BinkleyTerm User's Guide

 

          
          
          
          
          
          ****   *         *      *             *******                 TM
          *   *            *      *                *
          *   *  *  * **   *   *  *   ***   *   *  *   ***   * **  *** **  
          ****   *  **  *  *  *   *  *   *  *   *  *  *   *  **    *  *  * 
          *   *  *  *   *  ***    *  ****   *   *  *  ****   *     *  *  * 
          *   *  *  *   *  *  *   *  *      *   *  *  *      *     *  *  * 
          ****   *  *   *  *   *  *   ****   ****  *   ****  *     *  *  * 
                                                *
          Version 2.30 - User's Guide           *        September 4, 1989
                                             ***
          
          
          
          
                  A Freely Available FidoNet Compatible Electronic
                      Mail Interface and Dumb Terminal Package
          
          
          
          
                 Software Written by Vince Perriello and Bob Hartman
                     Documentation Written by Alan D. Applegate
          
          
          
          
                  Copyright (C) 1988, 1989 Bit Bucket Software, Co.
                               A Delaware Corporation
                                 All Rights Reserved
          
                      Terms and Conditions Contained Separately
          
          
          
          
                              Bit Bucket Software, Co.
                            427-3 Amherst St., Suite 232
                                  Nashua, NH 03063
          
          
          
          
                        "BinkleyTerm" and "Freely Available"
                     are trademarks of Bit Bucket Software, Co.
          
          
          
          
          


                BinkleyTerm Version 2.30 - User's Guide - Page 2

          TABLE OF CONTENTS
          
          Section 1 - General Information                             4
               How to Use This Manual                                 4
               Acknowledgements                                       5
               Kudos                                                  6
               Forward                                                7
               Introduction                                           8
               General Requirements                                   9
               Memory Requirements                                    9
               Modem Requirements                                     10
          
          Section 2 - Operation as a Terminal Communications Program  11
               Terminal Mode Overview                                 11
               VT-100 Emulation                                       12
               External Protocols                                     12
          
          Section 3 - Operation as a Automated Electronic Mailer      13
               Unattended Mode Overview                               13
               The BinkleyTerm Concept                                14
               How BinkleyTerm Handles Mail                           14
                    Idea #1                                           14
                    Idea #2                                           15
                    Idea #3                                           15
                    Idea #4                                           15
                    A Sample Message, Start to Finish                 17
                    The Concept of Cost                               18
                    Alternative Method                                18
               Windowed Interface                                     19
                    Current Settings                                  19
                    Today at a Glance                                 19
                    Pending Outbound Mail                             20
                    Recent Activity                                   21
                    Transfer Status                                   21
               Control                                                21
                    Errorlevels and Batch Files                       22
                    What is an Errorlevel?                            23
                    What Errorlevels BinkleyTerm Produces             24
                    Making Errorlevels Work for You                   26
                    Errorlevels, Batch Files and ExtrnMail            26
                    Errorlevels, Batch Files and Housekeeping         26
                    DOS Shell Keys                                    26
                    Using Errorlevels                                 27
                    What Now?                                         27
                    Errorlevel and Batch File Hints and Kinks         28
                    Environment Variable                              30
               Configuration File                                     30
                    BTCTL                                             30
               Nodelist                                               31
                    FIDOUSER.LST                                      31
                    Version 5 Nodelist                                32
                    Version 6 Nodelist                                32



                BinkleyTerm Version 2.30 - User's Guide - Page 3

                    QuickBBS Nodelist                                 32
                    TBBS Nodelist                                     33
                    Nodelist Support Information                      33
               Zone Support                                           34
               Multiple Network Operation                             35
               Security                                               35
                    Prot                                              36
                    Known                                             36
                    Default                                           36
                    Security - Session Passwording                    36
                    Security - Secured Inbound File Areas             37
                    Security - Controlling File Requests              38
                    Security - Response File Templates                39
               BBS Interface                                          39
                    BBS Exit                                          39
                    BBS Spawn                                         40
                    BBS Batch                                         40
                    BBS Batch Method Flowchart                        42
                    Banner                                            42
               External Mail Programs                                 43
               User-Selected BBS Functionality                        43
               File Requests                                          45
               Update Requests                                        47
               Request Response Files                                 48
               Function Requests                                      49
                    $ Function Requests                               49
                    + Function Requests                               50
                    Function Request Notes                            50
               A Word About Point Networks                            51
          
          Section 4 - Problem Solving                                 52
               BinkleyTerm Support                                    52
               Troubleshooting                                        52
                    Baud Rate Locking Trouble                         52
                    Outward Dial Aborting                             52
                    False Call Collision Reports                      53
                    FOSSIL Driver Compatibility Problems              53
                    BinkleyTerm Will Not Recognize Node Address       53
                    TBBS Difficulty - BinkleyTerm Runtime Errors      53
                    DOS Shells Not Working Correctly                  53
                    Zone Support Does Not Operate Correctly           54
                    Date Rollover Problem                             54
               Glossary                                               54
          
          
                              
          
          
          
          
          
          
          
          


                BinkleyTerm Version 2.30 - User's Guide - Page 4

          +-------------+
          | +---------+ |
          | | Section | |   BinkleyTerm User's Guide
          | |    1    | |   GENERAL INFORMATION
          | +---------+ |
          +-------------+
          
          HOW TO USE THIS MANUAL
          
          The documentation for BinkleyTerm is supplied in two parts.  
          
          The User's Guide (named BT_USER.DOC) explains how to install
          BinkleyTerm.  It also describes basic operational procedures. 
          New users may find some concepts or terminology unfamiliar; a
          glossary is provided toward the end of the User's Guide.  
          
          Concepts and terminology that may be of interest to experienced
          users and new users alike are covered in the Reference Guide
          (named BT_REF.DOC) an alphabetically arranged manual separate
          from the User's Guide. 
          
          For inquiries, questions or comments regarding BinkleyTerm,
          please refer to the User's Guide section "BinkleyTerm Support." 
          
          Some material in the section "How BinkleyTerm Handles Mail" is
          excerpted from MATRIX.DOC, and is Copyright (C) 1987 Wynn Wagner
          III, All Rights Reserved.  Used by permission.
          
          Some material in the section "Control" was written by Ron
          McKenzie, and is Copyright (C) 1989 Ron McKenzie, All Rights
          Reserved.  Used by permission.
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          


                BinkleyTerm Version 2.30 - User's Guide - Page 5

          ACKNOWLEDGEMENTS
          
          The following names are either trademarks, registered trademarks,
          and/or the efforts of the person and/or company named:
          
          Fido, FidoNet - Tom Jennings, Fido Software
          MS-DOS, Microsoft C - Microsoft Corporation
          IBM, PC-DOS - International Business Machines Corporation
          Opus-CBCS, ZedZap, YooHoo, WaZOO, OpusNode - Wynn Wagner III
          ARC, SEAdog, SEAlink, XlatList, ARCmail, GroupMail - Thom
               Henderson, System Enhancement Associates, Inc.
          VT-100, DEC, DEC Rainbow, VAX, VMS - Digital Equipment
          Corporation
          FANSI-CONSOLE - Hersey Micro Consulting
          Hayes - Hayes Microcomputer Products Corporation
          Zmodem - Chuck Forsberg, Omen Technologies, Inc.
          ConfMail, ParseLst, oMMM, Opus!Comm - Bob Hartman, Spark
               Software, Inc. 
          oMMM - BS Software, Marshall Presnell, Jim Nutt
          msged - Jim Nutt
          XlaxNode - Scott Samet
          Heath/Zenith - Heath/Zenith Electronics, Inc. 
          Sanyo - Sanyo Electric Co. (Japan) Ltd.
          DoubleDOS - SoftLogic Solutions, Inc. 
          DESQview - Quarterdeck Office Systems, Inc. 
          Telix - Colin Sampaleanu, Exis Inc.
          Sirius - Bob Klahn, Micro Solutions 
          OOPS - Tom Kashuba 
          AMAX - Alan Applegate 
          Dutchie - Henk Wevers 
          PC Pursuit - GTE/Telenet 
          EchoMail - Jeff Rush 
          ProComm - Datastorm Technologies, Inc. 
          Qmodem - The Forbin Project 
          TBBS - Phil Becker, eSoft, Inc.
          QuickBBS - Adam Hudson 
          X00 - Ray Gwinn, RENEX Corporation 
          DECCOMM - Vince Perriello, VEP Software
          Atari, ST - Atari, Inc.
          Commodore, Amiga -  Commodore International
          USRobotics, HST - USRobotics, Inc.
          RBBS-PC - Capital PC Users Group, Thomas J. Mack
          FrontDoor - Joaquim Homrighausen
          D'Bridge - Chris Irwin
          
          Every effort has been made to identify and give credit for
          trademarks mentioned in this documentation.  Any failure to
          mention a particular trademark in the above list that may be
          found in the text, or failure to give proper credit for a
          particular trademark, constitutes merely an oversight and should
          not be construed as intentional, or in any way a claim of rights
          to the trademark.
          
          PLEASE NOTE!  Throughout this documentation, the mention of any


                BinkleyTerm Version 2.30 - User's Guide - Page 6

          particular software package or system should not be construed as
          an endorsement of any kind on the part of the authors.
          
          KUDOS
                   
          A number of people have been involved in the creation,
          development and testing of this program, or have contributed to
          it in one way or another.
          
          Tom Jennings, of course, gets credit for creating the beast that
          brought us all together and defining the basic method of mail
          transfer that we still use.  Wynn Wagner gets our thanks for
          releasing source code for his file transfer routines and sending
          some of his WaZOO source code as well for inclusion.  Thom
          Henderson gets a humble tip of the hat for SEAdog, the
          prototypical mail-only front-end which was the basis for our
          front-end design, and for SEAlink, his extension of Xmodem/Telink
          which doubled the speed of network mail transfers overnight. 
          Chuck Forsberg of Omen Technologies gets our thanks for
          developing and implementing the original Zmodem protocol.
          
          Then there are the guys who have put to the test everything the
          authors thought would be worthwhile, the BinkleyTerm Beta Test
          Team, members both past and present.  Without you, who knows what
          we'd have wound up with.
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          


                BinkleyTerm Version 2.30 - User's Guide - Page 7

          FORWARD
          
          There is no question that BinkleyTerm is an extremely powerful
          communications tool.  We also make no secret of the fact that
          BinkleyTerm is an extremely complex communications tool.  
          
          A set of documentation the size of an unabridged dictionary
          (about 150mm thick or so) would still not address every possible
          use of BinkleyTerm in every possible environment.  BinkleyTerm
          can run on a number of personal computer platforms - a total of
          several thousand brands and models.  Hundreds of different modems
          can be used.  It works with several operating environments such
          as DESQview and DoubleDOS.  In addition, BinkleyTerm is designed
          with an open architecture, so it can be used with several BBS
          packages, nodelist processors, mail processors, editors, and so
          on.  BinkleyTerm "ports" have been made for entirely different
          platforms such as the Atari ST, Commodore Amiga and VAX/VMS based
          systems.  You begin to get the scope of what's involved.
          
          This documentation attempts to cover fairly broad generalities in
          configuring and operating BinkleyTerm.  It cannot and will not
          cover all possibilities or circumstances.  Hopefully it will
          serve as a starting point - a ground level from which you may
          grow and expand.  Further, this documentation describes only the
          version of BinkleyTerm provided by the original authors - that
          which runs in the PC-DOS/MS-DOS environment.
          
          Most of the enjoyment of the electronic mail hobby comes from
          trying new things - tweaking the system.  Although BinkleyTerm is
          a dependable, powerful program that is not especially difficult
          to get going, it does provide ample opportunity to experiment and
          have fun.  
          
          Still, if you're looking for something that will meld itself into
          your computer in just a few minutes and work without modification
          forever more, BinkleyTerm should probably not be your first
          choice.  In exchange for a little complexity, we give you power
          and an incredible amount of configurability and compatibility.
          
          If you become frustrated with BinkleyTerm, call on others in your
          area who have configured it for an environment similar to yours. 
          We estimate that several thousand people around the world are
          BinkleyTerm users, and someone close to you in your network no
          doubt runs BinkleyTerm.  With an architecture as open as that of
          BinkleyTerm, your best source of information is someone who has
          the benefit of time and experience configuring it.  Of course,
          you will eventually become an expert yourself!  Enjoy it, and
          delight in the wonder of technology.
          
               Alan D. Applegate,
               Vice-President,
               Bit Bucket Software, Co.
          
          


                BinkleyTerm Version 2.30 - User's Guide - Page 8

          INTRODUCTION
          
          BinkleyTerm is an advanced, state-of-the-art telecommunications
          tool.  It is primarily designed for the semi-automated sending
          and receiving of electronic mail and files within FidoNet-
          compatible electronic mail networks.
          
          When used as a mailer, BinkleyTerm is designed to communicate
          with any FidoNet-compatible mail interface or BBS package.  The
          program uses standard FidoNet protocol, as well as certain
          modified protocols supported by programs such as SEAdog and Opus-
          CBCS.  It also offers easy-to-use event scheduling, single
          keystroke spawning to other programs (DOS shell), excellent
          support for high speed modems, advanced session recovery, inbound
          call collision detection, and much more. 
          
          When used as a dumb terminal, BinkleyTerm offers a rich selection
          of file transfer protocols for exchanging files with a host
          system.  The program also offers keyboard macros, optional VT-100
          emulation, echoing of the on-line session to a flat text file or
          printer, support for baud rates of 300 to 38,400 and more. 
          
          BinkleyTerm can be used as a dumb terminal program exclusively,
          as a mail interface for a Point system, or as a front end mail
          interface for an electronic bulletin board system (BBS).
          
          Mail interface and dumb terminal operations can be switched in
          and out with a minimum of effort providing dual functionality. 
          
          BinkleyTerm is one of several software packages to utilize the
          FOSSIL standard communications driver.  This standard allows for
          consistent console (keyboard and screen) and communications port
          I/O operations.  By using a FOSSIL driver, BinkleyTerm is capable
          of running on practically any MS-DOS/PC-DOS capable machine, even
          those that are not 100% IBM hardware compatible. 
          
          BinkleyTerm endeavors to provide you with the widest possible
          variety of advanced features, combined with solid and efficient
          operation in a wide range of hardware environments.  
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          


                BinkleyTerm Version 2.30 - User's Guide - Page 9

          GENERAL REQUIREMENTS
          
               - A personal computer running MS-DOS or PC-DOS, with at
               least 256k of available RAM.
          
               - MS-DOS or PC-DOS, Version 2.10 or greater, Version 3.20 or
               higher preferred.
          
               - An auto-dial, auto-answer modem; should be mostly "Hayes
               compatible."  See "Modem Requirements" below.
          
               - A FOSSIL driver designed for your particular hardware.
          
               - One 360k floppy disk drive (Terminal Mode).
          
               - At least two 360k floppy disk drives, more space and/or
               hard disk recommended (Unattended Mode).
          
               - Basic knowledge of computer-based telecommunications,
               without which you would have no need for BinkleyTerm.
          
          Please note that when using BinkleyTerm as a front-end mailer for
          a BBS system, a hard disk is required.  The more space you have
          for such an operation, the better off you'll be.
          
          You will also need various utilities and adjunct programs, which
          vary with your application.
          
          MEMORY REQUIREMENTS
          
          BinkleyTerm requires approximately 185k of RAM in any operational
          mode with the non-overlay version (BTBIG.EXE) and somewhat less
          for overlay version (BT.EXE).  When used for Unattended Mode,
          additional memory sufficient to hold the nodelist index file
          (usually NODELIST.IDX) will also be required.  Keep in mind that
          a small amount of overhead will also be required to accommodate a
          FOSSIL driver, as well as a VFOSSIL if one is used.  At least a
          512k system is recommended when using DOS shells, or when
          BinkleyTerm is used in a multi-tasking environment.  BinkleyTerm
          should, however, be completely functional even on a system with
          only 256k of RAM.
          
          BinkleyTerm is not currently capable of taking direct advantage
          of extended (AT style) or expanded (EEMS, EMS 4.0) memory, and
          having such memory installed will not be of direct benefit to
          BinkleyTerm. Some multi-taskers, such as DESQview, are able to
          take advantage of such memory to BinkleyTerm's ultimate benefit. 
          Please note, however, that when using the 'SwapDir' configuration
          file statement, a RAM disk with at 150k of available space is
          highly recommended for efficient operation.  Typically RAM disks
          can be placed in extended or expanded memory.  Refer to the
          Reference Guide section "Configuration File" for details on the
          'SwapDir' statement and its use.
          


               BinkleyTerm Version 2.30 - User's Guide - Page 10

          When used as a front end mailer for a BBS system, it is HIGHLY
          RECOMMENDED that the 'BBS Batch' method of accessing your BBS be
          implemented for the most efficient use of memory.  Please refer
          to the applicable sections of the documentation for further
          information.
          
          MODEM REQUIREMENTS
          
          A modem that is generally "Hayes compatible" is required for
          BinkleyTerm operation.  Such modems are typically referred to as
          "smart" modems.  Most popular, late model modems you're apt to
          own meet this requirement.  Since you configure the various modem
          command strings, the modem does not need to be 100% Hayes "AT"
          command set compatible, but it does need to use the "AT" style of
          issuing modem commands.
          
          Most smart modems are capable of returning VERBAL (full words) or
          NUMERIC (numbers only) response codes; the modem must be
          configured in such a way as to use the VERBAL codes ONLY.
          
          BinkleyTerm can be operative if the modem supports just one modem
          response string - CONNECT.  (See below for qualifications
          required of the CONNECT string.)
          
          BinkleyTerm has been programmed to handle and respond
          appropriately to the following modem response strings:  NO
          ANSWER, BUSY, RING, VOICE, NO DIAL TONE, NO DIALTONE, ERROR, NO
          CARRIER, DIAL TONE and DIALING.
          
          The following response strings are recognized, but are ignored: 
          RRING, RINGING and RING RESPONSE.
          
          With the exception of the CONNECT response, any other data
          provided by the modem after a given response string is ignored. 
          For example, "NO CARRIER DETECTED" would be handled in the same
          manner as a "NO CARRIER" response.
          
          Since BinkleyTerm uses the CONNECT string to determine connection
          baud rates, the modem should be capable of sending such strings. 
          Generally, CONNECT is a default, and indicates a 300 baud
          connection.  Other possible connections should be CONNECT 1200
          for a 1200 baud connection, CONNECT 2400 for a 2400 baud
          connection, and so on, up to the maximum supported speed.
          
          Note also that BinkleyTerm recognizes the response CONNECT 1275
          for split-speed modems.
          
          If you are experiencing modem difficulties, try one or all of the
          following configuration file statements:  'SlowModem', 'SameRing'
          and/or 'NoCollide'.  Additionally, not all modems are capable of
          using the 'Answer' statement and its related modem configuration. 
          Explanations of all these statements can be found in the
          Reference Guide section, "Configuration File."
          


               BinkleyTerm Version 2.30 - User's Guide - Page 11

          +-------------+
          | +---------+ |
          | | Section | |   BinkleyTerm User's Guide
          | |    2    | |   OPERATION AS A TERMINAL COMMUNICATIONS PROGRAM
          | +---------+ |
          +-------------+
          
          TERMINAL MODE OVERVIEW
          
          This section describes the installation and operation of
          BinkleyTerm in the Terminal Mode.
          
          BinkleyTerm's Terminal Mode offers functionality similar to that
          provided by programs such as Telix, ProComm or Qmodem.  You can
          use your computer and modem to call out to on-line services and
          electronic bulletin board systems (BBS).
          
          BinkleyTerm offers a full selection of file transfer protocols
          for use in exchanging files with remote systems.  Also offered is
          optional VT-100 terminal emulation, an open architecture for
          adding additional file transfer protocols, support for high speed
          modems up to 38,400 baud, session logging to a flat file or
          printer, and more. 
          
          BinkleyTerm also features Zmodem Auto-Downloads.  Once the
          transfer begins at the remote host, BinkleyTerm will detect the
          unique Zmodem start-of-transfer signal, and will immediately go
          into Zmodem download mode.  If for some reason the Auto-Download
          does not occur, a Zmodem download can always be initiated
          manually.
          
          To install and operate BinkleyTerm for use exclusively in
          Terminal Mode, follow these steps. 
          
               - Prepare disk media.  Create a sub-directory on your hard
               disk, or format a single diskette.
          
               - Move the software to the newly prepared media.
          
               - With a standard text editor, or with DOS' EDLIN command,
               edit the sample configuration file, BINKLEY.CFG, included in
               the distribution archive or diskette.  The parameters needed
               are outlined in the file itself on comment lines, or you may
               refer to the Reference Guide for more information.
          
               - Obtain and properly install a FOSSIL driver in accordance
               with the directions included with your driver.  (Refer to
               the Glossary for more information on FOSSIL drivers.)
          
               - Invoke BinkleyTerm (enter 'BT' on the command line).
          
               - Press Alt-F10 for a brief help screen.
          
          The various keystrokes available in Terminal Mode are covered in


               BinkleyTerm Version 2.30 - User's Guide - Page 12

          detail in the Reference Guide.
          
          VT-100 EMULATION
          
          VT-100 terminal emulation is provided optionally by BinkleyTerm. 
          Outward keystrokes are always active with the VT-100 keypad
          mapping (as shown in the Reference Guide).  However, incoming
          screen control codes require ANSI X3.64 support, such as that
          provided in firmware on a DEC Rainbow computer. 
          
          For users of IBM PC computers and compatibles, external ANSI
          support is required, as provided by FANSI-CONSOLE, a separately
          available utility.  Load FANSI-CONSOLE in accordance with its
          directions prior to running BinkleyTerm for full VT-100 terminal
          emulation.
          
          EXTERNAL PROTOCOLS
          
          BinkleyTerm provides a rich selection of file transfer protocols,
          hard coded for ease of use and efficient operation.  On occasion
          however, other protocols may also be desired.
          
          BinkleyTerm supports special external file transfer programs that
          conform to the standard used by Opus-CBCS.  External file
          transfer protocols MUST identify themselves as being compatible
          with Opus-CBCS in order to work with BinkleyTerm.  Such protocols
          are often available from Opus-CBCS systems.
          
          Protocols currently available include WXmodem, Kermit and others. 
          To use such an external protocol, add a 'Protocol' statement to
          your configuration file along with the required path information,
          as illustrated in the Reference Guide section "Configuration
          File." 
          
          Some of the Opus-CBCS compatible protocols are specially designed
          and optimized for BBS use, and may not be operable in
          BinkleyTerm's Terminal Mode.  Check the individual package for
          information, or test the performance of the package on your own.
          
          "True" external protocols, those that are designed to be accessed
          by any communications program via a DOS shell, can also be used
          with BinkleyTerm.  BinkleyTerm provides a DOS shell command that
          can be invoked during a communications session.  An external
          protocol of this type can then be executed from the DOS command
          line, or from a batch file, depending on your situation. 
          External protocols such as Jmodem and BiModem can be accessed in
          this manner.
                   
                   
                   
                   
                   
                   
                   


               BinkleyTerm Version 2.30 - User's Guide - Page 13

             +-------------+
             | +---------+ |
             | | Section | |   BinkleyTerm User's Guide
             | |    3    | |   OPERATION AS AN AUTOMATED ELECTRONIC MAILER
             | +---------+ |
             +-------------+
          
          UNATTENDED MODE OVERVIEW
          
          This section describes the installation and use of BinkleyTerm in
          Unattended Mode.  This mode is used when BinkleyTerm is to
          function as a front-end mail interface, whether in a BBS or
          "Point" environment.  The Glossary provides information on BBS
          and Point systems.
          
          BinkleyTerm, in this operational mode, provides functionality
          similar to that provided by programs such as SEAdog, Dutchie,
          FrontDoor, D'Bridge and other FidoNet compatible mailers. 
          BinkleyTerm answers the telephone, and exchanges mail with other
          compatible mail interface packages, or in the case of a human
          caller, passes control of the connection to a BBS system. 
          
          Due to the complexity and widely varying combinations of hardware
          and software, only a generalized, broad explanation of the
          installation procedure can be given.
          
               - Prepare your disk media.  Normally, this would involve
               selecting and/or creating a hard disk sub-directory.
          
               - Move BinkleyTerm and the distribution files to this new
               directory.
          
               - Using any standard text editor, make the necessary changes
               to the configuration file included with the distribution
               archive or package.  Refer to the Reference Manual section
               "Configuration File" for more information.
          
               - Run the BTCTL program included in the distribution
          package.
          
               - Obtain and install a FOSSIL driver.  Refer to the Glossary
               for more information.  
          
               - Obtain the necessary utilities and programs for packing
               and unpacking mail.  Install them in accordance with the
               instructions included with each package.
          
               - If you're a fully qualified FidoNet node (not a Point),
               obtain a current nodelist.  Process it into usable form. 
          
               - Make the appropriate changes to an existing batch file
               used to start your BBS.  If the installation is completely
               new, or if your BBS does not use a batch file, create one. 
               Refer to the section "Control" for more information.


               BinkleyTerm Version 2.30 - User's Guide - Page 14

          
               - Start your system.  Test a remote call if possible.
          
               - Alt-F10 displays a brief help file of commands available
               in Unattended Mode.
          
          THE BINKLEYTERM CONCEPT
          
          It is important to remember that BinkleyTerm is a mailer program
          with a completely open architecture.  As such, BinkleyTerm can be
          operated with a tremendous variety of BBS systems, mail packing
          and unpacking programs, and accessories.  
          
          BinkleyTerm will answer the telephone and respond to another mail
          program.  Mail will be placed in an incoming files area.  If the
          caller is human, control is passed entirely to the BBS program,
          if one is installed.  It is the responsibility of third-party
          software to unpack the mail received, and add it to your message
          base.  
          
          On the outward side, BinkleyTerm uses an outbound holding area to
          hold outward mail.  It is the responsibility of third-party
          packing software to pack new messages into the required format,
          and place them in the outbound area.  
          
          BinkleyTerm neither packs nor unpacks mail.  Allowing this 
          functionality to be provided by other software allows BinkleyTerm
          to be compatible with practically any BBS software, regardless of
          message base structure.
          
          For mail handling, you might use programs such as ConfMail and
          oMMM to process mail, along with programs such as Sirius or msged
          to read and enter messages, or allow your users to do so in a BBS
          installation such as Opus-CBCS or Fido.  Some BBS packages, such
          as TBBS and QuickBBS come complete with their own proprietary
          packing and unpacking software.  Finding the utilities and
          programs needed to work with your system is your responsibility. 
          
          HOW BINKLEYTERM HANDLES MAIL
          
          Sending outbound mail with BinkleyTerm is fairly simple.  The
          concept of mail handling with BinkleyTerm is the same concept
          that Opus-CBCS uses.  If you're already familiar with Opus, then
          BinkleyTerm will fall into place easily.  If you are a complete
          neophyte, this section is intended to give you an understanding
          of the concept.
          
                                       Idea #1
          
          Mail events are less important than they are with other mailing
          methods and systems.  With BinkleyTerm's events, you paint with a
          wide brush telling the system what to do with 'classes' of remote
          systems.  
          


               BinkleyTerm Version 2.30 - User's Guide - Page 15

          When systems handled mail only at specific times, routing and
          times were of great importance.  Because more and more systems
          can process mail at any time, the idea of a schedule becomes less
          important.  The item of prime importance with BinkleyTerm is
          COST.  We are going to try and relieve you of the tedious details
          of scheduling, and concentrate on doing things for the least
          cost.  More on this later.
          
                                       Idea #2
          
          Another new idea deals with the way that packets are created.  
          
          If you have used other mailer systems, you're probably used to
          seeing packets generated several times.  With some programs,
          packets are built every time a mail schedule starts.  As a
          result, one message may be put into a packet several times.
          
          With BinkleyTerm, packets are built once by an external mail
          packing program.  Most often, this is a program called oMMM. 
          They may be remarked and rerouted once they're built, but they
          are physically built only once, and placed in a special sub-
          directory called the outbound holding area.
          
          NOTE:  oMMM stands for Opus Matrix Message Masher, and was
          originally designed for use with the Opus-CBCS system as its
          packer.  BinkleyTerm is able to use oMMM because it chose to
          implement the holding area in a compatible (although not
          identical) way.  oMMM may not have to be used at all; in some
          cases, the mail packing program for your particular environment
          may handle oMMM-like functions internally.
          
                                       Idea #3
          
          BinkleyTerm uses 'Continuous Mail.'  If you are already using a
          program that supports 'Crash Mail' then you understand a little
          of what Continuous Mail does.  Continuous Mail differs from Crash
          Mail in a couple of areas.
          
          In other mailer systems, you would mark a message as 'Crash'
          meaning that you wanted this message to go out NOW.  These mailer
          programs would shut down human caller access to the BBS and try
          like heck to get the message through.
          
          BinkleyTerm uses Continuous Mail, meaning that this is a message
          going to a system that can accept mail at any time of day. 
          BinkleyTerm makes no frantic attempts to dial out, rather it will
          try and deliver the message between callers.  
          
                                       Idea #4
          
          The driving forces of outbound traffic are file names!
          
          You'll have a special sub-directory set aside just for packets,
          compressed mail packets and other network files.  This sub-


               BinkleyTerm Version 2.30 - User's Guide - Page 16

          directory belongs to BinkleyTerm, which will maintain the
          directory for you.  It's a good idea not to play with this area
          unless you know exactly what you're doing. 
          
          Note also that when zoned operation is active (BinkleyTerm
          default) there are separate outbound areas for each zone.  The
          default outbound area (for your zone) and one additional area for
          each other zone you deal with.  The names of these additional
          areas are simply the outbound area name, with a three-digit
          extension that is the zone number in hexadecimal with leading
          zeroes.  See "Zone Support" for information.
          
          The file names of the packets tell BinkleyTerm how to treat the
          different packets.  Here's a typical packet name:
          
               00680024.OUT
          
          That says that the packet is for 0068/0024 (in hexadecimal) or
          104/36 in more familiar terms.  The ".OUT" means it is a Normal
          packet.
          
          Other packet extensions include:
          
               .HUT . . . Hold this packet for pickup by the remote system.
               .CUT . . . The other system can receive Continuous Mail.
               .DUT . . . Direct, meaning the other system can NOT receive
                          Continuous Mail.
          
          One nice thing is that you can manually change the file extension
          if you need to, or you can use fancy utilities such as AMAX to do
          this sort of thing for you on your command.
          
          For the remainder of this section, we'll assume that you'll be
          using oMMM as your mail packer.  As mentioned previously, you may
          be using another program that has oMMM-like functionality; it
          depends on your environment.  
          
          The oMMM program knows about these extensions and creates them
          based on information you put into the oMMM control file.  You'll
          have statements like this:
          
               NormHold  124/102
          
          Any messages you enter to 124/102 would be turned into a .HUT
          packet file, placed into the outbound area, and BinkleyTerm would
          hold that packet for 124/102 to call and pick it up. 
          
          Files are also sent through FidoNet compatible networks.  oMMM
          builds and maintains a file that tells BinkleyTerm what files to
          send (or hold) for whom.  A typical 'file attach' file might be
          named: 
          
               00680024.FLO
          


               BinkleyTerm Version 2.30 - User's Guide - Page 17

          This would designate a that there is a file waiting to be sent to
          0068/0024 (in hexadecimal) or 104/36 in more familiar terms.  The
          ".FLO" says it is a Normal file attach.  File attach files are
          also called 'flow files' - named after the .FLO file extension.
          
          Other flow file extensions are:
          
               .HLO . . . Hold these files for pickup by the remote system.
          
               .CLO . . . The other system can receive Continuous Mail.    
               .DLO . . . Direct, meaning the other system can NOT receive
                          Continuous Mail.
          
          A flow file is just a text file.  It contains a list of files
          that are to be sent to another system:
          
               #c:\binkley\outbound\0000fc9c.mo1
               ^c:\myfiles\wizzle.doc
               c:\pascal\notes.doc
          
          The '#' prior to a flow file entry says to truncate the file to
          zero-length after successfully sending the file to the remote
          system.  This is normally only employed when sending compressed
          mail (archived mail) to the remote.  The '^' prior to a flow file
          entry says to delete the file after sending.  
          
          The oMMM program will put messages into archives for you. 
          Details on how this is done can be found in the oMMM
          documentation.  The point is that oMMM combines the functionality
          of "generating packets" with that of programs like ARCmail. 
          
                          A Sample Message, Start to Finish
          
          So here's a practical example.  Say I enter a message to Rod
          Lamping at 104/610.  I mark the message as KILL/SENT when I enter
          it.  I also enter the message designating a file to attach to
          Rod, named C:\FILE\REQ\FOOBAR.ARC.
          
          I then enter a message in an EchoMail conference.  My conference
          host is Phil Kaiser at 104/904, for whom I hold my mail for
          pickup. 
          Among other things, I have two lines in my oMMM control file:
          
               NormCM    104/610
               OneHold   104/904
          
          'NormCM' tells oMMM to mark the message as Continuous Mail (since
          Rod runs a mailer 24 hours a day).  'OneHold' tells oMMM to
          archive the mail to 104/904, and mark it Hold-for-Pickup.  Refer
          to the oMMM documentation for the full set of available oMMM
          control file statements.
          
          First, my EchoMail utilities are run to turn EchoMail messages
          into Normal packets, and place them in the outbound area for


               BinkleyTerm Version 2.30 - User's Guide - Page 18

          processing by oMMM.  Next, I execute oMMM.  It first scans the
          NetMail message area (where I entered my message to Rod) and
          turns new messages there into Normal packets, and if there are
          files attached, it creates Normal flow files.  oMMM's second step
          is to use its control file, and apply the statements in the file
          against the mail in the outbound area that is marked as Normal.
          
          Since I have Rod's board listed as NormCM, oMMM renames the file
          extension of the Normal packet and flow file for Rod to .CUT and
          .CLO respectively, for Continuous Mail.  Since I have Phil's
          board listed as OneHold, first oMMM archives the packets to Phil,
          then creates a flow file with a file extension of .HLO for Hold-
          for-Pickup. 
          
          I would then have the following in my outbound area:
          
               00680262.CUT   Message to Rod
               00680262.CLO   Flow File to Rod
               00680388.HLO   Flow File to Phil
               0000FC9C.MO1   Archived Message to Phil
          
          For more information on how oMMM works, refer to the oMMM
          documentation.
          
                                 The Concept of Cost
          
          As mentioned earlier, one of the prime considerations with
          BinkleyTerm is sending mail for the least cost.  Cost is, of
          course, determined by the nodelist entry.  With a properly
          compiled nodelist, local FidoNet nodes have '0' in the cost field
          for their nodelist entry (assuming local calls are free of
          charge).  Other entries have cost fields that realistically
          reflect the actual cost of sending mail to a particular node.
          
          In most areas, it is cheapest to send toll calls during nighttime
          house.  Therefore, BinkleyTerm is normally set-up to send such
          mail only during nighttime hours.
          
          The 'L' flag used when scheduling events designates 'local only.' 
          As already mentioned, nodes with a '0' cost field are assumed to
          be local.  When the flag is applied to an event, only local calls
          are made.  The 'L' flag should be used whenever it costs the most
          money to make toll calls, and removed for events during which
          toll calls are cheapest.  More about this is in the Reference
          Manual section, "Scheduling Events."
          
                                 Alternative Method
          
          Randy Bush of 1:105/6 has assembled a package called MOOO which
          allows the Dutchie mail packer to be used with BinkleyTerm.  This
          will allow routing commands familiar to grizzled FidoNet veterans
          to be used with BinkleyTerm.
          
          


               BinkleyTerm Version 2.30 - User's Guide - Page 19

          WINDOWED INTERFACE
          
          BinkleyTerm features a windowed user interface.  The windowed
          interface provides "at-a-glance" convenience for watching mail
          sessions in progress, as well as determining what activity has
          taken place with the system recently.
          
          If a Video FOSSIL (VFOSSIL) is installed, the windowing
          operations can take place much faster than they would without
          one.  It is recommended that a VFOSSIL be used with BinkleyTerm.
          
          Some more recent VFOSSIL implementations may also allow
          BinkleyTerm to be used on EGA and VGA systems in extended text
          modes of 132 columns by 43 lines.  The mode switching must be
          performed by the utility software that accompanied your video
          card prior to invoking BinkleyTerm.
          
          There are five information windows displayed on-screen.  
          
                                  Current Settings
          
          This window contains various information about your system,
          including the current date and time, current event, port and
          current baud rate, status and multi-tasker type, if any.
          
          The current event line features a number, and a list of event
          flags.  The number corresponds to which entry in the BinkleyTerm
          configuration file contains the line that covers the current
          event.  The first 'Event' statement in the configuration file
          would be event 1, the second would be event 2, and so on.  The
          flags are letters that are a subset of those used with event
          scheduling.  Here is a list of letters that may be found in this
          window:
          
               C    Continuous Mail Only Event
               L    Local Only Event
               N    Do Not Accept Inbound File Requests
               R    Receive Only Event
               B    BBS Use Allowed
               D    Dynamic Event
               K    Do Not Send to #CM Nodes
          
          Note that not all event flags will be displayed in the window. 
          For complete details and use information, see "Scheduling Events"
          in the Reference Guide.
          
                                  Today at a Glance
          
          This window contains several lines of information regarding the
          activity on your system since midnight.  Note that the totals
          given apply only to calls handled by BinkleyTerm's Unattended
          (mailer) Mode, and do not include Terminal Mode totals.
          
          The first line, "BBS/Mail," lists how many bbs calls and mail


               BinkleyTerm Version 2.30 - User's Guide - Page 20

          calls have come in, separated by a slash.  For example, 2/15
          would indicate 2 BBS calls and 15 mail calls since midnight.
          
          The second line, "Calls Out," lists the number of dial attempts
          that have been made by your system, successful or otherwise.  
          
          The third line, "Good/Cost," shows how many successful outward
          connects have been made and the cumulative cost of all the
          successful calls, separated by a slash.  For example, 3/100 would
          indicate that 3 successful outbound calls have been placed, and
          that together, they cost 100 units (in the United States, units
          are cents, which would mean that the cost was 100 cents or
          $1.00).  The cost is calculated based on the cost shown in your
          compiled nodelist files; the cost shown there is assumed to be a
          per-minute value in calculating a per-call cost.
          
          The fourth line, "Files I/O," shows how many files (packets,
          compressed mail or other incoming files) have been received and
          sent, separated by a slash.  For example, 12/3 would indicate
          that 12 files have been received, and 3 have been sent.  
          
          Finally, the fifth line indicates the type of last call.  If the
          last call was incoming, the display will indicate whether the
          call was a BBS call, external mail call, or the node address will
          be displayed if it was a mail call.  If the last successful call
          was outgoing, the node address will be displayed.  
          
                                Pending Outbound Mail
          
          This window displays a list of systems for whom mail is pending,
          along with related information.  The window can be scrolled using
          PgUp, PgDn, Home, End, Up-Arrow and Down-Arrow keys.  The top
          line of the window lists the node that is being called, or was
          just called.  The second line lists the node that will be called
          next.
          
          Various information about the mail for the various nodes is also
          displayed.  The columns are marked by a single letter.  The
          column letters and their meaning are:  
          
               C    Continuous Mail 
               H    Hold-for-Pickup Mail 
               D    Direct Mail 
               N    Normal Mail 
               R    File and/or Update Request
               S    Status
          
          The symbol shown under the C, H, D, N and R columns is:
          
               *    Mail of This Type Pending
          
          
          
          


               BinkleyTerm Version 2.30 - User's Guide - Page 21

          The symbols shown under the S column are:
          
               x    Too Many Bad Connects (Undialable)
               #    Already Called, But Mail Still Pending
               -    Cannot Call During This Event
               !    Node Not Found in Nodelist
          
          When BinkleyTerm is making an outbound call, the node you are
          calling is highlighted in the Pending Outbound Mail window.  This
          allows you to know which node has been called, even after the
          pertinent information has scrolled out of the Recent Activity
          window (described below).  This feature can also be helpful in
          determining whether an active mail session was initiated by you,
          or was started by an incoming call.
          
          The outbound area is re-scanned for new additions under the
          following circumstances:
          
               - After a keyboard shell has been invoked
               - After 'AfterMail' is run (if designated)
               - After 'Packer' is run (if designated)
               - After message editor (Alt-E) has been run
               - After 10 minutes of no activity
          
          Note the 'AfterMail', 'Packer' and 'Reader' (message editor) are
          designated in the configuration file.  Refer to the Reference
          Guide section "Configuration File" for additional information.
          
                                   Recent Activity
          
          This window is similar to the main section of previous
          BinkleyTerm displays, in that it gives various information about
          what the system is currently doing, or has just done.  This
          includes identification of the remote system, the type of
          connection, what files were transferred, etc.
          
          Any feedback available about the current or recent activity of
          the system is shown in this window.  
          
                                   Transfer Status
          
          This window gives particulars about current file transfers that
          may be taking place if a connection is active.  For WaZOO/ZedZap
          connections, this includes filename and the number of bytes
          transferred; for other connections, the number of blocks
          transferred may be given.  
          
          CONTROL
          
          In Unattended Mode, BinkleyTerm is normally used with batch files
          that control system operation.  You'll have a batch file used to
          invoke BinkleyTerm and invoke system utilities such mail
          processors.  
          


               BinkleyTerm Version 2.30 - User's Guide - Page 22

          Since BinkleyTerm can be used in such a wide variety of
          situations, there is not a particular "correct" or "incorrect"
          way to configure BinkleyTerm.  The remainder of this section
          explains some of the operational theory and methods behind batch
          processing as it applies to BinkleyTerm. 
          
          If you are adding BinkleyTerm to an existing FidoNet compatible
          BBS system, chances are excellent that you are already familiar
          with batch files and the various tricks that they must typically
          perform in a FidoNet environment. 
          
          If advanced batch processing is beyond your scope, it is highly
          recommended that you review your DOS manual, or the numerous
          third-party DOS usage guides for information to get you started.
          
          One of the fundamentals of using batch files with BinkleyTerm is
          the concept of the 'errorlevel.'  This DOS environment variable
          is set to a given value when a program completes execution.  A
          batch file can detect and act upon the value, branching to
          various parts of the batch file.  This section provides many good
          tips and ideas for errorlevel and batch file processing.  Also
          consult your DOS manual for additional information.
          
          A practical application might be after BinkleyTerm receives mail. 
          BinkleyTerm would exit to the batch file, setting the errorlevel
          to a predetermined value.  The batch file detects the value, and
          branches to a section in the batch file where mail unpacking
          programs are invoked.  The batch file would then be restarted,
          invoking BinkleyTerm to again wait for or send mail.
          
               NOTE:  The remainder of the "Control" section was
               written by Ron McKenzie of 1:104/45.1.  My gracious
               thanks to him for the insights presented here, and for
               the time he contributed to its composition.  This
               section was sorely needed (and requested) by many
               BinkleyTerm users.
          
                    - Alan D. Applegate
          
                             Errorlevels and Batch Files
          
          Errorlevels present a difficult hurdle to the new user of
          BinkleyTerm, especially those with no experience operating a BBS
          or a Point.  In addition, BinkleyTerm's great flexibility
          confuses some Sysops.  Few things are "fixed" or "cast in
          concrete."  This section attempts to draw together pertinent
          information from many sources relating to errorlevels and their
          use in crafting a batch file to operate a BBS or a Point.  Also
          presented are some accumulated bits of wisdom gathered by the
          author in the course of creating his own Point.
          
          This section looks at what errorlevels are, which errorlevels are
          returned by BinkleyTerm, distinguishes between those errorlevel
          values set by BinkleyTerm and by the user, shows how you use


               BinkleyTerm Version 2.30 - User's Guide - Page 23

          errorlevels in your batch file and, finally, offers some hints
          and shortcuts.
          
                              What is an "Errorlevel?"
          
          An errorlevel is a numeric value which a program may "return"
          when it terminates.  The name is misleading because the value
          returned is really an exit code, rather than an indication of an
          error per se.  It distinguishes different types of normal exits,
          in addition to denoting an abnormal condition on exit.  The
          software's creator (or, in some instances, the program's user)
          sets the value(s).
          
          Errorlevels permit the user to craft a batch (.BAT) file, using
          DOS batch commands such as IF and GOTO, to logically organize the
          BBS or Point operating process.  Automagically, this batch file
          determines which tasks need be performed and in what order.  It
          branches between tasks based on the exit code generated by each
          program and on the program logic created by the Sysop.
          
          For example, an editor might return the following:
          
               Exit
               Code Condition
               ---- ----------------------------
               3    EchoMail and NetMail Created
               2    EchoMail Only Created
               1    NetMail Only Created
               0    No Mail Created
          
          For another example, the ConfMail mail processing program returns
          the following errorlevels in the Import mode:
          
               Exit
               Code Condition
               ---- ----------------------------
               2    Severe Error in Processing
               1    Messages Were Imported
               0    No Messages Imported
          
          Branching or jumping within the batch files is facilitated with
          the use of labels.  A label is used to identify a particular
          block within the batch file.  For example, you might choose to
          label a portion of your batch file "nodelist" because that
          particular section of the file handles nodelist processing.
          
          Labels are designated with a colon, followed by the label name. 
          You may wish to identify the top of the file with a label to make
          re-starting the batch file as easy as using a GOTO statement.
          
          Here is a short example of the use of labels:
          
               :start
               myprog -p1 


               BinkleyTerm Version 2.30 - User's Guide - Page 24

               if errorlevel 2 goto process
               if errorlevel 1 goto start
               if errorlevel 0 goto end
          
               :process
               proc -c -d1
               if errorlevel 1 goto start
               if errorlevel 0 goto end
          
               :end
          
          Note that the top of the file is identified by a label named
          "start" and that other sections are labeled as well.  The batch
          file starts out by invoking a program called MYPROG.  Once MYPROG
          exits, the errorlevel values determine where in the file that
          control will be passed.  One errorlevel references another label
          that in turn will cause a program named PROC to be run.  Another
          branch goes back to the top of the file, and yet another goes to
          the end of the file.  The PROC program also gives errorlevels
          that are processed by the batch file.
             
          Errorlevels and associated batch processing commands permit
          tailoring the batch file and bypassing of unnecessary processing
          steps, saving substantial amounts of time, which, in turn,
          translates into more time for user-access and other processes. 
          (There is NEVER too much time.)
          
                        What Errorlevels BinkleyTerm Produces
          
          BinkleyTerm returns errorlevels in four general cases:
          
               Sysop-Initiated
                    Fx keys, Escape and Alt-X
          
               Sysop-Defined
                    E1=, E2= and E3= exits used with event scheduling, and
                    external mail program exits
          
               Caller-Initiated
                    A non-mail call returns the baud rate code
          
               System-Generated
                    BinkleyTerm cannot find itself in the nodelist
          
          What errorlevels (exit codes) does BinkleyTerm return?
          
          Many values are "hard coded" in BinkleyTerm or are provided in
          the sample files included in the distribution package.  However,
          only some of the values have "fixed" definitions.
          
          
          
          
          


               BinkleyTerm Version 2.30 - User's Guide - Page 25

               Error-    
               Level     Means          Caused By
               --------- -------------- ----------------------------------
                 1       Exit           Alt-X Keypress
                 3       300 bps Call   Non-Mail Call at 300 Baud
                10       E1= Exit **    F1 Keypress *
                12       1200 bps Call  Non-Mail Call at 1200 Baud
                20       E2= Exit **    F2 Keypress *
                24       2400 bps Call  Non-Mail Call at 2400 Baud
                30       E3= Exit **    F3 Keypress *
                40       **             F4 Keypress
                48       4800 bps Call  Non-Mail Call at 4800 Baud
                50       **             F5 Keypress
                60       **             F6 Keypress
                70       **             F7 Keypress
                80       **             F8 Keypress
                90       **             F9 Keypress
                96       9600 bps Call  Non-Mail Call at 9600 Baud
                99       ExtrnMail      External Mail String Received *****
               100       **             F10 Keypress
               128       38400 bps Call Non-Mail Call at 38,400 Baud ****
               192       19200 bps Call Non-Mail Call at 19,200 Baud
               254       Error          Address Not Found in Nodelist ***
               255       Error          Microsoft C Produced Error
          
               * As shipped; the sample BINKLEY.EVT event file included in
               the distribution package uses errorlevels 10, 20 and 30 for
               E1=, E2= and E3= exits respectively.  Thus pressing F1, F2
               or F3 has the same effect as BinkleyTerm making an E1=, E2=
               or E3= exit.  Exits are defined as:
               
                    E1=  Beginning of Event
                    E2=  Mail Received
                    E3=  Compressed Mail Received
          
               ** All F-key exits have user-defined functionality.
          
               *** BinkleyTerm will exit with errorlevel 254 when it cannot
               find its own address in the nodelist.  Other conditions
               checked are: 
                    
                    - Non-Zero Zone Number Designated
                    - Non-Zero Net Number Designated
                    - System Name Designated
                    - Sysop Name Designated
                    - Outbound (Hold) Area Designated
                    - Inbound Area Designated
          
               If any of these parameters are not designated or are
               improperly designated as noted, then an errorlevel 254 exit
               is performed.  These parameters are designated in the
               configuration file.
          
               **** Errorlevel values allowed by DOS are from 0 to 255. 


               BinkleyTerm Version 2.30 - User's Guide - Page 26

               Therefore, the value of a 38,400 baud exit "wraps" around to
               equal 128, instead of 384.
          
               ***** The external mail program functionality features
               configurable exit values, but the default value is 99.
                  
                           Making Errorlevels Work For You
          
          You, the user, define ALL errorlevels associated with the E1=,
          E2= and E3= exits, setting them in BINKLEY.EVT.  You 'program' a
          specific task to occur at the beginning of a selected BinkleyTerm
          "event" (time interval) by selecting a unique "E1=" code for that
          task.
             
          The task can be set to occur periodically throughout each day,
          once-per-day, once-a-week or on selected days within the week;
          further, you may execute a given task at different times on
          different days, if so desired, depending on the way a particular
          event is configured.  Similarly, by having a variety of E2= and
          E3= codes, you can use different mail unpacking routines
          throughout the day or week.  Refer to the section "Scheduling
          Events" in the Reference Guide for details.
             
          You customize the operation of your BBS or Point to meet your
          specific needs and those of your "customers".
          
                       Errorlevels, Batch Files and ExtrnMail
          
          This BinkleyTerm option is intended for invocation of an external
          mail handling program, possibly an alternate mailer, upon
          reception of a user-defined string of characters.  It can also be
          used to set-up multiple BBS installations, allowing a user to
          specify which BBS he or she wants.  This is covered in detail in
          the sections "External Mail Programs" and "User-Selected BBS
          Functionality" elsewhere in this manual.
          
                      Errorlevels, Batch Files and Housekeeping
          
          Another common application of exits and exit values is for
          housekeeping.  For example, the author set up his Point system to 
          do daily housekeeping (deleting and renumbering of the message
          base) daily at 8:00am.  Twice a day, at 4:00am and 11:00pm, his
          Point polls his BossNode.  Each Saturday, the Point requests the
          current NODEDIFF from the BossNode and, then, on Sunday,
          processes the weekly NODELIST.  A distinct E1= errorlevel handles
          each task.
                  
          Thus, only you can prevent chaos and create an orderly
          functioning batch file for your BBS or Point.  Be vigilant, and
          avoid re-using the same errorlevel for several different tasks.
          
                                   DOS Shell Keys
             
          There are also 9 programmable DOS shell exits which are invoked


               BinkleyTerm Version 2.30 - User's Guide - Page 27

          by using Alt-Fx key combinations.  You enable and set these up in
          the configuration file.  Look for 'Shell' near the end of the
          sample BINKLEY.CFG file included with BinkleyTerm, and refer to
          the section "Configuration File," the command 'Shell' in the
          Reference Guide.  
          
          These shells produce NO errorlevels but are mentioned because
          they are an alternate and/or additional solution to creating
          Sysop controllable exit/task options.  When configured, these
          shell keys invoke a new copy of the command processor,
          COMMAND.COM.  You may not want to use these as they consume extra
          memory for the 2nd copy of COMMAND.COM.
          
                                  Using Errorlevels
           
          How do you use errorlevels?  By testing for their existence with
          the batch file statement:
          
               IF ERRORLEVEL n GOTO xxx
          
          Where:
          
               n    is a numeric value
               xxx  is a label within the batch file
          
          Bear in mind the following Rules:
          
               The "IF ERRORLEVEL ... " statements must follow immediately
               after the program they test.
          
               "IF ERRORLEVEL n" returns true for any value GREATER THAN or
               EQUAL TO "n", therefore,
             
               Test errorlevels in descending numerical sequence, and,
               
               Trap unwanted exit codes so that a step will be executed if,
               and only if, the desired errorlevel is encountered.
             
          In this excerpt from a batch file, the "Start_BT" label refers to
          a section that loads BinkleyTerm:
          
               IF ERRORLEVEL 21 GOTO Start_BT  <- Traps 21 to etc. *
               IF ERRORLEVEL 20 GOTO OpenMail  <- Branch & Open Mail
               IF ERRORLEVEL 11 GOTO Start_BT  <- Traps 11 to 19 *
               IF ERRORLEVEL 10 GOTO Start_BT  <- "Non-Event"
               IF ERRORLEVEL  3 GOTO Start_BT  <- Traps 3 to 9 *
               IF ERRORLEVEL  2 GOTO Bad_Exit  <- Nodelist Entry Error
               IF ERRORLEVEL  1 GOTO Exit_BT   <- Branch to 'Exit'
             
               * Invalid responses are 'trapped', BinkleyTerm restarts.    
          
                                      What Now?
          
          Look at some "good" examples which demonstrate automating


               BinkleyTerm Version 2.30 - User's Guide - Page 28

          processes using batch files and errorlevels.  In particular, look
          at the samples provided by Bob Hartman and Alan Applegate for
          BinkleyTerm (available from 1:104/36), or samples that existing
          BinkleyTerm Sysops may be able to provide you.  Then, make up
          your own batch file to control a process.  Or, take one of the
          samples and modify it for your specific needs.  Have fun!  Hack
          away!
             
          Consult the documentation for each of your application programs,
          determine whether or not it produces errorlevels, and how you can
          take advantage of them.
          
                      Errorlevel and Batch File Hints and Kinks
          
          When looking at sample batch files, note carefully how each
          author organized the program logic in his batch file.  Here are
          some reminders.
          
          A batch file loses 'control' if it merely invokes another batch
          file (e.g. you execute a second batch file within the first);
          instead, "shell out" to DOS from the first batch file by invoking
          another copy of COMMAND.COM.  Using the /C switch closes that
          second command processor when the second batch file finishes. 
          Consult your DOS reference materials for more information on this
          point.
             
          Examples:
          
               COMMAND.COM /C Pak_Mail.BAT
          
          or:
          
               %comspec% /C Pak_Mail.BAT
          
          This is true for all MS-DOS versions up to and including 3.2. 
          MS-DOS/PC-DOS 3.3 introduced the batch command CALL which
          overcomes this limitation, when it is used.  Refer to your DOS
          manual.
          
          Sometimes, your batch file must "remember" what it is doing.  You
          can accomplish this by "setting" an environment variable, for
          example:
             
               SET PROC=UNATTENDED
             
          Your batch file can then determine its "logic path" or invoke
          other programs using statements such as:
             
               IF %PROC% == UNATTENDED GOTO xxx
          
          or:
          
               IF %PROC% == UNATTENDED BT UNATTENDED
          


               BinkleyTerm Version 2.30 - User's Guide - Page 29

          or:
          
               IF %PROC% == UNATTENDED %comspec% /C Pak_Mail.BAT
          
          In the above examples, the program follows a certain logic path
          and performs specific tasks when it's in the unattended mode.  
          
          Verify that you have sufficient environment space for any
          variables which you want to "store" in it.  Review the section
          concerning the SHELL entry for CONFIG.SYS in your DOS reference
          material.  This will explain how to enlarge the environment space
          if that is needed.  The exact adjustments which you may need to
          make are dependent upon your version of MS-DOS/PC-DOS, and
          several other factors such as memory use, size of DOS paths and
          so on.
            
          You can also pass a variable into a batch file when you invoke a
          program.  For example, the author's POINT.BAT batch file
          immediately comes up in the Unattended Mode if you invoke it
          with:
             
               POINT -u    (or, POINT -U)
             
          POINT.BAT then leapfrogs directly into unattended mode using the
          following statements:
             
               IF %1 == -u SET PROC=UNATTENDED
               IF %1 == -u GOTO Start_BT
               ...
               
               :Start_BT
               IF     %PROC% == TERM BT           <-Terminal Mode
               IF NOT %PROC% == TERM BT %PROC%    <-Other Modes
             
          Finally, use of errorlevels is not always necessary.  Some
          programs provide an alternative which may meet your needs.
             
          For example, ConfMail and some editors produce an ".OUT" file
          containing the name of each EchoMail area for which mail has been
          received or created.  Thus, test for the existence of the .OUT
          file rather than testing the errorlevels and, thereby, simplify
          the logical branching in your batch (.BAT) file.  For example:
          
               if exist AREAS.OUT ConfMail Export ... -F AREAS.OUT
               if exist AREAS.OUT del AREAS.OUT
          
          or:
          
               if exist ECHO.OUT ConfMail Maint ... -F ECHO.OUT
               if exist ECHO.OUT ReplyLnk -F ECHO.OUT
               if exist ECHO.OUT del ECHO.OUT
          
          The point here is that such an .OUT file can be used by several
          programs serially, as in the last example, and thus, avoid using


               BinkleyTerm Version 2.30 - User's Guide - Page 30

          errorlevel driven logic.  Further, it can continue working for
          you after you have "lost" your errorlevel by running another
          program.
          
                                Environment Variable
          
          In environments where multiple drives and paths are used, it is
          generally a good idea to set a DOS environment variable named
          BINKLEY.  BinkleyTerm can then use this variable to determine
          where its configuration file is located, should it not be located
          in the current directory.
          
          Place in your AUTOEXEC.BAT file (or in the batch file that starts
          BinkleyTerm) the line:
          
               SET BINKLEY=C:\PATH
          
          Where C:\PATH is the drive designator and complete path name
          where the configuration file is located.
          
          CONFIGURATION FILE
          
          Most BinkleyTerm parameters are set through a configuration file. 
          By default, the configuration file is named BINKLEY.CFG, and is
          expected to be available unless a different configuration file is
          specified on the command line.
          
          A sample BINKLEY.CFG files is included with the distribution
          package.  You can edit the file with any plain text editor, such
          as DOS' own EDLIN.  The Reference Guide contains a complete
          listing of all BinkleyTerm configuration statements and their
          proper use.
          
          BinkleyTerm directly uses the raw configuration file, and each
          time the program in invoked, BinkleyTerm will scan and process
          the file, setting internal values to those that you have
          selected.
          
          When you first install BinkleyTerm, or if you change your address
          ('Address'), inbound files area ('NetFiles'), outbound files area
          ('Hold'), or NetMail message area ('NetMail') as specified in the
          configuration file, you must run a special program included with
          the distribution package called "BTCTL".
          
                                        BTCTL
          
          BTCTL is used to create two files based on information in the
          BinkleyTerm configuration file.  First, it produces MAIL.SYS, a
          Fido-compatible system file used by many mail processing
          programs.  Second, it produces BINKLEY.PRM, a file used by oMMM,
          a mail packer nearly always used with BinkleyTerm.  
          
          Note!  BTCTL needs to be run only under the circumstances
          mentioned above.  BTCTL DOES NOT need to be run for minor changes


               BinkleyTerm Version 2.30 - User's Guide - Page 31

          to the file that DO NOT include address, inbound file path,
          outbound file path or NetMail message path.
          
          NODELIST
          
          The listing of FidoNet compatible systems in your network is
          called a 'nodelist.'  Once a current nodelist is obtained, it can
          be kept up-to-date by using so-called NODEDIFF files that are
          distributed weekly within the network.
          
          The nodelist and update files are distributed in 'raw' form. 
          Adjunct software must be used to process and compile the raw
          nodelist and NODEDIFF files into a form usable by BinkleyTerm. 
          From now on, when we refer to "nodelist" we're referring to the
          compiled, ready-to-use nodelist data files, not the raw nodelist
          file as distributed within the network.
          
          BinkleyTerm is capable of using a variety of compiled nodelist
          formats.  If you do not already have a BinkleyTerm-compatible
          format that you desire to use, the primary formats supported by
          BinkleyTerm are the Opus 'Version 5' nodelist, used by Opus-CBCS
          1.03b and below, and the Opus 'Version 6' nodelist, used by Opus
          1.10 and above.  
          
          THE VERSION 5 NODELIST SHOULD BE CONSIDERED OBSOLETE.  THE
          VERSION 6 FORMAT OR THE QUICKBBS FORMAT (DISCUSSED LATER) ARE THE
          PREFERRED FORMATS FOR BINKLEYTERM, AS SEVERAL IMPORTANT FEATURES
          ARE UNAVAILABLE WITHOUT THEM.
          
          Point installations do not need a nodelist at all if they don't
          care to have one, simply by using all of the following
          configuration file statements:
          
               - BossPhone
               - BossPwd
               - PrivateNet
               - Address
          
          Of course, this requires establishing a session password with
          your boss (as designated by the 'BossPwd' statement).  With this
          method, Terminal Mode must be used to poll the boss using the
          Alt-Y keystroke, as Unattended Mode will not operate without a
          nodelist available.  Refer to appropriate sections of the manual
          for additional information.
          
                                    FIDOUSER.LST
          
          The nodelist processing software is also used to produce
          FIDOUSER.LST, a list of Sysop names and node address that
          BinkleyTerm can use when dialing out.  When this file is
          available to BinkleyTerm, you can enter a Sysop name in place of
          a node address whenever prompted to enter a node address.  This
          applies to both Unattended and Terminal Modes, while polling or
          dialing a system.


               BinkleyTerm Version 2.30 - User's Guide - Page 32

          
          FIDOUSER.LST should be kept in the same sub-directory as the
          compiled nodelist files are kept.
          
                                 Version 5 Nodelist
          
          Although this nodelist format is the BinkleyTerm default (for
          backward compatibility), it is considered obsolete for use with
          the current version of BinkleyTerm.  
          
          If you are running a Fido 11w or Opus 1.0x system, BinkleyTerm
          can support this nodelist format, but it is highly recommended
          that you produce both a Version 5 and a Version 6 nodelist for
          your system; the former for your BBS software, and the latter for
          use by BinkleyTerm.  Again, the Version 5 nodelist is considered
          obsolete, and should not be used unless absolutely necessary.
          
                                 Version 6 Nodelist
          
          Using the Version 6 nodelist allows BinkleyTerm to have more
          information at its fingertips, specifically, whether a given node
          in the nodelist supports 'Continuous Mail.'  Some nodelist
          processors are also able to put modem type information into a
          compiled Version 6 nodelist.  The extended information in a
          Version 6 nodelist allows for automatic determination of this
          information, resulting in fewer errors that result from attempts
          to manually compensate for such variables.
          
          The Version 6 nodelist is a relatively new format.  Nodelist
          processor commands mentioned in this section apply only to
          ParseLst, a commonly available nodelist processing package.  You
          will be able to locate ParseLst from systems that normally carry
          Opus or BinkleyTerm.  Other nodelist processors may also support
          this format, and their specific commands may vary.  
          
          Make certain that you also make the necessary changes to your
          configuration file.  Add the 'NewNodelist' statement, and change
          your event schedules to be compatible as well.  Refer to the
          Reference Guide for additional information. 
          
          Please note that the index files for the Version 5 and Version 6
          nodelists ARE IDENTICAL.  Therefore, you may use BOTH lists
          SIMULTANEOUSLY.  This is helpful in installations where Opus-CBCS
          1.0x or Fido 11w is used under BinkleyTerm.
          
          With ParseLst, you'll need to use the following statements in the
          ParseLst configuration file in order to process a nodelist for
          BinkleyTerm's use:  UseZone, Complete, and Version6.  Don't
          forget to use 'NewNodelist' in BinkleyTerm's configuration file.
          
                                  QuickBBS Nodelist
          
          BinkleyTerm also supports the QuickBBS Version 2.0x nodelist. 
          This nodelist format is equivalent in functionality to the


               BinkleyTerm Version 2.30 - User's Guide - Page 33

          Version 6 nodelist described above, including automatic
          determination of whether a node can accept Continuous Mail.
          
          In order for the QuickBBS nodelist to be used with BinkleyTerm,
          it MUST be processed by ParseLst Version 1.01 or higher.  At this
          writing, Qnode, the nodelist processor included with QuickBBS,
          does not support the extended information BinkleyTerm requires
          from the nodelist.  ParseLst will insure that the information is
          included, as well as provide complete compatibility with
          QuickBBS.  Other nodelist processors, such as XlaxNode, should
          also be able to produce a QuickBBS nodelist that contains the
          necessary information for BinkleyTerm to function properly.
          
          To use this format, add the statement 'QuickNodelist' to your
          configuration file.  Refer to the Reference Guide for additional
          information.
          
                                    TBBS Nodelist
          
          BinkleyTerm can use the nodelist format supported by TBBS.  In
          order to obtain additional information about the various nodes in
          the list, BinkleyTerm requires an adjunct file, NODELIST.EXT.
          
          The nodelist is first processed normally for TBBS.  Then,
          ParseLst is used to produce NODELIST.EXT and NODELIST.IDX from
          the raw nodelist.  These files are then used together by
          BinkleyTerm to provide full functionality as described above for
          the Version 6 nodelist.  This includes automatic determination of
          whether a node can accept Continuous Mail.  
          
          PLEASE NOTE!  The TBBS format DOES NOT provide sufficient
          information to allow BinkleyTerm's zone support to be active.  If
          you use this format, YOU MUST ALSO USE the 'NoZones' statement in
          your configuration file.  Refer to the section "Zone Support" for
          additional information.
          
          To use this format, add the statement 'TBBSNodelist' to your
          configuration file.  Refer to the Reference Guide for additional
          information.  Also refer to the ParseLst documentation for more
          information about compiling NODELIST.EXT.
          
                            Nodelist Support Information
          
          The authors of BinkleyTerm are willing to consider supporting
          additional nodelist formats.  To facilitate the support of your
          nodelist format, the following information is required: 
          
               1.  C language structure definition for the format.  (Pascal
               is acceptable too, but C is preferred.)
          
               2.  Definitions of any of the fields in the format.  In
               particular, bit fields must be defined, and the contents of
               any field that is not obvious must be given.  
          


               BinkleyTerm Version 2.30 - User's Guide - Page 34

               3.  Compiler and instructions for generating the given
               nodelist format.  
          
               4.  Examples of C code to look-up a given
               zone:net/node.point number in the nodelist.  (Note that any
               code used will be given out for free in source form, so this
               should not be taken lightly.) 
          
               5.  A phone number and hours when the author can be reached
               if there are issues that need to be resolved.
          
               6.  IMPORTANT!  A good reason why we should include the
               format.  
          
               7.  IMPORTANT!  If this is for BinkleyTerm front-ending for
               a certain type of BBS, the author should include
               configuration files, batch files, etc. that will be
               necessary for others to use BinkleyTerm and his BBS.  This
               will save us a lot of work tracking these things down in the
               long run.  
          
          If all of this information is forwarded to 1:132/101, 1:141/491
          or 1:104/36 we can get back to the author within a week or two to
          tell them whether the format will be in the next release.  
          
          ZONE SUPPORT
          
          Zones are a high-level addressing scheme devised for use within
          FidoNet.  In a full FidoNet address, such a 1:104/36.0, '1' would
          be the zone, '104' the net, '36' the node number, and '0' the
          point number.  Currently, zone addressing is not supported within
          the FidoNet message or packet structure, allowing software such
          as BinkleyTerm to provide only "kludged" support of zones. 
          BinkleyTerm offers such support, and endeavors to make it as
          seamless as possible.  
          
          If for some reason you do not wish zone support to be active,
          place the statement 'NoZones' in your configuration file.  This
          will cause BinkleyTerm to essentially "turn off" zone support. 
          If you intend not to use zone support, then use the 'NoZones'
          configuration file statement.
          
          If you have not used the 'NoZones' statement, BinkleyTerm will
          assume that a full, zone-based nodelist is available for its use. 
          For information on how to properly compile a nodelist for
          BinkleyTerm, refer to the section "Nodelist" for more
          information.
          
          When attempting to send mail to nodes in other zones, BinkleyTerm
          will assume that mail for other zones will be held in separate
          outbound areas by zone number.  For example, if your outbound
          mail directory is C:\BT\OUTBOUND, mail for your zone will be held
          there.  However, mail for nodes in zone 2 would be expected in
          C:\BT\OUTBOUND.002, mail for zone 3 would be expected in


               BinkleyTerm Version 2.30 - User's Guide - Page 35

          C:\BT\OUTBOUND.003, and so on.  This example is for zone 1.
          
          The zone number for which your default outbound directory applies
          is determined by the FIRST appearance of the 'Address' statement
          in your configuration file.  Subsequent 'Address' statements
          identify your alternate identities within other zones (and/or
          networks).  For example, if the first 'Address' statement
          designates an address in zone 2, then the outbound area
          designated by the 'Hold' statement in your configuration file is
          the default, and mail to other zones would require their own
          distinct outbound areas with extensions that match the zone
          number.
          
          The multi-zone outbound areas are in hexadecimal.  For example,
          the outbound area for zone 10 would be C:\BT\OUTBOUND\.00A. 
          Using this method, it is possible to support up to 4,095 zones.
          
          Your mail packer also needs to support the discrete outbound
          areas for multiple zones.  oMMM versions greater than 1.30
          support them, as well as the MOOO package.  oMMM is commonly
          available wherever BinkleyTerm or Opus-CBCS files are available. 
          MOOO is also available from many such locations.
          
          MULTIPLE NETWORK OPERATION
          
          Operation of a system within multiple networks is becoming
          increasingly popular.  Normally, networks such as AlterNet,
          EggNet, RBBS-Net and so on are implemented as separate zones.  To
          facilitate operation of a BinkleyTerm system within multiple
          networks, you may specify a separate system address, each with a
          different zone.
          
          For example, if you wish to use a different address for FidoNet
          (currently zones 1, 2, 3 and 4) and for two alternative networks,
          you might have the following in your configuration file:
          
               Address 1:1010/89.0
               Address 9:569/999.0
               Address 11:334/1.0
          
          If your system connects with a system in zone 9, your system will
          identify itself as 9:569/999.  If connected with a zone 11
          system, it will identify itself as 11:334/1.  The first 'Address'
          statement is the default, and callers in zone 1 (and any zones
          other than 1, 9 and 11 - those specified with 'Address'
          statements) would find your system identified as 1:1010/89.
          
          SECURITY
          
          In the ideal world, we would not need locks, police, or jails;
          there wouldn't be crime.  But we don't live in an ideal world,
          and for this reason, BinkleyTerm offers a selection of features
          that are intended to offer your system a certain level of
          security against "electronic mail crime."


               BinkleyTerm Version 2.30 - User's Guide - Page 36

          
          The existence of security features is not intended to evoke fear. 
          Chances are excellent that you will have no need for security
          features in most cases.  But just as high crime areas see more
          locks and iron gates than low-crime areas, the choice of how much
          security to put in place is up to you, and is based on your needs
          and experience.
          
          BinkleyTerm's internal security is based on a simple principle. 
          With the exception of session passwording, for each secured
          feature (all of which are specified within the configuration
          file), there is a default statement.  When you implement no
          security features, the default statement is used to specify a
          particular feature's configuration.
          
                                        Prot
          
          When security is implemented, however, two more statements are
          used in addition to the default.  One type of statement, known as
          "Prot" for "protected," describes a group of systems with which
          you have implemented session passwording.  These links are
          "protected" by passwords.  
          
          When session passwording is implemented, unless a password is
          matched when connecting to a protected system, a mail session is
          aborted.  
          
          "Protected" or "Prot" systems are the top-level, or "most
          favored" situations, since you generally know the other person at
          the other end (a pre-requisite to establishing a password).
          
                                        Known
          
          The second type of statement is called "Known" and describes
          systems that are listed in the nodelist ("known" to you) but with
          whom you have not established a session password.  These are
          links with listed systems, but links that are not password
          protected.  This group represents the middle-level of security.
          
                                       Default
          
          When you use a Prot and/or a Known security feature, then the
          default statements all take on a new meaning - that of unknown
          systems.  The defaults are used for links that are not in the
          nodelist, and therefore, cannot have a session password
          established.  This group of systems represents the lowest-level
          of security, since you really have no idea who owns such systems,
          or where they are located.
          
                           Security - Session Passwording
          
          BinkleyTerm supports session-level password protection.  Using
          such protection helps prevent situations where someone uses a
          FidoNet mailer to 'impersonate' a legitimate FidoNet node, and


               BinkleyTerm Version 2.30 - User's Guide - Page 37

          pickup mail addressed to the node.  When implemented, both the
          sending and receiving systems must have it in operation, with the
          same password on both ends (exceptions noted below).
          
          With Point systems, passwording can be automatic.  Simply use the
          'BossPwd' configuration file option, and choose a password.  Make
          sure your Boss also uses the same password.
          
          For other types of systems, password information is kept in the
          nodelist data file.  ParseLst (and some other nodelist
          processors) can easily add a password to a nodelist entry during
          processing.  Refer to the documentation for your nodelist
          processor. 
          
          When talking with other BinkleyTerm, Opus or compatible systems
          that use the YooHoo session negotiation method, full, two-way
          protection is available.  The systems connect and exchange the
          password when the YooHoo takes place.  If the passwords do not
          match, the session is terminated, regardless of who initiated the
          call.  The only exception is when you have a password
          implemented, but the remote has NO password implemented.  In this
          case, if YOU placed the call, then a session will still occur. 
          If the REMOTE placed the call, then the session will be aborted.
          
          When connected with SEAdog and compatible systems, password
          matching takes place only when you are picking up mail from the
          remote system.  You may send to a SEAdog system without a
          password match taking place.  (The assumption is that you always
          know who you're calling, but don't always know who's calling
          you.)
          
          Note that session passwords must not exceed eight (8) characters,
          and are case insensitive.
          
          When BinkleyTerm cannot find a password for a remote system when
          placing a call, it will not check for a password during the
          session.  This responsibility is left to the remote system, if
          the remote chooses to perform checking.
          
          BinkleyTerm allows easy implementation of new passwords.  Simply
          add the agreed upon password as outlined above, and send the
          remote system a message.  BinkleyTerm will allow an outbound
          session to take place in cases where you have designated a
          password, but the remote has not yet implemented it.  This is
          handy for letting a remote system know that a password was
          implemented.  Note that in this case, BinkleyTerm will NOT allow
          the remote to have a successful session when the remote calls
          your system; only when you place the call (as stated above, the
          idea is that you know who you're calling, not who's calling you).
          
                        Security - Secured Inbound File Areas
          
          Another method of securing the flow of mail involves controlling
          the processing of incoming mail to your system.  In most cases,


               BinkleyTerm Version 2.30 - User's Guide - Page 38

          you will want to protect common mail links with session
          passwording, as outlined in the previous section.  Still, the
          potential exists for another abusive system to send you rogue
          mail, or mail "planted" onto your system in hopes that it will be
          routed to another system at your expense, or find its way into a
          national EchoMail conference.
          
          The following list shows the various security levels and the
          configuration file statements that define their respective
          inbound paths:
          
               Prot      'ProtInbound'
          
               Known     'KnownInbound'
          
               Default   'NetFile'
          
          In a typical installation secured in this manner, mail will
          automatically be processed only if received to the 'ProtInbound'
          area.  Mail received to 'KnownInbound' or 'NetFile' must be
          examined and processed manually.  Of course, you could choose to
          configure your system in a such a manner that mail received in
          any of the three areas is processed automatically to your liking,
          possibly to special message areas.  
          
          The only "hole" in this is with FSC-0001 sessions, such as those
          with SEAdog or Fido.  Since BinkleyTerm has no way of knowing the
          address of the sending system until a packet is received, that
          first packet (.PKT file) will always be placed in the default
          area specified by the 'NetFile' statement.
          
          Secured inbound file areas simply provide another, extra measure
          of handling potential security problems associated with the
          reception of "rogue" or "planted" mail.
          
                        Security - Controlling File Requests
          
          BinkleyTerm offers a method of establishing limitations on file
          requests received from systems that are not session password
          protected, or are not found in the nodelist.  This support is
          optional; if you do not wish to limit file requests in this
          manner, use only the files and configuration file statements
          mentioned in the section "File Requests."
          
          The following table lists these possibilities, the file types (as
          described in the section "File Requests") and the respective
          configuration file statement used:
          
               Prot      ABOUT     'ProtAbout'
                         AVAIL     'ProtAvail'
                         OKFILE    'ProtReqList'
                         Maximum   'ProtReqLim'
          
               Known     ABOUT     'KnownAbout'


               BinkleyTerm Version 2.30 - User's Guide - Page 39

                         AVAIL     'KnownAvail'
                         OKFILE    'KnownReqList'
                         Maximum   'KnownReqLim'
          
               Default   ABOUT     'About'
                         AVAIL     'Avail'
                         OKFILE    'Okfile'
                         Maximum   'MaxReq'
          
          Essentially, the default files and configuration file statements
          described in the section "File Requests" are used for all file
          requests by default unless a higher "Known" or "Prot" statement
          is used. 
          
          Note that all file request controls apply to update requests and
          function requests as well.
          
                         Security - Response File Templates
          
          Refer to the section "Request Response Files" for information on
          their operation and use.
          
          It is possible to designate separate response file templates for
          each of the three security levels.  Generally, you won't want or
          need to do this unless security controls on file requests have
          been implemented.
          
          The security levels and their respective configuration files
          statements for secured response file templates are:
          
               Prot      'ProtReqTpl'
          
               Known     'KnownReqTpl'
          
               Default   'ReqTemplate'
          
          BBS INTERFACE
          
          One of the most common uses of BinkleyTerm is as a mail front-end
          for a bulletin board system, or BBS.  BinkleyTerm offers three
          different methods for passing control to a BBS.  The method you
          use is determined by a configuration file statement (refer to the
          Reference Guide for details).
          
                                      BBS Exit
          
          The 'BBS Exit' option will cause BinkleyTerm to exit to the
          start-up batch file with an errorlevel of the baud rate divided
          by 100 upon receipt of a non-mail call.  For example, a 300 baud
          caller exits to the batch file with an errorlevel of 3, a 2400
          baud caller at errorlevel 24. 
          
          The batch file then detects the errorlevel, and jumps to a
          section of the batch file you designate to start the BBS program


               BinkleyTerm Version 2.30 - User's Guide - Page 40

          with the required information.  The batch file should recycle and
          restart BinkleyTerm once BBS use is terminated.
          
                                      BBS Spawn
          
          The 'BBS Spawn' option causes BinkleyTerm to stay resident when a
          caller accesses the BBS.  BinkleyTerm will execute the following
          command as a child process: 
          
               spawnbbs <baud> <port> <time> <modem_info>
          
          SPAWNBBS.BAT is the name of a batch file you create.  <baud> is
          the baud rate of the connection, <port> is the communications
          port number used for the call, and <time> is the number of
          minutes to the next non-BBS-allowed event (as designated in your
          configuration file event schedules).  <modem_info> is intended
          primarily for RBBS-PC installations where extended modem connect
          information may be desired.  For example, USRobotics HST modems
          might issue the connect message "CONNECT 9600/ARQ" in which case
          the <modem_info> parameter would be "/Arq" indicating a
          "reliable" connection.  Note that in this parameter, only the
          first letter of each "word" will be capitalized (as shown in the
          example).  
          
          The batch file can use the parameters passed to it with standard
          DOS conventions.  %1 designates the first parameter (baud rate in
          this case), %2 the second parameter (port number), and so on. 
          Opus might be started from SPAWNBBS.BAT with this command line: 
          
               opus bbs -b%1 -p%2 -t%3
                
          Refer to the documentation for your particular BBS for the
          command line information that can be passed to the BBS.
          
          The primary disadvantage of the 'BBS Spawn' option is that
          BinkleyTerm stays memory resident while the BBS operates.  This
          could cause memory availability problems on some systems.  Be
          certain to check the memory requirements of your BBS software.
          
          If you choose to use the 'SwapDir' configuration file option, the
          'BBS Spawn' option will be workable.  Using 'SwapDir' causes
          BinkleyTerm to leave only a small kernel of itself in memory when
          performing DOS shells, making available substantially more memory
          than would otherwise be available.  Refer to the Reference Guide
          section "Configuration File" for additional information.
          
                                      BBS Batch
          
          The 'BBS Batch' option uses the best of both of 'BBS Exit' and
          'BBS Spawn.'  
          
          BinkleyTerm still exits to the start-up batch file, but prior to
          exiting, BinkleyTerm physically writes to the disk a batch file
          named BBSBATCH.BAT, which contains a single line.  An example of


               BinkleyTerm Version 2.30 - User's Guide - Page 41

          the contents of this file might be: 
          
               spawnbbs 2400 1 47 /Arq
          
          The information is the baud rate, port number and time in minutes
          to the next non-BBS event.  In this case, there is a 2400 baud
          caller, on COM port 1, with 47 minutes remaining to the next non-
          BBS event, and a modem information string of /Arq.
                   
          After writing this file, BinkleyTerm exits as does the 'BBS Exit'
          option, with an errorlevel of the baud rate of the caller divided
          by 100. 
          
          The start-up batch file should simply start execution of 
          BBSBATCH.BAT by adding the line "bbsbatch" to the file, and
          jumping to the line whenever a human caller is on-line.  In other
          words, regardless of the baud rate of the caller, BBSBATCH.BAT
          should be invoked.
          
          Once invoked, BBSBATCH.BAT will invoke SPAWNBBS.BAT with the 
          necessary parameters that include the baud rate, port number, and
          minute to the next non-BBS event.  SPAWNBBS.BAT would physically
          invoke the BBS with the proper command lines.  When use of the
          BBS is complete, this batch file should re-invoke the BinkleyTerm
          start-up batch file.
          
          Using this 'BBS Batch' method of accessing the BBS, BinkleyTerm
          can still provide all the information of the 'BBS Spawn' method,
          without the necessity of staying resident.  
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          


               BinkleyTerm Version 2.30 - User's Guide - Page 42

                             BBS Batch Method Flowchart
          
          The 'BBS Batch' method of accessing BBS software is confusing to
          many BinkleyTerm users.    
          
          For further clarification, a flowchart of this method is shown
          here: 
          
                              +-----------------------+
                              |     Wait for Call     | <-------------+    
                              +-----------------------+               |
                                          |                           | 
                                          v                           |    
                          No  +-----------------------+               |    
                  Mail <------|     Human Caller?     |               |
                              +-----------------------+               |
                                      Yes |                           |
                                          v                           |
                         300  +-----------------------+  1200         |
                       +------|       Baud Rate       |------+        |
                       |      +-----------------------+      |        |
                       |         2400 |       | 9600         |        |
                       +--------+     |       |     +--------+        |
                                |     |       |     |                 |
                                v     v       v     v                 |
                              +-----------------------+               |
                              |  Invoke BBSBATCH.BAT  |               |
                              +-----------------------+               |
                                          |                           |
                                          v                           |
                              +-----------------------+               |
                              |  Invoke SPAWNBBS.BAT  |               |
                              |     w/ Parameters     |               |
                              +-----------------------+               |
                                          |                           |
                                          v                           |
                              +-----------------------+               |
                              |   Invoke BBS System   |               |
                              |     w/ Parameters     |               |
                              +-----------------------+               |
                                          |                           |
                                          +---------------------------+
          
                                       Banner
          
          When a file named BINKLEY.BAN is present in the directory that
          BinkleyTerm is invoked from, the file will be displayed to
          callers immediately after the BinkleyTerm identification line.
          
          The file is a flat ASCII text file, and may contain extended
          information for the benefit of callers.  
          
          
          


               BinkleyTerm Version 2.30 - User's Guide - Page 43

          EXTERNAL MAIL PROGRAMS
          
          BinkleyTerm can be used with external mail programs, such as
          UUCP.  
          When an 'ExtrnMail' statement is used in the configuration file,
          BinkleyTerm will answer the phone and wait for a YooHoo or TSYNC
          (the start of a mail session) or a string you designate with the
          'ExtrnMail' option.  When the designated string is received from
          the remote system, BinkleyTerm will send the string associated
          with the 'MailNote' configuration file option (if any), then will
          physically write a batch file called MAILBAT.BAT to the disk, and
          exit the start-up batch file with an errorlevel as given with the
          'ExtrnMail' statement, or with errorlevel 99 if none was given. 
          
          MAILBAT.BAT contains a single line:
          
               EXTMAIL <baud> <port> <time> <errorlevel> <modem_info>
          
          Where <baud> is the baud rate of the caller, <port> is the COM
          port number, and <time> is the time in seconds to the next non-
          BBS event, <errorlevel> is the errorlevel number used to exit the
          original batch file, and <modem_info> is extended modem connect
          information.
          
          <errorlevel> will be the same as that given with the 'ExtrnMail'
          statement in the configuration file, or "99" if none was given. 
          
          <modem_info> is intended primarily for RBBS-PC installations
          where extended modem connect information may be desired.  For
          example, USRobotics HST modems might issue the connect message
          "CONNECT 9600/ARQ" in which case the <modem_info> parameter would
          be "/Arq" indicating a "reliable" connection.  Note that in this
          parameter, only the first letter of each "word" will be
          capitalized (as shown in the example).  
          
          Notice the similarity in concept between this and the 'BBS Batch'
          method of invoking a BBS (as described previously).  When
          BinkleyTerm exits with the previously defined errorlevel, your
          batch file must capture the errorlevel and invoke MAILBAT.BAT,
          which will in turn invoke EXTMAIL.BAT with the various command
          line parameters shown above.
          
          EXTMAIL.BAT is then used to invoke the external mail program of
          your choice, taking the needed command line parameters as
          supplied by the batch file, and processing and/or using them as
          needed.  Once the external mail program session has been
          completed, your original start-up batch file for BinkleyTerm
          should be invoked to place BinkleyTerm on-line again.
          
          USER-SELECTED BBS FUNCTIONALITY
          
          An additional use for the external mail functionality described
          in the previous section would be to allow multiple BBS systems to
          reside at the same telephone number, and to give BBS users the


               BinkleyTerm Version 2.30 - User's Guide - Page 44

          ability to select the desired BBS from a menu.  It would be
          possible to run completely separate systems, to run the same
          system with different BBS packages, and so on.  This section will
          give an overview of the procedure.
          
          Basically, 'ExtrnMail' statements in the configuration file are
          used to build the menu options themselves.  If you want to exit
          to the batch file when a user presses 'A' on their terminal, then
          a configuration file entry like this would be needed:
          
               ExtrnMail 130 A
          
          This would cause BinkleyTerm to write MAILBAT.BAT to the disk,
          and exit to the batch file with an errorlevel of 130.  As
          described in the previous section on external mail programs, your
          batch file should invoke MAILBAT.BAT, which in turn invokes
          EXTMAIL.BAT.  EXTMAIL.BAT would be the batch file that acts upon
          the choice, and physically invokes the desired BBS program.
          
          If you want the choices to be case-insensitive, then two
          'ExtrnMail' statements would be needed for each letter, like
          this:
          
               ExtrnMail 130 A
               ExtrnMail 130 a
          
          This would cause BinkleyTerm to use errorlevel 130 when either
          'a' or 'A' is received from the user.
          
          The menu presented to users should be kept in a file called
          BINKLEY.BAN (refer to the "Banner" section for more information). 
          This file might look like this:
          
               Welcome to Multi-System 100.  Please choose the desired BBS:
          
                    A - "Garden Central" Using QuickBBS Software
                    B - "Margarita Bay" Using Opus-CBCS Software
                    C - "Margarita Bay" Using Fido 11w Software
          
               Make your selection by letter...
          
          Such a menu would allow users three options.  Each lettered
          option would require a separate 'ExtrnMail' statement in the
          configuration file; two each if case insensitivity is required.
          
          The string "Make your selection by letter..." is NOT contained in
          BINKLEY.BAN, but rather, is added with a 'Banner' statement in
          the configuration file so that the line is re-displayed each time
          a user makes an incorrect choice (refer to the Reference Guide
          section "Configuration File" for information).
          
          Once the user has made a selection, and MAILBAT.BAT is invoked
          and in turn EXTMAIL.BAT is invoked, then the batch file must
          determine which selection is made and act upon it.


               BinkleyTerm Version 2.30 - User's Guide - Page 45

          
          In EXTMAIL.BAT (where the BBS systems are invoked), the top of
          the batch file should make a determination as to which choice was
          given by the user.  One of the parameters on the command line
          when EXTMAIL.BAT is invoked by MAILBAT.BAT is the errorlevel
          which corresponds to the choice the user gave (as designated by
          an 'ExtrnMail' statement in the configuration file).  
          
          A section of the batch file might look like this:
          
               if %4 == 130 goto bbs1
               if %4 == 140 goto bbs2
               if %4 == 150 goto bbs3
          
          The fourth parameter given on the command line is the errorlevel
          value, and is reference by "%4" as shown.  For example, if the
          errorlevel that corresponds to the choice was 130, then batch
          file execution would jump to the "bbs1" label, and invoke a
          particular BBS program.  
          
          Please note that the default is for a user to press the "escape"
          key to enter the BBS.  One of the BBS systems should be setup as
          the default system as described in the section "BBS Interface." 
          Should a user press "escape," or if the time limit to make a
          response should expire, the default BBS would be invoked.  
          
          Note also that the configuration file parameter 'Timeout' should
          be extended to allow a user more time to read and make a
          selection prior to making a default exit.  A 'Timeout' value of
          30 to 60 seconds is suggested.  
          
          Placing multiple BBS systems on-line at one number takes some
          work and experimentation in order to operate correctly. 
          Hopefully the tips given here will point you in the right
          direction. 
          
          FILE REQUESTS
          
          BinkleyTerm supports the two popular file request methods 
          currently in use in FidoNet; "Bark" requests as designed for and
          used by SEAdog, and "WaZOO" as designed for and used by Opus-
          CBCS.  Either style can be used on an incoming or outgoing basis.
          
          To generate an outgoing file request, use one of the many
          utilities designed for the purpose, such as AMAX, Please, oGet,
          tGet, etc.  Any Opus-compatible file request builder can be used
          with BinkleyTerm.  You may also manually build file requests. 
          They are a single-line flat ASCII text file, and are named in the
          same manner as packets (refer to the section "How BinkleyTerm
          Handles Mail" for information on the naming convention) and have
          a file extension of .REQ.  Outgoing requests NEVER should have a
          drive and path designation; only the file name.  The remote
          system handles the drives and paths.
                   


               BinkleyTerm Version 2.30 - User's Guide - Page 46

          The .REQ file is placed in your outbound holding area. 
          BinkleyTerm will handle .REQ files in the same manner as it does
          Normal packets (unless an 'X' flag is applied to an event), but
          you can also manually poll to send the request immediately. 
          
          Incoming requests are controlled and affected by four files, each
          of which are designated in the configuration file.
          
          The first file, OKFILE, is a machine-read listing of files,
          complete with drive and path, that you will allow to be sent to
          remote systems via file request.  The file is designated with the
          'Okfile' statement in the configuration file.  Wildcards are
          allowed, and nearly always used.  When an incoming request is
          received, the request is checked against the OKFILE to see if you
          permit the file to be sent.  
          
          The OKFILE also allows you to implement "magic filenames" which
          are words used to represent a file.  If someone requests
          "BINKLEY" from you, for example, you could set-up your OKFILE in
          such a way as to send BEXE_150.ARC in return.  This frees the
          person making the request from having to know the exact filename
          of the file he wants.  This is generally used by systems which
          are software distribution points, hubs, and so on.
          
          Password protection may also be implemented with the OKFILE,
          making a password required in order to receive a particular file
          or group of files.
          
          A sample OKFILE:
          
               b:\aprog.ARC
               c:\file\stuff\*.*
               c:\file\programs\wlc*.txt
               c:\file\private\*.* !mypass
               @BINKLEY c:\file\dist\bexe_150.arc 
               @MYEDIT !outpass c:\file\private\editmax.arc
          
          The first line gives an exact filename.  The second and third    
          lines show the use of wildcards.  The fourth line shows password
          protection, with an exclamation point (!) followed by the
          password.  The fifth line shows a magic filename, an 'at' symbol
          (@) followed by the magic filename, followed by an exact drive,
          path and filename designation.  The sixth line shows a magic
          filename with password protection.
          
          Note that in all cases, a password (if any) is always the second
          argument in an OKFILE entry.
          
          The next special file is the AVAIL file, and is designated by the
          'Avail' statement in the configuration file.  When someone
          requests the magic filename "FILES" BinkleyTerm will send this
          file.  It is a list of the files you have available for request,
          in human readable form.  This is a flat ASCII text file, and
          should feature the name of the file, and usually its size in


               BinkleyTerm Version 2.30 - User's Guide - Page 47

          bytes and a short description of the file.  There are utilities
          available that can construct this file automatically based on
          your BBS system's internal listings.  Of course, it could also be
          manually created.
          
          The next special file is called the ABOUT file, and is designated
          by the 'About' statement in the configuration file.  When someone
          makes a request for the magic filename "ABOUT" or when someone
          makes an invalid WaZOO file request, this file is sent by
          BinkleyTerm.  It normally contains a short advertisement about
          your system, as well as a notification that the calling system
          could possibly have made an invalid request.  Again, this is a
          flat ASCII text file in human-readable form. 
          
          The ABOUT file is sent only on failed WaZOO requests.  The file
          is NOT sent on failed Bark requests. 
          
          Finally, the last item that applies to file requests is the
          'MaxReq' statement contained in the configuration file.  A
          quantity is given with the statement which allows you to
          designate the maximum number of files that will be sent during
          one file request session.  Refer to the Reference Guide section
          "Configuration File" for more information.
          
          It is possible to limit incoming file requests based on some
          basic criteria.  For information, refer to the section "Security
          - Controlling File Requests."
          
          UPDATE REQUESTS
          
          Update requests are a method of obtaining an "update" of a file
          you already have, from another system you believe to have a newer
          copy.  They differ from file requests in that when you construct
          an update request, you include a drive/path/file specification
          that points to an existing file on your system.  Generally, DOS
          wildcards are acceptable.  When BinkleyTerm connects with the
          desired remote, it will compare the date and time stamp on your
          copy of the file(s) to the date and time stamp of the same-named
          file(s) on the remote system.  If the remote system has a newer
          copy of a given file, it will be sent.  If it does not, no file
          will be sent.  Note that the drive and path specification DO NOT
          need to be the same on the remote system; the drive and path you
          give refer only to YOUR copy of the file.  The remote may have
          any file structure he or she desires.
          
          Update requests were originally implemented in SEAdog, a mailer
          from System Enhancement Associates, Inc.  In addition to
          supporting update requests with SEAdog systems, BinkleyTerm
          implements a newly defined WaZOO update request for use other
          BinkleyTerm systems, or other mailers that support WaZOO update
          requests.
          
          Update requests are most commonly used now to handle GroupMail, a
          new method of sharing message areas developed by System


               BinkleyTerm Version 2.30 - User's Guide - Page 48

          Enhancement Associates, Inc.  GroupMail generally requires update
          request capability on both ends of the connection.  
          
          Like file requests, update requests are kept in .REQ files in
          your outbound area.  In fact, a combination of update and file
          requests can be contained in the same physical .REQ file.  An
          update request entry contains a filename, as well as a date and
          time code that corresponds to the date and time stamp of the file
          on your system.  Because the date and time code is in a special
          format, it is not recommended that you attempt to create an
          update request entry yourself.
          
          At this writing, the oMMM mail packer (version 1.30 or higher)
          and the AMAX outbound utility (version 2.10 or higher) both
          support the creation of update requests in the manner that
          BinkleyTerm requires.  Refer to the documentation for those
          programs for additional information on creating update requests. 
          Certainly other utilities will eventually have this ability as
          well.
          
          Please note that in order for update requests to work, the remote
          system must have the file you want updated available for regular
          file request.  You cannot update a file that would not otherwise
          be available for file request from the remote system.
          
          REQUEST RESPONSE FILES
          
          Incoming file and update requests are not always successful. 
          BinkleyTerm supports the ability to dynamically generate a
          "response file."  This file is a plain text file, built "on-the-
          fly" during a session, and sent in response to a failed (or
          optionally, a successful) file or update request.  If you choose
          to implement request response files, the "about" file designated
          in your configuration file will no longer be sent.  See "File
          Requests" for more information.
          
          Note that when a response file is sent, it is counted against the
          maximum number of file sent in response to a request, as
          designated by the 'MaxReq' statement in the configuration file. 
          See "File Requests" or the Reference Guide section "Configuration
          File" for more information.
          
          The content of the response file is configured by you with a
          template file.  The template file name is designated by the
          'ReqTemplate' configuration file statement.  As with file
          requests, you can also implement security controls with the
          request templates.  See "Security - Response File Templates" for
          more details.
          
          Normally, the response file contains information such as the date
          and time the request was made, what file was requested, and why
          the request failed.  You may wish to include information such as
          the times your system accepts requests, what magic filenames you
          support, and so on.


               BinkleyTerm Version 2.30 - User's Guide - Page 49

          
          Response files are named similar to outbound packets or request
          files.  They are <net><node>.RSP, where <net> is a net number,
          and <node> is a node number.  Both <net> and <node> are four-
          digit hexadecimal number with leading zeroes.
          
          A sample response file template, SAMPLE.TPL, is included with the
          BinkleyTerm distribution package.  Use this sample as a starting
          point for your own response file template.
          
          The complete list of possible verbs for use in the response file
          can be found in the section "Response File Template" in the
          Reference Guide. 
          
          FUNCTION REQUESTS
          
          Two additional special entries may be included in the OKFILE that
          operate similar to magic filenames.  Called "magic" function
          requests, they allow an incoming request to trigger the operation
          of a program.
          
                                 $ Function Requests
          
          The first style uses a dollar sign ($) in the first column of an
          OKFILE entry, followed by a function request name.  If the name
          is matched, then the command after the password (if any) is
          executed.  In addition, two arguments which correspond to the net
          and node number of the calling system can be sent if desired by
          adding "%d %d" to the end of the OKFILE entry.  For example:
          
               $INFO INFO.BAT %d %d
          
          If an incoming file request is for "INFO" then the program
          INFO.BAT would be executed, and it would receive two command line
          arguments that correspond to the net and node number
          respectively.  For instance, if 141/491 requested "INFO" then the
          following would be issued to DOS for execution:
          
               INFO.BAT 141 491
          
          Another example of such an OKFILE entry would be:
          
               $CLEANUP !mypass CLEANUP.BAT %x %x
          
          In this case, a password is included as the second argument of
          the line, and must be matched by the incoming request in order
          for the program to be executed.  Note also that in this example,
          "%x %x" was used, and would cause a hexadecimal representation of
          the net and node number to be sent as command line arguments to
          the program being executed.  In our example, if 104/36 requests
          "CLEANUP" with a password of "mypass" then the following would be
          sent to DOS for execution:
          
               CLEANUP.BAT 68 24


               BinkleyTerm Version 2.30 - User's Guide - Page 50

          
          See "Function Request Notes" below for additional function
          request information.
          
                                 + Function Requests
          
          A second type of function request is also supported, and is
          designated by a plus sign (+) in the first column of an OKFILE
          entry.  In this case, if the filename and optional password are
          matched, then the entire line from the incoming .REQ file is
          passed to DOS for processing, with the <zone>:<net>/<node>
          address appended as individual arguments to the command line.  An
          example of an OKFILE entry might be:
          
               +GETREV !mypass
          
          If an incoming .REQ file from 141/491 contained the line:
          
               GETREV !mypass BT 1.50
          
          Then the following would be passed to DOS for execution:
          
               GETREV !mypass BT 1.50 1 141 491
          
          A program called GETREV would be executed, and would need to
          process or filter the command line as needed.  
          
          Function requests are convenient for allowing a remote system to
          have a batch file or utility of some kind (not included) place a
          particular file on hold for a node for later pickup, to cause the
          system to send a particular file, to trigger some other sort of
          function or activity remotely, etc., etc.
          
          If a program called as part of a function request creates a file
          in the appropriate outbound area called <net><node>.QLO (where
          <net> and <node> are 4-digit hexadecimal numbers with leading
          zeroes), BinkleyTerm will treat this file as a legitimate "flow"
          (file attach) file and send the file(s) listed in it back to the
          caller as part of the request logic.
          
                               Function Request Notes
          
          If a function request triggers a program or batch file to build a
          file attach (flow) file, then BinkleyTerm will process the file
          attach during the current session.  In other words, if a file
          attach is generated during a function request, then the file(s)
          shown in the file attach will be sent during the current session. 
          
          Note that the normal logic for the handling of .HLO (Hold file
          attaches) still applies; i.e., file(s) designated within a .HLO
          file will be sent only when the destination node polls for pick-
          up.
          
          


               BinkleyTerm Version 2.30 - User's Guide - Page 51

          A WORD ABOUT POINT NETWORKS
          
          BinkleyTerm is well suited to the task of being a "boss" (or host
          system) of a point network.  Points are essentially a "system
          under a system" and allow the point operator to have limited
          access to the network without the normal requirements of keeping
          a system on-line at certain hours.
          
          Since point addressing is not part of the FidoNet standard at
          this time, certain "kludges" must be used in order to handle a
          point network.  
          
          Essentially, the process involves using a private network
          address, and assigning node numbers to the points under the boss. 
          For example, 1:104/36.17 (point #17 off of node 104/36) might
          actually be assigned 1052/17 for the purpose of transacting mail
          with the boss.  For reference purposes the point is 1:104/36.17,
          but mail is actually held for 1052/17 to pick-up, and the point
          must call as 1052/17.
          
          Often times, private point addresses will make their way into
          EchoMail "SEEN-BY" lines.  This could cause problems down the
          line if another system uses the same private address.  For this
          reason, IT IS RECOMMENDED THAT YOUR PRIVATE NETWORK ADDRESS BE
          ASSIGNED BY THE INTERNATIONAL COORDINATOR.  The International
          Coordinator requests that you adhere to this recommendation, and
          contact him directly for a private network number assignment.  As
          a boss node, you may then use the network address to assign your
          points their own node address in the private net for the purpose
          of transacting mail.
          
          The International Coordinator can be reached at 1:1/0.
          
          To receive a private net number, the information that follows is
          needed.  All information will be held in confidence, but is
          needed in case the International Coordinator needs to get a hold
          of the private net administrator.  As soon as this information is
          received, the International Coordinator will issue a private net
          number:
          
               - Name of the Private Network Administrator
               - Name of the Private Network (if any)
               - Mailing Address
               - Voice Phone
               - Data Phone
               - FidoNet Node (if any)
               - Alternate E-Mail Addresses (i.e., Usenet, Bitnet, MCI
               Mail, Telex, etc., if any)
          
          Your cooperation in obtaining an assigned private network number
          for use on point networks will help ensure network integrity.
          
          
          


               BinkleyTerm Version 2.30 - User's Guide - Page 52

          +-------------+
          | +---------+ |
          | | Section | |   BinkleyTerm User's Guide
          | |    4    | |   PROBLEM SOLVING
          | +---------+ |
          +-------------+
          
          BINKLEYTERM SUPPORT
          
          Since BinkleyTerm is a product which is "free for the asking" you
          cannot expect a toll-free software support line (as much as we
          may want to provide you with one).  
          
          The primary means of support is the BINKLEY EchoMail Conference. 
          This conference is carried worldwide via FidoNet.  Contact your
          EchoMail Coordinator or Hub for information on hooking into the
          conference, or finding a system that you can use to participate
          in the conference.  The conference is monitored and read by the
          BinkleyTerm authors and beta testers.
          
          A secondary source of support is provided by BinkleyTerm HELP,
          Shawn Stoddard, at FidoNet 1:1/102.0.  If you have an urgent
          question, or are unable to hook into the BINKLEY EchoMail
          Conference, send a NetMail message to BinkleyTerm HELP.  Replies
          are issued as time and resources allow, so please be patient.
          
          TROUBLESHOOTING
          
          3,000 pages of documentation would not entirely eliminate the
          potential for problems with the installation and operation of
          BinkleyTerm.  Due to the wide variety of hardware and software
          configurations that BinkleyTerm may be used with, as well as the
          varying levels of experience of the BinkleyTerm user, problems
          will sometimes occur.  This section attempts to present common
          problems and possible solutions.
          
          If there is not a solution to your problem presented here, please
          read over the appropriate sections of the manual again.  If you
          still are having difficulty, place a message in the BINKLEY
          EchoMail conference, or contact BinkleyTerm HELP at 1:1/102.
          
                              Baud Rate Locking Trouble
          
          Do not use BinkleyTerm's 'LockBaud' configuration file statement. 
          Lock the baud rate of your FOSSIL instead.  
          
                                Outward Dial Aborting
          
          Many people installing BinkleyTerm mistakenly use the 'Suffix'
          option in their configuration file.  Unlike most communications
          programs, BinkleyTerm by default adds a carriage return to the
          end of the dial string.  'Suffix' is used to add instructions to
          the end of the phone number, but BEFORE the carriage return.  By
          adding a carriage return code (pipe symbol, |) with the 'Suffix'


               BinkleyTerm Version 2.30 - User's Guide - Page 53

          statement, you are essentially telling BinkleyTerm to send TWO
          carriage returns, yours, plus the default.  With most modems,
          this will immediately abort the dialing process before it even
          gets started.  
          
          In nearly all installations, the 'Suffix' statement WILL BE
          COMMENTED OUT.  If deleting the 'Suffix' statement does not fix
          the problem, you may also try adding the 'NoCollide' and/or
          'SlowModem' statements to the configuration file.  Refer to the
          Reference Guide section "Configuration File" for more details.
          
                            False Call Collision Reports
          
          In some installations, BinkleyTerm may abort the dialing process
          due to an incoming call, even when there is no incoming call. 
          This is probably due to the modem reporting "RING" on both
          incoming and outgoing calls.  Use the 'SameRing' configuration
          file option to partially disable the call collision feature; use
          the 'NoCollide' option to totally disable the feature.
          
                        FOSSIL Driver Compatibility Problems
          
          The two most popular FOSSIL drivers in use with BinkleyTerm are
          Ray Gwinn's X00 and Bob Hartman's OpusComm, both of which are for
          the IBM PC and close compatibles.  If one of the drivers fails to
          work correctly in your installation, please try the other.  
          
                    BinkleyTerm Will Not Recognize Node Addresses
          
          You have not compiled the nodelist correctly.  Use ParseLst to
          compile a fully-zoned Version 6 nodelist for your system.  To do
          this, make sure the following statements exist within your
          ParseLst configuration file:  UseZone, Complete (or Gated), and
          Version6.
          
                    TBBS Difficulty - BinkleyTerm Runtime Errors
          
          When used with TBBS, BinkleyTerm must be renamed MAILER.EXE. 
          Since BT.EXE uses overlays to provide more efficient memory
          usage, it CANNOT be renamed.  TBBS users should be certain to use
          BTBIG.EXE, the non-overlay version, on their systems, renaming it
          to MAILER.EXE before use.  
          
          Some TBBS Sysops have patched TBBS.EXE to invoke BT.EXE, which
          allows them to use the overlaid version.  While if this is done
          correctly it will probably cause no problems, we cannot recommend
          this course of action.
          
                           DOS Shell Not Working Correctly
          
          BinkleyTerm is developed under Microsoft C.  The MSC routines do
          not use COMSPEC to find COMMAND.COM, which is needed to perform a
          DOS shell or child process.  COMMAND.COM must be found on the DOS
          path.  Refer to your DOS documentation for information and


               BinkleyTerm Version 2.30 - User's Guide - Page 54

          instructions regarding COMSPEC, and the SET PATH command.
          
                       Zone Support Does Not Operate Correctly
          
          Chances are excellent that you have not compiled the nodelist
          correctly.  Although the actual entries for nodes in other zones
          do not need to be included in the compiled nodelist files, what
          are called "zone identifiers" DO need to be included in order for
          zone support to work.  See the section "Nodelist" for more
          information on correct compilation of a nodelist.  Another item
          to check is that outbound areas are created for the other zones
          to which you want to send mail.  See "Zone Support" for
          information on how outbound areas for other zones are
          constructed.
          
                                Date Rollover Problem
          
          BinkleyTerm keeps schedule information in binary form in a file
          named BINKLEY.SCD.  If for some reason the file is newer than the
          current date and time, BinkleyTerm will report "Date Rollover
          Problem?" as this condition is usually indicative of a problem
          with DOS rolling the date over at midnight properly.  If there
          appears to be no difficulty with date rollover, delete the
          BINKLEY.SCD file, and allow BinkleyTerm to contruct a new one the
          next time it is invoked.  A date rollover problem sometimes does
          exist with certain versions of DOS.  If the problem persists, a
          DOS upgrade may be indicated.
          
          GLOSSARY
          
          AMAX
          
               The name of a BinkleyTerm utility by Alan Applegate that
               handles various outbound mail manipulation functions.
          
          ARCmail
          
               Simply archived mail packets, processed with an ARC-
               compatible utility.  Typically used to forward EchoMail
               messages due to the file compression inherent in the
               archiving process.  Naming conventions correspond to a
               generally accepted method.  See 'Mail Packet.'
          
          BBS
          
               An electronic bulletin board system.  A method of
               communicating and sharing files with others by computer. 
               Typically operated by hobbyists, free-of-charge.  
          
          Carrier Detect
          
               A serial port line that is brought "high" (raised, given a
               "true" logical value) when carrier is present on the line,
               e.g., when the modem is connected to another modem.  


               BinkleyTerm Version 2.30 - User's Guide - Page 55

          
               The modem raises and lowers this line.
          
          CD
          
               See "Carrier Detect."
          
          Compressed Mail
          
               Mail that has been compressed or "archived" with any one of
               several archiving utilities.  Such mail is also known as
               ARCmail, ZOOmail, PAKmail, etc., depending on which
               archiving utility was used to compress the mail.
          
          ConfMail
          
               The name of a mail processing program by Bob Hartman for use
               in the Opus or Fido environments, or any other environment
               that uses a compatible message base.
          
          Continuous Mail
          
               A capability of a particular system to accept mail at any
               time of day, as opposed to being required to accept it only
               during certain pre-scheduled times.
          
          D'Bridge
          
               A commercial FidoNet mailer written by Chris Irwin.
          
          Data Terminal Ready
          
               A serial port line that is brought "high" (raised, given a
               "true" logical value) when the local terminal is ready for
               communications.  A serial device (in our case a modem)
               connected to the serial port uses this line to detect
               whether the terminal (your PC and BinkleyTerm) are ready for
               communications activities.  Normally, bringing the line
               "low" (lowering, giving a "false" logical value) causes a
               modem to disconnect from the telephone line.  
          
               BinkleyTerm raises and lowers this line.
               
          DTR
          
               See "Data Terminal Ready."
          
          Dutchie
          
               A FidoNet mailer written by Henk Wevers.
          
          Dynamic Event
          
               A system event (see "Event") that stops when particular


               BinkleyTerm Version 2.30 - User's Guide - Page 56

               conditions (lack of mail of a certain type to be sent) are
               met.
          
          EchoMail
          
               A system devised by Jeff Rush for the automated sharing of
               message areas between systems, whereby messages are "echoed"
               from one system to another.  Also known as conferences or
               EchoMail conferences.  
          
          Errorlevel
          
               The name of a DOS environment variable; contains a value
               returned by a program on exit that indicates a certain pre-
               defined condition.
          
          Event
          
               A system occurrence at a pre-configured time, day-of-the-
               week, and/or date.  Normally system limitations such as when
               to dial long distance are dependent on system events.
          
          Fido
          
               The original implementation of FidoNet and FidoNet protocol;
               a BBS software package.
          
          FidoNet
          
               The name of the original network that used FidoNet protocol,
               as designed by Tom Jennings.
          
          FidoNet Protocol
          
               A method of electronic mail transfer designed by Tom
               Jennings, as documented in the Fido Technical Standards
               Committee document FSC-0001.
          
          File Request
          
               The ability and associated methods of using extended FidoNet
               protocol to obtain a particular file automatically from one
               FidoNet system to another.
          
          FOSSIL Driver
          
               FOSSIL is an acronym for Fido/Opus/SEAdog Standard Interface
               Layer.  Since not all computers capable of running MS-DOS
               are hardware compatible with the IBM PC, communications
               software typically written for the IBM PC may not operate on
               machines such as the DEC Rainbow, Sanyo 555 or Heath/Zenith
               100. 
          
               The FOSSIL provides a consistent manner for a communications


               BinkleyTerm Version 2.30 - User's Guide - Page 57

               program to access the communications ports, keyboard and
               screen.  The FOSSIL is typically installed at boot-time,
               either as a device driver or as a program.  The driver MUST
               be installed prior to running any FOSSIL compatible
               software, BinkleyTerm included, or an error message will be
               generated, and the program will abort.
          
               FOSSIL drivers are normally available from systems that
               distribute Opus-CBCS and/or BinkleyTerm software.  Examples
               of FOSSIL drivers are:  OpusComm by Bob Hartman for the IBM
               PC and close compatibles, X00 by Ray Gwinn for the IBM PC
               and compatibles, and DECCOMM by Vince Perriello for the DEC
               Rainbow. 
          
          FrontDoor
          
               A FidoNet mailer written by Joaquim Homrighausen.
          
          FSC001
          
               In BinkleyTerm, an abbreviation that indicates that a mail
               session corresponding to the FSC-0001 standard is in use. 
               FSC-0001 is a standards document written by the FidoNet
               Technical Standards Committee. 
          
          GroupMail
          
               A method of sharing message areas devised by System
               Enhancement Associates, Inc., similar to EchoMail, except
               that responsibility for obtaining mail is placed on the
               receiving system, not the sending system as with EchoMail. 
               Based on usage of update requests.
          
          Hold Area
          
               See "Outbound Area."
          
          Inbound Area
          
               Also known as the "NetFiles" area, this is a special sub-
               directory set aside for the acceptance of incoming mail or
               files from other network systems.
          
          Mail Packet
          
               A unit of mail as defined in the FidoNet Technical Standards
               Committee document FSC-0001. 
          
          Mailer
          
               A program that acts as a FidoNet-compatible mail handler,
               using FidoNet protocol.  Normally, a mailer answers the
               phone, accepts and/or sends mail, and possibly passes human
               callers on to a BBS.


               BinkleyTerm Version 2.30 - User's Guide - Page 58

          
          msged
          
               An Opus/Fido compatible message reader/editor by Jim Nutt.
          
          Net
          
               A subset of a FidoNet compatible network, usually a
               collection of nodes within a metropolitan area.
          
          NetFiles
          
               Files received from other systems in the network; also a
               special sub-directory set aside for the reception of such
               files.
          
          NetMail
          
               Person-to-person mail sent through the network.
          
          Network
          
               As it applies to BinkleyTerm, a collection of nodes that are
               FidoNet compatible, such as the FidoNet network itself, or
               others such as EggNet, AlterNet, RBBS-Net, etc.
          
               Also, a division of a full network.  See "Net" above.
          
          Node
          
               A FidoNet compatible system, represented by a node address,
               and listed in a nodelist.
          
          Nodelist
          
               A listing of FidoNet nodes.
          
          oMMM
               
               A packing program (packer) originally designed for Opus-
               CBCS, but now widely used with BinkleyTerm.
          
          Opus-CBCS
          
               "The Opus Computer Based Conversation System," a BBS
               designed by Wynn Wagner III.  Uses ".MSG" message base
               (compatible with Fido BBS program).  Contains built-in
               FidoNet compatible mailer.
          
          Outbound Area
          
               Also known as the "Hold Area," this is a special sub-
               directory set aside specifically for holding mail waiting to
               be sent to or picked-up by its destination.


               BinkleyTerm Version 2.30 - User's Guide - Page 59

          
          Packer
          
               A program that processes mail entered on a system, and
               prepares it for sending by the mailer.
          
          Packet
          
               Within FidoNet, a message unit conforming to FSC-0001
               specifications.
          
               With file transfer protocols, a block, or "piece" of the
               file transfer.  Normally a pre-determined size in bytes.
          
          Point
          
               A point is an extension of a regular, fully qualified
               FidoNet node.  The term is derived from the node address
               format, 1:104/36.2 for example, where 1 is a zone, 104 a
               net, 36 a node, and 2 is the point.  
          
               Primarily, Points are intended to provide an method of
               participating in EchoMail conferences in an off-line state. 
               The conferences are packed and held for the Point system by
               the Boss, a system which carries the desired conference(s)
               and is willing to route them to the Point.  The Point system
               'polls' the Boss for the conferences, which are unpacked and
               read off-line on the Point system.  Responses are packed and
               sent to Boss in much the same manner as is done by regular
               FidoNet nodes. 
          
               Generally, Points never interact with regular nodes, only
               with their Boss, since Point systems are not listed in the
               FidoNet nodelist. 
          
          QuickBBS
          
               A BBS program designed by Adam Hudson, which uses
               configurable menuing and a database-style message base. 
               Requires mail processing software designed specifically for
               its message format.
          
          Region
          
               A subset of a FidoNet compatible network, a collection of
               nodes within a broad geographical area.  With regard to
               FidoNet addressing, a region is handled the same way as a
               network.  With regard to operational infrastructure, this is
               a higher level than a net.
          
          Scan
          
               Usually associated with EchoMail processing, "scanning" is
               the process of taking new messages from a form usable by a


               BinkleyTerm Version 2.30 - User's Guide - Page 60

               BBS program or message editor and preparing them for sending
               via the network by placing them in standard packet and/or
               compressed mail format.
          
          SEAdog
          
               A commercial FidoNet mailer by System Enhancement
               Associates, Inc.
          
          SEAlink
          
               A variant of Xmodem, a robust file transfer protocol
               featuring sliding windows, good error trapping and extended
               file information.  Superior to Xmodem for use on difficult
               or satellite connected links.
          
          Sirius
          
               An Opus/Fido compatible message reader/editor by Bob Klahn.
          
          Sysop
          
               System operator; the person who operates a BBS, and/or the
               operator of a FidoNet node.
          
          TBBS
          
               A commercial BBS software package by eSoft, Inc.
          
          Telink
          
               An Xmodem variant, a file transfer protocol that is
               essentially Xmodem with a file information packet.
          
          Terminal Mode
          
               A BinkleyTerm mode within which the software may be used for
               manual, direct connections with remote modem-equipped
               computers.
          
          Toss
          
               Usually associated with EchoMail processing, "tossing" is
               the process of unpacking compressed mail into a form usable
               by a particular BBS program or message editor.
          
          TSYNC
          
               A signal sent to a FidoNet system from another FidoNet
               system attempting to pass mail traffic.  TSYNC is
               essentially a "handshake" between the sending and receiving
               systems to synchronize the mail session.
          
          


               BinkleyTerm Version 2.30 - User's Guide - Page 61

          Unattended Mode
          
               A BinkleyTerm mode within which FidoNet electronic mail may
               be sent or received.
          
          Undialable
          
               A term for nodes which will no longer be called
               automatically by the system until manually reset.  The
               result of excessive unsuccessful connections with the remote
               system in an attempt to send mail.
          
          Unpacker
          
               A mail processing program that takes mail as received
               (compressed mail and/or packets) and places it into a form
               usable by a given type of BBS program or message editor.
          
          Update Request
          
               The ability and associated methods of requesting only a
               newer copy of a file located on one FidoNet system, if a
               newer copy exists, from another FidoNet system, using
               extended FidoNet protocol.
          
          VFOSSIL (Video FOSSIL Driver)
          
               A standard resident driver that allows a software program to
               access display hardware in a consistent manner regardless of
               hardware compatibility.  This is an extension of the FOSSIL
               driver, and may not be supported by all FOSSIL drivers at
               this time.  A VFOSSIL allows much faster access to the video
               display hardware than a FOSSIL driver alone would support.
          
          WaZOO
          
               An open architecture method of electronic mail transfer
               designed by Wynn Wagner, and originally used with Opus-CBCS. 
               Various protocols can be used under WaZOO, including ZedZap,
               a slightly modified Zmodem, and DietIFNA, a SEAlink method. 
               See 'YooHoo.'
          
          Xmodem
          
               One of the first of its type, a file transfer protocol
               designed by Ward Christensen.  Although technologically
               behind other newer, more robust protocols, Xmodem is the
               most widely supported and implemented file transfer protocol
               in dial-up use.
          
          YooHoo
          
               A method of mail transfer session negotiation which 
               determines if the remote system is capable of handling


               BinkleyTerm Version 2.30 - User's Guide - Page 62

               WaZOO.  FidoNet systems that do not support WaZOO will
               simply disregard the YooHoo; systems capable of supporting
               it will answer affirmatively, and a WaZOO session will be
               initiated.  See 'WaZOO.'  YooHoo is defined in the Fido
               Technical Standards Committee document FSC-0005.
          
          Zmodem
          
               A robust streaming file transfer protocol featuring advanced
               error recovery techniques, variable packet sizing, good
               error detection and extended file information.  Extremely
               efficient, yet complex.  Highly effective with difficult
               connections.
          
          Zone
          
               A large geographical sub-division in the network, the
               highest level of the accepted FidoNet addressing scheme. 
               Broad areas such as continents are given zone designations. 
               Also used to specify a particular alternate network.
          
          ZOOmail
          
               Simply archived mail packets, processed with the ZOO
               utility.  Typically used to forward EchoMail messages due to
               the file compression inherent in the archiving process. 
               Naming conventions correspond to a generally accepted
               method.  See 'Mail Packet.'
          
          


Comments

Popular posts from this blog

BOTTOM LIVE script

Evidence supporting quantum information processing in animals

ARMIES OF CHAOS