    software.  How do we create the ground swell, then?

    FIRST STEPS
    -----------

    Step 1
    ------
    We develop two program functions (they may or may not actually be
    separate programs) that can be distributed via  Fido.  Currently,
    we  estimate  we  can  have  these  two  programs done within two
    FidoNews 4-28                Page 16                  27 Jul 1987


    months.

    The first program is a  DOS  (Unix  style)  filter.  It  has  two
    functions.  First,  given  one file that contains the private key
    and a second file that contains the text to  be  encrypted,  this
    first program,  which I will call 'pk_crypt',  provides an output
    file that is encrypted and can be decrypted with the public  key.
    This serves the authentication function.  Second,  'pk_crypt' can
    encrypt a file with public key so that it can be  decrypted  with
    the private key.  This provides the privacy function.

    The second program generates unique key pairs.

    Step 2
    ------
    Sysops  provide a message section and a coordinated file section.
    The message section allows users to notify each other that  there
    are  secure  messages  that  have been uploaded to the respective
    users that have been notified via  standard  Fido  text  message.
    The  file section is not only a safe (reliable,  not secure) port
    for uploaded secure message files but also for a single text file
    that contains a list of the mapping of user IDs to  public  keys.
    Users  upload  their  public  keys  as they generate them and the
    sysops collate these  standard  format  subfiles  into  a  single
    standard format public key-user ID list.

    We  will  provide  documentation  not  only  for  the  use of the
    program,  but also for how users can "certify" new users and  new
    keys,  since  we  will not at this stage be able to provide a key
    server automated certification process.

    Step 3
    ------
    Sysops provide a standard service that allows binary files to  be
    "attached to" Fidomail messages.  Nothing automatic is implied by
    the previous sentence.

    Step 4
    ------
    We would have to provide a mail function that from the same level
    of  menu allowed the entry of a text tag message into the message
    system, followed by the immediate upload of an encrypted (perhaps
    archived) file to the secure message file section.

    The inverse  of  these  two  processes  would  also  have  to  be
    provided.  Users  would  have to be able,  from the same level of
    message  menu,   to  first  read  a  tag  message,   and,   then,
    immediately, download the associated secure binary message file.

         .
         .
         .

    WHAT DO YOU THINK?
    ==================
    This  is  a  lot to lay on anyone in one swell foop.  What do you
    FidoNews 4-28                Page 17                  27 Jul 1987


    think  about  practically  any  of  this?   We   are   especially
    interested  in  your views and ideas as to how (or if) it can fit
    into Fidonet.  We await your responses.


    Lee Rothstein, Phil Zimmermann, Steve Welch


                           Prodex Laboratories
                           ------ ------------

                   COMPUTER AND COMMUNICATIONS SYSTEMS
                     PRODUCT DEVELOPMENT CONSULTING

         o    Computer and communications system product development:
              Software, Hardware & Integration
         o    Marketing requirements,  product,  business & strategic
              plans
         o    Market research
         o    New venture evaluation
         o    Technical   marketing,   marketing  programs,   seminar
              development
         o    Product definition,  architecture development,  systems
              engineering, human interface design
         o    Strategic information systems & computerized marketing

                            Lee D. Rothstein
                           Prodex Laboratories
                          7723 Arlington Drive
                         Boulder, CO  80303-3207
                         (303) 499-8716  (Voice)

    We can be contacted via any of these BBSes, or via FidoNet at one
    of these BBSes:

         o    Microlink B Fido.   Fido 104/108.   (303) 972-4181.
         o    Eighth Sea Fido.    Fido 104/610.   (303) 252-9235.
         o    Day's End Fido.     Fido 104/ 20.   (303) 650-5636.
         o    Mile Hi Tech Fido.  Fido 104/ 56.   (303) 973-9338.

    -----------------------------------------------------------------

    FidoNews 4-28                Page 18                  27 Jul 1987


    Patrick McDonald, 109/657

          Sirius v0.50 - The FOS-Compatible Message Base Manager

    "... and all I ask is a tall ship and a star to steer her by"
                                      --- Masefield

         Sirius,  a star in Canis Major also known as the  dog  star,
    has   been  guiding  mariners  in  the  Northern  hemisphere  for
    centuries. Sirius, the message base manager by Bob Klahn of 150/1
    will now add a new twist to  the  common  definition  by  helping
    solve your message base manipulation and navigation problems.  No
    matter  what  software  you  currently  use to interact with your
    Fido/Opus/SEAdog message base, Sirius has features that will help
    make it the message manager of choice on your system.

    In particular, Sirius 0.50:

    *  Provides universal context-sensitive help via the "?" key.

    *  Adapts its prompting to your  needs  and  level  of  expertise
       while keeping required keystrokes to a minimum.

    *  Supports one hundred message areas.

    *  Recognizes  EchoMail and NetMail areas,  and allows them to be
       addressed by name as well as by number.

    *  Edits new or existing messages with the  configurable  outside
       text  editor  of  your  choice,  or with its own line-oriented
       editor.

    *  Quotes replied-to message text with prefixing that YOU choose,
       and with the option to prefix the quoted author's lines only.

    *  Moves and copies messages to flat files,  to the  printer,  to
       other  message  areas,  low or high,  up or down,  and with or
       without "stamping".

    *  Groups messages logically, in ways YOU define, using a library
       of over three dozen Boolean,  integer,  and string  functions.
       Operations  may be performed on a message group as a unit,  or
       group definitions may be  used  to  filter  the  retrieval  of
       individual messages.

    *  Can  record  your  interactive  keystrokes  in script form for
       later playback.  Yes, Sirius will write your scripts for you!

    *  Allows its complete  functionality  to  be  accessed  locally,
       remotely, or through its automated scripts.

    *  Provides access to DOS from within the Sirius environment.

    The Basics
    ~~~~~~~~~~

    FidoNews 4-28                Page 19                  27 Jul 1987


         The  entire  interactive  interface of Sirius is designed to
    minimize the number of keystrokes entered.  Many of the main menu
    commands have lower submenus,  and commands  may  be  stacked  as
    appropriate,  with  white  space needed only when ambiguity might
    otherwise result.  In addition, the "?" character is available at
    all menus to provide context sensitive help to guide you along.

         As a message base manager,  Sirius provides you with all the
    usual  functions,  and  then some.  You may select a message area
    not only  by  the  usual  method  of  area  number,  but  by  the
    associated  EchoMail  area tag as well.  If you have many message
    areas or are in  the  habit  of  occasionally  reorganizing  your
    message areas,  this feature makes it easier to jump into an echo
    area.  The entire area name need not be specified when  utilizing
    this feature, but only enough to uniquely identify it.

         Messages  may  be  retrieved  in  a number of ways (forward,
    backward,  and by links),  and when retrieving messages it is not
    necessary  to  view the entire text.  You may tell Sirius to only
    view message text until a given text string is encountered  (such
    as 'SEEN-BY: '), and as indicated in the example, this is usually
    used to squelch the EchoMail routing information.

    Shifting into 2nd Gear
    ~~~~~~~~~~~~~~~~~~~~~~

         You  can do a lot more with messages than just retrieve them
    and display them to your screen.  Sirius  provides  features  for
    moving  messages  around  to  various  locations.  You  may  copy
    messages to a file (optionally either  appending  or  overwriting
    the file),  to your printer, or to other locations in the message
    system.  These "other locations" encompass copying the message to
    another area as well as different spots  within  the  same  area.
    When moving a message, you may optionally ask Sirius to include a
    "stamp" line in the copied message (much like the Opus forwarding
    information but much more concise).

    The Doctor's Office
    ~~~~~~~~~~~~~~~~~~~

        So, you want to change something about a message?  The Doctor
    function provides the means of changing virtually every aspect of
    a message IN PLACE,  including message header fields,  body text,
    flags,  and attach filenames.  The Body doctor is also a powerful
    tool all by itself,  providing a full-featured line-oriented text
    editor for the message body.  The line editor makes extensive use
    of PC editing keys while providing control key mapping for remote
    usage and local keyboards that don't have  these  keys.  Selected
    portions of the message body may be re-wrapped at will and to any
    line width that you like.  You may also import text from external
    files.  As  powerful  as  the editing features inherent to Sirius
    are,  you may need to do something to a message body not provided
    by  Sirius,  or  may  simply  have a preference for a full-screen
    editor.  This is no problem since  Sirius  provides  support  for
    editing  message  bodies  with  the  external text editor of your
    choice.
    FidoNews 4-28                Page 20                  27 Jul 1987


    ... And you may quote me on that!
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

         When replying to an  existing  message,  Sirius  provides  a
    quoting  feature that is unsurpassed by any other message system.
    You are not locked into any particular reply prefix,  but  rather
    may  specify  your  own "designer quote" to be used for prefixing
    selected portions of the text of the replied-to  message.  Sirius
    does  not  just  blindly  prefix the entire original message text
    when forming the reply-quoted message (although  it  can  if  you
    desire)  but  actually  has  the  ability  to  prefix  only those
    portions of the original message that ARE NOT  ALREADY  PREFIXED!
    This  becomes especially useful when responding to a message that
    already has text reply-quoted from one or more authors.

    Join the Group
    ~~~~~~~~~~~~~~

         Sirius provides a group definition facility that is  perhaps
    the  single  most  powerful  capability in its arsenal.  Using an
    extensive set of message-oriented  functions  and  an  expression
    formation language similar to many general programming languages,
    you  may  define  up  to  twenty-six different message groups.  A
    group definition may be  used  in  one  of  two  different  ways.
    First,  a  message group may be used as a retrieval filter.  That
    is,  by virtue of a group definition being in force,  the message
    area  appears  to  only  contain  messages  that  match the group
    specification.  This might be used for  something  as  simple  as
    only  considering  messages  addressed  specifically to you,  for
    example.

         The second use of a group definition is in conjunction  with
    group  operations.  Group  operations  mirror,  in some respects,
    those functions available for single messages (such as copying to
    a file,  deleting,  moving elsewhere) but act on the entire group
    of  messages  as  a  unit.  Some  of  these  group operations are
    unavailable in 0.50,  but will be there  in  0.51.  The  built-in
    functions for use in group definitions include the following:

        Boolean (Message Flags):

        @Private       @Xpress     @Received   @Sent
        @FileAttach    @InTransit  @Orphan     @KillSent
        @Local         @Hold       @FileReq    @AuditReq
        @ReceiptReq    @UpdateReq

        Boolean (Other):

        @FromYou       @ToYou      @NoBody     @ReadOnly

        Integer Functions:

        @DaysHere      @DaysOld    @FileSize   @Zenith
        @HighMsg#      @LowMsg#    @Msg#       @MsgCount
        @NetFrom       @NetTo      @NodeFrom   @NodeTo

    FidoNews 4-28                Page 21                  27 Jul 1987


        String Functions (case insensitive):

        @From          @To         @Subject    @Header
        @Body          @Msg        @Keyin

    Sirius provides the usual conditional operators (EQ,  NE, GT, LT,
    GE, LE, AND, OR), as well as some additional ones:

        CO     contains
        NC     does not contain
        IN     is contained in
        NI     is not contained in

    A few simple examples of Sirius expressions will make  clear  the
    power intrinsic in their usage:

    1. @ToYou OR @FromYou

    This expression will match only those messages that are to you or
    from you.

    2. @ToYou AND @Private

    This expressions will match those messages addressed to you which
    are private.

    3. @From CO 'arcmail' AND NOT @Local

    This expression would match your inbound ARCmail attach messages.

    4. @DaysHere GT 7 AND @InTransit

    Suppose  you  are  a hub and want to identify those messages that
    have been sitting waiting for delivery for more than  a  week  (a
    possible indication of trouble)?  This will do it.

    5. @Msg CO 'Heinlein'

    A science fiction fanatic?  This will find those messages related
    to your favorite author.


         As  is  the case elsewhere,  the Sirius expression parser is
    built with the  user  in  mind.  When  entering  a  Sirius  group
    definition,  you  need  only type enough to uniquely identify the
    token, and Sirius will fill in the rest automagically.

    Shifting into High Gear
    ~~~~~~~~~~~~~~~~~~~~~~~

         What has been mentioned before,  but which  might  not  have
    been  truly  appreciated  until  now,  is  the  fact  that Sirius
    provides a scripting language that allows you to do anything from
    a  script  that  can  be  done  online  (including  creating  new
    messages,  replying  to  old ones,  etc...).  The script language
    uses a Lisp-like syntax,  and the verbs match  exactly  the  menu
    FidoNews 4-28                Page 22                  27 Jul 1987


    commands  which  you  use  online,  including a conditional and a
    while loop construct driven by  the  same  types  of  expressions
    listed  above.  Sirius scripts may call other Sirius scripts in a
    nestable fashion,  and I/O commands allow you easily design menus
    and other forms of interaction with the user at the keyboard.  In
    combination  with  DOS  parameterized  batch files,  your Sirius-
    driven system can almost  run  itself  in  some  respects.  As  a
    simple example, consider the following script:

    (View (Xpertise (High))
     View (Continuous)
     Area (NetMail)
     Group (Define (@ToYou AND NOT @Received))
     0 Next
     ! (While (@Msg# LE @HighMsg#))
        Copy (Flat file ('NEWTOME.TXT'))
        Next
        ! (End)
     Quit (Bbs))

         This  simple  script  will append all of the new messages to
    you in your netmail area to the file NEWTOME.TXT in your  current
    directory.  For  the new Sirius user who might want to dive right
    in writing Sirius scripts,  there is a recording option that  you
    may  use  to allow Sirius to write the script for you,  simply by
    recording  in  the  proper  format  operations  that  you   enter
    interactively.

    Winding Down
    ~~~~~~~~~~~~

         Sirius  is  still  a growing project.  Many enhancements are
    planned and  there  is  an  active  national  Sirius  echo  being
    coordinated  by  150/1.  The Sirius author,  Bob Klahn,  is quite
    receptive to user suggestions for Sirius enhancements.  There are
    subtleties and details to Sirius that were  not  appropriate  for
    inclusion  in  this  brief  introduction.  At  the  time  of this
    writing,  there does not exist a single,  comprehensive,  set  of
    documentation for Sirius.  This problem is being addressed by the
    Beta  Test  Group and hopefully will be remedied shortly.  In the
    interim,  there does exist a complete set of  release  notes  for
    Sirius  that  cover  major features,  and these combined with the
    online help and sample  scripts  shipped  with  Sirius  serve  to
    offset  the lack of formal documentation.  The best bet for a new
    Sirius user is simply to dive in and try  it  (and  to  join  the
    Sirius  echo  where  experienced  users will be able to lend some
    help).  Bob's practice in  the  past  has  been  to  release  new
    versions  of  Sirius  on  a  regular  schedule.  Due to the major
    enhancements  in  version  0.50  (most  dealing  with  the  group
    definition  facility),  this  latest version has been almost four
    months in development and testing,  and we are sure you will find
    it worth the wait.

    -----------------------------------------------------------------

    FidoNews 4-28                Page 23                  27 Jul 1987


    Mike Brisson
    The Augusta Forum 360/1

                      THE SPORTSNET ECHO CONFERENCE

    The SportsNet Echo Conference was started by the Augusta Forum in
    February of this year to give FidoNet boards  a  chance  to  talk
    coast  to  coast  about  their  favorite  sports  topics.  Almost
    everyone has at least a little interest in sports of one type  or
    another,  either  as a participant or a spectator ...  if you do,
    this conference is for you.

    SportsNet is NOT just a "my team's better than yours" conference!
    It is a place for discussions about  WHY  teams  or  players  are
    better  ...  or  worse.  On  SportsNet you have to be prepared to
    discuss your  choices  for  the  World  Series,  Super  Bowl,  or
    whatever ... someone's bound to differ with you.

    You'll find a place for participants, spectators, and media.  The
    net  has had discussions among bicycling racers ...  and also has
    heard from a TV station director.

    Of course,  the obvious sports  (football,  baseball,  etc.)  are
    discussed  but  there's  also  lively discussion about the lesser
    known ones (we've even gotten into  snake  handling  and  buffalo
    chip throwing)!  What-ever the sport, we'll discuss it.

    SportsNet  can be a learning place,  too.  If you don't know what
    an ERA (base-ball) or a blue line (hockey)  are,  you  can  learn
    those  things  there.  Also,  the  conference has a weekly trivia
    quiz, possibly the first of its kind among echo conferences.

    Football fans will  find  a  place,  this  fall,  to  test  their
    prediction  skills  on  NFL games,  and possibly selected college
    games as well.

    If  you're  not  already  a  part  of  SportsNet,  this  is  your
    invitation to give us a try.  We aren't one of those 100-message-
    a-day  conferences  that  sometimes  can overwhelm a newcomer ...
    we're still small enough for anyone to fit right in.  We do  have
    boards  in  New York,  Baltimore,  Pittsburgh,  Dallas,  Indiana,
    Arkansas,  and Oklahoma,  as well as  most  of  the  Southeastern
    states.  If  you're  interested  in SportsNet,  drop me a NetMail
    message.  We'd like to have you join us!

          SportsNet Host:  Mike Brisson
          Host Sysop:  Ed Meloan
          Host System:  Augusta Forum (360/1), N. Augusta, SC
          Host System Numbers:  (803) 279-4124 or 279-5392

    -----------------------------------------------------------------

    FidoNews 4-28                Page 24                  27 Jul 1987


    =================================================================
                                 COLUMNS
    =================================================================

    Glen Jackson
    Broadcast Software
    SEAdog/Fido 100/517

                          Where are we at Now ?

    We're still at it,  going strong in the echos.  We've added  some
    more nodes. Colorado is a real busy state with the Broadcasters.

    If  you  know  of  any  BBS's  (in  the  net or not) that address
    themselves to the  broadcasting  Industry,  drop  us  a  line  at
    100/517.

    If  you  are in the industry,  we welcome your call and feedback.
    We'll point you to the closest node involved in our echos.

    We're here to encourage communications among the  industry.  Here
    we are, a communuications group, and we rarely talk to each other
    across the country. Why would we want to?

    To exchange information. Information on what we use our computers
    at  work for.  How we use them.  Programs that benefit all of us.
    How about issues that will be or do affect us?  In such a  highly
    competetive  market,  are  we  so  afraid we'll help someone else
    grow???

    We want to invite you to become a part of our growing echos.  One
    of  the echos is not limited to broadcasters only.  It is a place
    that the public can talk with the people  in  the  industry.  The
    decision makers. People with the answers.

    If  you'd  like  to  become  a  part of our growing family in the
    Broadcast Echos, let us know.  You don't need to run a broadcast-
    specific  board to do so.  We can be reached by routing a message
    to us at 100/517 - or calling direct at 314-928-2501.

                      Broadcast Software Industries
                     > Home of the Broadcast Echos <

    -----------------------------------------------------------------

    FidoNews 4-28                Page 25                  27 Jul 1987


                   -- The Regular Irregular Column --
                               Dale Lovell
                               1:157/504.1

         Things are  going very  well this past week. I've found some
    more programs that will run with SIMCGA (Ancient Art of War and a
    few others  by Broderbund). In addition, I'm finally getting used
    to this new keyboard. My old XT had an original  PC style layout,
    but with  10 function keys at the top and a cursor pad as well as
    a numeric keypad. The keyboard with  the AT  is one  of the "new"
    101 key style keyboards, 12 function keys and such. I'm still not
    entirely used  to it,  but things  are a  lot easier  after a few
    weeks of  use (and  some customizing with SuperKey). Just goes to
    show how flexible the human mind can be when it has to adjust.

    -- Ventura Publisher Version 1.1 (Xerox, List $895.00) --

         Some of you may recall  how  much  I  liked  version  1.0 of
    Ventura Publisher  when I  got to  try it  out a few months back.
    Well Xerox has been busy working on an update, and  it improves a
    product I wouldn't have thought could be improved. On the surface
    it still looks (and acts) the same, but  once you  get beyond the
    initial  pull  down  screens  it  has a lot of new (yet familiar)
    functions and improvements. While it costs  $100.00 to  update to
    the  new  version  of  Ventura,  it is money well spent (the list
    price is still the  same,  it  didn't  go  up).  Even  the manual
    appears to be written better than the version 1.0 manual.

         I still  thinks it's amusing that Xerox's DeskTop Publishing
    program supports  PostScript  printers  better  than  Xerox's own
    printers. PostScript  users will  greatly appreciate  some of the
    new features in 1.1. The font  names now  match the  names you're
    used  to  calling  them,  and  Ventura  lists  all  of  the Adobe
    supported fonts. If you have something like the QMS PS800+ (or an
    Allied Linotronic  typesetter), you  won't have to do anything to
    make Ventura know about your additional fonts. Instead of the box
    selections of  fonts and sizes in 1.0, you now see something that
    resembles the box you're used to using to select files (only they
    aren't files,  they're several dozen fonts). You are also free to
    enter the point size of the font, no limitations under PostScript
    (other  than  those  your  printer  has built into it). If you're
    using download fonts to your PostScript device, it's very easy to
    tell Ventura  about them.  Once told,  it will download the fonts
    you're using automatically. While Ventura still doesn't take full
    advantage of  PostScript's powerful capabilities, it brings it up
    a step from the previous version (and while I'm not sure, I think
    it beats PageMaker's PostScript support).

         In  version  1.0  there  were  some  wonderful features when
    bringing in a short text file, or some  form of  art. Ventura 1.1
    increases it's list of generally useful features by being able to
    make these frames follow a specific part of the main text around.
    Xerox calls  this "anchoring"  a frame  to text and may be reason
    enough for many people to spend  the  $100  on  the  upgrade. The
    reasoning behind anchoring a picture to text is that pictures are
    meant to go along with the text. An  example would  be a business
    FidoNews 4-28                Page 26                  27 Jul 1987


    report with several graphs, each graph goes along with a specific
    part of the report.  You  certainly  wouldn't  want  the employee
    attendance graph  to be  above the  section of the report dealing
    with quarterly sales, would you? Yet  this is  exactly what could
    happen if you added a few paragraphs of text or added the company
    logo to the top of the report. Ventura 1.1 puts an end  to having
    to  manually  readjust  every  graphics  (or text) frame when you
    change an earlier part of the publication. The  frame will follow
    the text  around every  time you make a change and Ventura allows
    you to anchor frames to text so that the frame will appear above,
    below or  on the  same page as the text it accompanies. I can see
    this having a large impact on the educational community as thesis
    papers  (especially  in  the  sciences,  maybe even the arts as I
    think  about  it)  won't  have  to  be  such  monumental efforts.
    Including  a  relevant  graph  in  the  text of the paper becomes
    trivial, and it will always show up where it belongs.

         One of the nicer additions to  me personally  is the support
    for Macintosh  MacPaint and PICT files. The MacPaint file support
    is nice because I have several of these already on my system. You
    may know  them better  as READMAC  pictures. All  of these can be
    brought right into Ventura. I no longer need to find a program to
    convert them  into PC  Paintbrush or  GEM Paint files. Sysops may
    see a renewed interest in their READMAC file area as people start
    looking around  for digitized  pictures to put into their work. I
    know I've spent quite a bit of time the past  week looking around
    several of the local boards and downloading such files.

         There are a few disappointments in Ventura 1.1. In the front
    of the  manual  there  is  an  errata  sheet.  While  support for
    Hewlett-Packard DDL  printers and Windows clipboard line art were
    not able to be included in this release  of Ventura.  It seems HP
    still hasn't  finalized the specification for DDL (not to mention
    not  shipping  any  printers   that  use   DDL)  and   until  the
    specification in finished and the printers shipped, Ventura won't
    support it. The Windows clipboard line art is  supposedly missing
    because   Xerox   has   been   unable   to  obtain  the  complete
    specifications on the metafile format. Support for both  of these
    items is  promised however,  and Xerox gives you a number to call
    if you need support  for DDL  or Windows  clipboard line  art. As
    soon as it is ready, they'll send it out to you.

         Overall I am still impressed with Ventura Publisher. Version
    1.1 includes  enough new  items (as  opposed to  bug fixes, which
    weren't to  many from what I hear) to make it a solid improvement
    over version 1.0. The  new  features  only  add  to  an excellent
    product. I may be prejudiced, but I think this product is an easy
    winner  over  PageMaker.  Most  of  the  people  in  the LASERPUB
    echomail conference  also seem  to think  the same  way. The only
    complaint I can recall on Ventura was due to someone  not knowing
    how  to  do  something  (as  opposed  to  not  being  able  to do
    something). If  you're going  to have  to buy  a page composition
    package in  the near  future, do  yourself a  favor and go find a
    dealer who really knows how to use Ventura and have  him give you
    a demonstration.

    FidoNews 4-28                Page 27                  27 Jul 1987


    -- WordPerfect 4.2 (WordPerfect Corp., list price $495.00) --

         I'll admit  it, I've been using WordPerfect for the past few
    weeks and haven't admitted it until  now. I  conned my  boss into
    buying it  for me at work and have been getting used to it before
    I "reviewed" it. I didn't want to say anything right away because
    it takes  me awhile to become accustomed to a new word processor.
    I didn't want to make the mistake of  saying it's  a poor product
    just because  I hit control-K Q to exit (Wordstar style commands)
    when it wants F7 Y Y (WordPerfect). I must admit that I  hated it
    when  I  was  still  becoming  accustomed  to  it,  but  am now a
    WordPerfect convert  and am  seriously considering  buying a copy
    for home  as well.  After getting  used to  how the function keys
    work (WordPerfect uses all 40 combinations on the  function keys;
    alone, alt-key,  ctrl-key, and shift-key) it is a remarkably easy
    word processor to use. My  boss  also  purchased  the WordPerfect
    Library, although I won't start going over it until next week.

         One of  the first things I noticed about WordPerfect is that
    it is fast. Supposedly this  is  because  WordPerfect  is written
    completely  in   assembler  while  many  other  word  processors,
    Microsoft Word included, are written in a mix of C and assembler.
    I don't know if this is actually true, but I do know that it is a
    lot quicker than Word. While it  doesn't do  some of  Word's nice
    displays,  in  many  cases  it's  easier  to use WordPerfect than
    Microsoft Word. In Word  I  could  only  spell  check  the entire
    document and that could take a long time (go to the library, tell
    it I want to do a spell check, etc.). WordPerfect  let's me check
    either  a  word,  page  or  entire  document.  I've  become  very
    accustomed to hitting Ctrl-F2 1  and  checking  the  word  I just
    entered.

         While  it  doesn't  have  Word's  style sheets, it does have
    built in macros;  either  the  Alt-key  variety  or  as  an eight
    character name.  The only  thing it is sadly missing is an editor
    for the  macros (they  aren't stored  in a  straight ASCII format
    like Superkey's  macros). In order to get a macro editor you must
    purchase the  WordPerfect  library.  The  macros  aren't  hard to
    learn, and in many cases are much more flexible than Word's style
    sheets. One of the first things I did when I started playing with
    it's macros  was create  one for  the start  of these columns and
    another with the complete signature. I used a variety of Superkey
    macros to  do this  in Word  and while  they were very similar, I
    decided to learn how to  do  it  in  WordPerfect.  If  you aren't
    familiar with  keyboard macros,  it's basically  a way of turning
    several keystrokes into one  (although that's  a weak comparison,
    it's the best I can do for now).

         Overall I've  been very  impressed with  it. While I haven't
    really gone into it very deeply, bear with  me over  the next few
    weeks while  I keep  learning more about it. Right now I can tell
    that it's going to become my word processor  of choice  (at least
    until I  come across something I like better). I just wish I been
    using it when all  I had  was a  4.77 mhz  XT, the  difference in
    speed would  have been  very nice. If you're looking around for a
    new word processor, I would definitely  say try  out WordPerfect.
    FidoNews 4-28                Page 28                  27 Jul 1987


    It is  fast, powerful,  and fairly easy to use. My biggest advice
    is to give yourself a chance to get used to it before  you decide
    against it.  I'll still  probably use Word when I'm looking for a
    variety of fonts (especially if I ever get a laser printer) since
    Word handles different fonts better than WordPerfect, but for all
    my other work I'll be using WordPerfect.

    -- Winding Down... --

         I've found a book  that may  help many  of you  as you break
    away  from   BASIC  into   Pascal  or  C.  It's  called  "Puzzled
    Programmers" by Michael Wiesenberg (Microsoft Press $12.95). It's
    a little  different as  it has several short stories accompanying
    each problem (of which there's  fifteen)  and  while  the problem
    doesn't actually relate to the story, they make for cute reading.
    Also included are hints to every problem as well as the solution.
    The solutions  are presented  in BASIC,  Pascal and C. One of the
    things Wiesenberg was  trying  to  accomplish  was  to  aid those
    learning a  new language. All three solutions to each problem use
    the same basic algorithm, so you can examine the solution  in the
    language  you  already  know  and  compare  it to the one you are
    trying to learn. This is supposed  to help  you see  how they are
    similar, and  how to  take advantage of the special techniques or
    principles  of  the  different  languages  (like  being  able  to
    initialize several  variables at the start of a loop in C). Since
    I already know all three of the languages used, I  wasn't able to
    really learn  anything with this book, but I can see how it might
    help someone  learn about  a new  language. The  problems are all
    mathematical problems,  several of  which could be solved without
    the aid of a computer. The hints rarely tell you  how to  write a
    program,  they  merely  guide  you  along  the way by helping you
    figure out how to solve a problem.

         I really support this method of learning. I've seen too many
    Computer Science  or MIS people graduate with honors and yet have
    no idea on how to solve  problems. To  many courses  on computers
    only deal  with syntax  and modifying  an existing program, often
    given to the students in  a  lecture  or  text,  to  do something
    slightly different.  To much of programming is determining HOW to
    do  something  to  ignore  teaching  the  students  how  to solve
    problems (or as I call it, thinking...but I'm fairly sarcastic in
    my attitudes these days). Books like this can  help out  those of
    you trying  to learn  how to  program more than many of the other
    books I've recommended  in  this  column.  Most  of  the  books I
    recommend already assume you can determine the steps necessary to
    accomplish a task, I think "Puzzled Programmers" will  help teach
    you this necessary skill. As I look over this paragraph I realize
    that I starting to climb up on my soapbox again, so I'm  going to
    wind  up  by  giving  high  marks  to  MIchael Wiesenberg on this
    excellent book.

         As always down below  you'll find  my US  mail address, uucp
    address and  FidoNet address.  If you're  sending me mail through
    FidoNet, please have your sysop route it through 157/1 (or 157/0)
    as I  am a  private node.  I'd like  to thank any of you I missed
    answering. While I try to  answer  every  message  (electronic or
    FidoNews 4-28                Page 29                  27 Jul 1987


    otherwise) I  receive, I'm  not the most organized person and I'm
    fairly certain  I missed  a few  somewhere. I'm  still waiting to
    hear from  the person  using the pseudonym "Ender Wiggin," unless
    you're worried about Jane eavesdropping? (for an understanding of
    this  read  "Ender's  Game"  and  "Speaker for the Dead" by Orson
    Scott Card). I'd like to thank  you  for  the  package  you sent,
    although I don't have much use for it now. Hope to see all of you
    at FidoCon.


    Dale Lovell
    3266 Vezber Drive
    Seven Hills, OH  44131

    FidoNet  1:157/504.1
    uucp:

    decvax\
           >!cwruecmp!hal\
    cbosgd/               \
                           >!ncoast
          ames\           /
       talcott \         /
                >!necntc/
       harvard /
       sri-nic/


    -----------------------------------------------------------------

    FidoNews 4-28                Page 30                  27 Jul 1987


    =================================================================
                                 NOTICES
    =================================================================

                         The Interrupt Stack


     1 Aug 1987
       Third Annual BBS Picnic in Edison, NJ.  Please register before
       July 10th.  Admission is $7 for adults, $4 for 12 and under,
       free for 5 and under.  Contact John Kelley at 107/331 for
       details.

    20 Aug 1987
       Start of the Fourth International FidoNet Conference, to be
       held at the Radisson Mark Plaza Hotel in Alexandria, VA.
       Contact Brian Hughes at 109/634 for more information.  This is
       FidoNet's big annual get-together, and is your chance to meet
       all the people you've been talking with all this time.  We're
       hoping to see you there!

    24 Aug 1989
       Voyager 2 passes Neptune.


    If you have something which you would like to see on this
    calendar, please send a message to FidoNet node 1:1/1.

    -----------------------------------------------------------------

                         Latest Software Versions

    BBS Systems            Node List              Other
    & Mailers   Version    Utilities   Version    Utilities   Version

    Dutchie        2.51    EDITNL          3.3    ARC            5.21
    Fido            11w    LISTGEN    05.25.86    ARCmail        1.00*
    Opus           1.00*   Prune          1.40    EchoMail       1.31
    SEAdog         4.00    TestList        8.3    FastEcho       2.00
    TBBS           2.0M    XlatList       2.81    Renum          3.30

    * Recently changed

    Utility authors:  Please  help  keep  this  list  as  current  as
    possible  by  reporting  new  versions  to  1:1/1.  It is not our
    intent to list all utilities here,  only  those  which  verge  on
    necessity.

    -----------------------------------------------------------------

    FidoNews 4-28                Page 31                  27 Jul 1987


                        OFFICIAL REGISTRATION FORM
                 FOURTH INTERNATIONAL FIDONET CONFERENCE
                        RADISSON MARK PLAZA HOTEL
                             ALEXANDRIA, VA.
                           AUGUST 20 - 23, 1987

        Name _________________________________     Date _____________
        Address ______________________________
        City & State _________________________
        Phone (Voice) ________________________
        Net/Node Number ______________________
        Phone (Data) _________________________

        Number in Your Party _________________
        Staying at the Radisson? _____________
        Number of Rooms? _____________________
        Arrival Date? ________________________
        Departure Date? ______________________

    Registration Fees:                         How Many        Total

        Full Conference        $60.00 each     ________    $________
        Late registration      $10.00 each     ________    $________
             (after Aug. 1)

        Friday Night Banquet   $30.00 each     ________    $________
        Saturday Luncheon      $16.50 each     ________    $________

        Total Amount Included (Registration and Meals)     $________

    IFNA MEMBERS ONLY:
        How many in your party will
        be attending the Sunday morning
        Board of Directors meeting?            ________

    Send your registration form and a check or money order to:

                 Fourth International FidoNet Conference
                212 E. Capitol St., Washington, D.C. 20003
              Attn: Brian H. Hughes -- voice: (202) 543-4200

    This registration form does not include hotel  accomodations.  If
    you wish to stay at the Radisson Mark Plaza Hotel, please contact
    them  directly  and  mention you are with the FidoNet Conference.
    Conference  room  rates  are  $80/night  for  single  or   double
    occupancy, and $20/night for an extra cot.

                        Radisson Mark Plaza Hotel
                5000 Seminary Rd., Alexandria, Va.  22311
                              1-800-228-9822

    -----------------------------------------------------------------

    FidoNews 4-28                Page 32                  27 Jul 1987


    Bob Morris 141/333
    Chairman, Elections and Nominations Committee

    The next two pages are your Official ballot for the  Election  of
    the  IFNA  Board  of  Directors.  The following are the few rules
    which must prevail in this election:

    1. You must send a legible copy of this  ballot  to  the  address
       listed  on  the  ballot.  It  must  be  signed  and  bear your
       net/node number.

    2. You  may  vote  for  any  one  person  in  your region for the
       position of Regional Director.  This vote is to be cast in the
       LEFT column of the ballot.

    3. You may vote for any eleven people  in  any  regions  for  the
       position  of Director at Large.  These votes are to be cast in
       the RIGHT column of the ballot.

    4. Voting will continue until the  end  of  registration  at  the
       Conference  in  August.  The  results  will be read during the
       opening of the business  meeting  on  the  first  day  of  the
       conference.

    5. Write-in Votes will be accepted and are requested during  this
       election.



    FidoNews 4-28                Page 33                  27 Jul 1987


                         IFNA Board Of Directors
                                  Ballot

                             Regional         At Large
    Region 10:
        Steve Jordan         _________        ________


    Region 11:
        Ryugen Fisher        _________        ________
        Theodore Polczynski  _________        ________


    Region 12:


    Region 13:
        Don Daniels          _________        ________
        John Penberthy       _________        ________
        Thom Henderson       _________        ________
        Gee Wong             _________        ________
        Brian Hughes         _________        ________


    Region 14:
        Ben Baker            _________        ________
        Ken Kaplan           _________        ________
        Brad Hicks           _________        ________


    Region 15:
        David Dodell         _________        ________
        Larry Wall           _________        ________


    Region 16:
        Bob Hartman          _________        ________
        Hal Duprie           _________        ________


    Region 17:
        Rob Barker           _________        ________
        Bob Swift            _________        ________


    Region 18:
        Wes Cowley           _________        ________
    FidoNews 4-28                Page 34                  27 Jul 1987


    Region 19:
        Mark Grennan         _________        ________
        Wynn Wagner          _________        ________


    Region 2:
        Henk Wevers          _________        ________


    Write-in candidates:
        ___________________  _________        ________
        ___________________  _________        ________





       Name ______________________________  Net/Node ___________

       Signature______________________________  Date ___________


    Please complete this and mail it to:

             Robert Morris
             IFNA Elections Committee
             210 Church Street
             West Haven, Ct.   06516

    or bring it with you when you come to the conference in August.


    These  ballots  will  be counted by myself since with 200 members
    the charges for a CPA would be very high.  Hard  copies  will  be
    made  available  to  anyone wishing to insure that their vote was
    included.

                              Thank You

                              Bob Morris
                              Elections and Nominations Committee

    -----------------------------------------------------------------