D'Bridge EMAIL System Single-line 1.51 / 28 October '92 Copyright 1987-1992 by Chris Irwin USER'S MANUAL AND TECHNICAL REFERENCE ------------------------------------------------------------ Mosaic Press 800-932-4044 Credit card orders 358 Oliver Road 513-821-1270 Other inquiries Cincinnati, OH 45215 513-821-1387 Data 201:100/0 DBNET 1:108/68 Fidonet ------------------------------------------------------------ TABLE OF CONTENTS --------------------------------------------------------------------------------G TABLE OF CONTENTS GSection Title PageH ------- ----- ---- 0.00 NOTE FROM THE AUTHOR 1 0.01 HARDWARE / SOFTWARE REQUIREMENTS 2 1.00 GENERAL OVERVIEW 3 2.00 SOFTWARE INSTALLATION 8 2.01 BASIC EMAIL SETUP 9 2.02 BASIC ECHOMAIL SETUP 12 3.00 SYSTEM CONFIGURATION AND MAINTENANCE 17 3.01 BASIC CONFIGURATION 18 3.02 DIRECTORY PATHS 27 3.03 COMM / MODEM SETUP 34 3.04 SCHEDULE MAINTENANCE 44 3.05 NODELIST CONFIGURATION 56 3.06 PACKET MAIL CONTROL 63 3.07 XMAIL CONTROL 71 3.08 TIME CONTROL SYSTEM 76 3.09 FUNCTION KEYS 81 3.10 BBS CONFIGURATION 82 3.11 SECURITY MISCELLANEOUS 88 3.12 DISK SPACE MINIMUMS 97 3.13 ACCOUNTING TRANSLATION 98 3.14 ZMODEM PARAMETERS 102 3.15 SETUP EDITOR OPTIONS 104 3.16 ECHOMAIL AREAS 109 3.17 WINDOW COLORS 115 3.18 KEYBOARD MACROS 116 3.19 TRANSLATION TABLE 117 4.00 SYSTEM IDLE COMMANDS 118 ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin TABLE OF CONTENTS --------------------------------------------------------------------------------G GSection Title PageH ------- ----- ---- 5.00 EMAIL MESSAGE EDITOR 139 5.01 USING EDIT MODE 145 5.02 USING READ MODE 152 5.03 ADVANCED FEATURES 155 6.00 UNDERSTANDING THE QUEUE 158 6.01 CREATING A PRIVATE NODELIST 163 6.02 DUTIES OF A NETWORK ADMINISTRATOR 165 6.03 PUBLIC EMAIL NETWORKS 166 7.00 DBUTIL / UTILITY PROGRAM 167 7.01 FIDO AND QUICKBBS STORAGE 170 7.02 USING THE SCRIPTING LANGUAGE 171 7.03 EXAMPLE SCRIPT FILE 176 8.00 BBS SYSTEMS 177 8.01 GENESIS DELUXE BBS 181 8.02 MAXIMUM BBS 186 8.03 OPUS CBBS 189 8.04 PC-BOARD 191 8.05 PHOENIX BBS 195 8.06 QUICKBBS 198 8.07 REMOTEACCESS 200 8.08 SUPERBBS 208 8.09 SEARCHLIGHT BBS 211 8.10 TBBS 214 8.11 TELEGARD 217 8.12 WILDCAT 222 9.00 GLOSSARY OF TERMS 226 A.00 ACKNOWLEDGEMENTS 258 ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 0.00 NOTE FROM THE AUTHOR 1 --------------------------------------------------------------------------------G 0.00 NOTE FROM THE AUTHOR Thank you for selecting D'Bridge, a state-of-the-art electronic mail system for the IBM PC. The ability to send and receive data electro- nically has now become almost as common as the telephone for business. More and more companies are realizing that the most efficient and cost-effective way to move data is digital. FAX is fine for printed documents and voice is the most direct way to convey a thought; but data is the best way for businesses to communicate when the informa- tion sent and received becomes routine or needs to be fed directly into one or more remote computers for instant processing. It is rapidly becoming commonplace for companies to have a "data" num- ber, just like they had "voice" and "FAX" numbers. In fact, it is al- ready possible to replace the "FAX" number with a combined "Data/FAX" number, since reasonably inexpensive modems supporting protocols for both are already being offered on a fast growing scale. What can D'Bridge do? Simple - it can move data, programs, documents, spreadsheets, pictures, drawings and sounds between continents in just seconds or minutes, depending on the size. Anything that can be stored in your computer may be automatically transmitted to other computers using compatible EMAIL systems anywhere in the world. D'Bridge isn't alone; there are many other programs out there that can communicate with it. We chose to implement the most widely used point- to-point EMAIL system in the world, Fidonet. This means you may commu- nicate with anyone using the programs: FrontDoor, BinkleyTerm, Intermail, Fido, Opus, SEAmail, TIMS, SEAmail, TrapDoor and many others. D'Bridge is just a beginning; look for our release of many innovative products using our EMAIL system as a "hub". The possibilities of how D'Bridge can be used are virtually limitless. Worry-free, automated communications is the key to many new applications: Shared databases, unattended data collection and automatic order processing to name a few. I would be happy to discuss your custom application; after all, I am still a consultant too... Sincerely, Chris Irwin 201:201/0@dbnet 1:110/68@fidonet.org ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 0.01 HARDWARE / SOFTWARE REQUIREMENTS 2 --------------------------------------------------------------------------------G 0.01 HARDWARE / SOFTWARE REQUIREMENTS GHARDWAREH GCOMPUTERH - IBM PC, XT, AT, PS/2 or compatible - 512K RAM (640K recommended) - Monochrome, CGA, EGA, VGA, PGA adapter and monitor - Serial port (if an external modem is used) - Printer (optional) GSTORAGEH - A hard disk or any other DOS-compatible electronic read/write data storage medium with at least 2.5 megabytes available before installation GMODEMH - Hayes or Hayes-compatible modem The modem used MUST be capable of using both the DTR (Data Terminal Ready) and the CD (Carrier Detect) signals. - Modem cable (if external) GTELEPHONE LINEH - A regular telephone line - A "cellular" phone (with a compatible modem) - Most PBX systems (check with your vendor) GSOFTWAREH GOPERATING SYSTEMH - D'Bridge requires DOS 3.0 or higher (DOS 5.0 suggested) - PKZIP.EXE and PKUNZIP.EXE from PKWARE are both required*. 4(*PKWARE, Inc., 7545 N. Port Washington Rd., Glendale, WI 53217)5 ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 1.00 GENERAL OVERVIEW 3 --------------------------------------------------------------------------------G 1.00 GENERAL OVERVIEW D'Bridge is one of the most flexible EMAIL systems on the market today and its menu-driven operation makes it one of the easiest to use. The communications between D'Bridge systems use the powerful ZMODEM proto- col, ensuring that your data arrives as quickly and accurately as possible. In its simplest form, D'Bridge acts like a messenger between two or more points; at its best and most complex, it can be a multi-tired network connecting hundreds (or thousands) of cities using a "hub and spoke" topology (much like our major airlines and parcel services.) GMESSAGESH D'Bridge can send messages (text) from one location to another automatically. Messages may be prepared by using the built-in D'Bridge Message Editor or a third-party product. Messages are a simple and cost-effective way for offices to communicate with each other. It is usually more cost-effective to send EMAIL messages between offices than to use FAX or TELEX. With a high-speed modem, D'Bridge acan transfer hundreds of messages in just a minute or two. GFILESH Along with messaging, D'Bridge can send files. Word processor files, spread- sheets, database files and graphic images are just a few of the types of files D'Bridge can transfer. Any file which can be put on a standard DOS storage medium may be sent anywhere in the world within minutes using D'Bridge. GFUNCTION-REQUESTSH D'Bridge also has the ability to spawn GFUNCTION-REQUESTH server tasks. These programs are designed to process received data then generate output to send back to the calling sytstem. Examples of function requests are the programs that issue "DEMO keys" and collect registration data. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 1.00 GENERAL OVERVIEW 4 --------------------------------------------------------------------------------G DESIGN PHILOSOPHY / BASIC CONCEPTS D'Bridge is a complex program that allows a user complete control over its operation. Four integrated programs are involved in the routine operation of the EMAIL system: GDB.EXEH This is the "shell" program that runs the mailer and editor. GDB01.151H This is the MAILER portion. It controls your modem both answering and originating calls; it can control your FAX card or the FAX options inside your modem at the same time. Think of the MAILER as a fancy timer/ clock allowing you to program different "events" to happen using a weekly schedule. EMAIL is transmitted only when the schedule permits; mail schedules can be set up to send all mail at the least-expensive over- night rates. GDB04.151H This is the EDITOR portion. It is very much like a word-processor in operation, but instead of documents, there are EMAIL messages. The editor allows you to enter, read and reply to messages. GDBUTIL.EXEH This is the utility program. It allows for additional functions such as SEND FILE or POLL to be executed from a batch file so that nightly data transmissions can be automated. With the PURGE option, DBUTIL will purge the message base. There are some basic terms that are important to understand when dealing with D'Bridge. There is also a complete glossary of terms located in appendix A, but here are the ones you will need in order to get started: GEMAILH Electronic mail, or in D'Bridge terms, messages that are sent directly between systems or routed through a host. EMAIL messages may be public or private and may be sent in normal or compressed (XMAIL) form. GNETmailH NETmail or network mail is the name of the EMAIL message area for messages sent directly between systems. Each NETmail message has an ORIGIN and a specific DESTINATION where it is to be sent. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 1.00 GENERAL OVERVIEW 5 --------------------------------------------------------------------------------G G ECHOmailH ECHOmail is a form of conferencing. When an ECHOmail message is entered on your system, it is automatically "echoed" to all other systems participating in the given conference. ECHOmail messages are generally not private since they can be read by the system operator of each node receiving it. ECHOmail conferences are generally topic-specific. For example, there may be an ECHOmail conference about SKIING and one about SCUBA_DIVING. This provides a means of linking lots of people throughout the world in a common forum for discussion. G XMAILH In D'Bridge terms, XMAIL simply means compressed mail. Compression is achieved through the use of common com- pression/archival programs that store a series of files inside a single archive. By default, ARC by System En- hancement Associates is used to store and compress the mail so that telephone costs may be cut. ZIP, LHA, ARJ, PAK and ZOO are also supported as standard compression methods. If you wish to use the XMAIL features of D'Bridge, you will need to get one of these supported archive programs: GZIPH PKWARE, Inc. 7545 N. Port Washington Rd. Glendale, WI 53217 GLHAH Copyright by Haruyasu Toshizaki Japan Distributed via electronic means GARJH Robert K. Jung 2606 Village Road West Norwood, MA 02062 GPAKH NoGate Consulting P.O. Box 88115 Grand Rapids, MI 49518-0115 GARCH System Enhancement Associates 21 New Street Wayne, NJ 07470 GZOOH Copyright by Rahul Dhesi Free noncommercial use permitted ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 1.00 GENERAL OVERVIEW 6 --------------------------------------------------------------------------------G G NETWORKH A NETWORK is a group of computer systems with the ability to send EMAIL on a scheduled or continuous basis. In D'Bridge, NETWORKS are defined by a NODELIST file. G NODELISTH A NODELIST is a text file containing a list of EMAIL systems in a given NETWORK. The list is in a structured form, known as the "St. Louis" format. D'Bridge needs to compile the raw list(s) into its database before a new nodelist file may be used. If you are joining a public NETWORK, you will need to obtain a copy of their NODELIST from a "network administrator". If you are setting up a private NETWORK, you will need to create your own NODELIST file. G MESSAGEH A MESSAGE is the basis of EMAIL communications. A user enters a MESSAGE in the editor and ADDRESSES it to any other system in the NODELIST. G ADDRESSH Each EMAIL MESSAGE has two addresses: the ORIGIN and DESTINATION ADDRESS. The ORIGIN is simply the ADDRESS of the system on which the message was written and the DESTI- NATION is the ADDRESS of the system where the message is being sent. In D'Bridge, addresses are broken up into four segments: ZONE, NET, NODE and POINT. Each of these segments is a number between 0 and 32767. The normal for- mat for an EMAIL ADDRESS is ZONE:NET/NODE.POINT. G ZONEH The ZONE ADDRESS is a number between 1 and 32767 desig- nating a NETWORK or geographic region. In the case of pu- blic NETWORKS, different ZONES have been used to designate completely separate NODELISTS. G NETH The NET ADDRESS is a number between 1 and 32767 designa- ting LOCAL NETWORKS. A LOCAL NETWORK consists of a HOST NODE, BOSS NODES and POINTS. G NODEH The NODE ADDRESS is a number between 0 and 32767 desig- nating the ADDRESS of an individual system. If the NODE number is 0, the system is a HOST NODE. G POINTH The POINT ADDRESS is a number between 0 and 32767 desig- nating the ADDRESS of an individual system acting as a POINT. If the POINT number is 0, the system is a BOSS NODE; otherwise, the system uses its BOSS NODE to receive mail. G BOSS NODEH A BOSS NODE is any system operating with a point address of zero. The difference between a BOSS NODE and a POINT is that BOSS NODES are listed in the NODELIST of a NETWORK, while POINTS are not. A BOSS NODE will HOLD and FORWARD EMAIL and files to its POINTS. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 1.00 GENERAL OVERVIEW 7 --------------------------------------------------------------------------------G G HOST NODEH A HOST NODE acts as a collecting point for EMAIL and HOST-ROUTED files. When a message and/or file is ROUTED, it is automatically FORWARDED for the appropriate NODES. G EVENTH An EVENT comprises of a number of scheduled parameter changes in order to control EMAIL routing or to execute a series of DOS commands at preprogrammed intervals. The SCHEDULE may hold a maximum of 64 EVENTS that tell D'Bridge what to do. D'Bridge features four basic modes of operation: GMAILERH The normal mode of operation, the MAILER mode of D'Bridge is normally running 24-hours/day unless you are running D'Bridge only at certain times. While in the MAILER mode, D'Bridge sends and receives EMAIL and files based on a preprogrammed schedule. The MAILER mode offers a completely unattended method for scheduled transfers of data between personal computer systems. The user has the ability to control the queue of outbound file-transmissions and file-requests as well as XMAIL and standard EMAIL. No mail will be sent if the system is not left in MAILER mode when not in use by the operator. GEDITORH The EDITOR mode allows you to enter and read EMAIL messages sent and received by D'Bridge. The EDITOR is a specialized word-processor designed to offer powerful functions through a clear and simple user interface. The editor can be configured to read hundreds of local and ECHOmail areas as well as standard EMAIL. GTERMINALH The TERMINAL mode allows D'Bridge to act as a ANSI terminal allowing the user to call other systems such as Bulletin Board Systems (BBS) or commercial systems such as CompuServe. This mode provides upload and download capability plus the ability to set up a custom dialing directory of systems frequently called. GCONFIGURATIONH The CONFIGURATION mode of D'Bridge consists of a series of parameter screens providing complete control over the operation of the software. There are hundreds of user-definable parameters controlling the scheduling, communications and routing of the EMAIL. For added security, a password may be required to enter the various CONFIGURATION screens. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 2.00 SOFTWARE INSTALLATION 8 --------------------------------------------------------------------------------G 2.00 SOFTWARE INSTALLATION Installing D'Bridge from the release GZIPH file is quick and easy. First, make sure that you mave a copy of both GPKZIP.EXEH and GPKUNZIP.EXEH in the DOS PATH. PKZIP is a compression/decompression system available from: GPKWARE, Inc.H G7545 N. Port Washington Rd.H GGlendale, WI 53217H 4This program is available as a SHAREWARE product and is available for file-5 4request from most of our dealers in the DBNET nodelist. It is REQUIRED for5 4D'Bridge operation.5 Next, unZIP the release file, DB-G140.ZIPH into a subdirectory of your choice. Assuming that the ZIP file is on a floppy in drive B: type the following DOS commands: ie. C>GMD \DBH C>GCD \DBH C>GPKUNZIP B:DB-140H At this point, you should have three files in the \DB directory that came from the release ZIP file: GDB-140.EXEH GDB-140.DOCH GREAD.MEH To install 4or5 upgrade D'Bridge, simply type the command DB-140 in the \DB directory: C>GDB-140H The installation program will walk you through the installation process. Once the installation is complete, the file GDB-140.EXEH will be erased. Proceed to the next chapter for basic EMAIL configuration. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 2.01 BASIC EMAIL SETUP 9 --------------------------------------------------------------------------------G 2.01 BASIC EMAIL SETUP In order to gain a complete understanding of D'Bridge, we suggest that you use the following guideline to initially configure the software. Using this section, follow along step-by-step as we install an operati- onal system. 1. When D'Bridge is first loaded, it will perform a series of tests on its environment, files and peripherals. There are several warning messages you may see in the LOG window. Here's a summary of these warnings and what they mean: GWARNING: Unable to initialize modemH This warning means that there is a modem defined but D'Bridge is unable to communicate with it. The software expects an "OK" response when the initialization string is sent to the modem. A number of things could cause this problem, the most likely being that a cable is loose, the modem is off or something is set wrong in the COMM/MODEM setup screen; see SECTION 3.03 for more information. GWARNING: 64K free RAM needed for ECHOmailH If there is not at least 64K of memory free when you run D'Bridge, ECHOmail processing is not possible. Increase the environment size, remove unnecessary TSR programs, try to load DOS into High RAM, if your systems is equipped with that feature or, if possible, install additional RAM chips in your computer. GWARNING: Unable to open log fileH The LOG FILE that is defined on the BASIC CONFIG screen has an invalid name or can't be created for some reason. Check the drive and path; see SECTION 3.01 for more information. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 2.01 BASIC EMAIL SETUP 10 --------------------------------------------------------------------------------G GNOTE: "Demo" key has 27 days left!H Your demonstration license key will expire in 27 days. This warning will only appear if you are running a demo copy of D'Bridge. This is here for two reasons: to remind you that the software is not free and to make sure that you order a permanent license before your demo key expires. GERROR: Insufficient disk space on C:H There is not enough disk space for D'Bridge to operate. This is based on the values established on the DISK MINIMUMS screen. The solution to this problem is either to free some disk space on the "offending" drive or use DB SETUP to change the DISK MINIMUMS. (Typing "DB SETUP" from the DOS command line will allow you to use the configuration menus without D'Bridge coming online). 2. When the top-left corner of the screen says "IDLE," you may press the ESC key to display the main menu. Pressing the ESC key a second time will return the system to IDLE mode. Select menu items by using the ARROW keys to move to the desired option, then press ENTER. Pressing the first letter of any option will select that option im- mediately without any other keystrokes. 3. On the EDITOR menu, select the SETUP EDITOR OPTIONS option. (Pressing ESC-E-S is a quick way of getting to this menu from the IDLE state.) Choose answers for all the fields on this screen. If you're not sure about a field, leave it blank or accept the pre- programmed "default"; refer to SECTION 3.15 for more information. 4. On the CONFIG menu, select each of the following options and fill-in all the fields with the appropriate information. Again, if you don't understand something, just accept the "default" value or leave it blank. Screen Section BASIC CONFIGURATION 3.01 DIRECTORY PATHS 3.02 COMM/MODEM SETUP 3.03 NODELIST CONFIGURATION 3.05 ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 2.01 BASIC EMAIL SETUP 11 --------------------------------------------------------------------------------G GH 5. If you run a bulletin board system (BBS,) setup the information on the ADVANCED MENU, BBS CONFIGURATION screen; refer to SECTION 3.10 for more information on this screen. 6. Next, if there are certain mail schedules required for your NETWORK, you can set them up in the SCHEDULE MAINTENANCE option of the CONFIG menu. Typically, a NETWORK will have at least one MAIL EVENT each night. During these events, EMAIL and files are allowed to be sent; this allows EMAIL entered during the day to be transmitted at night, yielding the highest savings in tele- communication costs. See SECTION 3.04 for more information. 7. At this point, your system should be configured for basic EMAIL operation. Assuming that you defined a NODELIST on the NODELIST CONFIGURATION screen, it must be compiled before D'Bridge can use it. The NODELIST always gets compiled when the system is brought up and a new NODELIST exists. If you haven't left the program, you can force a nodelist compile by using the BUILD NODELIST DATABASE on the UTILITIES menu. This process takes a few minutes, so be patient. 8. Now EMAIL is fully configured and you may continue by reading SECTION 2.02, BASIC ECHOMAIL SETUP. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 2.02 BASIC ECHOMAIL SETUP 12 --------------------------------------------------------------------------------G 2.02 BASIC ECHOMAIL SETUP It is assumed you've completed the previous section and set up most of the parameters on all the menus listed. If you haven't done this, please go back and read the previous section as you configure D'Bridge. Before you configure the ECHOmail subsystem, it is a good idea to have a general understanding of what it is and how it works. Once properly configured, the D'Bridge ECHOmail processor is completely automatic in operation. - What is ECHOmail? ECHOmail is a facility allowing for EMAIL-based conferencing in any number of message areas at the same time. An ECHOmail message differs from a NETmail message only in that there is no DESTINATI- ON ADDRESS for an ECHOmail message; it gets sent to ALL systems participating in a given conference. With ECHOmail, you have the capability of sharing ideas with other people in SPECIAL INTEREST GROUPS or SIGS. A conference is created for each topic of discussion and you may participate in as few or as many as you wish. When you enter a message, it is automatically forwarded to all the other nodes you are linking to the conference. In turn, all the other nodes forward the message to all the nodes they link to; the process continues until your message has been seen by every system participating in the conference. Your message can be sent to THOUSANDS of systems if a conference is interesting enough to attract a large and widespread "audience"! ECHOmail is a unique form of communications. People living thousands of miles apart can carry on a public discussion on any topic or in- terest they have in common. During the Gulf War the CNN television network featured a report about D'Bridge being used for fast commu- nications between American soldiers and their families at home. In fact, within several days a special purpose all-D'Bridge SaudiNet had been set up for this particular purpose. While it took regular mail several weeks to get to its destination, D'Bridge carried Mega- bytes of messages back and forth between the Gulf Region and the States within minutes! ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 2.02 BASIC ECHOMAIL SETUP 13 --------------------------------------------------------------------------------G An example of some public ECHOmail conferences anyone may partici- pate in are: DBRIDGE D'Bridge users conference HUMOR Sick jokes and humor POLITICS International political discussion SYSOP International Sysop ECHO ZMODEM Discussion about the ZMODEM protocol For more information about how to receive public ECHOmail, contact any of our support nodes and we'll be glad to help you. - How does ECHOmail work? Each ECHOmail conference is actually an entire network within itself. An ECHOmail network is defined by its TOPOLOGY or the way in which the network interconnects. The following chart describes the topology of an ECHOmail conference from my system's point-of-view. (This is just an example...) -------------------- 1:110/68 (my system) ---------+---------- | | | /-----------+------------+-----+-----+-------------+-------------\ | | | | | | ---+--- ----+---- ----+---- ---+----- ----+----- ----+----- 1:105/3 1:107/150 1:150/613 1:3601/14 2:512/1006 1:110/68.1 ---+--- --------- --------- ---+----- ----+----- ---------- | | | +-----------+------------\ | +-------\ | | | | | | ---+---- ---+---- ----+---- ---+----- ---+----- | 1:105/10 1:105/50 1:105/300 1:3601/14.1 2:280/280 | -------- -------- ----+---- --------- --------- | | | +----------------\ | | | | -----+------ -----+------ -----+------ 1:105/300.14 1:105/300.68 2:512/1006.1 ------------ ------------ ------------ ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 2.02 BASIC ECHOMAIL SETUP 14 --------------------------------------------------------------------------------G To understand what topology is and how messages get to all the systems in the conference, let's take an example of a message entered on 1:105/300.68 replying to a message from 2:512/1006.1... The message would pass through the following systems to make it to its final destination: 1:105/300.68, 1:105/300, 1:105/3, 1:110/68, 2:512/1006, 2:512/1006.1 This could take anywhere from a few hours to a few days depending on the events running on the different systems; the message must be forwarded through four different systems before making it to 2:512/1006.1! You will notice the topology (interconnection) is in the form of a tree starting with my address at the top. ECHOmail topology is different from every system's point-of-view. In the above network, there may be links I am not aware of. For example, I have no way of knowing to which points 1:105/300 is sending the ECHOmail. The tree looks completely different from his point-of-view. The main thing to remember is never to have more than once "source" of an ECHO. It is fine to forward an echo to several other systems, but make sure all topology follows this tree structure and never causes any loops. Most networks have an ECHOmail coordinator whose job it is to ensure the validity of the local network topology. If you are a member of a public network, you should always contact the ECHOmail coordinator before setting up any ECHOmail links. IMPROPER TOPOLOGY ACCEPTABLE TOPOLOGY /-----------\ /-----------\ | | | | ---+--- ---+--- ---+--- ---+--- 1:134/2 1:134/5 1:134/2 1:134/5 ---+--- ---+--- ---+--- ---+--- | | | | ---+--- ----+---- ---+--- ----+---- 1:134/3 1:134/150 1:134/3 1:134/150 ---+--- ----+---- ------- --------- | | \-----------/ ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 2.02 BASIC ECHOMAIL SETUP 15 --------------------------------------------------------------------------------G OPTIMUM TOPOLOGY System FORWARD TO a ------ ---------- ------- 1:134/2 1:134/3 1:134/5 1:134/150 1:134/2 1:134/3 1:134/2 ---+--- 1:134/5 1:135/2 | 1:134/150 1:135/2 /-----------+-----------\ b | c | d | ---+--- ---+--- ----+---- 1:134/3 1:134/5 1:134/150 ------- ------- --------- While configuring basic ECHOmail capabilities, read the follo- wing sequence of instructions to gain a greater understanding of D'Bridge. 1. From the CONFIG menu, select the PACKET/MAIL CONTROL screen. Using this screen, set the ECHOmail-related parameters like this: Inbound mail handling? Automatic Kill null msgs? Yes Kill In-transit msgs? Yes In-transit rescan? Yes Secured ECHOmail only? No Save ECHOmail SEENBYs? No Save duplicate messages? No Auto-add ECHOmail areas? No (for now) Accept AREAFIX requests? Yes Remove empty PASSTHRUs? Yes 2. Next, select the XMAIL CONTROL screen. Here, you should already have defaults displayed for each of the compression commands. If you are using different archive programs than the ones specified, change them as appropriate, but remember the formats of the ARC, ZIP, LHA, ARJ, PAK or ZOO files must be the same. Specify "30" for "XMAIL processing interval" Specify "200" for XMAIL packet size limit" XMAIL uses the ARC program by default, but you may specify which compression methods to use for which systems on this screen. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 2.02 BASIC ECHOMAIL SETUP 16 --------------------------------------------------------------------------------G GH 3. On the ADVANCED menu, select the DISK SPACE MINIMUMS screen. D'Bridge comes preprogrammed with suggested minimum disk space criteria. If you plan to use more than one hard-drive to store the message bases or queue directory, make sure you specify minimums for them on this screen. 4. On the EDITOR menu, select the ECHOMAIL AREAS screen. Following the directions listed in SECTION 3.16, create all the ECHOmail areas you will be using. In the FORWARD TO fields, list the addresses of the systems you want to set up ECHOmail links for. 5. That's all there is to it. For ECHOmail to work, you must verify the following things: a. D'Bridge reports at least enough free memory as it takes to run the compression and decompression programs specified on the XMAIL CONTROL screen. When D'Bridge first comes online, it says how many bytes of memory are available. Typically, this must be around 100K, depending on the compression programs you are using. b. The compression programs specified must exist in the current default path. c. There is enough free disk space; there will be a warning at the bottom of the screen if disk space is too low to unpack or forward ECHOmail. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.00 SYSTEM CONFIGURATION AND MAINTENANCE 17 --------------------------------------------------------------------------------G 3.00 SYSTEM CONFIGURATION AND MAINTENANCE D'Bridge is configured by using a series of configuration options on the GEDITORH, GCONFIGH and GADVANCEDH menus. These options give you complete control over all features and settings and, if improperly set, result in bad performance or malfunction. It is therefore advised that only the system operator have access to the maintenance functions. Configuration screens may have a password assigned, using the GConfig passwordH parameter on the GBASICH GCONFIGURATIONH screen. The following menu options comprise the configuration/maintenance sub-system of D'Bridge: GSetup editor optionsH GECHOmail areasH GKeyboard macrosH GTranslation tableH GBasic configurationH GDirectory pathsH GComm/modem setupH GSchedule maintenanceH GNodelist configurationH GPacket/Mail controlH GXMail controlH GTime adjustment dataH GFunction keysH GBBS configurationH GSecurity/MiscellaneousH GDisk space minimumsH GAccounting/TranslationH GZMODEM parametersH GXport configurationH GWindow colorsH All these options are described in detail in the following sections. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.01 BASIC CONFIGURATION 18 --------------------------------------------------------------------------------G 3.01 BASIC CONFIGURATION The GBASIC CONFIGURATIONH screen allows control over the "basic" functions of D'Bridge such as: - System log - Primary and Alias EMAIL addresses - System name - Operator name - Location or City - Data phone number - Flags - Alarms - Configuration password SYSTEM LOG LEVEL System log level: GVerboseH (GNHone/GTHerse/GVHerbose/GDHebug) This controls the level of detail being written to the system log file. D'Bridge allows three levels of activity logging; it is high- ly recommended you select VERBOSE until you are familiar with the complete operation of D'Bridge Email System. /---------+----------------------------------------------------------------\ | GNONEH | Creates NO log whatsoever. Using this option, problems will | | | be difficult to resolve, once detected. | | | | | GTERSEH | Writes only the important data, such as connections, events, | | | and file-transfer information. | | | | | GVERBOSEH | Writes ALL information displayed in the log window. | | | | | GDEBUGH | Same as VERBOSE, except the times are recorded in the log | | | using fractional seconds. (HH:MM:SS.hh) | \---------+----------------------------------------------------------------/ ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.01 BASIC CONFIGURATION 19 --------------------------------------------------------------------------------G PURGE LOG AFTER Purge log after: G7 H (days) This specifies the number of days to retain the information in the system log file. Every day, all log entries older than the specified number of days will be erased from the current log file. This purge occurs during the GAutoUpdateH event at midnight. 4 * NOTE * 5 This feature is not yet implemented. LOG FILENAME Log filename: GC:\DB\DBRIDGE.LOG H D'Bridge normally keeps a "log" of all activity so that you may review its performance. Here, you specify the name of the file (including the directory if you wish) to which D'Bridge will write its log. This file contains the information displayed in the upper-left window including such data as incoming and outgoing calls, file-transfer statistics and event activation. CPS DISPLAY UNIT CPS display unit: GbpsH (GbpsH/GcpsH/GkpmH/G%H) This setting determines the method to use when reporting the effective speed of a data transfer. These measurements are displayed in the ACTIVITY window during an online mail session. The value of this parameter has absolutely no effect on the actual speed of a transfer. /-----+----------------------------------------------------------------\ | GbpsH | Bits per second @ 10 bits per byte. ie. 17100 bps | | | | | GcpsH | Characters or bytes per second. " 228 cps | | | | | GkpmH | Kilobytes per minute. (cps x 1024) " 94.2 kpm | | | | | G%H | Percentage of reported baud rate. " 113.2% | \-----+----------------------------------------------------------------/ ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.01 BASIC CONFIGURATION 20 --------------------------------------------------------------------------------G PRIMARY ADDRESS Primary address: G1:110/68.1 H This specifies your primary system address. This (like all addresses) must be in the format: <GZONEH:GNETH/GNODEH.GPOINTH@GdomainH> If you are a member of an already-existing network, contact your network coordinator for an address assignment. If you're not sure, just pick arbitrary numbers for now and change them later. /--------+------------------------------------------------------------\ | GZONEH | Continent or nodelist designator 1=US, 2=Europe, etc. | | | | | GNETH | Usually represents a local calling area (1..32767.) | | | | | GNODEH | Specific system address within a ZONE and NET. | | | | | GPOINTH | Zero unless running as a "point" of another system. | | | | | GDOMAINH | 4 * NOTE * 5 Domains are not supported yet. | \--------+------------------------------------------------------------/ ALIAS ADDRESSES Alias addresses: G201:201/0 FOR 201:ALL H This specifies your secondary (alias) addresses. The field must be in the format: <GaddressH> [FOR <GfilterH>] If you are a member of multiple networks, specify your main address in the "Primary address" field and all other origin addresses here. The filter controls the automatic alias function. In the above example, any mail, AREAFIX requests or transactions with any zone 201 address will be sent using 201:201/0 as the origin address. The primary address is used in all cases where there is no match with an alias address filter. (See GPRIMARY ADDRESSH for information about EMAIL address formats.) ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.01 BASIC CONFIGURATION 21 --------------------------------------------------------------------------------G SYSTEM NAME System name: GFactory Second Parachutes, Inc. H When D'Bridge communicates with a remote site, the SYSTEM NAME is displayed on the other system's screen along with OPERATOR NAME, CITY and your primary and alias addresses. This field should match the SYSTEM NAME field of your nodelist entry. SYSTEM CITY System city: GMiddletown, OH H When D'Bridge communicates with a remote site, the SYSTEM CITY is displayed on the other system. Make sure it is not duplicated in the SYSTEM NAME field (it would be redundant...). This field should match the CITY field of your nodelist entry. OPERATOR NAME Operator name: GChris Irwin H When D'Bridge communicates with a remote site, the OPERATOR NAME is displayed on the other system and placed in its system log file. This name will also be used in the "FROM" field in the editor, when entering a NETmail or ECHOmail message. This field should match the OPERATOR field of your nodelist entry. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.01 BASIC CONFIGURATION 22 --------------------------------------------------------------------------------G DATA PHONE Data phone: G1-513-821-1387 H When D'Bridge communicates with a remote site, the DATA PHONE field is transmitted to the other system for automatic addition to their nodelist database. If you fail to specify this number correctly, it will not be possible for the remote site to return an answer to your mail directly. If you are using a voice line or do not wish to disclose this number to the public, DO NOT LIST IT HERE. Use "G-Unlisted-H" to designate the number as private. This data is exchanged during the initial EMSI handshake. 4* NOTE *5 For proper translation, phone number MUST be in the format: <GCOUNTRY CODEH>-<GCITY CODEH>-<GNUMBERH> CAPABILITY FLAGS Capability flags: GXX,CM,V32 H This specifies your system's capabilities. Each Gcapability flagH is separated by commas. These flags are transmitted to the remote site during the initial EMSI handshake. With this information stored in a system's nodelist, it is possible to determine modem type, hours of operation and file-request capability. Following is a partial list of standard capability flags: /-----+----------------------------------------------------------\ | GCMH | Continuous mail system. (On 24-hours every day) | | | | | GXXH | WaZOO file-requests and update-requests are accepted. | | | | | GV32H | Modem conforms to the V.32 standard. | | | | | GHSTH | Modem conforms to the US Robotics HST standard. | | | | | GPEPH | Modem conforms to the Telebit Trailblazer standard. | \-----+----------------------------------------------------------/ ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.01 BASIC CONFIGURATION 23 --------------------------------------------------------------------------------G AUDIO ALARMS Audio alarms? GYesH (GYHes/GNHo) This parameter controls the PC's speaker, enabling or disabling the audio alarms. These alarms will alert the operator of incoming calls and new mail received. If you specify GNoH, all automatic alarms will be disabled. ALARM HOURS Alarm hours: G24 hoursH -or- Alarm hours: G08:00H until G23:00H This parameter controls the time of day during which the audio alarms may be heard. This has no effect if the GAudio alarmsH are disabled. Either specify nothing (for 24 hours) or enter both starting and ending times. Use 24-hour format to describe times after 12 noon. If the starting time is before the ending time, the period includes midnight. RING SIGNAL Ring signal? GYesH (GYHes/GNHo) This parameter enables or disables the PC's speaker when the phone is ringing because of an incoming call. This has no effect unless the GAnswering methodH is configured for GHardwareH or GRingMasterH on the COMM/MODEM SETUP screen. This signal is only heard during the allowed time period. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.01 BASIC CONFIGURATION 24 --------------------------------------------------------------------------------G CALL ALARM Call alarm: GT120L8CGL4E H This parameter would normally be blank, indicating that the standard alarm tones should be used. However, some people get tired of hearing the same alarm every day, so this field gives you the opportunity to write your own musical alarm. Either specify the music codes or the name of a text file containing the notes. Standard ANSI music codes are used, in fact, they are the same as the "PLAY" statement in MicroSoft's BASICA. Following is a chart of legal music commands: /--------+--------------------------------------------------------\ | GAH .. GGH | The musical notes A thru G. A note may be followed | | | by an accidental ('G#H' or 'G+H' for sharp and 'G-H' for | | | flat.) Additionally, a note (With optional sharp or | | | flat) may also be followed by a number denoting the | | | note length (1 for a whole note thru 64 for a 64th) | | | The note, with optional accidental and length, may | | | also be followed by one or more dots ("G.H"), each of | | | which extends the note by one half of its existing | | | value. For example, two dots produce a length 9/4ths | | | the original value, and three dots 27/8ths the value. | | | | | GLHn | Specifies the default length of the notes following | | | ("n" must be G1H for a whole note thru G64H for a 64th | | | note.) The default value is G4H (quarter note.) | | | | | GMHz | Specifies the fraction of the note length that the | | | note is actually sounding. "z" is either "GSH," "GNH" | | | or "GLH", which have these meanings: | | | | | | GMSH Music staccato (3/4 of note length) | | | GMNH Music normal (7/8 of note length) | | | GMLH Music legato (all of note length) | | | | | GOHn | Specifies the octave in which the notes following | | | are to be played (G0H thru G7H). The initial default | | | octave is G3H, which is the octave beginning at | | | middle C. | | | | ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.01 BASIC CONFIGURATION 25 --------------------------------------------------------------------------------G GH | GPHn | Specifies that no sound is to be made for an | | | interval. "n" (optional) is the note length (G1H | | | for a whole note thru G64H for a 64th note.) If "n" | | | is omitted, the current default note length is used. | | | One or more dots may follow, each of which extends | | | the rest by one half of its existing value. | | | | | GTHn | Specifies the tempo in beats per minute (G32H thru | | | G255H.) The initial default value is G120H. | \--------+--------------------------------------------------------/ SPECIAL ALARMS Special alarms: G135/ALL T180L8O4GGGAAACD. H If you would like to be notified when certain systems call, specify the address followed by the music codes you wish to hear. The format for the music is specified in the preceding section. The alarm will be heard after the call is complete, but only if new messages or files have been received. CONFIG PASSWORD Config password: GSECRET H In a corporate environment where there may be several people using the EMAIL system, it may be desirable to put a "lock" on the configuration menu to prevent accidental changes of the D'Bridge configuration. If a password is specified here, then it must be entered when any of the SETUP menu options are selected. It only needs to be entered once for each time D'Bridge is run. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.01 BASIC CONFIGURATION 26 --------------------------------------------------------------------------------G HISTORY DAYS Keep history for: G7 H (days) D'Bridge automatically maintains history files for INBOUND and OUTBOUND EMAIL calls as well as ECHOmail and AREAFIX requests. These files are automatically purged every night at midnight. This field defines how many days of history to keep before purging it. The default value for this option is 7, providing one week's history. DISPLAY TIMEOUT Display timeout: G5 H (Minutes) D'Bridge features a built-in "screen-saver" which will blank your video screen after a specified period of inactivity. The DISPLAY TIMEOUT parameter specifies the number of MINUTES of inactivity before the screen goes blank. If a call comes in, a scheduled event starts, or you press any key, the screen will re-display and the timer starts over. When the screen is blank, D'Bridge is still fully-functional - just waiting for something to happen! If you do not want the screen to ever go blank, enter a zero ("0") and the display timeout will be disabled. BLANKOUT GRAPHICS Blankout graphics? GYesH (GYHes/GNHo) When the D'Bridge screen is blanked due to inactivity, you have the option to display "blankout graphics." If you answer YES to this question, there will be a bouncing pattern of dots that will tell you at a glance D'Bridge is still running and you haven't had a system crash or something terrible like that. Most computers hate to be bored and do nothing all day; blankout graphics make your system happy by giving it something to do when nothing else is going on... ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.02 DIRECTORY PATHS 27 --------------------------------------------------------------------------------G 3.02 DIRECTORY PATHS The GDIRECTORY PATHSH screen allows you to set which drives and subdirectories D'Bridge will use. Parameters include: - Network mail storage - Inbound files path - Temporary queue path - Outbound queue path - Script file path - Bad ECHOmail path - New ECHO area path - "ABOUT" and "FILES" filenames - Request paths - Specific requests - Inbound, outbound, ECHOmail and AREAFIX history NETWORK MAIL STORAGE Network mail storage: GFido H (GFHido/GQHuickBBS) D'Bridge gives you the option of two storage methods for NETmail: /----------+---------------------------------------------------------------\ | GFIDOH | This method uses one .MSG file for each message. This has | | | the advantage of being compatible with a great number of | | | third-party utility programs. | | | | | GQUICKBBSH | This method uses a single set of database files for all the | | | messages. The advantage is increased speed and a savings | | | of disk space. | \----------+---------------------------------------------------------------/ ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.02 DIRECTORY PATHS 28 --------------------------------------------------------------------------------G NETWORK MAIL PATH Network mail path: GC:\DB\MESSAGES H Specify the directory path to use for Fido-style NETmail messages. This directory will contain the files such as: GDirectory of C:\DB\MESSAGESH G1 MSG 1847 12-06-91 11:15aH G2 MSG 1511 12-06-91 11:15aH G3 MSG 1459 12-06-91 11:54pH . . Gnnnn MSG 505 12-15-91 11:07aH QUICKBBS AREA NUMBER QuickBBS area number: G17 H Specify the area number you would like to use for NETmail messages using the QuickBBS message base. (G1H-G200H) INBOUND FILES PATH Inbound files path: GC:\DB\FILES H This designates the drive and path for the directory where inbound files will be stored. Make sure there is always enough disk space available to store any files which may be received. This may be changed at any time without adversely affecting the system, as long as the specified directory path actually exists. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.02 DIRECTORY PATHS 29 --------------------------------------------------------------------------------G TEMPORARY QUEUE PATH Temporary queue path: GC:\DB\PACKETS H This designates the drive and path for the temporary directory where the outbound NETmail queue will be created. 4* NOTE *5 GAll files in this directory will be automatically erasedH Geach time the queue is rebuilt.H OUTBOUND QUEUE PATH Outbound queue path: GC:\DB\QUEUE H This designates the drive and path for the outbound queue directory. XMAIL archives and poll, transmit, and request queue entries are stored in this directory. SCRIPT FILE PATH Script file path: GC:\DB\SCRIPTS H This designates the drive and path where the dialing script files are located. Script files provide an alternate method of dialing when using carriers other than standard long-distance telephone lines. BAD ECHO PATH Bad echo path: GC:\DB\BADECHO H This designates the drive and path where invalid or unknown ECHOmail messages should be stored. The GBADECHOH messages are stored in Fido format and may be accessed using area 9999 in the editor. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.02 DIRECTORY PATHS 30 --------------------------------------------------------------------------------G NEW ECHO PATH New echo path: GC:\DB\NEWECHO H This designates the drive and path where Fido-style ECHOmail message bases will be created if GAuto-add areasH is configured for "GFHido." 4* NOTE * 5 See GPACKET/MAIL CONTROLH for further information. QUICK DIRECTORY PATH Quick directory path: GC:\QUICKBBS H This designates the drive and path where the QuickBBS database files will be stored. If they do not already exist, D'Bridge will create them automatically. The following files are used: GDirectory of C:\QUICKBBSH GMSGINFO BBS 406 06-05-92 11:01aH GMSGIDX BBS 2346 06-05-92 11:01aH GMSGHDR BBS 146234 06-05-92 11:01aH GMSGTOIDX BBS 28152 06-05-92 11:01aH GMSGTXT BBS 1012480 06-05-92 11:01aH DFB PATH DFB path: GC:\DB\DFB H This designates the drive and path where the DFB files are located. This is for the GD'Bridge FileBaseH indexing system. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.02 DIRECTORY PATHS 31 --------------------------------------------------------------------------------G ABOUT FILENAME "ABOUT" filename: GC:\DB\110-68.TXT H The "ABOUT" file is used mainly with the "Public Amateur Network" to contain general information about your system. The "ABOUT" file name should specify the name of a text file to be transmitted when a file- request for "ABOUT" is received. (For more information, see the section about file-requests.) FILES FILENAME "FILES" filename: GC:\DB\110-68.LST H The "FILES" file is used primarily with the "Public Amateur Network" to provide a list of all requestable files on your system. The GFILESH GfilenameH should point to this text file or archive. REQUEST PATHS Request paths: GC:\PRIVATE\ SECRET H D'Bridge has a feature allowing other systems to call in and request files from your system. If you wish to enable this option, you must specify which directories will be available for request. You may also specify a password that must accompany a request. If you use no pass- word, any system will have access to the specified directory. The format for the request paths is: <GDIRECTORY PATHH> <GOPTIONAL PASSWORDH> Where password is an optional parameter. Any number of directories may be specified in the REQUEST PATHS window. Make sure to use passwords on any directory containing sensitive or confidential information. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.02 DIRECTORY PATHS 32 --------------------------------------------------------------------------------G SPECIFIC REQUESTS Specific requests: GDBRIDGE C:\FREQ\DB*.ZIP H This window allows you to specify any number of "magic filenames" that may be requested from your system. An example of this might be where you distribute a newsletter and the filename changes every month. You might have a line like: GNEWS \NEWSLTR\PC-NEWS.021H The above line means that when a file-request arrives for "NEWS" - the file \newsltr\pc-news.021 will be transmitted instead of searching the directories specified in REQUEST PATHS. The format for this window is: <GMAGIC NAMEH> <GFILE PATHH> <GOPTIONAL PASSWORDH> Once again, password is optional, but should be specified if any of this information is not public. OUTBOUND HISTORY FILENAME Outbound history file: GC:\DB\OUTBOUND.TXT H The OUTBOUND HISTORY FILENAME parameter specifies a text file to write an outbound EMAIL history log. Every outbound connection is logged to a the specified text file listing the date/time, address, data sent and received, elapsed time and total cost. If you do not want such a log, leave this field blank. INBOUND HISTORY FILENAME Inbound history file: GC:\DB\INBOUND.TXT H The INBOUND HISTORY FILENAME parameter specifies a text file to write an inbound EMAIL history log. Every outbound connection is logged to the specified text file listing the date/time, address, data sent and received and elapsed time. If you do not want such a log, leave this field blank. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.02 DIRECTORY PATHS 33 --------------------------------------------------------------------------------G ECHOMAIL HISTORY FILENAME ECHOmail history file: GC:\DB\ECHOMAIL.TXT H The ECHOMAIL HISTORY FILENAME specifies what text file to use for the inbound ECHOmail history. This log lists date/time, address, area name, messages and duplicates received. AREAFIX HISTORY FILENAME AREAFIX history file: GC:\DB\AREAFIX.TXT H The AREAFIX HISTORY FILENAME specifies what text file to use for an AREAFIX history log. This includes information about conferences added and removed either by remote AREAFIX request or New ECHOmail link, ALT-N. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.03 COMM / MODEM SETUP 34 --------------------------------------------------------------------------------G 3.03 COMM / MODEM SETUP The GCOMM/MODEM SETUPH screen allows you to define your serial port(s) and modem(s) as well as control such things as: - Answering method - Line assignment - CostGuard limits - DimeSaver - Auto-initialization time - Dialing overrides - Printer setup - Inbound, outbound, ECHOmail and AREAFIX history Before D'Bridge can function as an EMAIL system, it must be able to control the serial port and modem. This screen allows the definition of modem and printer types: MCF and PCF files (Modem Control and Printer Control Files.) PORT Port Base/IRQ Status Ident MCF name Description GCOM3H G H G H G H G H G H G H The PORT identifies the name of the serial I/O channel connected to your modem. Standard values are GCOM1H-GCOM7H, but any other name is allowed also. If you select one of the standard ports, the GBASE ADDRESSH an GIRQH values will be calculated automatically. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.03 COMM / MODEM SETUP 35 --------------------------------------------------------------------------------G BASE ADDRESS Port Base/IRQ Status Ident MCF name Description G H G03E8H G H G H G H G H G H The BASE ADDRESS determines the CPU's I/O port address to use. If you do not understand what this means, you should use a standard port, like GCOM1H or GCOM2H. If you do have a non-standard configuration, consult your vendor for this information. This field must contain a 16-bit 4hexadecimal5 value. Standard values are listed below. IBM PC/XT/AT IBM PS/2 /------+--------\ /------+--------+------+--------\ | GCOM1H | 03F8 | | GCOM1H | 03F8 | GCOM5H | 4220 | | GCOM2H | 02F8 | | GCOM2H | 02F8 | GCOM6H | 4228 | | GCOM3H | 03E8 | | GCOM3H | 3220 | GCOM7H | 5220 | | GCOM4H | 02E8 | | GCOM4H | 3228 | GCOM8H | 5228 | \------+--------/ \------+--------+------+--------/ IRQ Port Base/IRQ Status Ident MCF name Description G H G H G4H G H G H G H G H The IRQ 4(Interrupt ReQuest)5 level determines the hardware-specific interrupt vector that will be used. (G3H and G4H are most common) This field must con- tain a 4-bit 4decimal5 value from 0 to 15. Standard values are listed below. IBM PC/XT/AT IBM PS/2 /------+-----\ /------+-----+------+-----\ | GCOM1H | 4 | | GCOM1H | 4 | GCOM5H | 3 | | GCOM2H | 3 | | GCOM2H | 3 | GCOM6H | 3 | | GCOM3H | 4 | | GCOM3H | 3 | GCOM7H | 3 | | GCOM4H | 3 | | GCOM4H | 3 | GCOM8H | 3 | \------+-----/ \------+-----+------+-----/ ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.03 COMM / MODEM SETUP 36 --------------------------------------------------------------------------------G MCF NAME Port Base/IRQ Status Ident MCF name Description G H G H G H G H G H GUSRC1438H GUS Robotics HST 14400 H The MCF NAME specifies the name of a D'Bridge "4Modem Control File5." Included, you will find an 4ZIP5 file which contains our standard MCF collection. If you press GF10H, you will receive a list of all modems currently supported. Simply select the 4Modem Control File5 to use for the specified serial port. When you select a different MCF or specify one for the first time, D'Bridge will 4unZIP5 the file if needed from GMCFILES.ZIPH. A list of files, modems and ident (ATI) codes are displayed from the list in GMCFILES.LSTH. MCF files are simple control files that may be changed using any standard text editor. The following control language is used. Keywords are not case-sensitive, but must start in column 1 or they will be ignored. Invalid syntax is ignored without error to allow backward / forward compatibility. MCF <GNAMEH> <GDESCRIPTIONH> ie. 4MCF USRC1419 US Robotics HST 144005 <GNAMEH> must match the DOS filename (without the extension.) <GDESCRIPTIONH> is the displayed modem type. GMCFH This must always be the first line of a 4Modem Control File5. BAUD <GBAUD RATEH> ie. 4BAUD 192005 <GBAUD RATEH> is 300, 1200, 2400, 4800, 9600, 19200 or 38400. LOCKED ie. 4LOCKED5 (no parameters) This causes D'Bridge to always use the specified baud rate, regardless of the "GCONNECTH" results reported by the modem. If you are using this mode, the modem must also be configured to use a fixed DTE rate. 4&B15 is used on HST's, for example. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.03 COMM / MODEM SETUP 37 --------------------------------------------------------------------------------G DELAY <GMILLISECONDSH> ie. 4DELAY5 50 This specifies the inter-character delay in milliseconds when sending commands to the modem. The default is G20H, but some modems may require values as high as G50H or G60H. TIMEOUT <GSECONDSH> ie. 4TIMEOUT5 75 This specifies the failsafe timeout when dialing or answering the phone. This defaults to G60H, but might need to be increased if overseas calls take longer than one minute to complete. DIAL <GBAUD RATEH> <GMODEM STRINGH> ie. 4DIAL 19200 ATDT5 <GBAUD RATEH> is 300, 1200, 2400, 4800, 9600, 19200 or 38400. <GMODEM STRINGH> is the command sent to the modem before the phone number. ANSWER <GMODEM STRINGH> ie. 4ANSWER ATA5 <GMODEM STRINGH> is the command sent to the modem to answer the phone. INIT <GMODEM STRINGH> ie. 4INIT ATZ5 <GMODEM STRINGH> is a command to configure the modem as desired. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.03 COMM / MODEM SETUP 38 --------------------------------------------------------------------------------G TRANSLATE <GBAUD RATEH> <GRESPONSEH>|<G*C STRINGH> ie. 4TRANSLATE 2400 CONNECT 2400/ARQ|2400MNP5 <GBAUD RATEH> is 300, 1200, 2400, 4800, 9600, 14400, 19200 or 38400. <GRESPONSEH> is the connection result string from the modem. <G*C STRINGH> is the translated response code for the BBS "4*C5" code. PREINIT <GMODEM STRINGH> ie. 4PREINIT AT&C1&D2&W5 <GMODEM STRINGH> is a command to pre-configure the modem as desired. ANSWERING METHOD Answering method: GHardware H (GHHardware/GSHoftware/GMHodem/GRHingmaster/GDHisable) This specifies the method D'Bridge will use to answer incoming calls. /------------+---------------------------------------------------------------\ | GHARDWAREH | Answers using hardware ring detection. (4RS-232 pin 225) | | | | | GSOFTWAREH | Answers using software ring detection. (4RING from modem5 | | | | | GMODEMH | Assumes that modem will auto-answer. (4S0=1 assumed5) | | | | | GRINGMASTERH | Hardware ring detection with multi-pattern ring detection. | | | 3 different ring patterns are detected, see GLINE ASSIGNMENTH. | | | | | GDISABLEH | Answering completely disabled. | \------------+---------------------------------------------------------------/ ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.03 COMM / MODEM SETUP 39 --------------------------------------------------------------------------------G LINE ASSIGNMENT Line assignment: GV11H (G1H/G2H/G3H/GVHoice) When using 4the RingMaster5 answering method, it is necessary to assign the three possible ring patterns to the desired DATA lines. G1H, G2H and G3H correspond to the GDATA/1H, G2H and G3H. GVoiceH designates a ring pattern to be ignored by D'Bridge and logged as a voice call. 4* NOTE *5 It is recommended to use the first ring pattern as 4voice5. COSTGUARD TIME CostGuard limits: G240H (minutes) G H (cost) The COSTGUARD TIME specifies the absolute maximum amount of time an EMAIL session may last. When the elapsed time for any 4inbound5 or 4outbound5 call reaches the number of minutes specified, DTR is lowered and the call is aborted by D'Bridge. COSTGUARD COST CostGuard limits: G H (minutes) G100.00 H (cost) The COSTGUARD COST specifies the absolute maximum cost of an 4outbound5 EMAIL session. When the accumulated cost for any 4outbound5 call reaches the amount specified, DTR is lowered and the call is aborted by D'Bridge. COLLISION DETECTION Collision detection? GYesH This specifies whether or not D'Bridge will detect collision of outbound dialing attempts with inbound calls. This is usually desirable, but it is possible that it will not work well with every kind of modem, so you should disable it if it incorrectly detects collisions. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.03 COMM / MODEM SETUP 40 --------------------------------------------------------------------------------G DIMESAVER ENABLED DimeSaver enabled? GYesH (GYHes/GNHo) This specifies whether or not the 4DimeSaver5 feature should be used. 4DimeSaver5 causes D'Bridge to answer a potential inbound call if the modem reports GNO DIAL TONEH when placing an outbound call. If there was no incoming call, subsequent 4DimeSaver5 activations will not occur. AUTO INITIALIZATION Auto-Initialization: G5 H (minutes) This parameter specifies the number of minutes idle before automatically re-initializing the modem. Sometimes, modems go "out-to-lunch" because of 4brown-outs5, cats and so forth. Re-programming the modem every few minutes certainly can't hurt and sometimes solves problems of unattended operation. If you specify zero, this feature will be disabled and the modem will only be initialized after each call and upon startup. BUSY WHEN OFFLINE Busy when offline? GNo H (GYHes/GNHo) D'Bridge does many things. During the time calls may not be answered, the phone can either be 4busy5 or just keep ringing. If you answer GYesH to this question, the phone will be taken 4off hook5 whenever D'Bridge is not ready to accept a call. - If you are using a dedicated data line, GYesH is preferred. - If you are using a voice/data line, in most cases, use GNoH. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.03 COMM / MODEM SETUP 41 --------------------------------------------------------------------------------G TOUCH TONE DIALING Touch-Tone dialing? GYesH (GYHes/GNHo) If you have a Touch-Tone telephone line, answer GYesH to this question. Pulse (rotary) dialing will be used if you specify GNoH. MAXIMUM RINGS Maximum rings: G4 H Some modems will report 4RINGING5 when placing an outbound call. This allows D'Bridge to count the number of times the remote phone rings. If this count exceeds the maximum specified by this parameter, dialing will be aborted. If the maximum ring count is exceeded on two consecutive attempts at calling the same system, the call will be placed on 4Ten minute hold5. Unless overridden by GVIEW/MODIFY QUEUEH, no further attempts will be made for at least ten minutes. FLAG DIAL "Flag" dial: GHST ATB1DT H This field is only used to define the exceptions to the normal dialing commands. The 4flag5 specifies a substring to match in the GnodelistH GflagsH field. When D'Bridge places an outbound call, it searches the nodelist flags fields for a match in the "Flag" dial list. The first match found will determine the <GDIAL STRINGH> to use. The format is: <GNODELIST FLAGH> <GDIAL STRINGH> ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.03 COMM / MODEM SETUP 42 --------------------------------------------------------------------------------G SPECIFIC DIAL Specific dial: G2:280/280 ATX0M1DT H This field lists exceptions to the normal and "Flag" dialing commands. After D'Bridge searches the "Flag" dial list, it looks for the first match in Specific dial. If you are using an address such as G2:ALLH, make sure any specific systems are listed 4before5 the wildcard entry. The format is: <GADDRESS MASKH> <GDIAL STRINGH> ie. 2:280/280 should come before 2:280/ALL, etc. PRINTER PORT Printer port: GPRN H Define the printer device here. If you wish to route output to a file for later printing, you may specify the filename here. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.03 COMM / MODEM SETUP 43 --------------------------------------------------------------------------------G PCF NAME PCF name: GOKIOL400 H GOKIDATA OL400 LED page printerH The PCF NAME specifies the name of a D'Bridge "4Printer Control File5." Included, you will find an 4ZIP5 file which contains our standard PCF collection. If you press GF10H, you will receive a list of all printers currently supported. Simply select the 4Printer Control File5 to use for the printer port. When you select a different PCF or specify one for the first time, D'Bridge will 4unZIP5 the file if needed from GPCFILES.ZIPH. A list of printers supported is displayed from the list in GPCFILES.LSTH. PCF files are simple control files that may be changed using any standard text editor. The following control language is used. Keywords are not case-sensitive, but must start in column 1 or they will be ignored. Invalid syntax is ignored without error to allow backward / forward compatibility. PCF <GNAMEH> <GDESCRIPTIONH> ie. 4PCF OKIOL400 OKIDATA OL400 LED page printer5 <GNAMEH> must match the DOS filename (without the extension.) FIXED FONT <GPRINTER CODESH> PROPORTIONAL FONT <GPRINTER CODESH> TITLE FONT <GPRINTER CODESH> START BOLD <GPRINTER CODESH> END_BOLD <GPRINTER CODESH> START_ITALIC <GPRINTER CODESH> END_ITALIC <GPRINTER CODESH> GRAPHICS ie. 4FIXED FONT &l0O(10U(s0p10h12v0s0b3T5 4PROPORTIONAL FONT &l0O(0U(s1p10v0s0b5T5 4TITLE FONT &l0O(0U(s1p14.4v0s3b4T5 4START BOLD (s7B5 4END BOLD (s0B5 4START ITALIC (s1S5 4END ITALIC (s0S5 4GRAPHICS ON5 ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.04 SCHEDULE MAINTENANCE 44 --------------------------------------------------------------------------------G 3.04 SCHEDULE MAINTENANCE The GSCHEDULE MAINTENANCEH screen allows you to program the weekly event schedule as well as set up routing, and access rules. Parameters include: - Schedule day/time - Time between caalls - Maximum tries, sessions and failures - Priorities allowed - Polling - Routing - Forwarding - Many more... EVENT TAG Event "tag": GNMH H The "TAG" is an arbitrary 8-letter name by which you identify the event. In the above example, I've used "NMH" to stand for "National Mail Hour." This "TAG" must be unique; it is used on the screen and in the log to identify events. EVENT ENABLED Enabled? GYesH This Yes/No question simply specifies whether this event should be currently enabled or not. Normally, you would answer YES but if you ever want to temporarily disable the event, you may change it to NO. This option is provided so you may disable events without actually removing them. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.04 SCHEDULE MAINTENANCE 45 --------------------------------------------------------------------------------G EVENT TYPE Type: GMail H (GMHail/GDHOS/GEHxit/GCHlockSync) There are four types of events; each functions differently: GMailH A "mail" event defines a period of time when certain mail may be sent. The default is to send ALL mail, unless you specify ADVANCED ROUTING. GDOSH A "DOS" event defines a list of DOS commands, programs and batch files to execute at a pre-defined time. These tasks are all "spawned" while D'Bridge remains in memory. This will only work if you have enough memory. GExitH An "exit" event specifies that you want D'Bridge to terminate at the specified time. This would normally be used in a batch file to transfer control to another program - instead of "spawning" it as above. With EXIT, you specify which DOS errorlevel you want to use. GClockSyncH A ClockSync event will set the system clock using the atomic clock or another D'Bridge system. The accuracy should be within a tenth of a second (plus the propagation delay) of the Timebase system. EVENT DAYS Weekday(s): [ ]All [GXH]Sun [ ]Mon [ ]Tue [GXH]Wed [ ]Thu [ ]Fri [GXH]Sat With the EVENT DAYS field, you put an "GXH" next to all days that you wish to run this event. If you specify GALLH, then all the days of the week are marked. To access individual days, erase the "X" next to GALLH by pressing the GSPACE BARH. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.04 SCHEDULE MAINTENANCE 46 --------------------------------------------------------------------------------G EVENT START Start time: G14:30H Specify the time you wish to activate the event. This time should be specified in 24-hour format and must not conflict with any other scheduled event. To specify a START TIME, just enter a time using 3 or 4 digits. For example: 300 is 3:00 AM; 2250 is 10:50 PM EVENT END End time: G15:20H Specify the time you wish a mail event to end. This time should be specified in 24-hour format and must not conflict with any other scheduled event. To specify an END TIME, just enter a time using 3 or 4 digits. For example: 300 is 3:00 AM; 2250 is 10:50 PM EVENT ERRORLEVEL Errorlevel: G200H For GEXITH EVENTS, you simply specify the DOS ERRORLEVEL to return when terminating. This number would normally be used by an "IF ERRORLEVEL" directive in a batch file. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.04 SCHEDULE MAINTENANCE 47 --------------------------------------------------------------------------------G EVENT DOS COMMANDS DOS commands: GMAILCHEK -S H For GDOSH events, you may specify any number of DOS commands, programs or batch files to execute. It is even possible to use DOS primitives like CD (change directory) and COPY. It is up to you to make sure none of the commands specified require human interaction. For example, if you specify the command to start your word processor, odds are the word processor will continue running until someone comes along... BETWEEN CALLS Between calls: G15 H to G45 H (seconds) Here, you specify the period of time to wait between outbound calls. This is entered as a "range." If you say "30 to 60," then D'Bridge will wait a random amount of time between 30 and 60 seconds before placing a subsequent call. This period of time is used to receive incoming mail; if this event is supposed to send mail only, you may specify a very short time period. EVENT CRITICAL Critical? GYesH (GYHes/GNHo) For GDOSH and GEXITH EVENTS, you should specify "GYESH" if you want the event to execute even if D'Bridge is not running at the time of the event. A CRITICAL event is one that D'Bridge will execute even after the START TIME specified; it is only executed once. Specify "GNOH" if you want the event to occur ONLY if D'Bridge is running at that time. MAX DIALING TRIES Max tries: G30 H The MAX TRIES parameter indicates the maximum number of times D'Bridge should attempt to dial a specific system during the current GMAILH EVENT. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.04 SCHEDULE MAINTENANCE 48 --------------------------------------------------------------------------------G MAX SESSIONS Max sessions: G3 H The MAX SESSIONS parameter specifies the maximum number of actual connects allowed during the given mail event. This is handy for limiting ECHOmail turnaround to long-distance systems. MAX SESSION FAILURES Max failures: G2 H The MAX FAILURES parameter specifies the maximum number of aborted or bad sessions allowed with each system during the specified mail event. This parameter may help control costs when the answering system has crashed or is not functioning properly. EVENT CLOCKSYNC TIMEBASE TimeBase: G1:3601/14 H For GClockSyncH events, this field designates the TimeBase to use for setting the system clock. Either specify the EMAIL address of another D'Bridge system, or leave the field blank to use the Atomic Clock. 4* Note *5 If the clock is wrong on the D'Bridge system specified, your clock will also be set to an incorrect time. Make sure you use a trust-worthy system. ACCEPT EMAIL CALLS Accept EMAIL calls? GYesH (GYHes/GNHo) This specifies whether or not D'Bridge should answer the phone to accept EMAIL/BBS calls during this event. If you answer GNoH, the phone will not be answered and will remain 4on-hook5 for the duration of the event. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.04 SCHEDULE MAINTENANCE 49 --------------------------------------------------------------------------------G PRIORITIES ALLOWED Priorities allowed? GNCIH (GNH/GCH/GIH) This field specifies what mail priorities (if any) may be sent during this event. For most events, specify GNCIH (Normal, Crash and Immediate), as allowable priorities. Keep in mind that outbound calls are still con- trolled by the cost-accounting system. This field simply serves as a 4master override5 to cost-accounting. HOST ROUTE PRIVATES Host-route privates? GNo H (GYHes/GNHo) If you want NETmail messages destined for private or unlisted systems to be 4host-routed5, answer GYesH to this question. If you answer GNoH, the mail will be held, waiting for the remote system to poll to pick it up. 4* Note *5 Host-routed mail may not be picked-up by the destination. CM SYSTEMS ONLY CM/Non-CM systems only? GBoth H (GCHM/GNHon-CM/GBHoth) "CM" stands for 4Continuous Mail5, a system designated as being able to receive EMAIL calls anytime. Certain events might be designated to send mail only to CM systems just as other scheduled events might be reserved for sending mail only to NON-CM systems. Specify GBothH if you want to send all mail regardless of the CM nodelist flag. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.04 SCHEDULE MAINTENANCE 50 --------------------------------------------------------------------------------G EVENT SCAN ECHOMAIL Scan ECHOmail areas? GYesH (GYHes/GNHo) If you want D'Bridge to scan all ECHOmail areas for new outbound traffic each time this event begins, answer GYesH here. Only when the event starts for the first time each day will the ECHOmail scan be performed. EVENT DYNAMIC Dynamic event? GNo H (GYHes/GNHo) If you answer GYesH to this question, a mail event will terminate when there are no more outbound calls to make. When a dynamic event ends early, the 4UN-EVENT5 is resumed and the queue is rebuilt. ALLOW REQUESTS Process requests? GYesH (GYHes/GNHo) If you want to allow file-requests during this event, answer GYesH to this question. Otherwise, file-requests (FREQs) will be rejected. ACCEPT HUMAN CALLS Accept human calls? GYesH (GYHes/GNHo) If you want to allow human (BBS) calls during this event, answer GYesH to this question. If you answer GNoH, human calls will be rejected for the duration of the event and callers will be notified that the system is cur- rently accepting EMAIL calls only. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.04 SCHEDULE MAINTENANCE 51 --------------------------------------------------------------------------------G EVENT ALLOW XMAIL Allow XMAIL? GYesH (GYHes/GNHo) If you want to allow XMAIL (compressed mail) traffic to be sent during this event, answer GYesH to this question. If you answer GNoH, all XMAIL will be held, disallowing pickup by remote systems. Specify GNoH only for dedicated NETmail events. In most cases, GYesH is the appropriate answer. PACKETS FOR Packets for: GALL H Here's where we get into the filters and addresses! In PACKETS FOR, specify a 4filter5 as defined previously in this section. This will determine for which systems you want to create packets. 4* Note *5 This does not necessarily mean D'Bridge will call the system, since the packet might be on "HOLD" or "ROUTED" to a diffe- rent system. HOLD FOR Hold for: GNONE H If you wish to hold all outbound traffic for certain systems, specify them here with a 4filter5. With a system on "hold", no calls will be made to it during this event, regardless of priority. EVENT POLL Poll: G1:110/68 H If you wish to poll certain systems each time this event is started, list the EMAIL addresses here. Polling means: to call a system in order to pick up any mail that is "on hold." ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.04 SCHEDULE MAINTENANCE 52 --------------------------------------------------------------------------------G PICKUP FROM Pickup from: GALL H Normally, D'Bridge will pick up mail from GALLH systems it calls. However, if you wish, you may specify a 4filter5 to control from which systems you would like to receive "hold" mail from when you call to deliver outbound traffic. ALLOW PICKUP FROM Allow pickup from: GALL H Normally, D'Bridge will allow GALLH systems to pick up their "hold" mail when they poll or call to deliver mail. If you want to run a completely secure system, you might not want to allow pickup for certain systems. Since D'Bridge has password-security, it would be rare to use anything other than GALLH here. ROUTE TO Route to: GNONE H Normally, D'Bridge sends mail directly to the receiving system when you write EMAIL messages. "Routing" is a way to cut costs by sending mail through other EMAIL systems or networks to be delivered to its final destination. "Route to" may control specific routing and/or host-routing. This field may contain multiple lines, so the last line should contain GHOSTSH or host/hub-routing or GNONEH for direct delivery. Specific routing may be done by specifying: Route to: <GADDRESSH> FOR <GFILTERH> ie. Route to: 110/68 for 110/ALL 2:ALL 3:ALL ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.04 SCHEDULE MAINTENANCE 53 --------------------------------------------------------------------------------G ROUTE FILES FOR Route files for: GNONE H D'Bridge has the capability of routing attached data files along with EMAIL messages. This should be used only by special arrangement between the system operators involved. Specify the 4filter5 describing the systems willing to route in-transit files from your system. This is only applicable if you are using a rou- ting other than GNONEH. FORWARD FOR Forward for: GALL H D'Bridge will forward in-transit mail for the systems specified in this 4filter5. In most cases, GALLH should be specified. FORWARD TO Forward to: GOURNET H D'Bridge will forward in-transit mail to the systems specified in this 4filter5. Using GOURNETH means D'Bridge will only forward in-transit mail destined for systems with the same NET number as your own. (It is assumed there is no cost associated with calls within your NET.) FORWARD FILES FOR Forward files for: GALL H D'Bridge will forward in-transit files for the systems specified in this 4filter5. In most cases, GALLH should be specified. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.04 SCHEDULE MAINTENANCE 54 --------------------------------------------------------------------------------G FORWARD FILES TO Forward files to: GOURNET H D'Bridge will forward in-transit files to the systems specified in this 4filter5. Using GOURNETH means D'Bridge will only forward in-transit mail destined for systems with the same NET number as your own. MAIL RECEIVED DOS COMMANDS DOS commands: G H During certain events, you may wish to have D'Bridge terminate or execute DOS commands every time mail is received from a remote system. The DOS COMMANDS field allows you to specify any number of DOS commands or programs to be executed when mail arrives. Any DOS command or program may be used, but you must make sure they don't require any human interaction or D'Bridge will be "stuck" until you give the program the input it wants. As well as DOS commands, the following functions are available from the DOS COMMANDS field: /----------------+-----------------------------------------------------------\ | G+H(command) | Causes D'Bridge to swap to disk, leaving more memory | | | available to the application program. | | | | | G-H(command) | Causes the command to be executed inside the queue | | | window. Only use this for programs that do standard | | | DOS I/O. | | | | | G*RH | This will force a rescan of the queue. Same as ALT-Q | | | | | G*SH | This will force a complete ECHOmail rescan. | | | | | G*XH | This causes an exit with the specified DOS errorlevel. | \----------------+-----------------------------------------------------------/ ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.05 NODELIST CONFIGURATION 55 --------------------------------------------------------------------------------G 3.05 NODELIST CONFIGURATION The GNODELIST CONFIGURATIONH screen allows you to setup the nodelist database that D'Bridge uses to make outbound calls. Parameters include: - St. Louis nodelists - Private nodelists - Pointlist - Zonegate data - Exclude/Translate NETs - Prefixes - Baud, Flag and Phone overrides ST LOUIS NODELISTS "St. Louis" nodelists? GC:\DB\FILES\ DBNET DBDIFF H "St. Louis" refers to a standard format for NODELIST text files. This includes a "nodelist" and a "nodediff". You may have any number of St. Louis-style nodelists at one time by listing each separately in the window. Each line in the window describes one nodelist and should contain: <GDIRECTORY PATHH> <GNODELIST BASEH> <GNODEDIFF BASEH> For example: C:\DB\FILES\ NODELIST NODEDIFF 7567 153 C:\DB\FILES\ ANETLIST ANETDIFF 38791 153 The two numbers on the right are the CRC of the nodelist name and the currently installed nodelist. These numbers are maintained by D'Bridge and the user need not concern himself with them. D'Bridge automatically determines which nodelist is the most-recent based on the extension of the "list" or "diff" file. The St. Louis format is based on weekly update files called "diff" files; these files contain the differences between last week's and this week's nodelists and are generally smaller than the nodelist itself. If a diff file exists for a nodelist, it will be automatically decompressed and installed when it arrives (if applicable). ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.05 NODELIST CONFIGURATION 56 --------------------------------------------------------------------------------G PRIVATE NODELISTS Private nodelist(s): GMYLIST.PVT H You may also use any number of private nodelists. In this field you may specify any number of text files to be included in your compiled nodelist. You may notice D'Bridge adds two numbers after the filename once the nodelist is compiled; these numbers are the date and time of the private nodelist file. If these numbers are changed or the node- list is replaced or edited, D'Bridge will automatically recompile the nodelist when it is started next. POINTLIST Pointlist: GPOINTS.LST H If you are part of a point system, you will want to specify the name of your POINTLIST file. This is a list of POINTS under the same ZONE:NET/NODE as your system. Just like the PRIVATE NODELISTS, the numbers after the filename indicate the date and time of the POINTLIST when the nodelist was last compiled. If these are changed, D'Bridge will automatically recompile the nodelist. FAKE POINTNET Fake pointnet: G32001H To maintain compatibility with older EMAIL systems, a "FAKE POINTNET" has been established to allow Fidonet-based mailers to act as points of a D'Bridge BOSS. Since there is no definition of a "point" address in Fidonet, a fake NET number is used. Specify the fake net to use here. When a system calls in using that NET number, the node number used will be translated to a point address. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.05 NODELIST CONFIGURATION 57 --------------------------------------------------------------------------------G FAKE POINTS Fake points: G1 2 4 22 H This field specifies which systems require the FAKE POINT addressing. Specify the point numbers of the systems for which FAKE POINT addressing is required. This affects the way in which ECHOmail packets are created. This is never required with points running D'Bridge EMAIL System; it is provided for compatibility with older Fidonet-based systems. USERNAME INDEX Create username index? GYesH D'Bridge will optionally create a USERNAME index when it compiles the nodelist. If you answer "YES" to this field, the index will be created and D'Bridge (and the editor) will be able to cross-reference operator name to address. This feature is quite handy, but makes the nodelist compile much slower. If you don't want the index created, answer "NO." USERLIST FILE Additional user file: GUSER.LST H You may specify the name of a text file containing an additional user- list to merge with the nodelists. Typically, this file will contain a list of people who use certain EMAIL systems but are not listed as the primary operator. The format for this file is: <GADDRESSH> <GUSER NAMEH> ie. 1:135/68.2 George Meyers .20 John Smith 107/27.5 Oliver South ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.05 NODELIST CONFIGURATION 58 --------------------------------------------------------------------------------G OUTBOUND GATEWAY Outbound gateway: G1:110/68 H Most networks do not use an outbound gateway, but if your NET has a system designated to send all outbound mail, then put its address here. You would use this in conjunction with the ROUTE TO field in the schedule maintenance subsystem. (ROUTE TO: OGATE FOR OTHERS) USE ZONEGATES Use zonegates? GNo H Fidonet (as well as other international networks) maintain so called ZONEGATES that allow mail to be sent from one ZONE to another without placing an overseas call. If you are part of Fidonet, and you are sen- ding mail from the U.S. to Europe, you have the option of sending the mail through the ZONE 1 gateway (1/2) or going direct to your destination. Specify "YES" if you wish all interzone traffic (without attached files) to be routed through the ZONEGATE; specify "NO" if you always want to use direct routing. EXCLUDE NETS Exclude ZONE:NET(s): G2:ALL 3:ALL H Some systems (that use a large NODELIST like Fidonet) may want to completely eliminate certain ZONES and/or NETS from their nodelist. If there is no reason to communicate with people in other countries, you can greatly reduce the NODELIST size and compile-time by excluding those addresses you don't use. For example, if you live in the U.S. and don't plan to do any mail to Europe or Australia, you may exclude these continents completely by using the statement from the example above. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.05 NODELIST CONFIGURATION 59 --------------------------------------------------------------------------------G TRANSLATE NETS Translate NET(s): G H This field gives you the option to actually translate one NET to another. This will let you move a NET from one zone to another or simply change the NET number to something else. This will not be used for most systems, but is a feature found in other EMAIL systems and I am including it for compatibility. The syntax is: <Goriginal ZONE:NETH> <Gnew ZONE:NETH> COUNTRY CODE Country code: G1 H Here, you MUST specify your country code. This is the prefix found before the "area code" in the nodelist. For the U.S. and Canada, specify "1" - other countries, specify your country code (in the same way you do with DOS) LOCAL PREFIX Local prefix: G H If there is a prefix you must dial before NO-COST (local) calls, speci- fy it here. In the U.S. and Canada, this field will be left blank in most cases. (Some PBX systems might require you to dial "9" to get a local outside line.) DOMESTIC PREFIX Domestic prefix: G H If there is a prefix in your country that you must dial before all domestic calls, specify it here. For the U.S. and Canada, this field should be left blank; we need no PREFIX. (Some PBX systems might require you to dial an "8" to get a long-distance line.) ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.05 NODELIST CONFIGURATION 60 --------------------------------------------------------------------------------G INTERNATIONAL PREFIX International prefix: G011 H Specify the prefix to dial before any international calls are made. In the U.S., use "011" - other countries, check with your phone company. An international call is defined as one where the COUNTRY PREFIX of the system being called differs from your own. PHONE NUMBER OVERRIDES Phone number overrides: G110/68 1-513-424-5167 H If you wish to override the phone number for an existing address, or define the phone number for an unlisted NODE or POINT, the PHONE NUMBER OVERRIDES field is the place to do this. <GADDRESSH> <GPHONE NUMBERH> <GACCOUNTING/CONTROL PREFIXH> BAUD RATE OVERRIDES Baud rate overrides: G110/68 9600 H This is where you may specify temporary overrides to the baud rate for specified addresses. <GADDRESSH> <GBAUD RATEH> 4* NOTE *5 This does not affect modems with a locked baud rate. FLAG OVERRIDES Flag overrides: G110/68 CM,XX,HST H This is where you may specify temporary overrides to the nodelist flags for specified addresses. <GADDRESSH> <GFLAGSH> ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.05 NODELIST CONFIGURATION 61 --------------------------------------------------------------------------------G SYNONYMS Synonyms: GARTHUR 1:3601/14 H This field defines a list of 4synonyms5 that will substitute a KEYWORD for an EMAIL ADDRESS. These mnemonic 4keywords5 allow for quick and easy entry of commonly used systems. <GKEYWORDH> <GADDRESSH> AUTO COMPILE NODELIST Auto-compile nodelists: G H (GSHtartup/GMHidnight/GNHever) Before a nodelist can be used, it must be compiled and indexed in the nodelist database files. This process can take anywhere from 5 seconds to 45 minutes, depending on the speed of your computer. Three options are available to specify when to test the nodelist for currency: /----------+---------------------------------------------------------------\ | GSTARTUPH | Tests and/or rebuilds the database every time D'Bridge is | | | fired up. (This includes the nightly 4auto-restart5.) | | | | | GMIDNIGHTH | Tests and/or rebuilds the database after the 4auto-restart5 | | | routine. | | | | | GNEVERH | Only rebuilds the database upon request or if it is missing. | \----------+---------------------------------------------------------------/ ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.06 PACKET MAIL CONTROL 62 --------------------------------------------------------------------------------G 3.06 PACKET MAIL CONTROL The GPACKET/MAIL CONTROLH screen allows you to set up general mailer controls. Parameters include: - Outbound/Inbound mail archives - NETmail purge criteria - Renaming of duplicate files - Pre-unpack command - ECHOmail controls - AREAFIX controls OUTBOUND MAIL ARCHIVE Outbound mail archive: GC:\DB\OLDMAIL\OUTBOUND.TXT H This specifies the name of the text file (if any) to write messages flagged ARCHIVE/SENT to before they are erased. This is quite useful as a history of NETmail; it includes the full message text and the date and time it was sent. INBOUND MAIL ARCHIVE Inbound mail archive: GC:\DB\OLDMAIL\INBOUND.TXT H The INBOUND MAIL ARCHIVE parameter specifies the text file (if any) into which the DBUTIL PURGE option will archive NETmail messages before era- sing them. If you do not wish to save old NETmail messages, leave this field blank. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.06 PACKET MAIL CONTROL 63 --------------------------------------------------------------------------------G NETMAIL PURGE CRITERIA Purge NETmail after: G30 H days -or- Purge NETmail except: G100 H messages In the DBUTIL PURGE program, there are two options for deciding which messages to erase from the system. When the cursor is on this field, you may press the F10 key to switch between the methods: PURGE EXCEPT and PURGE AFTER. With PURGE EXCEPT, DBUTIL will erase all but "x" messages; specify "x" in this field as how many messages to save after purging. With the PURGE AFTER option, DBUTIL will purge messages based on their age. PURGE AFTER 30 DAYS means to erase all messages over 30 days old when DBUTIL PURGE is run. RENAME DUPLICATE FILES Rename duplicate files? GYesH There will be occasions when you receive different files with the same name. If you answer YES to this question, any files received having a duplicate name in the INBOUND FILES DIRECTORY will be renamed by "se- quencing" the last character of the extension. A duplicate README.TXT would become README.TX1 if it existed; if "1" was already there as well, "2" would be used, etc. If you answer NO, the existing file will simply be replaced by the one just received. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.06 PACKET MAIL CONTROL 64 --------------------------------------------------------------------------------G MAIL PROCESSING Inbound mail handling? GAutomaticH (GAHutomatic/GMHanual/GEHxternal/GDHisabled) This parameter controls the method used for receiving and processing inbound mail traffic. For most cases, GAutomaticH would be the best choice because mail is unpacked and possibly forwarded continuously allowing immediate access to all ECHOmail and forwarded NETmail for the nodes served by your system. The options available are: /-----------+--------------------------------------------------------------\ | GAUTOMATICH | Automatically processes mail after each call. Exceptions | | | are low disk-space, event override or QuickDial active. | | | | | GMANUALH | Processes mail only when activated by the operator. | | | | | GEXTERNALH | Completely disables internal processing and causes inbound | | | XMAIL and EMAIL packets to be received as normal data files. | | | | | GDISABLEDH | Completely disables processing of inbound mail. | \-----------+--------------------------------------------------------------/ PACKET PREPROCESSOR Pre-unpack command: G H If you wish to run an external program before processing inbound .PKT files, specify a DOS command here. The use for this varies from running archival/statistical analyzers to executing a "Message Police" program of some type. 4WARNING:5 Modifying packets might upset some people... KILL NULL MESSAGES Kill null messages? GYesH (GYHes/GNHo) Usually, you would answer YES to KILL NULL MESSAGES. A null message means a message that has a TO, FROM and SUBJECT, but no text. These are usually just messages associated with a file-attach and should be ignored anyway. If you answer YES to this question, all messages that are unpacked and have no text will be ignored. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.06 PACKET MAIL CONTROL 65 --------------------------------------------------------------------------------G KILL IN TRANSIT MESSAGES Kill in-transit messages? GYesH (GYHes/GNHo) An IN-TRANSIT message is a message which was neither originated from nor destined for your system. This message exists on your system just to be forwarded elsewhere. If you answer YES to this question, IN- TRANSIT messages will be flagged KILL/SENT when they arrive. If you answer NO here, forwarded mail will "pile-up" until it is purged or manually killed. IN TRANSIT RESCAN In-transit rescan? GYesH (GYHes/GNHo) If your system acts as a hub or boss-node, you might want to provide immediate turnaround when "routed" mail is received. If you answer YES to IN-TRANSIT RESCAN, the NETmail area will be rescanned after each in-transit message is received. This will cause the message to be made available to the destination system immediately rather than at the be- ginning of the next event. LIMIT NO COST CALLS Limit no-cost calls? GNo H (GYHes/GNHo) D'Bridge has a limit for the number of connections with a given system in each mail event. This limit exists to make sure ECHOmail traffic only 4turns-around5 a few times each mail event. Since local calls are usually free, you can circumvent this limit for no-cost calls. Answering GYesH here will make unlimited local calls for ECHOmail turnaround. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.06 PACKET MAIL CONTROL 66 --------------------------------------------------------------------------------G SECURED ECHOMAIL ONLY Secured ECHOmail only? GNo H (GYHes/GNHo) Some hubs may wish to run a more secure system by only allowing ECHOmail from passworded systems. It makes sense that routine mail links should be secured for the benefit of the whole network. If you answer GYesH to this question, all ECHOmail received from non-passworded systems will be tossed into the BADECHO area. LEAVE SEENBYS Save ECHOmail SEENBYs? GYesH (GYHes/GNHo) If you wish to save the text containing the SEEN-BY lines in your message base, answer YES. It really doesn't matter how you respond to this question; the system will perform the same way. 4* NOTE *5 This field only affects the Quick storage method. SAVE DUPLICATE MESSAGES Save duplicate messages? GNo H (GYHes/GNHo) Personally, I would answer NO to this question, but if you would like to see what messages are received more than once, answer YES here. If you save the duplicate messages, they will be tossed into the BADECHO area for your inspection. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.06 PACKET MAIL CONTROL 67 --------------------------------------------------------------------------------G FORCED PRIORITIES Forced priorities: G1:110/68 CRASH H This window allows you to absolutely override the priority for any system on a semi-permanent basis. The overrides are listed one per line and the format is: <GADDRESSH> <GIMMEDIATEH/GCRASHH/GHOLDH> This field is also maintained in the VIEW/MODIFY QUEUE, ALT-V screen. AUTO ADD ECHOMAIL AREAS Auto-add ECHOmail areas? GFido H (GNHo/GFHido/GQHuickBBS) D'Bridge has the capability of automatically adding ECHOmail areas that don't exist when undefined CONFERENCE TAGS are detected. This can save lots of work in setting up areas; all you need to do once they are added is to enter the area security and description using LOCAL/ECHOMAIL AREAS. Specify which ECHOmail storage format to use for new areas: /-----------+--------------------------------------------------------------\ | GNOH | Unknown ECHOmail messages will be tossed to BADECHO. | | | | | GFIDOH | A new subdirectory will be created and messages will be | | | tossed there. The area will be created with Fido storage. | | | | | GQUICKBBSH | Scans for the highest-used QuickBBS message base number. | | | The mail will be tossed and a Quick-type area is created. | \-----------+--------------------------------------------------------------/ PROCESS AREAFIX REQUESTS Process AREAFIX requests? GYesH (GYHes/GNHo) If D'Bridge should accept and process AREAFIX requests, answer YES here. If you answer NO, the requests received will just appear in your NETMAIL area and never be processed. D'Bridge only processes requests as they are unpacked, not from them existing in the NETMAIL area. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.06 PACKET MAIL CONTROL 68 --------------------------------------------------------------------------------G AREAFIX INFORMATION Areafix information: G1:110/68 PASSWORD ABC,501 Normal Yes Yes AREAS68.BBSH This window controls the AREAFIX subsystem, allowing automated area list and ECHOmail distribution management. For each system, specify: <GADDRESSH> <GPASSWORDH> <GGROUPS,LEVELH> <GPRIORITYH> <GRESCAN?H> <GFWD REQ?H> <GAREAS.BBSH> Where: <GADDRESSH> is the address of the system in the form ZONE:NET/NODE.POINT <GPASSWORDH> is a codeword agreed upon by both systems (you and the system specified.) The password may be from 1 to 32 characters. <GGROUPS,LEVELH> contains the groups allowed and security level assigned to the system. ie. ABC,501 allows groups GAH, GBH and GCH and areas with a security level equal to or less than G501H. <GPRIORITYH> is the EMAIL priority associated with the link. In most cases, you would use CRASH for systems in your local calling area and NORMAL or HOLD for long-distance links. Valid priorities are: Immediate, Crash, Normal and Hold. <GRESCAN OK?H> asks whether the specified system should be allowed to request a complete rescan of a conference as it is added. Normally, this is acceptable, but if your system is particularly busy, you may want to disallow this by answering NO. <GFWD REQ?H> determines whether requests for unavailable ECHOmail areas will be forwarded to your ECHO hub(s). If you answer GYesH, all unknown requests will be passed along to the first applicable ECHOmail hub. <GAREAS.BBSH> specifies the filename of the system's AREAS.BBS file to use when forwarding requests. This should only be specified for the systems which are your ECHOmail hubs or feeds. Any conference listed in this file may be requested by other allowed systems. Make sure these lines are listed in the desired search order. 4* REMEMBER *5 GCTL-NH inserts lines, GCTL-YH deletes lines in a window. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.06 PACKET MAIL CONTROL 69 --------------------------------------------------------------------------------G REMOVE EMPTY PASSTHRUS Remove empty passthrus? GYesH (GYHes/GNHo) ECHOmail hubs which carry many passthru areas may wish to remove unused conferences automatically. D'Bridge will erase these unused areas a few days after the last ECHOmail feed is cut. GAREAFIXH GTIMEOUT DAYSH controls the number of inactive days to wait before killing the last feed and sending an AREAFIX request to your feed, removing the conference. AREAFIX TIMEOUT DAYS Areafix forwarding days? G3 H This parameter controls the number of days to wait for a new conference to arrive after forwarding a request. After this many days, if a new conference requested has not been received, a message is generated to the original requesting system, explaining why their request was not honored. This also controls the number of days before removing a passthru area with no links left. UNKNOWN AREA FORWARDING Unknown area forwarding: G H Here, you may specify the address of an ECHOmail hub to use "blindly", forwarding AREAFIX requests for unknown areas. If the area is not found in any listed AREAS.BBS file, it will be sent to the specified system. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.07 XMAIL CONTROL 70 --------------------------------------------------------------------------------G 3.07 XMAIL CONTROL The GXMAIL CONTROLH screen allows you to configure the various compression and decompression software that is used to bundle XMAIL packets. Parameters include: - XMAIL processing interval - Size limits - Default format - Specific formats - ZIP, LHA, ARJ, PAK, ARC and ZOO Compress and Decompress commands XMAIL PROCESSING INTERVAL XMAIL processing interval: G30 H (minutes) This parameter specifies the minimum time interval between XMAIL processing cycles. In the above example, there will be a 30 minute delay between the end of one cycle and the start of the next. Any XMAIL received during this delay period will not be processed immediately. At the end of the period, processing will resume automatically. XMAIL ARCHIVE SIZE LIMIT 4* NOTE *5 This feature is not currently supported. XMAIL PACKET SIZE LIMIT XMAIL packet size limit: G200 H (kilobytes) This parameter controls the maximum size of outbound ECHOmail .PKT files. When ECHOmail is scanned or forwarded, a new packet is started when the origin address changes, or the Gpacket size limitH is exceeded. Making this field smaller than 50k is not a good idea; neither is exceeding 250k in a network using mailers other than D'Bridge. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.07 XMAIL CONTROL 71 --------------------------------------------------------------------------------G COMPRESSED MAIL FORMAT Compressed mail format: GZIPH [Press GSPACEH to change] This specifies the 4default5 compression format for outbound XMAIL files. Choose either GZIPH, GLHAH, GARJH, GPAKH, GARCH or GZOOH. For D'Bridge EMAIL networks, the GZIPH format is most often used. Many public networks still require the ARC format. (D'Bridge is capable of unpacking any of these archives, providing the decompression program is correctly specified.) GZIPH PKWARE, Inc. 7545 N. Port Washington Rd. Glendale, WI 53217 U.S.A. GLHAH Copyright by Haruyasu Toshizaki Japan Distributed via electronic means GARJH Robert K. Jung 2606 Village Road West Norwood, MA 02062 U.S.A. GPAKH NoGate Consulting P.O. Box 88115 Grand Rapids, MI 49518-0115 U.S.A. GARCH System Enhancement Associates 21 New Street Wayne, NJ 07470 U.S.A. GZOOH Copyright by Rahul Dhesi U.S.A. Free noncommercial use permitted ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.07 XMAIL CONTROL 72 --------------------------------------------------------------------------------G ALTERNATE COMPRESSION FORMATS System-specific formats: GARJ 1:110/68 H This field allows you to define specific compression formats for certain systems. The format is as follows: <GZIPH/GLHAH/GARJH/GPAKH/GARCH/GZOOH> <Gfilter> ie. ARC ALL EXCEPT 1:110/68 .10 .20 ZIP COMPRESS COMMAND ZIP compress command: GPKZIP -M H This specifies the command to move files to a ZIP archive. For PKZIP, the G-MH option must be specified. ZIP DECOMPRESS COMMAND ZIP decompress command: GPKUNZIP -O H This specifies the command to extract files from a ZIP archive. PKUNZIP requires the G-OH option to overwrite existing files. LHA COMPRESS COMMAND LHA compress command: GLHA M -M H This specifies the command to move files to a LHA archive. LHA requires the GMH command and the G-MH option. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.07 XMAIL CONTROL 73 --------------------------------------------------------------------------------G LHA DECOMPRESS COMMAND LHA decompress command: GLHA E -CM H This specifies the command to extract files from a LHA archive. LHA requires the GEH command and the G-CMH option to overwrite existing files. ARJ COMPRESS COMMAND ARJ compress command: GARJ M H This specifies the command to move files to an ARJ archive. ARJ requires the GMH command. ARJ DECOMPRESS COMMAND ARJ decompress command: GARJ E /U H This specifies the command to extract files from an ARJ archive. ARJ requires the GEH command to decompress and the G/UH switch to update (overwrite) files. PAK COMPRESS COMMAND PAK compress command: GPAK M H This specifies the command to move files to a PAK archive. PAK requires the GMH command. PAK DECOMPRESS COMMAND PAK decompress command: GPAK E /WA H This specifies the command to extract files from a PAK archive. PAK requires the GEH command to decompress and the G/WAH option to overwrite existing files. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.07 XMAIL CONTROL 74 --------------------------------------------------------------------------------G ARC COMPRESS COMMAND ARC compress command: GARCA | /D H This specifies the command to move files to an ARC archive. ARCA requires the G/DH option to move the files to the archive. Note that there is a vertical bar (|) separating the command from the G/DH option. This indicates the option comes after the file names. ARC DECOMPRESS COMMAND ARC decompress command: GARCE | /R H This specifies the command to extract files from an ARC archive. ARCE requires the G/RH option to overwrite existing files. Note that there is a vertical bar (|) separating the command from the G/RH option. This indicates the option comes after the file names. ZOO COMPRESS COMMAND ZOO compress command: GZOO -M H This specifies the command to move files to a ZOO archive. ZOO requires the G-MH command. ZOO DECOMPRESS COMMAND ZOO decompress command: GZOO -E H This specifies the command to extract files from a ZOO archive. ZOO requires the G-EH command. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.08 TIME CONTROL SYSTEM 75 --------------------------------------------------------------------------------G 3.08 TIME CONTROL SYSTEM The GTIME CONTROL SYSTEMH screen allows you to set time-related parameters and display historical data. Functions and parameters include: - UTC offset - Daylight savings time status - Timezone names - Default ClockSync systems - Remote clock history - Adjustment history OBSERVE DAYLIGHT SAVINGS TIME Observe DAYLIGHT SAVINGS TIME at this site? GYesH In most locations, the time changes twice a year for daylight savings time. If your country/state observes this, answer GYesH. ADJUST MAIL EVENTS 4* NOTE *5 This feature is not currently supported. ADJUST CLOCKSYNC EVENTS 4* NOTE *5 This feature is not currently supported. ADJUST DOS EVENTS 4* NOTE *5 This feature is not currently supported. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.08 TIME CONTROL SYSTEM 76 --------------------------------------------------------------------------------G DAYLIGHT TIME STARTS Daylight time starts: G04/23/92H Specify the date on which daylight savings time starts. If daylight time is currently in effect, use the date last spring when it started. If it is late fall or winter and daylight savings time is not in effect, use the date on which it will start next spring. DAYLIGHT TIME ENDS Daylight time ends: G10/21/92H Specify the date on which daylight savings time ends. Always make sure the ending date is greater than the starting date, next spring. DAYLIGHT TIME CHANGES Time of automatic change: G02:01H Specify the exact time at which daylight savings time changes. In the USA it is always 2:01 on a Sunday morning in the spring and fall. For times in the afternoon, make sure to use 24-hour format (ie. 13:00 is 1:00pm). LOCAL STANDARD TIME Name of local STANDARD time: GEastern Standard Time H Specify the name of your timezone during standard time. LOCAL STANDARD TIME ABBREVIATION Abbreviation for local STANDARD time: GEST H Specify the commonly accepted abbreviation for your local standard time. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.08 TIME CONTROL SYSTEM 77 --------------------------------------------------------------------------------G LOCAL DAYLIGHT TIME Name of local DAYLIGHT time: GEastern Daylight Time H Specify the name of your timezone during daylight savings time. LOCAL DAYLIGHT TIME ABBREVIATION Abbreviation for local DAYLIGHT time: GEDT H Specify the commonly accepted abbreviation for your local daylight time. DISPLAY TIME DATA Display comparative time data? GNo H On inbound as well as outbound calls D'Bridge will compare its time with that on other systems it connects to. If you want this data to be displayed in the LOG window, answer GYesH here. TIME WARNING THRESHOLD Display average time-difference if: G5 H minute(s) or more On inbound as well as outbound calls D'Bridge will compare its time with that on other systems it connects to. A history is kept and average differences are computed. If you wish to see a warning when the average time difference exceeds a certain threshold, specify the number of minutes here. In this example, a warning will be displayed when the average time difference exceeds 5 minutes. To reset this warning display, you will need to GZHero the clock history screen. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.08 TIME CONTROL SYSTEM 78 --------------------------------------------------------------------------------G CLOCK HISTORY FOR Store data from the clocks on: GALL H Specify a 4filter5 controlling which systems will be included in your time/clock history screen. If there are some systems you wish to exclude, use: GALL EXCEPT nnn/nnn nnn/nnn ... etcH. CLOCKSYNC SYSTEM Always synchronize clock with: G1:3601/14 H You have the option of setting your clock using a certain system both on demand and every time you connect with it. In this example, my system will always synchronize its clock to 1:3601/14, a "D'Bridge Universal TimeBase." In most cases, leave this blank. AUTOMATIC CLOCKSYNC SYSTEM Default ClockSync timebase: GAtomic clock H If you start D'Bridge with the clock obviously wrong, it will set its clock using the specified system. Leaving it blank will make it call the atomic clock at the U.S. Naval Observatory near Washington D.C. The only time this happens automatically is when the date is set to before this release of D'Bridge occurred -- the clock is wrong without a doubt. (This occurs when there is no battery-backed clock on an XT most frequently.) ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.08 TIME CONTROL SYSTEM 79 --------------------------------------------------------------------------------G CLOCK SET COMMAND DOS command after clock adjustment: G H Some computers, usually XTs, require a command to be issued to set the battery-backed clock which is not on the motherboard. If you own such a clock, you probably know what this means. If you don't, leave this field blank. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.09 FUNCTION KEYS 80 --------------------------------------------------------------------------------G 3.09 FUNCTION KEYS The GFUNCTION KEYSH screen allows you to define programmable function keys for use within D'Bridge. USER FUNCTION There are 19 programmable function keys that may be made available from the main menu or D'Bridge idle state. GF2H through GF10H and GALT-F1H through GALT-F10H may be programmed to execute any number of DOS commands or spe- cial functions. As well as DOS commands, the following functions are available here: /----------------+-----------------------------------------------------------\ | G+H(command) | Causes D'Bridge to swap to disk, leaving more memory | | | available to the application. | | | | | G-H(command) | Causes the command to be executed inside the queue | | | window. Only use this for programs that do standard | | | DOS I/O. | | | | | G*RH | This will force a rescan of the queue. Same as ALT-Q | | | | | G*SH | This will force a complete ECHOmail rescan. | | | | | G*XH | This causes an exit with the specified DOS errorlevel. | \----------------+-----------------------------------------------------------/ 4* NOTE *5 You must NEVER load a TSR using this method. It will cause a system crash when D'Bridge resumes. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.10 BBS CONFIGURATION 81 --------------------------------------------------------------------------------G 3.10 BBS CONFIGURATION The GBBS CONFIGURATIONH screen allows you to set up an interface between your BBS system and D'Bridge. Parameters include: - EMAIL calls only text - Press ESC for BBS text - Loading BBS text and filename - Human caller timeout - BBS online hours - After hours file - Minimum baud rate - Too slow file - ECHOmail scan - DOS commands for BBS BBS SOFTWARE INSTALLED BBS software installed? GYesH If you are using D'Bridge as the "front-end" for a bulletin board system (BBS), answer "YES" to this question. If you do not want D'Bridge to run another program (such as a BBS) when "humans" call, specify "NO." EMAIL CALLS ONLY TEXT "EMAIL calls only" text: GPlease hang up... accepting EMAIL calls only. H If a human caller dials in when D'Bridge is not accepting human callers during the current mail event, this line of text will be displayed on the caller's terminal. This is also displayed if you have answered GNoH to "BBS software installed." ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.10 BBS CONFIGURATION 82 --------------------------------------------------------------------------------G PRESS ESC FOR BBS TEXT "Press ESC for BBS" text: GPress the ESC key twice to access the BBS. H When someone first dials into D'Bridge, it displays its copyright notice and this text. You may specify any message you wish to replace the stan- dard message, but remember you should inform the caller to 'press the GESCH key twice for faster access' in this line. LOADING BBS TEXT "Loading BBS" text: GBBS now loading - Please wait... H This text will be displayed when a human caller presses the GESCH key twice or the "human caller timeout" has expired. This is to inform the caller that the BBS is currently loading and that he should wait. LOADING BBS FILE "Loading BBS" file: GC:\DB\LOADBBS.TXT H If you wish to display some sort of "banner" file when the BBS is loading, specify the name of a text file here. You may use ANSI codes and IBM graphics if you wish, but keep in mind that not all callers have computers compatible with IBM ANSI. You're best off keeping it printable ASCII (32-126 decimal). HUMAN CALLER TIMEOUT "Human" caller timeout: G20H Specify the number of seconds D'Bridge should wait before determining that a call is "human" and not an EMAIL call. The minimum value for this field is 10 (seconds), but you may want to make this time longer if you have "noisy" phone lines or trouble with inbound connections. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.10 BBS CONFIGURATION 83 --------------------------------------------------------------------------------G BBS ONLINE HOURS BBS online hours: G06:00H until G23:00H This field allows you to specify the hours of operation for your BBS. If a human caller is detected outside of these hours, the "After hours" file will be transmitted and D'Bridge will hang-up. This is another way besides the use of mail events to restrict BBS access times. AFTER HOURS FILE "After hours" file: GC:\DB\BBSHOURS.TXT H If you restrict the hours of operation of your BBS, you need to prepare a text file in which you explain your policy to human callers. Specify the name of a text file here; it will be transmitted to all human callers dialing in outside the specified time frame. MINIMUM BAUD RATE Minimum baud rate: G1200 H If you wish to restrict BBS access to those callers that have a faster modem, specify the minimum allowable baud rate here. In this example, 300 baud callers will be rejected and the "Too slow" file will be sent. TOO SLOW FILE "Too slow" file: GC:\DB\TOOSLOW.TXT H If you have specified a minimum baud rate for BBS access, this file will be transmitted to callers with slower modems. If you're going to reject callers based on baud rate, the least you can do is explain your policy... ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.10 BBS CONFIGURATION 84 --------------------------------------------------------------------------------G SCAN ECHOMAIL AFTER CALL Scan ECHOmail after call? GYesH If you wish to rescan all ECHOmail areas after each BBS call, answer GYesH here. This allows for immediate turnaround on ECHOmail entered through the BBS software. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.10 BBS CONFIGURATION 85 --------------------------------------------------------------------------------G DOS COMMANDS FOR BBS DOS commands for BBS: G H Here, you specify the DOS commands that will be used to invoke the BBS, telling it you already have a caller on. There are two methods for doing this: SPAWNING and EXITING. The most popular method is to SPAWN the BBS - leaving D'Bridge in memory. EXITING is used only when there is not enough memory to SPAWN the entire BBS system. In this field, you simply list the DOS commands you want D'Bridge to run to invoke the BBS. There are several "special" commands that substitute values or cause an EXIT: /----------------+-----------------------------------------------------------\ | G+H(command) | Causes D'Bridge to swap to disk, leaving more memory | | | available to the application program. | | | | | G-H(command) | Causes the command to be executed inside the queue | | | window. Only use this for programs that do standard | | | DOS I/O. | | | | | G*BH | This is replaced by the baud rate of the connection. | | | | | G*CH | This is replaced by the actual or translated connect | | | string from the modem. | | | | | G*PH | This is replaced by the comm port number (G1H-G8H) | | | | | G*RH | This will force a rescan of the queue. Same as ALT-Q | | | | | G*SH | This will force a complete ECHOmail rescan. | | | | | G*TH | This is replaced by number of minutes until the next | | | event defined in "schedule maintenance." | | | | | G*XH | This causes an exit with the errorlevel corresponding | | | to the baud rate divided by 100. ie. 1200 baud = 12 | | | | | G*XH | This causes an exit with the specified DOS errorlevel. | \----------------+-----------------------------------------------------------/ ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.10 BBS CONFIGURATION 86 --------------------------------------------------------------------------------G As an example, here's what my DOS BBS COMMANDS field looks like to run Opus, then execute the MYMAIL program (An Opus MAIL-CHECK program by Steve Sullivan): cd \opus opus opus -t*t -p*p -b*b mymail -u When a caller dials in at 2400 baud with 120 minutes until the next event, D'Bridge runs the following DOS commands: cd \opus opus opus -t120 -p1 -b2400 mymail -u After all these commands are complete, D'Bridge initializes the modem and returns to its previous status (Mail event, IDLE, etc.). ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.11 SECURITY MISCELLANEOUS 87 --------------------------------------------------------------------------------G 3.11 SECURITY MISCELLANEOUS The GSECURITY/MISCELLANEOUSH screen allows you to setup various parameter which affect security or are somehow "miscellanneous." Parameters include: - Hang-up on security violation - Ignore unauthorized mail packets - Rename unauthorized files - Allow unlisted nodes to send mail - File request controls - Session passwords - Automatic password request control - Function requests - Gateways - External receivers - Fidonet and WaZOO protocol overrides HANG UP ON SECURITY VIOLATION Hang-up on security violation? GNo H If you are using SESSION PASSWORDS to protect any or all of your links, you may choose to hang-up and not accept any mail from any system with a missing or invalid password. This option has no effect on systems that have no password specfied. Used in conjunction with GSecured ECHOmail onlyH, this provides a fairly good security method for ECHOmail traffic. IGNORE UNAUTHORIZED MAIL PACKETS Ignore unauthorized mail packets? GNo H If you are using SESSION PASSWORDS to protect any or all of your links, you may choose to completely ignore incoming mail from a link using the wrong (or no) password. If you indeed wish to ignore this mail, specify GYesH to this field. If you want to receive the mail normally, answer GNoH. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.11 SECURITY MISCELLANEOUS 88 --------------------------------------------------------------------------------G RENAME UNAUTHORIZED INBOUND FILES Rename unauthorized inbound files? GYesH If you are using SESSION PASSWORDS to protect any or all of your links, you may choose to rename incoming files to BADFILE.001, BADFILE.002, etc. The reason for doing this is to prevent unauthorized ECHOMAIL and FUNCTION REQUESTS from being executed. Specify GYesH if you want to automatically rename incoming files or GNoH if you want to receive them normally. ALLOW UNLISTED NODES TO SEND MAIL Allow unlisted nodes to send mail? GYesH In a private network, possibly the BEST way to discourage hackers from the outside is to hang-up on them immediately. If you specify GYesH to this question, D'Bridge will immediately reject any incoming call from a system not listed in your nodelist. This should only be used in a private network - public networks often have communications from new addresses or private addresses that are not in the nodelist (yet). FILE REQUESTS FOR UNLISTED NODES File-requests for unlisted nodes? GYesH If you support file-requests, you must decide whether or not you wish to allow systems that are NOT in your nodelist to request files. Some people (kids, usually) will abuse your system's file-request privilege by calling back many times, using many fake node numbers to file-request. If you say GYesH to this question, any system, listed or not will be able to issue file-requests. If you say GNoH then only requests from systems found in your nodelist will be honored. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.11 SECURITY MISCELLANEOUS 89 --------------------------------------------------------------------------------G TIME LIMIT FOR FILE REQUESTS Time limit for file-requests: G30 H (minutes) When you are running a public system, you may find you have trouble with people abusing the file-request privilege by constantly requesting too many files and keeping your system busy for hours. D'Bridge allows you to limit the time allowed for file-requests. Here you may limit the num- ber of minutes allowed before refusing to honor a request. FILE REQUEST LIMIT File-request limit: G500 H (kilobytes) You may limit the total number of kilobytes allowed for file-request by specifying it here. It is suggested you make this larger than the biggest file you have available for request. MAXIMUM FILES FOR FILE REQUEST Maximum files for file-request: G10 H You may limit the total number of files allowed for request. This is really not as meaningful as the other limits because time is the main factor requiring a limitation. CHECK LIMITS BEFORE OR AFTER Check limits BEFORE or AFTER? GAfter H This specifies whether the file-request limits are tested BEFORE or AFTER each file is transferred. Personally, I prefer testing AFTER because I like to allow people to request any file on my system; some files on my system are larger than the FILE-REQUEST LIMIT (K.) If the limits are checked BEFORE each transfer, it would be impossible to file-request any file larger than the size limit. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.11 SECURITY MISCELLANEOUS 90 --------------------------------------------------------------------------------G ENFORCE LIMITS FOR 24 HOURS Enforce limits for 24-hours? GNo H If you wish to accumulate these file-request limits for a 24-hour period, answer GYesH here. If you want the limits enforced on a per-call basis, answer GNoH. If the limits are enforced for 24-hours, a file is created containing the address, timestamp and limit data. The limit will be reset exactly 24-hours from the START of the first file-request. If you must manually reset these limits, delete the file "DBRIDGE.FRS." MINIMUM BAUD RATE FOR REQUESTS Minimum baud rate for request? G1200 H This specifies the minimum link rate (baud) allowed for file-requests. (300/1200/2400/4800/9600... Etc.) SESSION PASSWORDS Session passwords: G1:3601/14 SECRET H In a corporate environment, or a public network where security is becoming a problem, you may specify a SESSION PASSWORD for each system you plan to communicate with directly. This password must be specified by BOTH systems and must be agreed upon in advance. Once in place, it becomes impossible to communicate with the other system if you don't use the same password. A password will prevent an unauthorized system from picking up mail. With HiTek comes Hi-Tech hackers. It is not hard to change your address to something else, then poll your host to see what mail you can "steal". Any "link" protected with a password is not vulnerable to this simple form of "mail-stealing". For a password with 135/20, type: 135/20 WALLY (Where "WALLY" is the desired SESSION PASSWORD) Any number of session passwords may be defined. Remember, in the above example, it is important 135/20 also sets up a SESSION PASSWORD for my address, 110/68, or it won't work. Both ends must use the same password! (Passwords must be eight letters or less). ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.11 SECURITY MISCELLANEOUS 91 --------------------------------------------------------------------------------G AUTOMATIC PASSWORD REQUEST FOR Automatic password request for: G201:ALL 1:110/ALL H D'Bridge has the capability to automatically establish session passwords with new links. This field specifies a 4filter5 that controls which EMAIL addresses that you wish to request an automatic session password be added. If you wish to disable this feature, specify GNONEH as the 4filter5. 4* NOTE *5 This field only affects GoutboundH calls. ALLOW PASSWORD REQUESTS FROM Allow password requests from: GALL H The D'Bridge GAutomatic Password Request SystemH allows a remote system to request that a session password be established automatically. If a calling system makes this request, the answering system creates a random 8-character password and transmits it back using the EMSI handshake. This field specifies a 4filter5 that controls which EMAIL addresses that you wish to allow password requests from. If you wish to disable this feature, specify GNONEH as the 4filter5. 4* NOTE *5 This field only affects GinboundH calls. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.11 SECURITY MISCELLANEOUS 92 --------------------------------------------------------------------------------G FUNCTION REQUESTS Function requests: G H A FUNCTION REQUEST is an online service provided to calling systems while they are still "on the line". FUNCTION REQUESTS only work with other WaZOO-based EMAIL systems such as D'Bridge, FrontDoor, Opus and BinkleyTerm. This is a VERY advanced feature and will not be used by most systems, so don't feel bad if you don't understand this... A function request can be defined in four steps: 1) The caller sends the REQUEST FILE. 2) D'Bridge recognizes the filename as being a FUNCTION REQUEST and spawns the REQUEST SERVER task. (user-provided) 3) The REQUEST SERVER (a program provided by the user) takes its input data from the REQUEST FILE and the CALLER.FIL file cre- ated by D'Bridge. It prepares output file(s) to send back to the caller plus an OUTPUT FILE LIST telling D'Bridge which files to send. 4) When the REQUEST SERVER has terminated, D'Bridge then transmits all the files listed in the OUTPUT FILE LIST, deletes them, and continues to send the rest of the "pickup" mail. To use this feature, you must either write your own REQUEST SERVER or use one of the existing systems such as ML-INQ. The format for the FUNCTION REQUESTS field is: For an example, I'll explain how I run the ML-INQ program on my system. ML-INQ stands for Megalist Inquiry. The Megalist is another program I wrote that creates a "master file listing" for all participating Fido and Opus systems. The list got so huge, I decided to add an on in- quiry service. To access the MegaList Inquiry feature, the calling sys- tem simply creates a text file containing a list of filenames to search for; this file is called MEGALIST.INQ. Anytime D'Bridge receives a file called MEGALIST.INQ, the REQUEST SERVER "ML-INQ" is executed. Here's what I have in my FUNCTION REQUEST field: MEGALIST.INQ MEGALIST.LST ML-INQ ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.11 SECURITY MISCELLANEOUS 93 --------------------------------------------------------------------------------G The ML-INQ program first opens the file "CALLER.INF" to get general information about the system and the caller. CALLER.INF is a text file created automatically by D'Bridge just before spawning the REQUEST SERVER task. Here's what my CALLER.INF contains at the moment: 1:101/200 (The Fidonet address) TC-Trader (The system name) Cheryl Buzzell (The operator name) C:\DB\FILES\ (My INBOUND FILES DIRECTORY path) ML-INQ then opens the file "C:\DB\FILES\MEGALIST.INQ" to get the actual request from the caller. Then, it prepares the file "MEGALIST.OUT" con- taining the results of the search. Finally, ML-INQ creates the OUTPUT FILE LIST, this time called MEGALIST.LST (in the current directory); this file contains the list of files to send back to the caller, then erase. In this case, the OUTPUT FILE LIST only contains MEGALIST.OUT. Finally, ML-INQ returns control to D'Bridge and the file gets sent and deleted as specified. The request file, MEGALIST.INQ, is also erased. A request server may transmit files without erasing them (if they are available for file-request) simply by creating a WaZOO-style request file (with the extension .REQ) in the INBOUND FILES DIRECTORY. D'Bridge will treat these files like inbound file requests. IMPORTANT: It is essential that any REQUEST SERVER takes no more than 30 seconds to execute. Taking more time than this can cause the calling system to timeout and hang-up. EXTERNAL RECEIVERS External receivers: GCONNECT FAX|*X50 H This feature is designed for use with combination modems that also handle FAX and/or VoiceMail. The above example causes D'Bridge to exit with errorlevel 50 when a "GCONNECT FAXH" response is received from the modem. The syntax for this field is: <GMODEM RESPONSEH>|<GDOS commandH> ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.11 SECURITY MISCELLANEOUS 94 --------------------------------------------------------------------------------G EXTERNAL GATEWAYS External gateways: G H Again, this is a VERY advanced feature and will not be used by 99% of the D'Bridge systems out there; this is for the other 1%: An EXTERNAL GATEWAY allows D'Bridge to act as a "front-end" for up to 20 other EMAIL receivers at the same time. The way this works, is by defining a specific "SYNC" sequence; D'Bridge can look for that sequence and spawn another EMAIL system while the calling system is still on. This way, D'Bridge can be compatible with as many systems as possible. As of this time, I know there are gateway programs for UUCP and USENET. I'm sure there are others I just don't know about. As an example, let's say I want to install a UUCP mail receiver "on top" of D'Bridge. I have a program written for the IBM PC which will receive mail when a call is received. Assuming this program features an option to respond to a call already in progress and terminate after finishing the session, it is compatible. The first thing you need to do is figure out what the SYNC sequence is. A SYNC sequence is the sequence of bytes the calling system sends to the receiving system (multiple times) until the receiver responds with an acknowledgment that it is ready to begin a mail session. D'Bridge can be programmed to recognize up to 20 separate sequences of up to 16 bytes each and spawn a different task depending on which one is received. For example, let's say your UUCP transmitter continuously sends the sequence: 9F, A9, 9F, A9... (hex) until the receiving system acknowledges. For this sequence, simply specify your EXTERNAL GATEWAYS field as: 9F/A9 UUCP_RCV -b*b -p*p As soon as an incoming call is detected sending the sequence 9F, A9, D'Bridge will spawn the UUCP mail receiver with the following command line: UUCP_RCV -b2400 -p1 Just like described in DOS BBS COMMANDS, the BAUD RATE and PORT NUMBER can be substituted by using a *B and *P respectively. It is up to the spawned task (UUCP_RCV in this case) to handle the mail session from this point on; it should terminate as soon as the mail is received and make sure it doesn't answer any calls itself. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.11 SECURITY MISCELLANEOUS 95 --------------------------------------------------------------------------------G GH Because of the normal operation of D'Bridge, we've restricted three characters: 1B (Escape), AE (Fidonet TSYNC), and F1 (WaZOO YOOHOO character). These three bytes may not be a part of your SYNC string. It is also suggested you use bytes with high parity (greater than 7F (hex)) to prevent "human" users from easily activating your alternate mailer. FIDONET PROTOCOL FOR Fidonet protocol for: GNONE H If you want to override the default EMSI/WAZOO protocol D'Bridge uses and revert to XMODEM/TELINK protocols, specify the NET/NODE filter here. This field should contain "NONE" in all but the strangest setups. WAZOO PROTOCOL FOR WaZOO protocol for: GNONE H If you want to override the default EMSI protocol D'Bridge uses and revert to the YOOHOO-YOOHOO/2U2 handshake, specify the NET/NODE filter here. This field should contain "NONE" in all but the strangest setups. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.12 DISK SPACE MINIMUMS 96 --------------------------------------------------------------------------------G 3.12 DISK SPACE MINIMUMS The GDISK SPACE MINIMUMH screen allows you to set minimum criteria for system operation: - System operation minimum - BBS operation minimum - Unpack/forward minimum SYSTEM OPERATION The system operation line specifies the minimum disk space allowed (in Kb) before D'Bridge will completely shut down. Once shut down, D'Bridge will not reactivate without human interaction. Either disk space must be freed, or DB SETUP must be used to change the minimum. BBS OPERATION The BBS operation line specifies minimum disk space criteria for BBS operation. If disk space is below specified criteria, human callers will be told the BBS is offline due to disk space shortage. UNPACK FORWARD The unpack/forward line specifies the minimum disk space required before a mail packet may be decompressed or unpacked. Once this limit is reached, all ECHOmail and NETMAIL unpacking will be halted. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.13 ACCOUNTING TRANSLATION 97 --------------------------------------------------------------------------------G 3.13 ACCOUNTING TRANSLATION The GACCOUNTING/TRANSLATIONH screen allows you to set up costing data and controls which determine where D'Bridge calls and when. This system allows for minimum telecommunications cost when NORMAL priority is used. A default table of USA-EAST.COS (an exported file) is included by default. Contact your nearest D'Bridge dealer for a local, more recent cost file. PREFIX Prefix: G1-513- H This is the "key" to the database record. You cannot change it. If you must, you need to remove and add the record again. The PREFIX field is the first part of a phone number (which will be replaced with the 4TRANSLATE TO5 field when a number is dialed). TRANSLATE TO Translate to: G1- H When phone number are translated, this field will be used to replace the PREFIX for dialing. The field is actually broken down into two subfields: 4PREFIX5 and 4SUFFIX5. If you need to dial something after the number, such as a credit card or billing account number, you may specify a 4SUFFIX5 by using a vertical pipe ( | ) to separate the 4PREFIX5 from the 4SUFFIX5. An example would be: 1-305-370|,,3188. ",,3188" would be sent to the modem after dialing. The two commas represent a modem command meaning "pause a few seconds before dialing the following digits". LOCATION Location: GSouthwestern Ohio H This is just a description field for your information. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.13 ACCOUNTING TRANSLATION 98 --------------------------------------------------------------------------------G COST DATA SOURCE Cost data source: GTableH Here, you either specify GTableH or GXrefH for the data source. If you use GXrefH, you will be prompted for another prefix to cross-reference. Otherwise, you will use the table listed below... The box at the bottom of the screen contains the cost information. In order to keep communications costs low, D'Bridge has adopted a system of "cost-based control". This means the system can be programmed to place all calls during the most economical periods based on this cost screen entirely. The cost-information for calling a given country or city can be acquired by calling your long-distance company. Typically, there are different rates on different days and at different times. This table allows you to specify up to 5 cost-periods for accounting and control purposes. When D'Bridge looks at these cost-tables, it searches from the top of the list to the bottom, stopping on the first match. For this reason, "catch-all" entries, like the one shown at the bottom of our example should be listed last. For flexibility and simplicity, you are allowed to define overlapping periods, but nevertheless D'Bridge will always select the first applicable period for accounting and control. Please note that any time-ranges left undefined are assumed "free" and D'Bridge will actually try to dial out during these times. Therefor: GDON'T LEAVE ANY TIME-RANGE UNSPECIFIED.H REFERENCE PREFIX Reference prefix: G1- H When using a cross-referenced table, you must specify the prefix whose table you wish to use for costing and control purposes. The translation will still be based on the data listed above, but now it will be applied to the referenced table. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.13 ACCOUNTING TRANSLATION 99 --------------------------------------------------------------------------------G TABLE WEEKDAYS All S M T W T F S H In these fields, specify for which day(s) the costing-line is applicable. Any non-blank character will designate a weekday. GHH stands for holiday. TABLE START TIME Here, you specify the starting time for the cost period. Make sure you use 24-hour time format (e.g. 23:00 is 11:00 pm). TABLE END TIME In this field, you specify the ending time for the cost period. TABLE NCI Here's the CRITICAL part to understand. During a given cost-period, you may choose which priorities of mail you would like to be sent. In the NCI field, you may specify any or all of the letters GNH, GCH and GIH, desig- nating the priorities NORMAL, CRASH and IMMEDIATE. If you list all three "GNCIH," then all priorities of mail are allowed to be sent during this cost-period. If you enter "GCIH," then just CRASH and IMMEDIATE mail will be sent. This allows you to send NORMAL priority mail during the low-cost periods and higher priority mail anytime (that's what this example shows). TABLE FIRST PERIOD COST In this field, enter the cost associated with the first billing period. This is a decimal number with three digits after the decimal point. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.13 ACCOUNTING TRANSLATION 100 --------------------------------------------------------------------------------G TABLE FIRST PERIOD SECONDS Specify the number of seconds on which the FIRST PERIOD COST field is based. In the United States, this is normally "60", but other countries and/or long-distance carriers may have a different billing increment. TABLE SUBSEQUENT PERIOD COST In this field, enter the cost associated with the subsequent billing periods. This is a number with three digits after the decimal point. TABLE SUBSEQUENT PERIOD SECONDS Specify the number of seconds on which the SUBSEQUENT PERIOD COST field is based. In the United States, this is normally "60", but other countries and/or long-distance carriers may have a different billing increment. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.14 ZMODEM PARAMETERS 101 --------------------------------------------------------------------------------G 3.14 ZMODEM PARAMETERS The GZMODEM PARAMETERSH screen allows you to set the behavior of the ZMODEM protocol which D'Bridge uses to send EMAIL. Parameters include: - Starting block size - Maximum block size - Recover block size - Block step rate - Direct ZMODEM STARTING BLOCK SIZE This is the block size to be used at the start of a ZMODEM file-transfer. This must be a power of two between G32H and G8192H (G32H, G64H, G128H, G256H, G512H, G1024H, G2048H, G4096H or G8192H). MAXIMUM BLOCK SIZE This is the largest block size D'Bridge will use in ZMODEM. The value will increase from the STARTING BLOCK SIZE to MAXIMUM BLOCK SIZE using the BLOCK STEP RATE specified here. RECOVERY BLOCK SIZE This is the block size to be used after an error has been reported by the receiver. Normally, this value should be less than the starting block size because where there is one error (phone noise) there may im- mediately be another. Making the recovery block size small reduces the amount of time it takes the system to recover from bad line noise. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.14 ZMODEM PARAMETERS 102 --------------------------------------------------------------------------------G BLOCK STEP RATE When the ZMODEM sender is not receiving error reports from the receiver, it will increase the block size by doubling it after "x" successful blocks until it reaches the MAXIMUM BLOCK SIZE specified. The BLOCK STEP RATE is "x". In other words, it tells the system after how many con- secutive good blocks it may increase the block size. By default, D'Bridge uses a factor of 4. DIRECT ZMODEM When D'Bridge communicates with other EMAIL systems capable of the GDZAH or GIZEH protocols, you have the option of increasing throughput an average of 1.6% by selecting direct ZMODEM. By answering GYesH to this parameter, the protocol will transmit the XON and XOFF characters transparently rather than "escaping" them as the ZMODEM specification calls for. If you are having ZMODEM trouble, try setting this to GNoH to see if it makes a difference. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.15 SETUP EDITOR OPTIONS 103 --------------------------------------------------------------------------------G 3.15 SETUP EDITOR OPTIONS The GSETUP EDITOR OPTIONSH screen allows you to control the behavior of the internal editor or configure an extrernal editor such as GoldED. EMAIL EDITOR EMAIL editor: GInternalH (GIHnternal/GGHoldED/GOHther) This selects the EMAIL editor to be used when ALT-E is pressed or the menu option "READ/EDIT EMAIL" is selected. The default is GInternalH, but GGoldEDH and many other Fidonet-compatible editors may just as well be used. EDITOR REBUILD QUEUE Rebuild queue? GYesH This parameter gives you the option to automatically rescan the NETmail area after EMAIL has been entered or deleted. This scan will happen im- mediately after exiting the editor. If you want the mail scanned automa- tically, specify GYesH here. It will not scan automatically if you spe- cify GNoH. EDITOR SCAN ECHOMAIL Scan ECHOmail? GYesH If you want to send ECHOmail messages immediately after leaving the editor, specify YES here. The D'Bridge ECHOmail scanner knows what areas need to be scanned if any. If you don't say YES here, then ECHOmail will not be sent until an ECHOscan is run either in an event or manually using the menu option: GUTILITIESH/GProcess ECHOmailH. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.15 SETUP EDITOR OPTIONS 104 --------------------------------------------------------------------------------G EDITOR SOUND EFFECTS Sound effects? GYesH This specifies whether the "warning beeps" will be active in the internal editor. Answer GYesH, and change it to GNoH later if the noise bothers you. EDITOR DEFAULT PRIORITY DEFAULT: Priority? GNormalH (GIHmmediate/GCHrash/GNHormal/GHHold) This specifies the default priority for EMAIL messages. The priority de- termines when (if at all) the message will be transmitted from the system. Four priorities are available, listed here from highest to lowest: GIMMEDIATEH When a message is flagged as IMMEDIATE, it has the ultimate priority on the system. All IMMEDIATE messages must be transmitted before any other out- bound calls are possible. Using this priority is quite effective in getting the mail out fast, but has the disadvantage of slowing down outbound mail traffic if the IMMEDIATE systems are busy or not answering. GCRASHH Messages flagged as CRASH are allowed to be sent anytime, 24-hours a day. Unless a "hold" override is placed on a system, an EMAIL message with CRASH priority will be sent during the UNEVENT or any scheduled event. If entered during the day, CRASH- priority messages will most-likely be sent at the highest phone rates. GNORMALH When a message is flagged as NORMAL, it will not be transmitted until a scheduled mail event occurs. Using this priority (usually overnight delivery) is the most cost-effective way to use D'Bridge for EMAIL. GHOLDH When a message is flagged as HOLD, it will not be sent until the destination system polls or another non-HOLD message is entered. Use HOLD priority if you intend for most systems to call to pickup their mail. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.15 SETUP EDITOR OPTIONS 105 --------------------------------------------------------------------------------G EDITOR FORCED ROUTING Forced Routing: GNone H (GDHirect/GHHub/GNHone) Choose the desired routing method for NETmail messages entered using the internal editor: GDIRECTH This designates all messages (by default) to go directly to the destination systems, bypassing any event-specific routing controls. GHUBH This defaults all messages to be HUB- or HOST-routed. GNONEH This defaults to standard routing as defined in each mail event. EDITOR DEFAULT PRIVATE Default private? GYesH This specifies whether the editor will default all new messages to private status or not. "Private" usually means the EMAIL is only intended for the receiver. However, you should note that mail can be read on all systems it passes through (unless the messages are encrypted somehow). EDITOR DEFAULT KILL SENT Default Kill/Sent? GNo H This specifies the default for the "Kill when sent" flag in the editor. If you have no use for a copy of outbound mail, you might want to specify GYesH here. Mail flagged KILL/SENT is erased after being sent to the next destination. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.15 SETUP EDITOR OPTIONS 106 --------------------------------------------------------------------------------G EDITOR DEFAULT ARCHIVE SENT Default Archive/Sent? GYesH This specifies the default for the "Archive when sent" flag in the editor. If you want to save a copy of the outbound mail in a text file "archive", answer GYesH here. When a message is sent, it will be added to the text file, showing the date and time of transmis- sion; the original message will subsequently be erased. EDITOR DEFAULT XMAIL Default XMAIL? GNo H This specifies the default setting for the "XMAIL" flag. If set to GYesH, all NETmail entered using the internal editor will, by default, be sent as com- pressed mail utilizing the compression method defined in the XMAIL CONTROL screen. When NETmail is marked as XMAIL, it will be marked as sent, deleted and/or archived when the queue is built, making it impossible to re-edit the message later. Unless this is really what you want, it is suggested you spe- cify GNoH here. EDITOR DEFAULT INSERT Default insert? GNo H This specifies the default state of the "insert mode" in the editor. Some people prefer to work in insert mode; others don't. If you want "insert" to be on in the editor by default, answer GYesH here. EDITOR DEFAULT INTL ADDRESSING INTL addressing? GYesH In the multi-zone world of EMAIL today, it is almost mandatory for all NETmail to contain international (zone-aware) addressing. Answer GYesH to this question unless there's a REALLY GOOD reason not to do so. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.15 SETUP EDITOR OPTIONS 107 --------------------------------------------------------------------------------G EDITOR QUOTE SEENBYS Quote SEEN-BYs? GNo H When entering a quoted reply with the internal editor, this field gives you the option of including ECHOmail SEEN-BY information in the reply text. If you want this, answer GYesH, otherwise specify GNoH. EDITOR USERS Valid users: GChris Irwin,SECRET H Here, you specify a list of valid users and their "passwords". The correct format for a user line with a password is: <GUSERNAMEH>[,<GOPTIONAL PASSWORDH>] If more than one line is entered here, every time the editor is run, you must specify which user you are. This is for the "FROM" field in the message editor. If you only specify one line, you won't have to confirm anything (except your password, if specified). GOLDED PATH GoldED path: GC:\GOLDED H If you have chosen GGoldEDH as your EMAIL reader/editor, specify the directory path where this program is located. EDITOR DOS COMMANDS DOS commands: GC:\MYEDIT\MYEDITOR /C /U H If you have chosen GOtherH as your EMAIL reader/editor, specify the DOS commands to invoke your editor here. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.16 ECHOMAIL AREAS 108 --------------------------------------------------------------------------------G 3.16 ECHOMAIL AREAS The GECHOMAIL AREASH screen allows you to define the local and ECHOmail areas that you wish to use with D'Bridge. ECHOMAIL CODEWORD Codeword: GDBRIDGE H The CODEWORD is a word from 1 to 16 characters which you designate as a mnemonic reference to an area. It could be a word like POL for politics or PROG for programming conference. CODEWORDs must be unique - "NETMAIL" and "BADECHO" are predefined by the system and may not be used here. ECHOMAIL ALERT FLAG Alert flag: GDH If you wish to be notified (on the status line) about new mail in this area, specify a one character "flag" here. When mail is received, the mailer will show it by listing the defined "flag" character on the right side of the bottom status line. ECHOMAIL SECURITY LEVEL Security level: G500 H The SECURITY LEVEL is used by the AREAFIX subsystem to allow other systems to automatically add or delete themselves from ECHO links. Security levels range from G0H to G9999H; if a system has a security level of 50, it has access to all areas with a SECURITY LEVEL of 50 or less. If you don't want anyone to have access to an area, define its level to be 9999. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.16 ECHOMAIL AREAS 109 --------------------------------------------------------------------------------G ECHOMAIL GROUP SORT Group/Sort: GA1H GROUP/SORT is a two-byte field; the first character is the AREAFIX access group; the second is the sort code for use with DBUTIL SORT AREAS. In AREAFIX, each area is assigned a GROUP code. Each system with an AREAFIX password also has one or more group codes associated with it. Only those systems with matching GROUP codes have access to a given area. ECHOMAIL DESCRIPTION Description: GD'Bridge Support Conference H This description field will be used throughout the system to describe the conference. ECHOMAIL STORAGE Storage method: GFido H (GFHido/GQHuickBBS/GNHone) There are three choices for the storage method of a message base: GFIDOH With FIDO format, each message is stored in a separate file in the specified directory. This is the most common storage format among Fidonet-based systems, but has the disadvantage of being slower than the other formats. GQUICKBBSH With the QUICKBBS format, messages are stored directly in a QuickBBS message base. This base may exist stand- alone or in conjunction with a QuickBBS system. GNONEH If NONE is specified, the area is regarded as an area "passing through" your system. The messages are not ac- tually stored on this system, just forwarded to the spe- cified systems. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.16 ECHOMAIL AREAS 110 --------------------------------------------------------------------------------G ECHOMAIL DIRECTORY PATH Directory path: GC:\FIDOMAIL\DBRIDGE\ H Specify the directory path to use for Fido-style messages. This directory will contain the message files, such as: GDirectory of C:\FIDOMAIL\DBRIDGEH G1 MSG 1847 12-06-92 11:15aH G2 MSG 1511 12-06-92 11:15aH G3 MSG 1459 12-06-92 11:54pH . . Gnnnn MSG 505 12-15-92 11:07aH ECHOMAIL QUICKBBS AREA NUMBER QuickBBS areas #: G32 H Each QuickBBS area must have a unique area number in a range from G1H to G200H. If you accidentally assign the same number to different areas, you will locally "crosslink" the conferences. Specify a GUNIQUEH number here or match your existing BBS setup. ECHOMAIL DEFAULT PRIVATE Default private? GNo H If you want the editor to flag messages as PRIVATE by default, answer GYesH. This only affects the internal message editor when entering or replying to messages. Most ECHOmail conferences are by nature "public" - Private ECHOmail can be read by all receiving system operators. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.16 ECHOMAIL AREAS 111 --------------------------------------------------------------------------------G ECHOMAIL ARCHIVE FILE Area archive: GC:\ECHO\DBRIDGE.TXT H If you want D'Bridge to save a copy of each message purged when GDBUTILH GPURGEH is run, specify a text file to "archive" them in. Each area may write messages to a different file, or you may combine several areas into a single text file. If you don't want to save a copy of the messages, just leave this field blank. ECHOMAIL PURGE CRITERIA Purge except: G100 H messages Purge after: G30 H days In the DBUTIL PURGE program, there are two options for deciding which messages to erase from the system. When the cursor is on this field, you may press the GF10H key to switch between the methods: PURGE EXCEPT and PURGE AFTER. With PURGE EXCEPT, DBUTIL will erase all but "x" messages; specify "x" in this field as "how many messages to save after purging". With the PURGE AFTER option, DBUTIL will purge messages based on their age. PURGE AFTER 30 DAYS means to erase all messages over 30 days old when the utility is run. ECHOMAIL PRESERVE MESSAGES Preserve: G200 H messages In DBUTIL PURGE, you may specify a certain number of messages to ignore while purging. These will be the lowest-numbered messages in the area and contain information you don't want erased such as conference rules, etc. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.16 ECHOMAIL AREAS 112 --------------------------------------------------------------------------------G ECHOMAIL AREA TYPE Area type: GECHOmailH (GEHCHOmail/GLHocal) User-defined areas are either GLocalH or GECHOmailH. The default is GECHOmailH. D'Bridge ignores LOCAL areas except while in the editor; when an ECHOscan is executed, all ECHOmail areas are scanned for outbound mail. ECHOMAIL CONFERENCE NAME Conference name: GDBRIDGE H Each ECHOmail area must have a unique CONFERENCE NAME. This may be the same as or different from the CODEWORD specified above, but must reflect the actual ECHOmail name or conference tag used for the specified area. The CONFERENCE NAME may be up to 54 characters and must not contain any spaces; when creating a new ECHOmail conference, it is suggested your CONFERENCE TAG should not exceed 16 characters if at all possible to maintain compatibility with other systems. ECHOMAIL ORIGIN LINE Origin line: GNancy's BBS - Middletown, Ohio H The ORIGIN LINE defaults from your SYSTEM NAME (specified on the BASIC CONFIGURATION screen) and will be added to the bottom of all ECHOmail messages originating from your system. Typically, sysops use the name of their system and the city where it is located. ECHOMAIL ALIAS ADDRESS Alias address: G H If you are a member of more than one network, it might be necessary to use an "alias" address on an ECHOmail area. This means that the address put on the ORIGIN-LINE of the messages will be different than your pri- mary address. Most systems would leave this blank. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.16 ECHOMAIL AREAS 113 --------------------------------------------------------------------------------G ECHOMAIL TINY SEENBYS Tiny SEEN-BYs? GNo H If you say GYESH to TINY SEEN-BYs, then only the systems you are forwar- ding a conference to will appear on the SEEN-BY lines. This is fine if you are a "leaf node" or a local ECHO hub; GPLEASE NOTE THAT USING THISH GOPTION IS NOT ALLOWED IN SOME NETWORKS - CONTACT YOUR LOCAL ECHOMAILH GCOORDINATOR FOR MORE INFORMATIONH. ECHOMAIL DEFAULT PRIORITY Default priority: GNormal H (GIHmmediate/GCHrash/GNHormal/GHHold) For each conference, you specify a DEFAULT PRIORITY for forwarding of ECHOmail. Choose either GIMMEDIATEH, GCRASHH, GNORMALH or GHOLDH; This default may be overridden for any specific system. ECHOMAIL FORWARD TO Forward to: G1:110/68 22 .20 H The FORWARD TO fields allow you to specify a list of systems to whom you wish to forward this ECHOmail conference. You may specify as many systems as will fit on the 5 lines available; the systems should be separated by spaces and be in the format: GZONEH:GNETH/GNODEH[,GPRIORITYH] or .GPOINTH[,GPRIORITYH] Here's an example: G1:18/0 1:105/3 1:110/22,C .20,HH In this example, G1:110/22H has GCRASHH priority as an override and G.20H has GHOLDH priority specified. Please note that you may only forward ECHOmail to points or your own node. You may not send NETmail or ECHOmail directly to a point of another system. With this example, if I enter an ECHOmail message in this area, it will automatically be forwarded to these four systems, who will in turn send my message on to all the other systems participating in the conference. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.17 WINDOW COLORS 114 --------------------------------------------------------------------------------G 3.17 WINDOW COLORS The GWINDOW COLORSH screen allows you to set the screen colors that D'Bridge will use. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.18 KEYBOARD MACROS 115 --------------------------------------------------------------------------------G 3.18 KEYBOARD MACROS The GKEYBOARD MACROSH option allows the operator to define "macros" that cause keys, ALT F1-F10 and CONTROL F1-F10, to substitute preprogrammed text while editing. This might be handy for "canned" introductions, signatures or whatever you can think of. Twenty keys may be defined and each key can have any amount of text desired. Note: This limit is RAM- based, so check your memory status if in question. The cursor will appear on the top line. Fields may be changed by typing over the current values or by using the field edit keys: INSERT, DELETE, LEFT and RIGHT arrows. Pressing ENTER or the DOWN arrow advances to the next line and pressing the UP arrow moves the cursor to the previous line. You must press the ESC key to exit this window and save the setup. The above example shows the definition for the CONTROL-F1 key as being my mailing address. Each key is defined in its own window. All vertical pipe characters "|" are translated to hard-returns in the editor. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 3.19 TRANSLATION TABLE 116 --------------------------------------------------------------------------------G 3.19 TRANSLATION TABLE The GTRANSLATION TABLEH screen allows you to redefine how certain characters will be displayed. This may be used to allow line-drawing or foreign character sets to be used in the internal message editor. The ALT-keys (a-z) may be defined as displaying any character and transmitting it as a normal printable character in the range of 33-126. This is an advanced option and is not normally needed, so if you have no need for foreign character sets, skip this screen. It allows you to redefine part of the printable character set as translating to non-standard characters. Pressing the GLEFTH and GRIGHTH arrow keys scans through the characters, helping you to locate the proper ASCII code. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 4.00 SYSTEM IDLE COMMANDS 117 --------------------------------------------------------------------------------G 4.00 SYSTEM IDLE COMMANDS When D'Bridge is idle, you have full control over its functions. The following single-key commands are available when the word "GIDLEH" appears in the upper-left corner of the screen: GCHall Makes the next outbound call immediately, if any GRHetry Retries the last outbound call, if any GNHext Advances the pointer to the next outbound call GPHrev Returns the pointer to the previous outbound call GHHold Places the queue entry selected on hold status GQHuickDial Activates QuickDial mode; no pause between calls GESCH Displays the main menu GF1H Activates the Help system GALT-CH Call a system from the nodelist in terminal mode GALT-DH Call a system from your directory in terminal mode GALT-EH Read/Edit EMAIL messages GALT-FH Request file(s) GALT-HH History display GALT-IH Information display GALT-KH KatGuard (electronic keyboard cover) GALT-LH View system log file GALT-NH New ECHOmail link GALT-PH Poll a node GALT-QH Rebuild outbound queue GALT-RH Request ECHOmail link GALT-SH Toggle display of the schedule window GALT-TH Transmit file(s) GALT-VH View/Modify queue GALT-XH Exit D'Bridge (Quit) GALT-YH Push to DOS shell (small) GALT-ZH Drop to DOS shell (large) HOLD ALL MAIL Selecting the GHOLD ALL MAILH menu option will immediately place all outbound mail on HOLD. The hold will come off at midnight, when a new event starts or by using the GVIEW/MODIFY QUEUEH command, GALT-VH. This command only holds mail until midnight at the latest. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 4.00 SYSTEM IDLE COMMANDS 118 --------------------------------------------------------------------------------G VIEW MODIFY QUEUE Selecting the GVIEW MODIFY QUEUEH option (or pressing ALT-V from IDLE mode) allows you direct access to the outbound mail queue allowing you to view, erase or change priorities of queue entries. The top line of the queue should be highlighted. To view or change a queue item, first move the highlight bar to the desired entry using the GUPH and GDOWNH arrows. Next select one of the following commands by pressing the first letter of the option (I for Immediate, etc.) GQUEUE: NHext, GPHrevious, GIHmmediate, GSHend, GHHold, GRHeset, GFHorce, GVHiew, GKHill GNEXTH The NEXT option advances to the next outbound call. GPREVIOUSH The PREVIOUS option returns to the previous outbound call. GIMMEDIATEH The IMMEDIATE option will change the priority of an entire queue entry to immediate until the next NETmail scan. If the queue entry is FORCED or is a unlisted system, this option is not valid and the computer will sound the "foghorn". GSENDH The SEND option will change the priority of an entire queue entry to crash priority. This change only lasts until the next NETmail scan. If the queue entry is FORCED or unlisted, the computer will sound the "foghorn". GHOLDH The HOLD option causes an entire queue entry to be held and not transmitted unless the receiving system poll for it. This option is not valid if there is a FORCED PRIORITY for the system. GRESETH When you RESET LIMITS for a queue entry, both the number of TRIES and CONNECTS is reset to zero, allowing the queue entry to be transmitted during this event even if the retries limit has been exceeded. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 4.00 SYSTEM IDLE COMMANDS 119 --------------------------------------------------------------------------------G GFORCEH When you FORCE a priority for a certain system, that system will be forced to that priority "until further notice". The only way to override the FORCE is to remove it by specifying "NONE" here. When you press "F" for FORCE, a menu is displayed: GFORCED MODE: IHmmediate, GCHrash, GHHold or GNHone Choose which priority to force this system to; if you don't want to do this, just press ESC and no change will be made. Select the priority or "N" to remove the "force". When a node is forced, it is designated by an exclamation point "!" next to the address. GVIEWH Viewing a queue entry lets you "look inside" a queue entry and see which messages and files are queued to send. Some general information about a system is displayed on the left; on the right is a detail window which may be scrolled up and down by using the UP, DOWN, PGUP and PGDN keys. Press ESC to exit view mode. GKILLH KILL is a very dangerous option because it allows you to erase any or all outbound mail and requests with one extra keystroke. Pressing "K" will display a window asking what you would like to KILL. If you don't want to KILL any part of the entry, press ESC to cancel. Otherwise, choose from the menu which lets you erase everything or just one "part" of the queued entry. You'll have to try it to really understand - just be careful. When you are finished VIEWING and MODIFYING the queue, just press ESC to exit this screen. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 4.00 SYSTEM IDLE COMMANDS 120 --------------------------------------------------------------------------------G REBUILD QUEUE The GREBUILD QUEUEH option causes D'Bridge to erase all the packets currently in the QUEUE window and re-scan for outbound mail. This is the same thing that happens when D'Bridge begins a mail event. This is handy for recreating packets if you had previously aborted the scan when D'Bridge first came up or you entered some messages in the editor (although there IS an option to automatically re-scan NETmail after leaving the editor). GREBUILD QUEUEH will normally create packets for all outbound mail regardless of whether it is CRASH priority or not; typically, all crash- mail will be sent, and all other mail will be on hold. This can easily be changed by using the GVIEW/MODIFY QUEUEH command, GALT-VH. POLL A NODE The GPOLL A NODEH option causes D'Bridge to call the specified system to pick up mail which may be on "hold" there. D'Bridge will simply ask you "Poll whom?" and you enter either the address of the system to call or the operator's name. If you enter a name, it will display a list of all systems with the Operator name you specify (if you enter "JOE," it will display all the "JOEs" in your nodelist and allow you to select the one you wish. If you don't know the address, five function keys (GF1H-GF5H) will aid you in your search. Once you have determined the system to call and pressed ENTER, D'Bridge will add a POLL entry to the queue with the specified priority. If you use IMMEDIATE or CRASH priority, the POLL will happen right away. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 4.00 SYSTEM IDLE COMMANDS 121 --------------------------------------------------------------------------------G TRANSMIT FILES The GTRANSMIT FILE(S)H option gives you a simple and quick way to send files to another system. Any file which can be copied using the DOS "COPY" command can be sent with D'Bridge. Similar to the GPOLL A NODEH command, the GTRANSMIT FILE(S)H option asks you for the destination address. Here, you may enter the address of the system or part of the operator's name. Once you've entered the address, D'Bridge will ask you for a list of files to transmit. You may enter as many files as you wish, one per line. Make sure you've included the DOS subdirectory if they aren't in the current directory. If D'Bridge can't find a file, the cursor will simply be stuck on the line until you press ESC (to cancel the entire request), press the UP arrow or enter a valid (exis- ting) DOS filename. When you're satisfied you've entered the list cor- rectly, press ENTER. You may also use the DOS "wildcard" characters "*" and "?" to specify a group of files to send. To use a priority other than the default, enter <GFILENAMEH> <GPRIORITYH> in the window: GC:\AUTOEXEC.BAT ImmediateH GC:\DATA\BIGFILE.ZIP HoldH ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 4.00 SYSTEM IDLE COMMANDS 122 --------------------------------------------------------------------------------G FILE REQUEST The GFILE REQUESTH option allows you to request that a remote system sends you file(s). With a network of all D'Bridge systems, all file requests are really update requests. This means that if you already have a file and you re-request it, it will only be sent if the file size or date/time are different. To use the FILE-REQUEST option, simply enter the address of the system you wish to call (just like MANUAL POLL and TRANSMIT FILE(S)) and enter a list of files you wish to receive. If you're not sure of the exact filenames, you may use the DOS "wild- card" characters "*" and "?." After you have entered the entire list of files to request, press ENTER and D'Bridge will add the request to the outbound mail queue. To use a priority other than the default or file-request passwords, use: <GFILENAMEH>[,<GPASSWORDH>] <GPRIORITYH> GFILE1,SECRET ImmediateH GFILE2 CrashH Note that HOLD is not a valid priority for file-requests. Requests only work when you call the remote system. INFORMATION DISPLAY The GINFORMATION DISPLAYH screens provide summary information about D'Bridge. Execution times and traffic-volume information are collected and available for display in three different forms: GSUMMARYH This provides traffic and data volumes for the year, month, week, yesterday and today. GTIME USAGEH History of execution times is displayed on this screen. GACTIVITY GRAPHH This shows a graphical representation of the operation of D'Bridge. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 4.00 SYSTEM IDLE COMMANDS 123 --------------------------------------------------------------------------------G READ / EDIT EMAIL The GREAD/EDIT EMAILH option causes D'Bridge to load the selected EMAIL editor. The screen will clear and the editor will be loaded, ready for you to read and respond to EMAIL messages. GDB EDITH may also be run directly from the dos prompt; it is used to enter and read the EMAIL messages D'Bridge sends and receives. D'Bridge utilizes the Fidonet standard message format used by so many other EMAIL systems, bulletin boards and utilities. This will allow you to use a great variety of external programs such as "robot" mailers, form-letter generators and editors. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 4.00 SYSTEM IDLE COMMANDS 124 --------------------------------------------------------------------------------G HISTORY DISPLAY When you select the GHISTORY DISPLAYH option, GALT-HH, you will receive a menu of available history screens. There are four screens on the menu: GOUTBOUND HISTORYH The outbound history screen simply displays a log of all outbound mail calls within the last "n" days (specified on the BASIC CONFIGURATION screen). This display always starts at the end by showing you the most recent call. The GUPH, GDOWNH, GPGUPH and GPGDNH keys scroll the screen, GESCH exits. This display lists the date, time, destination, bytes sent/received, elapsed time and actual cost of the connection. GINBOUND HISTORYH The inbound history screen simply displays a log of all incoming mail calls within the last "n" days. This display lists the date, time, origin, bytes sent/received, elapsed time. Since this is inbound mail, there is no cost involved. GRECEIVED ECHOMAIL HISTORYH The received ECHOmail history screen displays a log of all ECHOmail messages received within the last "n" days. This display lists the date, time, destination, bytes sent/received, elapsed time and actual cost of the connection. GAREAFIX LOGH The AREAFIX log screen displays a log of all automatic additions to your "forward-to" list in the area manager. These may be in the form of AREAFIX requests or may be entered manually by using the GNEWH GECHOMAIL LINKH, GALT-NH option. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 4.00 SYSTEM IDLE COMMANDS 125 --------------------------------------------------------------------------------G VIEW SYSTEM LOG The GVIEW SYSTEM LOGH command allows you to scroll through the system log file and search it for keywords. Besides the standard cursor control keys, the following keys are active here: G+H/G-H The GPLUSH and GMINUSH keys change the date of the display (pressing the minus key three times displays the log from 3 days ago.) GMHorning Displays log entries starting at midnight. GAHfternoon Displays log entries starting at noon. GEHvening Displays log entries starting at 6:00 PM. GSHearch Enters "search mode" GHHighlight Allows entry of highlight keywords and colors. GUSING SEARCH MODEH Search mode has two ways to look for log entries: GKEYWORD SEARCHH Searches for any match in a list of keywords. GTEXT SEARCHH Searches for the first occurrence of a substring. The GNHext and GPHrevious commands actually invoke the search. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 4.00 SYSTEM IDLE COMMANDS 126 --------------------------------------------------------------------------------G REQUEST ECHOMAIL LINK AREAFIX is a subsystem within D'Bridge enabling you to remotely request new ECHOmail links from a HOST or FEED system. This system, designed by Greg Dawson, eliminates the need for manual intervention on the part of the HOST system operator. Now that handling hundreds of ECHOmail conferences on a single system is a daily reality, this automated system of forwarding maintenance is required. The GREQUEST ECHOMAIL LINKH, GALT-RH command allows you to request a remote system, either STARTs or STOPs forwarding of ECHOmail conferences. To use this feature, you must pre-arrange a PASSWORD with the operator of your ECHOmail feed. First, enter the address of the system to request ECHOmail from. If you have not established an AREAFIX password for the specified system, D'Bridge will ask you to assign one at this time. AREAFIX will not function without a security password (for good reason!). AREAFIX pass- words may also be entered on the PACKET/MAIL CONTROL screen. Next, enter a list of CONFERENCE TAGS desired, one per line; press ENTER on a blank line when finished. If you wish to remove a conference rather than adding it, simply put a minus sign "-" before the tag. If you wish to receive a list of available ECHOmail from your ECHO link, answer YES to "Area listing?". If you want the host system to rescan the message base, sending you all the old messages, answer YES to "Get old messages?". Finally, choose the EMAIL priority you wish to use for transmitting the request. This priority has no connection to the one with which you will receive the ECHOmail - that's up to the other system's operator. When the request is received by the remote system, it will add or remove your system from its "forward-to" list as you have specified; it will send you a confirmation message which will explain the changes made and errors or violations you have made. This message may be sent automatical- ly, or you may have to poll later to receive it; this depends on how your ECHOmail link has his system configured. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 4.00 SYSTEM IDLE COMMANDS 127 --------------------------------------------------------------------------------G NEW ECHOMAIL LINK The GNEW ECHOMAIL LINKH, GALT-NH command allows you to add systems to the FORWARD-TO list in your area manager. This command queues up the same type of entry as an inbound AREAFIX request with the exception of the security check. When a system is added or removed from an area, an audit trail is created in the AREAFIX LOG and a confirmation message is created and sent to the receiving system. First, enter the address of the system to send the ECHOmail conference(s) to. You do not have to have an AREAFIX password just to enter a manual request. Next, enter a list of CONFERENCES to add or remove, one per line; press ENTER on a blank line when finished. If you wish to remove a conference rather than adding one, simply put a minus sign "-" before the tag. If you wish to have D'Bridge rescan the entire ECHOmail area and send all the mail currently stored, answer YES to "Rescan?". If you wish to send a list of areas available, answer YES to "Send area list?". Choose the EMAIL priority you wish to use to transmit the request. This priority has no connection to the one with which you will receive the ECHOmail - that's up to the other system's operator. Finally, if you want the request to be processed immediately, answer YES to "Process now?". If the request is not processed immediately, you may enter several requests and subsequently run the PROCESS ECHOMAIL option on the UTILITIES menu. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 4.00 SYSTEM IDLE COMMANDS 128 --------------------------------------------------------------------------------G TERMINAL EMULATOR The D'Bridge terminal mode is designed to let you communicate with online services such as a bulletin board system (BBS), CompuServe and other such electronic information systems. Terminal mode acts like a glass Teletype, having an 24x80 display plus a status line giving information such as current baud rate, parity, etc. It is not the intention of D'Bridge to provide many terminal features such as you might find in other communication programs; D'Bridge is an EMAIL system and only provides this terminal mode as a simple means for you to tie- in with other systems through a direct connection. Terminal mode transmits all printable and control characters without translation to your modem. The ALT keys are used to control the various functions in terminal mode. Pressing ALT-X exits the terminal and returns to mailer mode. Once in the terminal mode, you will notice that pressing ALT-H displays a help screen. These are the commands currently supported: /-TERMINAL MODE COMMANDS----------------\ | | | ALT-C Dial system(s) from nodelist | | ALT-D Dial system(s) from directory | | ALT-P Set terminal parameters | | ALT-L Capture log ON/OFF | | ALT-T Terminate connection | | ALT-W Wipe (clear) screen | | ALT-X Exit terminal mode | | ALT-Y PUSH to DOS | | ALT-Z DROP to DOS | | PgUp Upload file(s) | | Pgdn Download file(s) | | | \---------------------------------------/ ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 4.00 SYSTEM IDLE COMMANDS 129 --------------------------------------------------------------------------------G GALT-C / Call system from nodelistH D'Bridge can dial any systems in your nodelist that are not "unlisted nodes". Pressing ALT-C will display the following window: /-CALL SYSTEM(S) FROM NODELIST--------------------------------------------\ | | | F1-List nodes in NET 1:110 | | F2-Change ZONE:NET | | F3-List all NETS | | F4-List NETS in ZONE 1 | | Dial which node(s)? F5-Scan user names | | | | _____________________________________________________________________ | | | \-------------------------------------------------------------------------/ Simply enter a list of addresses you wish to call, separated by spaces. D'Bridge will auto-dial the entire list until a connection is made. The function keys F3-F7 are available to assist you in locating the proper addresses. When a connection has been made, D'Bridge will "beep" and return to terminal mode with the remote system online at the proper baud rate. GF3H Scans the entire nodelist by username (first names). GF4H Pressing the F3 key displays all the NODES and POINTS in the currently selected NET. Pressing ENTER while using this display selects a system; pressing ESC cancels. GF5H Gives a listing of all NETs in the entire nodelist and allows you to select a new NET. GF6H Lists all ZONEs in the nodelist GF7H Allows you to change the currently selected NET by entering the ZONE:NET desired. After you change NETs, you can use the F1 key to list the systems in the new NET. GENTERH Starts the cycle-dialing window; D'Bridge will continue dialing until connected or interrupted by the operator. GESCH Cancels dialing mode ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 4.00 SYSTEM IDLE COMMANDS 130 --------------------------------------------------------------------------------G GALT-D / Dialing directoryH D'Bridge terminal mode has a built-in dialing directory enabling you to program the phone numbers for up to 100 systems you call frequently. Pressing ALT-D will display the following window: /-DIALING DIRECTORY---------------------------------------------------------\ | Entry Name Phone number Baud/Parms | | ----- ---- ------------ ---------- | | 1 D'Bridge Support/Cincinn 1-513-821-1387 9600 8N1 | | 2 D'Bridge Support/West 1-503-292-7233 9600 8N1 | | 3 D'Bridge Support/West 1-503-292-7237 9600 8N1 | | 4 D'Bridge Support/East 1-215-879-3310 9600 8N1 | | 5 D'Bridge Support/Canada 1-416-823-4521 9600 8N1 | | 6 D'Bridge Support/Europe 31-85-459034 2400 8N1 | | 7 D'Bridge Support/Italy 39-766-540-899 2400 8N1 | | 8 D'Bridge Support/Austral 61-3-848-3331 9600 8N1 | | 9 D'Bridge Support/Austral 61-3-563-2496 9600 8N1 | | 10 | | 11 | | 12 | | | | Edit entry, Delete entry, UP, DOWN, PGUP, PGDN, #, ENTER-Dial, ESC-Cancel | | | | Command? | \---------------------------------------------------------------------------/ You may easily enter or change numbers in this list by using the EDIT ENTRY command. Move the highlight bar to the entry you wish to add or edit then press "E". It will display the following window: /-EDIT DIRECTORY ENTRY---------------------\ | | | Entry number: 1 | | Name: D'Bridge Support/Cincinn | | Phone number: 1-513-821-1387 | | Baud rate: 9600 | | Parity: NONE | | Data bits: 8 | | Stop bits: 1 | | Save entry? | | | \------------------------------------------/ ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 4.00 SYSTEM IDLE COMMANDS 131 --------------------------------------------------------------------------------G Enter the NAME, PHONE NUMBER, BAUD RATE, PARITY, DATA BITS and STOP BITS desired, then answer YES for "Save entry?". Pressing ESC will abort the change. After you have answered YES, the window will disappear and the entry will be permanently added to your personal dialing directory. To dial a number, simply type the ENTRY NUMBERS desired, separated by spaces, then press ENTER. You can also move the highlight bar to the desired line and press ENTER. Either will do the same thing. If you wish to use the D'Bridge scripting language, simply enter the phone number with the following format: "SCRIPT.FIL"aaa-nnn-nnnn Where SCRIPT.FIL is the name of your script file, aaa is the AREA CODE you are calling and nnn-nnnn is the PHONE NUMBER. GALT-H / Terminate connectionH Pressing ALT-H will terminate the current call immediately by dropping the DTR signal to the modem for 1.2 seconds. GALT-P / Set terminal parametersH The ALT-P command will allow you to set the default settings for terminal mode. Pressing ALT-P displays the following window: /-SET TERMINAL PARAMETERS--\ | | | Comm port: COM1 | | Baud rate: 2400 | | Parity: NONE | | Data bits: 8 | | Stop bits: 1 | | Duplex: FULL | | Emulation: ANSI | | Capture ANSI: YES | | AutoDownload: YES | | | \--SPACE-Change, ESC-Exit--/ ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 4.00 SYSTEM IDLE COMMANDS 132 --------------------------------------------------------------------------------G By using the UP and DOWN arrow keys to select an option and pressing the SPACE bar to change, you can configure the terminal to any setting you wish. This setting will be recalled when terminal mode is entered, but the communications settings can also be changed by ALT-C and ALT-D. GCOMM PORTH The COMM PORT specifies which serial interface channel you wish to use. This could allow you to select between modems or even direct links to other PC's. COM1 through COM7 are allowable values. GBAUD RATEH This allows you to select the speed or BAUD RATE of the serial link with your modem. Allowable values are 300, 1200, 2400, 4800, 9600, 19200 and 38400, but may not exceed the value specified in the COMMUNICATIONS/MODEM SETUP screen. If you have LOCKED your modem at its top speed, this baud rate setting has no effect. GPARITYH The PARITY setting allows you to communicate with systems that require parity-error checking. Valid settings are NONE, EVEN, ODD, MARK and SPACE, but most newer networks are using "NONE." GDATA BITSH This setting is included for compatibility with old-style 7-bit systems. Allowable values are 7 and 8, but be warned file-transfers will not function properly with a 7-bit link. GSTOP BITSH Almost all baud rates use 1 stop bit, but "weird" configurations might require a value of 2 (highly unlikely!). ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 4.00 SYSTEM IDLE COMMANDS 133 --------------------------------------------------------------------------------G GDUPLEXH Some older systems require your own system to provide the "echo" of the characters typed. This is called HALF DUPLEX. Newer systems all echo back the characters you type, eliminating the need for a HALF DUPLEX setting. Use FULL DUPLEX for systems such as CompuServe, The Source and BBS networks. GEMULATIONH D'Bridge terminal program has only one emulation, ANSI. You may either select ANSI or NONE. The ANSI emulation does not require the use of an ANSI.SYS driver; it includes full color support plus ANSI-MUSIC! GCAPTURE ANSIH If you have the capture log enabled, D'Bridge has the option to either save or strip the ANSI codes from the file. If you want to SAVE the ANSI codes in the capture file, answer YES here. GAUTODOWNLOADH D'Bridge terminal mode has the capability to detect when the remote system has initiated a ZMODEM send request. If you answer YES to this question, when such a request is detected, D'Bridge automatically starts a ZMODEM receive session saving you the trouble. GALT-L / Capture log ON/OFFH The ALT-L key "toggles" the capture log ON or OFF. If you wish every- thing displayed on the screen to be captured to a text file, press ALT-L to turn on the capture log. It will ask you for a DOS filename to store the information in; it defaults to CAPTURE.LOG, but you may change it to any directory or filename you wish. Pressing ALT-L a second time or exiting terminal mode will close the text file. If a capture file already exists, D'Bridge will add on to the end of it, preserving its previous contents. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 4.00 SYSTEM IDLE COMMANDS 134 --------------------------------------------------------------------------------G GALT-W / Wipe (clear) screenH Pressing ALT-W simply clears the current screen, moving the cursor to the upper-right corner. GALT-X / Exit terminal modeH Pressing ALT-X will take you out of the terminal mode and back to D'Bridge. Your modem will be re-initialized and should be ready to receive incoming mail almost immediately. GALT-Y / PUSH to DOSH Pressing ALT-Y will allow you access to DOS commands while you are still connected to a remote system. To get back into D'Bridge, type EXIT. This is handy for doing directory listings, etc. while you're connected to an online service. GALT-Z / DROP to DOSH Pressing ALT-Z will also allow you access to DOS commands. The only difference is that with ALT-Z, D'Bridge is totally swapped out of memory to EMS or disk so you have as much free memory as possible. GPgUp / UploadH The PgUp key allows you to transmit a list of files to the host computer. The way to do this is typically to tell the remote computer you are ready to send some files, then press the PgUp button, select the desired protocol, XMODEM, Telink or ZMODEM, then enter a list of files to send. Note: With XMODEM, you can only send one file at a time - XMODEM is not a "batch" protocol. GPgDn / DownloadH The PgDn key allows you to receive files from the host computer. This is normally done by first telling the remote system which files to send then pressing the PgDn key. You then tell D'Bridge which protocol you want to use, XMODEM, Telink or ZMODEM and specify which directory to put the files in. With XMODEM you must specify the actual filename because it is not a batch protocol. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 4.00 SYSTEM IDLE COMMANDS 135 --------------------------------------------------------------------------------G BUILD NODELIST DATABASE This forces D'Bridge to recompile the nodelist database index. This is normally an automatic process happening at midnight, but you can force it to happen by selecting this option. PROCESS MAIL This enables you to manually start inbound mail processing and scanning for outbound ECHOmail and AREAFIX requests. This shouldn't be necessary unless you have mail processing set to "Manual" in the PACKET/MAIL CONTROL screen. FILEBASE SEARCH This option (GCTL-FH) allows you to search through the D'Bridge FileBase for a partial match on a specified filespec. The FileBase is a combined listing of files available for request on other systems. This enables you to easily locate files and request them with the ease of point-and-shoot operation. After you specify a search key to start (like "DB" for filenames starting with DB), a list of partial matches will be displayed. You can highlight the file you want to request by using the arrow keys; request it by pressing "R", then the priority: GImmediateH, GCrashH, or GNormalH. If you need to make a passworded request, set the current password with the "GPH" option. Since the FileBase is not zone-aware, you may select another zone with the "GZH" option. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 4.00 SYSTEM IDLE COMMANDS 136 --------------------------------------------------------------------------------G LICENSE REGISTRATION D'Bridge requires a 4registered5 license key be used in accordance with our software license policy. This registraion process will allow you to be added to our mailing list and at the same time request that a new license key file, customized with YOUR name or handle will be created for you within ten days. Complete the registration form, send it in, then look for "GNEWKEY.ZIPH" to arrive about ten days after your registration was sent. If you have more than one license key to register, put them all in a directory and specify it in the registration screen. EXPORT CONFIGURATION With this option, D'Bridge will produce an "exported configuration" file. Normally called GDBRIDGE.CFGH, the output is a standard text file designed to transfer the entire D'Bridge parameter configuration to another system or for upgrading to a newer version. Every night at midnight, D'Bridge automatically exports its configuration to a file called GDBRIDGE.AUTH and puts it in an archive called GDBCONFIG.ZIPH. LEAVE DBRIDGE This option, GCTL-CH or GALT-XH will exit to DOS and completely unload the D'Bridge software. DROP TO DOS This option or GALT-ZH will "drop" to DOS, creating the largest possible DOS shell using the secondary command processor specified by the environment variable "COMSPEC" (usually COMMAND.COM). D'Bridge swaps its memory either to EMS or disk, depending on free memory available. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 4.00 SYSTEM IDLE COMMANDS 137 --------------------------------------------------------------------------------G PUSH TO DOS This option or GALT-YH will "push" to DOS, creating a DOS shell using the secondary command processor specified by the environment variable "COMSPEC". ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 5.00 EMAIL MESSAGE EDITOR 138 --------------------------------------------------------------------------------G 5.00 EMAIL MESSAGE EDITOR The EMAIL message editor is activated by selecting the READ/ENTER EMAIL option from the main menu or by pressing ALT-E. The editor may also be accessed directly from the DOS prompt by typing: C> DB EDIT Assuming the DB EDIT command was found, you quickly get a display similar to the following: F1-Enter, F2-Reply, F3-Edit, F4-List, F5-Kill, F6-Areas, ESC-Menu D'Bridge 1.30/001002 /-READ/EDIT EMAIL-------------------------------------------------------------\ |Msg # 250 | |Date: 11 Jun 92 18:10:34 | |From: Chris Irwin | | To: Tom Ordelman on 201:200/0 D'Bridge Support/Europe | |Subj: Greetings from freezing Cincinnati! | |-----------------------------------------------------------------------------| |Hello Tom, | | | |I was just writing to let you know that I've been sitting out in the snow | |finishing the D'Bridge documentation. I think that you will find that it | |is well-written and quite clear. It's Thursday, so I'll be out playing poker | |this evening... Give me a call when you get a chance tomorrow! | | | |Regards, | |Chris, 201:201/0 | | | | | | | | | \-----------------------------------------------------------------------------/ Area: D'Bridge network mail Msgs: 273 Highest: 298 Last read: 276 This is the "READ" mode of D'Bridge. Using this screen, you can enter, read and reply to messages along with a variety of utility functions. Each function will be described in detail in the next few sections. Remember that a quick way to get out of the editor is to press CONTROL-C. This is a perfectly acceptable way to get out, it's just like using the QUIT menu option. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 5.00 EMAIL MESSAGE EDITOR 139 --------------------------------------------------------------------------------G GRIGHT and LEFT arrows - NEXT and PREVIOUS MESSAGEH Pressing the RIGHT arrow key will display the next message in the current area; pressing the LEFT arrow will display the previous one. GF1 or E - ENTER A MESSAGEH As soon as you press the F1 key or the letter "E" D'Bridge will go into "EDIT" mode, clearing the screen and starting with a blank message. GF2, R, Q or > - REPLY TO A MESSAGEH Replying to a message is the same as entering a new one; the difference is that the "TO" name and address is taken automatically from the message currently on the screen. The editor will move the "FROM" infor- mation to the "TO" field. This is handy to keep from making a mistake typing the name or network address. There are four keys that create a reply message: GF2H Asks for QUOTED or NORMAL reply. GRH Creates a NORMAL reply. GQH Creates a QUOTED reply. G>H Same as Q. If you select a NORMAL reply, the screen will clear and just the "TO" and "FROM" information will be displayed. If you specify a QUOTED re- ply, the entire message you are replying to will be QUOTED, so that you may remind who you are communicating with and exactly what it is you are replying to. QUOTED text has each line starting with a ">" character indicating that the text came from the other person. For example, if a message reads: What time can I call you about the pricing information? Your QUOTED reply might look like: CI> What time can I call you about the pricing information? Give me a call around 4:00, if I'm not in, please leave the information with my secretary. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 5.00 EMAIL MESSAGE EDITOR 140 --------------------------------------------------------------------------------G QUOTED replies are quite valuable for reminding the receiver exactly what you're talking about. In fact, if the receiver of the above message wanted to reply to you, the reply might look like: CI> What time can I call you about the pricing information? TO> Give me a call around 4:00, if I'm not in, please leave the TO> information with my secretary. I can't - I'm flying to Paris today. I'll call you when I get back. GF3 or O - EDIT AN OLD MESSAGEH Sometimes, you will enter a message, then realize you wish to make a change before sending it. The F3 or "O" option does just that. It allows you to edit the currently displayed message. If the message displayed is not from you, you will be asked "You didn't enter this message, edit anyway?". Generally, it's not "nice" to edit other people's mail, but D'Bridge allows you to do this anyway. GF4 or L - LIST MESSAGESH Pressing F4 or "L" will put the editor into "LIST" mode. While in "LIST" mode, the display changes to show you all the message headers. This is handy when you want to scan for a particular message quickly. Until you press the ESC key, the editor will remain in LIST mode and the function keys have a different meaning. While in this mode, you may view message headers and select a group of messages to KILL or PRINT. LIST: Include, Exclude, All, None, Page, Display, Group, ESC-Exit D'Bridge 1.50/001002 /-READ/EDIT EMAIL-------------------------------------------------------------\ |/-LIST MESSAGES--------------------------------------------------------------\ ||Msg # Date From To Subject | || 292 20 Apr Chris Irwin Tom Ordelman 201:200/0 D'Bridge Suppor| || 293 20 Apr Chris Irwin Joaquim Homri 135/20 Re: ZMODEM | || 294 20 Apr ARCmail Sysop 107/246 FF239209.MO1 | || 295 20 Apr ARCmail Sysop 108/871 F98429E1.MO1 | || 296 20 Apr ML-UPD 1.5 11/109 Megalist Admi 000B0071.MLA | ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 5.00 EMAIL MESSAGE EDITOR 141 --------------------------------------------------------------------------------G The first line will be highlighted with a light bar. Using the UP, DOWN, PGUP and PGDN keys, you can move the light bar to the desired message. When you press the ESC key, the specified message will be displayed and DBEDIT will return to READ mode. While the LIST window is on the screen, the following commands are enabled: GI - INCLUDEH When you press the I key, a star ( * ) will appear next to the message number on the highlighted line. This means this message is "included" for processing by group commands. GE - EXCLUDEH Pressing the E key will remove a star "*" from the highlighted line. This is used to un-include (de-select) the current message from processing by the group commands. GA - ALLH If you press A, all of the messages will be included for processing by group commands and they will all have a star "*" next to them. This is handy to use in conjunction with "E" (EXCLUDE) when you want to process most of the messages with group commands. GN - NONEH Pressing N will remove all the stars "*" from the LIST MESSAGES window. None of the messages will be selected for group commands. GP - PAGEH Pressing P will select all messages on the currently displayed page. GD - DISPLAYH Pressing D will toggle the LIST display between showing the TO, FROM and SUBJECT and showing the entire SUBJECT line. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 5.00 EMAIL MESSAGE EDITOR 142 --------------------------------------------------------------------------------G GG - GROUPH Pressing G will display another list of options called GROUP COM- MANDS. With these commands, you can PRINT or KILL all of the selected messages automatically. This can be a very "dangerous" command, so make sure you know exactly what you're doing if you use it. The following GROUP COMMANDS are allowed: GP - PRINT (group command)H The P group command will PRINT all messages that have stars "*" next to them and were previously included while in the "LIST" mode. Obviously this option will work only if you have a printer connected; press the ESC key to cancel the PRINT operation. GK - KILL (group command)H The Kill group command will KILL all messages that were included and have a star "*" next to them. Make sure you have double- checked which messages were included because once they are KILLED, they are permanently gone. (Perhaps Professor Norton could get them back... ). GF5 or K - KILL A MESSAGEH Pressing F5 or "K" allows you to permanently KILL (erase) a message from your disk. It will ask you "ARE YOU SURE?" just in case you pressed it accidentally; use this option with caution! GF6 or A - CHANGE MESSAGE AREASH The editor allows you to have any number of local and ECHOmail areas. Pressing F6 or "A" will display a list of all the areas you have de- fined in your configuration. Select the desired area by moving the light bar up and down, then pressing ENTER when the desired area is highlighted. You may also enter the AREA NUMBER and press ENTER. Both ways accomplish the same thing. If you are running a basic EMAIL system, you probably will not have any use for this option. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 5.00 EMAIL MESSAGE EDITOR 143 --------------------------------------------------------------------------------G GESC - EDITOR MENUH All of the other editor features are accessible by using the EDITOR MENU. Pressing ESC will display the menu and allow you to select any of the following options: - Area information - Display statistics - Forward message - Copy/move message - Print message - Write message to file - Username AKAs/Alias addresses - Search headers/text - PUSH/DROP to DOS ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 5.01 USING EDIT MODE 144 --------------------------------------------------------------------------------G 5.01 USING EDIT MODE After you have selected either the ENTER, REPLY or EDIT command, the editor will be in "EDIT" mode. When you are using this mode, all of the keys have different meanings than they do in READ mode. The top line of the screen lists all the valid commands. The cursor will first appear on the "TO" field. Here, you enter the name of the person to whom the message is addressed. If you have selected the USERNAME INDEX option (in the nodelist configuration), the editor scans for a username simply by entering part of the name. For example, if you enter "CHRIS", DBEDIT will display all of the users who have a first name of Chris, Christine, Christy or Christo- pher and allow you to select the desired person. This search is based on FIRST NAME, so entering a last name won't work. If you wish to send the same message/files to different destinations, press the F8 key while on the "TO" field. This will display a window which allows you to enter any number of destinations, one per line in the following form:
[,] ie. 1:110/68 Chris Irwin Valid priorities are: GHH - Hold GNH - Normal GCH - Crash GIH - Immediate If you routinely send information to the same list of systems, you will want to take advantage of the "distribution list" feature. Instead of an address and a username, you can specify the names of any number of distribution lists to include. A distribution list is simply a text file containing the same information as above: address and username. After you have entered or selected the name of the person you are writing the message to, the editor will say "on" and expect you to enter the address of the user. If you selected the username from the D'Bridge database, the address should already be there and you simply press ENTER. If you are entering this message to someone not in the database or have specified NO in the CREATE USERNAME INDEX field in the nodelist setup, you will need to enter the address. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 5.01 USING EDIT MODE 145 --------------------------------------------------------------------------------G The editor provides 5 function keys to help you to find an address: GF3 - List nodesH Pressing F3 will display a list of all the systems in the currently selected ZONE:NET. Moving the light bar, highlight the desired system and press ENTER. If you can't find the address in this NET, press the ESC key. GF4 - Change netH The F4 key allows you to change the currently selected ZONE and NET numbers. Enter the ZONE and NET numbers desired separated by a colon ( : ) character. If you specify just one number, it is assumed to be the NET; the ZONE remains the same. After changing the ZONE and NET you may use the F3 key again to scan for individual systems. GF5 - List netsH Pressing F5 will give you a list of all ZONE and NET numbers in your nodelist and allow you to choose one as the currently selected NET. Similar to the F6 function, move the light bar to the desired line and press the ENTER key. GF6 - List zonesH This function is identical to F5 above except it lists the ZONES that are compiled into the nodelist. GF7 - Set ZONE:NETH Allows you to directly set the ZONE and NET defaults. After you have selected the destination address, the cursor will move to the SUBJECT line. If you want to send a file along with this message or if you wish to request one, you must enter the filename(s) as the sub- ject. If you are SENDING files, you must specify the actual filename including drive and directory. If you are requesting a file, just specify the filenames you wish to receive. Obviously, if you are neither SENDING nor REQUESTING files, the SUBJECT line is simply a field which briefly states the purpose of the message. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 5.01 USING EDIT MODE 146 --------------------------------------------------------------------------------G While the cursor is on the SUBJECT field, the following function keys are in effect: GF3 - Send fileH Pressing F3 sets the FILE-ATTACH attribute for the message. This means all the files listed in the SUBJECT line (labeled ENCL) will be sent with the message. GF4 - File requestH Pressing the F4 key sets the FILE-REQUEST attribute for the message. This means that when the message is sent, D'Bridge will request that the remote system sends you all the listed files. GF5 - Update requestH The F5 key sets the UPDATE-REQUEST attribute for the message. UPDATE- REQUESTS are the same as FILE-REQUESTS in D'Bridge. GF6 - CancelH Pressing F6 cancels a FILE-ATTACH, FILE-REQUEST or UPDATE-REQUEST and makes the SUBJECT line be just informational. When the cursor is BELOW the line separating the heading from the message text, the editor acts just like most word-processing systems. You may simply type in your message, using the BACKSPACE and ARROW keys to edit. You may notice that when you press the ENTER key, a "HARD RETURN SYMBOL" is generated. Normally, you should not press the ENTER key unless you wish to start a new paragraph or are entering a list of some kind which should not be "rejustified" on the receiving system. Because D'Bridge can communicate with other EMAIL systems and bulletin boards, the messages might not look exactly the same on the receiving system as they look on your screen when you enter them. For example, some EMAIL editors only allow the display of 66-column text. If you were to use HARD RETURNS (by pressing ENTER on each line), your message would be very hard to read on the other EMAIL system. Get in the habit of only pressing the ENTER key when you want to start a new paragraph. While in the "EDIT" mode, the following function keys are in effect: GF1 or ESC-Q-A - ABORTH If you have accidentally gone into "EDIT" mode or wish to cancel your edit session and completely "throw away" the message you are entering, use the ABORT option. The editor will ask "ARE YOU SURE?", just to make sure you didn't press F1 accidentally. ABORTING your editor will return you to "READ" mode. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 5.01 USING EDIT MODE 147 --------------------------------------------------------------------------------G GF2 or ESC-Q-S - SAVE MESSAGEH Pressing F2 will immediately save the current message to disk. Unless otherwise specified, it will be sent during the next scheduled mail event. If you press F2 by accident, you can always use the EDIT OLD option to continue or change it. SAVING your message will return you to "READ" mode. GF3 or CONTROL-N - INSERT LINEH The INSERT LINE option will add a blank line BEFORE the line where the cursor is located. GF4 or CONTROL-Y - DELETE LINEH The DELETE LINE option does just that; it erases the line that the cursor is on. GF5/F6 - MARKH This is an "advanced" feature; The F5 key marks the beginning of a block of text; the F6 key marks the end. "Marked" text is designated by reverse video for the selected block. This is used in conjunction with the BLOCK commands described later; they allow you to COPY, MOVE, DELETE or WRITE the selected block of text to a file. GF10 - FLAGSH D'Bridge allows you to set up to 15 different "FLAGS" on an EMAIL message. Pressing F10 displays a menu of all the flags; only the ones that are "bright" are allowed. Depending on certain criteria, such as FAX addressing, etc, certain options are not always available. The currently defined flags are as follows: GPrivateH This message is intended for the addressee only. If the receiving system is a BBS, only the Sysop should be able to read the message. GHoldH HOLD priority should be used for this message. Please note that unless you specify XMAIL for this message, the message will be sent if there is any other outbound traffic for the destination system; if you enter a CRASH message to the same system, both messages will be sent unless you XMAIL it. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 5.01 USING EDIT MODE 148 --------------------------------------------------------------------------------G GCrashH CRASH priority means the message should be sent right-away, even during the UNEVENT. Only messages with CRASH or IMMEDIATE priority will be sent during the UNEVENT. CRASH messages might cost more due to making a long-distance phone call during the day rather than during a late-night scheduled event. CRASH priority messages never get routed, but go directly to their destination. GImmediateH An IMMEDIATE priority message means the message will be sent right away and have priority over other out- bound traffic that has no IMMEDIATE priority. This is handy for getting an important message out when there's a lot of other outbound traffic in the queue. GXMailH If you specify an EMAIL message to be XMAIL, this means the D'Bridge mail scanner will pack the message in an outbound XMAIL archive using the specified archive program: ZIP, LHA, ARJ, PAK, ARC or ZOO. If you use this method, all priorities: IMMEDIATE, CRASH, NORMAL and HOLD are treated separately; HOLD mail will never be sent unless the other system calls to pick it up or the operator specifically overrides it in the VIEW/MODIFY QUEUE, ALT-V mode. GKill/SentH If a message has the KILL/SENT flag, it will be erased from your NETmail area as soon as it has been successfully transmitted. This is good for messages that have been sent to multiple destinations. GArchive/SentH The ARCHIVE/SENT flag causes a message to be written to the specified OUTBOUND MAIL ARCHIVE specified on the PACKET/MAIL CONTROL screen. After the message text has been stored in this file, the message is erased from the system. GDirectH If a message is flagged as DIRECT, the normal routing specified in the ADVANCED ROUTING screen of the event setup is ignored; the message is sent directly to its final destination. GUse ZonegateH If you wish an inter-zone message to be routed through the official "zonegate", use this flag. GRoute/HUBH If you want a message to be HOST- or HUB-ROUTED, specify this flag. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 5.01 USING EDIT MODE 149 --------------------------------------------------------------------------------G You can change the flags either by moving the highlight bar with the UP and DOWN arrows and pressing ENTER, or by pressing the first letter of the desired flag. Press ESC when you are finished setting message flags. GESC - MENUH The rest of the "EDIT" mode commands are activated from the menu. Pressing the ESC key will display the menu. GBLOCK: READH The BLOCK READ option allows you to read in text from a standard text file. It will ask for the name of a text file and whether you want to use HARD of SOFT returns. If the text is in the form of paragraphs, use the SOFT option; if you are reading in columns of numbers or some sort of text you don't want to be reformatted, specify HARD. GBLOCK: WRITEH Assuming you have already used the F5 and F6 keys to highlight a block of text, the BLOCK WRITE option allows you to write it to a standard text file. GBLOCK: COPYH The BLOCK COPY option will move the text highlighted with the F5 and F6 keys to the position where the cursor is currently located. This option will not work if the cursor is within the highlighted region. GBLOCK: MOVEH The BLOCK MOVE option is the same as the BLOCK COPY command except the text is actually moved rather than copied to the current cursor position. GBLOCK: DELETEH The BLOCK DELETE command will erase all text you highlighted with the F5 and F6 keys. GQUIT: SAVEH The SAVE option is the same as the F2 key. It saves the current message and returns to "READ" mode. GQUIT: ABORTH The ABORT option allows you to "throw away" the current edit session. This is the same as the F1 key. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 5.01 USING EDIT MODE 150 --------------------------------------------------------------------------------G GQUIT: DROP TO DOSH The DROP TO DOS command allows you access to DOS while you are editing a message. This method frees all available memory by swapping the editor to EMS or disk. When you are finished using DOS commands or programs, type "EXIT" to return to your edit. GQUIT: PUSH TO DOSH The PUSH TO DOS command allows you access to DOS while you are editing a message. When you are finished using DOS commands or programs, simply type "EXIT" to return to the editor. To summarize, we have included the following table of keys and their effect in various "edit" modes: Mode/field Key(s) Effect ------------------------------------------------------------------- G"TO" F3H List users starting with the one entered GF8H Multiple destinations/Distribution list(s) G"ADDRESS" F3H List all NODEs in the currently selected NET GF4H Select a new ZONE and NET GF5H List all NETs in the nodelist GF6H List all NETs in the selected ZONE GF7H List FAX entries G"SUBJECT" F3H Send file(s) GF4H File-request GF5H Update-request GF6H Cancel send/request GEDITOR UPH Moves the cursor up one line GDOWNH Moves the cursor down one line GLEFTH Moves the cursor left one character GRIGHTH Moves the cursor right one character GDELETEH Deletes the character under the cursor GINSERTH Toggles "insert mode" ON/OFF GHOMEH Moves cursor to the start of line/page/message GENDH Moves cursor to the end of line/page/message GTABH Moves cursor to the next tab position GBACKSPACEH Moves cursor left one character and erases previous character if at the end of a line or "insert mode" is ON. GF1H Aborts the current edit, returns to READ mode GF2H Saves the message, returns to READ mode ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 5.02 USING READ MODE 151 --------------------------------------------------------------------------------G 5.02 USING READ MODE "Read" mode allows the user to read EMAIL messages in any of the defined message areas. There are several keys that are used to control "read" mode with a single keystroke: GUP and DOWN arrowsH The UP and DOWN arrow keys move the currently displayed message UP and DOWN on your screen allowing you to read more text than will fit on the screen. GPGUP and PGDNH The PGUP and PGDN keys work like the UP and DOWN arrows except they advance the text one page at a time. GHOME and ENDH The HOME key displays the first page of a message; the END key displays the last page. GLEFT and RIGHT arrowsH The RIGHT arrow displays the NEXT message; the LEFT arrow displays the previous message. G+ and - keysH The PLUS and MINUS keys allow you to read by "thread". If a message says "Reply to #nnn", you can read the original message (the one replied to) by pressing the MINUS (-) key. Pressing PLUS (+) displays the next message in the "thread". This is most useful for "local" areas and does not usually work in your Network mail area. GNumber keys (0-9)H You can advance to the desired message simply by entering the message number and pressing ENTER. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 5.02 USING READ MODE 152 --------------------------------------------------------------------------------G D'Bridge allows for virtually any number of message areas to be defined in the area manager. While in READ mode, you may select between the different message areas by using the F6 or "A" command. This command displays the following screen which allows you to select a new message area: F1-Enter, F2-Reply, F3-Edit, F4-List, F5-Kill, F6-Areas, ESC-Menu D'Bridge 1.50/001002 /-READ/EDIT EMAIL-------------------------------------------------------------\ |Msg # 251 | |Date: 07/-AREA CHANGE-----------------------------------------------------\ | |From: Ch| 0 NETMAIL Network mail area | | | To: To| 2 COMPLAIN Complaint Department | | |Subj: Gr| 4 DB_ALPHA D'Bridge ALPHA conference | | |--------| 6 FTSC Technical standards committee |--| |Hello To| 7 NETDEV Network developer's conference | | | | 10 SYSOP18 Region 18 Sysop conference | | |I was ju| 11 ZMODEM ZMODEM conference | | |finishin| 12 ECHOECHO ECHOmail working group | | |is well-| 19 SYSOP110 NET 110 Sysop conference | | |I won't | 21 DBRIDGE D'Bridge ECHO | | | | 22 QUICKBBS QuickBBS ECHO | | |Regards,| 24 TBBS TBBS ECHO | | |Chris, 2| 9999 BADECHO Bad ECHOmail area | | | | | | | | | | | \-----------------------------------------------------------------/ | | | | | \-----------------------------------------------------------------------------/ Change areas either by highlighting the desired area using the UP and DOWN arrows and pressing ENTER or by entering the TAG or NUMBER of the message area you desire. Pressing ESC will leave you in the same area you were in before. Once DBEDIT is displaying another message area, it should be displaying the same message as was there the last time you exited from that area. This is a feature of the so-called LAST READ POINTER, which is maintained for each user in the editor separately. D'Bridge stores the LAST READ POINTERS on your disk so that they are the same the next time you read your mail. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 5.02 USING READ MODE 153 --------------------------------------------------------------------------------G To summarize, we have included the following table of keys and their effect in various "read" modes: Mode Key(s) Effect -------------------------------------------------------------------- GREAD F1, EH Enter a new message GF2H Enter a reply to a message (see REPLY mode) GRH Enter a normal reply GQ, >H Enter a quoted reply GF3, OH Edit an old message GF4, LH Change to LIST mode GF5, KH Kill (erase) the current message GF6, AH Change message areas GESCH Displays the main menu (advanced functions) GLEFT arrowH Displays the previous message GRIGHT arrowH Displays the next message G0..9H Selects message number GENTERH Selects message or advances to the next one GUP arrowH Scrolls the message up one line GDOWN arrowH Scrolls the message down one line GPgUpH Scrolls the message up one screen GPgDnH Scrolls the message down one screen GHOMEH Displays the beginning of the message GENDH Moves to the end of the message GCTL-CH Leave editor GREPLY F1H Enter a quoted reply GF2H Enter a normal reply GESCH Cancel reply GLIST UP arrowH Moves the highlight bar up one line GDOWN arrowH Moves the highlight bar down one line GPgUpH Scrolls the screen back one page GPgDnH Scrolls the screen forward one page GENTERH Select current message, return to READ mode GIH Includes the highlighted message GEH Excludes the highlighted message GAH Includes all messages GNH Includes no messages (excludes all) GPH Includes all messages on the current page GGH Enters GROUP mode GESCH Exits LIST mode, displaying the same message GGROUP PH Print all included messages GKH Kills (erases) all included messages GESCH Exits GROUP mode, returns to LIST mode ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 5.03 ADVANCED FEATURES 154 --------------------------------------------------------------------------------G 5.03 ADVANCED FEATURES There are several other features available from DBEDIT; they include forwarding, copying, moving or printing messages, searching text and selecting alternate addresses or "AKA" usernames. To activate the EDITOR MENU, press ESC while in "READ" mode; the following menu will be displayed: Editor menu: UTILITIES SEARCH QUIT D'Bridge /--------------------\ 1.50/001002 /-READ/EDIT EM| Area information |------------------------------------------\ |Msg # 252 Wri| Forward message | | |Date: 11 Jun | Copy message | | |From: Chris I| Move message | | | To: Tom Ord| Print message |Bridge Support/Europe | |Subj: Greetin| Write msg to file | | |-------------| New username |------------------------------------------| |Hello Tom, | Use alias address | | | \--------------------/ | |I was just writing to let you know that I've been sitting out in the snow | |finishing the D'Bridge documentation. I think that you will find that it | |is well-written and quite clear. It's Thursday, so I'll be playing poker | |tonight... Give me a call when you get a chance tomorrow! | | | |Regards, | |Chris, 1:110/68 | | | \-----------------------------------------------------------------------------/ Following are descriptions of all the options available from the main editor menu: GUTILITIES: AREA INFORMATIONH The AREA INFORMATION screen functions identically to the AREA CHANGE function described in the previous section. The difference is that AREA INFORMATION displays the number of messages, last read, low and high message numbers in each area. D'Bridge displays the areas that have new, unread mail in the selected BRIGHT color. Areas which have new mail have the HIGHEST message different than the LAST READ. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 5.03 ADVANCED FEATURES 155 --------------------------------------------------------------------------------G The information screen looks like this: /-AREA INFORMATION------------------------------------------------------------\ |# Name Description Low High LR Msgs| |0 NETMAIL Network mail area 16 1477 1471 190| |2 COMPLAIN Complaint Department 1 1458 1458 17| |4 DB_ALPHA D'Bridge ALPHA conference 279 1479 1479 268| |6 FTSC Technical standards committee 1 295 261 295| |7 NETDEV Network developer's conferenc 1 107 107 95| |10 SYSOP18 Region 18 Sysop conference 1 479 479 402| |11 ZMODEM ZMODEM conference 1 29 29 29| |12 ECHOECHO ECHOmail working group 1 3 3 3| |19 SYSOP135 NET 135 Sysop conference 1 178 175 15| |21 DBRIDGE D'Bridge ECHO 4 1332 1332 125| |22 QUICKBBS QuickBBS ECHO 130 1450 1450 199| |24 TBBS TBBS ECHO 621 1182 1080 102| |9999 BADECHO Bad ECHOmail area 1 1 1 1| | | | | | | \-----------------------------------------------------------------------------/ GUTILITIES: FORWARD MESSAGEH The FORWARD MESSAGE option allows you to re-route or send a copy of the current message to another system. You simply enter the TO, ADDRESS and specify the priority and whether to keep a the original copy of the message. GUTILITIES: COPY/MOVE MESSAGEH The COPY and MOVE MESSAGE commands can only be used when you have specified alternate message areas. It will copy or move the current message from one area to another. GUTILITIES: PRINT MESSAGEH Assuming you have a printer connected to your "PRN" port, DBEDIT will print the current message. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 5.03 ADVANCED FEATURES 156 --------------------------------------------------------------------------------G GUTILITIES: WRITE MSG TO FILEH The WRITE MSG TO FILE option allows you to export a message to a standard text file. This might be used to transfer data from D'Bridge to a word processor or spreadsheet. GUTILITIES: NEW USERNAMEH If you have defined more than one USER NAME in the SETUP EDITOR PARAM- ETERS menu, you can select from any of these to be the current user. This is the same screen you receive when you first start the editor with more than one user defined. GUTILITIES: ALIAS ADDRESSESH For systems who have defined multiple ALIAS ADDRESSES on the BASIC CONFIGURATION menu, this function allows you to enter messages addressed from one of your aliases. GSEARCH: HEADERS or TEXTH The SEARCH HEADERS or TEXT options allow you to search through your messages for specific keywords. Simply enter the word to search for and D'Bridge will find and highlight all occurrences. GQUIT: EXITH Terminates DBEDIT and returns to D'Bridge. GQUIT: DROP/PUSH TO DOSH PUSH TO DOS allows you to enter DOS commands and run other programs while DBEDIT is still in memory. Type "EXIT" to return to DBEDIT. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 6.00 UNDERSTANDING THE QUEUE 157 --------------------------------------------------------------------------------G 6.00 UNDERSTANDING THE QUEUE Everything D'Bridge does is based on the entries in the outbound queue window. Once you understand what the "queue" is and how it is organized, you will have a good overview of the program's structure. The "GQUEUEH" The outbound queue is a database containing entries for each of the systems that currently have "outbound" mail. When D'Bridge first starts, the outbound queue is created by scanning the NETmail area (either in Fido or QuickBBS format), then scanning the disk-based queue for polls, file-requests, etc. This database is then sorted by address and finally displayed in the bottom-left window. The queue can best be understood by disabling the SCHEDULE window so the entire QUEUE window will be displayed. (Press ALT-S to toggle the schedule window on and off). /-QUEUE----------------------------------------------------------------------\ | Destination Try/Con/Bad/Online Priorities/Pkt types Status | |*110/68.1 0 0 0 00:00 C N X M Hold/Unlisted | | 105/3 0 0 0 00:00 H X Hold | | 108/0 0 0 0 00:00 N F M Decision at 17:00| | 135/3 30 0 0 00:00 C X Try limit | | 135/142 1 1 0 00:32 Sent successfully| | 143/18 1 0 0 00:00 H X Hold | | 167/999 0 0 0 00:00 C M Hold/Unlisted | | 2:243/40 0 0 0 00:00 H X Hold | |*8:77/7 0 0 0 00:00 N T M Hold/Unlisted | \----------------------------------------------------------------------------/ To understand the queue, you simply need to have a good understanding of the individual fields: GDESTINATIONH The destination is simply the Fidonet or FAX address of the system to contact. The destination is not always the "ultimate" destination due to possible routing, but is the system to be called. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 6.00 UNDERSTANDING THE QUEUE 158 --------------------------------------------------------------------------------G GTRYH The try field simply shows how many times D'Bridge has tried to call the destination system during the current event. If there is a plus sign ( + ) behind the number, it has been manually reset this event by the operator. GCONH This field shows the number of actual connections (carrier detects) made as the result of outbound calls to the specified system. Inbound connections do not count in the CON field. Again, if there is a plus sign ( + ) after the number, it has been manually reset this event. GBADH This field shows the number of failures encountered during outbound sessions this event. In general, a failure means it was a wasted phone call for one reason or another (generally, the reason or error is listed in the log file). Again, the plus sign after the number is an indication that it has been manually reset (using the ALT-V com- mand). GONLINEH The online field keeps track of total connect time as a summation of all outbound connects. This field is not reset until the end of the current event. GPRIORITIESH The priorities field shows which priorities of mail are contained within the queue entry. This field may contain any or all of the following: GIH Immediate (Highest priority mail) GCH Crash (High priority mail) GNH Normal (Normal, budget priority mail) GHH Hold (Mail held for pickup) ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 6.00 UNDERSTANDING THE QUEUE 159 --------------------------------------------------------------------------------G GPACKET TYPESH The packet type field contains what types of mail packets are contained within the queue entry. The field may contain any or all of the follow- ing: GRH Outbound AREAFIX request (ALT-R) GTH Transmit file(s) (ALT-T) GFH File-request(s) (ALT-F) GPH Poll (ALT-P) GXH XMAIL (Editor/BBS/ECHOmail) GMH NETmail (Editor/BBS) GSTATUSH The STATUS field is most-likely the most important one to understand. If you are having trouble understanding why a mail packet is not being sent, the STATUS indication should be able to tell you exactly what is wrong. Please read and understand what the following status indications mean: GHoldH The mail can't be sent because "HOLD" is the only priority specified for the mail. (You told it to do this when you entered a message or set-up an ECHOmail area). GHold/UnlistedH This indication means it is impossible to call this system because it is either not in your nodelist or it is listed as "unpublished". The destination system must call in for its mail or you need to get a nodelist containing its phone number. GMax cost holdH The cost of the message you want to send (as indicated in the editor) exceeds the maximum allowed during the current event. GTemporary holdH This means the operator has used the VIEW/MODIFY QUEUE mode to set the entry's status to "hold". To send the message, select ALT-V again and specify "SEND". ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 6.00 UNDERSTANDING THE QUEUE 160 --------------------------------------------------------------------------------G GForced holdH This means the operator has specified a forced priority of hold at some time in the past. This may be changed by using the ALT-V command to remove the "forced" status. GPriority holdH This means the given mail event does not allow the specified priority of mail to be transmitted. (This is related to the PRIORITIES field in the advanced routing of the schedule). GNot a CM systemH In this event, you have specified that only those systems with a "CM" (continuous mail) flag may be called. (Again, this is a function of the advanced routing screen of the scheduler). GCM not allowedH In this event you have told D'Bridge not to call any "CM" systems. GDecision at 17:00H This means that because of the cost-control data, no outbound call may be placed to this address until at least 17:00. At 17:00, a decision will be made as to whether it may be called or not. This is the mechanism which allows D'Bridge to call-out only at the most economical times for normal priority mail. If you want the mail to be sent now, you should use a higher priority or change the cost- control data in the ACCOUNTING/TRANSLATION screen. GTry limitH This means D'Bridge has exceeded the maximum number of times allowed to try calling the remote system. Typically, you are not charged for non-connects, but you might want a limit on how many tries (gotta give up sometime... ). GSession limitH You have reached the maximum number of sessions allowed within the given event. In the case of long-distance systems, this has most- likely saved you a wasted phone call, making too many ECHOmail calls in the same event... ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 6.00 UNDERSTANDING THE QUEUE 161 --------------------------------------------------------------------------------G GFailure limitH This means you have reached the maximum failures (bad sessions) allowed for the event. Maybe something is wrong with the remote system? GPicked upH This means all mail has been successfully picked up by the remote system. This saves D'Bridge the trouble and expense of making the call itself. GSent successfullyH This means you called the other system, sent the mail and all went well. All mail is confirmed as delivered to the "destination" sys- tem; remember that routed mail is now in the hands of another operator and is not 100% guaranteed to arrive. G----------H The dashes (-----) mean that the packet is ready to be sent, now. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 6.01 CREATING A PRIVATE NODELIST 162 --------------------------------------------------------------------------------G 6.01 CREATING A PRIVATE NODELIST Without a nodelist, D'Bridge can not make outbound EMAIL calls. Your nodelist tells D'Bridge which systems it can communicate with and contains information such as name, phone number and baud rate. Nodelists are text files that can be created by any standard text editor. It lists ZONES, NETS and NODES, one per line, using the "St. Louis format", the same style used by Fidonet, Alternet and many other public EMAIL networks. You may specify any number of St. Louis or private nodelists in D'Bridge. Here's a sample NODELIST for a bogus private network: ,HOST,1720,Main_System,Cincinnati_OH,Rancy_Neagan,1-513-777-0007,9600,CM ,1,New_York_Office,Bronx_NY,Quan_Dale,1-202-555-9343,2400,CM ,4,Western_Division,Los_Angeles,Clinn_Billton,1-714-555-5286,2400,CM ,6,XYZ_Canada,Quebec,Lawrence_DeLaMouche,1-418-555-2811,2400,CM ,15,European_Office,The_Hague_NL,Luud_Rubbers,31-70-452121,9600,CM ,20,Moscow_Bureau,Moscow_USSR,Joris_Beltsin,!Unlisted,2400,CM This example defined a HOST system and 5 nodes in NET 1720. Unless a ZONE directive is specified, NET 1720 will be in whatever zone you are in. Notice the format of the text file; no spaces are allowed. All underscore characters "_" will be translated to spaces when the information is displayed. Each field is separated by commas. The following format is used for the "St. Louis format" nodelist: GKEYWORDH,GNUMBERH,GNAMEH,GCITYH,GOPERATORH,GPHONEH,GBAUDH,GFLAGSH GKEYWORDH The KEYWORD directive may be blank or contain any of the following values: GZONEH The ZONE keyword marks the start of a new ZONE and NET (both with the same number). It also defines the NODE that is the ZONE coordinator. GPOINTH Specifies that this entry is a POINT of the previously specified NODE. GHOSTH The HOST keyword defines the start of a new NET number and defines its HOST (a HOST has a NODE number of zero). ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 6.01 CREATING A PRIVATE NODELIST 163 --------------------------------------------------------------------------------G GREGIONH The REGION keyword is identical to HOST with the exception that no mail will be automatically routed through the "HOST" node. This is mainly used when the NET covers more than one geographic area. GHUBH The HUB keyword defines the start of a routing group. A HUB acts as the HOST to receive in- coming mail for all nodes listed after it. GPVTH Defines that the listed node is private and does not have a listed phone number. If a system's phone number is not listed, this keyword MUST be used. GDOWNH Defines that the listed node is down and should not be added to the database. GNUMBERH This specifies the NODE number of the listed node UNLESS the KEYWORD is ZONE, HOST or REGION; in these cases, the NUMBER defines the ZONE and/or NET, depending. GNAMEH Defines the name of the system. D'Bridge truncates NAMES to 25 characters. Underscores "_" will be translated to spaces for display. GCITYH Specifies the city where the system is located. Again, underscores "_" translate to spaces. GOPERATORH Defines the name of the primary system operator. Under- scores "_" translate to spaces. GPHONEH List the ENTIRE phone number including the COUNTRY CODE, AREA CODE and PHONE NUMBER separated with dashes. "-" For example: 1-305-232-9365 or 38-52-592831 GBAUDH Specify the MAXIMUM BAUD RATE for the system. May be either 300, 1200, 2400, 4800, 9600 or 19200. GFLAGSH A free-form field that may contain additional information about the system. Include the characters "CM" if you wish to designate a system as CONTINUOUS MAIL (24-hours) ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 6.02 DUTIES OF A NETWORK ADMINISTRATOR 164 --------------------------------------------------------------------------------G 6.02 DUTIES OF A NETWORK ADMINISTRATOR Every network must have an "administrator" or anarchy would certainly prevail! This chapter briefly outlines which duties the administrator of any private network should perform. Remember, these are just guidelines. G1H) The NETWORK ADMINISTRATOR is generally responsible for daily operation of the network. This means any problems are reported directly to the administrator. Obviously, a very large network would sub-divide the support into several regional administrators who would try to field all problems if they could. G2H) The NETWORK ADMINISTRATOR is responsible for the maintenance of the nodelist. Any systems added, changed or deleted must have these changes reflected in the nodelist and the new nodelist updates must be sent to all systems in the network. G3H) The general structure and routing used in the network must be either designed or approved by the NETWORK ADMINISTRATOR. He must be kept informed of all aspects of the network so that he can "keep a handle on it..." G4H) The NETWORK ADMINISTRATOR will assign NET and NODE numbers unless that responsibility is divided into different regions and handled by the regional administrators. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 6.03 PUBLIC EMAIL NETWORKS 165 --------------------------------------------------------------------------------G 6.03 PUBLIC EMAIL NETWORKS There are a number of public amateur networks anyone may join. This section lists a few of them and who to contact to participate in the network and ECHOmail conferencing. Each network distributes its own nodelist in the "St. Louis" format. After you join a new network, use the NODELIST CONFIGURATION screen to add the nodelist definition and recompile the nodelist. Here are a few networks open to new membership: Network Contact ------------------------------------------------------------------ GFIDONETH International FidoNet Association P.O. Box 41143 St. Louis, Missouri 63141 U.S.A. GALTERNETH InterGalactic Sysop Alliance (ISA) P.O. Box 956 Springfield, New Jersey 07081 U.S.A. GEGGNETH Ken Shackelford U.S.A. EMAIL 99:99/0 1-404-928-1876 data ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 7.00 DBUTIL / UTILITY PROGRAM 166 --------------------------------------------------------------------------------G 7.00 DBUTIL / UTILITY PROGRAM D'Bridge comes with a utility program called DBUTIL; it allows you to automate routine file-transfers and maintenance. Typing DBUTIL from the DOS prompt will display the following "help" information: C> GDBUTILH D'Bridge Utilities 1.50 single-line; Copyright 1987-1992 by Chris Irwin Valid commands: [priority] SEND
... Transmit file(s) [priority] ROUTE
... Transmit file(s) [priority] REQUEST
... File-request [priority] POLL
Poll PURGE [areaname] [areaname] ... [areaname] Purge/Archive messages SORT AREAS Sort message areas/group ERASE QUICKBASE CONFIRM Completely erase Quickbase DBUTIL may be run from any directory providing you have included the D'Bridge root directory (C:\DB) in your PATH setting in AUTOEXEC.BAT. ie. PATH C:\DOS;C:\DB GSENDH The DBUTIL SEND command adds TRANSMIT-FILE entries to the disk-based queue. Files will be sent directly to the destination system with no routing. The syntax for the SEND command is: C> DBUTIL [priority] SEND
... ie. C> DBUTIL CRASH SEND 18/68.5 HOMEWORK.TXT C> DBUTIL HOLD SEND 18/20 DB-140*.ZIP DBNET.Z56 C> DBUTIL SEND MYBOSS READTHIS.TXT ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 7.00 DBUTIL / UTILITY PROGRAM 167 --------------------------------------------------------------------------------G GROUTEH The DBUTIL ROUTE command does the same thing as the SEND command except that it generates a FILE-ATTACH message in the NETMAIL area. Creating a message allows the file to be routed if you have specified any file- routing in your schedule. If you are not routing files, it is faster and better to use the SEND option as it puts entries directly in the disk-based queue. The syntax for ROUTE is the same as SEND: C> DBUTIL [priority] ROUTE
... ie. C> DBUTIL CRASH ROUTE 18/68.5 HOMEWORK.TXT C> DBUTIL HOLD ROUTE 18/20 DB-140*.ZIP DBNET.Z56 C> DBUTIL ROUTE MYBOSS READTHIS.TXT GREQUESTH The DBUTIL REQUEST command adds FILE-REQUEST entries to the disk-based queue. The file-request will be sent immediately or during the next applicable mail event, depending on the priority you specify. Following is the syntax for REQUEST: C> DBUTIL [priority] REQUEST
... ie. C> DBUTIL CRASH REQUEST 2:280/280 FILES ABOUT C> DBUTIL REQUEST 135/14 GOODGAME.ZIP MONOPOLY.ZIP C> DBUTIL IMMEDIATE REQUEST MYBOSS UPDATE.ZIP GPOLLH The DBUTIL POLL commands adds a POLL entry to the disk-based queue. Depending on the priority, the system will be called either immediately or during the next applicable mail event. When you POLL a system, D'Bridge will call to see if you have any mail waiting. The syntax for POLL is: C> DBUTIL [priority] POLL
ie. C> DBUTIL POLL MYBOSS C> DBUTIL IMMEDIATE POLL 1:105/3 ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 7.00 DBUTIL / UTILITY PROGRAM 168 --------------------------------------------------------------------------------G GPURGEH The DBUTIL PURGE command will purge the specified message areas or all of them if you don't list any AREA NAMES. The purge will scan each message area and purge (and archive) the messages based on the criteria specified in the LOCAL/ECHOMAIL AREAS screen; see SECTION 3.2 for more information. The syntax for the PURGE command is: C> DBUTIL PURGE [areaname] [areaname] ... [areaname] ie. C> DBUTIL PURGE C> DBUTIL PURGE POLITICS SCIENCE ART GSORT AREASH If you wish to reorganize the areas in your LOCAL/ECHOMAIL AREAS screen, you may use the SORT AREAS command. This will sort and renumber your areas by SORT GROUP and TAG. Before using this command, make sure you specify SORT GROUPS for all the areas and group them together in a logical manner. The syntax is: C> DBUTIL SORT AREAS GERASE QUICKBASEH If you want to completely destroy and recreate your QuickBBS message base, you may do it with this command. You really had better be SURE you want to do this or you could lose thousands of EMAIL messages with this single command. The syntax is: C> DBUTIL ERASE QUICKBASE CONFIRM ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 7.01 FIDO AND QUICKBBS STORAGE 169 --------------------------------------------------------------------------------G 7.01 FIDO AND QUICKBBS STORAGE D'Bridge currently supports two methods for storing EMAIL messages on disk. These particular methods were chosen for compatibility with some popular bulletin board systems: GFIDOH Using the FIDO storage method, each message is stored in a separate ".MSG" file in a certain directory. Each fido- style local or ECHOmail area will have a unique sub- directory. This method is compatible with Fido and Opus, as well as many message handling utilities. FIDO storage usually takes the most disk space and is the slowest method available. GQuickBBSH The QUICKBBS storage method stores all messages in five data files: MSGHDR.BBS, MSGTXT.BBS, MSGIDX.BBS, MSGTOIDX.BBS and MSGINFO.BBS, all stored in the specified QuickBBS directory. Using this method, up to 200 message areas may be defined. This method is fast and doesn't use too much disk space; it is provided for compatibility with the QuickBBS bulletin board system. ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 7.02 USING THE SCRIPTING LANGUAGE 170 --------------------------------------------------------------------------------G 7.02 USING THE SCRIPTING LANGUAGE D'Bridge includes a powerful scripting language allowing it to use alternate carriers such as packet-switched networks rather than normal telephone connections. This can be used with any carrier such as Tele- net's PC-Pursuit or your private Satellite uplink service. Any data carrier capable of 8-bit, no parity, full duplex communication may be used with D'Bridge. The reason for using an alternate carrier is usu- ally to save money on your phone bill. The scripting language connects two D'Bridge systems through any form of data link that is compatible. In the U.S.A., the most common example for using scripts is PC-Pursuit, so I'll use that as an example. Script files are text-files created by any standard text editor and contain keywords telling D'Bridge exactly what to do. It is important to have a good understanding of the carrier you intend to use before designing your script file; this is necessary for a good understanding of all the terms used here - it's not that simple. To use a script file, you will need to have a PHONE NUMBER TRANSLATION or OVERRIDE for each area code or system you intend to use. With PC- Pursuit, this currently requires 40 translation strings, one for each city served. I intend to use an indexed database in a future release to eliminate this necessity, but that's later. For now, use a trans- lation in the following format: Gcc-aaa- "script.fil"xxxxx-H Where "cc" is the COUNTRY CODE, "aaa" is the AREA CODE, and "xxxxx" is the translated AREA CODE (or in the case of PC-Pursuit, the city des- ignator). As an example, use the following PHONE NUMBER TRANSLATION to reach the Miami, Florida area: G1-305- "PCP.SCR"FLMIA-H This will translate ALL 305 area codes to use the script file. Needless to say, not all of area code 305 is PC-Pursuitable, so if you need to contact other cities in our area code, you will need to specify previous translation or override strings (the upcoming index file will eliminate the need for these translations altogether). Assuming you now have 305 translated to use the PCP.SCR script file, you now must create this file and put it in your defined SCRIPT PATH (SCRIPT PATH is defined on the DIRECTORY PATHS setup screen). With D'Bridge, it is possible to use one script file for ALL the "pursuitable" cities, though you will need one for each baud rate desired. Following is a detailed description of the scripting language keywords and their meaning (see the next chapter for a specific example and explanation using PC-Pursuit): ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 7.02 USING THE SCRIPTING LANGUAGE 171 --------------------------------------------------------------------------------G Syntax: GABORTH <Gstart_timeH> <Gend_timeH> Example: GABORT 6:00 18:00H The ABORT keyword causes the script to abort immediately if the time is between the and specified. This is handy for making sure no script calls are made outside predefined hours. Syntax: GAREACODEH The AREACODE keyword causes D'Bridge to transmit the AREA CODE field of the phone number. This is separated from the PHONE NUMBER by a dash "-" and is sent with no carriage return or other characters. For PC-Pursuit, this is usually substituted with the city code (such as FLMIA). Syntax: GBAUDH <Gbaud_rateH> Example: GBAUD 1200H The BAUD keyword changes the current baud rate to the specified value. By default, it will be the baud rate of the destination system. Syntax: GCARRIERH When the CARRIER keyword is encountered, the script file is aborted unless a carrier is detected at this point. This is handy for ensuring you have a carrier when you think you should. Syntax: GCOMMH <Gconfig_charactersH> Example: GCOMM 7E1H The COMM keyword configures the communication port for the setting specified. In this example, it is set for 7 data bits, even parity and 1 stop bit. The following are supported: G1H - 1 stop bit GNH - No parity G2H - 2 stop bits GEH - Even parity G7H - 7 data bits GOH - Odd parity G8H - 8 data bits ------------------------------------------------------------------------------- D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin 7.02 USING THE SCRIPTING LANGUAGE 172 --------------------------------------------------------------------------------G Syntax: GCONNECTH The CONNECT keyword sets the CONNECT count for the given packet is increased by one. This is used in conjunction with the maximum connects limit defined for the current mail event. Syntax: GDIALH <Gphone_numberH> Example: GDIAL 555-2939H The DIAL keyword causes D'Bridge to dial the specified and wait for a CONNECT, BUSY or NO CARRIER field just like when dialing normally. If a non-connect message is received, the script is aborted. Syntax: GDIRECTH <Gstart_timeH> <Gend_timeH> Example: GDIRECT 6:00 18:00H The DIRECT keyword will cause D'Bridge to abort the script file and dial direct (using your phone company) between the times specified. This is useful for switching between script and telephone company use depending on the time of day. Syntax: GDOSH <GDOS_commandH> Example: GDOS ibm_uucp 2400H The DOS keyword is seldom used, but it enables you to execute any DOS command from within a script file. In this example, the program "IBM_UUCP" is executed with a parameter of 2400. Syntax: GGOTOH <GlabelH> Example: GGOTO LOOP-1H The GOTO keyword transfers control to another point within the script file. The