home *** CD-ROM | disk | FTP | other *** search
- ╟─╖╟─╖╟╖╟─╖╟─╖╟─╖╟─╖╟─╖╟─╖╟─╖╟─╖╟─╖╟─╖╟─╖╟─╖╟─╖╟─╖╟─╖╟─╖╟─╖╟─╖╟─╖╟─╖╟─╖╟─╖╟─╖╟
- ─╢╙─╢╙─╢╙─╢╙─╢╙─╢╙─╢╙─╢╙─╢╙─╢╙─╢╙─╢╙─╢╙─╢╙─╢╙─╢╙─╢╙─╢╙─╢╙─╢╙─╢╙─╢╙─╢╙─╢╙─╢╙─╢╙─
-
- ┬─┬─────┐ ──────┐ ┌─┬─────┐
- │ │ ┌┘ │ │
- │ ├── ┌─┘ │ │ ┌┬──┐ ┬┬─ ┬┬─ ┬┬─┐ ┌┬──┐ ┌┬──┐ ┬┬ ┌─
- │ │ ┌┘ │ │ │├──┤ ││ ││ │├─┴┐ │├──┤ ││ │├─┴┐
- ┴─┴─────┘ └────── └─┴─────┘ ┴┴ ┴ ┴┴──┘ ┴┴──┘ ┴┴──┘ ┴┴ ┴ └┴──┘ ┴┴ ┴
-
- ╥─╖ ╥ ╥ ╥─╖ ╥──╖ ╓──╖ ─╥──╖
- ╟─╨╖ ╙──╢ ▀ ╟─╨╖ ╟─╥╜ ╟──╢ ║ ║
- ╨──╜ ╙──╜ ▀ ╨──╜ ╨ ╨─ ╨ ╨ ─╨──╜
-
- ╓─── ╓──╖ ╥──╖ ╓─╖ ╥ ╥──╖ ╥──╖
- ║ ╓╖ ╟──╢ ╟─╥╜ ║ ║ ║ ╟─ ╟─╥╜
- ╙──╜ ╨ ╨ ╨ ╨─ ╨ ╙─╜ ╨──╜ ╨ ╨─
-
-
- Copyright 1992 by Brad Garner - Version 1.55
- Compiled 08/13/92 @ 6:54 pm
-
- ─╢╓─╢╓─╢╓─╢╓─╢╓─╢╓─╢╓─╢╓─╢╓─╢╓─╢╓─╢╓─╢╓─╢╓─╢╓─╢╓─╢╓─╢╓─╢╓─╢╓─╢╓─╢╓─╢╓─╢╓─╢╓─╢╓─
- ╟─╜╟─╜╟─╜╟─╜╟─╜╟─╜╟─╜╟─╜╟─╜╟─╜╟─╜╟─╜╟─╜╟─╜╟─╜╟─╜╟─╜╟─╜╟─╜╟─╜╟─╜╟─╜╟─╜╟─╜╟─╜╟─╜╟
-
-
- (These DOCs *don't* print too well!)
-
- ▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌Overview▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌
-
- EZ Callback is a simple, yet very efficient approach to
- modern BBSing for SysOps. With the growing need of verification
- due to "hackers", many SysOps have decided, that instead of making
- that stupid, and oftentimes EMBARRASSING, voice telephone call,
- that they use a CALLBACK VERIFIER (herein referred to as a CBV).
- A CBV will ask a user, over the modem, for their telephone number,
- then in theory, drop carrier and call then back OVER THE MODEM.
- Once a connection is established, the user is asked for their
- password. Upon entering it correctly, they are validated on that
- BBS, as it is obvious that they entered their phone number
- correctly. This seems just fine for all SysOps, except for one
- little minority that is quickly growing - Searchlight SysOps.
- yes, there are only 2 known Callback verifiers specifically for
- Searchlight SysOps. One can only work with 1.77 and under,
- because it writes directly to the user file. Another is a very
- buggy one that occasionally locks the BBS up, doesn't always
- validate, and does not seem to be fully supported by the author.
- That is why this program was written - to provide a VERY effective
- (and colorful!) Callback System for Searchlight SysOps that uses
- the simplest way to validate someone - the VALIDATE.EXE program!
-
- ▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌Disclaimer▌and▌Copyright▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌
-
- This program is Copyright (C)1992 by Brad Garner. You may not
- disassemble, reverse engineer, or "Hex-Edit" this program in any
- way. Doing so violates this copyright.
-
-
- I, Brad Garner, assume no responsibility for your use, or
- inability to use, or damage caused by the use of this program.
- I cannot guarantee that this program is not infected with a virus,
- unless it is downloaded from any designated Beta sites. By running
- this program, you agree to these terms (not too, much, eh? :) )
-
- ▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌This▌is▌SHAREWARE!▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌
-
- Yes, this program is SHAREWARE. What this means is that you
- may try it for a reasonable amount of time, then you are under
- obligation to register this with the author. By "reasonable", I
- mean I am letting you make that decision. It does NOT mean the
- entire life of your BBS, 1 year, or even 6 months! I would think
- 2 months would be nice. Or until the delays and flashing letters
- get to you, that is. Okay, so I can't FORCE you to register, but
- people who did not have reportedly taken long falls off of cliffs,
- been beaten by the Energizer Bunny, and gotten extra little dots
- of toothpaste on the bathroom mirror. I have spent many MONTHS
- and sleepless night, and many HOURS of uploading test copies with
- little bugs fixed, to achieve this version. Thank you, that is
- all.
-
- ▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌"System ▌Requirements"▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌
-
- IBM 100% compatible, DOS 3.3 or higher, SLBBS 1.77 and up should
- work, VALIDATE.EXE, and a fully Hayes compatible modem.
-
- ▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌"Quick▌Start!"▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌
-
- Here is a quick and easy way to get yourself running in about
- 10 minutes!
-
- First, create a directory. For these examples, we will use
- C:\CALLBACK. Then get into it. You do this by typing:
-
- MD CALLBACK <enter>
- CD\CALLBACK <enter>
-
- Now, unarchive the EZ Callback Archive into this directory.
- Some of the more common ways of doing this are:
-
- HOPEFULLY, if you run a BBS you will know what to do! :)
- Now, type the following: CALLBACK <enter>
-
- Then press ENTER once more to enter CONFIGURATION. An
- alternate way to do this is: CALLBACK CONFIG, which will bypass
- pressing ENTER again.
-
- Now, you will see a window instructing you on how this
- configuration program works. Once you see the next window, you
- will be faced with a SLEW of options! These are all very self
- explanatory. If you need help, you can consult the "CALLBACK.CFG"
- section later in these DOCs. Once done, you will be asked if you
- wish to make a batch file. I suggest doing this, as this next bit
- assumes you DID.
-
- Now that you have a batch file in your Searchlight directory,
- you will have to do one (maybe two) more things. You will need to
- edit your DOORS.DEF file, if you still use one and add this to it:
-
-
- 0;0;0;0;Callback Verifier;.;CBV.BAT /G%G /P%P /A%A /M%M /N%N
-
- If you are using SL 2.25 with menus, you may put it into any
- menu you wish as a DOOR type.
- ------------------------------------------------------------------------------
- E D I T C O M M A N D S
-
- <Enter> Edit <F1> Add <F2> Delete <F3> Copy <F4> Move
-
- Command Key Description Type │PgUp│
-
- CALLBACK CALLBACK VERIFIER DOOR CBV.BAT /G%G /P%P /A%A
-
- <End of Listing>
- -------------------------------------------------------------------------g-----
-
- The second screen should look something like this, with the
- exception of access levels and attributes you desire for your
- system.
-
- ------------------------------------------------------------------------------
- E D I T C O M M A N D
-
- Press F1 to Change Command Type
-
- 1. Command Name .................. CALLBACK
- 2. Command Key ...................
- 3. Description ................... CALLBACK VERIFIER
- 4. Minimum Access Level .......... 0
- 5. Maximum Access Level .......... 10
- 6. Required Attributes ........... N (Maybe the New User attribute?)
- 7. Exclude Attributes ............ V (Maybe a *V*alidated user?)
- 8. Preference Attributes .........
- 9. Help Levels ................... Novice
- 10. Door Command .................. CBV.BAT /G%G /P%P /A%A /M%M /N%N
- 11. Directory Path ................ C:\BBS
- 12. Communications Support ........ None <----EZ CBV handles its own IO!
- 13. Abort Method .................. None <----this MUST BE NONE!
- 14. Write Protection .............. No
- 15. Parameter File ................ None
- 16. Pause After Door .............. Yes
-
- ------------------------------------------------------------------------------
-
- Now, if you have an ANSI or ASCII menu, you will just need to
- add "Callback Verifier" to them! In future times, you can just
- use the CALLBACK CONFIG method, or edit CALLBACK.CFG. It will be
- a fully commented text file!
-
-
-
- ▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌Acknowledgements▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌
-
- QuickBASIC 4.5 is (C)1985-1988 Microsoft Corp.
- QBSerial 2.01 is (C)1992 Jeff Sumberg (The Comm Routines)
- Windowing Routines in Setup are (C)Christy Gemmell
- DesqView is (C)1987, 88, 89, 90 Quarterdeck Office Systems.
- The Energizer Bunny is a TradeMark of Energizer, Inc.
- Searchlight BBS is (C) Searchlight Systems
- MS-DOS is (C) Microsoft Corp.
- Windows is (C) Microsoft Corp. (Yes, I mention Windows ONCE!)
- Ultima VII is (C) Origin Systems (Why is Ultima VII IN HERE?!)
-
- Any other products mentioned are copyright of their
- respective owners/companies.
-
- A big thanks to Anthony Hernandez. He was the reason this
- program was written, due to his constant complaining about his
- current CBV. :) He also provided endless help in ALPHA testing,
- and the pre-PRErelease which was very buggy and had TYPOS in it!
- Thanks again! And call his BBS at (214)264-6979!
-
- ▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌CALLBACK.CFG▌-▌Configuration▌Options▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌
-
- The following is a brief description of all configuration
- options. For even MORE detail, look in any CALLBACK.CFG file!
-
- * Locked Baud - For high Speed modems. If you don't know what this
- is, then chances are it's zero! :)
-
- * Your Area Code - The area code you are in. Almost all (if not
- all) calls are local in this area.
-
- * 2nd Local Area Code - You might not be in this area code, but
- some area code around can also be dialed locally (ie xxx-xxxx).
- Even if YOU CAN'T dial it locally, still put it here, as some
- users probably can.
-
- * Do you have a metro line? - Can you dial the alternate area code
- locally? NOTE: It will still give an option for long distance,
- as some parts of the area code may still be long distance. This is
- a service of the Dallas/Ft.Worth area and may not apply to your
- local region of service, if not just leavel it blank.
-
- * Will you do long distance validation? - I think you can figure
- this one out.
-
- * The path to VALIDATE.EXE - Basically, your BBS path. Make sure
- there is NOT a trailing backslash if you edit with a text editor!
-
- * Maximum and Minimum Access - These establish which users you
- will allow to go through the validation process. The maximum
- should be one below a validated user status, and Minimum should be
- one ABOVE a guest account or some hacker who has lost all
- privileges. :)
-
- * The hang up string - What will hang up your modem. I suggest
- leaving this BLANK, as the program will drop DTR, and that is
- almost GUARANTEED to work!
-
-
- * The dialing prefix - Start with AT, then any commands that act
- as an initialization string, then DT (tone) or DP (pulse). I
- HIGHlY recommend you put in S7=xx where xx is the number of
- seconds to try dialing, X4 which will enable result codes like NO
- DIALTONE and BUSY, and M0 which turns off the speaker. These of
- course are for Hayes compatible modems, yours may vari. Aslo make
- sure you modem is set to use VERBOSE reslut codes not NUMERIC.
-
-
- * Valid Main & Files Access & File ratio - Just put in the correct
- number, or leave a BLANK LINE for it to remain the same!
-
- * Valid Subboards and/or Security Attributes - The subboards a
- user can access, or in 2.15 and great, security attributes.
-
- * Hang up ALL users? - Some people might just want to turn this on
- as a SAFETY precaution. Some places in the US have STRANGE long
- distance companies. This will hang up a user after validation,
- even IF THEY MIGHT BE LOCAL. Keep in mind, even when this IS
- turned off, the CBV STILL will hang anyone up it suspects of being
- long distance! :)
-
- * Are you running DesqView? - Please see "DesqView?" section
- below...
-
- * Do you want a LOG file? - By Default, CALLBACK.LOG is generated
- which records what users do. You can turn it off if you wish...
-
- Now, for all of you people DEMANDING a status report to be
- mailed to you, here's the solution for *2.15* (Check the docs for
- other version). All it takes is a little... BATCH MAGIC!(bad joke)
- Add this AFTER the CBV.EXE in CBV.BAT, but BEFORE the EXIT command.
-
- cd \BBS
- SLMAIL SEND MAIL -T SYSOP -S CBV -X \CALLBACK\CALLBACK.LOG
- DEL \CALLBACK\CALLBACK.LOG
- EXIT
-
- Not hard, huh? :)
-
- ▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌The▌Command▌Line▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌
-
- The command line is relatively simple. It is comprised of a
- forward slash (/), a letter representing something, then the
- VALUE of that something right after it! :) This method was used
- instead of using PCBOARD.SYS or even a door converter to convert
- to DORINFO1.DEF or such. Here is what each command line parameter
- represents:
-
- * /G - This stands for GRAPHICS. WHen you put a %G in front of
- this, Searchlight will either put a C, M, or N (Color, monochrome
- or none). If you are doing this on the command line, then this
- must be uppercase!
-
- * /P - The COM port of the modem. Originally, I had this in the
- configuration, but then I thought there might be a CHANCE of
- making this multi-node if the port was passed on the command line.
- This is anywhere from 1 to 4
-
- * /A - The user's Main Access. This is used to establish if
- these people can be validated or not. If their security is too
- HIGH, then they are already validated, and if its too LOW, they
- are either a HACKER or a GUEST account! This is from 1 to 255.
-
- * /M - This is *M*inutes left. I used /M because That is the way
- Searchlight passes it. ie /M%M. This is probably from 1 to 9999,
- but going over 2000 will cause an overflow.
-
- * /N - The name of the user. This MUST be the last option on the
- command line, as it is usually two (maybe even three) words. If
- it is not, you will get EVERYTHING from the /N to the right of it!
- Also, you don't have to worry about trailing spaces, as they are
- removed.
-
- * CONFIG - This is not required, but when put on the command
- by itself, it loads up the configuration program.
-
-
- * PRINTFORM - Just what it says, it will allow you to print a
- registration form. The same thing can be achieved by typing: COPY
- REGISTER.DOC PRN.
- ******************************************************************************
- NOTE: All commands must have NO spaces between them!
- *************** ie: /GC is okay, but /G C is NOT! ************************
-
- ▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌PREFIX.DAT▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌
-
- Upon request, I have added support for a PREFIX.DAT file. In
- this, should you wish to utilize it, you would put all prefixes
- you WILL dial to. A good use might be for a LARGE state whose area
- code is the same EVERYWHERE, and also who might have a very messed
- up phone system! :) You might want to put all the prefixes local
- to you here.
-
- NOTE #1: You do NOT HAVE to put this. This file is only for a very
- few special cases. If not there, the CBV won't say ANY-
- thing! :)
-
- NOTE #2: You CANNOT use this with long distance set ON. COME ON
- PEOPLE - BE REALISITIC! You CANNOT put EVERY prefix in
- the USA in a file! :)
-
- NOTE #3: If there IS a PREFIX.DAT, all normal checks will be run
- on the phone number(ie making sure it wasn't used before)
-
- ▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌OPENING.ANS & OPENING.ASC▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌
-
- If you wish, you can designate these two files. They will be
- shown directly after the title screen about "EZ Callback, (C)1992
- Brad Garner - Registered to:...". If they are not there, then
- that's great. If they are, that's great, too. Space bar SHOULD
- abort these, but I have found that, like Searchlight, flow control
- tends to go down the drain once locked baud rates are used.
-
- ▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌The▌main▌"menu"▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌
-
- The main menu, so to speak, is really nothing more than a
- little information, and a scroll bar with 3 options. [C]ontinue
- will, well, CONTINUE, [H]elp will basically explain WHAT A CALL
- BACK VERIFIER IS, and [Q]uit will allow an unvalidated user to
- quit. You can press Space to move through the options, or press
- the 1st letter. And you press ENTER to confirm your choice.
-
- ▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌Continuing▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌
-
- Once you continue, you will be asked for area code, exchange
- and suffix. Then, EZ Callback will set forth hundreds of
- algorithms that try and guess what your phone number MIGHT be.
- Actually, it's not that big of a deal, but there ARE a lot of
- ways it thinks of, then presents you with the only possible ones
- under the conditions the BBS is set up under. NOTE: I am almost
- POSITIVE that I have accounted for everything here, but since my
- beta testing area is limited, please tell me if there is something
- missing!
-
- Then you will be asked for a password. Simple....
-
-
- Then it will check your phone number and if it finds you
- HAVEN'T used it before or if you're NOT on the lockout list (see
- below), then it will drop carrie and call you back. This area of
- the program SEEMS to work just fine, but once again, please report
- any bugs! A connection attempt will be tried TWICE (I think this
- is enough. If ANYONE asks, I will allow it to be configurable.),
- then it will abort. If a connection is made, there is a 10 second
- countdown (a suggestion from a beta site, as 9600 and 14.4k modems
- would miss some of thee 1st words while still trying to see if it
- was a high speed connection). Then the user will have 3 tries to
- enter their password from earlier. In fact, it SHOULD still be on
- the SCREEN, so it shouldn't be THAT HARD! :) Once entered
- correctly, VALIDATE.EXE will be called will all the correct
- command-line parameters. If the user was a long-distance caller,
- they will be hung up, and POLITELY be asked to call back. Once
- again, if ANYONE suggests it, I will allow an option "Hang up Long
- Distance Users after validation?". But I don't think you want
- your phone bill higher than it ALREADY IS! :)
-
- ▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌The▌Function▌Keys▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌
-
- The SysOp (or whoever happens to be at the BBS computer at the
- time), has some functions not available to the remote user. They
- are:
-
- * F1 - Show a help screen with a brief description of each
- function key. This shouldn't be noticed at all on the remote
- end.
-
- * F2 - This will tell the user they are being paged, and it
- will begin beeping. When either side presses a key, it will stop.
- This is useful for "waking up" a user that has "fallen asleep". :)
-
- * F4 - This will suspend the operation of the CBV, and let the
- SysOp do basic things in DOS. Remember, you probably won't have
- over 350k, so this isn't the time to fire up Windows or Ultima
- VII! :)
-
- * F5 - The universal "boot user" key. This will stop the CBV
- in its tracks, and return the user to the BBS. It WILL, however,
- make the user BELIEVE that the CBV ended with error 60. In
- otherwords, this is a "polite" way to boot them from the door!
- <evil grin>
-
- * F6 & F7 - Reduce and Increase Time in 2 minute intervals.
- Just what it says! Note: The routine to check on time left is
- only called every 60 seconds, so it IS possible to reduce time to
- NEGATIVE! :) But rest assured they will be booted once the
- routine is called! Also, the status line MAY (and probably won't)
- not be updated instantly. Don't worry, though.
-
- * F10 - This is a primitive chat mode. There is no word wrap,
- BUT the remote and local user's colors ARE different! press ESC
- to exit this.
-
- Once AGAIN, if you can think of anything else I could add to
- this list, just let me know!
-
-
- ▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌Locking▌out▌phone▌numbers▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌
-
- To make a phone number so it cannot be dialed, you must edit
- the CALLBACK.PHN file. Here is the format:
-
- [Any Text],[phone number]
-
- You MUST have text there, or at LEAST a comma! The phone number
- must have no spaces in it, commas, such. Here are some examples:
-
- My Voice Line,2145556970
- Information,5551212
- sdfjkh,9479482
- Nintendo Hint Line,12068857529
- ,2142646979
-
- This is a very limited area right now, but will soon be added on
- to.
-
- ▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌Locking▌out▌prefixes▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌
-
- To lock out a prefix, you would do something VERY similar to
- locking out a phone number:
-
- [Any Text],[prefix]*
-
- As before, you MUST have at least a comma, and no commas in
- the [Any Text] area. Here are some examples:
-
- Any Information Service,555*
- Stupid pay numbers,976*
- That one Long Distance Prefix,998*
- ,562*
- etiouf,123*
-
- ▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌Multi-Node?▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌
-
- I have no PROOF that this will work multi-node. It does not
- INTERNALLY support multi-node, but if your multi-tasking software
- handles this, then great. I KNOW it would get the correct port,
- but if all of your modems are not locked at the same baud rate as
- specified in the configuration, or some are not locked and some
- are, then I KNOW it will not work. If enough people actually ASK
- me to work on this, I will. But my suggestion would be to
- designate this to work only on one node. Probably Node 1, as that
- is what all new users would log in on. I HAVE been able to tell,
- however, that if the above requirements are ment (ie, all ports
- locked at same speed), it WILL work with one person at a time. It
- has not been determined yet if two people at the same time in it
- will work, although it PROBABLY most likely will.
-
-
- ▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌Desqview?▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌
-
- Yes! As of version 1.2, Desqview IS supported! In
- configuration, the "Desqview" option should be turned to 1. This
- will cause BIOS screen writes. The only catch is this.
- QuickBasic, for some reason, is DETERMINED to keep us from writing
- to BIOS. So I'm writing to the CONsole, which will take it
- through BIOS. MUCH SLOWER, in fact. And, i'm having to send ANSI
- codes for it to work. In short, you'd better make SURE you have
- DVANSI.COM loaded! If you have a better solution as a programer,
- please contact me at the address below.
-
- ▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌CGA Support?▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌
-
- Allright, I KNEW someone would bring this up. As of version
- 1.0, I was cutting down on you people. Not that I'm NOT ANYMORE,
- but you can stop static by turning the Desqview option on. This
- SHOULD work, but STILL, just get a VGA!
-
- ▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌Author▌Support▌and▌stuff▌like▌that▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌
-
- Yes, this program IS, and as far as I can tell, WILL ALWAYS BE
- FULLY SUPPORTED! I enjoy my programming, and am tickled with joy
- when I see someone enjoying on of my programs. :) That ALONE is
- enough to keep me supporting my products! This common
- DISCOURAGEMENT to an author is finding their program "cracked",
- or "hex-edited", because someone didn't like their wording or
- something. That HAS caused me to drop support on ONE product to
- date. Let's try and keep it at ONE, okay? Thanks.
-
- You can reach me at Thule BBS - I'm CoSysOp there. Weirdest
- thing is, we run TELEGARD! So you won't see the CBV in action
- there (although the latest version will ALWAYS be available for
- download!). The number is: (214)394-7448
-
- The Hobby Hut BBS is the main distribution site as Ed Underwood
- is a support and sales site for Searchlight. You may report bugs
- and direct question to me through his system. He is running the
- CBV in multinode and under DesqView. The latest version will also
- be availible to download or FREQ from The Hobby Hut at:
-
- - 1:124/2109.0 or 250:305/655 -
- (214)462-9124 Node 1 (V.32bis)
- (214)393-0338 Node 2 (V.32bis)
-
- You'll also find me on "The Happy Camper". I KNOW I call daily
- there, and it IS a Searchlight. Also, the latest version will
- ALSO be available there. The number is (214)264-6979.
-
- Star Base 147 is now yet another fine BBS establishment where
- the CBV can be picked up. While there, why not read some of the
- latest, top secret gossip on Star Trek. If you're a trekker, that
- is. Well, the 3 nodes are: (214)262-9094, (214)262-9095, and
- (214)262-9096. Thanks to Steve Andrews, SysOp there, for testing
- the new Desqview interface!
-
-
- You can also write to me at:
- Brad Garner
- 209 Mill Creek Drive
- Arlington, TX 76010
-
- ▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌Common▌Error▌Numbers▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌
-
- Here are some of the MOST COMMON error numbers. This does NOT
- cover them all, as I want to minimize document size.
-
- Number Description
- -------------------------------------------------------------------
- 6 Overflow - Grossly large numbers. ie 1000 minutes left
- 7 You need to free up more memory!
- 11 Division by Zero - maybe if 0 min. left at midnight.
- 14 Another out of memory problem!
- 25 Printer isn't on. This is handled internally, though.
- 52 Bad File Name - Check the path for VALIDATE.EXE
- 57 Some I/O error occurred with a device
- 60 The "error" generated when a user is booted from the door!
- 61 Disk Full!! A SysOp's worst nightmare!!!
- 62 You deleted a line in CALLBACK.CFG, or didn't remove a
- name AND number at the same time from CALLBACK.PHN. Maybe
- you added a lockout number without still putting a "name"?
- 64 Bad File Name (again). Check all paths in the .CFG file.
- 67 Make sure you didn't specify less than FILES=5 in
- CONFIG.SYS. This SHOULD be around 30 for Searchlight!
- 68 Maybe an error if you don't HAVE a printer?!
- 70 You made the .LOG or .CFG file READ-ONLY?!
- 71 You'd better not be running this from a FLOPPY!!!
- 72 Maybe a BAD SECTOR on your hard drive? (ARG!)
- 73 This requires DOS 2.10 or later. (but 3.3 or later is
- better!)
- 76 Once AGAIN, MAYBE check your paths in CALLBACK.CFG
-
-
- If another error occurs, and you cannot immediately see what
- you might have done wrong, PLEASE write to me at the address in
- the above section, or call one of the BBSes I am on! Thanks!
-
-
- ▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌This▌is▌the▌end▌of▌the▌Document▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌▌