[comp.org.fidonet] FidoNET Newsletter, Volume 5, # 13

pozar@hoptoad.uucp (Tim Pozar) (03/29/88)

     Volume 5, Number 13                                 28 March 1988
     +---------------------------------------------------------------+
     |                                                  _            |
     |                                                 /  \          |
     |                                                /|oo \         |
     |        - FidoNews -                           (_|  /_)        |
     |                                                _`@/_ \    _   |
     |        International                          |     | \   \\  |
     |     FidoNet Association                       | (*) |  \   )) |
     |         Newsletter               ______       |__U__| /  \//  |
     |                                 / FIDO \       _//|| _\   /   |
     |                                (________)     (_/(_|(____/    |
     |                                                     (jm)      |
     +---------------------------------------------------------------+
     Editor in Chief                                       Dale Lovell
     Editor Emeritus:                                   Thom Henderson
     Chief Procrastinator Emeritus:                       Tom Jennings
     Contributing Editors:                                   Al Arango
     
     FidoNews  is  published  weekly  by  the  International   FidoNet
     Association  as  its  official newsletter.  You are encouraged to
     submit articles for publication in FidoNews.  Article  submission
     standards  are contained in the file ARTSPEC.DOC,  available from
     node 1:1/1.
     
     Copyright 1988 by  the  International  FidoNet  Association.  All
     rights  reserved.  Duplication  and/or distribution permitted for
     noncommercial purposes only.  For  use  in  other  circumstances,
     please contact IFNA at (314) 576-4067. IFNA may also be contacted
     at PO Box 41143, St. Louis, MO 63141.
     
     The  contents  of  the  articles  contained  here  are  not   our
     responsibility,   nor   do   we   necessarily  agree  with  them.
     Everything here is  subject  to  debate.  We  publish  EVERYTHING
     received.



                             Table of Contents

     1. EDITORIAL  ................................................  1
        FidoNet: Stand Up Now or Watch it Die  ....................  1
     2. ARTICLES  .................................................  3
        Public Key Encryption  ....................................  3
        FireNet Revisited  ........................................  7
        New Area Code in Florida  .................................  9
        Introducing "The Good Egg Network"  ....................... 10
        MegaList - Seven months later (an update)  ................ 14
        Nominations for IFNA BoD Positions  ....................... 18
        Net 322 forming in Massachusetts  ......................... 19
        Setting Up NetMail With QuickBBS  ......................... 21
     3. COLUMNS  .................................................. 26
        Let's YACK about Electronic Voting  ....................... 26
     4. NOTICES  .................................................. 28
        The Interrupt Stack  ...................................... 28
        Contact Hours Changing for RC 18  ......................... 28
        Latest Software Versions  ................................. 28
     FidoNews 5-13                Page 1                   28 Mar 1988


     =================================================================
                                 EDITORIAL
     =================================================================

     Don Daniels, President
     International FidoNet Association
     FidoNet 1:107/210


                  FidoNet: Stand Up Now or Watch it Die


     I just heard something about Randy Edwards that appalls me.  Oh,
     not what HE's said or done, but what is being done to him.  It
     seems that someone out there has decided that Randy's
     controversial and rather vociferous opinions have justified, in
     return, certain threats against himself and his family, telephone
     harrassment of them, and attempts to crash his system.

     This type of response is absolutely wrong.

     Some might argue that to quite some extent, Randy deserves what
     he gets, in that his behavior has also resulted in a crashed
     system or two and he has certainly abused the hospitality of
     others who freely provide certain resources for specific purposes
     other than those pursued by Randy.  But for the most part Randy,
     through overzealousness, is only guilty of certain
     insensitivities of the rights of others and the other results
     have been inadvertant by-products.

     But, regardless of his own level of any culpability, two wrongs
     never make a right -- and the escalation in this situation has
     moved beyond the realm of insensitivity of the rights of others
     to out-and-out anti-social behavior and illegality.  Make no
     mistake about it: telephone harrassment is illegal, regardless of
     whatever form it takes and it should be something that FidoNet
     totally stands against, instead of, unfortunately, being an
     uninvolved party to its promotion.

     To quite some extent, what we see now is the unsurprising result
     of not taking stands in the past to protect the rights of others.
     On far too many occasions, individuals have been unjustly
     attacked or harrassed and the Net has sat by with a collective,
     "So what?" attitude instead of speaking out against such
     practices or seeking to effect a just disposition of such cases
     as have been brought forward.

     The result of such inaction is that now we have an atmosphere
     where freedom of dissent - no, freedom of any opinion - is
     likely to bring about personal attacks and where escalation into
     illegality is becoming a norm.  The eventual result of this can
     only be the destruction of that ideal of FidoNet and the
     wonderful benefits it could provide to so much of society.

     Randy has questioned why IFNA should exist.  Well, he's certainly
     discovered one of the primary reasons: as a non-profit,
     FidoNews 5-13                Page 2                   28 Mar 1988


     educational body, IFNA sees as one of its main priorities the
     formation and distribution of certain basic policies and
     procedures that are designed to safe-guard the rights of
     individuals thereby giving them the protections to freely
     continue in their personal "pursuit of happiness."  Everyone,
     within FidoNet or not, should have the right to say, do, or
     experience anything they wish that, in turn, does not interfere
     with those same rights for others.

     But the net as a whole cannot just stand by and "let IFNA do it"
     or hope that perhaps someone else will speak out against
     injustices.  If you believe in the perpetuation of FidoNet you
     must now take a stand against any and all such practices as have
     been directed against Randy and others.  Each and every one of
     you should call for a stop of these blatant violations of rights
     and should demand that those in positions of authority take all
     necessary steps to see that the indiviuals responsibile for such
     acts be removed from FidoNet and that clear guidelines exist to
     prevent reoccurrences.

     This stand must be taken NOW, before it's too late -- if, indeed,
     it's not too late already.

     -----------------------------------------------------------------

     FidoNews 5-13                Page 3                   28 Mar 1988


     =================================================================
                                 ARTICLES
     =================================================================

                           Public Key Encryption

            I have seen a few referances to Public Key Encryption
     recently and since I claim to actually know something about the
     subject, I thought I would try to clear up a few misconceptions.

            Let me start with a bit of history. Some time ago people
     were thinking about electronic communication (lets call it email
     even if most of what I plan to say could also be applied to other
     forms of communications like voice phone calls).  This was quite a
     while before Fidonet. They thought that for email to be really
     usefull people need to have confidence in the confidentiality of
     their messages. To be honest it is just too easy to eavesdrop on
     email.

            These people thought that encryption was the best way to
     ensure confidential email. Other ways are possible but they all
     tend to rely on some form of trust in one way or another. Now
     there is nothing wrong with trusting someone but in practice it is
     depressingly rare.

            In fact various form of encryption were and are in common
     use for email already. They generally use a, so called, key which
     is used to translate, so called, plain text into a secure form
     before transmision and then used again to reverse the process
     after transmision. So to send a confidential email message you
     first must agree on a key since, of course, if you try to use
     different keys, you won't be able to reverse the original
     conversion appropriatly.

            This is where the problem comes up. How do you find out
     what key was used to encrypt the original message.  The
     conventional answer is that you use a separate channel of
     comunications for agreeing on keys. If you use a telephone for the
     encrypted messages, then you send the key via the post office or a
     courier or an armed gaurd depending on how serious you are.

            This is where the Public Key Encryption idea started.
     Theses people wanted to use the same channels of communication for
     their keys as they used for the confidential email. They wanted to
     do away with the couriers and the post office and all the
     rigamarole but they did not want to give up the security that had
     been already accomplished. It is pretty obvious that you couldn't
     just put the key to decodeing your message right in front of the
     message since then ANYONE listening in could decode and then read
     your message.

            What was eventually figured out was that it IS possible to
     first send a message telling someone how to ENCODE a message which
     is then sent BACK to the original person and still have a secure
     message. For instance I can tell you how to scramble a message in
     a certain way so that only I can read it. Anyone listening in will
     FidoNews 5-13                Page 4                   28 Mar 1988


     only find out how to scramble messages and they will also have a
     copy of the scrambled message that you eventually send me but they
     can't unscramble the message to find out what you are saying to
     me.

            The only practical and secure way of actually implementing
     such a system discovered so far is generally refered to as the RSA
     Public Key Encryption system. It is based on an article called "A
     Method for Obtaining Digital Signatures and Public-Key
     Cryptosystems" writen by R.L.Rivest, A.Shamir and L.Adleman
     published in the February 1978 issue of Comunications of the ACM.

            The system they discovered is based on very large prime
     numbers. The larger the numbers, the more secure the system
     becomes. Keys based on numbers of the size we contend with every
     day up to millions or billions are pretty easy to decode even if
     you don't know the key. However it is possible to set up keys with
     hundreds of digits and almost guarantee that no one will ever be
     able to decode the messages without the key.

            The process actually produces two different, but related
     keys. One part is used to encrypt or scramble the original message
     and the other part is then kept to yourself and used to unscramble
     the message. One you have produced a pair of keys, you can give
     out the first part to anyone that wants to send confidential
     messages to you. The half of the key that you give out is refered
     to as a Public Key because you send it out over the public
     comunications channel and it doesn't matter who knows it.

            If you want to send a private message to someone you must
     first get their public key. For two-way communication there is two
     sets of keys involved. Two public keys and two private secret
     keys. The public keys are exchanged before any confidential
     exchanges can take place.

            In fact you can publish your public key so that it is
     public knowledge. For instance I have generated a key for myself
     to use. It is:

       n = 2736819260645630669527694759316520435577
           74311021562498273154432038898470487
       e = 1318658420201053439930112933655370300596
           0307881881836602807819529828909731

            I had to break the numbers up to fit on these lines. They
     are about 75 digits each. This key is considered to be of
     "moderate" security. A high security key would consist of numbers
     of 150 to 200 digits each. Note that the two numbers above are
     just the one public key. There is a third number to go with the
     two above that is the private part of my key. Now you can use this
     key to send me absolutly (practicly speaking) confidential
     messages.

            About this time you might be saying "Now wait just a
     minute, what do I do with these big numbers? I don't think my
     computer will even understand numbers that big!" and you are
     FidoNews 5-13                Page 5                   28 Mar 1988


     perfectly justified in asking. As it happens, your computer WILL
     handle numbers like those well enough. You just need the right
     programs. To make it easier for you I have created a program to do
     all the RSA ecryption and decryption work for you. It will even
     generate the big number keys for you to have your own personal
     public keys. The encryption and decryption processes work with
     disk files on your MS-DOS computer. I called the program PKSCrypt
     and it is currently released at version 0.2a. You can call my Fido
     and download the file (called pkscrypt.arc) on your first call.
     (1-403-282-1703 no file requests though, sorry)

            If you actually go to the trouble of getting a copy of the
     program and play around with it, you will quickly find out why
     this system is not going to replace the conventional encryption
     systems.  It is very slow. For example it will take about 15
     minutes to encrypt a 1000 byte file using my key on a PC (give or
     take a few minutes). In fact it is so slow that you might think it
     is completely useless. Before we forget about the whole idea,
     remember what the original problem was. All we need to encrypt is
     the key for one of the standard encryption methods so that we can
     send it over our standard communications channel.

            Lets get more specific for a minute. Most of the readers of
     Fidonews are sysops on fidonet and I suspect that most of you are
     familiar with Bob Hartman's ConfMail system. Confmail has a built
     in encryption system of the conventional type. Some of you out
     there are probably already using this feature to make some of your
     links secure. You must have agreed with your corespondents on a
     key. Perhaps you just sent the other sysop a private message. You
     probably didn't and wouldn't have any trouble with such an
     arrangement BUT it is remotly possible that for the same reason
     that you descided to use the encryption in the first place, that
     key could have gone astray. You would be no better off than if you
     didn't bother at all.

            Maybe you thought of that and just phoned up the other
     sysop voice and told him the key. The only problem here is that
     the voice call is more expensive, in general, than a fidonet
     message since it is during daytime, higher rates and it usually
     will be longer in duration than a network call.

            However, if you knew the public encryption key of the sysop
     who you wanted to send the ConfMail key to, you could encrypt the
     ConfMail key with his public key. That way, only the person who
     knows the secret part of the key could decrypt your message and
     discover the ConfMail key. You can pretty safely assume that only
     one person will know that secret key. You can then send the
     resulting message over the regular insecure links.

            You can easily use the public key encryption to scramble
     the relativly small ConfMail key. You can still use the relatively
     fast and convientient encryption that is built into ConfMail for
     the bulk of the traffic. And you can do it all over Fidonet with
     the cheap communications possible with this medium.

            The topic of "digital signatures" was breifly touched upon.
     FidoNews 5-13                Page 6                   28 Mar 1988


     As it turns out the RSA public key encryption can also be used for
     identification purposes. It is possible to use the private key to
     create a, so called, signature which can be verified with that
     person's public key. While this would seem to be usefull to us on
     Fidonet also, it turns out that it is not as practical due to the
     slow speed of the algorithms. If you get my package, I talk about
     digital signatures some more in the dox that come with it.

            There are other, more controversial, applications of
     encryption techniques. If you are using regular netmail, but your
     mail is being routed through another node and perhaps you think
     the sysop of the intermediate system is reading your private
     messages, you could either "no-route" your mail or you could
     continue to use the same route but encrypt your messages. Most of
     us agree that a host or hub should pass along ANY traffic that he
     has promised to deliver but what would you say if the messages
     were encrypted? You might ask first of all, why is this person
     bothering to encrypt his messages? Is it because he is doing
     something illegal?

             Some places might even have laws about such practices (the
     cops think they should have the right to read your mail and listen
     to your phone calls even if they need to ask a judge about it
     first and some other government agentcies seem to have similar
     ideas). Of course none of us do anything along those lines do we?
     O:-)

            What about our pet crime - software piracy? If the pirates
     want to operate on the net they might be able to do it right under
     our noses. If you allow encrypted messages for any reason, you
     will not be able to prevent any other uses of the same techniques.
     One encrypted message looks just like any other encrypted message.

            You may have noticed, I have not come out and promised this
     system will BE secure for all time. That is only because it has
     not been PROVEN to be secure in a mathematical sense. I am very
     confident of the security of the system but it may be possible
     that tommorow someone will find a simple and cheap way to beat it.
     This situation is not unique to the RSA system. It is actually
     true of most of the modern encryption systems still in use today.
     The primary exceptions are the ones which have been broken. It
     seems that it is much harder to prove that a system is secure than
     it is to come up with the idea in the first place, all of which
     isn't really that surprizing.

            Lloyd Miller
            1988 March 15
            Calgary, Alberta
            Node 1:134/1, The First Calgary Fido

     -----------------------------------------------------------------

     FidoNews 5-13                Page 7                   28 Mar 1988


     Christopher Baker
     MetroFire - 135/14


                  FireNet Echo Recap for the Neophyte

     Those of you new to FidoNet may have heard of FireNet but may
     not be sure what FireNet is or what it does. Herein lies a
     brief synopsis.

     Shortly after getting into FidoNet back in early 1985, it
     occurred to me that the FidoNet structure was such that it
     could lend itself very well all sorts of spin-off sub-nets.
     Having set up this system for the fire department I work for
     (Metro-Dade Fire & Rescue in greater Miami)as an experiment,
     I began to toy with the idea that a private Net could be
     created that would allow direct and convenient message
     communication between participating departments. The software
     was readily available, operated on most standard machines and
     modems, and could be configured specifically for fire depart-
     ment use.

     I began to write articles for FidoNews on the subject and
     began contacting other departments and fire service types who
     might be cajoled into participating in such a venture.

     At that time, special interest Nets existed in FidoNet (since
     abandonded as redundant) so I applied for and received the
     number Net 911 (now operating as a private Net) and started
     gathering interested systems.

     It wasn't until the advent of Jeff Rush's famous Echomail
     programs that the real potential of the original idea began
     to emerge. Woody Wood and Chuck Sanders of the Colorado
     Springs Fire Department and I began to exchange ideas and
     plans and Woody and Chuck got Echomail installed on their
     system and began to link-in other FidoNet systems. Echomail
     was much easier to hook into for established systems and
     gave a new dimension to the original concept of a sub-Net
     or private Nodelist. For one thing, Echomail allowed users
     to participate without having to set up a system, first.
     All anyone had to do was find a system carrying FireNet and
     enter messages. This is how many departments first became
     aware of the Echo. Many of those departments went on to set
     up full-fledged FidoNet systems.

     FireNet is now carried on the Echomail Backbone and has many
     participating systems and even more users. A detailed account
     of the structure of FireNet is in the works and will be related
     in this forum by Chuck and Woody in a future article.

     Basically, FireNet is an Echo conference devoted to the Fire,
     EMS (Emergency Medical Services) and Public Safety sector. We
     discuss equipment, procedures, service related software,
     hazardous materials, service related legislation and other
     topics directly related to the Fire Services. It has been a
     FidoNews 5-13                Page 8                   28 Mar 1988


     valuable tool in communication and dissemination of bulletins
     and warnings.

     FireNet is available to anyone who has an interest in the Fire/
     Rescue Services. It is available from the Host and western Hub
     (FireNet Leader, 128/16), from the eastern Hub (MetroFire,
     135/14), or from the Echo Backbone. It is a moderated conference
     that anyone may read or post Fire/Rescue Service messages of
     international interest. A list of the systems carrying FireNet
     will appear in the Sanders/Wood article soon to be published.

     If you get a link into FireNet from the Backbone or your
     Regional Echo Coordinator, please let Woody or Chuck know about
     it by sending a Netmail message to 128/16. We are trying to
     compile a current list of participating systems.

     Try it. You'll like it. If you'd like to take a look at the
     Echo, you can call MetroFire at 305-596-8611 or FireNet Leader
     at 719-591-7415 or St. Joe's Hospital at 602-235-9653 or
     SoundingBoard at 412-681-9464 for starters.

     If you have any questions or comments, you may send them to me
     via Netmail to 135/14. I'll be happy to assist you in
     convincing YOUR department to set up a system and get into the
     FireNet Echo. For a complete ARC of all my previous FireNet
     articles and other FireNet material, you may GET via SEAdog or
     other Bark request type program the file FIRENET.ARC or just
     FIRENET. If you are unable to GET it, I will send it upon
     receipt of a Netmail request.

     FireNet. It's here. It works and it's growing.


     -----------------------------------------------------------------

     FidoNews 5-13                Page 9                   28 Mar 1988


     Christopher Baker
     Region 18 Coordinator
     18/0 - 135/14


                   Southern Bell Declares a New Area Code
                          Central/Eastern Florida

     Effective at midnight, 16 Apr 88, Florida will have a new area
     code. The new prefix will be 407 and will be replacing a large
     portion of what is now area code 305.

     The area of change will encompass the east coast from Palm
     Beach county north to Brevard and west to Orlando and south to
     Disney World/Kissimmee.

     Some of the cities affected will be:

        Apopka, Belle Glade, Boca Raton, Boynton Beach, Cocoa, Cocoa
        Beach, Debary, Delray, Delray Beach, East Orange, Eau Gallie,
        Fort Pierce, Geneva, Hobe Sound, Hutchinson Island, Indian-
        town, Jensen Beach, Jupiter, Kenansville, Kissimmee, Lake
        Buena Vista, Lake Mary, Melbourne, Monteverde, Orlando,
        Oviedo, Pahokee, Port St. Lucie, Reedy Creek, Sanford,
        Satellite Beach, Sebastian, St. Cloud, Stuart, Titusville,
        Vero Beach, West Palm Beach, Windermere, Winter Garden and
        Winter Park.

     There will be a transition period from 16 Apr 88 through 18 Jun
     88 to allow everyone to get used to the change and implement it.
     Net Coordinators in the affected areas of Florida should make
     sure that these changes are reflected in the Nodelist submissions
     as soon a practicable so the rest of FidoNet doesn't end up with
     voice connections from the Southern Bell recording that goes into
     place at midnight on 19 Jun 88. Both 305 and 407 will operate
     normally during the transition period. Don't forget to change all
     references to your area codes in your Origin lines, bulletins and
     questionnaires when the time comes.

     Those of you outside of Florida with manual overrides in your
     Nodelist compiler control files will want to make adjustments as
     necessary for any Florida Nodes you may be carrying that are
     affected by this change.

     Thanks.


     -----------------------------------------------------------------

     FidoNews 5-13                Page 10                  28 Mar 1988


     Ken Shackelford
     133/1

                     Introducing the Good Egg Network

     By now, I suspect that there are very few in FidoNet that have
     NOT heard about "The Good Egg Net".  Many think it's a joke,
     since it is scheduled to go into operation on April 1st.  Some
     think it's an idea from Hell, designed to destroy the FidoNet
     and all who use it.  Some folks think that it is a simply grand
     idea, and have given it alot of support.

     What is the truth here?  Just what IS the "Good Egg Net", and
     who is behind it?  And why?

     To answer these questions, you must have a pretty basic under-
     standing of the FidoNet, EchoMail, IFNA, and what has been going
     on in the various conferences lately.  I will attempt in this
     article to give a little background, and provide the information
     that so many have been asking for.

     First of all, Good Egg Net (EGGNET) is NOT a joke, despite the
     fact that it begins it's operation on April Fool's Day.  This is
     just pure coincidence.  John Zimmatore (133/107) and I were just
     brainstorming at the end of February, and decided to start up an
     alternative network based on how FidoNet USED to be (pre-IFNA).
     We realized that we had two choices:  simply announce AND begin
     operations (and be swamped and over our heads), or announce for
     a future date (one month later), and use that month to prepare.
     We chose the latter.

     Why are John and I doing this?  Well, this has been the subject
     of ALOT of "flaming".  Very basically, we no longer believe in
     IFNA.  We think IFNA has had time enough to get it's act
     together, and it has not done so.  IFNA has made promises and
     has not kept them.  IFNA, by controlling the NODELIST, controls
     the Sysops in the FidoNet.  A good percentage of the members of
     the IFNA BoD are not elected, but appointed (this because the
     elected people got fed up and quit).  A full disclosure of the
     IFNA finances was promised; we got a small listing of very
     gross numbers that are meaningless.  But I think perhaps the ONE
     thing that it did it for ME, anyway, was the attitude of the
     IFNA Board of Directors that you have only three choices in the
     FidoNet:  Lead, Follow, or get the Hell out of the way.  This
     very statement is on the origin line of all EchoMail that the
     IFNA *president* puts out in EchoMail.  This attitude, quite
     frankly, stinks.  Since the early days when IFNA was formed,
     folks disagreed with the premise of IFNA.  These folks, myself
     included, were told that if we didn't like what was going on,
     then we should go out and form a NEW network.  We are doing so
     here.  Now we are being flamed for doing so.  Well, you can't
     please everyone it seems.

     Clearly, IFNA has stumbled and there are quite a few Sysops out
     there like me, like John Zimmatore, and like over two dozen
     others that believe that we need an alternative.
     FidoNews 5-13                Page 11                  28 Mar 1988


     EGGNET is that alternative.  What we propose to do with EGGNEt
     is to recreate the way that FidoNet USED to be.  We intend to
     have a nodelist that is published bimonthly.  This nodelist will
     be PUBLIC DOMAIN.  We further propose to have a newsletter that
     will be made available to everyone that wants it, but we will
     NOT make it a requirement that each coordinator down the chain
     carry it.  It will be available from one central node, and will
     be available for file request.  If a net host in EGGNET wants to
     make it available down the chain, then so much the better.  But
     if a certain person in EGGNET decides that he or she does not
     want to carry the newsletter, there will be NO threats, NO ill
     will, and NO warnings from "Powers That Be".

     How will EGGNET be organized?  Simply.  We will have a system
     based on democracy, at least as close as we can come to it.  We
     will have three "Egg Commissioners" at the top who have as their
     responsibility the creation of the NODELIST and the NEWSLETTER,
     and that is ALL.  Nothing else.  After the first 6 months, Egg
     Commissioners will be elected by the REGIONAL COORDINATORS.
     Also after the first 6 months, the Regional Coordinators will be
     elected by the Network Coordinators.  And of course, the Network
     Coordinators will be elected by the sysops that make up their
     networks.  If you have ever read Randy Edward's "Sysop Bill of
     Rights", you get the general idea of what it is that we are
     trying to do here with the "Power".  We are trying to put it at
     the BASE of the network where it belongs, rather than at the TOP.

     How do conflicts get resolved in the EGGNET?  Again, simple.  We
     will have a Supreme Court.  No one that is a Network Coordinator
     or Regional Coordinator will be permitted to serve in this court
     while they also serve as coordinators.  And of course, none of
     the Egg Commissioners may serve.  Members of the court serve for
     a period of one year.  All issues brought before the court must
     be submitted formally and have a preponderance of evidence to
     support the case brought forward.  Anyone may bring forward a
     complaint, but if it is judged that the complaint is trivial and
     is made simply for the sake of attention, then the court will
     recommend that the offender be suspended from EGGNET for a
     period of time that can range from 2 weeks to one year.  Each
     Region has a representative sitting on the bench, and each rep
     is elected by the Network Coordinators from a list drawn up by
     the Egg Commissioners.  The Egg Commissioners make this list up
     based on nominations submitted by anyone in the EGGNET.  The Egg
     Commissioners themselves have no vote in the selection of the
     members of the bench.  The decision of the Court CAN be appealed
     if an ONLY if at least 1/3 of the EGGNET petitions the court for
     a retrial.

     What is EGGNET all about?  Well, that is real simple.  We're
     in this for FUN!  Remember that?  Remember a time when running a
     node was fun, and you didn't have to worry about IFNA or the
     various cheerleading going on?  Remember when FLAMES were some-
     thing that happened in your fireplace?  Remember a time before
     Nomex suits were standard equipment in EchoMail?  By trying to
     move the POWER out of the way, we hope to make everyone in the
     EGGNET peers such that there are no real Power Brokers.  It only
     FidoNews 5-13                Page 12                  28 Mar 1988


     follows that if we can isolate and control the situations where
     power can be taken and abused, then what we are left with is a
     nice, friendly place to communicate and to enjoy our hobby.  And
     we end up with a SIMPLISTIC network where intrigue and innuendo
     just don't happen.

     What about the EGGNET nodelist?  How will it be structured?
     Well, it will be structured EXACTLY the same as the IFNA node-
     list is today, so all the various nodelist processors and
     software utilities will still work.  The nodelist will be pub-
     lished twice a month:  once on the 15th, and again on the 30th.
     We will use Zone 99.  Our Regions will lay out EXACTLY the same
     as the FidoNet Regions, and will be numbered 910 through 920.
     All Networks in EGGNET will be numbered 9000 through 9999.  As
     far as we are aware, this should not interfere with anything
     that currently exists in FidoNet.

     One other thing:  EGGNET is NOT an "international" system.  We
     are doing this for North America only.  This is not because we
     don't care about the rest of the world.  We do!  But trying to
     MANAGE something THAT big would become a nightmare, and we do
     not want to get bogged down in administrivia.  That is alot of
     what is wrong in FidoNet these days (our opinion).  We would,
     of course, suggest that each area of the world consider well
     their own special circumstances, and if IFNA does it for you,
     then by all means stay there and enjoy.  If you have problems
     with IFNA, then you can always do what we in the States are in
     the process of doing, and create your very OWN verison of the
     EGGNET.  Different strokes for different folks, and diversity
     there is beauty.

     Listen folks, EGGNET is not here to try and "destroy Fidonet".
     We do hope to coexist PEACEFULLY with it.  Lots of folks that
     will be coming to EGGNET will maintain dual identities so that
     they will ALSO be a part of FidoNet.  While we do not encourage
     nodes in EGGNET to have dual or even triple identities, we will
     certainly no prohibit it either.  We have decided to use ZONE 99
     so that few if any in FidoNet will become upset over it.  Our
     nodelist will be Public Domain, and if folks in FidoNet want to
     compile it in along with their regular nodelist, then super!  We
     won't complain at all.  No one will have to pay a cent to be in
     the EGGNET.  No yearly dues.  We will interface with the IFNA
     controlled Fidonet only through EchoMail (it is our view that
     Echomail belongs to EVERYONE, and not just FidoNet).  Other than
     that, we just don't see a whole lot of reason for folks that
     stay in IFNA/FidoNet to complain.

     Currently, we are scheduled to begin normal operations in EGGNET
     on April 1st.  John Zimmatore will be taking care of the EGGNET
     nodelist and nodediff, so if you are interested in becoming a
     node in the EGGNET, send a message to John at 133/107 (via 133/0
     after 4/1/88, as Steve Antonoff will be gating netmail into
     EGGNET after that time).  I will be continuing to develop the
     basic policies and procedures for EGGNET.  We are still looking
     for a third Egg Commissioner to handle miscellaneous chores for
     EGGNET, so if you are interested or know anyone else that would
     FidoNews 5-13                Page 13                  28 Mar 1988


     like to volunteer, please let us know!

     Finally, the one point to remember about EGGNET is that we are
     made up of volunteers.  No one gets paid, no one gets their
     phone bills paid for them, and there is no glory or power OTHER
     THAN the feeling of friendship and accomplishment.  This is how
     it originally was with Fidonet, and that is what we are going
     back to.  If this flies, then great.  Perhaps other networks
     will learn from us.  If EGGNET flops, then so be it.  At least,
     we will have tried.

     Ken Shackelford
     John Zimmatore


     -----------------------------------------------------------------

     FidoNews 5-13                Page 14                  28 Mar 1988


                     MegaList - Seven Months Later
                            (an update)
                            Chris Irwin
                     D'Bridge Support, 1:135/68
                         (1200-9600/HST)


          BACKGROUND

          Well, it's been seven months since I first wrote an article
     announcing the MegaList and I figured that it was about time to
     write a follow-up.  For those of you that don't know about the
     MegaList, it's a national cross-system file listing and (if I may
     say so myself) it's doing rather well!  As of this moment, there
     are over 28,000 files listed on 58 systems.  (1.2 gigobytes!)

          When I first started, I envisioned the MegaList as a text
     file sorted by filename listing all the files on participating
     systems.  This file still exists today, but it is over 400 pages
     long and unARCs to over a megabyte; it's grown to a point where
     it's a bit unreasonable to file-request or download unless you
     have a high-speed modem.  So in early August, I wrote a database
     inquiry program called ML-FIND; this allowed users to inquire
     directly using wildcard searches identical to a DOS directory
     listing.  This was setup as the "O" command in the file section
     of my board; instantly, you can locate any file on any system.


          CURRENT STATUS

        Part of the reason for writing this article was to announce a
     revolutionary new service offered by 1:135/68; this is the Mega-
     List inquiry service.  Because of the awesome new capabilities of
     D'Bridge, it is now possible for all WaZOO-based mailers to issue
     "Function Requests" to D'Bridge.  I won't go into exactly how it
     works here, but I'd like to explain how you can use it.  If you
     wish to inquire into the MegaList via netmail, here's what to do:

         1) Make sure that you are using a WaZOO/ZMODEM-based mailer
            such as D'Bridge, FrontDoor, Opus or BinkleyTerm.

         2) Create a text file called MEGALIST.INQ; this file should
            contain the filenames (including wildcards) that you wish
            to search for.  (one per line)

         3) Send the file to 1:135/68 and make sure that you have the
            "pickup" option enabled.

         4) When my system receives MEGALIST.INQ, it spawns the Mega-
            List Search program.  This program prepares MEGALIST.OUT
            which contains the results of your search.  This program
            has an internal timer so that no search may take over 30
            seconds.

         5) By ZMODEM "pickup" mail, D'Bridge will send you the output
            file, MEGALIST.OUT.  This file is a subset of the current
     FidoNews 5-13                Page 15                  28 Mar 1988


            MEGALIST.TXT file containing just the files that you were
            looking for or an error message if the file doesn't exist
            or your MEGALIST.INQ format was invalid.


          Simple, right?  I am aware that some other NETs (both here
     and abroad) are creating their own MegaLists for their area.  If
     any of you are running D'Bridge or FrontDoor and would like to
     provide this service also, please contact me for the software; it
     is not available as a general release as of this time.


          To summarize, the MegaList is available from 1:135/68 in the
     following forms:

          - By download, WaZOO or Bark request with the filenames:

            MEGALIST.ARC - A rather "huge" file containing the text
                           file MEGALIST.TXT; ALL files on ALL systems.

            MEGA-ARC.ARC - Another "huge" file with MEGA-ARC.TXT;
                           .ARC files on ALL systems.

            MEGA-TXT.ARC - A small subset of .TXT, .DOC and files with
                           no extension.

            ML-INDEX.ARC - The current database files for ML-FIND.
                           This file is somewhere around 400K and can
                           only be used with ML-FIND or ML-SEARCH.

          - By online inquiry through my Opus system using ML-FIND,
            the "Outside" command in the file-section.

          - Or by the WaZOO-based inquiry described above


          JOIN THE MEGALIST

          All BBS systems in North America are invited to join the
     National MegaList;  All that is required is that your system be
     100% IBM compatable and your BBS has Fido/Opus-compatable SYSTEM
     and FILES.BBS files.  Get the ML-UPD program from 1:135/68 and
     run it about once per month; systems must supply updates at least
     once every 90 days to remain in the list.

          ML-UPD takes just a few minutes to run and is completely
     automatic.  It creates an update file, ARCs it, then mails it
     to the National MegaList center in Miami, Florida.  The following
     software relating to the MegaList is available for download or
     WaZOO/Bark file-request from 1:135/68:

          ML-UPD.ARC  -  MegaList update software; used to  add your
                         system to the national (or a local) list.

          ML-COL.ARC  -  Create MegaLists for your NET or REGION with
                         this program; this also can create database
     FidoNews 5-13                Page 16                  28 Mar 1988


                         files for ML-FIND.

          ML-FIND.ARC -  An "Outside" command designed to be used with
                         Opus that allows fast database inquiry into
                         the megalist.  Requires ML-COL or ML-INDEX
                         to operate.


          THE FUTURE

          Well, I meant to release a "version 2" late last year, but
     my six-month project of writing D'Bridge kinda kept me more than
     busy.  Now that D'Bridge is ready for preliminary release in the
     middle of March, I am ready to dedicate some time to making some
     revsions to the way MegaList works.  It has been suggested that
     the best way to organize the list would be to break down the
     collection process using Regional MegaList Coordinators.  These
     coordinators would maintain a list for their region plus submit
     the data to the national collection center on a monthly basis.

          I agree with this approach, but I think that we should go
     a step further and organize the lists by catagory/machine type.
     As of this time, I haven't written one line of code towards the
     "version 2" because I'm at a loss for exactly what to do.  I'm
     at a point where I really need some feedback from the users and
     potential users of the MegaList.  If you feel (as I do) that this
     project warrants continuing effort and organization, then your
     input and/or help would be greatly appreciated.  Help along the
     following lines is requested:

          - Regional MegaList Coordinators needed; the IFNA nodelist
            is broken down into logical regions.  If we could get one
            person from each region willing to act as a collection
            center, we could make the concept work much better.  As
            I said earlier, the national list (in text format) is a
            little bit unreasonable in size; database inquiry is the
            only logical way for inquiry into this ever-growning list.

          - Software authors for non-IBM machines; from the beginning,
            people have complained about ML-UPD not working on non-
            compatables.  I must admit, that I did this on purpose to
            keep non-IBM software out of the list.  If we can come up
            with a way to put a "tag" on each file-area defining the
            machine and software catagory, we could segment the list
            in a very logical way...

          - General constructive criticism; sometimes being the author
            of a widely-used package causes one to be a bit "myopic"
            in one's views.  I admit that this is the case here.  It
            would really help if I got some feedback about this and
            some suggestions about how I can make the MegaList work
            more effectively.  Over the last few months, interest has
            slacked off a bit in the national list.  There are many
            local/regional lists, but people seem less interested in
            the national list.  Right now, the MegaList is actually
            shrinking rather than growing; at one point, 70 systems
     FidoNews 5-13                Page 17                  28 Mar 1988


            were listed!

          Anyway, I can't believe that I could type so much; I didn't
     think that I had so much to say.  Thanks for listening/reading
     and please JOIN THE MEGALIST if you're not already participating.
     Stay tuned for my article announcing the amazing, WaZOO-based,
     98% SEAdog-compatable Electonic Mail System, D'Bridge!


          Chris Irwin, D'Bridge Support, 1:135/68
          (305) 232-9365  (1200-9600/HST)



     -----------------------------------------------------------------

     FidoNews 5-13                Page 18                  28 Mar 1988


     David Garrett, 1:103/501
     Nominations and Elections Chairman


     The time has come for all those who desire to run for the postion
     of Director for their Division (Region) to place their  names  on
     the ballot.


     The  following Divisions have their BoD Representatives Positions
     up for re-election:

         Division 10
         Division 12
         Division 14
         Division 16
         Division 18
         Zone 2

         At-Large 5 Members

     In order to qualify to run for the position,  it is necessary for
     to  be a dues paying member of IFNA,  if running for a Divisional
     position, to be a member of that Division (Region),  and have the
     support of 10 members of IFNA from your Region.  The procedure is
     as follows:

           1.  Send  a  Net  Mail  Message  direct  from  your node to
               103/501 stating that you intend to run for the position
               on the BoD (please state as to whether it  is  Regional
               or At-Large).

           2.  Have ten IFNA members submit their statement of support
               for  your  running  to  103/501 by Direct NetMail.  The
               subject line of the message should contain  your  name.
               If  you  are running for a Divisional position then you
               must have 10 Members  from  your  Region  support  you,
               otherwise   you   can  obtain  any  10  Members  names,
               duplicates are allowed.

     That's all that there is to it.  Your  Net  Mail  Message  should
     reach me no later than May 21,  1988, names will be listed on the
     Ballot in alpha sequence by Region.  At-Large directors  will  be
     listed in name sequence only.

     Ballots  will  be send to FidoNews for Publication by May 28th in
     order to meet the needs of the By-Laws.

     Remember that this is your organization and we need your  support
     to make it match the needs of our membership.


     -----------------------------------------------------------------

     FidoNews 5-13                Page 19                  28 Mar 1988


                        A New Net in Massachusetts
                       by David Kaufman (1:321/147)

     Starting with NODELIST.078 (barring some unforeseen occurence) a
     new net, Net 322, will form in Massachusetts.  The new net will
     be comprised of nodes from both of the existing nets (Net 321 and
     Net 101).  If you do echomail or have regular correspondence with
     any Massachusetts node, make sure you know which net that node
     will be in.  Here's a list of those which will be moving:

                      Net 322 (the new MassNet East)

            Old #   New #   |  Old #   New #  |  Old #   New #
            ------- ------- | ------- ------- | ------- -------
            101/140 322/710 | 101/129 322/890 | 101/117 322/117
            101/168 322/110 | 101/172 322/130 | 101/139 322/180
            101/113 322/188 | 101/433 322/210 | 101/448 322/220
            101/162 322/230 | 101/188 322/240 | 101/166 322/310
            101/14  322/14  | 101/182 322/335 | 101/184 322/339
            101/132 322/340 | 101/146 322/360 | 101/186 322/380
            321/147 322/422 | 321/148 322/410 | 321/401 322/470
            101/27  322/27  | 101/885 322/530 | 101/124 322/559
            101/156 322/555 | 101/174 322/557 | 101/125 322/560
            101/126 322/561 | 101/164 322/566 | 101/366 322/590
            101/152 322/940 | 101/105 322/960 |


     -----------------------------------------------------------------

     FidoNews 5-13                Page 20                  28 Mar 1988


                       MY COMPUTER

                You sit there on the table,
                With just a little RAM.
                I wish that you were able,
                To really give a Damn.

                Your screen is brightly colored,
                An your drive goes round and round.
                The inner workings dullered,
                The data you have found.

                Sometimes, you work just fine,
                An others you do not.
                I think you spend more time,
                Looking for what you've got.

                I wonder what would happen,
                If you could only talk.
                But if that should ever happen,
                Think I'd go out for a walk.

                So here's to my computer,
                You work so hard for me.
                You use to be my tutor.
                Now you've set me free.



                                          Jake Hargrove (CTBBS)
                                          (C)1987



     -----------------------------------------------------------------

     FidoNews 5-13                Page 21                  28 Mar 1988


     Setting up NetMail with QuickBBS
     By Gene Coppola 1/114 (107/246)

     By now you have downloaded a copy of Quick BBS and have
     decided that it is the BEST Shareware Bulletin Board system
     and have decided you would like to join the network.

     Okay, great. The first thing you should do is get a copy of
     POLICY3.DOC and read it thoroughly from start to finish.
     This file explains all you need to know to get a Net/Node
     number and join the network. (Okay I was obligated to tell
     you that first, now let's continue.)

     The world is divided into seperate Zones in the network.
     Each Zone is then divided into multiple Regions. Each Region
     is further divided into Nets. Each Net has a Coordinator and
     in most cases several Hubs that service the individual
     Sysops in each Net.

     Each Sysop who joins the Net receives a unique Net/Node
     identification number to identify his system. The
     Coordinator's Net/Node number is easy to find in the
     Nodelist as it ends in a zero. For example a Sysop in the
     Net 107 area who would like to request a Net/Node number
     would send a message to 107/0 who would start the processing
     on it's way.

     Current policy REQUIRES that all requests for Net/Node
     number assignments be sent via NETMAIL to the appropriate
     person. This might sound strange, but in fact is based on
     sound reasoning. If you have set up your system properly,
     then the message will get through, and in most cases this
     also means that you will be able to receive NETMAIL as well
     as send it. If your system is not set up properly then the
     message will not be sent, and you will have to do further
     work to get your system set up properly.

     No matter what system you are running ie; Quick BBS, TBBS,
     RBBS, Fido or Opus, you NEED to get a copy of the Nodelist
     if you wish to join the public network. The Nodelist is
     updated once a week as is available on most systems. The
     first time, you will need to get the complete Nodelist. Each
     weeks list is numbered with a Julian day as the last 3
     digits of the file name. For example the Nodelist for March
     18, 1988 should be named NODELIST.078 or in the archived
     form it would be called NODELIST.A78. The last 3 digits
     increase as the year goes on. Once you get the first copy
     you can update it each week by obtaining that weeks NODEDIFF
     which contains the weekly updates.

     The NODEDIFF files are also numbered the same way so the
     NODEDIFF for the above date would be NODEDIFF.A78. Way back
     when I first started, we updated the Nodelist by hand,
     adding and deleting nodes manually. However this soon got to
     be too much work, and utilities were written to automate
     this task for you.
     FidoNews 5-13                Page 22                  28 Mar 1988


     The BEST utility to use for this is known as XLATLIST and is
     usually available on systems under the following names of
     XLATRGEN.ARC or XLATLIST.ARC. The current version of this
     utility is 2.86 as of the date of this article. XLATLIST was
     written and designed to make the weekly updates as painless
     as possible. Once set up, XLATLIST will take last weeks
     Nodelist, process the current Nodediff and produce a new,
     updated Nodelist for you. This utility was written by Thom
     Henderson of System Enhancement Associates, and we all owe
     Thom thanks for this fine utility.

     Other people have written utilities but none perform up to
     the high standards of XLATLIST. XLATLIST was freely given to
     Sysops to use, while other utilities require payment for
     continued use, and in certain instances have even been know
     to send Netmail messages to their authors, notifying them
     that you are using their software. XLATLIST is great, and
     the author is a concerned Sysop, who deals with problems as
     they occur and provide updates as needed.

     An important note is needed here. In order for XLATLIST to
     properly work, you MUST run it EACH and EVERY week without
     fail. This will assure you that your list is up to date and
     you will not be accidently calling a "little old lady" in
     the middle of the night, trying to send Netmail.

     Okay, once you XLATLIST, you set up the control file for it,
     with the appropriate information. In the case of a new Sysop
     requesting a node number, use a -1 as your node number. For
     example, after reading the nodelist and determining you are
     in the Net 107 area, you would put 107/-1 as your node
     number UNTIL you receive your permanent number. This special
     number (-1) notifies the Coordinator this a request for a
     node number.

     PLEASE, do not make up a node number. This is the "accepted"
     way of requesting a node number. Making up a node number
     will just confuse the entire process and result in a delay
     for you to receive your number.



     Now copy the file that XLATLIST produces (nodelist.bbs) to
     your Quick BBS directory. Run Qconfig and set up the basic
     parameters, including a message board for Netmail (there can
     be only ONE such board in Quick BBS) and the basic
     information requested.

     Now run Qnode which will process the information contained
     in nodelist.bbs and produce a file that Quick BBS uses to
     know where to send Netmail.

     Now send a message to the Coordinator in the area that you
     are in requesting a Net/Node number. Please be sure to
     include the following information as a minimum.

     FidoNews 5-13                Page 23                  28 Mar 1988


     1) Sysops Name
     2) Bulletin Board Name
     3) Phone Number
     4) Full Address Of The System.
     5) Maximum Baud Rate
     6) Hours System Operates.
     7) Name Of Front End Software
     8) Protocols In Use.

     This is the MINIMUM information required. If the Coordinator
     requires more information, you will be notified of this.

     Quick BBS requires some type of external software to handle
     the Netmail functions. The following software (in no special
     order) works quite well with Quick BBS. Binkley, SEAdog,
     Dbridge, Front Door, and Dutchie. I prefer Binkley which is
     widely available and works quite well.

     Once Quick BBS and your Front End are set up, it is time to
     send the message to your Coordinator. Remember that the
     Coordinator's number will end in a zero (107/0). Hopefully
     the Coordinator will send back information pertaining to any
     special routing your Net uses to process Netmail.

     At this point in time you must make your system available to
     process mail during National Mail Hour (NMH). NMH has been
     carefully established to allow mail to flow between systems
     when the costs are the lowest. On the East Coast (EST) NMH
     is currently between 4 and 5 a.m. Your Coordinator can help
     you translate this into the proper time frame for your
     location.

     So to recap, the following files are the minimum required to
     set up for Network mail.

     1) Current Nodelist File.
     2) XLATLIST or XLATRGEN File.
     3) One Of The Various Front End Mail Programs.

     If you cannot find these anywhere else, they are available
     from 1/114 at (516)-328-7064. We are open from 6:15 a.m.
     until 2:45 a.m. for bulletin board access. All files above
     and all the Quick BBS software and utilities are available
     to FIRST time callers.

     Here is a current list of the Quick BBS software and
     utilities currently on-line.

     QUICKBBS.ARC QuickBBS Standard Package (Main Program)
     QUICKDOC.ARC QuickBBS Sysop Documentation
     QUICKNET.ARC QuickBBS Net Mail Option
     QUICKECO.ARC QuickBBS EchoGen Mail Option
     QUICKPAK.ARC All Of The Above Files
     HELPFILE.ARC New Quick BBS Help Files
     SAMPMENU.ARC Menus Used On This System <-Updated
     SAMPQEST.ARC Sample New User Questionnaire
     FidoNews 5-13                Page 24                  28 Mar 1988


     STRUCT.ARC File Structures For Quick BBS
     X00109.ARC Fossil Driver
     BULLMAKE.ARC News/Bulletin Generator (FREEWARE)
     CVTMSG.ARC Imports Messages From Opus To Quick BBS
     CVTUSER.ARC Converts Opus User File To Quick BBS
     DSZ0208.ARC External Zmodem Protocol (Latest Version)
     ECHOAREA.ARC Echo Mail Utility For Version 2.0 and up
     FILESCAN.ARC Creates List Of Available Files V 2.12 <-New
     MGMLINK.ARC Very Handy Echo Mail Utility
     PCB-QBBS.ARC Run Quick BBS As A Door On PcBoard
     QBBSEXAM.ARC Changes Caller Count In SYSINFO
     TODAY.ARC Highlights Each Day In History (Door)
     USERLOG.ARC Userlog/Message Base/Answerfile Utility <-New
     UPURGE.ARC Purge By Date, Security Level
     WXMODEM.ARC External Wxmodem Driver
     BINKBATS.ARC My Cfg And Bats To Run Binkley
     BEXE_140.ARC Latest Version Of Binkley
     BT_286.ARC Binkley 1.40 Compiled For 286 Machines
     BINKOMMM.ARC Using OMMM With Binkley
     FILESCAN.ARC Now Supports Binkley V 2.12 <--NEW
     OMMM_107.ARC Message Handler With COMPLETE Docs
     OMMMHELP.ARC More Help Using OMMM With Binkley
     ONODE146.ARC Nodelist Utility For Binkley
     REMAPPER.ARC Service Points With Binkley




     Here is a list of the Door software now available, please
     note that these are for Quick BBS 2.0 and up!

     ADVE0288.ARC Adventure Yes it is the old Adventure game
     ALPH0288.ARC Alpha Word game in space
     ARAB0288.ARC Arab Word game on the Hot Sands
     AROU0288.ARC Around Word game make it around the world
     ATLA0288.ARC Atlantis Word game getting out of Atlantis
     BBSL0288.ARC BBS listing program
     CAST0288.ARC Castle Adventure Game
     CAVE0288.ARC Cave Multi-User takes place in a Cave
     CHAT0388.ARC Eliza Like 'Sysop' Chat Routine
     CHES0288.ARC Chess Users play chess Excellent!!
     CIA0288.ARC C.I.A. Word game Beat the bad people
     CRAZ0288.ARC Crazy Word game in a mental hospital
     KILL0288.ARC Killer Word game GET out of harlem
     KING0288.ARC King A Multi-User trivia game
     MARS0288.ARC Mars Word game on Mars
     MEGA0388.ARC Search/View The National Megalist
     MONI0288.ARC Monitor Good program to tie Doors together
     NETM0288.ARC NetMail puts you on the Fido Net (For RBBS)
     PIRA0388.ARC Pirate Multi-User Takes place on the ocean
     REVE0288.ARC Reverse Try to reverse numbers for points
     RIPP0288.ARC Ripper word game Jack the Ripper
     ROVE0288.ARC Rover Try to get Rover Robot across grid
     SWOR0288.ARC Sword Word game kill medusa if you can
     SYSU0388.ARC Remote Sysop Utility
     TIME0388.ARC Time word game about time travel
     FidoNews 5-13                Page 25                  28 Mar 1988


     TW5A0388.ARC TradeWars 500  part 1 of 2
     TW5B0288.ARC TradeWars 500  part 2 of 2

     As you can see, in the short time that Quick BBS has been in
     operation, it has developed into a full featured Bulletin
     Board program, which takes a back-seat to no other software.

     -----------------------------------------------------------------

     FidoNews 5-13                Page 26                  28 Mar 1988


     =================================================================
                                  COLUMNS
     =================================================================

                                    YACK
                      Yet Another Complicated Komment

                            by Steven K. Hoskin
                        ( STEVE HOSKIN at 1:128/31 )

                       Episode 4:  Electronic Voting



          I don't know about  y'all  out  there,  but  I want to see a
     democratic FidoNet.  You know,  where each FidoNode gets one vote
     on matters that concern the InterNational FidoNet.

          I thought originally that was  why the InterNational FidoNet
     Association went corporate;  so  there'd be rules to follow about
     collective voting.

          As it turned out, for  whatever  reasons,  IFNA did not turn
     out to be that voting tool, that  graceful central coordinator of
     the collective will of all  FidoNet  SysOps.  One of its problems
     is that members of FidoNet are  NOT  necessarily members of IFNA.
     Therefore, IFNA cannot do things  to  control FidoNet, as FidoNet
     SysOps don't get to vote on IFNA matters if they're not IFNA.

          To join IFNA costs $25.    You  should  NEVER have to pay to
     vote on  something  that  affects  the  way  you  run  your life.
     Period.

          I joined IFNA because I thought  it would help to insure the
     survival of FidoNet during hard times.  That may still hold true,
     and I will probably be an IFNA member for life, but one thing has
     become clear to me:  IFNA IS NOT ESTABLISHING NET-WIDE DEMOCRACY.

          Don Daniels, president of IFNA, has requested ideas for ways
     to establish a fully democratic  FidoNet,  BE IT VIA IFNA OR SOME
     OTHER MECHANISM.  Now there's a man who's interested in FidoNet.

          Well, here we go again, folks, YET ANOTHER idea:  Electronic
     Voting.

          Reserve a FidoNode, just  like  1:1/0 does the NodeList, and
     1:1/1 does the FidoNews,  to  handle  strictly Electronic Voting.
     For sake of example, I'll use  1:1/9.   I don't know if this Node
     number is being used for anything, but that's my example.

          For starters, if IFNA is to be retained (as many of us would
     STILL like to see), we must adopt  a  by-law (if nothing stronger
     can be used) that states in whatever legal wording is needed that
     IFNA as an organization MUST ABIDE BY FIDONET SYSOP VOTE RESULTS.
     And that IFNA MUST  ISSUE  BALLOTS  FOR  VOTE  ON  ANY RESOLUTION
     REQUESTED BY ANY FIDONET SYSOP.
     FidoNews 5-13                Page 27                  28 Mar 1988


          Then get 1/9 going.  An automated  system, disallowing human
     tampering, whereby ballots and  resolutions are sent to the node,
     1/9 sends the ballot via Network  mail AUTOMATICALLY to ALL Nodes
     in the NodeList DIRECTLY, and waits for some predetermined amount
     of time for a vote result.

          If one month is  the  predetermined  time,  have 1/9 re-send
     ballots to any Node from  which  no  vote  has been received on a
     weekly basis until either a  vote  is  received or the time limit
     has been reached.

          As vote "ballot" messages come back to 1/9 via Network Mail,
     in   some   predetermined   format   such   that   a   relatively
     unsophisticated program can  determine  the vote, 1/9 tallies the
     vote, stores the message,  and  sends  a verification message via
     Network Mail DIRECTLY to the node that allegedly sent the ballot.

          Duplicate Node  votes  would  be  cancelled  and  the ballot
     reissued to the Node in  question  with  a note commenting on the
     duplication.

          A password  could  be  set  up  for  each  Node  and  placed
     somewhere  in  the  Ballot  return   vote  message.    Improperly
     passworded ballots would cause  1/9 to send a message DIRECTLY to
     that Node informing  him  or  her  that  a  password  failing had
     occurred.  A place for changing  of passwords could also be added
     to the ballot return message.

          This should eliminate "bogus"  node  voting, as the SysOp of
     the REAL Node could  then  be  aware  that  somebody is trying to
     break into his or her vote.

          When all Nodes have responded  OR the time limit is reached,
     1/9 forwards the vote  results  to  anybody that wants it, either
     via Network Mail or as an Echo Area.

          Have a preformed  message  format  for  requesting a ballot,
     which could be sent to  1/9  such  that  no human could interfere
     with the request for the vote.  This eliminates interference with
     the   vote   request   system  if  someone   feels   that   their
     ballot/resolution  has  not  been  properly  sent to 1/9 by IFNA.
     Improper resolutions  thusly  sent  could  be  construed as being
     "excessively annoying"  and  multiple  occurrences  of such could
     then be voted on by the Network  for  possible EXCOMMUNICATION of
     the offending Node.

          Choosing who runs Node  1/9  is  a  sensitive subject, since
     that person  could  theoretically  tamper  with  things.  There's
     simply going to have to be SOME kind of trust out there.

          This is not a full overview,  as  I  am  trying to limit the
     size of this column.  Replies, questions, comments, etc.  contact
     me as STEVE HOSKIN at Node 1:128/31.   I'd love to see this thing
     implemented.  I'd even write the software.  :-)

     -----------------------------------------------------------------
     FidoNews 5-13                Page 28                  28 Mar 1988


     =================================================================
                                  NOTICES
     =================================================================

                          The Interrupt Stack


     16 May 1988
        Digital Equipment Corporations Users Society Spring Symposium.
        Will be held May 16-May 20 in Cincinnati, OH.

     25 Jun 1988
        EuroCon II starts in Tiel, Holland. Sponsored by the Dutch
        Hobby Computer Club. Will run for 2 days. Contact Hans
        Lichthelm at 2:2/999 for information.

     16 Jul 1988
        A new  areacode, 508, will  form in eastern  Massachusetts and
        will  be effective on  this date.  The  new area  code will be
        formed  from the  current  areacode 617.  Greater Boston  will
        remain areacode 617  while the  rest of eastern  Massachusetts
        will form the new areacode 508.

     25 Aug 1988
        Start  of the  Fifth  International  FidoNet Conference, to be
        held  at  the Drawbridge Inn  in Cincinnati, OH.  Contact  Tim
        Sullivan at 108/62 for more information. This is FidoNet's big
        annual get-together, and is your chance to meet all the people
        you've  been talking with  all this time.  We're hoping to see
        you there!

     24 Aug 1989
        Voyager 2 passes Neptune.


     If you have something which you would like to see on this
     calendar, please send a message to FidoNet node 1:1/1.

     -----------------------------------------------------------------

     Christopher Baker
     MetroFire - 135/14 (18/0)

     Effective 22 Mar 88, my working hours will be changed
     from day shift to afternoon shift. Those of you used to
     reaching me in the A.M. should make a note of my new
     schedule.

     You may contact me from 1430-2230, Tuesday-Saturday, at
     305-596-8576.

     Thanks.

     -----------------------------------------------------------------

                          Latest Software Versions
     FidoNews 5-13                Page 29                  28 Mar 1988


     BBS Systems            Node List              Other
     & Mailers   Version    Utilities   Version    Utilities   Version

     Dutchie        2.80    EditNL          3.3    ARC            5.21
     Fido            12g*   MakeNL         2.03    ARCmail         1.1
     Opus          1.03b    Prune          1.40    ConfMail       3.31
     SEAdog         4.10    XlatList       2.86*   EchoMail       1.31
     TBBS           2.0M                           MGM             1.1
     BinkleyTerm    1.40*
     QuickBBS       1.02

     * Recently changed

     Utility authors:  Please help  keep  this  list  up  to  date  by
     reporting  new  versions  to 1:1/1.  It is not our intent to list
     all utilities here, only those which verge on necessity.

     -----------------------------------------------------------------

     FidoNews 5-13                Page 30                  28 Mar 1988


                                      __
                 The World's First   /  \
                    BBS Network     /|oo \
                    * FidoNet *    (_|  /_)
                                    _`@/_ \    _
                                   |     | \   \\
                                   | (*) |  \   ))
                      ______       |__U__| /  \//
                     / Fido \       _//|| _\   /
                    (________)     (_/(_|(____/ (tm)

            Membership for the International FidoNet Association

     Membership in IFNA is open to any individual or organization that
     pays  a  specified  annual   membership  fee.   IFNA  serves  the
     international  FidoNet-compatible  electronic  mail  community to
     increase worldwide communications.

     Member Name _______________________________  Date _______________
     Address _________________________________________________________
     City ____________________________________________________________
     State ________________________________  Zip _____________________
     Country _________________________________________________________
     Home Phone (Voice) ______________________________________________
     Work Phone (Voice) ______________________________________________
     Zone:Net/Node Number ____________________________________________
     BBS Name ________________________________________________________
     BBS Phone Number ________________________________________________
     Baud Rates Supported ____________________________________________
     Board Restrictions ______________________________________________
     Your Special Interests __________________________________________
     _________________________________________________________________
     _________________________________________________________________
     In what areas would you be willing to help in FidoNet? __________
     _________________________________________________________________
     _________________________________________________________________
     Send this membership form and a check or money order for $25 in
     US Funds to:
                   International FidoNet Association
                   c/o Leonard Mednick, MBA, CPA
                   700 Bishop Street, #1014
                   Honolulu, Hawaii 96813-4112
                   USA

     Thank you for your membership!  Your participation will  help  to
     insure the future of FidoNet.

     Please  NOTE  that  IFNA is a general not-for-profit organization
     and Articles of Association  and  By-Laws  were  adopted  by  the
     membership in January 1987.  The first elected Board of Directors
     was filled in August 1987.  The IFNA Echomail Conference has been
     established  on  FidoNet  to  assist  the Board.  We welcome your
     input to this Conference.

     -----------------------------------------------------------------

     FidoNews 5-13                Page 31                  28 Mar 1988


                     INTERNATIONAL FIDONET ASSOCIATION
                                 ORDER FORM

                                Publications

     The IFNA publications can be obtained by downloading from Fido
     1:1/10 or  other FidoNet compatible  systems, or by purchasing
     them directly from IFNA.  We ask that  all our  IFNA Committee
     Chairmen   provide  us   with  the  latest  versions  of  each
     publication, but we can make no written guarantees.

     Hardcopy prices as of October 1, 1986

        IFNA Fido BBS listing                       $15.00    _____
        IFNA Administrative Policy DOCs             $10.00    _____
        IFNA FidoNet Standards Committee DOCs       $10.00    _____

                                                  SUBTOTAL    _____

                      IFNA Member ONLY Special Offers

        System Enhancement Associates SEAdog        $60.00    _____
        SEAdog price as of March 1, 1987
        ONLY 1 copy SEAdog per IFNA Member

        Fido Software's Fido/FidoNet               $100.00    _____
        Fido/FidoNet price as of November 1, 1987
        ONLY 1 copy Fido/FidoNet per IFNA Member

        International orders include $10.00 for
               surface shipping or $20.00 for air shipping    _____

                                                  SUBTOTAL    _____

                    HI. Residents add 4.0 % Sales tax         _____

                                                  TOTAL       _____

        SEND CHECK OR MONEY ORDER IN US FUNDS:
        International FidoNet Association
        c/o Leonard Mednick, MBA, CPA
        700 Bishop Street, #1014
        Honolulu, HI.  96813-4112
        USA

     Name________________________________
     Zone:Net/Node____:____/____
     Company_____________________________
     Address_____________________________
     City____________________  State____________  Zip_____
     Voice Phone_________________________

     Signature___________________________

     -----------------------------------------------------------------

-- 
=======================================================================
| ...sun!hoptoad!\                                     Tim Pozar      |
|                 >fidogate!pozar               Fido:  1:125/406      |
|  ...lll-winken!/                            PaBell:  (415) 788-3904 |
|         USNail:  KKSF  77 Maiden Lane  San Francisco CA 94108       |
=======================================================================