WILDKEYS(TM) Version 1.07 - Feb. 1994 Triad Solutions, Inc. P.O. Box 421055 Plymouth, MN 55442-1055 (BBS) 612-525-9632 1200-16.8 USRDS Copyright (c) 93 by Christopher J. Grossmeier ALL RIGHTS RESERVED! Revised: Feb. 1994 What is WILDKEYS? ~~~~~~~~~~~~~~~~~ WILDKEYS is a simple utility that allows a Sysop to modify a Wildcat! v3.x file database so that all files have the maximum usable KEY WORDS. It simply removes all the critical words from the sixty character description and places them into the KEY WORD fields in you ALLFILES database. WILDKEYS also becomes useful for systems that process files with an automated process. If your system runs such programs as WCFF, you may notice that these file tossers are not generating keywords for your files in the database. With WILDKEYS, you can selected one of these automated areas and generate keywords for all the files within it. This saves you the time of manually entering them after being processed. C O N T E N T S ~~~~~~~~~~~~~~~~~ Legal Stuff Registration WILDKEYS' Command Lines WILDKEYS' Trouble Shooting What is Shareware? L E G A L S T U F F ~~~~~~~~~~~ ~~~~~~~~~~~ WARRANTY -------- WILDKEYS IS SUPPLIED AS IS. THE AUTHOR DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THE WARRANTIES OF MERCHANTABILITY AND OF FITNESS FOR ANY PURPOSE. THE AUTHOR ASSUMES NO LIABILITY FOR DAMAGES, DIRECT OR CONSEQUENTIAL, WHICH MAY RESULT FROM THE USE OF WILDKEYS. COPYRIGHT NOTICE & LICENSE -------------------------- WILDKEYS is distributed as SHAREWARE. Under this concept you may use the SHAREWARE (UnRegistered) version for a reasonable period of time, which I consider to be 30 days, after which you must register your copy or discontinue usage all together. The Trail Version contains all features described in the documents and is NOT CRIPPLED and will NOT EXPIRE in any way. ACKNOWLEDGEMENTS ---------------- This program was written using Turbo Pascal v7.0 from Borland International, Scotts Valley, CA. This program used routines from Object Professional v1.20 and B- Tree Filer v5.40 from TurboPower Software, Colorado Springs, CO. Wildcat! (TM), and QmodemPro (c) Mustang Software, Bakersfield, CA. DesqView (c) 1985-1993 by Quarterdeck Office Systems. R E G I S T R A T I O N ~~~~~~~~~~~~~~~~~~~~~~~~~ Registration to WILDKEYS includes: * Free upgrades for one year. * Removal of registration reminder screen. To register WILDKEYS, fill out the registration form included on this distribution disk (WKEYS.REG) and send with a check or money order (in US funds only) for the appropriate amount or complete the MasterCard/Visa/Amex information. You can also register by credit card online at the Freezing Point BBS. _____________________________________________________________ Mailing Address: FIDO ID: 1:282/85 ATTN:Chris Grossmeier RIME ID: TRIAD TRIAD SOLUTIONS INC. BBS: (612)525-9632 P.O. Box 421055 Voice: (612)525-9635 Plymouth MN 55442-1055 Internet : chris.grossmeier@triad1.com _____________________________________________________________ Upon receipt of the appropriate registration fee, we will acknowledge the registration by U.S. mail and: * Provide the user with the codes necessary to remove the registration reminder screen. * Provide the user with the registration number entitling the user to update and telephone support. The registration fee is for the use of a single copy of WILDKEYS by ONE individual, on a Single BBS. W I L D K E Y S B R I E F S U M M A R Y ~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~ ~~~~~~~~~~~~~~~ WILDKEYS was written to fix the annoying problem of to many garbage Key Words in the Wildcat! Database. It doesn't necessarily reduce the number of key words. More often it actually creates more. What it does do, is create Key Words that are of use to the user. It will generate key words from the 60 character short description for each file. In generating key words, it strips out many of the unnecessary words that are rarely or never searched for. The list, is brief, but will reduce the number of wasted keys in your database. Stripped Keys Words : OF , THE , AT , THIS , FOR , FROM , TO , YOUR , YOU , IT , THAT , JUST , WAS , WHEN , AND , OR , NOR , BUT , YET , SO , OUR , IF , AN , AS , IN , BE , BY , IS , DO , ON , US A , B , C , D , E , F , G , H , I , J , K , L , M N , O , P , Q , R , S , T , U , V , W , X , Y , Z 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 , 0 and all number combinations. ( * Note: Numbers are stripped by default, but can be kept with a /N on the command line. ) Other keys words can be excluded by adding or removing them from the BADKEYS.LST file. This file should be located in the same directory that WKEYS.EXE resides in. The WCHOME option is read if it is present in the current environment. If WCHOME is not found, WKEYS assumes that it is being run from the WC home directory itself. Wkeys will also read the current NODE number if set in environment. WCNODEID=### for Multi-Line use where ### is the current node number. W I L D K E Y S C O M M A N D L I N E S ~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~ ~~~~~~~~~~~ WILDKEYS offers a complete set of command line options to allow users to create special batch files to automate processing. Command Line Switches /? : Help for command line options. /F : Turns on FAST MODE for Single Line BBS', or if no nodes are running in a multi-line enviroment. DEFAULT IS OFF ( Multi-Line Mode ) This option will use a faster file lock procedure that will increase the processing speed. However, it will not allow other nodes to access the fileblock while it is running. This important if you wish to process the database as fast as possible. The down side, all node MUST be down. This option works well in a Batch situation. If all nodes are down for events, this can process the filebase in a minimal amount of time. /N : Keep all numbers as valid key words. DEFAULT IS TO SRTIP ALL NUMBERS Few users will ever do a search for a key word that is a number. WKEYS will STRIP ALL NUMBERS BY DEFAULT. This means that it also strips out version numbers, the word OS/2 to just OS, Gif resolutions if present, etc. Any number will be removed. The /N option will KEEP all numbers for sysops who see a definite need for numbers in their Key Words. /A#[-#] : Define an Area Range to be processed. DEFAULT IS AREA 1 to AREA 1000 If you see a need to process only a small area, or exclude an area, you can process any given range of areas with this option. If the areas that you desire to process are 10 to 20, then use /A10-20. If you only wish to process area 10, then use /A10. Only one range can be defined at the present time. /1 : This option is start the Database at RECORD 1 DEFAULT IS TO START WITH LAST RECORD MODIFIED BY WKEYS Wildkeys process the database by record number. It does not process in area order or alphabetical order, rather, it process in the order in which they appear in the database. This increases the speed in which WKeys processes the database. When Processing, WKeys will log the current record to a file called WKEYS.CNT. In the event that you should have to stop processing, or Wildkeys should stop for some unforseen reason, you can continue processing from the last file accessed simply by restarting WKEYS. When you restart, you can start where you left off simply by restarting Wildkeys. If you need to restart from record on, add the /1 at the start to begin the process at the begining. /@name : Process a single file name in the database. Wildkeys has the ability to process a single file. This option usually used in a upload hook batch file. In most cases, the batch file would look like this : WKEYS /L%1 This will process a single file passed from Wildcat!. The %1 can be just a filename or a filename with path. Wildkeys will strip the %1 to just the filename. In most cases, this option will be used while the BBS is running. For this reason, you will want to avoid the /F option in conjunction with the single file option. The single option will work in conjuntion with all other option switches. /Lname : Process a list of file names in the database. Wildkeys has the ability to process a list of files. These file names can be either just file names or paths and file names. Wildkeys will strip out all path information on the data contained in the text file. The name of the text file itself can contain the path where the text file is located. This option was created to process a list of files added to the database that we added by another third party utility. Example: WKEYS /Lc:\wc30\wcff\wcff.lst This example would process a list created with the name of WCFF.LST. All of the other options will work with the list option. The /F option should only be used when the bbs is not running. W I L D K E Y S T R O U B L E S H O O T I N G ~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ If for some reason, WILDKEYS should not finish processing your database, there are some steps you can take to correct the situation. First off, be certain you have a CURRNET BACKUP available. Most problems can be diagnosed with minimal difficulty if a backup was created before running WKEYS. First, did you run Wilkeys in a single or multi-line mode. WILDKEYS will not operate correctly if the /F option is invoked and the BBS is still running in the background or on a separate node in a workstation environment. The /F or Fast option performs a different file locking routine that could cause WILDKEYS of Wildcat! to crash if both are running. The default mode of WILDKEYS, assumes that you are running WILDKEYS in a multi-line environment. Second step is to check to see what record was involved. If you know the file name, you can view that file with either Wildcat or the Pro series to see if indeed the record was corrupt. In the event that the database was corrupt, run WCREPAIR, provided by Mustang Software, Inc. with Wildcat!, to verify and rebuild the database into a known stable format. Again, verify the suspect file, and any file near it before re-executing WKEYS. ********************************************************************** W H A T I S S H A R E W A R E ? ~~~~~~~~~ ~~~~~ ~~~~~~~~~~~~~~~~~~~~~ Shareware distribution gives users a chance to try software before buying it. If you try a shareware program and continue using it, you are expected to register. Individual programs differ on details -- some request registration while others require it, some specify a maximum trial period. With registration, you get anything from the simple right to continue using the software to an updated program with printed manual. Copyright laws apply to both Shareware and commercial software, and the copyright holder retains all rights, with a few specific exceptions as stated below. Shareware authors are accomplished programmers, just like commercial authors, and the programs are of comparable quality. (In both cases, there are good programs and bad ones!) The main difference is in the method of distribution. The author specifically grants the right to copy and distribute the software, either to all and sundry or to a specific group. For example, some authors require written permission before a commercial disk vendor may copy their Shareware. Shareware is a distribution method, not a type of software. You should find software that suits your needs and pocketbook, whether it's commercial or Shareware. The Shareware system makes fitting your needs easier, because you can try before you buy. And because the overhead is low, prices are low also. Shareware has the ultimate money- back guarantee -- if you don't use the product, you don't pay for it.