[comp.sys.apple] misc

PGOETZ@LOYVAX.BITNET (03/01/88)

Miscellaneous stuff:

Crack:
Odyssey: The Compleat Apventure
Synergistic Software
recently on Softdisk

   When I bought my Apple (early 1980), Odyssey and Zork I were the best games
available.  But you couldn't play Odyssey without Integer BASIC or 64K, so I
never did until Softdisk put it on a disk in Applesoft ($10 - $5 coupon if you
are a Softdisk contributor).

   The game is still fun, but just too hard. I needed help. Like my drill
sergeant said, "If you ain't cheating, you ain't trying." To cheat I had to
defeat Softdisk's wimpy protection.

   Anyway, if you have Demuffin Plus:
1. Initialize a disk.
2. Write a sector starting with 01 AD E8 C0 4C 59 FF or something to stop
the drive & halt bootup to T0 S0.
3. Boot Odyssey.
4. Put in the noboot disk & press reset. It will load T0S0 to $800-8FF, but
won't overwrite the protected DOS.
5. *2000<9000.BFFFM     Move DOS out of way
6. Boot normal disk.
7. ]BLOAD DEMUFFIN PLUS,A$803
8. ]CALL-151
9. *9000<2000.4FFFM     Move protected DOS back
10. *803G
11. Copy all files to blank disk with wildcard =.

To cheat, interrupt the program at any point with a ctrl-C, change variables
(ie FM = men, BG & BI & Bsomething else control inventory)

][e price: $500 sounds like a reasonable price for a IIe system, since a new
   IIe system costs about $750 and a Laser 128 about $350 (I think.)
   But why get a IIe?

Wildcard transfer: Alan & Valerie Floeter published a patch to DOS 3.3
   which allows the use of wildcards in all file operations, on p. 120-123 of
   Nibble Vol. 4 No. 4 (1983).

Fractals: Yes, you can use fractals in arcade games, or so the people at
   Lucasfilm? Software who wrote Eidolon & Rescue from Fractalus or something
   like that claim.

Preemptive multitasking: The Apple II, let us remember, is as fast as the
   original IBM PC. The IIgs is 3.5? times as fast. It is certainly fast
   enough. I don't think speed is the problem. The big problem is that
   you can't write a program which will generate interrupts on the II
   (can you on the IIgs?) There is a 1-wire hardware mod that will cause
   the apple to generate 60 interrupts or so per second, I think it was in
   Micro about 4 years ago.

Write protection: It is hardware. You CANNOT write to a write-pro:{ected disk.
The fellow who said you could was probably think of protected disks, which are
different.
   I modified my Apple 5 1/4 drive so I can override the write
protection or pretend a disk is write protected. I can post schematics
if anyone is interested, but not for a few weeks.

Phil Goetz

laba-4an@web2e.berkeley.edu (Andy McFadden) (03/07/88)

>Article 4846 of comp.sys.apple:
>From: PGOETZ@LOYVAX.BITNET

Miscellaneous stuff:

>Crack:
>Odyssey: The Compleat Apventure
>Synergistic Software
>recently on Softdisk

How about a subscription to COMPUTIST?  Probably a more appropriate place
for this sort of thing than comp.sys.apple...

COMPUTIST
Subscription Department
PO Box 110846-T
Tacoma, WA 98411

Features copy protection removal for Apple II's, some Mac stuff, and (recently)
an occasional IBM program.  Also has program modifications, cheats, and the
usual character editing/map listing programs.  Subscriptions are $32/year.

>Preemptive multitasking: The Apple II, let us remember, is as fast as the
>   original IBM PC. The IIgs is 3.5? times as fast. It is certainly fast
>   enough. I don't think speed is the problem. The big problem is that
>   you can't write a program which will generate interrupts on the II
>   (can you on the IIgs?) There is a 1-wire hardware mod that will cause
>   the apple to generate 60 interrupts or so per second, I think it was in
>   Micro about 4 years ago.
>Phil Goetz

On the //gs, you can generate interupts at 1 seconds intervals, 1/4 second,
1/60 second, or on each scan line.  All from software.  That should be
enough.

-- 
(One of these days, I'll settle on a REAL .signature)

mkao@crash.cts.com (Mike Kao) (03/14/88)

I think comp.sys.apple is a FINE place for talk about copy protection. I mean,
why do people speak of deprotection as a taboo? It's perfectly legal!

-- 

To insure my reception of any replies, please respond via e-mail. Thanks!

                                                                  -- Mike Kao

UUCP: {cbosgd, hplabs!hp-sdd, sdcsvax, nosc}!crash!pnet01!mkao
ARPA: crash!pnet01!mkao@nosc.mil
INET: mkao@pnet01.CTS.COM

laba-4an@web7b.berkeley.edu (Andy McFadden) (03/15/88)

>I think comp.sys.apple is a FINE place for talk about copy protection. I mean,
>why do people speak of deprotection as a taboo? It's perfectly legal!
>
>-- 
>
>To insure my reception of any replies, please respond via e-mail. Thanks!
>
>                                                                  -- Mike Kao

It's not taboo.  I just feel that it belongs elsewhere.

Most deprotection stuff can be found on BBSs, magazines (I gave one a while
back; there may be another one called the "Software Protection Digest"
laying around here somewhere), or sold as text files on disk.  Anyone who
is really interested should look there.

I would like to see this newsgroup be used to discuss current Apple //
products, problems, and questions; if I want to read about someone's latest
"warez" (or similarly misspelled items) I will look in an appropriate place.

Incidentally, "talk about copy protection" is different from "give methods
for defeating copy protection".  The former belongs in a philosophical
newsgroup, while the latter belongs elsewhere.

					- Andy

-- 
"Wise man say: be wary of fony phreaks."

PGOETZ@LOYVAX.BITNET (03/16/88)

Tramp: The Apple III and the Lisa are two entirely different computers. Which
  do you mean? The III came with a II emulator program (it could only
  emulate a 48K II, I think).

Craig Williamson: I bought a keyboard & case combo for my II+ from Jameco (I
  think) which I really like.  It has full lowercase, extra characters like
  _\[]{}, a numeric keypad which I never use, and ROMed-in macros (ie
  ctrl-; or something is CALL-151, ctrl-2 is CATALOG). It has both autorepeat
  (like the IIe) and a repeat key (like the II+). The repeat key repeats
  twice as fast as a standard Apple, a great help if you do any Applesoft
  programming (I don't know how Apple got away with such a lousy editor;
  the Commodore PET 2001 did full-screen editing in 1976 or 77).
  Keyboard & case cost around $90? about 3? years ago.

Andy McFadden: I, too, think info-apple is a fine place to talk about
  specific methods for deprotecting Apple software. It is an Apple forum,
  for everything relating to Apples. And copy-protection teaches you many
  things about the Apple. I find copy protection interesting. I have several
  games which I bought, deprotected, and never used (or traded) - the protection
  was more interesting than the game. If you don't like it, don't read those
  messages. I also support the distribution of Apple BBS numbers,
  regardless of what obnoxious names they have given themselves. Caveat hackor.
  I happen to believe that information should be shared, so it's true I have a
  knee-jerk reaction to anybody saying "Don't give this information here," but
  in this case I think it is justified.

I'd like DDD too.

comp.apple.binaries: When this vote was being taken, I tried to vote but
  don't think my vote got thru. Anyway, I never saw a SINGLE message
  explaining just WHAT comp.apple.binaries would be (I still don't know
  if it would be a file server or a newsgroup). So don't complain of
  apathy to me - how do you expect us to get excited about something which
  you never tell us what it is?

BTW, does anyone know how to find other groups on the net like this one?

Phil Goetz
PGOETZ@LOYVAX.BITNET

mkao@crash.cts.com (Mike Kao) (03/17/88)

> It's not taboo.

Yet you treat it as such in your talk. Why is this subject not "appropriate"
to a general Apple users' forum? I believe that any topic that is legal is
germane. I think too many people equate talk of deprotection to piracy. The
two are distinct. Isn't there a clause somewhere grants people the right to
make archival copies of their software? If so, then why can't people discuss
HOW to do this out in the open, instead of being referred to some "underground"
magazine?

-- 

To insure my reception of any replies, please respond via e-mail. Thanks!

                                                                  -- Mike Kao

UUCP: {cbosgd, hplabs!hp-sdd, sdcsvax, nosc}!crash!pnet01!mkao
ARPA: crash!pnet01!mkao@nosc.mil
INET: mkao@pnet01.CTS.COM

laba-4an@web2e.berkeley.edu (Andy McFadden) (03/19/88)

In article <2692@crash.cts.com> mkao@crash.CTS.COM (Mike Kao) writes:
>> It's not taboo.
>
>Yet you treat it as such in your talk. Why is this subject not "appropriate"
>to a general Apple users' forum? I believe that any topic that is legal is
>germane. I think too many people equate talk of deprotection to piracy. The
>two are distinct. Isn't there a clause somewhere grants people the right to
>make archival copies of their software? If so, then why can't people discuss
>HOW to do this out in the open, instead of being referred to some "underground
>magazine?

An underground magazine?!?  They've been publishing for about five years now,
advertising in nibble, softalk, and a number of other places.  Hardly
underground.

I just don't want to see this turn into a place for posting deprotection
methods, for the same reasons I don't want it to be a place where people
discuss the civil rights of armadillos: it's out of place.

I have nothing against deprotecting software; in fact, I strongly encourage
developers to distribute software without copy protection.  But if you want
to discuss it, start a new newsgroup.  I'll be the first to subscribe.

-- 
"They want to make backups?!?  We gave them two copies, one on each side
of the disk!"  - Utilico Microware [inferred]

laba-4an@web2e.berkeley.edu (Andy McFadden) (03/19/88)

>Andy McFadden: I, too, think info-apple is a fine place to talk about
>  specific methods for deprotecting Apple software. It is an Apple forum,
>  for everything relating to Apples. And copy-protection teaches you many
>  things about the Apple. I find copy protection interesting. I have several
>games which I bought, deprotected, and never used (or traded) - the protection
>  was more interesting than the game. If you don't like it, don't read those
>  messages. I also support the distribution of Apple BBS numbers,
> regardless of what obnoxious names they have given themselves. Caveat hackor.
>  happen to believe that information should be shared, so it's true I have a
> knee-jerk reaction to anybody saying "Don't give this information here," but
>  in this case I think it is justified.
>Phil Goetz
>PGOETZ@LOYVAX.BITNET

Well, you're certainly entitled to your opinion.  The problem that often occurs
is that once deprotection methods start getting posted, everybody and his
cousin Fred start posting messages everywhere.

Saying that I shouldn't read those messages is fine, but tell that to the
usenet sysops who have to store these things, pass them down the line over
(often expensive) telephone lines, and so on.  I simply feel that there
are much better ways of distributing this kind of information.

I've said it before and I'll say it again: I have nothing against software
deprotection [unlike certain highly flammable people].  But there's no
point in blasting twenty gigabytes of info across the news.

-- 
"signature"
"no, really.  that's my signature."

"A moose bit my sister once..."

PGOETZ@LOYVAX.BITNET (03/24/88)

Misc. copying trivia
Piracy (something new, I think)
Keyboard update
EOA boot code
F-15 Strike Eagle
Test players

Wes Williams:

>        1. How does the " copy all you want until the disk has been booted
one time" work?
        A disk could insist on writing to itself when booted (refuse to continue
until you remove the write protect tab). However, this would have no value for
protection. More likely, you mean programs which allow you to make a certain
number (like 1) of backups. Simple. They write a note to the original saying
"this guy's already made a backup" when they make the backup with a special
copy program included with the program.

>        2. How does the "copy from the original but not from a copy" work?
        In most cases like this, the program does a nibble count, so a working
copy has to have the same number of nibbles per track on at least one track.
It's harder to get this right off a copy.

>        4. I have seen protected software self destruct an original when
a copy program is run to make a backup. As these originals are write
protected, how is the protected software screwing things up?
        It isn't. Sorry, you're wrong. Something else makes them go bad, you
can't write over a write protect.
        If there is no write protect, the only way I can think of this could
happen is if company A puts out a copy program which checks each disk to see
if the user is using it to copy itself, in which case it would erase the
original if possible. Then company B releases programs with the same signature
(which they get from examining the copy program) so the copy program erases
them too.  But this has never happened.  So if you don't understand it, don't
worry.

Piracy (bear with me):
        I've heard many, many flames on the subject, but I've
never heard anyone who shares my views. They are:

a. Those involved with computers are programmers and users.
b. Programmers want to make money.
c. Users (including programmers) want to utilize their system in as many ways
  as possible. The user should have and understand a core of
  application programs (Appleworks, Applewriter, etc.)  But to effectively use
  his system he also needs a slew of utilities: copy programs, sector editors
  if he knows how to use them, file translators, terminal emulators,
  archiving programs (despite the fact that there STILL don't seem to be any
  for the Apple), system verification programs like Apple-Cillin, etc., etc.
d. Few people can afford to fully utilize their computer under current market
  conditions.  This is because program prices are targeted at people who
  would use the program often, yet effective utilization of the computer
  implies having professional packages for anything you might want to do.

   So, the problem is the tension between the need for users to utilize their
systems, and for programmers to make money.  It is important both that users
can get their hands on whatever they need, and that programmers are paid enough
to keep the programs coming.
   The ideal solution, which I try to follow myself, is to buy enough to
maintain a market and pirate enough to use your system.  I would say that
allowing yourself to pirate about 10 programs for every 1 you buy would be
reasonable.  I buy programs which I plan to use regularly, or which I need
for my work.  If I don't need a program but think it might come in handy
sometime, I copy it.  This comes out somewhere near a 1:10 ratio.
   Admittedly, this can fail when you copy a program you don't think you need
and then find out you can't live without it.  But, 1) this is a kind of
statistical ethics, and small problems aren't statistically significant, and
2) you probably wouldn't have bought the program anyway.
   With games, I just worry about the 10:1 ratio and not whether I'm buying
the best ones.  This is because it is much harder to know before buying if
you will like a game.  Ex: Among games I bought recently, I found Fahrenheit
451, Amnesia, and F-15 Strike Eagle boring.  But this was no problem, as I
pirated others which I found I loved.
   The only radical thing about this argument is that instead of asking whether
piracy is right or wrong, I ask what is the best end result for the user and
the programmer.  So it's a kind of utilitarian relativism, I'm ashamed to
admit.  The ultimate goal is to advance the quality of software and of the
user environment.

   The implication for software companies is that ideally they should gear their
protection routines so they are not too difficult to crack, but sufficiently
difficult that only a moderate amount of pirated copies will circulate.  Of
course I don't expect them to do this.  I might if I sell a program.

Craig Williamson:
        The keyboard I mentioned is from JDR Microdevices, now for $69 or so.
It also includes a shift-lock, BTW.

Whoever asked about Electronic Arts boot-code tracing:
        I did trace their code, and on all their games I've cracked (which is
about five) the code looks so tricky because they use an interpreter to
interpret what is essentially a subset of 6502 assembly language.  The only
reason is to confuse boot code tracers.  I wrote a disassembler for EOA
interpreted code; I was going to publish it in COMPUTIST about a year ago
but never wrote it up because they stopped paying for contributions.
(Shame on me, I know I'm supposed to write out of concern for the computer
community, but it's hard to find the time to do it right without money.
I don't mind blowing off essays for info-apple, but when you put it in
print I want it to be right.)  If there's interest, I'll provide details.

F-15 Strike Eagle, from Microprose:
        Has anybody cracked F-15 Strike Eagle? I've disabled three protection
routines already & it still doesn't run.  None of the cracks in COMPUTIST go
beyond the first two routines.  (Info on Silent Service would be applicable.)

To everybody who sent me a SASE to test my adventure:
        I'll try to get the envelopes mailed out by March 28 or so.  Be patient.
There are some significant bugs still.

Phil Goetz
PGOETZ@LOYVAX.BITNET

DSEAH@WPI.BITNET (04/23/88)

My favorite all-time disk zap utility for DOS 3.3 has always been
Zap from the Bag of Tricks disk.  I find myself in need of a ProDOS
block/sector editor of the same caliber.  I heard that Bag of Tricks II
has such a zap on it, but can not verify this myself.  Help!

Hallooo!  Anybody in Taiwan on Info-Apple?  I am going back to 'Wan
this summer, so I was just curious if there were any die-hard Apple
loyalists left.  My good friend Mark Kern, who left a year and a half
after I, mentioned that there is a local chapter of APDA in Taipei.
And goody for me, I am bringing my GS, sans RGB monitor (*sob*).
I suppose I had better bring receipts for the equipment upon return
to the US, lest the curs in Customs jump all over me.

Dave Seah --- Rockin' at WPI
+-----------------------------------------------+---------------------------+
| Bitnet:   DSeah@WPI.Bitnet                    |  We can't receive files!  |
| Internet: DSeah%WPI.Bitnet@CUNYVM.CUNY.EDU    |  EMAIL only! Apples Rock! |
+-----------------------------------------------+---------------------------+

laba-4an@web3d.berkeley.edu (Andy McFadden) (04/23/88)

In article <8804222308.AA02239@wpi.local> DSEAH@WPI.BITNET writes:
>My favorite all-time disk zap utility for DOS 3.3 has always been
>Zap from the Bag of Tricks disk.  I find myself in need of a ProDOS
>block/sector editor of the same caliber.  I heard that Bag of Tricks II
>has such a zap on it, but can not verify this myself.  Help!

Copy II+ v8 has a block/sector editor, but it doesn't have as many features
as Zap does.  It's better than Apple's DiskEdit program; that didn't even
have a search function.

-- 
laba-4an@widow.berkeley.edu (Andy McFadden)

tmetro@lynx.northeastern.EDU (07/25/88)

Does anyone know:
 
  1. Of an "input-anything" routine for AppleSoft that is public domain and
     compatable with BASIC.SYSTEM? I need this for disk access to avoid
     INPUT A$'s problems with punctuation. GET A$ is too slow.
 
  2. Where to get the source code to FredWriter or FreeWriter?
 
  3. A program that will allow you to reconstruct a file (text) from
     sectors (DOS 3.3, ProDOS, and Pascal)?
 
  4. A squeeze/unsqueeze utility that will work as a command from
     BASIC.SYSTEM (not a .SYS file)?
 
  5. A spell checking program that will process plain text files
     or a "dictionary" data file that could be used for a spell
     checking program.
 
  ___________
 / Tom Metro \_____________________________________________________________ 
|                                                   _   _                  |
| INET: tmetro@pro-angmar.uucp              --/\/\_| |_| '- DigiTell, Inc. |
| ARPA: crash!pnet01!pro-angmar!tmetro@nosc.mil             Newton, MA     |
| UUCP: [ihnp4 sdcsvax nosc]!crash!pnet01!pro%angmar!tmetro                |
|_Alternate: tmetro@lynx.northeastern.edu__________________________________|
  "The Ghost crowd supports me. They're "BOO"-ing you!" -Hobbes
 

wes@csd4.milw.wisc.edu (Wesley James Vokes) (07/31/88)

In article <memo.39233@lynx.northeastern.edu> tmetro@lynx.northeastern.EDU writes:
>
>Does anyone know: 
> 
>  1. Of an "input-anything" routine for AppleSoft that is public domain and 
>     compatable with BASIC.SYSTEM? I need this for disk access to avoid
>     INPUT A$'s problems with punctuation. GET A$ is too slow.
> 
Tom,

This is sloppy, and I'm writing this on the spot, but it'll give you an idea
as to how to write your own subroutine to use.  Here's a short listing, I'll
explain it after I've typed it in.



1000 REM Keyboard Input Subroutine
1005 A$ = ""
1010 FOR X=1 TO 16: 
1020 Poke -16368,0
1030 A= PEEK (-16384)
1040 IF (A>127) THEN 1060
1050 GOTO 1020
1060 B$ = CHR$(PEEK(-16384)-128)
1070 IF B$ = "" THEN 1100
1080 A$ = A$+B$
1085 POKE -16368,0
1090 NEXT X
1100 POKE -16368,0
1110 RETURN

Ok, the key to this is, that at location 16368, in applesoft, the highbit
ASCII value of the last letter typed is stored.  I wrote the program to
allow 16 letters max, and it takes each key typed and adds it on to the
string A$.   Noene of the keys typed are displayed on the screen, so 
you might want to put that in.  Also, if they try to backspace, it
won't work.  But, you can customize it toaccomodate backspacing with alittle
work.  I hope this works.  Any questions, just send my account email.



 _     ____ 
' )   /                       arpanet: wes@csd4.milw.wisc.edu
 / / / _  _                    bitnet: wes%csd4.milw.wisc.edu@wiscvm.bitnet
(_(_/ </_/_)_                    UUCP: !ihnp4!uwmcsd1!csd4!wes

                         p/g - "grace under pressure"     

SEWALL@UCONNVM.BITNET (Murph Sewall) (08/02/88)

>  5. A spell checking program that will process plain text files

The Sensible Speller will do that (as well as work with practically
every Apple word processor known to man).


Murph Sewall     Sewall@UCONNVM.BITNET
Business School  sewall%uconnvm.bitnet@mitvma.mit.edu          [INTERNET]
U of Connecticut {rutgers psuvax1 ucbvax & in Europe - mcvax}
                 !UCONNVM.BITNET!SEWALL                        [UUCP]

-+- My employer isn't responsible for my mistakes AND vice-versa!
            (subject to change without notice; void where prohibited)

"It might help if we ran the MBA's out of Washington." - Adm Grace Hopper

SEWALL@UCONNVM.BITNET (Murph Sewall) (08/02/88)

>In article <memo.39233@lynx.northeastern.edu> tmetro@lynx.northeastern.EDU
> writes:
>>
>>Does anyone know:
>>
>>  1. Of an "input-anything" routine for AppleSoft that is public domain and
>>     compatable with BASIC.SYSTEM? I need this for disk access to avoid
>>     INPUT A$'s problems with punctuation. GET A$ is too slow.
>>
>
>1000 REM Keyboard Input Subroutine
>1005 A$ = ""
>1010 FOR X=1 TO 16:
>1020 Poke -16368,0
>1030 A= PEEK (-16384)
>1040 IF (A>127) THEN 1060
>1050 GOTO 1020
>1060 B$ = CHR$(PEEK(-16384)-128)
>1070 IF B$ = "" THEN 1100
>1080 A$ = A$+B$
>1085 POKE -16368,0
>1090 NEXT X
>1100 POKE -16368,0
>1110 RETURN

Sorry, but that's not going to do it.  The "killer" is 1080 A$= A$+B$
(takes too much time and creates "garbage" - which then takes even more time
to "collect").

What Tom needs is an "input anything" routine for ProDOS (there are
numerous DOS 3.3 versions -- or perhaps just variants on a version) that
will INPUT a line into a single string variable regardless of colons,
semicolons, and commas that may be in the line.  Such a criter would have
to be in machine code (either a routine to BLOAD or something that can be
POKEd from DATA statements).

Isn't PEEKing the keyboard character buffer the equivalent of GET A$ (or
at least not noticeably quicker)?


Murph Sewall     Sewall@UCONNVM.BITNET
Business School  sewall%uconnvm.bitnet@mitvma.mit.edu          [INTERNET]
U of Connecticut {rutgers psuvax1 ucbvax & in Europe - mcvax}
                 !UCONNVM.BITNET!SEWALL                        [UUCP]

-+- My employer isn't responsible for my mistakes AND vice-versa!
            (subject to change without notice; void where prohibited)

"It might help if we ran the MBA's out of Washington." - Adm Grace Hopper

jason@lakesys.UUCP (Jason) (08/03/88)

In article <8808011402.aa04788@SMOKE.BRL.ARPA>, SEWALL@UCONNVM.BITNET (Murph Sewall) writes:
> [Original post & program deleted - part of Mr. Sewall's post deleted as well]
> 
> What Tom needs is an "input anything" routine for ProDOS (there are
> numerous DOS 3.3 versions -- or perhaps just variants on a version) that
> will INPUT a line into a single string variable regardless of colons,
> semicolons, and commas that may be in the line.  Such a criter would have
> to be in machine code (either a routine to BLOAD or something that can be
> POKEd from DATA statements).

	The input anything routine I have works under both DOS 3.3 and ProDOS.
Unfortunately, it's from Call A.P.P.L.E.'s "All about Applesoft", and, it
would seem, copywritten & un-put-here-able.

> Isn't PEEKing the keyboard character buffer the equivalent of GET A$ (or
> at least not noticeably quicker)?

	The GET A$ does a few more things: It goes through the ROM code until
it hits the re-routing vector, which calls ProDOS' BI or DOS 3.3. In either
case the OS checks to see if there's a file being used for input, in which
case it goes to internal code. If there's no file open for input, the OS puts
the original vectors back in, and calls them. If unchanged (by things like
keyboard macro expanders and the like), the ROM gets called, which actually
checks the keyboard. Then, back up through the levels until we return to
Applesoft... All the peek has to do is translate the address of the number
to be PEEKed, and encode the number returned (actually, there's some other
overhead from FORMEVL, but it would seem that less time would be taken
overall - quite possible I'm wrong on this one, tho').

	As for the need for speed in getting characters in Applesoft, it
really doesn't make all that much difference - I can't out-type GET's, and
the PEEK method can't be used with disk files, which is generally where the
speed is needed. Then again, Applesoft in general isn't the worlds quickest
way to do things :) (At least as far as execution times go)

> Murph Sewall     Sewall@UCONNVM.BITNET

-- 

Jason - Not your average iconoclast  |	UUCP: uwvax!uwmcsd1!lakesys!jason

mdavis@pro-sol.cts.com (Morgan Davis) (01/11/89)

One note.  If you do make a reliable network connection to the GBBS domain,
*YOU* will be held responsible for any and all problems that are caused in
that chain of the connectivity, just as *I* am responsible for any problems
arising from the ProLine network.

GBBS Pro users, as a whole, do not have the reputation that netters respect.
For that matter, I think most UUCP net users look down (frown) upon ProLine as
well.  It gets exponentially WORSE in the GBBS domain.  So, keep your
knightstick at the ready.

Please make all documents known to GBBS sites that you get into the network.
This includes network rules, syntax, semantics, signatures, mail standards,
do's and dont's and all that kind of stuff.  It is imperative that every GBBS
sysop become a net expert, as irresponsible sysops will be a major detriment
to all of us.

Realize that allowing your network to connect with ProLine is a gift, given on
the pretense that there will be no trouble.  But should trouble arise, I, Bill
Blue, and other sysops that have some stake in all of this will not hesitate
to refuse connectivity with your network of sites.

I just had to say this.  I hope you realize the seriousness of all of this.

--Morgan Davis

UUCP: crash!pnet01!pro-sol!mdavis		ProLine:  mdavis@pro-sol
ARPA: crash!pnet01!pro-sol!mdavis@nosc.mil	MCI Mail: 137-6036
INET: mdavis@pro-sol.cts.com			APE, BIX: mdavis

dvac@drutx.ATT.COM (Daniel Vachon) (01/13/89)

In article <8901110116.AA01397@crash.cts.com>, mdavis@pro-sol.cts.com (Morgan Davis) writes:
> One note.  If you do make a reliable network connection to the GBBS domain,
> *YOU* will be held responsible for any and all problems that are caused in
> that chain of the connectivity, just as *I* am responsible for any problems
> arising from the ProLine network.
> 
.....
> I just had to say this.  I hope you realize the seriousness of all of this.
> 
> --Morgan Davis
> 

Morgan, not to rag on you or anything, but I don't think he was thinking 
about networking with uucp or your proline for that matter...  I too have 
written a networking segment for GBBS Pro, and it is up and running right now
on about 10 boards from california to colorado to ohio to Mass.  I have no
desire to network with uucp or proline.  I just wanted to establish a way for
sysops of other GBBS boards to be able to keep in contact with each other.
Most of the time I have trouble finding time to call the boards I want to
call (and the LDX bills don't help either), so I wrote the networking seg to
network amongst our boards....simple in theory, and if anyone has a problem
with the network, I am willing to iron out the bugs...I mean I wrote it!
Just an opinion....it seemed you got kind of edgy when someone else said they
wanted to design a network for apples....  I felt this had to be said....

Later -Dan