home *** CD-ROM | disk | FTP | other *** search
Text File | 1994-04-17 | 37.9 KB | 1,017 lines |
-
-
-
-
-
-
-
- €€flflflfl
- €€‹‹‹‹ flfl€€flfl €€flflfl €€flfl€ €€ flfl€€flfl €€ €
- Õ ÕÕ ÕÕ ÕÕÕ ÕÕ ÕÕ ÕÕÕ
- ‹‹‹‹‹€ €€ €€‹‹‹ €€ € €€‹‹ €€ €€ €
- 5.0 (c) 1995 David Smith All rights reserved
-
- -= A complete code re-write =-
- -= OFFICIAL RELEASE =-
-
-
- You can order Stealth using your Visa/MasterCard!
- Call 1-800-242-4775 and specify order #11241
-
-
-
-
-
-
-
-
-
-
- ========== QUICK START ! ==================================================
-
-
- Put STEALTH.EXE in a "test" directory containing some archives.
-
- Make sure STEALTH.EXE is in your "PATH=" statement.
-
- Type: STEALTH.EXE
-
- Now watch as all the archives are converted to your favorite
- compressor! This program finds them all: PAK ZIP HAP SQZ LZH
- plus tons more, then converts them to your 'favorite' archiver.
-
- Now type: CD\
-
- Notice that STEALTH.LOG has been written there. Use EDIT.COM
- from DOS 5+ and look at it. Just type: EDIT STEALTH.LOG
-
- All action from Stealth has been written, including dates, times
- and DOS commands that it used.
-
- Type: STEALTH /? for a quick help screen!
-
-
-
- =============================================================================
-
-
-
- Advanced users: Welcome to the world of Stealth. This program
- is quite unique, because it will convert ANY archive to ANY
- other archive. The advantages of this over other competition
- programs (like ZZAP, SHEZ, etc...) is:
-
- ˛ It supports every major archiver available! ARJ, ARC, LHA,
- HAP, SQZ, DWC, PAK, ZIP 1.1 and 2.0, ICE, LHARC, LARC, UC2,
- HYPER, SDN, FCOMPACT, LIMIT and ZOO.
-
- ˛ It can recognize PKZIP 1.1 files and PKZIP 2.0 "normal"
- compressed files, then convert them to PKZIP -EX "extra"
- compression. This will save you a ton of hard disk
- space!
-
- ˛ Allows using LHA SFX self-extracting archives to be the
- "target" archiver. That makes distribution of your
- archives easy, since the recipient does not need a
- program to un-archive your files!
-
- ˛ Use ENVIRONMENTAL variables to "customize" your version.
-
- ˛ Allows REMOVAL of a file's comment to a separate file.
-
- ˛ Supports VENDINFO.DIZ: The new standard in vendor and BBS
- information. The FIRST util to support this.
-
- ˛ Uses MULTIPLE config files, so you can completely change
- Stealth's operation from a batch file.
-
- ˛ Leave PKZIP and ARJ -AV files alone, plus virus scanning
- using any of the three most popular scanners!
-
- ˛ Recognizes embedded directories, and can include them with
- the conversion.
-
- ˛ Is perfect for SYSOPS, since it can be run as an "event" to
- update all .ZIP files, or be used as an upload processor.
- Even add comments or strip them from the files...
-
- ˛ You can "customize" STEALTH to almost any configuration.
- Include some archives, but not others, recurse subdirectories,
- leave SFX files alone, delete files after processing,
- plus MORE.
-
- ˛ Keeps an accurate log of all activity.
-
- ˛ Lists archived files using its own 'internal' compression
- viewer (super-fast!).
-
- ˛ Allows overriding Stealth.cfg options on the command-line.
-
- ˛ You can add extra BBS advertisements, add only your comments,
- or evaluate the current files.
-
- ˛ Re-comment your entire BBS file area with ONE command.
-
- ˛ You can NOW pause, shell to DOS, or stop the program
- by just pressing a key.
-
- ˛ Search archives for FILE_ID.DIZ, DESC.SDI, *.SDA
- {SDA.ID} or VENDINFO.DIZ
-
-
-
-
-
- No other utility can do this! Plus STEALTH recognizes even
- DWC, SQZ, and LARC self-extracting files. Please notice
- that NO OTHER ARCHIVE program can do that.
-
- Is hard disk space important? That PKZIP file you downloaded
- yesterday... it is probably in 1.1 format. In fact, most of
- your PKZIP'ed files are 1.1 or else 2.0 "normal" compressed.
-
- Use STEALTH to maximize their compression. You can save 60,000
- bytes of disk space on a few files, and several megabytes if
- you re-archive every downloaded file. Doing that manually will
- take FOREVER. And even batch files are no good, since they are
- so slow. But, you can be assured of accuracy and speed with STEALTH!
-
-
-
- STEALTH is extrememly simple:
-
- 1. Edit STEALTH.CFG to your satisfaction (see below for details)
- (or just use STL_CFG.EXE to create your OWN stealth.cfg)
-
- 2. Include STEALTH.EXE and STEALTH.CFG in your path
-
- 3. Go to a directory containing some old archives.
-
- 4. Type: STEALTH.EXE (or STEALTH *.*)
-
-
- Now note that Stealth processes the entire directory! The
- only filespec you need (optional) is *.*. Stealth ruthlessly
- converts everything it can find using your .CFG file.
-
- NOTE: You can use STEALTH *.* or STEALTH *.ZIP .....
-
- And wala, you are all done.
-
- If you change your mind on archives, or want to change something,
- STEALTH.CFG is easy to edit.
-
- Take your favorite editor and change it around.
- NOTE: If Stealth cannot locate STEALTH.CFG file, it will use
- its own defaults.
-
-
-
- =======================================================================
-
- NEW! Stealth now has a variety of command line options
- that will override the Stealth.cfg defaults.
-
- USAGE: STEALTH [filespec] [options]
-
- [altfile.CFG] can specify alternate .CFG file
-
- Options: /X Give exact details in log file
- /COMM Add the COMMENT file only (no conversion)
- /EVAL Evaluation archive only (no conversion)
- /+ Debug STEALTH process (messy output, but detailed!)
- /ID Show files having FILE_ID.DIZ, DESC.SDI *.SDA
- {SDA.ID} or VENDINFO.DIZ (new vendor info file)
- /LIST List contents of archive file(s)
- /GETCOM Get comment: Save into COMMENT.1
- /SHORTLOG Keep Stealth's LOGfile under 40K
-
- NOTE: STEALTH environmental variables overrides .CFG file
-
-
-
-
- ⁄ƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒø
- ≥ IMPORTANT NOTE: While Stealth is running, you can pause it, ≥
- ≥ shell to DOS, or do an emergency exit. ≥
- ≥ ≥
- ≥ Pressing the [spacebar] pauses Stealth. Any other key resumes. ≥
- ≥ Pressing the 'D' key shells to DOS. Just type: 'exit' to resume. ≥
- ≥ Pressing the [ESC] key exits Stealth immediately. ≥
- ¿ƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒŸ
-
-
-
- [altconfigfile.CFG] Stealth now can take multiple config files
- on the command line! Now, instead of changing
- STEALTH.CFG every five minutes, you can create
- several different ones.
-
- Examples: STEALTH C:\PCB\GEN\UPLOAD.CFG
- Will force Stealth to use the UPLOAD.CFG config
- file located in \PCB\GEN.
- STEALTH E:\STLCFG\STEALTH5.CFG
- Will use Stealth5.cfg file on the E: drive.
-
- Valid Usage: STEALTH *.ZIP C:\STEALTH\PROCESS.CFG
- STEALTH *.ARJ D:\TEMP\MY.CFG
- STEALTH *.LZH C:\STEALTH\DAVE$S.CFG
- STEALTH E:\UPL\UPLOAD8.CFG
-
- IMPORTANT NOTE: The alternate config file MUST have a .CFG
- extension. The filename can be anything,
- but must have a .CFG ending!
- If no config file is specified on the command
- line, then Stealth still searches the DOS
- path for STEALTH.CFG
-
-
-
-
- /X will provide a little more detailed information in STEALTH.LOG
-
-
- /COMM if you are a SYSOP, and want to add a "comment" file to your
- PKZIP and ARJ files, this is great!
- Using the /COMM switch, you can quickly comment ALL YOUR
- FILES in minutes.
- For an extra bonus, turn on RECURSE SUBDIRECTORIES in the
- config file, and watch as Stealth updates the comments on
- every file you got!
- *** NO OTHER ARCHIVE CONVERTER CAN DO THAT! ***
-
-
- /EVAL if you wonder what kind of files you have, then run:
- STEALTH *.* /EVAL then Stealth will show what the archive
- types are without converting them.
- This is kinda like a "preprocessor" for Stealth.
-
-
- /+ will show a large amount of messy information on the screen,
- detailing exactly how STEALTH is thinking, and what part of
- the program it is in. That way, you can debug where a problem
- is in case of a serious crash or lockup.
-
-
- /ID Searches files for FILE_ID.DIZ, DESC.SDI *.SDA or {SDA.ID}
- This is ideal for SySops, since many BBS programs require
- a "description file" to update the main file listing.
- Using:
- STEALTH *.* /ID
-
- allows quickly identifying files with no description!
-
-
- /LIST List a single archive's contents.
- This works on only ONE file at a time. Wildcards are
- not allowed here. If you want to list a large number
- of files, use the LIST environmental variable instead.
-
- Usage: STEALTH test.zip /LIST
- STEALTH shez.arj /LIST
-
- *** NO OTHER ARCHIVE CONVERTER CAN DO THAT! ***
-
-
- /GETCOM Get the comment from a .ZIP or .ARJ file, then
- write it to COMMENT.1
- This is useful if you see a really cool comment on
- a compressed file, and would like to "leech" it, and
- customize it with your OWN information!
-
-
- /SHORTLOG The Stealth LOG file can get rather large, real
- quick. Using /SHORTLOG will truncate the Stealth
- log file when it gets over 40K.
-
-
-
-
-
-
-
-
-
-
-
-
-
- ===== EXAMPLES: ====================================================
- STEALTH *.ZIP /X
- STEALTH *.ARJ /LIST
- STEALTH TEST.ZIP /GETCOM
- STEALTH *.ZIP /COMM
- STEALTH *.ZIP /X
- STEALTH *.* /+/NOLOG
- STEALTH *.ARJ /VIRUS/NOLOG/X
- STEALTH /EVAL (the *.* is assumed)
- STEALTH /ID (the *.* is assumed)
- ======================================================================
-
-
-
-
- Do not separate the options. If you have more than one, place
- them all together as shown above.
-
- CORRECT: STEALTH *.ZIP /X/NOLOG
-
- INCORRECT: STEALTH *.ZIP /X /NOLOG
-
- ========================================================================
-
-
-
-
-
-
-
-
-
-
- IMPORTANT NOTE: PKZIP 2.0 "stored" files are identical to PKZIP 1.1
- format. Therefore, all 2.0 "stored" archives are
- flagged as version 1.1.
-
-
-
-
-
-
-
-
-
-
- ========= The New STEALTH Environmental Variable =============================
-
- Starting in v5.0, Stealth has a new environmental variable.
-
- You can set it by using: SET STEALTH=option;option;option;option
-
- on the command line, or from within a batch file. Note that each
- option is separated by a ';', which is similar to the DOS PATH.
-
- Valid Options:
-
- SHORTLOG - Truncate Stealth's logfile when it
- becomes longer than 40K
-
- F-PROT - Turn on virus scanning, and use
- F-PROT as the scanner
-
- TBAV - Turn on virus scanning, and use
- TBSCAN as the scanner
-
- SCAN - Turn on virus scanning, and use
- McAfee's VIRUSCAN as the scanner
-
- NOLOG - Do not use a log file
- (Default: Use a log file)
-
- LIST - List files before processing
-
- STRCOM - Strip comment
-
- ADDCOM - Add comment (a COMMENT file must
- be specified in STEALTH.CFG)
-
- EXPEXE - Expand EXE files (self-extracting
- compressors)
-
- NODEL - Do not delete original files
- (Default: Delete original archives)
-
- 2EXTRA - Make .ZIPs to extra-compression
- (PKZIP2 must be the default compressor
- in STEALTH.CFG)
-
- BREAKAV - Break -AV seal on .ZIP and .ARJ files
- (Default: Never break -AV files)
-
- RECURSE - Recurse subdirectories
- (Default: Do not recurse subdirs)
-
-
- Valid Usage: SET STEALTH=2EXTRA;LIST;BREAKAV
- SET STEALTH=RECURSE;NOLOG;ADDCOM;SHORTLOG
-
- Explained Usage: SET STEALTH=RECURSE;NOLOG;ADDCOM;SHORTLOG
-
- ≥ ≥ ≥ ≥
- Recurse subdirs ƒƒƒƒƒƒƒƒƒŸ ≥ ≥ ≥
- Don't use a logfile ƒƒƒƒƒƒƒƒŸ ≥ ≥
- Add a comment file ƒƒƒƒƒƒƒƒƒƒƒŸ ≥
- Truncate log when over 40K ƒƒƒƒƒƒƒƒŸ
-
-
-
- ÷ƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒ∑
- ∫ IMPORTANT NOTE: Anything in the STEALTH environmental variable ∫
- ∫ will over-ride the settings in Stealth's ∫
- ∫ CONFIG file. ∫
- ∫ IE: If BREAKAV is set to OFF in Stealth.Cfg, ∫
- ∫ and BREAKAV is in STEALTH's variable, then ∫
- ∫ -AV files will be broken. ∫
- ”ƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒΩ
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- ========= USING STEALTH.CFG FILE ============================================
-
- Included here is STEALTH.CFG, a configuration file for this program.
-
- Use the enclosed STL_CFG.EXE program for a quick and easy way
- to create Stealth.cfg. Just fill in the blanks, and change
- the values to what you like best.
-
- Press [F10] to save Stealth.cfg and exit.
-
-
-
-
-
- Now you can change it by using a text editor, and type out
- which options you want to use. The format is:
-
- ---------------------------------------------------------------------
- Put the archiver you want everything converted to.
-
- [archiver] = archiver
-
- Whereas archiver could be:
- PKZIP1 ARJ LHA DWC
- PKZIP2 PAK ZOO ARC6 LHASFX
- SQUEEZE ICE HAP LARC LIMIT
- HYPER FCOMPACT LHARC UC2
- ---------------------------------------------------------------------
- Next, put all the archives you want converted to YOUR archiver.
- For instance, if you put LHA here, all .LZH files will be
- converted.
-
- [archiver] = convert
-
- Whereas archiver could be:
- PKZIP1 ARJ LHA DWC
- PKZIP2 PAK ZOO ARC6
- SQUEEZE ICE HAP LARC
- HYPER UC2 LIMIT LHARC
- ---------------------------------------------------------------------
- Now, do you want to strip all comment files in the archivers
- found?
-
- NO = strip comment
- ---------------------------------------------------------------------
- And do you want to add your own comment file to the archives
- that are converted?
-
- NO = add comment
- ---------------------------------------------------------------------
- Then, what comment file do you want added? (leave this line
- out if you want to comment added)
- NOTE: Make sure that the filename is left justified! No spaces
- should be on the left of the filename!
-
- B:\COMMENT.DAV = comment file
- ---------------------------------------------------------------------
- When .EXE self-extracting archives are found, do you want
- them extracted?
-
- NO = executables
- ---------------------------------------------------------------------
- If PKZIP 2.0 files are found that have been compressed using
- "normal" compression, do you want them to be re-compressed
- using "EXTRA" compression?
- NOTE: This will immediately change your ARCHIVER to PKZIP 2.0
-
- NO = make ZIPs -EX
- ---------------------------------------------------------------------
- Do you want to recurse the subdirectories? If YES, then all
- directories beneath the current one will be processed also!
-
- NO = recurse subdirs
- ---------------------------------------------------------------------
- As a default, STEALTH logs all activity into \STEALTH.LOG.
- This makes it easy to see what happened, and keep track of
- what went where.
-
- yes = create log file
- \STEALTH.LOG = log file location
- ---------------------------------------------------------------------
- Also as default, STEALTH deletes the old archives, so that
- your hard disk is not cluttered with old and new versions.
- That would make it extremely difficult to sort through them!
-
- yes = delete files
- ---------------------------------------------------------------------
- If you want to scan your archives for viruses, you can utilize
- any of the three most popular virus scanners avaiable. Just
- include the "check for viruses" line, then choose one of the
- scanners listed below (NOTE: You can only specify one)
-
- yes = CHECK FOR VIRUS
-
- VIRUSCAN = VIRUS PROGRAM /* McAfee's */
- F-PROT = VIRUS PROGRAM
- TBSCAN = VIRUS PROGRAM
- ---------------------------------------------------------------------
- Many PKZIP and ARJ files have a -AV seal attached to them.
- Most people (including SYSOPS) may not want to break those
- sealed files, since a "sealed file is a safe file".
- If a PKZIP or ARJ is -AVed, then you can be pretty sure no
- one has tampered with it.
-
- no = break AV files
- ---------------------------------------------------------------------
- STEALTH has an internal "archive viewer" that allows you to
- see what's inside an archive before/as it is processed. This
- will allow a clear representation of the file. Actually,
- the viewer is FASTER than any other I have found. Try it out!
-
- yes = list files before processing
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- ============ ATTENTION SYSOPS ===========================================
-
- STEALTH 5.0 HAS LOADS OF NEW OPTIONS DESIGNED FOR YOU!
-
- New in this version:
-
- 1. Don't ya hate re-commenting all your files whenever
- you change your BBS "comment"?
- Stealth makes it ULTIMATELY easy. Just go to your
- filebase's root directory, and type:
-
- STEALTH *.* /COMM
-
- Make sure to turn on 'recurse sub' and 'comment files'
- in the STEALTH.CFG.
- Stealth automatically hunts down every file, comments
- them, then goes through every subdirectory!
-
- 2. The new /EVAL switch allows you to "trial run" Stealth
- and watch exactly what it will do with your files.
-
- 3. Searches files for FILE_ID.DIZ, DESC.SDI *.SDA or {SDA.ID}
- This is ideal for SySops, since many BBS programs require
- a "description file" to update the main file listing.
- Using:
- STEALTH *.* /ID
-
- allows quickly identifying files with no description!
-
- 4. Read and use the included QCOM, which only comments files
- that need it!
-
-
-
-
-
-
-
-
- STEALTH can save you tons of hard disk space, and serve as a
- processor for uploads.
-
- If some new member uploads you an ancient archive (PAK or ZOO),
- or some unknown self-extracting .EXE archive, how do you
- find out what it is?
-
- It could be a cool game that everybody likes, but the lamer has
- given you a useless file.
-
- STEALTH will instantly recognize the .EXE file as DWC, ZOO, PAK,
- ARJ, PKZIP 1.1, PKZIP 2.0, ARC, LHA, etc.
- Then it will convert it to your BBS's archiver, with no problem.
- Even embedded paths are saved!
-
- **** Included is UPLOAD.CFG configuration for upload processing ****
-
-
- Is your BBS's hard disk getting full? Run STEALTH as an event
- once a week and convert all of your PKZIP 1.1 and 2.0 "normal"
- compressed files to PKZIP 2.0 "EXTRA" compression!
- That will save MEGABYTES of space (a friend of mine saved over
- 2 megabytes on one directory of uploads)
-
- **** Included is EVENT.CFG configuration for event processing ****
-
-
- Plus you can comment all the processed files with your own
- BBS comment file, or simply strip the old comments from
- them.
-
-
-
-
-
-
-
-
- ========= PLEASE READ THIS! ===============================================
-
- Please think about what you put into STEALTH.CFG before starting
- the program.
-
- 1. If your "Archiver" and "convert" file types are the same, then
- all files will be processed twice:
-
- PKZIP2 = Archiver
- PKZIP2 = convert
- PAK = convert
- ARJ = convert
-
- because STEALTH will convert all the .ARJ and .PAK files, then
- convert them again because they are now PKZIP 2.0 files!
-
-
- IMPORTANT NOTE: If you specify MAKE ZIPS -EX, then Stealth assumes
- you want to use PKZIP 2.0 as your default archiver.
- It will process files as such!
-
-
- 2. If you have 20 archives with the same name:
-
- ANOTHER.PAK
- ANOTHER.ARJ
- ANOTHER.ZIP
- ANOTHER.SDN
- ANOTHER.ZOO
- ANOTHER.ARC
-
- all of the contents of ALL THE ARCHIVES will be converted into
- your new file. So, if you said: PKZIP2 = Archiver
- then ANOTHER.PAK's contents will be stuffed into ANOTHER.ZIP,
- and ANOTHER.ARJ's contents will be also. And you will lose
- the original files. So please don't name several archives
- the same file name, then include all those types in your
- STEALTH.CFG file!
-
- 3. Embedded directories are NOT processed if you use:
-
- yes = recurse subdirs
-
- Why? Because when you re-compress the file, then you will include
- all subdirectories under the current one. And if you are in
- the root directory, your whole hard drive will be sucked up into
- the new compressed file!
-
- 4. Please don't STRIP a file's comments, then ADD a comment. If you
- ADD a comment, then the old one is automatically deleted.
-
- 5. Please make sure ALL FILENAMES IN STEALTH.CFG are left justified!
- For example, your comment file should look like:
-
- ∫
- ∫C:\PCBOARD\COMMENT.FIL
- ∫
- instead of:
-
- ∫
- ∫ C:\PCBOARD\COMMENT.FIL
- ∫
-
- Because to get the filename, an ASCII 'zero' is placed wherever
- a 'space' character is. And the filename won't register unless
- it's left justified.
-
-
-
- NOTE: PKZIP 2.0 "stored" files are identical to PKZIP 1.1
- format. Therefore, all 2.0 "stored" archives are
- flagged as version 1.1.
-
-
-
- 7. Due to the "human" nature of my C++ compiler, if you have
- a THICK layer of subdirectories (more than 10), and each have
- the exact same filenames, one or two files may be skipped.
- This is because the Data Transfer Area of DOS thinks that it
- already processed that file. This should also be fixed in the
- next version.
-
- 8. Also NOTE: Any unsuccessful de-compression of a file will
- result in the original not being erased. So if STEALTH does
- not get an errorlevel of 0, then it aborts the erasure process.
-
-
-
-
-
-
-
-
-
-
-
-
- =================== WHERE IS DWC? =========================================
-
- UC2, ARJ, PKZIP, DWC, PAK and all the other archivers can be found at:
-
- LIMIT is also a GREAT archiver (download LIMIT10.ZIP)
-
-
- ÷ƒƒƒƒƒø “ ¬
- ∫ ≥ ∫ ≥
- «ƒƒƒƒƒ¥ ÷ƒƒø ÷ƒ“ƒø ƒ“ƒ ”∑ ⁄Ÿ ƒ“ƒ “ƒƒø “ ¬ ÷ƒø
- ∫ ≥ ∫ ≥ ∫ ∫ ∫ ≥ ∫ «ƒ¬Ÿ ∫ ≥ ”ƒø
- – ¡ – ¡ – ƒ–ƒ ”ƒƒƒŸ ƒ–ƒ – ¡ ”ƒƒŸ ”ƒƒŸ
- ‹€€€€€€€€‹ ‹€€€€€€€‹ ‹€€€€€€€‹ ‹€€‹ ‹€€‹
- (214) 606-1485 €€€fl fl€€€ €€€€flflfl€€€€ €€€€fl fl€€€ €€€€ ‹€€€€fl
- €€€‹ ‹€€€ €€€ €€€ €€€€ €€€€€€€€fl
- €€€€€€€€€fl €€€ €€€ €€€€ €€€€€€€€‹
- 1.2 GIG online €€€€ fl€€€€‹ €€€€‹‹‹€€€€ €€€€‹ ‹€€€ €€€€ fl€€€€‹
- Thousands of Files fl€€fl fl€€fl fl€€€€€€€fl fl€€€€€€€fl fl€€fl fl€€fl
-
-
- The ONLY antivirus Board in DFW
-
- We have: Boot disks for DOS versions 3.0 - 6.2 (IBM and Microsoft)
- Up to-the-minute new virus information
- The hottest and newest games (Apogee, Epic, + others)
- Download every COMM protocol imaginable - we got them all!
- We have more compression programs than all DFW boards, combined!
- More antivirus text files than you can read
- We are the HUB in Dallas/Fort Worth for Virus Researchers -
- nowhere else can you obtain more information
-
-
-
- ˛ 100 AntiVirus programs (the newest SCAN, TBAV, F-PROT -> -AV sealed)
- ˛ FidoNet, RIMENet, WildNet, USNetmail virus echos + VIRUS_NFO
-
- ˛ Hundreds of compression programs ˛ Unlimited free downloads!
- ˛ Download 2 MEG on your first call ˛ The Fastest LogOn in DFW
- ˛ 10 protocols ˛ 14.4 Zoom v32bis
- ˛ 100 FILE areas ˛ No fee ever required!
- ˛ We add 2,000+ NEW files each month
-
- ˛ The OFFICIAL support BBS for Stealth, Ultra Toolbox, Exe Master,
- Protect EXE/COM and Sound Effects 6.1
- ˛ Distribution site for HyperDisk, ExtraDos, NameBase and Dave Utils
-
-
- 24 hours / 7 days --> (214) 606-1485
- or (214) 606-1485
-
-
-
- The SysOp is a great guy, and has all of these files available
- for download. And while you are there, check out the
- Dave's Utilities section. It has all my stuff, and is updated weekly.
-
-
-
-
- ÷ƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒ∑
- ∫ WHO IS DAVID BUCKERT? ∫
- ∫ ∫
- ∫ David Buckert is a BBS fanatic that regularly uses ROBOCOMM to ∫
- ∫ download the newer files from all Dallas BBS's and upload them ∫
- ∫ to all other Dallas BBS's. This is fantastic! All the boards ∫
- ∫ in town have new and updated files because of his generosity. ∫
- ∫ ∫
- ∫ Do you have a "David Buckert" in your area? If not, I suggest ∫
- ∫ becoming one. Uploading new stuff to all the BBS's helps ∫
- ∫ everybody, and enhances an "area" of town. More people will ∫
- ∫ hop on their terminals and call around, because there's great ∫
- ∫ stuff everywhere! ∫
- ∫ ∫
- ∫ Come on guys, boring subscription services like CompuServe, ∫
- ∫ Delphi, Prodigy, etc are leeching subscribers and costing ∫
- ∫ too many people too much money. KEEP IT LOCAL! Make new ∫
- ∫ friends and get to know the people computing in your area. ∫
- ∫ ∫
- ∫ Have some parties, enjoy the "TERMINAL" experience. ∫
- ”ƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒΩ
-
-
-
-
-
-
-
-
-
-
- ============= REGISTRATION ================================================
-
-
- ⁄ƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒø
- ≥ ≥
- ≥ Registration is only $20.00 ≥
- ≥ ≥
- ¿ƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒŸ
-
- For technical support:
-
- BBS (817) 282-5542
- CompuServe 71441,2723
-
-
-
- You can order Stealth using your Visa/MasterCard!
- Call 1-800-242-4775 and specify order #11241
-
-
- NOTE: Technical support is for a limited amount of time
- to unregistered users. Once registered, you get
- all the technical support you want.
- If you have any substantial problems, let me know.
-
-
- *** PERSONALLY CONFIGURED VERSIONS OF STEALTH ARE AVAILABLE ***
-
- *** Leave a note on one of the technical support numbers ***
- *** to arrange the configuration and price ***
-
-
-
-
-
-
-
- ’ÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕ IMPORTANT ÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕ∏
- ≥ ≥
- ≥ ≥
- ≥ This trial version of Stealth randomly sets the date on a few ≥
- ≥ files to : JANUARY 1, 2010 ≥
- ≥ ≥
- ≥ This will cause substantial problems if you run the ≥
- ≥ "unregistered" copy as a normal event on your BBS. ≥
- ≥ You have 30 days to evaluate Stealth on your own personal ≥
- ≥ files. Feel free to test it, play with it, etc. But using ≥
- ≥ this version for long periods of time will cause your ≥
- ≥ filebase to have SERIOUS PROBLEMS. ≥
- ≥ ≥
- ≥ You can obtain a registered version for only $20.00 ≥
- ≥ ≥
- ≥ I strongly suggest getting a registered copy if you enjoy the ≥
- ≥ program and intend to use it regularly. ≥
- ≥ ≥
- ‘ÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕÕæ
-
-
-
-
-
-
-
-
- ============= TECHNICAL STUFF =============================================
-
- Because of the complicated nature of Stealth, problems may arise.
- Here is a list of common difficulties people have written me with:
-
- 0. If you are getting the .ARC files from the Satellite
- Network, they DO NOT unarchive because they are version
- 7.0 of ARC. You MUST HAVE a registered version of
- ARC in order to extract these!
-
-
- 1. Stealth does not process ARJ files properly.
-
- You need at least version 2.39 of ARJ in order to process the switches
- I use. Of course, the registered Stealth offers customized switches!
-
-
- 2. I use STEALTH D:\FILES\*.* and nothing happens.
-
- Of course not. You must be in the directory with your archivers in
- order to convert them. If you want to do the above, try:
- D:
- CD\FILES
- STEALTH *.*
-
-
- 3. I used Stealth on several PKZIP 2.0 files to make them -EXTRA
- compressed, but nothing happened.
-
- In cases where it could be ANYTHING gone wrong, use the following
- special switch:
-
- STEALTH *.* /X/+ > LOGIT
-
- This will run Stealth, show technical debugging information that I
- need, and pipe the output into a new file called "LOGIT".
- Now just send the file "LOGIT" to me, along with your STEALTH.LOG,
- and I can sort out what the problem is.
-
- Just upload the files for me at the AntiVirus ROCK BBS, on CompuServe,
- or simply mail them to me at my home address on a disk (any size).
-
-
- 4. To extract the COMMENT.1 file when using the /GETCOM
- switch, Stealth 'tests' the file using the needed
- archiver, then strips the comment from the captured
- text. This may take a while when 'testing' larger
- archives.
-
-
-
-
-
- ============ ERRORLEVELS ==================================================
-
- When Stealth exits, it returns the following errorlevels:
-
-
-
- Errorlevel = 0 success
- 1 virus found
- 2 no files found
- 3 ONLY help screen printed
- 4 DAVETMP directory was not deleted
- 5 STEALTH.CFG had problems..
- 6 Spawn Error
- 7 aborted!
- 99 error opening file
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- €€€€€€€ª €€ª €€ª €€€€€€ª €€€€€€ª €€€€€€ª €€€€€€ª €€€€€€€€ª €€€€€€ª
- €€…ÕÕÕÕº €€∫ €€∫ €€…ÕÕ€€ª €€…ÕÕ€€ª €€…ÕÕÕ€€ª €€…ÕÕ€€ª »ÕÕ€€…ÕÕº »ÕÕÕÕ€€ª
- ÷ƒƒ€€€€€€€ª €€∫ €€∫ €€€€€€…º €€€€€€…º €€∫ €€∫ €€€€€€…º €€∫ ‹€€€…–ƒ∑
- ∫ »ÕÕÕÕ€€∫ €€∫ €€∫ €€…ÕÕÕº €€…ÕÕÕº €€∫ €€∫ €€…ÕÕ€€ª €€∫ flflÕÕº ∫
- ∫ €€€€€€€∫ »€€€€€€…º €€∫ €€∫ »€€€€€€…º €€∫ €€∫ €€∫ €€ª ∫
- ∫ »ÕÕÕÕÕÕº »ÕÕÕÕÕº »Õº »Õº »ÕÕÕÕÕº »Õº »Õº »Õº »Õº ∫
- ∫ ∫
- ∫ ∫
- ∫ Support for this program is available in the following ways: ∫
- ∫ ∫
- ∫ ∫
- ∫ ÷ƒƒø ÷ƒƒø ÷ƒ“ƒø “ƒƒø “ ¬ ÷ƒø “ƒƒø “ƒƒø “ ¬ “ƒƒø ∫
- ∫ ∫ ∫ ≥ ∫ ∫ ≥ «ƒƒŸ ∫ ≥ ”ƒø «ƒ «ƒ¬Ÿ ”∑⁄Ÿ «ƒ ∫
- ∫ ”ƒƒŸ ”ƒƒŸ – – ¡ – ”ƒƒŸ ”ƒƒŸ –ƒƒŸ – ¡ ”Ÿ –ƒƒŸ ∫
- ∫ User ID: 71441,2723 ∫
- ∫ I usually log on every other day and check my mail. ∫
- ∫ ∫
- ∫ ∫
- ∫ ‹‹‹‹‹‹ ‹‹‹‹‹‹ ‹‹‹‹‹‹‹ ∫
- ∫ € ‹‹ €‹ € ‹‹ €‹ € ‹‹‹‹€ ∫
- ∫ € ‹‹‹ € € ‹‹‹ € €‹‹‹‹ € ∫
- ∫ €‹‹‹‹‹€ €‹‹‹‹‹€ €‹‹‹‹‹€ ∫
- ∫ Drop me a line on the AntiVirus ROCK Bulletin Board ∫
- ∫ David Smith (214) 606-1485 ∫
- ∫ or (214) 606-1484 ∫
- ∫ ∫
- ∫ ∫
- ∫ ‹€€‹ ‹€€‹ ‹€€€€€€€‹ ‹€‹ ‹€€‹ ∫
- ∫ €€€€€‹€€€€€ €€€€flflfl€€€€ €€€€€ €€€€ ∫
- ∫ €€€€€€€€€€€ €€€€‹‹‹€€€€ €€€€€ €€€€ ∫
- ∫ €€€€ €€€€ €€€€€€€€€€€ €€€€€ €€€€ ∫
- ∫ €€€€ €€€€ €€€€ €€€€ €€€€€ €€€€‹‹‹‹‹‹‹ ∫
- ∫ fl€€fl fl€€fl fl€€fl fl€€fl fl€fl fl€€€€€€€€fl ∫
- ∫ Write to: ∫
- ∫ ∫
- ∫ David Smith ∫
- ∫ 1104 Mason Dr. ∫
- ∫ Hurst TX 76053 ∫
- ∫ ∫
- ”ƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒΩ
-
-
-
-
-
-