home *** CD-ROM | disk | FTP | other *** search
Text File | 1991-09-25 | 341.8 KB | 9,985 lines |
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- FrontDoor 2.02 Noncommercial
-
- User guide
-
- For noncommercial use and distribution
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- To the memories of Catharina Frodin and Alva Gardlund.
- And to Christian, Katja, and Igor Homrighausen.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Table of contents
-
- 1 LEGAL NOTICE . . . . . . . . . . . . . . . . . . . . . . . . . 1
-
- 2 Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
- 2.1 Hardware requirements . . . . . . . . . . . . . . . . . . 3
- 2.2 Software requirements . . . . . . . . . . . . . . . . . . 3
- 2.3 Additional equipment . . . . . . . . . . . . . . . . . . 3
- 2.4 BBS software . . . . . . . . . . . . . . . . . . . . . . 3
-
- 3 Installation . . . . . . . . . . . . . . . . . . . . . . . . . 4
- 3.1 CONFIG.SYS . . . . . . . . . . . . . . . . . . . . . . . 4
- 3.2 AUTOEXEC.BAT . . . . . . . . . . . . . . . . . . . . . . 4
- 3.3 Directories . . . . . . . . . . . . . . . . . . . . . . . 4
- 3.4 Files . . . . . . . . . . . . . . . . . . . . . . . . . . 4
-
- 4 Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
- 4.1 FD environment variable . . . . . . . . . . . . . . . . . 5
- 4.2 FD.SYS <> SETUP.FD . . . . . . . . . . . . . . . . . . . 5
- 4.3 Getting started . . . . . . . . . . . . . . . . . . . . . 5
- 4.4 Menus . . . . . . . . . . . . . . . . . . . . . . . . . . 6
- 4.4.1 File . . . . . . . . . . . . . . . . . . . . . . . 6
- 4.4.2 Global . . . . . . . . . . . . . . . . . . . . . . 6
- 4.4.3 Mailer . . . . . . . . . . . . . . . . . . . . . 11
- 4.4.4 Editor . . . . . . . . . . . . . . . . . . . . . 19
- 4.4.5 Terminal . . . . . . . . . . . . . . . . . . . . 22
- 4.4.6 Modem . . . . . . . . . . . . . . . . . . . . . . 26
- 4.4.7 Printer . . . . . . . . . . . . . . . . . . . . . 26
- 4.4.8 Manager . . . . . . . . . . . . . . . . . . . . . 26
- 4.4.9 Event Manager . . . . . . . . . . . . . . . . . . 27
- 4.4.10 Folder Manager . . . . . . . . . . . . . . . . . 27
- 4.4.11 Security . . . . . . . . . . . . . . . . . . . . 29
- 4.4.11.1 Notes regarding protocols . . . . . . . . 30
- 4.4.12 Request Manager . . . . . . . . . . . . . . . . 30
-
- 5 The nodelist and the nodelist compiler . . . . . . . . . . . 31
- Zone . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
- Region . . . . . . . . . . . . . . . . . . . . . . . . . . 31
- Net . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
- Node . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
- Point . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
- 5.1 Hosts and hubs . . . . . . . . . . . . . . . . . . . . 31
- 5.2 Compiling a nodelist . . . . . . . . . . . . . . . . . 32
- 5.2.1 FDNODE.CTL . . . . . . . . . . . . . . . . . . . 32
- POINTLIST . . . . . . . . . . . . . . . . . . . . . 32
- PVTLIST . . . . . . . . . . . . . . . . . . . . . . 32
- SWEPULSE . . . . . . . . . . . . . . . . . . . . . 33
- PHONE . . . . . . . . . . . . . . . . . . . . . . . 33
- USE ZONE . . . . . . . . . . . . . . . . . . . . . 33
- DIAL . . . . . . . . . . . . . . . . . . . . . . . 33
- COST . . . . . . . . . . . . . . . . . . . . . . . 35
- 5.3 Nodelist flags . . . . . . . . . . . . . . . . . . . . 35
- 5.4 Command line switches . . . . . . . . . . . . . . . . . 36
- 5.5 Points . . . . . . . . . . . . . . . . . . . . . . . . 37
- 5.5.1 Pointlist . . . . . . . . . . . . . . . . . . . . 37
- 5.5.2 FDNODE.CTL . . . . . . . . . . . . . . . . . . . 38
- 5.5.3 Point handling . . . . . . . . . . . . . . . . . 39
- 5.5.4 Remapping . . . . . . . . . . . . . . . . . . . . 39
- 5.5.5 POINTNET . . . . . . . . . . . . . . . . . . . . 40
-
-
-
-
-
- 5.6 Sharing the nodelist . . . . . . . . . . . . . . . . . 40
-
- 6 Modems and FOSSIL drivers . . . . . . . . . . . . . . . . . . 41
- 6.1 Basic configuration . . . . . . . . . . . . . . . . . . 41
- 6.1.1 Hardware . . . . . . . . . . . . . . . . . . . . 41
- Modem port . . . . . . . . . . . . . . . . . . . . 41
- Maximum baud rate . . . . . . . . . . . . . . . . . 41
- Lock port . . . . . . . . . . . . . . . . . . . . . 42
- Reset modem to connect speed . . . . . . . . . . . 42
- Lower DTR when busy . . . . . . . . . . . . . . . . 42
- Lower DTR to terminate call . . . . . . . . . . . . 42
- Toggle DTR before dialing . . . . . . . . . . . . . 42
- Carrier detect mask (CDMASK) . . . . . . . . . . . 43
- 6.1.2 Messages . . . . . . . . . . . . . . . . . . . . 43
- 6.1.3 Command strings . . . . . . . . . . . . . . . . . 43
- Escape code . . . . . . . . . . . . . . . . . . . . 43
- Return on-line . . . . . . . . . . . . . . . . . . 43
- Onhook . . . . . . . . . . . . . . . . . . . . . . 43
- Offhook . . . . . . . . . . . . . . . . . . . . . . 43
- Dial . . . . . . . . . . . . . . . . . . . . . . . 44
- Prefix . . . . . . . . . . . . . . . . . . . . . . 44
- Suffix . . . . . . . . . . . . . . . . . . . . . . 44
- Delay . . . . . . . . . . . . . . . . . . . . . . . 44
- Init-1..Init-3 . . . . . . . . . . . . . . . . . . 44
- Down . . . . . . . . . . . . . . . . . . . . . . . 44
- Reset . . . . . . . . . . . . . . . . . . . . . . . 44
- 6.1.4 Answer control . . . . . . . . . . . . . . . . . 44
- Manual answer . . . . . . . . . . . . . . . . . . . 44
- Force answer . . . . . . . . . . . . . . . . . . . 45
- Answer delay . . . . . . . . . . . . . . . . . . . 45
- Limited hours . . . . . . . . . . . . . . . . . . . 45
- Starting time . . . . . . . . . . . . . . . . . . . 45
- Ending time . . . . . . . . . . . . . . . . . . . . 45
- 6.2 Advanced configuration . . . . . . . . . . . . . . . . 45
- 6.2.1 The Modem Manager . . . . . . . . . . . . . . . . 45
- 6.2.2 An example, the HST/DS . . . . . . . . . . . . . 46
- 6.3 Some sample configurations . . . . . . . . . . . . . . 47
- US Robotics HST (older models) . . . . . . . . . . . . 47
- US Robotics HST/DS/V.32bis . . . . . . . . . . . . . . 48
- 6.4 FOSSIL drivers . . . . . . . . . . . . . . . . . . . . 49
- 6.4.1 BNU . . . . . . . . . . . . . . . . . . . . . . . 49
- 6.4.2 X00.SYS . . . . . . . . . . . . . . . . . . . . . 49
-
- 7 Events . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
- 7.1 The Event Manager . . . . . . . . . . . . . . . . . . . 51
- 7.1.1 External event behavior . . . . . . . . . . . . . 52
- 7.1.2 Mail event behavior . . . . . . . . . . . . . . . 53
- 7.1.3 The @ event . . . . . . . . . . . . . . . . . . . 55
- 7.1.4 Overlapping events . . . . . . . . . . . . . . . 56
-
- 8 Mailer . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
- 8.1 Menus . . . . . . . . . . . . . . . . . . . . . . . . . 57
- 8.1.1 Programs <Alt-P> . . . . . . . . . . . . . . . . 57
- 8.1.2 Utilities <Alt-U> . . . . . . . . . . . . . . . . 58
- 8.1.3 Mail <Alt-U> . . . . . . . . . . . . . . . . . . 58
- 8.2 Mail queue <Alt-B> . . . . . . . . . . . . . . . . . . 60
- 8.3 Call progress . . . . . . . . . . . . . . . . . . . . . 61
- 8.4 Semaphore indicators . . . . . . . . . . . . . . . . . 62
- 8.5 Undialable . . . . . . . . . . . . . . . . . . . . . . 62
-
-
-
-
-
- 9 Editor . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
- 9.1 Main <Alt-M> . . . . . . . . . . . . . . . . . . . . . 63
- 9.2 Edit <Alt-E> . . . . . . . . . . . . . . . . . . . . . 65
- 9.2.1 <Alt-T> in edit mode . . . . . . . . . . . . . . 65
- 9.2.2 Toggle menu <Ctrl-F2> . . . . . . . . . . . . . . 67
- 9.3 Utilities <Alt-U> . . . . . . . . . . . . . . . . . . . 67
- 9.4 Purge <Alt-P> . . . . . . . . . . . . . . . . . . . . . 68
- 9.5 Other keys in edit mode . . . . . . . . . . . . . . . . 68
- 9.6 Other keys in view (read) mode . . . . . . . . . . . . 69
- 9.7 Entering new messages . . . . . . . . . . . . . . . . . 70
- 9.8 Management <Alt-F9> . . . . . . . . . . . . . . . . . . 71
- 9.8.1 Main menu . . . . . . . . . . . . . . . . . . . . 71
- 9.8.2 Continuous tagging . . . . . . . . . . . . . . . 72
- 9.8.3 Range select <F4> . . . . . . . . . . . . . . . . 72
- 9.9 Keyboard macros . . . . . . . . . . . . . . . . . . . . 73
- 9.9.1 Examples . . . . . . . . . . . . . . . . . . . . 73
- 9.10 Carbon copies (CC) . . . . . . . . . . . . . . . . . . 75
- 9.10.1 Hidden CCs . . . . . . . . . . . . . . . . . . . 75
- 9.10.2 Using files as input to CCs . . . . . . . . . . 75
- 9.10.3 Address expansion . . . . . . . . . . . . . . . 76
- 9.11 Crossposting (XC) . . . . . . . . . . . . . . . . . . 77
-
- 10 Terminal . . . . . . . . . . . . . . . . . . . . . . . . . . 78
- 10.1 Menus . . . . . . . . . . . . . . . . . . . . . . . . 78
- 10.1.1 File <Alt-F> . . . . . . . . . . . . . . . . . . 78
- 10.1.2 Line settings <Alt-L> . . . . . . . . . . . . . 79
- 10.1.3 Session <Alt-S> . . . . . . . . . . . . . . . . 81
- 10.1.4 Options <Alt-O> . . . . . . . . . . . . . . . . 82
- 10.2 Keyboard macros . . . . . . . . . . . . . . . . . . . 83
- 10.3 Raw mode . . . . . . . . . . . . . . . . . . . . . . . 83
- 10.4 Keypad modes . . . . . . . . . . . . . . . . . . . . . 83
- 10.5 PC keyboards . . . . . . . . . . . . . . . . . . . . . 84
- 10.6 Phone directory <Alt-P> . . . . . . . . . . . . . . . 84
- 10.6.1 Queue status . . . . . . . . . . . . . . . . . . 85
- 10.6.2 Adding/changing entries . . . . . . . . . . . . 85
- 10.7 Inactivity timer . . . . . . . . . . . . . . . . . . . 85
- 10.8 File transfers . . . . . . . . . . . . . . . . . . . . 85
- 10.9 On-line timer . . . . . . . . . . . . . . . . . . . . 86
-
- 11 Miscellaneous . . . . . . . . . . . . . . . . . . . . . . . 87
- 11.1 Destination of messages . . . . . . . . . . . . . . . 87
- 11.1.1 Name lookups . . . . . . . . . . . . . . . . . . 87
- 11.1.2 Address browsing . . . . . . . . . . . . . . . . 87
- 11.1.3 Address macros (NAMES.FD) . . . . . . . . . . . 88
-
- 12 File Requests . . . . . . . . . . . . . . . . . . . . . . . 89
- 12.1 Outbound Requests . . . . . . . . . . . . . . . . . . 89
- 12.2 Requesting files with a password . . . . . . . . . . . 90
- 12.3 Update Requests . . . . . . . . . . . . . . . . . . . 90
- 12.4 Inbound Requests . . . . . . . . . . . . . . . . . . . 90
- 12.4.1 Request modes . . . . . . . . . . . . . . . . . 90
- Anyone can request . . . . . . . . . . . . . . . . 90
- Systems in nodelist can request . . . . . . . . . . 90
- No requests . . . . . . . . . . . . . . . . . . . . 90
- 12.4.2 Directory listings . . . . . . . . . . . . . . . 91
- 12.4.3 Alias listings . . . . . . . . . . . . . . . . . 91
- 12.4.4 Response message . . . . . . . . . . . . . . . . 92
- 12.4.5 Limiting Requests . . . . . . . . . . . . . . . 92
- Max match . . . . . . . . . . . . . . . . . . . . . 92
-
-
-
-
-
- Max size . . . . . . . . . . . . . . . . . . . . . 92
- Max time . . . . . . . . . . . . . . . . . . . . . 92
- Minimum speed . . . . . . . . . . . . . . . . . . . 92
- 12.4.6 Limited hours . . . . . . . . . . . . . . . . . 93
- Limited . . . . . . . . . . . . . . . . . . . . . . 93
- Start . . . . . . . . . . . . . . . . . . . . . . . 93
- End . . . . . . . . . . . . . . . . . . . . . . . . 93
- Days . . . . . . . . . . . . . . . . . . . . . . . 93
- 12.4.7 Event restrictions . . . . . . . . . . . . . . . 93
- 12.4.8 Protecting files and directories . . . . . . . . 93
-
- 13 Swapping . . . . . . . . . . . . . . . . . . . . . . . . . . 94
- 13.1 Complete path specifications . . . . . . . . . . . . . 94
- 13.2 Loading programs in a DOS shell . . . . . . . . . . . 94
-
- 14 CRT environments . . . . . . . . . . . . . . . . . . . . . . 95
-
- 15 Message Status Bits . . . . . . . . . . . . . . . . . . . . 96
- Private . . . . . . . . . . . . . . . . . . . . . . . . . . 96
- Crash . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
- Hold . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
- File . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
- File Request . . . . . . . . . . . . . . . . . . . . . . . 96
- Update request . . . . . . . . . . . . . . . . . . . . . . 96
- Kill/Sent . . . . . . . . . . . . . . . . . . . . . . . . . 97
- Truncate file/sent . . . . . . . . . . . . . . . . . . . . 97
- Delete file/sent . . . . . . . . . . . . . . . . . . . . . 97
- Direct . . . . . . . . . . . . . . . . . . . . . . . . . . 97
- Immediate mail . . . . . . . . . . . . . . . . . . . . . . 97
- Lock . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
- Sent . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
- No status . . . . . . . . . . . . . . . . . . . . . . . . . 98
-
- 16 Mail routing . . . . . . . . . . . . . . . . . . . . . . . . 99
- 16.1 Default routing . . . . . . . . . . . . . . . . . . . 99
- 16.2 Message status . . . . . . . . . . . . . . . . . . . . 100
- 16.3 Host/Hub/Boss routing . . . . . . . . . . . . . . . . 100
- 16.4 Qualifying systems . . . . . . . . . . . . . . . . . . 101
- 16.5 Route commands . . . . . . . . . . . . . . . . . . . . 101
- 16.6 LIST specifications . . . . . . . . . . . . . . . . . 104
- 16.7 Using nodelist flags . . . . . . . . . . . . . . . . . 104
- 16.8 File routing/forwarding . . . . . . . . . . . . . . . 105
- 16.9 Message forwarding . . . . . . . . . . . . . . . . . . 105
- 16.10 Multiple zones . . . . . . . . . . . . . . . . . . . 105
- 16.11 Examples . . . . . . . . . . . . . . . . . . . . . . 105
- 16.12 Dynamic packing . . . . . . . . . . . . . . . . . . . 107
- 16.13 Regarding points . . . . . . . . . . . . . . . . . . 107
- 16.14 Order of evaluation . . . . . . . . . . . . . . . . . 107
- 16.15 TARGET vs. qualification . . . . . . . . . . . . . . 108
- 16.16 Restrictions . . . . . . . . . . . . . . . . . . . . 108
- 16.17 Macros . . . . . . . . . . . . . . . . . . . . . . . 108
- MYZONE . . . . . . . . . . . . . . . . . . . . . . . . 108
- MYNET . . . . . . . . . . . . . . . . . . . . . . . . . 108
- MYPOINTS . . . . . . . . . . . . . . . . . . . . . . . 108
- 16.18 Supported nodelist flags . . . . . . . . . . . . . . 108
-
- 17 EMSI and IEMSI . . . . . . . . . . . . . . . . . . . . . . . 109
- 17.1 Passwords . . . . . . . . . . . . . . . . . . . . . . 109
- 17.2 Mail . . . . . . . . . . . . . . . . . . . . . . . . . 109
-
-
-
-
-
- 17.3 IEMSI . . . . . . . . . . . . . . . . . . . . . . . . 110
-
- 18 Script language . . . . . . . . . . . . . . . . . . . . . . 111
- 18.1 What can I do with it? . . . . . . . . . . . . . . . . 111
- 18.2 Commands . . . . . . . . . . . . . . . . . . . . . . . 111
- 18.3 Labels . . . . . . . . . . . . . . . . . . . . . . . . 117
- 18.4 Node block . . . . . . . . . . . . . . . . . . . . . . 117
- 18.5 PC Pursuit . . . . . . . . . . . . . . . . . . . . . . 117
- 18.6 How do I update PCP.DAT? . . . . . . . . . . . . . . . 118
- 18.7 MNEMONICS . . . . . . . . . . . . . . . . . . . . . . 118
-
- 19 FDSERVER . . . . . . . . . . . . . . . . . . . . . . . . . . 119
- 19.1 What is a FDSERVER request? . . . . . . . . . . . . . 119
- 19.2 Request message . . . . . . . . . . . . . . . . . . . 119
- 19.2.1 Internal commands . . . . . . . . . . . . . . . 120
- 19.3 Using it . . . . . . . . . . . . . . . . . . . . . . . 120
- 19.4 Keeping calls to a minimum . . . . . . . . . . . . . . 121
- 19.5 Security . . . . . . . . . . . . . . . . . . . . . . . 121
-
- 20 Service requests . . . . . . . . . . . . . . . . . . . . . . 122
- 20.1 Service requests vs FDSERVER . . . . . . . . . . . . . 122
- 20.2 Setting up . . . . . . . . . . . . . . . . . . . . . . 122
- 20.3 ^ - + ? . . . . . . . . . . . . . . . . . . . . . . . 124
- 20.4 Remote system information . . . . . . . . . . . . . . 124
- 20.5 Security . . . . . . . . . . . . . . . . . . . . . . . 125
- 20.6 A word of wisdom . . . . . . . . . . . . . . . . . . . 125
-
- 21 Global command line switches . . . . . . . . . . . . . . . . 126
- 21.1 A word of wisdom . . . . . . . . . . . . . . . . . . . 128
-
- 22 Environment variables . . . . . . . . . . . . . . . . . . . 129
- 22.1 FDOPT . . . . . . . . . . . . . . . . . . . . . . . . 129
- 22.2 FDSWAP . . . . . . . . . . . . . . . . . . . . . . . . 129
- 22.3 POINTNET . . . . . . . . . . . . . . . . . . . . . . . 129
- 22.4 FMOVR and FDOVR . . . . . . . . . . . . . . . . . . . 129
-
- 23 Semaphore files . . . . . . . . . . . . . . . . . . . . . . 130
-
- 24 Batch files . . . . . . . . . . . . . . . . . . . . . . . . 132
- 24.1 Errorlevels . . . . . . . . . . . . . . . . . . . . . 132
- 24.2 Categories . . . . . . . . . . . . . . . . . . . . . . 132
- 24.3 Loading BBS software . . . . . . . . . . . . . . . . . 133
- 24.4 Different labels . . . . . . . . . . . . . . . . . . . 133
- 24.5 Same label . . . . . . . . . . . . . . . . . . . . . . 134
- 24.6 DOBBS.BAT . . . . . . . . . . . . . . . . . . . . . . 135
- 24.7 EXEBBS.BAT . . . . . . . . . . . . . . . . . . . . . . 135
- 24.8 Flow (batch files) . . . . . . . . . . . . . . . . . . 136
-
- 25 Multi-tasking . . . . . . . . . . . . . . . . . . . . . . . 137
- 25.1 NS16550 . . . . . . . . . . . . . . . . . . . . . . . 137
- 25.2 DESQview . . . . . . . . . . . . . . . . . . . . . . . 137
- 25.3 DoubleDOS . . . . . . . . . . . . . . . . . . . . . . 138
- 25.4 Multilink . . . . . . . . . . . . . . . . . . . . . . 139
-
- 26 Converting from other mail systems . . . . . . . . . . . . . 140
-
- 27 Help systems . . . . . . . . . . . . . . . . . . . . . . . . 141
-
- 28 Sample (PCP) script . . . . . . . . . . . . . . . . . . . . 142
-
-
-
-
-
- 29 Commercial inquiries . . . . . . . . . . . . . . . . . . . . 145
-
- 30 Developer notes . . . . . . . . . . . . . . . . . . . . . . 146
-
- 31 Technical specifications . . . . . . . . . . . . . . . . . . 147
-
- 32 Credits . . . . . . . . . . . . . . . . . . . . . . . . . . 148
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 1 LEGAL NOTICE
-
- The FrontDoor 2.02 Noncommercial software and information attached
- hereto, hereafter referred to as FrontDoor, is protected by
- applicable copyright laws and international treaty provisions.
- FrontDoor is provided as is, without warranty of any kind or fitness
- for a particular purpose, either expressed or implied, all of are
- hereby explicitly disclaimed. Advanced Engineering sarl only
- guarantees that FrontDoor will occupy disk space.
-
- In no event shall Advanced Engineering sarl be liable to you or
- anyone else for any damages or costs, including, but not limited to,
- any lost profits, lost savings, lost income, lost information, loss
- of the right to use FrontDoor, or other incidental or consequential
- damages arising out of the use or inability to use FrontDoor.
-
- Additional statements by agents, employees, distributors, and dealers
- of Advanced Engineering sarl do not constitute warranties by Advanced
- Engineering sarl and do not bind Advanced Engineering sarl.
-
- FrontDoor is not public domain, shareware, or freeware; nor does it
- stop working after a certain amount of time. FrontDoor is simply free
- of charge for individual hobby use by persons holding or aspiring to
- obtain a network address (including point addresses) in one or more
- of the amateur data communications networks throughout the world. It
- is not allowed to use FrontDoor within a commercial environment (ie.
- business, governmental organization, association, school, foundation,
- or any other form of juridical person) without prior written
- permission from Advanced Engineering sarl.
-
- FrontDoor can only be used by physical persons (as opposed to
- juridical persons), and installed on a computer which is personal
- property. Exception to the rule of personal ownership of the
- computer: before the year 1995, individual hobby use (as described
- above) of FrontDoor can be carried on a computer owned by business or
- state agency if the installation is located and remains in one of the
- following countries: Albania, Angola, Bulgaria, China, Cuba,
- Czeckoslovakia, Estonia, Ethiopia, Hungary, Latvia, Laos, Lithuania,
- North Korea, Poland, Rumania, the Soviet Union, Sudan, Tanzania,
- Vietnam, Yugoslavia, or former republic, province or member state of
- one of these countries which has turned independent.
-
- Information on how to obtain the commercial version of FrontDoor is
- included in a separate section of this document.
-
- You may freely distribute and copy FrontDoor provided no fee is
- charged and the FrontDoor archive contains unmodified copies of the
- original files as produced by Advanced Engineering sarl or Joaquim H.
- Homrighausen. No part of FrontDoor may be modified, altered, reverse
- engineered, sold, or distributed in any form which would involve some
- sort of trade without prior written permission from Advanced
- Engineering sarl.
-
- All Advanced Engineering sarl and Joaquim H. Homrighausen products
- are trademarks or registered trademarks of Advanced Engineering sarl
- or Joaquim H. Homrighausen. Other brand and product names are
- trademarks or registered trademarks of their respective holders.
-
- 1
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Copyright 1986-1991 Advanced Engineering sarl. All rights reserved.
-
- Documentation and Software written and designed by
- Joaquim H. Homrighausen.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 2
-
-
-
-
-
- 2 Preface
-
- Welcome to FrontDoor, the complete e-mail package from Advanced
- Engineering sarl. It is probably safe to say that an e-mail package,
- such as FrontDoor, is one of the most complex types of applications
- around. This manual is very straight forward and may seem hard to
- understand at first glance. If you get lost, or cannot understand
- something, go back and read the section you are having problems with,
- carefully.
-
- FrontDoor has been tested on more than four thousand systems for over
- five years. It will run under MS or PC DOS versions 3.1 and above;
- including 4.x, 5.x, OS/2 1.3, and OS/2 2.0 DOS Mode. It runs under
- most LAN software; including Novell and LANtastic. It also runs under
- PC-MOS/386, VM/386 and in other multi-tasking environments such as
- DESQview.
-
- For complete technical and FidoNet-related specifications, see
- "Technical specifications". Although FrontDoor will run on most
- machines, there are a few restrictions and requirements.
-
-
- 2.1 Hardware requirements
-
- o An IBM PC, AT, i386, i486, PS/2 or 100% BIOS compatible.
- o A hard disk with at least 1 MB available diskspace.
- o An asynchronous modem capable of sending alphanumeric
- messages such as CONNECT 2400.
- o A DTE interface (computer <> modem) that supports CTS/RTS
- handshaking (most cables/internal modems do).
- o A monochrome or color monitor.
- o 384 KB of system memory.
-
-
- 2.2 Software requirements
-
- o MS or PC DOS 3.10 or above.
- o A FOSSIL driver such as X00 or BNU.
-
-
- 2.3 Additional equipment
-
- FrontDoor can take advantage of, but does not require, the
- following:
-
- o EMS/XMS memory for overlays and memory image swapping.
- o EGA/VGA extended screen modes such as 80x43/50 and
- 132x28.
- o AT-style (extended) keyboard.
-
-
- 2.4 BBS software
-
- FrontDoor can be used as a front-end to many popular bulletin
- boards including TUBBS, PC Board, RemoteAccess, Maximus-CBCS,
- TCL, TPBoard, QuickBBS, SuperBBS, Phoenix RCS, Fido, Opus-CBCS,
- and WildCat!.
-
- 3
-
-
-
-
-
- 3 Installation
-
- Included in the distribution archive are several files. This document
- will walk you through the installation and configuration of the
- system. All path names and directories suggested here are not
- required. You can change them as you wish, but I suggest you use the
- example in this document for a start and then move on to change
- things as you become more familiar with the system. In the example,
- it is assumed that you are about to install FrontDoor on your C
- drive.
-
-
- 3.1 CONFIG.SYS
-
- FrontDoor needs to have a few extra file handles allocated to
- keep the nodelist and other files open. Your CONFIG.SYS file
- should contain FILES=25 (or higher). If you do not know what
- handles means, that is okay, as long as you have the FILES=25
- statement in your CONFIG.SYS file. If you are using multi-tasking
- software, your FILES= setting must usually be set to something
- higher than 25.
-
- You should also have BUFFERS=30 (or higher) in your CONFIG.SYS
- file to improve DOS' buffer performance. If you are using a disk
- cache, you should have BUFFERS=3 or something close to that.
-
-
- 3.2 AUTOEXEC.BAT
-
- Add SET FD=C:\FD to your AUTOEXEC.BAT file. This will make sure
- FrontDoor can find all its system files. You may NOT have spaces
- between FD and =.
-
-
- 3.3 Directories
-
- From your root directory (C:\) create a directory called FD. This
- is the main (ROOT) directory for FrontDoor. Change the active
- directory to FD. Create the following directories:
-
- NODELIST
- MAIL
- PACKET
- FILE
-
-
- 3.4 Files
-
- Copy FD.EXE, FD.OVR, FM.EXE, FM.OVR, FDNC.EXE and FDSETUP.EXE to
- C:\FD.
-
- The program files are now installed.
-
-
-
-
-
-
- 4
-
-
-
-
-
- 4 Setup
-
- The Setup program, FDSETUP hereafter, is used to configure FrontDoor.
- Most functions and behavior of the Editor (FM), Mailer (FD), and
- Terminal are controlled from FDSETUP. When you start FDSETUP, it
- searches for the system file, SETUP.FD, in the directory pointed to
- by the FD environment variable.
-
- If the FD variable has not been set, FDSETUP searches the current
- directory for SETUP.FD. If it cannot open SETUP.FD, it will ask you
- if you want to create a new file or abort.
-
-
- 4.1 FD environment variable
-
- The FD environment variable specifies where FDSETUP should search
- for SETUP.FD. If the FD environment variable is not set, FDSETUP
- will search the current directory for SETUP.FD. It is recommended
- that you add SET FD=<path> to your AUTOEXEC.BAT or other startup
- file. This allows FDSETUP, and the other FrontDoor programs, to
- locate SETUP.FD without having to be in the same directory.
- Usage:
-
- SET FD=<PATHSPEC>
-
- Eg. SET FD=C:\FD
-
-
- 4.2 FD.SYS <> SETUP.FD
-
- The system file was previously (FD 1.99c and FD 2.00) called
- FD.SYS and some programs may still require it to be present
- before they will run (TosScan 1.00 is one example). It is
- therefore VERY IMPORTANT that you COPY SETUP.FD to FD.SYS
- whenever you have made changes to SETUP.FD by using FDSETUP.
-
-
- 4.3 Getting started
-
- To create a new SETUP.FD file, make the FrontDoor root directory
- the active directory by using the DOS command CD; type FDSETUP
- and press Enter. If you have set the FD variable, you do not have
- to change the active directory before invoking FDSETUP.
-
- FDSETUP will display a message saying something like "SETUP.FD,
- path or file not found". Press <Space> to create a new file.
-
-
-
-
-
-
-
-
-
-
-
-
- 5
-
-
-
-
-
- 4.4 Menus
-
- There are eight top-level (pull-down) menus. Each function and
- menu of FDSETUP will now be described.
-
-
- 4.4.1 File
-
- Shell to DOS Invokes a temporary DOS shell. Type EXIT and
- press <Enter> to return to FDSETUP. You can
- invoke a temporary DOS shell in FDSETUP by
- pressing <Alt-Z> in the middle of input
- fields, pull-down menus, selection fields,
- etc.
-
- Exit Returns you to DOS or the Mailer, depending
- on how FDSETUP was invoked. If you made any
- changes to your configuration, you will be
- asked if you want to make your changes
- permanent or abandon them. You can also exit
- FDSETUP by pressing <Esc> at any of the
- top-level menus.
-
-
- 4.4.2 Global
-
- Address
- Address Defines your network address and alternate
- network addresses, or "also-known-as" (AKA).
- You must define at least one network address
- (the first slot).
-
- Site info Defines your system's name, location,
- telephone number, maximum speed, and nodelist
- flags.
-
- The telephone number should be specified in
- international format, eg. +352 355936 or -
- Unpublished- if you do not wish to reveal
- this information to other systems.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 6
-
-
-
-
-
- Domains Specifies the name of a network zone. This
- should be "fidonet.org" for all FidoNet Zones
- (currently 1 through 6).
-
- At the moment, this is only used for the
- generation of the ^AMSGID: kludge line and
- for inserting "^aVia" information in messages
- forwarded by the Mailer (FD).
-
- AKA.. Allows you to specify which AKA to use when
- corresponding with certain zones and nets
- within zones.
-
- Ie. if you are writing a message to someone
- in zone 2 and you have specified that you
- wish to use your 2:270/17 AKA for this, the
- Editor will automatically use 2:270/17
- regardless of your current AKA setting.
-
- This allows you to easily participate in
- multiple networks.
-
- Filenames
-
- System Where the FrontDoor system files are stored.
- This should NOT be a RAM disk.
-
- Netmail Where Netmail messages are stored, ie. the
- Netmail folder. The Mailer unpacks received
- messages to this directory. This should NOT
- be a RAM disk.
-
- Files Where inbound (received) files are stored.
- This should NOT be a RAM disk.
-
- Packets Where the Mailer stores its temporary mail
- packets. They are created every time the
- Mailer runs a mail event and are removed
- after when the event ends.
-
- By putting the Packet directory on a RAM
- disk, you can greatly improve the speed of
- packing and scanning outbound mail. It is
- recommended that you use a sub-directory on
- your RAM disk (eg. <drive>:\PACKETS) since
- the number of directory entries in the root
- directory of a drive is usually strictly
- limited.
-
-
-
-
-
-
-
-
-
-
- 7
-
-
-
-
-
- Log file The log file. This is a complete filename,
- eg. C:\FD\FD.LOG. The Mailer is the only
- program in the FD package that writes
- information to this file. You should NOT use
- a RAM disk for the log file as it will
- disappear if the system reboots.
-
- Banner The contents of this file is displayed to
- human callers before the Mailer passes
- control to your batch file to invoke the BBS
- software. This file is not used if you are
- running in mail-only mode. You should NOT use
- a RAM disk for the banner file.
-
- Nodelist Where the nodelist database is stored. The
- Nodelist Compiler (FDNC) expects to find its
- control file(s) here. The Mailer (FD) and
- Editor (FM) expects to find the compiled
- nodelist database here. If this directory is
- not specified, FrontDoor will use the SYSTEM
- directory instead. The nodelist directory
- should NOT be located on a RAM disk.
-
- In-event This file is displayed to human callers if
- the Mailer rejects their call. Ie. if you are
- running in mail-only mode or if a mail event
- prevents human callers from accessing your
- BBS.
-
- MSG Base Where the Editor (FM) expects to find the
- Hudson Message Base files (MSGHDR.BBS,
- MSGTXT.BBS, MSGINFO.BBS, MSGIDX.BBS,
- MSGTOIDX.BBS and LASTREAD.BBS). If you do not
- have any folders with MsgBase status, you do
- not have to specify this.
-
- Swapping If you enable swapping to disk or there is
- not sufficient XMS/EMS memory available. The
- Mailer (FD) and the Editor (FM) will use this
- directory to store its swap file.
-
- This setting can be overridden by the FDSWAP
- environment variable (see "Environment
- variables").
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 8
-
-
-
-
-
- Semaphore Where the Mailer (FD) and Editor (FM) creates
- and looks for the various semaphore files
- (see "Semaphore files"). This allows you to
- configure a multi-line and/or multi-user
- system with different configurations to use
- the same semaphore directory.
-
- This is not available in the noncommercial
- version.
-
- General
- Your country code
- Your country code. Eg. USA=1, Sweden=46,
- Luxembourg=352. This is used for telephone
- number translations. This is related to the
- COUNTRY= command used in CONFIG.SYS.
-
- It does not, however, have to be the same as
- your COUNTRY= setting. FDSETUP's country code
- setting should always be your real country
- code.
-
- Screen flickers
- FrontDoor attempts to detect if you have a
- CGA card that causes flicker if software
- performs direct memory access (DMA). The
- default for this setting is NO and you should
- leave it alone unless you are seeing flicker
- on your screen when you use the Mailer (FD),
- Editor (FM), and/or the Terminal.
-
- Use "fastkey"
- Forces the Mailer (FD), Editor (FM), and the
- Terminal to speed up the typematic rate of
- your keyboard. This is only valid for
- machines with an AT- or compatible BIOS
- installed.
-
- If you are using other keyboard speed-up
- utilities, leave this to NO; otherwise, the
- programs will restore the typematic rate to
- the default (slow) when they terminate.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 9
-
-
-
-
-
- Screen blanking
- Prevents screen images from "burning in". If
- you are using a monochrome monitor, data that
- is displayed often in the same location on
- your screen can "burn in" and leave ugly
- marks. Color monitors usually do not have
- this problem.
-
- Since the Mailer (FD) is active more than 80%
- of the day on most systems, it may be wise to
- enable this option to avoid "burn ins" of the
- Mailer's main display.
-
- Blackout timer
- Specifies how many seconds of inactivity
- should pass before the screen is blanked.
- This option is only used if screen blanking
- (previous page) has been enabled. You can
- "light up" a blanked screen by pressing a
- key. The screen will also be lit when the
- Mailer (FD) places outgoing calls and when
- incoming calls are answered.
-
- Extended keyboard
- Specifies which type of keyboard you have
- (101/102 or 83/84). FDSETUP will attempt to
- "guess" which type of keyboard you have, but
- some BIOS flavors does not properly indicate
- the type. This allows you to override what
- FDSETUP detects.
-
- Force 24-hour fmt
- Allows you to force the Mailer and the Editor
- to display the time in 24-hour format even if
- you are located in a country that uses the
- 12-hour format, such as the USA.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 10
-
-
-
-
-
- Users
-
- Allows you to specify user names and access levels. The
- default name of the first user is System Operator. You
- should change this to your own name.
-
- There are three different access levels. Supervisor,
- Administrator and User.
-
- A user with Supervisor access can override any
- restrictions on folders and messages. He/she can also
- change all settings regardless of passwords. You should
- only have one user with Supervisor access, but FDSETUP
- will allow you to define more than one. At least one user
- with Supervisor access MUST exist and is required to add
- any additional users.
-
- A user with Administrator access cannot override any
- restrictions on folders and messages. He/she has to enter
- passwords for protected items before they can be changed.
-
- A user with User access cannot override any restrictions
- on folders and messages. The only setting he/she can
- change in FDSETUP is his/her own password.
-
-
- 4.4.3 Mailer
-
- Miscellaneous
- Mail from unlisted systems
- Defines whether or not the Mailer should
- accept incoming calls from systems not listed
- in your nodelist database. If this option is
- disabled (set to NO) and an unlisted system
- calls in, the Mailer will terminate the call
- immediately.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 11
-
-
-
-
-
- Mail from "unprotected" systems
- Defines whether or not the Mailer should
- accept incoming calls from systems for which
- you do not have a session level password
- defined. If this option is disabled (set to
- NO) and an unprotected system calls in, the
- Mailer will terminate the call immediately.
-
- Mail from unlisted points
- The Mailer will by default accept calls from
- points of other systems. You can, however,
- specify that you do not want the Mailer to
- accept calls from points that are not listed
- in your nodelist database. If this option is
- disabled (set to NO) and a point for which
- you have no entry in your nodelist database
- calls in, the Mailer will terminate the call
- immediately.
-
- Kill empty received messages
- Specifies that you want the Mailer to kill
- empty messages (messages with no text in its
- body) when they are unpacked from mail
- packets.
-
- Terminal only (no mail)
- If enabled, the Mailer will invoke the
- Terminal as soon as it is loaded. This
- setting can be overridden with the /M command
- line switch.
-
- Mail only (no BBS)
- If enabled, the Mailer will not accept human
- callers under any circumstances. Use this
- option if you do not have a BBS or similar
- software running "below" the Mailer.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 12
-
-
-
-
-
- Present all AKAs to remote system
- If you have more than one AKA address, the
- Mailer will by default attempt to pickup mail
- destined for all your addresses during a mail
- session.
-
- This can be disabled so that only one address
- is presented to the remote system. Which
- address is actually presented is determined
- by the AKA matching table (described
- previously).
-
- Trigger exit upon receipt of netmail
- The Mailer will by default only trigger (set)
- the exit flag when compressed (following the
- ARCmail 0.60 standard) mail is received. If
- this option is enabled, the exit flag will be
- triggered (set) when NetMail packets (files
- ending with the extension .PKT) have been
- received. Whether or not the Mailer will
- actually exit is controlled by event
- behaviors (see "Events") and the mail exit
- errorlevels.
-
- Trigger exit upon receipt of ANY file
- Similar to the previous option, but will
- trigger exit as long as any (file) data has
- been received.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 13
-
-
-
-
-
- Print received messages
- If enabled, the Mailer will print messages
- unpacked from received mail packets.
-
- This is not available in the noncommercial
- version.
-
- Busy retries
- Defines the maximum number of times the
- Mailer will attempt to call a system during
- an event (see "Events") if the system is busy
- or does not answer on the first call. See the
- section about the Mailer for further details
- regarding call progress.
-
- Resend retries
- Defines the maximum number of times the
- Mailer will attempt to transfer mail to a
- system during an event if the first attempt
- fails. See the section about the Mailer for
- further details regarding call progress.
-
- Retry delay
- Defines the minimum number of seconds the
- Mailer will wait between outgoing calls. This
- is used in conjunction with a random timer to
- avoid two Mailers calling each other at the
- same time (and thus causing both telephone
- lines to be engaged).
-
- Delay before first call
- The Mailer will by default attempt to place
- the first outgoing call as soon as possible.
- If this option is enabled, it will delay the
- first call.
-
- Days to keep mail history
- Number of days to retain entries in the
- floating inbound/outbound history files. The
- Mailer removes all entries older than this
- value from the history files every morning
- (at first opportunity after midnight).
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 14
-
-
-
-
-
- BBS software name
- Name of the BBS software you are running (if
- any). This is displayed to human callers
- together with the "Press <Esc> twice for
- BBSNAME" if the event allows human callers to
- access the BBS.
-
- Seconds before passing to BBS
- Defines the number of seconds the Mailer will
- wait before assuming a human caller. Unless
- the Mailer receives two consecutive escape
- (ASCII 27) characters, it will attempt to
- establish a mail session for the amount
- specified here. The minimum and default value
- is 11 seconds. The maximum value is 60
- seconds.
-
- Minimum undialable cost
- The minimum cost of a call for a system to be
- processed by the undialable handler. The
- undialable handler is discussed in a separate
- section.
-
- Honor Return Receipt Requests (RRQ)
- Specifies whether or not the Mailer should
- generate a Return Receipt for received
- messages with the RRQ flag set. The RRQ flag
- is discussed in the Editor section.
-
- This is not available in the noncommercial
- version.
-
- Log Defines the various level of logging. All
- messages will appear on the screen, the log
- options defines which of them ends up in the
- log file.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 15
-
-
-
-
-
- File requests Controls how the Mailer (FD) treats inbound
- File and Update Requests. A separate section
- explains File and Update Requests in detail.
-
- FDServer If no password is specified in FDSETUP, the
- FDSERVER function is inactive (disabled). The
- FDSERVER function is described in a separate
- section.
-
- External mail When the Mailer processes an incoming call,
- all received characters are processed for a
- possible match with any of the external mail
- "wake-up" sequences (strings) and if a match
- is made, the Mailer exits with the specified
- errorlevel of the matching string.
-
- This allows you to run alternate mail
- handlers behind the Mailer, such as UFGATE
- and Waffle to process uucp mail. Note that
- the call is not terminated when using the
- external mail interface, the FOSSIL driver is
- simply de-initialized and the Mailer exits.
- This option is NOT intended for echomail
- processors, etc.
-
- To enter characters with an ASCII code below
- 32 (Space), hold down the <Alt> key, enter
- the ASCII code on the numerical keypad and
- release the <Alt> key.
-
- Display
- Mail waiting flashing
- When there is new mail waiting, the text
- "Mail" will flash on the Mailer screen. The
- flashing can be disabled with this option.
-
- Display clock
- Specifies whether or not you want the current
- date and time displayed in the top right
- corner of the Mailer screen.
-
- Display timestamp
- Specifies whether or not you want the Mailer
- to display the time to the left of each line
- displayed in the main activity window. This
- setting does not affect what is being written
- to the log file.
-
- Screen size
- 25 25 line mode.
-
- 43/50 43/50 line mode. Only available for systems
- with EGA and VGA cards.
-
-
-
-
-
- 16
-
-
-
-
-
- Auto Specifies that the Mailer should attempt to
- automatically adapt to whatever the current
- screen size is when it is started. This also
- means that the Mailer will not attempt to
- reset the screen mode when it is terminated.
-
- Custom Allows you to specify computer register
- values to send to the INT 10h (Video BIOS) to
- set and reset the screen.
-
- This is not available in the noncommercial
- version.
-
- Colors
- Allows you to choose between the default monochrome
- (black and white) and the default color sets. You can
- also choose to customize the colors to suit your own
- needs.
-
- Hidden dial info
- Allows you to hide portions of telephone numbers that
- otherwise would be displayed when the Mailer places an
- outgoing call. Eg. The Mailer calls 352-355936, if you
- had one of the hidden dial info strings set to 352- the
- displayed number would be 355936.
-
- Function keys
- Allows you to define up to 20 (24) programs, etc. to
- invoke from the Mailer when any of the functions keys are
- pressed. The first 10 (12) function keys are accessed
- through <F1> - <F10> (F12), the second 10 (12) function
- keys are accessed through <Shift-F1> - <Shift-F10> (F12).
-
- Title The title to appear on the screen when you
- press <Alt-K> from the Mailer's main screen.
-
- Action The program to invoke or errorlevel to exit
- with. To specify more than one program,
- separate them by semicolons (;). To exit with
- an errorlevel, specify ?<errorlevel>. Eg.
-
- LIST C:\FD\FD.LOG;DEL C:\FD\FD.LOG
-
- Would load the program LIST and pass
- C:\FD\FD.LOG as the parameter. When the LIST
- program terminates, the Mailer would proceed
- to the next command, which in this case
- removes C:\FD\FD.LOG.
-
- ?255
-
- Would force the Mailer to terminate with an
- errorlevel of 255.
-
-
-
-
-
- 17
-
-
-
-
-
- Pause Specifies whether or not you want the Mailer
- to pause when the invoked program(s)
- terminates.
-
- Check Specifies whether or not the Mailer should
- re-scan the Netmail folder when the invoked
- program(s) terminates.
-
- To create a DOS shell that does not force a re-scan of
- the Netmail folder, specify C:\COMMAND.COM (or wherever
- you have your copy of COMMAND.COM stored) as ACTION and
- set CHECK to NO.
-
- Errorlevels
- This section allows you to invoke BBS software, or other
- similar software, when an incoming call is established
- and the Mailer has determined that it is not a mail call.
- It also allows you to define an errorlevel to exit with
- when mail has been received.
-
- If a baudrate related errorlevel is zero, the Mailer will
- display a message to human callers saying that your
- system does not support non-mail calls at that speed and
- then terminate the call. If you are running in mail-only
- mode, the Mailer will never accept non-mail (human)
- calls.
-
- If the RECEIVED MAIL errorlevel is zero, the Mailer will
- never exit when mail has been received. Whether or not
- the Mailer will actually exit when it has received mail
- is determined by the current event behavior and whether
- or not the received file(s) indicated mail.
-
- The CREATE .BAT FILE option allows you to simplify BBS
- operation. If it is enabled, the Mailer will create a
- batch file containing the current baudrate, the COM port
- used, the number of minutes left to the next system
- event, etc. This is described in a separate section.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 18
-
-
-
-
-
- Audio control
- The Mailer can sound alarms and make other noises when
- certain events occur, such as received mail, incoming
- human callers, fatal errors, etc. This section allows you
- to control which sounds should be active and when audio
- should be active.
-
- Swapping
- Determines whether or not you want the Mailer to use
- swapping. You can disable the use of XMS/EMS memory for
- the swap function. The swap function is explained in the
- Miscellaneous section.
-
- Protection
- Allows you to protect certain functions of the Mailer
- (FD), such as access to the DOS shell, Editor (FM),
- Nodelist compiler (FDNC), Terminal, etc. with a password.
-
- This is not available in the noncommercial version.
-
-
- 4.4.4 Editor
-
- Miscellaneous
- Netmail.Restricted
- Specifies if the Netmail folder should be
- restricted. If you enable this, users with
- User or Administrator access can only read
- private messages addressed to their
- usernames.
-
- Netmail.Read-only
- Prevents users with User or Administrator
- access from writing messages in the netmail
- folder. The definition of writing includes
- forwarding and moving of messages to the
- Netmail folder.
-
- Netmail.Export OK
- Defines whether or not users with User or
- Administrator access can export messages from
- the Netmail folder. The definition of export
- includes moving, copying, and export to disk.
-
- Netmail.Use tables
- Defines whether or not the translation tables
- should be active by default in the Netmail
- folder. This can be toggled from within the
- Editor.
-
- Netmail.Crash
- If the Crash status bit should be set by
- default on locally created messages.
-
-
-
-
-
- 19
-
-
-
-
-
- Netmail.Direct
- If the Direct status bit should be set by
- default on locally created messages.
-
- Netmail.Hold
- If the Hold status bit should be set by
- default on locally created messages.
-
- Netmail.Private
- If the Private status bit should be set by
- default on locally created messages.
-
- Netmail.Kill/Sent
- If the Kill/sent status bit should be set by
- default on locally created messages.
-
- Use zone gates
- Determines if the Editor (FM) should ask you
- whether or not you want to send inter-zone
- messages via the zone gate, never send
- messages via the zone gate, or always send
- inter-zone messages via the zone gate.
-
- This is not available in the noncommercial
- version.
-
- Del.Orig (Conf)
- Del.Orig (Locl)
- Del.Orig (NetM)
- Determines if the Editor (FM) should ask
- "Delete original message" when replying to
- messages in EchoMail (Conf), Local (Locl),
- and NetMail (NetM)-type folders.
-
- This is not available in the noncommercial
- version.
-
- Show hard CRs
- If enabled, the Editor will show hard CRs in
- messages. The display of hard CRs is disabled
- by default and can be toggled from within the
- Editor.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 20
-
-
-
-
-
- Margin Specifies the margin at which the Editor
- should automatically wrap text when you enter
- and quote (replying) messages. The default
- value, 60, should not be changed in most
- cases.
-
- When you read messages in the Editor, it will
- use all available columns (80, 132, etc.) as
- the wrap margin.
-
- Keyboard macros
- Allows you to define up to 20 (24) strings.
- These can be used to insert common text, such
- as name signatures, etc. while editing
- messages. The first 10 (12) function keys are
- accessed through F1-F10 (F12), the second 10
- (12) function keys are accessed through Shift
- F1-F10 (F12).
-
- The Editor (FM) macro language is discussed
- in the section about how to operate the
- Editor.
-
- Origin lines
- Appended to messages you create in
- echomail-type folders to show the origin of a
- message. These should include the name and
- location of your system if possible.
-
- You can choose default origin lines for all
- EchoMail-type folders. You can also choose a
- different origin line from within the Editor.
-
- Whether or not the origin line is appended to
- messages you enter in echomail-type folders
- is controlled by the echo info status bit for
- each folder.
-
- Display
- Screen size
- 25 25 line mode.
-
- 43/50
- 43/50 line mode. Only available for systems
- with EGA and VGA cards.
-
- Auto
- Specifies that the Editor should attempt to
- automatically adapt to whatever the current
- screen size is when it is are started. This
- also means that the Editor will not attempt
- to reset the screen mode when it is
- terminated.
-
-
-
-
-
- 21
-
-
-
-
-
- Custom Allows you to specify computer register
- values to send to the INT 10h (Video BIOS) to
- set and reset the screen.
-
- This is not available in the noncommercial
- version.
-
- Colors Allows you to choose between the default
- monochrome (black and white) and the default
- color sets. You can also choose to customize
- the colors to suit your own needs.
-
- Xlat.In and Xlat.Out
- Defines the translation tables to use
- wherever the translation table status bit is
- active. This is used to translate language
- specific 8-bit ASCII characters to 7-bit
- ASCII when writing messages to disk and vice
- versa when reading messages from disk.
-
- The In table is used when reading messages
- from disk and the Out table is used when
- writing messages to disk.
-
- FDSETUP program automatically creates
- reasonable defaults for most countries when
- it creates a new SETUP.FD (system) file. If
- you are located in an English speaking
- country, you do normally not have to worry
- about translation tables.
-
- Swapping Determines whether or not you want the Editor
- to use swapping for its DOS shell. You can
- disable the use of XMS/EMS memory for the
- swap function. The swap function is explained
- in a separate section.
-
-
- 4.4.5 Terminal
-
- Miscellaneous
- Init An additional modem initialization string,
- sent to the modem as soon as the Terminal is
- started. If you start the Terminal directly
- from DOS (FD /T) or have set the
- Terminal-only option in FDSETUP, the Mailer's
- initialization strings are first sent to the
- modem.
-
- Download Default download path. Files that you receive
- (download) during a Terminal session will by
- default end up here.
-
- Upload Default upload path.
-
-
-
-
- 22
-
-
-
-
-
- Editor Allows you to install an Editor or file
- listing program and invoke it from the
- Terminal. The Terminal will prompt your for
- optional parameters, such as filenames, etc.
- This can also be used to invoke external
- protocols or external protocol menu programs.
-
- Protocol Zmodem, Telink, or Xmodem. Defines the
- default transfer protocol to use for file
- transfers in the Terminal. While SEAlink is
- an available protocol in the Terminal, it
- cannot be set as the default protocol in
- FDSETUP.
-
- Emulation ANSI, TTY, VT100 or VT52. Defines the default
- Terminal emulation protocol to use in the
- Terminal. Note that the Terminal's ANSI
- protocol supports the AVATAR (AVT/0)
- emulation protocol.
-
- Avatar Allows you to disable the support for AVATAR
- sequences in ANSI emulation. This can be
- toggled from within the Terminal.
-
- Buffer The size, in KB, of the scroll-back buffer.
-
- Connect noise
- Whether or not the Terminal should make noise
- when a connection has been established.
-
- Transfer noise
- Whether or not the Terminal should make noise
- after file transfers.
-
- Use tables Whether or not the Terminal translation
- tables should be active by default. See
- Editor.Xlat In for a detailed explanation of
- translation tables.
-
- Auto Zmodem
- Whether or not the automatic Zmodem download
- (receive) function should be enabled by
- default.
-
- Local echo Whether or not the Terminal should echo typed
- characters to your screen by default.
-
- Wrap around
- Whether or not the Terminal should move the
- cursor to the beginning of a new line when it
- reaches the end of the previous line.
-
-
-
-
-
-
-
- 23
-
-
-
-
-
- Delay Number of seconds to wait between outgoing
- calls if the number you dialed was busy or
- did not answer. If there is more than one
- entry in the dial queue, the delay is ignored
- and the Terminal proceeds to the next number
- in the queue.
-
- Logging Allows you to enable logging of file
- transfers, dialed numbers, and time spent on-
- line to systems. Similar to the Mailer's (FD)
- log output.
-
- This is not available in the noncommercial
- version.
- Display
- Screen size
- 25 25 line mode.
-
- 43/50
- 43/50 line mode. Only available for systems
- with EGA and VGA cards.
-
- Auto
- Specifies that the Terminal should attempt to
- automatically adapt to whatever the current
- screen size is when it is are started. This
- also means that the Terminal will not attempt
- to reset the screen mode when it is
- terminated.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 24
-
-
-
-
-
- Custom
- Allows you to specify computer register
- values to send to the INT 10h (Video BIOS) to
- set and reset the screen.
-
- This is not available in the noncommercial
- version.
-
- Keyboard macros
- Allows you to define up to 20 (24) macro
- strings. These can be used to transmit common
- text, such as names and passwords, etc. The
- first 10 (12) function keys are accessed
- through <Shift-F1> - <Shift-F10> (F12), the
- second 10 (12) function keys are accessed
- through <Ctrl-F1> - <Shift-F10> (F12).
-
- To enter characters with an ASCII code below
- 32 (space), hold down the <Alt> key, enter
- the ASCII code on the numerical keypad and
- release the <Alt> key.
-
- This is referred to as the default macro set.
-
- Xlat.In and Xlat.Out
- See Editor.Xlat In for a detailed explanation
- of translation tables. The Xlat.In table is
- used for characters received from the modem
- (remote). The Xlat.Out table is used for
- characters typed on the keyboard.
-
-
- EMSI Profile
- Defines the default IEMSI (Interactive
- Electronic Mail Standard Information) profile
- used to negotiate interactive EMSI sessions
- with BBS software supporting it.
-
- Active Determines whether or not IEMSI support
- should be active by default.
-
- Name The username you wish to use. If this field
- is empty, the ACTIVE field (above) is
- automatically toggled to "NO".
-
- Handle The handle you wish to use, or empty if none.
-
- Password
- The password you wish to use.
-
-
-
-
-
-
-
-
-
- 25
-
-
-
-
-
- Hot-keys
- Quiet
- Pausing
- Editor
- News
- New mail
- New files
- Screen Clr
- Specifies default user profile options,
- allowing you to customize the BBS or on-line
- service's behavior.
-
- The Terminal allows you to configure separate
- profiles for each individual telephone number in the
- Terminal Phone Directory.
-
-
- 4.4.6 Modem
-
- This option is used to configure your modem for use with
- FrontDoor. Modems are discussed in a separate section.
-
-
- 4.4.7 Printer
-
- The printer configuration can only be changed in the
- commercial version. The noncommercial version defaults to
- using LPT1.
-
-
- 4.4.8 Manager
-
- The managers are used to define events, session level
- security, file protection (for file requests) and to define
- your various message folders.
-
- All managers require that the SYSTEM path has been defined
- since they store their data files (EVENT.FD, PASSWORD.FD,
- REQUEST.FD and FOLDER.FD) in that directory.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 26
-
-
-
-
-
- 4.4.9 Event Manager
-
- Events are discussed in a separate section.
-
-
- 4.4.10 Folder Manager
-
- Folders are used to define different areas (directories, or
- boards for the Hudson Message Base) so that you can use the
- Editor (FM) to read and write messages in those areas. The
- Editor only knows about one folder by default. It is defined
- in the Filenames section of FDSETUP (described earlier) and
- is referred to as the NetMail folder.
-
- The folder manager has two modes. The first is the view mode,
- which is self explanatory. The second mode is the edit/create
- mode. It will now be described.
-
- Status The status and type of the folder.
-
- Origin The default origin line to use. This is only
- used for EchoMail-type folders with the Echo
- info status enabled. Origin lines are used to
- identify the origin of a message in EchoMail
- conferences. This is required because
- echomail is not a point to point environment,
- like a telephone conversation or NetMail
- exchange.
-
- EchoMail conferences are usually widespread
- and can have an unlimited number of
- participating systems.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 27
-
-
-
-
-
- Title The title appearing in the folder list when
- you select a new active folder in the Editor
- (FM).
-
- Board/Path Depending on the type of the folder, this is
- either the Hudson Message Base board number
- or the DOS path (directory) where the
- messages for this folder should be stored.
-
- Users Defines which users should have access to
- this folder. If a user does not have access
- to a folder, it will not show up on his/her
- list of available folders.
-
- Password Defines whether or not access to the folder
- is protected by a password. You can allow
- users to access a folder, and the password
- protect it.
-
- Use AKA Defines which address (AKA) the Editor should
- use for the folder. This is only important
- for EchoMail-type folders with the Echo info
- status enabled. The address is a part of the
- origin line.
-
- Folder status
-
- Restricted If enabled, users can only read Private
- messages addressed to their username. Public
- messages are not affected by this.
-
- Echo info Whether or not an origin line should be
- appended to newly created messages. See
- Origin (previous page) for more information.
-
- Export OK See Netmail.Export OK described earlier.
-
- Echomail Defines the folder as an EchoMail folder (as
- opposed to a Local or NetMail-type folder).
-
- MsgBase Specifies that the folder is of the Hudson
- Message Base type, rather than a directory
- with .MSG message files. The Hudson Message
- Base (HMB) is used by several BBS packages,
- such as RemoteAccess.
-
- NetMail Defines the folder as NetMail-type folder (as
- opposed to an EchoMail or Local-type folder).
- This enabled nodelist lookups, carbon copies,
- etc.
-
- This is not available in the noncommercial
- version.
-
-
-
-
-
- 28
-
-
-
-
-
- Local Defines the folder as a Local folder (as
- opposed to an EchoMail or NetMail-type
- folder). This is usually used to access local
- BBS message areas.
-
- Translate Enables the translation tables for the
- folder. They can be toggled on/off from
- within the folder.
-
- Private Specifies that the Private status should be
- allowed (and the default) for messages
- created in the folder. This should NOT be
- used in EchoMail folders unless the EchoMail
- conference explicitly allows this.
-
- Read-only See Netmail.Read-only described earlier.
-
-
- 4.4.11 Security
-
- The security manager is used to define session level
- passwords for other systems. It can also be used to
- explicitly refuse File/Update Requests and Mail from a
- system, and to disable/enable specific protocol and handshake
- options to fine tune your outbound mail sessions.
-
- Session level passwords are used to protect the receiving
- (called) system in a mail session, and calling system during
- an outbound EMSI session, to ensure that the calling system
- really is what it appears to be. Anyone can setup a Mailer,
- like FrontDoor or D'Bridge and send you mail. If there is
- mail waiting for the address they are using, your system will
- by default attempt to send it.
-
- You should setup session level passwords for all your common
- mail links, such as echomail distribution systems, etc.
-
- System The system address of the remote system. Eg.
- 2:270/17.
-
- Password Defines the session level password that your
- system will present when calling the
- specified system and the password that your
- system requires to establish a mail session
- with the specified system.
-
- Note that some systems treat passwords case
- sensitive, ie. ALLAN is not treated like
- AlLaN. The Mailer (FD) will treat passwords
- case insensitive on incoming (inbound) calls.
- They will, however, be sent EXACTLY as you
- have defined them here.
-
- You do not have to specify a password to use
- any of the other options.
-
-
-
- 29
-
-
-
-
-
- FREQs Whether or not the specified system is
- allowed to make File/Update Requests (see
- "File Requests").
-
- Mail Whether or not your system will allow the
- specified system to call your system. Note
- that by disabling (setting it to "NO") this
- option, you may be in violation of network
- policy.
-
- EMSI Whether or not you want the Mailer to attempt
- to negotiate an EMSI session when it calls
- the specified system.
-
- FTSC1 Whether or not you want the Mailer to attempt
- to negotiate an FTS-1 session when it calls
- the specified system.
-
- Zap Whether or not you want the Mailer to use the
- ZedZap/Zmodem protocol when negotiating an
- FTS-6 (YooHoo) session. If this is set to
- "NO", the DietIFNA protocol (Telink/SEAlink)
- will be used during YooHoo sessions with the
- specified system.
-
- YooHoo Whether or not you want the Mailer to attempt
- to negotiate an FTS-6 session when it calls
- the specified system.
-
-
- 4.4.11.1 Notes regarding protocols
-
- The Mailer (FD) will by default attempt to negotiate a
- mail session in the following order:
-
- 1. EMSI
- 2. FTS-6 (YooHoo), ZedZap/Zmodem
- 3. FTS-6 (YooHoo), DietIFNA
- 4. FTS-1
-
- The Mailer will ignore any entries in the security manager
- with inactive status.
-
-
- 4.4.12 Request Manager
-
- The request manager is used to protect file requests. File
- and Update Requests are discussed in a separate section.
-
-
-
-
-
-
-
-
-
-
- 30
-
-
-
-
-
- 5 The nodelist and the nodelist compiler
-
- The nodelist is FrontDoor's telephone directory listing and is used
- for several purposes. Among these are to allow you to perform name
- lookups of other SysOps, to retrieve information about remote
- systems, such as the maximum supported baud rate, modem flags, and
- system capability flags, to check if a remote system is known to your
- system or should be treated as an unlisted system.
-
- FD requires that a nodelist be present whereas FM and the Terminal
- can both be used without one, if so required. The typical FidoNet
- nodelist contains over 10.000 systems and has a fairly straight
- forward structure as follows.
-
- Zone Usually a large geographical area, such as North America,
- Europe, Australia and New Zealand, etc. At the time of
- the release of this package, the following FidoNet Zone
- numbers have been allocated:
-
- 1 North America (including Canada)
- 2 Europe
- 3 Australia, Tasmania, and New Zealand
- 4 Latin America
- 5 Africa
- 6 Asia
-
- Region Usually a somewhat smaller geographical area, such as a
- country or part of a (large) country. A collection of
- regions make up one zone.
-
- Net Usually a collection of systems local to each other.
- Typically a city and in some cases including its suburbs.
- A collection of nets make up one region.
-
- Node A single system within a net.
-
- Point A single system belonging to a node. Typically, a point
- is similar to a user logging on to a BBS system using
- his/her terminal program, with the main difference being
- that a point performs most of his/her activities offline
- and use smart software to collect and transit his/her
- mail.
-
-
- 5.1 Hosts and hubs
-
- The coordinator of a net is called the host or NC for Network
- Coordinator. The host is responsible for maintaining the nodelist
- segment for his/her net and to act as an inbound NetMail gateway
- for the systems in his/her net ("host routed mail").
-
- In a large net, it is quite common that "sub-hosts", called hubs,
- are set-up to aid in mail distribution within the net. In other
- words, a hub has the same function for systems in a network that
- a host has for (remote) systems outside the same network.
-
-
-
- 31
-
-
-
-
-
- 5.2 Compiling a nodelist
-
- Before FrontDoor can use the information in a nodelist, it must
- be compiled with the FrontDoor Nodelist Compiler, FDNC hereafter.
- FDNC will process the specified nodelist file(s) and generate
- database information and index files.
-
- The nodelist that FDNC needs to process is often referred to as
- the raw nodelist. It should not have been processed by Xlatlist,
- Parselst or a similar utility; but only be the nodelist you
- receive each week (if you are a FidoNet node) from your host.
-
- Grab a somewhat recent version of a nodelist and decompress it.
- Place the resulting file (such as NODELIST.228) in the NODELIST
- directory. Create a file called FDNODE.CTL with your favorite
- text Editor and place it in the same directory. You can also use
- the sample file included in the FrontDoor distribution package
- and modify it to suit your needs.
-
-
- 5.2.1 FDNODE.CTL
-
- FDNODE.CTL is FDNC's control file. It is used to control how
- FDNC processes the nodelist files, for dial translation and
- cost calculation. The order of commands does not matter. All
- commands are case insensitive.
-
-
- POINTLIST <FILENAME> [BOSS]
-
- This option allows you to add points to your nodelist
- database. The optional BOSS address is required if FILENAME
- does not contain a BOSS entry and should not be specified if
- FILENAME contains a BOSS entry.
-
- If you only have one file with point entries, you can name it
- FDPOINT.PVT. FDNC will automatically use this file if it is
- found in the NODELIST directory. If you use one or more
- POINTLIST statements, FDNC will merge all specified files
- into FDPOINT.PVT, overwriting its contents. A separate
- chapter discusses the point concept.
-
-
- PVTLIST <FILENAME> [ZONE]
-
- Similar to the POINTLIST command, but FILENAME contains one
- or more regular nodes. The optional ZONE number is required
- if FILENAME does not contain a ZONE entry and should not be
- specified if FILENAME contains a ZONE entry. The optional
- ZONE number is only supported for the first PVTLIST
- statement. FDNC accepts the POINT keyword in private
- nodelists.
-
-
-
-
-
-
- 32
-
-
-
-
-
- If you only have one file with additional node entries, you
- can name it FDNET.PVT. FDNC will automatically use it if it
- is found in the NODELIST directory. Note that if you use one
- or more PVTLIST statements, FDNC will merge all specified
- files into FDNET.PVT, overwriting its contents.
-
- Note that FILENAME for POINTLIST and PVTLIST may contain
- wildcard characters (* and ?). FDNC will use the most recent
- (by comparing the timestamp of the matching files) file.
-
-
- SWEPULSE
-
- This command was added to handle the somewhat screwed up
- method Swedish pulse exchanges handles dialing. Most modem
- manufacturers uses the British standard for pulse dialing,
- which is not compatible with Swedish pulse dialing. If you
- use SWEPULSE in FDNODE.CTL, telephone numbers will be
- properly translated. Do NOT use this command unless you live
- in Sweden and have to use pulse dialing.
-
-
- PHONE <ADDRESS> <NUMBER>
-
- Some systems are listed as PVT (private) in the nodelist, in
- which case there is no telephone number available (the text
- -Unpublished- is used in place). This, of course, means that
- FD cannot call a system listed as PVT. If you have the phone
- number of a PVT listed system, or wish to override the
- telephone number listed in the nodelist, you can use the
- PHONE command.
-
- ADDRESS is a fully qualified address (eg. 2:270/17). NUMBER
- is an untranslated (raw) telephone number (eg. 352-355-936).
- If the PHONE command is used, FDNC will remove possible DOWN,
- HOLD and PVT flags for the specified system.
-
-
- USE ZONE <ZONE>[<ZONE> <ZONE>..]
-
- This command controls which zones FDNC should include in the
- nodelist and username index files. The default is to include
- all encountered zones. This does not affect the contents of
- raw nodelist files, only what information ends up in the
- nodelist and username index files.
-
-
- DIAL <NATL PREFIX>/<SUFFIX> <INTL PREFIX>/<SUFFIX>
-
- Indicates the start of the dial translation table. All four
- parameters are optional and are only used if no other
- translation applies for a telephone number.
-
-
-
-
-
-
- 33
-
-
-
-
-
- If you only want to use a national (NATL) prefix/suffix, you
- must specify the / character for the international (INTL)
- prefix/suffix to indicate no special treatment. The same
- applies if you only want to use an INTL prefix/suffix.
-
-
- ; prefix
- ; prefix/suffix
- ; /suffix
- ;
- DIAL / 00 ; Add INTL prefix to all INTL
- ; numbers.
- 352- ; Strip country code
- 61- 0061-/X2 ; Send "X2" to HST for Australia
- 46-8 /391 ; Append (suffix) 391 to all
- ; numbers in Stockholm Sweden.
- END
-
- END is required to terminate the dial translation table.
-
- If you need to strip the search value from a number, you do
- not have to put anything after it. In other words, if you
- need to strip 1-305-596 from all number, you enter that
- string with no translation. Comments are ignored and must be
- preceded by a semicolon.
-
-
- DIAL 12345-1- 00
- ..
- ..
- END
-
- Would add (prefix) 12345-1- to all NATL numbers not otherwise
- translated. It would add (prefix) 00 to all INTL numbers not
- otherwise translated.
-
-
- DIAL /2222 00/1111
- ..
- ..
- END
-
- Would append (suffix) 2222 to all NATL numbers not otherwise
- translated. It would add (prefix) 00 and append (suffix) 1111
- to all INTL numbers not otherwise translated.
-
- The translation values (strings) does not have to contain
- number characters (0-9,.-). They can include commands such as
- "S25=100" etc. as long as your modem supports it.
-
-
-
-
-
-
-
-
-
- 34
-
-
-
-
-
- COST <NATL COST> <INTL COST>
-
- Indicates the start of the cost table. The two (default)
- parameters are NOT optional. The default cost only applies to
- numbers with no matching entry in the cost table.
-
- COST 5 125 ; NATL default=5, INTL=175
- 1- 75 ; Canada and the US
- 1-808- 125 ; Hawaii
- 46- 27 ; Sweden
- END
-
-
- An additional parameter can be added after the cost for a
- number entry indicating the maximum baud rate used. This is
- useful when calling locations with a lot of line noise etc.
- Please note that this does not work with several high-speed
- modems such as the US Robotics Courier HST. You cannot force
- a HST modem to connect at 2400 with another HST modem by
- changing the baud rate.
-
-
- To compile your nodelist, type FDNC and press <Enter>, or invoke
- the nodelist compiler from FD's main menu, <Alt-N>.
-
- When FDNC is started, it will compare the date of the raw
- nodelist and its index files. If the dates match, and no update
- has been made to FDNODE.CTL, no compilation will be made and the
- program will ask "Nodelist files are up-to-date, compile
- anyway?".
-
- If you want to force compilation, run FDNC with the /F command
- line switch.
-
-
- 5.3 Nodelist flags
-
- Most of the system entries in the nodelist contain one or more
- capability flags to indicate the system's capability. These are a
- few of the flags and their meaning:
-
- CM System accepts mail 24 hours a day.
- MO System does not accept human (BBS) callers.
- V32 CCITT V.32 capable modem.
- V32B CCITT V.32bis capable modem (implies CCITT V.32
- capability).
- V42 LAP-M error correction w/fallback to MNP 1-4.
- V42B LAP-M error correction w/fallback to MNP 1-5.
- HST US Robotics HST modem (implies MNP capability).
- MAX Microcom AX/96xx series modem.
- PEP Capable of supporting the Packet Ensemble Protocol
- (PEP).
- XA Bark and WaZOO file/update requests (all systems
- using FrontDoor 2.01 or above should have this).
-
-
-
-
- 35
-
-
-
-
-
- 5.4 Command line switches
-
- /C Compile the nodelist if it (or FDNODE.CTL) has
- been updated since the last time it was compiled,
- otherwise exit directly. This is useful for
- compiling the nodelist in batch files since it
- avoids the "Nodelist files are up-to-date,
- compile anyway?" prompt.
-
- /F Forces FDNC to compile the nodelist regardless of
- whether or not it has been updated.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 36
-
-
-
-
-
- 5.5 Points
-
- As mentioned before, a point is similar to a user logging on to a
- BBS system using his/her terminal program, with the main
- difference being that a point performs most of his/her activities
- offline and use smart software to collect and transit his/her
- mail.
-
- A point system is addressed by specifying the BOSS system's
- address followed by the point number. Eg. 2:270/17.1 is point one
- of 2:270/17. The BOSS system is called point zero (2:270/17.0),
- but the .0 is normally left out.
-
- FrontDoor is a point smart software package and fully supports
- the "four-dimensional" (zone, net, node, point) addressing
- method. FrontDoor also supports the "two-dimensional" point
- approach used by software like BinkleyTerm and oMMM. This is
- often called the "fakenet" or "pointnet" method. "Fake" because
- the software uses a non-existent network number to identify its
- "pointnet" and uses the node field for the point number.
-
- The maximum number of points any system can have is 65,535, not
- counting the BOSS, or point zero.
-
-
- 5.5.1 Pointlist
-
- A pointlist is similar to a normal nodelist, with the
- exception that all entries are considered point systems.
- FrontDoor, by default, uses the file FDPOINT.PVT to store its
- pointlist. It is possible to add points of other systems to
- your pointlist. This will allow you to enter messages to
- other systems' points just like you would to any other
- system.
-
-
- Here is a sample FDPOINT.PVT:
-
- ,1,The_Lab,Oetrange_L,JoHo,-Unpublished-,9600
- ,2,Marketing,Oetrange_L,Tomas,-Unpublished-,9600
-
- As you can see, a point list looks very much like a raw
- nodelist. The last field contains nodelist flags (HST, MO,
- CM, etc.) and if more than one flag is present, they are
- separated by commas.
-
-
-
-
-
-
-
-
-
-
-
-
-
- 37
-
-
-
-
-
- Points can also be added to systems in the master nodelist by
- using the POINT keyword:
-
- ,7,AES_Sales,Oetrange_L,Tomas,352-355-936,9600,CM,XA,HST,V32B
- Point,1,Marketing,Oetrange_L,Tomas,-Unpublished-,9600
- ,17,AES_Labs,Oetrange_L,JoHo,352-355-937,9600,CM,XA,HST,V32B
- Point,1,The_Lab,Oetrange_L,JoHo,-Unpublished-,9600
-
- Assuming this was listed under the Net-270 host in zone two,
- we have created 2:270/7, 2:270/7.1, 2:270/17, and 2:270/17.1.
-
-
- The second example works well if your nodelist is not updated
- frequently (weekly, daily, etc.). But if you have to add the
- "Point,#" every time you get a new nodelist, this task
- becomes rather tedious.
-
- FrontDoor therefore supports an additional pointlist format:
-
- Boss,2:270/7
- ,1,Marketing,Oetrange_L,Tomas,-Unpublished-,9600
- Boss,2:270/17
- ,1,The_Lab,Oetrange_L,JoHo,-Unpublished-,9600
-
- This does away with the need to constantly update the BOSS
- system's data in the raw nodelist and allows you to put your
- pointlist in a separate file. FDNC will then take the BOSS
- system's data from the master nodelist.
-
-
- 5.5.2 FDNODE.CTL
-
- If you only have one file with point definitions, you can put
- them in FDPOINT.PVT and use the third example (above) to add
- points for other systems, or your own system. If you have
- more than one file with point definitions, however, you
- should NOT name any of them FDPOINT.PVT.
-
- Assume we have two files with pointlists:
-
-
- FDHQ.PTS:
-
- ;
- ; Pointlist for 2:270/17
- ;
- Boss,2:270/17
- ,1,The_Lab,Oetrange_L,JoHo,-Unpublished-,9600
- ,2,Marketing,Oetrange_L,Tomas,-Unpublished-,9600
-
-
-
-
-
-
-
-
-
- 38
-
-
-
-
-
- and
-
- SCOTT.PTS:
-
- ;
- ; Pointlist for 135/990
- ;
- Boss,1:135/990
- ,1,ScottPoint,Miami_FL,Scott_Samet,-Unpublished-,9600
-
-
- We would tell FDNC to merge these two files into FDPOINT.PVT
- before it compiles the nodelist, by specifying the following
- in FDNODE.CTL:
-
- pointlist C:\FD\NODELIST\SCOTT.PTS
- pointlist C:\FD\NODELIST\FDHQ.PTS
-
-
- The BOSS statement in FDHQ.PTS and SCOTT.PTS can be removed
- if you instead specify:
-
- pointlist C:\FD\NODELIST\SCOTT.PTS 1:135/990
- pointlist C:\FD\NODELIST\FDHQ.PTS 2:270/17
-
- You must ALWAYS specify the address of the BOSS system (as
- shown above) if it is not listed in the actual pointlist
- file.
-
-
- 5.5.3 Point handling
-
- A point system is treated just like any other system with one
- exception. A point system of another system than your own is
- always treated as its BOSS (or point zero) system. When the
- Mailer creates mail packets for 1:135/990, it includes mail
- for any points under it by default.
-
-
- 5.5.4 Remapping
-
- If you have points that uses "point dumb" software, ie. which
- does not support the "four dimensional" (zone, net, node,
- point) concept fully, you must instruct FrontDoor about this.
- Since FrontDoor supports the "four dimensional" concept, it
- has to remap mail from and to "point dumb" software.
-
-
-
-
-
-
-
-
-
-
-
-
- 39
-
-
-
-
-
- 5.5.5 POINTNET
-
- If the POINTNET environment variable is set, mail from and to
- systems with the same net number as the value of POINTNET is
- remapped.
-
- Eg. AUTOEXEC.BAT:
-
- SET POINTNET=1004
-
- Would force FD and FM to remap mail from and to 1004/1,
- 1004/2, 1004/3, and 1004/4 to 2:270/17.1, 2:270/17.2,
- 2:270/17.3, and 2:270/17.4; assuming your network address is
- 2:270/17.
-
- FD automatically remaps messages that it extracts from mail
- packets. If you use the POINTNET variable, FD will treat
- 1004/1 identical to 2:270/17.1; assuming your network address
- is 2:270/17.
-
-
- 5.6 Sharing the nodelist
-
- FM, FD, and the Terminal are all capable of using the nodelist
- together with another program that supports sharing of the
- FrontDoor nodelist. If you are running FrontDoor under DESQview
- or LANtastic, for example, it is possible to run FD at the same
- time as FM, sharing the same nodelist.
-
- When FDNC compiles the nodelist, you must, however, make sure
- that no other program (including text editors) is using any of
- the nodelist files (FDPOINT.PVT, FDNET.PVT, and/or the raw
- nodelist).
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 40
-
-
-
-
-
- 6 Modems and FOSSIL drivers
-
- FrontDoor works with several modems, including US Robotics HST and
- HST/DS, Telebit's Trailblazer, ANC, Everex and Hayes. The general
- rule is that the modem must be able to send alphanumeric result
- strings. For most modems, the basic configuration is all that is
- required. For high speed modems such as the HST, a few extra settings
- are necessary.
-
- To utilize your modem in the most efficient way, it must be properly
- configured for use with FrontDoor. Most modems are incorrectly
- configured for use with FrontDoor when they leave their factory.
-
- FrontDoor require that your modem can return verbal result codes,
- such as "CONNECT 2400" and "NO CARRIER". In addition, if you want
- FrontDoor to answer the telephone on inbound calls, the modem must be
- able to return a verbal code indicating a ring signal, such as
- "RING". The modem must not have CD (carrier detect) forced. It should
- support disconnecting by lowering DTR (data terminal ready), but it
- is not necessary. DTR must not be forced.
-
- For high speed modem users, it is usually recommended that you lock
- the DTE (computer<>modem) speed to the highest possible baud rate;
- which is usually 19.2 or 38.4 KBPS.
-
- The current version of FrontDoor does not support manually operated
- modems with fixed speeds since most of them do not send any type of
- messages to the terminal (program). This is expected to be
- implemented in future versions.
-
-
- 6.1 Basic configuration
-
- The modem options are located in FDSETUP under the MODEM pull-
- down menu. There are four sub-menus, Hardware, Messages, Command
- strings, and Answer control.
-
-
- 6.1.1 Hardware
-
- The Hardware option screen allows you to configure things
- like the highest baud rate supported by your modem, the COM
- port to which your modem is connected, etc.
-
- Modem port The COM port your modem is attached to (1-8).
-
- Maximum baud rate
- The maximum supported baud rate of your modem
- (300-38400 BPS). If you have locked your
- FOSSIL driver (discussed later), set this to
- the same speed as the speed you locked the
- FOSSIL driver at.
-
-
-
-
-
-
- 41
-
-
-
-
-
- Lock port Whether or not you have locked the FOSSIL
- driver's baud rate.
-
- Reset modem to connect speed
- ---------------------------------------------
- This option should ONLY be used if you have a
- modem that supports the CCITT V.23 (split
- speed, 1200/75 and 75/1200) recommendation.
- ---------------------------------------------
-
- Lower DTR when busy
- Determines how the Mailer (FD) should handle
- the modem when it invokes other programs,
- exits and shells to DOS. If enabled, the
- Mailer will simply lower DTR. This means that
- your modem will not answer the phone, but any
- calling systems will not get a busy signal.
-
- If you disable this, the Mailer (FD) will
- send the Offhook string to the modem instead
- of lowering DTR. This can be used to take the
- modem offhook when your system is not
- available so that calling systems gets a busy
- signal instead of no answer.
-
- ---------------------------------------------
- It is against the law of some countries to
- take a modem offhook unless actual
- communication is taken place. As the operator
- of FrontDoor, it is your responsibility to be
- aware of such laws in your own country.
- ---------------------------------------------
-
- Lower DTR to terminate call
- If enabled, the Mailer (FD) will drop DTR for
- a short period of time to terminate calls.
- Most modems supports this and you should only
- disable it if your modem does not support
- lowering of DTR.
-
- If disabled, the Mailer (FD) will send the
- Escape code string followed by the Onhook
- string to terminate a call.
-
- Toggle DTR before dialing
- Specifies that the Mailer (FD) should lower
- DTR, pause, and then raise DTR again every
- time it places an outgoing call.
-
- While this increases the chances of call
- collision, it may be required by some modems
- to reset properly, etc. Do not enable this
- option unless it is absolutely necessary.
-
-
-
-
-
- 42
-
-
-
-
-
- Carrier detect mask (CDMASK)
- The bitmask the Mailer (FD) should use when
- asking the FOSSIL driver for the port status
- to determine if a carrier signal is still
- present. The default is 128 and cannot be
- changed in the noncommercial version.
-
-
- 6.1.2 Messages
-
- This option allows you to define the messages sent by your
- modem. If your modem does not send one or more of the strings
- you should NOT remove them.
-
- The 300 string is sent as CONNECT followed by a carriage
- return by some modems (US Robotics Courier HST for example).
- You should therefore set the string to CONNECT| (the pipe
- character will be replaced with a CR by the Mailer) if this
- is the case with your modem.
-
- The RING string should be set to RING| (the pipe character
- will be replaced with a CR by the Mailer) if your modem sends
- the RINGING message while waiting for a call to be connected.
-
-
- 6.1.3 Command strings
-
- All command strings may contain a pipe (|) character, which
- translates into a CR and a tilde (~) character which
- translates into a one second pause.
-
- Escape code Used to place the modem in command (as
- opposed to data/on-line) mode. This is only
- used if you have disabled "Lower DTR to
- terminate call" or if you are using the
- "Reset modem to connect speed" option.
-
- Return on-line Used to place the modem in data/on-line (as
- opposed to command) modem. This is only used
- if you are using the "Reset modem to connect
- speed" option.
-
- Onhook Used to place the modem on hook (as opposed
- to off hook) if you have disabled "Lower DTR
- when busy" or "Lower DTR to terminate call".
-
- Offhook Used to place the modem off hook (as opposed
- to on hook) if you have disabled "Lower DTR
- when busy".
-
-
-
-
-
-
-
-
-
- 43
-
-
-
-
-
- Dial Used when the Mailer places an outgoing call.
- The Mailer will send the dial (this) string,
- the Prefix, the telephone number, followed by
- the Suffix.
-
- Ie. <Dial><Prefix><Number><Suffix>
-
- Prefix Sent before every number when the Mailer
- places an outgoing call (see above).
-
- Suffix Sent after every number when the Mailer
- places an outgoing call (see above). This
- should be set to the pipe (|) character to
- indicate a CR in most cases.
-
- Delay The delay (in 1/10 second) between every
- string the Mailer sends to the modem. If you
- have an extremely fast modem (not baud rate),
- such as the USR HST, you can set this as low
- as one or two, but most modems require that
- this is set between four and eight.
-
- Init-1..Init-3 Modem initialization strings. They are sent
- every time the Mailer initializes the modem
- in order (Init-1, Init-2, Init-3). Unused
- strings should not be set to anything (leave
- field blank).
-
- Down Sent to the modem when the Mailer terminates.
- This occurs when mail has been received or
- when you press <Alt-Q> (Quit).
-
- Reset Sent to the modem to force it to respond with
- an OK message. This should be set to "AT|" in
- most cases.
-
-
- 6.1.4 Answer control
-
- Manual answer Defines that the Mailer should wait for the
- RING message from the modem and then send the
- force answer string (below) to force the
- modem to answer.
-
- This is the safest way to control modem
- answering and should be used unless your
- modem does not support it. For Hayes
- compatible modems, you should add S0=0 to one
- of your init strings to prevent the modem
- from answering automatically.
-
-
-
-
-
-
-
-
- 44
-
-
-
-
-
- Force answer The string forcing the modem to answer an
- incoming call. This should be "ATA|" in most
- cases.
-
- Answer delay When the Mailer receives the RING message
- from the modem, it will pause for nn 1/10
- seconds before sending the force answer
- string. This should be set between four and
- eight for most modems.
-
- Limited hours
- Starting time
- Ending time Allows you to force the Mailer to ignore the
- RING message outside the specified hours.
- This is useful if the telephone line is
- shared by other people during daytime but
- available during the night for example.
-
-
- 6.2 Advanced configuration
-
- Many modems have several different connection modes and options.
- The US Robotics HST Dual Standard, HST/DS hereafter, for example
- can be configured between several different connect modes,
- including CCITT V.32, CCITT V.32bis, and the proprietary HST
- protocol.
-
- Since the nodelist can list a system's hardware (modem)
- capabilities, the Mailer (FD) can automatically reconfigure your
- modem depending on what type of hardware the remote system (to be
- called) is using. This automatic reconfiguration feature can also
- be used to disable or enabled certain options for individual
- systems (ie. not based on a system's capabilities) because of
- problems with to noisy lines, long satellite delays, etc.
-
- This is all configured in the MODEM MANAGER under the Manager
- pull-down menu in FDSETUP. The actual data is stored in a file
- called MODEM.FD in the SYSTEM directory.
-
-
- 6.2.1 The Modem Manager
-
- The entries are processed as defined, ie. in sequential
- order. It may be important in which order these options are
- configured and triggered, the modem manager therefore allows
- you to re-arrange individual entries by using the "F2-Move"
- option.
-
- "String to match" is either a nodelist flag, such as HST, or
- a complete network address, such as 2:270/17, that the Mailer
- (FD) should match in order to send the specified string.
-
-
-
-
-
-
-
- 45
-
-
-
-
-
- "String to send" is the string that will be transmitted to
- the modem when a match is made.
-
- The Mailer (FD) will ignore entries with INACTIVE status.
-
-
- 6.2.2 An example, the HST/DS
-
- Most HST/DS owners will have the following three lines at the
- beginning of their MODEM MANAGER list:
-
- V32 ATB0|
- HST ATB1|
- V32B ATB0|
-
- The first line, V32, will transmit "ATB0" followed by a
- carriage return (ASCII 13) to the modem if the system to be
- dialed has V32 in its nodelist flags. This is to enable the
- HST/DS' CCITT V.32 handshake.
-
- The second line, HST, will transmit "ATB1" (followed by a
- carriage return) to the modem if the system to be dialed has
- HST in its nodelist flags. This is to tell the modem that we
- prefer the HST protocol. In the case of a system with both
- the V32 and the HST flag, we want the HST flag, because that
- protocol is faster than the CCITT V.32 protocol.
-
- The third line, V32B, will transmit "ATB0" to the modem if
- the system to be dialed has V32B in its nodelist flags. This
- it to tell the modem that we prefer the CCITT V.32bis
- protocol. In the case of a system with both the V32B and the
- HST flag, we want the V32B flag, because it is easier to get
- a good modem handshake over noisy phone lines and because
- CCITT V.32bis is 14.4 KBPS in both directions (full-duplex).
-
-
- Let us assume our modem has a problem, with incorrect busy
- and voice signal detection, when it encounters a modem that
- answers using PEP (Telebit Trailblazer is such a modem), we
- would then want to disable our modem's capability to detect a
- busy signal and/or a voice signal. We would then add:
-
- PEP ATX2|
-
- to the MODEM MANAGER.
-
-
-
-
-
-
-
-
-
-
-
-
-
- 46
-
-
-
-
-
- 6.3 Some sample configurations
-
- US Robotics HST (older models)
-
- DIP Switches:
-
- 0 (big)=OFF, 1=OFF, 2=OFF, 3=ON, 4=OFF, 5=ON, 6=OFF, 7=OFF,
- 8=ON, 9=ON, 0=OFF.
-
- Command/modem strings:
-
- CONNECT 300 CONNECT|
- RING RING|
- OffHook ATH1|
- OnHook ~ATH0|
- Init-1 AT&G2&K0&M4S19=2B&B1&H1&R2&N0
- S15=72|
- Init-2 ATV1X4S7=55EQM0S11=50S0=0|
- Down AT|
- Reset AT|
-
- Modem hardware:
-
- Lock port YES
- Baudrate 38400, 19200 or 9600
- Reset modem to connect speed NO
- Lower DTR when busy YES
- Lower DTR to terminate call YES
- Toggle DTR before dialing NO
-
- Answer control:
-
- Manual answer YES
- Force answer ATB0A|
- Delay 4
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 47
-
-
-
-
-
- US Robotics HST/DS/V.32bis
-
- DIP Switches:
-
- 0 (big)=OFF, 1=OFF, 2=OFF, 3=ON, 4=ON, 5=ON, 6=OFF, 7=OFF,
- 8=ON, 9=ON, 10=OFF.
-
- Command/modem strings:
-
- CONNECT 300 CONNECT|
- RING RING|
- OffHook ATM0H1|
- OnHook ~ATM1H0|
- Init-1 AT&K0&M4S19=2&B1&H1&R2&N0E0Q0
- B1&G2|
- Init-2 ATV1X4S7=55M1S11=50S10=40S15=
- 72&A3|
- Init-3 ATS0=0H0|
- Down <empty>
- Reset AT|
-
- Modem hardware:
-
- Lock port YES
- Baudrate 38400, 19200 or 9600
- Reset modem to connect speed NO
- Lower DTR when busy YES
- Lower DTR to terminate call YES
- Toggle DTR before dialing NO
-
- Answer control:
-
- Manual answer YES
- Force answer ATB0M0A|
- Delay 4
-
- In the MODEM MANAGER in FDSETUP:
-
- V32 ATB0|
- HST ATB1|
- V32B ATB0|
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 48
-
-
-
-
-
- 6.4 FOSSIL drivers
-
- A FOSSIL (or Fido/Opus/SEAdog Standard Interface Layer) driver is
- a memory resident program that works as a layer between the
- application program and your computer's hardware. The Mailer (FD)
- requires a FOSSIL driver to function. One of the advantages of
- the standard FOSSIL interface is that programs can be ported
- easily to other machines and/or operating systems.
-
- There are several FOSSIL drivers available. The Mailer (FD) has
- been tested with OpusComm, X00, and BNU with good results. X00
- and BNU will be described here.
-
-
- 6.4.1 BNU
-
- BNU, written by David Nugent, comes in two flavors. One is a
- device driver, similar to X00.SYS. The second flavor is a
- .COM file, loaded from AUTOEXEC.BAT or another batch file.
- The .COM flavor is assumed in the example. For a detailed
- description of the BNU driver, please refer to the
- documentation included in the BNU distribution archive.
-
- [AUTOEXEC.BAT]
-
- BNU /R=1024 /T=512 /L1:38400
-
- /R=1024 Specifies a receive buffer of 1024 bytes.
-
- /T=512 Specifies a transmit buffer of 512 bytes.
-
- /L1:38400 Locks COM2 at 38,400 BPS (for use with the 14,400
- HST or HST/DS modems).
-
- If you are not using a high-speed modem the above example
- should most likely be modified to not lock COM2.
-
-
- 6.4.2 X00.SYS
-
- X00, written by Ray Gwinn, is a device driver (later versions
- can also be loaded as an executable from AUTOEXEC.BAT), it is
- loaded from your CONFIG.SYS file when your machine is
- started. For a detailed description of the X00 driver, read
- the documentation included in the X00 distribution archive.
-
- [CONFIG.SYS]
-
- device = X00.SYS E 1 B,1,38400 T=512 R=1024
-
- E Disable 5 second advertisement when X00 is first
- loaded.
-
-
-
-
-
-
- 49
-
-
-
-
-
- 1 Number of COM ports X00 should allow to be
- accessed at one time.
-
- B,1,38400 Locks COM2 at 38,400 BPS (for use with the 14,400
- HST or HST/DS modems).
-
- T=512 Specifies a transmit buffer of 512 bytes.
-
- R=1024 Specifies a receive buffer of 1024 bytes.
-
- If you are not using a high-speed modem the above example may
- not be what you want. The most common command line for X00
- is:
-
- device=X00.SYS E 1
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 50
-
-
-
-
-
- 7 Events
-
- There are two basic types of events. Mail events and external events.
- Mail events are used to control how the Mailer (FD) treats mail
- during a given time of the day. External events are used to force the
- Mailer to terminate with an errorlevel at a specific time. They can
- be used to run system maintenance programs, disk optimizers, etc.
-
- The EVENT MANAGER in FDSETUP is used to control mail and external
- events. There is a (required) global event, which is active when no
- other event is active. The @ character is used for the global event.
-
- 7.1 The Event Manager
-
- The event manager has two modes. The first is the view mode,
- which is self explanatory. The second mode is the edit/create
- mode. It will now be described.
-
- Tag (T) The event "ID". A letter from A-Z or @. The @
- event has special meaning and is described later.
- X is used for eXternal events, all other letters
- are used for mail events. Which letter you use is
- not important. They could correspond with the
- time of day, N for Night, E for Evening, D for
- Day, etc. The event tag is used to associate an
- event with a schedule block in the route file
- (see "Mail routing").
-
- Days The days you want the event to be active on. The
- @ event is active on all days.
-
- Modifier (M) You can define a start time for the @ event. It
- is not used to control the start of the @ event.
- It can be added, subtracted, or ignored, when
- calculating the actual start time of other
- events.
-
- If the modifier for an event is +, the start time
- of the @ event is added to the start time of the
- event.
-
- If the modifier for an event is -, the start time
- of the @ event is subtracted from the start time
- of the event.
-
- If the modifier for an event is *, the start time
- of the @ event is ignored and not used to
- calculate the actual start time of the event.
-
- This is very useful when it is time to switch
- between winter and summer time. Instead of having
- to manually go into each event and define a new
- start time, you could change the start time of
- the @ event and the start time of all other
- events will be changed.
-
-
-
- 51
-
-
-
-
-
- Let us assume that you have an event (tag=E) that
- starts at 08:00 in the morning with a modifier of
- +. Your @ event has a start time of 01:00. Since
- the modifier was + (add), the start time of @
- (01:00) will be added to the start time of the E
- event and the result will be that event E starts
- at 09:00. If you change the modifier to -
- (subtract), the start time of event E will be
- 07:00 (08:00 minus 01:00). If you set the
- modifier to * (ignore), the start time of E is
- not affected.
-
- Start time Defines the start time of an event. See Modifier
- (above) for an explanation on how this can be
- affected.
-
- Length Defines the length of the event. External events
- (X) always have a length of 00:01 (one minute).
-
- Errorlevel
- For external (X) events, this defines the
- errorlevel that the Mailer (FD) will terminate
- with.
-
- For mail events, this defines the errorlevel to
- exit with if mail is received (and the Mailer is
- triggered to exit). If the errorlevel field is
- set to zero, the default MAIL RECEIVED errorlevel
- will be used.
-
- You may use any value in the range 31-255.
-
- Min.cost Defines the minimum cost of messages that should
- be qualified (see "Mail routing").
-
- Max.cost Defines the maximum cost of messages that should
- be qualified (see Mail Routing). A value of -1
- forces FD to ignore the cost of messages.
-
- Behavior Defines the behavior of the event. Mail events
- and external (X) events have different behavior
- options, this is described later.
-
- Retry delay
- Defines the delay (in seconds) the Mailer should
- wait between placing outgoing calls. A value of
- zero means that you want the Mailer to use the
- default delay (described earlier).
-
- 7.1.1 External event behavior
-
- Allow users during event
- Defines whether or not non-mail (human) calls are
- allowed to interrupt the event.
-
-
-
-
- 52
-
-
-
-
-
- If a non-mail call comes in at 12:00 and you have
- an external (X) event scheduled for 12:30, the
- Mailer will take the X event into account when
- calculating the number of minutes left until the
- next event, depending on how this option is set.
- If it is disabled, the user would, in this case,
- only have 30 minutes until the next event. If it
- was enabled, the Mailer would instead scan ahead
- for the next (if any) event that does not allow
- users.
-
- Forced Defines whether or not the event is forced. The
- Mailer, by default, ignores events that it
- "missed" while doing something else. If you
- enable this option, the event will be executed
- even if the Mailer have "missed" it.
-
- Assume you have a non-forced external (X) event
- scheduled for 12:00 and a user calls in at 11:50.
- The call lasts for 30 minutes (12:20). When the
- Mailer is brought back up again, the external
- event will not be executed. If, however, you had
- this option enabled for the external (X) event,
- it would be executed as soon as the Mailer was
- brought up again.
-
- Inactive Toggles the state of the event. The Mailer will
- ignore any inactive events. This allows you to
- deactivate events without removing them from the
- event manager.
-
- 7.1.2 Mail event behavior
-
- Allow users during event
- This has the same function as for external (X)
- events. In addition, if this option is set to
- "NO" (disabled), non-mail calls will not be
- accepted during the duration of the event.
-
- Exit when mail is received
- Defines whether or not you want the Mailer to
- exit when mail has been received. This allows you
- to process received echomail, etc.
-
- High priority (crash) mail only
- Forces the Mailer to ignore messages that does
- not have crash status. Note that messages with
- IMM (Immediate) status are not affected by this.
-
- Allow file requests
- Defines whether or not you want the Mailer to
- honor file requests during an event. If you
- disable this option, the Mailer will simply
- ignore file requests.
-
-
-
-
- 53
-
-
-
-
-
- Pickup file requests
- The Mailer will by default not accept file
- requests received during an outgoing (outbound)
- mail call since you are paying for the call. This
- option allows you to pickup waiting file requests
- and process them. Whether or not they are
- actually honored is defined by the Allow file
- requests option.
-
- Hold (do not send) file requests
- Forces the Mailer to ignore outgoing (your own)
- file request messages during the event. This is
- useful if you do not want to send out file
- requests during daytime events for example.
-
- Attempt to pickup waiting mail
- Defines whether or not you want the Mailer to
- pickup any waiting mail on outgoing calls. The
- default (Yes) should be used unless you want the
- Mailer to terminate the mail session as soon as
- it has delivered its mail. If this option is
- disabled, your file requests (if any) will fail
- since the Mailer terminates the call before the
- remote system has a chance to process them.
-
- Allow nodes to pickup waiting mail
- This option is the same as using the DENY route
- command (see "Mail routing").
-
- The only difference is that you cannot be
- selective about which systems can pickup waiting
- mail. If a system calls in to deliver its mail
- and this option is disabled (NO), your system
- will not release (send) any waiting mail.
-
- Prioritize outbound calls
- Forces the Mailer to make outgoing calls without
- waiting for the specified time (retry delay,
- etc.) between calls. The Mailer will still accept
- incoming (inbound) mail, but the chances of
- another system getting through are very small.
-
- Receive-Only
- Specifies that you do not want the Mailer to make
- any outgoing calls during the event.
-
- End event when no more mail to send
- If you have an event with some restrictions on
- other systems or do not allow users, it may be
- useful to enable this option, forcing the Mailer
- to release all restrictions enforced by the event
- as soon as there is no more mail to send.
-
- If new mail is entered that qualifies for mailing
- and the event has ended (prematurely), it will be
- restarted.
-
-
- 54
-
-
-
-
-
- Send to CM systems only
- Forces the Mailer to only qualify those systems
- that have the CM (continuous mail) flag set in
- their nodelist entry.
-
- Send to non-CM systems only
- Forces the Mailer to only qualify those systems
- that Do not have the CM (continuous mail) flag
- set in their nodelist entry.
-
- Only execute event once
- Forces the Mailer to only deliver mail to a
- system once during the event. If the event is
- interrupted or aborted, the Mailer will remember
- which systems it has already delivered mail to
- and when the event is restarted, it will not call
- those systems again.
-
- Assume you have mail to 1:135/20 and 2:310/11
- during event A, with this behavior enabled. On
- the first call to 1:135/20, the Mailer sends its
- mail successfully. If the event is restarted for
- some reason (user break, human caller, mail
- receive exit), the Mailer will not call 1:135/20
- again, even if there is new mail for that system.
-
- Inactive The same as for external (X) events.
-
-
- 7.1.3 The @ event
-
- The @ event is active whenever your system is not in another
- mail event. The @ event is required. You do not have to tell
- the Mailer to send mail during the @ event, but it must be
- defined.
-
- You can use it to send local and/or low cost mail whenever
- the Mailer is not busy, etc. You can specify a schedule block
- (see Mail routing), using the @ tag and define routing rules
- for it just like any other mail event. If the Mailer does not
- find a schedule block for the @ tag, it will still use any
- global rules defined in the route file.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 55
-
-
-
-
-
- 7.1.4 Overlapping events
-
- Overlapping events are fully supported by the Mailer.
-
- Event B starts at 05:00 with a duration of 01:00. Event A
- starts at 05:01 with a duration of 00:15. The behavior for
- event A includes Only execute event once and End event when
- no more mail to send.
-
- Event B will start at 05:00, after one minute, event A will
- start and last for fifteen minutes (or end when there is no
- more mail to send).
-
- Once event A has ended, B will resume. This is a very
- powerful and useful concept. It can be used to start
- temporary or dynamic events within events that lasts for
- several hours.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 56
-
-
-
-
-
- 8 Mailer
-
- The Mailer, FD hereafter, is the core program of FrontDoor. It is
- responsible for sending and receiving messages; and optionally pass
- human callers to a BBS or other interactive software. The Terminal
- function is also located in FD and can be reached from one of its
- menus.
-
- Most functions of FD are reached by holding down the <Alt> key and
- pressing a key, <A..Z>.
-
-
- 8.1 Menus
-
- Each function and menu of the Mailer will now be described.
-
-
- 8.1.1 Programs <Alt-P>
-
- <Alt-E>
- Message Editor Loads FM.
-
- <Alt-J>
- Terminal Loads the Terminal (it resides in FD overlay
- file, FD.OVR).
- <Alt-C>
- Configure Loads the FDSETUP program.
-
- <Alt-N>
- Nodelist Loads the nodelist compiler (FDNC).
-
- <Alt-K>
- User keys Allows you to select one of the 20(24) user
- definable functions.
-
- <Alt-Z>
- DOS shell Invokes a temporary DOS shell. Type EXIT and
- press <Enter> to return to FD.
-
- Packets created with any of the temporary
- mail services function (File Request,
- Transmit file, Send mail) will be discarded
- when you return and FD will re-scan the
- contents of the NetMail folder.
-
- <Alt-Q>
- Quit Returns you to DOS. FD will return errorlevel
- 10 (user break).
-
-
-
-
-
-
-
-
-
-
- 57
-
-
-
-
-
- 8.1.2 Utilities <Alt-U>
-
- <Alt-A>
- Active event Shows the settings for the currently active
- event (if any).
-
- <Alt-I>
- Inbound history
- Invokes the inbound call (mail) history
- management function.
-
- <Alt-O>
- Outbound history
- Invokes the outbound call (mail) history
- management function.
-
- <Alt-R>
- Recent activity
- Shows you the last two days of general
- activity, failed sessions, file requests,
- number of files/bytes sent and received, etc.
-
- <Alt-X>
- Disconnect Allows you to manually terminate a call. This
- will also re-initialize the modem.
-
- <Alt-L>
- Lock keyboard Allows you to lock the keyboard (and FD)
- against unauthorized use. FD will still
- perform its duties such as sending and
- receiving mail, etc.
-
- You must enter the specified password to
- unlock the keyboard. If FD exits (due to mail
- received or a BBS call is received), the
- keyboard lock status is retained and when FD
- is brought back up, the keyboard will be
- locked.
-
- Restart event Forces FD to re-scan the message base and
- create new mail packets. All previous
- temporary packet information is discarded.
-
-
- 8.1.3 Mail <Alt-U>
-
- <Alt-B>
- Queue manager Allows you to manipulate the current mail
- queue. If no mail event is active, the mail
- queue is empty. The mail queue is described
- in a separate section.
-
-
-
-
-
-
-
- 58
-
-
-
-
-
- <Alt-V>
- Undialable manager
- Allows you to manipulate systems marked as
- undialable. This is discussed in a separate
- section.
-
- <Alt-F>
- Forced poll Creates a priority entry in the mail queue
- for the specified system. If an entry for the
- specified system already exists in the queue,
- its status is set to priority. If FD has to
- re-scan the message base, the temporary poll
- is removed from the mail queue.
-
- <Alt-G>
- Request files Allows you to create a temporary file request
- to the specified system. If FD has to re-scan
- the message base, the temporary file request
- is removed from the mail queue.
-
- <Alt-T>
- Transmit files
- Allows you to transmit files to the specified
- system. As with the poll and request function
- (above), this is only a temporary function;
- if FD has to re-scan the message base, the
- entry is removed from the mail queue.
-
- <Alt-S>
- Send mail Allows you to create a temporary mail packet
- for the specified system. You can choose to
- include all or high-priority mail. If FD has
- to re-scan the message base, the entry is
- removed from the mail queue.
-
-
- <Alt-Y>
- Your profile
- Answer Allows you to toggle the manual answer
- status. This option is only valid if you have
- enabled the manual answer option in FDSETUP.
- Note that if you manually toggle this option,
- the Mailer will honor the new setting until
- it exits.
-
- Printer Allows you to toggle the printing of new
- (incoming) messages. This option is not
- available in the noncommercial version.
-
- Human callers
- Allows you to toggle whether or not you want
- FD to accept human callers.
-
- This option is only valid if you are not
- running FD in mail-only mode.
-
-
-
- 59
-
-
-
-
-
- Exit on mail
- Allows you to toggle whether or not FD should
- exit when mail has been received. This option
- is only valid if an errorlevel for received
- mail has been specified in FDSETUP and the
- active event (if any) specifies that FD
- should exit when mail has been received.
-
- <Alt-W>
- Which AKA Allows you to select a different AKA to
- operate under. The specified AKA will be
- active until FD exits or you select a new AKA
- to operate under. Note that this does not
- effect the AKA matching function of FD.
-
-
- 8.2 Mail queue <Alt-B>
-
- The mail queue function allows you to modify the status of one or
- more mail packets, temporarily change the destination of mail
- packets, and to unpack one or more packets.
-
- <F1>
- Priority Sets priority status on all selected packets.
- Packets with priority status are always processed
- before packets with crash or normal status.
-
- <F2>
- <Enter>
- Verbose Shows more information about the highlighted mail
- packet such as attached files, estimated transfer
- time, etc. You can not use this function if the
- destination system is unlisted (does not exist).
-
- <F3>
- Crash Sets crash status on all selected packets.
-
- <F4>
- Hold Sets hold status on all selected packets. Packets
- with hold status will never be processed by FD
- unless the destination system calls in to pickup
- mail.
-
- <F5>
- Select all Selects all packets.
-
-
-
-
-
-
-
-
-
-
-
-
-
- 60
-
-
-
-
-
- <F6>
- Destination Changes the destination of all selected packets.
- When FD processes the mail queue, it will treat
- all active (non-sent and non-held) packets as
- individual packets, including two or more
- different packets destined for the same system.
- If a connection is made (whether the destination
- system calls you or your system calls it),
- however, all packets destined for that system
- will be sent.
-
- <F7>
- Unpack Discards all selected packets (note: NOT MAIL)
- from the queue.
- <F8>
- Clear status Sets normal status on all selected packets.
-
- <F9>
- Clear busy retries
- Sets the dial attempts for all selected packets
- to zero.
-
- <Esc>
- Exit Returns you to FD.
-
- <Space>
- Select Selects the currently highlighted packet.
-
-
- 8.3 Call progress
-
- When FD has mail to send, it will step through the mail queue and
- call the systems with mail packets waiting. Packets with sent,
- failed, and hold status are ignored by FD. These can, however,
- always be picked up by the destination system if it calls in.
-
- After every unsuccessful (BUSY, NO CARRIER, etc.) call, the busy
- retry counter is incremented until it reaches the value defined
- in FDSETUP. Once the limit has been exceeded, FD puts hold status
- on the packet. If a connection is made but the actual transfer
- fails, the resend retry counter is updated and once the limit,
- defined in FDSETUP, is reached, FD puts failed status on the
- packet.
-
- Press <Space> to force FD to place the next outgoing call.
-
-
-
-
-
-
-
-
-
-
-
-
-
- 61
-
-
-
-
-
- 8.4 Semaphore indicators
-
- Every time FD scans the NetMail folder, it looks for unread
- messages destined for your system. If any are found, it will
- enable the flashing "Mail" text in the bottom right hand corner.
- Once the message(s) have been marked received (read), the
- flashing mail text will disappear.
-
-
- 8.5 Undialable
-
- When FD reaches the resend (session failure, transmission
- failure, etc.) retry limit for a system during an event. That
- system is added to the undialable table with a "grade" of one.
- When the "grade" reaches three, the system is considered
- undialable and FD will never call that system again (until you
- manually "upgrade" it).
-
- The undialable manager is accessed by pressing <Alt-V> from FD's
- main menu and allows you to "upgrade" a system's status, add a
- system manually to the undialable list, and remove one or more
- undialable systems.
-
- The undialable system information is kept in NODIAL.FD in
- FrontDoor's SYSTEM directory.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 62
-
-
-
-
-
- 9 Editor
-
- The Editor, FM hereafter, is the program used to write and read
- messages. It can be invoked from the command line in DOS or from FD
- by pressing <Alt-E>.
-
- FM has two "status" lines. The bottom status line is used to display
- the current message, number of messages in the current folder, the
- lowest and highest message numbers and the number of messages
- remaining to the last message (last minus current). The top status
- line shows the currently active AKA (address), the current time and
- the folder you are in.
-
- Most functions of FM are reached by holding down either the <Ctrl> or
- <Alt> key and pressing a key, <A..Z>. If you press a key that has no
- function in FM, it will display a message saying "Press Alt-M for
- menu" on the bottom status line.
-
- Each function and menu of FM will now be described.
-
-
- 9.1 Main <Alt-M>
-
- <Ins>
- Create Allows you to create a new message in the current
- folder. You will be prompted for the destination
- (user name and possibly a network address),
- subject, etc.
-
- <Del>
- Kill Removes the currently displayed message. FM will
- confirm that you really want to remove the
- message.
-
- <Alt-R>
- Reply Similar to the CREATE function. The destination
- of the newly created message, however, is taken
- from the sender of the message you are replying
- to. This function also allows you to quote the
- original message, in whole, or selected parts.
-
- <Alt-N>
- Netmail reply Similar to the REPLY function. If you are in a
- Local or EchoMail folder, your message (the
- reply) will be placed into the NetMail folder.
- The destination address of the message is taken
- from either the origin line (EchoMail folders) or
- the sender's name (Local folders).
-
-
-
-
-
-
-
-
-
-
- 63
-
-
-
-
-
-
- <Alt-C>
- Reply comment Similar to the REPLY function. It allows you to
- create a follow-up message with additional
- comments to the same destination as the original
- message.
-
- This function is not available in the
- noncommercial version.
-
- <Alt-L>
- <Tab>
- Forward This function allows you to redirect a message to
- someone else. It will also insert some additional
- information at the top of the message, showing
- who the message was originally from, etc. You can
- choose whether or not you want to overwrite the
- original message with the forwarded message.
-
- <Alt-L> will also add the default message status
- to the message and remove the Rcvd and Sent
- status bits if they were set.
-
- <Alt-F>
- Folders Allows you to change the active folder. You
- cannot change to another folder while editing a
- message, but you can view the folder list. The
- type of each folder is shown as 'E' for EchoMail,
- 'L' for Local and 'M' for NetMail.
-
- The commercial version allows you to configure
- any folder with NetMail status, the type will
- then be displayed as 'N'.
-
- To select a folder, you can use the arrow keys to
- move the highlight bar and then press <Enter>.
- You can also type the number of the folder
- followed by pressing <Enter>.
-
- <Ctrl-F>
- Folder scan Scans all folders and indicates which folders
- have any message number higher than the last read
- message. Typically, this means that new messages
- have arrived in a folder since you last accessed
- it.
-
- <Alt-Z>
- DOS shell Invokes a temporary DOS shell. Type EXIT and
- press <Enter> to return to FM.
-
- <Alt-Q>
- Quit Returns you to DOS or to FD, depending on how FM
- was invoked. If you are editing a message, you
- will be asked whether or not you wish to save it
- before exiting.
-
-
-
- 64
-
-
-
-
-
- 9.2 Edit <Alt-E>
-
- <Alt-S>
- Status Allows you to change the status of a message. See
- the separate section about Message Status Bits
- for a detailed description of this.
-
- <Alt-A>
- Subject Allows you to change the subject of a message. If
- you have a message with file attaches and press
- <Alt-A>, the file attach list will be processed
- again and if you specified wild-cards or more
- than one file on the subject line, you will have
- to select the files you want to send once again.
-
- <Alt-T>
- Text Allows you to edit the text (body) of a message.
- If you are already in editing mode, this will
- bring up a secondary menu with text editing
- related functions.
-
- <Alt-D>
- Destination Allows you to change the destination of a
- message. This will add the default message status
- bits as well as the Local bit to the message and
- remove the Rcvd and Sent status bits if they were
- set.
-
- As opposed to the FORWARD function, using <Alt-D>
- will not result in any text being added to the
- message body (forwarding info).
-
- <Ctrl-F2>
- Toggle Brings up the toggle menu.
-
-
- 9.2.1 <Alt-T> in edit mode
-
- <Alt-F2>
- Import file
- Allows you to import an ASCII file into the text.
- The contents of the file will be inserted at the
- current cursor position.
-
- <Ctrl-Enter>
- Insert line
- Inserts a blank line after the current line. The
- cursor will remain in the same position.
-
-
-
-
-
-
-
-
-
-
- 65
-
-
-
-
-
- <Ctrl-B>
- Line to buffer
- Adds the current (where cursor is positioned)
- line to end of the temporary buffer and moves the
- cursor down one line. The last eighty lines of
- deleted/marked text is always retained in a
- temporary buffer and can be reinserted with
- <Alt-F1> or <Esc>.
-
- <Ctrl-W>
- Delete word
- Deletes the word to the right of the cursor.
-
- <Ctrl-G>
- Go to line#
- Allows you to specify an absolute line number to
- place the cursor on.
-
- <Ctrl-T>
- Delete to EOF
- Deletes all text from cursor to end of message.
-
- <Alt-F5>
- Find Searches for the specified string, and if found,
- places the cursor on the first character of the
- found word.
-
- <Alt-F6>
- Find & Replace
- Allows you to replace a string with another. Note
- that this function will restore the cursor
- position (the find function will not).
-
- <Alt-F8>
- Re-format Reformats a block of text (from cursor to the
- next blank line) and removes any hard CRs from
- the reformatted lines. It will add a hard CR to
- the end of the reformatted block.
-
- <Alt-F4>
- Line drawing
- Allows you to draw lines and boxes using a
- variety of line sets.
-
- This is not available in the noncommercial
- version.
-
- <Alt-F1>
- <Esc>
- Undelete Inserts the last deleted line at the current
- cursor position. The last eighty lines of
- deleted/marked text is always retained in a
- "scratch" buffer.
-
-
-
-
-
- 66
-
-
-
-
-
- <Alt-F10>
- <Ctrl-Z>
- Save & Exit
- Save (or discard changes to) the current message.
-
-
- 9.2.2 Toggle menu <Ctrl-F2>
-
- <Ctrl-X>
- Translation tables
- Toggles the state of the translation tables.
-
- <Ctrl-C>
- Hard CRs Toggles whether or not hard CRs in the message
- text should be displayed.
-
- <Ctrl-E>
- Echo info Toggles the state of the echo info. This function
- is only available in echomail folders.
-
-
- 9.3 Utilities <Alt-U>
-
- <Alt-F9>
- Management Invokes the management function.
-
- <Alt-J>
- Move/copy Allows you to move/copy the current message to
- another folder.
-
- <Alt-V>
- Message to file
- Exports the current message to an ASCII file. If
- the specified file already exists, you will be
- asked if you want to overwrite its contents or
- append the message to the end of the file.
-
- <Alt-I>
- Print message Adds the current message to the print queue.
- Messages added to the queue are printed in the
- order they were added. If you attempt to leave FM
- while messages are still being printed, it will
- ask you to confirm your choice to exit. If you
- choose to exit, FM will cancel the remaining
- messages in the print queue.
-
- FM does NOT use any external print spooler, such
- as DOS' PRINT program.
-
- <Alt-B>
- Renumber Renumbers the messages in the current folder so
- that there are no gaps in the numbering. This
- function is not available in Hudson Message
- Base-type folders.
-
-
-
-
- 67
-
-
-
-
-
- <Alt-G>
- Change username
- Allows you to change the current user profile.
-
- <Alt-W>
- Change address Allows you to change the active network AKA
- (address). This will also change the address that
- is inserted in origin lines in EchoMail folders.
-
- <Alt-O>
- Change origin Allows you to change the active origin line.
- Whether or not an origin line is appended to
- messages that you create is determined by the
- echo info setting (EchoMail folders only).
-
- <Alt-X>
- Show notes Displays extended information (hidden behind ^A,
- ASCII 1, characters) in a message.
-
-
- 9.4 Purge <Alt-P>
-
- The options on the Purge menu allow you to remove one or more
- messages, in the current folder, based on the various criteria,
- as described below.
-
- From user Purge all messages FROM the specified user.
-
- To user Purge all messages TO the specified user.
-
- From net address
- Purge all messages that originated from the
- specified address.
-
- To net address Purge all messages destined for the specified
- address.
-
- Received Purge all received (read) messages.
-
- Age Purge all messages older than the specified date.
-
-
- 9.5 Other keys in edit mode
-
- <Left>
- <Right>
- <Up>
- <Down> Moves the cursor.
-
- <Ctrl-Left> Places the cursor at the beginning of the word to
- the left of the cursor.
-
- <Ctrl-Right> Places the cursor at the beginning of the word to
- the right of the cursor.
-
-
-
-
- 68
-
-
-
-
-
- <Home> Moves to the beginning of the current line. If
- the cursor is already at the beginning of the
- line, it will be moved to the top of the text
- window.
-
- <End> Moves to the end of the current line. If the
- cursor is already at the end of the line, it will
- be moved to the bottom of the text window.
-
- <PgUp>
- <PgDn> Scrolls one page up/down.
-
- <Ctrl-Up>
- <Ctrl-Down> Scrolls one line up/down without moving the
- cursor. This option is only available for systems
- with 101/102 key (extended) keyboards.
-
- <Ctrl-PgUp>
- <Ctrl-PgDn> Moves to the beginning/end of the message.
-
- <Tab> Expands to four spaces (or to the next TAB
- column).
-
- <Shift-Tab>
- (Backtab) The opposite of Tab. Moves the cursor four spaces
- back (or to the previous Tab column). If the
- cursor is already at the beginning of the line,
- no action is taken.
-
- <Ins> Toggles insert mode on/off.
-
- <Del> Deletes character under cursor and scrolls the
- rest of the line left without moving the cursor.
-
-
- <Backspace> Deletes character to the left of cursor and
- scrolls the rest of the line left, moving the
- cursor one step.
-
- <Ctrl-End> Deletes from the cursor to end of line.
-
- <Ctrl-Y> Deletes the entire line.
-
- <Ctrl-U> Changes the case of the current line. Uppercase
- characters are converted to lowercase characters
- and vice versa.
-
-
- 9.6 Other keys in view (read) mode
-
- <Home> Move to first message in folder.
-
- <End> Move to last message in folder.
-
-
-
-
-
- 69
-
-
-
-
-
- <Left>
- <Right> Move to previous/next message in folder.
-
- <Up>
- <Down>
- <PgUp>
- <PgDn> Scroll message text (line or page).
-
- <Ctrl-PgUp>
- <Ctrl-PgDn> Move to beginning/end of message.
-
- <Space> Selects current message as "home" message. Note
- that once you switch to another folder, set
- "home" message is by default set to the current
- message.
-
- <Enter> Returns to home message.
-
- <Ctrl-Left>
- <Ctrl-Right> Find previous/next message addressed to current
- user.
-
- <->
- <+> Move to previous/next message in reply chain.
-
- <Ctrl-Home>
- <Ctrl-End> Move to first/last message in reply chain.
-
- <1..9> Go to specified message number.
-
- <Ctrl-Up>
- <Ctrl-Down> Move to previous/next tagged message. This
- requires that you first use <Alt-F9> (Management)
- and select the messages you wish to move between.
-
-
- 9.7 Entering new messages
-
- Press <Ins>. The screen will be refreshed and you will be
- prompted for the destination. If you are in the NetMail folder,
- you can use the name/address look-up function to specify the
- destination of the message; if you are in an EchoMail/Local
- folder, you must type the destination manually.
-
- Once you have specified the destination of a message, you will be
- prompted for the subject (Re:). If you want to send or request
- files to/from another system, select the proper status bits and
- specify the file data in the subject line. Note that the default
- message status (specified in FDSETUP) is always added, but can be
- changed.
-
- Enter the message text and press <Ctrl-Z> or <Alt-F10> to save
- the message.
-
-
-
-
-
- 70
-
-
-
-
-
- 9.8 Management <Alt-F9>
-
- The management function is used to perform global operations on a
- range of messages such as moving, printing, copying, deleting,
- etc.
-
- When you press <Alt-F9> for the first time in a folder, FM will
- scan all the messages in the folder and build a list of them.
- That list is kept in memory until you press <Alt-F9> in another
- folder, or when FM, for some reason, has to rebuild its internal
- message list for a folder. If you remove, add or renumber
- messages the list will be updated accordingly, so no rescan is
- necessary.
-
-
- 9.8.1 Main menu
-
- <Del>
- Kill Removes all selected messages.
-
- <F3>
- Print messages Prints all selected messages.
-
- <F4>
- Range select Allows you to select a range of messages
- matching a certain criteria.
-
- <F5>
- Select all Allows you to select all messages in the
- folder.
-
- <F6>
- Move Allows you to move all selected messages to
- another folder.
-
- <F7>
- Copy Allows you to copy all selected messages to
- another folder.
-
- <F8>
- Export to file Allows you to export all selected messages to
- an ASCII file.
-
- <Enter>
- Go to message Returns to view mode and makes the
- highlighted message the current message.
-
- <Space>
- Select Selects or deselects the current message.
-
-
-
-
-
-
-
-
-
- 71
-
-
-
-
-
- <Esc>
- Exit Returns you to view mode.
-
-
- 9.8.2 Continuous tagging
-
- If you activate Caps Lock, messages can be tagged (selected)
- by moving the bar with the arrow keys.
-
-
- 9.8.3 Range select <F4>
-
- The range select function allows you to select a range of
- messages matching a certain criteria. Most of the functions
- only require a partial match with the selected search
- criteria.
-
- <F2>
- From user Selects all messages from the specified user.
-
- <F3>
- To user Selects all messages to the specified user.
-
- <F4>
- Originating address
- Selects all messages originating from the
- specified address.
-
- <F5>
- Destination address
- Selects all messages destined for the
- specified address.
-
- <F6>
- Text Selects all messages containing the specified
- search string in the message body.
-
- <F7>
- Date Selects all messages between two dates.
-
- <F8>
- Subject Selects all messages matching the specified
- subject.
-
- <F9>
- Received Selects all messages with received (read)
- status.
-
- <Esc>
- Exit Returns you to the main menu of the
- management function.
-
-
-
-
-
-
-
- 72
-
-
-
-
-
- 9.9 Keyboard macros
-
- The keyboard macros are located on <F1> - <F10> (12) and <Shift
- F1> - <Shift-F10> (12). When a macro key is pressed, FM will
- insert its contents at the current cursor position. The following
- macros are supported:
-
- Sequence Expands to Key in FM
- ---------------------------------------------------------------
- ~~ ~
- ~| |
- | CR <Enter>
- ~B TAB <Tab>
- ~> Cursor one step to the right <Right>
- ~< Cursor one step to the left <Left>
- ~^ Cursor one line up <Up>
- ~V Cursor one line down <Down>
- ~F Reformat paragraph <Alt-F8>
- ~L Insert line <Ctrl-Enter>
- ~} Delete from cursor to EOL <Ctrl-End>
- ~T Delete from cursor to EOF <Ctrl-T>
- ~S Save message and keep original <Ctrl-Z>, 'N'
- ~# Save message and delete original <Ctrl-Z>, 'Y'
- ~U Current username
- ~! Invoke DOS shell <Alt-Z>
- ~E<prog><parm>; Execute program
- ~I<filename>; Import file <Alt-F2>
- ~R<filename>; Import file and remove it
-
-
- 9.9.1 Examples
-
- The sequence "~Edir /w>x.bak;~Rx.bak;" (without the quotes)
- will:
-
- 1. Execute "DIR /W>X.BAK"
- 2. Import X.BAK into the message text
- 3. Remove X.BAK
-
- Note that the semi-colon (;) is NOT optional for the
- "Execute" and "Import" macros. It determines the end of the
- program name and its parameters and/or the end of the name of
- the file to import.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 73
-
-
-
-
-
- The sequence "|~T|~B~B~BRegards,|~B~B~B~U|" (without the
- quotes) will:
-
- 1. Insert a CR
- 2. Delete the text from the cursor to the end of the
- message.
- 3. Insert another CR
- 4. Insert three TAB characters (equivalent to pressing
- <Tab> three times).
- 5. Insert the text "Regards," without the quotes
- followed by a CR.
- 6. Insert three TAB characters (equivalent to pressing
- <Tab> three times).
- 7. Insert the current user's name followed by a CR.
-
- Eg. ..
- <message text>
- ..
-
- Regards,
- John Doe
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 74
-
-
-
-
-
- 9.10 Carbon copies (CC)
-
- The Carbon Copy function, is more or less what the name implies.
- A function that allows you to send the same message to two or
- more recipients; a distribution list. The CC function is only
- active in the NetMail folder. CCs can also be used for File
- Attach and File Request messages.
-
- To use the CC function, put the text "cc:" (case does not matter)
- followed by one or more SysOp names or system addresses,
- separated by a comma, at the top of the message. Once you select
- to save the message, FM will scan the beginning of the message
- text for CC: and if found, process each element of the CC list.
- You can have more than one line with CCs. Eg.
-
- cc: bremin,#bodger,samet
- cc: howard,kasza,wallin,1:135/4
-
- Note that if you create several messages using the CC function,
- editing any of them will not reactivate the CC function. FM will
- only process a CC list the first time you enter a message (ie. a
- new message).
-
-
- 9.10.1 Hidden CCs
-
- To hide a recipient in a CC list, put the pound (#) character
- in front of the SysOp name or system address. Eg.
-
- cc: #1:135/20,#1:135/990,2:310/11
-
-
- 9.10.2 Using files as input to CCs
-
- You can also specify a file containing SysOp names or
- addresses to the CC function. Eg.
-
- cc: @betanote.txt
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 75
-
-
-
-
-
- 9.10.3 Address expansion
-
- All addresses in a CC list can be entered in short form, and
- several macros are recognized.
-
- cc: MYNET
-
- Will process your whole net and add every system to the CC
- list. Note that the previously supported notation
- "MYNET/node" (eg. MYNET/12) is no longer supported.
-
- cc: 2:310/*, 1:135/*
-
- Will include all systems in net 2:310 and 1:135.
-
- cc: 2:270/17.*
-
- Will include all listed point systems under 2:270/17.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 76
-
-
-
-
-
- 9.11 Crossposting (XC)
-
- Although CCs are not supported for EchoMail and Local folders,
- there is an additional function that provides you with a method
- of broadcasting the same message to two or more folders. This
- function is called crossposting, XC hereafter, and is not
- available in the noncommercial version.
-
- To use the XC function, put the text "xc:" (case does not matter)
- followed by one or more numbers, separated by commas. Each number
- represents a folder number where you want the message
- cross-posted. If your folder list looks like:
-
- 1 BNU
- 2 COMP.SYS.IBM.PC
- 3 FDECHO
- 4 TSECHO
- 5 NETSYSOP
-
- And you put "xc: 1,3,5" in a message in folder two. The resulting
- messages will have
-
- * Crossposted in BNU
- * Crossposted in COMP.SYS.IBM.PC
- * Crossposted in FDECHO
- * Crossposted in NETSYSOP
-
- At the top of each message. The target folder is excluded from
- the list. Ie. " * Crossposted in BNU " will appear in each
- message not going to the first (BNU) folder.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 77
-
-
-
-
-
- 10 Terminal
-
- Although FrontDoor was designed primarily as an e-mail system, it
- also features a powerful terminal emulator, hereafter called the
- Terminal. The Terminal features very accurate and efficient Terminal
- emulation and file transfer protocols; and several other features
- found in expensive and/or complex communications packages.
-
- The Terminal is invoked by pressing <Alt-J> from FD's main menu, or
- by specifying /T on the command line when FD is started. You can also
- choose to run FD in terminal-only mode, in which case the Terminal is
- brought up directly when you start it.
-
- Most functions of the Terminal are reached by holding down the <Alt>
- key and pressing a key, <A..Z>. If you press a key that has no
- function in the Terminal, it will display a message saying "Press
- Alt-H for help".
-
-
- 10.1 Menus
-
- Each function and menu of the Terminal will now be described.
-
-
- 10.1.1 File <Alt-F>
-
- The file menu contains functions to manipulate macros, upload
- and download files, transmit ASCII files, invoke DOS shell
- and Editor, etc.
-
- <Alt-G>
- Download files Receive one or more files from the remote
- system.
-
- <Alt-T>
- Upload files Transmit one or more files to the remote
- system.
-
- <Alt-A>
- Transmit ASCII file
- Allows you to transmit an ASCII file to the
- remote. You will be able to select the
- default inter-character delay and line
- translation. It is possible to create simple
- script or macro files by using this option.
-
- <Alt-V>
- Macro management
- Allows you to create and maintain your macro
- key sets. Use this function to make a
- different macro key set the active set.
-
-
-
-
-
-
-
- 78
-
-
-
-
-
- <Alt-E>
- Profile management
- Allows you to create, maintain, and select
- IEMSI session profiles. IEMSI is discussed in
- a separate section.
-
- <Alt-U>
- Command history
- The Terminal records your last ten typed
- lines. When you press Enter, it removes the
- oldest entry and adds the newly typed line to
- the list. You can choose any one of the ten
- history entries and retransmit it to the
- remote.
-
- <Alt-I>
- Editor Invokes the program defined in the Terminal >
- Miscellaneous > Editor field in FDSETUP. You
- will be asked for optional command line
- parameters, they are stored for the remains
- of your Terminal session. This could also be
- used to bring up external protocol menus,
- etc.
-
- Note that the FOSSIL driver is deactivated
- when leaving the Terminal and reactivated
- upon returning to the Terminal. This is to
- make sure FrontDoor maintain control of the
- FOSSIL driver even when loading other
- programs that could possibly leave the FOSSIL
- driver in a non-desirable state.
-
- <Alt-Z>
- DOS shell Invokes a temporary DOS shell. Type EXIT and
- press <Enter> to return to the Terminal.
-
- <Alt-Q>
- Quit Depending on how the Terminal was invoked,
- this will return you to FD's main menu or to
- DOS. If you are connected to a remote system
- when you press <Alt-Q>, you will be asked to
- confirm that you want to hang up.
-
-
- 10.1.2 Line settings <Alt-L>
-
- The line settings menu contains your current communications
- parameters. You cannot reach the options of this menu unless
- you press <Alt-L>. Most of the options in this menu are self
- explanatory, only the not so obvious options are explained
- here.
-
-
-
-
-
-
-
- 79
-
-
-
-
-
- BPS The current DTE baud rate. If you have
- enabled the "Lock port" option, this field
- will contain "Fixed" and you will not be able
- to change it.
-
- Wraparound Determines whether or not the Terminal should
- place the cursor on a new line when it is
- positioned at the rightmost position of the
- screen and a character is received. This
- should be set to On in most situations. There
- are however VT100/VT52 applications that
- require this setting to be Off. Note that a
- CR/LF will force a new line even if this is
- set to Off.
-
- CR expansion Determines how a received CR character should
- be processed. If set to CR, no expansion is
- made. If, however, it is set to CR/LF, the
- Terminal will expand all received CR
- characters to CR/LF.
-
- Local echo Some on-line services do not echo the
- characters you type. It may be necessary to
- enable this option to see what you are
- typing. If the on-line service you are using
- does echo the characters you type and you
- enable this option, you will get duplicated
- characters. Eg. "HHEELLLLOO!!".
-
- Emulation Allows you to choose between ANSI, VT100,
- VT52 and TTY (no) emulation. Note that the
- default for ANSI emulation is to support
- AVT/0+ (AVATAR/0+). This is a Terminal
- emulation protocol designed by G. Adam
- Stanislav. It is extremely fast and very
- efficient.
-
- Translation tables
- If enabled, the Terminal will use the
- Terminal translation tables to filter any
- received characters.
-
- Auto-Zmodem downloads
- The Terminal monitors received characters for
- the special sequence a Zmodem transmitter
- sends when a Zmodem file session is started.
- If it detects this start-up sequence, it will
- automatically invoke the Zmodem receiver. If
- you disable this option, you must use <Alt-G>
- (Download) to receive files using the Zmodem
- protocol.
-
-
-
-
-
-
-
- 80
-
-
-
-
-
- Allow AVT/0 sequences
- Determines whether or not you want to accept
- AVT/0+ emulation sequences when you are in
- ANSI emulation. Since AVT/0+ is based upon
- certain control characters, you may want to
- disable this option if you are using programs
- like Doorway, etc. which frequently transmits
- control characters.
-
- Clear on Form Feeds
- Determines whether or not the Terminal should
- clear the screen when receiving a Form Feed
- (FF, ASCII 12) character from the remote.
-
- Interactive EMSI
- Determines whether or not the Terminal should
- attempt to establish IEMSI sessions with
- systems you call. IEMSI is completely
- transparent and should not cause any
- problems. IEMSI is described in a separate
- section.
-
-
- 10.1.3 Session <Alt-S>
-
- <Alt-C>
- Capture Allows you to capture characters, as they appear
- on the screen, to a disk file, or logging it to a
- printer. Since the Terminal filters out NUL
- characters (ASCII 0), they will never appear in a
- capture file.
-
- Other characters and control sequences may not
- appear either, depending on what terminal
- emulation protocol is active at the time.
-
- <Alt-N>
- Conversation (chat)
- The conversation mode function splits the screen
- in half, creating two windows or sections on the
- screen. Data received from the remote system will
- be displayed in the top section, while the
- characters you type will be displayed in the
- bottom section.
-
- <Alt-D>
- Dial Allows you to dial a system in the nodelist. This
- function is disabled if no nodelist files are
- detected when the Terminal/FD is started. Note
- that you cannot queue numbers in the nodelist.
-
- <Alt-M>
- Manual dial
- Allows you to enter a number manually, which will
- then be dialed until you press the <Esc> key or a
- connection has been made. Note that you cannot
- queue manually entered numbers.
-
- 81
-
-
-
-
-
- <Alt-X>
- Disconnect Disconnects the current call and displays the
- elapsed time.
-
- <Alt-P>
- Phone directory
- Brings up the phone directory manager.
-
- <Alt-R>
- Reset timer
- Resets the on-line timer. The timer is
- automatically reset when a new connection is
- made.
-
- <Alt-B>
- Scroll back buffer
- Allows you to view data that has scrolled off the
- screen.
-
- <Alt-W>
- Send BREAK Sends a (short) BREAK signal to the modem.
- Consult the documentation for your modem
- regarding BREAK signals. This is often used to
- terminate inquiries to commercial on-line
- systems, etc. but can be treated differently by
- your modem.
-
- <Alt-J>
- Clear screen
- Clears the screen and moves the cursor to the
- upper left-hand corner.
-
- <Alt-Y>
- Initialize modem
- Transmits the Init-1..Init-3 modem strings as
- configured in FDSETUP under Modem > Command
- strings, followed by the Init string defined
- under Terminal > Miscellaneous, to attempt to
- initialize the modem.
-
- This is not available in the noncommercial
- version.
-
-
- 10.1.4 Options <Alt-O>
-
- Most Terminal emulators and communications packages have a
- status line, either at the top or at the bottom of the
- screen; on which they display various information about
- settings and the current connection. FrontDoor's Terminal
- does not have a status line, hence the options menu.
-
-
-
-
-
-
-
- 82
-
-
-
-
-
- 10.2 Keyboard macros
-
- Depending on how many function keys you have on your keyboard,
- you will have access to 20 or 24 keyboard macros for every macro
- set. You can have over 60,000 macro sets defined, but only one
- can be active at any time. The macro management function is
- reached by pressing <Alt-V>.
-
- The keyboard macros are located on <Shift-F1> - <Shift-F10> (12)
- and <Ctrl-F1> - <Ctrl-F10> (12). When a macro key is pressed, the
- Terminal will send the data specified as the macro string,
- uninterpreted, to the remote system. The two exceptions to this
- are the tilde (~) character which forces a one second pause, and
- the pipe (|) character which translates into a CR. Neither the
- tilde, nor the pipe character is transmitted to the remote
- system.
-
-
- 10.3 Raw mode
-
- The IBM PC keyboard generates two characters for every key you
- press. The first character is called the ASCII code, and the
- second character is called the scan code. Only the ASCII code is
- transmitted to the remote system by default. There are, however,
- some situations which require the Terminal software to transmit
- both codes. The AVATAR emulation protocol and the Doorway
- programs both require the complete codes (two characters) to
- identify certain keys; function and arrow keys in particular.
-
- Once raw mode has been enabled (by pressing the Scroll Lock key),
- you cannot reach any of the Terminal's regular functions. Raw
- mode is disabled by deactivating Scroll Lock.
-
-
- 10.4 Keypad modes
-
- The VT100 and VT52 emulation protocols require that the cursor
- keys transmit different codes depending on the state of the
- remote application. Most on-line services follows the VT100
- recommendation for this, but several Editors and other programs
- have their own ideas of how this should be handled.
-
- If you enable the numerical keypad (Num Lock), the white cursor
- keypad will transmit the numerical application codes for
- VT100/VT52. If you have an extended (101/102) keyboard, the grey
- cursor keys will not follow the numerical keypad setting.
-
- By using the <Shift> key together with the white cursor keypad,
- you can negate the setting of Num Lock temporarily. Ie. if Num
- Lock is enabled and you press <Shift-Up> (8), the Terminal will
- transmit the up key sequence to the remote. If Num Lock is
- disabled and you press <Shift-Up> (8), the Terminal will transmit
- the numerical application keypad sequence for 8.
-
-
-
-
-
- 83
-
-
-
-
-
- 10.5 PC keyboards
-
- When the remote (host) requests that the Terminal enters
- numerical application keypad mode, the Terminal automatically
- enables Num Lock. On extended (101/102) keyboards, this will also
- enable the Num Lock LED. The Num Lock LED on IBM-PC (standard)
- keyboards will not change by doing this. The Options, <Alt-O>,
- menu should correctly reflect the proper state of Num Lock
- anyway.
-
-
- 10.6 Phone directory <Alt-P>
-
- The phone directory allows you to define up to 200 (400 in the
- commercial version) numbers in addition to those stored in the
- nodelist database. The Terminal keeps the internal phone
- directory in a file named TERMPHON.FD, which is located in the
- SYSTEM directory.
-
- The top menu in the phone directory has nine options.
-
- <F1>
- Clear queue Removes the queue (Q) status from all entries in
- the phone directory. If no entries are listed in
- the queue, no action is taken.
-
- <F2>
- <Enter>
- Dial Adds the current (highlighted) number to the
- queue and proceeds to the dial function. If no
- connection is made, the Terminal will proceed to
- the next number in the queue. If no other numbers
- exists in the queue, the Terminal will wait the
- defined (in FDSETUP) number of seconds before
- trying again. You can abort dialing by pressing
- <Esc>.
-
- <F4>
- Edit existing entry
- Allows you to change an existing entry.
-
- <F6>
- Purge Removes all entries marked for deletion (small
- square) from the phone directory. There is no way
- to recover a removed entry, so use this option
- with caution.
-
- <F7>
- <Space>
- Toggle queue status
- Adds/removes the current (highlighted) number to
- the queue.
-
-
-
-
-
-
- 84
-
-
-
-
-
- <F8>
- Sort/Purge This option is similar to the PURGE option with
- one difference. It will sort the phone directory
- in ascending order, based on the name field.
-
- <Ins>
- Add entry Allows you to add a new entry to the phone
- directory.
-
-
- <Del>
- Mark for deletion
- Marks an entry for deletion (small square). No
- other action is taken. You must use the <F6> or
- <F8> function to remove entries marked for
- deletion.
-
-
- 10.6.1 Queue status
-
- The queue status is only retained while you are in the phone
- directory. Once you return to the Terminal, the phone
- directory is removed from memory.
-
-
- 10.6.2 Adding/changing entries
-
- When you press <F4> (Edit) or <Ins> (Add), the edit screen
- will appear. Press <F10> to save the entry and <Esc> to
- abandon the entry/changes.
-
-
- 10.7 Inactivity timer
-
- If you are not connected to another system, the Terminal function
- will be terminated automatically after ten minutes of inactivity,
- if there is no carrier signal. The timer is reset if a key is
- pressed and when the carrier signal changes.
-
-
- 10.8 File transfers
-
- When you transmit or receive files in the Terminal, it will
- automatically set the line parameters to no parity, eight data
- bits and one stop bit. Once the transfer is completed, the line
- parameters will be reset to whatever values they had prior to the
- transfer.
-
-
-
-
-
-
-
-
-
-
-
- 85
-
-
-
-
-
- 10.9 On-line timer
-
- The on-line time displayed in the Options, <Alt-O>, menu shows
- the elapsed time of the current connection in hours and minutes.
- It is not intended as a precise mechanism for cost calculations,
- etc. but will give you a rough estimate of the time you have
- spent on-line.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 86
-
-
-
-
-
- 11 Miscellaneous
-
- This chapter contains functions and options that are global to all
- programs in FrontDoor.
-
-
- 11.1 Destination of messages
-
- When you are prompted for an address and/or SysOp name for a
- message, you can use the look-up function. This is true for both
- FD, FM, and the Terminal. FM only allows you to use the look-up
- function for messages written in the NetMail folder.
-
- You do not have to use the look-up function, of course. You can
- enter a short form address, such as 10 (for node 10 in your own
- net), .1 (for point one in your own point net) in which case the
- SysOp's name is taken from the nodelist data. This is one of the
- most flexible functions in FrontDoor.
-
-
- 11.1.1 Name lookups
-
- If you specify "Homrig" as the destination, you will be
- prompted to select from a list of all users with a last name
- matching "Homrig" (Homrighausen for example). The network
- address will also be taken from the name you select.
-
-
- 11.1.2 Address browsing
-
- To enter the address browse mode, specify an incomplete
- address, such as "2:?", "2:270/?" or "2:270/17.?". You can
- then browse through all zones, regions, networks and
- pointlists known to your system.
-
- If you press <Enter> (and the input field is blank) when you
- are prompted for an address, you will be placed in browse
- mode in your own net.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 87
-
-
-
-
-
- 11.1.3 Address macros (NAMES.FD)
-
- You can also create a file containing short names which
- expands into a full address/SysOp name. The macros are
- located in a file called NAMES.FD which must be placed in the
- SYSTEM directory. The format of NAMES.FD follows:
-
- <alias>,<user name>,<address>[,<subject>]
-
- ALIAS The name you want to use for the macro.
-
- USER NAME The name you want FM to place in the TO: user
- name field.
-
- ADDRESS The network address you want as the destination
- when using the macro.
-
- SUBJECT The fourth and optional parameter can be used to
- insert a default subject in FM and also in the
- "File(s):" field in FD when using the "Mail
- services" options "Request files" and "Transmit
- files".
-
- Eg. oci,James Smith,1:132/300
- am,AreaMgr,2:512/1,MyAreaMgrPassword
- joho,joaquim homrighausen,2:270/17
- tebe,tomas bremin,2:270/7
- tj,Tom Jennings,1:125/111
-
- Would allow you to place "*oci", "*am", "*joho", "*tebe",
- and "*tj" anywhere you are prompted for a network address
- or user name, including carbon copies (CC).
-
- A special format can also be used to automatically address
- messages to UUCP and INTERNET gateways. By putting a
- commercial at character (@) as the first character of the
- user name field (second field), you indicate to FM that the
- macro should receive special treatment.
-
- Eg. dn,@INTERNET/david@csource.oz.au,2:241/999
-
- Would place "INTERNET" in the message header's
- TO: field and address the message to 2:241/999.
- On the first line of the message text, it would
- put "TO: david@csource.oz.au".
-
- If no forward slash (/) is found in the user name
- field (where "INTERNET" is above), FM defaults to
- putting "UUCP" in the message header's TO: field.
-
- This cannot be used for carbon copies (CC).
-
-
-
-
-
-
-
- 88
-
-
-
-
-
- 12 File Requests
-
- This section will explain and discuss the various aspects of File
- Requests. There are two types of Requests, File Request and Update
- Request. The latter is basically a File Request that triggers a
- mechanism to only send the requested files if they are more recent
- than those found on the requesting system. Two basic terms have to be
- explained and understood:
-
-
- Outbound Requests A File or Update Request created and
- transmitted by your system to another,
- remote, system.
-
- Inbound Requests A File or Update Request transmitted by
- another system to your system.
-
- There is no mechanism in FD to control how an outbound Request is
- treated by the remote system. FD strictly deals with controlling the
- access to and security of your system (inbound Requests).
-
-
- 12.1 Outbound Requests
-
- When you want to Request one or more files from a remote system,
- you may do so using several different methods:
-
- 1. By using FM and entering a message with File or Update
- Request status. The files you want to request from the
- remote system are listed on the subject (Re:) line of the
- message and you set FilReq or UpdReq to indicate that FD
- should give the message special treatment.
-
- 2. By using FD's temporary mail services, which are accessed
- with <Alt-M> from FD's main menu. Whether or not the
- Request is treated as an Update Request or File Request
- is determined by how you specify the filename(s) in the
- File(s): field. If you include a path, FD will treat it
- as an Update Request, otherwise, it will be treated as a
- File Request.
-
- Requests created this way will not remain if FD is
- brought down (for one reason or another) as they are
- intended for temporary, quick and dirty, purposes only.
-
- 3. Use a robot utility, such as XRobot, to create the File
- or Update Request message(s).
-
- Note that an Update Request with no matching target, that is, you
- have attempted to Update Request a file that does not exist on
- your system, is automatically converted to a File Request.
-
-
-
-
-
-
-
- 89
-
-
-
-
-
- 12.2 Requesting files with a password
-
- Since files and directories can be protected with passwords, it
- may be necessary for you to present a password in order to
- request certain files from a remote system.
-
- To add a password to an outbound File or Update Request, you
- simply put the password preceded by a space character and a '!'
- character. Ie. <filename> !<password>. Regardless of whether you
- are creating the Request in FM or from FD's Request function,
- this is the format used to specify passwords.
-
-
- 12.3 Update Requests
-
- As mentioned before, an Update Request is really a File Request.
- The difference is that an Update Request is used to "update" a
- file that already exists on your system. The mailers accomplish
- this by transmitting the date and time of the existing file, the
- system that processes (receives) the Update Request then compares
- this with the requested filemask and sends any matching file that
- has a later date and time.
-
-
- 12.4 Inbound Requests
-
- You can control which directories should be accessible from the
- "outside world" during a Request. This is accomplished by telling
- FD which directories should be searched for matches. How FD
- handles inbound Requests depends on how you have configured the
- Mailer > File requests option screen in FDSETUP.
-
-
- 12.4.1 Request modes
-
- There are three different modes which decide how FD treats a
- Request from a remote system.
-
- 1. Anyone can request. This means that FD will allow any
- system to Request files from your system, subject to
- event behaviors and other modifiers.
-
- 2. Systems in nodelist can request. Similar to (1), but
- FD will only process Requests received from systems
- that are listed in your Nodelist database.
-
- 3. No requests. Forces FD to ignore any received
- Requests, effectively disabling the ability to
- request files from your system.
-
-
-
-
-
-
-
-
-
- 90
-
-
-
-
-
- 12.4.2 Directory listings
-
- The directory list file is a plain vanilla ASCII file with
- one directory (complete path) per line. This is used by FD to
- determine which directories should be searched for a file
- that is being requested by a remote system. No other
- directories than those listed here will be searched.
-
- Two separate list files can be defined in FDSETUP under
- Mailer > File requests. The first one, LIST, is used for
- unprotected sessions. The second one, SECLIST, is used for
- password protected sessions; allowing you to make different
- directories available for Request depending on the status of
- the session. If no SECLIST file has been defined, FD will use
- the LIST file for password protected sessions as well.
-
- Please note that each line defines a directory and not a
- filemask. All files in the specified directory will be
- available for Request, subject to password protection and
- other factors.
-
-
- 12.4.3 Alias listings
-
- The alias list file is a plain vanilla ASCII file with one
- alias definition per line. Alias definitions are useful to
- allow remote systems to use the same name when requesting
- files that change frequently, such as a file list or another
- file with similar contents. The remote system simply requests
- the "alias" and FD will send whatever files you have defined
- to send for that alias.
-
- Eg. FRODO C:\FILES\FDKIT.ARJ
- XR C:\FILES\XROBOT.ARJ
- RACCESS C:\FILES\RA*.ARJ
- MYSECRET C:\TEST1.ARJ C:\TEST2.ARJ
-
- The remote system can request FRODO, XR, RACCESS or MYSECRET
- and get the above specified files. Files listed as alias
- names do not have to be located in requestable (see
- "Directory listings") directories.
-
- Two separate alias files can be defined in FDSETUP under
- Mailer > File requests. The first one, ALIAS, is used for
- unprotected sessions. The second one, SECALIAS, is used for
- password protected sessions; allowing you to make different
- alias definitions available for Request depending on the
- status of the session. If no SECALIAS file has been defined,
- FD will use the ALIAS file for password protected sessions as
- well.
-
-
-
-
-
-
-
-
- 91
-
-
-
-
-
- 12.4.4 Response message
-
- In the event that FD cannot satisfy a Request for one reason
- or another, it will return a message to the requesting system
- telling it why the request(s) could not be satisfied.
-
- If you have specified a filename for the MESSAGE option,
- under Mailer > File requests, FD will attempt to open the
- specified file and append its contents to the end of the
- automatically generated response message.
-
-
- 12.4.5 Limiting Requests
-
- You can choose to place a limit on how many files, how many
- kilobytes, and/or how long a Request may take. This allows
- you to fine tune your system for maximum efficiency.
-
- Max match The maximum number of files your system will
- send during one Request session. If the
- remote system requests an alias filename that
- expands to two files, the request is counted
- as two files. A setting of zero disables this
- feature.
-
- Max size The maximum amount of data (in KB) your
- system will send during one Request session.
- Note that if the remote system requests an
- alias filename that expands into two files,
- the size of both files is checked. A setting
- of zero disables this feature.
-
- Max time The maximum time (in minutes) the resulting
- files of a File or Update Request may take to
- transfer. Before sending each file, a check
- is made to see if sending the file will cause
- this limit to be exceeded. If so, the file is
- skipped and the next file in the list will be
- checked. A setting of zero disables this
- feature.
-
- Minimum speed The minimum baud rate required to allow
- Requests. If the current connection is at a
- lower speed, Requests will not be honored.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 92
-
-
-
-
-
- 12.4.6 Limited hours
-
- You may also choose to limit the access of your Request
- functions to certain days and certain hours of those days.
-
- Limited Enables limited hours.
-
- Start The time of day when your system should start
- honoring Requests. This setting can only be
- changed if the LIMITED option is enabled.
-
- End The time of day when your system should stop
- honoring Requests. This setting can only be
- changed if the LIMITED option is enabled.
-
- Days Defines on which days your system will honor
- Requests.
-
-
- 12.4.7 Event restrictions
-
- Ultimately, whether or not your system will honor Requests is
- controlled by the current event's behavior. If the ALLOW FILE
- REQUESTS option is set to NO, Requests will not be honored.
-
-
- 12.4.8 Protecting files and directories
-
- You may want to protect access to certain files and
- directories, just like another system may require you to
- present the proper password to request one or more files. See
- "Outbound Requests".
-
- The Request Manager in FDSETUP is used to protect Inbound
- Requests.
-
- Filename/
- Directory Defines the filename/directory you want to
- protect. This is NOT an exclusive name. If you
- set this field to C:\HIDDEN\ and define a
- password, all Requests that result in files being
- sent from C:\HIDDEN\ are protected. If you set
- this field to MYSECRET.ARJ and define a password,
- the file MYSECRET.ARJ will only be sent if the
- requesting system presented the proper password.
-
- Password Defines the password for the specified
- file/directory. The requesting system have to
- present this in its request to get the file(s).
- These passwords are treated case insensitive.
-
- Entries with inactive status in the Request Manager are
- ignored by FD. Note that Alias definitions can also be
- protected by placing the name of the Alias definition in the
- Filename/Directory field.
-
-
-
- 93
-
-
-
-
-
- 13 Swapping
-
- Both FM and FD requires over 220 KB of RAM. If you shell to DOS, or
- load another program from FD, this memory is not freed. FrontDoor
- allows you to swap out the memory used by FD and FM, either to
- XMS/EMS memory or to a disk file. If you have specified that you want
- the programs to use XMS/EMS memory for swapping but there is not
- sufficient XMS/EMS memory available, the swap image is written to
- disk. The swap file is placed in the SYSTEM directory and removed
- when you return to the program.
-
- If you enable swapping for FD, it will be swapped out when you invoke
- a DOS shell and when you invoke other programs. The FD swap setting
- also affects the Terminal. The Terminal will not flush its
- scroll-back buffer to disk if any type of swapping is enabled for FD.
-
- Once the swap image has been created and written to XMS/EMS memory or
- a disk file, all used (by FD/FM) memory is freed except between three
- and five KB which will always remain in memory.
-
- 13.1 Complete path specifications
-
- To avoid problems when you enable swapping to XMS/EMS memory or
- to a disk file, it is recommended that all the filename and
- directory specifications under Global > Filenames in FDSETUP
- contain complete path specifications, including a driver
- specifier.
-
- If you choose to swap to a disk file, it is further recommended
- that you specify a complete path to where you want the swap files
- to be placed (Global > FileNames > Swapping).
-
-
- 13.2 Loading programs in a DOS shell
-
- Make sure that you do not load any TSR (Terminate and Stay
- Resident) programs, such as DOS' PRINT and SideKick, when you are
- in a DOS shell. Failure to follow this advice may lead to system
- lockups when you attempt to return to FD or FM.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 94
-
-
-
-
-
- 14 CRT environments
-
- All programs in the FrontDoor package are screen environment aware
- and most of them can adjust to most (if not all) screen sizes as long
- as the current screen mode has 80 or more columns (horizontally).
-
- If you have an EGA or VGA card that allows you to set the screen mode
- to something like 132x28 and you want to use this in FM, FD, or the
- Terminal, you should specify that you want the AUTO screen mode for
- that particular program. This will prevent it from altering the
- screen mode.
-
- Please note that if you run FD in AUTO mode, you must run FM and the
- Terminal in AUTO mode as well, if you plan to load either from FD
- (and not just from DOS). Otherwise, FD will display garbage data on
- the screen when you return from the Terminal. The opposite (running
- the Terminal in AUTO and FD in 25 or 43/50) is, however, properly
- handled.
-
- To set extended screen modes (except 80x43 and 80x50), you must use
- an external utility in the noncommercial version. The commercial
- version allows you to specify video BIOS parameters to set and reset
- extended screen modes.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 95
-
-
-
-
-
- 15 Message Status Bits
-
- Message status bits determines how FD will treat outbound (outgoing)
- messages and how FM will treat locally destined messages. The Message
- status menu is accessed by pressing <Alt-S> in FM and is also
- displayed when entering a new message and changing the subject of a
- message.
-
- The keys listed refer to the status menu in FM.
-
-
- <Ctrl-P>
- Private Indicates that the message should only be read by the
- addressee.
-
- <Ctrl-C>
- Crash High-priority mail. Messages with crash status can
- never be routed or held by a route file (see Mail
- routing). Crash messages do, however, NOT override
- any cost restrictions for an event; they also require
- that the destination system has been qualified before
- FD will call it.
-
- <Ctrl-H>
- Hold The hold status will force FD to ignore the message
- unless the destination system calls your system to
- pick up its mail. If the message is destined for a
- point system and the boss of the point system calls
- your system, the message will be given to the boss
- unless the message also has Direct status.
-
- <Ctrl-F>
- File Indicates that the message has one or more files
- attached to it. The files are listed in the subject
- (Re:) line. File attach messages can be routed and
- held unless another status bit (Crash, Immediate,
- Hold, etc.) prevents it. The default treatment of a
- file attach message is to send it directly to its
- destination.
-
- <Ctrl-R>
- File Request Indicates that the message is a File Request. The
- requested files are listed in the subject line and
- may contain wild-cards characters. File request
- messages can be held, but are never routed. See "File
- Requests".
-
- <Ctrl-U>
- Update request Similar to a File Request, <Ctrl-R>, but the subject
- line (Re:) must contain valid (existing) file
- specification(s). When FD connects to the destination
- system, the requested files will only be sent by the
- remote if they are more recent than the matching
- files on your system. See "File Requests"
-
-
-
-
- 96
-
-
-
-
-
- <Ctrl-K>
- Kill/Sent Removes the message after it has been sent or picked
- up. If the Kill/Sent status is not set on a message,
- it will be marked as sent after it has been sent or
- picked up.
-
- <Ctrl-T>
- Truncate file/sent
- Truncates the attached files to zero length after
- they have been sent or picked up. This option is only
- valid for file attach messages.
-
- Note that it is nearly impossible to recover a
- truncated file so use this option with caution.
-
- <Ctrl-E>
- Delete file/sent
- Removes the attached files after they have been sent
- or picked up. This option is only valid for file
- attach messages.
-
- <Ctrl-D>
- Direct Similar to the Crash status, with the difference that
- they can be held. Messages with the Direct and Hold
- status combined require that the destination system
- (including points) call in to pickup their mail.
-
- <Ctrl-I>
- Immediate mail Similar to the Crash status, but messages with
- immediate status will be sent at the first
- opportunity, ignoring all restrictions and
- qualifications. If there is one or more messages with
- immediate status to a system, all other messages
- (except those with hold status) to that system will
- be added to the mail packet.
-
- USE THIS OPTION WITH CAUTION!
- <Ctrl-L>
- Lock Locks a message from further access. This is done by
- setting the DOS attribute to read-only and adding a
- special flag to the message text. FD and most other
- utilities will ignore message files (.MSG) with
- read-only attribute.
-
- Messages with lock status cannot be removed by any of
- the purge functions and will never be sent (or picked
- up). FM can, however, renumber a folder containing
- one or more messages with locked status.
-
- <Ctrl-S>
- Sent Indicates that the message has been sent or picked up
- by the addressee. Once a message has been flagged as
- sent, they cannot be sent or picked up by the
- addressee.
-
-
-
-
- 97
-
-
-
-
-
- <Ctrl-Z>
- No status Clears all status bits.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 98
-
-
-
-
-
- 16 Mail routing
-
- This is one of the most complex parts of FrontDoor and takes
- considerable time to learn and understand. Make sure you understand
- how each routing verb affects mail routing before you use it.
-
- When FD is brought up, it scans for any active events and when one is
- found, opens the route file, ROUTE.FD, and uses it to determine whom
- to send mail to, and how to send it. The route file must be placed in
- the SYSTEM directory. If the timestamp of the route file is modified,
- FD will detect it and re-scan the NetMail folder (see "Semaphores").
-
- Global routing verbs are those that appear before any SCHEDULE
- keyword in the route file. They are always used, so you can specify
- routing that is identical for all your events here.
-
- Local routing verbs are those that appear between two schedule
- keywords (a schedule block) in the route file. FD determines which
- schedule block to use by searching for a schedule keyword with a tag
- (letter) matching the current event tag (see "Events").
-
- Several references are made to Hold status in this chapter. Do not
- confuse this with the HOLD route verb. The Hold status refers to the
- message status bit (see "Message Status Bits"), or where stated, to a
- system's nodelist status.
-
- FD allows you to insert comments in your route file. Every line with
- a semicolon as the first non-space (TAB/Space) character is treated
- as a comment. While comments may seem inadequate at first glance, it
- is a very useful function. Going back to a route file you wrote five
- months ago may not be your definition of spending a weekend in joy
- and happiness.
-
- Addresses specified in the route file should always be fully
- expressed. The * macro (implying "ALL") is supported. You can also
- use nodelist flags to specify a range of systems. The routing
- language is completely case insensitive (case does not matter).
- SCRIPT, SCripT, and scRIPt are all treated as the same command.
-
-
- 16.1 Default routing
-
- FD has several default rules for routing that will be used if no
- other rules have been defined for a specific system. Some of the
- default rules cannot be overridden by routing verbs.
-
-
-
-
-
-
-
-
-
-
-
-
-
- 99
-
-
-
-
-
- 16.2 Message status
-
- Messages with immediate (IMM hereafter), Crash, File/Update
- Request, and Direct status will normally not be routed. They are
- sent directly to the destination system, with the exception of
- systems without a telephone number, as described later.
-
- Messages with IMM or Crash status can never be held by using the
- HOLD keyword. Messages with Crash status can, however, be
- prevented from being sent by event behavior, qualification lists,
- and cost restrictions, but never held with the HOLD route verb.
-
- Messages with Hold status will NEVER be packed into a mail
- packet. They can always be picked up by the destination system.
- Messages to points with Hold status can and will be picked up if
- the Boss of the point calls to pickup mail, unless the message
- also has Direct status.
-
- Messages with IMM status will always be packed into mail packets,
- overriding ANY event restrictions. If you have a message with IMM
- status, FD will add all other qualifying messages to the same
- system to the same mail packet.
-
- Messages with Received (read), Orphan, Lock, and/or Sent status
- are ignored by FD.
-
-
- 16.3 Host/Hub/Boss routing
-
- Messages not otherwise prevented from being routed will by
- default be sent to the destination system's HOST (see "Nodelist")
- if the destination system is outside your own net and to its HUB
- if it is within your own net.
-
- If you have mail for a system listed as DOWN in your nodelist
- database, it will never be packed. If the system calls your
- system to pick up mail, it will receive its mail.
-
- If you have mail for a system listed as HOLD or PVT (no telephone
- number) in your nodelist, the default behavior is to send the
- mail via the system's Host, Hub, or Boss. If the mail to a HOLD
- or PVT listed system contains file attaches, the mail packet will
- by default be placed on hold for the Host/Hub, or go directly to
- the Boss in the case of a point.
-
- Messages to systems not in your nodelist (unlisted systems) will
- not be Host/Hub routed by default, but they can be routed by
- using route verbs.
-
- Messages with Crash, IMM or Direct status, destined for points to
- which FD cannot place a call directly will retain its status (and
- restrictions), but FD will instead assume the point system's Boss
- as the destination.
-
-
-
-
-
- 100
-
-
-
-
-
- 16.4 Qualifying systems
-
- Before FD will send mail to a system, it must be qualified by
- specifying its address, or a macro that includes its address in a
- SCHEDULE block (this is not true for IMM mail as previously
- described).
-
- You can qualify a system by placing a SEND-TO statement in the
- global section of a route file, but this is NOT RECOMMENDED.
- SEND-TO, POLL and the optional SEND-LIST after a Schedule command
- are the only available methods to qualify a system for mailing.
-
- If FD cannot find ROUTE.FD, mail to all systems will be put on
- hold for the destination system to call in and pickup its mail.
-
-
- 16.5 Route commands
-
- SCHEDULE <TAG> [SEND-LIST]
-
- Defines the start of a schedule block. All commands following a
- Schedule command are considered a part of the same block until
- another Schedule command is encountered.
-
- TAG is a letter corresponding with the event tag, defined in
- FDSETUP (see "Events"). You should only have one Schedule block
- per defined event tag.
-
- The optional SEND-LIST parameter should contain the systems to
- qualify for the event.
-
-
- SEND-TO <SEND-LIST>
-
- Qualifies the specified systems. This is identical to the
- optional SEND-LIST after the Schedule command.
-
-
- HOLD <LIST>
-
- Hold mail for the specified systems.
-
-
- UNHOLD <LIST>
-
- The opposite of HOLD. Useful if you have global HOLD statements
- and want to negate the effect of those statements for one or more
- systems.
-
-
-
-
-
-
-
-
-
-
- 101
-
-
-
-
-
- NO-ROUTE <LIST>
-
- Send mail to the specified systems directly. This overrides the
- default routing rules. Some logics is applied to "directly" when
- using the NO-ROUTE command. Systems which FD cannot mail directly
- will be sent "as directly as possible".
-
- If <LIST> includes a system listed as PVT (unpublished telephone
- number), for example, FD evaluates the "NO-ROUTE" as "NO-ROUTE
- this message to the system's nearest Host/Hub".
-
-
- DIRECT <LIST>
-
- Unconditionally send mail to the specified systems directly (you
- can still place it on hold by using the HOLD command). No logics
- is applied to this command, and if FD cannot call the specified
- systems, the resulting mail packets are placed on hold
- automatically. Note that a system must still exist for this to
- apply. If a system that is included in a DIRECT <LIST> does not
- exist, the message will be stamped "Orphan" and not included in a
- mail packet, but it can still be picked up by the destination
- system.
-
-
- ROUTE-TO <TARGET> <LIST>
-
- Route mail (excluding file attach messages) for the specified
- systems through TARGET. This automatically implies "NO-ROUTE
- <TARGET>", ie. the target system's mail will not be routed
- through another system, even if so previously stated.
-
-
- HOST-ROUTE <LIST>
-
- Route messages, not otherwise prevented from being routed, for
- the specified systems through their HOST system.
-
-
- HUB-ROUTE <LIST>
-
- Route messages, not otherwise prevented from being routed, for
- the specified systems through their HUB system.
-
-
- ROUTE-FILES <TARGET> <LIST>
-
- Route file attach messages (excluding normal mail) for the
- specified systems through TARGET. This automatically implies "NO-
- ROUTE <TARGET>", ie. the target system's mail will not be routed
- through another system, even if so previously stated.
-
- You should ask the SysOp of the TARGET system if he allows you to
- route files through his system before using this command.
-
-
-
-
- 102
-
-
-
-
-
- POLL <LIST>
-
- Force FD to call the specified systems even if there is no other
- mail destined for them. This does not effect the routing of
- existing mail destined for the specified systems. The POLL
- command unconditionally qualifies a system for mailing. Each
- system in LIST will only be called once. If an event is
- restarted, FD will not call systems that it has already polled.
-
-
- EXCEPT <LIST>
-
- Specifies an exception to the LIST of the previously used
- command.
-
-
- FORWARD-FOR <LIST>
-
- Tells FD that you allow the specified systems to send mail
- (excluding file attach messages) through your system. Note that
- this does not place any restrictions of the destination of the
- forwarded mail.
-
-
- FORWARD-TO <LIST>
-
- Tells FD that you allow mail (excluding file attach messages) to
- be forwarded through your system ONLY if it is destined to any of
- the specified systems. This is a more secure alternative to the
- FORWARD-FOR command.
-
-
- FILES-FOR <LIST>
-
- Identical to FORWARD-FOR, but for file attach messages.
-
-
- FILES-TO <LIST>
-
- Identical to FORWARD-TO, but for file attach messages.
-
-
- DENY <LIST>
-
- Allows you to prevent the specified systems from picking up
- waiting mail. FD will still accept incoming mail from the
- specified systems. This can be used to prevent local (or other
- low-cost) systems from picking up their mail in national mail
- events, etc.
-
-
-
-
-
-
-
-
-
- 103
-
-
-
-
-
- SCRIPT <SCRIPT FILE> <LIST>
-
- Tells FD to use the SCRIPT FILE when calling the specified
- systems instead of the telephone number (if any) in your nodelist
- database. Script files are explained in a separate section.
-
-
- NO-SCRIPT <LIST>
-
- Prevents FD from using default script handling for the specified
- systems. Script files are explained in a separate section.
-
-
- 16.6 LIST specifications
-
- You can use a variety of formats to specify a list of systems for
- a route verb. A few follows:
-
- * All systems
-
- 2:* All systems in zone two
-
- 2:270/* All systems in zone two, net 270.
-
- 2:270/1 2:270/1 and all points under it.
-
- 2:270/1.0 2:270/1 but no points under it.
-
- 2:270/1.1 2:270/1.1.
-
- MYNET All systems in your own net. Note that the result
- of this format depends on which AKA FD is
- operating under. This is normally your primary
- AKA.
-
-
- 16.7 Using nodelist flags
-
- When you specify system LISTs to a route command, you can use
- nodelist flags in place of address information. Most of the
- available mail and system related nodelist flags are supported by
- FD. You can mix flags and address information as you wish. A few
- follows:
-
- HST CM All systems with HST or CM in their nodelist
- entry.
-
- !HST All systems that do not have HST in their
- nodelist entry. The ! character negates the
- meaning of a flag.
-
- !HST !CM All systems that do not have HST _or_ CM in
- their nodelist entry.
-
-
-
-
-
- 104
-
-
-
-
-
- !HST CSP All systems that do not have HST in their
- nodelist entry and all systems that have CSP
- in their nodelist entry.
-
- 1:1/101 HST CM 1:1/101 and all other systems with HST or CM
- in their nodelist entry.
-
-
- 16.8 File routing/forwarding
-
- FILES-FOR and FILES-TO will mark all in-transit (not destined for
- your system) file attach messages as Del/Sent (see "Message
- Status Bits"). If you receive the same file destined for two
- different systems, the file will not be removed until it has been
- sent to (or picked up by) both systems.
-
-
- 16.9 Message forwarding
-
- When FD unpacks received mail packets, it will always mark
- messages as in-transit if they are not destined for your system
- (including any AKAs). These messages can be forwarded by using
- FORWARD-FOR and FORWARD-TO, but FD will under NO circumstances
- forward mail, that has not been entered or modified locally,
- automatically to systems unless one or both of these two commands
- are used.
-
-
- 16.10 Multiple zones
-
- If you are operating under more than one AKA listed in different
- zones, it is important to explicitly specify a zone for address
- information in the route file.
-
-
- 16.11 Examples
-
- Here are a few examples of route files and how to use route
- commands:
-
-
- schedule @ *
-
-
- This is the most simple of route files and qualifies all systems
- for mailing. It will force FD to use its default routing rules
- for mail to all systems.
-
-
-
-
-
-
-
-
-
-
-
- 105
-
-
-
-
-
- schedule @ *
- route-to 2:512/1 2:*
- hold 2:512/1 !CM !HST
-
- This qualifies all systems for mailing, routes all mail destined
- for zone two through 2:512/1, and places the mail for 2:512/1
- (including the routed mail) and any systems, that do not have the
- CM or HST flags in their nodelist entry, on hold.
-
-
- schedule @ MYNET
-
- This qualifies all systems in your own net and uses default
- routing.
-
-
- schedule @
- send-to 1:* 2:* 3:*
- route-to 2:512/1 2:*
- except 2:201/329
- 2:201/130
- route-to 3:632/348 3:*
- deny MYNET
-
- This qualifies all systems in zone one, two, and three. Routes
- all mail destined for zone two through 2:512/1 except for mail
- destined 2:201/329 and 2:201/130, routes all mail destined for
- zone three through 3:632/348, and prevents systems in your own
- net from picking up their mail.
-
-
- schedule B *
- hold *
- except 2:*
- no-route 2:*
-
- This qualifies all systems, holds all mail except mail destined
- for systems in zone two, and sends mail destined for zone two
- directly to its destination.
-
-
- hold *
-
- schedule D MYNET
- unhold MYNET
-
- schedule A 1:*
- unhold 1:*
-
- This holds all mail by default (the HOLD command is in the global
- section).
-
- Schedule D sends mail to all systems in your own net.
-
- Schedule A sends mail to all systems in zone one.
-
-
-
- 106
-
-
-
-
-
- 16.12 Dynamic packing
-
- Whenever a mail event is started, FD scans the messages in the
- netmail folder and possible packets are built. Messages that do
- not qualify to be processed will not be packed (but kept in the
- internal list). If a system calls in, FD will scan the message
- list stored in memory and create a mail packet on the fly and
- immediately send it to the calling system. So mail is always
- available, 24 hours/day.
-
- This means that your system does not have to be in an event for
- other systems to pickup their mail. Note that you can prevent
- systems from picking up their mail with the DENY command and by
- modifying an event's behavior.
-
-
- 16.13 Regarding points
-
- Points of other systems are always treated as their boss system
- unless you explicitly specify the boss or a point. To ONLY
- reference a boss system, without referencing its points, use .0
- (eg. 2:270/17.0).
-
- If you have the telephone number for another system's points, the
- will be treated just like any other node. Ie. you can send mail
- to them directly.
-
-
- 16.14 Order of evaluation
-
- The route file is evaluated (processed) from top to bottom.
- Because of this, it is wise to put the "global" (affecting all
- systems) first, followed by the exceptions. Eg.
-
- route-to 2:512/1 *
- no-route 2:270/17
-
- will result in all mail being routed via 2:512/1, except mail for
- 2:270/17, which is sent directly to 2:270/17.
-
-
- The only route command that cannot be overridden in this manner
- is the ROUTE-FILES command. It is therefore required that you use
- the EXCEPT keyword to override a ROUTE-FILES command where
- necessary. Eg.
-
-
- route-files 2:512/1 *
- except 2:270/17
-
- will result in all file attaches messages being sent via 2:512/1,
- except file attach messages destined for 2:207/17, which are sent
- directly to 2:270/17. The only other way to override the effects
- of a ROUTE-FILES command is to use the DIRECT command.
-
-
-
-
- 107
-
-
-
-
-
- 16.15 TARGET vs. qualification
-
- Note that only actual <TARGET> systems, and systems which you
- have told FD to send mail directly to, or systems not otherwise
- included in default routing, need to be qualified.
-
- route-to 2:512/1 *
- no-route 2:270/17
-
- schedule @ 2:512/1 2:270/17
-
- Note that even if you have mail for a non-qualified system (ie. a
- system other than 2:512/1 and 2:270/17), it would be routed to
- 2:512/1, and qualified for sending (via 2:512/1), using the above
- scenario.
-
-
- 16.16 Restrictions
-
- A <TARGET> system cannot contain a point address.
-
- You can not route mail destined for your own systems via another
- system.
-
-
- 16.17 Macros
-
- MYZONE All systems in your zone.
- MYNET All systems in your net.
- MYPOINTS All points under your system.
-
-
- 16.18 Supported nodelist flags
-
- Note that the meaning of the following flags can be negated by
- placing a '!' character in front of them, eg. !HST.
-
- CM, MO, HST, H96, PEP, MAX, XA, XB, XC, XP, XW, XX, MNP, V29,
- V32, V33, V34, V42, V42B, V32B, CSP.
-
- All FrontDoor systems should have the "XA" flag in their nodelist
- entry.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 108
-
-
-
-
-
- 17 EMSI and IEMSI
-
- EMSI (EMSC-001 and FSC-0056) or "Electronic Mail Standard
- Identification" is a handshake method developed by Joaquim H.
- Homrighausen and Chris Irwin (author of D'Bridge). It provides
- features and flexibility that other handshake methods, such as FTS-1
- and FTS-6 (YooHoo), do not offer.
-
- The two major advantages of the EMSI handshake method is the ability
- to pickup mail for all your AKAs in one call, and unlimited expansion
- of the data (handshake packets) exchanged when a session is
- negotiated. I will not go into any technical details about EMSI here,
- I will, however, describe the handling of the multiple AKAs.
-
- The EMSI handshake is supported by FrontDoor, AirMail, TrapDoor, and
- D'Bridge. I expect other packages such as BinkleyTerm to add support
- for it in the near future. EMSI does not interfere with other
- handshake protocols such as FTS-1 and FTS-6.
-
-
- 17.1 Passwords
-
- If you have established or wish to establish a session level
- password for a certain system, you must make sure that you have
- entered all AKAs of that system in the Security Manager. All
- entries must have the same password.
-
- For example, let us assume you want to establish a session level
- password with 1:135/142 which is also 26:1305/142. You should add
- both 1:135/142 and 26:1305/142 in the security manager and use
- the same password for both entries.
-
-
- 17.2 Mail
-
- Using the same example, if you have mail for both 1:135/142 and
- 26:1305/142, all mail (for both addresses) would be delivered
- during the same session. This is true for both inbound and
- outbound connections.
-
- If you know that a system is EMSI capable and you have regular
- mail traffic with more than one of its AKAs, you can HOLD mail
- for the system's other AKAs and only allow the Mailer (FD) to
- call one of the addresses. When the session is established, all
- of the remote system's AKAs are processed.
-
- This probably sounds more confusing than it really is. So to make
- a long story short, make sure you have the "Present all AKAs to
- remote" option enabled (Mailer>Miscellaneous) and play it by ear.
-
-
-
-
-
-
-
-
-
- 109
-
-
-
-
-
- 17.3 IEMSI
-
- IEMSI is similar to the EMSI handshake protocol, with the
- exception that it deals with the handshake between a terminal
- program (such as the one found in FrontDoor) and an on-line
- service, such as a BBS.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 110
-
-
-
-
-
- 18 Script language
-
- The script language provides an alternative method of calling a
- system (instead of calling it directly with the telephone number
- listed in your nodelist). A script file is used where you have to, or
- prefer to, connect to another system indirectly. Ie. you will not be
- calling it by dialing its number directly. This could be through X.25
- or PC Pursuit.
-
- The script file must be a plain vanilla ASCII file. A semicolon (;)
- may be used as a comment character, making FD ignore everything
- following the semicolon on the same line. FD is not case sensitive
- when interpreting the script file.
-
- The route file (ROUTE.FD) can be used to specify that a script should
- be used for one or more nodes by entering:
-
- SCRIPT <SCRIPT FILE> <LIST>
-
- (see Mail routing). The command may be global or local to a specific
- event's schedule block. If you are using PC Pursuit, you can use a
- generic script file for all "PC Pursuitable" nodes. See PCP SCRIPTS.
-
-
- 18.1 What can I do with it?
-
- The script language consists of a number of commands that allows
- you to send characters to the modem, wait for responses from the
- modem or the remote system/network that you are using, and
- trigger different actions depending on the responses you get.
-
- The versatility of the script language is further enhanced by the
- use of so-called labels to execute different parts of the script
- depending on a specific situation. The script language can be
- seen as a simple programming language for controlling the way FD
- or the Terminal makes a call.
-
-
- 18.2 Commands
-
- SEND <STRING>
-
- Sends a series of characters to the modem or the remote system.
- Everything following the SEND command on the same line will be
- sent. Control characters may be entered using mnemonics, eg.
- <CR>. In addition, <CR> (carriage return) may be sent by using
- the pipe (|) symbol. The string will be sent exactly as entered,
- with no case conversion.
-
-
-
-
-
-
-
-
-
-
- 111
-
-
-
-
-
- DIAL <NUMBER>
-
- Sends NUMBER, preceded by the dial command specified in FDSETUP's
- modem section. Control characters may be entered in the same
- manner as with the SEND command.
-
-
- SETPORT <BAUD> <DATABITS> <STOPBITS> <PARITY>
-
- Sets the communications port to the specified parameters. BAUD
- can be any value supported by the hardware between 300 and 9600
- baud. At no time will the baud rate be set to a higher value than
- the highest supported speed of the destination system, or the
- baud rate of the outbound node in a PC Pursuit script. DATABITS
- is 7 or 8. STOPBITS is 1 or 2. PARITY is NONE, ODD or EVEN. In
- addition, a value of -1 means that the previous setting for that
- parameter should be retained.
-
-
- PROVOKE <STRING>
-
- Keeps sending STRING with an interval of one second, until any
- character is received from the remote system, or until a timeout
- occurs (see TIMERSET), or until interrupted by the user. Control
- characters may be entered in the same manner as with the SEND
- command.
-
-
- TIMERSET <SECONDS>
-
- Sets the timer for fatal timeouts while waiting to receive
- something from the remote system. The default is 120 seconds (two
- minutes). The maximum value is 300 seconds (five minutes), and
- the minimum is 0.
-
-
- DEBUG <ON|OFF>
-
- Sets debug mode on or off. In debug mode, all characters received
- while waiting for one or more strings will be displayed. When you
- are not using debug mode, only the string that matched a pattern
- will be displayed. Similarly, in debug mode all strings sent to
- the modem/remote system will be displayed, whereas FD will only
- say "Sending string" when not using debug mode. It is recommended
- that you enable debug mode while developing and testing a script.
-
-
- WAIT <SECONDS>
-
- Makes the script wait for SECONDS seconds before continuing.
-
-
-
-
-
-
-
-
- 112
-
-
-
-
-
- WAITFOR <STRING>[|<STRING>|<STRING>..]
-
- Forces the script function to wait for one or more specified stri
- ngs or until a timeout occurs (see TIMERSET). Each string must be
- separated with a pipe (|) character. Control characters may be
- entered in the same manner as with the SEND command. Of the
- specified strings, only the first will signify success, the other
- strings will immediately terminate the script with failed status.
- The string comparison is case sensitive, and requires an exact
- match.
-
-
- CASE / ENDCASE
-
- Starts and ends a CASE statement, respectively. CASE is a more
- flexible variety of WAITFOR. Each line after CASE must start with
- a string that the script should wait for, followed by a colon and
- one or more script commands, or a label jump directive (see
- LABELS).
-
- If the string consists of more than one word, it must specified
- between quote characters ("). The CASE statement is ended with
- the command ENDCASE on a separate line.
-
- When a matching string has been received from the modem or the
- remote system, the command on the same line will be executed. If
- the command consists of a label jump instruction, the script will
- continue from the specified label position. If it is one or more
- script commands, they will be executed, and the script will
- continue from the line following the ENDCASE statement, unless
- the command terminates the script (see SESSION and FAIL).
-
- The string comparison is case sensitive, and requires an exact
- match. A short example follows.
-
- CASE ; Comments:
- CONNECT : session ; connect
- BUSY : >redial
- "NO CARRIER": >redial
- VOICE : fail
- @NOCARRIER : fail ; carrier lost
- @DEFAULT : fail ; timeout
- ENDCASE
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 113
-
-
-
-
-
- @NOCARRIER Tests the presence of carrier in a CASE
- statement.
-
- @DEFAULT May be used to specify a default course of action
- if a timeout occurs in a CASE statement.
-
-
- SESSION
-
- Terminates the script with success status, leading to a mail
- session. It is NOT necessary to have a SESSION command in script
- files used to connect to another system in the Terminal. The
- SESSION command is only used to establish mail sessions.
-
-
- FAIL
-
- Terminates the script with failed status. No mail session will be
- initiated.
-
-
- PURGEIN
-
- Purges the inbound buffer, getting rid of any pending characters.
-
-
- PURGEOUT
-
- Purges the outbound buffer, getting rid of any pending
- characters.
-
-
- RETRYCOUNT <RETRIES>
-
- Provides a means of incrementing and checking a predefined retry
- count variable. If the retry count exceeds RETRIES, the script is
- terminated with failed status, otherwise the count is incremented
- with 1. The retry count does not include the first attempt.
-
-
- CLEARCOUNT
-
- Clears the predefined retry count variable, resetting it to 0.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 114
-
-
-
-
-
- MAX2400 <COMMANDS>
- MAX1200 <COMMANDS>
-
- Commands following on the same line will only be executed if the
- max baudrate for the session is 1200/2400. The maximum baudrate
- for a session is calculated as the maximum baudrate supported by
- the remote system, by the outbound node (if using PCP), or by
- your own modem, whichever is lowest.
-
- Eg. MAX2400 setport 2400 -1 -1 -1
- MAX1200 setport 1200 -1 -1 -1
-
-
- @OUTBOUND
-
- Used to insert the name of an outbound PC Pursuit node in a
- string. The contents of @OUTBOUND is undefined if used in any
- other script than PCP.SCR.
-
- Eg. send C @OUTBOUND,ABC12345<CR>
-
-
- @LOCALNUM
-
- Used to insert the local telephone number in a PC Pursuit script.
- The contents of @LOCALNUM is undefined if used in any other
- script than PCP.SCR.
-
- Eg. send ATDT@LOCALNUM<CR>
-
-
- ENDNODE
-
- Terminates a "node block". See NODE BLOCK.
-
-
- UPLOAD <PROTOCOL> <FILESPEC>
-
- Transmits the files matching FILESPEC to the remote, using the
- PROTOCOL transfer protocol (X=Xmodem, T=Telink, S=SEAlink,
- Z=Zmodem). FILESPEC may include wild-cards characters for all
- protocols. This command is not available in the noncommercial
- version.
-
- Eg. upload Z C:\FILES\FD*.LZH
-
-
-
-
-
-
-
-
-
-
-
-
-
- 115
-
-
-
-
-
- DOWNLOAD <PROTOCOL> <PATH>
-
- Receives one or more files from the remote, using the PROTOCOL
- transfer protocol (X=Xmodem, T=Telink, S=SEAlink, Z=Zmodem). PATH
- must be a complete filename for Xmodem transfers and a valid
- directory for Zmodem, SEAlink, and Telink transfers. This command
- is not available in the noncommercial version.
-
- Eg. download Z C:\INFILES\
- download X C:\INFILES\FUN.LZH
-
-
- DISCONNECT
-
- Unconditionally terminates a call (if any) from within a script.
- Script execution will resume as soon as the carrier (CD) signal
- has been lost; the script function lowers DTR to disconnect. This
- command is not available in the noncommercial version.
-
-
- IFBAD
- <line to execute>
-
- Executes the command(s) listed on <line to execute> (which is the
- line following "IFBAD") if an UPLOAD or DOWNLOAD command failed.
- This command is not available in the noncommercial version.
-
-
- SENDBREAK
-
- Transmits a short BREAK signal to the modem. This command is not
- available in the noncommercial version.
-
-
- LONGBREAK
-
- Transmits a long BREAK signal to the modem. This command is not
- available in the noncommercial version.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 116
-
-
-
-
-
- 18.3 Labels
-
- A label is used to define a position in the script, so that it
- may be used as a jump destination. The label can consist of any
- word, starting with a letter from A to Z, except the above script
- commands, and must be preceded by a colon.
-
- At the position in the script where you want to execute a jump to
- the label, you enter the label name preceded by a greater than
- sign (>).
-
- Eg. ..
- ..
- :redial
- send ATDT@LOCALNUM<CR>
- CASE
- CONNECT : session
- BUSY : >redial
- @default : fail
- ENDCASE
-
-
- 18.4 Node block
-
- A node block is a special type of label. It starts with a node
- number preceded by a colon. All commands from the first line to
- the ENDNODE statement, that ends the node block, will only be
- executed if you are currently calling the specified node.
-
- Eg. ..
- ..
- :270/17 ; start of node block
- send ATZ<CR>
- ENDNODE ; end of node block
-
-
- 18.5 PC Pursuit
-
- You can use a generic script for calling all "PC Pursuitable"
- nodes, taking advantage of the specific PCP commands @OUTBOUND
- and @LOCALNUM. This requires that the script file is named
- PCP.SCR and is placed in the SYSTEM directory. You must also
- compile the nodelist with the file PCP.DAT, containing a list of
- all "PC Pursuitable" exchanges, present in the NODELIST
- directory.
-
- If you have followed these steps, the PCP script file will be
- used automatically when FrontDoor finds that a node is "PC
- Pursuitable". You will probably wish to prevent FrontDoor from
- using the PCP script in the daytime on weekdays. A special route
- command, NO-SCRIPT, exists specifically for this purpose. For
- further information, see Mail routing.
-
-
-
-
-
-
- 117
-
-
-
-
-
- 18.6 How do I update PCP.DAT?
-
- The file PCP.DAT is a somewhat modified version of the file
- provided by Telenet's BBS. We take no responsibilities whatsoever
- regarding the contents of the PCP.DAT file supplied with
- FrontDoor. To update it, you must issue CONNECT PURSUIT from
- PCP's command prompt and log-on to their BBS. The file that you
- want to download is called EXCHANGE.TXT (or EXCHANGE.ARC). Should
- you update this file, you MUST make sure that your files follows
- the same format as the file supplied with FrontDoor.
-
-
- 18.7 MNEMONICS
-
- The following mnemonics may be used to enter control characters
- in the script, both for sending and receiving. They can be used
- with the following commands: SEND, DIAL, PROVOKE, WAITFOR, and
- CASE.
-
- ASCII MNEMONIC : ASCII MNEMONIC
- --------------------+----------------------
- 0 <NUL> : 17 <DC1>
- 1 <SOH> : 18 <DC2>
- 2 <STX> : 19 <DC3>
- 3 <ETX> : 20 <DC4>
- 4 <EOT> : 21 <NAK>
- 5 <ENQ> : 22 <SYN>
- 6 <ACK> : 23 <ETB>
- 7 <BEL> : 24 <CAN>
- 8 <BS> : 25 <EM>
- 9 <HT> : 26 <SUB>
- 10 <LF> : 27 <ESC>
- 11 <VT> : 28 <FS>
- 12 <FF> : 29 <GS>
- 13 <CR> : 30 <RS>
- 14 <SO> : 31 <US>
- 15 <SI> : 32 <SP>
- 16 <DLE> :
- --------------------+----------------------
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 118
-
-
-
-
-
- 19 FDSERVER
-
- FD has a function referred to as FDSERVER. It can be used to perform
- functions on your system from a remote site, such as moving and
- copying files, etc. FDSERVER is a very powerful function and the
- examples given in this chapter are only some of the things you can do
- with it.
-
- FDSERVER is activated by specifying a password in FDSETUP. FDSERVER
- requests will be ignored if no password has been specified in
- FDSETUP.
-
- FDSERVER requests are processed after a mail session has been
- completed and the call has been terminated, so everything you specify
- in request message is processed off-line.
-
-
- 19.1 What is a FDSERVER request?
-
- A FDSERVER request is a message, addressed to FDSERVER (case does
- not matter) on your system, with commands. Think of it as a
- remote, but controlled, DOS shell. You can run almost any program
- and perform any DOS function from a FDSERVER request. The
- FDSERVER function has some limitations, however.
-
- You cannot use the DOS command ECHO in a FDSERVER request.
-
- Programs that require local keyboard input should not be executed
- from a FDSERVER request since these program(s) will just sit and
- wait for keyboard input.
-
- FDSERVER request messages must NOT be compressed (ARCmail, etc.).
- The function is only triggered if FD unpacks the request message.
-
- Batch (.BAT) file labels are not supported.
-
-
- 19.2 Request message
-
- Each line of the message is considered a command and blank lines
- are ignored. When FDSERVER has executed all commands found in the
- message, it will change drive and directory to where it was
- before processing your request and return to FD.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 119
-
-
-
-
-
- 19.2.1 Internal commands
-
- Lines beginning with a % character are internal FDSERVER
- commands.
-
- %logall Will create one line in the log file for each
- command that was executed along with the
- status (err: or exe:).
-
- %nologerr Normally, all commands that generated an
- errorlevel will be logged, this can be
- disabled with this command.
-
- %store After a request is processed, it will be
- deleted by default. This can be disabled by
- putting this command in the message which
- will force FDSERVER to mark the messages as
- received.
-
-
- 19.3 Using it
-
- You are sitting in front of your computer at home, working with a
- report or something similar and find that you need some files
- from the office machine.
-
- Assuming that these files contain information that is very
- sensitive or confidential, and even though you have the option to
- protect your file requests with a password, you may still not
- want to have the files semi-accessible. This is where you can use
- FDSERVER.
-
- The directories and file names used in this example were thought
- up and does not necessarily match the setup on your machine.
-
- Create a message addressed to FDSERVER on the node you want to
- call and send it.
-
- By: joaquim homrighausen, JoHo's Home (2:270/17.1)
- To: fdserver, Advanced Engineering sarl (2:270/17)
- Re: password
- ----------------------------------------------------
- %nologerr
- cd \TEMP
- copy C:\LOTUS\THA*.SPS
-
- arj a THA THA*.SPS
- erase *.SPS
- copy THA.ARJ C:\REQUEST\FORNOW
- erase THA.ARJ
-
-
-
-
-
-
-
-
- 120
-
-
-
-
-
- The server function will read the message and execute each line.
- The next step would be to create a new server request containing
- the following:
-
- By: joaquim homrighausen, JoHo's Home (2:270/17.1)
- To: fdserver, Advanced Engineering sarl (2:270/17)
- Re: password
- ----------------------------------------------------
- %nologerr
-
- erase C:\REQUEST\FORNOW\THA.ARJ
-
- And send it along with a File Request for THA.ARJ. FD will
- process the File Request first, and when the mail session has
- been completed, the newly created server request will be
- processed by FDSERVER.
-
-
- 19.4 Keeping calls to a minimum
-
- You could avoid the extra phone call in the example with the
- request if you have a robot utility such as XRobot (by Joaquim H.
- Homrighausen) and create a file attach with the files you need so
- the Mailer will call you back.
-
-
- 19.5 Security
-
- If you do not need to use FDSERVER, Do not define a password for
- it in FDSETUP. Since FDSERVER is a VERY powerful function, the
- results could be disastrous if someone got hold of your FDSERVER
- password.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 121
-
-
-
-
-
- 20 Service requests
-
- Service requests is a very powerful function of FD. It allows you to
- use FD as a front-end to databases, to make on-line inquiries etc.
- without having to manually call the system with a Terminal program.
-
-
- 20.1 Service requests vs FDSERVER
-
- The difference between a service request and a FDSERVER request
- is that they are processed while two systems are connected. This
- has the drawback of being slightly more expensive, but it offers
- a much greater flexibility than the FDSERVER function.
-
- Consider this. You have a program on your system that allows
- people to search for data in a database of files and then get a
- list of all the new files, you have named the service request
- WHATSNEW.
-
- Your system receives a file request for WHATSNEW and FD runs the
- program SEARCH.EXE, defined as the program to run for WHATSNEW.
- When SEARCH terminates, FD will send the file NEWFILES.LST,
- created by SEARCH, to the remote system.
-
-
- 20.2 Setting up
-
- Service requests are defined in the ALIAS file (where you define
- alias file names for file requests). The format of a service
- request definition looks like this:
-
- <NAME> ><PROGRAM> <PARAMETERS> ^<+ or - path name>
-
- Eg.
-
- WHATSNEW >SEARCH.EXE findit =A =T ^-C:\SERVICE\RESULT\*.TXT
-
-
- Service name
-
- NAME (case does not matter) is what the remote system should
- request to invoke the service request.
-
-
- Program
-
- >PROGRAM is the program that should be invoked when FD receives a
- request for NAME. The > character is required and tells FD it is
- a service request and not an alias definition. There should be no
- spaces between the > and PROGRAM.
-
- The extension of PROGRAM is important. FD can execute batch
- (.BAT) files as a result of a service request, but it must do it
- through COMMAND.COM. So it has to know what type of file
- (program) it is that you are executing.
-
-
-
- 122
-
-
-
-
-
- Parameters
-
- You can pass any parameters to the program. The only restriction
- is (as with DOS) that they do not exceed a length of 128
- characters and none of them starts with the ^ (see below)
- character.
-
- There are several macros that you can specify as parameters.
- Macros should be preceded by a single equal sign (=). FD will
- expand these macros before calling the program. You may include
- macros in other parameters.
-
- Eg. -p=P Would pass -p followed by the value of the P
- macro to the program.
-
-
- Macros
-
- Here is a list of the available macros:
-
- =A The requesting system's network address. Eg.
- 2:270/17.
-
- =B The baud rate of the connection. Eg. 9600.
-
- =C The cost per minute for the connection. If your
- system initiated the session (called the
- requesting system), this is the cost per minute.
- If the requesting system initiated the session
- (called your system), this will be 0.
-
- =D OUTBOUND if your system initiated the session
- (called the requesting system) or INBOUND if the
- requesting system initiated the session (called
- your system).
-
- =L The requesting system's location. Eg. Oetrange_L.
- This value is taken from the nodelist based on
- the network address. Note that if the requesting
- system is not listed in your nodelist, this value
- will be "UNKNOWN".
-
- =N The name of the requesting system. Eg. FroDo_HQ.
-
- =O The operator of the requesting system. Eg.
- Bilbo_Baggins. Note that space characters are
- replaced with an underscore.
-
- =P The password that was specified for the request
- (if any).
-
-
-
-
-
-
-
-
- 123
-
-
-
-
-
- =S The service that was requested. Eg. WHATSNEW.
-
-
- =U The date and time supplied on an update request.
- It is expressed in UNIX format, ie. the number of
- seconds since 1970. If the request was a plain
- file request, this will be 0.
-
- =X Whether or not the session is password protected.
- This macro can have two values, SECURE or
- UNSECURE.
-
- =Z The type of the mail session that has been
- established. This macro can have three values,
- WAZOO, EMSI, or OTHER.
-
-
- 20.3 ^ - + ?
-
- The ^ character defines the beginning of a filemask that FD
- should send after the service request has been completed. If no ^
- definition has been made, FD will not send any files as the
- result of a service request.
-
- The plus (+) means that FD should NOT remove the files once they
- have been transmitted.
-
- The minus (-) means that FD SHOULD remove the files once they
- have been transmitted. This also means that the files will be
- removed even if they could not be sent (carrier lost, etc).
-
- The question mark (?) means that FD should ONLY remove the files
- once they have been SUCCESSFULLY transmitted. This means that if
- a session fails after transmitting three files, only those three
- files will be removed and the remaining left intact.
-
- The path name is a file specification, it may include wildcard (?
- and *) characters. FD will send all matching files.
-
-
- 20.4 Remote system information
-
- When FD loads the program specified for the request, it will
- create a file with information about the remote (requesting)
- system, such as the system name, system location, operator's
- name, list of network addresses, etc. allowing an external
- program to access this information without having to know the
- internals of FrontDoor. This file is described in detail in the
- FrontDoor Developer's Kit (FDDEV).
-
-
-
-
-
-
-
-
-
- 124
-
-
-
-
-
- 20.5 Security
-
- Since service requests are built on the concept of File Requests,
- they are protected the same way a File Requests is protected. To
- setup a password, you have to use the Request Manager in FDSETUP
- and define a password for the service request name.
-
-
- 20.6 A word of wisdom
-
- Service Requests should be used with extreme caution. It is
- recommended that you have a full understanding of what a service
- request actually does before you attempt to use it.
-
- You should also keep in mind that the requesting system is
- waiting at the other end for FD to start sending files. So keep
- it short and sweet.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 125
-
-
-
-
-
- 21 Global command line switches
-
- Support for these switches is included in all programs in FrontDoor,
- except where otherwise stated. All command line parameters must be
- preceded by either a forward slash (/) or a dash (-). Command line
- parameters are case insensitive (case does not matter) except where
- otherwise stated.
-
- Switch Programs Description
- --------------------------------------------------------------------
- C FDSETUP Forces color mode
-
- M FDSETUP Forces monochrome mode
-
- NORES All Disables use of internal (and undocumented)
- DOS pathname resolution calls. This is
- required under PC-MOS/386 and some LAN
- environments.
-
- NOCOMMIT All Disables use of DOS 3.3 commit() call.
-
- NOSHADOW All Disables window shadows.
-
- NOMULD All Prevents FrontDoor from attempting to detect
- a multi-tasking environment, such as DESQview
- and PC-MOS/386.
-
- NOEKBD All Prevents FrontDoor from using extended (AT-
- style) keyboard BIOS calls.
-
- NOISCR FM Forces FM to treat a SoftCR (ASCII 141)
- character as any other printable character.
- The default for FM is to strip these when
- reading and writing message from/to disk.
-
- INTL FM Forces FM to always insert the ^aINTL kludge
- line in newly created NetMail messages. FM
- will, by default, only insert INTL
- information if the destination system of the
- message is located in a different zone than
- that of the originating address (your) used
- to create the message, or when a different
- originating address than your primary AKA is
- used.
-
- NOEMS FD, FM Disables use of LIM/EMS memory for overlay
- file buffers. This switch does not affect
- whether or not FD and FM use EMS/XMS memory
- when (if) swapping.
-
- NOLOCK FM Disables Hudson Message Base locking support
- in FM. Do not use this unless absolutely
- necessary.
-
-
-
-
-
- 126
-
-
-
-
-
- Switch Programs Description
- --------------------------------------------------------------------
- NODASH FD Forces FD to strip dash (-) characters from
- telephone numbers before sending them to the
- modem. This does not affect how telephone
- numbers are displayed on screen or logged to
- disk.
-
- NOUNPACK FD Forces FD to ignore received mail packets
- (files with .PKT extension). This assumes
- that you have an external utility to unpack
- NetMail packets. Do not use this unless you
- absolutely need it.
-
- NOMDM FD Forces FD to ignore information listed in
- MODEM.FD.
-
- NOSLO FD Disables support for the Overdrive protocol
- option (SLO) in SEAlink. SLO is by default
- only active during error free connections
- (/ARQ, /MNP, /LAPM, etc.) and for link speeds
- above 2400 BPS.
-
- NODZA FD Disables support for the DirectZAP Zmodem
- protocol (DZA) variant used between some EMSI
- capable mailers such as FrontDoor and
- D'Bridge. DZA is only used during EMSI mail
- sessions that have not been negotiated via a
- script file.
-
- NOZAP FD Disables support for the Zmodem protocol
- during mail sessions negotiated using the
- FTS-6 (YooHoo) session protocol. This
- effectively means that FD will only establish
- FTS-6 sessions using the DietIFNA protocol
- option. This does not affect sessions
- negotiated using EMSI.
-
- NOYOOHOO FD Disables support for the FTS-6 (YooHoo)
- session protocol. This means that FD will
- only support FTS-1 and EMSI sessions, unless
- otherwise restricted.
-
- NOFTSC1 FD Disables support for the FTS-1 session
- protocol, effectively making FD non-FidoNet
- compliant. This means that FD will only
- support FTS-6 and EMSI sessions, unless
- otherwise restricted.
-
- --- Public (listed as non-PVT in the FidoNet
- nodelist) FidoNet systems should use this
- option with CAUTION since by using it, you
- may be in violation FidoNet policy. ---
-
-
-
-
-
- 127
-
-
-
-
-
- Switch Programs Description
- --------------------------------------------------------------------
- NOEMSI FD Disables support for the FSC-0056 (EMSI)
- session protocol. This means that FD will
- only support FTS-1 and FTS-6 sessions, unless
- otherwise restricted.
-
- RDEBUG FD Enables debug output from the mail routing
- handler in FD. This is quite useful when
- debugging your ROUTE.FD file.
-
- X<1..255> FD Forces FD to terminate with the specified
- errorlevel as soon as there is no more
- outbound calls to make. This is not available
- in the noncommercial version.
-
- T FD Forces FD into Terminal mode directly from
- DOS. Once you exit the Terminal, you will be
- returned to DOS.
-
- M FD Forces FD into Mail mode directly from DOS.
- This switch was added to allow you to
- override the Terminal-only setting in
- FDSETUP.
-
- S FD Forces FD to ignore any forced events it may
- have missed. FD will by default execute all
- pending external events when it is brought
- up. This switch is useful if you have
- performed system maintenance for several
- hours and do not want FD to execute any
- overdue forced events.
-
- L:<pwd> FD Locks the keyboard with the specified
- password directly from DOS. This has the same
- effect as using the LOCK, <Alt-L>, function
- from FD's main menu.
-
- ONLINE Terminal Forces the Terminal to not initialize the
- modem when it is started. This is not
- available in the noncommercial version.
-
-
- 21.1 A word of wisdom
-
- Please be aware that some of the previously described command
- line switches completely alter the way FrontDoor acts and may
- make it incompatible with other software and/or some
- environments.
-
- Use the switches with caution and when in doubt, try to test the
- effects of the switch in a local environment or between your own
- and a friend's system before you leave FD to answer your
- telephone unattended.
-
-
-
-
- 128
-
-
-
-
-
- 22 Environment variables
-
- Several environment variables affect how FrontDoor operates. It is
- assumed that you are familiar with what and environment variable is
- and how to set/remove one.
-
-
- 22.1 FDOPT
-
- All of the "Global command line switches" except "-/C" and "-/M"
- can also be specified by including them in the FDOPT environment
- variable. To include more than one option, separate them by a
- comma, eg.
-
- SET FDOPT=NOISCR,NOSHADOW
-
-
- 22.2 FDSWAP
-
- Overrides the "Swapping" path, defined under Global > Filenames
- in FDSETUP, eg.
-
- SET FDSWAP=D:\TEMPDIR\
-
-
- 22.3 POINTNET
-
- See "Nodelist and the Nodelist Compiler".
-
-
- 22.4 FMOVR and FDOVR
-
- Allows you to specify a complete path where FM and FD should look
- for their overlay (.OVR) files. Useful when multiple copies of
- either program are being used (eg. multi-line environment). This
- is not available in the noncommercial version.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 129
-
-
-
-
-
- 23 Semaphore files
-
- FrontDoor can be controlled by using so called semaphore files. Both
- FD and FM periodically scan for certain file names in the SYSTEM
- directory, and if found, performs a task such as rescanning the
- contents of the NetMail folder, exits to DOS, prevents human callers,
- and more.
-
- The commercial version furthermore allows you to specify a separate
- semaphore directory (see FDSETUP > Global > Filenames) to allow
- several copies of FM and FD to use the same semaphore files.
-
- FD uses the lower right hand corner of its main screen to indicate
- that one or more semaphore is present.
-
- Filename Programs Description
- --------------------------------------------------------------------
- FDRESCAN.NOW FD Forces FD to discard all mail packets
- (NOT messages) from the packet directory
- and rescan the contents of the NetMail
- folder before rebuilding the packets.
-
- FMRESCAN.NOW FM Forces FM to rebuild its internal list of
- messages in the NetMail folder.
-
- FDINSESS.nnn FD, FM FD creates this file whenever a mail
- session is initiated, and when it is
- dialing a system, attempting to establish
- a mail session. If FM detects this file,
- it will not let you renumber the NetMail
- folder. "nnn" is the task number (0-255).
- This is not available in the
- noncommercial version.
-
- FDINEXIT.nnn FD FD creates this file whenever a human
- caller is detected and passed onto a BBS
- or other on-line service. When FD
- returns, it compares the timestamp of
- FDINEXIT.nnn with the timestamp of
- FDRESCAN.NOW, and if they do not match, a
- complete rescan (see FDRESCAN.NOW) is
- performed. "nnn" is the task number (0-
- 255). In the noncommercial version, this
- file is not task aware, and is always
- called "FDINEXIT.NOW".
-
- FDNOUSER.NOW FD Forces FD to refuse human callers. This
- has the same effect as setting the "Human
- callers" option, under FD's "Your
- profile" menu, to "NO". The visual
- indicator for this semaphore file is
- "NU".
-
- FDNOSCAN.NOW FD Forces FD to ignore FDRESCAN.NOW.
-
-
-
-
- 130
-
-
-
-
-
- FDNOEXIT.NOW FD Prevents FD from exiting because of
- received mail. This has the same effect
- as setting the "Exit on mail" option,
- under FD's "Your profile" menu, to "NO".
- The visual indicator for this semaphore
- file is "NE".
-
- NODIAL.FD FD While this is not a semaphore file per
- se, it triggers the display of a visual
- indicator, "UD".
-
- FDEXIT.nnn FD Forces FD to UNconditionally exit with
- the errorlevel "nnn". Before FD exits, it
- removes the file.
-
- FDRENUM.nnn FD, FM FM creates this file whenever you press
- <Alt-B> to renumber the NetMail folder.
- When FD detects this file, it will not
- place any outgoing calls until it can no
- longer be found. This prevents FD from
- initiating an outbound session while FM
- is renumbering the contents of the
- NetMail folder. "nnn" is the task number
- (0-255). This is not available in the
- noncommercial version.
-
- ROUTE.FD FD While this is not a semaphore file per
- se, it is used to determine if the
- NetMail folder has to be rescanned (see
- FDRESCAN.NOW). If the timestamp of this
- file has changed since FD last checked
- it, a rescan is forced.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 131
-
-
-
-
-
- 24 Batch files
-
- FD will, in most cases, be run from a DOS batch (.BAT) file. When it
- terminates, it will return certain errorlevels that you can trap for
- in your batch file.
-
-
- 24.1 Errorlevels
-
- 1 Internal error
- 2 External error - missing files, paths, etc.
- 3 Insufficient available disk space (less than 32 KB)
- 4 (reserved)
- 5 Unable to initialize modem
- 6 Incorrect FOSSIL version
- 7 FOSSIL not loaded or detected
- 8 FrontDoor already loaded, issue EXIT to return
- 9 (reserved)
- 10 User break
- 11 - 30 (reserved)
- 31 - 255 User definable errorlevels
-
- If you invoke the Terminal from DOS by running FD /T, it will always
- terminate with an errorlevel of 10 (User break), the same applies
- when you have specified "Terminal-only" in FDSETUP.
-
-
- 24.2 Categories
-
- The various errorlevels can be organized into four basic
- categories:
-
- Mail received When mail is received, you can choose to exit
- to the batch file to run external mail
- processing utilities, such as TosScan, etc.
-
- User break/errors When you press <Alt-Q> from the FD's main
- menu or when errors occur.
-
- BBS calls If you are running a BBS under FD, it is
- necessary for FD to exit with an errorlevel
- indicating the baudrate of the call. The line
- is still active when FD exits to the batch
- file, the BBS software is loaded and the
- caller will be able to access the BBS.
-
- External events The errorlevels defined in FDSETUP's event
- manager.
-
-
-
-
-
-
-
-
-
-
- 132
-
-
-
-
-
- 24.3 Loading BBS software
-
- There are two methods that can be used to invoke BBS software
- when the Mailer detects a non-mail (human) call. The first uses
- different batch file labels for the various baudrates and the
- second one uses the same label for the various baudrates. The
- second method relies on the "Create .BAT file" option in FDSETUP
- (under Mailer > Errorlevels).
-
-
- 24.4 Different labels
-
- @echo off
- rem --- We end up here after every BBS call
- :loop
-
- C:
- CD \FD
- FD
-
- rem --- Check errorlevels returned by the Mailer
-
- if errorlevel 200 goto b9600
- if errorlevel 199 goto b2400
- if errorlevel 198 goto b1200
- if errorlevel 197 goto b300
- if errorlevel 100 goto mailIN
- if errorlevel 10 goto userBRK
- if errorlevel 1 goto FDerror
-
- :mailIN
-
- rem --- Process possible echomail, etc.
-
- tosscan toss
- tsutil link -t
- goto loop
-
- :b9600
-
- Load BBS software for incoming call at 9600 bps
- goto loop
-
- :b2400
-
- Load BBS software for incoming call at 2400 bps
- goto loop
-
- ..
- ..
-
-
-
-
-
-
-
-
- 133
-
-
-
-
-
- :userBRK
- cls
- @echo User break.
- goto done
-
- :FDerror
- @echo Mailer returned an error (1-9)
-
- :done
-
-
- While this option works just fine for a environment where it is
- not critical that the BBS software knows about upcoming events
- etc. it is somewhat limited.
-
-
- 24.5 Same label
-
- @echo off
- rem --- We end up here after every BBS call
- :loop
-
- C:
- CD \FD
- FD
-
- rem --- Check errorlevels returned by the Mailer
-
- if errorlevel 200 goto bbsCALL
- if errorlevel 199 goto bbsCALL
- if errorlevel 198 goto bbsCALL
- if errorlevel 197 goto bbsCALL
- if errorlevel 100 goto mailIN
- if errorlevel 10 goto userBRK
- if errorlevel 1 goto FDerror
-
- :mailIN
-
- rem --- Process possible echomail, etc.
-
- tosscan toss
- tsutil link -t
- goto loop
-
- :bbsCALL
- rem --- Load DOBBS.BAT, created by the Mailer if
- rem the "Create .BAT file" option is enabled.
- dobbs
-
- :userBRK
- cls
- @echo User break.
- goto done
-
-
-
-
-
- 134
-
-
-
-
-
- :FDerror
- @echo Mailer returned an error (1-9)
-
- :done
-
-
- 24.6 DOBBS.BAT
-
- This is the batch file created by FD when you have the "Create
- .BAT file" option enabled. It contains the speed at which the
- call came in, the COM port, number of minutes left till the next
- event and possibly a string indicating ARQ, MNP etc.
-
- The commercial version inserts the task number (0-255) between
- the number of minutes left till the next event and the possible
- ARQ/MNP string.
-
- For a call coming in at 9600 BPS with ARQ, 30 minutes left till
- the next non-user event, on COM port 1 the DOBBS.BAT file would
- contain:
-
- exebbs 9600 1 30 /ARQ
-
- For a call coming in at 2400 BPS, two hours left till the next
- non-user event, on COM port 1, the DOBBS.BAT file would contain:
-
- exebbs 2400 1 120
-
-
- 24.7 EXEBBS.BAT
-
- This is the file you have to create. It should handle everything
- required for the BBS software you are running, including
- exporting mail after users have logged off, etc. The last
- statement of your EXEBBS.BAT file should be the name of the big
- (main) batch file. Here is a sample of an EXEBBS.BAT file:
-
- coolBBS -b%1%4 -p%2 -t%3
-
- if errorlevel 200 goto newmail
- if errorlevel 40 goto fatal
-
- run
-
- :newmail
- cls
- @echo User entered echomail, let's send it!
- tosscan scan
- run
-
- :fatal
- cls
- @echo A fatal error has occurred in coolBBS
-
-
-
-
-
- 135
-
-
-
-
-
- Since DOBBS.BAT calls EXEBBS.BAT with various information, it
- can be used to pass parameters to the BBS software. The
- result of the above EXEBBS.BAT file would expand to:
-
- coolBBS -b9600/ARQ -p1 -t120
-
- If a BBS call came in at 9600, the COM port is one, the
- number of minutes till the next non-user event is 120 and the
- optional (%4) string contained /ARQ.
-
- The text RUN, refers to the original (main) batch file, in
- which we bring the Mailer back up again. When the BBS
- software (coolBBS in the above examples) terminates,
- EXEBBS.BAT will trap two errorlevels and then invoke
- RUN(.BAT) again.
-
-
- 24.8 Flow (batch files)
-
- Complicated? Here is the actual file flow between RUN, DOBBS and
- EXEBBS:
-
- +-> RUN.BAT Loads FD and performs all EchoMail and
- : : error handling. When a non-mail (human)
- : : call is detected, it loads DOBBS.BAT,
- ^ V created by FD.
- : :
- : :
- : DOBBS.BAT Created by FD. It calls the EXEBBS.BAT
- : : file with the baudrate, port, remaining
- : : time till the next non-user event, and
- ^ V and possibly the /ARQ parameter.
- : :
- : :
- : EXEBBS.BAT Called by DOBBS.BAT with the above
- : : described parameters. Loads the BBS
- : : software, processes newly created
- ^ V mail (if any), and finally returns to
- : : RUN.BAT.
- +--<--+
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 136
-
-
-
-
-
- 25 Multi-tasking
-
- FrontDoor can be used together with most multi-tasking programs. It
- has been tested with DESQview, PC-MOS/386, OS/2 1.3 DOS Box,
- DoubleDOS, Multilink and Taskview. It will automatically detect most
- multi-tasking software. My personal suggestion would be DESQview. One
- of the best multi-taskers around for PC/MS-DOS.
-
-
- 25.1 NS16550
-
- If you are running FrontDoor under a multi-tasker or in a LAN
- environment, I suggest you replace your 8250 or 16450 UART chip
- with a NS16550AN or NS16550AFN. These are available from several
- electronics outfits for somewhere between USD 17 and USD 23.
-
- The 16550 family of UARTs have internal buffering (FIFO) and will
- improve performance in multi-tasking and LAN environments. Both
- BNU and X00 has direct support for the 16550 family and can be
- used without modifying your command-line parameters when loading
- them.
-
-
- 25.2 DESQview
-
- FrontDoor will request a virtual screen buffer from DV and write
- to it. The result is very fast and very well behaved screen
- writes. Here are the settings I use with DESQview (2.2x / 2.3x):
-
- Keys to Use on Open Menu FD
- Memory Size (in K) 250
-
- Options:
-
- Writes text directly to screen N
- Displays graphics information N
- Virtualize text/graphics (Y,N,T) N
- Uses serial ports (Y,N,1,2) 2
- Requires floppy diskette N
-
- Advanced Options:
-
- System Memory (in K) 0
- Maximum Program Memory Size (in K) <empty>
- Script Buffer Size 0
- Maximum Expanded Memory Size (in K) 0
-
- Text Pages 1
- Graphics Pages 0
- Initial Mode <empty>
- Interrupts 00 to FF
-
-
-
-
-
-
-
- 137
-
-
-
-
-
- Maximum Height 25
- Starting Height 25
- Starting Row 1
- Maximum Width 80
- Starting Width 80
- Starting Column 1
-
- Close on exit (Y,N,blank) N
- Uses its own colors Y
- Allow Close Window command Y
- Runs in background (Y,N,blank) Y
- Uses math coprocessor N
- Keyboard conflict (0-4) 0
- Share CPU when foreground Y
- Share EGA when foreground/zoomed Y
- Can be swapped out (Y,N,blank) N
- Protection level (0-3) 0
-
-
- 25.3 DoubleDOS
-
- Smart multi-tasking software allocates a virtual screen buffer
- for each task. Applications can then ask the multi-tasking
- software where it should write and the multi-tasker handles the
- screen updates. DoubleDOS 5.0, however, is using a different
- method.
-
- Every time you switch tasks from the keyboard, the screen-buffers
- change. So there is no easy way for the software running under
- DoubleDOS to detect this. In DoubleDOS 5.00, there are two
- options that allows you to run FrontDoor under DoubleDOS just
- fine. You MUST run FrontDoor in the TOP section for the two
- methods below to work.
-
- DISPLAY=TEXT If your system has a MCGA, CGA, EGA or VGA
- card installed, there is extra memory
- available on those cards for graphics, etc.
- DoubleDOS can use some of that memory for
- each of its screen buffers. To enable this,
- add DISPLAY=TEXT to your DDCONFIG.SYS file.
-
- REFRESH If you have a text-only adapter (MDA) there
- is most likely no extra memory available on
- the card. Add REFRESH by itself on a line to
- your DDCONFIG.SYS file. This will tell
- DoubleDOS to repaint the screen if the other
- task is bleeding through.
-
-
-
-
-
-
-
-
-
-
-
- 138
-
-
-
-
-
- X00 and DoubleDOS When using FrontDoor, X00.SYS and DoubleDOS,
- do not assign the COM ports in DDCONFIG.SYS.
- If you have problems with your clock, try the
- DEFER option in X00.
-
- Make sure you replace ANSI.SYS with DBLDANSI.SYS.
-
- The BOTTOM partition should initialize before the TOP partition.
- In other words, if you are loading FrontDoor in the BOTTOM
- partition, try to delay the initialization of the TOP partition.
-
-
- 25.4 Multilink
-
- I would personally not recommend anyone using FrontDoor with
- Multilink. I have never successfully executed any program under
- Multilink for longer periods of time than momentarily.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 139
-
-
-
-
-
- 26 Converting from other mail systems
-
- If you were using SEAdog or D'Bridge before you started using
- FrontDoor, you should have little trouble converting to FrontDoor.
- The routing and message handling used by these two mail systems is
- very similar to the way things are done with FrontDoor.
-
- If you are converting from BinkleyTerm, Opus, or Dutchie, however,
- there are a few things you should know and make sure you have done
- before you install FrontDoor.
-
- The main difference between FrontDoor and BinkleyTerm or Opus is that
- FrontDoor does not use oMMM, the static message packer written by Bob
- Hartman. We see the oMMM approach as a black hole from which there is
- no return. This is not true in some cases and there are advantages of
- using oMMM type packers instead of the method used by FrontDoor.
-
- oMMM will create what we call static bundles, where each system has a
- control file that tells the Mailer what files and messages to send to
- what systems. FrontDoor will NOT recognize oMMM type bundles
- (packets) so before you fully convert to FrontDoor, you must make
- sure that all the oMMM type mail is sent before you convert to
- FrontDoor.
-
- You can use FrontDoor to send the remaining oMMM type mail by
- attaching the files manually with FrontDoor's Editor (FM) or a robot
- utility such as XRobot, but you will need a utility with which you
- can determine which file belongs to which system before you can do
- this. So it might be easier for you to tell BinkleyTerm or Opus to
- send its remaining mail before you do the conversion.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 140
-
-
-
-
-
- 27 Help systems
-
- The following systems and persons can be contacted if you have
- problems or questions regarding FrontDoor. You will most likely
- find the latest noncommercial version on these systems as well.
-
- Bruce Bodger 1:1/101 USA
- Mark Howard 1:260/1 USA
- Mats Wallin 2:201/329 Sweden (Europe, Main)
- Stig Jacobsen 2:231/16 Denmark
- Lars Eriksson 2:222/150 Finland
- Zbigniew Borowiec 2:480/6 Poland
- Sascha Vogt 2:310/5 Austria
- Ulrich Bartelt 2:24/4 Germany
- Mark Kerr 2:263/301 Ireland
- Michael Bravo 2:50/200 USSR
- Peter Janssens 2:512/1 Netherlands
- Orlando Castillo 2:346/4 Spain
- Patrick Oetiker 2:30/5 Switzerland
- Nick Parker 2:253/165 United Kingdom
- David Nugent 3:3/101 Australia
- Ricardo Sandor 4:4/104 Latin America
- Ralph Colyn 5:5/103 RSA
- Larry Leong 6:6/101 Asia
-
- The above people are NOT responsible for helping you with commercial
- queries and/or problem.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 141
-
-
-
-
-
- 28 Sample (PCP) script
-
- This script was written by Eric Larson, 1:260/330@fidonet and is
- intended as a sample PC Pursuit script.
-
- ; PCP script for FrontDoor version 2.0x
- ; Eric Larson, 1:260/330.0, 8/11/91
- ; modified from script supplied in FD 1.99 documentation
- ;
- ; You must modify this script in at least 3 places:
- ;
- ; 1: Indial Number
- ; 2: PCP ID Number
- ; 3: PCP Password
- ;
- ; You may also want to modify the script for your modem
- ; or types of systems you call. See notes in script.
- ; For further information, see PCP documentation on
- ; Net Exchange BBS. To connect to the Net Exchange, type
- ; "C PURSUIT" at the Telenet @ prompt.
- ;
-
- debug ON
- setport 2400 ; Redundant if you have locked your Fossil
- ; If you have a 1200 indial :-(, use 1200
- ; here and change the hunt-confirm sequence
- ; to @ wait 1 <CR>
- ;
- ; Users with MNP modems should disable MNP as the buffering
- ; combined with PCP's packet latency will cause block position
- ; errors during error recovery. For HST owners, use:
- ;
- send AT&M0<CR>
- waitfor OK
- ;
- ; Others should adjust the above for their modem
- ; non-buffered modem owners should comment out the
- ; above two lines.
- ;
- ;----------------------------------
- ; Your Indial Phone Number Here
- ;----------------------------------
- ;
- send ATDT4795372<CR>
- ; send ATDT4795445<CR> ; official number
- ; 6406 5776 5355 5372 ; alternates
- ;
- ; If you are having difficulty with your indial line, call
- ; PCP customer service and they may be able to give you
- ; an alternate number that works better.
-
-
-
-
-
-
-
-
- 142
-
-
-
-
-
- case
- CONNECT : >whackit
- RING<CR> : fail
- BUSY<CR> : fail
- "NO " : fail
- @default : fail
- endcase
-
- :whackit ; Attempt to "wake-up" PCP
- purgein ; Telenet recommends at least
- wait 2 ; a 200 ms pause between
- send @ ; characters in the hunt-confirm sequence
- wait 1 ; change the @ to <CR> if you call
- send D ; a 1200 bps indial
- wait 1
- send <CR>
- waitfor TERMINAL=
- send D3<CR> ; Preferred terminal type
- waitfor @
-
- ;--------------------------
- ; Your ID and Password Here
- ;--------------------------
-
- :outdial ; Dial PCP city
- purgein
- retrycount 5
- send C @OUTBOUND,YOURPCPID<CR> ; Your ID Here
- waitfor PASSWORD
- send YOURPASSWORD<CR> ; Your Password Here
-
- CASE
- CONNECT : >local ; Gotcha!
- BUSY : >outdial
- "NOT " : fail
- @nocarrier : fail
- @default : fail
- ENDCASE
-
- :local ; Initialize Outdial
- purgein
- send <CR>
- wait 1
- send I<CR>
- send ATZ|
- timerset 15
- waitfor OK
- send @|
- waitfor @
-
-
-
-
-
-
-
-
-
- 143
-
-
-
-
-
- ;
- ; Setup PADS
- ;
- ; Note - if you are calling a SEAdog system,
- ; change the SET and RST 5:1 and 12:1 to 5:0 and 12:0
- ; as SEAlink is not transparent to software flow control
- ;
- ; If you only call WaZoo systems, use 5:1 and 12:1 for
- ; fewer errors and greater reliability.
- ;
- send SET?<sp>1:0,7:8<CR>
- ;
- waitfor @
- ;
- ; send RST?5:1,12:1<CR>
- ;
- ; waitfor @
-
- send CONT<CR>
- send ATH0Z<CR>
- waitfor OK|IDLE
- send <ENQ><CR> ; Turn on RV Mode
- waitfor *
-
- purgein
-
- timerset 50
- wait 2
- send D@LOCALNUM<CR>
-
- purgein
-
- case
- ANS : >landing
- ONLINE : >landing
- BUSY : fail
- FAILED : fail
- "NO CARRIER" : fail
- "NO DIAL TONE" : fail
- "NO DTR" : fail
- VOICE : fail
- @default : fail
- @nocarrier : fail
- endcase
-
- :landing ; Landing on Pluto
- wait 7 ; wait for PCP messages to clear
- purgein
- session
-
- ;/* End Of File */
-
-
-
-
-
-
-
- 144
-
-
-
-
-
- 29 Commercial inquiries
-
- To use FrontDoor in a commercial environment, a commercial licence
- must be obtained. The commercial version of FrontDoor includes
- numerous features not found in any other software package (including
- the noncommercial version of FrontDoor). Eligible users of the non-
- commercial version of FrontDoor may also benefit from the commercial
- features, and can enjoy a special "SysOp's Discount" at the time of
- writing this.
-
- The easiest way to receive up-to-date information of features,
- availability, pricing and a list of local distributors and resellers
- of the commercial version, is to file request FDINFO from one of the
- following main distribution sites:
-
-
- Online Communications, Inc. Telephone: +1 207 941 1110
- 22 State Street Modem: +1 207 990 3511
- Bangor Maine 04401 Email: 1:132/300@fidonet
- USA 1:132/301@fidonet
-
- Advanced Engineering sarl Telephone: +352 358 725
- 8, am For Modem: +352 355 936
- L-5351 Oetrange Email: 2:270/7@fidonet
- Luxembourg ae@fido.rmi.de
-
-
- The file FDINFO is also available from some FrontDoor Help Nodes
- around the world. Please, make sure that you have the latest
- available order forms before placing an order!
-
- The FDINFO package contains information about various FrontDoor-
- related utilities, such as TosScan, the conference mail package.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 145
-
-
-
-
-
- 30 Developer notes
-
- A separate package with information regarding FrontDoor is
- distributed under the name FDDEV. It contains structures and
- technical information directed towards authors of FrontDoor
- utilities. If you are planning on writing a utility with explicit
- support for FrontDoor, make sure you grab a copy of the FDDEV
- package.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 146
-
-
-
-
-
- 31 Technical specifications
-
- FrontDoor was written using Zortech C++ 2.18, TASM 2.0, and Turbo
- Pascal 6.0. It uses direct-to-screen writes, and properly supports
- virtual screen environments, such as the one provided by DESQview.
-
-
- FrontDoor features support for several FTSC (FidoNet Technical
- Standards Committee) standards and standard proposals, including:
-
- FTS-1 Basic FidoNet Technical Standard
- FTS-4 EchoMail Specification
- FTS-5 The Distribution Nodelist
- FTS-6 YooHoo NetMail Handshake
- FTS-7 SEAlink Protocol Extension
- FTS-8 BARK File Request Protocol Extension
- FSC-15 FOSSIL 5.0 Documentation and Specifications
- FSC-25 AVATAR Video Specifications
- FSC-37 AVATAR 0+ Video Specifications
- FSC-39 A type-2 packet extension proposal
- FSC-41 MSGID / REPLY: A proposal
- FSC-46 Proposed product identifier
- FSC-53 Specifications for the ^aFLAGS field
- FSC-56 EMSI/IEMSI protocol definition (EMSC-001)
-
-
- FrontDoor's FTSC product code is 0x0C (or 12 decimal).
-
-
- The proper nodelist file request flag for systems using FrontDoor is
- XA.
-
-
- FrontDoor's Editor (FM) allows you to share the Hudson Message Base
- together with other programs, such as RemoteAccess, following the
- RemoteAccess/FrontDoor HMB sharing specifications.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 147
-
-
-
-
-
- 32 Credits
-
- Thanks to..
-
- ..Anders Johansson, Andrew Khoo, Dave Hatch, Bill Bolton, Bill Dunn,
- Bjorn Bogfelt, Bob Rudolph, Boris Osadciw, Chris Homrighausen (hey
- bro!), Chris Van Tuin, Chris Baker, Clement Studer, David Kerley,
- Dieter Soltau, Eelco de Graaff, Fred Vlinkervleugel, 1B Systems
- Management Ltd, Ken McVay, Darryl Gregorash, Carina Carlsson, Lovisa
- Hagberg, Gareth McClean, Joop Mellaart, Horst Buhl, James Henthorn,
- James Smith, Online Communications Inc., Jan Crommenacker, Jan
- Jonsson, Jeff Wolach, Jerry Hindle, Jim Faucette, Gerard van der
- Land, Joakim Hernberg, John Huls, Jon Schneider, Ken Doebler, Kim
- Lykkegard, Malte Erikson, Mario Diaz, Mark Howard, Mats Knuts, Mats
- Wallin, Peter Adenauer, Werner Berghofer, Randy Harner, Rick
- Petersen, Rick Siegel, Robin Valle', Ruud de Bruin, Scott Samet,
- Thomas Stjernstrom, Thomas Sundblom, Todd Lehr, Maurie Halkier, Tony
- Wagner, Ulf Hedlund, Ulf Jungjohann, Andreas Polz, David Nugent, Tom
- McGivern, Andrew Farmer, Steve Froeschke, Orlando Castillo, Eric
- Larson, Paul Marwick, Tommy Svensson, Bob Beilstein, Bruce Bodger,
- Michael Butler, Paul Schlyter, Bill Kraski, Alexander Holy, Lars
- Eriksson, Fabiano Fabris, Bob Snowdon, Aaron Schmiedel, Mike Janke,
- Peter and Irene Janssens, Jeff Murphy, Gary Funk, Luca Leone, Andrew
- Milner, Jan Berglund, Sascha Vogt, The Crocodile Club in Karlsruhe,
- Michael Raschke, Bofferding Breweries, Mark Kerr, Robert Hessler,
- Mats Birch, Mats Jansson, John Barton, Dirk Astrath, Glen Johnson,
- Ulf Nilsson, Ed Meloan, Nick Parker, Jim Louvau, Luc and Nathalie,
- Bob Hoffman..
-
- All the help nodes.
-
- ..Tom Jennings, Felix Kasza, Bob Hartman, Chris Irwin, Chuck
- Forsberg, Henk Wevers, Randy Bush, Ray Gwinn, Thom Henderson, Vince
- Perriello, Wynn Wagner III, Mike Ratledge, Rick Moore, G. Adam
- Stanislav, Doug Boone, Ralf Brown, jim nutt, Maximilian Hantsch.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 148
-
-
-