BinkleyTerm User's Guide
**** * * * ******* TM * * * * * * * * * ** * * * *** * * * *** * ** *** ** **** * ** * * * * * * * * * * * ** * * * * * * * * *** * **** * * * **** * * * * * * * * * * * * * * * * * * * * * **** * * * * * * **** **** * **** * * * * * Version 2.30 - User's Guide * September 4, 1989 *** A Freely Available FidoNet Compatible Electronic Mail Interface and Dumb Terminal Package Software Written by Vince Perriello and Bob Hartman Documentation Written by Alan D. Applegate Copyright (C) 1988, 1989 Bit Bucket Software, Co. A Delaware Corporation All Rights Reserved Terms and Conditions Contained Separately Bit Bucket Software, Co. 427-3 Amherst St., Suite 232 Nashua, NH 03063 "BinkleyTerm" and "Freely Available" are trademarks of Bit Bucket Software, Co. BinkleyTerm Version 2.30 - User's Guide - Page 2 TABLE OF CONTENTS Section 1 - General Information 4 How to Use This Manual 4 Acknowledgements 5 Kudos 6 Forward 7 Introduction 8 General Requirements 9 Memory Requirements 9 Modem Requirements 10 Section 2 - Operation as a Terminal Communications Program 11 Terminal Mode Overview 11 VT-100 Emulation 12 External Protocols 12 Section 3 - Operation as a Automated Electronic Mailer 13 Unattended Mode Overview 13 The BinkleyTerm Concept 14 How BinkleyTerm Handles Mail 14 Idea #1 14 Idea #2 15 Idea #3 15 Idea #4 15 A Sample Message, Start to Finish 17 The Concept of Cost 18 Alternative Method 18 Windowed Interface 19 Current Settings 19 Today at a Glance 19 Pending Outbound Mail 20 Recent Activity 21 Transfer Status 21 Control 21 Errorlevels and Batch Files 22 What is an Errorlevel? 23 What Errorlevels BinkleyTerm Produces 24 Making Errorlevels Work for You 26 Errorlevels, Batch Files and ExtrnMail 26 Errorlevels, Batch Files and Housekeeping 26 DOS Shell Keys 26 Using Errorlevels 27 What Now? 27 Errorlevel and Batch File Hints and Kinks 28 Environment Variable 30 Configuration File 30 BTCTL 30 Nodelist 31 FIDOUSER.LST 31 Version 5 Nodelist 32 Version 6 Nodelist 32 BinkleyTerm Version 2.30 - User's Guide - Page 3 QuickBBS Nodelist 32 TBBS Nodelist 33 Nodelist Support Information 33 Zone Support 34 Multiple Network Operation 35 Security 35 Prot 36 Known 36 Default 36 Security - Session Passwording 36 Security - Secured Inbound File Areas 37 Security - Controlling File Requests 38 Security - Response File Templates 39 BBS Interface 39 BBS Exit 39 BBS Spawn 40 BBS Batch 40 BBS Batch Method Flowchart 42 Banner 42 External Mail Programs 43 User-Selected BBS Functionality 43 File Requests 45 Update Requests 47 Request Response Files 48 Function Requests 49 $ Function Requests 49 + Function Requests 50 Function Request Notes 50 A Word About Point Networks 51 Section 4 - Problem Solving 52 BinkleyTerm Support 52 Troubleshooting 52 Baud Rate Locking Trouble 52 Outward Dial Aborting 52 False Call Collision Reports 53 FOSSIL Driver Compatibility Problems 53 BinkleyTerm Will Not Recognize Node Address 53 TBBS Difficulty - BinkleyTerm Runtime Errors 53 DOS Shells Not Working Correctly 53 Zone Support Does Not Operate Correctly 54 Date Rollover Problem 54 Glossary 54 BinkleyTerm Version 2.30 - User's Guide - Page 4 +-------------+ | +---------+ | | | Section | | BinkleyTerm User's Guide | | 1 | | GENERAL INFORMATION | +---------+ | +-------------+ HOW TO USE THIS MANUAL The documentation for BinkleyTerm is supplied in two parts. The User's Guide (named BT_USER.DOC) explains how to install BinkleyTerm. It also describes basic operational procedures. New users may find some concepts or terminology unfamiliar; a glossary is provided toward the end of the User's Guide. Concepts and terminology that may be of interest to experienced users and new users alike are covered in the Reference Guide (named BT_REF.DOC) an alphabetically arranged manual separate from the User's Guide. For inquiries, questions or comments regarding BinkleyTerm, please refer to the User's Guide section "BinkleyTerm Support." Some material in the section "How BinkleyTerm Handles Mail" is excerpted from MATRIX.DOC, and is Copyright (C) 1987 Wynn Wagner III, All Rights Reserved. Used by permission. Some material in the section "Control" was written by Ron McKenzie, and is Copyright (C) 1989 Ron McKenzie, All Rights Reserved. Used by permission. BinkleyTerm Version 2.30 - User's Guide - Page 5 ACKNOWLEDGEMENTS The following names are either trademarks, registered trademarks, and/or the efforts of the person and/or company named: Fido, FidoNet - Tom Jennings, Fido Software MS-DOS, Microsoft C - Microsoft Corporation IBM, PC-DOS - International Business Machines Corporation Opus-CBCS, ZedZap, YooHoo, WaZOO, OpusNode - Wynn Wagner III ARC, SEAdog, SEAlink, XlatList, ARCmail, GroupMail - Thom Henderson, System Enhancement Associates, Inc. VT-100, DEC, DEC Rainbow, VAX, VMS - Digital Equipment Corporation FANSI-CONSOLE - Hersey Micro Consulting Hayes - Hayes Microcomputer Products Corporation Zmodem - Chuck Forsberg, Omen Technologies, Inc. ConfMail, ParseLst, oMMM, Opus!Comm - Bob Hartman, Spark Software, Inc. oMMM - BS Software, Marshall Presnell, Jim Nutt msged - Jim Nutt XlaxNode - Scott Samet Heath/Zenith - Heath/Zenith Electronics, Inc. Sanyo - Sanyo Electric Co. (Japan) Ltd. DoubleDOS - SoftLogic Solutions, Inc. DESQview - Quarterdeck Office Systems, Inc. Telix - Colin Sampaleanu, Exis Inc. Sirius - Bob Klahn, Micro Solutions OOPS - Tom Kashuba AMAX - Alan Applegate Dutchie - Henk Wevers PC Pursuit - GTE/Telenet EchoMail - Jeff Rush ProComm - Datastorm Technologies, Inc. Qmodem - The Forbin Project TBBS - Phil Becker, eSoft, Inc. QuickBBS - Adam Hudson X00 - Ray Gwinn, RENEX Corporation DECCOMM - Vince Perriello, VEP Software Atari, ST - Atari, Inc. Commodore, Amiga - Commodore International USRobotics, HST - USRobotics, Inc. RBBS-PC - Capital PC Users Group, Thomas J. Mack FrontDoor - Joaquim Homrighausen D'Bridge - Chris Irwin Every effort has been made to identify and give credit for trademarks mentioned in this documentation. Any failure to mention a particular trademark in the above list that may be found in the text, or failure to give proper credit for a particular trademark, constitutes merely an oversight and should not be construed as intentional, or in any way a claim of rights to the trademark. PLEASE NOTE! Throughout this documentation, the mention of any BinkleyTerm Version 2.30 - User's Guide - Page 6 particular software package or system should not be construed as an endorsement of any kind on the part of the authors. KUDOS A number of people have been involved in the creation, development and testing of this program, or have contributed to it in one way or another. Tom Jennings, of course, gets credit for creating the beast that brought us all together and defining the basic method of mail transfer that we still use. Wynn Wagner gets our thanks for releasing source code for his file transfer routines and sending some of his WaZOO source code as well for inclusion. Thom Henderson gets a humble tip of the hat for SEAdog, the prototypical mail-only front-end which was the basis for our front-end design, and for SEAlink, his extension of Xmodem/Telink which doubled the speed of network mail transfers overnight. Chuck Forsberg of Omen Technologies gets our thanks for developing and implementing the original Zmodem protocol. Then there are the guys who have put to the test everything the authors thought would be worthwhile, the BinkleyTerm Beta Test Team, members both past and present. Without you, who knows what we'd have wound up with. BinkleyTerm Version 2.30 - User's Guide - Page 7 FORWARD There is no question that BinkleyTerm is an extremely powerful communications tool. We also make no secret of the fact that BinkleyTerm is an extremely complex communications tool. A set of documentation the size of an unabridged dictionary (about 150mm thick or so) would still not address every possible use of BinkleyTerm in every possible environment. BinkleyTerm can run on a number of personal computer platforms - a total of several thousand brands and models. Hundreds of different modems can be used. It works with several operating environments such as DESQview and DoubleDOS. In addition, BinkleyTerm is designed with an open architecture, so it can be used with several BBS packages, nodelist processors, mail processors, editors, and so on. BinkleyTerm "ports" have been made for entirely different platforms such as the Atari ST, Commodore Amiga and VAX/VMS based systems. You begin to get the scope of what's involved. This documentation attempts to cover fairly broad generalities in configuring and operating BinkleyTerm. It cannot and will not cover all possibilities or circumstances. Hopefully it will serve as a starting point - a ground level from which you may grow and expand. Further, this documentation describes only the version of BinkleyTerm provided by the original authors - that which runs in the PC-DOS/MS-DOS environment. Most of the enjoyment of the electronic mail hobby comes from trying new things - tweaking the system. Although BinkleyTerm is a dependable, powerful program that is not especially difficult to get going, it does provide ample opportunity to experiment and have fun. Still, if you're looking for something that will meld itself into your computer in just a few minutes and work without modification forever more, BinkleyTerm should probably not be your first choice. In exchange for a little complexity, we give you power and an incredible amount of configurability and compatibility. If you become frustrated with BinkleyTerm, call on others in your area who have configured it for an environment similar to yours. We estimate that several thousand people around the world are BinkleyTerm users, and someone close to you in your network no doubt runs BinkleyTerm. With an architecture as open as that of BinkleyTerm, your best source of information is someone who has the benefit of time and experience configuring it. Of course, you will eventually become an expert yourself! Enjoy it, and delight in the wonder of technology. Alan D. Applegate, Vice-President, Bit Bucket Software, Co. BinkleyTerm Version 2.30 - User's Guide - Page 8 INTRODUCTION BinkleyTerm is an advanced, state-of-the-art telecommunications tool. It is primarily designed for the semi-automated sending and receiving of electronic mail and files within FidoNet- compatible electronic mail networks. When used as a mailer, BinkleyTerm is designed to communicate with any FidoNet-compatible mail interface or BBS package. The program uses standard FidoNet protocol, as well as certain modified protocols supported by programs such as SEAdog and Opus- CBCS. It also offers easy-to-use event scheduling, single keystroke spawning to other programs (DOS shell), excellent support for high speed modems, advanced session recovery, inbound call collision detection, and much more. When used as a dumb terminal, BinkleyTerm offers a rich selection of file transfer protocols for exchanging files with a host system. The program also offers keyboard macros, optional VT-100 emulation, echoing of the on-line session to a flat text file or printer, support for baud rates of 300 to 38,400 and more. BinkleyTerm can be used as a dumb terminal program exclusively, as a mail interface for a Point system, or as a front end mail interface for an electronic bulletin board system (BBS). Mail interface and dumb terminal operations can be switched in and out with a minimum of effort providing dual functionality. BinkleyTerm is one of several software packages to utilize the FOSSIL standard communications driver. This standard allows for consistent console (keyboard and screen) and communications port I/O operations. By using a FOSSIL driver, BinkleyTerm is capable of running on practically any MS-DOS/PC-DOS capable machine, even those that are not 100% IBM hardware compatible. BinkleyTerm endeavors to provide you with the widest possible variety of advanced features, combined with solid and efficient operation in a wide range of hardware environments. BinkleyTerm Version 2.30 - User's Guide - Page 9 GENERAL REQUIREMENTS - A personal computer running MS-DOS or PC-DOS, with at least 256k of available RAM. - MS-DOS or PC-DOS, Version 2.10 or greater, Version 3.20 or higher preferred. - An auto-dial, auto-answer modem; should be mostly "Hayes compatible." See "Modem Requirements" below. - A FOSSIL driver designed for your particular hardware. - One 360k floppy disk drive (Terminal Mode). - At least two 360k floppy disk drives, more space and/or hard disk recommended (Unattended Mode). - Basic knowledge of computer-based telecommunications, without which you would have no need for BinkleyTerm. Please note that when using BinkleyTerm as a front-end mailer for a BBS system, a hard disk is required. The more space you have for such an operation, the better off you'll be. You will also need various utilities and adjunct programs, which vary with your application. MEMORY REQUIREMENTS BinkleyTerm requires approximately 185k of RAM in any operational mode with the non-overlay version (BTBIG.EXE) and somewhat less for overlay version (BT.EXE). When used for Unattended Mode, additional memory sufficient to hold the nodelist index file (usually NODELIST.IDX) will also be required. Keep in mind that a small amount of overhead will also be required to accommodate a FOSSIL driver, as well as a VFOSSIL if one is used. At least a 512k system is recommended when using DOS shells, or when BinkleyTerm is used in a multi-tasking environment. BinkleyTerm should, however, be completely functional even on a system with only 256k of RAM. BinkleyTerm is not currently capable of taking direct advantage of extended (AT style) or expanded (EEMS, EMS 4.0) memory, and having such memory installed will not be of direct benefit to BinkleyTerm. Some multi-taskers, such as DESQview, are able to take advantage of such memory to BinkleyTerm's ultimate benefit. Please note, however, that when using the 'SwapDir' configuration file statement, a RAM disk with at 150k of available space is highly recommended for efficient operation. Typically RAM disks can be placed in extended or expanded memory. Refer to the Reference Guide section "Configuration File" for details on the 'SwapDir' statement and its use. BinkleyTerm Version 2.30 - User's Guide - Page 10 When used as a front end mailer for a BBS system, it is HIGHLY RECOMMENDED that the 'BBS Batch' method of accessing your BBS be implemented for the most efficient use of memory. Please refer to the applicable sections of the documentation for further information. MODEM REQUIREMENTS A modem that is generally "Hayes compatible" is required for BinkleyTerm operation. Such modems are typically referred to as "smart" modems. Most popular, late model modems you're apt to own meet this requirement. Since you configure the various modem command strings, the modem does not need to be 100% Hayes "AT" command set compatible, but it does need to use the "AT" style of issuing modem commands. Most smart modems are capable of returning VERBAL (full words) or NUMERIC (numbers only) response codes; the modem must be configured in such a way as to use the VERBAL codes ONLY. BinkleyTerm can be operative if the modem supports just one modem response string - CONNECT. (See below for qualifications required of the CONNECT string.) BinkleyTerm has been programmed to handle and respond appropriately to the following modem response strings: NO ANSWER, BUSY, RING, VOICE, NO DIAL TONE, NO DIALTONE, ERROR, NO CARRIER, DIAL TONE and DIALING. The following response strings are recognized, but are ignored: RRING, RINGING and RING RESPONSE. With the exception of the CONNECT response, any other data provided by the modem after a given response string is ignored. For example, "NO CARRIER DETECTED" would be handled in the same manner as a "NO CARRIER" response. Since BinkleyTerm uses the CONNECT string to determine connection baud rates, the modem should be capable of sending such strings. Generally, CONNECT is a default, and indicates a 300 baud connection. Other possible connections should be CONNECT 1200 for a 1200 baud connection, CONNECT 2400 for a 2400 baud connection, and so on, up to the maximum supported speed. Note also that BinkleyTerm recognizes the response CONNECT 1275 for split-speed modems. If you are experiencing modem difficulties, try one or all of the following configuration file statements: 'SlowModem', 'SameRing' and/or 'NoCollide'. Additionally, not all modems are capable of using the 'Answer' statement and its related modem configuration. Explanations of all these statements can be found in the Reference Guide section, "Configuration File." BinkleyTerm Version 2.30 - User's Guide - Page 11 +-------------+ | +---------+ | | | Section | | BinkleyTerm User's Guide | | 2 | | OPERATION AS A TERMINAL COMMUNICATIONS PROGRAM | +---------+ | +-------------+ TERMINAL MODE OVERVIEW This section describes the installation and operation of BinkleyTerm in the Terminal Mode. BinkleyTerm's Terminal Mode offers functionality similar to that provided by programs such as Telix, ProComm or Qmodem. You can use your computer and modem to call out to on-line services and electronic bulletin board systems (BBS). BinkleyTerm offers a full selection of file transfer protocols for use in exchanging files with remote systems. Also offered is optional VT-100 terminal emulation, an open architecture for adding additional file transfer protocols, support for high speed modems up to 38,400 baud, session logging to a flat file or printer, and more. BinkleyTerm also features Zmodem Auto-Downloads. Once the transfer begins at the remote host, BinkleyTerm will detect the unique Zmodem start-of-transfer signal, and will immediately go into Zmodem download mode. If for some reason the Auto-Download does not occur, a Zmodem download can always be initiated manually. To install and operate BinkleyTerm for use exclusively in Terminal Mode, follow these steps. - Prepare disk media. Create a sub-directory on your hard disk, or format a single diskette. - Move the software to the newly prepared media. - With a standard text editor, or with DOS' EDLIN command, edit the sample configuration file, BINKLEY.CFG, included in the distribution archive or diskette. The parameters needed are outlined in the file itself on comment lines, or you may refer to the Reference Guide for more information. - Obtain and properly install a FOSSIL driver in accordance with the directions included with your driver. (Refer to the Glossary for more information on FOSSIL drivers.) - Invoke BinkleyTerm (enter 'BT' on the command line). - Press Alt-F10 for a brief help screen. The various keystrokes available in Terminal Mode are covered in BinkleyTerm Version 2.30 - User's Guide - Page 12 detail in the Reference Guide. VT-100 EMULATION VT-100 terminal emulation is provided optionally by BinkleyTerm. Outward keystrokes are always active with the VT-100 keypad mapping (as shown in the Reference Guide). However, incoming screen control codes require ANSI X3.64 support, such as that provided in firmware on a DEC Rainbow computer. For users of IBM PC computers and compatibles, external ANSI support is required, as provided by FANSI-CONSOLE, a separately available utility. Load FANSI-CONSOLE in accordance with its directions prior to running BinkleyTerm for full VT-100 terminal emulation. EXTERNAL PROTOCOLS BinkleyTerm provides a rich selection of file transfer protocols, hard coded for ease of use and efficient operation. On occasion however, other protocols may also be desired. BinkleyTerm supports special external file transfer programs that conform to the standard used by Opus-CBCS. External file transfer protocols MUST identify themselves as being compatible with Opus-CBCS in order to work with BinkleyTerm. Such protocols are often available from Opus-CBCS systems. Protocols currently available include WXmodem, Kermit and others. To use such an external protocol, add a 'Protocol' statement to your configuration file along with the required path information, as illustrated in the Reference Guide section "Configuration File." Some of the Opus-CBCS compatible protocols are specially designed and optimized for BBS use, and may not be operable in BinkleyTerm's Terminal Mode. Check the individual package for information, or test the performance of the package on your own. "True" external protocols, those that are designed to be accessed by any communications program via a DOS shell, can also be used with BinkleyTerm. BinkleyTerm provides a DOS shell command that can be invoked during a communications session. An external protocol of this type can then be executed from the DOS command line, or from a batch file, depending on your situation. External protocols such as Jmodem and BiModem can be accessed in this manner. BinkleyTerm Version 2.30 - User's Guide - Page 13 +-------------+ | +---------+ | | | Section | | BinkleyTerm User's Guide | | 3 | | OPERATION AS AN AUTOMATED ELECTRONIC MAILER | +---------+ | +-------------+ UNATTENDED MODE OVERVIEW This section describes the installation and use of BinkleyTerm in Unattended Mode. This mode is used when BinkleyTerm is to function as a front-end mail interface, whether in a BBS or "Point" environment. The Glossary provides information on BBS and Point systems. BinkleyTerm, in this operational mode, provides functionality similar to that provided by programs such as SEAdog, Dutchie, FrontDoor, D'Bridge and other FidoNet compatible mailers. BinkleyTerm answers the telephone, and exchanges mail with other compatible mail interface packages, or in the case of a human caller, passes control of the connection to a BBS system. Due to the complexity and widely varying combinations of hardware and software, only a generalized, broad explanation of the installation procedure can be given. - Prepare your disk media. Normally, this would involve selecting and/or creating a hard disk sub-directory. - Move BinkleyTerm and the distribution files to this new directory. - Using any standard text editor, make the necessary changes to the configuration file included with the distribution archive or package. Refer to the Reference Manual section "Configuration File" for more information. - Run the BTCTL program included in the distribution package. - Obtain and install a FOSSIL driver. Refer to the Glossary for more information. - Obtain the necessary utilities and programs for packing and unpacking mail. Install them in accordance with the instructions included with each package. - If you're a fully qualified FidoNet node (not a Point), obtain a current nodelist. Process it into usable form. - Make the appropriate changes to an existing batch file used to start your BBS. If the installation is completely new, or if your BBS does not use a batch file, create one. Refer to the section "Control" for more information. BinkleyTerm Version 2.30 - User's Guide - Page 14 - Start your system. Test a remote call if possible. - Alt-F10 displays a brief help file of commands available in Unattended Mode. THE BINKLEYTERM CONCEPT It is important to remember that BinkleyTerm is a mailer program with a completely open architecture. As such, BinkleyTerm can be operated with a tremendous variety of BBS systems, mail packing and unpacking programs, and accessories. BinkleyTerm will answer the telephone and respond to another mail program. Mail will be placed in an incoming files area. If the caller is human, control is passed entirely to the BBS program, if one is installed. It is the responsibility of third-party software to unpack the mail received, and add it to your message base. On the outward side, BinkleyTerm uses an outbound holding area to hold outward mail. It is the responsibility of third-party packing software to pack new messages into the required format, and place them in the outbound area. BinkleyTerm neither packs nor unpacks mail. Allowing this functionality to be provided by other software allows BinkleyTerm to be compatible with practically any BBS software, regardless of message base structure. For mail handling, you might use programs such as ConfMail and oMMM to process mail, along with programs such as Sirius or msged to read and enter messages, or allow your users to do so in a BBS installation such as Opus-CBCS or Fido. Some BBS packages, such as TBBS and QuickBBS come complete with their own proprietary packing and unpacking software. Finding the utilities and programs needed to work with your system is your responsibility. HOW BINKLEYTERM HANDLES MAIL Sending outbound mail with BinkleyTerm is fairly simple. The concept of mail handling with BinkleyTerm is the same concept that Opus-CBCS uses. If you're already familiar with Opus, then BinkleyTerm will fall into place easily. If you are a complete neophyte, this section is intended to give you an understanding of the concept. Idea #1 Mail events are less important than they are with other mailing methods and systems. With BinkleyTerm's events, you paint with a wide brush telling the system what to do with 'classes' of remote systems. BinkleyTerm Version 2.30 - User's Guide - Page 15 When systems handled mail only at specific times, routing and times were of great importance. Because more and more systems can process mail at any time, the idea of a schedule becomes less important. The item of prime importance with BinkleyTerm is COST. We are going to try and relieve you of the tedious details of scheduling, and concentrate on doing things for the least cost. More on this later. Idea #2 Another new idea deals with the way that packets are created. If you have used other mailer systems, you're probably used to seeing packets generated several times. With some programs, packets are built every time a mail schedule starts. As a result, one message may be put into a packet several times. With BinkleyTerm, packets are built once by an external mail packing program. Most often, this is a program called oMMM. They may be remarked and rerouted once they're built, but they are physically built only once, and placed in a special sub- directory called the outbound holding area. NOTE: oMMM stands for Opus Matrix Message Masher, and was originally designed for use with the Opus-CBCS system as its packer. BinkleyTerm is able to use oMMM because it chose to implement the holding area in a compatible (although not identical) way. oMMM may not have to be used at all; in some cases, the mail packing program for your particular environment may handle oMMM-like functions internally. Idea #3 BinkleyTerm uses 'Continuous Mail.' If you are already using a program that supports 'Crash Mail' then you understand a little of what Continuous Mail does. Continuous Mail differs from Crash Mail in a couple of areas. In other mailer systems, you would mark a message as 'Crash' meaning that you wanted this message to go out NOW. These mailer programs would shut down human caller access to the BBS and try like heck to get the message through. BinkleyTerm uses Continuous Mail, meaning that this is a message going to a system that can accept mail at any time of day. BinkleyTerm makes no frantic attempts to dial out, rather it will try and deliver the message between callers. Idea #4 The driving forces of outbound traffic are file names! You'll have a special sub-directory set aside just for packets, compressed mail packets and other network files. This sub- BinkleyTerm Version 2.30 - User's Guide - Page 16 directory belongs to BinkleyTerm, which will maintain the directory for you. It's a good idea not to play with this area unless you know exactly what you're doing. Note also that when zoned operation is active (BinkleyTerm default) there are separate outbound areas for each zone. The default outbound area (for your zone) and one additional area for each other zone you deal with. The names of these additional areas are simply the outbound area name, with a three-digit extension that is the zone number in hexadecimal with leading zeroes. See "Zone Support" for information. The file names of the packets tell BinkleyTerm how to treat the different packets. Here's a typical packet name: 00680024.OUT That says that the packet is for 0068/0024 (in hexadecimal) or 104/36 in more familiar terms. The ".OUT" means it is a Normal packet. Other packet extensions include: .HUT . . . Hold this packet for pickup by the remote system. .CUT . . . The other system can receive Continuous Mail. .DUT . . . Direct, meaning the other system can NOT receive Continuous Mail. One nice thing is that you can manually change the file extension if you need to, or you can use fancy utilities such as AMAX to do this sort of thing for you on your command. For the remainder of this section, we'll assume that you'll be using oMMM as your mail packer. As mentioned previously, you may be using another program that has oMMM-like functionality; it depends on your environment. The oMMM program knows about these extensions and creates them based on information you put into the oMMM control file. You'll have statements like this: NormHold 124/102 Any messages you enter to 124/102 would be turned into a .HUT packet file, placed into the outbound area, and BinkleyTerm would hold that packet for 124/102 to call and pick it up. Files are also sent through FidoNet compatible networks. oMMM builds and maintains a file that tells BinkleyTerm what files to send (or hold) for whom. A typical 'file attach' file might be named: 00680024.FLO BinkleyTerm Version 2.30 - User's Guide - Page 17 This would designate a that there is a file waiting to be sent to 0068/0024 (in hexadecimal) or 104/36 in more familiar terms. The ".FLO" says it is a Normal file attach. File attach files are also called 'flow files' - named after the .FLO file extension. Other flow file extensions are: .HLO . . . Hold these files for pickup by the remote system. .CLO . . . The other system can receive Continuous Mail. .DLO . . . Direct, meaning the other system can NOT receive Continuous Mail. A flow file is just a text file. It contains a list of files that are to be sent to another system: #c:\binkley\outbound\0000fc9c.mo1 ^c:\myfiles\wizzle.doc c:\pascal\notes.doc The '#' prior to a flow file entry says to truncate the file to zero-length after successfully sending the file to the remote system. This is normally only employed when sending compressed mail (archived mail) to the remote. The '^' prior to a flow file entry says to delete the file after sending. The oMMM program will put messages into archives for you. Details on how this is done can be found in the oMMM documentation. The point is that oMMM combines the functionality of "generating packets" with that of programs like ARCmail. A Sample Message, Start to Finish So here's a practical example. Say I enter a message to Rod Lamping at 104/610. I mark the message as KILL/SENT when I enter it. I also enter the message designating a file to attach to Rod, named C:\FILE\REQ\FOOBAR.ARC. I then enter a message in an EchoMail conference. My conference host is Phil Kaiser at 104/904, for whom I hold my mail for pickup. Among other things, I have two lines in my oMMM control file: NormCM 104/610 OneHold 104/904 'NormCM' tells oMMM to mark the message as Continuous Mail (since Rod runs a mailer 24 hours a day). 'OneHold' tells oMMM to archive the mail to 104/904, and mark it Hold-for-Pickup. Refer to the oMMM documentation for the full set of available oMMM control file statements. First, my EchoMail utilities are run to turn EchoMail messages into Normal packets, and place them in the outbound area for BinkleyTerm Version 2.30 - User's Guide - Page 18 processing by oMMM. Next, I execute oMMM. It first scans the NetMail message area (where I entered my message to Rod) and turns new messages there into Normal packets, and if there are files attached, it creates Normal flow files. oMMM's second step is to use its control file, and apply the statements in the file against the mail in the outbound area that is marked as Normal. Since I have Rod's board listed as NormCM, oMMM renames the file extension of the Normal packet and flow file for Rod to .CUT and .CLO respectively, for Continuous Mail. Since I have Phil's board listed as OneHold, first oMMM archives the packets to Phil, then creates a flow file with a file extension of .HLO for Hold- for-Pickup. I would then have the following in my outbound area: 00680262.CUT Message to Rod 00680262.CLO Flow File to Rod 00680388.HLO Flow File to Phil 0000FC9C.MO1 Archived Message to Phil For more information on how oMMM works, refer to the oMMM documentation. The Concept of Cost As mentioned earlier, one of the prime considerations with BinkleyTerm is sending mail for the least cost. Cost is, of course, determined by the nodelist entry. With a properly compiled nodelist, local FidoNet nodes have '0' in the cost field for their nodelist entry (assuming local calls are free of charge). Other entries have cost fields that realistically reflect the actual cost of sending mail to a particular node. In most areas, it is cheapest to send toll calls during nighttime house. Therefore, BinkleyTerm is normally set-up to send such mail only during nighttime hours. The 'L' flag used when scheduling events designates 'local only.' As already mentioned, nodes with a '0' cost field are assumed to be local. When the flag is applied to an event, only local calls are made. The 'L' flag should be used whenever it costs the most money to make toll calls, and removed for events during which toll calls are cheapest. More about this is in the Reference Manual section, "Scheduling Events." Alternative Method Randy Bush of 1:105/6 has assembled a package called MOOO which allows the Dutchie mail packer to be used with BinkleyTerm. This will allow routing commands familiar to grizzled FidoNet veterans to be used with BinkleyTerm. BinkleyTerm Version 2.30 - User's Guide - Page 19 WINDOWED INTERFACE BinkleyTerm features a windowed user interface. The windowed interface provides "at-a-glance" convenience for watching mail sessions in progress, as well as determining what activity has taken place with the system recently. If a Video FOSSIL (VFOSSIL) is installed, the windowing operations can take place much faster than they would without one. It is recommended that a VFOSSIL be used with BinkleyTerm. Some more recent VFOSSIL implementations may also allow BinkleyTerm to be used on EGA and VGA systems in extended text modes of 132 columns by 43 lines. The mode switching must be performed by the utility software that accompanied your video card prior to invoking BinkleyTerm. There are five information windows displayed on-screen. Current Settings This window contains various information about your system, including the current date and time, current event, port and current baud rate, status and multi-tasker type, if any. The current event line features a number, and a list of event flags. The number corresponds to which entry in the BinkleyTerm configuration file contains the line that covers the current event. The first 'Event' statement in the configuration file would be event 1, the second would be event 2, and so on. The flags are letters that are a subset of those used with event scheduling. Here is a list of letters that may be found in this window: C Continuous Mail Only Event L Local Only Event N Do Not Accept Inbound File Requests R Receive Only Event B BBS Use Allowed D Dynamic Event K Do Not Send to #CM Nodes Note that not all event flags will be displayed in the window. For complete details and use information, see "Scheduling Events" in the Reference Guide. Today at a Glance This window contains several lines of information regarding the activity on your system since midnight. Note that the totals given apply only to calls handled by BinkleyTerm's Unattended (mailer) Mode, and do not include Terminal Mode totals. The first line, "BBS/Mail," lists how many bbs calls and mail BinkleyTerm Version 2.30 - User's Guide - Page 20 calls have come in, separated by a slash. For example, 2/15 would indicate 2 BBS calls and 15 mail calls since midnight. The second line, "Calls Out," lists the number of dial attempts that have been made by your system, successful or otherwise. The third line, "Good/Cost," shows how many successful outward connects have been made and the cumulative cost of all the successful calls, separated by a slash. For example, 3/100 would indicate that 3 successful outbound calls have been placed, and that together, they cost 100 units (in the United States, units are cents, which would mean that the cost was 100 cents or $1.00). The cost is calculated based on the cost shown in your compiled nodelist files; the cost shown there is assumed to be a per-minute value in calculating a per-call cost. The fourth line, "Files I/O," shows how many files (packets, compressed mail or other incoming files) have been received and sent, separated by a slash. For example, 12/3 would indicate that 12 files have been received, and 3 have been sent. Finally, the fifth line indicates the type of last call. If the last call was incoming, the display will indicate whether the call was a BBS call, external mail call, or the node address will be displayed if it was a mail call. If the last successful call was outgoing, the node address will be displayed. Pending Outbound Mail This window displays a list of systems for whom mail is pending, along with related information. The window can be scrolled using PgUp, PgDn, Home, End, Up-Arrow and Down-Arrow keys. The top line of the window lists the node that is being called, or was just called. The second line lists the node that will be called next. Various information about the mail for the various nodes is also displayed. The columns are marked by a single letter. The column letters and their meaning are: C Continuous Mail H Hold-for-Pickup Mail D Direct Mail N Normal Mail R File and/or Update Request S Status The symbol shown under the C, H, D, N and R columns is: * Mail of This Type Pending BinkleyTerm Version 2.30 - User's Guide - Page 21 The symbols shown under the S column are: x Too Many Bad Connects (Undialable) # Already Called, But Mail Still Pending - Cannot Call During This Event ! Node Not Found in Nodelist When BinkleyTerm is making an outbound call, the node you are calling is highlighted in the Pending Outbound Mail window. This allows you to know which node has been called, even after the pertinent information has scrolled out of the Recent Activity window (described below). This feature can also be helpful in determining whether an active mail session was initiated by you, or was started by an incoming call. The outbound area is re-scanned for new additions under the following circumstances: - After a keyboard shell has been invoked - After 'AfterMail' is run (if designated) - After 'Packer' is run (if designated) - After message editor (Alt-E) has been run - After 10 minutes of no activity Note the 'AfterMail', 'Packer' and 'Reader' (message editor) are designated in the configuration file. Refer to the Reference Guide section "Configuration File" for additional information. Recent Activity This window is similar to the main section of previous BinkleyTerm displays, in that it gives various information about what the system is currently doing, or has just done. This includes identification of the remote system, the type of connection, what files were transferred, etc. Any feedback available about the current or recent activity of the system is shown in this window. Transfer Status This window gives particulars about current file transfers that may be taking place if a connection is active. For WaZOO/ZedZap connections, this includes filename and the number of bytes transferred; for other connections, the number of blocks transferred may be given. CONTROL In Unattended Mode, BinkleyTerm is normally used with batch files that control system operation. You'll have a batch file used to invoke BinkleyTerm and invoke system utilities such mail processors. BinkleyTerm Version 2.30 - User's Guide - Page 22 Since BinkleyTerm can be used in such a wide variety of situations, there is not a particular "correct" or "incorrect" way to configure BinkleyTerm. The remainder of this section explains some of the operational theory and methods behind batch processing as it applies to BinkleyTerm. If you are adding BinkleyTerm to an existing FidoNet compatible BBS system, chances are excellent that you are already familiar with batch files and the various tricks that they must typically perform in a FidoNet environment. If advanced batch processing is beyond your scope, it is highly recommended that you review your DOS manual, or the numerous third-party DOS usage guides for information to get you started. One of the fundamentals of using batch files with BinkleyTerm is the concept of the 'errorlevel.' This DOS environment variable is set to a given value when a program completes execution. A batch file can detect and act upon the value, branching to various parts of the batch file. This section provides many good tips and ideas for errorlevel and batch file processing. Also consult your DOS manual for additional information. A practical application might be after BinkleyTerm receives mail. BinkleyTerm would exit to the batch file, setting the errorlevel to a predetermined value. The batch file detects the value, and branches to a section in the batch file where mail unpacking programs are invoked. The batch file would then be restarted, invoking BinkleyTerm to again wait for or send mail. NOTE: The remainder of the "Control" section was written by Ron McKenzie of 1:104/45.1. My gracious thanks to him for the insights presented here, and for the time he contributed to its composition. This section was sorely needed (and requested) by many BinkleyTerm users. - Alan D. Applegate Errorlevels and Batch Files Errorlevels present a difficult hurdle to the new user of BinkleyTerm, especially those with no experience operating a BBS or a Point. In addition, BinkleyTerm's great flexibility confuses some Sysops. Few things are "fixed" or "cast in concrete." This section attempts to draw together pertinent information from many sources relating to errorlevels and their use in crafting a batch file to operate a BBS or a Point. Also presented are some accumulated bits of wisdom gathered by the author in the course of creating his own Point. This section looks at what errorlevels are, which errorlevels are returned by BinkleyTerm, distinguishes between those errorlevel values set by BinkleyTerm and by the user, shows how you use BinkleyTerm Version 2.30 - User's Guide - Page 23 errorlevels in your batch file and, finally, offers some hints and shortcuts. What is an "Errorlevel?" An errorlevel is a numeric value which a program may "return" when it terminates. The name is misleading because the value returned is really an exit code, rather than an indication of an error per se. It distinguishes different types of normal exits, in addition to denoting an abnormal condition on exit. The software's creator (or, in some instances, the program's user) sets the value(s). Errorlevels permit the user to craft a batch (.BAT) file, using DOS batch commands such as IF and GOTO, to logically organize the BBS or Point operating process. Automagically, this batch file determines which tasks need be performed and in what order. It branches between tasks based on the exit code generated by each program and on the program logic created by the Sysop. For example, an editor might return the following: Exit Code Condition ---- ---------------------------- 3 EchoMail and NetMail Created 2 EchoMail Only Created 1 NetMail Only Created 0 No Mail Created For another example, the ConfMail mail processing program returns the following errorlevels in the Import mode: Exit Code Condition ---- ---------------------------- 2 Severe Error in Processing 1 Messages Were Imported 0 No Messages Imported Branching or jumping within the batch files is facilitated with the use of labels. A label is used to identify a particular block within the batch file. For example, you might choose to label a portion of your batch file "nodelist" because that particular section of the file handles nodelist processing. Labels are designated with a colon, followed by the label name. You may wish to identify the top of the file with a label to make re-starting the batch file as easy as using a GOTO statement. Here is a short example of the use of labels: :start myprog -p1 BinkleyTerm Version 2.30 - User's Guide - Page 24 if errorlevel 2 goto process if errorlevel 1 goto start if errorlevel 0 goto end :process proc -c -d1 if errorlevel 1 goto start if errorlevel 0 goto end :end Note that the top of the file is identified by a label named "start" and that other sections are labeled as well. The batch file starts out by invoking a program called MYPROG. Once MYPROG exits, the errorlevel values determine where in the file that control will be passed. One errorlevel references another label that in turn will cause a program named PROC to be run. Another branch goes back to the top of the file, and yet another goes to the end of the file. The PROC program also gives errorlevels that are processed by the batch file. Errorlevels and associated batch processing commands permit tailoring the batch file and bypassing of unnecessary processing steps, saving substantial amounts of time, which, in turn, translates into more time for user-access and other processes. (There is NEVER too much time.) What Errorlevels BinkleyTerm Produces BinkleyTerm returns errorlevels in four general cases: Sysop-Initiated Fx keys, Escape and Alt-X Sysop-Defined E1=, E2= and E3= exits used with event scheduling, and external mail program exits Caller-Initiated A non-mail call returns the baud rate code System-Generated BinkleyTerm cannot find itself in the nodelist What errorlevels (exit codes) does BinkleyTerm return? Many values are "hard coded" in BinkleyTerm or are provided in the sample files included in the distribution package. However, only some of the values have "fixed" definitions. BinkleyTerm Version 2.30 - User's Guide - Page 25 Error- Level Means Caused By --------- -------------- ---------------------------------- 1 Exit Alt-X Keypress 3 300 bps Call Non-Mail Call at 300 Baud 10 E1= Exit ** F1 Keypress * 12 1200 bps Call Non-Mail Call at 1200 Baud 20 E2= Exit ** F2 Keypress * 24 2400 bps Call Non-Mail Call at 2400 Baud 30 E3= Exit ** F3 Keypress * 40 ** F4 Keypress 48 4800 bps Call Non-Mail Call at 4800 Baud 50 ** F5 Keypress 60 ** F6 Keypress 70 ** F7 Keypress 80 ** F8 Keypress 90 ** F9 Keypress 96 9600 bps Call Non-Mail Call at 9600 Baud 99 ExtrnMail External Mail String Received ***** 100 ** F10 Keypress 128 38400 bps Call Non-Mail Call at 38,400 Baud **** 192 19200 bps Call Non-Mail Call at 19,200 Baud 254 Error Address Not Found in Nodelist *** 255 Error Microsoft C Produced Error * As shipped; the sample BINKLEY.EVT event file included in the distribution package uses errorlevels 10, 20 and 30 for E1=, E2= and E3= exits respectively. Thus pressing F1, F2 or F3 has the same effect as BinkleyTerm making an E1=, E2= or E3= exit. Exits are defined as: E1= Beginning of Event E2= Mail Received E3= Compressed Mail Received ** All F-key exits have user-defined functionality. *** BinkleyTerm will exit with errorlevel 254 when it cannot find its own address in the nodelist. Other conditions checked are: - Non-Zero Zone Number Designated - Non-Zero Net Number Designated - System Name Designated - Sysop Name Designated - Outbound (Hold) Area Designated - Inbound Area Designated If any of these parameters are not designated or are improperly designated as noted, then an errorlevel 254 exit is performed. These parameters are designated in the configuration file. **** Errorlevel values allowed by DOS are from 0 to 255. BinkleyTerm Version 2.30 - User's Guide - Page 26 Therefore, the value of a 38,400 baud exit "wraps" around to equal 128, instead of 384. ***** The external mail program functionality features configurable exit values, but the default value is 99. Making Errorlevels Work For You You, the user, define ALL errorlevels associated with the E1=, E2= and E3= exits, setting them in BINKLEY.EVT. You 'program' a specific task to occur at the beginning of a selected BinkleyTerm "event" (time interval) by selecting a unique "E1=" code for that task. The task can be set to occur periodically throughout each day, once-per-day, once-a-week or on selected days within the week; further, you may execute a given task at different times on different days, if so desired, depending on the way a particular event is configured. Similarly, by having a variety of E2= and E3= codes, you can use different mail unpacking routines throughout the day or week. Refer to the section "Scheduling Events" in the Reference Guide for details. You customize the operation of your BBS or Point to meet your specific needs and those of your "customers". Errorlevels, Batch Files and ExtrnMail This BinkleyTerm option is intended for invocation of an external mail handling program, possibly an alternate mailer, upon reception of a user-defined string of characters. It can also be used to set-up multiple BBS installations, allowing a user to specify which BBS he or she wants. This is covered in detail in the sections "External Mail Programs" and "User-Selected BBS Functionality" elsewhere in this manual. Errorlevels, Batch Files and Housekeeping Another common application of exits and exit values is for housekeeping. For example, the author set up his Point system to do daily housekeeping (deleting and renumbering of the message base) daily at 8:00am. Twice a day, at 4:00am and 11:00pm, his Point polls his BossNode. Each Saturday, the Point requests the current NODEDIFF from the BossNode and, then, on Sunday, processes the weekly NODELIST. A distinct E1= errorlevel handles each task. Thus, only you can prevent chaos and create an orderly functioning batch file for your BBS or Point. Be vigilant, and avoid re-using the same errorlevel for several different tasks. DOS Shell Keys There are also 9 programmable DOS shell exits which are invoked BinkleyTerm Version 2.30 - User's Guide - Page 27 by using Alt-Fx key combinations. You enable and set these up in the configuration file. Look for 'Shell' near the end of the sample BINKLEY.CFG file included with BinkleyTerm, and refer to the section "Configuration File," the command 'Shell' in the Reference Guide. These shells produce NO errorlevels but are mentioned because they are an alternate and/or additional solution to creating Sysop controllable exit/task options. When configured, these shell keys invoke a new copy of the command processor, COMMAND.COM. You may not want to use these as they consume extra memory for the 2nd copy of COMMAND.COM. Using Errorlevels How do you use errorlevels? By testing for their existence with the batch file statement: IF ERRORLEVEL n GOTO xxx Where: n is a numeric value xxx is a label within the batch file Bear in mind the following Rules: The "IF ERRORLEVEL ... " statements must follow immediately after the program they test. "IF ERRORLEVEL n" returns true for any value GREATER THAN or EQUAL TO "n", therefore, Test errorlevels in descending numerical sequence, and, Trap unwanted exit codes so that a step will be executed if, and only if, the desired errorlevel is encountered. In this excerpt from a batch file, the "Start_BT" label refers to a section that loads BinkleyTerm: IF ERRORLEVEL 21 GOTO Start_BT <- Traps 21 to etc. * IF ERRORLEVEL 20 GOTO OpenMail <- Branch & Open Mail IF ERRORLEVEL 11 GOTO Start_BT <- Traps 11 to 19 * IF ERRORLEVEL 10 GOTO Start_BT <- "Non-Event" IF ERRORLEVEL 3 GOTO Start_BT <- Traps 3 to 9 * IF ERRORLEVEL 2 GOTO Bad_Exit <- Nodelist Entry Error IF ERRORLEVEL 1 GOTO Exit_BT <- Branch to 'Exit' * Invalid responses are 'trapped', BinkleyTerm restarts. What Now? Look at some "good" examples which demonstrate automating BinkleyTerm Version 2.30 - User's Guide - Page 28 processes using batch files and errorlevels. In particular, look at the samples provided by Bob Hartman and Alan Applegate for BinkleyTerm (available from 1:104/36), or samples that existing BinkleyTerm Sysops may be able to provide you. Then, make up your own batch file to control a process. Or, take one of the samples and modify it for your specific needs. Have fun! Hack away! Consult the documentation for each of your application programs, determine whether or not it produces errorlevels, and how you can take advantage of them. Errorlevel and Batch File Hints and Kinks When looking at sample batch files, note carefully how each author organized the program logic in his batch file. Here are some reminders. A batch file loses 'control' if it merely invokes another batch file (e.g. you execute a second batch file within the first); instead, "shell out" to DOS from the first batch file by invoking another copy of COMMAND.COM. Using the /C switch closes that second command processor when the second batch file finishes. Consult your DOS reference materials for more information on this point. Examples: COMMAND.COM /C Pak_Mail.BAT or: %comspec% /C Pak_Mail.BAT This is true for all MS-DOS versions up to and including 3.2. MS-DOS/PC-DOS 3.3 introduced the batch command CALL which overcomes this limitation, when it is used. Refer to your DOS manual. Sometimes, your batch file must "remember" what it is doing. You can accomplish this by "setting" an environment variable, for example: SET PROC=UNATTENDED Your batch file can then determine its "logic path" or invoke other programs using statements such as: IF %PROC% == UNATTENDED GOTO xxx or: IF %PROC% == UNATTENDED BT UNATTENDED BinkleyTerm Version 2.30 - User's Guide - Page 29 or: IF %PROC% == UNATTENDED %comspec% /C Pak_Mail.BAT In the above examples, the program follows a certain logic path and performs specific tasks when it's in the unattended mode. Verify that you have sufficient environment space for any variables which you want to "store" in it. Review the section concerning the SHELL entry for CONFIG.SYS in your DOS reference material. This will explain how to enlarge the environment space if that is needed. The exact adjustments which you may need to make are dependent upon your version of MS-DOS/PC-DOS, and several other factors such as memory use, size of DOS paths and so on. You can also pass a variable into a batch file when you invoke a program. For example, the author's POINT.BAT batch file immediately comes up in the Unattended Mode if you invoke it with: POINT -u (or, POINT -U) POINT.BAT then leapfrogs directly into unattended mode using the following statements: IF %1 == -u SET PROC=UNATTENDED IF %1 == -u GOTO Start_BT ... :Start_BT IF %PROC% == TERM BT <-Terminal Mode IF NOT %PROC% == TERM BT %PROC% <-Other Modes Finally, use of errorlevels is not always necessary. Some programs provide an alternative which may meet your needs. For example, ConfMail and some editors produce an ".OUT" file containing the name of each EchoMail area for which mail has been received or created. Thus, test for the existence of the .OUT file rather than testing the errorlevels and, thereby, simplify the logical branching in your batch (.BAT) file. For example: if exist AREAS.OUT ConfMail Export ... -F AREAS.OUT if exist AREAS.OUT del AREAS.OUT or: if exist ECHO.OUT ConfMail Maint ... -F ECHO.OUT if exist ECHO.OUT ReplyLnk -F ECHO.OUT if exist ECHO.OUT del ECHO.OUT The point here is that such an .OUT file can be used by several programs serially, as in the last example, and thus, avoid using BinkleyTerm Version 2.30 - User's Guide - Page 30 errorlevel driven logic. Further, it can continue working for you after you have "lost" your errorlevel by running another program. Environment Variable In environments where multiple drives and paths are used, it is generally a good idea to set a DOS environment variable named BINKLEY. BinkleyTerm can then use this variable to determine where its configuration file is located, should it not be located in the current directory. Place in your AUTOEXEC.BAT file (or in the batch file that starts BinkleyTerm) the line: SET BINKLEY=C:\PATH Where C:\PATH is the drive designator and complete path name where the configuration file is located. CONFIGURATION FILE Most BinkleyTerm parameters are set through a configuration file. By default, the configuration file is named BINKLEY.CFG, and is expected to be available unless a different configuration file is specified on the command line. A sample BINKLEY.CFG files is included with the distribution package. You can edit the file with any plain text editor, such as DOS' own EDLIN. The Reference Guide contains a complete listing of all BinkleyTerm configuration statements and their proper use. BinkleyTerm directly uses the raw configuration file, and each time the program in invoked, BinkleyTerm will scan and process the file, setting internal values to those that you have selected. When you first install BinkleyTerm, or if you change your address ('Address'), inbound files area ('NetFiles'), outbound files area ('Hold'), or NetMail message area ('NetMail') as specified in the configuration file, you must run a special program included with the distribution package called "BTCTL". BTCTL BTCTL is used to create two files based on information in the BinkleyTerm configuration file. First, it produces MAIL.SYS, a Fido-compatible system file used by many mail processing programs. Second, it produces BINKLEY.PRM, a file used by oMMM, a mail packer nearly always used with BinkleyTerm. Note! BTCTL needs to be run only under the circumstances mentioned above. BTCTL DOES NOT need to be run for minor changes BinkleyTerm Version 2.30 - User's Guide - Page 31 to the file that DO NOT include address, inbound file path, outbound file path or NetMail message path. NODELIST The listing of FidoNet compatible systems in your network is called a 'nodelist.' Once a current nodelist is obtained, it can be kept up-to-date by using so-called NODEDIFF files that are distributed weekly within the network. The nodelist and update files are distributed in 'raw' form. Adjunct software must be used to process and compile the raw nodelist and NODEDIFF files into a form usable by BinkleyTerm. From now on, when we refer to "nodelist" we're referring to the compiled, ready-to-use nodelist data files, not the raw nodelist file as distributed within the network. BinkleyTerm is capable of using a variety of compiled nodelist formats. If you do not already have a BinkleyTerm-compatible format that you desire to use, the primary formats supported by BinkleyTerm are the Opus 'Version 5' nodelist, used by Opus-CBCS 1.03b and below, and the Opus 'Version 6' nodelist, used by Opus 1.10 and above. THE VERSION 5 NODELIST SHOULD BE CONSIDERED OBSOLETE. THE VERSION 6 FORMAT OR THE QUICKBBS FORMAT (DISCUSSED LATER) ARE THE PREFERRED FORMATS FOR BINKLEYTERM, AS SEVERAL IMPORTANT FEATURES ARE UNAVAILABLE WITHOUT THEM. Point installations do not need a nodelist at all if they don't care to have one, simply by using all of the following configuration file statements: - BossPhone - BossPwd - PrivateNet - Address Of course, this requires establishing a session password with your boss (as designated by the 'BossPwd' statement). With this method, Terminal Mode must be used to poll the boss using the Alt-Y keystroke, as Unattended Mode will not operate without a nodelist available. Refer to appropriate sections of the manual for additional information. FIDOUSER.LST The nodelist processing software is also used to produce FIDOUSER.LST, a list of Sysop names and node address that BinkleyTerm can use when dialing out. When this file is available to BinkleyTerm, you can enter a Sysop name in place of a node address whenever prompted to enter a node address. This applies to both Unattended and Terminal Modes, while polling or dialing a system. BinkleyTerm Version 2.30 - User's Guide - Page 32 FIDOUSER.LST should be kept in the same sub-directory as the compiled nodelist files are kept. Version 5 Nodelist Although this nodelist format is the BinkleyTerm default (for backward compatibility), it is considered obsolete for use with the current version of BinkleyTerm. If you are running a Fido 11w or Opus 1.0x system, BinkleyTerm can support this nodelist format, but it is highly recommended that you produce both a Version 5 and a Version 6 nodelist for your system; the former for your BBS software, and the latter for use by BinkleyTerm. Again, the Version 5 nodelist is considered obsolete, and should not be used unless absolutely necessary. Version 6 Nodelist Using the Version 6 nodelist allows BinkleyTerm to have more information at its fingertips, specifically, whether a given node in the nodelist supports 'Continuous Mail.' Some nodelist processors are also able to put modem type information into a compiled Version 6 nodelist. The extended information in a Version 6 nodelist allows for automatic determination of this information, resulting in fewer errors that result from attempts to manually compensate for such variables. The Version 6 nodelist is a relatively new format. Nodelist processor commands mentioned in this section apply only to ParseLst, a commonly available nodelist processing package. You will be able to locate ParseLst from systems that normally carry Opus or BinkleyTerm. Other nodelist processors may also support this format, and their specific commands may vary. Make certain that you also make the necessary changes to your configuration file. Add the 'NewNodelist' statement, and change your event schedules to be compatible as well. Refer to the Reference Guide for additional information. Please note that the index files for the Version 5 and Version 6 nodelists ARE IDENTICAL. Therefore, you may use BOTH lists SIMULTANEOUSLY. This is helpful in installations where Opus-CBCS 1.0x or Fido 11w is used under BinkleyTerm. With ParseLst, you'll need to use the following statements in the ParseLst configuration file in order to process a nodelist for BinkleyTerm's use: UseZone, Complete, and Version6. Don't forget to use 'NewNodelist' in BinkleyTerm's configuration file. QuickBBS Nodelist BinkleyTerm also supports the QuickBBS Version 2.0x nodelist. This nodelist format is equivalent in functionality to the BinkleyTerm Version 2.30 - User's Guide - Page 33 Version 6 nodelist described above, including automatic determination of whether a node can accept Continuous Mail. In order for the QuickBBS nodelist to be used with BinkleyTerm, it MUST be processed by ParseLst Version 1.01 or higher. At this writing, Qnode, the nodelist processor included with QuickBBS, does not support the extended information BinkleyTerm requires from the nodelist. ParseLst will insure that the information is included, as well as provide complete compatibility with QuickBBS. Other nodelist processors, such as XlaxNode, should also be able to produce a QuickBBS nodelist that contains the necessary information for BinkleyTerm to function properly. To use this format, add the statement 'QuickNodelist' to your configuration file. Refer to the Reference Guide for additional information. TBBS Nodelist BinkleyTerm can use the nodelist format supported by TBBS. In order to obtain additional information about the various nodes in the list, BinkleyTerm requires an adjunct file, NODELIST.EXT. The nodelist is first processed normally for TBBS. Then, ParseLst is used to produce NODELIST.EXT and NODELIST.IDX from the raw nodelist. These files are then used together by BinkleyTerm to provide full functionality as described above for the Version 6 nodelist. This includes automatic determination of whether a node can accept Continuous Mail. PLEASE NOTE! The TBBS format DOES NOT provide sufficient information to allow BinkleyTerm's zone support to be active. If you use this format, YOU MUST ALSO USE the 'NoZones' statement in your configuration file. Refer to the section "Zone Support" for additional information. To use this format, add the statement 'TBBSNodelist' to your configuration file. Refer to the Reference Guide for additional information. Also refer to the ParseLst documentation for more information about compiling NODELIST.EXT. Nodelist Support Information The authors of BinkleyTerm are willing to consider supporting additional nodelist formats. To facilitate the support of your nodelist format, the following information is required: 1. C language structure definition for the format. (Pascal is acceptable too, but C is preferred.) 2. Definitions of any of the fields in the format. In particular, bit fields must be defined, and the contents of any field that is not obvious must be given. BinkleyTerm Version 2.30 - User's Guide - Page 34 3. Compiler and instructions for generating the given nodelist format. 4. Examples of C code to look-up a given zone:net/node.point number in the nodelist. (Note that any code used will be given out for free in source form, so this should not be taken lightly.) 5. A phone number and hours when the author can be reached if there are issues that need to be resolved. 6. IMPORTANT! A good reason why we should include the format. 7. IMPORTANT! If this is for BinkleyTerm front-ending for a certain type of BBS, the author should include configuration files, batch files, etc. that will be necessary for others to use BinkleyTerm and his BBS. This will save us a lot of work tracking these things down in the long run. If all of this information is forwarded to 1:132/101, 1:141/491 or 1:104/36 we can get back to the author within a week or two to tell them whether the format will be in the next release. ZONE SUPPORT Zones are a high-level addressing scheme devised for use within FidoNet. In a full FidoNet address, such a 1:104/36.0, '1' would be the zone, '104' the net, '36' the node number, and '0' the point number. Currently, zone addressing is not supported within the FidoNet message or packet structure, allowing software such as BinkleyTerm to provide only "kludged" support of zones. BinkleyTerm offers such support, and endeavors to make it as seamless as possible. If for some reason you do not wish zone support to be active, place the statement 'NoZones' in your configuration file. This will cause BinkleyTerm to essentially "turn off" zone support. If you intend not to use zone support, then use the 'NoZones' configuration file statement. If you have not used the 'NoZones' statement, BinkleyTerm will assume that a full, zone-based nodelist is available for its use. For information on how to properly compile a nodelist for BinkleyTerm, refer to the section "Nodelist" for more information. When attempting to send mail to nodes in other zones, BinkleyTerm will assume that mail for other zones will be held in separate outbound areas by zone number. For example, if your outbound mail directory is C:\BT\OUTBOUND, mail for your zone will be held there. However, mail for nodes in zone 2 would be expected in C:\BT\OUTBOUND.002, mail for zone 3 would be expected in BinkleyTerm Version 2.30 - User's Guide - Page 35 C:\BT\OUTBOUND.003, and so on. This example is for zone 1. The zone number for which your default outbound directory applies is determined by the FIRST appearance of the 'Address' statement in your configuration file. Subsequent 'Address' statements identify your alternate identities within other zones (and/or networks). For example, if the first 'Address' statement designates an address in zone 2, then the outbound area designated by the 'Hold' statement in your configuration file is the default, and mail to other zones would require their own distinct outbound areas with extensions that match the zone number. The multi-zone outbound areas are in hexadecimal. For example, the outbound area for zone 10 would be C:\BT\OUTBOUND\.00A. Using this method, it is possible to support up to 4,095 zones. Your mail packer also needs to support the discrete outbound areas for multiple zones. oMMM versions greater than 1.30 support them, as well as the MOOO package. oMMM is commonly available wherever BinkleyTerm or Opus-CBCS files are available. MOOO is also available from many such locations. MULTIPLE NETWORK OPERATION Operation of a system within multiple networks is becoming increasingly popular. Normally, networks such as AlterNet, EggNet, RBBS-Net and so on are implemented as separate zones. To facilitate operation of a BinkleyTerm system within multiple networks, you may specify a separate system address, each with a different zone. For example, if you wish to use a different address for FidoNet (currently zones 1, 2, 3 and 4) and for two alternative networks, you might have the following in your configuration file: Address 1:1010/89.0 Address 9:569/999.0 Address 11:334/1.0 If your system connects with a system in zone 9, your system will identify itself as 9:569/999. If connected with a zone 11 system, it will identify itself as 11:334/1. The first 'Address' statement is the default, and callers in zone 1 (and any zones other than 1, 9 and 11 - those specified with 'Address' statements) would find your system identified as 1:1010/89. SECURITY In the ideal world, we would not need locks, police, or jails; there wouldn't be crime. But we don't live in an ideal world, and for this reason, BinkleyTerm offers a selection of features that are intended to offer your system a certain level of security against "electronic mail crime." BinkleyTerm Version 2.30 - User's Guide - Page 36 The existence of security features is not intended to evoke fear. Chances are excellent that you will have no need for security features in most cases. But just as high crime areas see more locks and iron gates than low-crime areas, the choice of how much security to put in place is up to you, and is based on your needs and experience. BinkleyTerm's internal security is based on a simple principle. With the exception of session passwording, for each secured feature (all of which are specified within the configuration file), there is a default statement. When you implement no security features, the default statement is used to specify a particular feature's configuration. Prot When security is implemented, however, two more statements are used in addition to the default. One type of statement, known as "Prot" for "protected," describes a group of systems with which you have implemented session passwording. These links are "protected" by passwords. When session passwording is implemented, unless a password is matched when connecting to a protected system, a mail session is aborted. "Protected" or "Prot" systems are the top-level, or "most favored" situations, since you generally know the other person at the other end (a pre-requisite to establishing a password). Known The second type of statement is called "Known" and describes systems that are listed in the nodelist ("known" to you) but with whom you have not established a session password. These are links with listed systems, but links that are not password protected. This group represents the middle-level of security. Default When you use a Prot and/or a Known security feature, then the default statements all take on a new meaning - that of unknown systems. The defaults are used for links that are not in the nodelist, and therefore, cannot have a session password established. This group of systems represents the lowest-level of security, since you really have no idea who owns such systems, or where they are located. Security - Session Passwording BinkleyTerm supports session-level password protection. Using such protection helps prevent situations where someone uses a FidoNet mailer to 'impersonate' a legitimate FidoNet node, and BinkleyTerm Version 2.30 - User's Guide - Page 37 pickup mail addressed to the node. When implemented, both the sending and receiving systems must have it in operation, with the same password on both ends (exceptions noted below). With Point systems, passwording can be automatic. Simply use the 'BossPwd' configuration file option, and choose a password. Make sure your Boss also uses the same password. For other types of systems, password information is kept in the nodelist data file. ParseLst (and some other nodelist processors) can easily add a password to a nodelist entry during processing. Refer to the documentation for your nodelist processor. When talking with other BinkleyTerm, Opus or compatible systems that use the YooHoo session negotiation method, full, two-way protection is available. The systems connect and exchange the password when the YooHoo takes place. If the passwords do not match, the session is terminated, regardless of who initiated the call. The only exception is when you have a password implemented, but the remote has NO password implemented. In this case, if YOU placed the call, then a session will still occur. If the REMOTE placed the call, then the session will be aborted. When connected with SEAdog and compatible systems, password matching takes place only when you are picking up mail from the remote system. You may send to a SEAdog system without a password match taking place. (The assumption is that you always know who you're calling, but don't always know who's calling you.) Note that session passwords must not exceed eight (8) characters, and are case insensitive. When BinkleyTerm cannot find a password for a remote system when placing a call, it will not check for a password during the session. This responsibility is left to the remote system, if the remote chooses to perform checking. BinkleyTerm allows easy implementation of new passwords. Simply add the agreed upon password as outlined above, and send the remote system a message. BinkleyTerm will allow an outbound session to take place in cases where you have designated a password, but the remote has not yet implemented it. This is handy for letting a remote system know that a password was implemented. Note that in this case, BinkleyTerm will NOT allow the remote to have a successful session when the remote calls your system; only when you place the call (as stated above, the idea is that you know who you're calling, not who's calling you). Security - Secured Inbound File Areas Another method of securing the flow of mail involves controlling the processing of incoming mail to your system. In most cases, BinkleyTerm Version 2.30 - User's Guide - Page 38 you will want to protect common mail links with session passwording, as outlined in the previous section. Still, the potential exists for another abusive system to send you rogue mail, or mail "planted" onto your system in hopes that it will be routed to another system at your expense, or find its way into a national EchoMail conference. The following list shows the various security levels and the configuration file statements that define their respective inbound paths: Prot 'ProtInbound' Known 'KnownInbound' Default 'NetFile' In a typical installation secured in this manner, mail will automatically be processed only if received to the 'ProtInbound' area. Mail received to 'KnownInbound' or 'NetFile' must be examined and processed manually. Of course, you could choose to configure your system in a such a manner that mail received in any of the three areas is processed automatically to your liking, possibly to special message areas. The only "hole" in this is with FSC-0001 sessions, such as those with SEAdog or Fido. Since BinkleyTerm has no way of knowing the address of the sending system until a packet is received, that first packet (.PKT file) will always be placed in the default area specified by the 'NetFile' statement. Secured inbound file areas simply provide another, extra measure of handling potential security problems associated with the reception of "rogue" or "planted" mail. Security - Controlling File Requests BinkleyTerm offers a method of establishing limitations on file requests received from systems that are not session password protected, or are not found in the nodelist. This support is optional; if you do not wish to limit file requests in this manner, use only the files and configuration file statements mentioned in the section "File Requests." The following table lists these possibilities, the file types (as described in the section "File Requests") and the respective configuration file statement used: Prot ABOUT 'ProtAbout' AVAIL 'ProtAvail' OKFILE 'ProtReqList' Maximum 'ProtReqLim' Known ABOUT 'KnownAbout' BinkleyTerm Version 2.30 - User's Guide - Page 39 AVAIL 'KnownAvail' OKFILE 'KnownReqList' Maximum 'KnownReqLim' Default ABOUT 'About' AVAIL 'Avail' OKFILE 'Okfile' Maximum 'MaxReq' Essentially, the default files and configuration file statements described in the section "File Requests" are used for all file requests by default unless a higher "Known" or "Prot" statement is used. Note that all file request controls apply to update requests and function requests as well. Security - Response File Templates Refer to the section "Request Response Files" for information on their operation and use. It is possible to designate separate response file templates for each of the three security levels. Generally, you won't want or need to do this unless security controls on file requests have been implemented. The security levels and their respective configuration files statements for secured response file templates are: Prot 'ProtReqTpl' Known 'KnownReqTpl' Default 'ReqTemplate' BBS INTERFACE One of the most common uses of BinkleyTerm is as a mail front-end for a bulletin board system, or BBS. BinkleyTerm offers three different methods for passing control to a BBS. The method you use is determined by a configuration file statement (refer to the Reference Guide for details). BBS Exit The 'BBS Exit' option will cause BinkleyTerm to exit to the start-up batch file with an errorlevel of the baud rate divided by 100 upon receipt of a non-mail call. For example, a 300 baud caller exits to the batch file with an errorlevel of 3, a 2400 baud caller at errorlevel 24. The batch file then detects the errorlevel, and jumps to a section of the batch file you designate to start the BBS program BinkleyTerm Version 2.30 - User's Guide - Page 40 with the required information. The batch file should recycle and restart BinkleyTerm once BBS use is terminated. BBS Spawn The 'BBS Spawn' option causes BinkleyTerm to stay resident when a caller accesses the BBS. BinkleyTerm will execute the following command as a child process: spawnbbs <baud> <port> <time> <modem_info> SPAWNBBS.BAT is the name of a batch file you create. <baud> is the baud rate of the connection, <port> is the communications port number used for the call, and <time> is the number of minutes to the next non-BBS-allowed event (as designated in your configuration file event schedules). <modem_info> is intended primarily for RBBS-PC installations where extended modem connect information may be desired. For example, USRobotics HST modems might issue the connect message "CONNECT 9600/ARQ" in which case the <modem_info> parameter would be "/Arq" indicating a "reliable" connection. Note that in this parameter, only the first letter of each "word" will be capitalized (as shown in the example). The batch file can use the parameters passed to it with standard DOS conventions. %1 designates the first parameter (baud rate in this case), %2 the second parameter (port number), and so on. Opus might be started from SPAWNBBS.BAT with this command line: opus bbs -b%1 -p%2 -t%3 Refer to the documentation for your particular BBS for the command line information that can be passed to the BBS. The primary disadvantage of the 'BBS Spawn' option is that BinkleyTerm stays memory resident while the BBS operates. This could cause memory availability problems on some systems. Be certain to check the memory requirements of your BBS software. If you choose to use the 'SwapDir' configuration file option, the 'BBS Spawn' option will be workable. Using 'SwapDir' causes BinkleyTerm to leave only a small kernel of itself in memory when performing DOS shells, making available substantially more memory than would otherwise be available. Refer to the Reference Guide section "Configuration File" for additional information. BBS Batch The 'BBS Batch' option uses the best of both of 'BBS Exit' and 'BBS Spawn.' BinkleyTerm still exits to the start-up batch file, but prior to exiting, BinkleyTerm physically writes to the disk a batch file named BBSBATCH.BAT, which contains a single line. An example of BinkleyTerm Version 2.30 - User's Guide - Page 41 the contents of this file might be: spawnbbs 2400 1 47 /Arq The information is the baud rate, port number and time in minutes to the next non-BBS event. In this case, there is a 2400 baud caller, on COM port 1, with 47 minutes remaining to the next non- BBS event, and a modem information string of /Arq. After writing this file, BinkleyTerm exits as does the 'BBS Exit' option, with an errorlevel of the baud rate of the caller divided by 100. The start-up batch file should simply start execution of BBSBATCH.BAT by adding the line "bbsbatch" to the file, and jumping to the line whenever a human caller is on-line. In other words, regardless of the baud rate of the caller, BBSBATCH.BAT should be invoked. Once invoked, BBSBATCH.BAT will invoke SPAWNBBS.BAT with the necessary parameters that include the baud rate, port number, and minute to the next non-BBS event. SPAWNBBS.BAT would physically invoke the BBS with the proper command lines. When use of the BBS is complete, this batch file should re-invoke the BinkleyTerm start-up batch file. Using this 'BBS Batch' method of accessing the BBS, BinkleyTerm can still provide all the information of the 'BBS Spawn' method, without the necessity of staying resident. BinkleyTerm Version 2.30 - User's Guide - Page 42 BBS Batch Method Flowchart The 'BBS Batch' method of accessing BBS software is confusing to many BinkleyTerm users. For further clarification, a flowchart of this method is shown here: +-----------------------+ | Wait for Call | <-------------+ +-----------------------+ | | | v | No +-----------------------+ | Mail <------| Human Caller? | | +-----------------------+ | Yes | | v | 300 +-----------------------+ 1200 | +------| Baud Rate |------+ | | +-----------------------+ | | | 2400 | | 9600 | | +--------+ | | +--------+ | | | | | | v v v v | +-----------------------+ | | Invoke BBSBATCH.BAT | | +-----------------------+ | | | v | +-----------------------+ | | Invoke SPAWNBBS.BAT | | | w/ Parameters | | +-----------------------+ | | | v | +-----------------------+ | | Invoke BBS System | | | w/ Parameters | | +-----------------------+ | | | +---------------------------+ Banner When a file named BINKLEY.BAN is present in the directory that BinkleyTerm is invoked from, the file will be displayed to callers immediately after the BinkleyTerm identification line. The file is a flat ASCII text file, and may contain extended information for the benefit of callers. BinkleyTerm Version 2.30 - User's Guide - Page 43 EXTERNAL MAIL PROGRAMS BinkleyTerm can be used with external mail programs, such as UUCP. When an 'ExtrnMail' statement is used in the configuration file, BinkleyTerm will answer the phone and wait for a YooHoo or TSYNC (the start of a mail session) or a string you designate with the 'ExtrnMail' option. When the designated string is received from the remote system, BinkleyTerm will send the string associated with the 'MailNote' configuration file option (if any), then will physically write a batch file called MAILBAT.BAT to the disk, and exit the start-up batch file with an errorlevel as given with the 'ExtrnMail' statement, or with errorlevel 99 if none was given. MAILBAT.BAT contains a single line: EXTMAIL <baud> <port> <time> <errorlevel> <modem_info> Where <baud> is the baud rate of the caller, <port> is the COM port number, and <time> is the time in seconds to the next non- BBS event, <errorlevel> is the errorlevel number used to exit the original batch file, and <modem_info> is extended modem connect information. <errorlevel> will be the same as that given with the 'ExtrnMail' statement in the configuration file, or "99" if none was given. <modem_info> is intended primarily for RBBS-PC installations where extended modem connect information may be desired. For example, USRobotics HST modems might issue the connect message "CONNECT 9600/ARQ" in which case the <modem_info> parameter would be "/Arq" indicating a "reliable" connection. Note that in this parameter, only the first letter of each "word" will be capitalized (as shown in the example). Notice the similarity in concept between this and the 'BBS Batch' method of invoking a BBS (as described previously). When BinkleyTerm exits with the previously defined errorlevel, your batch file must capture the errorlevel and invoke MAILBAT.BAT, which will in turn invoke EXTMAIL.BAT with the various command line parameters shown above. EXTMAIL.BAT is then used to invoke the external mail program of your choice, taking the needed command line parameters as supplied by the batch file, and processing and/or using them as needed. Once the external mail program session has been completed, your original start-up batch file for BinkleyTerm should be invoked to place BinkleyTerm on-line again. USER-SELECTED BBS FUNCTIONALITY An additional use for the external mail functionality described in the previous section would be to allow multiple BBS systems to reside at the same telephone number, and to give BBS users the BinkleyTerm Version 2.30 - User's Guide - Page 44 ability to select the desired BBS from a menu. It would be possible to run completely separate systems, to run the same system with different BBS packages, and so on. This section will give an overview of the procedure. Basically, 'ExtrnMail' statements in the configuration file are used to build the menu options themselves. If you want to exit to the batch file when a user presses 'A' on their terminal, then a configuration file entry like this would be needed: ExtrnMail 130 A This would cause BinkleyTerm to write MAILBAT.BAT to the disk, and exit to the batch file with an errorlevel of 130. As described in the previous section on external mail programs, your batch file should invoke MAILBAT.BAT, which in turn invokes EXTMAIL.BAT. EXTMAIL.BAT would be the batch file that acts upon the choice, and physically invokes the desired BBS program. If you want the choices to be case-insensitive, then two 'ExtrnMail' statements would be needed for each letter, like this: ExtrnMail 130 A ExtrnMail 130 a This would cause BinkleyTerm to use errorlevel 130 when either 'a' or 'A' is received from the user. The menu presented to users should be kept in a file called BINKLEY.BAN (refer to the "Banner" section for more information). This file might look like this: Welcome to Multi-System 100. Please choose the desired BBS: A - "Garden Central" Using QuickBBS Software B - "Margarita Bay" Using Opus-CBCS Software C - "Margarita Bay" Using Fido 11w Software Make your selection by letter... Such a menu would allow users three options. Each lettered option would require a separate 'ExtrnMail' statement in the configuration file; two each if case insensitivity is required. The string "Make your selection by letter..." is NOT contained in BINKLEY.BAN, but rather, is added with a 'Banner' statement in the configuration file so that the line is re-displayed each time a user makes an incorrect choice (refer to the Reference Guide section "Configuration File" for information). Once the user has made a selection, and MAILBAT.BAT is invoked and in turn EXTMAIL.BAT is invoked, then the batch file must determine which selection is made and act upon it. BinkleyTerm Version 2.30 - User's Guide - Page 45 In EXTMAIL.BAT (where the BBS systems are invoked), the top of the batch file should make a determination as to which choice was given by the user. One of the parameters on the command line when EXTMAIL.BAT is invoked by MAILBAT.BAT is the errorlevel which corresponds to the choice the user gave (as designated by an 'ExtrnMail' statement in the configuration file). A section of the batch file might look like this: if %4 == 130 goto bbs1 if %4 == 140 goto bbs2 if %4 == 150 goto bbs3 The fourth parameter given on the command line is the errorlevel value, and is reference by "%4" as shown. For example, if the errorlevel that corresponds to the choice was 130, then batch file execution would jump to the "bbs1" label, and invoke a particular BBS program. Please note that the default is for a user to press the "escape" key to enter the BBS. One of the BBS systems should be setup as the default system as described in the section "BBS Interface." Should a user press "escape," or if the time limit to make a response should expire, the default BBS would be invoked. Note also that the configuration file parameter 'Timeout' should be extended to allow a user more time to read and make a selection prior to making a default exit. A 'Timeout' value of 30 to 60 seconds is suggested. Placing multiple BBS systems on-line at one number takes some work and experimentation in order to operate correctly. Hopefully the tips given here will point you in the right direction. FILE REQUESTS BinkleyTerm supports the two popular file request methods currently in use in FidoNet; "Bark" requests as designed for and used by SEAdog, and "WaZOO" as designed for and used by Opus- CBCS. Either style can be used on an incoming or outgoing basis. To generate an outgoing file request, use one of the many utilities designed for the purpose, such as AMAX, Please, oGet, tGet, etc. Any Opus-compatible file request builder can be used with BinkleyTerm. You may also manually build file requests. They are a single-line flat ASCII text file, and are named in the same manner as packets (refer to the section "How BinkleyTerm Handles Mail" for information on the naming convention) and have a file extension of .REQ. Outgoing requests NEVER should have a drive and path designation; only the file name. The remote system handles the drives and paths. BinkleyTerm Version 2.30 - User's Guide - Page 46 The .REQ file is placed in your outbound holding area. BinkleyTerm will handle .REQ files in the same manner as it does Normal packets (unless an 'X' flag is applied to an event), but you can also manually poll to send the request immediately. Incoming requests are controlled and affected by four files, each of which are designated in the configuration file. The first file, OKFILE, is a machine-read listing of files, complete with drive and path, that you will allow to be sent to remote systems via file request. The file is designated with the 'Okfile' statement in the configuration file. Wildcards are allowed, and nearly always used. When an incoming request is received, the request is checked against the OKFILE to see if you permit the file to be sent. The OKFILE also allows you to implement "magic filenames" which are words used to represent a file. If someone requests "BINKLEY" from you, for example, you could set-up your OKFILE in such a way as to send BEXE_150.ARC in return. This frees the person making the request from having to know the exact filename of the file he wants. This is generally used by systems which are software distribution points, hubs, and so on. Password protection may also be implemented with the OKFILE, making a password required in order to receive a particular file or group of files. A sample OKFILE: b:\aprog.ARC c:\file\stuff\*.* c:\file\programs\wlc*.txt c:\file\private\*.* !mypass @BINKLEY c:\file\dist\bexe_150.arc @MYEDIT !outpass c:\file\private\editmax.arc The first line gives an exact filename. The second and third lines show the use of wildcards. The fourth line shows password protection, with an exclamation point (!) followed by the password. The fifth line shows a magic filename, an 'at' symbol (@) followed by the magic filename, followed by an exact drive, path and filename designation. The sixth line shows a magic filename with password protection. Note that in all cases, a password (if any) is always the second argument in an OKFILE entry. The next special file is the AVAIL file, and is designated by the 'Avail' statement in the configuration file. When someone requests the magic filename "FILES" BinkleyTerm will send this file. It is a list of the files you have available for request, in human readable form. This is a flat ASCII text file, and should feature the name of the file, and usually its size in BinkleyTerm Version 2.30 - User's Guide - Page 47 bytes and a short description of the file. There are utilities available that can construct this file automatically based on your BBS system's internal listings. Of course, it could also be manually created. The next special file is called the ABOUT file, and is designated by the 'About' statement in the configuration file. When someone makes a request for the magic filename "ABOUT" or when someone makes an invalid WaZOO file request, this file is sent by BinkleyTerm. It normally contains a short advertisement about your system, as well as a notification that the calling system could possibly have made an invalid request. Again, this is a flat ASCII text file in human-readable form. The ABOUT file is sent only on failed WaZOO requests. The file is NOT sent on failed Bark requests. Finally, the last item that applies to file requests is the 'MaxReq' statement contained in the configuration file. A quantity is given with the statement which allows you to designate the maximum number of files that will be sent during one file request session. Refer to the Reference Guide section "Configuration File" for more information. It is possible to limit incoming file requests based on some basic criteria. For information, refer to the section "Security - Controlling File Requests." UPDATE REQUESTS Update requests are a method of obtaining an "update" of a file you already have, from another system you believe to have a newer copy. They differ from file requests in that when you construct an update request, you include a drive/path/file specification that points to an existing file on your system. Generally, DOS wildcards are acceptable. When BinkleyTerm connects with the desired remote, it will compare the date and time stamp on your copy of the file(s) to the date and time stamp of the same-named file(s) on the remote system. If the remote system has a newer copy of a given file, it will be sent. If it does not, no file will be sent. Note that the drive and path specification DO NOT need to be the same on the remote system; the drive and path you give refer only to YOUR copy of the file. The remote may have any file structure he or she desires. Update requests were originally implemented in SEAdog, a mailer from System Enhancement Associates, Inc. In addition to supporting update requests with SEAdog systems, BinkleyTerm implements a newly defined WaZOO update request for use other BinkleyTerm systems, or other mailers that support WaZOO update requests. Update requests are most commonly used now to handle GroupMail, a new method of sharing message areas developed by System BinkleyTerm Version 2.30 - User's Guide - Page 48 Enhancement Associates, Inc. GroupMail generally requires update request capability on both ends of the connection. Like file requests, update requests are kept in .REQ files in your outbound area. In fact, a combination of update and file requests can be contained in the same physical .REQ file. An update request entry contains a filename, as well as a date and time code that corresponds to the date and time stamp of the file on your system. Because the date and time code is in a special format, it is not recommended that you attempt to create an update request entry yourself. At this writing, the oMMM mail packer (version 1.30 or higher) and the AMAX outbound utility (version 2.10 or higher) both support the creation of update requests in the manner that BinkleyTerm requires. Refer to the documentation for those programs for additional information on creating update requests. Certainly other utilities will eventually have this ability as well. Please note that in order for update requests to work, the remote system must have the file you want updated available for regular file request. You cannot update a file that would not otherwise be available for file request from the remote system. REQUEST RESPONSE FILES Incoming file and update requests are not always successful. BinkleyTerm supports the ability to dynamically generate a "response file." This file is a plain text file, built "on-the- fly" during a session, and sent in response to a failed (or optionally, a successful) file or update request. If you choose to implement request response files, the "about" file designated in your configuration file will no longer be sent. See "File Requests" for more information. Note that when a response file is sent, it is counted against the maximum number of file sent in response to a request, as designated by the 'MaxReq' statement in the configuration file. See "File Requests" or the Reference Guide section "Configuration File" for more information. The content of the response file is configured by you with a template file. The template file name is designated by the 'ReqTemplate' configuration file statement. As with file requests, you can also implement security controls with the request templates. See "Security - Response File Templates" for more details. Normally, the response file contains information such as the date and time the request was made, what file was requested, and why the request failed. You may wish to include information such as the times your system accepts requests, what magic filenames you support, and so on. BinkleyTerm Version 2.30 - User's Guide - Page 49 Response files are named similar to outbound packets or request files. They are <net><node>.RSP, where <net> is a net number, and <node> is a node number. Both <net> and <node> are four- digit hexadecimal number with leading zeroes. A sample response file template, SAMPLE.TPL, is included with the BinkleyTerm distribution package. Use this sample as a starting point for your own response file template. The complete list of possible verbs for use in the response file can be found in the section "Response File Template" in the Reference Guide. FUNCTION REQUESTS Two additional special entries may be included in the OKFILE that operate similar to magic filenames. Called "magic" function requests, they allow an incoming request to trigger the operation of a program. $ Function Requests The first style uses a dollar sign ($) in the first column of an OKFILE entry, followed by a function request name. If the name is matched, then the command after the password (if any) is executed. In addition, two arguments which correspond to the net and node number of the calling system can be sent if desired by adding "%d %d" to the end of the OKFILE entry. For example: $INFO INFO.BAT %d %d If an incoming file request is for "INFO" then the program INFO.BAT would be executed, and it would receive two command line arguments that correspond to the net and node number respectively. For instance, if 141/491 requested "INFO" then the following would be issued to DOS for execution: INFO.BAT 141 491 Another example of such an OKFILE entry would be: $CLEANUP !mypass CLEANUP.BAT %x %x In this case, a password is included as the second argument of the line, and must be matched by the incoming request in order for the program to be executed. Note also that in this example, "%x %x" was used, and would cause a hexadecimal representation of the net and node number to be sent as command line arguments to the program being executed. In our example, if 104/36 requests "CLEANUP" with a password of "mypass" then the following would be sent to DOS for execution: CLEANUP.BAT 68 24 BinkleyTerm Version 2.30 - User's Guide - Page 50 See "Function Request Notes" below for additional function request information. + Function Requests A second type of function request is also supported, and is designated by a plus sign (+) in the first column of an OKFILE entry. In this case, if the filename and optional password are matched, then the entire line from the incoming .REQ file is passed to DOS for processing, with the <zone>:<net>/<node> address appended as individual arguments to the command line. An example of an OKFILE entry might be: +GETREV !mypass If an incoming .REQ file from 141/491 contained the line: GETREV !mypass BT 1.50 Then the following would be passed to DOS for execution: GETREV !mypass BT 1.50 1 141 491 A program called GETREV would be executed, and would need to process or filter the command line as needed. Function requests are convenient for allowing a remote system to have a batch file or utility of some kind (not included) place a particular file on hold for a node for later pickup, to cause the system to send a particular file, to trigger some other sort of function or activity remotely, etc., etc. If a program called as part of a function request creates a file in the appropriate outbound area called <net><node>.QLO (where <net> and <node> are 4-digit hexadecimal numbers with leading zeroes), BinkleyTerm will treat this file as a legitimate "flow" (file attach) file and send the file(s) listed in it back to the caller as part of the request logic. Function Request Notes If a function request triggers a program or batch file to build a file attach (flow) file, then BinkleyTerm will process the file attach during the current session. In other words, if a file attach is generated during a function request, then the file(s) shown in the file attach will be sent during the current session. Note that the normal logic for the handling of .HLO (Hold file attaches) still applies; i.e., file(s) designated within a .HLO file will be sent only when the destination node polls for pick- up. BinkleyTerm Version 2.30 - User's Guide - Page 51 A WORD ABOUT POINT NETWORKS BinkleyTerm is well suited to the task of being a "boss" (or host system) of a point network. Points are essentially a "system under a system" and allow the point operator to have limited access to the network without the normal requirements of keeping a system on-line at certain hours. Since point addressing is not part of the FidoNet standard at this time, certain "kludges" must be used in order to handle a point network. Essentially, the process involves using a private network address, and assigning node numbers to the points under the boss. For example, 1:104/36.17 (point #17 off of node 104/36) might actually be assigned 1052/17 for the purpose of transacting mail with the boss. For reference purposes the point is 1:104/36.17, but mail is actually held for 1052/17 to pick-up, and the point must call as 1052/17. Often times, private point addresses will make their way into EchoMail "SEEN-BY" lines. This could cause problems down the line if another system uses the same private address. For this reason, IT IS RECOMMENDED THAT YOUR PRIVATE NETWORK ADDRESS BE ASSIGNED BY THE INTERNATIONAL COORDINATOR. The International Coordinator requests that you adhere to this recommendation, and contact him directly for a private network number assignment. As a boss node, you may then use the network address to assign your points their own node address in the private net for the purpose of transacting mail. The International Coordinator can be reached at 1:1/0. To receive a private net number, the information that follows is needed. All information will be held in confidence, but is needed in case the International Coordinator needs to get a hold of the private net administrator. As soon as this information is received, the International Coordinator will issue a private net number: - Name of the Private Network Administrator - Name of the Private Network (if any) - Mailing Address - Voice Phone - Data Phone - FidoNet Node (if any) - Alternate E-Mail Addresses (i.e., Usenet, Bitnet, MCI Mail, Telex, etc., if any) Your cooperation in obtaining an assigned private network number for use on point networks will help ensure network integrity. BinkleyTerm Version 2.30 - User's Guide - Page 52 +-------------+ | +---------+ | | | Section | | BinkleyTerm User's Guide | | 4 | | PROBLEM SOLVING | +---------+ | +-------------+ BINKLEYTERM SUPPORT Since BinkleyTerm is a product which is "free for the asking" you cannot expect a toll-free software support line (as much as we may want to provide you with one). The primary means of support is the BINKLEY EchoMail Conference. This conference is carried worldwide via FidoNet. Contact your EchoMail Coordinator or Hub for information on hooking into the conference, or finding a system that you can use to participate in the conference. The conference is monitored and read by the BinkleyTerm authors and beta testers. A secondary source of support is provided by BinkleyTerm HELP, Shawn Stoddard, at FidoNet 1:1/102.0. If you have an urgent question, or are unable to hook into the BINKLEY EchoMail Conference, send a NetMail message to BinkleyTerm HELP. Replies are issued as time and resources allow, so please be patient. TROUBLESHOOTING 3,000 pages of documentation would not entirely eliminate the potential for problems with the installation and operation of BinkleyTerm. Due to the wide variety of hardware and software configurations that BinkleyTerm may be used with, as well as the varying levels of experience of the BinkleyTerm user, problems will sometimes occur. This section attempts to present common problems and possible solutions. If there is not a solution to your problem presented here, please read over the appropriate sections of the manual again. If you still are having difficulty, place a message in the BINKLEY EchoMail conference, or contact BinkleyTerm HELP at 1:1/102. Baud Rate Locking Trouble Do not use BinkleyTerm's 'LockBaud' configuration file statement. Lock the baud rate of your FOSSIL instead. Outward Dial Aborting Many people installing BinkleyTerm mistakenly use the 'Suffix' option in their configuration file. Unlike most communications programs, BinkleyTerm by default adds a carriage return to the end of the dial string. 'Suffix' is used to add instructions to the end of the phone number, but BEFORE the carriage return. By adding a carriage return code (pipe symbol, |) with the 'Suffix' BinkleyTerm Version 2.30 - User's Guide - Page 53 statement, you are essentially telling BinkleyTerm to send TWO carriage returns, yours, plus the default. With most modems, this will immediately abort the dialing process before it even gets started. In nearly all installations, the 'Suffix' statement WILL BE COMMENTED OUT. If deleting the 'Suffix' statement does not fix the problem, you may also try adding the 'NoCollide' and/or 'SlowModem' statements to the configuration file. Refer to the Reference Guide section "Configuration File" for more details. False Call Collision Reports In some installations, BinkleyTerm may abort the dialing process due to an incoming call, even when there is no incoming call. This is probably due to the modem reporting "RING" on both incoming and outgoing calls. Use the 'SameRing' configuration file option to partially disable the call collision feature; use the 'NoCollide' option to totally disable the feature. FOSSIL Driver Compatibility Problems The two most popular FOSSIL drivers in use with BinkleyTerm are Ray Gwinn's X00 and Bob Hartman's OpusComm, both of which are for the IBM PC and close compatibles. If one of the drivers fails to work correctly in your installation, please try the other. BinkleyTerm Will Not Recognize Node Addresses You have not compiled the nodelist correctly. Use ParseLst to compile a fully-zoned Version 6 nodelist for your system. To do this, make sure the following statements exist within your ParseLst configuration file: UseZone, Complete (or Gated), and Version6. TBBS Difficulty - BinkleyTerm Runtime Errors When used with TBBS, BinkleyTerm must be renamed MAILER.EXE. Since BT.EXE uses overlays to provide more efficient memory usage, it CANNOT be renamed. TBBS users should be certain to use BTBIG.EXE, the non-overlay version, on their systems, renaming it to MAILER.EXE before use. Some TBBS Sysops have patched TBBS.EXE to invoke BT.EXE, which allows them to use the overlaid version. While if this is done correctly it will probably cause no problems, we cannot recommend this course of action. DOS Shell Not Working Correctly BinkleyTerm is developed under Microsoft C. The MSC routines do not use COMSPEC to find COMMAND.COM, which is needed to perform a DOS shell or child process. COMMAND.COM must be found on the DOS path. Refer to your DOS documentation for information and BinkleyTerm Version 2.30 - User's Guide - Page 54 instructions regarding COMSPEC, and the SET PATH command. Zone Support Does Not Operate Correctly Chances are excellent that you have not compiled the nodelist correctly. Although the actual entries for nodes in other zones do not need to be included in the compiled nodelist files, what are called "zone identifiers" DO need to be included in order for zone support to work. See the section "Nodelist" for more information on correct compilation of a nodelist. Another item to check is that outbound areas are created for the other zones to which you want to send mail. See "Zone Support" for information on how outbound areas for other zones are constructed. Date Rollover Problem BinkleyTerm keeps schedule information in binary form in a file named BINKLEY.SCD. If for some reason the file is newer than the current date and time, BinkleyTerm will report "Date Rollover Problem?" as this condition is usually indicative of a problem with DOS rolling the date over at midnight properly. If there appears to be no difficulty with date rollover, delete the BINKLEY.SCD file, and allow BinkleyTerm to contruct a new one the next time it is invoked. A date rollover problem sometimes does exist with certain versions of DOS. If the problem persists, a DOS upgrade may be indicated. GLOSSARY AMAX The name of a BinkleyTerm utility by Alan Applegate that handles various outbound mail manipulation functions. ARCmail Simply archived mail packets, processed with an ARC- compatible utility. Typically used to forward EchoMail messages due to the file compression inherent in the archiving process. Naming conventions correspond to a generally accepted method. See 'Mail Packet.' BBS An electronic bulletin board system. A method of communicating and sharing files with others by computer. Typically operated by hobbyists, free-of-charge. Carrier Detect A serial port line that is brought "high" (raised, given a "true" logical value) when carrier is present on the line, e.g., when the modem is connected to another modem. BinkleyTerm Version 2.30 - User's Guide - Page 55 The modem raises and lowers this line. CD See "Carrier Detect." Compressed Mail Mail that has been compressed or "archived" with any one of several archiving utilities. Such mail is also known as ARCmail, ZOOmail, PAKmail, etc., depending on which archiving utility was used to compress the mail. ConfMail The name of a mail processing program by Bob Hartman for use in the Opus or Fido environments, or any other environment that uses a compatible message base. Continuous Mail A capability of a particular system to accept mail at any time of day, as opposed to being required to accept it only during certain pre-scheduled times. D'Bridge A commercial FidoNet mailer written by Chris Irwin. Data Terminal Ready A serial port line that is brought "high" (raised, given a "true" logical value) when the local terminal is ready for communications. A serial device (in our case a modem) connected to the serial port uses this line to detect whether the terminal (your PC and BinkleyTerm) are ready for communications activities. Normally, bringing the line "low" (lowering, giving a "false" logical value) causes a modem to disconnect from the telephone line. BinkleyTerm raises and lowers this line. DTR See "Data Terminal Ready." Dutchie A FidoNet mailer written by Henk Wevers. Dynamic Event A system event (see "Event") that stops when particular BinkleyTerm Version 2.30 - User's Guide - Page 56 conditions (lack of mail of a certain type to be sent) are met. EchoMail A system devised by Jeff Rush for the automated sharing of message areas between systems, whereby messages are "echoed" from one system to another. Also known as conferences or EchoMail conferences. Errorlevel The name of a DOS environment variable; contains a value returned by a program on exit that indicates a certain pre- defined condition. Event A system occurrence at a pre-configured time, day-of-the- week, and/or date. Normally system limitations such as when to dial long distance are dependent on system events. Fido The original implementation of FidoNet and FidoNet protocol; a BBS software package. FidoNet The name of the original network that used FidoNet protocol, as designed by Tom Jennings. FidoNet Protocol A method of electronic mail transfer designed by Tom Jennings, as documented in the Fido Technical Standards Committee document FSC-0001. File Request The ability and associated methods of using extended FidoNet protocol to obtain a particular file automatically from one FidoNet system to another. FOSSIL Driver FOSSIL is an acronym for Fido/Opus/SEAdog Standard Interface Layer. Since not all computers capable of running MS-DOS are hardware compatible with the IBM PC, communications software typically written for the IBM PC may not operate on machines such as the DEC Rainbow, Sanyo 555 or Heath/Zenith 100. The FOSSIL provides a consistent manner for a communications BinkleyTerm Version 2.30 - User's Guide - Page 57 program to access the communications ports, keyboard and screen. The FOSSIL is typically installed at boot-time, either as a device driver or as a program. The driver MUST be installed prior to running any FOSSIL compatible software, BinkleyTerm included, or an error message will be generated, and the program will abort. FOSSIL drivers are normally available from systems that distribute Opus-CBCS and/or BinkleyTerm software. Examples of FOSSIL drivers are: OpusComm by Bob Hartman for the IBM PC and close compatibles, X00 by Ray Gwinn for the IBM PC and compatibles, and DECCOMM by Vince Perriello for the DEC Rainbow. FrontDoor A FidoNet mailer written by Joaquim Homrighausen. FSC001 In BinkleyTerm, an abbreviation that indicates that a mail session corresponding to the FSC-0001 standard is in use. FSC-0001 is a standards document written by the FidoNet Technical Standards Committee. GroupMail A method of sharing message areas devised by System Enhancement Associates, Inc., similar to EchoMail, except that responsibility for obtaining mail is placed on the receiving system, not the sending system as with EchoMail. Based on usage of update requests. Hold Area See "Outbound Area." Inbound Area Also known as the "NetFiles" area, this is a special sub- directory set aside for the acceptance of incoming mail or files from other network systems. Mail Packet A unit of mail as defined in the FidoNet Technical Standards Committee document FSC-0001. Mailer A program that acts as a FidoNet-compatible mail handler, using FidoNet protocol. Normally, a mailer answers the phone, accepts and/or sends mail, and possibly passes human callers on to a BBS. BinkleyTerm Version 2.30 - User's Guide - Page 58 msged An Opus/Fido compatible message reader/editor by Jim Nutt. Net A subset of a FidoNet compatible network, usually a collection of nodes within a metropolitan area. NetFiles Files received from other systems in the network; also a special sub-directory set aside for the reception of such files. NetMail Person-to-person mail sent through the network. Network As it applies to BinkleyTerm, a collection of nodes that are FidoNet compatible, such as the FidoNet network itself, or others such as EggNet, AlterNet, RBBS-Net, etc. Also, a division of a full network. See "Net" above. Node A FidoNet compatible system, represented by a node address, and listed in a nodelist. Nodelist A listing of FidoNet nodes. oMMM A packing program (packer) originally designed for Opus- CBCS, but now widely used with BinkleyTerm. Opus-CBCS "The Opus Computer Based Conversation System," a BBS designed by Wynn Wagner III. Uses ".MSG" message base (compatible with Fido BBS program). Contains built-in FidoNet compatible mailer. Outbound Area Also known as the "Hold Area," this is a special sub- directory set aside specifically for holding mail waiting to be sent to or picked-up by its destination. BinkleyTerm Version 2.30 - User's Guide - Page 59 Packer A program that processes mail entered on a system, and prepares it for sending by the mailer. Packet Within FidoNet, a message unit conforming to FSC-0001 specifications. With file transfer protocols, a block, or "piece" of the file transfer. Normally a pre-determined size in bytes. Point A point is an extension of a regular, fully qualified FidoNet node. The term is derived from the node address format, 1:104/36.2 for example, where 1 is a zone, 104 a net, 36 a node, and 2 is the point. Primarily, Points are intended to provide an method of participating in EchoMail conferences in an off-line state. The conferences are packed and held for the Point system by the Boss, a system which carries the desired conference(s) and is willing to route them to the Point. The Point system 'polls' the Boss for the conferences, which are unpacked and read off-line on the Point system. Responses are packed and sent to Boss in much the same manner as is done by regular FidoNet nodes. Generally, Points never interact with regular nodes, only with their Boss, since Point systems are not listed in the FidoNet nodelist. QuickBBS A BBS program designed by Adam Hudson, which uses configurable menuing and a database-style message base. Requires mail processing software designed specifically for its message format. Region A subset of a FidoNet compatible network, a collection of nodes within a broad geographical area. With regard to FidoNet addressing, a region is handled the same way as a network. With regard to operational infrastructure, this is a higher level than a net. Scan Usually associated with EchoMail processing, "scanning" is the process of taking new messages from a form usable by a BinkleyTerm Version 2.30 - User's Guide - Page 60 BBS program or message editor and preparing them for sending via the network by placing them in standard packet and/or compressed mail format. SEAdog A commercial FidoNet mailer by System Enhancement Associates, Inc. SEAlink A variant of Xmodem, a robust file transfer protocol featuring sliding windows, good error trapping and extended file information. Superior to Xmodem for use on difficult or satellite connected links. Sirius An Opus/Fido compatible message reader/editor by Bob Klahn. Sysop System operator; the person who operates a BBS, and/or the operator of a FidoNet node. TBBS A commercial BBS software package by eSoft, Inc. Telink An Xmodem variant, a file transfer protocol that is essentially Xmodem with a file information packet. Terminal Mode A BinkleyTerm mode within which the software may be used for manual, direct connections with remote modem-equipped computers. Toss Usually associated with EchoMail processing, "tossing" is the process of unpacking compressed mail into a form usable by a particular BBS program or message editor. TSYNC A signal sent to a FidoNet system from another FidoNet system attempting to pass mail traffic. TSYNC is essentially a "handshake" between the sending and receiving systems to synchronize the mail session. BinkleyTerm Version 2.30 - User's Guide - Page 61 Unattended Mode A BinkleyTerm mode within which FidoNet electronic mail may be sent or received. Undialable A term for nodes which will no longer be called automatically by the system until manually reset. The result of excessive unsuccessful connections with the remote system in an attempt to send mail. Unpacker A mail processing program that takes mail as received (compressed mail and/or packets) and places it into a form usable by a given type of BBS program or message editor. Update Request The ability and associated methods of requesting only a newer copy of a file located on one FidoNet system, if a newer copy exists, from another FidoNet system, using extended FidoNet protocol. VFOSSIL (Video FOSSIL Driver) A standard resident driver that allows a software program to access display hardware in a consistent manner regardless of hardware compatibility. This is an extension of the FOSSIL driver, and may not be supported by all FOSSIL drivers at this time. A VFOSSIL allows much faster access to the video display hardware than a FOSSIL driver alone would support. WaZOO An open architecture method of electronic mail transfer designed by Wynn Wagner, and originally used with Opus-CBCS. Various protocols can be used under WaZOO, including ZedZap, a slightly modified Zmodem, and DietIFNA, a SEAlink method. See 'YooHoo.' Xmodem One of the first of its type, a file transfer protocol designed by Ward Christensen. Although technologically behind other newer, more robust protocols, Xmodem is the most widely supported and implemented file transfer protocol in dial-up use. YooHoo A method of mail transfer session negotiation which determines if the remote system is capable of handling BinkleyTerm Version 2.30 - User's Guide - Page 62 WaZOO. FidoNet systems that do not support WaZOO will simply disregard the YooHoo; systems capable of supporting it will answer affirmatively, and a WaZOO session will be initiated. See 'WaZOO.' YooHoo is defined in the Fido Technical Standards Committee document FSC-0005. Zmodem A robust streaming file transfer protocol featuring advanced error recovery techniques, variable packet sizing, good error detection and extended file information. Extremely efficient, yet complex. Highly effective with difficult connections. Zone A large geographical sub-division in the network, the highest level of the accepted FidoNet addressing scheme. Broad areas such as continents are given zone designations. Also used to specify a particular alternate network. ZOOmail Simply archived mail packets, processed with the ZOO utility. Typically used to forward EchoMail messages due to the file compression inherent in the archiving process. Naming conventions correspond to a generally accepted method. See 'Mail Packet.'
Comments
Post a Comment