home *** CD-ROM | disk | FTP | other *** search
Text File | 1994-03-02 | 335.5 KB | 9,070 lines |
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- FrontDoor 2.12 Shareware
-
- User guide
-
- For noncommercial use and distribution
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- To the memory of Catharina Frodin and Alva Gardlund.
- And to Christian, Katja, and Igor Homrighausen.
-
- Party on Fred, we miss you.
-
-
-
- Table of contents
-
- 1 FRONTDOOR SHAREWARE VERSION LICENCE AGREEMENT - "FFHA194k" . . . . 1
-
- 2 Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
- 2.1 Hardware requirements . . . . . . . . . . . . . . . . . . . . 3
- 2.2 Software requirements . . . . . . . . . . . . . . . . . . . . 3
- 2.3 Additional equipment . . . . . . . . . . . . . . . . . . . . 3
- 2.4 BBS software . . . . . . . . . . . . . . . . . . . . . . . . 4
-
- 3 Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
- 3.1 CONFIG.SYS . . . . . . . . . . . . . . . . . . . . . . . . . 5
- 3.2 AUTOEXEC.BAT . . . . . . . . . . . . . . . . . . . . . . . . 5
- 3.3 Directories . . . . . . . . . . . . . . . . . . . . . . . . . 5
- 3.4 Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
-
- 4 Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
- 4.1 FD environment variable . . . . . . . . . . . . . . . . . . . 6
- 4.2 FD.SYS <> SETUP.FD . . . . . . . . . . . . . . . . . . . . . 6
- 4.3 Getting started . . . . . . . . . . . . . . . . . . . . . . . 6
- 4.4 Menus . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
- 4.4.1 File . . . . . . . . . . . . . . . . . . . . . . . . . 6
- 4.4.2 Global . . . . . . . . . . . . . . . . . . . . . . . . 7
- 4.4.3 Mailer . . . . . . . . . . . . . . . . . . . . . . . 11
- 4.4.4 Editor . . . . . . . . . . . . . . . . . . . . . . . 18
- 4.4.5 Terminal . . . . . . . . . . . . . . . . . . . . . . 21
- 4.4.6 Modem . . . . . . . . . . . . . . . . . . . . . . . . 24
- 4.4.7 Printer . . . . . . . . . . . . . . . . . . . . . . . 24
- 4.4.8 Manager . . . . . . . . . . . . . . . . . . . . . . . 25
- Event Manager . . . . . . . . . . . . . . . . . . . . . . . 25
- Folder Manager . . . . . . . . . . . . . . . . . . . . . . 25
- Security . . . . . . . . . . . . . . . . . . . . . . . . . 27
- Notes regarding protocols . . . . . . . . . . . . . . . 29
- Request Manager . . . . . . . . . . . . . . . . . . . . 29
-
- 5 The nodelist and the nodelist compiler . . . . . . . . . . . . . 30
- Zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
- Region . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
- Net . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
- Node . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
- Point . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
- 5.1 Hosts and hubs . . . . . . . . . . . . . . . . . . . . . . 30
- 5.2 Compiling a nodelist . . . . . . . . . . . . . . . . . . . 31
- 5.2.1 FDNODE.CTL . . . . . . . . . . . . . . . . . . . . . 31
- POINTLIST . . . . . . . . . . . . . . . . . . . . . . . 31
- PVTLIST . . . . . . . . . . . . . . . . . . . . . . . . 31
- SWEPULSE . . . . . . . . . . . . . . . . . . . . . . . 32
- PHONE . . . . . . . . . . . . . . . . . . . . . . . . . 32
- USE ZONE . . . . . . . . . . . . . . . . . . . . . . . 32
- DIAL . . . . . . . . . . . . . . . . . . . . . . . . . 32
- COST . . . . . . . . . . . . . . . . . . . . . . . . . 33
- 5.3 Nodelist flags . . . . . . . . . . . . . . . . . . . . . . 34
- 5.4 Command-line switches . . . . . . . . . . . . . . . . . . . 34
- 5.5 Points . . . . . . . . . . . . . . . . . . . . . . . . . . 34
- 5.5.1 Pointlist . . . . . . . . . . . . . . . . . . . . . . 35
- 5.5.2 FDNODE.CTL . . . . . . . . . . . . . . . . . . . . . 35
- 5.5.3 Treatment of points . . . . . . . . . . . . . . . . . 36
- 5.5.4 Remapping . . . . . . . . . . . . . . . . . . . . . . 36
- 5.5.5 POINTNET . . . . . . . . . . . . . . . . . . . . . . 36
-
-
-
- 5.6 Sharing the nodelist . . . . . . . . . . . . . . . . . . . 37
-
- 6 Modems and FOSSIL drivers . . . . . . . . . . . . . . . . . . . . 38
- 6.1 Basic configuration . . . . . . . . . . . . . . . . . . . . 38
- Hardware . . . . . . . . . . . . . . . . . . . . . . . . . 38
- Serial port . . . . . . . . . . . . . . . . . . . . . . 38
- Locked port . . . . . . . . . . . . . . . . . . . . . . 38
- Maximum baud rate . . . . . . . . . . . . . . . . . . . 38
- Reset modem to connect speed . . . . . . . . . . . . . 39
- Lower DTR when busy . . . . . . . . . . . . . . . . . . 39
- Lower DTR to terminate call . . . . . . . . . . . . . . 39
- Toggle DTR before dialing . . . . . . . . . . . . . . . 39
- Carrier detect mask (CDMASK) . . . . . . . . . . . . . 39
- Connect messages . . . . . . . . . . . . . . . . . . . . . 39
- Status messages . . . . . . . . . . . . . . . . . . . . . . 39
- Custom message . . . . . . . . . . . . . . . . . . . . . . 39
- Command strings . . . . . . . . . . . . . . . . . . . . . . 40
- Escape code . . . . . . . . . . . . . . . . . . . . . . 40
- Return on-line . . . . . . . . . . . . . . . . . . . . 40
- On-hook . . . . . . . . . . . . . . . . . . . . . . . . 40
- Off-hook . . . . . . . . . . . . . . . . . . . . . . . 40
- Dial . . . . . . . . . . . . . . . . . . . . . . . . . 40
- Suffix . . . . . . . . . . . . . . . . . . . . . . . . 41
- Delay . . . . . . . . . . . . . . . . . . . . . . . . . 41
- Init-1..Init-3 . . . . . . . . . . . . . . . . . . . . 41
- Down . . . . . . . . . . . . . . . . . . . . . . . . . 41
- Reset . . . . . . . . . . . . . . . . . . . . . . . . . 41
- Answer control . . . . . . . . . . . . . . . . . . . . . . 41
- Manual answer . . . . . . . . . . . . . . . . . . . . . 41
- Fax . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
- 6.2 Advanced configuration . . . . . . . . . . . . . . . . . . 42
- 6.3 The Modem Manager . . . . . . . . . . . . . . . . . . . . . 42
- An example, the HST/DS . . . . . . . . . . . . . . . . . . 43
- 6.4 FOSSIL drivers . . . . . . . . . . . . . . . . . . . . . . 43
- BNU . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
- X00 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
- OS/2 2.x . . . . . . . . . . . . . . . . . . . . . . . . . 45
-
- 7 Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
- 7.1 The Event Manager . . . . . . . . . . . . . . . . . . . . . 46
- 7.1.1 External event behavior . . . . . . . . . . . . . . . 47
- 7.1.2 Mail event behavior . . . . . . . . . . . . . . . . . 48
- 7.1.3 The @ event . . . . . . . . . . . . . . . . . . . . . 50
- 7.1.4 Overlapping events . . . . . . . . . . . . . . . . . 51
-
- 8 Mailer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
- 8.1 Menus . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
- 8.1.1 Programs <Alt-P> . . . . . . . . . . . . . . . . 52
- 8.1.2 Utilities <Alt-U> . . . . . . . . . . . . . . . . 52
- 8.1.3 Mail <Alt-M> . . . . . . . . . . . . . . . . 53
- 8.1.4 Your profile . . . . . . . . . . . . . . . . . . . . 54
- 8.2 Mail queue <Alt-B> . . . . . . . . . . . . . . . . . . 55
- 8.3 Call progress . . . . . . . . . . . . . . . . . . . . . . . 56
- 8.4 Semaphore indicators . . . . . . . . . . . . . . . . . . . 56
- 8.5 Undialable . . . . . . . . . . . . . . . . . . . . . . . . 56
-
- 9 Editor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
- 9.1 Main <Alt-M> . . . . . . . . . . . . . . . . . . 57
- 9.2 Edit <Alt-E> . . . . . . . . . . . . . . . . . . 58
-
-
-
- 9.2.1 Edit mode <Alt-T> . . . . . . . . . . . . . . . . . . 59
- 9.2.2 Toggle <Ctrl-F2> . . . . . . . . . . . . . . . . . 60
- 9.3 Utilities <Alt-U> . . . . . . . . . . . . . . . . . . 60
- 9.4 Purge <Alt-P> . . . . . . . . . . . . . . . . . . 61
- 9.5 Help <Alt-H> . . . . . . . . . . . . . . . . . . 62
- 9.6 Entering new messages . . . . . . . . . . . . . . . . . . . 63
- 9.7 Message survey <Alt-F9> . . . . . . . . . . . . . . . . . 63
- 9.7.1 Main menu . . . . . . . . . . . . . . . . . . . . . . 63
- 9.7.2 Continuous tagging . . . . . . . . . . . . . . . . . 64
- 9.7.3 Range select <F4> . . . . . . . . . . . . . . . . . 64
- 9.8 Keyboard macros . . . . . . . . . . . . . . . . . . . . . . 65
- Examples . . . . . . . . . . . . . . . . . . . . . . . . . 65
- 9.9 Carbon copies (CC) . . . . . . . . . . . . . . . . . . . . 66
- 9.9.1 Hidden CC's . . . . . . . . . . . . . . . . . . . . . 67
- 9.9.2 Using files as input to CC's . . . . . . . . . . . . 67
- 9.9.3 Address expansion . . . . . . . . . . . . . . . . . . 67
- 9.10 Blind Carbon Copies (BCC) . . . . . . . . . . . . . . . . 67
- 9.11 Cross-posting (XC) . . . . . . . . . . . . . . . . . . . . 67
-
- 10 Terminal . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
- 10.1 Menus . . . . . . . . . . . . . . . . . . . . . . . . . . 69
- 10.1.1 File <Alt-F> . . . . . . . . . . . . . . . . 69
- 10.1.2 Line settings <Alt-L> . . . . . . . . . . . . . . 70
- 10.1.3 Session <Alt-S> . . . . . . . . . . . . . . . . 71
- 10.1.4 Options <Alt-O> . . . . . . . . . . . . . . . . 73
- 10.2 Keyboard macros . . . . . . . . . . . . . . . . . . . . . 73
- 10.3 Raw mode . . . . . . . . . . . . . . . . . . . . . . . . . 73
- 10.4 Keypad modes . . . . . . . . . . . . . . . . . . . . . . . 74
- 10.5 PC keyboards . . . . . . . . . . . . . . . . . . . . . . . 74
- 10.6 Phone directory <Alt-P> . . . . . . . . . . . . . . . . 74
- 10.6.1 Queue status . . . . . . . . . . . . . . . . . . . . 75
- 10.6.2 Adding/changing entries . . . . . . . . . . . . . . 76
- 10.7 Inactivity timer . . . . . . . . . . . . . . . . . . . . . 76
- 10.8 File transfers . . . . . . . . . . . . . . . . . . . . . . 76
- 10.9 On-line timer . . . . . . . . . . . . . . . . . . . . . . 76
-
- 11 Miscellaneous . . . . . . . . . . . . . . . . . . . . . . . . . 77
- 11.1 Destination of messages . . . . . . . . . . . . . . . . . 77
- 11.1.1 Name look-ups . . . . . . . . . . . . . . . . . . . 77
- 11.1.2 Address browsing . . . . . . . . . . . . . . . . . . 77
- 11.1.3 Address macros (NAMES.FD) . . . . . . . . . . . . . 77
-
- 12 File Requests . . . . . . . . . . . . . . . . . . . . . . . . . 79
- 12.1 Outbound Requests . . . . . . . . . . . . . . . . . . . . 79
- 12.2 Requesting files with a password . . . . . . . . . . . . . 79
- 12.3 Requesting files from foreign file systems . . . . . . . . 80
- 12.4 Update Requests . . . . . . . . . . . . . . . . . . . . . 80
- 12.5 Inbound Requests . . . . . . . . . . . . . . . . . . . . . 80
- 12.5.1 Request modes . . . . . . . . . . . . . . . . . . . 80
- Anyone can request . . . . . . . . . . . . . . . . . . 80
- Systems in nodelist can request . . . . . . . . . . . . 81
- No requests . . . . . . . . . . . . . . . . . . . . . . 81
- 12.5.2 Directory listings . . . . . . . . . . . . . . . . . 81
- 12.5.3 Alias listings . . . . . . . . . . . . . . . . . . . 81
- 12.5.4 Response message . . . . . . . . . . . . . . . . . . 81
- 12.5.5 Limiting Requests . . . . . . . . . . . . . . . . . 82
- Maximum match . . . . . . . . . . . . . . . . . . . . . 82
- Maximum time . . . . . . . . . . . . . . . . . . . . . 82
- Maximum size . . . . . . . . . . . . . . . . . . . . . 82
-
-
-
- Minimum speed (BPS) . . . . . . . . . . . . . . . . . . 82
- 12.5.6 Limited hours . . . . . . . . . . . . . . . . . . . 82
- Limited . . . . . . . . . . . . . . . . . . . . . . . . 83
- Start . . . . . . . . . . . . . . . . . . . . . . . . . 83
- End . . . . . . . . . . . . . . . . . . . . . . . . . . 83
- Days . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
- 12.5.7 Event restrictions . . . . . . . . . . . . . . . . . 83
- 12.5.8 Protecting files and directories . . . . . . . . . . 83
- 12.5.9 Request processor . . . . . . . . . . . . . . . . . 84
-
- 13 Swapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
- 13.1 Complete path specifications . . . . . . . . . . . . . . . 85
- 13.2 Loading programs in a DOS shell . . . . . . . . . . . . . 85
-
- 14 CRT environments . . . . . . . . . . . . . . . . . . . . . . . . 86
-
- 15 Message Status Bits . . . . . . . . . . . . . . . . . . . . . . 87
- Private . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
- Crash . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
- Hold . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
- File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
- File request . . . . . . . . . . . . . . . . . . . . . . . . . 87
- Update request . . . . . . . . . . . . . . . . . . . . . . . . 87
- Kill/sent . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
- Trunc/sent . . . . . . . . . . . . . . . . . . . . . . . . . . 88
- Delete/sent . . . . . . . . . . . . . . . . . . . . . . . . . . 88
- Direct . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
- Immediate mail . . . . . . . . . . . . . . . . . . . . . . . . 88
- Lock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
- Sent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
- No status . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
-
- 16 Mail routing . . . . . . . . . . . . . . . . . . . . . . . . . . 89
- 16.1 Default routing . . . . . . . . . . . . . . . . . . . . . 89
- 16.2 Message status . . . . . . . . . . . . . . . . . . . . . . 89
- 16.3 Host/Hub/Boss routing . . . . . . . . . . . . . . . . . . 90
- 16.4 Qualifying systems . . . . . . . . . . . . . . . . . . . . 90
- 16.5 Route commands . . . . . . . . . . . . . . . . . . . . . . 91
- 16.6 LIST specifications . . . . . . . . . . . . . . . . . . . 93
- 16.7 Using nodelist flags . . . . . . . . . . . . . . . . . . . 93
- 16.8 File routing/forwarding . . . . . . . . . . . . . . . . . 94
- 16.9 Message forwarding . . . . . . . . . . . . . . . . . . . . 94
- 16.10 Multiple zones . . . . . . . . . . . . . . . . . . . . . 94
- 16.11 Examples . . . . . . . . . . . . . . . . . . . . . . . . 95
- 16.12 Dynamic packing . . . . . . . . . . . . . . . . . . . . . 96
- 16.13 Regarding points . . . . . . . . . . . . . . . . . . . . 96
- 16.14 Order of evaluation . . . . . . . . . . . . . . . . . . . 96
- 16.15 TARGET vs. qualification . . . . . . . . . . . . . . . . 97
- 16.16 Restrictions . . . . . . . . . . . . . . . . . . . . . . 97
- 16.17 Macros . . . . . . . . . . . . . . . . . . . . . . . . . 97
- MYZONE . . . . . . . . . . . . . . . . . . . . . . . . . . 97
- MYNET . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
- MYPOINTS . . . . . . . . . . . . . . . . . . . . . . . . . 97
- 16.18 Supported nodelist flags . . . . . . . . . . . . . . . . 97
-
- 17 EMSI and IEMSI . . . . . . . . . . . . . . . . . . . . . . . . . 98
- 17.1 Passwords . . . . . . . . . . . . . . . . . . . . . . . . 98
- 17.2 Mail . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
- 17.3 IEMSI . . . . . . . . . . . . . . . . . . . . . . . . . . 98
-
-
-
- 18 Script language . . . . . . . . . . . . . . . . . . . . . . . . 99
- 18.1 What can I do with it? . . . . . . . . . . . . . . . . . . 99
- 18.2 Commands . . . . . . . . . . . . . . . . . . . . . . . . . 99
- 18.3 Labels . . . . . . . . . . . . . . . . . . . . . . . . . . 103
- 18.4 Node block . . . . . . . . . . . . . . . . . . . . . . . . 104
- 18.5 PC Pursuit . . . . . . . . . . . . . . . . . . . . . . . . 104
- 18.6 How do I update PCP.DAT? . . . . . . . . . . . . . . . . . 104
- 18.7 MNEMONICS . . . . . . . . . . . . . . . . . . . . . . . . 104
-
- 19 FDSERVER . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
- 19.1 What is a FDSERVER request? . . . . . . . . . . . . . . . 106
- 19.2 Request message . . . . . . . . . . . . . . . . . . . . . 106
- 19.2.1 Internal commands . . . . . . . . . . . . . . . . . 106
- 19.3 Using it . . . . . . . . . . . . . . . . . . . . . . . . . 107
- 19.4 Keeping calls to a minimum . . . . . . . . . . . . . . . . 108
- 19.5 Security . . . . . . . . . . . . . . . . . . . . . . . . . 108
-
- 20 Service requests . . . . . . . . . . . . . . . . . . . . . . . . 109
- 20.1 Service requests vs FDSERVER . . . . . . . . . . . . . . . 109
- 20.2 Setting up . . . . . . . . . . . . . . . . . . . . . . . . 109
- 20.3 ^ - + ? . . . . . . . . . . . . . . . . . . . . . . . . . 110
- 20.4 Security . . . . . . . . . . . . . . . . . . . . . . . . . 110
- 20.5 A word of wisdom . . . . . . . . . . . . . . . . . . . . . 110
-
- 21 Global command-line switches . . . . . . . . . . . . . . . . . . 111
- 21.1 A word of wisdom . . . . . . . . . . . . . . . . . . . . . 115
-
- 22 Environment variables . . . . . . . . . . . . . . . . . . . . . 116
- 22.1 FDOPT . . . . . . . . . . . . . . . . . . . . . . . . . . 116
- 22.2 FDSWAP . . . . . . . . . . . . . . . . . . . . . . . . . . 116
- 22.3 POINTNET . . . . . . . . . . . . . . . . . . . . . . . . . 116
- 22.4 FMOVR and FDOVR . . . . . . . . . . . . . . . . . . . . . 116
- 22.5 TZUTC . . . . . . . . . . . . . . . . . . . . . . . . . . 116
-
- 23 Semaphore files . . . . . . . . . . . . . . . . . . . . . . . . 118
-
- 24 Batch files . . . . . . . . . . . . . . . . . . . . . . . . . . 121
- 24.1 Errorlevels . . . . . . . . . . . . . . . . . . . . . . . 121
- 24.2 Categories . . . . . . . . . . . . . . . . . . . . . . . . 121
- 24.3 Loading BBS software . . . . . . . . . . . . . . . . . . . 121
- 24.4 Different labels . . . . . . . . . . . . . . . . . . . . . 122
- 24.5 Same label . . . . . . . . . . . . . . . . . . . . . . . . 123
- 24.6 DOBBS.BAT . . . . . . . . . . . . . . . . . . . . . . . . 123
- 24.7 EXEBBS.BAT . . . . . . . . . . . . . . . . . . . . . . . . 124
- 24.8 Flow (batch files) . . . . . . . . . . . . . . . . . . . . 125
- 24.9 EXEFAX.BAT . . . . . . . . . . . . . . . . . . . . . . . . 125
-
- 25 Multi-tasking . . . . . . . . . . . . . . . . . . . . . . . . . 126
- 25.1 NS16550 . . . . . . . . . . . . . . . . . . . . . . . . . 126
- 25.2 DESQview . . . . . . . . . . . . . . . . . . . . . . . . . 126
- 25.3 DoubleDOS . . . . . . . . . . . . . . . . . . . . . . . . 127
- 25.4 Multilink . . . . . . . . . . . . . . . . . . . . . . . . 128
-
- 26 Converting from other mail systems . . . . . . . . . . . . . . . 129
-
- 27 Help systems . . . . . . . . . . . . . . . . . . . . . . . . . . 130
-
- 28 Sample (PCP) script . . . . . . . . . . . . . . . . . . . . . . 131
-
-
-
- 29 Commercial inquiries . . . . . . . . . . . . . . . . . . . . . . 134
-
- 30 Developer notes . . . . . . . . . . . . . . . . . . . . . . . . 135
-
- 31 Technical specifications . . . . . . . . . . . . . . . . . . . . 135
-
- 32 Credits . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
-
-
-
- 1 FRONTDOOR SHAREWARE VERSION LICENCE AGREEMENT - "FFHA194k"
-
- 1. This is a licence agreement between you, the end user, and Joaquim
- Homrighausen, hereafter "the author". The FrontDoor 2.12 Shareware
- software and information attached hereto, hereafter "FD", is the
- property of the author. Read the terms and conditions of this licence
- agreement carefully before using the software. If you for any reason,
- whatsoever, cannot accept the conditions in this agreement, you are
- not permitted to use FD.
-
- 2. You acknowledge and agree that FD is a proprietary product of the
- author, protected by applicable copyright laws and international
- treaty provisions. You further acknowledge and agree that all rights,
- title, and interest in and to FD are and shall remain with the
- author.
-
- 3. FD may be used for a period of thirty (30) days on a trial basis to
- allow you to determine its suitability for your particular
- application. After this period you MUST register each copy of FD that
- you run simultaneously.
-
- 4. Registration entitles you to a non-transferable licence to use FD and
- any future versions of FD for as long as you wish, subject to any
- special licensing conditions and/or applicable upgrade fees attached
- to future versions.
-
- 5. In the event that you are in violation of this licence agreement, you
- agree and accept that the author may cancel your registration and any
- rights to use FD that you may have. In the case of a dispute over the
- licence agreement, you further agree and accept to fully reimburse
- the author for legal and other expenses resulting from the dispute,
- should the dispute be decided in favor of the author.
-
- 6. FD is provided "as is", without warranty of any kind or fitness for a
- particular purpose, either expressed or implied, all of which are
- hereby explicitly disclaimed. The author only guarantees that
- FrontDoor will occupy disk space.
-
- The author's liability resulting from your use or inability to use FD
- is limited to the amount that the affected party has paid for it, or
- in the event that FD was registered with a third party for payment to
- the author, liability is limited to the amount that was received by
- the author from that third party.
-
- 7. Neither the author nor any of his employees, agents, or other
- representatives are in any way obligated to provide future versions
- of, or support for, FD.
-
- 8. You may freely distribute and copy FD provided that no fee is charged
- and the FD distribution archive contains unmodified copies of the
- original files as produced by the author. Pay Bulletin Board Systems
- may, however, charge their normal fee provided that no additional
- charge for FD is levied. No part of FD may be modified, altered,
- reverse engineered, sold, or distributed in any form whatsoever which
- would involve some sort of trade without prior written permission
- from the author.
-
-
- 1
-
-
-
- 9. FD may only be used and registered, with taxed personal income, by
- physical persons for use on equipment, including but not limited to
- telephone lines, electricity, hardware, and software, maintained and
- operated 100% by means of taxed personal income. FD may not be used
- to provide commercial services.
-
- 10. Place of jurisdiction is the Grand Duchy of Luxembourg and this
- agreement is subject to the law and regulations of the Grand Duchy of
- Luxembourg. In the case of any of the provisions of this agreement
- not being legally effective or losing its legal validity due to some
- subsequent circumstance, or in the case of a gap in this agreement
- coming into light, the legal validity of the remaining provisions
- will not be affected. An appropriate regulation is to take place of
- the ineffective provisions or fill the gap, which as far as legally
- possible, comes nearest to fulfilling the intentions of the author
- had he considered the matter in question. If the invalidity of a
- provision is due to a scale of the performance contained therein,
- then a legally permissible scale is to be inserted with due regard to
- the aforesaid.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- All Joaquim Homrighausen products are trademarks or
- registered trademarks of Joaquim Homrighausen. Other brand
- and product names are trademarks or registered trademarks of their
- respective holders.
-
- Copyright 1986-1994 Joaquim Homrighausen; All rights reserved.
-
- Absolute Solutions
-
- March 2, 1994
-
- 2
-
-
-
- 2 Preface
-
- <C> as used in FrontDoor indicates that the feature is only available in
- the commercial version; <+> indicates that the feature is only available
- in the registered shareware version. Footnote references are indicated by
- a number between double forward slashes, i.e. //nn//.
-
- Welcome to FrontDoor, the complete e-mail package. It is probably safe to
- say that an e-mail package, such as FrontDoor, is one of the most complex
- types of applications around. This manual is very straight forward and
- may seem hard to understand at first glance. If you get lost, or cannot
- understand something, go back and read the section you are having
- problems with, carefully.
-
- FrontDoor has been tested on more than four thousand systems for over six
- years. It will run under MS or PC DOS versions 3.1 and above; including
- OS/2 1.3, 2.0, and 2.1 DOS Mode. It runs under most LAN software;
- including Novell and LANtastic. It also runs under PC-MOS/386, VM/386,
- Windows, Windows NT, Novell DOS 7.x, and in other multi-tasking
- environments such as DESQview.
-
- For technical specifications, see "Technical specifications". Although
- FrontDoor will run on most machines, there are a few restrictions and
- requirements.
-
-
- 2.1 Hardware requirements
-
- o An IBM PC, AT, i386, i486, PS/2 or 100% BIOS compatible.
- o A hard disk with at least 1 MB available disk space.
- o An asynchronous modem capable of sending alphanumeric
- messages such as CONNECT 2400 //1//.
- o A DTE (computer-modem) interface that supports CTS/RTS
- handshaking (most cables/internal modems do).
- o A monochrome or color monitor.
- o 384 KB of system memory.
-
-
- 2.2 Software requirements
-
- o MS or PC DOS 3.10 or above.
- o A FOSSIL driver such as X00, BNU, OpusComm, cFos, VX00,
- DGFossil, or VFD.
-
-
- 2.3 Additional equipment
-
- FrontDoor can take advantage of, but does not require, the following:
-
- o EMS memory for overlays and EMS/XMS memory for program image
- swapping.
- ____________________
-
- //1// An ISDN adapter in combination with a FOSSIL driver that supports
- the ISDN adapter may be used in place of a modem. cFos is one such FOSSIL
- driver.
-
-
- 3
-
-
-
- o EGA/VGA extended screen modes such as 80x43/50 and 132x28.
- o AT-style (extended) keyboard.
-
-
- 2.4 BBS software
-
- FrontDoor can be used as a front-end to many popular bulletin boards
- including TUBBS, PC Board, RemoteAccess, Maximus-CBCS, TCL, TPBoard,
- QuickBBS, SuperBBS, Phoenix RCS, Fido, Opus-CBCS, ProBoard, TPCS, and
- WildCat!.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 4
-
-
-
- 3 Installation
-
- Several files are included in the distribution archive. This manual will
- walk you through the installation and configuration of the system. All
- path names and directories suggested here are not required. You can
- change them as you wish, but it is suggested that you use the examples
- shown for a start and then move on to change things as you become more
- familiar with the software. In the example, it is assumed that you are
- about to install FrontDoor on your C drive.
-
-
- 3.1 CONFIG.SYS
-
- FrontDoor needs to have a few extra file handles allocated to keep
- some files open. Your CONFIG.SYS file should contain FILES=25 (or
- higher). If you do not know what handles means, that is okay, as long
- as you have the FILES=25 statement in your CONFIG.SYS file. If you
- are using multi-tasking software, your FILES= setting must usually be
- set to something higher than 25.
-
- You should also have BUFFERS=30 (or higher) in your CONFIG.SYS file
- to improve DOS' buffer performance. If you are using a disk cache,
- you should have BUFFERS=3 or something close to that.
-
-
- 3.2 AUTOEXEC.BAT
-
- Add SET FD=C:\FD to your AUTOEXEC.BAT file. This allows FrontDoor to
- find its system files even if you start it from another directory.
- You may NOT have spaces between FD and =.
-
-
- 3.3 Directories
-
- From your root directory (C:\) create a directory called FD. This is
- the main (ROOT) directory for FrontDoor. Change the active directory
- to FD. Create the following directories:
-
- NODELIST
- MAIL
- PACKETS
- FILES
-
-
- 3.4 Files
-
- Copy FD.EXE, FD.OVR, FM.EXE, FM.OVR, FDNC.EXE, FDNC.OVR, and
- FDSETUP.EXE to C:\FD. The program files are now installed.
-
-
- 3.5 FidoNet
-
- If you are joining (or already are active in) FidoNet, you should
- obtain a copy of a recent FidoNet nodelist. The FidoNet nodelist can
- be found on many FidoNet systems under the name NODELIST followed by
- a numerical extension, e.g. NODELIST.035. Place the uncompressed
- nodelist ASCII file in the C:\FD\NODELIST directory.
-
- 5
-
-
-
- 4 Setup
-
- The Setup program, FDSETUP hereafter, is used to configure FrontDoor.
- Most functions and behavior of the Editor (FM), Mailer (FD), and Terminal
- are controlled from FDSETUP. When you start FDSETUP, it searches for the
- system file, SETUP.FD, in the directory pointed to by the FD environment
- variable.
-
- If the FD variable has not been set, FDSETUP searches the current
- directory for SETUP.FD. If it cannot open SETUP.FD, it will ask you if
- you want to create a new file or abort.
-
-
- 4.1 FD environment variable
-
- The FD environment variable specifies where FDSETUP should search for
- SETUP.FD. It is recommended that you add SET FD=<path> to your
- AUTOEXEC.BAT or other startup file. This allows FDSETUP, and the
- other FrontDoor programs, to locate SETUP.FD without having to be in
- the same directory.
-
- E.g. SET FD=C:\FD
-
-
- 4.2 FD.SYS <> SETUP.FD
-
- The system file used by some earlier (1.99c and 2.00) versions of
- FrontDoor is called FD.SYS. Some FrontDoor specific utilities
- (TosScan 1.00 for example) and other programs may therefore require
- that you maintain a copy of FD.SYS. If you are using such software,
- make sure you copy SETUP.FD to FD.SYS in the FrontDoor root
- directory.
-
-
- 4.3 Getting started
-
- To create a new SETUP.FD file, make the FrontDoor root directory the
- active directory by using the DOS command CD; type FDSETUP and press
- Enter. If you have set the FD variable, you do not have to change the
- active directory before invoking FDSETUP.
-
- FDSETUP will display a message saying something like "SETUP.FD, path
- or file not found". Press <Space> to create a new file.
-
-
- 4.4 Menus
-
- There are eight top-level (pull-down) menus. Each function and menu
- of FDSETUP will now be described.
-
-
- 4.4.1 File
-
- Write SETUP.FD
-
-
-
-
- 6
-
-
-
- Forces FDSETUP to write the configuration file, SETUP.FD, to
- disk. This allows you to commit any changes you have made to your
- configuration without leaving FDSETUP.
-
- Shell to DOS
-
- Invokes a temporary DOS shell. Type EXIT and press <Enter> to
- return to FDSETUP. You can invoke a temporary DOS shell in
- FDSETUP by pressing <Alt-Z> in the middle of input fields,
- pull-down menus, selection fields, etc.
-
- Exit
-
- Returns you to DOS or the Mailer, depending on how FDSETUP was
- invoked. If you made any changes to your configuration, you will
- be asked if you want to make your changes permanent or abandon
- them. You can also exit FDSETUP by pressing <Esc> at any of the
- top-level menus.
-
- Enter your code
-
- Allows you to enter the registration code required to activate
- some registered-only features. Once you have successfully entered
- your registration code, FDSETUP will not allow you to enter it
- again.
-
-
- 4.4.2 Global
-
- Address
-
- Address
-
- Defines your network address and alternate network addresses,
- or "also-known-as" (AKA). You must define at least one
- network address (the first slot).
-
- Site info
-
- Defines your system's name, geographical location, telephone
- number, maximum speed, nodelist flags, and the name of your
- BBS software (if any).
-
- The telephone number should be specified in international
- format, e.g. +352 316702, or "-Unpublished-" if you do not
- wish to reveal this information to other systems.
-
- Domains
-
- Specifies the name of a network zone. This should be
- "fidonet" for all FidoNet Zones (currently 1 through 6).
-
- At the moment, this is only used for the generation of the
- ^AMSGID: kludge line and for inserting "^aVia" information in
- messages forwarded by the Mailer (FD).
-
- AKA..
-
- 7
-
-
-
- Allows you to specify which AKA to use when corresponding
- with certain zones and nets within zones.
-
- I.e. if you are writing a message to someone in zone 2 and
- you have specified that you wish to use your 2:270/17 AKA for
- this, the Editor will automatically use 2:270/17 regardless
- of your current AKA setting.
-
- This allows you to easily participate in multiple networks.
-
- Filenames
-
- System
-
- Where the FrontDoor system files are stored. This should NOT
- be a RAM disk. If you have followed the installation
- instructions above, this should be C:\FD.
-
- NetMail
-
- Where NetMail messages are stored, i.e. the NetMail folder.
- The Mailer unpacks received messages to this directory. This
- should NOT be a RAM disk. If you have followed the
- installation instructions above, this should be C:\FD\MAIL.
-
- Files
-
- Where inbound (received) files are stored. This should NOT be
- a RAM disk. If you have followed the installation
- instructions above, this should be C:\FD\FILES.
-
- SecFiles
-
- Identical to Files above except that it is only used to store
- files received during a secure (password protected) mail
- session. If SecFiles isn't specified, the Mailer will use the
- path specified for Files.
-
- Packets
-
- Where the Mailer stores its temporary mail packets. They are
- created every time the Mailer runs a mail event and are
- removed when the event ends.
-
- By putting the Packet directory on a RAM disk, you can
- greatly improve the speed of packing and scanning outbound
- mail.
-
- It is recommended that you use a sub-directory on your RAM
- disk since the number of directory entries in the root
- directory of a drive is usually limited to a fairly low
- number.
-
- If you have followed the installation instructions above,
- this should be C:\FD\PACKETS.
-
- Log file
-
- 8
-
-
-
- The log file. This is a complete filename, e.g. C:\FD\FD.LOG.
- This is used by the Mailer (and can be used by the Terminal
- in the registered version) to log its activities such as
- received and sent files, call progress, etc. You should NOT
- use a RAM disk for the log file as it will disappear if the
- system reboots.
-
- Banner
-
- The contents of this file is displayed to human (interactive)
- callers before the Mailer passes control to your batch file
- to invoke the BBS software. This file is not used if you are
- running in mail-only mode. You should NOT use a RAM disk for
- the banner file.
-
- Nodelist
-
- Where the nodelist database is stored. The Nodelist Compiler
- (FDNC) expects to find its control file(s) here. The Mailer
- and Editor expects to find the compiled nodelist database
- here. If this directory is not specified, FrontDoor will use
- the SYSTEM directory instead. The nodelist directory should
- NOT be located on a RAM disk.
-
- If you have followed the installation instructions above,
- this should be C:\FD\NODELIST.
-
- No BBS
-
- This file is displayed to human callers if the Mailer rejects
- their call. I.e. if you are running in mail-only mode or if a
- mail event prevents interactive access to your BBS.
-
- MSG Base
-
- Where the Editor expects to find the Hudson Message Base
- files (MSGHDR.BBS, MSGTXT.BBS, MSGINFO.BBS, MSGIDX.BBS,
- MSGTOIDX.BBS and LASTREAD.BBS). If you do not have any
- folders with MsgBase status, you do not have to specify this.
-
- Swapping
-
- If you enable swapping to disk or there is not sufficient
- XMS/EMS memory available. The Mailer and the Editor will use
- this directory to store their swap files.
-
- This setting can be overridden by the FDSWAP environment
- variable (see "Environment variables").
-
- <C> Semaphore
-
- Where the Mailer and Editor creates and looks for the various
- semaphore files (see "Semaphore files"). This allows you to
- configure a multi-line and/or multi-user system with
- different configurations to use the same semaphore directory.
-
- <C> MailExit
-
- 9
-
-
-
- If specified, this file is created by the Mailer when it has
- received mail and would normally have terminated with an
- errorlevel indicating that mail has been received.
-
- In a multi-line and/or multi-tasking environment, this could
- be used to automatically invoke mail processing software and
- run it in the background while the Mailer continues its
- operation.
-
- General
-
- Your country code
-
- Your country code (e.g. USA=1, Sweden=46, Luxembourg=352).
- This is used for telephone number translations. This is
- related to the COUNTRY= command used in CONFIG.SYS. It does
- not, however, have to be the same as your COUNTRY= setting.
- FDSETUP's country code setting should always be your real
- country code.
-
- Screen flickers
-
- FrontDoor attempts to detect if you have a CGA card that
- causes flicker if software performs direct memory access
- (DMA). The default for this setting is NO and you should
- leave it alone unless you are seeing flicker on your screen
- when you use the Mailer, Editor, and/or the Terminal.
-
- Use "fastkey"
-
- Forces the Mailer, Editor, and the Terminal to speed up the
- typematic rate of your keyboard. This is only valid for
- machines with an AT- or compatible BIOS installed.
-
- If you are using other keyboard speed-up utilities, leave
- this to NO; otherwise, the FrontDoor programs will restore
- the typematic rate to the default (slow) when they terminate.
-
- Screen blanking
-
- Prevents screen images from "burning in". If you are using a
- monochrome monitor, data that is displayed often in the same
- location on your screen can "burn in" and leave ugly marks.
- Color monitors usually do not have this problem.
-
- Since the Mailer is active more than 80% of the day on most
- systems, it may be wise to enable this option to avoid "burn
- ins" of the Mailer's main display.
-
- Blackout timer
-
- Specifies how many seconds of inactivity should pass before
- the screen is blanked. This option is only used if screen
- blanking (previous page) has been enabled. You can "light up"
- a blanked screen by pressing a key. The screen will also be
- lit when the Mailer places outgoing calls and when incoming
- calls are answered.
-
- 10
-
-
-
- Extended keyboard
-
- Specifies which type of keyboard you have (101/102 or 83/84).
- FDSETUP will attempt to "guess" which type of keyboard you
- have, but some BIOS flavors does not properly indicate the
- type. This allows you to override what FDSETUP detects.
-
- Force 24-hour fmt
-
- Allows you to force the Mailer and the Editor to display the
- time in 24-hour format even if you are located in a country
- that uses the 12-hour format, such as the USA.
-
- Monochrome mode
-
- Forces FDSETUP to assume monochrome color mode (as if you
- would have specified FDSETUP /M on the DOS command-line).
-
- Users
-
- Allows you to specify user names and access levels. The default
- name of the first user is System Operator. You should change this
- to your own name.
-
- <+> There are three different access levels. Supervisor,
- Administrator and User. //1//
-
- A user with Supervisor access can override any restrictions on
- folders and messages. He/she can also change all settings
- regardless of passwords. You should only have one user with
- Supervisor access, but FDSETUP will allow you to define more than
- one. At least one user with Supervisor access MUST exist and is
- required to add any additional users.
-
- A user with Administrator access cannot override any restrictions
- on folders and messages. He/she has to enter passwords for
- protected items before they can be changed.
-
- A user with User access cannot override any restrictions on
- folders and messages. The only setting he/she can change in
- FDSETUP is his/her own password.
-
-
- 4.4.3 Mailer
-
- Miscellaneous
-
- <+> Mail from unlisted systems
-
- Defines whether or not the Mailer should accept incoming
- calls from systems not listed in your nodelist database. If
-
- ____________________
-
- //1// The unregistered shareware version only allows you to define one
- user and forces the access level to that of Supervisor.
-
-
- 11
-
-
-
- this option is disabled (set to "NO") and an unlisted system
- calls in, the Mailer will terminate the call immediately.
-
- <C> Mail from "unprotected" systems
-
- Defines whether or not the Mailer should accept incoming
- calls from systems for which you do not have a session level
- password defined. If this option is disabled (set to "NO")
- and an unprotected system calls in, the Mailer will terminate
- the call immediately. //1//
-
- <+> Mail from unlisted points
-
- The Mailer will by default accept calls from points of other
- systems whether or not they are present in your nodelist
- database; provided the point system's boss passes the
- required criteria.
-
- You can, however specify that you do not want the Mailer to
- accept calls from points that cannot be found in the nodelist
- database. If this option is disabled (set to NO) and a point
- for which you have no entry in your nodelist database calls
- in, the Mailer will terminate the call immediately.
-
- Kill empty received messages
-
- Specifies that you want the Mailer to kill empty messages
- (messages with no text in its body) when they are unpacked
- from received mail packets.
-
- Terminal only (no mail)
-
- If enabled, the Mailer will invoke the Terminal as soon as it
- is loaded. This setting can be overridden with the /M
- command-line switch.
-
- Mail only (no BBS)
-
- If enabled, the Mailer will not accept human callers under
- any circumstances. Use this option if you do not have a BBS
- or similar software running behind the Mailer.
-
- Match remote's zone
-
- The Mailer normally uses the AKA matching table to determine
- which AKA to present as your system's primary address when it
- is communicating with another system. This setting, when
- enabled, instructs the Mailer to attempt to determine which
- AKA should be presented as your primary address based on the
- remote system's primary address; this is not done if a match
- is made in the AKA matching table.
-
- ____________________
-
- //1// Note that by using this option, you may be in violation of your
- network's policy statues.
-
-
- 12
-
-
-
- Present all AKAs to remote system
-
- If you have more than one AKA address, the Mailer will by
- default attempt to pickup mail destined for all your
- addresses during a mail session.
-
- This can be disabled so that only one address is presented to
- the remote system. Which address is actually presented is
- determined by the AKA matching table and the setting of
- "Match remote's zone" (described above).
-
- Trigger exit upon receipt of netmail
-
- The Mailer will by default only trigger (set) the exit flag
- when compressed (following the ARCmail 0.60 standard) mail is
- received. If this option is enabled, the exit flag will be
- triggered (set) when NetMail packets (files ending with the
- extension .PKT) have been received. Whether or not the Mailer
- will actually exit is controlled by event behaviors (see
- "Events") and the mail exit errorlevels.
-
- Trigger exit upon receipt of ANY file
-
- Similar to the above option, but will trigger exit as long as
- any (file) data has been received.
-
- Print received messages
-
- <C> If enabled, the Mailer will print messages unpacked from
- received mail packets.
-
- Busy retries
-
- Defines the maximum number of times the Mailer will attempt
- to call a system during an event (see "Events") if the system
- is busy or does not answer on the first call. See the section
- about the Mailer for further details regarding call progress.
-
- Resend retries
-
- Defines the maximum number //1// of times the Mailer
- will attempt to transfer mail to a system during an event if
- the first attempt fails. See the section about the Mailer for
- further details regarding call progress.
-
- Retry delay
-
- Defines the minimum number of seconds the Mailer will wait
- between outgoing calls. This is used in conjunction with a
- random timer to avoid two Mailers calling each other at the
- same time (and thus causing both telephone lines to be
- engaged).
- ____________________
-
- //1// "Retries" means attempts after the first failed attempt. I.e. a
- setting of zero (0) means that at least one call will be placed.
-
-
- 13
-
-
-
- Days to keep mail history
-
- Number of days to retain entries in the inbound/outbound
- history files. The Mailer removes all entries older than this
- value from the history files every morning (at first
- opportunity after midnight).
-
- Seconds before passing to BBS
-
- Defines the number of seconds the Mailer will wait before
- assuming a human caller. Unless the Mailer receives two
- consecutive escape (ASCII 27) characters, it will attempt to
- establish a mail session for the amount specified here. The
- default value is 30 seconds, the minimum and maximum values
- are 11 and 60 respectively. //1//
-
- Minimum undialable cost
-
- The minimum cost of a call for a system to be processed by
- the undialable handler. The undialable handler is discussed
- in a separate section.
-
- <C> Honor Return Receipt Requests (RRQ)
-
- Specifies whether or not the Mailer should generate a Return
- Receipt for received messages with the RRQ flag set. The RRQ
- flag is discussed in the Editor section.
-
- Log
-
- Defines the various level of logging. All messages will appear on
- the screen, the log options defines which of them end up in the
- log file.
-
- File requests
-
- Controls how the Mailer treats inbound File and Update Requests.
- A separate section explains File and Update Requests in detail.
-
- <+> FDServer
-
- If no password is specified in FDSETUP, the FDSERVER function is
- inactive (disabled). The FDSERVER function is described in a
- separate section.
-
- External mail
-
- When the Mailer processes an incoming call, all received
- characters are processed for a possible match with any of the
- external mail "wake-up" sequences (strings), and if a match is
- ____________________
-
- //1// Note that by setting this value too low, the Mailer may pass calls
- to the BBS, or other software, that are really mail calls; in particular
- when the established link suffers from line noise, etc. which would cause
- the modems to retrain in an attempt to maintain data integrity.
-
-
- 14
-
-
-
- made, the Mailer exits with the specified errorlevel of the
- matching string.
-
- This allows you to run alternate mail handlers behind the Mailer,
- such as UFGATE and Waffle to process INTERNET/UUCP mail. Note
- that the call is not terminated when using the external mail
- interface, the Mailer simply exits with the specified errorlevel.
- This option is NOT intended for EchoMail processors, etc.
-
- To enter characters with an ASCII code below 32 (Space), hold
- down the <Alt> key, enter the ASCII code on the numerical keypad
- and release the <Alt> key.
-
- Display
-
- Mail waiting flashing
-
- When there is new mail waiting, the text "Mail" will flash on
- the Mailer screen. The flashing can be disabled with this
- option.
-
- Display clock
-
- Specifies whether or not you want the current date and time
- displayed in the top right corner of the Mailer screen.
-
- Display timestamp
-
- Specifies whether or not you want the Mailer to display the
- time to the left of each line displayed in the main activity
- window. This setting does not affect what is being written to
- the log file.
-
- Screen size
-
- 25
-
- 25 line mode.
-
- 43/50
-
- 43/50 line mode. Only available for systems with EGA and
- VGA cards.
-
- Auto
-
- Specifies that the Mailer should attempt to automatically
- adapt to whatever the current screen size is when it is
- started.
-
- This also means that the Mailer will not attempt to reset
- the screen mode when it is terminated.
-
- <+> Custom
-
- Allows you to specify computer register values to send to
- the INT 10h (Video BIOS) to set and reset the screen.
-
- 15
-
-
-
- Colors
-
- Allows you to choose between the default monochrome (black and
- white) and the default color sets. You can also choose to
- customize the colors to your own taste.
-
- Hidden dial info
-
- Allows you to hide portions of telephone numbers that otherwise
- would be displayed when the Mailer places an outgoing call. E.g.
- The Mailer calls 352-316702, if you had one of the hidden dial
- info strings set to 352- the displayed number would be 316702.
-
- Function keys
-
- Allows you to define up to 20 (24) programs, etc. to invoke from
- the Mailer when any of the functions keys are pressed. The first
- 10 (12) function keys are accessed through <F1> - <F10> (F12),
- the second 10 (12) function keys are accessed through <Shift-F1>
- - <Shift-F10> (F12). //1//
-
- Title
-
- The title to appear on the screen when you press <Alt-K> from
- the Mailer's main screen. This is also written to the log
- file when a function key is pressed.
-
- Action
-
- The program to invoke or errorlevel to exit with. To specify
- more than one program, separate them by semicolons (;). To
- exit with an errorlevel, specify ?<errorlevel>.
-
- E.g. LIST C:\FD\FD.LOG;DEL C:\FD\FD.LOG
-
- would load the program LIST and pass C:\FD\FD.LOG as the
- parameter. When the LIST program terminates, the Mailer would
- proceed to the next command, which in this case removes
- C:\FD\FD.LOG.
-
- ?255
-
- Would force the Mailer to terminate with an errorlevel of
- 255.
-
- Pause
-
- Specifies whether or not you want the Mailer to pause when
- the invoked program(s) terminates.
-
- Check
- ____________________
-
- //1// To create a DOS shell that does not force a rescan of the NetMail
- folder, specify C:\COMMAND.COM (or wherever you have your copy of
- COMMAND.COM stored) as ACTION and set CHECK to NO.
-
-
- 16
-
-
-
- Specifies whether or not the Mailer should rescan the NetMail
- folder when the invoked program(s) terminates.
-
- Swap
-
- Specifies whether or not the Mailer should swap itself out of
- memory prior to invoking the specified commands.
-
- Errorlevels
-
- This section allows you to invoke BBS software, or other similar
- software, when an incoming call is established and the Mailer has
- determined that it is not a mail call. It also allows you to
- define an errorlevel to exit with when mail has been received.
-
- If a baud rate related errorlevel is zero, the Mailer will
- display a message to human callers saying that your system does
- not support non-mail calls at that speed and then terminate the
- call. If you are running in mail-only mode, the Mailer will never
- accept non-mail (human) calls.
-
- If the RECEIVED MAIL errorlevel is zero, the Mailer will never
- exit when mail has been received. Whether or not the Mailer will
- actually exit when it has received mail is determined by the
- current event behavior and whether or not the received file(s)
- indicated mail.
-
- The CREATE .BAT FILE option allows you to simplify BBS operation.
- If it is enabled, the Mailer will create a batch file containing
- the current baud rate, the COM port used, the number of minutes
- left to the next system event, etc. This is described in a
- separate section.
-
- Audio control
-
- The Mailer can sound alarms and make other noises when certain
- events occur, such as received mail, incoming human callers,
- fatal errors, etc. This section allows you to control which
- sounds should be active and when audio should be active.
-
- Swapping
-
- Determines whether or not you want the Mailer to use swapping
- when executing external programs. You can disable the use of
- EMS/XMS memory for the swap function. The swap function is
- explained in the Miscellaneous section.
-
- <C> Protection
-
- Allows you to protect certain functions of the Mailer, such as
- access to the DOS shell, Editor, Nodelist compiler, Terminal,
- etc. with a password.
-
- <C> Fax
-
- Allows you to control how the Mailer should handle incoming fax
- calls.
-
- 17
-
-
-
-
- 4.4.4 Editor
-
- Miscellaneous
-
- <C> Delete original (Conference)
- <C> Delete original (Local)
- <C> Delete original (NetMail)
-
- Determines if the Editor should ask "Delete original message"
- when replying to messages in EchoMail (Conference), Local,
- and NetMail-type folders.
-
- Show hard CRs
-
- If enabled, the Editor will show hard CRs in messages. The
- display of hard CRs is disabled by default and can be toggled
- from within the Editor.
-
- Margin
-
- Specifies the margin at which the Editor should automatically
- wrap text when you enter and quote (reply) messages. The
- default value, 60, should not be changed in most cases.
-
- When you read messages in the Editor, it will use all
- available columns (80, 132, etc.) as the wrap margin.
-
- <C> Honor CFM
-
- Specifies whether or not the Editor should generate a
- Confirmation Return Receipt for received messages with the
- CFM (Confirmation Receipt Request) flag set. The CFM flag is
- discussed later in the Editor section.
-
- <C> New mail semaphores
-
- Specifies whether or not the Editor should create the new
- mail semaphores FMNEWNET, FMNEWCNF, and FMNEWLOC upon exit
- when you have entered one or more messages.
-
- NetMail folder
-
- <+> Restricted
-
- Specifies if the NetMail folder should be restricted. If you
- enable this, users with User or Administrator access can only
- read private messages addressed to their user names.
-
- <+> Read-only
-
- Prevents users with User or Administrator access from writing
- messages in the NetMail folder. The definition of writing
- includes forwarding and moving of messages to the NetMail
- folder.
-
- <+> Export OK
-
- 18
-
-
-
- Defines whether or not users with User or Administrator
- access can export messages from the NetMail folder. The
- definition of export includes moving, copying, and export to
- disk.
-
- Use tables
-
- Defines whether or not the translation tables should be
- active by default in the NetMail folder. This can be toggled
- from within the Editor.
-
- Crash
-
- If the Crash status bit should be set by default on locally
- created messages.
-
- Direct
-
- If the Direct status bit should be set by default on locally
- created messages.
-
- Hold
-
- If the Hold status bit should be set by default on locally
- created messages.
-
- Private
-
- If the Private status bit should be set by default on locally
- created messages.
-
- Kill/Sent
-
- If the Kill/sent status bit should be set by default on
- locally created messages.
-
- <+> Use Zonegates
-
- Determines if the Editor should ask you whether or not you
- want to send inter-zone messages via the zonegate, never send
- messages via the zonegate, or always send inter-zone messages
- via the zonegate.
-
- Keyboard macros
-
- Allows you to define up to 20 (24) strings. These can be used to
- insert common text, such as name signatures, etc. while editing
- messages. The first 10 (12) function keys are accessed through
- F1-F10 (F12), the second 10 (12) function keys are accessed
- through Shift F1-F10 (F12).
-
- The Editor macro language is discussed in the section about how
- to operate the Editor.
-
- Origin lines
-
-
-
- 19
-
-
-
- Appended to messages you create in Conference-type folders to
- show the origin of a message. These should include the name and
- location of your system if possible.
-
- You can choose default origin lines for all Conference-type
- folders. You can also choose a different origin line from within
- the Editor.
-
- Whether or not the origin line is appended to messages you enter
- in Conference-type folders is controlled by the Echo info status
- bit for each folder.
-
- Display
-
- Screen size
-
- 25
-
- 25 line mode.
-
- 43/50
-
- 43/50 line mode. Only available for systems with EGA and
- VGA cards.
-
- Auto
-
- Specifies that the Editor should attempt to automatically
- adapt to whatever the current screen size is when it is
- are started. This also means that the Editor will not
- attempt to reset the screen mode when it is terminated.
-
- <+> Custom
-
- Allows you to specify computer register values to send to
- the INT 10h (Video BIOS) to set and reset the screen.
-
- Colors
-
- Allows you to choose between the default monochrome (black and
- white) and the default color sets. You can also choose to
- customize the colors to suit your own needs.
-
- Xlat.In and Xlat.Out
-
- Defines the translation tables to use wherever the translation
- table status bit is active. This is used to translate language
- specific 8-bit ASCII characters to 7-bit ASCII when writing
- messages to disk and vice versa when reading messages from disk.
-
- The In table is used when reading messages from disk and the Out
- table is used when writing messages to disk.
-
- FDSETUP automatically creates reasonable defaults for most
- countries when it creates a new SETUP.FD file. If you are located
- in an English speaking country, you do normally not have to worry
- about translation tables.
-
- 20
-
-
-
- Swapping
-
- Determines whether or not you want the Editor to use swapping for
- its DOS shell. You can disable the use of EMS/XMS memory for the
- swap function. The swap function is explained in a separate
- section.
-
- <C> Fax
-
- Settings related to internal fax support.
-
-
- 4.4.5 Terminal
-
- Miscellaneous
-
- Init
-
- An additional modem initialization string, sent to the modem
- as soon as the Terminal is started.
-
- If you start the Terminal directly from DOS (FD /TERM) or if
- you have enabled the Terminal-only option in FDSETUP, the
- Mailer's initialization strings are first sent to the modem.
-
- Download
-
- Default download path. Files that you receive (download)
- during a Terminal session will by default end up here.
-
- Upload
-
- Default upload path.
-
- Editor
-
- Allows you to install an Editor or file listing program and
- invoke it from the Terminal. The Terminal will prompt your
- for optional parameters, such as filenames, etc. This can
- also be used to invoke external protocols or external
- protocol menu programs.
-
- Protocol
-
- Zmodem, SEAlink, Telink, or Xmodem. Defines the default
- transfer protocol to use for file transfers in the Terminal.
-
- Emulation
-
- ANSI, TTY, VT100 or VT52. Defines the default Terminal
- emulation protocol to use in the Terminal. Note that the
- Terminal's ANSI protocol supports the AVATAR/0+ (AVT/0+)
- emulation protocol.
-
- AVATAR/0+
-
-
-
- 21
-
-
-
- Allows you to disable the support for AVATAR/0+ sequences in
- ANSI emulation. This can be toggled from within the Terminal.
-
- Buffer
-
- The size, in KB, of the scroll-back buffer. The scroll-back
- buffer stores information that has "rolled off" the top of
- the screen during Terminal sessions.
-
- Connect noise
-
- Whether or not the Terminal should make a noise when a
- connection has been established.
-
- Transfer noise
-
- Whether or not the Terminal should make a noise after file
- transfers.
-
- Use tables
-
- Whether or not the Terminal translation tables should be
- active by default. See Editor > Xlat.In for a detailed
- explanation of translation tables.
-
- Auto Zmodem
-
- Whether or not the automatic Zmodem download (receive)
- function should be enabled by default.
-
- Local echo
-
- Whether or not the Terminal should echo typed characters to
- your screen by default.
-
- Wrap around
-
- Whether or not the Terminal should move the cursor to the
- beginning of a new line when it reaches the end of the
- previous line.
-
- Delay
-
- Number of seconds to wait between outgoing calls if the
- number you dialed was busy or did not answer. If there is
- more than one entry in the dial queue, the delay is ignored
- and the Terminal proceeds to the next number in the queue.
-
- <+> Logging
-
- Allows you to enable logging of file transfers, dialed
- numbers, time spent on-line to systems, etc. Similar to the
- Mailer's log output.
-
- <+> Auto DW Mode
-
-
-
- 22
-
-
-
- If enabled, the Terminal will intercept and act upon a
- special sequence that some software transmits when the
- Terminal needs to be in "raw keyboard mode" (see "Raw mode").
-
- Timer enabled
-
- If enabled, the Terminal will automatically return to the
- Mailer (if you invoked the Terminal with <Alt-J>) after the
- specified amount of time has passed. As soon as you press a
- key, or the Terminal receives data from the modem, the timer
- is reset.
-
- Timer
-
- The value for the timer described above, specified in
- seconds.
-
- Display
-
- Screen size
-
- 25
-
- 25 line mode.
-
- 43/50
-
- 43/50 line mode. Only available for systems with EGA and
- VGA cards.
-
- Auto
-
- Specifies that the Terminal should attempt to
- automatically adapt to whatever the current screen size
- is when it is are started. This also means that the
- Terminal will not attempt to reset the screen mode when
- it is terminated.
-
- <+> Custom
-
- Allows you to specify computer register values to send to
- the INT 10h (Video BIOS) to set and reset the screen.
-
- Keyboard macros
-
- Allows you to define up to 20 (24) macro strings. These can be
- used to transmit common text, such as names and passwords, etc.
- The first 10 (12) function keys are accessed through <Shift-F1> -
- <Shift-F10> (F12), the second 10 (12) function keys are accessed
- through <Ctrl-F1> - <Shift-F10> (F12). This is referred to as the
- default macro set.
-
- To enter characters with an ASCII code below 32 (space), hold
- down the <Alt> key, enter the ASCII code on the numerical keypad
- and release the <Alt> key.
-
- Xlat.In and Xlat.Out
-
- 23
-
-
-
- See Editor > Xlat.In for a detailed explanation of translation
- tables. The Xlat.In table is used for characters received from
- the modem (remote). The Xlat.Out table is used for characters
- typed on the keyboard.
-
- IEMSI Profile
-
- Defines the default IEMSI (Interactive Electronic Mail Standard
- Information) profile used to negotiate interactive EMSI sessions
- with BBS software supporting it.
-
- Active
-
- Determines whether or not IEMSI support should be active by
- default.
-
- Name
-
- The user name you wish to use. If this field is empty, the
- ACTIVE field (above) is automatically toggled to "NO".
-
- Handle
-
- The handle you wish to use, or empty if none.
-
- Password
-
- The password you wish to use.
-
- Hot-keys
- Quiet
- Pausing
- Editor
- News
- New mail
- New files
- Screen Clr
-
- Specifies default user profile options, allowing you to
- customize the BBS or on-line service's behavior.
-
- The Terminal allows you to configure separate profiles for
- each individual telephone number in the Terminal Phone
- Directory.
-
-
- 4.4.6 Modem
-
- This option is used to configure your modem for use with
- FrontDoor. Modems are discussed in a separate section.
-
-
- 4.4.7 Printer
-
- <C> The printer configuration can only be changed in the commercial
- version. The shareware version defaults to using LPT1.
-
-
- 24
-
-
-
- 4.4.8 Manager
-
- The managers are used to define events, session level security,
- file protection (for file requests), your message folders, and
- strings to be sent to the modem when calling specific systems.
-
- All managers require that the SYSTEM path has been defined since
- they store their data files (EVENT.FD, PASSWORD.FD, REQUEST.FD
- and FOLDER.FD) in that directory.
-
- Event Manager
-
- Events are discussed in a separate section.
-
-
- Folder Manager
-
- Folders are used to define different areas (directories, or
- boards for the Hudson Message Base) so that you can use the
- Editor to read and write messages in those areas. The Editor only
- knows about one folder by default. It is defined in the Filenames
- section of FDSETUP (described above) and is referred to as the
- NetMail folder.
-
- The folder manager has two modes. The first is the view mode,
- which is self explanatory. The second mode is the edit/create
- mode and is accessed by pressing the Enter/Ins key depending on
- whether you want to edit an existing entry or create a new entry.
- It will now be described.
-
- Status
-
- The status and type of the folder.
-
- Origin
-
- The default origin line to use. This is only used for
- Conference-type folders with the Echo info status enabled.
- Origin lines are used to identify the origin of a message in
- Conference conferences. This is required because conference
- mail is not a point to point environment, like a telephone
- conversation or NetMail exchange.
-
- Mail conferences are usually widespread and can have an
- unlimited number of participating systems.
-
- Title
-
- The title appearing in the folder list when you select a new
- active folder in the Editor.
-
- Board/Path
-
- Depending on the type of the folder, this is either the
- Hudson Message Base board number or the DOS path (directory)
- where the messages for this folder should be stored.
-
-
- 25
-
-
-
- <+> Users
-
- Defines which users should have access to this folder. If a
- user does not have access to a folder, it will not show up on
- his/her list of available folders.
-
- Password
-
- Defines whether or not access to the folder is protected by a
- password. You can allow users to access a folder, and then
- protect it with a password.
-
- Use AKA
-
- Defines which address (AKA) the Editor should use for the
- folder. This is only important for Conference-type folders
- with the Echo info status enabled. The address is a part of
- the origin line.
-
- Folder status
-
- Restricted
-
- If enabled, users can only read Private messages
- addressed to their user name. Public messages are not
- affected by this.
-
- Echo info
-
- Whether or not an origin line should be appended to newly
- created messages. See Origin (above) for more
- information.
-
- Export OK
-
- See NetMail folder > Export OK described above.
-
- MsgBase
-
- Specifies that the folder is of the Hudson Message Base
- type, rather than a directory with .MSG message files.
- The Hudson Message Base (HMB) is used by several BBS
- packages, such as RemoteAccess.
-
- Translate
-
- Enables the translation tables for the folder. They can
- be toggled on/off from within the Editor.
-
- Private
-
- Specifies that the Private status should be allowed (and
- the default) for messages created in the folder. This
- should NOT be used in Conference-type folders unless the
- conference explicitly allows this.
-
- Read-only
-
- 26
-
-
-
- See "Netmail folder > Read-only" described above.
-
- <C> No check
-
- Determines if the Editor should access the specified path
- when checking for unread mail. This allows you to create
- folders that hold messages on removable media, e.g.
- floppy disks, that are not always accessible to the
- Editor.
-
- <C> Force CR
-
- Forces the Editor to append a hard CR to all lines
- instead of letting paragraphs flow. Some INTERNET mail
- environments require that the line length does not exceed
- a certain limit.
-
- Conference
-
- Defines the folder as a Conference folder (as opposed to
- a Local or NetMail-type folder).
-
- <C> NetMail
-
- Defines the folder as a NetMail-type folder (as opposed
- to a Conference or Local-type folder). This enables
- nodelist look-ups, carbon copies, etc.
-
- Local
-
- Defines the folder as a Local folder (as opposed to a
- Conference or NetMail-type folder). This is usually used
- to access local BBS message areas.
-
- Security
-
- The security manager is used to define session level
- passwords for other systems. It can also be used to
- explicitly refuse File/Update Requests and Mail from a
- system, and to disable/enable specific protocol and handshake
- options to fine tune your outbound mail sessions.
-
- Session level passwords are used to protect the receiving
- (called) system in a mail session, and calling system during
- an outbound EMSI session, to ensure that the calling system
- really is what it appears to be. Anyone can setup a Mailer,
- like FrontDoor, and send you mail. If there is mail waiting
- for the address they are using, your system will by default
- attempt to send it.
-
- You should setup session level passwords for all your common
- mail links, such as conference mail distribution systems,
- etc.
-
- System
-
- The system address of the remote system, e.g. 2:270/17.
-
- 27
-
-
-
- Password
-
- Defines the session level password that your system will
- present when calling the specified system and the
- password that your system requires to establish a mail
- session with the specified system.
-
- Note that some mailer software treat passwords case
- sensitive, i.e. ALLAN is not treated like AlLaN. The
- FrontDoor Mailer will treat passwords case insensitive on
- incoming (inbound) calls. They will, however, be sent
- EXACTLY as you have defined them here.
-
- You do not have to specify a password to use any of the
- other options.
-
- FREQs
-
- Whether or not the specified system is allowed to make
- File/Update Requests (see "File Requests").
-
- Mail
-
- Whether or not your system will allow the specified
- system to call your system. //1//
-
- EMSI
-
- Whether or not you want the Mailer to attempt to
- negotiate an EMSI session when it calls the specified
- system.
-
- FTS-1
-
- Whether or not you want the Mailer to attempt to
- negotiate an FTS-1 session when it calls the specified
- system.
-
- Zap
-
- Whether or not you want the Mailer to use the
- ZedZap/Zmodem protocol when negotiating an FTS-6 (YooHoo)
- session. If this is set to "NO", the DietIFNA protocol
- (Telink/SEAlink) will be used during YooHoo sessions with
- the specified system.
-
- YooHoo
-
- Whether or not you want the Mailer to attempt to
- negotiate an FTS-6 session when it calls the specified
- system.
-
- ____________________
-
- //1// Note that by disabling (setting it to "NO") this option, you may be
- in violation of network policy.
-
-
- 28
-
-
-
- Notes regarding protocols
-
- The Mailer will by default attempt to negotiate a mail
- session in the following order:
-
- 1. EMSI
- 2. FTS-6 (YooHoo), ZedZap/Zmodem
- 3. FTS-6 (YooHoo), DietIFNA
- 4. FTS-1
-
- The Mailer will ignore any entries in the security
- manager with inactive status.
-
- Request Manager
-
- The request manager is used to protect file requests. File
- and Update Requests are discussed in a separate section.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 29
-
-
-
- 5 The nodelist and the nodelist compiler
-
- The nodelist is FrontDoor's telephone directory and is used for several
- purposes. Among these are to allow you to perform name look-ups of other
- SysOps, to retrieve information about remote systems, such as the maximum
- supported baud rate, modem flags, and system capability flags, to check
- if a remote system is known to your system or should be treated as an
- unlisted system.
-
- The Mailer requires that a nodelist be present whereas the Editor and the
- Terminal can both be used without one, if so required. The typical
- FidoNet nodelist contains over 21000 systems and has a fairly straight
- forward structure as follows.
-
- Zone
-
- Usually a large geographical area, such as North America, Europe,
- Australia and New Zealand, etc. At the time of the release of this
- package, the following FidoNet Zone numbers have been allocated:
-
- 1 North America (including Canada)
- 2 Europe
- 3 Australia, Tasmania, and New Zealand
- 4 Latin America
- 5 Africa
- 6 Asia
-
- Region
-
- Usually a somewhat smaller geographical area, such as a country or
- part of a (large) country. A collection of regions make up one zone.
-
- Net
-
- Usually a collection of systems local to each other. Typically a city
- and in some cases including its suburbs. A collection of nets make up
- one region.
-
- Node
-
- A single system within a net.
-
- Point
-
- A single system belonging to a node. Typically, a point is similar to
- a user logging on to a BBS system using his/her terminal program,
- with the main difference being that a point performs most of his/her
- activities offline and use smart software to collect and transmit
- his/her mail.
-
-
- 5.1 Hosts and hubs
-
- The coordinator of a net is called the host or NC for Network
- Coordinator. The host is responsible for maintaining the nodelist
- segment for his/her net and to act as an inbound NetMail gateway for
- the systems in his/her net ("host routed mail").
-
- 30
-
-
-
- In a large net, it is quite common that "sub-hosts", called hubs, are
- set-up to aid in mail distribution within the net. In other words, a
- hub has the same function for systems in a network that a host has
- for (remote) systems outside the same network.
-
-
- 5.2 Compiling a nodelist
-
- Before FrontDoor can use the information in a nodelist, it must be
- compiled with the FrontDoor Nodelist Compiler (FDNC). FDNC will
- process the specified nodelist file(s) and generate database
- information and index files.
-
- The nodelist that FDNC needs to process is often referred to as the
- raw nodelist. It should not have been processed by Xlatlist, Parselst
- or a similar utility; but only be the nodelist you receive each week
- (if you are a FidoNet node) from your host.
-
- Grab a somewhat recent version of a nodelist and decompress it. Place
- the resulting file (such as NODELIST.228) in the NODELIST directory.
- Create a file called FDNODE.CTL with your a text Editor and place it
- in the same directory. You can also use the sample file included in
- the FrontDoor distribution package and modify it to suit your needs.
-
-
- 5.2.1 FDNODE.CTL
-
- FDNODE.CTL is FDNC's control file. It is used to control how FDNC
- processes the nodelist files, for dial translation and cost
- calculation. The order of commands does not matter. All commands
- are case insensitive.
-
- POINTLIST <FILENAME> [BOSS]
-
- This option allows you to add points to your nodelist
- database. The optional BOSS address is required if FILENAME
- does not contain a BOSS entry and should not be specified if
- FILENAME contains a BOSS entry.
-
- If you only have one file with point entries, you can name it
- FDPOINT.PVT. FDNC will automatically use this file if it is
- found in the NODELIST directory. If you use one or more
- POINTLIST statements, FDNC will merge all specified files
- into FDPOINT.PVT, overwriting its contents. A separate
- chapter discusses the point concept.
-
- PVTLIST <FILENAME> [ZONE]
-
- Similar to the POINTLIST command, but FILENAME contains one
- or more regular nodes. The optional ZONE number is required
- if FILENAME does not contain a ZONE entry and should not be
- specified if FILENAME contains a ZONE entry. The optional
- ZONE number is only supported for the first PVTLIST
- statement. FDNC accepts the POINT keyword in private
- nodelists.
-
-
-
- 31
-
-
-
- If you only have one file with additional node entries, you
- can name it FDNET.PVT. FDNC will automatically use it if it
- is found in the NODELIST directory. Note that if you use one
- or more PVTLIST statements, FDNC will merge all specified
- files into FDNET.PVT, overwriting its contents.
-
- Note that FILENAME for POINTLIST and PVTLIST may contain
- wildcard characters (* and ?). FDNC will use the most recent
- (by comparing the timestamp of the matching files) file.
-
- SWEPULSE
-
- This command was added to handle the somewhat screwed up
- method Swedish pulse exchanges handles dialing. Most modem
- manufacturers uses the British standard for pulse dialing,
- which is not compatible with Swedish pulse dialing. If you
- use SWEPULSE in FDNODE.CTL, telephone numbers will be
- properly translated. Do NOT use this command unless you live
- in Sweden and have to use pulse dialing.
-
- PHONE <ADDRESS> <NUMBER>
-
- Some systems are listed as PVT (private) in the nodelist, in
- which case there is no telephone number available (the text
- -Unpublished- is used in place). This, of course, means that
- the Mailer cannot call a system listed as PVT. If you have
- the phone number of a PVT listed system, or wish to override
- the telephone number listed in the nodelist, you can use the
- PHONE command.
-
- ADDRESS is a fully qualified address (e.g. 2:270/17). NUMBER
- is an untranslated (raw) telephone number (e.g. 352-355-936).
- If the PHONE command is used, FDNC will remove possible DOWN,
- HOLD and PVT flags for the specified system.
-
- USE ZONE <ZONE>[<ZONE> <ZONE>..]
-
- This command controls which zones FDNC should include in the
- nodelist and user name index files. The default is to include
- all encountered zones. This does not affect the contents of
- raw nodelist files, only what information is written to the
- nodelist and user name indices.
-
- DIAL <NATL PREFIX>/<SUFFIX> <INTL PREFIX>/<SUFFIX>
-
- Indicates the start of the dial translation table. All four
- parameters are optional and are only used if no other
- translation applies for a telephone number.
-
- If you only want to use a national (NATL) prefix/suffix, you
- must specify the / character for the international (INTL)
- prefix/suffix to indicate no special treatment. The same
- applies if you only want to use an INTL prefix/suffix.
-
- ; prefix
- ; prefix/suffix
- ; /suffix
-
- 32
-
-
-
- ;
- DIAL / 00 ; Add INTL prefix to all INTL
- ; numbers.
- 352- ; Strip country code
- 61- 0061-/X2 ; Send X2 to modem for
- ; Australia
- 46-8 /391 ; Append (suffix) 391 to all
- ; numbers in Stockholm
- ; Sweden.
- END
-
- END is required to terminate the dial translation table.
-
- If you need to strip the search value from a number, you do
- not have to put anything after it. In other words, if you
- need to strip 1-305-596 from all number, you enter that
- string with no translation. Comments are ignored and must be
- preceded by a semicolon.
-
- DIAL 12345-1- 00
- ..
- ..
- END
-
- Would add (prefix) 12345-1- to all NATL numbers not otherwise
- translated. It would add (prefix) 00 to all INTL numbers not
- otherwise translated.
-
- DIAL /2222 00/1111
- ..
- ..
- END
-
- Would append (suffix) 2222 to all NATL numbers not otherwise
- translated. It would add (prefix) 00 and append (suffix) 1111
- to all INTL numbers not otherwise translated.
-
- The translation values (strings) do not have to contain
- number characters (0-9,.-). They can include commands such as
- "S25=100" etc. as long as your modem supports it.
-
- COST <NATL COST> <INTL COST>
-
- Indicates the start of the cost table. The two (default)
- parameters are NOT optional. The default cost only applies to
- numbers with no matching entry in the cost table.
-
- COST 5 125 ; NATL default=5, INTL=175
- 1- 75 ; Canada and the US
- 1-808- 125 ; Hawaii
- 46- 27 ; Sweden
- END
-
- An additional parameter can be added after the cost for a
- number entry indicating the maximum baud rate used. This is
- useful when calling locations with a lot of line noise etc.
- Please note that this does not work with several high-speed
-
- 33
-
-
-
- modems such as the US Robotics Courier HST. You cannot force
- a HST modem to connect at 2400 with another HST modem by
- changing the baud rate.
-
- To compile your nodelist, type FDNC and press <Enter>, or invoke the
- nodelist compiler from FD's main menu, <Alt-N>.
-
- When FDNC is started, it will compare the date of the raw nodelist
- and its index files. If the dates match, and no update has been made
- to FDNODE.CTL, no compilation will be made and the program will ask
- "Nodelist files are up-to-date, compile anyway?".
-
- If you want to force compilation, run FDNC with the /F command-line
- switch.
-
-
- 5.3 Nodelist flags
-
- Most of the system entries in the nodelist contain one or more
- capability flags to indicate the system's capability. The Editor is
- capable of displaying, and the Mailer and Terminal are capable of
- using, any nodelist flag present in a system's nodelist entry.
-
-
- 5.4 Command-line switches
-
- /C
-
- Compile the nodelist if it (or FDNODE.CTL) has been updated since the
- last time it was compiled, otherwise exit directly. This is useful
- for compiling the nodelist in batch files since it avoids the
- "Nodelist files are up-to-date, compile anyway?" prompt.
-
- /F
-
- Forces FDNC to compile the nodelist regardless of whether or not it
- has been updated.
-
-
- 5.5 Points
-
- As mentioned before, a point is similar to a user logging on to a BBS
- system using his/her terminal program. A point system is addressed by
- specifying the BOSS system's address followed by the point number.
- E.g. 2:270/17.1 is point one of 2:270/17. The BOSS system is called
- point zero (2:270/17.0), but the .0 is normally left out.
-
- FrontDoor is a point smart software package and fully supports the
- "four-dimensional" (zone, net, node, point) addressing method.
- FrontDoor also supports the "two-dimensional" point approach used by
- some software. This is often called the "fakenet" or "pointnet"
- method. "Fake" because the software uses a non-existent network
- number to identify its "pointnet" and uses the node field for the
- point number.
-
- The maximum number of points any system can have is 65,535, not
- counting the BOSS, or point zero.
-
- 34
-
-
-
-
- 5.5.1 Pointlist
-
- A pointlist is similar to a normal nodelist, with the exception
- that all entries are considered point systems. FrontDoor, by
- default, uses the file FDPOINT.PVT to store its pointlist. It is
- possible to add points of other systems to your pointlist. This
- will allow you to enter messages to other systems' points just
- like you would to any other system.
-
- Here is a sample FDPOINT.PVT:
-
- ,1,FrontDoor_Development,Strassen,JoHo,-Unpublished-,9600
- ,2,APX_Development,Strassen,JoHo_Too,-Unpublished-,9600
-
- As you can see, a point list looks very much like a raw nodelist.
- The last field contains nodelist flags (HST, MO, CM, etc.) and if
- more than one flag is present, they are separated by commas.
-
- Points can also be added to systems in the master nodelist by
- using the POINT keyword:
-
- ,7,SuperMail_HQ,Strassen_L,Jon_Doe,352-123-456,9600,CM,XA,ZYX
- Point,1,Marketing,Strassen,Jon's_Uncle,-Unpublished-,9600
- ,17,UseMail_HQ,Strassen_L,Jill_Doe,352-234-567,9600,CM,XA,HST
- Point,1,The_Lab,Strassen_L,Jill's_Uncle,-Unpublished-,9600
-
- Assuming this was listed under the Net-270 host in zone two, we
- have created 2:270/7, 2:270/7.1, 2:270/17, and 2:270/17.1.
-
- The second example works well if your nodelist is not updated
- frequently (weekly, daily, etc). But if you have to add the
- "Point,#" every time you get a new nodelist, this task becomes
- rather tedious.
-
- FrontDoor therefore supports an additional pointlist format:
-
- Boss,2:270/7
- ,1,Marketing,Strassen,Jon's_Uncle,-Unpublished-,9600
- Boss,2:270/17
- ,1,The_Lab,Strassen_L,Jill's_Uncle,-Unpublished-,9600
-
- This does away with the need to constantly update the BOSS
- system's data in the raw nodelist and allows you to put your
- pointlist in a separate file. FDNC will then take the BOSS
- system's data from the master nodelist.
-
-
- 5.5.2 FDNODE.CTL
-
- If you only have one file with point definitions, you can put
- them in FDPOINT.PVT and use the third example (above) to add
- points for other systems, or your own system. If you have more
- than one file with point definitions, however, you should NOT
- name any of them FDPOINT.PVT.
-
- Assume we have two files with pointlists:
-
- 35
-
-
-
- FDHQ.PTS:
-
- ;
- ; Pointlist for 2:270/17
- ;
- Boss,2:270/17
- ,1,The_Lab,Strassen_L,Jill's_Uncle,-Unpublished-,9600
- ,2,The_Office,Strassen_L,Jill's_Sister,-Unpublished-,9600
-
- and
-
- WIZOZ.PTS:
-
- ;
- ; Pointlist for 1:135/990
- ;
- Boss,1:135/990
- ,1,OZ_Point,Miami_FL,Dorothy,-Unpublished-,9600
-
- We would tell FDNC to merge these two files into FDPOINT.PVT
- before it compiles the nodelist, by specifying the following in
- FDNODE.CTL:
-
- pointlist C:\FD\NODELIST\WIZOZ.PTS
- pointlist C:\FD\NODELIST\FDHQ.PTS
-
- The BOSS statement in FDHQ.PTS and WIZOZ.PTS can be removed if
- you instead specify:
-
- pointlist C:\FD\NODELIST\WIZOZ.PTS 1:135/990
- pointlist C:\FD\NODELIST\FDHQ.PTS 2:270/17
-
- You must ALWAYS specify the address of the BOSS system (as shown
- above) if it is not listed in the actual pointlist file.
-
-
- 5.5.3 Treatment of points
-
- A point system is treated just like any other system with one
- exception. A point system of a system other than your own is
- always treated as its BOSS (or point zero) system. When the
- Mailer creates mail packets for 1:135/990, it includes mail for
- any points under it by default.
-
-
- 5.5.4 Remapping
-
- If you have points that use "point dumb" software, i.e. which
- does not support the "four dimensional" (zone, net, node, point)
- concept fully, you must tell FrontDoor about this. Since
- FrontDoor supports the "four dimensional" concept, it has to
- remap mail from and to "point dumb" software.
-
-
- 5.5.5 POINTNET
-
-
-
- 36
-
-
-
- If the POINTNET environment variable is set, mail from and to
- systems with the same net number as the value of POINTNET is
- remapped.
-
- E.g. in AUTOEXEC.BAT:
-
- SET POINTNET=1004
-
- Would force FrontDoor to remap mail from and to 1004/1, 1004/2,
- 1004/3, and 1004/4 to 2:270/17.1, 2:270/17.2, 2:270/17.3, and
- 2:270/17.4 respectively; assuming your network address is
- 2:270/17.
-
- FrontDoor automatically remaps messages that it extracts from
- mail packets. If you use the POINTNET variable, FrontDoor will
- treat 1004/1 identical to 2:270/17.1; assuming your network
- address is 2:270/17.
-
-
- 5.6 Sharing the nodelist
-
- FrontDoor is capable of using the nodelist together with another
- program that supports sharing of the nodelist. If you are running
- FrontDoor under DESQview or LANtastic, for example, it is possible to
- run the Mailer at the same time as the Editor, sharing the same
- nodelist.
-
- When FDNC compiles the nodelist, you must, however, make sure that no
- other program (including text editors) is using any of the nodelist
- files (FDPOINT.PVT, FDNET.PVT, and/or the raw nodelist).
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 37
-
-
-
- 6 Modems and FOSSIL drivers
-
- FrontDoor works with most "Hayes-compatible" modems, including US
- Robotics HST and HST/DS, Telebit's Trailblazer, ANC, Everex, ZyXEL and
- Hayes; to name a few. The general rule is that the modem must be able to
- send alphanumeric result strings. For most low-speed modems, the basic
- configuration is all that is required. For high-speed modems such as the
- US Robotics HST, a few extra settings are necessary.
-
- To utilize a high-speed modem in the most efficient way, it must be
- properly configured for use with FrontDoor. Some high-speed modems are
- incorrectly configured for use with FrontDoor when they leave their
- factory.
-
- FrontDoor requires that your modem can return verbal result codes, such
- as "CONNECT 2400" and "NO CARRIER". In addition, if you want FrontDoor to
- answer the telephone on inbound calls, the modem must be able to return a
- verbal code indicating a ring signal, such as "RING". The modem must not
- have DCD (carrier detect) forced. It should support disconnecting by
- lowering DTR (data terminal ready), but it is not necessary. DTR must,
- however, not be forced.
-
- For high-speed modem users, it is usually recommended that you lock the
- DTE (computer<>modem) speed to the highest possible baud rate; which is
- usually 19200, 38400, 57600, or 115200 BPS.
-
- The current version of FrontDoor does not support manually operated
- modems with constant DTE speeds since most of them do not send any type
- of messages to the terminal (program). This is expected to be implemented
- in future versions.
-
-
- 6.1 Basic configuration
-
- The modem options are located in FDSETUP under the MODEM > Default
- settings pull-down menu. There are four sub-menus, Hardware,
- Messages, Command strings, and Answer control.
-
- Hardware
-
- The Hardware option screen allows you to configure things like the
- highest baud rate supported by your modem, the COM port to which your
- modem is connected, etc.
-
- Serial port
-
- The COM port your modem is attached to (1-32).
-
- Locked port
-
- Whether or not you have locked the FOSSIL driver's baud rate.
-
- Maximum baud rate
-
- The maximum supported baud rate of your modem (300-38400 BPS). If
- you have locked your FOSSIL driver (discussed later), this
- setting is not important.
-
- 38
-
-
-
- Reset modem to connect speed
-
- This instructs the Mailer to transmit the "Escape code" string,
- set the baud rate, and finally transmit the "Return on-line"
- string to the modem; when an incoming call at ITU-T V.23 (split
- speed) is processed. Most modems do not require this setting to
- properly handle V.23 connects.
-
- Lower DTR when busy
-
- Determines how the Mailer should handle the modem when it invokes
- other programs, exits, and shells to DOS. If enabled, the Mailer
- will simply lower DTR. This means that your modem will not answer
- the phone, but calling systems will not get a busy signal. If you
- disable this, the Mailer will send the Off-hook string to the
- modem instead of lowering DTR. This can be used to take the modem
- off-hook when your system is not available so that calling
- systems gets a busy signal instead of no answer. //1//
-
- Lower DTR to terminate call
-
- If enabled, the Mailer will drop DTR for a short period of time
- to terminate calls. Most modems support this and you should only
- disable it if your modem does not support lowering of DTR. If
- disabled, the Mailer will send the Escape code string followed by
- the On-hook string to terminate a call.
-
- Toggle DTR before dialing
-
- Specifies that the Mailer should lower DTR, pause, and then raise
- DTR again every time it places an outgoing call. While this
- increases the chances of call collision, it may be required by
- some modems to reset properly, etc. Do not enable this option
- unless it is absolutely necessary.
-
- <C> Carrier detect mask (CDMASK)
-
- The bitmask the Mailer should use when asking the FOSSIL driver
- for the port status to determine if a carrier signal is still
- present.
-
- Connect messages
- Status messages
-
- These options allow you to define the messages sent by your modem. If
- your modem does not send one or more of the strings you should NOT
- remove them.
-
- <+> Custom message
-
- ____________________
-
- //1// It is against the law of some countries to take a modem off-hook
- unless actual communication is taking place. As the operator of
- FrontDoor, it is your responsibility to be aware of such laws in your own
- country.
-
-
- 39
-
-
-
- Allows you to define a custom connect message and its associated baud
- rate in the event that your modem returns a connect message not
- otherwise covered by FrontDoor; such as "CONNECT FAST".
-
- Command strings
-
- The following characters have special meaning in strings sent to the
- modem by the Mailer (the Terminal initialization string may also
- contain these characters):
-
- | <CR>
- v Lower DTR
- ^ Raise DTR
- ~ One second pause
- ` 0.5 second pause
-
- Escape code
-
- Used to place the modem in command mode (as opposed to data
- mode). This is only used if you have disabled Hardware > Lower
- DTR to terminate call or if you are using the Hardware > Reset
- modem to connect speed option.
-
- Return on-line
-
- Used to place the modem in data mode (as opposed to command
- mode). This is only used if you are using the Hardware > Reset
- modem to connect speed option.
-
- On-hook
-
- Used to place the modem on-hook (as opposed to off-hook) if you
- have disabled Hardware > Lower DTR when busy or Hardware > Lower
- DTR to terminate call".
-
- Off-hook
-
- Used to place the modem off-hook (as opposed to on-hook) if you
- have disabled Hardware > Lower DTR when busy. //1//
-
- Dial
-
- Used when the Mailer places an outgoing call. The Mailer will
- send the dial (this) string, the Prefix, the telephone number,
- followed by the Suffix.
-
- I.e. <Dial><Prefix><Number><Suffix>
-
- ____________________
-
- //1// It is possible to utilize the Offhook string and lower DTR at the
- same time, should that be necessary. Simply disable (set to "NO") the
- "Lower DTR when busy" option and then include a 'v' (lowercase V)
- somewhere in the Offhook string. If you do this, however, it is
- recommended that a '^' (caret) be included in your Onhook string so the
- Mailer raises the DTR signal again.
-
-
- 40
-
-
-
- Prefix
-
- Sent before every number when the Mailer places an outgoing call
- (see above).
-
- Suffix
-
- Sent after every number when the Mailer places an outgoing call
- (see above). This should be set to the pipe (|) character to
- indicate a CR in most cases.
-
- Delay
-
- The delay (in 1/10 second) between every string the Mailer sends
- to the modem. If you have a modem that accepts commands rapidly,
- such as the US Robotics HST, you can set this as low as one or
- two, but most modems require that this is set between four and
- eight.
-
- Init-1..Init-3
-
- Modem initialization strings. They are sent every time the Mailer
- initializes the modem in order (Init-1, Init-2, Init-3). Unused
- strings should not be set to anything (leave field blank).
-
- Down
-
- Sent to the modem when the Mailer terminates. This occurs when
- mail has been received or when the Mailer terminates execution.
-
- Reset
-
- Sent to the modem to force it to respond with an OK message. This
- should be set to "AT|" in most cases.
-
- Answer control
-
- Manual answer
-
- Specifies that the Mailer should wait for the RING message from
- the modem and then send the force answer string (below) to force
- the modem to answer. //1//
-
- Force answer
-
- The string forcing the modem to answer an incoming call. This
- should be "ATA|" in most cases.
-
- Answer delay
-
- ____________________
-
- //1// This is the safest way to control modem answering and should be
- used unless your modem does not support it. For Hayes compatible modems,
- you should add "S0=0" to one of your init strings to prevent the modem
- from answering automatically.
-
-
- 41
-
-
-
- When the Mailer receives the RING message from the modem, it will
- pause for nn 1/10 seconds before sending the force answer string.
- This should be set between four and eight for most modems.
-
- <+> Enable LDFRS
-
- Enables Logging of Data Following Ring Signal (DFRS). This is
- mainly used in areas that offer CALLER*ID as a service to their
- subscribers. The CALLER*ID data will be logged between the first
- and the second RING in most cases.
-
- <C> Fax
-
- Used to enable or disable the internal Fax handling of the Mailer.
-
-
- 6.2 Advanced configuration
-
- Many modems have several different connection modes and options. The
- US Robotics HST/DS, for example, can be configured between several
- different connect modes, including ITU-T V.32, ITU-T V.32bis, and the
- proprietary HST protocol.
-
- Since the nodelist normally indicates a system's hardware (modem)
- capabilities, the Mailer can automatically reconfigure your modem
- depending on what type of hardware the remote system being called is
- using. This automatic reconfiguration feature can also be used to
- disable or enabled certain options for specific systems (i,e. not
- based on nodelist data) because of problems with noisy lines, long
- satellite delays, etc.
-
- This is configured in the MODEM MANAGER under the Manager pull-down
- menu in FDSETUP. The actual data is stored in a file called MODEM.FD
- in the SYSTEM directory.
-
-
- 6.3 The Modem Manager
-
- The entries are processed as defined, i.e. in sequential order, top
- to bottom. It may be important in which order these options are
- configured and triggered, the modem manager therefore allows you to
- re-arrange individual entries by using the Move (F2) option.
-
- String to match
-
- A nodelist flag, such as HST, a baud rate, such as 2400, or a
- complete network address, such as 2:270/17, that the Mailer
- should match in order to send the specified string. To specify a
- baud rate, place it behind an equal sign, e.g. =2400. //1//
- ____________________
-
- //1// The Mailer supports any ASCII text to be entered as the String to
- match. The data you enter is matched verbatim with the data in the
- nodelist. The FidoNet user (U) flag must therefore be taken into
- consideration. I.e. "ISDN" does not match "UISDN", nor does "UISDN" match
- "ISDN".
-
-
- 42
-
-
-
- NoDial
-
- This setting is toggled with <F3>; if enabled, it will prevent
- the Mailer from placing an outbound when a match is made with
- this entry. Note that the Mailer will still go through the
- motions of making a call because the Modem Manager data is not
- accessed until the actual call is about to be placed by the
- Mailer.
-
- String to send
-
- The string that will be transmitted to the modem when a match is
- made. The pipe (|) character is translated to a CR and should
- terminate the string in most cases.
-
- The Mailer will ignore entries with INACTIVE status.
-
- An example, the HST/DS/V.32Terbo
-
- Most HST/DS/V.32Terbo owners will have the following lines at the
- beginning of their Modem Manager list:
-
- HST ATB1|
- V32 ATB0|
- H14 ATB1|
- V32B ATB0|
- H16 ATB1|
- V32T ATB0|
-
- These lines are basically the preferred connect options with V32T
- (V.32Terbo) listed last as it is the fastest of the various connect
- options (for this specific modem).
-
- Let us assume our modem has a problem, with incorrect busy and voice
- signal detection (many modems also have problems with incorrectly
- identifying the ring signal as a busy signal, when calling the United
- Kingdom and other Commonwealth countries), when it encounters a modem
- that answers using the PEP protocol handshake, we would then want to
- disable our modem's capability to detect a busy signal and/or a voice
- signal by adding:
-
- PEP ATX2|
-
-
- 6.4 FOSSIL drivers
-
- A FOSSIL (Fido/Opus/SEAdog Standard Interface Layer) driver is a
- memory resident program (TSR) that works as a layer between the
- application program and your computer's hardware. The Mailer requires
- a FOSSIL driver to function. One of the advantages of the standard
- FOSSIL interface is that programs can be ported easily to other
- machines and/or operating systems, or to communicate with devices
- that do not normally function like a "Hayes compatible" modem, such
- as ISDN cards.
- ____________________
-
-
-
- 43
-
-
-
- There are several FOSSIL drivers available. The Mailer has been
- tested with cFos, SIO/VX00, VFD, OpusComm, X00, DGFossil, and BNU
- with good results. X00 and BNU will be described here.
-
- BNU
-
- BNU, written by David Nugent, comes in two flavors. One is a device
- driver, the other is a .COM file, loaded from AUTOEXEC.BAT or another
- batch file. The .COM flavor is assumed in the example. For a detailed
- description of the BNU driver, please refer to the documentation
- included in the BNU distribution archive.
-
- [AUTOEXEC.BAT]
-
- BNU /R=1024 /T=512 /L1:57600
-
- /R=1024
-
- Specifies a receive buffer of 1024 bytes.
-
- /T=512
-
- Specifies a transmit buffer of 512 bytes.
-
- /L1:57600
-
- Locks COM2 at 57600 BPS //1// (for use with a high-speed
- modem).
-
- If you are not using a high-speed modem the above example should
- most likely be modified to not lock COM2.
-
- X00
-
- X00, written by Ray Gwinn, is a device driver (later versions can
- also be loaded as an executable from AUTOEXEC.BAT), it is loaded from
- your CONFIG.SYS file when your machine is started. For a detailed
- description of the X00 driver, read the documentation included in the
- X00 distribution archive.
-
- [CONFIG.SYS]
-
- device=X00.SYS E 1 B,1,115200 T=512 R=1024
-
- E
-
- Disable 5 second advertisement when X00 is first loaded.
-
- 1
-
- Number of COM ports X00 should allow to be accessed at one
- time.
- ____________________
-
- //1// To lock BNU at 115200 BPS, the baudrate parameter must be specified
- as 11520.
-
-
- 44
-
-
-
- B,1,115200
-
- Locks COM2 at 115200 BPS.
-
- T=512
-
- Specifies a transmit buffer of 512 bytes.
-
- R=1024
-
- Specifies a receive buffer of 1024 bytes.
-
- If you are not using a high-speed modem the above example may not
- be what you want. The most common command-line for X00 is:
-
- device=X00.SYS E 1
-
- OS/2 2.x
-
- FrontDoor can be used in an OS/2 DOS box with excellent results. The
- two drivers described above, BNU and X00, should, however, not be
- used for optimum results. Two drivers that have been tested with good
- results exist. The first one, VFD for Virtual FOSSIL Driver, written
- by Joakim Hernberg is a FOSSIL layer that interfaces with the native
- OS/2 2.x COM driver (or compatible replacements thereof); the other
- is SIO/VX00 by Ray Gwinn.
-
- A separate FrontDoor Technical Note (FDTN), number two (2), can be
- found on many systems that describe the exact details of how to add
- these drivers to your OS/2 configuration.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 45
-
-
-
- 7 Events
-
- There are two basic types of events. Mail events and external events.
- Mail events are used to control how the Mailer treats mail during a given
- time of the day. External events are used to force the Mailer to
- terminate with an errorlevel at a specific time. They can be used to run
- system maintenance programs, disk optimizers, etc.
-
- The EVENT MANAGER in FDSETUP is used to control mail and external events.
- There is a (required) global event, which is active when no other event
- is active. The @ character is used for the global event.
-
-
- 7.1 The Event Manager
-
- The event manager has two modes. The first is the view mode, which is
- self explanatory. The second mode is the edit/create mode. It will
- now be described.
-
- Tag (T)
-
- The event ID. A letter from A-Z or @. The @ event has special
- meaning and is described later. X is used for eXternal events,
- all other letters are used for mail events. Which letter you use
- is not important. They could correspond with the time of day, N
- for Night, E for Evening, D for Day, etc. The event tag is used
- to associate an event with a schedule block in the route file
- (see "Mail routing").
-
- Days
-
- The days you want the event to be active on. The @ event is
- active on all days.
-
- Modifier (M)
-
- You can define a start time for the @ event. It is not used to
- control the start of the @ event. It can be added, subtracted, or
- ignored, when calculating the actual start time of other events.
-
- If the modifier for an event is +, the start time of the @ event
- is added to the start time of the event.
-
- If the modifier for an event is -, the start time of the @ event
- is subtracted from the start time of the event.
-
- If the modifier for an event is *, the start time of the @ event
- is ignored and not used to calculate the actual start time of the
- event.
-
- This is useful when it is time to switch between winter and
- summer time. Instead of having to manually go into each event and
- define a new start time, you could change the start time of the @
- event and the start time of all other events will be changed.
-
- Let us assume that you have an event (tag=E) that starts at 08:00
- in the morning with a modifier of +. Your @ event has a start
-
- 46
-
-
-
- time of 01:00. Since the modifier was + (add), the start time of
- @ (01:00) will be added to the start time of the E event and the
- result will be that event E starts at 09:00. If you change the
- modifier to - (subtract), the start time of event E will be 07:00
- (08:00 minus 01:00). If you set the modifier to * (ignore), the
- start time of E is not affected.
-
- Start time
-
- Defines the start time of an event. See Modifier (above) for an
- explanation on how this can be affected.
-
- Length
-
- Defines the length of the event. External events (X) always have
- a length of 00:01 (one minute).
-
- Errorlevel
-
- For external (X) events, this defines the errorlevel that the
- Mailer will terminate with. For mail events, this defines the
- errorlevel to exit with if mail is received (and the Mailer is
- triggered to exit). If the errorlevel field is set to zero, the
- default Mailer > Errorlevels > MAIL RECEIVED errorlevel will be
- used.
-
- You may use any value in the range 31-255.
-
- Min.cost
-
- Defines the minimum cost of messages that should be qualified
- (see "Mail routing").
-
- Max.cost
-
- Defines the maximum cost of messages that should be qualified
- (see "Mail Routing"). A value of -1 forces the Mailer to ignore
- the cost of messages.
-
- Behavior
-
- Defines the behavior of the event. Mail events and eXternal
- events have different behavior options, this is described later.
-
- Retry delay
-
- Defines the delay (in seconds) the Mailer should wait between
- placing outgoing calls. A value of zero means that you want the
- Mailer to use the default delay (described above).
-
-
- 7.1.1 External event behavior
-
- Allow users during event
-
- Defines whether or not non-mail (human) calls are allowed to
- interrupt the event.
-
- 47
-
-
-
- If a non-mail call comes in at 12:00 and you have an external (X)
- event scheduled for 12:30, the Mailer will take the X event into
- account when calculating the number of minutes left until the
- next event, depending on how this option is set. If it is
- disabled, the user would, in this case, only have 30 minutes
- until the next event. If it was enabled, the Mailer would instead
- scan ahead for the next (if any) event that does not allow users.
-
- Forced
-
- Defines whether or not the event is forced. The Mailer, by
- default, ignores events that it "missed" while doing something
- else. If you enable this option, the event will be executed even
- if the Mailer has "missed" it.
-
- Assume you have a non-forced external (X) event scheduled for
- 12:00 and a user calls in at 11:50. The call lasts for 30 minutes
- (12:20). When the Mailer is brought back up again, the external
- event will not be executed. If, however, you had this option
- enabled for the external (X) event, it would be executed as soon
- as the Mailer was brought up again.
-
- Inactive
-
- Toggles the state of the event. The Mailer will ignore any
- inactive events. This allows you to deactivate events without
- removing them from the event manager.
-
-
- 7.1.2 Mail event behavior
-
- Allow users during event
-
- This has the same function as for eXternal events. In addition,
- if this option is set to "NO" (disabled), interactive (non-mail)
- calls will not be accepted during the duration of the event.
-
- Exit when mail is received
-
- Defines whether or not you want the Mailer to exit when mail has
- been received. This allows you to process received echomail, etc.
-
- High priority (crash) mail only
-
- Forces the Mailer to ignore messages that does not have crash
- status. Note that messages with IMM (Immediate) status are not
- affected by this.
-
- Allow file requests
-
- Defines whether or not you want the Mailer to honor file requests
- during an event. If you disable this option, the Mailer will
- simply ignore file requests.
-
- Pickup file requests
-
-
-
- 48
-
-
-
- The Mailer will by default not accept file requests received
- during an outgoing (outbound) mail call since you are paying for
- the call. This option allows you to pickup waiting file requests
- and process them. Whether or not they are actually honored is
- defined by the Allow file requests option.
-
- Hold (do not send) file requests
-
- Forces the Mailer to ignore outgoing (your own) file request
- messages during the event. This is useful if you do not want to
- send out file requests during daytime events for example.
-
- Hold (do not send) file attaches
-
- Forces the Mailer to ignore outgoing (your own) file attach
- messages during the event. This is useful if you do not want to
- send out files attached to messages during daytime events for
- example.
-
- Attempt to pickup waiting mail
-
- Defines whether or not you want the Mailer to pickup any waiting
- mail on outgoing calls. The default (YES) should be used unless
- you want the Mailer to terminate the mail session as soon as it
- has delivered its mail. If this option is disabled, your file
- requests (if any) will fail since the Mailer terminates the call
- before the remote system has a chance to process them.
-
- Allow nodes to pickup waiting mail
-
- This option is the same as using the DENY route command (see
- "Mail routing"). The only difference is that you cannot be
- selective about which systems can pickup waiting mail. If a
- system calls in to deliver its mail and this option is disabled
- (NO), your system will not release (send) any waiting mail.
-
- Prioritize outbound calls
-
- Forces the Mailer to make outgoing calls without waiting for the
- specified time (retry delay) between calls. The Mailer will still
- accept incoming (inbound) mail, but the chances of another system
- getting through are very small.
-
- Delay before placing first call
-
- The Mailer will by default attempt to place the first outgoing
- call as soon as possible. If this option is enabled, it will
- delay the first call.
-
- Inbound-Only
-
- Specifies that you do not want the Mailer to make any outgoing
- calls during the event.
-
- End event when no more mail to send
-
-
-
- 49
-
-
-
- If you have an event with some restrictions on other systems or
- do not allow users, it may be useful to enable this option,
- forcing the Mailer to release all restrictions enforced by the
- event as soon as there is no more mail to send.
-
- If new mail is entered that qualifies for mailing and the event
- has ended (prematurely), it will be restarted.
-
- Send to CM systems only
-
- Forces the Mailer to only qualify those systems that have the CM
- (continuous mail) flag set in their nodelist entry.
-
- Send to non-CM systems only
-
- Forces the Mailer to only qualify those systems that Do not have
- the CM (continuous mail) flag set in their nodelist entry.
-
- Send to systems once only
-
- Forces the Mailer to only deliver mail to a system once during
- the event. If the event is interrupted or aborted, the Mailer
- will remember which systems it has already delivered mail to and
- when the event is restarted, it will not call those systems
- again.
-
- Assume you have mail to 1:135/20 and 2:310/11 during event A,
- with this behavior enabled. On the first call to 1:135/20, the
- Mailer sends its mail successfully. If the event is restarted for
- some reason (user break, human caller, mail received exit), the
- Mailer will not call 1:135/20 again, even if there is new mail
- for that system.
-
- Answer inbound calls
-
- If you have specified that you want the Mailer to force the modem
- to answer when it receives a RING message (see Modem > Answer
- control), this setting ultimately determines whether or not the
- Force answer string is sent to the modem, or if the Mailer should
- simply ignore the RING message. This allows you to control when
- the Mailer should answer inbound calls.
-
- Inactive
-
- The same as for eXternal events.
-
-
- 7.1.3 The @ event
-
- The @ event is active whenever your system is not in another mail
- event. The @ event is required. You do not have to tell the
- Mailer to send mail during the @ event, but it must be defined.
-
- You can use it to send local and/or low cost mail whenever the
- Mailer is not busy, etc. You can specify a schedule block (see
- "Mail routing"), using the @ tag and define routing rules for it
- just like any other mail event. If the Mailer does not find a
-
- 50
-
-
-
- schedule block for the @ tag, it will still use any global rules
- defined in the route file.
-
-
- 7.1.4 Overlapping events
-
- Overlapping events are fully supported by the Mailer.
-
- Event B starts at 05:00 with a duration of 01:00. Event A starts
- at 05:01 with a duration of 00:15. The behavior for event A
- includes Only execute event once and End event when no more mail
- to send.
-
- Event B will start at 05:00, after one minute, event A will start
- and last for fifteen minutes (or end when there is no more mail
- to send).
-
- Once event A has ended, B will resume. This is a very powerful
- and useful concept. It can be used to start temporary or dynamic
- events within events that lasts for several hours.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 51
-
-
-
- 8 Mailer
-
- The Mailer is the core program of FrontDoor. It is responsible for
- sending and receiving messages and files; and to optionally pass
- interactive callers to a BBS or other software. The Terminal function is
- located in the executable file of the Mailer and can be reached from one
- of its menus.
-
- Most functions of the Mailer are reached by holding down the <Alt> key
- and pressing a key, A through Z.
-
-
- 8.1 Menus
-
- Each function and menu of the Mailer will now be described.
-
-
- 8.1.1 Programs <Alt-P>
-
- Message Editor <Alt-E>
-
- Loads the message Editor.
-
- Terminal <Alt-J>
-
- Invokes the Terminal (it resides in the Mailer's overlay file,
- FD.OVR).
-
- Configure <Alt-C>
-
- Loads the configuration program, FDSETUP.
-
- Nodelist <Alt-N>
-
- Loads the nodelist compiler, FDNC.
-
- User keys <Alt-K>
-
- Displays the 20 (24) user definable function keys and allows you
- to select one.
-
- DOS shell <Alt-Z>
-
- Invokes a temporary DOS shell. Type EXIT and press <Enter> to
- return to the Mailer. Packets created with any of the temporary
- mail services function (File Request, Transmit file, Send mail)
- will be discarded when you return and the Mailer will rescan the
- contents of the NetMail folder.
-
- Quit <Alt-Q>
-
- Returns you to DOS or the batch file that first executed the
- Mailer. The Mailer will return errorlevel 10 (User Break).
-
-
- 8.1.2 Utilities <Alt-U>
-
-
- 52
-
-
-
- Active event <Alt-A>
-
- Displays the settings for the currently active event.
-
- Inbound history <Alt-I>
-
- Invokes the inbound call (mail) history management function.
-
- Outbound history <Alt-O>
-
- Invokes the outbound call (mail) history management function.
-
- Recent activity <Alt-R>
-
- Shows you the last two days of general activity, failed sessions,
- file requests, number of files/bytes sent and received, etc.
-
- Disconnect <Alt-X>
-
- Allows you to manually terminate a call. This will also
- re-initialize the modem.
-
- Lock keyboard <Alt-L>
-
- Allows you to lock the keyboard (and the Mailer) against
- unauthorized use. The Mailer will still perform its duties such
- as sending and receiving mail, etc.
-
- You must enter the specified password //1// to unlock the
- keyboard. If the Mailer exits (due to mail received or an
- interactive call is received), the keyboard lock status is
- retained and when the Mailer is restarted, the keyboard will
- remain locked.
-
- Restart event <Alt-F7>
-
- Forces the Mailer to rescan the message base and create new mail
- packets. All previous temporary packet information is discarded.
-
-
- 8.1.3 Mail <Alt-M>
-
- Queue manager <Alt-B>
-
- Allows you to manipulate the current mail queue. If no mail event
- is active, the mail queue is empty. The mail queue is described
- in a separate section.
-
- Undialable manager <Alt-V>
-
-
- ____________________
-
- //1// When you enter a password to lock the keyboard, note that the
- Mailer is case sensitive when you later enter the password to unlock the
- keyboard. E.g. "KEYlock" is not treated the same as "keyLOCK".
-
-
- 53
-
-
-
- Allows you to manipulate systems marked as undialable. This is
- discussed in a separate section.
-
- Forced poll <Alt-F>
-
- Creates a priority entry in the mail queue for the specified
- system. If an entry for the specified system already exists in
- the queue, its status is set to priority. If the Mailer has to
- rescan the message base, the temporary poll is removed from the
- mail queue.
-
- Request files <Alt-G>
-
- Allows you to create a temporary file request to the specified
- system. If the Mailer has to rescan the message base, the
- temporary file request is removed from the mail queue.
-
- Transmit files <Alt-T>
-
- Allows you to transmit files to the specified system. As with the
- poll and request function (above), this is only a temporary
- function. If the Mailer has to rescan the message base, the entry
- is removed from the mail queue.
-
- Send mail <Alt-S>
-
- Allows you to create a temporary mail packet for the specified
- system. You can choose to include all or high-priority mail. If
- the Mailer has to rescan the message base, the entry is removed
- from the mail queue.
-
-
- 8.1.4 Your profile <Alt-Y>
-
- Answer
-
- Allows you to toggle the manual answer status. This option is
- only valid if you have enabled the manual answer option in
- FDSETUP. Note that if you manually toggle this option, the
- Mailer will honor the new setting until it exits.
-
- <C> Printer
-
- Allows you to toggle the printing of new (incoming) messages.
-
- Human callers
-
- Allows you to toggle whether or not you want the Mailer to
- accept human callers. This option is only valid if you are
- not running the Mailer in mail-only mode.
-
- Exit on mail
-
- Allows you to toggle whether or not the Mailer should exit
- when mail has been received. This option is only valid if an
- errorlevel for received mail has been specified in FDSETUP
-
-
- 54
-
-
-
- and the active event (if any) specifies that the Mailer
- should exit when mail has been received.
-
- Which AKA <Alt-W>
-
- Allows you to select a different AKA to operate under. The
- specified AKA will be active until the Mailer exits or you
- select a new AKA to operate under. Note that this does not
- effect the AKA matching function of the Mailer.
-
-
- 8.2 Mail queue <Alt-B>
-
- The mail queue function allows you to modify the status of one or
- more mail packets, temporarily change the destination of mail
- packets, and to unpack one or more packets.
-
- Priority <F1>
-
- Sets priority status on all selected packets. Packets with priority
- status are always processed before packets with crash or normal
- status.
-
- Verbose <F2> or <Enter>
-
- Displays more information about the highlighted mail packet such as
- attached files, estimated transfer time, etc.
-
- Crash <F3>
-
- Sets crash status on all selected packets.
-
- Hold <F4>
-
- Sets hold status on all selected packets. Packets with hold status
- will never be sent by the Mailer unless the destination system calls
- in to pickup mail.
-
- Select all <F5>
-
- Toggles the selected status for all packets.
-
- Destination <F6>
-
- Changes the destination of all selected packets. When the Mailer
- processes the mail queue, it will treat all active (non-sent and non-
- held) packets as individual packets, including two or more different
- packets destined for the same system. If a connection is made
- (whether the destination system calls you or your system calls it),
- however, all packets destined for that system will be sent.
-
- Unpack <F7>
- Discards all selected packets from the queue. This will not delete
- any mail from the NetMail folder.
-
- Clear status <F8>
-
-
- 55
-
-
-
- Sets normal status on all selected packets.
-
- Clear busy retries <F9>
-
- Sets the dial attempts for all selected packets to zero.
-
- Exit <Esc>
-
- Returns you to the Mailer's main screen.
-
- Select <Space>
- Toggles the selected status of the currently highlighted packet.
-
-
- 8.3 Call progress
-
- When the Mailer has mail to send, it will step through the mail queue
- and call the systems with mail packets waiting. Packets with sent,
- failed, and hold status are ignored. These can, however, always be
- picked up by the destination system if it calls in.
-
- After every unsuccessful (BUSY, NO CARRIER, etc.) call, the busy
- retry counter is incremented until it reaches the value defined in
- FDSETUP. Once the limit has been exceeded, the Mailer puts hold
- status on the packet. If a connection is made but the actual transfer
- fails, the resend retry counter is updated and once the limit,
- defined in FDSETUP, is reached, the packet receives failed status.
-
- Press <Space> to force the Mailer to place the next outgoing call.
-
-
- 8.4 Semaphore indicators
-
- Every time the Mailer scans the NetMail folder, it looks for unread
- messages destined for your system. If any are found, it will enable
- the flashing "Mail" text in the bottom right hand corner. Once the
- message(s) have been marked received (read), the flashing mail text
- will disappear.
-
-
- 8.5 Undialable
-
- When the Mailer reaches the resend (session failure, transmission
- failure, etc.) retry limit for a system during an event. That system
- is added to the undialable table with a "grade" of one. When the
- "grade" reaches three, the system is considered undialable and will
- never be called again (until you manually "upgrade" it).
-
- The undialable manager is accessed by pressing <Alt-V> from the
- Mailer's main menu and allows you to "upgrade" a system's status, add
- a system manually to the undialable list, and remove one or more
- undialable systems.
-
- The undialable system information is kept in NODIAL.FD in FrontDoor's
- SYSTEM directory.
-
-
-
- 56
-
-
-
- 9 Editor
-
- The Editor is the program used to write and read messages. It can be
- invoked from the command-line in DOS by typing FM followed by <Enter>, or
- from the Mailer by pressing <Alt-E>.
-
- The Editor has two "status" lines. The bottom status line is used to
- display the current message, number of messages in the current folder,
- the lowest and highest message numbers and the number of messages
- remaining to the last message (last minus current). The top status line
- shows the currently active AKA (address), the current time and the folder
- you are in.
-
- Most functions of the Editor are reached by holding down either the
- <Ctrl> or <Alt> key and pressing a key, A through Z. If you press a key
- that has no function assigned to it, it will display a message saying
- "Press Alt-H for help" on the bottom status line.
-
- Each function and menu of the Editor will now be described.
-
-
- 9.1 Main <Alt-M>
-
- Create <Ins>
-
- Allows you to create a new message in the current folder. You will be
- prompted for the destination (user name and possibly a network
- address), subject, etc.
-
- Delete <Del>
-
- Removes the currently displayed message. The Editor will ask you to
- confirm that you really want to remove the message.
-
- Reply <Alt-R>
-
- Similar to the Create function. The destination of the newly created
- message, however, is taken from the sender of the message you are
- replying to. This function also allows you to quote the original
- message, in whole, or selected parts.
-
- NetMail reply <Alt-N>
-
- Similar to the Reply function. If you are in a Local or Conference
- folder, your message (the reply) will be placed into the NetMail
- folder. The destination address of the message is taken from either
- the origin line (Conference folders) or the sender's name (Local
- folders).
-
- <C> Reply comment <n/a>
-
- Similar to the Reply function. It allows you to create a follow-up
- message with additional comments to the same destination as the
- original message.
-
- Forward <Alt-L> or <Tab>
-
-
- 57
-
-
-
- This function allows you to redirect a message to someone else. It
- will also insert some additional information at the top of the
- redirected message, indicating who the message was originally from,
- etc. You can choose whether or not you want to overwrite the original
- message with the forwarded (redirected) message.
-
- The Forward function will also add the default message status to the
- message and remove the Rcvd and Sent status bits if they were set.
-
- <C> View fax <n/a>
-
- Invokes the external fax viewer, allowing you to view documents
- attached to a fax cover page message.
-
- Folders <Alt-F>
-
- Allows you to change the active folder. You cannot change to another
- folder while editing a message, but you can view the folder list. The
- type of each folder is shown as 'E' for Conference, 'L' for Local and
- 'M' for NetMail.
-
- <C> The commercial version allows you to configure any folder with
- NetMail status, the type will then be displayed as 'N'. The shareware
- version only has one NetMail-type folder.
-
- To select a folder, you can use the arrow keys to move the highlight
- bar and then press <Enter>, or you can type the number of the folder
- followed by pressing <Enter>.
-
- Folder scan <Ctrl-F>
-
- Scans all folders and indicates which folders have any message number
- higher than the last read message. Typically, this means that new
- messages have arrived in a folder since you last accessed it.
-
- DOS shell <Alt-Z>
-
- Invokes a temporary DOS shell. Type EXIT and press <Enter> to return
- to the Editor.
-
- Leave editor <Alt-Q>
-
- Returns you to DOS or to the Mailer, depending on how the Editor was
- invoked. If you are editing a message, you will be asked whether or
- not you wish to save it before exiting.
-
-
- 9.2 Edit <Alt-E>
-
- Status <Alt-S>
-
- Allows you to change the status of a message. See the separate
- section about Message Status Bits for a detailed description of this.
-
- Subject <Alt-A>
-
-
-
- 58
-
-
-
- Allows you to change the subject of a message. If you have a message
- with file attaches and press <Alt-A>, the file attach list will be
- processed again and if you specified wild-cards or more than one file
- on the subject line, you will have to select the files you want to
- send once again.
-
- Text <Alt-T>
-
- Allows you to edit the text (body) of a message. If you are already
- in editing mode, this will bring up a secondary menu with text
- editing related functions.
-
- Destination <Alt-D>
-
- Allows you to change the destination of a message. This will add the
- default message status bits as well as the Local bit to the message
- and remove the Rcvd and Sent status bits if they were set.
-
- As opposed to the Forward function, using <Alt-D> will not result in
- any text being added to the message body (forwarding info).
-
- Toggle <Ctrl-F2>
- Brings up the toggle menu.
-
-
- 9.2.1 Edit mode <Alt-T>
-
- Import file <Alt-F2>
-
- Allows you to import an ASCII file into the text. The contents of
- the file will be inserted at the current cursor position.
-
- Insert line <Ctrl-Enter>
-
- Inserts a blank line after the current line. The cursor will
- remain in the same position.
-
- Line to buffer <Ctrl-B>
-
- Adds the current (where cursor is positioned) line to end of the
- temporary buffer and moves the cursor down one line. The last
- eighty lines of deleted/marked text is always retained in a
- temporary buffer and can be reinserted with <Alt-F1> or <Esc>.
-
- Delete word <Ctrl-W>
-
- Deletes the word to the right of the cursor.
-
- Go to line # <Ctrl-G>
-
- Allows you to specify an absolute line number to place the cursor
- on.
-
- Delete to EOF <Ctrl-T>
-
- Deletes all text from cursor to end of message.
-
-
- 59
-
-
-
- Find <Alt-F5>
-
- Searches for the specified string, and if found, places the
- cursor on the first character of the found word.
-
- Find & Replace <Alt-F6>
-
- Allows you to replace a string with another. Note that this
- function will restore the cursor position whereas the Find
- function will not.
-
- Re-format <Alt-F8>
-
- Reformats a block of text (from cursor to the next blank line)
- and removes any hard CRs from the reformatted lines. It will add
- a hard CR to the end of the reformatted block.
-
- <C> Line drawing <Alt-F4>
-
- Allows you to draw lines and boxes using a variety of line sets.
-
- Undelete <Alt-F1> or <Esc>
-
- Inserts the last deleted line at the current cursor position. The
- last eighty lines of deleted/marked text is always retained in a
- "scratch" buffer.
-
- Save & exit <Alt-F10> or <Ctrl-Z>
-
- Save (or discard changes to) the current message.
-
-
- 9.2.2 Toggle <Ctrl-F2>
-
- Translation <Ctrl-X>
-
- Toggles the state of the translation tables.
-
- Hard CRs <Ctrl-C>
-
- Toggles whether or not hard CRs in the message text should be
- displayed.
-
- Echo info <Ctrl-E>
-
- Toggles the state of the echo info. This function is only
- available in Conference folders.
-
-
- 9.3 Utilities <Alt-U>
-
- Survey <Alt-F9>
-
- Invokes the message survey function.
-
- <C> Force rescan <n/a>
-
-
- 60
-
-
-
- Forces the Mailer and other Editors to rescan the NetMail folder.
-
- Move/copy <Alt-J>
-
- Allows you to move or copy the current message to another folder.
-
- Message to file <Alt-V>
-
- Exports the current message to an ASCII file. If the specified file
- already exists, you will be asked if you want to overwrite its
- contents or append the message to the end of the file.
-
- Print message <Alt-I>
-
- Adds the current message to the print queue. Messages added to the
- queue are printed in the order they were added. If you attempt to
- leave the Editor while messages are still being printed, it will ask
- you to confirm your choice to exit. If you choose to exit, the Editor
- will cancel the remaining messages in the print queue. //1//
-
- Renumber <Alt-B>
-
- Renumbers the messages in the current folder so that there are no
- gaps in the numbering. This function is not available in Hudson
- Message Base-type folders.
-
- Change user name <Alt-G>
-
- Allows you to change the current user profile.
-
- Change address <Alt-W>
-
- Allows you to change the active network AKA (address). This will also
- change the address that is inserted in origin lines in Conference
- folders.
-
- Change origin <Alt-O>
-
- Allows you to change the active origin line. Whether or not an origin
- line is appended to messages that you create is determined by the
- echo info setting (Conference folders only).
-
- <C> Drop marker <Ctrl-D>
-
- Allows you to drop a marker (0-9) on the current message. You can
- later return to these markers by pressing <Alt> in combination with
- the digits 0 through 9.
-
-
- 9.4 Purge <Alt-P>
-
-
- ____________________
-
- //1// The Editor does not use any external print spooler, such as the DOS
- PRINT program.
-
-
- 61
-
-
-
- The options on the Purge menu allow you to remove one or more
- messages in the current folder, based on the various criteria, as
- described below.
-
- From user
-
- Purge all messages FROM the specified user.
-
- To user
-
- Purge all messages TO the specified user.
-
- From net address
-
- Purge all messages that originated from the specified address.
-
- To net address
-
- Purge all messages destined for the specified address.
-
- Received
-
- Purge all received (read) messages.
-
- Sent
-
- Purge all sent messages.
-
- Age
-
- Purge all messages older than the specified date.
-
-
- 9.5 Help <Alt-H>
-
- Keyboard help <Ctrl-F1>
-
- Displays a brief help screen about various keys (cursor keys, etc).
-
- Macro keys <Alt-K>
-
- Displays the contents of the 20 (24) macro keys available in edit
- mode.
-
- Program notice <Ctrl-A>
-
- Displays the program version, copyright and registration information.
-
- Show notes <Alt-X>
-
- Displays extended information about the currently displayed message.
- The extended information is stored behind Ctrl-A (ASCII 1, SOH)
- characters in the message text.
-
- <C> Remote Info <Alt-Y>
-
- Displays information about the originating or destination system.
-
- 62
-
-
-
-
- 9.6 Entering new messages
-
- Press <Ins>. The screen will be refreshed and you will be prompted
- for the destination. If you are in the NetMail folder, you can use
- the name/address look-up function to specify the destination of the
- message; if you are in a Conference or Local folder, you must type
- the destination manually.
-
- Once you have specified the destination of a message, you will be
- prompted for the subject (Re:). If you want to send or request files
- to/from another system, select the proper status bits and specify the
- file data in the subject line. Note that the default message status
- (specified in FDSETUP) is always added, but can be changed.
-
- Enter the message text and press <Ctrl-Z> or <Alt-F10> to save the
- message.
-
-
- 9.7 Message survey <Alt-F9>
-
- The Survey function is used to perform global operations on a range
- of messages such as moving, printing, copying, deleting, etc.
-
- When you press <Alt-F9> for the first time in a folder, the Editor
- will scan all the messages in the folder and build a list of them.
- That list is kept in memory until you press <Alt-F9> in another
- folder, or when the Editor, for some reason, has to rebuild its
- internal message list for the folder. If you remove, add or renumber
- messages the list will be updated accordingly, so no rescan is
- necessary.
-
-
- 9.7.1 Main menu
-
- Kill <Del>
-
- Removes all selected messages.
-
- Print messages <F3>
-
- Prints all selected messages.
-
- Range select <F4>
-
- Allows you to select a range of messages matching a certain
- criteria.
-
- Select all <F5>
-
- Allows you to select all messages in the folder.
-
- Move <F6>
-
- Allows you to move all selected messages to another folder.
-
- Copy <F7>
-
- 63
-
-
-
- Allows you to copy all selected messages to another folder.
-
- Export to file <F8>
-
- Allows you to export all selected messages to an ASCII file.
-
- Go to message <Enter>
-
- Returns to view mode and makes the highlighted message the
- current message.
-
- Select <Space>
- Toggles the selected status of the highlighted message.
-
- Exit <Esc>
-
- Returns you to view mode.
-
-
- 9.7.2 Continuous tagging
-
- If you activate Caps Lock, messages can be tagged (selected) by
- moving the bar with the arrow keys.
-
-
- 9.7.3 Range select <F4>
-
- The range select function allows you to select a range of
- messages matching a certain criteria. Most of the functions only
- require a partial match with the selected search criteria.
-
- From user <F2>
-
- Selects all messages from the specified user.
-
- To user <F3>
-
- Selects all messages to the specified user.
-
- Originating address <F4>
-
- Selects all messages originating from the specified address.
-
- Destination address <F5>
-
- Selects all messages destined for the specified address.
-
- Text <F6>
-
- Selects all messages containing the specified search string in
- the message body.
-
- Date <F7>
-
- Selects all messages between two dates.
-
- Re: <F8>
-
- 64
-
-
-
- Selects all messages matching the specified subject.
-
- Rcvd <F9>
-
- Selects all messages with received (read) status.
-
- Sent <F10>
-
- Selects all messages with sent status.
-
- Exit <Esc>
-
- Returns you to the main menu of the Survey function.
-
-
- 9.8 Keyboard macros
-
- The keyboard macros are located on <F1> - <F10> (F12) and <Shift
- F1> - <Shift-F10> (F12). When a macro key is pressed, the Editor will
- insert its contents at the current cursor position. The following
- macros are supported:
-
- Sequence Expands to Key in FM
- ---------------------------------------------------------------
- ~~ ~
- ~| |
- | CR <Enter>
- ~B TAB <Tab>
- ~> Cursor one step to the right <Right>
- ~< Cursor one step to the left <Left>
- ~^ Cursor one line up <Up>
- ~V Cursor one line down <Down>
- ~G Cursor to top of message <Ctrl-PgUp>
- ~H Cursor to end of message <Ctrl-PgDn>
- ~F Reformat paragraph <Alt-F8>
- ~L Insert line <Ctrl-Enter>
- ~Y Delete line <Ctrl-Y>
- ~} Delete from cursor to EOL <Ctrl-End>
- ~T Delete from cursor to EOF <Ctrl-T>
- ~S Save message and keep original <Ctrl-Z>, 'N'
- ~# Save message and delete original <Ctrl-Z>, 'Y'
- ~U Current user name
- ~D Recipient of original message
- ~O Sender of original message
- ~A Subject (re:) of original message
- ~C Date of original message
- ~J Originating address of original msg
- ~K Destination address of original msg
-
- ~! Invoke DOS shell <Alt-Z>
- ~E<prog><parm>; Execute program
- ~X<filename>; Export to file <Alt-V>
- ~W<filename>; Export to file (no header) <Alt-V>
- ~I<filename>; Import file <Alt-F2>
- ~R<filename>; Import file and remove it
-
- Examples
-
- 65
-
-
-
- The sequence "~Edir /w>x.bak;~Rx.bak;" (without the quotes) will:
-
- o Execute "DIR /W>X.BAK"
- o Import X.BAK into the message text
- o Remove X.BAK
-
- Note that the semi-colon (;) is NOT optional for the "Execute"
- and "Import" macros. It determines the end of the program name
- and its parameters and/or the end of the name of the file to
- import.
-
- The sequence "|~T|~B~B~BRegards,|~B~B~B~U|" (without the quotes)
- will:
-
- o Insert a CR
- o Delete the text from the cursor to the end of the
- message.
- o Insert another CR
- o Insert three TAB characters (equivalent to pressing <Tab>
- three times).
- o Insert the text "Regards," without the quotes followed by
- a CR.
- o Insert three TAB characters (equivalent to pressing <Tab>
- three times).
- o Insert the current user's name followed by a CR.
-
- E.g. ..
- <message text>
- ..
-
- Regards,
- John Doe
-
-
- 9.9 Carbon copies (CC)
-
- The Carbon Copy function, is more or less what the name implies. A
- function that allows you to send the same message to two or more
- recipients; a distribution list. The CC function is only active in
- the NetMail folder. CC's can also be used for File Attach and File
- Request messages.
-
- To use the CC function, put the text "cc:" (case does not matter)
- followed by one or more SysOp names or system addresses, separated by
- a comma, at the top of the message. Once you select to save the
- message, the Editor will scan the beginning of the message text for
- CC: and if found, process each element of the CC list. You can have
- more than one line with CC's.
-
- E.g. cc: bremin,#bodger,samet
- cc: howard,kasza,wallin,1:135/4
-
- Note that if you create several messages using the CC function,
- editing any of them will not reactivate the CC function. The Editor
- will only process a CC list the first time you enter a message (i.e.
- a new message).
-
-
- 66
-
-
-
- 9.9.1 Hidden CC's
-
- To hide a recipient in a CC list, put the pound (#) character in
- front of the SysOp name or system address.
-
- E.g. cc: #1:135/20,#1:135/990,2:310/11
-
-
- 9.9.2 Using files as input to CC's
-
- You can also specify a file containing SysOp names or addresses
- to the CC function.
-
- E.g. cc: @betanote.txt
-
-
- 9.9.3 Address expansion
-
- All addresses in a CC list can be entered in short form, and
- several macros are recognized.
-
- cc: MYNET
-
- Will process your whole net and add every system to the CC list.
- Note that the previously supported notation "MYNET/node" (e.g.
- MYNET/12) is no longer supported.
-
- cc: 2:310/*, 1:135/*
-
- Will include all systems in net 2:310 and 1:135.
-
- cc: 2:270/17.*
-
- Will include all listed point systems under 2:270/17.
-
-
- <C> 9.10 Blind Carbon Copies (BCC)
-
- Blind Carbon Copies are identical to normal Carbon Copies with the
- exception that none of the recipients will know that the message is a
- Carbon Copy.
-
- <C> 9.11 Cross-posting (XC)
-
- Although CC's are not supported for Conference and Local folders,
- there is an additional function that provides you with a method of
- broadcasting the same message to two or more folders. This function
- is called Cross-posting.
-
- To use the XC function, put the text "xc:" (case does not matter)
- followed by one or more numbers, separated by commas. Each number
- represents a folder number where you want the message cross-posted.
- If your folder list looks like:
-
- 1 BNU
- 2 COMP.SYS.IBM.PC
- 3 FDECHO
-
- 67
-
-
-
- 4 TSECHO
- 5 NETSYSOP
-
- And you put "xc: 1,3,5" in a message in folder two. The resulting
- messages will have
-
- * Cross-posted in BNU
- * Cross-posted in COMP.SYS.IBM.PC
- * Cross-posted in FDECHO
- * Cross-posted in NETSYSOP
-
- At the top of each message. The target folder is excluded from the
- list. That is, " * Cross-posted in BNU " will appear in each message
- not going to the first (BNU) folder.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 68
-
-
-
- 10 Terminal
-
- Although FrontDoor was designed primarily as an e-mail system, it also
- features a powerful terminal emulator, hereafter called the Terminal. The
- Terminal features very accurate and efficient Terminal emulation and file
- transfer protocols; and several other features found in expensive and/or
- complex communications packages.
-
- The Terminal is invoked by pressing <Alt-J> from the Mailer's main menu,
- or by specifying /TERM on the command-line when it is started. You can
- also choose to run the Mailer in terminal-only mode, in which case the
- Terminal is invoked when you start the Mailer.
-
- Most functions of the Terminal are reached by holding down the <Alt> key
- and pressing a key, A through Z. If you press a key that has no function
- in the Terminal, it will display a message saying "Press Alt-H for help".
-
-
- 10.1 Menus
-
- Each function and menu of the Terminal will now be described.
-
-
- 10.1.1 File <Alt-F>
-
- The file menu contains functions to manipulate macros, upload and
- download files, transmit ASCII files, invoke DOS shell and
- Editor, etc.
-
- Download files <Alt-G>
-
- Receive one or more files from the remote system.
-
- Upload files <Alt-T>
-
- Transmit one or more files to the remote system.
-
- Transmit ASCII file <Alt-A>
-
- Allows you to transmit an ASCII file to the remote. You will be
- able to select the default inter-character delay and line
- translation. It is possible to create simple script or macro
- files by using this option.
-
- Macro management <Alt-V>
-
- Allows you to create and maintain your macro key sets. Use this
- function to make a different macro key set the active set.
-
- Profile management <Alt-E>
-
- Allows you to create, maintain, and select IEMSI session
- profiles. IEMSI is discussed in a separate section.
-
- Command history <Alt-U>
-
-
-
- 69
-
-
-
- The Terminal records your last ten typed lines. When you press
- Enter, it removes the oldest entry and adds the newly typed line
- to the list. You can choose any one of the ten history entries
- and retransmit it to the remote.
-
- Editor <Alt-I>
-
- Invokes the program defined in the Terminal > Miscellaneous >
- Editor field in FDSETUP. You will be asked for optional command-
- line parameters, they are stored for the remainder of your
- Terminal session. This could also be used to bring up external
- protocol menus, etc.
-
- Note that the FOSSIL driver is deactivated when leaving the
- Terminal and reactivated upon returning to the Terminal. This is
- to make sure FrontDoor maintains control of the FOSSIL driver
- even when loading other programs that could possibly leave the
- FOSSIL driver in a non-desirable state.
-
- DOS shell <Alt-Z>
-
- Invokes a temporary DOS shell. Type EXIT and press <Enter> to
- return to the Terminal.
-
- Leave Terminal <Alt-Q>
-
- Depending on how the Terminal was invoked, this will return you
- to the Mailer's main menu or to DOS. If you are connected to a
- remote system when you press <Alt-Q>, you will be asked to
- confirm that you want to hang up.
-
-
- 10.1.2 Line settings <Alt-L>
-
- The line settings menu contains your current communications
- parameters. You cannot reach the options of this menu unless you
- press <Alt-L>. Most of the options in this menu are self
- explanatory, only the not so obvious options are explained here.
-
- BPS
-
- The current DTE baud rate. If you have enabled the "Lock port"
- option in FDSETUP, this field will contain "Fixed" and you will
- not be able to change it.
-
- Wraparound
-
- Determines whether or not the Terminal should place the cursor on
- a new line when it is positioned at the rightmost position of the
- screen and a character is received. This should be set to On in
- most situations. There are however VT100/VT52 applications that
- require this setting to be Off. Note that a CR/LF will force a
- new line even if this is set to Off.
-
- CR expansion
-
-
-
- 70
-
-
-
- Determines how a received CR character should be processed. If
- set to CR, no expansion is made. If, however, it is set to CR/LF,
- the Terminal will expand all received CR characters to CR/LF.
-
- Local echo
-
- Some on-line services do not echo the characters you type. It may
- be necessary to enable this option to see what you are typing. If
- the on-line service you are using does echo the characters you
- type and you enable this option, you will get duplicated
- characters. E.g. "HHEELLLLOO!!".
-
- Emulation
-
- Allows you to choose between ANSI, VT100, VT52 and TTY (no)
- emulation. Note that the default for ANSI emulation is to support
- AVT/0+ (AVATAR/0+). This is a Terminal emulation protocol
- designed by G. Adam Stanislav. It is extremely fast and very
- efficient.
-
- Translation tables
-
- If enabled, the Terminal will use the Terminal translation tables
- to filter any received characters.
-
- Auto-Zmodem downloads
-
- The Terminal monitors received characters for the special
- sequence a Zmodem transmitter sends when a Zmodem file session is
- started. If it detects this start-up sequence, it will
- automatically invoke the Zmodem receiver. If you disable this
- option, you must use <Alt-G> (Download) to receive files using
- the Zmodem protocol.
-
- Allow AVT/0 sequences
-
- Determines whether or not you want to accept AVT/0+ emulation
- sequences when you are in ANSI emulation. Since AVT/0+ is based
- upon certain control characters, you may want to disable this
- option if you are using programs like Doorway, etc. which
- frequently transmits control characters.
-
- Clear on Form Feeds
-
- Determines whether or not the Terminal should clear the screen
- when receiving a Form Feed (FF, ASCII 12) character from the
- remote.
-
- Interactive EMSI
-
- Determines whether or not the Terminal should attempt to
- establish IEMSI sessions with systems you call. IEMSI is
- completely transparent and should not cause any problems. IEMSI
- is described in a separate section.
-
-
- 10.1.3 Session <Alt-S>
-
- 71
-
-
-
- Capture <Alt-C>
-
- Allows you to capture characters, as they appear on the screen,
- to a disk file, or logging it to a printer. Since the Terminal
- filters out NUL characters (ASCII 0), they will never appear in a
- capture file.
-
- Other characters and control sequences may not appear either,
- depending on what terminal emulation protocol is active at the
- time.
-
- Conversation mode <Alt-N>
-
- The conversation mode function splits the screen in half,
- creating two windows or sections on the screen. Data received
- from the remote system will be displayed in the top section,
- while the characters you type will be displayed in the bottom
- section.
-
- Dial <Alt-D>
-
- Allows you to dial a system in the nodelist. This function is
- disabled if no nodelist files are detected when the
- Terminal/Mailer is started. Note that you cannot queue numbers
- dialed via the nodelist.
-
- Manual dial <Alt-M>
-
- Allows you to enter a number manually, which will then be dialed
- until you press the <Esc> key or a connection has been made. Note
- that you cannot queue manually entered numbers.
-
- Disconnect <Alt-X>
-
- Disconnects the current call and displays the elapsed time.
-
- Phone directory <Alt-P>
-
- Brings up the phone directory manager. //1//
-
- Reset timer <Alt-R>
-
- Resets the on-line timer. The timer is automatically reset when a
- new connection is made.
-
- Scroll back buffer <Alt-B>
-
- Allows you to view data that has scrolled off the screen. The
- amount of data stored in the scroll back buffer is configured in
- FDSETUP.
-
- ____________________
-
- //1// If you invoke the Phone Directory and there is insufficient memory
- available, the Terminal will dispose of the memory allocated to the
- scroll back buffer in an attempt to make sufficient memory available.
-
-
- 72
-
-
-
- Send BREAK <Alt-W>
-
- Sends a (short) BREAK signal to the modem. Consult the
- documentation for your modem regarding BREAK signals. This is
- often used to terminate inquiries to commercial on-line systems,
- etc. but can be treated differently by your modem.
-
- Clear screen <Alt-J>
-
- Clears the screen and moves the cursor to the upper left-hand
- corner.
-
- <C> Initialize modem <Alt-Y>
-
- Transmits the Init-1..Init-3 modem strings as configured in
- FDSETUP under Modem > Command strings, followed by the Init
- string defined under Terminal > Miscellaneous, to attempt to
- initialize the modem.
-
-
- 10.1.4 Options <Alt-O>
-
- Most Terminal emulators and communications packages have a status
- line, either at the top or at the bottom of the screen; on which
- they display various information about settings and the current
- connection. FrontDoor's Terminal does not have a status line,
- hence the options menu.
-
-
- 10.2 Keyboard macros
-
- Depending on how many function keys you have on your keyboard, you
- will have access to 20 or 24 keyboard macros for every macro set. You
- can have over 60000 macro sets defined, but only one can be active at
- any time. The macro management function is reached by pressing
- <Alt-V>.
-
- The keyboard macros are located on <Shift-F1> - <Shift-F10> (F12) and
- <Ctrl-F1> - <Ctrl-F10> (F12). When a macro key is pressed, the
- Terminal will send the data specified in the macro string,
- uninterpreted, to the remote system. The following characters have
- special meaning when specified in a macro string:
-
- Sequence Expands to
- ----------------------------------------------------
- ~~ ~
- ~| |
- | CR
- ~B TAB
- ~! One second pause
- ~P The current password as defined in the Phone
- Directory or the current IEMSI Profile's
- password.
-
-
- 10.3 Raw mode
-
-
- 73
-
-
-
- The IBM PC keyboard generates two characters for every key you press.
- The first character is called the ASCII code, and the second
- character is called the scan code. Only the ASCII code is transmitted
- to the remote system by default. There are, however, some situations
- which require the Terminal software to transmit both codes. The
- AVATAR emulation protocol and the Doorway programs both require the
- complete codes (two characters) to identify certain keys; function
- and arrow keys in particular.
-
- Raw mode can be enabled by activating Scroll Lock, by pressing <Alt-
- => //1//, or, if you have enabled it, when the remote transmits
- a specific sequence that instructs the Terminal to enter raw mode.
- Once raw mode has been enabled, you cannot reach any of the
- Terminal's regular functions until raw mode is disabled.
-
-
- 10.4 Keypad modes
-
- The VT100 and VT52 emulation protocols require that the cursor keys
- transmit different codes depending on the state of the remote
- application. Most on-line services follow the VT100 recommendation
- for this, but several Editors and other programs have their own ideas
- of how this should be handled.
-
- If you enable the numerical keypad (Num Lock), the white cursor
- keypad will transmit the numerical application codes for VT100/VT52.
- If you have an extended (101/102) keyboard, the grey cursor keys will
- not follow the numerical keypad setting.
-
- By using the <Shift> key together with the white cursor keypad, you
- can negate the setting of Num Lock temporarily. I.e. if Num Lock is
- enabled and you press <Shift-Up> (8), the Terminal will transmit the
- up key sequence to the remote. If Num Lock is disabled and you press
- <Shift-Up> (8), the Terminal will transmit the numerical application
- keypad sequence for 8.
-
-
- 10.5 PC keyboards
-
- When the remote (host) requests that the Terminal enters numerical
- application keypad mode, the Terminal automatically enables Num Lock.
- On extended (101/102) keyboards, this will also enable the Num Lock
- LED. The Num Lock LED on IBM-PC (standard) keyboards will not change
- by doing this. The Options, <Alt-O>, menu should correctly reflect
- the proper state of Num Lock anyway.
-
-
- 10.6 Phone directory <Alt-P>
-
-
- ____________________
-
- //1// This key was added in addition to Scroll Lock to allow raw mode to
- be enabled in environments where Scroll Lock is already used for some
- other function. One such environment is DESQview/X. This means that the
- <Alt-=> sequence cannot be transmitted in raw mode.
-
-
- 74
-
-
-
- The phone directory allows you to define up to 200 (400 in the
- commercial version) numbers in addition to those stored in the
- nodelist database. The Terminal keeps the internal phone directory in
- a file named TERMPHON.FD, which is located in the SYSTEM directory.
-
- The top menu in the phone directory has nine options.
-
- Clear queue <F1>
-
- Removes the queue (Q) status from all entries in the phone directory.
- If no entries are listed in the queue, no action is taken.
-
- Dial <F2> or <Enter>
-
- Adds the current (highlighted) number to the queue and proceeds to
- the dial function. If no connection is made, the Terminal will
- proceed to the next number in the queue. If no other numbers exist in
- the queue, the Terminal will wait the defined (in FDSETUP) number of
- seconds before trying again. You can abort dialing by pressing <Esc>.
-
- Edit existing entry <F4>
-
- Allows you to change an existing entry.
-
- Purge <F6>
-
- Removes all entries marked for deletion (small square) from the phone
- directory. There is no way to recover a removed entry, so use this
- option with caution.
-
- Toggle queue status <F7> or <Space>
-
- Adds/removes the current (highlighted) number to the queue.
-
- Sort (and purge) <F8>
-
- This option is similar to the Purge option with one difference. It
- will also sort the phone directory in ascending order, based on the
- name field.
-
- Add entry <Ins>
-
- Allows you to add a new entry to the phone directory.
-
- Mark for deletion <Del>
-
- Marks an entry for deletion (small square). No other action is taken.
- You must use the <F6> or <F8> function to remove entries marked for
- deletion.
-
-
- 10.6.1 Queue status
-
- The queue status is only retained while you are in the phone
- directory. Once you return to the Terminal, the phone directory
- is removed from memory.
-
-
- 75
-
-
-
- 10.6.2 Adding/changing entries
-
- When you press <F4> (Edit) or <Ins> (Add), the edit screen will
- appear. Press <F10> to save the entry and <Esc> to abandon the
- entry/changes.
-
-
- 10.7 Inactivity timer
-
- If you are not connected to another system, the Terminal function
- will be terminated automatically after ten minutes of inactivity, if
- there is no carrier signal. The timer is reset if a key is pressed
- and when the carrier signal changes.
-
-
- 10.8 File transfers
-
- When you transmit or receive files in the Terminal, it will
- automatically set the line parameters to no parity, eight data bits
- and one stop bit. Once the transfer is completed, the line parameters
- will be reset to whatever values they had prior to the transfer.
-
-
- 10.9 On-line timer
-
- The on-line time displayed in the Options, <Alt-O>, menu shows the
- elapsed time of the current connection. It is not intended as a
- precise mechanism for cost calculations, etc. but will give you a
- rough estimate of the time you have spent on-line.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 76
-
-
-
- 11 Miscellaneous
-
- This chapter contains functions and options that are global to all
- programs in FrontDoor.
-
-
- 11.1 Destination of messages
-
- When you are prompted for an address and/or SysOp name for a message,
- you can use the look-up function. This is true for both the Mailer,
- the Editor, and the Terminal. The Editor only allows you to use the
- look-up function for messages written in the NetMail folder.
-
- You do not have to use the look-up function, of course. You can enter
- a short form address, such as 10 (for node 10 in your own net), .1
- (for point one in your own point net) in which case the SysOp's name
- is taken from the nodelist data. This is one of the most flexible
- functions in FrontDoor.
-
-
- 11.1.1 Name look-ups
-
- If you specify "Homrig" as the destination, you will be prompted
- to select from a list of all users with a last name matching
- "Homrig" (Homrighausen for example). The network address will
- also be taken from the name you select.
-
-
- 11.1.2 Address browsing
-
- To enter the address browse mode, specify an incomplete address,
- such as "2:?", "2:270/?" or "2:270/17.?". You can then browse
- through all zones, regions, networks and pointlists known to your
- system.
-
- If you press <Enter> (and the input field is blank) when you are
- prompted for an address, you will be placed in browse mode in
- your own net.
-
- 11.1.3 Address macros (NAMES.FD)
-
- You can also create a file containing short names which expands
- into a full address/SysOp name. The macros are located in a file
- called NAMES.FD which must be placed in the SYSTEM directory. The
- format of NAMES.FD follows:
-
- <alias>,<user name>,<address>[,<subject>]
-
- ALIAS The name you want to use for the macro.
-
- USER NAME The name you want FM to place in the TO: user name
- field.
-
- ADDRESS The network address you want as the destination when
- using the macro.
-
-
-
- 77
-
-
-
- SUBJECT The fourth and optional parameter can be used to
- insert a default subject in FM and also in the
- "File(s):" field in FD when using the "Mail services"
- options "Request files" and "Transmit files".
-
- E.g. oci,James Smith,1:132/300
- am,AreaMgr,2:512/1,MyAreaMgrPassword
- joho,joaquim homrighausen,2:270/17
- jd,Jon Doe,9:333/111
-
- Would allow you to place "*oci", "*am", "*joho", and "*jd"
- anywhere you are prompted for a network address or user name,
- including carbon copies (CC).
-
- A special format can also be used to automatically address
- messages to UUCP and INTERNET gateways. By putting a commercial
- at character (@) as the first character of the user name field
- (second field), you indicate to FM that the macro should receive
- special treatment.
-
- E.g. jd,@INTERNET/jd@jon.doe.lu,2:241/999
-
- Would place "INTERNET" in the message header's TO: field and
- address the message to 2:241/999. On the first line of the
- message text, it would put "TO: jd@jon.doe.lu".
-
- E.g. jd,@jd@jon.doe.lu,2:241/999
-
- Would place "UUCP" (the default) in the message header's TO:
- field and address the message to 2:241/999. On the first line of
- the message text, it would put "TO: jd@jon.due.lu".
-
- This cannot be used for carbon copies (CC).
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 78
-
-
-
- 12 File Requests
-
- This section will explain and discuss the various aspects of File
- Requests. There are two types of Requests, File Request and Update
- Request. The latter is basically a File Request that triggers a mechanism
- to only send the requested files if they are more recent than those found
- on the requesting system. Two basic terms have to be explained and
- understood:
-
- Outbound Request
-
- A File or Update Request created and transmitted by your system to
- another, remote, system.
-
- Inbound Requests
-
- A File or Update Request transmitted by another system to your
- system.
-
- There is no mechanism in the Mailer to control how an outbound Request is
- treated by the remote system. The Mailer strictly deals with controlling
- the access to and security of your system (inbound Requests).
-
-
- 12.1 Outbound Requests
-
- When you want to Request one or more files from a remote system, you
- may do so using several different methods:
-
- 1. By using the Editor and entering a message with File or
- Update Request status. The files you want to request from the
- remote system are listed on the subject (Re:) line of the
- message and you set FilReq or UpdReq to indicate that the
- Mailer should give the message special treatment.
-
- 2. By using the Mailer's temporary mail services, which are
- accessed with <Alt-M> from the main menu. Whether or not the
- Request is treated as an Update Request or File Request is
- determined by how you specify the filename(s) in the File(s):
- field. If you include a path, the Mailer will treat it as an
- Update Request, otherwise, it will be treated as a File
- Request.
-
- Requests created this way will not remain if the Mailer
- terminates (for one reason or another) as they are intended
- for temporary purposes only.
-
- 3. Use a robot utility, such as XRobot, to create the File or
- Update Request message(s).
-
- Note that an Update Request with no matching target, that is, you
- have attempted to Update Request a file that does not exist on your
- system, is automatically converted to a File Request.
-
-
- 12.2 Requesting files with a password
-
-
- 79
-
-
-
- Since files and directories can be protected with passwords, it may
- be necessary for you to present a password in order to request
- certain files from a remote system.
-
- To add a password to an outbound File or Update Request, you simply
- put the password preceded by a space character and a '!' character
- (i.e. <filename> !<password>). Regardless of whether you are creating
- the Request with the Editor or from the Mailer's Request function,
- this is the format used to specify passwords.
-
-
- 12.3 Requesting files from foreign file systems
-
- While DOS filenames may not contain underscore (_) and forward slash
- (/) characters, some file systems do allow this. When requesting
- files from remote systems, you can utilize the '~' (tilde) character
- to insert special characters in the file specification of your
- request. The following sequences are supported:
-
- ~_ Translates to a single space
- ~$ Translates to a single forward slash (/)
- ~~ Translates to a single tilde (~)
-
- To file request the file "morse code trainer.sit", specify the
- filename as "morse~_code~_trainer.sit".
-
-
- 12.4 Update Requests
-
- As mentioned before, an Update Request is really a File Request. The
- difference is that an Update Request is used to "update" a file that
- already exists on your system. The mailers accomplish this by
- transmitting the date and time of the existing file, the system that
- processes (receives) the Update Request then compares this with the
- requested filemask and sends any matching file that has a later date
- and time.
-
-
- 12.5 Inbound Requests
-
- You can control which directories should be accessible from the
- "outside world" during a Request. This is accomplished by telling the
- Mailer which directories should be searched for matches. How the
- Mailer handles inbound Requests depends on how you have configured
- the Mailer > File requests section in FDSETUP.
-
-
- 12.5.1 Request modes
-
- There are three different modes which decide how the Mailer
- treats a Request from a remote system. This is configured in the
- Mailer > File requests > Request limits section in FDSETUP.
-
- 1. Anyone can request. This means that the Mailer will allow
- any system to Request files from your system, subject to
- event behaviors and other modifiers.
-
-
- 80
-
-
-
- 2. Systems in nodelist can request. Similar to (1), but the
- Mailer will only process Requests received from systems
- that are listed in your nodelist database.
-
- 3. No requests. Forces the Mailer to ignore any received
- Requests, effectively disabling the ability to request
- files from your system.
-
-
- 12.5.2 Directory listings
-
- The directories that the Mailer searches during an inbound file
- request are configured in the Mailer > File requests > Filenames
- section of FDSETUP. Two files can be specified. Each file is a
- plain vanilla ASCII file with one directory (complete path) per
- line; this is NOT a filemask. All files in the specified
- directories will be available for file request. No other
- directories than those specified in these files will be searched.
-
- The "List" file is searched during unsecure sessions (i.e. those
- with systems that there is no session level password for). The
- "SecList" file is searched during secure sessions. This allows
- you to have different files available depending on whether or not
- the session is password protected. If no "SecList" file has been
- specified, the Mailer will use the "List" file.
-
-
- 12.5.3 Alias listings
-
- Alias files are used to set-up something often referred to as
- "Magic filenames". That is, the requesting system requests a
- specific name that expands into one or more files. The alias
- files are scanned before the list of requestable directories (see
- above), and if a match is made, the Mailer does not search the
- other lists. The two alias files are configured in the same
- section as the list of requestable directories.
-
- The alias file is a plain vanilla ASCII file with one alias
- definition per line.
-
- E.g. FRODO C:\FILES\FRODO\FDKIT.ARJ
- XR C:\FILES\FRODO\XROBOT.ARJ
- RA C:\FILES\RA\RA*.ARJ
- MYSECRET C:\TEST1.ARJ C:\TEST2.ARJ
-
- The remote system can request FRODO, XR, RA, or MYSECRET and get
- the above specified files. Files listed as alias names do not
- have to be located in requestable (see above) directories.
-
- Just like you can specify different requestable directories
- depending on whether or not the session is password protected,
- you can specify two separate alias files.
-
-
- 12.5.4 Response message
-
-
-
- 81
-
-
-
- In the event that the Mailer cannot satisfy a file or update
- request for one reason or another, it will return a message to
- the requesting system telling it why the request(s) could not be
- satisfied.
-
- If you have specified a filename for the Message option, under
- Mailer > File requests > Filenames, the Mailer will attempt to
- open the specified file and append its contents to the end of the
- automatically generated response message.
-
-
- 12.5.5 Limiting Requests
-
- You can choose to place a limit on how many files, how many
- kilobytes, and/or how long a request may take. This allows you to
- fine tune your system for maximum efficiency. The request limits
- are configured in the Mailer > File requests > Request limits
- section of FDSETUP.
-
- <C> Stop after first match
-
- Prevents the Mailer from searching all requestable directories as
- soon as one match has been made for a given request.
-
- Maximum match (files)
-
- The maximum number of files your system will send during one
- Request session. If the remote system requests an alias filename
- that expands to two files, the request is counted as two files. A
- setting of zero disables this feature.
-
- Maximum time (minutes)
-
- The maximum time the resulting files of a request may take to
- transfer. Before sending each file, a check is made to see if
- sending the file will cause this limit to be exceeded. If so, the
- file is skipped and the next file in the list will be checked. A
- setting of zero disables this feature.
-
- Maximum size (KB)
-
- The maximum amount of data your system will send during a request
- session. Note that if the remote system requests an alias
- filename that expands into two files, the size of both files is
- checked. A setting of zero disables this feature.
-
- Minimum speed (BPS)
-
- The minimum baud rate required to allow Requests. If the current
- connection is at a lower speed, Requests will not be honored.
-
-
- 12.5.6 Limited hours
-
- You may also choose to limit the access of your request functions
- to certain days and certain hours of those days.
-
-
- 82
-
-
-
- Limited
-
- Enables limited hours.
-
- Start
-
- The time of day when your system should start honoring Requests.
- This setting can only be changed if the Limited hours option is
- enabled.
-
- End
-
- The time of day when your system should stop honoring Requests.
- This setting can only be changed if the Limited hours option is
- enabled.
-
- Days
-
- Defines on which days your system will honor requests.
-
-
- 12.5.7 Event restrictions
-
- Ultimately, whether or not your system will honor requests is
- controlled by the current event's behavior. If the Allow file
- requests option for an event is set to NO, requests will not be
- honored.
-
-
- 12.5.8 Protecting files and directories
-
- You may want to protect access to certain files and directories,
- just like another system may require you to present the proper
- password to request one or more files. See "Outbound Requests".
-
- The Request Manager in FDSETUP is used to protect Inbound
- Requests.
-
- Filename/Directory
-
- Defines the filename/directory you want to protect. This is
- NOT an exclusive name. If you set this field to C:\HIDDEN\
- and define a password, all Requests that result in files
- being sent from C:\HIDDEN\ are protected. If you set this
- field to MYSECRET.ARJ and define a password, the file
- MYSECRET.ARJ will only be sent if the requesting system
- presented the proper password.
-
- Password
-
- Defines the password for the specified file/directory. The
- requesting system have to present this in its request to get
- the file(s). These passwords are treated case insensitive.
-
- Entries with inactive status in the Request Manager are ignored
- by the Mailer. Note that Alias definitions can also be protected
-
-
- 83
-
-
-
- by placing the name of the Alias definition in the
- Filename/Directory field.
-
- <+> 12.5.9 Request processor
-
- A request processor is basically a slide-in replacement for the
- Mailer's internal code to handle file requests. The main
- difference is that it is an external program and can thus be
- easily replaced and updated. Other advantages include being able
- to access proprietary file database formats used by some BBS
- packages, and to handle searches for files located on CD-ROM
- drives which are notoriously slow if you access them directly.
-
- The Request processor is configured in the Mailer > File requests
- > Request processor section of FDSETUP. The Name field is the
- program to invoke (i.e. the name of the request processor) and
- any parameters it may require. Several macros can be specified to
- give the request processor access to some of the Mailer's
- internal variables and data. The Enabled field simply determines
- if the Mailer should call the request processor or if it should
- handle file requests internally. The Swapping option determines
- if the Mailer should swap its program image out of memory prior
- to invoking the request processor.
-
- The available macros are described in the FrontDoor Developer's
- Kit (FDDEV) and the specific macros you have to use with the
- request processor should be covered by its documentation. There
- are at least two request processors available for FrontDoor at
- the time of publication; one works with the Maximus BBS software
- and the other with RemoteAccess 2.x.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 84
-
-
-
- 13 Swapping
-
- Both the Editor and the Mailer require over 220 KB of RAM. If you shell
- to DOS, or load another program from the Mailer, this memory is not
- available for other programs. You can therefore force the Editor and the
- Mailer to swap their program image to disk or EMS/XMS memory. If you have
- specified that you want the programs to use XMS/EMS memory for swapping
- but there is not sufficient XMS/EMS memory available, the swap image is
- written to disk. The swap file is placed in the SYSTEM directory and
- removed when you return to the program.
-
- If you enable swapping for the Mailer, it will be swapped out when you
- invoke a DOS shell and when you invoke other programs. The Mailer swap
- setting also affects the Terminal. The Terminal will not flush its
- scroll-back buffer to disk if any type of swapping is enabled for the
- Mailer.
-
- Once the swap image has been created and written to XMS/EMS memory or a
- disk file, all memory used by the program is freed except between three
- and five KB which will always remain in memory.
-
-
- 13.1 Complete path specifications
-
- To avoid problems when you enable swapping, it is recommended that
- all the filename and directory specifications under Global >
- Filenames in FDSETUP contain complete path specifications, including
- a drive specifier.
-
- If you choose to swap to a disk file, it is further recommended that
- you specify a complete path to where you want the swap files to be
- placed (Global > FileNames > Swapping).
-
-
- 13.2 Loading programs in a DOS shell
-
- Make sure that you do not load any TSR (Terminate and Stay Resident)
- programs, such as DOS' PRINT and SideKick, when you are in a DOS
- shell. Failure to follow this advice may lead to system lockups when
- you attempt to return from the DOS shell.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 85
-
-
-
- 14 CRT environments
-
- All programs in the FrontDoor package are screen environment aware and
- most of them can adjust to most (if not all) screen sizes as long as the
- current screen mode has 80 or more columns (horizontally).
-
- If you have an EGA or VGA card that allows you to set the screen mode to
- something like 132x28 and you want to use this in the Editor, the Mailer,
- or the Terminal, you should specify that you want the AUTO screen mode
- for that particular program. This will prevent it from altering the
- screen mode.
-
- Please note that if you run the Mailer in AUTO mode, you must run the
- Editor and the Terminal in AUTO mode as well, if you plan to invoke
- either from the Mailer (and not just from DOS). Otherwise, the Mailer
- will display garbage on the screen when you return from the Terminal. The
- opposite (running the Terminal in AUTO and the Mailer in 25 or 43/50) is,
- however, properly handled.
-
- <+> The registered version also allows you to use an alternate mode
- referred to as Custom, which allows you to specify the exact register
- parameters to the INT 10H Video BIOS call. Refer to the documentation for
- your video adapter for further information.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 86
-
-
-
- 15 Message Status Bits
-
- Message status bits determines how the Mailer will treat outbound
- (outgoing) messages and how the Editor will treat locally destined
- messages. The Message status menu is accessed by pressing <Alt-S> in the
- Editor and is also displayed when entering a new message and changing the
- subject of a message.
-
-
- The keys listed refer to the status menu in FM.
-
- Private <Ctrl-P>
-
- Indicates that the message should only be read by the addressee.
-
- Crash <Ctrl-C>
-
- High-priority mail. Messages with crash status can never be routed or
- held by a route file (see "Mail routing"). Crash messages do, however,
- NOT override any cost restrictions for an event; they also require that
- the destination system has been qualified before the Mailer will call it.
-
- Hold <Ctrl-H>
-
- The hold status will force the Mailer to ignore the message unless the
- destination system calls your system to pick up its mail. If the message
- is destined for a point system and the boss of the point system calls
- your system, the message will be given to the boss unless the message
- also has Direct status.
-
- File <Ctrl-F>
-
- Indicates that the message has one or more files attached to it. The
- files are listed in the subject (Re:) line. File attach messages can be
- routed and held unless another status bit (Crash, Immediate, Hold, etc.)
- prevents it. The default treatment of a file attach message is to send it
- directly to its destination.
-
- File request <Ctrl-R>
-
- Indicates that the message is a File Request. The requested files are
- listed in the subject line and may contain wild-cards characters. File
- request messages can be held, but are never routed. See "File Requests".
-
- Update request <Ctrl-U>
-
- Similar to a File Request, but the subject line (Re:) must contain valid
- (existing) file specification(s). When the Mailer connects to the
- destination system, the requested files will only be sent by the remote
- if they are more recent than the matching files on your system. See "File
- Requests".
-
- Kill/sent <Ctrl-K>
-
- Removes the message after it has been sent or picked up. If the Kill/Sent
- status is not set on a message, it will be marked as sent after it has
- been sent or picked up.
-
- 87
-
-
-
- Trunc/sent <Ctrl-T>
-
- Truncates the attached files to zero length after they have been sent or
- picked up. This option is only valid for file attach messages. //1//
-
- Delete/sent <Ctrl-E>
-
- Removes the attached files after they have been sent or picked up. This
- option is only valid for file attach messages.
-
- Direct <Ctrl-D>
-
- Similar to the Crash status, with the difference that they can be held.
- Messages with the Direct and Hold status combined require that the
- destination system (including points) call in to pickup their mail.
-
- Immediate mail <Ctrl-I>
-
- Similar to the Crash status, but messages with immediate status will be
- sent at the first opportunity, ignoring all restrictions and
- qualifications. If there is one or more messages with immediate status to
- a system, all other messages (except those with hold status) to that
- system will be added to the mail packet. USE THIS OPTION WITH CAUTION!
-
- Lock <Ctrl-L>
-
- Locks a message from further access. This is done by setting the DOS
- attribute to read-only and adding a special flag to the message text. The
- Mailer and most other utilities will ignore message files (.MSG) with
- read-only attribute.
-
- Messages with lock status cannot be removed by any of the purge functions
- and will never be sent (or picked up). The Editor can, however, renumber
- a folder containing one or more messages with locked status.
-
- Sent <Ctrl-S>
-
- Indicates that the message has been sent or picked up by the addressee.
- Once a message has been flagged as sent, they cannot be sent or picked up
- by the addressee.
-
- No status <Ctrl-Z>
-
- Clears all status bits. This is actually a toggle. I.e. if you press
- <Ctrl-Z> once, the Editor will remove all status bits (except the Local
- bit), if you press <Ctrl-Z> again, the Editor will restore the previous
- status bits.
-
-
-
-
-
- ____________________
-
- //1// It is nearly impossible to recover a truncated file so use this
- option with caution.
-
-
- 88
-
-
-
- 16 Mail routing
-
- This is one of the most complex parts of FrontDoor and takes considerable
- time to learn and understand. Make sure you understand how each routing
- verb affects mail routing before you use it.
-
- When the Mailer is started, it scans for any active events and when one
- is found, opens the route file, ROUTE.FD, and uses it to determine whom
- to send mail to, and how to send it. The route file must be located in
- the SYSTEM directory. If the timestamp of the route file is modified, the
- Mailer will detect it and rescan the NetMail folder (see "Semaphores").
-
- Global routing commands are those that appear before any SCHEDULE keyword
- in the route file. They are always used, so you can specify routing that
- is identical for all your events here.
-
- Local routing commands are those that appear between two SCHEDULE
- keywords (a "Schedule block") in the route file. the Mailer determines
- which schedule block to use by searching for a schedule keyword with a
- tag (letter) matching the current event tag (see "Events").
-
- Several references are made to Hold status in this chapter. Do not
- confuse this with the HOLD command. The Hold status refers to the message
- status bit (see "Message Status Bits"), or where stated, to a system's
- nodelist status.
-
- The Mailer allows you to insert comments in your route file. Every line
- with a semicolon as the first non-space (TAB/Space) character is treated
- as a comment. While comments may seem inadequate at first glance, it is a
- very useful function. Going back to a route file you wrote five months
- ago may not be your definition of spending a weekend in joy and
- happiness.
-
- Addresses specified in the route file should always be fully expressed.
- The * macro (implying "ALL") is supported. You can also use any
- combination of nodelist flags to specify a range of systems. The routing
- language is case insensitive (case does not matter). SCRIPT, SCripT, and
- scRIPt are all treated as the same command.
-
-
- 16.1 Default routing
-
- The Mailer has several default rules for routing that will be used if
- no other rules have been defined for a specific system. Some of the
- default rules cannot be overridden by routing commands.
-
-
- 16.2 Message status
-
- Messages with immediate (IMM hereafter), Crash, File/Update Request,
- and Direct status will normally not be routed. They are sent directly
- to the destination system, with the exception of systems without a
- telephone number, as described later.
-
- Messages with IMM or Crash status can never be held by using the HOLD
- command. Messages with Crash status can, however, be prevented from
-
-
- 89
-
-
-
- being sent by event behavior, qualification lists, and cost
- restrictions.
-
- Messages with Hold status will NEVER be packed into a mail packet.
- They can always be picked up by the destination system (unless they
- also have Lock status). Messages to points with Hold status can and
- will be picked up if the Boss of the point calls to pickup mail,
- unless the message also has Direct status.
-
- Messages with IMM status will always be packed into mail packets,
- overriding event restrictions. If you have a message with IMM status,
- the Mailer will add all other qualifying messages to the same system
- to the same mail packet.
-
- Messages with Rcvd (read), Orphan, Lock, and/or Sent status are
- ignored by the Mailer.
-
-
- 16.3 Host/Hub/Boss routing
-
- Messages not otherwise prevented from being routed will by default be
- sent to the destination system's Host (see "Nodelist") if the
- destination system is outside your own net and to its Hub if it is
- within your own net.
-
- If you have mail for a system listed as DOWN in your nodelist
- database, it will never be packed. If the system calls your system to
- pick up mail, it will receive its mail.
-
- If you have mail for a system listed as HOLD or PVT (no telephone
- number) in your nodelist, the default behavior is to send the mail
- via the system's Host, Hub, or Boss. If the mail to a HOLD or PVT
- listed system contains file attaches, the mail packet will by default
- be placed on hold for the Host/Hub, or go directly to the Boss in the
- case of a point.
-
- Messages to systems not in your nodelist (unlisted systems) will not
- be Host/Hub routed by default, but they can be explicitly routed.
-
- Messages with Crash, IMM, or Direct status, destined for points to
- which the Mailer cannot place a call directly will retain its status
- (and restrictions), but the Mailer will instead assume the point
- system's Boss as the destination.
-
-
- 16.4 Qualifying systems
-
- Before the Mailer will send mail to a system, it must be qualified by
- specifying its address, or a macro that includes its address in a
- SCHEDULE block (this is not true for IMM mail as previously
- described).
-
- You can qualify a system by placing a SEND-TO command in the global
- section of a route file, but this is NOT RECOMMENDED. SEND-TO, POLL
-
-
-
-
- 90
-
-
-
- and the optional SEND-LIST after a SCHEDULE command are the only
- available methods to qualify a system for mailing. //1//
-
- If the Mailer cannot find ROUTE.FD, mail to all systems will be put
- on hold for the destination system to call in and pickup its mail.
-
-
- 16.5 Route commands
-
- SCHEDULE <TAG> [SEND-LIST]
-
- Defines the start of a schedule block. All commands following a
- SCHEDULE command are considered a part of the same block until
- another SCHEDULE command is encountered.
-
- TAG is a letter corresponding with the event tag, defined in FDSETUP
- (see "Events"). You should only have one schedule block per defined
- event tag.
-
- The optional SEND-LIST parameter should contain the systems to
- qualify for the event.
-
- SEND-TO <SEND-LIST>
-
- Qualifies the specified systems. This is identical to the optional
- SEND-LIST after the SCHEDULE command.
-
- HOLD <LIST>
-
- Hold mail for the specified systems.
-
- UNHOLD <LIST>
-
- The opposite of HOLD. Useful if you have used the HOLD command in the
- global section and want to negate the effect of those for one or more
- systems.
-
- NO-ROUTE <LIST>
-
- Send mail to the specified systems directly. This overrides the
- default routing rules. Some logic is applied to "directly" when using
- the NO-ROUTE command. Systems which the Mailer cannot mail directly
- will be sent "as directly as possible".
-
- E.g. if <LIST> includes a system listed as PVT (no telephone number),
- the Mailer evaluates the "NO-ROUTE" as "NO-ROUTE this message to the
- system's nearest Host/Hub".
-
- DIRECT <LIST>
-
-
- ____________________
-
- //1// You only need to qualify the final destination - target - system
- for mail to be sent. I.e. if you route mail for system A and B via system
- C, you only need to qualify system C.
-
-
- 91
-
-
-
- Unconditionally send mail to the specified systems directly (you can
- still place it on hold by using the HOLD command). No implied logic
- is applied to this command, and if the Mailer cannot call the
- specified systems, the resulting mail packets are placed on hold
- automatically. Note that a system must still exist for this to apply.
- If a system that is included in a DIRECT <LIST> does not exist, the
- message will be stamped "Orphan" and not included in a mail packet,
- but it can still be picked up by the destination system.
-
- ROUTE-TO <TARGET> <LIST>
-
- Route mail (excluding file attach messages) for the specified systems
- via TARGET. This automatically implies "NO-ROUTE <TARGET>", i.e. the
- target system's mail will not be routed through another system, even
- if so previously stated.
-
- HOST-ROUTE <LIST>
-
- Route messages, not otherwise prevented from being routed, for the
- specified systems through their Host system.
-
- HUB-ROUTE <LIST>
-
- Route messages, not otherwise prevented from being routed, for the
- specified systems through their Hub system.
-
- ROUTE-FILES <TARGET> <LIST>
-
- Route file attach messages (and normal mail) for the specified
- systems through TARGET. This automatically implies "NO-ROUTE
- <TARGET>", i.e. the target system's mail will not be routed through
- another system, even if so previously stated.
-
- You should ask the SysOp of the TARGET system if he allows you to
- route files through his system before using this command.
-
- POLL <LIST>
-
- Force the Mailer to call the specified systems even if there is no
- other mail destined for them. This does not effect the routing of
- existing mail destined for the specified systems. The POLL command
- unconditionally qualifies a system for mailing. Each system in LIST
- will only be called once. If an event is restarted, the Mailer will
- not call systems that it has already polled.
-
- EXCEPT <LIST>
-
- Specifies an exception to the LIST of the previously used command.
-
- FORWARD-FOR <LIST>
-
- Tells the Mailer that you allow the specified systems to send mail
- (excluding file attach messages) through your system. Note that this
- does not place any restrictions of the destination of the forwarded
- mail.
-
- FORWARD-TO <LIST>
-
- 92
-
-
-
- Tells the Mailer that you allow mail (excluding file attach messages)
- to be forwarded through your system ONLY if it is destined to any of
- the specified systems. This is a more secure alternative to the
- FORWARD-FOR command.
-
-
- FILES-FOR <LIST>
-
- Identical to FORWARD-FOR, but for file attach messages.
-
- FILES-TO <LIST>
-
- Identical to FORWARD-TO, but for file attach messages.
-
- DENY <LIST>
-
- Allows you to prevent the specified systems from picking up waiting
- mail. The Mailer will still accept incoming mail from the specified
- systems. This can be used to prevent local (or other low-cost)
- systems from picking up their mail in national mail events, etc.
-
- SCRIPT <SCRIPT FILE> <LIST>
-
- Tells the Mailer to use the SCRIPT FILE when calling the specified
- systems instead of the telephone number (if any) in your nodelist
- database. The SCRIPT FILE parameter is a filename without a path and
- extension. Script files are explained in a separate section.
-
- NO-SCRIPT <LIST>
-
- Prevents the Mailer from using default script handling for the
- specified systems. Script files are explained in a separate section.
-
-
- 16.6 LIST specifications
-
- You can use a variety of formats to specify a list of systems for
- a routing command. A few follow:
-
- * All systems
-
- 2:* All systems in zone two
-
- 2:270/* All systems in zone two, net 270.
-
- 2:270/1 2:270/1 and all points under it.
-
- 2:270/1.0 2:270/1 but no points under it.
-
- 2:270/1.1 2:270/1.1.
-
- MYNET All systems in your own net. Note that the result of
- this format depends on which AKA FD is operating
- under. This is normally your primary AKA.
-
-
- 16.7 Using nodelist flags
-
- 93
-
-
-
- When you specify system LISTs to a routing command, you can use
- nodelist flags in place of address information //1//. Any
- combination of nodelist flags can be used. You can mix flags and
- address information as you wish. A few follow:
-
- %HST %CM All systems with HST or CM in their nodelist
- entry.
-
- %!HST All systems that do not have HST in their
- nodelist entry. The ! character negates the
- meaning of a flag.
-
- %!HST %!CM All systems that do not have HST _or_ CM in their
- nodelist entry.
-
- %!HST %CSP All systems that do not have HST in their
- nodelist entry and all systems that have CSP in
- their nodelist entry.
-
- 1:1/5 %HST %CM 1:1/5 and all other systems with HST or CM in
- their nodelist entry.
-
-
- 16.8 File routing/forwarding
-
- FILES-FOR and FILES-TO will mark all in-transit (not destined for
- your system) file attach messages as Del/Sent (see "Message Status
- Bits"). If you receive the same file destined for two different
- systems, the file will not be removed until it has been sent to (or
- picked up by) both systems.
-
-
- 16.9 Message forwarding
-
- When the Mailer unpacks received mail packets, it will always mark
- messages as in-transit if they are not destined for your system
- (including any AKAs). These messages can be forwarded by using
- FORWARD-FOR and FORWARD-TO, but the Mailer will under NO
- circumstances forward mail, that has not been entered or modified
- locally, automatically to systems unless one or both of these two
- commands are used.
-
-
- 16.10 Multiple zones
-
- If you are operating under more than one AKA listed in different
- zones, it is important to explicitly specify a zone for address
- information in the route file.
- ____________________
-
- //1// Some FidoNet nodelist entries contains something referred to as
- "user flags". They are listed last on the line of a nodelist entry. E.g.
- CM,XA,UREC,V32T. Any flags following the first flag prefixed by a 'U' are
- considered user flags. FrontDoor does not have built-in logics to handle
- this. To cover both possibilities of a user flag, you should specify
- U<flag> and <flag>, e.g. UREC REC.
-
-
- 94
-
-
-
-
- 16.11 Examples
-
- A few examples of route files and how to use route commands follows:
-
- schedule @ *
-
- This is the most simple of route files and qualifies all systems for
- mailing. It will force the Mailer to use its default routing rules
- for mail to all systems.
-
- schedule @ *
- route-to 2:512/1 2:*
- hold 2:512/1 %!CM %!HST
-
- This qualifies all systems for mailing, routes all mail destined for
- zone two through 2:512/1, and places the mail for 2:512/1 (including
- the routed mail) and any systems, that do not have the CM or HST
- flags in their nodelist entry, on hold.
-
- schedule @ MYNET
-
- This qualifies all systems in your own net and uses default routing.
-
- schedule @
- send-to 1:* 2:* 3:*
- route-to 2:512/1 2:*
- except 2:201/329
- 2:201/130
- route-to 3:632/348 3:*
- deny MYNET
-
- This qualifies all systems in zone one, two, and three. Routes all
- mail destined for zone two through 2:512/1 except for mail destined
- 2:201/329 and 2:201/130, routes all mail destined for zone three
- through 3:632/348, and prevents systems in your own net from picking
- up their mail.
-
- schedule B *
- hold *
- except 2:*
- no-route 2:*
-
- This qualifies all systems, holds all mail except mail destined for
- systems in zone two, and sends mail destined for zone two directly to
- its destination.
-
- hold *
-
- schedule D MYNET
- unhold MYNET
-
- schedule A 1:*
- unhold 1:*
-
- This holds all mail by default (the HOLD command is in the global
- section).
-
- 95
-
-
-
- Schedule D sends mail to all systems in your own net.
-
- Schedule A sends mail to all systems in zone one.
-
-
- 16.12 Dynamic packing
-
- Whenever a mail event is started, the Mailer scans the messages in
- the NetMail folder and possible packets are built. Messages that do
- not qualify to be processed will not be packed (but kept in the
- internal list). If a system calls in, the Mailer will scan the list
- stored in memory and create a mail packet "on the fly" and
- immediately send it to the calling system. So mail is always
- available, 24 hours/day.
-
- This means that your system does not have to be in a specific event
- for other systems to pickup their mail. Note that you can prevent
- systems from picking up their mail with the DENY command and by
- modifying an event's behavior.
-
-
- 16.13 Regarding points
-
- Points of other systems are always treated as their boss system
- unless you explicitly specify the boss or a point. To ONLY reference
- a boss system, without referencing its points, use .0 (e.g.
- 2:270/17.0).
-
- If you have the telephone number for another system's points, they
- will be treated just like any other node (i.e. you can send mail to
- them directly).
-
-
- 16.14 Order of evaluation
-
- The route file is evaluated (processed) from top to bottom. Because
- of this, it is wise to put the "global" (affecting all systems)
- first, followed by the exceptions. E.g.
-
- route-to 2:512/1 *
- no-route 2:270/17
-
- will result in all mail being routed via 2:512/1, except mail for
- 2:270/17, which is sent directly to 2:270/17.
-
- The only route command that cannot be overridden in this manner is
- the ROUTE-FILES command. It is therefore required that you use the
- EXCEPT keyword to override a ROUTE-FILES command where necessary.
- E.g.
-
- route-files 2:512/1 *
- except 2:270/17
-
- will result in all file attach messages being sent via 2:512/1,
- except file attach messages destined for 2:207/17, which are sent
- directly to 2:270/17. The only other way to override the effects of a
- ROUTE-FILES command is to use the DIRECT command.
-
- 96
-
-
-
-
- 16.15 TARGET vs. qualification
-
- Note that only actual <TARGET> systems, and systems which you have
- told the Mailer to send mail directly to, or systems not otherwise
- included in default routing, need to be qualified.
-
- route-to 2:512/1 *
- no-route 2:270/17
-
- schedule @ 2:512/1 2:270/17
-
- Even if you have mail for a non-qualified system (i.e. a system other
- than 2:512/1 and 2:270/17), it would be routed to 2:512/1, and
- qualified for sending (via 2:512/1), using the above scenario.
-
-
- 16.16 Restrictions
-
- A <TARGET> system cannot contain a point address.
-
- You can not route mail destined for your own system via another
- system.
-
-
- 16.17 Macros
-
- MYZONE All systems in your zone.
- MYNET All systems in your net.
- MYPOINTS All points under your system.
-
-
- 16.18 Supported nodelist flags
-
- All past, present, and future nodelist flags are supported
- //1//. There is, however, one case that is not dealt with
- automatically. The FidoNet nodelist contains several "user flags" of
- which only the first flag is preceded by a single 'U', e.g. UISDN,REC
- and UREC,ISDN. To specify such a flag in the route file requires that
- you specify the actual string since the Mailer requires an exact
- match. E.g. "%ISDN" would NOT match "UISDN". To be on the safe side,
- it is recommended that you specify user flags with and without the
- preceding 'U' - "%ISDN %UISDN". Note that the meaning of flags can be
- negated by placing a '!' character in front of them, e.g. %!HST.
-
-
-
-
-
-
-
-
- ____________________
-
- //1// All FrontDoor systems should have the "XA" flag in their nodelist
- entry.
-
-
- 97
-
-
-
- 17 EMSI and IEMSI
-
- EMSI (EMSC-001 and FSC-0056) or "Electronic Mail Standard Identification"
- is a handshake method developed by Joaquim Homrighausen and Chris Irwin
- (author of D'Bridge). It provides features and flexibility that other
- handshake methods, such as FTS-1 and FTS-6 (YooHoo), do not offer.
-
- The two major advantages of the EMSI handshake method is the ability to
- pickup mail for all your AKAs in one call, and unlimited expansion of the
- data (handshake packets) exchanged when a session is negotiated. I will
- not go into any technical details about EMSI here, I will, however,
- describe the handling of the multiple AKAs.
-
- The EMSI handshake is supported by many software packages, including
- FrontDoor, FrontDoor APX, TrapDoor, BinkleyTerm, and D'Bridge. EMSI does
- not interfere with other handshake protocols such as FTS-1 and FTS-6.
-
-
- 17.1 Passwords
-
- If you have established or wish to establish a session level password
- for a certain system, you must make sure that you have entered all
- AKAs of that system in the Security Manager. All entries must have
- the same password.
-
- For example, let us assume you want to establish a session level
- password with 1:135/142 which is also 26:1305/142. You should add
- both 1:135/142 and 26:1305/142 in the security manager and use the
- same password for both entries.
-
-
- 17.2 Mail
-
- Using the same example, if you have mail for both 1:135/142 and
- 26:1305/142, all mail (for both addresses) would be delivered during
- the same session. This is true for both inbound and outbound
- connections.
-
- If you know that a system is EMSI capable and you have regular mail
- traffic with more than one of its AKAs, you can HOLD mail for the
- system's other AKAs and only allow the Mailer (FD) to call one of the
- addresses. When the session is established, all of the remote
- system's AKAs are processed.
-
- This probably sounds more confusing than it really is. So to make a
- long story short, make sure you have the "Present all AKAs to remote"
- option enabled (Mailer>Miscellaneous) and play it by ear.
-
-
- 17.3 IEMSI
-
- IEMSI is similar to the EMSI handshake protocol, with the exception
- that it deals with the handshake between a terminal program (such as
- the one found in FrontDoor) and an on-line service, such as a BBS.
-
-
-
-
- 98
-
-
-
- 18 Script language
-
- The script language provides an alternative method of calling a system
- (instead of calling it directly with the telephone number listed in your
- nodelist). A script file is used where you have to, or prefer to, connect
- to another system indirectly. I.e. you will not be calling it by dialing
- its number directly. This could be through X.25 or PC Pursuit to name a
- few.
-
- The script file must be a plain vanilla ASCII file. Script files have the
- extension .SCR, and are located in the SYSTEM directory. A semicolon (;)
- may be used as a comment character, forcing the Mailer to ignore
- everything following the semicolon on the same line. The Mailer is not
- case sensitive when interpreting the script file.
-
- The route file (ROUTE.FD) can be used to specify that a script should be
- used for one or more nodes by entering:
-
- SCRIPT <SCRIPT FILE> <LIST>
-
- (see Mail routing). The command may be global or local to a specific
- event's schedule block. If you are using PC Pursuit, you can use a
- generic script file for all "PC Pursuitable" nodes. See PCP SCRIPTS.
-
-
- 18.1 What can I do with it?
-
- The script language consists of a number of commands that allows you
- to send characters to the modem, wait for responses from the modem or
- the remote system/network that you are using, and trigger different
- actions depending on the responses you get.
-
- The versatility of the script language is further enhanced by the use
- of so-called labels to execute different parts of the script
- depending on a specific situation. The script language can be seen as
- a simple programming language for controlling the way FD or the
- Terminal makes a call.
-
-
- 18.2 Commands
-
- SEND <STRING>
-
- Sends a series of characters to the modem or the remote system.
- Everything following the SEND command on the same line will be sent.
- Control characters may be entered using mnemonics, e.g. <CR>. In
- addition, the special characters supported for modem command-strings
- (as described above) v ^ ` | and ~ are supported. The string will be
- sent exactly as entered, with no case conversion.
-
- SENDNOXLAT <STRING>
-
- Identical to the SEND command with the exception that v ^ ` | and ~
- have no special meaning and are transmitted verbatim.
-
- DIAL <NUMBER>
-
-
- 99
-
-
-
- Sends NUMBER, preceded by the dial command specified in FDSETUP's
- modem section. Control characters may be entered in the same manner
- as with the SEND command.
-
- SETPORT <BAUD> <DATABITS> <STOPBITS> <PARITY>
-
- Sets the communications port to the specified parameters. BAUD can be
- any value supported by the hardware between 300 and 9600 baud. At no
- time will the baudrate be set to a higher value than the highest
- supported speed of the destination system, or the baud rate of the
- outbound node in a PC Pursuit script. DATABITS is 7 or 8. STOPBITS is
- 1 or 2. PARITY is NONE, ODD or EVEN. In addition, a value of -1 means
- that the previous setting for that parameter should be retained.
-
- PROVOKE <STRING>
-
- Keeps sending STRING with an interval of one second, until any
- character is received from the remote system, or until a timeout
- occurs (see TIMERSET); or until the script is interrupted by the
- user. Control characters may be entered in the same manner as with
- the SEND command.
-
- TIMERSET <SECONDS>
-
- Sets the timer for fatal timeouts while waiting to receive something
- from the remote system. The default is 120 seconds (two minutes). The
- maximum value is 300 seconds (five minutes), and the minimum is 0.
-
- DEBUG <ON|OFF>
-
- Sets debug mode on or off. In debug mode, all characters received
- while waiting for one or more strings will be displayed. When you are
- not using debug mode, only the string that matched a pattern will be
- displayed. Similarly, in debug mode all strings sent to the
- modem/remote system will be displayed, whereas the Mailer will only
- display "Sending string" when not using debug mode. It is recommended
- that you enable debug mode while developing and testing a script.
-
- WAIT <SECONDS>
-
- Makes the script wait for SECONDS seconds before continuing.
-
- WAITFOR <STRING>[|<STRING>|<STRING>..]
-
- Forces the script to wait for one or more specified strings or until
- a timeout occurs (see TIMERSET). Each string must be separated with a
- pipe (|) character. Control characters may be entered in the same
- manner as with the SEND command. Of the specified strings, only the
- first will signify success, the other strings will immediately
- terminate the script with failed status. The string comparison is
- case sensitive, and requires an exact match.
-
- CASE / ENDCASE
-
- Starts and ends a CASE statement, respectively. CASE is a more
- flexible variety of WAITFOR. Each line after CASE must start with a
-
-
- 100
-
-
-
- string //1// that the script should wait for, followed by a
- colon and one or more script commands, or a label jump directive (see
- LABELS). The CASE statement is ended with the command ENDCASE on a
- separate line.
-
- When a matching string has been received from the modem or the remote
- system, the command on the same line will be executed. If the command
- consists of a label jump instruction, the script will continue from
- the specified label position. If it is one or more script commands,
- they will be executed, and the script will continue from the line
- following the ENDCASE statement, unless the command terminates the
- script (see SESSION and FAIL).
-
- The string comparison is case sensitive, and requires an exact match.
- A short example follows.
-
- CASE ; Comments:
- CONNECT : session ; connect
- BUSY : >redial
- "NO CARRIER": >redial ; note the use of "
- VOICE : fail
- @NOCARRIER : fail ; carrier lost
- @DEFAULT : fail ; timeout
- ENDCASE
-
-
- @NOCARRIER
-
- Tests the presence of carrier in a CASE statement.
-
- @DEFAULT
-
- May be used to specify a default course of action if a timeout occurs
- in a CASE statement.
-
- SESSION
-
- Terminates the script with success status, leading to a mail session
- if the script was invoked from the Mailer. It is NOT necessary to
- have a SESSION command in script files used to connect to another
- system in the Terminal. The SESSION command is only used to establish
- mail sessions.
-
- FAIL
-
- Terminates the script with failed status. No mail session will be
- initiated.
-
- PURGEIN
-
- Purges the inbound buffer, getting rid of any pending characters.
-
- ____________________
-
- //1// If the string consists of more than one word, it must be specified
- between quote characters ("), e.g. "NO CARRIER".
-
-
- 101
-
-
-
- PURGEOUT
-
- Purges the outbound buffer, getting rid of any pending characters.
-
- RETRYCOUNT <RETRIES>
-
- Provides a means of incrementing and checking a predefined retry
- count variable. If the retry count exceeds RETRIES, the script is
- terminated with failed status, otherwise the count is incremented
- with 1. The retry count does not include the first attempt.
-
- CLEARCOUNT
-
- Clears the predefined retry count variable, resetting it to 0.
-
- MAX2400 <COMMANDS>
- MAX1200 <COMMANDS>
-
- Commands following on the same line will only be executed if the max
- baud rate for the session is 1200/2400. The maximum baud rate for a
- session is calculated as the maximum baud rate supported by the
- remote system, by the outbound node (if using PCP), or by your own
- modem, whichever is lowest.
-
- E.g. MAX2400 setport 2400 -1 -1 -1
- MAX1200 setport 1200 -1 -1 -1
-
- @OUTBOUND
-
- Used to insert the name of an outbound PC Pursuit node in a string.
- The contents of @OUTBOUND is undefined if used in any other script
- than PCP.SCR.
-
- E.g. send C @OUTBOUND,ABC12345<CR>
-
-
- @LOCALNUM
-
- Used to insert the local telephone number in a PC Pursuit script. The
- contents of @LOCALNUM is undefined if used in any other script than
- PCP.SCR.
-
- E.g. send ATDT@LOCALNUM<CR>
-
- <C> @SYSTEMNUM
-
- Used to insert the telephone number of the system being called as if
- the Mailer or Terminal (if dialing a system listed in the nodelist)
- would have dialed the number.
-
-
- ENDNODE
-
- Terminates a "node block". See NODE BLOCK.
-
- <C> UPLOAD <PROTOCOL> <FILESPEC>
-
-
- 102
-
-
-
- Transmits the files matching FILESPEC to the remote, using the
- PROTOCOL transfer protocol (X=Xmodem, T=Telink, S=SEAlink, Z=Zmodem).
- FILESPEC may include wild-cards characters for all protocols.
-
- E.g. upload Z C:\FILES\FD*.LZH
-
- <C> DOWNLOAD <PROTOCOL> <PATH>
-
- Receives one or more files from the remote, using the PROTOCOL
- transfer protocol (X=Xmodem, T=Telink, S=SEAlink, Z=Zmodem). PATH
- must be a complete filename for Xmodem transfers and a valid
- directory for Zmodem, SEAlink, and Telink transfers.
-
- E.g. download Z C:\INFILES\
- download X C:\INFILES\FUN.LZH
-
- <C> DISCONNECT
-
- Unconditionally terminates a call (if any) from within a script.
- Script execution will resume as soon as the carrier (CD) signal has
- been lost; the script function lowers DTR to disconnect.
-
- <C> IFBAD
- <line to execute>
-
- Executes the command(s) listed on <line to execute> (which is the
- line following "IFBAD") if an UPLOAD or DOWNLOAD command failed.
-
- <C> SENDBREAK
-
- Transmits a short BREAK signal to the modem.
-
- <C> LONGBREAK
-
- Transmits a long BREAK signal to the modem.
-
- <C> LINESPEED <BPS>
-
- Sets the baud rate the Mailer and Terminal use to determine transfer
- times, etc. to <BPS> BPS.
-
- <C> LOG <Symbol> <String>
-
- Adds <String> to the Mailer's log using the <Symbol> loglevel.
-
-
- 18.3 Labels
-
- A label is used to define a position in the script, so that it may be
- used as a jump destination. The label can consist of any word,
- starting with a letter from A to Z, except the above script commands,
- and must be preceded by a colon.
-
- At the position in the script where you want to execute a jump to the
- label, you enter the label name preceded by a greater than sign (>).
-
- E.g. ..
-
- 103
-
-
-
- ..
- :redial
- send ATDT@LOCALNUM<CR>
- CASE
- CONNECT : session
- BUSY : >redial
- @default : fail
- ENDCASE
-
-
- 18.4 Node block
-
- A node block is a special type of label. It starts with a node number
- preceded by a colon. All commands from the first line to the ENDNODE
- statement, that ends the node block, will only be executed if you are
- currently calling the specified node.
-
- E.g. ..
- ..
- :270/17 ; start of node block
- send ATZ<CR>
- ENDNODE ; end of node block
-
-
- 18.5 PC Pursuit
-
- You can use a generic script for calling all "PC Pursuitable" nodes,
- taking advantage of the specific PCP commands @OUTBOUND and
- @LOCALNUM. This requires that the script file is named PCP.SCR and is
- placed in the SYSTEM directory. You must also compile the nodelist
- with the file PCP.DAT, containing a list of all "PC Pursuitable"
- exchanges, present in the NODELIST directory.
-
- If you have followed these steps, the PCP script file will be used
- automatically when the Mailer detects that a node is "PC
- Pursuitable". You will probably want to prevent the Mailer from using
- the PCP script in the daytime on weekdays. A special route command,
- NO-SCRIPT, exists specifically for this purpose. For further
- information, see Mail routing.
-
-
- 18.6 How do I update PCP.DAT?
-
- The file PCP.DAT is a somewhat modified version of the file provided
- by Telenet's BBS. We take no responsibilities whatsoever regarding
- the contents of the PCP.DAT file supplied with FrontDoor. To update
- it, you must issue CONNECT PURSUIT from PCP's command prompt and
- log-on to their BBS. The file that you want to download is called
- EXCHANGE.TXT (or EXCHANGE.ARC). Should you update this file, you MUST
- ensure that your file follows the same format as the file supplied
- with FrontDoor.
-
-
- 18.7 MNEMONICS
-
-
-
-
- 104
-
-
-
- The following mnemonics may be used to enter control characters in
- the script, both for sending and receiving. They can be used with the
- following commands: SEND, DIAL, PROVOKE, WAITFOR, and CASE.
-
- ASCII MNEMONIC : ASCII MNEMONIC
- --------------------+----------------------
- 0 <NUL> : 17 <DC1>
- 1 <SOH> : 18 <DC2>
- 2 <STX> : 19 <DC3>
- 3 <ETX> : 20 <DC4>
- 4 <EOT> : 21 <NAK>
- 5 <ENQ> : 22 <SYN>
- 6 <ACK> : 23 <ETB>
- 7 <BEL> : 24 <CAN>
- 8 <BS> : 25 <EM>
- 9 <HT> : 26 <SUB>
- 10 <LF> : 27 <ESC>
- 11 <VT> : 28 <FS>
- 12 <FF> : 29 <GS>
- 13 <CR> : 30 <RS>
- 14 <SO> : 31 <US>
- 15 <SI> : 32 <SP>
- 16 <DLE> :
- --------------------+----------------------
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 105
-
-
-
- 19 FDSERVER <+>
-
- The Mailer has a function referred to as FDSERVER. It can be used to
- perform functions on your system from a remote site, such as moving and
- copying files, etc. FDSERVER is a very powerful function and the examples
- given in this chapter are only some of the things you can do with it.
-
- FDSERVER is activated by specifying a password in FDSETUP. FDSERVER
- requests will be ignored if no password has been specified in FDSETUP.
-
- FDSERVER requests are processed after a mail session has been completed
- and the call has been terminated, so everything you specify in the
- request message is processed off-line.
-
-
- 19.1 What is a FDSERVER request?
-
- A FDSERVER request is a message, addressed to FDSERVER (case does not
- matter) on your system, with commands. Think of it as a remote, but
- controlled, DOS shell. You can run almost any program and perform any
- DOS function from a FDSERVER request. The FDSERVER function has some
- limitations, however.
-
- o You cannot use the DOS command ECHO in a FDSERVER request.
-
- o Programs that require local keyboard input should not be
- executed from a FDSERVER request since these program(s) will
- just sit and wait for keyboard input.
-
- o FDSERVER request messages must NOT be compressed (ARCmail,
- etc.). The function is only triggered if the Mailer unpacks
- the request message.
-
- o Batch (.BAT) file labels are not supported.
-
-
- 19.2 Request message
-
- Each line of the message is considered a command and blank lines are
- ignored. When FDSERVER has executed all commands found in the
- message, it will change drive and directory to where it was before
- processing your request and return to the Mailer.
-
-
- 19.2.1 Internal commands
-
- Lines beginning with a % character are internal FDSERVER
- commands.
-
- %logall
-
- Will create one line in the log file for each command that
- was executed along with the status (err: or exe:).
-
- %nologer
-
-
-
- 106
-
-
-
- Normally, all commands that generated an errorlevel will be
- logged, this can be disabled with this command.
-
- %store
-
- After a request is processed, it will be deleted by default.
- This can be disabled by putting this command in the message
- which will force FDSERVER to mark the messages as received.
-
-
- 19.3 Using it
-
- You are sitting in front of your computer at home, working with a
- report or something similar and find that you need some files from
- the office machine.
-
- Assuming that these files contain information that is very sensitive
- or confidential, and even though you have the option to protect your
- file requests with a password, you may still not want to have the
- files semi-accessible. This is where you can use FDSERVER.
-
- The directories and file names used in this example were thought up
- and does not necessarily match the setup on your machine.
-
- Create a message addressed to FDSERVER on the node you want to call
- and send it.
-
- By: joaquim homrighausen, JoHo's Home (2:270/17.1)
- To: fdserver, Use your illusion (2:270/17)
- Re: password
- ----------------------------------------------------
- %nologerr
- cd \TEMP
- copy C:\LOTUS\THA*.SPS
-
- arj a THA THA*.SPS
- erase *.SPS
- copy THA.ARJ C:\REQUEST\FORNOW
- erase THA.ARJ
-
- The server function will read the message and execute each line. The
- next step would be to create a new server request containing the
- following:
-
- By: joaquim homrighausen, JoHo's Home (2:270/17.1)
- To: fdserver, Use your illusion (2:270/17)
- Re: password
- ----------------------------------------------------
- %nologerr
-
- erase C:\REQUEST\FORNOW\THA.ARJ
-
- And send it along with a File Request for THA.ARJ. The Mailer will
- process the File Request first, and when the mail session has been
- completed, the newly created server request will be processed by
- FDSERVER.
-
-
- 107
-
-
-
- 19.4 Keeping calls to a minimum
-
- You could avoid the extra phone call in the example with the request
- if you have a robot utility such as XRobot and create a file attach
- with the files you need so the Mailer will call you back.
-
-
- 19.5 Security
-
- If you do not need to use FDSERVER, Do not define a password for it
- in FDSETUP. Since FDSERVER is a VERY powerful function, the results
- could be disastrous if someone got hold of your FDSERVER password.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 108
-
-
-
- 20 Service requests
-
- Service requests is a very powerful function of FrontDoor. It allows you
- to use the Mailer as a front-end to databases, to make on-line inquiries
- etc. without having to manually call the system with a Terminal program.
-
-
- 20.1 Service requests vs FDSERVER
-
- The difference between a service request and a FDSERVER request is
- that they are processed while two systems are connected. This has the
- drawback of being slightly more expensive, but it offers a much
- greater flexibility than the FDSERVER function.
-
- Consider this. You have a program on your system that allows people
- to search for data in a database of files and then get a list of all
- the new files, you have named the service request WHATSNEW.
-
- Your system receives a file request for WHATSNEW and the Mailer
- invokes the program SEARCH.EXE, defined as the program to run for
- WHATSNEW. When SEARCH terminates, the Mailer will send the file
- NEWFILES.LST, created by SEARCH, to the remote system.
-
-
- 20.2 Setting up
-
- Service requests are defined in the ALIAS file (where you define
- alias file names for file requests). The format of a service request
- definition looks like this:
-
- <NAME> ><PROGRAM> <PARAMETERS> ^<+ or - path name>
-
- E.g.
-
- WHATSNEW >SEARCH.EXE findit =A =T ^-C:\SERVICE\RESULT\*.TXT
-
- Service name
-
- NAME (case does not matter) is what the remote system should request
- to invoke the service request.
-
- Program
-
- >PROGRAM is the program that should be invoked when the Mailer
- receives a request for NAME. The > character is required and tells FD
- it is a service request and not an alias definition. There should be
- no spaces between the > and PROGRAM.
-
- The extension of PROGRAM is important. The Mailer can execute batch
- (.BAT) files as a result of a service request, but it must do it
- through COMMAND.COM. So it has to know what type of file (program) it
- is that you are executing.
-
- Parameters
-
-
-
-
- 109
-
-
-
- You can pass any parameters to the program. The only restriction is
- (as with DOS) that they do not exceed a length of 128 characters and
- none of them starts with the ^ (see below) character.
-
- There are several macros that you can specify as parameters. These
- macros are described in detail in the FrontDoor Developer's Kit
- (FDDEV).
-
-
- 20.3 ^ - + ?
-
- The ^ character defines the beginning of a filemask that the Mailer
- should send after the service request has been completed. If no ^
- definition has been made, the Mailer will not send any files as the
- result of a service request.
-
- The plus (+) means that the Mailer should NOT remove the files once
- they have been transmitted.
-
- The minus (-) means that the Mailer SHOULD remove the files once they
- have been transmitted. This also means that the files will be removed
- even if they could not be sent (carrier lost, etc).
-
- The question mark (?) means that the Mailer should ONLY remove the
- files once they have been SUCCESSFULLY transmitted. This means that
- if a session fails after transmitting three files, only those three
- files will be removed and the remaining left intact.
-
- The path name is a file specification, it may include wildcard (? and
- *) characters. The Mailer will send all matching files.
-
-
- 20.4 Security
-
- Since service requests are built on the concept of File Requests,
- they are protected the same way a File Requests is protected. To
- setup a password, you have to use the Request Manager in FDSETUP and
- define a password for the service request name.
-
-
- 20.5 A word of wisdom
-
- Service Requests should be used with extreme caution. It is
- recommended that you have a full understanding of what a service
- request actually does before you attempt to use it.
-
- You should also keep in mind that the requesting system is waiting at
- the other end for the Mailer to start sending files. So keep it short
- and sweet.
-
-
-
-
-
-
-
-
-
- 110
-
-
-
- 21 Global command-line switches
-
- Support for these switches is included in all programs in FrontDoor,
- except where otherwise stated. All command-line parameters must be
- preceded by either a forward slash (/) or a dash (-). Command-line
- parameters are case insensitive (case does not matter) except where
- otherwise stated. FD is the Mailer, FM is the Editor, and FDNC is the
- Nodelist Compiler.
-
- AUTOVIDEO FM/FD <C>
-
- Overrides the current video mode setting for the Editor and Mailer
- respectively.
-
- C FDSETUP
-
- Forces color mode
-
- EMSIDEBUG FD
-
- Enables extensive debug information when the Mailer negotiates a mail
- session using the EMSI protocol.
-
- FOLDER FM <C>
-
- Forces the Folder list to be displayed as soon as the Editor is invoked.
- This is identical to pressing <Alt-F> from the Editor's main menu.
-
- FOLDERSCAN FM <C>
-
- Similar to FOLDER (above) but emulates the behavior of <Ctrl-F>.
-
- FORCECOMMIT FD <C>
-
- Forces the Mailer to flush the DOS disk buffers every time it writes data
- to disk while receiving a file. The use for this is to increase the
- integrity of received data, in case of a power failure. You can use it
- independent of the NOCOMMIT parameter, because the two are not related.
-
- FORCEDPMI All
-
- Disables FrontDoor's autodetection of type of multitasker, and force
- time-slicing according to the DPMI-specification. OS/2 and Windows
- support DPMI.
-
- FORCEINT28 All
-
- Force FrontDoor to issue INT 28H calls when it is idle. This is useful in
- such multi-tasking environments which support this method for
- applications to give up time slices (most notably older TSR programs
- written to run in the background).
-
- INTL FM
-
- Forces the Editor to always insert the ^aINTL kludge line in newly
- created NetMail messages. The Editor will, by default, only insert INTL
- information if the destination system of the message is located in a
-
- 111
-
-
-
- different zone than that of the originating address (your) used to create
- the message, or when a different originating address than your primary
- AKA is used.
-
- L:<pwd> FD
-
- Locks the keyboard with the specified password directly from DOS. This
- has the same effect as using the Lock, <Alt-L>, function from the
- Mailer's main menu.
-
- LOGINTRO FD
-
- Enables more detailed information to be logged during the initial phase
- of a mail session negotiation.
-
- M FDSETUP
-
- Forces monochrome mode
-
- M FD
-
- Forces the Mailer into Mail mode directly from DOS. This switch was added
- to allow you to override the Terminal-only setting in FDSETUP.
-
- MSGSURVEY FM <C>
-
- Forces the Message Survey function to be selected as soon as the Editor
- is invoked. This is identical to pressing <Alt-F9> from the Editor's main
- menu.
-
- NOCANSES FD <C>
-
- Forces the Mailer to ignore the FDCANSES.n semaphore.
-
- NOCOMMIT All
-
- Disables use of DOS 3.3 commit() call.
-
- NODASH FD
-
- Forces the Mailer and Terminal to strip dash (-) characters from
- telephone numbers before sending them to the modem. This does not affect
- how telephone numbers are displayed on screen or logged to disk.
-
- NODUPBCK FDSETUP
-
- Disables the duplicate Hudson Message Base board check that FDSETUP
- normally performs when you edit and add Folders in the Folder manager.
-
- NOEKBD All
-
- Prevents FrontDoor from using extended (AT-style) keyboard BIOS calls.
-
- NOEMS All
-
- Disables use of LIM/EMS memory for overlay file buffers. This switch does
- not affect whether or not EMS/XMS memory is used when (if) swapping.
-
- 112
-
-
-
- NOEMSI FD
-
- Disables support for the FSC-0056 (EMSI) session protocol. This means
- that the Mailer will only support FTS-1 and FTS-6 sessions, unless
- otherwise restricted.
-
- NOFCB FD
-
- Disables the use of the File Control Block (FCB) delete function when the
- Mailer needs to remove files in the Packet directory. Its intended use is
- for dealing with special incompatibilities, such as with the "DELDIR"
- setting of OS/2 2.0 and OS/2 2.1. It is likely to impose a decrease in
- speed when the Mailer is processing mail packets.
-
- NOFTS1 FD //1//
-
- Disables support for the FTS-1 session protocol, effectively making the
- Mailer non-FidoNet compliant. This means that the Mailer will only
- support FTS-6 and EMSI sessions, unless otherwise restricted.
-
- NOICA FM/FD
-
- Prevents the Editor and the Mailer from using the ICA (intra-application
- communications BIOS area). Some combinations of hardware and software
- (notably in some Gateway brand of PCs with specific BIOS revisions) have
- problems with the support of ICA-enabled applications.
-
- NOISCR FM
-
- Forces the Editor to treat a SoftCR (ASCII 141) character as any other
- printable character. The default for the Editor is to strip these when
- reading and writing message from/to disk.
-
- NOLOCK FM
-
- Disables Hudson Message Base locking support in the Editor. Do not use
- this unless absolutely necessary.
-
- NOMDM FD
-
- Forces the Mailer to ignore information listed in MODEM.FD.
-
- NOMULD All
-
- Prevents FrontDoor from attempting to detect a multi-tasking environment,
- such as DESQview and PC-MOS/386.
-
- NORAWEXTD FD
-
-
-
- ____________________
-
- //1// Public (listed as non-PVT in the FidoNet nodelist) FidoNet systems
- should use this option with CAUTION since by using it, you may be in
- violation FidoNet policy.
-
-
- 113
-
-
-
- Forces the Terminal to send the normal (white) cursor key sequences when
- the gray cursor keys are used in raw mode. This may be required by some
- "doorway" programs that do not support extended keyboard codes.
-
- NORES All
-
- Disables use of internal DOS pathname resolution calls. This is required
- under PC-MOS/386 and some LAN environments.
-
- NORESYNC FD
-
- Disables support for the RESYNC extension to the SEAlink protocol.
-
- NOSHADOW All
-
- Disables window shadows.
-
- NOSLO FD
-
- Disables support for the Overdrive protocol option (SLO) in SEAlink. SLO
- is by default only active during "error free" connections (/ARQ, /MNP,
- /LAPM, etc.) and for link speeds above 2400 BPS.
-
- NOUNPACK FD
-
- Forces the Mailer to ignore received mail packets (files with .PKT
- extension). This assumes that you have an external utility to unpack
- NetMail packets. Do not use this unless you absolutely need it.
-
- NOYOOHOO FD
-
- Disables support for the FTS-6 (YooHoo) session protocol. This means that
- the Mailer will only support FTS-1 and EMSI sessions, unless otherwise
- restricted.
-
- NOZAP FD
-
- Disables support for the Zmodem protocol during mail sessions negotiated
- using the FTS-6 (YooHoo) session protocol. This effectively means that
- the Mailer will only establish FTS-6 sessions using the DietIFNA protocol
- option. This does not affect sessions negotiated using EMSI.
-
- ONLINE FD <C>
-
- Forces the Terminal to not initialize the modem when it is started.
-
- RDEBUG FD
-
- Enables debug output from the mail routing handler in the Mailer. This is
- quite useful when debugging your ROUTE.FD file.
-
- S FD
-
- Forces the Mailer to ignore any forced events it may have missed. The
- Mailer will by default execute all pending external events when it is
- brought up. This switch is useful if you have performed system
-
-
- 114
-
-
-
- maintenance for several hours and do not want overdue forced events to be
- executed.
-
- SESSONDCD FD <C>
-
- Forces the Mailer to immediately attempt to initiate a mail session when
- the DCD (carrier) signal goes high.
-
- TERM FD
-
- Forces the Mailer into Terminal mode directly from DOS. Once you exit the
- Terminal, you will be returned to DOS.
-
- X<1..255> FD <C>
-
- Forces the Mailer to terminate with the specified errorlevel as soon as
- there is no more outbound calls to make.
-
-
- 21.1 A word of wisdom
-
- Please be aware that some of the previously described command-line
- switches completely alter the way FrontDoor acts and may make it
- incompatible with other software and/or some environments.
-
- Use the switches with caution and when in doubt, try to test the
- effects of the switch in a local environment or between your own and
- a friend's system before you leave the Mailer to answer your
- telephone unattended.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 115
-
-
-
- 22 Environment variables
-
- Several environment variables affect how FrontDoor operates. It is
- assumed that you are familiar with what an environment variable is and
- how to set/remove one.
-
-
- 22.1 FDOPT
-
- All of the "Global command-line switches" except /C and /M can also
- be specified by including them in the FDOPT environment variable. To
- include more than one option, separate them by a comma, e.g.
-
- SET FDOPT=NOISCR,NOSHADOW
-
-
- 22.2 FDSWAP
-
- Overrides the "Swapping" path, defined under Global > Filenames in
- FDSETUP, e.g.
-
- SET FDSWAP=D:\TEMPDIR\
-
-
- 22.3 POINTNET
-
- See "Nodelist and the Nodelist Compiler".
-
-
- <C> 22.4 FMOVR and FDOVR
-
- Allows you to specify a complete path where the Editor and the Mailer
- should look for their overlay (.OVR) files. Useful when multiple
- copies of either program are being used (e.g. multi-line
- environment).
-
-
- 22.5 TZUTC
-
- Allows you to specify your geographical time zone's offset to UTC
- (GMT) time. E.g.
-
- SET TZUTC=[-|+]hhmm
-
- The plus-sign (+) is optional, meaning that the use of SET TZUTC=0100
- and SET TZUTC=+0100 would both indicate that your time zone is Paris
- (Central European Time), which is one hour east of GMT (Greenwich
- Mean Time). The Editor will insert the TZUTC kludge if the
- environment variable is present. The Mailer will present the TZUTC-
- setting during EMSI handshakes, <C> and as a kludge when creating
- return receipts.
-
- If you periodically change your system clock according to
- "summer/winter time", you will need to adjust the setting of TZUTC as
- well. Here follows a list of some of the world's time zones:
- Zone Offset Name
- ------------------------------------------------
-
- 116
-
-
-
- AHST -1000 Alaska-Hawaii Standard Time
- HDT -0900 Hawaii Daylight Time
- PST -0800 Pacific Standard Time
- PDT -0700 Pacific Daylight Time
- MST -0700 Mountain Standard Time
- MDT -0600 Mountain Daylight Time
- CST -0600 Central Standard Time
- CDT -0500 Central Daylight Time
- EST -0500 Eastern Standard Time
- EDT -0400 Eastern Daylight Time
- WAT -0100 West Africa Time
- GMT +0000 Greenwich Mean Time
- UTC +0000 Universal Time
- CET +0100 Central Europe Time
- BST +0100 British Summer Time
- CEST +0200 Central Europe Summer Time
- EET +0200 Eastern European Time
- WAST +0700 West Australian Time
- WADT +0800 West Australian Daylight Time
- CCT +0800 China Coast Time
- JST +0900 Japan Standard Time
- CAST +0930 Central Australian Standard Time
- EAST +1000 East Australian Standard Time
- CADT +1030 Central Australian Daylight Time
- EADT +1100 East Australian Daylight Time
- NZST +1200 New Zealand Standard Time
- NZDT +1300 New Zealand Daylight Time
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 117
-
-
-
- 23 Semaphore files
-
- FrontDoor can be controlled by using so called semaphore files. Both the
- Mailer and the Editor periodically scan for certain file names in the
- SYSTEM directory, and if found, performs a task such as rescanning the
- contents of the NetMail folder, exits to DOS, prevents human callers, and
- more.
-
- <C> The commercial version furthermore allows you to specify a separate
- semaphore directory (see FDSETUP > Global > Filenames) to allow several
- copies of the Editor and the Mailer to use the same semaphore files.
-
- The Mailer uses the lower right hand corner of its main screen to
- indicate that some semaphore files are present. FD is the Mailer and FM
- is the Editor.
-
- FMRESCAN.NOW FM
-
- Forces the Editor to rebuild its internal list of messages in the NetMail
- folder.
-
- FMFREEZE.n FM <C>
-
- Used to freeze task(s) running the Editor. The Editor will search for
- this semaphore once a minute, when updating the on-screen clock. When
- found, the keyboard is frozen, the databases for nodelist and messages
- are closed, and the Editor will check every twenty seconds to see if the
- semaphore has disappeared. FMFREEZE.ALL has a similar function but
- affects all currently active Editors rather than just the specified task.
-
- FMNEW???.n FM <C>
-
- Created by the the Editor to indicate that new messages (including
- replies) have been entered as NetMail, conference mail, and local mail
- respectively. The classification of messages is defined by the settings
- under Manager > Folders in FDSetup, of the corresponding folder(s) where
- one or more new messages have been saved. You can control support of
- these semaphores in FDSetup, under the Editor > Miscellaneous menu.
- Messages saved with the Lock attribute are not considered as new. The
- actual names are FMNEWCNF.n, FMNEWNET.n, and FMNEWLOC.n respectively.
-
- FDRESCAN.NOW FD
-
- Forces the Mailer to discard all mail packets from the packet directory
- and rescan the contents of the NetMail folder before rebuilding the
- packets.
-
- FDINSESS.nnn FD/FM <C>
-
- The Mailer creates this file whenever a mail session is initiated, and
- when it is dialing a system, attempting to establish a mail session. If
- the Editor detects this file, it will not let you renumber the NetMail
- folder. "nnn" is the task number (0-255).
-
- FDINEXIT.nnn FD
-
-
-
- 118
-
-
-
- The Mailer creates this file whenever a human caller is detected and
- passed onto a BBS or other interactive service. When the Mailer is
- restarted, it compares the timestamp of FDINEXIT.nnn with the timestamp
- of FDRESCAN.NOW, and if they do not match, a complete rescan (see above)
- is performed. "nnn" is the task number (0-255). In the shareware version,
- this file is not task aware, and is always called "FDINEXIT.NOW".
-
- FDFREEZE.n FD <C>
-
- Used to freeze task(s) running the Mailer. The Mailer will search for
- this semaphore once a minute. When found, the keyboard is frozen, the
- nodelist database and the log file is closed, and the Mailer will check
- every twenty seconds to see if the semaphore has disappeared.
- FDFREEZE.ALL has a similar function but affects all currently active
- Mailers rather than just the specified task.
-
- FDNOUSER.NOW FD
-
- Forces the Mailer to refuse human callers. This has the same effect as
- setting the "Human callers" option, under FD's "Your profile" menu, to
- "NO". The visual indicator for this semaphore file is "NU".
-
- FDNOSCAN.NOW FD
-
- Forces the Mailer to ignore FDRESCAN.NOW.
-
- FDNOEXIT.NOW FD
-
- Prevents the Mailer from exiting because of received mail. This has the
- same effect as setting the "Exit on mail" option, under the "Your
- profile" menu, to "NO". The visual indicator for this semaphore file is
- "NE".
-
- NODIAL.FD FD
-
- While this is not a semaphore file per se, it triggers the display of a
- visual indicator, "UD".
-
- FDXIT.nnn FD
-
- Forces the Mailer to unconditionally exit with the errorlevel "nnn".
- Before it exits, the Mailer removes the file.
-
- FDRENUM.nnn FD/FM <C>
-
- The Editor creates this file whenever you press <Alt-B> to renumber the
- NetMail folder. When the Mailer detects this file, it will not place any
- outgoing calls until it can no longer be found. This prevents the Mailer
- from initiating an outbound session while the Editor is renumbering the
- contents of the NetMail folder. "nnn" is the task number (0-255).
-
- ROUTE.FD FD
-
- While this is not a semaphore file per se, it is used to determine if the
- NetMail folder has to be rescanned (see above). If the timestamp of this
- file has changed since the Mailer last checked it, a rescan is forced.
-
-
- 119
-
-
-
- FDALIVE.n FD <C>
-
- Used by the Mailer to indicate that it is still "alive". The timestamp is
- updated every few minutes even when the Mailer has been frozen with the
- FDFREEZE semaphore, or when the Terminal is active. It provides a simple
- method to monitor whether or not the Mailer is operating as it should.
- When the Mailer terminates, or a DOS shell is invoked, the semaphore is
- removed.
-
- FDSCAN.n FD <C>
-
- Used to indicate that the Mailer is processing the (primary) NetMail
- folder. While this semaphore is present, certain functions in the primary
- NetMail folder (such as renumber and change of destination) are disabled
- in any task running the Editor.
-
- FDINTERM.n FD
-
- Created and present for the duration when the Terminal is running. In the
- shareware version, this file is named FDINTERM.NOW.
-
- FDCANSES.n FD <C>
-
- Used to force the Mailer to terminate the currently active session. The
- semaphore is checked for between files being sent/received. If the Mailer
- finds the file, it removes the file and terminates the session. The
- Mailer can be told to ignore this file by using the NOCANSES option as
- described above.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 120
-
-
-
- 24 Batch files
-
- The Mailer will, in most cases, be run from a DOS batch (.BAT) file. When
- it terminates, it will return certain errorlevels that you can "trap" for
- in your batch file.
-
-
- 24.1 Errorlevels
-
- 1 Internal error
- 2 External error - missing files, paths, etc.
- 3 Insufficient available disk space (less than 32 KB)
- 4 (reserved)
- 5 Unable to initialize modem
- 6 Incorrect FOSSIL version
- 7 FOSSIL not loaded or detected
- 8 FrontDoor already loaded, issue EXIT to return
- 9 (reserved)
- 10 User break
- 11-30 (reserved)
- 31-255 User definable errorlevels
-
- If you invoke the Terminal from DOS by running FD /TERM, it will
- always terminate with an errorlevel of 10 (User break), the same
- applies when you have specified "Terminal-only" in FDSETUP.
-
-
- 24.2 Categories
-
- The various errorlevels can be organized into four basic categories:
-
- Mail received
-
- When mail is received, you can choose to exit to the batch file
- to run external mail processing utilities, such as TosScan, etc.
-
- User break/errors
-
- When you press <Alt-Q> from the Mailer's main menu or when errors
- occur.
-
- BBS calls
-
- If you are running a BBS under the Mailer, it must exit with an
- errorlevel indicating the baud rate of the call. The line is
- still active when the Mailer exits to the batch file, the BBS
- software is loaded, and the caller will be able to access the
- BBS.
-
- External events
-
- The errorlevels defined in FDSETUP's event manager.
-
-
- 24.3 Loading BBS software
-
-
-
- 121
-
-
-
- There are two methods that can be used to invoke BBS software when
- the Mailer detects an interactive call. The first uses different
- batch file labels for the various baud rates and the second one uses
- the same label for the various baud rates. The second method relies
- on the "Create .BAT file" option in FDSETUP (under Mailer >
- Errorlevels).
-
-
- 24.4 Different labels
-
- @echo off
- rem --- We end up here after every BBS call
- :loop
-
- C:
- CD \FD
- FD
-
- rem --- Check errorlevels returned by the Mailer
-
- if errorlevel 200 goto b9600
- if errorlevel 199 goto b2400
- if errorlevel 198 goto b1200
- if errorlevel 197 goto b300
- if errorlevel 100 goto mailIN
- if errorlevel 10 goto userBRK
- if errorlevel 1 goto FDerror
-
- :mailIN
-
- rem --- Process possible echomail, etc.
-
- tosscan toss
- tsutil link -m
- goto loop
-
- :b9600
-
- Load BBS software for incoming call at 9600 bps
- goto loop
-
- :b2400
-
- Load BBS software for incoming call at 2400 bps
- goto loop
-
- ..
- ..
-
- :userBRK
- cls
- @echo User break.
- goto done
-
- :FDerror
- @echo Mailer returned an error (1-9)
-
-
- 122
-
-
-
- :done
-
- While this option works just fine for an environment where it is not
- critical that the BBS software knows about upcoming events etc. it is
- somewhat limited.
-
-
- 24.5 Same label
-
- @echo off
- rem --- We end up here after every BBS call
- :loop
-
- C:
- CD \FD
- FD
-
- rem --- Check errorlevels returned by the Mailer
-
- if errorlevel 200 goto bbsCALL
- if errorlevel 199 goto bbsCALL
- if errorlevel 198 goto bbsCALL
- if errorlevel 197 goto bbsCALL
- if errorlevel 100 goto mailIN
- if errorlevel 10 goto userBRK
- if errorlevel 1 goto FDerror
-
- :mailIN
-
- rem --- Process possible echomail, etc.
-
- tosscan toss
- tsutil link -m
- goto loop
-
- :bbsCALL
- rem --- Load DOBBS.BAT, created by the Mailer if
- rem the "Create .BAT file" option is enabled.
- dobbs
-
- :userBRK
- cls
- @echo User break.
- goto done
-
- :FDerror
- @echo Mailer returned an error (1-9)
-
- :done
-
-
- 24.6 DOBBS.BAT
-
- This is the batch file created by the Mailer when you have the
- "Create .BAT file" option enabled. It contains the speed at which the
- call came in, the COM port, number of minutes left until the next
- event and possibly a string indicating ARQ, MNP etc.
-
- 123
-
-
-
- <+> Additionally, the registered version can include data following the
- ring signal (DFRS), i.e. CALLER*ID information.
-
- For a call coming in at 16800 BPS with ARQ, with 30 minutes left
- until the next non-user event, on COM port 1, and with no DFRS the
- DOBBS.BAT file would contain:
-
- exebbs 16800 1 30 0 /ARQ N/A
-
- For a call coming in at 2400 BPS, with two hours left until the next
- non-user event, on COM port 1, the DOBBS.BAT file would contain:
-
- exebbs 2400 1 120 0 /NONE N/A
-
- The parameter between the remaining time and possible extended modem
- result code information (e.g. /ARQ, /MNP, etc.) is the task number
- and is always zero for the shareware version. If the modem did not
- send any extended result code information (other than a "CONNECT
- nnnn"), the Mailer will insert /NONE.
-
-
- 24.7 EXEBBS.BAT
-
- This is the file you have to create. It should handle everything
- required for the BBS software you are running, including exporting
- mail after users have logged off, etc. The last statement of your
- EXEBBS.BAT file should be the name of the big (main) batch file. Here
- is a sample of an EXEBBS.BAT file:
-
- coolBBS -b%1%5 -p%2 -t%3
- if errorlevel 200 goto newmail
- if errorlevel 40 goto fatal
-
- run
-
- :newmail
- cls
- @echo User entered echomail, let's send it!
- tosscan scan
- run
-
- :fatal
- cls
- @echo A fatal error has occurred in coolBBS
-
- Since DOBBS.BAT calls EXEBBS.BAT with various information, it can
- be used to pass parameters to the BBS software. The result of the
- above EXEBBS.BAT file would expand to:
-
- coolBBS -b9600/ARQ -p1 -t120
-
- If a BBS call came in at 9600, the COM port is one, the number of
- minutes till the next non-user event is 120 and the optional (%5)
- string contained /ARQ.
-
- The text RUN, refers to the original (main) batch file, in which
- we bring the Mailer back up again. When the BBS software (coolBBS
-
- 124
-
-
-
- in the above examples) terminates, EXEBBS.BAT will trap two
- errorlevels and then invoke RUN(.BAT) again.
-
-
- 24.8 Flow (batch files)
-
- Complicated? Here is the actual file flow between RUN, DOBBS and
- EXEBBS:
-
- +-> RUN.BAT Loads the Mailer and performs all EchoMail
- : : and error handling. When an interactive (BBS)
- : : call is detected, it loads DOBBS.BAT,
- ^ V created by the Mailer.
- ^ :
- : :
- : DOBBS.BAT Created by the Mailer. DOBBS calls EXEBBS.BAT
- : : file with the parameters relevant for the
- : : incoming call.
- ^ V
- ^ :
- : :
- : EXEBBS.BAT Called by DOBBS.BAT with the above described
- : : parameters. Loads the BBS software, processes
- ^ : newly created mail (if any), and finally
- ^ V returns to RUN.BAT.
- : :
- +--<--+
-
-
- 24.9 EXEFAX.BAT
-
- As described above, DOBBS.BAT (created by the Mailer) normally
- contains a reference to EXEBBS.BAT (maintained by the operator). The
- Mailer can, however, place a reference to EXEFAX.BAT instead of
- EXEBBS.BAT in DOBBS.BAT. If a "CONNECT FAX" message is returned from
- the modem, and you have defined an errorlevel for this message, the
- Mailer will exit as with interactive calls. But instead of referring
- to EXEBBS, DOBBS.BAT will contain EXEFAX. The parameters also vary
- slightly from those given to EXEBBS:
-
- exefax nnnnn 1 0 0 /NONE N/A
-
- From left to right is the baud rate (since there is no indication of
- the speed in "CONNECT FAX", this depends on your configuration), the
- COM port (1), the physical port (0), the TASK number <C> or zero (0)
- for the shareware version, data following CONNECT FAX to the first
- <CR>, and the DFRS info.
-
-
-
-
-
-
-
-
-
-
-
- 125
-
-
-
-
- 25 Multi-tasking
-
- FrontDoor can be used together with most multi-tasking programs. It has
- been tested with DESQview, PC-MOS/386, OS/2 1.3, 2.0, and 2.1 DOS Box,
- DoubleDOS, Multilink, Windows, Windows NT, and Taskview. It will
- automatically detect most multi-tasking software.
-
-
- 25.1 NS16550
-
- If you are running FrontDoor under a multi-tasker or in a LAN
- environment, I suggest you replace your 8250 or 16450 UART chip with
- a NS16550AN or NS16550AFN. These are available from several
- electronics outfits for somewhere between USD $17 and USD $23.
-
- The 16550 family of UARTs have internal buffering (FIFO) and will
- improve performance in multi-tasking and LAN environments. Both BNU
- and X00 has direct support for the 16550 UART family and can be used
- without modifying your command-line parameters when loading them.
-
-
- 25.2 DESQview
-
- FrontDoor will request a virtual screen buffer from DV and write to
- it. The result is very fast and very well behaved screen writes.
- Here's a sample DESQview configuration //1//:
-
- Keys to Use on Open Menu FD
- Memory Size (in K) 270
-
- Options:
-
- Writes text directly to screen N
- Displays graphics information N
- Virtualize text/graphics (Y,N,T) N
- Uses serial ports (Y,N,1,2) 2
- Requires floppy diskette N
-
- Advanced Options:
-
- System Memory (in K) 0
- Maximum Program Memory Size (in K) <empty>
- Script Buffer Size 0
- Maximum Expanded Memory Size (in K) 0
-
- Text Pages 1
- Graphics Pages 0
- Initial Mode <empty>
- ____________________
-
- //1// All FrontDoor programs, except FDSETUP, will by default utilize
- LIM/EMS memory unless told otherwise, i.e. by using the NOEMS command-
- line parameter or FDOPT setting. Under DESQview, you can also prevent use
- of LIM/EMS memory by telling DESQview that it should not make it
- available to the software.
-
-
- 126
-
-
-
- Interrupts 00 to FF
-
- Maximum Height 25
- Starting Height 25
- Starting Row 1
- Maximum Width 80
- Starting Width 80
- Starting Column 1
- Close on exit (Y,N,blank) N
- Uses its own colors Y
- Allow Close Window command Y
- Runs in background (Y,N,blank) Y
- Uses math coprocessor N
- Keyboard conflict (0-4) 0
- Share CPU when foreground Y
- Share EGA when foreground/zoomed Y
- Can be swapped out (Y,N,blank) N
- Protection level (0-3) 0
-
-
- 25.3 DoubleDOS
-
- Smart multi-tasking software allocates a virtual screen buffer for
- each task. Applications can then ask the multi-tasking software where
- it should write and the multi-tasker handles the screen updates.
- DoubleDOS 5.0 uses a different method.
-
- Every time you switch tasks from the keyboard, the screen-buffers
- change. So there is no easy way for the software running under
- DoubleDOS to detect this. In DoubleDOS 5.00, there are two options
- that allows you to run FrontDoor under DoubleDOS just fine. You MUST
- run FrontDoor in the TOP section for the two methods below to work.
-
-
- 25.3.1 DISPLAY=TEXT
-
- If your system has a MCGA, CGA, EGA or VGA card installed, there
- is extra memory available on those cards for graphics, etc.
- DoubleDOS can use some of that memory for each of its screen
- buffers. To enable this, add DISPLAY=TEXT to your DDCONFIG.SYS
- file.
-
-
- 25.3.2 REFRESH
-
- If you have a text-only adapter (MDA) there is most likely no
- extra memory available on the card. Add REFRESH by itself on a
- line to your DDCONFIG.SYS file. This will tell DoubleDOS to
- repaint the screen if the other task is bleeding through.
-
-
- 25.3.3 X00 and DoubleDOS
-
- When using FrontDoor, X00.SYS, and DoubleDOS, do not assign the
- COM ports in DDCONFIG.SYS. If you have problems with your clock,
- try the DEFER option in X00.
-
-
- 127
-
-
-
- Make sure you replace ANSI.SYS with DBLDANSI.SYS.
-
- The BOTTOM partition should initialize before the TOP partition. In
- other words, if you are loading FrontDoor in the BOTTOM partition,
- try to delay the initialization of the TOP partition.
-
-
- 25.4 Multilink
-
- I would personally not recommend anyone using FrontDoor with
- Multilink. I have never successfully executed any program under
- Multilink for longer periods of time than momentarily.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 128
-
-
-
- 26 Converting from other mail systems
-
- If you were using SEAdog, Dutchie, or D'Bridge before you started using
- FrontDoor, you should have little trouble converting to FrontDoor. The
- routing and message handling used by these two mail systems is very
- similar to the way things are done with FrontDoor.
-
- If you are converting from BinkleyTerm or Opus, however, there are a few
- things you should know and make sure you have done before you install
- FrontDoor.
-
- The main difference between FrontDoor and BinkleyTerm or Opus is that
- FrontDoor does not use oMMM, i.e. a static message packer. I see the oMMM
- approach as a black hole from which there is no return. This is not true
- in some cases and there are advantages of using oMMM type packers instead
- of the method used by FrontDoor.
-
- oMMM will create static bundles, where each system has a control file
- that tells the Mailer what files and messages to send to what systems.
- FrontDoor will NOT recognize oMMM type bundles (packets) so before you
- fully convert to FrontDoor, you must make sure that all the oMMM type
- mail is sent before you convert to FrontDoor.
-
- You can use FrontDoor to send the remaining oMMM type mail by attaching
- the files manually with FrontDoor's Editor or a robot utility such as
- XRobot, but you will need a utility with which you can determine which
- file belongs to which system before you can do this. So it might be
- easier for you to tell BinkleyTerm or Opus to send its remaining mail
- before you do the conversion.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 129
-
-
-
- 27 Help systems
-
- For a list of help systems that can help you with problems that you
- encounter with the shareware versions, please refer to the file
- FDHELPnn.TXT that is distributed in the FidoNet SDSFRONT file conference.
- If all else fails, contact either Bruce Bodger on 1:170/400@fidonet, or
- Mats Wallin on 2:201/329@fidonet. The official FidoNet support conference
- for the shareware version is FDECHO.
-
- Please note that the FidoNet help systems are not responsible for giving
- support to users of the commercial version of FrontDoor. Likewise,
- commercial suppliers of FrontDoor are not responsible for giving support
- to users of the shareware version of FrontDoor.
-
- If you have purchased the software with the SysOp discount, you may,
- however, post your questions in FDECHO. For shareware registration
- information, please refer to the REGINFO.DOC file enclosed in the
- distribution archive.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 130
-
-
-
- 28 Sample (PCP) script
-
- ; PCP script for FrontDoor version 2.11
- ; Eric Larson, 1:2605/620.0, 8/11/91
- ; Modified from script supplied in FD 1.99 documentation
- ;
- ; Joaquim Homrighausen makes no claims of the accuracy, nor
- ; does he take any responsibility for the information provided
- ; in this file.
- ;
- ; You must modify this script in at least 3 places:
- ;
- ; 1: Indial Number
- ; 2: PCP ID Number
- ; 3: PCP Password
- ;
- ; You may also want to modify the script for your modem
- ; or types of systems you call. See notes in script.
- ; For further information, see PCP documentation on
- ; Net Exchange BBS. To connect to the Net Exchange, type
- ; "C PURSUIT" at the Telenet @ prompt.
- ;
-
- debug ON
- setport 2400 ; Redundant if you have locked your FOSSIL
- ; If you have a 1200 indial :-(, use 1200
- ; here and change the hunt-confirm sequence
- ; to @ wait 1 <CR>
- ;
- ; Users with MNP modems should disable MNP as the buffering
- ; combined with PCP's packet latency will cause block position
- ; errors during error recovery. For HST owners, use:
- ;
- send AT&M0<CR>
- waitfor OK
- ;
- ; Others should adjust the above for their modem
- ; non-buffered modem owners should comment out the
- ; above two lines.
- ;
- ;----------------------------------
- ; Your Indial Phone Number Here
- ;----------------------------------
- ;
- send ATDT4795372<CR>
- ; send ATDT4795445<CR> ; official number
- ; 6406 5776 5355 5372 ; alternates
- ;
- ; If you are having difficulty with your indial line, call
- ; PCP customer service and they may be able to give you
- ; an alternate number that works better.
-
-
- case
- CONNECT : >whackit
- RING<CR> : fail
- BUSY<CR> : fail
-
- 131
-
-
-
- "NO " : fail
- @default : fail
- endcase
-
- :whackit ; Attempt to "wake-up" PCP
- purgein ; Telenet recommends at least
- wait 2 ; a 200 ms pause between
- send @ ; characters in the hunt-confirm sequence
- wait 1 ; change the @ to <CR> if you call
- send D ; a 1200 bps indial
- wait 1
- send <CR>
- waitfor TERMINAL=
- send D3<CR> ; Preferred terminal type
- waitfor @
-
- ;--------------------------
- ; Your ID and Password Here
- ;--------------------------
-
- :outdial ; Dial PCP city
- purgein
- retrycount 5
- send C @OUTBOUND,YOURID471E<CR> ; Your ID Here
- waitfor PASSWORD
- send KKKKKK<CR> ; Your Password Here
-
- CASE
- CONNECT : >local ; Gotcha!
- BUSY : >outdial
- "NOT " : fail
- @nocarrier : fail
- @default : fail
- ENDCASE
-
- :local ; Initialize Outdial
- purgein
- send <CR>
- wait 1
- send I<CR>
- send ATZ|
- timerset 15
- waitfor OK
- send @|
- waitfor @
- ;
- ; Setup PADS
- ;
- ; Note - if you are calling a SEAdog system,
- ; change the SET and RST 5:1 and 12:1 to 5:0 and 12:0
- ; as SEAlink is not transparent to software flow control
- ;
- ; If you only call WaZoo systems, use 5:1 and 12:1 for
- ; fewer errors and greater reliability.
- ;
- send SET?<sp>1:0,7:8<CR>
- ;
-
- 132
-
-
-
- waitfor @
- ;
- ; send RST?5:1,12:1<CR>
- ;
- ; waitfor @
-
- send CONT<CR>
- send ATH0Z<CR>
- waitfor OK|IDLE
- send <ENQ><CR> ; Turn on RV Mode
- waitfor *
-
- purgein
-
- timerset 50
- wait 2
- send D@LOCALNUM<CR>
-
- purgein
-
- case
- ANS : >landing
- ONLINE : >landing
- BUSY : fail
- FAILED : fail
- "NO CARRIER" : fail
- "NO DIAL TONE" : fail
- "NO DTR" : fail
- VOICE : fail
- @default : fail
- @nocarrier : fail
- endcase
-
- :landing ; Landing on Pluto
- wait 7 ; wait for PCP messages to clear
- purgein
- session
-
- ;end of file "pcp.scr"
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 133
-
-
-
- 29 Commercial inquiries
-
- For any use other than that allowed by the licence agreement, you must
- obtain the commercial version of FrontDoor. The commercial version of
- FrontDoor include numerous features not found in the shareware version.
- Eligible users of the shareware version of FrontDoor may also benefit
- from the commercial features, and can enjoy a special "SysOp Discount" at
- the time of this writing.
-
- The easiest way to receive up-to-date information of features,
- availability, pricing and a list of local distributors and resellers of
- the commercial version, is to file request FDINFO from one of the
- following main distribution sites:
-
- Online Communications, Inc. Telephone: +1 207 941 1110
- 22 State Street Modem: +1 207 990 3511
- Bangor Maine 04401 Fax: +1 207 990 2293
- USA Email: 1:132/300@fidonet
-
- ComDas GmbH Telephone: +49 9132 78160
- attn: Holger von Heissen Modem: +49 9132 781621
- Rathgeberstrasse 43c Fax: +49 9132 781615
- D-91074 Herzogenaurach Email: 2:2490/1510@fidonet
- Germany
-
- FDINFO is also available from 2:270/17@fidonet.
-
- The FDINFO package contains information about various FrontDoor-related
- utilities, such as TosScan, the conference mail package.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 134
-
-
-
- 30 Developer notes
-
- A separate package with information regarding FrontDoor is distributed
- under the name FDDEV. It contains structures and technical information
- directed towards authors of FrontDoor utilities. If you are planning on
- writing a utility with explicit support for FrontDoor, make sure you grab
- a copy of the FDDEV package.
-
-
- 31 Technical specifications
-
- FrontDoor was written using Zortech C++ 3.1, TASM 3.1, and Turbo Pascal
- 6.0. It uses direct-to-screen writes, and properly supports virtual
- screen environments, such as the one provided by DESQview.
-
- FrontDoor's FTSC product code is 0x0C (or 12 decimal).
-
- The proper nodelist flag for file requests for systems using FrontDoor is
- XA.
-
- FrontDoor's Editor allows you to share the Hudson Message Base together
- with other programs, such as RemoteAccess, following the
- RemoteAccess/FrontDoor HMB sharing specifications.
-
-
- 32 Credits
-
- This list, as most lists, started out in 1986 with a few names. It has
- since grown to unrealistic proportions and instead of running the risk of
- forgetting to mention someone, I'll take the cheap way out and say thanks
- to everyone who has contributed to making FrontDoor what it is today. You
- know who you are.
-
- I do wish to point out a "few" people though..
-
- .. the beta crew, the help nodes, all you people who keep pestering me
- with NetMail about things that you want to see in FrontDoor, Bruce
- Bodger, Ron Dwight, Peter Garben (1111), all the people who turned up at
- EuroCon '93, M.E., C.A., G.A., THA/2, Lill Homrig, Senior, the JAM crew..
-
- And last, but not least..
-
- ..Tom Jennings, Felix Kasza, Bob Hartman, Chris Irwin, Chuck Forsberg,
- Henk Wevers, Randy Bush, Ray Gwinn, Thom Henderson, Vince Perriello, Wynn
- Wagner III, Mike Ratledge, Rick Moore, G. Adam Stanislav, Doug Boone,
- Ralf Brown, jim nutt, Maximilian Hantsch, Alexander Holy, Scott Dudley,
- Arjen Lentz, Scott Samet, and all the people at Turbo Power Software.
-
- "It ain't over till the fat lady sings"
-
-
-
-
-
-
-
-
-
- 135
-
-
-
- Batch files 121 NOISCR 113
- BBS 121 NOLOCK 113
- CALLER*ID 124 NOMDM 113
- Create .BAT file 17, NOMULD 113
- 122, 123 NORAWEXTD 113
- DOBBS.BAT 123 NORES 114
- Errorlevels 17, 47, 121 NORESYNC 114
- EXEBBS.BAT 124 NOSHADOW 114
- EXEFAX.BAT 125 NOSLO 114
- FDNOEXIT semaphore 119 NOUNPACK 114
- FDXIT semaphore 119 NOYOOHOO 114
- Flow 125 NOZAP 114
- Mail received 121 ONLINE 114
- Terminal 121 RDEBUG 114
- TZUTC 116 S (Mailer) 114
- X<1..255> 115 SESSONDCD 115
- BBS TERM 21, 69, 115, 121
- DOBBS.BAT 123 X<1..255> 115
- EXEBBS.BAT 124 Commercial inquiries 134
- Human callers (mailer CONFIG.SYS
- profile) 54 BUFFERS= 5
- Loading 14, 121 FILES= 5
- Mail only 12 Credits 135
- Maximus 84 Display
- RemoteAccess 84 "Mail" 15
- Software 4 "NE" 119
- Carbon copies 66 "UD" 119
- Blind 67 <C> and <+> 3
- Hidden 67 AUTO 86
- Command-line parameters 111 AUTOVIDEO 111
- AUTOVIDEO 111 C command-line parameter
- C (FDNC) 34 111
- C (FDSETUP) 111 Clear screen 73
- DOBBS.BAT 123 Clock 15
- EMSIDEBUG 111 Colors 16, 20
- F (FDNC) 34 CRT environments 86
- FOLDER 111 Custom 86
- FOLDERSCAN 111 DESQview 126
- FORCECOMMIT 111 DoubleDOS 127
- FORCEDPMI 111 EGA/VGA 4, 86
- FORCEINT28 111 M command-line parameter
- INTL 111 112
- L:<pwd> 112 Margin 18
- LOGINTRO 112 Monochrome mode 11
- M (FDSETUP) 11, 112 NODASH 112
- M (Mailer) 12, 112 NOISCR 113
- MSGSURVEY 112 NOSHADOW 114
- NOCANSES 112, 120 Program notice 62
- NOCOMMIT 112 Screen blanking 10
- NODASH 112 Screen flickers 10
- NODUPBCK (FDSETUP) 112 Semaphore indicators 56
- NOEKBD 112 Show hard CRs 18
- NOEMS 112 Timestamp in activity
- NOEMSI 113 window 15
- NOFCB 113 Wrap around 22
- NOFTSC1 113 Environment variables 116
- NOICA 113 FD 5, 6
-
- 136
-
-
-
- FDOPT 116 ALIAS files 81, 109
- FDOVR 116 Allow 48
- FDSWAP 9, 116 Available directories
- FMOVR 116 81
- POINTNET 36, 116 Event restrictions 83
- TZUTC 116 Foreign file systems 80
- Events 46, 49 Hold (do not send) 49
- Allow file requests 48 Limiting 28, 80, 82
- Answer inbound calls 50 Manual (mailer) 54
- BBS 47 Message status 87
- Behavior 47 Pickup 48
- Days 46 Protecting 83
- Errorlevel 47 Request processor 84
- Event manager 46 Response message 81
- Exit when mail received Service requests 109
- 13 Update request 87
- External 46, 47 Update requests 80
- File requests 83 XRobot 79
- Forced 48 Files
- Global event (@) 46, 50 AUTOEXEC.BAT 5
- Hold (do not send) file Banner 9
- attaches 49 Carbon copy lists 67
- Inactive 48, 50 CONFIG.SYS 5
- Length 47 DOBBS.BAT 123, 124
- Mail 46 EVENT.FD 25
- Max.cost 47 EXEBBS.BAT 124
- Min.cost 47 FD.EXE 5
- Modifier 46 FD.OVR 5
- Overlapping 51 FD.SYS 6
- Skipping forced 114 FDNC.EXE 5
- Start 47 FDNET.PVT 32
- Tag 46, 89, 91 FDNODE.CTL 31, 34, 35
- Fax FDPOINT.PVT 35
- Editor 21 FDSETUP.EXE 5
- EXEFAX.BAT 125 FM.EXE 5
- Mailer 17, 42 FM.OVR 5
- View from Editor 58 FOLDER.FD 25
- FDDEV 135 Hudson Message Base 113
- FDNODE.CTL 31 Inbound 8
- COST 33 LASTREAD.BBS 9
- DIAL 32 Log 8
- PHONE 32 MODEM.FD 113
- POINTLIST 31, 36 MSG Base 9
- PVTLIST 31 MSGHDR.BBS 9
- SWEPULSE 32 MSGIDX.BBS 9
- Telephone number MSGINFO.BBS 9
- translation 10 MSGTOIDX.BBS 9
- USE ZONE 32 MSGTXT.BBS 9
- FDSERVER 106 NAMES.FD 77
- %logall 106 NetMail messages 8
- %nologer 106 No BBS 9
- %store 107 NODIAL.FD 56, 119
- Example 107 NOLOCK 113
- Limitations 106 Overlays 112, 116
- Password 14 Packets 8
- Security 108 PASSWORD.FD 25
- File requests 79 REQUEST.FD 25
-
- 137
-
-
-
- ROUTE.FD 114, 119 NOEMS 112
- SETUP.FD 6 overlay 112
- Swapping 9 Scroll-back buffer 22
- FOSSIL Swapping 17, 21, 85,
- BNU 3, 44, 126 112
- cFos 3, 44 TSRs (DOS shell) 85
- Deactivating 70 Messages
- DGFossil 3, 44 Attached files 87
- FOSSIL not loaded or Blind Carbon Copies 67
- detected 121 Carbon copies 66
- Incorrect FOSSIL version Confirmation Receipt
- 121 Request 18
- Lock port 38 Continuous tagging 64
- OpusComm 3, 44 Crash 87
- OS/2 45 Cross-posting 67
- Requirement 3 Default status 19
- SIO/VX00 3, 44, 45 Delete/sent 88
- VFD 3, 44, 45 Destination 77
- X00 3, 44, 126, 127 Direct 88
- Handshake Domains 7
- DietIFNA 28, 114 Echo info (origin lines)
- EMSI 28, 114 60
- EMSIDEBUG 111 Entering 63
- FTS-1 28 Extended information 62
- FTS-6 28 File request 87
- LOGINTRO 112 Folders 25
- NOEMSI 113 Forward (manual) 57
- NOFTSC1 113 Forwarding 92, 94
- non-FidoNet compliant Hard CRs 18
- 113 Hold 87
- NOYOOHOO 114 Immediate mail 48, 88
- NOZAP 114 Import 59
- Order of priority 29 INTL 111
- Security 27 Kill/sent 87
- Hardware Lock 88
- Extended keyboard 4, 11 Margin 18
- Keypad modes 74 No status 88
- Lock keyboard 53, 112 NOISCR 113
- Modem 38 Origin lines 19, 25,
- NOEKBD 112 26, 61
- NOICA 113 Print (Editor) 61
- PC keyboards 74 Private 87
- Raw mode (keyboard) 73 Request response 81
- Use "fastkey" 10 Return Receipt Requests
- Macros 14
- Address 77 Sent 88
- Editor 19, 62, 65 Status 87
- Mailer 16, 52 Storage 8
- Terminal 23, 69, 73 Survey 63
- UUCP 78 Trunc/sent 88
- Mailer Update requests 87
- Converting from other UUCP 78
- 129 Zonegates 19
- Memory Modem 38
- EMS/XMS 3, 85, 112 Answer control 41, 50,
- LIM/EMS 112 54
- Minimum requirement 3 Call progress 56
-
- 138
-
-
-
- CALLER*ID 42 Hosts and hubs 30
- Command strings 40 Modem manager 42
- CTS/RTS 3 Multiple nodelists 31
- Custom message 39 Name look-ups 77
- DCD forced 38 Net 30
- DCD mask 39 Node 30
- Dialing 13, 39, 40, 47, Point 30
- 49, 56 Pointlist 35
- Disconnect 53 POINTNET 36
- DTE interface 3, 38 Points 31, 34, 36
- DTR 39 Region 30
- DTR forced 38 Remote info 62
- Fax 42 Sharing 37
- FOSSIL requirement 43 Storage 9
- Hardware 38 Zone 30
- Hiding dial info 16 Protocol 28
- Initialization 41 Auto-Zmodem 22, 71
- ITU-T V.23 39 EMSI 98
- Locked port 38 IEMSI 69, 71, 98
- Maximum baud rate 38 NORESYNC 114
- Messages 3, 38, 39 NOSLO 114
- Modem manager 42 SEAlink 114
- Multi-tasking 126 Transmit ASCII file 69
- NODASH 112 Zmodem 114
- NOMDM 113 Routing 89, 114
- ONLINE 114 Allow nodes to pickup
- OS/2 45 waiting mail 49
- Send BREAK 73 Commands 91
- Serial port 38 comments in route file
- SESSONDCD 115 89
- Unable to initialize Debugging 114
- 121 Default rules 89
- Multi-line 116 Dynamic 96
- Multi-tasking Event tag 46
- DESQview 126 Examples 95
- DoubleDOS 127 File routing 94
- FIFO 126 High priority (crash)
- FILES= 5 mail only 48
- FORCEDPMI 111 Hold (do not send) file
- FORCEINT28 111 attaches 49
- Hardware 126 Host/Hub/Boss 90
- Multilink 128 Macros 97
- NOFCB 113 Max.cost 47
- NOMULD 113 Min.cost 47
- NORES 114 Multiple zones 94
- OS/2 45, 111, 126 Nodelist flags 93, 97
- PC-MOS/386 114, 126 Order of evaluation 96
- Semaphores 9 points 96
- Windows 111, 126 Scripts 99
- Nodelist Send to CM systems only
- Address browsing 77 50
- Compiler 52 Send to non-CM systems
- Compiling 31 only 50
- Dial (Terminal) 72 Scripts 99
- FDNODE.CTL 35 Commands 99
- FidoNet 5 Labels 103
- Flags 34 Mnemonics 104
-
- 139
-
-
-
- Node block 104
- PC Pursuit 104, 131
- Semaphores 118
- "NE" 119
- "UD" 119
- Directory 9
- FDALIVE.n 120
- FDCANSES.n 120
- FDFREEZE.ALL 119
- FDFREEZE.n 119
- FDINEXIT.nnn 118
- FDINSESS.nnn 118
- FDINTERM.n 120
- FDNOEXIT.NOW 119
- FDNOSCAN.NOW 119
- FDNOUSER.NOW 119
- FDRENUM.nnn 119
- FDRESCAN.NOW 118
- FDSCAN.n 120
- FDXIT.nnn 119
- FMFREEZE.n 118
- FMNEW???.n 118
- FMRESCAN.NOW 118
- Indicators 56
- MailExit 9
- New mail 18
- NODIAL.FD 119
- ROUTE.FD 119
- Service requests
- ALIAS file 109
- Parameters 109
- Service requests 109
- Support
- Help systems 130
- Technical specifications
- 135
- FDDEV 84, 110, 135
- FSC-0056 98, 113
- FTSC 135
- HMB sharing 135
- nodelist flag 97, 135
- NOLOCK 113
- Utilities
- TosScan 6, 121, 124,
- 134
- XRobot 79, 129
-
-
-
-
-
-
-
-
-
-
-
-
- 140
-