home *** CD-ROM | disk | FTP | other *** search
-
-
-
-
-
-
-
- *
- * INCOGNITO *
- *
-
-
-
- Version 3.09
-
- A Alias Door For PCBoard 14.5x
-
-
-
-
-
- U S E R S M A N U A L
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Release Version 3.09
- Copyright (c) 1990,1991 Gary R. Smith
- All Rights Reserved
-
- DISCLAIMER
-
-
- There is made no warranty of any kind, express or implied,
- including without limitation, any warranties of merchantability
- and/or fitness for a particular purpose. I shall not be liable
- for any damages, whether direct, indirect, special or on
- sequential arising from a failure of this program to operate in
- the manner desired by the user. I shall not be liable for any
- damage to data or property which may be caused directly or
- indirectly by the use of this program.
-
- IN NO EVENT WILL I BE LIABLE TO YOU FOR ANY DAMAGES, INCLUDING
- ANY LOST PROFITS, LOST SAVINGS OR OTHER INCIDENTAL OR
- CONSEQUENTIAL DAMAGES ARISING OUT OF YOUR USE OR INABILITY TO USE
- THE PROGRAM, OR FOR ANY CLAIM BY ANY OTHER PARTY.
-
-
- QuickBasic is a Registered Trademark of MicroSoft Corporation
- Turbo C is a Registered Trademark of Borland International Inc.
- Borland C++ is a Registered Trademark of Borland International Inc.
- CKIT is a Trademark of Data-Comp Information Systems
-
- Note from the author
-
-
- Welcome to what we consider one of our finer works of art. We are
- proud to present to the PCBoard public our newest rendition of
- INCOGNITO. The road to this version has been a long and hard
- journey, but alas we have seen the light at the end of the
- proverbial tunnel.
-
- Rewriting Incognito has taken several months. This rewrite
- commenced when Incognito was discovered to have problems working
- with multiple nodes on a network. This problem only occurred on
- networks that employed over 3 nodes. Keep it to less than 3 and
- there was no problem. I could only contribute this problem to the
- communication routines that I was using at that time. I have
- since switched to the infamous CKIT by Ricky Belitz and have not
- seen the problem arise, thus showing off the superior workmanship
- of such a fine library of routines and communication support. We
- strongly recommend CKIT if you are planning on creating doors for
- Bulletin Board programs.
-
- The latest version of Incognito was rewritten in Borland C++ 2.0.
- Incognito had its start in MS QuickBasic 4.5 and has matured to a
- much faster and compact language. Rewriting Incognito has been a
- tremendous learning experience as you can well imagine.
-
- Reduction in size is approximately 25% and with a increase of
- speed of up to 300% over the previous versions.
-
-
- We hope that you enjoy INCOGNITO!
-
-
- Author
-
-
- If you are like 99.9% of the sysops world wide, you will want
- the latest version of Incognito available on your system.
- Incognito's latest version can always be found on Quality systems
- Like the boards listed below:
-
-
- Random Access (RNBB Support!)
- Atlanta, Georgia
- On-Line Registration Available
- (404) 516-7150 (HST)
-
-
- Incognito is designed to run on systems that utilize PCBoard
- version 14.5 + only.
-
-
- Plans to cover all popular boards are in the works. If you have
- a copy of a BBS that you would like INCOGNITO to work on, please
- mail a copy to the register address and we will do what we can to
- accommodate your system. The BBS files must include setup
- documents and file structures if they are provided from the
- author. If the BBS requires registration to operate doors then a
- registered copy should be sent. Registered copies sent for the
- purpose of developing incognito for that BBS Software will not be
- used as a active board.
-
-
- Features of INCOGNITO:
-
- o Detects Loss of carrier!
-
- o Can operate at speeds in excess of 38400 Baud!
-
- o Will automatically log user off after 4 minutes of no keyboard
- activity!
-
- o Can be operated on a MultiNetwork Board!
-
- o Allows sysop total control of users allowed in system!
-
- o Allows the sysop to pick the Security Level to be used with the
- ALIAS Name!
-
- o Always informs the user Which Name is being used prior to
- closing the Door!
-
- o Allows the Sysop to select which conferences the user is
- allowed in while using his alias name! (No more restrictions on
- number of conferences for registered and unregistered
- versions!)
-
- o Allows up to 200 conferences!
-
- o Automatically registers users in all conferences that you
- specify!
-
- o Allows user to logoff through the Incognito door and changes
- their name back to their real name if the do!
-
- o Incorporates SYSOP designed menus for conference selection
- menus, either in mono or color!
-
- o Supports full color and mono systems!
-
- o Allows on line viewing of conferences users are allowed in!
-
-
- Getting Started:
-
-
- Setting up INC is simple and straight forward. If you have set up
- other PCBoard doors then you should have no problem at all with
- this door. This door WILL NOT work with conversion programs
- provided for other types of BBS's. It was written especially for
- PCBoard 14.5x systems only.
-
-
-
- NOTE: If you are currently running a previous version of
- Incognito, You must delete all the files. Incognito Version 3.0+
- is not compatible with earlier versions.
-
-
-
- SETTING IT UP -
-
- Step 1: Create a directory from which Incognito will run from.
- This Directory can be called anything you wish that is
- within the DOS 8 character limit. (This document will
- assume you have selected C:\PCB\INC for the remainder
- of the examples).
-
- Step 2: Copy or UNZIP all the Incognito files into the
- directory you just created above.
-
- ex. COPY INC-309.ZIP C:\PCB\INC
- PKUNZIP INC-309
-
- Step 3: Create the INC configuration file. This file will
- contain all the external data that Incognito will need.
- Using your ascii editor you will create a file called
- "INC.CNF". The name cannot be changed and it MUST be
- placed in your Incognito Directory. If this file is not
- found a message is written to the screen and the
- program is exited.
-
- The below is a Description of each line required
- Example -
-
-
- Line 1 RNBB Software BBS ( BBS Name
- Line 2 999999999 ( Registration Number
- Line 3 110 ( Security Level (NOTE 1)
- Line 4 2,3,4,5,6,7,8,9,10, ( Conferences Users
- Allowed In (NOTE 2 & 3)
-
- NOTE 1: A security level is required for this line. This security
- level is for the level that you wish users/co-sysops to
- access the sysops menu. Users that have a lower access
- than this will receive the regular users screen. Users
- allowed to access this menu can change ALL information.
- You should be very vigilant in assigning users to this
- access level.
-
- NOTE 2: Line 4 through Line 25 contain conference information.
- The only stipulation here is that the length of the line
- may not exceed 80 characters. If you have multiple lines
- they may look like the following example. (You can have
- from 1 to 200 conferences listed this way)
-
-
- 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23
- 26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45
- ┌──>
- └ Only one blank line at the end of the file.
-
-
- Last but not least, ensure there is only one blank line
- after the last conference line.
-
- NOTE 3: Conference 0 (MAIN) is NOT SUPPORTED for regular users,
- This is a safety precaution to preclude users using an
- alias in the main conference (0) area. If you want a user
- to be able to access the Main PCBoard conference with
- their alias you will have to give that user co-sysop
- level usage.
-
- STEP 4: You now need to construct the batch file that PCBoard
- will use to call the Incognito program. If your running
- multi-node you will have to make one each of these for
- each node your running.
-
- By creating this batch file you are configuring it so
- Incognito will run for that node. Each batch file you
- create should be like the following example. (Assuming we
- are configuring for a single Node)
-
- INC -
-
- Line 1 @ECHO OFF
- Line 2 CD C:\PCB\INC
- Line 3 INC C:\PCB\PCBOARD.SYS C:\PCB\MAIN\USERS
- Line 4 CD C:\PCB
- Line 5 BOARD
-
- Line 1 Turns off the Local Screen Echo
- Line 2 Changes the directory to where Incognito is stored
- Line 3 (1) First is the complete path to that nodes
- PCBoard.sys file (You can use the %PCBDIR% variables
- for multinode systems)
- (2) Second is the complete path to the Users File
- Line 4 Changes the directory back to the PCB directory
- Line 5 Calls the PCBoard program
-
-
- NOTE: Your INC batch file should be similar to the example
- above, Line 3 however, Must contain the path to both the
- pcboard.sys and the users file. PCBOARD.SYS First USERS
- Second.
-
- If you are running multiple nodes you will have another INC
- batch file, (Like INC2),(Or use the %PCB% variables) that will
- contain the same information as the first node file with the
- exception of the path to the PCBOARD.SYS file. The users path
- should not change.
-
-
- STEP 5: You now have to create a conference menu. This is the
- menu presented to the user. There are two examples
- provided. These files must be called CONFLST and
- CONFLSTG. If don't want to create a color menu then only
- the CONFLST is required. Place these menus in your
- Incognito directory and keep them updated with your
- current conferences available.
-
- STEP 6: The next and last step to setting up Incognito is to add
- Incognito to your PCBoard Doors file. This is done
- through the PCBoard setup program. All you need to do
- once you are in the PCBSETUP editor for doors is place
- the name of the batch file you just created above in a
- slot for a door, give it a minimum security level and
- your all done. Incognito does not require a users.sys or
- door.sys file.
-
- NOTE: When assigning Incognito a security level, ensure
- that the level is lower than what you plan to give
- to a user so that the user can open the door when
- using their alias.
-
-
- SETTING UP CONFERENCES
-
- STEP 1: To ensure that Incognito works properly with your
- conference scheme you will need to edit how you have
- your conferences set up.
-
- a. In your INC.CNF file you should have placed the
- number of the conferences that you want your users
- with alias's to be allowed in.
-
- b. Now modify each conference using PCBSETUP and reset
- the "auto-rejoin conference" flag to "Y". If this is
- not done, PCBoard will return the user to the Main
- Board Conference with their Alias and Alias Security
- Level If they log off and then back on again. So
- ensure this flag is changed.
-
- c. You must now change PCBoard.dat file using PCBSETUP
- so that a user cannot (A)bandon or (J)oin a
- conference when they are at the alias security level.
- They should be able to at a minimum (R)ead messages,
- (E)nter messages, and (OPEN) doors (Or at least
- reopen the Incognito door so they can get back to
- their Real Name and Security Level.
-
- Ensure that after changing the parameters that you do
- not affect what commands your regular non-aliased
- users can/cannot use.
-
- NOTE: (SUGGESTION) We would like to suggest that you make a
- security LOGON file for the security level you select for
- alias users, so that in the likely hood that they log off
- with their alias name they will understand that they need
- to open the INC door to restore their previous Name and
- Security Level.
-
- Your now all set to run INCOGNITO !!...
-
-
- RUNNING INCOGNITO
- _________________
-
- Now that you have set up the incognito door, We can imagine that
- you are all ready to get into it and see what it does. Incognito
- is a door utility that allows sysops the capability of allowing
- his users to use an alias name. This can be very handy when
- dealing with message bases of an adult nature or where an alias
- would be preferred such as the Medical conference of RIME or the
- Adult conferences found on many boards that carry the THROB net.
-
- Below is a suggested method for starting your Incognito program.
-
- STEP 1: Logon as the sysop and OPEN the Incognito Door.
-
- STEP 2: You will be asked for an alias name.
-
- STEP 3: Since this was your first time through, you will be
- logged out of the incognito door.
-
- NOTE: You have now just created the INC.USE file, This is the
- users file that Incognito will use to keep track of all alias's,
- real names, security levels, etc...
-
- STEP 4: You may now reopen the door and access all the sysops
- functions. Remember your users don't get this screen
- unless you assign them a high enough security level to
- match what you entered in the INC.CNF file.
-
- a. Setting up for a CO-SYSOP.
-
- Co-Sysops will also get the screen you are now observing.
- if a co-sysop is to be entered, they should follow the
- exact procedures as the sysop for first time logon. Then
- the sysop or co-sysop can verify them as a user (PRIOR)
- to them using their alias.
-
- ATTENTION:
-
- Sysops and Co-sysops have a couple of rules to follow when
- using alias's. #1. You will not be able to use your alias
- if you just approved yourself (exit and reenter to use).
- #2. You cannot perform maintenance if you are not using
- your real name. #3. You cannot use you alias if you have
- not approved yourself.
-
-
- STEP 5: That's it!, All you have to do is now wait for users to
- enter the door and request an alias. once this is done,
- You validate and your on your way. Enjoy Incognito!
-
- List of Commands
-
- By opening the INC door you as the sysop will view a menu of
- items that you may preform.
-
- The menu is as follows:
-
- 1. Lets you elect to use your REAL or ALIAS name.
-
- NOTE: If you are using your REAL NAME the menu will state
-
- " 1. Utilize your Alias Name "
-
- If you are using your ALIAS NAME the menu will state
-
- " 1. Utilize your Real Name "
-
- 2. Verify New Users - Select this option to validate all new
- users that have requested an alias. When selected you will be
- presented with each new user (One by One) to validate,
- Entering "Y" will validate, (RETURN) will skip to the next
- record. If you select "Y" you will be asked to enter a
- security level that user will receive when they use their
- alias name. Enter the alias security level. (Pressing RETURN
- will enter a zero (0) to the file)
-
- You will then be asked to register all users in the
- conferences you have indicated in the INC.CNF file. If you
- enter "Y" the user will receive a R flag in each of the
- conferences listed in the INC.CNF file. (This makes it easy if
- you have a lot of conferences to enter users into. (INCOGNITO
- will register them in any number of conferences, Not just the
- first 40!).
-
- NOTE: Previous versions of INCOGNITO wrote messages in the main
- directory to the user letting them know of the approved
- application. This is no longer done.
-
- 3. Delete Selected Users - Use this option to deleted selected
- users. You must know the users REAL NAME in order for
- Incognito to find the name and delete it.
-
- 4. List all Users - Use this option of view all users Real Name,
- Alias Names, And both Security Levels assigned. If you have a
- color monitor validated users will be yellow and non validated
- users will be blue.
-
- 5. Change Users Alias/Security levels - Use this option to change
- any users alias name or alias security level. You must know
- the REAL NAME of the user to perform this option. (You must
- also be using your real name to do this operation)
-
- 6. Available Conferences - Use this option to list all the
- conferences that you have listed as available for your ALIAS
- users. If there is no conference number assigned, the slot
- will be printed as (EMPTY).
-
- 7. Return to PCBoard (Quit) - Use this option to return to the
- main board.
-
-
- NOTE: All options may also be accomplished by enter the first
- letter of line. ex. If you want to list users instead of
- pressing 4 you may select "L"...When returning to board the
- letters/numbers (7,R,Q) are all valid inputs. The letters
- are highlighted on a color monitor.
-
- USER OPERATION.
-
- STEP 1: When a user wishes to use an alias, That user must only
- Open the Incognito door and request an alias. First time
- users will go through the same steps that the sysop
- preformed above. If a user comes back to the door and the
- request has not been approved, an appropriate message
- will be presented to the user.
-
- STEP 2: After sysop / co-sysop approval, the user will be
- presented with a menu of options. The list is explained
- below.
-
- 1. Enter a conference - The user will select this option
- when they desire to use their alias name. Once
- selected they will be presented with the menu
- (Conflst) of selections. If the conference they select
- is a valid conference you have listed in the INC.CNF
- file they will be placed in that conference with their
- alias name and security level. If that conference is
- valid in the INC.CNF file but is not a valid
- conference in PCBoard the user will be placed in the
- Main board area with alias and alias security level.
- So be careful and make sure all conferences are valid
- ones. If the user decides to join another conference
- they must open Incognito again and select another
- conference.
-
- 2. Quit to PCBoard - Using this option will send the user
- back to the main board (conference area 0) with their
- original name and security level.
-
- 3. Logoff - Selecting this option will log the user off
- the board. Their name and security level will be
- changed automatically back to their original, and the
- time on that day will be logged to the users file.
-
- INCOGNITO is Shareware. You are granted a TWO week trial period
- in which you may evaluate INCOGNITO. If you continue to utilize
- this product you are required to register it with the author. If
- you do not register INCOGNITO within the required time frame
- allowed, You are REQUIRED to remove it from your board in
- accordance with the United States Copyright Laws governing the
- use of Pirated Software.
-
- This program is not crippled in any way. It is full featured in
- that it will do everything that a Registered version will. The
- "Not A Registered Version" will not be shown on the ending screen
- for registered members. There are no extra pauses, bells, beeps
- etc... in Incognito.
-
- If you register your copy of INCOGNITO, you will receive a
- registration Number to place in your INC.CNF FILE.
-
- The most important part of registering is that you will have
- peace of mind knowing that you did.
-
-
- To register your copy of INCOGNITO, Fill out the form
-
- CALL OUR SUPPORT BOARD AND REGISTER VIA MASTERCARD/VISA/AMEXPRESS
- (Registration is instant and OnLine. You will receive your registration
- number instantly!)
-
- (404) 516-7150
-
- Register.doc and mail it along with $19.95 to :
-
- Gary R. Smith
- 5012 Olde Mill Drive
- Marietta, Georgia, 30066
-
- Make all checks payable to
-
- Gary R. Smith
-
- All checks must be drawn from U.S. Banks...No foreign currency
- will be accepted. (This includes Canadian) Please include in the
- Registration form, exactly how you would like your BBS name to
- appear on the Closing Screen.
-