home *** CD-ROM | disk | FTP | other *** search
Text File | 1992-05-20 | 355.3 KB | 11,122 lines |
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Ezycom V1.01.
-
- Copyright Peter Davies 1992.
-
- All Rights Reserved.
-
- Released 20 May, 1992.
-
-
-
-
-
-
- Table of Contents
-
- Features 4
- Conditions of Use 7
- Registration 9
- Copyrights 10
- Installation 11
- Configuration (General) 13
- Configuration (Misc) 21
- Configuration (File Areas) 32
- Configuration (Ezyprot, Protocols) 44
- Configuration (Bimodem) 46
- Configuration (Setting Up Your Own Protocols) 47
- Configuration (Message Areas) 50
- Configuration (Echoarea Manager) 56
- Configuration (Message Misc) 59
- Configuration (Message Security) 63
- Configuration (Message Netmail) 64
- Configuration (Compression of Echomail) 66
- Configuration (Global Message Options) 67
- Configuration (Modem Set-(Up) 70
- Configuration (Baud Rate Set-up) 73
- Networking with Ezycom 74
- Sysop Function Keys 76
- Ezycom Command Line Parameters 78
- Errorlevels 79
- Ezycom External Support Files 80
- Ans/Asc/Asl/Avt Files 81
- File Points 85
- Page Tunes 85
- Menu System (Ezymenu) 86
- Menu System (Defining a Menu System) 86
- Menu System (Templates) 90
- Menu System (Global Menus) 91
- Menu System (Automatic Options) 91
- Menu System (Special Characters) 91
- Menu System (Keyboard Stuffing) 92
- Menu System (Groups) 93
- Utilities (Ezymaint, Maintenance Program) 95
- Utilities (Conversion Files, Doconv.bat Upconv.bat) 97
- Utilities (Fedit, Filebase Editor) 98
- Utilities (Usercomp, Userbase Utility Program) 105
- Utilities (Anstoavt, Makes Avatar Screens) 106
- Utilities (Ezymail, Echomail Utility) 107
- Utilities (Ezynet, Netmail, Areafix Utility) 108
- Utilities (Msgcomp, Messagebase Utility) 111
- Utilities (Ezyff, Filebase Utility) 112
- Utilities (Ezyutil, General Utility) 113
- Utilities (Ezyed, Userbase Editor) 118
- Utilities (EzyNode, Nodelist Compiler) 122
-
-
-
-
-
- Page 2.
-
-
-
-
-
-
- Appendix A (Questionnaire Language) 125
- Appendix B (Multiline Operation) 136
- Appendix C (File Control Characters) 139
- Appendix D (Menu Commands) 143
- Appendix E (Operating Batch Files) 166
- Appendix F (Credits) 174
- Appendix G (Colour Changer) 175
- Index 176
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 3.
-
-
-
-
-
-
- Features of Ezycom
-
- o Ezycom used advanced file system technology to get high
- performance when is use with Mass Storage Devices such
- as CD-Roms. Typically, file searches can find a file
- in approximately one second, where as on other older
- systems, it takes well over five minutes.
-
- o Database type file system, allowing high performance
- file listing, without continually accessing the hard
- disk to find a files date/size. This gives MASSIVE
- speed increases on CD Roms, Multiline and Networked
- BBS's. The system also allows classifying of files
- into separate areas, no matter WHERE the files are on
- your Hard Disk. You are not restricted to a file area
- for each file path. This allows CD Roms, which
- normally have their files laid out in no particular
- order (such as the RBBS-In-a-Box), to function well
- under Ezycom.
-
- o Ezycom is a fully fido compatible Bulletin board.
-
- o Ezycom has a full-blown Mail Tosser/Scanner. Which is
- built around Ezycom to enable integration between it
- and Ezycom itself. Thus enabling many exciting
- features, such as automatically adding conferences into
- the BBS package.
-
- o Up to 65,000 security levels, with Up to 32 flags that
- can be defined on each level to make your BBS more
- secure.
-
- o Four ratio systems, including Post/Call ratios,
- Kilobyte Ratios, File Ratios and a VERY Powerful File
- Points System are included.
-
- o The File Points System is the answer to many sysop's
- prayers. As it will can (Sysop Definable) credit the
- uploader of the file, only if the file was downloaded
- many times. Thus, avoiding problems with Ratio
- systems, where users upload rubbish so they can
- download. (Registered Versions Only)
-
- o Database message system, increasing speed in message
- base handling, and decreasing space used by each
- message. This method is different to many other
- Database systems as two files are used per message
- area. Thus, if something dreadful happened to one of
- your message base files, you do not loose your entire
- message base.
-
-
-
-
-
- Page 4.
-
-
-
-
-
-
- o Message Base packing system allowing you to define 4
- different ways of deleting messages. The most exciting
- is deleting by Kilobytes, enabling you to keep your
- message base at a fixed size.
-
- o Comprehensive Paging system allowing configuration of
- page times on a per day basis. As most people are home
- more on weekends than weekdays, this allows your users
- to page you more on weekends (If so desired).
-
- o Comprehensive File Management system taking care of all
- file area needs. Including sorting file areas, archive
- conversion, master list generation, virus checking,
- integrity checking and much more.
-
- o A Full-Blown file area editor, allowing multiple tag
- and move of files, deletion of multiple files, viewing
- of file info including uploader and other various
- options.
-
- o Security can be placed on downloading of file areas but
- still allowing the viewing of the files. A look but
- not touch environment.
-
- o Passwording of files, on per directory or per file
- basis can be done.
-
- o Allowing certain files to be 'FREE' for the user to
- download, again on per directory or per file basis.
-
- o Support for Up to 250 lines, running under either a
- network, multitasker or both.
-
- o A full-blown chat system between nodes is available.
- Avatar/local users will be opened up into a full screen
- user to user chat. Allowing messages to popup even
- while they are typing them in. Up to 200 different
- chats can take place at any one time. Private messages
- can also be sent between nodes.
-
- o Ezycom also allows (sysop definable) restricted access
- to any function that Ezycom performs. This restricted
- access can vary dramatically. Different types of
- restrictions include Security, Flags, Age, Time On-
- Line, Time Of Day, File Ratio, Kilobyte Ratio and
- Post/Call Ratio.
-
- o An intelligent duplicate upload detection system, that
- stops users from being credited for files that are
- already on your system. The file will then be removed
- from your system, thus not taking up precious disk
- space.
-
-
-
- Page 5.
-
-
-
-
-
-
- o A full screen ANSI/AVATAR chat, which has full local
- and remote scrolling.
-
- o Local uploads and downloads, which allows an easy way
- to place files on your system.
-
- o Full conferencing style system, allowing message and
- file areas to be grouped, to allow users to only view
- areas of their choosing such as IBM and/or Amiga.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 6.
-
-
-
-
-
-
- Conditions of Use
-
- o Ezycom is the copyrighted materials of Peter Davies and
- authors of respective products. The material it covers
- it the executable files, overlays, documentation and
- anything contained in the Ezycom Package.
-
- o If, you classify as a SHAREWARE registration (see
- "Registration"), you are allowed to evaluate Ezycom for
- 1 month, and after that period, you MUST either
- REGISTER Ezycom or stop using it. Non-Profit
- organisations/Commercial customers may ONLY evaluate
- Ezycom for a period of 7 days, before Ezycom must be
- bought, or discontinued in use. If, Ezycom is being
- used in a multi-line situation, then only one
- Registration is required. Providing that the
- registration key in use, will only be on one hard disk
- and only in one directory of that hard disk. If, this
- is not the case, then a site licensing agreement is
- required.
-
- o Before registration, you miss out on a few 'Nice'
- features, taken out to help encourage registration. It
- must be stated however, that Ezycom is usable without
- these features, and is not now and never will be
- 'Cripple Ware'.
-
- o Ezycom may never be used in an unlawful, or illegal
- manner.
-
- o Ezycom distribution is encouraged. So long as no
- charge is levied for the distribution. Pay Systems are
- exempt from this, so long as there is no extra charge
- for Ezycom. Commercial Software Libraries may not
- include Ezycom in their libraries without the written
- permission of Peter Davies.
-
- o Ezycom archive's may not be altered in any shape or
- form. The conversion to a different archive format is
- allowed, but we prefer that you do not convert it.
- Adding of BBS comment files or headers to the archive,
- is NOT permitted.
-
- o You are NOT allowed to modify Ezycom executables,
- Overlays, registration keys or documentation in any
- shape or form. Tampering with messages inside
- executables is NOT permitted.
-
- o Site / Group licensing agreements will be reviewed on a
- case by case basis.
-
- o The registration key may not be distributed to other
- person(s). Doing so, will violate the licensing
- agreement you made when Registering Ezycom.
-
- Page 7.
-
-
-
-
-
-
- o In using this program agree that in no event shall
- Peter Davies and respective authors, be liable for any
- indirect, incidental, consequential, special, or
- exemplary damage or lost profits, even if Peter Davies
- and respective authors have been advised of the
- possibility of such damages or lost profits. You
- further agree that if for any reason Peter Davies and
- respective Authors are found to be liable to you as a
- result of your use of the program and software, that as
- partial consideration of Peter Davies and respective
- Authors granting you this license, you agree that Peter
- Davies and respective Authors, sole and exclusive
- cumulative liability to you or others shall be no
- greater than the amount of any registration fee paid by
- you. If no such registration fee was paid, then Peter
- Davies and respective Authors are not liable for any
- amount.
-
- o Peter Davies or the associated Authors are in no way
- obligated to provide support for or future versions of
- Ezycom.
-
- o Registration of Ezycom entitles you to the use of the
- current version of Ezycom. Any future versions may
- have new licensing conditions, which may change the
- terms of your current licensing agreement.
-
- o The use of tampered versions of Ezycom, or the use keys
- not distributed by Registration Sites is an
- infringement of the Copyright Act. We will not
- hesitate in prosecuting offenders.
-
- o The copying and/or distribution of your license key is
- strictly prohibited. Except, of course for backup or
- archival purposes.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 8.
-
-
-
-
-
-
- Registration
-
- Included with the package are two registration files,
- REGISTER.FRM, (registrations using Cheques/Money Orders),
- and CREDIT.CRD, (registrations using VISA/Master Credit
- Cards (NO BANKCARD)). Please select the correct file for
- your purposes. Please make sure you complete these forms
- when registering to avoid delays.
-
- $50AUD for use of Ezycom in a private home, for non-
- commercial activities. This special introductory offer
- to Ezycom, will only remain at this price for V1.00 and
- V1.01.
-
- $150AUD for use of Ezycom in a non-commercial environment.
- That is, the business is a non-profit organization and
- makes no money in the use of Ezycom. Example: Public
- School, University, Church, Tennis Club, etc.
-
- $250AUD for use of Ezycom in a commercial environment.
- That is, none of the above conditions are met.
-
- Prices subject to change without prior notice.
-
- Support Sites
-
- Footrot Flats
- +61-3-578-0968 (300/1200/2400/9600)
- Fido 3:636/213
- Internet daviesex@brt.deakin.edu.au
- 24 Hours a day
-
- Hitch Hikers Guide to The Galaxy
- +61-3-546-3038 (300/1200/2400/9600)
- Fido 3:636/204
- 24 Hours a day
-
- Offline
- +61-3-808-4510 (300/1200/2400/9600)
- Fido 3:633/374
- Internet rjstocksex@brt.deakin.edu.au
- 24 Hours a day
-
- EzyAccess
- +61-3-585-0495 (300/1200/2400/9600)
- Fido 3:636/200
- 24 Hours a day
-
- Ezycom support conference (EC_SUPPORT) and the latest
- version, should be available at any of the support sites or
- beta test sites.
-
-
-
-
- Page 9.
-
-
-
-
-
-
- Copyrights
-
- The following products are copyrighted to the following
- people. Unlisted products, are also copyrighted to their
- respective authors.
-
- Arj Robert Jung
- Async Professional Turbo Power
- BNU David Nugent
- D'Bridge Mosaic Press
- DESQView Quarterdeck Office Systems
- DSZ, GSZ Chuck Forensberg
- Ezycom Peter Davies
- Ezyed Wayne Burnside
- EzyEdit Brad Vonarx
- Ezymenu Richard Stocks
- Ezyup Colin Berg
- Front Door Joaquim Homrighausen
- IBM International Business Machines
- Lha H Yoshizaki
- MSDOS Microsoft
- PkZip Pkware
- Scan McAfee Associates
- Turbo Pascal Borland International
- Windows Microsoft
- X00 Ray Gwinn
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 10.
-
-
-
-
-
-
- Installation
-
- Install
- -------
-
- Requirements
- ------------
- Ezycom can run on IBM PC or compatible. A modem with
- Hayes compatible commands (such as CONNECT/RING/etc) and
- hardware flow control (CTS/RTS) is required also for
- communications and DOS version 3.X, 4.X, 5.X or later,
- although MSDOS V5.0 is recommended.
-
- Ezycom requires a machine with at least 512K of Ram,
- although 640K is preferable. A Hard Disk is also required
- with a minimum of 1 meg recommended. If, you have EMS
- memory, XMS memory or Extended memory, Ezycom can make use
- of this. It, can directly use EMS to Swap itself out to, or
- to load the Overlay into, or it can indirectly use XMS or
- Extended memory, by using it to make a Ram Disk, and placing
- the overlay/swap files on there.
-
- Set-up
- ------
- Ezycom requires one other program to run it
- successfully stand alone. That is, a FOSSIL driver. X00,
- by Ray Gwinn, and BNU by David Nugent have successfully been
- tested with Ezycom. See their documentation for the
- installation of those programs.
-
- If, you are using Ezycom in a mail Network which is
- FidoNet compatible, you will also require a Mailer.
- D'Bridge and Front Door have both been successfully used
- with Ezycom. Ezycom, has its own fido compatible mail
- tosser / scanner.
-
- In your CONFIG.SYS add the following lines...
- FILES=20
- BUFFERS=20
-
- FILES=20, tells DOS how many files can be open at once.
-
- BUFFERS=20, tells DOS how many buffers are to be open.
- Generally, 20 is good, as it does not use too much memory,
- and it speeds up disk access.
-
- In your AUTOEXEC.BAT add the following lines depending on
- the drive you set EZYCOM to run on...
-
- SET EZY=C:\EZY
- SET TASK=1
-
-
-
-
- Page 11.
-
-
-
-
-
-
- SET EZY, tells Ezycom where to find the system
- directory. It can optionally be the directory where your
- BBS runs from.
-
- SET TASK, The node number to execute Ezycom under.
- Note: -N overrides this variable.
- Eg SET TASK=1
-
- Extract SETUP.ARJ in a temporary directory and run
- INSTALL. An example command to perform this is "ARJ e
- SETUP.ARJ". It will automatically install a default setup
- of menus, messages, files and text files for the operator to
- observe as a sample system, to learn from, or to work from.
-
- Ezycom sample setup will now be located in the path
- specified, but the executables will still be where you
- unarchived them from.
-
- You are now ready to start configuring Ezycom.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 12.
-
-
-
-
-
-
- Configuration
-
- General
- -------
-
- Paths
- -----
- When you load the config file you will presented with a
- list of options. That you access by moving the cursor on
- the option you want to change then hit ENTER. You will have
- to set up many of these options in order to get Ezycom up
- and running. First Set-up all the directories that will be
- used by your system with Ezycom the directories you have to
- set up are as follows.
-
- Eg
- Overlay Path : C:\EZY\
- System Log : C:\EZY\EZY*N.LOG
- Maintain Log : C:\EZY\EZY*N.LOG
- Swap File : C:\EZY\EZYSWAP
- AVT Files : C:\EZY\TXT\
- ANS Files : C:\EZY\TXT\
- ASC Files : C:\EZY\TXT\
- ASL Files : C:\EZY\TXT\
- Menu Files : C:\EZY\MENUS\
- Menu 2nd : [UnUsed]
- Netmail : C:\EZY\NETMAIL\
- Nodelist : C:\EZY\NODELIST\
- Message Base : C:\EZY\MSGBASE\
- File Base : C:\EZY\FILEBASE\
- File Index : C:\EZY\FASTBASE\
- File Sec : C:\EZY\
- User Base : C:\EZY\USERBASE\
- Bimodem Path : [UnUsed]
- Node Message : C:\EZY\
- Temp Path : C:\EZY\TEMP\
- Upload Path : C:\EZY\UPLOADS
- OutSide Page : [Unused]
- Editor Path : *C /C EDIT.EXE
-
-
- Overlay Path. This is where Ezycom looks to find its
- overlay file (EZY.OVR). You can set this to a Ram Disk, for
- improved efficiency.
-
- System Log. This is the path and filename of where
- Ezycom will write its log file. If you place a *N in the
- log name, it will be translated into the current node
- number. So EZY*N.LOG would actually become EZY1.LOG for node
- one.
-
-
-
-
-
- Page 13.
-
-
-
-
-
-
- Maintenance Log. This is where Ezycom writes the logs
- for all the utilities that come with it. You should NEVER
- have this the same filename as the other log, if you are
- running more than one line. Here, you can also place a *N
- in the filename for translation into node number. Each
- Ezycom utility has a unique identifier for logging, so if
- you place a *T in the maintenance log name, many logs will
- be written out for each utility.
-
- Swap File. When Ezycom swaps out its memory, it can
- (sysop definable) swap itself to DISK. This is the path and
- filename to the swap file(s). The extension is not allowed,
- as Ezycom will append its own extension for node number.
- Ezymaint and Ezymail append different extensions, so they
- can be run at the same time as nodes.
-
- Text Files. These are the paths to where the text
- files are kept. They may all point to the same directory if
- you like. Since ANSI are the most popular, you may like to
- put .ANS on a Ram Disk, but leave the rest on your hard
- disk.
-
- Menu Files. Your Menu Files are stored in this path.
- This may be a Ram Disk or Physical Disk Path.
-
- Menu 2nd. This is a second menu path, for when the
- first path points to a Ram Disk. Take the situation where
- you alter a menu on a Ram Disk. All modifications are
- stored to the Ramdisk, not the physical disk. Placing a
- path here, makes all modifications be stored at this path as
- well.
-
- Netmail/Nodelist. Simply, this is your Netmail and
- Nodelist paths. A more full explanation is explained in the
- Echomail/Netmail section of this document.
-
- Message Base. This is the location of Ezycom's message
- base. It should be noted that you MUST use the SAME
- userbase with the message base. You can NOT have several
- message bases per userbase or vice versa, without totally
- destroying lastread pointers.
-
- File Base. This is the location of where the filebase
- is located.
-
- File Index. The Fast Find Index is stored here. This
- is an index to EVERY file downloadable in your BBS system.
-
- File Sec. The FILESEC.EZY is stored in this path. A
- path is provided to allow you to point this file to the
- ramdrive.
-
-
-
-
- Page 14.
-
-
-
-
-
-
- Userbase. Simply, where the userbase is stored.
-
- BiModem Path. This is where BiModem.COM and
- BIMODEM.1/BIMODEM.2/etc should be found. Normally this path
- would be null. If there is a path here, you MUST have
- BiModem fully Set-up to run Ezycom.
-
- Node Message. This is where the internode
- communication files are stored. If, you plan to use the
- inbuilt multiuser chat, it might be advisable to point this
- path to a ram disk. Only 10k would be required maximum in
- the ramdisk.
-
- Temp Path. This is where Ezycom stores its temporary
- files.
-
- OutSide Page. If, you wish your pages to use other
- tunes besides the default, or the tune files, you can use
- Page modules written for Ezycom. EZYSB100 is one such page
- program, which plays sound blaster VOC files. Please see
- your PAGE programs (such as EZYSB100) for more details on
- this.
-
- Upload Path. This is a temporary path where ALL
- uploads will be uploaded to, before they are moved. If, the
- upload is aborted, then the file is left in this directory
- for later resumption. It is advisable to have a daily
- maintenance routine to delete all files in your upload path.
- (Remove aborted uploads) A statement like "Echo Y | del
- c:\ezy\uploads\*.*" would delete them. This path MUST be
- unique and NOT used in the file base system.
-
- Editor Path. This is the path and filename that the
- CONFIG will load when you choose to edit the text files.
- Any text editor will do Dos's edlin, Nortons Editor,
- WordStar Etc.
-
- Eg: *C /C C:\WS\WS.EXE
- This would run Wordstar as your editor for the Ctl and Q-A
- files such as TRASHCAN.CTL, PHONEDUP.CTL, NEWUSER.Q-A Etc.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 15.
-
-
-
-
-
-
- Netmail Addresses
- -----------------
- You can now set your Net Address, if you are going to
- be using Ezycom in one of the many PC Networks. ie FidoNet
-
-
- Main Address : 3:636/213
- Aka Address #1 : 80:1000/153
- Aka Address #2 : 0:0/0
- Aka Address #3 : 0:0/0
- Aka Address #4 : 0:0/0
- Aka Address #5 : 0:0/0
-
-
- Main Address : 3:636/213
-
- This is to say you are node 213 in net 636 in region 3.
- You can also enter up to 15 aka Address's.
-
- The Aka Address is for people that are members of more
- than one Network. In the above example, the Aka shows that
- the you are also in region 80 and are node 153 of net 1000.
-
- For more information about Network Addresses, see the
- Echomail/Netmail section of this document.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 16.
-
-
-
-
-
-
- Limits
- ------
- Next option is setting the Limits. These are the
- settings that implement the Security Levels you set for your
- BBS. First set the Security Level.
-
-
- Security Level : 10
- Maximum Time : 30
- 300 Baud Daily k limit : 100
- 1200 Baud Daily k limit : 200
- 1275 Baud Daily k limit : 200
- 2400 Baud Daily k limit : 300
- 4800 Baud Daily k limit : 300
- 7200 Baud Daily k limit : 300
- 9600 Baud Daily k limit : 300
- 12000 Baud Daily k limit : 300
- 14400 Baud Daily k limit : 300
- 19200 Baud Daily k limit : 300
- 38400 Baud Daily k limit : 0
- Downloads per One Upload : 15
- Initial Download Credit (Files) : 15
- Downloads in k per One K Uploaded : 0
- Initial Download K Credit : 0
- Post Call Ratio (%) : 10
- Initial Message Credit : 2
- Number of Days till Rego Expires : 365
-
-
- This example shows the security level <10>
-
- To open a new security level you hit the INSERT key and
- all the options are blank. Type the security level that you
- wish to enable. Then fill out the blanks as you see fit for
- that level.
-
- Maximum Time : This sets the time that you allow for
- this security level.
-
- The next options are the DAILY Kilobyte Download limits
- which you can set for each Baud rate that logs onto your
- System. Unlike other options you will use later, 0 does
- not disable daily K limits, it makes the users daily K limit
- 0. To effectively give the user unlimited download
- Kilobytes, make the limit 65000.
- Eg.
- 300 Baud Daily k Limit :20 (Eg 20k download)
- 1200 Baud Daily k Limit :40 (Eg 40k download)
- 1275 Baud Daily k Limit :40 (Eg 40k download)
- 2400 Baud Daily k Limit :80 (Eg 80k download)
- 9600 Baud Daily k Limit :65000 (Eg Unlimited k)
-
- Continue this for all Baud Rates that you use.
-
-
- Page 17.
-
-
-
-
-
-
- Downloads Per Upload : Sets your Download Ratio
- Factor's (FILES) which is the amount of Downloads a user can
- have before he/she must Upload a file. This ratio means
- that when it is set to one, a user must upload 1 file for
- every file he/she downloads. When the ratio is set to 2,
- the user must upload 1 file for every 2 files the user
- downloads. When the ratio is set to 3, the user must upload
- 1 file for every 3 files the user downloads. To disable
- this option, set the ratio to 0. The initial credit for the
- file ratio, means how many files the user can download
- before the ratio is enforced. That is, if set to 1, a user
- can download 1 file, before he/she has to upload. Setting
- the credit to 0, means the user must UPLOAD BEFORE he/she
- can download.
-
- The Next two options are similar to the above but are
- Ratios for Kilobytes. The Ratio for Kilobytes is the
- Downloads in k per ONE k Uploaded. For instance, if this
- was set to 5, then for every Kilobyte the user uploads,
- he/she can download 5 kilobytes. The Initial Download K
- credit is the Initial Free Kilobytes Credit you give the
- user. The examples used above are similar to this
- situation, except that the ratio applies to Kilobytes not
- Files.
-
- Next is that Ratio on Calls/Messages Posted. This is a
- percentage. Just enter the percent of calls to message
- ratio you want the user to use. Setting the percentage
- 100%, means that a user MUST post one message for every call
- he/she makes. Setting the percentage to 200%, means the
- user MUST post 2 messages for every call he/she makes.
- Setting the percentage to 50%, means the user MUST post 1
- message every two calls he/she makes. Setting the
- percentage to 0%, disables the option for the security
- level. Again the initial credit, gives the user some
- "breathing space" before the ratio is enforced.
-
- This Post Call Ratio actually works differently to the
- other two cited above. If the user does not meet the
- required PCR, then there is actually nothing stopping
- him/her from doing anything on the BBS. Through the use of
- the Menu System flag "Test Message/Call Ratio", you can stop
- users who have exceeded this ratio by setting it to YES.
-
- And lastly is the number of days until the users Rego
- Expires for this Security level. This is used to calculate
- when the user registration date will expire for this user.
- At the point of expiring, REGEXP.Q-A is executed at logon
- for that user. See "Questionnaires" for more details on
- "REGEXP.Q-A". Setting this value to 365, would mean that
- the user's registration would expire 365 days after the
- setting of the user's registration date (usually the date of
- when they first logon).
-
-
- Page 18.
-
-
-
-
-
-
- To create another Security Level just hit your INSERT
- key.
-
- To delete a Security Level just hit the DELETE key.
-
- Hit (P) to get a great Pick List of all the Security
- Levels you have set-up.
-
- Moving between the Security Levels can also be made by
- hitting the Page Up and Page Down keys.
-
- Events
- ------
- Setting of System Events is easy, just hit the INSERT
- key and you will be entering the time you want the event to
- start. Then you can set whether the event is enabled or
- disabled. Next set the ERRORLEVEL you want Ezycom to exit
- with. And the last thing to do is tell Ezycom when to use
- the Event, just pick the days required or all days. Events
- can be used to trigger events on your systems, such as
- system maintenance. If, the user is on-line when an event
- should take place, they are automatically dropped off, so
- that the event can be processed. Events are triggered 5
- minutes earlier than the actual start time, so it could be
- possible for Ezycom to come back on-line before the actual
- event start time. If this occurs, Ezycom will NOT trigger
- the event again, it will continue as per normal. If, Ezycom
- is not running when an event occurs, then Ezycom will NOT
- execute the event when fired up.
-
- Start Time : 07:30
- Status : Enabled
- Errorlevel : 20
- Days Active : Sun Mon Tue Wed Thu Fri Sat
- Last Run : 23-04-1992
-
- This example shows that there is an event at 7:30,
- which will exit Ezycom with errorlevel 20 on all days of the
- week.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 19.
-
-
-
-
-
-
- Textfiles
- ---------
- These are the textfiles you are able to edit with the
- editor you set up as the Editor, in the Path section of the
- config.
-
- Trashcan.Ctl. This is the list of names not allowed on
- your system.
-
- PhoneDup.Log. This is a log file created by Ezycom
- that tells you if there are more than one user using the
- same phone number.
-
- PhoneNum.Ctl. This file has the list of phone numbers
- that you have deemed not allowed on your system.
-
- Newuser.Q-A. This file is displayed to all new users
- to fill out. See the Questionair Documation later in this
- file to see the laungage used in this file.
-
- RegExp.Q-A. This file is displayed to users that have
- loged on after there regodate has expired.
-
-
- Drop Dos
- --------
- This will let you shell out to DOS. Type EXIT to
- return to Ezycom.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 20.
-
-
-
-
-
-
- Misc
- ----
-
- New User
- --------
- Choosing this option you will be able to set all the
- options that need to be set and ask when a new user logs on
- to your BBS.
-
- First set if you want your New Users to be asked for
- there Home/Voice Phone Number. (Toggle with the ENTER Key).
-
- Next is Ask NewUser Phone Number 2 which can be Toggled
- between NoPhone (don't ask for number), Business or Data.
-
- You will then have to set if you want to use a forced
- phone format which is configurable in the next option.
-
- After setting the phone format you set the following
- options by toggling each one with the ENTER key.
-
- Ask NewUser for Alias : Yes
- Ask NewUser for Date of Birth : Yes
- NewUser Ansi : Ask
- NewUser Avatar : Ask
- NewUser Full Screen Editor : Ask
- NewUser Clear Screens : Ask
- NewUser More Prompt : Ask
- NewUser IBM Characters : Yes
- NewUser Date Format : Ask
-
- The toggles are as follows Ask, No or Yes.
-
-
- Alias...............User alias for systems that allow them.
- Date of Birth.......Date of Birth (used for Security Check).
- Ansi................Ansi Graphics (On or Off).
- Avatar..............Avatar Graphics (On or Off).
- FSE.................Full Screen Editor (On or Off).
- Clear Screens.......Clear Screen codes sent.
- More Prompt.........More Prompt or not.
- IBM Characters......HighBit Characters to be sent.
- Date Format.........Either DD-MM-YYYY or MM-DD-YYYY
-
- Now set the NewUsers Logon Security Level. This is the
- level that you set for ALL New Users to your BBS. Set a low
- one so you can enhance it as you feel. You can override
- this if you set one in the NEWUSER.Q-A file but more on that
- later.
-
- Next is the New Users Flags.
- The Flags are labelled A..D with each flag having 8 settings
- that is to say A1..A8 B1..B8 etc. you can use these flags to
- enhance your Security Levels.
-
- Page 21.
-
-
-
-
-
-
- Next is the Minimum Length of the Password you want
- your New Users to use. (The longer the better!!)
-
- Next is the Minimum baud rate for Ansi and Avatar. Any
- user logging on under this baud rate will get ASCII graphics
- only.
-
- FilePoints are the next option you are able to set.
- This sets the initial amount of file points a user receives
- when logging on for the first time.
-
- The last option in this screen is the New User Net Mail
- Credit. This allows New Users the option to use Net Mail
- from there first logon.
-
-
- Logon Info
- ----------
- This section shows options that are used to set the way
- Ezycom handles each Logon attempt. I will List them here
- and then explain.
-
- Forced Password Change (Calls) : 0
- Ask for Date of Birth (Calls) : 0
- Ask for Phone Number (Calls) : 0
- WatchDog Message Board (0=Off) : 0
- Minimum Logon Security : 5
- Number of Logon Attempts : 3
- Allow OneWord Logon Names : No
- Minimum Logon Baud Rate : 300
- Minimum Slow Baud Rate : 300
- Slow Baud Start : 00:00 End : 23:59
- Low Security Start : 00:00 End : 23:59
- Minimum Baud for File Transfers : 300
- First Registration Expire Warn : 30
- 2nd Expire Warning (Days) : 10
- Check for Mail at Logon : Ask
- Check for Files at Logon : Ask
- Fast Local Login : Yes
- Display Remote User's Password : No
- Allow Sysop Remote : Yes
- Auto Detect ANSI : Yes
- IEMSI : Yes
-
-
- Forced Password Change. Allows the Sysop to set at
- what number of calls the user's should change there
- Passwords. This is for better Security on your System as
- users have to keep changing there passwords to stay on the
- system.
-
- Ask for Date of Birth. Is also a Security feature that
- Ezycom uses to make sure that the user logged on is who they
- say they are. They will be asked every XX calls.
-
- Page 22.
-
-
-
-
-
-
- Ask for Phone Number. This is also a Security feature.
- The user will be asked to enter there Phone Number (Last
- four digits) to stay logged on to the system. You set the
- number of called between asking for this check.
-
- WatchDog Message Board. This tells Ezycom where to
- post a message, that you have written to be posted. This
- message should let the User know that someone has tried to
- log in under there password and failed. A good place for
- this message is the Sysop's Conference if you allow users to
- read messages in this area. A file called WATCHDOG.ASL must
- be placed in the Ezycom system directory, which is a plain
- text file, that contains the message you wish to send to the
- user.
-
- Minimum Logon Security. Is the lowest security level
- that you will allow users to login under. Eg. if you set
- New User Security Level to 5 but have a level lower than
- this for Users that may have Upset you, you can give them
- this access. Users between security level 1 and this
- security level, can logon between the times allocated by low
- security start and end time. Note that users with Security
- Level 0, are ALWAYS barred from the system.
-
- Number of Logon Attempts. If the user goes over this
- setting they will not be logged on to the system. As they
- would have failed to enter the correct Password in the
- amount of attempts that you have set here. If you have set
- the WatchDog Message to a message board the user will be
- notified when he/she logs on next.
-
- Allow OneWord Logon Names. This is for Systems that
- allow there Users to login under an Alias (First time on) or
- allow Users to use there First Name as a Login Name.
-
- Minimum Logon Baud Rate. Is the slowest Baud Rate that
- Ezycom will allow users to gain access to your system.
-
- Minimum Slow Baud Rate. Is a baud rate the you can set
- so you can pick the time the users with slow modems can
- access your BBS.
-
- Slow Baud Start and End. This is the time that you
- allow users with the SLOW modems to access your system.
-
- Low Security Start and End. Is the time that you allow
- the users that have the Security level less than that set in
- the Minimum Logon Security. Eg. If the minimum security
- was 5, then those users from security levels 1 through 4,
- could logon between these times. A start and end time of
- 00:00, would indicate users can logon all the time, but any
- other time intervals where start and end times match, would
- indicate these users can NEVER logon.
-
-
- Page 23.
-
-
-
-
-
-
- Minimum Baud for File Transfers. This sets the slowest
- baud rate that you will allow your users to download/upload
- from/to your file areas.
-
- First Registration Expire Warning. Is when Ezycom will
- let the user know that there registration will expire in the
- number of days you set here.
-
- 2nd Expire Warning (Days). The user will be notified
- again about there registration expiring soon. This expiry
- warning should be LATER than the first warning, for it to
- function correctly.
-
- Check for Mail at Logon. With this option you are able
- to toggle whether you want the system to Check for NEW Mail
- at each Logon, Ask the User each Logon or Never ask the
- user.
-
- If you pick not to ask or check for mail make sure that
- you have an option in one of your menus or the user will
- never know when they have new mail.
-
- Check for Files at Logon. This is similar to the Mail
- Checking option above but for New Files on your system.
-
- Fast Local Login. With this option set to Yes all you
- have to do is hit Enter at the Logon Prompt, and the Sysop
- will be logged into the system.
-
- Display Remote User's Password. This option when set
- will display the Remote User's Password on your screen.
-
- Ask for Local Password. If you have this option set
- you will have to enter your password when logging into the
- system.
-
- Auto Detect ANSI. With this set Ezycom will Auto
- detect ANSI so it will display ANSI graphic files and menus.
- If the User has another graphic setting in his/her UserBase
- Record that one will be used.
-
- IEMSI. This allows users to logon to Ezycom using the
- IEMSI portocol. Just set it to Yes to trun it on.
-
-
-
-
-
-
-
-
-
-
-
-
- Page 24.
-
-
-
-
-
-
- Colours
- -------
- In this screen you can define the way Ezycom displays
- colour in your BBS. You will be able to set many different
- colours for many different options.
-
- Status Bar Foreground :
- Status Bar Background :
- PopUp Window Foreground :
- PopUp Border Foreground :
- PopUp Background :
- PopUp Text Colour :
- PopUp HighLight Colour :
- Foreground Colour :
- Default Message Quote :
- Default Message Colour :
- Default Message Prompt :
- Default Prompt Bkgrnd :
- Default FileName Col :
- Default FileStata Col :
- Default FileDate Col :
- Default Descrip Col :
- Default Uploader Col :
- NewUser Colour 1 :
- NewUser Colour 2 :
- Change Stats Colour :
- Enter Prompt Colour :
-
- By moving to the one you want to change with the up and
- down arrows all you have to do is hit ENTER to toggle the
- colour change. So as you can see its easy to get a
- different looking BBS just by changing a few colours.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 25.
-
-
-
-
-
-
- Prompts
- -------
- In this section you can modify all the Prompts that
- Ezycom uses in the course of running your BBS.
-
- Name : Please Enter Your Name :
- Password : Enter Password :
- Jump To Dos : Sysop shelled to DOS!
- Back from Dos : Sysop back from DOS!
- Enter : Press [Enter] to continue
- Enter Chat : Sysop breaking in for a chat..
- Exit Chat : Sysop ending chat..
- Bulletin : Please Select an option.
- Type 7/15 Exit : It's here somewhere??
- Alias : Please Enter your Alias (Return=None)
- ANSI : Can Your Terminal Support ANSI Graphics
- Avatar : Can Your Terminal Support Avatar Graphics
- Phone Check : Scanning for duplicate Phone Numbers...
- Full Screen Ed : Use the Full Screen Editor
- Location : Please Enter your Suburb and City :
- Screen Length : What is your Screen Length :
- Scan UserBase : Searching the UserBase
- Screen Clear : Do you want Screen Clearing Codes Sent
-
- As you can see, you have plenty of options to make your
- BBS look the way you want it.
-
- Paging
- ------
- As most people are home more on the weekend than the
- rest of the week, we at Ezycom thought that you would like
- to be able to set the paging hours to what ever you like.
- You can also set the number of times that the user can page
- you per session. If you have a Sound Blaster Card, Ezycom
- will use it (if you like) to play a tune when a user asks
- for a chat. You can do this by setting the Hex address and
- IRQ of the sound blaster card, and defining the External
- Pager (in paths set-up) to run the Ezycom Sound Blaster
- module. When a user requests a chat, you can optionally ask
- the user for a reason. Setting this option to Yes enables
- this feature. After a chat request has failed, you can
- optionally, allow the user to post a message to you. Setting
- the message board number to a number greater than 0, enables
- this feature, and will post the message in this conference.
-
-
-
-
-
-
-
-
-
-
-
- Page 26.
-
-
-
-
-
-
- Screen Options
- --------------
- In this screen you will be able to tell Ezycom will
- handle how it operates on your system. Like how it writes
- to the screen, if it checks for snow etc. The following
- points should help when filling out this section.
-
- Direct Screen Writes. This tell Ezycom if you want it
- to write the information directly to the screen or use the
- bios.
-
- Check for Snow. If you have an old Cga Card Ezycom may
- cause snow on your screen by its way of writing to the
- screen. If you enable this option Ezycom will check your
- system set-up and if it detects snow it will do its writes
- in a way to stop it.
-
- 40/50 Line Mode. If you have an EGA/VGA card and
- screen, you can utilize its enhanced capabilities, by
- setting this option to Yes. This will display more lines on
- the screen depending on the Card/Screen you have. This will
- enable you to see more files/more of a message on the screen
- at any one time.
-
- Screen Blanking. When Ezycom is in Waiting for Caller
- mode, you could possibly get screen burn in, if your monitor
- is left on all the time. Setting this option to an amount
- of seconds, will tell Ezycom to BLANK the screen after
- waiting that time, thus SAVING your monitor.
-
-
- Alt - Ctrl Function Keys
- ------------------------
- The Alt-Function keys enable you to set an option to be
- executed while users are online. Much in the same way as a
- Type 7 Exit. These options could include, running FEdit,
- running EzyMenu etc. An example of Alt-Function keys is
-
- Alt-F1 EzyEd.Exe
-
- Pressing Alt-F1 would run EzyEd.
-
- Note: The Ctrl-Function keys are not yet available for
- use in Ezycom, but will be used in upcoming versions.
-
-
-
-
-
-
-
-
-
-
-
- Page 27.
-
-
-
-
-
-
- Sound
- -----
- If you set start and ending time this will enable the
- bell (Speaker) to chime when a user logs on in stand alone
- mode. A start time of 00:00 and end time of 00:00 enables
- full 24 hour chimes, whereas a start time of 00:01 and end
- time of 00:01 disables it completly. Any other times, only
- enables it during those times.
-
- Incoming Call Bell Start Time : 00:00
- Incoming Call Bell End Time : 00:00
-
- Access
- ------
- These access settings are to set your system up in
- special ways.
-
- Guest Account : EZYCOM
- System Password : [UnUsed]
- Logon Password : [UnUsed]
- Newuser Password : [UnUsed]
-
- The example above shows that you don't need to use all
- the features in this section. Just the ones you want.
-
- Guest Account : This allows you to make an account.
- That lets you configure your system to allow special users
- to have a special security level that can do differant
- things on the system. You have to open an account with
- ezyed (userbase editor) with the same name. If you use the
- Topmenu option in the user editor (page 2) you can setup an
- entirely differant system to your nomal one. If you have
- mulitable lines, currently only 1 user can use this account
- at a time. As the system will think that the user is trying
- to logon twice and kick the second user off the BBS.
-
-
- System Password : This password is used to lock out all
- the special "Alt" keys from the local keyboard. When an
- "Alt" key is pressed, the user is prompted for a password.
- If the user types in the correct password, then the "Alt"
- keys become free to use for the remainder of the session.
-
-
- Logon Password : This password is used to stop user(s)
- logging on your system unless they know this password. If,
- they do not get it correct, then they are denied access to
- the system. (Not implemented)
-
-
- NewUser Password : This password is used to stop new
- users gaining an account on your BBS, unless they know this
- password. (Not implemented)
-
-
- Page 28.
-
-
-
-
-
-
- System
- ------
- Now the most important part of this section as it tells
- Ezycom how to operate on your computer. This is a list of
- options:
-
- System : Your BBS System Name
- Sysop : Your Name
- Sysop's Alias : Your Alias if you use one
- System Location : Your City and Country
- Inactivity (Mins) : 5
- Multiline Messages : Yes
- Multi Tasker : Auto-Detect
- Use Extended IBM Chars : Yes
- Swap Out on Jump to Dos : Yes
- Top Menu : Top
- Log to Printer : No
- Printer Port : LPT1
- Password Echo Character : *
- High Bit Replace Char : o
- Max Time to Bank : 0
- Max ks to Bank : 0
- Freq of Message Check : 1 secs
- Minimum Age for .MNU Test : 18
- Utility Date Format : DDMMYY
- Use EMS for Overlays : Yes
- Swapping Type : EMS
- Enclosing Brackets : ()
- Left Bracket : (
- Right Bracket : )
-
- System. Is where you place the name you wish to use
- for your BBS.
-
- Sysop. Place your name here so all messages addressed
- to the Sysop will be sent to you, also it will be the name
- used for the fast logon if you have set it to on.
-
- System Location. This is the city and suburb where
- your BBS is location. Eg: Moorabbin Melbourne
-
- Inactivity (Mins). If the user online hasn't hit a key
- in the time set in this option he/she will be logged off.
-
- Multiline. This tells Ezycom to perform multiline
- capabilities, including internode messages, user to user
- chats, and other various updates.
-
- Multi Tasker. Allow you to toggle how it detects if
- your system is running under a Multi Tasker such as Desqview
- or Double Dos or others. Just hit Enter to toggle the
- display.
-
-
-
- Page 29.
-
-
-
-
-
-
- Use Extended IBM Chars. This allows users to type in
- Extended characters. ie If your user are not always English
- speaking, then their name might include some Extended IBM
- characters, although disabling this option, helps reduce
- line noise.
-
- Swap Out on Jump to Dos. With this set to Yes Ezycom
- will swap out to either EMS or your hard disk (depending on
- the setting for swapping) this will give you more room in
- Dos on the swap out.
-
- Top Menu. The name of the first menu Ezycom is to
- display. This can be any menu you like but it must be in
- the menu path on your computer.
-
- Log to Printer. This will send all the Log information
- to your printer, except for local logins.
-
- Printer Port. Is the port that Ezycom will send the
- Log to. This can either be LPT1->3, or COM1->4. Make sure
- that you do not log to the comport being used for modem
- communications.
-
- Password Echo Character. Is the character that the
- user will see when they enter there password on your system.
-
- High Bit Replace Char . This character will be sent to
- users that can only access low bit ANSI screens.
-
- Max Time to Bank. Is the maximum time that you will
- allow users Bank. This time will allow them to stay on the
- system longer than the normal setting for there security
- level, only until this time is used up.
-
- Max ks to Bank. Similar to the above option but it
- deals with the users Kilobytes access, so the user can get
- that file which is a little over there limit.
-
- Freq of Message Check. Is how often Ezycom checks for
- inter-node messages for multi node systems. Internode
- messages are ONLY checked with in User/User chats or in
- moving around menus.
-
- Minimum Age for .MNU Test. If you have message areas
- or file areas that have information that maybe XXX. Or you
- feel that young user should not have access to these areas,
- all you have to do is set the age limit that your users have
- to be over to get access to those areas. You also have to
- set this option in your menus otherwise it won't work.
-
- Utility Date Format. Toggles the two date formats that
- Ezycom can use either DDMMYY or MMDDYY.
-
-
-
- Page 30.
-
-
-
-
-
-
- Use EMS for Overlays. Tells Ezycom if its allowed to
- use your EMS memory (if you have it) for its overlay files.
- This will speed the system if set to Yes.
-
- Swapping Type. This option allows you define what type
- of swapping type used in Ezycom. The swapping techniques
- ranges from EMS, XMS, DISK, EMS then XMS then DISK, or XMS
- then EMS then DISK.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 31.
-
-
-
-
-
-
- File Areas
- ----------
-
- File Area
- ---------
- Here we set-up your file areas for the BBS. Please
- read this and the following sections very carefully as the
- information shown here will take a while to get through.
- But one you understand how Ezycom file areas are set-up, you
- will then have one of the best file area managers and
- filebase's in the world of BBS's.
-
- Category 1 Name : General IBM Files
- Area Path : 1-C:\FILES\GENERAL\
- Upload File Area : 10-New Uploads
- Conversion : ZIP
- Offline Allowed : No
- Sort by : Alpha
- Master List : No
- User Security : 5
- User Flags
- Sysop Security : 1000
- Sysop Flags
-
- Category ## Name. This is the name you wish to call
- this file area, try to be as informative as possible as this
- name what is displayed to your users.
-
- Area Path. This is the path where all uploads, and all
- moves (of files) to this path are placed. The actual path
- is defined in the "File Paths" section of the config. This
- allows multiple paths for one file area, or multiple file
- areas for one path. Generally, the Area Path Number, would
- be the same Number as the File Area. You can press "P" for
- a pick list, if you forget the Area Path number.
- Example:
- File Area 1
- -----------
- Category : IBM New Uploads
- Area Path : 1-C:\F\IBMUPLD
- Upload File Area : 1-IBM New Uploads
-
- File Area 2
- -----------
- Category : IBM General Files
- Area Path : 2-C:\F\IBMGEN
- Upload File Area : 1-IBM New Uploads
-
- File Area 3
- -----------
- Category : IBM Virus Support
- Area Path : 3-C:\F\IBMVIRUS
- Upload File Area : 1-IBM New Uploads
-
-
- Page 32.
-
-
-
-
-
-
- Upload File Area. This is the file area where ALL
- UPLOADS that are done to this template file area (explained
- in the menu configuration documentation). Eg. If you had
- an IBM Uploads area, you would place that number in all IBM
- areas, so that all uploads would go to that file area. You
- can also press "P" for a pick list of file areas, in case
- you forget the file area number of IBM Uploads.
-
- Conversion. You can pick the conversion type you wish
- your files converted to. If you like ZIP then if a user
- uploads a file called FRED.LZH then in the next maintenance
- Ezycom will convert the file to the format you place here.
- The formats supported are None, ZIP, LZH, ARJ, PAK, ARC and
- ZOO. So as you see we have covered most formats. If, you
- have any other formats you wish added, please contact us,
- and we should be able to provide support for it in future
- versions. To set up conversion mechanisms, see
- "Conversion".
-
- Offline Allowed. This option tells Ezycom, whether
- offline descriptions are allowed. If, set to No, then any
- file descriptions that do not have the associated file on
- your hard disk, will be removed file list. If, Offline
- allowed is set to Yes, then all file descriptions without an
- associated file on your hard disk, is set Offline. If, you
- have large file lists, that hold all files that used to be
- on the hard disk, but are now offline, then to stop Ezycom
- checking to see if the file is now online, set Offline
- Allowed to "Offline, Keep Offline".
-
- Sort by. This tells Ezycom in what way you would like
- your users to see the file listing. The options are None,
- Date and Alpha.
-
- Use in Master List. This tells Ezycom if the
- particular file area, should be used in Master Lists
- generated with EzyMaint. However, this does not effect the
- Online Master List Generator.
-
- User Security. Is the security level that users need
- to gain access to this file area.
-
- User Flags. These are the flags that the user MUST
- have set to gain access to this file area.
-
- SysOp Security. This security level is the one needed
- to gain SYSOP access to the file area listed.
-
- SysOp Flags. As for the user flags but applying to the
- SYSOP. As you can see if you like you can set some users as
- SysOps to selected file areas. For Co-SysOps and alike.
-
-
-
-
- Page 33.
-
-
-
-
-
-
- File Paths
- ----------
- The paths you set up here are the file area paths that
- your BBS uses for all your users at any security level you
- might have set.
-
- File Path : C:\FILE\GENERAL\
- Dnld Security : 5
- Dnld Flags
- New Files Area : 1-GENERAL IBM FILES
- Password : [UnUsed]
- CD Rom Path : No
- Sec Action : File Displayed as Not Enough Security
- Free Path : No
- Check Age : No
-
- File Path. Is the path to the file area to be
- displayed to the user.
-
- Download Security. This is the minimum security needed
- to be able to download off this path. This security also
- effects functions such as view archive, and view text file.
-
- Download Flags. Are the flags needed by the user to
- download off this file area.
-
- New Files Area. When Ezycom finds a file in this
- directory, that is NOT in ANY of the file lists, it can
- optionally place this file in a file area for you. This is
- the file area that it should place it in. You can press "P"
- for a pick list, if you forget the file area number.
-
- Password. If you place a password here the user must
- enter it to download a file in this path.
-
- CD Rom Path. If this path is on a CD Rom, then make
- this "Yes" to tell Ezycom, not to MOVE/DELETE files in this
- area. It also aids in efficiency, in maintenance.
-
- Sec Action. When a user tries to download a file in
- this area, and does not have enough Security/Flags/Age to
- download it, this is the type of message that Ezycom will
- display to the user. Eg. If you set it to "Not Found",
- then Ezycom will tell the user that this file is not found,
- whereas if you set it to "Security File", ezycom will tell
- the user they do not have enough access, to access the file.
-
- Free Path. You toggle this option with the enter key.
- If this option is set to "Yes", then ALL files in this path
- are TOTALLY FREE to the user.
-
-
-
-
-
- Page 34.
-
-
-
-
-
-
- Check Age. If you select Yes to this feature Ezycom
- will test the users age against the Age set in the system
- set-up. If the user is below this age the user will not get
- access to this file path.
-
- To move around the file paths you can hit the page up
- or page down keys or hit P to get a pick list of the file
- paths that you have already entered.
-
-
- Misc File Options
- -----------------
- With these choices you tell Ezycom how to behave when
- using Bimodem, Archiving and many other options.
-
- Minimum Upload Space (k) : 20
- Swap Out on Bimodem : Yes
- Ezymaint Conversion Swap : EMS/XMS
- Swap Out on Upload Checks : Yes
- Minimum Ignore FPs Given : 1000
- FPs credited for Download : 100%
- Time of Upload FPs Given : 100%
- 1 File Point is worth (k) : 1
- Maximum File Areas : 50
- Upload Time Credit Factor : 100%
- Min Description Length : 5
- Max Description Length : 50
- Delete Incomplete Uploads : No
-
- Minimum Upload Space. This is the minimum space that
- your hard disk must have to let Ezycom allow a user to
- upload to your system.
-
- Swap Out on Bimodem. If set to Yes Ezycom will swap
- out to either disk or EMS. (depending on what you have set
- the swap outs to) This will give Bimodem more room to use
- in its shell, thus making sure of it running with no
- problems.
-
- Ezymaint Conversion Swap. This tells Ezymaint whether
- to Swap out Memory (leaving 4k resident), when processing
- DOCONV.BAT (Conversion). You can select either EMS, XMS or
- DISK. Two other options XMS/EMS and EMS/XMS exist to allow
- Ezymaint to check for the existance/use of these memory
- management devices in the order shown.
-
- Swap Out on Upload Checks. If you use the upconv.bat
- file that comes with Ezycom it will check the file for
- integrity, scan for Viruses (if you have and use Scan by
- McAFEE) and convert archive types if needed. So if you do
- set this option to Yes it will give the running programs
- plenty of room to do its work.
-
-
-
- Page 35.
-
-
-
-
-
-
- Minimum Ignore FPs Security. This option sets the
- lowest limit that your users must have to not worry about
- being caught by the filepoint ratios.
-
- FilePoints Credited for Download. This sets the
- percentage of a filepoint which is given to the uploader of
- the file the user downloaded. That is, the more downloads
- of the file, the more filepoints the upload will receive.
-
- Time of Upload FilePoints Given. This sets the
- percentage of filepoints given, when the user UPLOADS the
- file to the system. You may wish to set this to NULL, so
- that the user ONLY receive filepoints for POPULAR files.
- That is, files that are download.
-
- 1 File Point is Worth (k). This tells Ezycom what in
- kilobytes a file point is worth. Any amount you think fit
- could be used here anywhere from 1k to 255k. The higher the
- amount in k, the less accurate filepoints is. That is, if
- you set this to 30k, downloading a 10k file is free in terms
- of filepoints. Setting this option to 0k, disables the
- filepoints system.
-
- Maximum File Areas. With this option you set the
- amount of file areas you wish to have as a maximum for your
- BBS. Ezycom can handle Up to 400 file areas.
-
- Upload time Credit Factor. Is the percentage of time
- the user receives for uploading a file. Eg. 100% would
- mean that the user looses no time for uploading, whereas
- 200% would give the user double the time he spent uploading.
-
- Minimum Description Length. As it says this set the
- minimum length you wish the user to describe the file's
- he/she just uploaded.
-
- Maximum Description Length. Is similar to the above
- option only that it sets the maximum description length.
- One point to note is that if you have it set over 50 you
- will find that it might cause a slight hassle with the
- master lists generated.
-
- Delete Incomplete Uploads. If set to Yes Ezycom will
- kill the incomplete upload. But if you do set this, Zmodem
- or any other protocol that allows recovery of aborted
- uploads, will not function correctly.
-
-
-
-
-
-
-
-
-
- Page 36.
-
-
-
-
-
-
- File List
- ---------
- This section sets how Ezycom displays file information
- to you the Sysop and your users. This is another way you
- can make your BBS look different to the others.
-
- User Show Date : Yes
- User Show FileSize : K
- User Uploader : No
- User Download Count : Yes
- User Show New File : Yes
- User Show Security : No
- User Transfer Time : No
- User Show File Points : No
- User Show Security Files : No
-
- This is the User part of the File List section. This
- only applies to people that have access to your files for
- downloading.
-
- User Show Date. This will show the date of the files
- in the list. The options are either Yes or No.
-
- User Show FileSize. Tells Ezycom how to display the
- file size to the user online either in Kilobytes, Bytes or
- not to display the file size at all. If you pick None you
- can display the file points for the file instead.
-
- User Uploader. If set to Yes, Ezycom will show the
- user who uploaded the files that they are looking at.
-
- User Download Count. This shows the user how many
- times the files listed have been downloaded by your users.
- Either Yes or No.
-
- User Show New File. This will show the new files to
- your user's when they ask for that list.
-
- User Show Security. When a file is marked with a
- Security flag (using FEdit), you can optionally show that
- these files are security files. The default would display
- an "S" on any security files.
-
- User Transfer Time. With this option on Ezycom will
- tell the user's online how long it would take them to
- download the files. This is an estimate based on the baud
- rate used.
-
-
-
-
-
-
-
-
- Page 37.
-
-
-
-
-
-
- User Show File Points. This shows how many file points
- each file is worth so the user's can quickly workout if they
- can download the file, as long as they know how many points
- they have left. This option only displays file points if
- the user does not have the "Ignore File Points" Flag set on,
- or their security is below the "Ignore File Points"
- Security. As File Points is only in registered versions,
- this feature also only works in registered versions.
-
- User Show Security Files. If option allows the sysop
- to decide whether or not to show the user "Security Files",
- that is files marked with Security. Setting this option to
- No, makes Security work in the same was as Private.
-
- The following list is what you can show the Sysop.
- This is the same as the User list so its the same to set-up
- the only difference are the last two options which are set
- for both User's and the Sysop.
-
- Sysop Show Date : No
- Sysop Show Filesize : K
- Sysop Uploader : No
- Sysop Download Count : Yes
- Sysop Show New File : Yes
- Sysop Show Security : Yes
- Sysop Transfer Time : No
- Sysop Show File Points : No
- Highlight New Files : Yes
- Show New Files Character : Yes
- Security Files Char : S
-
- Show New Files Character. This option selects whether
- you wish a new files character ("*") is shown, not shown or
- just shown to ASCII users.
-
- Highlight New Files. If this option is set, then all
- new files are highlighted, and non new files are dull.
-
- Security Files Character. This is the same as the
- above option only that it applies to files that the user has
- not enough security to download.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 38.
-
-
-
-
-
-
- File Security
- -------------
- The file security options listed in this area are about
- what files can be password protected separately or if its a
- free download off your system.
-
- Filename : BADFILE.BAD
- Security : 0
- Flags
- Password : [UnUsed]
- Sec Action : File Displayed as Not Enough Security
- Free File : No
- Age Check : Yes
-
- Filename. Is the file that the following options will
- apply to. This can contain wildcards such as "*.GIF". Note
- that Ezycom will "translate" wildcards for performance
- reasons into something like "????????.GIF".
-
- Security. The security level needed to download/view
- the file(s) listed.
-
- Flags. The security flags for the file listed.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 39.
-
-
-
-
-
-
- Password. If one is placed here the user will have to
- supply the correct password to download/view the file. Note
- that this password overrides that found in filepaths.
-
- Security Action. You have two options to pick from ans
- here they are.
-
- File Displayed as Not Enough Security
- File Displayed as Not Found
-
- Depending on which one you have picked the user will either
- be display that the file requested had not enough security
- to download or it wasn't found.
-
- Free File. Either yes or no on this option and as it
- implies the file is either free to download or not. Note
- that this setting overrides the setting in FilePaths.
-
- Age Check. If set to yes Ezycom will check the user's
- age against the age set in the system's config. If the user
- is younger than the test age the user will not have access
- to that file.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 40.
-
-
-
-
-
-
- Global File Options
- -------------------
-
- These option operate on the file areas GLOBALLY so be
- careful as they are very powerful.
-
- Set Default Security
- Set Default Flags
- Set File Area Conversion
- Set File Area Sort
- Set File Area Offline
- Set File Area Master List
- Set CD Rom Drive
- Set Security/Not Found
- Set Protocol DSZLOG Style
- Set File Area Delete Old
- Set File Area Upload Area
- Set File Area Upload Path
- Set File Path Upload Area
- Centre File Area Name
-
- Set Global Security. This will enable a popup window
- that shows the following options. That deal with security
- on all aspects of the file base.
-
- User File Area Security
- Sysop File Area Security
- Protocol Security
- File Path Security
- Individual File Sec
- Quit
-
-
- User File Area Security. If you use this option you
- will be setting the user security for ALL of your file
- area's. This maybe the best option to use if you have many
- file areas that all your users have access to, if you only
- have a few areas that the normal users don't have access to
- then just go to that one and change it as in the file area
- section.
-
- Sysop File Area Security. As with the above option
- this sets all the file area's sysop security. If you have
- different sysops for different file areas you would/should
- have different security levels for each sysop. If they are
- the same all of them would be sysop's of each others area.
- The other way to make them different is to use the flags,
- more on this later.
-
- Protocol Security. This will set the security level
- needed for any user to gain access to the file transfer
- protocols. If set too high none of your users will be able
- to upload or download files off your system.
-
-
- Page 41.
-
-
-
-
-
-
- File Path Security. This will set the level of
- security needed to gain access to the file path's and files
- on the system.
-
- Individual File Security. If you have files that you
- want protected by a separate security level you can set them
- all to the same security level with this option.
-
- Quit. As is implies this quits back to the previous menu
- list.
-
- Set Default Flags. As with the set default security
- this option also displays another popup window.
-
- User File Area Security
- Sysop File Area Security
- Protocol Security
- File Path Security
- Individual File Sec
- Quit
-
- Each option list is the same as the previous menu and
- affect the flags in the same way.
-
-
- Set File Area Conversion. This displays a smaller
- popup window which shows you how to change the conversion
- type.
-
- SPACE=Change, ENTER=Accept and ESC=Quit : None
-
- By toggling the option with the space bar you can set
- the default conversion type to None, Zip, Lzh, Arj, etc. You
- then hit the Enter key to tell Ezycom that the type
- displayed is the type you want, or hit ESC to exit with NO
- change.
-
- Set File Area Sort. As with the above option this also
- displays a small popup window the same as the last one.
-
- SPACE=Change, ENTER=Accept and ESC=Quit : None
-
- Again by hitting the space bar you are able to toggle
- between the options, which are None, Date or Alpha. The
- Enter and Esc keys behave the same as the previous option.
-
- Set File Area Offline. Yet another option with a popup
- that looks like the last and behaving the same.
-
- SPACE=Change, ENTER=Accept and ESC=Quit : No
-
-
-
-
-
- Page 42.
-
-
-
-
-
-
- This time the options are No, Yes or Keep OFF. The
- Keep Off option will set the file OFFLINE all the time
- unless you set it otherwise.
-
- Set File Master List. You only have two options in this
- popup window Yes or No. Again Space to toggle Enter to
- accept and Esc to exit.
-
- Set CD Rom Drive. This is to set the drive letter's of
- your CD's if you have them. The options are C to Z for the
- drive letters. This option basically sets the CD Rom Flag
- of All Paths using these Drives letters to Yes.
-
- Set Security / Not Found. With this option you can set
- Files or Paths to NOT FOUND if you want.
-
- Set Protocol DSZLOG Style. This sets your log style to
- enable you to use the Dsz log style needed when using DSZ or
- GSZ or another protocol that uses this type of logging
- style.
-
- Set File Area Upload Area. This sets the default
- Upload file Area for all of your file areas. All you have
- to do is enter the area number you wish to use as the
- default upload file area. You can chose form a Pick list of
- all of your file areas if you like.
-
- Set File Area Upload Path. This sets the default
- Upload file Path for all of your file areas. As in the
- previous option this allows you to also chose the path from
- a pick list of the paths.
-
- Centre File Area Names. As it implies this will Centre
- all the file area names so when you display them to your
- users in an ansi, ascii or avatar screen they will be
- Centred.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 43.
-
-
-
-
-
-
- Ezyprot, Protocols
- ------------------
-
- Default Set-up Protocols
- ------------------------
- Ezycom comes with its own external protocol engine
- called EzyProt. Currently, it does not use the Fossil
- Driver, but this will come in later versions. This set-up
- is made to work regardless of whether you have locked com
- ports or not. The protocol engine comes with XModem, XModem
- CRC, XModem-1K, XModem-1KG, YModem, YModem-G, ZModem, Kermit
- and ASCII. These protocols automatically dupe check on the
- fly, that is, when a new file is sent, it checks it for a
- duplicate file, and if so, stops that file from being sent.
- If, the user is using ZModem, then the file is simply
- skipped, but if YModem/Kermit is being used, then the whole
- transfer is aborted, unfortunately. Single file transfers
- are different, since, Ezycom stops the user from uploading
- the duplicate file before it passes to Ezycom.
-
- Ezycom also comes with a sample setup for Moby Turbo
- (in registered versions of DSZ), Lynx and Puma. They have
- been disabled, in case you do not have these protocols. If,
- these protocols are installed, then DSZLOG must be set for
- them to work. Normally, the DSZLOG path would look like
- "set DSZLOG=C:\EZY\DSZ.1" for node 1, "set
- DSZLOG=C:\EZY\DSZ.2" for node 2, and so on.
-
- As stated earlier Ezycom at the moment does not use the
- fossil, so if you have non-standard comport assignments then
- you will need to alter the defaults.
-
- Default Comport Assignments
-
- Comport Base Address IRQ Comport Vector
- 1 3F8 4 C
- 2 2F8 3 B
- 3 3E8 4 C
- 4 2E8 3 B
- 5 4220 3 B
- 6 4228 3 B
- 7 5220 3 B
- 8 5228 3 B
-
- If this is not correct for the comport that you are
- using, then you can SET an enviorment variable to tell
- Ezyprot to use special values for that session.
-
- This is done by setting the "EZYPROT" enviorment
- variable this way.
- EZYPROT=<baseaddress>,<irq>,<comportvector>.
-
- Eg to set com1 using the above information would be.
- SET EZYPROT=3F8,4,C
-
- Page 44.
-
-
-
-
-
-
- Of course if multinode operation is being used, and the
- default setup is not the same as you have. You will need to
- set the enviorment for each comport for the nodes you have.
-
- Eg If you are running multinode under Desqview you would
- have to set the environment variable in each Desqview
- window.
- As long as the default does not work on your system.
-
- This is what you see when ezyprot is running.
-
-
- Protocol: Zmodem Bytes sent: 322283
- Block check: Crc32 Bytes remaining: 4004
- File name: EZYCOM1.ZIP Blocks sent: 21
- File size: 326287 Blocks remaining: 4
- Block size: 1024 Block errors: 0
- Total blocks: 26 Total errors: 0
-
- Est. time: 21:51 Throughput: 226 CPS
- Elapsed time: 21:38 Efficiency: 94%
- Remaining time: 0:17
-
- Progress: #################################*******
- Status: Ok
- ---| EzyProt V1.00 |--------------------------------------
- Baud Rate: 2400 Start: 18:18
-
- As you can see you have all the information on the
- download in progress you will need.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 45.
-
-
-
-
-
-
- Bimodem
- -------
- Ezycom has a menu option (Type 30) to run BiModem. This
- is a full blown BiModem interface. No external utilities
- are required. You are required to have a version of BiModem
- V1.24 or later to use with this option.
-
- Place the path where BiModem will reside in your
- CONFIG->Paths->BiModem_Path (Usually C:\EZY\BIMODEM). In
- this directory, you are required to place BIMODEM.COM,
- BICONFIG.COM and the configuration for each Node (BIMODEM.1,
- BIMODEM.2 etc from PROTCFG.ZIP). When Ezycom executes
- BiModem, it tells BiModem to use BiModem.<node> as the
- configuration file for it. To edit the configuration for
- each node, you use
-
- BICONFIG /C BIMODEM.1 for node 1
- BICONFIG /C BIMODEM.2 for node 2 etc
-
- If, your system path is not C:\EZY, then you will need
- to alter the filenames and paths accordingly in BiModem
- Config. Ezycom automatically makes a list of download
- directories on execution of BiModem. This list of paths,
- contains only those of which the user has access to. It
- creates a DOWN.<node> in your BiModem directory. If, you
- want to reject uploads, then make sure your rejection list
- of directories points to this file as well. As users might
- not have access to all directories, it could be possible for
- them to upload duplicate files. If, you do not want this to
- occur, make up your own list of paths (or with EZYFF -
- L<filename>), and make the rejection list point to that
- file.
-
- All BiModem uploads should go to the CONFIG-> Paths->
- Upload_Path. Ezycom will then move the files to the
- directory, which you actually wish to upload to go. ie IBM
- Uploads, Amiga Upload, etc.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 46.
-
-
-
-
-
-
- Setting Up Your Own Protocols
- -----------------------------
-
- Name : XModem Record #1
- Key : X
- Status : Up/Down
- Batch : No
- BiDir (Not Imp) : No
- Log Name : C:\EZY\PROT1\DSZ.*N
- Ctrl Name : [UnUsed]
- Minimum Security : 0
- Flags
- Download Command : C:\EZY\PROT1\DSZ.COM port *P speed *O
- Download Ctrl : [UnUsed]
- Download Log Key : S
- Download Err Key : E
- Dnload Err2 Key : L
- Upload Command : C:\EZY\PROT1\DSZ.COM port *P speed *O
- Upload Log Key : R
- Upload Err Key : E
- Upload Err2 Key : L
- Efficiency : 78%
- Log : FileName : 11
- Log : CPS : 5
-
- As you can see you are able to add extra protocols to
- Ezycom. You will have to read the documentation on the
- protocol on how to set it up for Uploading and Downloading.
-
- Name. Is the name of the protocol used in this record.
- Eg Zmodem, Puma etc. Ezycom will use this to display the
- name to the user online.
-
- Key. This is a ONE character key that the user will
- hit to gain access to this protocol. This should be a
- unique key (not used in other protocols).
-
- Status. The status tells Ezycom what the protocol will
- be able to do. Either Upload, Download, Both or if the
- protocol is Disabled. Use the Enter Key to toggle the
- status of this option. The options are Up/Down, Upload,
- Download or Disabled. If the protocol is disabled it will
- NOT be shown to the user.
-
- Batch. This option tells Ezycom if the protocol is
- able to handle batch uploads or downloads. Eg Zmodem.
-
- BiDir. This is for the new bidirectional protocols Not
- Implemented in this version of Ezycom.
-
- Log Name. Is the name of the log file used. The most
- common will be C:\EZY\PROT1\DSZ.*N. The *N will translate
- to the Node being used.
-
-
- Page 47.
-
-
-
-
-
-
- Ctrl Name. If the protocol is capable of a batch
- transfer it will most likely need a control file to tell it
- what files to download. So you would set this to something
- like C:\EZY\PROT1\FILES.*N as in the previous section the
- *N will translate to the Node being used at the time of
- calling the protocol.
-
- Minimum Security. This is the minimum security the
- user must have to gain access to this protocol.
-
- Flags. This will display a popup window that you will
- be able to edit. Using the up and down arrows you can
- access the flag that you want.
-
- Download Command. This the actual command line that
- will be sent to the protocol file area to get the protocol
- to download. Make sure that you read the documentation on
- the protocol to get it right. All the usual Type 7 control
- codes can be placed in the command line. One SPECIAL
- character exists, that can be used for translation. "#" is
- a list of All the Files that will be sent in this session.
- Although, if you are using a BATCH protocol, the number of
- files in the batch could exceed the maximum length allowed
- by DOS for parameters, so that only a few files are sent.
- In this case, the download control file is recommended. "#"
- is nearly ALWAYS used on non-batch protocols. (Eg XModem)
-
- Download Ctrl. This is the control character used by
- the protocol. Used in batch protocols. Special
- "characters" exist that can be translated. That is, @ will
- translate into the path and filename of a file to be
- downloaded. If multiple files are being sent, then each
- line will contain a path and filename. Text can also be
- placed in there, such as "Send @", could translate into
- "Send C:\FRED1.ZIP" on line 1, and "Send C:\FRED2.ZIP" on
- line 2, and so forth.
-
- Download Log Key. Is the key used by the protocol to
- log the download in the log file.
- Download Err Key. Is the error key used by the
- protocol if there is an error that aborts the sending of the
- file. As users now receive "FREE" downloads by aborting
- downloads near the end, it is in your best interests to have
- aborted downloads LOGGED.
-
- Dnload Err2 Key. This is the second error key if the
- protocol has one.
-
- Upload Command. Like the download command this is the
- actual command line used by the protocol to upload a file to
- your BBS. Two SPECIAL characters exist for translation
- before the protocol is executed. The "#" is again used, but
- this time indicates the upload directory WITH a trailing
- backslash. If, you do NOT want a trailing backslash, simply
-
- Page 48.
-
-
-
-
-
-
- add a "." after it. Also, a "$" can be used to indicate
- the filename of the file to be uploaded. This is only for
- use with NON-BATCH protocols, as they generally require the
- filename of the file to be uploaded. (Eg XModem)
-
- Upload Log Key. Is the key character used by the
- protocol in the log file it uses.
-
- Upload Err Key. The error character is used by Ezycom
- to determine files that were aborted during the upload
- process. Primarily, this is used to delete aborted uploads,
- if the sysop has configured Ezycom for it.
-
- Upload Err2 Key. The second error key if the protocol
- has one.
-
- Efficiency. This how efficient the protocol is.
- Ezycom uses this to work out how long the download will
- take.
-
- Log : FileName. Is the position of the filename in
- words in the log file. In a DSZ Log format, the position is
- 11.
-
- Log : CPS. Is the position of the CPS rate in words in
- the log file that the protocol generates. In a DSZ Log
- format, the position is 5.
-
- Example DSZ Log format
-
- CPS Rate
- v
- Z 10007 2400 bps 240 cps 0 errors 0 512 C:\CONFIG.SYS
- ^ ^^^^^
- Upload Log Keyword Filename
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 49.
-
-
-
-
-
-
- Message Areas
- -------------
-
- Message Area Name
- -----------------
- Place a unique title for the message area here to
- identify it from all others. Try to make the name of the
- area reflect the contents of the messages that the area will
- contain.
-
- As an example "Messages to Sysop".
-
- Msg Area Name : MESSAGE TO THE SYSOP Rec 1
- Area Tag : Not Needed
- Message Type : Local
- Message Kind : Private Only Kill Messages After 30 Days
- Alias Allowed : Real Names Only Kill Recv After 10 Days
- Area Group : Not Needed Maximum Messages 50
- Read Security : 5 Maximum Kilobytes 0
- Read Flags Combined Access Yes
- Write Security : 5 Initial Combined Yes
- Write Flags Test for Cfg Age No
- Sysop Security : 50000 Keep Private Bit Not Needed
- Sysop Flags Show SeenBy Lines Not Needed
- Uplink : Not Needed Clear SeenBy Not Needed
- Origin Aka : Not Needed Visible Not Needed
- Origin Line : Not Needed
- SeenBy
-
- Export To
-
-
- The message area name can be up to 30 characters long.
- To delete an area just remove the area name.
-
- Areafix Tag
- -----------
- This is where you put the name of the echomail
- conference. It must be a unique Conference tag and reflect
- the actual echomail name. It can be up to 30 characters
- long, but can not contain spaces.
-
- For example EC_SUPPORT, EC_BETA.
-
- Message Types
- -------------
- There are 6 possible types of messages you can
- configure in EZYCOM.
-
- 1/LOCAL - Allows the exchange of messages only between
- users of the BBS.
-
- 2/NETMAIL - Allows you to send a private message to any
- user on another bbs that is part of the same network.
-
- Page 50.
-
-
-
-
-
-
- 3/ECHOMAIL - Allows the exchange of messages between
- users on BBS'S that are linked to the same Network. Usually
- these messages are public and deal with a specific topic.
-
- 4/PASSTHRU - This option if enabled tells Ezymail that
- the conference is forward only. i.e. No mail will be
- unpacked onto your system but will be forwarded to those in
- your export list.
-
- 5/WAITTHRU - This option is mainly used by HUBS and HOSTS
- of NETWORKS. If a conference is in WaitThru mode it is not
- active. It does however, allow a node to turn a conference
- on at his HUB site by making his HUB request the conference
- from his HOST.
-
- 6/ALLMAIL - Messages posted to "All" in this conference
- are shown to "All" users on Mail Scan.
-
-
- Message Kinds
- -------------
- There are 3 types of message kinds
-
- 1/PUBLIC - These are message areas that contain messages
- that any user can read on the bbs.
-
- 2/PUBLIC / PRIVATE - This allows you to have both public
- or private messages in the same area. When leaving a
- message in one of these areas you will be prompted if you
- would like to make it private.
-
- 3/PRIVATE - Messages in this area are private only.
- Private messages being distinct from public messages in that
- only the user who the message is addressed to or the user
- who wrote it can read it.
-
- Alias Allowed
- -------------
- 1/USE ALIAS - Only your alias can be used in this message
- area.
-
- 2/ALIAS - ask for alias - This enables the user to be
- prompted to use another alias as long as it is not used by
- another user on the bbs.
-
- 3/REAL NAMES ONLY - Only real names can be used in this
- area. This is particularly used for Fidonet echomail
- conferences.
-
- 4/ASK FOR ALIAS - This gives the user the option to write
- a message in the area using an alias. The alias selected
- however can not be used if it already exists on the bbs.
-
-
-
- Page 51.
-
-
-
-
-
-
- Areafix Group
- -------------
- This function allows the sysop to define which group
- the Echomail conference belongs to. The valid range is A
- through Z. You should categorize your Echomail areas.
-
- Example: You could use 'F' for all your Fidonet areas and
- S for all your Signet areas.
-
- This function is used in conjunction with Echo area
- manager (Described later).
-
- Read Security
- -------------
- This is the minimum security level required by the user
- to read mail in this area.
- Security levels can be set from 0-64000.
-
- Eg. If the read security is set to 100 then only users
- with security 100 and above can read the messages in that
- area. If however you wish all users to have access to read
- mail then set security to 0.
-
- Read Flags
- ----------
- These are the flags required to read mail in the area.
- There are 32 flags available from A1-D8. These flags work
- in conjunction with the read security level.
-
- Eg. If you have set the Read Security level to 100 and A1
- flag is turned on then only users with security level of 100
- and above PLUS the A1 flag can read the messages. To set a
- flag ON place the cursor over the flag you wish to set and
- press X.
-
- Write Security
- --------------
- This is the minimum security level required by the user
- to write mail in the area. Security levels can be set from
- 0 - 64000.
-
- Eg. If the right security is set to 200 then only users
- with security level 200 and above can write in this area.
- If however you want all users to be able to write in this
- area then set the security level to 0.
-
-
- Write Flags
- -----------
- These flags work the same as the Read Flags except work
- in conjunction with the write security.
-
-
-
-
- Page 52.
-
-
-
-
-
-
- Sysop Security
- --------------
- This is the security level required to carry out sysop
- functions on the message area. This enables the sysop to
- read all messages in the area even if they are private,
- delete mail, edit users forward messages, export messages to
- disk or printer and also edit the message header.
-
- Uplink
- ------
- This is used with Echomail, Netmail and WaitThru areas.
- It is where you put the network address of the system you
- are collecting your conferences from. (Usually your HUB or
- HOST).
-
- Origin Aka
- ----------
- This specifies which address should be placed on the
- origin line of an Echomail conference. If you choose to use
- an alias press Return and a window will open presenting you
- with a list of addresses you defined under "GENERAL
- ADDRESS". This is particularly used if you are a member of
- more than one Network.
-
- Origin Line
- -----------
- Defines the origin line placed at the bottom of
- Echomail messages which originate from your BBS. It can be
- up to 50 characters long, and should contain at least the
- name, location and phone number of your system. You can
- optionally place a *N in the origin line, to indicate the
- node number.
-
- Eg. Ezycom Support Melbourne 613-xxx-xxxx. If you do not
- define an origin line here then the default origin line
- specified in Messages Misc will be used.
-
- Seenby
- ------
- This is a list of your current Seenbys, as defined
- using F8. For a detailed explanation of Seenbys, see "(F8)
- SEENBYS" further on in this chapter.
-
- Kill Messages After
- -------------------
- This field is used by Msgcomp and determines how long a
- message resides in the message area before being deleted.
-
- Eg. If you set the field to " 7days " then all mail
- older than 07 days will be removed. If the field is set to
- ZERO then the age of the messages will be ignored.
-
-
-
-
- Page 53.
-
-
-
-
-
-
- Kill Recv After
- ---------------
- This works the same as "Kill Messages After" except
- that Msgcomp wont delete the messages until the specified
- number of days after the message has been read (received).
- If the field is set to ZERO then the age after the messages
- have been read will be ignored.
-
- Maximum Messages
- ----------------
- This is the maximum numbers of messages that can be
- posted in the area.
-
- Eg. If you set Max Messages for 100 then Msgcomp wont
- start deleting messages till 100 messages have been reached
- and then will maintain the area at 100. When the number of
- msgs exceeds this limit and you invoke Msgcomp, old messages
- get removed till your max messages is equal to the number
- you specified.
-
- Maximum Kilobytes
- -----------------
- This is the same as Max Msgs except instead of
- determining how many individual messages an area can hold,
- it is determined by how big the message area is in
- kilobytes. This is especially useful for those sysops who
- have limited disk space.
-
- Combined Access
- ---------------
- This option determines whether the user is allowed to
- have Combined Access to the Message Area. Combined Access,
- is whether they can do a Mail Check and/or Globally Read New
- messages for that conference. Normally this would be set to
- yes, but under some circumstances a NO might be required.
- The user also has the ability to turn Combined Areas Off,
- but if this option is set OFF, they can NEVER turn it on.
- Use Initial Combined if you want them to have it OFF to
- start with, but be able to turn it ON.
-
- Initial Combined
- ----------------
- This option if selected will determine if a new user
- will initially have combined access to that message area.
-
- Test For Config Age
- -------------------
- This makes Ezycom test the users age, before allowing
- them to access that conference. It stops them READING and
- WRITING to the conference. The AGE is defined in CONFIG-
- >MISC->SYSTEM.
-
-
-
-
- Page 54.
-
-
-
-
-
-
- Keep Private Bit
- ----------------
- This allows you to keep the private bit set on Netmail
- messages and enables only the person who the message is
- addressed to, to read it. If you set the option to NO then
- the private bit will be removed and the message will become
- PUBLIC.
-
-
- Show Seenby Lines
- -----------------
- This is for the sysop and if you decide to set the
- option to "YES" then when the sysop presses ! from the
- message reader he can see the path the message has taken.
-
-
- Clear Seenby
- ------------
- This gives you the option to remove seenbys on the
- echomail you are forwarding through your system. Only the
- systems you echo with directly are left in the SeenBy
- information. This option is normally only used by
- Zonegates.
-
-
- Visible
- -------
- This determines whether or not a conference should
- appear in a system area listing when an authorized system
- requests a list of available conferences, but does not have
- access to the group. If the visible option is set to "NO"
- then the conference will not appear in the list.
-
-
- Page Up/Down
- ------------
- By pressing PAGE UP / DOWN you can scroll through each
- message area in numerical order.
-
-
- (F8) Seenbys
- -------------
- Seenby lines contain useful information for
- Echomail/Passthru/Waitthru software. Seenbys are a list of
- systems that have already seen /forwarded the message. By
- pressing F8 you will be presented with a list of your
- network addresses you defined under General Addresses. Use
- up/dn arrow key to highlight the address you wish to use and
- then press enter.
-
- The address you pick should be relevant to the conference
- you are forwarding. Note : At least one seenby should be
- defined in each
- Echomail/Passthru/Waitthru area.
-
- Page 55.
-
-
-
-
-
-
- (F10) Export List
- -----------------
- To access the export list press F10. You will be
- presented with a list of addresses you defined in NODE
- Manager. Use your arrow keys to highlight the address you
- wish to forward mail onto and press Enter. A small square
- will the be presented next to that address.
-
- Pick
- ----
- By pushing (P) a window will be displayed presenting
- you with all message areas. Use your UP/DN arrow keys or
- Page UP/DL keys till you highlight the area you wish to
- edit. Press Enter on the area to accept it.
-
- Echoarea Manager
- ----------------
-
- Node
- ----
- Defines a network address for your export list. Eg
- 3:636/200 You can have up to 128 nodes.
-
- Node (Rec 1) : 3:636/200
- EchoMail Active : Yes
- Echo Manager Groups : AB
- Compress to : ARJ
- Password to EchoMgr : XXXX
- Password from EchoMgr : XXXX
- Mail Status : Normal Mail
- Days to Hold Mail : 30
- Send .PKT Type : Type 2+
- Can Create New Echos : Yes
- Add to New Echos : Yes
-
- Echomail Active
- ---------------
- Toggled between YES/NO by the return key to determine
- if the system is active or not. This can be useful if you
- know one of your NODES is going away on holiday for a few
- weeks and wont be able to pick mail up. Simply set the
- field to NO and no mail will be forwarded to that NODE until
- you reset it to YES. Generally, this option would be set to
- YES.
-
- Echo Manager Groups
- -------------------
- This specifies which groups a system has access to.
- Valid range is A through Z. If you have given a system
- access to GROUP "F" then that system can access all the
- conferences that you have designated "F" in field Areafix
- Group in the message areas.
-
-
-
- Page 56.
-
-
-
-
-
-
- Compress To
- -----------
- This allows you to select which compression method you
- wish to pack your mail packets with. You have a choice of 7
- archivers and they can be toggled by pressing the return key
- till you reach your selected choice.
-
- Password To Echomgr
- -------------------
- This is the password that is used when you are
- requesting conferences from this node. This password would
- generally be the same password as Password From Echomgr.
-
- Password From Echomgr
- ----------------------
- This is the password your downlinks use when requesting
- areas off you.
-
- Mail Status
- -----------
- This specifies the status of the mail for this system.
- You can toggle 3 choices of mail by pressing RETURN.
-
- 1/NORMAL MAIL - If mail is flagged as normal it will not
- be transmitted till a scheduled mail event or the system who
- the mail is address to calls you to pick up mail.
-
- 2/CRASH - Mail flagged as Crash is allowed to be sent any
- time of the day. However Crash mail does require the
- destination system to be qualified.
-
- 3/HOLD MAIL - When mail is flagged as hold, it will not
- be sent until the destination system polls your system to
- pick their mail up.
-
- Days To Hold Mail
- -----------------
- This determines how long you hold mail for a system
- before it is deleted. For instance, if a node does not pick
- up mail after 7 days, Ezymail could delete it for you.
-
- Send .PKT Type
- --------------
- Currently in FidoNet there are two standards at which
- EchoMail can be packed as. They are both compatible, but
- Type 2+ is 4D, that is, it has Zone, Net, Node and Point,
- whereas Type 2 only has Net and Node information. Ezycom
- does not handle the fakenet approach, as we do not believe
- in kludging things to make them work. Most echomail
- processors are now going to the new Type 2+ format.
-
-
-
-
-
- Page 57.
-
-
-
-
-
-
- Can Create New Echos
- --------------------
- If this option is enabled, then any conference that is
- sent to you by this node, can be automatically added to your
- message areas, whereas if it is not, then this node can not
- create a new conference on your system. This might be
- enabled for your Host.
-
- Add to New Echos
- ----------------
- If this option is enabled, then if a new conference is
- made in one of the groups this node has access to, then this
- node is automatically added to the conference. This might
- be enabled for your Downlinks (Hubs/Nodes/Points) for
- instance.
-
- Page Up/Down
- ------------
- By pressing Page UP / Down you can scroll through each
- Area Manager area in numerical order.
-
- Pick
- ----
- By pressing (P) a window will open presenting you with
- a list of all Nodes. Use your UP/DN arrow keys or Page
- up/down keys till you highlight the Node you wish to edit.
- Press enter on the Node to except it.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 58.
-
-
-
-
-
-
- Message Misc
- ------------
-
- Usable Message Areas
- --------------------
-
- Usable Msg Areas : 32 of 500
- Inbound Mail Path : D:\DB\FILES\
- Outbound Mail Path : D:\EZY\OUTFILES\
- ARCmail 0.6 Compat : No
- Delete Net on Import : Yes
- EchoMail Routing : Direct
- Swap Out EzyMail : EMS/XMS
- Dupe Detection : Yes
- Keep EchoArea Recpt : No
- Bad Message Board : 32
- Unknown Area Action : EchoMail*
- Kill Bad Archive(s) : Yes
- Quote String : @>
- External Editor : EZYEDIT.EXE -N*N
- Old Style MSGTMP : No
- Default Origin Line : EzyCom Registration's 61-3-546-3038
- Mark Netmail as Kill/Sent : Ask
- Kill Null Netmail : Yes
-
- You can have a total of 500 messages areas, 400 normal
- plus 100 passthru. It is however unlikely that most people
- would have this many areas. So for efficiency reasons, you
- can put the actual number of message areas you have.
-
- Eg. If you use only 32 message areas, you can select 32.
- This will speed up some operations in Ezycom dramatically.
-
- Note: You can only define the number of message areas in
- jumps of 16, and the minimum is 32. Also, when you do
- change the number of message areas, it effects the size
- required by the LastRead Pointers. So, you MUST delete
- LASTCOMB.BBS, which resides in your userbase directory. If,
- you are using more than one configuration, then EVERY
- configuration MUST have the same number of message areas.
- (Assuming you share the message and userbase).
-
-
- Inbound Mail Path
- -----------------
- Path where your incoming mail packets are delivered.
-
- Eg. C:\EZY\INFILES\
-
-
-
-
-
-
-
- Page 59.
-
-
-
-
-
-
- Outbound Mail Path
- ------------------
- Path where your outgoing mail packets reside till they
- are picked up. This path, must be ONLY used by EzyMail. If
- any other files are found in this directory, EzyMail will
- remove them. This is done to help keep the area 'Clean' of
- files.
-
- Eg. C:\FD\OUTFILES\
-
- Arc Mail 0.6 Compatibility
- --------------------------
- By pressing Return you toggle YES/NO to ARCmail 0.6
- compatibility. Ezycom uses its own naming convention for
- the mail bundles. Turning this to on, forces Ezycom to use
- the ArcMail method.
-
- Delete Netmail On Import
- ------------------------
- Normally when a netmail message is imported to the
- Ezycom message base, it is deleted in the netmail path, this
- option stops Ezycom from doing that.
- Swap On Archiving
- -----------------
- If enabled EzyMail will swap out all except for 20k of
- its memory to either EMS or disk.
-
- Use EMS With Swap
- -----------------
- If enabled EzyMail will swap out to EMS memory. If
- however you have insufficient EMS, then it will swap to
- disk.
-
- Dupe Detection
- --------------
- If enabled, EzyMail will do Dupe Detection on Inbound
- Echomail with MSGID kludge lines.
-
- Keep Echomail Node Receipts
- ---------------------------
- If you require to keep EchoArea requests from other
- systems requesting conferences to be turned on or off, or a
- list of available conferences your system carries then
- enable this function.
-
-
-
-
-
-
-
-
-
-
-
- Page 60.
-
-
-
-
-
-
- Bad Message Board
- -----------------
- Defines the message area you wish to use to inform you
- of bad conferences you have received. This works in
- conjunction with Unknown Areas Action. If you have selected
- Kill in Unknown Areas then a message will be posted in the
- bad message area telling you that an unselected conference
- was sent to your system.
-
- Unknown AREAS Action
- --------------------
- There are 3 options to select from:
-
- 1/ECHOMAIL (Registered Version Only).
- If you select "ECHOMAIL" then any new undefined "Conference
- Tags" that are detected by your system will automatically be
- added to the message area. This works in conjunction with
- Message Security options. Also if you have "New Echo Area
- Notify Board defined, a message will be left in that area
- informing you of the new conferences added.
-
- 2/PASSTHRU - If this option is selected then any new
- undefined "Conference Tags" that are detected by your system
- will be automatically added as passthru conferences in the
- message area.
-
- 3/KILL - If this option is selected then any new
- Undefined "Conference Tags" that are detected by your system
- will be deleted, and not added to your message area. If you
- have "Bad Message Board" defined then a message will be
- posted in that area informing you of the Bad conferences.
-
- Kill Bad Archives
- -----------------
- Lets you select if you wish to delete incomplete or
- corrupted mail packet archives.
-
- Quote String
- ------------
- This is the string used when you quote a message using
- a full screen message editor. An example is @> the @ will
- insert the users initials and the > just acts as a prompt
- but this is sysop definable.
-
- External Editor
- ---------------
- This is the DOS command line that will be used to call
- up a full screen external message editor. All control codes
- used in a type 7 menu are supported. For example *P for
- command port, *B for baud rate and *T for time.
-
-
-
-
-
- Page 61.
-
-
-
-
-
-
- Old Style MSGTMP
- ----------------
- This option allows the System Operator to configure,
- which style of External Full Screen Editor Format should
- Ezycom support. Currently, two formats exist, the MSGTMP
- format, and the MSGTMP.<node> format. The MSGTMP format is
- the most common, and this is used by QUICKED and TOPED full
- screen editors, whereas the other format is only used by
- EzyEdit (by Brad Vonarx). The first two editors place a
- very big restriction on Ezycom, in that for every node used,
- there must be a seperate directory for each node, containing
- that editor inside the path, whereas EzyEdit interfaces
- better with Ezycom, allowing all nodes to run in the one
- directory if so desired. More information about Full Screen
- Editors and multitasking can be found in the "Multiline"
- part of the document.
- Default Origin Line
- -------------------
- Used to define your default origin line. Each Echomail
- area can be set with different Origin lines to be attached
- to the end of messages that are posted in each area.
- However if you choose not to put individual Origin lines in
- each area then the Origin line defined here will be used.
- Remember to at least put your system Name, location and
- phone number in the Origin line. You can also optionally
- add a *N to indicate which node the message was written on.
-
- Eg. Ezycom Beta site1 MELBOURNE 61-3-XXX-XXXX
-
- Kill Null Netmail
- -----------------
- If this option is set, then any packed netmail messages
- sent to EzyMail and your system (not passing through), will
- be purged if there is no text within the message.
-
- Mark Netmail As Kill / Sent
- ---------------------------
- Allows you to set the Status Bit to Kill/Sent by
- default on created Netmail messages from your system. What
- this means is that once the Netmail message has been sent it
- will then be deleted. Hit Return to toggle between YES / NO
- / ASK.
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 62.
-
-
-
-
-
-
- Message Security Option
- -----------------------
-
- Force Crash Mail Security
- -------------------------
-
- Force Crash Mail Security : 64000
- Optional Crash Mail Security : 1000
- Netmail File Attach Security : 1000
- Netmail File Request Security : 1000
- Security to Update Users : 1000
- Read Sec on New EchoMail Area : 1000
- Write Sec on New EchoMail Area : 1000
- Sysop Sec on New EchoMail Area : 1000
- Reply Via Netmail Security : 1000
- Request Receipt Security : 1000
-
- Force Crash Mail Security. This is the minimum
- security level required to send Crash Netmail messages.
-
- Optional Crash Mail Security
- ----------------------------
- This is the minimum security level required for a user
- to be prompted if he wishes to send a Crash Netmail message.
- If he selects no then the message will be sent in a normal
- mail session.
-
- Netmail File Attach Security
- ----------------------------
- This is the minimum security level to allow users to
- attach a file to a Netmail message.
-
- Security To Update Users
- ------------------------
- This is the minimum security level to allow (usually
- the sysop) to upgrade users from the message reader by
- pressing "U" or from the user listing by selecting "Edit".
- In either case you can edit the users security level and
- flags.
-
- Read Security On New Echomail Area
- ----------------------------------
- This is the minimum Security level set to "Read"
- Echomail in newly created Echomail Areas if you have
- selected "ECHOMAIL" in Unknown Areas Action under Messages
- MISC.
-
- Write Security On New Echomail Area
- -----------------------------------
- This is the minimum Security level set to "Write"
- Echomail in newly created Echomail Areas if you have
- selected "ECHOMAIL" in Unknown Areas Action under Message
- MISC.
-
-
- Page 63.
-
-
-
-
-
-
- Sysop Security On New Echomail Area
- -----------------------------------
- This is the sysop Security level set in newly created
- Echomail Areas if you have selected "ECHOMAIL" in Unknown
- Areas Action under Message MISC.
-
-
- Reply Via Netmail Security
- --------------------------
- This sets the security level for replying to a message
- using NetMail. For this to work fully a few things have to
- be right. First the user has to have the security level
- needed to access this feature, second the user MUST have
- access to the WRITE netmail access for the area that the
- message belongs to Eg Fido. And finely the message being
- replyed to MUST have a MSGID. Note Only NEW messages tossed
- to your system will have the correct return address for the
- reply. After you have set up EZYCOM V1.01 set this to the
- sysop for a week to make sure that only new messages are
- able to be replied to.
-
-
- Request Receipt Security
- ------------------------
- This sets the security level needed to ask for a
- receipt on the message you post ONLY in local mail. If you
- have this security level you will be asked if you require a
- receipt, if you ask for one, ezycom will send you a message
- that the user has recived the message that you set the
- receipt on. You MUST have a file called RETRECPT.ASL in
- your text file path. A sample of retrecpt.asl in in the
- setup.dat file that comes with Ezycom. This file handels
- all the smart text codes except the change current colour
- ones.
-
-
-
-
- Netmail Boards
- --------------
-
- 3:636/204 : 4
- 80:1000/6 : 4
- 0:0/0 : 1
- 0:0/0 : 1
- 0:0/0 : 1
-
- This allows you to define which message area Netmail
- messages will be imported to for each Network address.
-
- Domains
- -------
-
- 3:636/204 : fidonet.org
-
- Page 64.
-
-
-
-
-
-
- 80:1000/6 : ezynet.org
- 0:0/0 : [UnUsed]
- 0:0/0 : [UnUsed]
- 0:0/0 : [UnUsed]
-
- Allows you to define each Network address against a
- NETWORK.
- For example: If your Fidonet Network addresses is 3:636/200
- you would place "fidonet.org" as the domain.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 65.
-
-
-
-
-
-
- Compression
- -----------
- This is where you define the compression line
- parameters for your Archives.
-
- -----------------------------------
- ZIP : PKZIP.EXE -ao
- LHA : LHA.EXE a-tm
- ARJ : ARJ.EXE a-ey
- ARC : PKARC.COM -oct -a
- PAK : PAK.EXE A /O /WA /L
- ZOO : ZOO.EXE a:
- LHARC : LHA a -otm
- -----------------------------------
-
- Ezycom is already set up to handle 7 different
- archives, so usually you can just leave the above parameters
- as default.
-
- Uncompress
- ----------
-
- This is where you define the decompression command line
- parameters for your Archive utilities.
-
-
- Eg.
- ------------------------------
-
- ZIP : PKUNZIP.EXE -o
- LHA : LHA.EXE e /cnm
- ARJ : ARJ.EXE e -y
- ARC : PKXARC.COM -r
- PAK : PAK.EXE e /wa
- ZOO : ZOO.EXE -e
-
- -------------------------------
-
- Ezycom is already set up to handle 6 different archives
- so usually you can just leave these parameters as default.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 66.
-
-
-
-
-
-
- Global Message Options
- ----------------------
- The options listed below give the sysop great
- versatility plus the added advantage of saving time by
- allowing you to set values for all message areas at once
- instead of editing each individual area. By selecting any
- one of the below fields will set all defined message areas
- for that option to the same value. I will now discuss each
- option individually.
-
- Set Default Security
- Set Default Flags
- Centre Message Area Name
- Set Maximum Kilobytes
- Set Maximum Messages
- Kill Messages After XX Days Old
- Kill Recv Messages After XX Days
- Add/Rem Node to/from Area Groups
- Add/Rem Net Address to/from Area Groups
-
- Set Default Security
- --------------------
- By pressing RETURN on this option you will be presented
- with another small window -
-
- ------------------------------
- (R)ead (W)rite
- (S)ysop (Q)UIT
- ------------------------------
-
- By selecting "R" you will be able to change the read
- security on All message areas if you wish to have them set
- at the same security level.
-
- By selecting "W" you will be able to change the write
- security on All message areas if you wish to have them set
- at the same security level.
-
- By selecting "S" you will be able to change the Sysop
- security on All message areas if you wish to have them set
- at the same security level.
-
- By selecting "Q" - it will take you back to Global
- Message Menu.
-
-
-
-
-
-
-
-
-
-
-
- Page 67.
-
-
-
-
-
-
- Set Default Flags
- -----------------
- Works the same as Default Security but changes the
- "READ", "WRITE" or Sysop flags for all message areas to the
- same flag settings.
- Centre Message Area Name
- ------------------------
- This centres the Message Area Names on all message
- areas. To activate this function just press RETURN on this
- option and all message area names will be centred.
-
- Set Maximum Kilobytes
- ---------------------
- By pressing RETURN on this option another window will
- open. Just type the value you wish to set Maximum kilobytes
- to and then press RETURN.
-
- Set Maximum Messages
- --------------------
- By pressing RETURN on this option another window will
- open. Just type the value you wish to set Max Messages to
- and then press RETURN. All message areas will then be set
- to this value.
-
- Kill Messages After XX Days Old
- -------------------------------
- By pressing RETURN on this option another window will
- open. Just type the value you wish to set KILL MESSAGES
- AFTER XX days old to then press RETURN. All message areas
- will then be set to this value.
-
- Kill Received Messages After XX Days
- ------------------------------------
- By pressing RETURN on this option another window will
- open. Just type the value you wish to set the KILL RECEIVED
- MESSAGES AFTER XX DAYS to then press return. All message
- areas will then be set to this value.
-
- Add/Rem Node from area list.
- ---------------------------
- This allows you to add or remove a Node in your export
- list from / or to a Group of conferences. When you hit
- RETURN another window will open prompting you if you want to
- add or remove. Select what option you require. You will
- then prompted for the Node number, and then which groups.
- For example if you wish to remove a Node from receiving
- group "F" Echomail conferences you would
- 1)SELECT REMOVE
- 2)TYPE the Node number in Eg. 3:636/200
- 3)Type the group(s) - in our example "F"
- 4)THEN PRESS RETURN
-
- This will then remove Node (3:636/200) from all group "F"
- conferences.
-
- Page 68.
-
-
-
-
-
-
- Add/Rem Node from area list.
- ---------------------------
- This option is basically the same as the previous one,
- except that it works on your seenbys rather than your export
- list.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 69.
-
-
-
-
-
-
- Modem Set-Up
- -----------
-
- Comport
- -------
- Specify which "COM PORT" your modem is connected to.
-
- Eg. 1 for COM1, or 2 for COM2.
-
-
- Max Baud Rate
- -------------
- Select the maximum baud rate your modem supports. To
- select a baud rate press RETURN till your baud rate appears.
- This is the speed your modem will be initialized at. Valid
- bauds rates are 300, 1200, 2400, 4800, 9600, 19200, 38400.
-
-
- Locked Port
- -----------
- Usually "NO" for most low speed modems (2400 or lower),
- but with high speed modems it is usually YES.
-
-
- Connect Responses
- -----------------
- This option selects if your modem sends "Connect
- Commands" or not. If, this is set to NO, then Ezycom always
- logs the user on at Maximum Baud Rate. Usually this would
- be set to "YES". For example Connect 2400.
-
- Init Response
- -------------
- The response sent back by the modem after a command has
- been issued. Usually set this to "OK".
-
- Ring String
- -----------
- This field allows you to define the "RING RESPONSE"
- from your modem when a ring signal has been detected from an
- incoming call. Usually set this to RING.
-
- Modem Delay
- -----------
- Many modems cannot accept command strings at full
- speed. Because of this an inter-character delay in tenths
- of a
- second is needed. For high speed modems this can be between
- 1 or 2 but for most modems set it to a value between 4 and
- 8.
-
-
-
-
-
- Page 70.
-
-
-
-
-
-
- Auto Answer
- -----------
- This determines if Ezycom should answer the phone or
- the modem. If you select YES then EZYCOM will send the
- manual answer string to the modem to make it answer. Make
- sure ATS0 = 0 is in your INIT string for this option. If
- you select NO then the modem will answer the call. Make
- sure you have ATS0=1 in your init string for this option.
- However the recommend setting is NO as it proves EZYCOM is
- up and running.
-
- Start Time
- ----------
- This allows you to define the start time for EZYCOM to
- answer the modem. Make sure Auto Answer is set to NO. This
- is useful if you are only running a part time bbs.
-
- End Time
- --------
- This defines when EZYCOM will cease to answer the
- modem.
-
- Init Tries
- ----------
- Specifies how many times EZYCOM will send the
- initialization string to the modem. Usually you set this
- between 5 and 10.
-
- Init String 1
- -------------
- Type your modem initialization string in here. These
- are the commands which are sent to the modems to intialize
- it and prepare it to answer calls.
-
- Init String 2
- -------------
- Used if you wont to send more than one initialization
- string to your modem.
-
- Set Busy String
- ---------------
- Used to make your modem in the busy state. (Offhook)
- Usually set this to ATH1|
-
- Manual Answer String
- --------------------
- If you selected "NO" to auto answer, then this is the
- string that is sent to your modem to force it to answer the
- call. The default is ATA|
-
-
-
-
-
-
- Page 71.
-
-
-
-
-
-
- Send Break To Modem
- -------------------
- This option tells Ezycom to Send a Break to your Modem
- when clearing the Fossil Buffer. This is mainly for use
- with High Speed modems with Internal Buffers (such as the US
- Robotics Courier HST). If you are not sure whether to place
- this option On or Off, leave it Off.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 72.
-
-
-
-
-
-
- Baud Rate Set-Up
- ----------------
-
- Baud Rate
- ---------
- Define the baud rates your modem supports in a separate
- window. For example if you have 2400 baud modem and it
- supports 300,1200 and 2400 use the PAGEUP/PAGEDOWN keys, and
- place a single baud rate in each window. If, you are using
- a modem that does NOT support LOCKED baud rates, then only
- 300, 1200, 1275, 2400, 4800, 9600, 19200 and 38400 baud
- rates are supported, however, if you lock your modem at a
- particular baud rate, then you can select/make baud rates of
- any amount.
-
- Efficiency (CPS)
- ----------------
- Usually worked out on 10 % of the modem baud rate.
- For example: 300 baud would be 30
- 1200 baud would be 120
- 1275 baud would be 120
- 2400 baud would be 240
- 9600 baud would be 1920
- 38400 baud would be 3840
-
- However for HST modems this is not quite true as a HST
- can do 1600(cps) or greater for 14400 baud. For HST users
- the best setting would be about 1650(cps). This efficiency
- setting is used to work out download times.
-
- Connect
- -------
- These are the connect strings that the modem passes to
- EZYCOM for a particular baud rate.
- For example: CONNECT 2400 CONNECT 9600
-
- Make sure you end the CONNECT for 300 baud with a pipe '|'
- or else all CONNECTS will be 300 baud.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 73.
-
-
-
-
-
-
- Networking with Ezycom
- ----------------------
- A mail network is basically a set of bulletin board
- systems that are capable of exchanging messages and files
- with each other without the Sysop's needing to intervene.
- Of these mail networks FidoNet is the world's largest, this
- is an amateur mail network which has approximately 10,000
- bulletin board systems. Each of these is assigned a unique
- address. All networks have this type of address setup to
- keep all the different bulletin boards separate across the
- network. A file called a nodelist stores all these
- addresses along with other information about each system.
-
- Being part of such a network will give you access to
- NetMail and EchoMail. NetMail allows you to send a private
- message to any user of any one of the bulletins boards in
- the network. EchoMail also allows you post messages to many
- bulletin board systems in your mail network, but this method
- is different to NetMail, in that the messages are usually
- public, and are organised into either general discussion
- areas, or areas that deal with specific issues and or
- topics.
-
- The FidoNet network is organised into several levels,
- which are usually based on geographical proximity. At the
- highest level there are six ZONES; zone 1 is the USA, zone
- 2 is Europe, zone 3 is the Pacific Rim, zone 4 is South
- America, zone 5 is Africa and zone 6 is Asia. Within each
- zone are a number of REGIONS that span large geographical
- areas. Typically there will be between 5 and 18 regions per
- zone. Each region is further divided into NETS. Each net
- has a unique net number, and the distribution of these nets
- is also based on geographical and technical considerations.
- Finally, within the net are a number of NODES. A node
- refers to a single bulletin board system.
-
- To find out about obtaining a node number, or an
- ADDRESS, contact the nearest FidoNet bulletin board. The
- sysop will usually be more than happy to help you out.
-
- The only piece of software that you will need to
- connect your Ezycom software to such a network is a frontend
- mailer. This is will answer the telephone for you and if
- it's a mail call, it will send the mail you have waiting and
- receive the mail from the system that has called. In most
- cases you will have to place the call to your host to pickup
- your mail, this is called POLLING for mail. When you
- receive your mail you use Ezymail to toss the mail into the
- message base. The most common mailers are D'Brigde and
- Frontdoor. Note Ezymail will NOT work with BinkleyTerm at
- the moment. D'Bridge is a commercial mail package whereas
- FrontDoor is freely available for use. Frontdoor is
- available off most bulletin boards, if you check with the
- sysop of one of these bulletin boards they might give you
-
- Page 74.
-
-
-
-
-
-
- the access to get them.
-
- The node number you will be assigned should be of the
- format Zone:Net/Node.Point. This initial node number should
- be put into your configuration file.
-
- Eg 3:636/213.0 Which means you are in Zone 3 in 636 Net and
- are Node 213 the .0 is there incase you are a point off a
- boss. This is more fully explained in the mailer's
- documents and out of the scope of this document.
-
- Each EchoMail message that is posted on your system
- could potentially be read by hundreds of other sysops and
- users, with this in mind please abide by the rules of your
- respective networks. EzyCom allows you to be a member of
- many networks like FidoNet, SigNet, MysticNet the list is
- endless all you have to do is place their address's they
- send you in your AKA address section of the config file.
-
- Conferences, these are the message areas that you can
- receive from the networks you are connected to. To add a
- conference to ezycom all you have to do is enter the
- conference tag into the message base configuration and make
- sure you set up the seenby's, export list (other BBS's that
- might get this message conference off you), and so on.
-
- For further assistance you can contact your proposed
- host or ezycom support for help, as this is beyond the scope
- of this document.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 75.
-
-
-
-
-
-
- Sysop Function Keys
- -------------------
-
- The following function keys are only available when a user
- in online.
-
- (F1-F6)
- Toggling between these keys displays complete user
- information on the status bar at the bottom of the screen.
-
- (F7)
- Pressing this key makes the system available for the sysop
- when the user logs off.
-
- (F8-F9)
- Provides help on the ALT and 'F'unction keys.
-
- (F10)
- Turns the status bar on the bottom of the screen off. Press
- any of the other 'F'unction keys to turn it back on.
-
- (ALT-S)
- Allows you to change the online users security level.
-
- (ALT-C)
- Brings online users into chat allowing you to "talk" to the
- user via the keyboard. Press escape to end the chat mode.
- The standard Alt-C brings up the full screen chat. To bring
- up the line chat, press SHIFT at the same time as pressing
- ALT-C.
-
- (ALT-M)
- This is very useful feature when you log on locally. It
- allows you to completely edit (page 1) of the users record
- when you read mail from that user.
-
- (ALT-J)
- Performs a shell to DOS while the user is on line.
-
- (ALT-E)
- Allows modification of Page 1 of the user on-line.
-
- (ALT-P)
- Toggles whether the user activity should be sent to the
- printer.
-
- (ALT-D)
- Toggles local screen on/off to see what the user is doing.
-
- (ALT-G)
- Sends an ASCII bell character (character 0x07) to the user
- online to gain their attention.
-
-
-
- Page 76.
-
-
-
-
-
-
- (ALT-H)
- Disconnects the user immediately.
-
- (ALT-N)
- Displays fake line noise to the user and local screens.
-
- (ALT-L)
- Drops the user's security level to zero (0) thereby locking
- them out of the system permanently, then logs them off.
-
- (ALT-I)
- Send inactivity timeout message to the user, and then log
- him/her off.
-
- (ALT-U)
- Allows you to make up a message to send to the user, and
- then it will hang them up immediately.
-
- (ALT-X)
- Allows the sysop to edit certain system parameters for the
- current session. The statistics that can be edited are Next
- Sysop, Minimum Disk Free Space, Swap on Jump to DOS,
- Swapping Type, Number of Pages, Page Sound, User Ratios and
- Download Limit. Note that Type 15 Exits will reset some of
- these options.
-
- (UP ARROW)
- Increases the user time by one minute.
-
- (SHIFT-UP ARROW)
- Increases user time by ten minutes.
-
- (DOWN ARROW)
- Decreases the user time by one minute.
-
- (SHIFT-DOWN ARROW)
- Decreases user time by ten minutes.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 77.
-
-
-
-
-
-
- Ezycom Command Line Parameters
- ------------------------------
-
- The following is a list of command line parameters supported
- by Ezycom:
-
- -Px = Com port selected (1-8).
-
- -L = Local logon.
-
- -BXXXX = Log users on at baud rate xxxxx (300-38400).
-
- -EXXX = Exit after caller logs off at error level xxx
- (20-255).
-
- -S = Set display to off. (no local screen)
-
- -D = Disable status bar at the bottom of the screen.
-
- -T = Time (in minutes) till next system event.
-
- -R = Re-logon user after Type 15 exit.
-
- -NXXX = Node number if running Multi line.(1-250)
- This can also be used with the -R parameter when
- relogging a user back on a Multi line system.
- EG. -R -N2
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 78.
-
-
-
-
-
-
- Errorlevels
- -----------
-
- When Ezycom exits after a user logs off or due to a type 15
- menu exit it returns an errorlevel that the batch file you
- ran Ezycom from should trap and act upon.
-
- The errorlevels Ezycom produces are:-
- 0 = Normal exit
- 1 = Set-up error
- 2 = Software error
- 3 = Fossil error
- 4 = Modem Init Error
- 5 = Echomail Entered
- 6 = Netmail Entered
- 7 = Echomail and Netmail Entered
- 8 = NextSysop
- 9-19 = Reserved.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 79.
-
-
-
-
-
-
- Ezycom External Support Files
- -----------------------------
-
- Trashcan.ctl (Optional)
- ----------------------
-
- This file contains a list of names specified by you as
- unacceptable to be used. Place one name per line. The
- standard check that Ezycom makes is look for the Text you
- specify in the users name. ie "Sysop" would not be allowed
- in a user who logged on as "Fred Sysop" or "Sysop". Whereas
- if you placed a "*" in front of Sysop, for example "*Sysop"
- then "Fred Sysop" would be allowed to logon, but "Sysop"
- would not be allowed to logon.
- Eg. If you wish the following names not to be used "sysop"
- "all" then place each name in TRASHCAN.CTL as below:
-
- SYSOP
- IDIOT
- *ALL
-
- Therefore if a user tries to logon using "SYSOP" or "IDIOT"
- as a first or last name they will be unable to.
-
- NOTE: If you are allowing aliases on your system be careful
- they don't use a single name like "John". If this user was
- to be put in the TRASHCAN.CTL file then any user whose name
- contained "John" as a first or last name would not be able
- to logon the system. If, you do want to stop the single
- word names, MAKE sure you place a "*" in front of the name
- to stop this from happening.
-
-
- Phonenum.ctl (Optional)
- -----------------------
- This file contains phone numbers or partial phone
- numbers you know to be false or unacceptable. Place the
- phone numbers one per line.
- Example: If Phonenum.Ctl contained,
- 12-
- -123-
- Then no user could logon with a phone number that contained
- 12-xxx-xxxx or xx-123-xxxx.
-
- Regexp.q-a (Optional)
- ---------------------
- Runs a questionnaire defined by you when the users
- registration has run out.
- This is only used if you have enabled regodays in config
- under "General->Limits".
- See Script Files for help on REGEXP.Q-A.
-
-
-
-
- Page 80.
-
-
-
-
-
-
- Newuser.q-a (Optional)
- ----------------------
- Allows you to define a new user questionnaire.
- (Consult questionnaire section for more details).
-
- Newuser2.q-a (Optional)
- -----------------------
- Allows you to define a new user questionnaire, but the
- user record has already been written to the user records at
- this point, so MENUCMNDs are valid.
-
- Phonedup.ctl (Optional)
- -----------------------
- If a user logs on using a phone number the same as
- another user, then you are notified in this file of the
- occurrence.
- Eg. John Doe logged on using same phone number as Jane Doe.
-
-
- Ans/Asc/Asl/Avt Files
- ---------------------
-
- Listed below are the ANS and ASCII support files which
- you can define. All files must reside either in the
- AVT/ANS/ASC/ASL directory.
-
-
- *** Means a default prompt will be displayed if the text
- file is not present.
-
- ALIAS.A* This file is displayed before the user
- enters their alias.
-
- AREAHELP.ASL This file is displayed when an EchoArea
- help message is processed.
-
- DOBSEC.A* This is displayed before the user is asked
- for their date of birth for logon security verification.
-
- DOWNHELP.A* This file is displayed when the user
- selects "Help" from the download command.
-
- EDITHELP.A* This file is displayed when the user
- selects help inside the line editor.
-
- FLSPHELP.A* This file is displayed when the user
- selects "Help" from the filespec search command.
-
-
-
-
-
-
-
-
- Page 81.
-
-
-
-
-
-
- FILEXXX.ASC These files can be implempted if you
- require Ezycom to display a comment file before displaying
- the files listed in the file area that the user is about to
- look at. The XXX is the file area number and this file is
- placed in the same path as the file base information is
- stored. So if you want a comment file for file area 10 you
- would have a file called FILE010.ASC placed in the path
- C:\EZY\FILEBASE\AREA1\FILE010.ASC
-
-
- KEYWHELP.A* This file is displayed when the user
- selects "Help" from the keyword search command.
-
- *** LOCKOUT.A* This message is displayed when you either
- lockout a user, or a user who has been locked out logs on.
-
- LOGO.A* This file is displayed just before the
- system asks the user for their name and password.
-
- *** MAXPAGE.A* This file is displayed if the user exceeds
- the maximum number of pages specified in config.
-
- *** MNUAGE.A* This file is displayed to inform a user
- that he/she has to be a certain age before they can use the
- menu option.
-
- *** MNUHOUR.A* This file is displayed to inform a user
- they are trying to use a menu option outside the menu time.
-
- *** MNUTIME.A* This file is displayed to inform a user
- that he/she has to be online for a certain time before they
- can use a menu option.
-
- MNUMESS.A* This file is displayed to a user if their
- post call ratio is bad.
-
- NEWS.A* This file is displayed after Newuser 2 or
- welcome files and check for waiting mail.
-
- NEWUSER1.A* This file is displayed to a new user when
- they confirm that they have entered their name correctly.
-
- NEWUSER2.A* This file is displayed before the
- Newuser.Q-A, but after the system questionnaire specified in
- config.
-
- *** NOTAVAIL.A* This file is displayed when a user pages
- outside the paging hours defined in Config.
-
- *** PAGEABRT.A* This file is displayed if the sysop aborts
- the page.
-
-
-
-
- Page 82.
-
-
-
-
-
-
- *** PAGED.A* This file is displayed after the user has
- paged the sysop but before the sysop answers. This could be
- something like your chat has been noted, the sysop will
- break in when available.
-
- *** PAGESTOP.A* This file is displayed if the sysop aborts
- the current page and stops all further paging.
-
- PASSWORD.A* This file is displayed before a user is
- asked to enter their system password.
-
- PHONESEC.A* This is displayed before the user is asked
- for their phone number for verification.
-
- *** PRIVATE.A* This is displayed to newusers if the
- newuser security level is 0. It would advise them that the
- system is a PRIVATE system.
-
- PROTHELP.A* This file is displayed when the user
- presses (?) at the list of selectable upload and download
- protocols.
-
- *** REGWARN1.A* Last warning before registration runs out.
-
- *** REGWARN2.A* First warning before registration runs
- out.
-
- READHELP.A* This file is displayed when the user
- selects help just after selecting to Read a message area.
-
- SECXXXXX.A* This file is displayed when a user logs on
- with XXXXX security. That is, if a user logged on with
- security 10, then SEC10.A* would be displayed to him/her.
-
- *** TIMESLOW.A* When a user logs on in the slow baud rate
- speeds, but is out of hours, this message is displayed.
-
- *** TIMESEC.A* This is displayed when the user logs on
- below the minimum logon security, and has not logged on
- between the low security start and end times.
-
- UPHELP.A* This file is displayed when the user
- selects "Help" from the upload command.
-
- WATCHDOG.ASL This file is sent in a message to a user
- who has had a previous unsuccessful logon. Typically this
- message would say something along the lines of "someone has
- tried to logon onto your account and failed. Please change
- your password.".
-
- WELCOME.A* This file is displayed after the user logs
- on. You can use this file to show the user a colourful
- display about your BBS.
-
-
- Page 83.
-
-
-
-
-
-
- WELCOME1.A* This file is displayed after the
- Welcome.A*. This can be used to tell the user more about
- your system.
-
- WELCOME2.A* This file is displayed after Welcome1.A*.
-
- WELCOMHH.A* This file is displayed between 00:00 and
- 23:00. You can have an individual WELCOME ANSI or ASCII
- displayed every hour.
- Eg: Welcom11.A* would be displayed between 1pm and midday.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 84.
-
-
-
-
-
-
- File Points
- -----------
- File Points is a file management system that doesn't
- incur the problems associated with the normal File/Kilobyte
- Ratio Systems. The unique facility of file points, is that
- when user(s) download the file, the uploader is given credit
- for the download. So, if user(s) upload old/boring files
- that will not be popular, then they will not receive many/no
- (depending on configuration) filepoints for the upload.
- This system encourages user(s) to upload decent files, as
- the more times their files downloaded, the more points they
- get, therefore the more downloads they can make. File
- Points can be configured in the "Files Misc" part of the
- "File Areas" of the config. The options to alter are
- "FPs credited for Download", "Time of Upload FPs given" and
- "1 File Point is worth XXk". See the documentation on these
- options for configuring them. (Registered Versions of
- Ezycom)
-
-
- Page Tunes
- ----------
- Ezycom also has the ability to play page tunes while
- the user is paging the sysop. They take the form of
- PAGExx.EZY in the Ezycom systempath. This first tune should
- be named "PAGE01.EZY", the second "PAGE02.EZY" and so on.
-
- These are plain text files, and they contain either a
- comment (indicated by a semicolon ";" at the start of the
- line), the TONE [hz] [1/100's second] and the WAIT [1/100's
- second]. The [hz] indicates the frequency (pitch) of the
- tone to be played. Following is a list of frequencies
- together with their respective musical notes.
-
- Note Octaves
- -----------------------------------------
- #1 #2 #3 #4 #5 #6
- -----------------------------------------
- C 45 134 268 536 1071 2145
- C# 71 142 284 568 1136 2273
- D 75 150 301 602 1204 2408
- D# 80 159 319 638 1275 2551
- E 84 169 338 676 1351 2703
- F 90 179 358 716 1432 2864
- F# 95 190 379 758 1517 3034
- G 100 201 402 804 1607 3215
- G# 106 213 426 851 1703 3406
- A 113 225 451 902 1804 3608
- A# 119 239 478 956 1991 3823
- B 127 253 506 1012 2025 4050
-
- Eg:
- TONE 71 100
- WAIT 100
-
- Page 85.
-
-
-
-
-
-
-
- Menu System
- -----------
-
- Defining a Menu System
- ----------------------
- Ezycom allows the use of fully user defined menu
- system. That is, you can make the menus appear exactly as
- YOU want, not how the authors want. For instance, you could
- combine a file area and message area into the one menu.
- With the addition of this feature, a certain amount of
- complexity is added to the Ezycom package, as you have to
- understand the menu system, so that you can build a system
- that you want. Included with Ezycom, is a sample setup,
- this allows you to have a look at a full blown menu system,
- to help you understand how it was put together.
-
- First of all, a decision must be made on the format of
- the menu structure. The structure appears much like a tree.
- A sample menu structure is:
-
- --UTILITIES
- /
- -----FILES
- TOP-|
- -----MESSAGES
- \
- ---GAMES
-
- Here, you have a TOP menu, this the name of the menu
- give to the first menu that is loaded when you run Ezycom.
- You can configure this in misc->system->top_menu. The "TOP"
- menu allows a various range of options, which includes
- allowing the moving to menus such as "FILES", "UTILITIES",
- "MESSAGES" and "GAMES".
-
- When defining a menu, you can use the GOTO or GOSUB
- commands to move you to one of these menus. From these
- menus (ie "FILES" etc), you would most likely want to be
- able to move back to the "TOP" menu. This can be done in
- three ways. First of all, you can use the GOTO command.
- This would move you to whichever menu you place in the
- "optional data" of the menu type. Another option could be
- using RETURN FROM GOSUB. This would return you to the menu
- who previously called it using GOSUB. For instance, if you
- had the MESSAGES menu coming off the TOP menu and the FILES
- menu, you would never know which menu actually called you if
- you wished to return to it. Using the GOSUB/RETURN FROM
- GOSUB, it would automatically return you to the menu that
- called it. The other option is GOTO MENU AND CLEAR GOSUB
- STACK. This is similar to the GOTO menu type, except that
- it also CLEARS any previous information about the menu stack
- (GOSUBs make a menu stack).
-
-
- Page 86.
-
-
-
-
-
-
- You can now load EZYMENU. This program is used to
- build a menu system for Ezycom. First of all, you are
- greeted by a Menu called NONAME.MNU. You can either load a
- new menu (Press F3), or create a new menu (F6). If, we were
- making the previous menu structure, you would press F6.
- Then, type in the name TOP. This would create the MENU TOP,
- and give it the same information as the current menu
- (NONAME). To load a different menu on startup with EZYMENU
- use the command line parameter -L<filename>.
- Eg: EZYMENU -LSYSOP
- Would load the menu SYSOP.MNU on startup.
-
- Now, you can define the ways in which you will move to
- the higher level MENUs (FILES, MESSAGES, etc). Press ENTER
- to edit current MENU line. You, will now be editing the top
- menu line of the MENU called TOP. Here, you can place in
- the menu option necessary to allow the USER to move to the
- MENU FILES.
-
- The DISPLAY, is the information that will be displayed
- to the user for this Menu option. This could be something
- like " [F] File Area". Although, there are 90 characters
- available for use in the DISPLAY information, it must be
- noted that even when using "Special Characters" documented
- later, that the line length should never exceed 79
- characters when actually displayed on the screen, or else
- weird side effects could occur.
-
- The OPTIONAL DATA is specific information for the menu
- command you are about to use. Since, we will be using the
- GOTO command, we need to place the MENU NAME in the OPTIONAL
- DATA. We are calling the MENU we are calling FILES, so
- "FILES" will be placed in the OPTIONAL DATA.
-
- The MENU TYPE number for GOTO is 1, so "1" will be
- placed in the Menu Type field. Optionally, you could press
- F1 to scan through a list of all the menu types, if you
- can't remember their number.
-
- After moving the cursor to the HOT KEY field, you will
- notice a box in the lower-right corner of the screen. This
- gives you HELP on the menu type you have just edited. Thus,
- if you forget the OPTIONAL DATA for a menu command, this
- could be used to quickly remind yourself. The HOT KEY, is
- the key you wish to use to activate the menu command. In
- our example, "F" would be placed in this field. Automatic
- Option should be left as "No", this will be explained under
- "Automatic Menu Options".
-
- SECURITY, is the security the USER must have (or the
- users could have above that security), to activate this menu
- option. As you would probably want all users to have access
- to this menu, the security field would be 0.
-
-
- Page 87.
-
-
-
-
-
-
- The FLAGS fields, are the FLAGS which the user MUST
- have to allow them to use the menu option. Pressing X while
- editing the flags fields, tells Ezycom that the USER must
- have that flag. A "-" value means that you do not care
- whether the user has the FLAG or not.
-
- Foreground and Background colours are used when
- displaying the "Display" information for this menu command.
-
- The TIME ONLINE field, is the amount of time, the user
- must have been online before they can access the menu
- option. Setting the value to 0, means they always have
- access to the menu option. The setting of the MENU-TIME
- flag in the user editor for a user, would STOP this field
- from restricting that users access.
-
- TIME-START and TIME-END, is the start times and end
- times in which the menu option can be activated. The time
- is entered in 24Hour format, ie 1300 is 1:00pm. Setting
- both times to 0000 and 0000 would actually make the menu
- option function ANY TIME of day, whereas setting it to 0001
- and 0001 would make the menu option only function at 1
- minute past midnight. In our example, you would leave this
- is the default, all the time.
-
- NODE, is what node number can access this menu option.
- In multiline environments, it might be desirable to have
- different menu options for different nodes. Setting it to
- 0, allows all nodes to activate the menu option, whereas
- setting it to 1 only allows node 1 to activate it.
-
- AGE, is a flag that allows you to restrict access to
- this menu option depending on the users age defined in the
- config (Usually 18 years old). If, this flag is set to YES,
- then no one with an age less than 18, can use this menu
- option.
-
- The next three options are RATIO options, and if they
- are set to Yes, then ONLY users with Ratios that pass each
- of the tests that are set on will be able to use the option.
- In our case, we would not want a post/call ratio enforced on
- the user, to go to the files menu, so that would be set to
- No. Likewise with the File and Kilobyte Ratios. You can
- also define tell Ezycom to disregard these flags for
- particular users if Ignore Ratios and Ignore Message Ratios
- are turned On.
-
-
-
-
-
-
-
-
-
- Page 88.
-
-
-
-
-
-
- Now, press ESCAPE to save the current menu option. You
- should notice that the pick list now shows that menu option
- at the top. You can now complete the other menu options,
- that is, do the menu commands to GOTO MESSAGES, UTILITIES
- and GAMES. After you have finished, you should SAVE the
- menu, using the F2 key. The TOP menu has now been
- completed. It will allow users that logon to your system,
- to go to all the menus laid out in your menu structure.
-
- Now, you can make the Second-Level menus. To begin
- with, just make the menu options to allow users to return to
- the main menus. As stated before, you can use the GOTO
- command to accomplish this.
-
- After, defining the basic menu structure, all the
- options must be placed in each menu. Work out what options
- will be in each menu. The options are listed later in the
- document under "MENU COMMANDS". You might wish to place
- options such as File List, Download, Upload and other
- various options in your FILES menu. In much the same way as
- the Menu Structure was defined in the MENUS, the options can
- be added. The major change, is the MENU TYPE and OPTIONAL
- DATA that varies for each menu option. After adding the
- menu options to the menu system, you will find that you NOW
- have a fully defined menu system for users to logon and use.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 89.
-
-
-
-
-
-
- Menu Templates
- --------------
- Ezycom allows a special menu templating system, which
- allows user defined menu systems, to be less maintenance
- orientated. Instead of creating a File Menu for EACH file
- area, it is possible to define ONE File Menu. This can be
- accomplished by placing /F in certain file area commands, to
- tell Ezycom to use the current file area template number for
- use in this command. For example, when doing a file list,
- instead of placing the file area number in there, you could
- place a /F in the OPTIONAL DATA. This tells Ezycom to do a
- file list of the current file area template number. The
- problem now arises of how to tell Ezycom, which file area
- template to use. There are a number of ways in which this
- can be done, the most used is the /F= command, which is
- placed on the GOTO/GOSUB/GOTO MENU and CLEAR GOSUB STACK
- commands.
- Eg: GOTO FILES /F=1
-
- Would tell Ezycom to GOTO the FILES menu, and make the
- current file area template number 1. So, that any functions
- in the FILES menu, would act on file area 1.
-
- Ezycom, allows another way in which you can change the
- current file area, that is Select the Current File Area.
- This allows the USER to select the current file area. This
- command would typically be placed in the FILES menu.
-
- Ezycom also allows the current file area to be
- incremented/decremented by the use of +/- respectively.
- This can be done by placing the + or - after the /F=
- command.
- Eg: GOTO FILES /F=+
-
- Would tell Ezycom to GOTO the FILES menu, and increment
- the current file area by One. If the user does not have
- access to that file area, Ezycom keeps on searching till it
- finds an area that the user has access to. The "-" option
- works in exactly the same manor, except that it goes
- decrements the file areas.
-
- The message areas, also contain this templating
- approach, except that instead of using /F, /M is used
- instead. /M is used to tell Ezycom to change the current
- Message Area template number on GOTO/GOSUBS/etc commands.
- Instead of using /F on the message area commands, the /M is
- used instead. Thus, making it easier to differentiate
- between file areas and message areas. The only other
- difference, is that the command to allow the user to select
- the current message area is Select Current Message Area,
- instead of File Area.
-
-
-
-
- Page 90.
-
-
-
-
-
-
- Global Menus
- ------------
- Ezycom also allows Up to 10 menu commands to be defined
- GLOBALLY. Thus, instead of having a command in EACH MENU to
- return the user to the main menu, you could have a GLOBAL
- menu command to do the same function. The MENU name used
- for global menus is "GLOBAL". If, this is in the menus
- directory on loading Ezycom, then ALL menu commands in the
- GLOBAL menu will become GLOBAL. If, a normal menu has the
- same menu command as the GLOBAL menu, then the normal menu
- command will override the GLOBAL option. It is also
- possible to DISABLE the GLOBAL menu for a specific menu,
- using menu type 81 "Disable Global Menu". This command HAS
- to be an automatic option (Explained later) to function
- correctly.
-
- Automatic Options
- -----------------
- Ezycom enables menu options to be automatically
- executed when the menu is loaded. When combined with Menu
- Type 40 (Display ANS/ASC/ASL/AVATAR), you can display these
- pictures automatically every time the menu is loaded, or
- after a menu function has been performed in that menu.
- Eg: If you made the top line in a menu a Type 40, and
- Automatic set to Yes, then that picture will be displayed
- every time that menu is loaded. Since, you are displaying a
- picture to the users, you may not want to have all the
- Display lines shown to the users, to stop these from being
- shown, the only thing on the display line should be a ";".
- This stops anything being displayed.
-
-
- Special Characters
- ----------------
- Ezycom provides some "SPECIAL" characters that may be
- used in the DISPLAY line of each menu option.
-
- ^ This changes the colours between the highlight
- and the normal menu lines colours.
- ; This stops a carriage return being placed on
- the displaying of that line. This should be
- placed ONLY at the end of EACH line.
-
- The Ctrl-F/K smart text codes can also be embedded into
- the Display and/or Miscdata options.
-
-
-
-
-
-
-
-
-
-
- Page 91.
-
-
-
-
-
-
- Ezycom also provides a means for accommodating
- "SPECIAL" characters in the OPTIONAL DATA line of each menu
- option. You can do this by placing a $<hex code> in the
- menu line. The <hex code> is a two digit hexadecimal
- number. If, for example the number was A, then the code
- would be $0F. To place a $ in the OPTIONAL DATA, the code
- would be $24. This features main inclusion was to cater for
- the placement of non-alphanumeric characters for use in the
- /SK= option.
-
- Keyboard Stuffing
- -----------------
- Ezycom allows characters to be stuffed into the
- keyboard buffer of the IBM PC on ANY menu option. This
- allows the simulation of a keypress to Ezycom. For example,
- if there was a need to pass through one menu, to get to
- another, you could stuff the keyboard with the character
- that the user needs to press to go to the other menu. This
- option could also be used to press keys in external programs
- run by Ezycom.
- Eg: GAME.BAT /SK=$0D
-
- This would place a return character in the keyboard, so
- that when the GAME is run, a return is pressed
- automatically.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 92.
-
-
-
-
-
-
- Groups
- ------
- Groups is a method in which file and message areas can
- be categorized into "Groups" or "Conferences". Its main
- purpose is for use with templating, so if you are not using
- that, then you can skip this part of the documentation. For
- instance, this would allow all of the Amiga areas to be
- grouped into one area, totally seperate from the IBM areas.
- Special commands in the questionnaire language can be used
- to allow users to select the groups they wish to view. For
- information on this, see the Questionnaire language.
-
- In the message and file area configuration, there are
- to options called "message group" and "file group"
- respectively. These options, allow the group for which the
- file/message area belongs to, to be configured. The groups
- can be configured from the letters of the alphabetic A
- through to Z. Also, to ALWAYS enable access to a certain
- message/file area, you can make the group a "*". Note that
- file and message areas use the SAME group. That is, Group A
- in message areas, is ALSO group A in file areas. Possible
- group naming might be "A" for Amiga, "I" for IBM.
-
- With the use of the questionnaire language group
- commands and the group settins, it is possible for the users
- to select which groups they wish to see. All they have to
- do is turn on the groups they want, for instance group "A",
- and turn off the groups they don't want (eg group "I").
- Then, whenever they do a new files listing, combined read,
- message area change, file area change, search for files, or
- any other "global" type command on message or file areas,
- then only those groups the user selects will be display.
- Please note that groups is NOT a security feature, and the
- user will STILL be allowed to access areas even if they have
- the group turned off, or if you make it available using
- /F=<area> or /M=<area> commands.
-
- Users can now select which groups they wish to select,
- but if they have all groups turned on, then they still could
- be presented with many file/message areas when doing area
- change commands. It is possible to override the group
- commands on the goto menu (with /F=+ or - or /M=+ or -), the
- change file area, change message area (and equivalents), and
- all global message area/file commands. To override group
- settings the sysop MUST place a /G=<group> on the miscdata
- line. The <group> is either a letter from A through to Z,
- or "*" (meaning ALL groups). For instance, to change to a
- file area only in the IBM group, a "/G=I" would be used on
- the miscdata (optionial data) line of the menu command. So,
- using a totally seperate menu for IBM files, the sysop could
- use "/G=I" command on all global type commands in the file
- area, thus allowing only IBM files to be viewed and/or
- changed to.
-
-
- Page 93.
-
-
-
-
-
-
- A problem now arises when the user changes between two
- "overridden" groups. The problem is, that when they go into
- the other group (eg Amiga), they are still in an area of the
- group they were last in (eg IBM). To overcome this, a new
- option has been added to the /F= /M= command. The option
- allows you to specify the <group>, which the user should be
- placed into.
-
- eg: Goto Menu FILEMENU /F=A
-
- This would place the user into the last Amiga file area
- they were in. If, the user has not yet been in an Amiga
- File Area, then they are placed in the first available Amiga
- File Area.
-
- We realise that this is a hard concept to grasp for
- some people. We suggest that first of all, the sysop should
- become totally familiar with the menu templating approach,
- before tackling groups. The best way to learn groups, is to
- experiment with them, and see what happens. If, you are
- still having problems, please do not hesitate in contacting
- any of the support/beta sites for help.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 94.
-
-
-
-
-
-
- Utilities
-
- Ezymaint
- --------
- This program will do all the required daily maintenance
- required by you system to keep it up and running fully.
- There are a few command line parameters that will help you
- do what you need to get done.
-
- Available Command Line Options are
- : -D Check for Deleted and Offline Files.
- Make Offline files, On-line if found.
- : -C Activate Daily Maintenance Routine.
- : -M<filename> Make a Master List for Selected File
- Areas.
- : -F<date> From Date for Master List Maker.
- : -T<date> To Date for Master List Maker.
- (Date Format - DDMMYYYY).
- : -O<days old> Master List with files from days old.
- : -E Enter Descriptions for Non-Described
- Files.
- : -U Update File Size and File Date.
- : -P File Download/Points Maintenance
- (Part 1).
- : -I Add Missing Files to File Lists
- (Part 1).
- : -N<1..250> Node Number.
- : -H<Filename> Header for the Master List that was
- generated with the -M option.
-
- If the -D option is used, Ezymaint will check every
- file to see if it is still in the Fast Find Index (It is
- suggested to run Ezyff -C before this option). If, a file
- is not found, then it is either marked Offline or Deleted
- depending on your configuration for that file area. If, an
- Offline file is found, Ezycom assumes that it has been made
- Online, and will mark the file as Online.
-
- If the -C option is used, and you have told Ezymaint
- that you want to convert the files that have been uploaded
- to your system, to another file compression type then
- Ezymaint will call a batch file called DOCONV.BAT and that
- will scan the file for Virii using the McAfee Scan program
- if you have that program in your path. It will also do the
- conversion that will be needed by your system.
-
- If the -M option is used, Ezymaint will create a Master
- List file called the name you placed after the -M.
-
- Eg EZYMAINT -MC:\BBSFILES\MASTER.LST
-
- Will create a file called MASTER.LST in the C:\BBSFILES
- directory. The -F and -T options are also used with this
- option.
-
- Page 95.
-
-
-
-
-
-
- If the -F<DDMMYYYY> option is used, in conjunction with
- the -M option. Ezymaint will create a Master List FROM the
- date specified after the -F the date format is DDMMYYYY.
-
- If the -T<DDMMYYYY> option is used, Ezymaint will use
- the date after the -T create the Master List to that date.
-
- Eg EZYMAINT -MC:\BBSFILES\1992.LST -F01011992 -T31121992
-
- Will create a Master List of all the files on your
- system dated form 01/01/1992 to 31/12/1992 using of course
- the DD/MM/YYYY date format. Note that the -F and -T options
- don't have to be used together.
-
- If the -Odays option is used, you can get Ezymaint to
- create a Master List with the files only a few days old
- every day.
-
- Eg EZYMAINT -MC:\BBSFILES\NEWFILES.LST -O5
-
- Will create a Master List file of only file files on
- your system that are 5 days old.
-
- If the -E option is used, Ezymaint will prompt you for
- a description for all the files in the filebase that have no
- description. If you don't know the description just hit the
- Enter Key to go to the next file.
-
- If the -U option is used, Ezymaint will update all the
- files with there correct file size and date. This is very
- handy if you convert your files outside the Ezycom
- enviorment and you converter is changing the date and the
- file size of the file.
-
- If the -P option is used, the Ezymaint will start the
- first part of the filepoint management. In finding the
- files that have been downloaded, and then adding all the
- points together to send to the user that upload the file, as
- per the setting in the config file. Usercomp does the 2nd
- part. This option also maintains the download count, so if
- you do not use the filepoints system, then this option
- should still be used.
-
- If the -I option is used, Ezymaint will start (Part 1)
- in adding missing files to your filebase. If you just place
- a file in one of the directories that your system uses for
- it's file areas, then this option will start the process of
- adding it to your system. Ezyff does the 2nd part.
- Ezyff -I should be run immediately after this option, or
- else new files will appear that are already in your
- database.
-
-
-
-
- Page 96.
-
-
-
-
-
-
- If the -N<1..250> option is used, Ezymaint will use
- that log file so you can use a node higher than the ones you
- use for online and ezymaint will not cause any problems if
- you are running under a multitasker on a network.
-
- The -H<Filename> option is used to add a header file to
- the master list that is generated by EZYMAINT. This file is
- inserted into the master list.
- eg EZYMAINT -MMASTER.LST -HHEADER.LST
-
- Conversion
- ----------
- The two conversion files supplied with Ezycom do all
- the conversions from one archive type to another archive
- type. As well as scanning the files inside the archive for
- any virii that might be hiding in there. They are just
- batch files that we have been using ever since we started
- this project and have found them to work very well. You
- must have your archive programs in your PATH statement if
- you want to use these batch files. Also as we have made
- them to scan for virii you will have to also have that file
- in the PATH as well. We have made the batch files to use
- McAfee's SCAN as this seems to be the most popular here in
- OZ. If you use a mailer like FrontDoor, D'Bridge or use
- Ezycom to answer the phone with the ATS0=1 command you
- should ONLY use Doconv.bat. If you however decide to use
- the Upconv.bat you will have to remember that the file is
- converted upon the finish of the upload and it will take
- time to do the conversion.
-
-
- Doconv.bat Upconv.bat
- ----------------------
- As stated above two batch files which are supplied do
- the conversion of archive types in your file base to what
- ever archive type you want. If however you use Upconv.bat,
- remember it will take time after the upload to do the
- conversion, so the user online might be slightly upset by
- the time it could take. So look into using doconv.bat in
- your daily maintenance when your system is not getting a lot
- of calls like late at night or early in the morning.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 97.
-
-
-
-
-
-
- Fedit
- -----
- This is a menu driven file area editor that allows you
- to
- move, delete edit and rename files. It is run from your BBS
- System directory, by typing Fedit at the Dos prompt and
- hitting Return. You will presented with a screen as below:
-
- +---------------------------------------------------------+
- | Help Edit File Tag | FEdit |
- |---------------------------------------------------------|
- | Num Tag Filename Description (C) Easy Soft 1991 |
- | |
- | 1 +-----------------------------------------------+ |
- | 2 | Num: 1 File Area: * IBM New Uploads * | |
- | 3 | Num: 2 File Area: * IBM General Files * | |
- | 4 | Num: 3 File Area: * IBM PD Games * | |
- | 5 | Num: 4 File Area: * IBM Archivers * | |
- | 6 | Num: 5 File Area: * IBM Communications * | |
- | 7 | Num: 6 File Area: * IBM Viruses * | |
- | 8 | Num: 7 File Area: * IBM Solutions * | |
- | 9 | Num: 8 File Area: * IBM Sound * | |
- | 10 | Num: 9 File Area: * GIF Clean * | |
- | 11 | Num: 10 File Area: * GIF Misc Pics * | |
- | +-----------------------------------------------+ |
- |---------------------------------------------------------|
- | File Size : 11831 File Date: 01-04-91 Downloads : 0 |
- | Uploader : Sysop |
- | Checked: On Gif Info: Off Offline: Off Incmplte:Off |
- | Private: Off Deleted : Off No Desc: Off Security: Off |
- |---------------------------------------------------------|
- | ...................................................... |
- +---------------------------------------------------------+
- Figure 1
-
- In the Centre of the screen as you can see is a list of
- the file areas you defined in config. Use the Pgup/Pgdn
- keys to move from file area to file area till you locate the
- one you wish to edit. Press RETURN on the highlighted area
- and you will now be presented with another window, (See
- Figure 2) showing all the files and their statistics, again
- press pgup/pgdn or up/dn arrow keys to select the file you
- wish to edit. As you move from file to file you will notice
- at the bottom of the screen various data fields changing.
- We will discuss each field later in this document.
-
-
-
-
-
-
-
-
-
-
- Page 98.
-
-
-
-
-
-
- +---------------------------------------------------------+
- | Help Edit File Tag | FEdit |
- |---------------------------------------------------------|
- | Num Tag Filename Description (C) Easy Soft 1991 |
- | |
- | 1 > HIGH.ZIP High Program |
- | 2 GAME.ZIP On-line Game |
- | 3 OLD.LZH Deleted |
- | 4 OFFY.ARJ Offline |
- | 5 NOS.DOC No Description Available |
- | 6 NORM.ARC Normal phone |
- | 7 |
- | 8 |
- | 9 |
- | 10 |
- | 11 |
- | |
- |---------------------------------------------------------|
- | File Size : 11831 File Date: 01-04-91 Downloads : 0 |
- | Uploader : Sysop |
- | Checked: On Gif Info: Off Offline: Off Incmplte: Off |
- | Private: Off Deleted : Off No Desc: Off Security: Off |
- |---------------------------------------------------------|
- | ...................................................... |
- +---------------------------------------------------------+
- Figure 2
-
- At the top of the screen (see figure 2) you will notice
- four headings:- HELP, EDIT, FILE and TAG.
-
- To activate any of these functions press the ALT key
- and the first letter of the option. For example to select
- "File" options press ALT-F. We will now discuss each area
- in detail.
-
- 1)HELP (ALT-H) OR F1. By activating this option you
- will be presented with another window which will give your
- quick reference Key Functions.
-
- 2)EDIT (ALT-E). When this is activated you will
- presented with a pull down menu which has three options.
- Move the highlighted bar over the function you wish to use
- or press the desired ALT key plus letter as defined in the
- menu.
-
- THE OPTIONS LISTED ARE:
-
-
- a)Edit description (ALT-D). This allows you to Edit
- the file description or add one if the uploader failed to
- give it.
-
- b)Edit UP/DN load (ALT-U). This allows you to Edit the
- Uploaders name and the download count.
-
- Page 99.
-
-
-
-
-
-
-
- c)Edit statistics (ALT-S). These are the 8 fields at
- the bottom of figure 2. We will discuss each one
- individually.
-
- i)Checked-This informs you if ezymaint has done a
- virus, integrity and missing file description check. If it
- is on, then it has been done.
-
- ii)Private-This informs you if the file is for the sysop
- only,(or for those with sysop security). The file will not
- be shown in the file listing to those beneath sysop access.
-
- iii)Delete-Informs you if the description has been
- deleted. This does not mean that the actual file has been
- deleted.
-
- iv)Offline-Informs you whether the file is offline or
- not.
-
- v)Security-Used in conjunction with File list and File
- Sec in config. Depending on what you have defined in those
- 2 config areas will determine what security the file has.
-
- Eg: A password, certain security level, if the file is
- free or a flag. (see docs on config for more details on File
- list and File Sec).
-
- By toggling security on /off will determine if security
- is activated on that file(s).
-
-
- d)View an Archive (ALT-V), this option allows you to
- view the contents of the archive that is highlighted in the
- file list. From this option you can view a TEXT file within
- this archive with the V key. This a very useful feature if
- you whish to check the files that your users upload to you.
- The formats that are able to be viewed are GIF, JPG, ARC,
- PAK, ARJ, ZIP, LZH and ZOO. This is done with batch files
- which there are examples in the file SETUP.DAT this file is
- in the LZH format, and the files to look for are the ones
- starting with "FED" eg FEDGIF.BAT will be the batch file
- that the view option uses to view the GIF files.
-
-
-
-
-
-
-
-
-
-
-
-
- Page 100.
-
-
-
-
-
-
-
-
- 3)FILE (ALT-F)
- --------------
- By pressing ALT-F a pull down menu will be presented
- with three options. Move the highlight bar over the
- function you wish to use or press the desired ALT key plus
- letter as defined in the menu.
- The option listed are:
-
- a)New file Edit (ALT-L). This allows you to select
- another file area to edit.
-
- b)Rename File (ALT-N). This allows you to rename the
- file.
-
- c)Update file (ALT-B). This updates the file size and
- date in the database.
-
- Eg. If, you added a system comment to the file, so
- that its size was now incorrect, this would get the new size
- for it.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 101.
-
-
-
-
-
-
-
- 4)TAG (ALT-T). By pressing ALT-T a pull down menu will
- be presented with 7 options. Move the highlight bar over
- the function you wish to use or press the defined ALT key
- plus letter as defined in the menu.
-
- The options listed are:
-
- a)Tag All (ALT-A). By pressing this option you will
- tag all files in the file list. You can also do a single
- file tag by pressing either the T-key, spacebar, or return
- key. A small triangle will appear next to tagged files.
-
- b)Clear ALL (ALT-C). This option clears or (untags)
- all files in the directory that were tagged.
-
- c)Delete Tagged (ALT-K). This will delete all tagged
- file descriptions.
-
- d)Move Tagged (ALT-M). This will move all tagged
- file(s) description to another file area but the file(s)
- will remain in the current directory. This will not
- interfere with EZYCOM as it works on Global principles and
- knows where the file is even if the description is in
- another file area.
-
- e)Remove Tagged (ALT-R). This will delete all tagged
- file(s) and their descriptions. Be careful using this
- option as it physically deletes the file from the disk.
-
- f)Tagged Offline (ALT-O). This will place all tagged
- file(s) offline. When a user does a file listing the files
- will be shown as Offline.
-
- g)Physical Move (ALT-P). This will move tagged file(s)
- and their descriptions to another selected file area as
- opposed to ALT-M that only moved the description.
-
- Fedit can also be run from the DOS prompt with command
- line switches.
- The switches are:
- -A <Filearea number>
- -N <Node number>
-
- When you have finished using Fedit press escape to
- return to the DOS prompt.
-
-
-
-
-
-
-
-
-
- Page 102.
-
-
-
-
-
-
-
-
- FEDGIF.BAT
-
- @echo off
- rem %1 is the Drive of the Gif
- rem %2 is the Path of the Gif
- rem %3 is the Filename (no extension)
- rem %4 is the Extension (including ".")
- rem For VPic, if you wish to choose Screen Mode inside
- vpic %2%3.* /a
- rem For VPic, if you just want to display it automatically
- rem vpic %2%3%4 /a
-
- This batch file is used for viewing Gif Files. In its
- present state, it requires VPIC to work.
-
- FEDJPG.BAT
-
- @echo off
- rem %1 is the Drive of the JPG
- rem %2 is the Path of the JPG
- rem %3 is the Filename (no extension)
- rem %4 is the Extension (including ".")
- rem Change to Drive of JPG
- %1
- rem Change to directory of JPG
- cd %2.
- rem Convert JPG to GIF file (JPG2GIF.EXE must be in PATH)
- jpg2gif %3%4
- rem For VPic, if you wish to choose Screen Mode inside
- vpic %3.* /a
- rem For VPic, if you just want to display it automatically
- rem vpic %3.GIF /a
- del %3.GIF
-
- This batch file is used to convert JPG files to GIF files,
- then view the GIF file. After viewing the GIF file, it is
- deleted off of your hard disk. In its present state, it
- requires VPIC and JPG2GIF to work.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 103.
-
-
-
-
-
-
-
- FEDVIEW.BAT
-
- @echo off
- rem ********************************************
- rem ** **
- rem ** FEdView.Bat **
- rem ** **
- rem ** Copyright Peter Davies 1992 **
- rem ** All Rights Reserved **
- rem ** **
- rem ** For use with Ezycom Only **
- rem ** **
- rem ********************************************
- echo Extracting %1 from %2
- rem If called stand alone, it checks to see if enough
- parameters were
- rem passed to the batch file
- if !%3! == !! goto endit
- rem This is a list of the command line in FEdView.Bat
- (Ezycom)
- rem %1 EZYCOM.PAS Filename to Extract
- rem %2 C:\EZY\FILES\EZYSRC.ZIP Filename to Extract From
- rem %3 ZIP Archive Type
- if not exist %2 goto :endit
- goto :get%3
- :getzip
- pkunzip -o %2 %1
- goto endit
- :getlzh
- lha e /cnm %2 %1
- goto endit
- :getarc
- PKXARC -r %2 %1
- goto endit
- :getpak
- PAK e /wa %2 %1
- goto endit
- :getarj
- arj e -y %2 %1
- goto endit
- :getzoo
- ZOO -e %2 %1
- :endit
- echo Finished Extraction
-
- This batch file is used by FEdit to extract a text file for
- viewing in any archive format. It requires all the standard
- de-archive programs.
-
-
-
-
-
-
- Page 104.
-
-
-
-
-
-
- Usercomp
- --------
- Usercomp is a userbase compacter that will do
- maintenance on your Userbase files. There are several
- command line switches that can be used with Usercomp. We
- will discuss each one separately below:
-
- -S1 Sort By Security then Surname.
- -S2 Sort By Security then first name.
- -S3 Sort By Security then Alias.
- -S4 Sort By Surname.
- -S5 Sort By First name.
- -S6 Sort By alias.
- -DXXX Delete Users After xxx days.
- This will delete users who have not called the
- system for the amount of days specified by XXX.
- Eg. If you set -d30 then all users who have not
- called for 30 days will be deleted, unless you have
- set "Don't kill user" in the user record.
- -UXXX No Delete Users >= xxx security.
- This will not delete users with a security level
- greater than or equal to the one specified by XXX.
- Eg. If you set -U100 then users with security
- level 100 and above will not be deleted.
- -ADD Add 0 Security Users to TRASHCAN.CTL.
- (See docs for more information on Trashcan.Ctl)
- -P Credit File Points for Downloads of their Upload.
- This function will credit file points to uploaders
- who's files have been downloaded if this option has
- been implemented in "files-misc" in config.
- -BXX Make XX Best User Information.
- This allows you to assign how many users you want
- shown in your best users information screens.
- Eg. If you assign -B10 then the best 10 users
- will be shown.
- -ALIAS When Usercomp makes the best lists, it will make
- them up using the users aliases instead of their
- real names with this switch.
- -N<1..250> Node Number.
-
- Any combination of these command line switches can be
- used simultaneously if you wish with usercomp.
-
- Eg. Usercomp -S1 -D20 -P -B1O -ALIAS -N1
- If you forget these switches, you can type usercomp -? at
- the DOS prompt for quick reference help.
-
-
-
-
-
-
-
-
-
- Page 105.
-
-
-
-
-
-
- Anstoavt
- --------
- This enables you to convert your .ans (ANSI) files to .Avt
- (Avatar) files.
- Eg. to convert mess.ans to mess.avt do the following at the
- Dos prompt type Anstoavt mess.ans. Wild cards are supported
- so if you wish to convert ALL your .Ans files type
- Anstoavt *.ans. This will convert all of your ansi screens
- to Avatar screens.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 106.
-
-
-
-
-
-
- Ezymail
- -------
- This is a Fido compatible Echomail tosser / scanner.
- It can be used in any Fidonet Mailer that uses the .MSG
- approach to file attaching. That is, Front Door, D'Bridge,
- etc, Binkley will however, NOT work with EzyMail.
- There are several command line switches that can be used.
- They are explained below:
-
- -SCAN Scan Message Base for Waiting Echomail.
- This function scans all echomail conferences
- and exports all messages, that have not been
- exported before to the systems listed in your
- export list.
-
- -TOSS Toss Echomail into Message Base.
- This function is used to import mail packets into
- Ezycom's Echomail areas. If Ezymail detects a
- message for a conference in which you have
- systems defined in your export list, it will
- automatically forward the message to those
- systems.
-
- -N<NODE> Node Number. (1-99)
-
-
- Ezymail and Multiline BBS's
- ---------------------------
- Ezymail creates an EZYMAIL.NOW file in your Ezycom
- systempath while running. This tells EzyMail and other
- programs that EzyMail is running. For instance, you would
- not want a mail session sending out mail, while Ezycom is
- packing up mail for that session. Ezymail can NOT run
- simultaneously with another Ezymail, so if EZYMAIL.NOW is
- present, then the second Ezymail will not run.
-
- FrontDoor
- ---------
- If, Ezymail finds an FD environment variable, it will
- update FDRESCAN.NOW and FMRESCAN.NOW after completion of
- execution. The commercial versions of Front Door make a
- file called FDINSESS.<task> in the Front Door System
- Directory, while a mail session is in process. If, Ezymail
- detects one of these files, then it will not execute as
- imagine what could happen, if it was updating a mail bundle,
- which was being sent in that session.
-
- D'Bridge
- -------
- If, Ezymail finds a D'BRIDGE environment variable, it
- will update DBRIDGE.RSN after completion of execution. This
- tells D'Bridge to rescan its netmail.
-
-
-
- Page 107.
-
-
-
-
-
-
- Ezynet
- ------
- EzyNet is used to import and export your NetMail from
- your Frontend mailer. Like FrontDoor, D'Bridge etc. It also
- will pass EchoArea messages to EzyCom for processing. Using
- EzyNet is easy, just have the following lines in your batch
- file that you use to run Ezycom. In the section you use to
- scan the message base for echomail add the following line.
-
- EZYNET -EXPORT
-
- This will export all the NetMail from Ezycom and place
- it in to the correct path for your Frontend Mailer to send.
-
- In the section you use to toss echomail into your BBS
- add the following lines.
-
- EZYNET -IMPORT -ECHOAREA
- ^^^^^^^^
- This will import all the NetMail from the directory
- that your Frontend mailer puts then and places them into
- your message base. The line ezynet -echoarea tells Ezycom's
- EchoMail area processor to read a message sent to it and act
- upon it as follows.
-
- What is EchoArea?
-
- EchoArea is a part of the Ezycom mail processor. It is
- used to update and maintain your echomail profile without
- needing to bother your host with requests - EchoArea will
- process them automatically.
-
- How to use EchoArea.
-
- To access EchoArea send a netmail message to your host,
- addressed to EchoArea.
-
- Eg. To: EchoArea, 3:633/374
-
- To safeguard your echomail profile, you must specify a
- password on the subject line of the netmail message. If you
- don't have a password, or you don't know what it is then
- contact your host.
-
- Eg. To: EchoArea, 3:633/374
- Re: foo
-
- Echomail profile maintenance. EchoArea's main use is
- to add/remove your node to/from your host's export list. To
- do this, you simply tell EchoArea the area tag of the
- conference you want to pick up or drop. For example, to add
- the Ezycom support conference (EC_SUPPORT) to your system
- you would send a message like:
-
-
- Page 108.
-
-
-
-
-
-
- To: EchoArea, 3:633/374
- Re: foo
- ----------------------------------------
- +EC_SUPPORT
-
- Note that the '+' sign in front of the name is
- optional. To remove a conference is very similar, only you
- put a '-' sign in front of the conference name instead of a
- '+'. In this case the prefix is NOT optional.
-
- For example, to get rid of an echo you are no longer
- interested in send a message like:
-
- To: EchoArea, 3:633/374
- Re: foo
- ----------------------------------------
- -BORING_ECHO_CONF
- ---
-
- As many of these commands as you like can be combined
- into the one message, so both of the above examples could
- have been in one request:
-
- To: EchoArea, 3:633/374
- Re: foo
- ----------------------------------------
- EC_SUPPORT
- -BORING_ECHO_CONF
- ---
-
- Note the tear line (row of dashes) at the end of this
- example. Everything after the tear line is ignored, so you
- can also send comments or queries to your host. This is
- useful if you have a question relating to your conference
- set-up or have problems using EchoArea.
-
- Options
-
- There are several optional commands that can be invoked
- by putting a parameter after your password on the subject
- line.
-
- -Q : Query.
-
- The query command will cause EchoArea to create list of
- all the echomail areas available to your system and send it
- back to you. The list will have the conference tag, a
- description, and one of either "On", "Off" or "Sec". On :
- The conference is already active for your system, Off: The
- conference is not active for your system, Sec: The
- conference is not available to your system.
-
-
-
-
- Page 109.
-
-
-
-
-
-
- -L : List.
-
- This is similar to the -Q command above, but does not
- add the conference status (on/off/sec) to the list.
-
- -H : Help.
-
- EchoArea will send a help file back to you in a netmail
- message.
-
- -All : All on.
-
- The all command will turn on all available areas to
- your system. Saves doing thirty or so areanames.
-
- -NoAll : All off.
-
- The all off command is the exact opposite to the all
- command. It will turn all echomail areas off for your
- system.
-
- Eg. To: EchoArea, 3:633/374
- Re: foo -q
- ----------------------------------------
- EC_SUPPORT
- -BORING_ECHOMAIL_CONF
- ---
-
- This will turn on the EC_SUPPORT conference, turn off
- the BORING_ECHOMAIL_CONF area, and send back a list of
- available areas and their status.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 110.
-
-
-
-
-
-
- Msgcomp
- -------
- This is Ezycom's message base compacter and will do
- maintenance on your message areas. Its function is to keep
- your message areas to the limits you set in Config "Message
- Areas". For example if you set "Max number of msgs" to 200
- and the area has 300, Msgcomp will delete the first 100
- messages to maintain the area at 200. However if you set
- any of the message limits to 0 then Msgcomp will ignore
- these fields. Msgcomp should be run once a day in a nightly
- event.
-
- The message compacter is limited to a maximum of 16000
- messages per message area, and so if the number of messages
- in an area exceeds 15000, it will automatically compress
- that message area to 15000 messages. Depending on how much
- free RAM is available, MSGCOMP will handle more messages per
- area, with an upper limit of 16000. Ezycom and other
- utilities can handle up to 65,000 messages per conference.
-
- MSGCOMP also has four command line switches :
- -LINK, -LINKALL, -NODELETE and -CLEANUP.
-
- -LINK will LINK all message areas that has had new
- echomail/netmail, since MSGCOMP -LINK was last run.
-
- -LINKALL, will unconditionally LINK ALL echomail and
- netmail areas. Local areas are NOT linked, as Ezycom does
- this when you reply to messages, so trying to LINK them,
- would be waisting system time. MSGCOMP links the messages
- (makes reply chains), by matching those with the same
- subjects together.
-
- -NODELETE, will stop MSGCOMP from deleting messages by
- days, received days, number of messages, or number of
- kilobytes.
-
- -CLEANUP, will tell MSGCOMP to delete conference(s)
- that no longer exist in your configuration setup. Thus, if
- you delete a message area with Alt-D, MSGCOMP -CLEANUP with
- actually delete the messages in that message area, and reset
- lastread pointers. Conferences should NEVER be deleted by
- using DOS commands, as the lastread pointers are not reset.
-
- Eg MSGCOMP -LINK
-
-
-
-
-
-
-
-
-
-
- Page 111.
-
-
-
-
-
-
- Ezyff
- -----
- This is used to keep all your file area index's up to
- date. It will add and remove files tell you of duplicates
- and sort the file index's. There are seven command line
- switches that can be used with Ezyff. These are listed
- below in detail:
-
- -C This creates/updates the Fast File index. This is
- a list of index to all the files available on your BBS for
- downloading. If you add files to your file areas or remove
- them, this should be run, to update the index. This should
- be run at least once a week, to make sure your index is
- correct.
-
- -S Sorts the fast file index. It makes it faster if
- you don't do -C everyday.
-
- -L<textfile> This makes a list of all your file paths
- to the text file name.
-
- -F This creates a QuickBBS compatible FLSEARCH.CTL.
-
- -D This lists all the duplicate files in directories
- to your maintenance log.
-
- ie.FRED.ARC was in C:\Files and FRED.LZH was in
- C:\NEWFILES, then it would place in the log that Fred.* was
- in both of those directories.
-
- -I This is the second part of maintenance to place
- files in your files lists which are in your directories but
- not in the files lists. The file area the files are placed
- in, is the upload area in CONFIG->FILEPATHS.
-
- -ID Does the above check, but also logs duplicate file
- descriptions, much like the -D option. It will also log
- duplicates when the same file area has duplicate
- descriptions, again on a .* level.
-
- -N<node> Node number to run EZYFF under. (1-250)
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 112.
-
-
-
-
-
-
- Ezyutil
- -------
- EzyUtil is a program that will import a file <Text>
- into your message base. It will also import files into a
- specified file area, while updating your fast file index
- with the information from a files.bbs file (Great if you use
- a program like TICK). It can also undelete messages in one
- or ALL of your message areas and lastly EzyUtil will sort
- your Echo Node Information. Ezyutil will also export
- message/file area configuration, and make message base
- statistics on a message area.
-
- Importing a message file. To import a message file
- into your message base use the following line.
-
- EZYUTIL -IMPORT -A<1..400> -F<Who_From> -T<Who_To>
- -S<Subject> -LC:\DOCS\HITHERE.DOC
-
- -A Message area to send the file to. (Message area
- number in your Config)
-
- -F Who the message is to be from. (Note the Underline
- between the First_LastName) it MUST be there.
-
- -T Is who the message is sent to. (Again Must have the
- Underline)
-
- -S The Subject of the message to be imported. (Remember
- the Underline)
-
- -L The path and file to import.
-
- Eg EZYUTIL -IMPORT -A1 -FPeter_Davies -Tall -SHigh_All
- -LTest.TXT
-
- Importing a file with Description. (Using a Files.bbs)
- To import the file and description use the following line.
-
- EZYUTIL -FILESBBS -A<1..400> [-L<Files.bbs Path>]
-
- -A File area to import the file to. (File area number
- in your Config)
-
- -L Path to the files.bbs (This is the path where the
- FILES.BBS, and the files IN the files.bbs are located). If,
- this option is omitted, then the area path for the filearea
- is used.
-
- Eg EZYUTIL -FILESBBS -A1 -LC:\BBS\FILES\GAMES
-
-
-
-
-
-
- Page 113.
-
-
-
-
-
-
-
- Sort EchoNode information.
-
- Use the following line.
-
- EZYUTIL -NODE
-
- This will sort all your EchoManager Nodes in Ascending
- order, while updating the export list for each message area
- at the same time.
-
- Undelete Messages.
-
- Use the following line.
-
- EZYUTIL -UNDELETE
-
- EzyUtil will then prompt you for the message area
- number where you wish to undelete the messages contained
- within it. If you select a valid message area, then EzyUtil
- will undelete all the messages in that conference. Only
- messages that were deleted AFTER the last MSGCOMP will be
- undeleted however. After a MSGCOMP, you can NOT retrieve
- any messages that were deleted.
-
- Strip Log.
-
- Use the following line.
-
- EZYUTIL -STRIPLOG -L<logfile> -D<days old>
-
- To strip Ezycom's log, and to leave a certain number of
- days log remaining use "EZYUTIL -STRIPLOG -L<logfile> -
- D<days old>".
- The <logfile> is the name of the Ezycom log which you wish
- to be stripped. The <days old> is the number of days of
- log, which you wish to keep. Eg -D7 would keep the last 7
- days of log file. When using EzyUtil -STRIPLOG, you MUST
- not be using any other utility or Ezycom that uses this
- logfile.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 114.
-
-
-
-
-
-
-
- File Area Information.
- Ezyutil can export file area configuration information
- to a file called FILES.TXT. This file contains all the
- information on your file areas. It is placed in the system
- path.
- eg: EZYUTIL -EXPORT -FILEAREA
-
- The following is an example of what to expect in the
- FILES.TXT file that is created with this option.
-
- File Area Num: 1
- File Area Name: GENERAL FILES
- Upload File Area: NEW UPLOADS
- Upload File Path: D:\BBS\FILE\GENERAL\
- File Group: *
- User Security: 5
- User Flag A: --------
- User Flag B: --------
- User Flag C: --------
- User Flag D: --------
- Sysop Security: 1000
- Sysop Flag A: --------
- Sysop Flag B: --------
- Sysop Flag C: --------
- Sysop Flag D: --------
- Sort By: Alpha
- Offline Allowed: No
- Master List: Yes
- Age Check: No
- Conversion: Zip
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 115.
-
-
-
-
-
-
-
- Message Base Information.
-
- As for the file base Ezyutil will create an information
- file for the message base. The file created is called
- MESSAGES.TXT. This will give you the following information
- about your message base.
-
- Mess Area Num: 2
- Mess Area Name: LOCAL CHIT CHAT
- Mess Area Type: Local
- Mess Area Kind: Public and Private
- Mess Group: *
- Days Kill: 30
- Receive Kill: 10
- Count Kill: 500
- Kilobyte Kill: 0
- Read Security: 1
- Read Flags A: --------
- Read Flags B: --------
- Read Flags C: --------
- Read Flags D: --------
- Write Security: 1
- Write Flags A: --------
- Write Flags B: --------
- Write Flags C: --------
- Write Flags D: --------
- Sysop Security: 50000
- Sysop Flags A: --------
- Sysop Flags B: --------
- Sysop Flags C: --------
- Sysop Flags D: --------
- Alias Allowed: Use Alias, Alias Allowed
- Combined Access: Yes
- Initial Combined: Yes
- Age Test: No
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 116.
-
-
-
-
-
-
-
- Message base Statistics.
- Ezyutil can generate a set of statistics for your
- message base the file created is called STAT<area>. This
- will include the number of participants in that message
- area, the average message length in bytes then a list of the
- users names, number of messages posted by that user, the
- total length in bytes for all their messages posted then an
- average of the length of their messages posted. At the end
- of the file there is a section showing the person that
- posted the longest message and the person that posted the
- shortese message. This text file could be imported into the
- message base useing the EZYUTIL message import command to
- show the users the stats of the message area being used.
-
- Eg: EZYUTIL -MBS -A1
-
- Message area statistics for " MESSAGE TO THE SYSOP "
-
- Number of participants : 13
- Average message length : 343 bytes
-
- Poster Posted Length Average
- ------------------------------------------------------------
- Fred Basset 3 739 246
- Anthony Jones 1 526 526
- Charles Manson 2 131 65
- Ian Mason 1 219 219
- Jack the Ripper 1 577 577
- Ned Kelly 1 38 38
- Randy Mandy 1 269 269
- Mr Squiggle 2 337 168
- Fat Cat 1 598 598
- Peter Davies 3 1378 459
- Mr Ed 1 279 279
- Elvis Presley 1 453 453
- Wayne Burnside 25 9224 368
-
- Longest message : Peter Davies, 1090 bytes
- Shortest message : Wayne Burnside, 35 bytes
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 117.
-
-
-
-
-
-
- Ezyed
- -----
- On loading Ezyed you will be presented with the first
- User in your Ezycom userbase. This Should Normally be the
- SysOp as He/She would usually be the first person to use the
- system, also he/she should have the Highest Security Level.
- Display Mode Options
-
-
- F1 : Displays the online Help Screens for Ezyed
-
- P : This gives you a very elaborate Pick List for you
- to chose a user from. To move around in the Pick
- List you just use the Arrow Keys to go up and down
- one user at a time or the PgUp and PgDn Keys to
- move up and down the list a page at a time.
-
- E : This launches you in to the Edit Mode more on this
- later.
-
- F10 : Toggles you to and from the 2 display screens.
-
- Arrow : These keys move you to and from the next and
- Keys previous record this includes PgUp and PgDn.
-
- F2 : You will be given a choice to Search for either
- the User's Name-Alias or by the User's Security
- Level. the search will being up the First
- occurrence of the pattern you chose ie(Name = Pet)
- will find the first record that has (Pet) in the
- Name/Alias Field case is not used in the search so
- (Peter = peter).
-
- F3 : This will continue the search using the (Last)
- pattern used. When the search doesn't find a user
- to match the pattern you will be told then EzyEd
- will take you to the (First) user in your
- userbase.
-
- F4 : This command allows certain global options to be
- performed on the userbase. These include flag
- editing and group editing. When editing global
- flags, a "-" sign means, do not change the flag, a
- "X" sign means, turn the flag ON for all users,
- and an "O" sign means, turn the flag OFF for all
- users. When editing global groups, the setting
- that you make will affect all users, so every user
- will have that global group setting.
-
- Esc : Exit from Ezyed.
-
- Insert : This will add a New Record to your user base.
-
-
-
- Page 118.
-
-
-
-
-
-
- Delete : This key will Toggle the (Deleted) Flag of the
- user displayed.
-
- Edit Mode.
-
- Ctl A : Abort any changes made to this record.
-
- Ctl P : This gives you a very elaborate Pick List for you
- to chose a user from. To move around in the Pick
- List you just use the Arrow Keys to go up and down
- one user at a time or the PgUp and PgDn Keys to
- move up and down the list a page at a time.
-
- Ctl S : Saves the record you are editing. Esc will do the
- same.
-
- Arrow : These keys move you to and from the next and
- Keys previous entries.
-
- PgUp : These two keys move you to the next and previous
- PgDn records after saving your changes first.
-
- Esc : Exit from Edit Mode.
-
- The function keys (F1, F2, F3, F4, F10) function in
- exactly the same was as in display mode.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 119.
-
-
-
-
-
-
- There are some user variables in Ezyed that you should
- know about, here is a list of them. All of these variables
- are changed by placing the highlight on the Yes or the No
- displayed. Then tap the space bar to toggle between Yes or
- No.
-
- Deleted : No
- Clear Screen : Yes
- Continue : Yes
- ANSI Capable : Yes
- Don't Kill User : No
- Ignore File Points : No
- Full Screen Ed : Yes
- Quiet Mode : No
- Ignore Ratios : No
- Avatar Capable : No
- IBM Chars : Yes
- Ignore Paging : No
- Exclude User : No
- Menu Time : No
- Ignore Message Ratio : No
- No Page Sound : No
- Page on Logon : No
-
- Deleted. If this is set to Yes then the next time you
- run usercomp the user will be deleted from the userbase.
-
- Clear Screen. This will set ezycom to send this user
- screen clearing codes when required.
-
- Continue. Tells ezycom that this user requires a
- continue prompt to be sent when displaying file lists and
- screens longer than there screen length.
-
- ANSI Capable. Tells ezycom whether the user will
- accept Ansi characters or not.
-
- Don't Kill User. If this option is set to Yes, then
- even if the user hasn't called in the amount of days you set
- to kill users when using usercomp this user will not be
- killed from the userbase.
-
- Ignore File Points. This option will stop the user
- from using his/her filepoints. So this user will not be
- stopped by this powerful ratio system in downloading files.
-
- Full Screen Ed. Enables the external full screen
- editor.
-
- Quite Mode. If enabled this user will not be able to
- be called by another node with the multinode chat system.
-
-
-
-
- Page 120.
-
-
-
-
-
-
- Ignore Ratios. This is similar to the ignore file
- points option but it applies to all the other file ratios
- used in the ezycom package. So if this option is Yes and
- ignore file points is No the users can download all they
- like until there file points are used up (Providing they
- don't exceed the daily download limit/time limit).
-
- Avatar Capable. If set this option will set ezycom to
- send avatar screen codes to the user with this set to Yes.
-
- IBM Characters. When this option is Yes ezycom will
- send the highbit IBM characters to the user. If set to no
- the user will get the character you have set in the replace
- IBM character in the config, This is set to (o) by default.
-
- Ignore Paging. If this option is set, then the user
- will be able to overide all paging hours, hence page the
- sysop 24 hours a day, seven days a week.
-
- Exclude User. With this option on Yes the user will
- NOT be displayed in any user display lists.
- Eg Best User Stats, User Lists, Last Caller, etc.
-
- Menu Time. If this option is set the user will NOT
- have to wait for the time restrictions in any of the menu
- option.
-
- Ignore Message Ratio. If this option is set, then the
- user will NOT have to abide by the post/call ratios.
-
- No Page Sound. When a user pages you with this option
- turned on, no page sound will be heard, although the user
- will be under the impression that he is paging you.
-
- Page on Logon. When the user logs on, five short beeps
- are sounded, to indicate to you that a very important user
- has logged on. Note that this option works 24 hours a day,
- 7 days a week, and is not restricted by page times.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 121.
-
-
-
-
-
-
- EzyNode
- -------
- This utility (thanks to Colin Berg for donating it)
- compiles your Nodelists for your network addresses, for use
- in Ezycom. If, you do not know what these terms mean, or do
- not belong to a network, then you can skip the documentation
- on EzyNode.
-
- Ezycom has a very different style of nodelist compiling
- than many other BBS packages. It allows the sysop to
- configure the nodelists to be viewed for each address that
- the sysop has. In all, the sysop has a maximum of 16
- network address, and for each network address, the sysop can
- have upto 5 nodelists. So, Ezycom can cater for upto 80
- nodelists. This feature, can be used to secure your network
- from unwanted user access. For instance, if you could allow
- your users to post messages into FidoNet, but NOT allow them
- to post messages into EzyNet (Network of Ezycom Beta Sites).
-
- Ezynode requires a nodelist control file for it to
- operate. This file is called EZYNODE.CTL, and should be
- located in your ezycom system directory.
-
- Comments may be placed in this control file, by placing
- a ";" at the start of the comment.
-
- Eg:
-
- ;Ezynode control file
-
- This is a valid comment, since the ";" preceeds the
- comment. Also, blank lines are ignored by ezynode.
-
- Ezynode accepts 4 different keywords. START, AKA, LIST
- and PLIST. A description of how each command is used and
- applied to the control file follows.
-
- The "START" command tells Ezynode that a NEW index
- should be created for the following AKAs/NODELISTs. Upto 16
- START commands (indexs) maybe present in EZYNODE.CTL.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 122.
-
-
-
-
-
-
- The "AKA" command tells Ezynode which network address
- should be used for this index. This is very important as,
- only those network addresses that use the nodelists
- indicated after this command, should be used. However, a
- short cut command can be used, called "ALL". That is, "AKA
- ALL" will tell Ezynode that all network addresses are to be
- used for these nodelists. If the "ALL" command is used for
- the network addresses, then no other network addresses
- should be stated.
-
- Syntax: AKA <network address or ALL>
- Eg: AKA 3:636/213
- AKA 3:636/213.3
- AKA ALL
-
- After entering the AKAs for the index, the nodelists to
- be used for the index must be specified. This can be
- accomplished using the "LIST" or "PLIST" commands.
-
- The "LIST" command indicates that the nodelist that
- follows it compiles to the StLousis nodelist format, or in
- simpler terms that it has at least 1 Zone statement at the
- top of the nodelist.
-
- Syntax: LIST <nodelist> [optionial zones]
- Eg: LIST nodelist.* 1 2 3
-
- If, the [optionial zones] are left out, then Ezynode
- assumes that all Zones are to be processed. In this
- example, NODELIST.* will be compiled (the latest version of
- NODELIST in the nodelist directory). Note that all
- nodelists MUST be located in your nodelist directory. That
- is, paths are not valid.
-
- The "PLIST" command indicates that the nodelist which
- follow will be a private nodelist that does not contain any
- Zone statements. You must indicate which Zone Ezynode is to
- use.
-
- Syntax: PLIST <nodelist> <zone to use>
- Eg: PLIST ezynode.* 80
-
- In this example, ezycoms network nodelist will be
- compiled, but because no valid zones are in the nodelist,
- ezynode will use zone 80 for the network address. The <zone
- to use> parameter MUST be present for the "PLIST" command to
- function.
-
- In Ezycom version 1.01, only limited nodelist support
- is present, but this will be expanded upon in later versions
- including point list support, costing, crashmail detection,
- and other delights.
-
-
-
- Page 123.
-
-
-
-
-
-
- EzyNode, Sample EZYNODE.CTL
- ---------------------------
-
- ; First Block will create EzyIndex.01
- START
- AKA 3:636/213
- LIST NODELIST.* 1 2 3 4 5 6
- ;
- ; Second block will create EzyIndex.02
- START
- AKA 80:1000/153
- LIST EZYNODE.*
- ;
- ;end of ezynode.ctl
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 124.
-
-
-
-
-
-
- Appendix A (Questionnaire Language)
-
- Questionnaire
- -------------
- Questionnaire languages are like a miniature
- interpreter language built around the BBS. It is simple,
- but a very powerful way in which tasks can be accomplished.
- Some ideas for the use of Q-A language are, asking newusers
- details which the BBS doesn't ask them (NEWUSER.Q-A) or
- (NEWUSER2.Q-A which allows MENUCMND unlike NEWUSER.Q-A),
- handling registration expiry (REGEXP.Q-A), writing door
- information files (DOOR.Q-A), turning off access to certain
- file/message areas (Eg. If a Amiga user doesn't want to view
- IBM Files), and much more. Throughout this appendix, <var
- num> is referred to, and the range of variables it has is 1
- through 50.
-
- The commands are case-insensitive, that is 'Quit',
- 'QUIT' and 'quit' are all valid commands.
-
- DisplayFlag <flagnum A-D><flagbit 1-8>
- This option displays the current status of a user's flag.
-
- Eg. DisplayFlag A1
-
- Would display ON/OFF depending on the value of the user's
- flag A1.
-
- SETFLAG <flagnum A-D><flagbit 1-8> <ON|OFF|TOGGLE>
- This option is used to set the user's flag to a value. ON
- would turn the user's flag on, OFF would turn the user's
- flag OFF, and TOGGLE would turn the user's flag OFF if it
- was ON, or ON if it was OFF.
-
- Eg. SetFlag D8 ON
-
- Would set the user's flag D8 to ON.
-
- SETSECURITY <security>
- SetSecurity changes the user's current security level to
- that defined in the command.
-
- Eg. SetSecurity 100
-
- SETIGNOREFP <ON|OFF|TOGGLE>
- SetIgnoreFp, sets the file points ignore flag ON or OFF for
- the user.
-
- Eg. SetFP OFF
- Would set the file points ignore flag OFF.
-
-
-
-
-
- Page 125.
-
-
-
-
-
-
- SETANSI <ON|OFF|TOGGLE>
- SetANSI, sets the ANSI graphics ON or OFF for the user.
-
- Eg. SetANSI OFF
- Would set ANSI graphics OFF.
-
- SETAVATAR <ON|OFF|TOGGLE>
- SetAVATAR, sets AVATAR graphics ON or OFF for the user.
-
- Eg. SetAVATAR TOGGLE
- Would turn AVATAR OFF, if it was currently ON, or ON if it
- was currently OFF for the user.
-
- SETFSE <ON|OFF|TOGGLE>
- SetFSE, sets the ANSI Full Screen Editor ON or OFF for the
- user.
-
- SETRATIO <ON|OFF|TOGGLE>
- SetRatio, sets the File Ratio Ignore Flag ON or OFF for
- the user.
-
- SETPOSTCALL <ON|OFF|TOGGLE>
- SetPOSTCALL, sets the Ignore Post Call Ratio Flag ON or OFF
- for the current user on-line.
-
- SETMNUTIME <ON|OFF|TOGGLE>
- SetMNUTIME, sets the Ignore Menu Time Restrictions, that is,
- time on-line, start time and end time, ON or OFF for the
- current user on-line.
-
- SETVARS "<text>" <var num>
- SetVARS, is a special command, where you can set on the of
- the 50 variables (each of maximum 255 characters), to a
- default value. This value can be anything from a number to
- a word. The 'SPECIAL' feature about this command is that
- most Type 7 codes can be used to place 'SPECIAL' information
- in the variable for testing. The <text> field also supports
- the Ctrl-F/K smart text codes.
-
- Eg. SetVars "Hi There" 1
- Would place "Hi There" in Variable 1.
-
- Eg. SetVars "Ctrl-FA" 1
- Would place <username in Variable 1.
-
- Eg. SetVars "COM*P" 1
- Would place "COM1" in Variable 1 in the current comport was
- 1. "COM2" in Variable 1, if the current comport was 2, and
- so on.
-
- Valid codes from Type 7 are *P, *B, *O, *F, *L, *A, *G,
- *V, *R, *S, *N, *7, *8, *9, *0, *1, *2.
-
-
-
- Page 126.
-
-
-
-
-
-
- Some new codes have been added specifically for the
- SETVARS statement.
-
- *E is the errorlevel returned from the last Type 7
- Shell. If, the program to be run in the Type 7 shell could
- not be found to run, then *E will give a value of 65535.
-
- Eg
- MENUCMND 7 TEST.EXE
- SETVARS "*E" 1
- IF 1 = 65535
- DISPLAY "File Not Found|"
- ELSE
- DISPLAY "Errorlevel Returned "
- DISPLAYASW 1
- ENDIF
-
- *AGE is the users age. This can be used to set user
- flags on or off, for restricting their access to message
- areas and/or file areas. If, their Birth Date is Invalid,
- then *AGE will return 255.
-
- Eg
- SETVARS "*AGE" 1
- IF 1 = 255
- DISPLAY "Sorry, your Birth Date is Invalid|"
- SETFLAGS A1 OFF
- ELSE
- DISPLAY "Your Age is "
- DISPLAYASW 1
- IF 1 <= 17
- SETFLAGS A1 OFF
- DISPLAY "Sorry, you can not access Adult Areas.|"
- ELSE
- SETFLAGS A1 ON
- DISPLAY "Yes, you are old enough for Adult Areas.|"
- ENDIF
- ENDIF
- WAITENTER
-
- *TIME is the current time. This can be used to further
- restrict users from doing things at certain times, run a
- program in the BBS, and still keep the user on-line and so
- on. The time is made into the numeric format HHMM.
-
- Eg
- SETVARS "*TIME" 1
- IF 1 < 1600
- DISPLAY "It is not 4pm yet.|"
- ELSE
- DISPLAY "Enjoy our On-line Game.|"
- MENUCMND 7 *C /C GAME.BAT
- ENDIF
-
-
- Page 127.
-
-
-
-
-
-
- SETCOMMENT <var num>
- SETCOMMENT sets the user's comment field the the variable
- number. Only the first 40 characters of the variable number
- is used.
-
- Eg
- SETVARS "High"
- SETCOMMENT 1
-
- SETTOPMENU <menuname>
- SETTOPMENU sets the user's top menu field to <menuname>.
- Menuname should NOT include the .MNU extension.
-
- Eg
- SETTOPMENU TOP
-
- WAITENTER
- WaitEnter displays the enter prompt, and waits till Enter is
- pressed.
-
- MENUMMND <option number> [miscdata]
- MenuCmnd executes ANY of the menu commands, except for the
- questionnaire (type 12) command. These are used exactly the
- same as the normal menu commands. Note that Menu Commands
- are NOT allowed in NEWUSER.Q-A.
-
- Eg
- MenuCmnd 7 *C /C GAME.BAT
-
- MenuCmnd 27 1 /T=Peter_Davies
-
- DISPLAY "<message>"
- This displays message to the user. It does NOT
- automatically place a carriage return on the end. Use | to
- force a carriage return.
-
- Eg Display "High"
-
- DISPLAYASW <var num>
- DISPLAYASW or LISTANSWER, displays <variable number> to the
- user WITH a carriage return.
-
- Eg SetVars "High" 1
- DisplayAsw 1
-
- DISPLAYGROUP <group>
- DISPLAYGROUP will display the current status of a group (A
- through to Z). If the particular group is ON, then ON is
- displayed, or if it is OFF, then OFF is displayed.
-
- Eg DisplayGroup A
-
-
-
-
- Page 128.
-
-
-
-
-
-
- CLEARSCREEN
- CLEARSCREEN clears the user's screen if he/she has the
- clearscreen flag set to ON.
-
- POSTINFO
- POSTINFO writes the users name, time and date to the answer
- file.
-
- OUTPUTANSWER "<message>" [var num]
- OUTPUTANSWER writes the <message> then the variable contents
- to the answer file. The [var num] is an optionial parameter
- and allows just <message> to be written to the answer file,
- if so desired. The <message> also supports all the CtrlK/F
- commands, such as Ctrl-FA.
-
- Eg.
- SETVARS "High" 1
- OUTPUTANSWER "Current Value of Var 1 " 1
- OUTPUTANSWER ""
- OUTPUTANSWER "Ctrl-FA"
-
- (The Ctrl-F represents Control F key)
-
- QUIT
- QUIT terminates execution of the script IMMEDIATELY. This
- is useful inside an IF statement or at the end of a GOTO.
-
- CAPITALIZE <ON|OFF|FIRSTLETTER|>
- CAPITALIZE or CAPITALIZE, turns ON or OFF the capitalizing
- of all input statements to the script. FirstLetter however,
- will Capitize the first letter of ever word, and force lower
- case on every other letter.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 129.
-
-
-
-
-
-
- CHANGECOLOR <foreground color> <background color>
- CHANGECOLOR or CHANGECOLOUR, changes the current foreground
- and background colours to those specified in the command.
-
- Eg
- CHANGECOLOR 15 0
- Would change the current colour to White with a black
- background.
-
- The colour assignments are
-
- Foreground Background
-
- 0 - Black 0 - Black
- 1 - Blue 1 - Blue
- 2 - Green 2 - Green
- 3 - Cyan 3 - Cyan
- 4 - Red 4 - Red
- 5 - Magenta 5 - Magenta
- 6 - Brown 6 - Brown
- 7 - LightGray 7 - LightGray
- 8 - DarkGray
- 9 - LightBlue
- 10 - LightGreen
- 11 - LightCyan
- 12 - LightRed
- 13 - LightMagenta
- 14 - Yellow
- 15 - White
-
- GETCHOICE <key list> <var num> [default]
- GetChoice waits until a key in <key list> is pressed and
- stores the result in <var num>. If a [default] key is in
- the command, then if ENTER is pressed, the default key will
- be placed in <var num>. If, GetChoice is used in
- conjunction with Capitalise ON or FIRSTLETTER, then all
- input is capitalized.
-
- Eg GetChoice YN 1 Y
- Would wait until either Y(es) or N(o) or ENTER is pressed.
- If, ENTER is pressed, then Variable would contain Y.
-
- Eg GetChoice YN 1
-
- Is exactly the same as the previous example, but if
- ENTER is pressed, it is ignored. ie The user MUST type in
- Y(es) or N(o).
-
-
-
-
-
-
-
-
- Page 130.
-
-
-
-
-
-
- IF ... [ELSE] ... ENDIF
-
- This is a very powerful way of manipulating responses
- from the user. Ezycom's IF's can be up to 65,000 levels
- deep. The ELSE is optional.
-
- Eg
- SETVARS "X" 1
- IF 1 = "Y"
- DISPLAY "Y Was Entered|"
- ELSE
- DISPLAY "Y Was Not Entered|"
- ENDIF
-
- Since the contents of 1 was "X", the test failed when
- testing for "Y", so the result would be "Y Was Not Entered|"
-
- Eg
- SETVARS "X" 1
- IF 1 = "Y"
- DISPLAY "Y Was Entered|"
- ELSE
- DISPLAY "Y Was Not Entered|"
- IF 1 = "X"
- DISPLAY "X Was Entered|"
- ELSE
- DISPLAY "I Can not work it Out|"
- ENDIF
- ENDIF
-
- In this example, the result would be "Y Was Not
- Entered" and on the next line "X Was Entered". Notice how
- the IF's can be deep.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 131.
-
-
-
-
-
-
- Eg
- :jumpback
- GETCHOICE WXY 1
- IF 1 = "Y"
- DISPLAY "Y Was Entered|"
- ELSE
- DISPLAY "Y Was Not Entered|"
- IF 1 = "X"
- DISPLAY "I actually wanted a W or Y|"
- GOTO jumpback
- ENDIF
- DISPLAY "W Was Entered|"
- ENDIF
-
- In this example, the script keeps on asking the user
- until he/she enters W or Y. Whenever an X is entered, it
- jumps back to the start for another Choice.
-
- IF's can also use other testing methods, than use
- equals. They can also use <=, >=, <, > and <>. This makes
- the possibilities endless.
-
- Eg
- ASK 1 1
- IF 1 <= "M"
- DISPLAY "A letter less than or equal to M was entered.|"
- ELSE
- DISPLAY "A letter greater than M was entered.|"
- ENDIF
-
- This, testing might be all well and good, but what
- about numeric testing? Well, Ezycom does this as well.
- Simply do NOT place quotes around the number you wish to be
- tested. If a number was expected in the variable, but a
- letter was placed there instead, then Ezycom gives the
- variable a value of 2,000,000,000. Although, no commas can
- be placed in the command.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 132.
-
-
-
-
-
-
- Eg
- :jumpback
- ASK 4 1
- IF 1 < 2000
- DISPLAY "The Number was less than 2000.|"
- ELSE
- IF 1 = 2000000000
- DISPLAY "Please ENTER a numeric value.|"
- GOTO jumpback
- ENDIF
- DISPLAY "The Number was greater than or equal to 2000.|"
- ENDIF
- :<label>
- GOTO <label>
-
- Ezycom, also allows you to move around the script using
- GOTOs. These are common in BASIC languages. A GOTO moves
- the current position in the script to the next command after
- :<label>. If Ezycom, finds a :<label> without GOTOing to
- it, it is simply ignored. The labels are NOT case
- sensitive.
-
- Eg
- :JumPiT
- DISPLAY "Enter Something "
- ASK 4 1
- IF 1 = ""
- DISPLAY "Please Enter Something|"
- GOTO jumPIT
- ENDIF
-
- GOTOXY <xpos> <ypos>
- GOTOXY moves the text cursor to that defined in the command
- line. Note that this does not work in ASCII.
-
- Eg
- SETVARS "*G" 1
- IF 1 = "0"
- DISPLAY "ASCII User|"
- GOTO :getoutofhere
- ENDIF
- MENUCMND 5 DISP
- GOTOXY 5 5
- ASK 5 1
- OUTPUTANSWER "Answer " 1
- GOTO skip
- :getoutofhere
- MENUCMND 5 DISP
- ASK 5 1
- OUTPUTANSWER "Answer " 1
- :skip
- QUIT
-
-
-
- Page 133.
-
-
-
-
-
-
- CREATE
- Create deletes the current Answer file, and restarts it.
- This can be used ANYWHERE within the Script language. If
- you are Creating DOOR files, this is an good option to use.
-
- SETREGRESET
- SETREGRESET, resets the registration date to Today's Date.
- This would typically be used in REGEXP.Q-A. As the user's
- registration has just expired. His/her registration date is
- then started again, but you would lower his/her security
- level. So, when he/she paid you more money, then all you
- have to do is up their security level, and they are back on
- target.
-
- Eg (REGEXP.Q-A)
- DISPLAY "Your Registration has Just Expired|"
- SETREGRESET
- SETVARS "*S" 1
- IF 1 = 10
- DISPLAY "Didn't register again... You Now have hardly"
- DISPLAY "any time per day|"
- setsecurity 5
- ELSE
- setsecurity 10
- ENDIF
-
- ASK <length> <var num>
- ASK, asks the user for a string (A sequence of characters).
- The string length maximum is that defined with <length>.
- The result is placed in <var num>. If, used in conjunction
- with CAPITALIZE, then the text entered can be forcefully
- capitalized. The <var num> can be a number from 1 to 50.
- Length can be from 1 to 255.
-
- Eg
- ASK 20 1
- DISPLAYASW 1
-
- Would ASK the user for a string of maximum length 20
- characters, and store it in variable 1.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 134.
-
-
-
-
-
-
- SETGROUP <group> <ON|OFF|TOGGLE>
- SETGROUP, sets the current group (file and message) for the
- user. <group> is the group letter (A through Z), which you
- wish the command to act on. Instead of specifying a group,
- "*" can be used, to globally set ALL groups ON or OFF
- (TOGGLE is NOT support for Global Group Setting). The
- second switch (ON|OFF|TOGGLE) sets the user's group to
- either ON or OFF or TOGGLE's the group.
-
- Eg
- SETGROUP * OFF
- SETGROUP A ON
-
- This would set all groups off, then set Group A to ON.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 135.
-
-
-
-
-
-
- Appendix B (Multiline Operation)
-
- Multiline Operation
- -------------------
- Ezycom has been tested successfully with Desqview,
- Lantastic and Novell. It has been tried on Double DOS, but
- this has not been extensive testing. Ezycom provides
- support for Desqview, Double DOS, Taskview, Topview and
- MultiDOS Plus Multitaskers in that when Ezycom is waiting
- for something to happen, it will give away its time slice so
- that other tasks may use it. Ezycom's file locking routines
- require SHARE to be loaded, and a common problem if it is
- not loaded, is internode communication does not work.
-
- When using Ezycom in multiline operation, you do not
- have to place each line in separate directories. Ezycom has
- been written in such a way, to allow all nodes to be run in
- the one directory. As every node is in one directory, a
- problem might arise with using different configurations for
- each node. This can be solved by copying the configuration
- (CONFIG.EZY) to CONFIG.<node> (Eg CONFIG.1). Then, Ezycom
- will ALWAYS loaded CONFIG.1 for node 1. Also, you can have
- a few nodes reading the same CONFIG.EZY in one directory,
- and have other nodes reading different CONFIG.EZY in a
- different directory. This might be desirable if you had
- 4x2400 baud modems and 4x9600 baud modems for instance.
- Ezycom looks for CONFIG.<node> firstly, then CONFIG.EZY in
- the current directory, then CONFIG.EZY in the systempath
- (pointed to by the EZY environment variable). To edit
- CONFIG.2, the config would be run as "CONFIG -N2".
-
- However, if Ezycom is being used with either the
- QUICKED, or TOPED full screen editors, then each line of
- Ezycom MUST be run in seperate directories. If, EzyEdit or
- the Internal Editor is being used, then Ezycom will run
- every line in one directory (if so desired).
-
- Not only can CONFIG.EZY be arrange using this
- CONFIG.<node> method, but all the other configuration files
- including EVENTS, PROTOCOL, etc. The only exceptions to this
- rule are STRING.EZY, MESSAGES.EZY, FILES.EZY and
- ECHOMGR.EZY. Ezycom will ALWAYS locate these files in the
- systempath, and can not be overridden. So it is quite
- possible to have different events for each node using
- EVENTS.1 for node 1 and EVENTS.2 for node 2. Do not forget,
- that to edit any configuration files for nodes other than 1,
- you MUST place a -N<node> on the command line of CONFIG. Eg
- CONFIG -N2.
-
- Ezycom supports up to 8 nodes locally, that is COM1
- through COM8. You must however, be able to configure your
- FOSSIL driver to this. Remember, that the external programs
- (Eg Door Games) also have to support it!
-
-
- Page 136.
-
-
-
-
-
-
- Each node will most likely require a different batch
- file to run it, although you could use a command line
- parameter and use %1 (etc) for the node number.
-
- When using external programs, you MUST make sure if
- they are multinode capable, and if NOT, then only allow one
- user to access them at anyone time. Another method would be
- to restrict certain DOORs to nodes, using the Menu Option
- "Node". If, you have any problems with multinode operation,
- please don't hesitate to write us a message in our Support
- Conference.
-
- Multidos Plus
- -------------
- Ezycom can not detect this, so you have to change the
- configuration to point to MultiDOS Plus. It has NOT been
- tested with MultiDOS. We have used information from various
- people to give time slices away for it. If you have any
- problems, simply unselect it. Please let us know how it
- works with MultiDOS PLUS.
-
- Networks
- --------
- Ezycom works basically like a Multitasker in a network.
- It doesn't need to know anything about the Network, so it
- doesn't detect its presence. You must however, load SHARE
- (or equivalent) on the File Servers of the Network. When
- using Novell, Ezycom detects "Double DOS" multitasker. To
- stop this, turn off multitasker detection.
-
- Ezycom Utilities
- ----------------
- Although Ezycom can have multiple nodes running at the
- same time, its utilities do not function while
- nodes/utilities are running, with the exception of EZYMAIL,
- EZYNET and FEdit.
-
- EzyMail will function fine while one or more lines are
- running, as long as you are using a different log file for
- EzyMail, than the other nodes running. For instance, if
- node 1 was running, and you wanted to run EzyMail, then you
- might run EzyMail as node 2.
-
- Eg: EZYMAIL -TOSS -N2
- Note: You can NOT run two versions of EzyMail or Ezynet
- simultaneously.
-
- EzyNet functions exactly the same way as EzyMail.
-
- FEdit does not log to a log file, so there are no
- restrictions whatsoever while nodes are running.
-
- EYZFF does not function while any nodes are active, this
- prevents you from adding New Files to your Database, while
-
- Page 137.
-
-
-
-
-
-
- users are online. To overcome this, you can logon local,
- and upload the files locally, or you can use Colin Berg's
- (Fido 3:635/500) EzyUp to accomplish the same thing, but
- without logging on.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 138.
-
-
-
-
-
-
- Appendix C (File Control Characters)
-
- Avt/Ans/Asc/Asl File Control Characters
- ---------------------------------------
- These are control charterers that can be placed in any
- of your Avt/Ans/Asc/Asl files. These functions will be
- initiated once the imbedded control character is reached
- within the Avt/Ans/Asc/Asl file. For example to show the
- user's name you would have a control code of ^FA (Ctrl-F A).
- To wait for a key, you would have a control code of ^A
- (Ctrl-A). To display the total system calls you would have
- a control code of ^FA (Ctrl-F A).
-
- The first set of control characters do not require ^F
- or ^K to precede the required function, but the others
- require ^F or ^K to precede them, as shown.
-
- ASCII Ctrl-Code Description
- ----- --------- ----------------------------
- 01 ^A Wait for [Enter] Key to be Pressed.
- 02 ^B Disable Abort with "S" key
- 03 ^C Enable Abort with "S" key
- 04 ^D Disable "Continue" Prompt
- 05 ^E Enable "Continue" Prompt
- 06 ^F @Insert User Parameter
- 07 ^G Beep at User's End
- 08 ^H Backspace
- 09 ^I Move Forward 8 spaces
- 10 ^J Line Feed
- 11 ^K @Insert System Parameter
- 12 ^L Clear Screen
- 13 ^M Carriage Return
- 22 ^W Pause for One Second
- 23 ^V Reserved for Avatar
- 24 ^Y Reserved for Avatar
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 139.
-
-
-
-
-
-
- User Parameters
-
- Add a Control-F to Precede The User Parameters.
-
- ASCII Character Description
- ----- --------- -------------------
- 65 A User's Name
- 66 B Location
- 67 C Password
- 68 D Business/Data Phone
- 69 E Voice Phone
- 70 F Date of Last Call
- 71 G Time of Last Call
- 72 H Flag A
- 73 I Flag B
- 74 J Flag C
- 75 K Flag D
- 76 L Netmail Credit
- 77 M Messages Posted
- 78 N Date Format (DDMMYY/MMDDYY)
- 79 O Security Level
- 80 P Number of Calls to BBS
- 81 Q Number of Uploads (Files)
- 82 R Number of Uploads (Kilobytes)
- 83 S Number of Downloads (Files)
- 84 T Number of Downloads (Kilobytes)
- 85 U User/Sysop Comment
- 86 V Screen Length
- 87 W First Name Only
- 88 X ANSI (On/Off)
- 89 Y Continue (On/Off)
- 90 Z Screen Clearing (On/Off)
- 48 0 Full Screen Editor (On/Off)
- 49 1 Quiet (Multi-Line) (On/Off)
- 50 2 Extended IBM Characters (On/Off)
- 51 3 Time Banked
- 52 4 Kilobytes Banked
- 53 5 FilePoints
- 54 6 User's Alias
- 55 7 Date of First Call
- 56 8 Date of Birth
- 57 9 Subscription Expiry Date (Registered)
- 96 a Days till Expiry Date (Registered)
- 97 b AVATAR (On/Off)
- 98 c Ratio for Files
- 99 d Credit for Files
- 100 e Number of Files Downloadable
- until Ratio Expires.
- 101 f Number of Files to Upload
- until Ratio is Even.
-
-
-
-
-
- Page 140.
-
-
-
-
-
-
- User Parameters (Continued)
-
- ASCII Character Description
- ----- --------- --------------
- 102 g Ratio for Kilobytes
- 103 h Credit for Kilobytes
- 104 i Number of Kilobytes Left
- until ratio Expires.
- 105 j Number of Kilobytes to
- upload until ratio is even.
- 106 k Default Protocol
- 107 l Number of Kilobytes for File Points
- 108 m Last NEW File Search Date
- 109 n Post/Call Percentage for Security
- 110 o Credit for Post/Call ratio
- 111 p Number of Msgs behind Post / Call
- ratio
- 112 q Number of Msgs in front of Post/ Call
- 113 r Graphics Mode (Verbose)
- 114 s Users Post/Call Percentage
- 115 t File Points awarded since last session
- 33 ! Message Quote Colour
- 64 @ Message Text Colour
- 35 # Message Prompt Foreground Colour
- 36 $ Message Prompt Background Colour
- 37 % Filename Colour
- 94 ^ File Size Colour
- 38 & File Date Colour
- 42 * File Description Colour
- 40 ( Uploader Colour
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 141.
-
-
-
-
-
-
- System Parameters (Preceded by Ctrl-K)
-
- ASCII Character Description
- ----- --------- ------------------------------------
-
- 65 A Total System Calls
- 66 B Last Caller (any line)
- 67 C Number of Messages (Total)
- 68 D Number of Msgs in Template Msg Area
- 69 E Maximum K Download
- 70 F Number of Times user has Paged Sysop
- 71 G Day of Week (Complete)
- 72 H Number of Users
- 73 I Time in 24 format
- 74 J Today's Date
- 75 K Minutes Connected this Call
- 76 L Number of Current Template file area
- 77 M Minutes Used Today
- 78 N Number of Current Template Msg Area
- 79 O Minutes Remaining Today
- 80 P Downloads (K) Left Today
- 81 Q Daily Time Limit
- 82 R Current Baud Rate
- 83 S Day of the week (abbreviated)
- 84 T Daily Download limit
- 85 U Minutes Until Next System Event
- 86 V 24 hour format time of the next event
- 87 W Node Number (Multi-Line)
- 88 X Terminates Session
- 89 Y Name of Message Area
- 90 Z Name of File Area
- 48 0 Time before a menu option can be
- activated.
- 49 1 Start Time for last invalid menu Opt
- 50 2 End Time for last invalid Menu Opt
- 51 3 Number of Files in Template file Area
- 52 4 Total Number of Files
- 53 5 Number of New Users Today
- 54 6 Number of New Messages Today
- 55 7 Number of New Files Today
- 56 8 Total Amount of Files in Kilobytes
- 57 9 Last Callers Alias
- 96 a Ezycom Version Number
- 97 b<hex> Changes the users current colour to
- <hex>. See Appendix G.
- 98 c Number of session failures since last
- session.
-
-
-
-
-
-
-
-
- Page 142.
-
-
-
-
-
-
-
- Appendix D (Menu Commands)
-
- The following commands are used to create your menus.
-
- Ezycom has approximately 80 different menu types for
- use in menus. Following is a list these commands. A few
- conventions have been used:
-
- <....> : Means that is a necessary option and must be
- included for the menu command to function correctly
- [....] : This means that it is optional information.
- | : This means "or". Eg 1 | 2 would mean 1 or 2, but
- not 1 and 2.
-
- Menu Types
-
- Option 0 Display
-
- Miscdata None
-
- This command simply does NOTHING, and is included for
- display line purposes only.
-
-
- Option 1 Goto Menu
-
- Miscdata <MENUNAME> | /TOPMENU
- [Password]
- [/F=<file area template number>
- | + | - | <group>]
-
- [/M=<message area template number>
- | + | - | <group>]
-
- [/NC]
-
- This command allows the movement from the current menu
- to another. The menu name, which Ezycom will move to when
- activated is indicated in the <MENUNAME>. The <MENUNAME>
- must not include the .MNU extension, as that is appended by
- Ezycom automatically. If, /TOPMENU is used instead of
- <MENUNAME>, then the user will be moved to the TOP MENU when
- selecting this option. Optionally, a [Password] may be
- specified. The user must then type in the Password
- correctly before he/she can gain entry to the menu. As
- stated in the Menu Templating documentation the /F= and /M=
- commands are valid for the Goto Menu Command. The Optional
- parameter /NC means, that NO CLEAR SCREEN command will be
- sent to the user when displaying the new menu.
-
- Eg: Miscdata /TOPMENU ourpassword /F=+
-
-
-
- Page 143.
-
-
-
-
-
-
- Option 2 Gosub Menu
-
- Miscdata <MENUNAME> | /TOPMENU>
- [Password]
- [/F=<file area template number>
- | + | - | <group>]
-
- [/M=<message area template number>
- | + | - | <group>]
-
- [/NC]
-
- This command works exactly like the GOTO menu command
- except that it leaves its FILENAME on the GOSUB MENU STACK,
- so you can later return to this MENU using Option 3 (Return
- from Gosub).
-
- Option 3 Return from Gosub
-
- Miscdata None
-
- This commands returns to the last menu where a GOSUB
- menu command was used.
-
-
- Option 4 Goto and Clear Gosub Stack
-
- Miscdata <MENUNAME> | /TOPMENU
- [Password]
- [/F=<file area template number>
- | + | - | <group>]
-
- [/M=<message area template number>
- | + | - | <group]
-
- [/NC]
-
- This command behaves exactly like the GOTO menu command
- except that it CLEARS the GOSUB menu stack, so you can not
- return from anymore menus until you have GOSUB'd to more.
-
-
- Option 5 Display ANS/ASC/ASL/AVT
-
- Miscdata <Textfile>
-
- This command Displays a <textfile> onto the users
- screens. This command does NOT support MENU hotkeys. The
- <textfile> name should not include the extension, as Ezycom
- automatically determines this, according to the users
- Terminal Emulation Options.
-
-
-
-
- Page 144.
-
-
-
-
-
-
- Option 6 Bulletin Menu
-
- Miscdata <1-8 character name>
-
- Displays the <1-8 character name> file in the text file
- directories. The user is then prompted for a remaining part
- of the file name (8 - <length of file>). The file is then
- displayed. No extension should be placed in the filename.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 145.
-
-
-
-
-
-
- Option 7 DOS Shell
-
- Miscdata <program to execute> [parameters]
-
- The <program to execute> is the name of the program you
- wish to run. If, a COM or EXE file is being executed, then
- just the name of the program and extension is required.
- Eg: EZYED.EXE
-
- However, if a batch file is being run, then a command
- line interpreter needs to be loaded (COMMAND.COM).
- Eg: C:\COMMAND.COM /C GAME.BAT
-
- Instead of specifying the entire path to COMMAND.COM,
- the COMSPEC environment variable can be used to retrieve the
- path. In this case, the C:\COMMAND.COM would be replaced by
- *C.
- Eg: *C /C GAME.BAT
-
- On executing a Type 7 Shell, Ezycom writes two files,
- EXITINFO.<node> and DORINFOx.DEF. The name for DORINFOx.DEF
- is configurable and can be changed with the list of special
- commands later. The EXITINFO.<node> holds ezycom specific
- information, that it uses to run. On returning to Ezycom
- after the Type 7 Shell, Ezycom reads in the EXITINFO.<node>
- file, to process any information that might have been
- changed.
-
- *F User's First Name
- *L User's Last Name
- *H The Fossil Driver is left "Hot" during the Type 7
- Shell. Generally this option is not used.
- *M Swap out Ezycom leaving using 9k ram. This enables
- larger programs to be executed in the Type 7 Shell,
- although swapping can take a few seconds, if Disk
- Swapping is used.
- *P Comport Number
- *R User Record Number
- *G ANSI On/Off On=1 Off=0
- *V ANSI/Avatar On/Off
- 3 ANSI & Avatar
- 2 Avatar
- 1 ANSI
- 0 ASCII
- *A Users Alias (Real Name if there is no alias)
- *C COMSPEC Environment variable (COMMAND.COM)
- *S User's Security Level
- *N Node : Format 1..250
- *9 Node : Format FO1..250
-
-
-
-
-
-
- Page 146.
-
-
-
-
-
-
- This format could be used for renaming/copying
- dorinfoX.def to a naming convention that some door programs
- might prefer.
-
- *0 This switch is replaced by the current File Area
- Template number.
- *1 This switch is replaced by the current Message Area
- Template number.
- *2 This is the upload path for the current file area
- template.
- &V This is the same as *V, except that it places the *V
- information in the Dorinfox.def and DOOR.SYS files.
- &A This is the same as *A, except that it places the
- Alias of the user in the Dorinfox.def and DOOR.SYS files
- instead of the user's real name.
- &O This is the same as *O, except that it places the
- Locked Baud rate in the Dorinfox.def and DOOR.SYS files
- instead of the effective baud rates. That is, if the
- comport is locked.
- *D1 This option creates the Dorinxxx.def on executing the
- Type 7 Shell where xxx is the *9 Node Format.
- *D2 This option creates the Dorinfo1.Def on executing the
- Type 7 Shell.
- *D3 This option creates Doorx.Def on executing the Type 7
- Shell where x is the *N Node Format
- *D4 This option creates a doorway compatible Door.sys file
- in executing the Type 7 Shell.
- *! This option stops the clock when the user is in the
- Type 7 Exit. That is, the user does not loose anytime in
- the Shell.
- *# This option turns off the Type 7 Exit Flag.
- *B This is the users effective Baud Rate. If, the user
- is local then the baud rate is 0.
- *O This is the users actual Baud Rate between the
- computer and modem. If the comport is NOT locked, then it
- is the same value as the effective Baud Rate.
-
- These options can be used in the parameters field of
- the Type 7 Exit.
- Eg: GAME.EXE *F *L *P
- This would translate to for instance,
- GAME.EXE Peter Davies 1.
-
-
- Option 8 Version of Ezycom
-
- Miscdata None
-
- This option displays the current version of Ezycom.
-
-
-
-
-
-
- Page 147.
-
-
-
-
-
-
- Option 9 Logoff/Terminate Call
-
- Miscdata [/NOHANGUP] [/ERR=<errorlevel>]
-
- This option displays GOODBYE.A* (if it exists), before
- hanging up the user. If, the /NOHANGUP flag is used, then
- the users Carrier, is not dropped during the termination of
- the call. The [/ERR=<errorlevel>] command, tells Ezycom
- that you wish to exit Ezycom with an errorlevel. The
- errorlevel must be from 20 through to 255.
- Eg: /NOHANGUP /ERR=25
- If, both of these options are used together, and with
- some intelligent batch file programming, it is possible to
- make a relogon option.
-
- Option 10 Display System Usage Graph for Each Line
-
- Miscdata None
-
- This option displays the system Usage of the node
- number, since TIME<node>.BBS was created.
-
-
- Option 11 Page System Operator for Chat
-
- Miscdata String to Display to User (about chat)
-
- This option pages the sysop for a chat request, and
- sends the miscdata line to the user. A suitable line for
- miscdata might be "Paging Sysop for a Chat... Please
- Wait...".
-
-
- Option 12 Questionnaire Language
-
- Miscdata <questionnaire name> [output file]
-
- This option executes a Questionnaire. The
- Questionnaires are named <questionnaire name>.Q-A in your
- system directory. [output file] is the name of the answer
- file you wish to use. See "Questionnaires" in Appendix A
- for information about Questionnaires.
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 148.
-
-
-
-
-
-
- Option 13 User List
-
- Miscdata [/A] [/C] [/S] [>=<security] [<=<security>]
- [=<security>] [<<security>]
- [><security>]
-
- This option displays a list of all the users on the
- system. Various options exist. They are
-
- /A : Show user's aliases instead of real names
- /C : Displays user's comments, instead of their location
- /S : Displays user's security, instead of number of calls
-
- >=<security>
- : User's security must be equal to or greater than the
- security to be displayed
- <=<security>
- : User's security must be less than or equal to the
- security to be displayed
- =<security>
- : User's security must be less than or equal to the
- security to be displayed
- <<security>
- : User's security must be less than the security to be
- displayed
- ><security>
- : User's security must be greater than the security to
- be displayed
-
- Option 14 Display Time Statistics
-
- Miscdata None
-
- This option displays time statistics about the user on-
- line.
-
-
- Option 15 Exit with Errorlevel
-
- Miscdata <errorlevel>
-
- This option exits Ezycom with <errorlevel>, which must
- be in range from 20 to 255. Ezycom can relogon the user
- using the -R option. This option would only be used if the
- door games are so big that they can not run inside of a Type
- 7 Shell, even with Swapping.
-
-
- Option 16 Change User's Location
-
- Miscdata None
-
- This option allows the user to change his/her location.
-
-
- Page 149.
-
-
-
-
-
-
- Option 17 Change User's Password
-
- Miscdata None
-
- This option allows the user to change his/her password.
-
-
- Option 18 Change User's Screen Length
-
- Miscdata None
-
- This option allows the user to change his/her screen
- length.
-
-
- Option 19 Toggle Screen Clearing
-
- Miscdata None
-
- This option allows the user to toggle screen clearing
- codes being sent to him/her.
-
-
- Option 20 Toggle Page Pausing
-
- Miscdata None
-
- This option allows the user to toggle page pausing.
-
- Option 21 Toggle ANSI Graphics
-
- Miscdata None
-
- This option allows the user to toggle ANSI Graphics.
-
-
- Option 22 Check Mail
-
- Miscdata [/G=<groups>]
-
- This option allows the user to check for mail waiting.
- Optionially, the groups used for checking mail can be used
- to override the user's groups.
-
- Eg: Miscdata /G=ABC
-
-
-
-
-
-
-
-
-
-
- Page 150.
-
-
-
-
-
-
- Option 23 Read Message
-
- Miscdata <message board> | /M
-
- This option allows the user to read a particular
- conference. If /M is placed in Miscdata, then the current
- message area template is used, otherwise the message board
- selected is used.
-
- While reading messages, the user/sysop is presented
- with various keys, they are:
- [A]gain : Display the message again.
- [L]ast : Go back to the previous message.
- [N]ext : Move to the next message.
- [R]eply : Reply to the message.
- [W]rite : Write a message.
- [D]elete : Delete a message.
- [F]orward : Forward the message to someone else.
- [E]dit : Edit the message.
- [K]eep : Keep the message unread.
- [!] : Shows hidden information in the message.
- [S]top : Stop reading messages.
- [U]pdate : Update the user who the message is from.
- Alt-M : (Local Only) Fully Update User who the
- message is from.
- e[X]port : (Local Only) Export the message to Disk.
- If, the filename is PRN/LTP1/LPT2/LPT3,
- then the message is printed.
-
- In the [E]dit mode, various attributes of the message
- can be edited. The most powerful feature is the No-Kill
- flag. If, this is set to On, then MSGCOMP will NEVER delete
- the message, until the message is deleted by a User.
-
-
- Option 24 Scan Messages
-
- Miscdata <message board> | /M
-
- This option is the same as Option 23, except that none
- of the message body is display to the user.
-
-
- Option 25 Quick Scan Messages
-
- Miscdata <message board> | /M
-
- This option is the same as Option 24, except that the
- information displayed, is on one line, allowing an even
- briefer view of the messages.
-
-
-
-
-
- Page 151.
-
-
-
-
-
-
- Option 26 Delete Message
-
- Miscdata <message board> or /M
-
- This option allows the user to delete individual
- messages for a particular message area. The user can only
- delete message(s), if they are A) A Sysop of that Message
- Area, B) They wrote the message and it is not an echomail
- message, or C) They received the message and it is not an
- echomail message. If, the user does not fall into one of
- these categories, then they will not be able to delete the
- message(s).
-
-
- Option 27 Post Message
-
- Miscdata <message board> | /M
- [/T=<to_user_name>] [/S=<subject>]
- [/L]
-
- Post Message, allows users to post a message into a
- conference pointed to <message board> or /M (the current
- message area template). The menu creator can FORCE the name
- of the message to be posted to, by placing a
- /T=<to_user_name> in. Note that when using this command, if
- the name has TWO words, an underscore must be placed between
- them.
- Eg: /T=Peter_Davies
- Also, the subject can be forced as well. This can be
- accomplished by using the /S=<subject> field. As with the
- /T option, an underscore MUST be used to separate words.
- The /L option can be used to logoff the user
- immediately after he/she posts the message. The special
- feature about this option, is that if the user does not post
- the message, they are not logged off.
-
-
- Option 28 Set Combined Area
-
- Miscdata None
-
- This option allows the user to individually select
- which message areas they want on/off for Global Message
- Options. Ezycom has two Global Message Options, Check For
- Mail, and Read Global New Messages. If, a user turned off a
- conference, then they would never read any messages for
- those conferences using those two options.
-
-
-
-
-
-
-
-
- Page 152.
-
-
-
-
-
-
- Option 29 Read Global New Messages
-
- Miscdata [/SCAN | /LIST] [/G=<groups>]
-
- This option allows the user to read all messages which
- he/she has not read. Optionially, /SCAN can be used to tell
- Ezycom to do scanning for new mail, instead of reading new
- mail. Optionially, /LIST can be used to tell Ezycom to list
- the messages, instead of readnew new mail. Optionially, the
- user's groups can be over ridden with the /G=<groups>
- command.
-
-
- Option 30 BiModem
-
- Miscdata <upload area> | /F
-
- This option allows users to transfer BIDIRECTIONALLY
- using the BiModem External Protocol. The path for BiModem
- must be set before this option will work. Also, the
- configuration files for BiModem (Bimodem.1 Bimodem.2 etc)
- must have also been placed in the path. See "BiModem" for
- more information on it. The <upload area> | /F, specifies
- what upload area do you wish the uploads to be placed in.
- If, /F is used, then uploads could be redirected to another
- file area if "Upload File Area" for that file area, points
- to a different file area. If, the actual file area number
- is used, then all the uploads are always placed in that file
- area, that is, no redirection can occur.
-
-
- Option 31 View File List
-
- MiscData <file area> | /F
- [/NEW]
- [/G=<groups>]
-
- View a file list for <file area> or /F (current file
- area template). Simply, if the user has access to the file
- area, they can view the file list for it. If, /NEW is used,
- then only NEW files in that file list will be displayed.
- Optionially, the user's groups for viewing can be over
- ridden using the /G=<groups> command. While viewing the
- file list, the user is given an option to add to batch (if
- more prompt is turned on). The user can add files to the
- batch, using filenames (wildcards supported), or by typing
- in the number of the file. Eg: +1 +2. Instead of typing in
- the numbers of the files for say 1 to 10, the user could
- also do +1-10. It is suggested that you make up a standard
- msg to send to all newusers telling them how to use this
- feature. It makes file batching VERY quick.
-
-
-
-
- Page 153.
-
-
-
-
-
-
- Option 32 Global Download
-
- Miscdata None
-
- Globally download files from the BBS. The users can
- download files from anywhere on the system, so long as they
- have access to the file areas. This option also supports
- all the batch commands.
-
-
- Option 33 Upload
-
- Miscdata <upload area> | /F
-
- This option allows the user to upload files to the
- system. If <upload area> is used, then uploads are ALWAYS
- uploaded to that file area, no redirection can take place.
- If, /F (current file area template) is used, then uploads
- are placed in that file areas template upload area. That
- is, if the file areas upload area pointed to another file
- area, then uploads would be placed in that other file area.
-
-
- Option 34 View Contents of Archive
-
- Miscdata None
-
- This option allows users to view the contents of ZIP,
- LZH, PAK, ARC, ZOO, GIF and ARJ files anywhere on the
- system, as long as they have download accesss to those
- files.
-
-
- Option 35 Scan File Areas by Keyword
-
- Miscdata [file areas to search and/or /F]
- [/G=<groups>]
-
- This option allows users to search through the file
- areas by using a keyword. Miscdata can Optionally contain a
- list of file areas that can be used to search. If, miscdata
- is blank, then all file areas are searched. An example
- miscdata might be
- Miscdata 1 /F
- This would mean that first of all, file area 1 is
- scanned, then the current file area template is scanned.
- If, they were reversed on the Miscdata line, that is "/F 1",
- then the current file area template would be searched first,
- then file area 1.
- Optionially, /G=<groups> can be used to override the
- user's groups for viewing.
-
-
-
-
- Page 154.
-
-
-
-
-
-
- Option 36 Scan File Areas by Filespec
-
- Miscdata [file areas to search and/or /F]
- [/G=<groups>]
-
- This option allows users to search through the file
- areas by using a filespec. A filespec, is a file
- specification. This could include DOS/UNIX valid wild cards
- such as * and ?, for example to list all files, *.* would be
- used. As with Menu Type 35, the file areas to list can be
- selected for this Menu Type. They work in EXACTLY the same
- way as Option 35. Optionially, the user's groups can be
- used to override the user's groups for viewing using the
- /G=<groups>.
-
-
- Option 37 List of New Files Since Last Time Viewed
-
- Miscdata [file areas to search and/or /F]
- [/G=<groups>]
-
- This option allows users to view new files, since the
- last time they executed this option, or the view new files
- option at logon. For instance, if the user logged on, and
- did not did a new files list in that session, then the next
- time they do a new files list, they will see all the files
- since the last time the did this option, not the last time
- they logged on. The Miscdata also allows the specification
- of which file areas to scan. The file areas are listed
- EXACTLY the same way as with Option 35. Optionially, the
- /G=<groups> can be used, to override the current user's
- groups for this command.
-
-
- Option 38 View Text File Specified by the User
-
- Miscdata None
-
- This option allows users to view text files, that are
- in file areas. The user is asked for the filename of the
- text file to view. Note that this is a GLOBAL option, so
- the users do not have to be in the correct file area to view
- the text file.
-
-
- Option 39 Display Direct Text File
-
- Miscdata <Textfile Name>
-
- This option allows the viewing of a textfile name,
- specified by <Textfile Name>. This filename should also
- include the extension.
- Eg: C:\EZY\SOLUTION\PQ3.SOL
-
-
- Page 155.
-
-
-
-
-
-
- Option 40 Display AVT/ANS/ASC/ASL with Menu Hotkeys
-
- Miscdata <FileName> | /MENU
-
- This option allows the displaying of AVT/ANS/ASC/ASL
- with the use of Menu Hotkeys. Typically, this option would
- be used as an automatic option at the top of a MENU. The
- <FileName> should NOT include an extension.
- Eg: QUICKF
- The /MENU command can be used instead of the filename,
- this option automatically replaces itself, with the FileName
- of the current Menu. For example, if Ezycom was in the Menu
- Top, and if the /MENU command was used in the miscdata, then
- Ezycom would display the TOP.A* textfile.
-
-
- Option 41 Toggle Full Screen Editor
-
- Miscdata None
-
- This option allows the user to toggle the use of the
- full screen editor.
-
-
- Option 42 Toggle IBM Extended Characters
-
- Miscdata None
-
- This option allows the user to toggle the user of the
- IBM Extended Character Set. This will tell Ezycom whether
- or not to use the .ASC files or the .ASL files for menu
- display for ASCII users.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 156.
-
-
-
-
-
-
- Option 43 View Nodelist
-
- Miscdata /M | <msgboard> | /N=<network address>
-
- This option allows you to view a nodelist, which has
- been setup with EZYNODE (See EZYNODE for configuration).
- If, /M is used on the command line, then the current message
- template area is used to view the nodelist. If, <msgboard>
- is used, then that message board's nodelist will be used.
- If, /N=<network address> is used, then that <network
- address> is used to view the nodelist. Note that when
- viewing the nodelist from a message board, only echomail or
- netmail areas will work.
-
- Eg: Miscdata: /M (Current Message Area)
- 1 (Message Board 1)
- /N=3:636/213 (Network Address 3:636/213)
-
-
- Option 44 Set Combined Areas (Global)
-
- Miscdata None
-
- This option allows the user to set all of their
- combined areas to either ON, OFF or the DEFAULT values.
-
-
- Option 45 Display AVT/ANS/ASC/ASL with Pause at End
-
- Miscdata <FileName> or /MENU
-
- This option displays the text file, then asks the user
- to press enter after the displaying of it has finished.
- Again, the /MENU command can be used to substitute the MENU
- name for the filename. The FileName should not include
- paths, or extensions.
- Eg: QUICKF
-
-
- Option 46 Display Direct ASC File with Pause at End
-
- Miscdata <TextFile>
-
- This option displays <TextFile> to the screen and
- pauses at the end. This option is basically the same as
- Option 39, except the pause is at the end. In this option,
- the FULL path, name and extension should be given.
- Eg: C:\EZY\FILES\PQ3.SOL
-
-
-
-
-
-
-
- Page 157.
-
-
-
-
-
-
- Option 47 Make a System Log Entry
-
- Miscdata Text to Place in Log
-
- This option allows an entry in the log to be used.
- Typically, this would be an automatic option, and would be
- used to indicate that the user moved into a menu on the
- board. The smart text codes of "@" and "`" can be used to
- indicate the current file area template and the current
- message area template respectively.
-
-
- Option 48 Download Specific
-
- Miscdata <filename> [/FREE]
-
- This option allows the user to download the file
- pointed to be <filename>. <filename> should be a full path
- and extension of the file. Optionally, the /FREE switch can
- be used, to signify a free download for the user.
-
-
- Option 49 Message Area Change
-
- Miscdata [text file] [/G=<groups>]
-
- This option gives the user a list of message areas, and
- changes the current message area template to the message
- area they select. If, you want to make your own list of
- message areas, then place the filename (no extension) of the
- textfile to be used instead in the miscdata like.
- Optionially, /G=<groups> can be used to override the default
- user's groups for this command.
- Eg: Miscdata MESSAREA
-
-
- Option 50 File Area Change
-
- Miscdata [text file] [/G=<groups>]
-
- This option is basically the same as Option 49, except
- that it changes the current file area template instead.
- Optionially, /G=<groups> can be used to override the default
- user's groups for this command.
-
-
-
-
-
-
-
-
-
-
-
- Page 158.
-
-
-
-
-
-
- Option 51 Today/Yesterday's Callers
-
- Miscdata [/A] [/Y]
-
- This option displays a list of todays or yesterdays
- callers to the Bulletin Board Service. If, /Y is placed in
- miscdata, then Yesterday's callers are shown, otherwise
- Today's callers are shown. If, /A is used in Miscdata, then
- aliases are used instead of real names.
-
- When a list of today's callers is displayed, a DidWhat?
- field is shown. They represent certain actions the user did
- while online. They are:
-
- N = NewUser
- R = Read Messages
- S = Sent Messages
- D = Downloaded
- U = Uploaded
- P = Paged Operator
- C = Chatted with Sysop
- O = Outside Ezycom (type 7/15 shell)
-
-
- Option 52 Display Who's On-Line
-
- Miscdata [/A]
-
- This option displays a list of users who are currently
- online. This option works across networks and/or
- multitaskers, to show every user, who is using Ezycom. If,
- the /A switch is used on the Miscdata line, then Aliases are
- shown instead of real names.
-
-
- Option 53 Toggle Quiet Mode
-
- Miscdata None
-
- This option toggles the Quiet Mode. Quiet Mode, stops
- users of other lines from sending a message to your node.
-
-
- Option 54 Send Message To Other Line
-
- Miscdata [/A]
-
- This option allows the user currently online, to send a
- message to a user on another line. The message arrives only
- while users are in the menu system, not while reading
- messages, or in an menu option, and more. If, the /A switch
- is used, aliases are shown instead of real names.
-
-
-
- Page 159.
-
-
-
-
-
-
- Option 55 Download anyfile
-
- Miscdata None
-
- This option allows user(s) to download files from
- ANYWHERE on the system. They can specify a full pathname to
- download the files. This option should only be made
- available to the Sysop, or not used at all.
-
-
- Option 56 Import a text file into a message
-
- Miscdata <message boad> | /M
- [/U=<from_username>]
- [/T=<to_username>]
- /S=<subject>
- /L=<text file>
-
- This option is used for importing a text file, into the
- BBS. The main use for this option, would be to post a
- message to a newuser. The <message board> | /M specify
- which message area the message will be posted in. The /U
- command specifies the from user name. All spaces in the
- names must use an UNDERSCORE characters.
- Eg: /U=Peter_Davies
-
- If, the /U command is left out, then the from user name
- defaults to the name of the user currently online. The /T
- command is mostly the same as the /U command, except that it
- specifies the name of who the message is to be posted to.
- If, the /T command is omitted, then the message is posted to
- the name of the user online. The /S command specifies the
- subject of the message and is not an optional parameter.
- The /L commands specifies a fully qualified filename (path,
- name and extension), of the file which contains the message
- to be imported into a message area and is not an optional
- parameter.
-
- This command supports the Ctrl-F/K smart text codes in
- the text file to be imported.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 160.
-
-
-
-
-
-
- Option 57 Change home/voice number
-
- Miscdata None
-
- This option allows the user to change his/her home
- voice phone number.
-
-
- Option 58 Change business/data number
-
- Miscdata None
-
- This option allows the user to change his/her
- business/data phone number.
-
-
- Option 59 Reserved for Future Expansion
-
- Option 60 Reserved for Future Expansion
-
-
- Option 61 Avatar On/Off
-
- Miscdata None
-
- This option allows the user to turn Avatar Graphics
- On/Off.
-
-
- Option 62 List Batch
-
- Miscdata None
-
- This option displays the current contents of the user's
- download batch.
-
-
- Option 63 Erase Batch
-
- Miscdata None
-
- This option erases the entire contents of the user's
- download batch.
-
-
- Option 64 Add Files to Batch
-
- Miscdata None
-
- This option allows the user to add files to his/her
- download batch.
-
-
-
-
- Page 161.
-
-
-
-
-
-
- Option 65 Erase Single Files from Batch
-
- Miscdata None
-
- This option allows the user to erase single/multiple
- files from the download batch.
-
-
- Option 66 Multiline Chat
-
- Miscdata [/A]
-
- This option allows the chatting between two or more
- users on different nodes of the Bulletin Board. The
- optional /A switch, forces Aliases instead of Real Names.
-
-
- Option 67 Change to Message Area and Unread Mail
-
- Miscdata None
-
- This option is the same as option 49 (change to message
- area), except that the user is told if their is new/unread
- mail in an area.
-
-
- Option 68 Produce Online Master List
-
- Miscdata [/FREE] (Free Download)
- [/RAW] (Allow Raw File Download)
- [/ZIP] (Allow ZIP Compression)
- [/LZH] (Allow LZH Compression)
- [/ARJ] (Allow ARJ Compression)
- [/SWAP] (Swap Out Ezycom on Compression)
-
- This option allows the user to download a master list
- that is generated online. /RAW, /ZIP, /LZH, /ARJ allows the
- sysop to define which archive formats are allowable for the
- download of the master list. The /SWAP command will swap
- ezycom out, only leaving 8K of memory resident. If, the
- /FREE command is used, the download is free. It is
- recommended, the systems with large file areas to not use
- this option, and just make a master file list daily.
-
-
-
-
-
-
-
-
-
-
-
-
- Page 162.
-
-
-
-
-
-
- Option 69 Turn Local Display On or Off
-
- Miscdata ON | OFF | TOGGLE
-
- This option turns on/off the local display, when a
- remote user is on-line. (Does nothing in local mode). If
- ON is used, then the display is turned ON. If, OFF is used,
- then the display is turned OFF. If, TOGGLE is used, then
- the display is turned ON or OFF depending on its current
- state.
-
-
- Option 70 Toggle MMDDYY/DDMMYY Date Format
-
- Miscdata None
-
- This option allows the user to toggle between the
- American and European date formats.
-
-
- Option 71 Change User Colour
-
- Miscdata <1..8> <+ | ->
-
- This option allows the user to change colours for the
- display of message/file areas. The <1..8> is which colour
- to change. If "+" is used, then the colour number is
- incremented by one. If "-" is used, then the colour number
- is decremented by one.
-
-
- Option 72 Change Alias
-
- Miscdata None
-
- This option allows the user to change his/her alias to
- any other name, besides that of another users name/alias.
-
-
- Option 73 Change Comment
-
- Miscdata None
-
- This option allows the user to define a comment about
- him/herself.
-
-
-
-
-
-
-
-
-
-
- Page 163.
-
-
-
-
-
-
- Option 74 Clear Screen
-
- Miscdata None
-
- This option simply clears the screen, if the user has
- clear screen codes set to On.
-
-
- Option 75 Display ASC Textfile with Menu Hotkeys
-
- Miscdata <FileName>
-
- This option is the same as Type 40, except only ASC/ASL
- menus can be displayed. That can give the user fast menus,
- but still have ANSI/AVATAR for other options like the Full
- Screen Editor for instance.
-
-
- Option 76 Get Default Protocol
-
- Miscdata None
-
- This option allows the user to select a default
- protocol for download/upload.
-
-
- Option 77 Add to Time/KiloBytes Bank
-
- MiscData [/K]
-
- This option allows the user to deposit time/kilobytes
- into the time/kilobyte bank respectively. The /K switch,
- forces the kilobytes bank, instead of the time bank.
-
- Option 78 Withdraw from Time/KiloBytes Bank
-
- MiscData [/K]
-
- This option allows the user to withdraw time/kilobytes
- from the time/kilobyte bank respectively. The /K switch,
- forces the kilobytes bank, instead of the time bank.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 164.
-
-
-
-
-
-
- Option 79 Display Best User Stats
-
- MiscData [/M] Display Best Messages
- [/C] Display Best Caller
- [/UP] Display Best Uploader (Files)
- [/DN] Display Best Downloader (Files)
- [/FP] Display Best File Points
- [/UK] Display Best Uploader (KiloBytes)
- [/DK] Display Best Downloader (KiloBytes)
-
- This option displays a users' best list. If, no
- options are selected, then all best lists are display. It
- is possible to have more than one best list displayed at a
- time.
-
-
- Option 80 Turn off GLOBAL.MNU for this MENU
-
- Miscdata None
-
- This option turns off the GLOBAL menu for this menu.
- This should be used as an automatic option, and should be
- the first line in the MENU.
-
-
- Option 81 Write door information files
-
- MiscData [DOORWAY=<filename>]
- [DORINFO=<filename>]
-
- *A Place Alias in the Files to written.
- *O Place the Locked Port Baud Rate (MaxBaud)
- in the Files to written.
- *V Use Avatar Standard for Graphics Flags in
- DORINFOx.DEF.
- *9 Use FO1..250 for Nodes 1 to 250
- *N Use 1..250 for Nodes 1 to 250
-
- This option writes the doorway DOOR.SYS, and/or
- DORINFO1.DEF file(s) to the filenames of your choosing. The
- type 7 parameters listed, can be placed in any parts of the
- command line, and will be translated into their meaning.
-
- Eg: DORINFO=DORIN*9.DEF *A *O *V
-
-
-
-
-
-
-
-
-
-
-
- Page 165.
-
-
-
-
-
-
-
- Appendix E (Operating Batch Files)
-
- The following is a batch file for running Ezycom as a
- stand alone system. This batch file will work for any
- amount of nodes you like up to 250 that is. For Node 1 just
- type BBS with no parameters after the batch file name. For
- any other Node type the node number (up to 250) after the
- batch file name.
- Eg for node 4 type BBS 4
-
- BBS.BAT from the startup file that comes with Ezycom.
-
- @echo off
- rem Ezycom Standalone Batch File V1.0
- rem Command Format :
- rem BBS (for node 1 operation)
- rem BBS [node] (for node X operation)
- rem [node] is the node number from 1 through to 250
- rem Eg BBS 2
- cd %EZY%
- if %1! == ! SET TASK=1
- if not %1! == ! SET TASK=%1
- :start
- ezy -E25
- if errorlevel 27 goto start
- if errorlevel 26 goto tossmail
- if errorlevel 25 goto start
- if errorlevel 24 goto weeklyevent
- if errorlevel 23 goto dailyevent
- if errorlevel 9 goto start
- if errorlevel 8 goto sysopnext
- if errorlevel 7 goto netecho
- if errorlevel 6 goto netmail
- if errorlevel 5 goto echomail
- if errorlevel 4 goto modeminit
- if errorlevel 3 goto fossil
- if errorlevel 2 goto runtimeerror
- if errorlevel 1 goto setuperror
- goto finish
- :weeklyevent
- echo Weekly Maintenance Being performed
- cd %EZY%
- ezyff -c
- ezymaint -D
- goto start
- :dailyevent
- echo Daily Maintenance Being performed
- cd %EZY%
- ezyff -c
- ezymaint -p -i -c
- ezyff -i
- usercomp -B20 -S1 -P -D90 -A
- msgcomp -LINK
-
- Page 166.
-
-
-
-
-
-
- ezyutil -STRIPLOG -TEZY%TASK%.LOG -D21goto start
- :tossmail
- cd %EZY%
- ezymail -toss
- ezynet -import -echoarea
- :netecho
- echo Net/Echo Mail Entered
- cd %EZY%
- EZYMAIL -SCAN
- :netmail
- cd %EZY%
- EZYNET -EXPORT
- goto start
- :echomail
- cd %EZY%
- EZYMAIL -SCAN
- goto start
- :fossil
- echo Fossil Error
- goto finish
- :modeminit
- echo Modem Init Error
- goto finish
- :runtimeerror
- echo Runtime Error Please consult Errors.log
- goto start
- :setuperror
- echo Setup Error
- :finish
- echo Ezycom is Down
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 167.
-
-
-
-
-
-
-
- The following Batch file is for running D'Bridge with
- Ezycom. Again this batch file will run any amount of Nodes
- you want (up to 250). The syntax is the same as the BBS.BAT
- example DBMAILER 2 would run dbridge with node 2 operating.
-
- DBMAILER.BAT
-
- @echo off
- rem Ezycom DB Mailer Batch File V1.0
- rem Command Format :
- rem DBMAILER (for node 1 operation)
- rem DBMAILER [node] (for node XX operation)
- rem [node] is the node number from 1 through to 250
- rem Eg BBS 2
- set DBRIDGE=C:\DB {You may have to change this to suit}
- rem NOTE : no trailing backslash
- if %1! == ! SET TASK=1
- if not %1! == ! SET TASK=%1
- :EXECDB
- cd %DBRIDGE%
- echo scan >dbridge.rsn
- Db
- if errorlevel 100 goto WEEKEND
- if errorlevel 90 goto DAILY
- if errorlevel 60 goto MAILIN
- if errorlevel 50 goto BBS
- if errorlevel 45 goto EDITOR
- if errorlevel 1 goto EXIT
- if errorlevel 0 goto EXIT
- goto execdb
-
- :DAILY
- cd %EZY%
- ezymail -scan
- ezynet -export
- ezyff -C
- ezymaint -C -I -P
- ezyff -ID
- usercomp -A -S1 -P -B10 -D90
- msgcomp -LINK
- goto execdb
-
- :MAILIN
- ezynet -import -echoarea
- ezymail -toss
- goto execdb
-
- :BBS
- CALL bbs.bat
- goto execdb
-
-
-
-
- Page 168.
-
-
-
-
-
-
- :EDITOR
- cd %DBRIDGE%
- dbedit
- goto execdb
-
- :WEEKEND
- rem weekend event like stuff goes here
- cd %EZY%
- ezyff -c
- ezymaint -D
- goto execdb
-
- :EXIT
- echo Ezycom is Down
-
- Here is also an excerpt of a d'bridge.aut to show you
- how to set the exit to the bbs section in d'bridge setup.
-
- * D'Bridge "Exported Configuration"
- * Execute BBS Segment From Dbridge.aut file
-
- After hours filename C:\DB\AHOURS.TXT
- Please wait text Please wait...20 sec or Press <esc> <esc>
- Loading BBS text Loading another Ezycom bbs.
- BBS DOS commands ECHO @C: >BBS.BAT
- BBS DOS commands ECHO @CD\EZY >>BBS.BAT
- BBS DOS commands ECHO @EZY -B*b -T*t >>bbs.bat
- BBS DOS commands *X50
-
- This is explained far better in the D'Bridge user
- manual that comes with D'Bridge.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 169.
-
-
-
-
-
-
- The following batch file is for users of FrontDoor, it
- will also run as many Nodes you want. Don't forget to check
- if you have to change the set command in your batch file.
-
-
- @echo off
- rem Ezycom FD Mailer Batch File V1.0
- rem Command Format :
- rem FDMAILER (for node 1 operation)
- rem FDMAILER [node] (for node XX operation)
- rem [node] is the node number from 1 through to 250
- rem Eg BBS 2
- set FD=C:\FD
- rem NOTE : no trailing backslash
- if %1! == ! SET TASK=1
- if not %1! == ! SET TASK=%1
- :start
- cd %FD%
- fd
- if errorlevel 210 goto 38400baud
- if errorlevel 209 goto 19200baud
- if errorlevel 208 goto 14400baud
- if errorlevel 207 goto 12000baud
- if errorlevel 206 goto 9600baud
- if errorlevel 205 goto 7200baud
- if errorlevel 204 goto 4800baud
- if errorlevel 203 goto 2400baud
- if errorlevel 202 goto 1275baud
- if errorlevel 201 goto 1200baud
- if errorlevel 200 goto 300baud
- if errorlevel 191 goto scanecho
- if errorlevel 190 goto unpackmail
- if errorlevel 51 goto localbbs
- if errorlevel 50 goto cleanup
- if errorlevel 10 goto end
- if errorlevel 6 goto fossil
- if errorlevel 5 goto modeminit
- if errorlevel 4 goto modemresp
- if errorlevel 3 goto fulldisk
- if errorlevel 2 goto external
- if errorlevel 1 goto internal
- goto start
-
- :38400baud
- cd %EZY%
- ezy -b38400 -E20
- goto after_ezy
-
- :19200baud
- cd %EZY%
- ezy -b19200 -E20
- goto after_ezy
-
-
-
- Page 170.
-
-
-
-
-
-
- :14400baud
- cd %EZY%
- ezy -b14400 -E20
- goto after_ezy
-
- :12000baud
- cd %EZY%
- ezy -b12000 -E20
- goto after_ezy
-
- :9600baud
- cd %EZY%
- ezy -b9600 -E20
- goto after_ezy
-
- :7200baud
- cd %EZY%
- ezy -b7200 -E20
- goto after_ezy
-
- :4800baud
- cd %EZY%
- ezy -b4800 -E20
- goto after_ezy
-
- :2400baud
- cd %EZY%
- ezy -b2400 -E20
- goto after_ezy
-
- :1275baud
- cd %EZY%
- ezy -b1275 -E20
- goto after_ezy
-
- :1200baud
- cd %EZY%
- ezy -b1200 -E20
- goto after_ezy
-
- :300baud
- cd %EZY%
- ezy -b300 -E20
- goto after_ezy
-
- :localbbs
- cd %EZY%
- ezy -L -E20
-
-
-
-
-
-
-
- Page 171.
-
-
-
-
-
-
- :after_ezy
- if errorlevel 20 goto start
- if errorlevel 8 goto sysopnext
- if errorlevel 7 goto scanecho
- if errorlevel 6 goto scanecho
- if errorlevel 5 goto scanecho
- if errorlevel 4 goto modeminit
- if errorlevel 3 goto fossil
- if errorlevel 2 goto runtimeerror
- if errorlevel 1 goto setuperror
- goto start
-
- :unpackmail
- cd %EZY%
- ezymail -toss -verbose
- ezynet -import -echoarea
- goto start
-
- :scanecho
- cd %EZY%
- ezymail -scan -verbose
- ezynet -export
- goto start
-
- :cleanup
- cd %EZY%
- ezyff -c
- ezymaint -i -p -c
- ezyff -i
- usercomp -b20 -p -d90 -s1 -a
- msgcomp -LINK
- goto start
-
- :sysopnext
- echo Yo!!!! Your LOGON NOW!!!
- pause
- goto start
-
- :weekly
- cd %EZY%
- ezyff -c
- ezymaint -d
- goto start
-
- :setuperror
- echo Setup Error!
- goto end
-
- :runtimeerror
- echo Runtime Error! Consult Errors.Log
- goto start
-
-
-
-
- Page 172.
-
-
-
-
-
-
- :modeminit
- echo Modem Init Error!
- goto End
-
- :fossil
- Echo Wrong Fossil Version!
- goto end
-
- :modeminit
- Echo EZY Unable To Initialize Modem!
- goto start
-
- :modemresp
- Echo FD Modem NOT Responding!
- goto end
-
- :fulldisk
- Echo Insufficient Disk Space TO Proceed!
- goto end
-
- :external
- Echo External FD Error - System File Missing!
- goto end
-
- :internal
- Echo Internal FD Error!
- goto end
-
- :end
- Echo Ezycom Is Down!
- cd %EZY%
-
-
- As you can see Ezycom will run with most mailers as
- well as a stand alone system. The only mailer we have found
- that Ezycom will NOT work with is BinkleyTerm.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 173.
-
-
-
-
-
-
-
- Appendix F (Credits)
-
- Credits
-
- I would like to thank Wayne Burnside, Richard Stocks,
- Garry Gillard, Colin Berg, Neil Lees, Geoff Edes, Steven
- Schnitzer, Brad Vonarx, Stuart Healey, Brendan McCarthy, Ian
- Mason, Donald Grover, Christian Kraus, Lloyd Bayley, Matthew
- Taylor, John Buetefuer, Dean Harry, Bernard Holkner and all
- the other Beta/Gamma Testers. Definitely, Ezycom would not
- have been what it is, without the aid and support of these
- people.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Page 174.
-
-
-
-
-
-
- Appendix G (Colour Changer)
-
- Ezycom now supports a colour changer which can be
- embedded in text files or in menus. Ctrl-Kb initiates the
- colour changer, then a hex code is required to actually tell
- Ezycom what colour to change to. The <hex> code is a two
- digit hexadecimal number that indicates the colour to change
- to. The first digit indicates the background colour and
- whether the forground colour should be blinking or not. The
- second digit is the forground colour.
-
- Foreground Background
-
- 0 - Black 0 - Black
- 1 - Blue 1 - Blue
- 2 - Green 2 - Green
- 3 - Cyan 3 - Cyan
- 4 - Red 4 - Red
- 5 - Magenta 5 - Magenta
- 6 - Brown 6 - Brown
- 7 - LightGray 7 - LightGray
- 8 - DarkGray 8 - Black + Blinking
- 9 - LightBlue 9 = Blue + Blinking
- A - LightGreen A - Green + Blinking
- B - LightCyan B - Cyan + Blinking
- C - LightRed C - Red + Blinking
- D - LightMagenta D - Magenta + Blinking
- E - Yellow E - Brown + Blinking
- F - White F - LightGray + Blinking
-
- Eg CtrlKb07
-
- Would set the background colour to black (0) and the
- foreground colour to LightGray (7).
-
- Eg CtrlKb4F
-
- Would set the background colour to Red (4) and the
- foreground colour to White (F).
-
- Eg CtrlKbCF
-
- Would set the background colour to Red ((4) + (8) = C) and
- the foreground colour to White Blinking (F)
-
-
-
-
-
-
-
-
-
-
-
- Page 175.
-
-
-
-
-
-
-
- Table of Contents 2
- Features of Ezycom 4
- Conditions of Use 7
- Registration 9
- Ezycom Support Sites 9
- Copyrights 10
- Installation 11
- Installation Requirements 11
- Installation Set-up 11
- Config (General) 13
- Config (General, Paths) 13
- Config (General, Netmail Addresses) 16
- Config (General, Limits) 17
- Config (General, Events) 19
- Config (General, Textfiles) 20
- Config (General, Drop Dos) 20
- Config (Misc) 21
- Config (Misc, New User) 21
- Config (Misc, Logon Info) 22
- Config (Misc, Colours) 25
- Config (Misc, Prompts) 26
- Config (Misc, Paging) 26
- Config (Misc, Screen Options) 27
- Config (Misc, Alt - Ctrl Function Keys) 27
- Config (Misc, Sound) 28
- Config (Misc, Access) 28
- Config (Misc, System) 29
- Config (File Areas) 32
- Config (File Areas, File Area) 32
- Config (File Areas, File Paths) 34
- Config (File Areas, Misc File Options) 35
- Config (File Areas, File List) 37
- Config (File Areas, File Security) 39
- Config (File Areas, Global File Options) 41
- Config (Ezyprot, Protocols) 44
- Config (Protocols, Default Set-up Protocols) 44
- Config (Protocols, Bimodem) 46
- Config (Protocols, Setting Up Your Own Protocols) 47
- Config (Msg Areas) 50
- Config (Msg Areas, Message Area Name) 50
- Config (Msg Areas, Areafix Tag) 50
- Config (Msg Areas, Message Types) 50
- Config (Msg Areas, Message Kinds) 51
- Config (Msg Areas, Alias Allowed) 51
- Config (Msg Areas, Areafix Group) 52
- Config (Msg Areas, Read Security) 52
- Config (Msg Areas, Read Flags) 52
- Config (Msg Areas, Write Security) 52
- Config (Msg Areas, Write Flags) 52
- Config (Msg Areas, Sysop Security) 53
- Config (Msg Areas, Uplink) 53
- Config (Msg Areas, Origin Aka) 53
- Config (Msg Areas, Origin Line 53
-
- Page 176.
-
-
-
-
-
-
- Config (Msg Areas, Seenby) 53
- Config (Msg Areas, Kill Messages After) 53
- Config (Msg Areas, Kill Recv After) 54
- Config (Msg Areas, Maximum Messages) 54
- Config (Msg Areas, Maximum Kilobytes) 54
- Config (Msg Areas, Combined Access) 54
- Config (Msg Areas, Initial Combined) 54
- Config (Msg Areas, Test For Config Age) 54
- Config (Msg Areas, Keep Private Bit) 55
- Config (Msg Areas, Show Seenby Lines) 55
- Config (Msg Areas, Clear Seenby) 55
- Config (Msg Areas, Visible) 55
- Config (Msg Areas, Page Up/Down) 55
- Config (Msg Areas, (F8) Seenbys) 55
- Config (Msg Areas, (F10) Export List) 56
- Config (Msg Areas, Pick) 56
- Config (Echoarea Manager) 56
- Config (Echoarea Manager, Node) 56
- Config (Echoarea Manager, Echomail Active) 56
- Config (Echoarea Manager, Echo Manager Groups) 56
- Config (Echoarea Manager, Compress To) 57
- Config (Echoarea Manager, Password To Echomgr) 57
- Config (Echoarea Manager, Password From Echomgr) 57
- Config (Echoarea Manager, Mail Status) 57
- Config (Echoarea Manager, Days To Hold Mail) 57
- Config (Echoarea Manager, Send .PKT Type) 57
- Config (Echoarea Manager, Can Create New Echos) 58
- Config (Echoarea Manager, Add to New Echos) 58
- Config (Echoarea Manager, Page Up/Down) 58
- Config (Echoarea Manager, Pick) 58
- Config (Msg Misc) 59
- Config (Msg Misc, Usable Message Areas) 59
- Config (Msg Misc, Inbound Mail Path) 59
- Config (Msg Misc, Outbound Mail Path) 60
- Config (Msg Misc, Arc Mail 0.6 Compatibility) 60
- Config (Msg Misc, Delete Netmail On Import) 60
- Config (Msg Misc, Swap On Archiving) 60
- Config (Msg Misc, Use EMS With Swap) 60
- Config (Msg Misc, Dupe Detection) 60
- Config (Msg Misc, Keep Echomail Node Receipts) 60
- Config (Msg Misc, Bad Message Board) 61
- Config (Msg Misc, Unknown AREAS Action) 61
- Config (Msg Misc, Kill Bad Archives) 61
- Config (Msg Misc, Quote String) 61
- Config (Msg Misc, External Editor) 61
- Config (Msg Misc, Old Style MSGTMP) 62
- Config (Msg Misc, Default Origin Line) 62
- Config (Msg Misc, Kill Null Netmail) 62
- Config (Msg Misc, Mark Netmail As Kill / Sent) 62
- Config (Msg Sec) 63
- Config (Msg Sec, Force Crash Mail Security) 63
- Config (Msg Sec, Optional Crash Mail Security) 63
- Config (Msg Sec, Netmail File Attach Security) 63
- Config (Msg Sec, Security To Update Users) 63
-
- Page 177.
-
-
-
-
-
-
- Config (Msg Sec, Read Security On New Echomail Area) 63
- Config (Msg Sec, Write Security On New Echomail Area) 63
- Config (Msg Sec, Sysop Security On New Echomail Area) 64
- Config (Msg Sec,Reply Via Netmail Security) 64
- Config (Msg Sec,Request Receipt Security) 64
- Config (Msg Netmail Boards) 64
- Config (Msg Netmail, Domains) 64
- Config (Compression of Echomail) 66
- Config (Echomail Uncompress) 66
- Config (Global Msg Options) 67
- Config (Global Msg, Set Default Security) 67
- Config (Global Msg, Set Default Flags) 68
- Config (Global Msg, Centre Message Area Name) 68
- Config (Global Msg, Set Maximum Kilobytes) 68
- Config (Global Msg, Set Maximum Messages) 68
- Config (Global Msg, Kill Messages After XX Days Old) 68
- Config (Global Msg, Kill Received Messages After XX Days) 68
- Config (Global Msg, Add/Rem Node from area list.) 68
- Config (Global Msg, Add/Rem Node from area list.) 69
- Config (Modem Set-Up) 70
- Config (Modem Set-Up, Comport) 70
- Config (Modem Set-Up, Max Baud Rate) 70
- Config (Modem Set-Up, Locked Port) 70
- Config (Modem Set-Up, Connect Responses) 70
- Config (Modem Set-Up, Init Response) 70
- Config (Modem Set-Up, Ring String) 70
- Config (Modem Set-Up, Modem Delay) 70
- Config (Modem Set-Up, Auto Answer) 71
- Config (Modem Set-Up, Start Time) 71
- Config (Modem Set-Up, End Time) 71
- Config (Modem Set-Up, Init Tries) 71
- Config (Modem Set-Up, Init String 1) 71
- Config (Modem Set-Up, Init String 2) 71
- Config (Modem Set-Up, Set Busy String) 71
- Config (Modem Set-Up, Manual Answer String) 71
- Config (Modem Set-Up, Send Break To Modem) 72
- Config (Baud Rate Set-Up) 73
- Config (Baud Rate Set-Up Efficiency (CPS)) 73
- Config (Baud Rate Set-Up Connect) 73
- Networking with Ezycom 74
- Sysop Function Keys 76
- Ezycom Command Line Parameters 78
- Errorlevels 79
- Ezycom External Support Files 80
- External Files (Trashcan.ctl) 80
- External Files (Phonenum.ctl) 80
- External Files (Regexp.q-a) 80
- External Files (Newuser.q-a) 81
- External Files (Newuser2.q-a) 81
- External Files (Phonedup.ctl) 81
- Graphic Support Files 81
- Graphic Support Files, (ALIAS.A*) 81
- Graphic Support Files, (AREAHELP.ASL) 81
- Graphic Support Files, (DOBSEC.A*) 81
-
- Page 178.
-
-
-
-
-
-
- Graphic Support Files, (DOWNHELP.A*) 81
- Graphic Support Files, (EDITHELP.A*) 81
- Graphic Support Files, (FLSPHELP.A*) 81
- Graphic Support Files, (FILEXXX.ASC) 82
- Graphic Support Files, (KEYWHELP.A*) 82
- Graphic Support Files, (LOCKOUT.A*) 82
- Graphic Support Files, (LOGO.A*) 82
- Graphic Support Files, (MAXPAGE.A*) 82
- Graphic Support Files, (MNUAGE.A*) 82
- Graphic Support Files, (MNUHOUR.A*) 82
- Graphic Support Files, (MNUTIME.A*) 82
- Graphic Support Files, (MNUMESS.A*) 82
- Graphic Support Files, (NEWS.A*) 82
- Graphic Support Files, (NEWUSER1.A*) 82
- Graphic Support Files, (NEWUSER2.A*) 82
- Graphic Support Files, (NOTAVAIL.A*) 82
- Graphic Support Files, (PAGEABRT.A*) 82
- Graphic Support Files, (PAGED.A*) 83
- Graphic Support Files, (PAGESTOP.A*) 83
- Graphic Support Files, (PASSWORD.A*) 83
- Graphic Support Files, (PHONESEC.A*) 83
- Graphic Support Files, (PRIVATE.A*) 83
- Graphic Support Files, (PROTHELP.A*) 83
- Graphic Support Files, (REGWARN1.A*) 83
- Graphic Support Files, (REGWARN2.A*) 83
- Graphic Support Files, (READHELP.A*) 83
- Graphic Support Files, (SECXXXXX.A*) 83
- Graphic Support Files, (TIMESLOW.A*) 83
- Graphic Support Files, (TIMESEC.A*) 83
- Graphic Support Files, (UPHELP.A*) 83
- Graphic Support Files, (WATCHDOG.ASL) 83
- Graphic Support Files, (WELCOME.A*) 83
- Graphic Support Files, (WELCOME1.A*) 84
- Graphic Support Files, (WELCOME2.A*) 84
- Graphic Support Files, (WELCOMHH.A*) 84
- File Points 85
- Page Tunes 85
- Menu System (Ezymenu) 86
- Menu System (Defining a Menu System) 86
- Menu System (Templates) 90
- Menu System (Global Menus) 91
- Menu System (Automatic Options) 91
- Menu System (Special Characters) 91
- Menu System (Keyboard Stuffing) 92
- Menu System (Groups) 93
- Utilities (Ezymaint, Maintenance Program) 95
- Utilities (Conversion Files) 97
- Utilities (Conversion Files, Doconv.bat Upconv.bat) 97
- Utilities (Fedit, Filebase Editor) 98
- Utilities (Fedit, Edit Options) 99
- Utilities (Fedit, Edit Descriptions) 99
- Utilities (Fedit, Edit Up/Dnload) 99
- Utilities (Fedit, Edit Statistics) 100
- Utilities (Fedit, View Archive) 100
-
- Page 179.
-
-
-
-
-
-
- Utilities (Fedit, File Options) 101
- Utilities (Fedit, New File Edit) 101
- Utilities (Fedit, Rename File) 101
- Utilities (Fedit, Update File) 101
- Utilities (Fedit, Tag Options) 102
- Utilities (Fedit, Tag All) 102
- Utilities (Fedit, Clear All) 102
- Utilities (Fedit, Delete Tagged) 102
- Utilities (Fedit, Move Tagged) 102
- Utilities (Fedit, Remove Tagged) 102
- Utilities (Fedit, Tagged Offline) 102
- Utilities (Fedit, Physical Move) 102
- Utilities (Fedit, Batch Files) 103
- Utilities (Usercomp, Userbase Utility Program) 105
- Utilities (Anstoavt, Makes Avatar Screens) 106
- Utilities (Ezymail, Echomail Utility) 107
- Utilities (Ezymail and Multiline BBS's) 107
- Utilities (Ezynet, Netmail, Areafix Utility) 108
- Utilities (Ezynet, What is EchoArea?) 108
- Utilities (Ezynet, How to use EchoArea.) 108
- Utilities (Ezynet, Options) 109
- Utilities (Msgcomp, Messagebase Utility) 111
- Utilities (Msgcomp, Command Line Options) 111
- Utilities (Ezyff, Filebase Utility) 112
- Utilities (Ezyff, Command Line Options) 112
- Utilities (Ezyutil, General Utility) 113
- Utilities (Ezyutil, Message Importing) 113
- Utilities (Ezyutil, Importing a File with Description) 113
- Utilities (Ezyutil, Sorting EchoNode Information) 114
- Utilities (Ezyutil, Undelete Messages) 114
- Utilities (Ezyutil, Strip Logs) 114
- Utilities (Ezyutil, File Area Information) 115
- Utilities (Ezyutil, Message Base Information) 116
- Utilities (Ezyutil, Message Base Stats) 117
- Utilities (Ezyed, Userbase Editor) 118
- Utilities (Ezyed, Display Mode Options) 118
- Utilities (Ezyed, Edit Mode Options) 119
- Utilities (EzyNode, Nodelist Compiler) 122
- Utilities (EzyNode, Sample EZYNODE.CTL) 124
- Appendix A (Questionnaire Language) 125
- Appendix B (Multiline Operation) 136
- Appendix C (File Control Characters) 139
- Appendix D (Menu Commands) 143
- Appendix E (Operating Batch Files) 166
- Appendix E (Stand Alone Batch File) 166
- Appendix E (D'Bridge Batch File) 168
- Appendix E (FrontDoor Batch File) 170
- Appendix F (Credits) 174
- Appendix G (Colour Changer) 175
-
-
-
-
-
-
- Page 180.