[comp.org.fidonet] FidoNET Newsletter, Volume 4, # 28

pozar@hoptoad.uucp (Tim Pozar) (07/31/87)

     Volume 4, Number 28                                  27 July 1987
     +---------------------------------------------------------------+
     |                                                  _            |
     |                                                 /  \          |
     |                                                /|oo \         |
     |        - FidoNews -                           (_|  /_)        |
     |                                                _`@/_ \    _   |
     |        International                          |     | \   \\  |
     |     FidoNet Association                       | (*) |  \   )) |
     |         Newsletter               ______       |__U__| /  \//  |
     |                                 / FIDO \       _//|| _\   /   |
     |                                (________)     (_/(_|(____/    |
     |                                                     (jm)      |
     +---------------------------------------------------------------+
     Editor in Chief:                                   Thom Henderson
     Chief Procrastinator Emeritus:                       Tom Jennings
     
     FidoNews  is  published  weekly  by  the  International   FidoNet
     Association  as  its  official newsletter.  You are encouraged to
     submit articles for publication in FidoNews.  Article  submission
     standards  are contained in the file ARTSPEC.DOC,  available from
     node 1:1/1.
     
     Copyright 1987 by  the  International  FidoNet  Association.  All
     rights  reserved.  Duplication  and/or distribution permitted for
     noncommercial purposes only.  For  use  in  other  circumstances,
     please contact IFNA at (314) 576-4067.


                          Three Weeks to FidoCon!

                             Table of Contents

     1. EDITORIAL  ................................................  1
        Is Echomail Doomed?  ......................................  1
     2. ARTICLES  .................................................  2
        The Maxum Turbo XE - A Serious Computer  ..................  2
        FidoNet in Japan  .........................................  6
        MegaList: A Cross-System File Listing  .................... 10
        Public Key Encryption for FidoNet Mail  ................... 11
        Sirius 0.50 - A Review  ................................... 18
        Sports Net ECHO Conference  ............................... 23
     3. COLUMNS  .................................................. 24
        Broadcast Booth - In The Network  ......................... 24
        The Regular Irregular Column  ............................. 25
     4. NOTICES  .................................................. 30
        The Interrupt Stack  ...................................... 30
        Latest Software Versions  ................................. 30
        International FidoNet Conference Registration Form  ....... 31
        IFNA Board of Directors Ballot  ........................... 32
     FidoNews 4-28                Page 1                   27 Jul 1987


     =================================================================
                                 EDITORIAL
     =================================================================

                            Is Echomail Doomed?


     For some time now,  and even more so lately,  we've been watching
     the consequences of our regrettable lack of security.  FidoNet is
     reasonably secure about sending mail to the right people (if  you
     don't look too closely at mail pickups),  but it's wide open when
     it comes to receiving mail.  In normal network  mail  this  isn't
     all  that much of a problem,  but with echomail we find ourselves
     holding a kettle of fish of quite a different color.  I have seen
     two major conferences whither and almost die under what amount to
     terrorist attacks.

     Can we defend ourselves?  Security  measures  can  be  developed,
     surely,  but  will  they do the trick?  I suspect not,  for a few
     reasons.

      1) Most of the measures proposed  are  for  securing  predefined
         conference links, which leaves normal network mail wide open.

      2) For  good  reason.  Securing normal netmail is not practical.
         How can you prearrange security  measures  with  a  new  node
         across the country that you didn't even know existed?

      3) Even  if we secured all links between all systems everywhere,
         that still  won't  stop  people  from  willingly  linking  in
         a known terrorist.

      4) Besides, anyone could fabricate messages for propagation over
         a secure line that appear to originate anywhere at all.

     It starts to look pretty  hopeless.  Is  echomail  doomed?  Well,
     not quite.  When one looks at which conferences were attacked, it
     becomes   apparent   that  it  is  only  the  large  national  or
     international conferences that  really  present  a  good  target.
     Terrorists thrive on attention and  response,  which  they  don't
     really  get in the smaller conferences.  Not to mention that in a
     smaller conference it is correspondingly easier to identify where
     the terrorist is linking in.

     Echomail will thrive.  People  will  continue  to  establish  new
     conferences  for  every topic under the sun.  Echomail is far too
     important a part of our subculture to die out now.  But I suspect
     that the heydey of the  large  international  conference  may  be
     drawing to a close.

     -----------------------------------------------------------------

     FidoNews 4-28                Page 2                   27 Jul 1987


     =================================================================
                                 ARTICLES
     =================================================================

     From 107/246

                  The Maxum Turbo XE - A Serious Computer

     The following is an in-depth review of  a  fine  clone  that  you
     should  consider  in  your shopping list if you are looking for a
     new computer in the near future.

         Data Sheet For MAXUM TURBO XE Personal Computer
         -----------------------------------------------

         MAXUM TURBO XE COMPUTER
         Sold by 47th Street Photo.

         The basic unit comes configured as follows:

         Maxum Turbo XE system unit.
         Phoenix type fast Ram test BIOS.
         AT style keyboard with indicator lights built in.
         256k Ram (256k Chips)-(Expandable to 1024k).
         One full height 5 1/2 inch 360k floppy drive.
         One disk controller for up to 2 floppy drives.
         Built in game port.
         8 Expansion Slots (2 Half - 6 Full Size Slots)
         FCC approved slide type case.
         Approved as Class B computing device.
         180 Watt Power Supply.
         MS-DOS 3.2 And GW-BASIC are included.
         Dual speed (4.77/8 Mhz 8088-2) processor.
         Socket for 8087 co-processor chip.
         Built in (battery powered) clock/calendar card.  Keyboard
         (key operated) lock-out switch.
         Power, Turbo, Hard Disk indicator lights.
         Built in reset switch in rear of machine.
         Internal speaker in front of system unit.
         4 power plugs coming out of power supply.

     Price as configured above is $499.00 plus tax.

     The unit comes securely packed in a double carton and  each  unit
     is tested before being released for sale.

     There  is  a  sticker  attached  to  the rear of each unit with a
     number to call for service and/or  advice  (not  toll  free)  you
     might need.  We called twice and each time the phone was answered
     by a polite technician  who  had  a  thorough  knowledge  of  the
     computer  and  was a great help in setting up the computer.  Each
     unit comes with a 5  book  set  of  documentation  complete  with
     excellent  instructions for the novice as well as the experienced
     user.

     I would judge that anyone could have this unit unpacked and fully
     FidoNews 4-28                Page 3                   27 Jul 1987


     operational inside of 25 minutes from opening the carton for  the
     first time.

     The documentation is from Microsoft for the most part and is well
     written  and  should  be a great help in setting up the system as
     well as utilizing the Ram from 640k to 1024k should you decide to
     install the extra Ram yourself at the time of purchase  or  at  a
     later date.

     The  system  as  tested  had  some extra features that were user-
     installed at the time of purchase. They were:

         Full 1024k Ram on the motherboard.
         IBM type RGB color card from Maxum.
         RS-232 card from Honeywell.
         One extra 5 1/2 inch floppy drive.
         One 22 Megabyte Miniscribe hard drive.
         Orchid Turbo 286E Card with 2 Megabytes Of Ram.
         Copy II Pc copy board.

     Approximate cost of system as tested is: $ 2399.00

     The system  runs  all  the  usual  PC  software  such  as  Lotus,
     Wordstar,  Flight Simulator,  dBase III+,  as well as Fido, Opus,
     SEAdog, Telix, PC-TALK, Qmodem and Crosstalk XVI.

     Lattice C,  Turbo Basic,  Quick Basic,  Microsoft Cobol,  and the
     Microsoft  Assembler  were  all  tested  and ran with no problems
     whatsoever.

     The system appears to be 100% compatible,  as we have  not  found
     any  software  that  will not run on this system at the time this
     article was written.

     Below  you will find some data we compiled from the various tests
     we ran on the system. There are 3 results reported for each test.

      1) Normal speed mode is the mode in which the computer  boots  up
         and  according  to  Norton's Sysinfo is slightly faster than a
         normal PC.

      2) Turbo speed is the user selectable speed  increase  gained  by
         typing  the  Cntrl-Alt-2 combination of keys.  This IS NOT the
         Orchid turbo speed which follows.

      3) 286 Turbo speed is when the Orchid 286E card is activated  and
         running.  In  this  mode  you  are  running  for all intensive
         purposes an IBM AT clone at 8 Mhz with  an  Intel  80286  chip
         handling  the processing.  Please note that in this mode it is
         possible to access 704k for DOS to run in,  as  opposed  to  a
         maximum 640k for the other two modes we tested.




         Maxum Turbo XE In Normal Speed Mode
     FidoNews 4-28                Page 4                   27 Jul 1987


         -----------------------------------
         SI-System Information, Version 3.10, (C) 1984-86

         IBM/PC
         Built-in BIOS programs dated Monday, September 15, 1986
         Operating under DOS 3.20
         5 logical disk drives, A: through E:
         DOS reports 640 K-bytes of memory:
         68 K-bytes used by DOS and resident programs
         572 K-bytes available for application programs
         A search for active memory finds:
         640 K-bytes main memory    (at hex 0000-A000)
         32 K-bytes display memory (at hex B800-C000)
         BIOS signature found at hex paragraph C800

         Computing performance index relative to IBM/PC: 1.7

         Maxum Turbo XE In Turbo Speed Mode
         ----------------------------------
         SI-System Information, Version 3.10, (C) 1984-86

         IBM/PC
         Built-in BIOS programs dated Monday, September 15, 1986
         Operating under DOS 3.20
         5 logical disk drives, A: through E:
         DOS reports 640 K-bytes of memory:
         68 K-bytes used by DOS and resident programs
         572 K-bytes available for application programs
         A search for active memory finds:
         640 K-bytes main memory    (at hex 0000-A000)
         32 K-bytes display memory (at hex B800-C000)
         BIOS signature found at hex paragraph C800

         Computing performance index relative to IBM/PC: 3.0

         Maxum Turbo XE With Orchid Turbo 286E Card Installed
         ----------------------------------------------------
         SI-System Information, Version 3.10, (C) 1984-86

         This computer might be identified by this:
         (C) Copyright 1986 More Computing. All Rights Reserved.
         Built-in BIOS programs dated Monday, November 8, 1982
         Operating under DOS 3.20
         5 logical disk drives, A: through E:
         DOS reports 704 K-bytes of memory:
         87 K-bytes used by DOS and resident programs
         617 K-bytes available for application programs
         A search for active memory finds:
         640 K-bytes main memory    (at hex 0000-A000)
         127 K-bytes display memory (at hex A040-C000)

         Computing performance index relative to IBM/PC: 9.2


     So  as  you can see from the test results above the stock machine
     in TURBO mode is much faster than a normal PC and of course  when
     FidoNews 4-28                Page 5                   27 Jul 1987


     the 286E co-processing board is added the speed jumps from 3.0 to
     9.2.

     The  Maxum  XE  in  my  Benchmark Test using PKARC to archive the
     following group of files used in my ARC tests.

         Filename        Length   Method   Size   Ratio
         --------        ------   ------  ------  -----
         AUTOEXEC.BAT       33  Crunched     31    7%
         COMMAND.COM     17664  Crunched  14787   17%
         CORRSTAR.OVR    57344  Crunched  28768   50%
         INTERNAL.DCT     35584 Squeezed  33871    5%
         LF.COM            512  Crunched    382   26%
         MAILMRGE.OVR    11520  Crunched   7533   35%
         PROKEY.EXE      13824  Crunched   6360   54%
         WC.EXE          12288  Crunched   8315   33%
         WINSTALL.COM     1152  Crunched    746   36%
         WINSTALL.OVR     38528 Crunched  22784   41%
         WPE.COM         21376  Crunched  16622   23%
         WPEMSGS.OVR     29056  Crunched  16072   45%
         WPEOVLY1.OVR    41216  Crunched  33172   20%
         WS1.PRO            29  Stored       29    0%
         WSCOLOR.BAS      6656  Crunched   2967   56%
         ----           ------           ------  -----
         0015           286782           192439   33%

     The following results were recorded when PKARC was used to create
     an archive file from the above files.

         Normal Speed   Turbo Speed   286 Turbo Speed
         --------------------------------------------
           01:12:43       00:44:99       00:20:00
         --------------------------------------------

     Using Wordstar and  Nodelist.184  I  performed  a  standard  move
     cursor  to end of file test.  The length of the nodelist used was
     149436 bytes.

         Normal Speed   Turbo Speed   286 Turbo Speed
         --------------------------------------------
           00:33:33       00:16:12       00:14:75
         --------------------------------------------

     Using PC Lab's Bench02 test which basically finds  prime  numbers
     the following results occurred.

         Normal Speed   Turbo Speed   286 Turbo Speed
         --------------------------------------------
           00:27:00       00:17:00       00:05:00
         --------------------------------------------

     All in all, a fine computer.

     -----------------------------------------------------------------

     FidoNews 4-28                Page 6                   27 Jul 1987


     Yoshi Mikami, November 26, 1986


                              FidoNet in Japan


     [Editor's note:  Sorry for  the  unusually  long  delay  on  this
     article.  It came to us via a very circuitous route.]


                           *** DOMESTIC NEWS ***

     FIDO/COLLIE SYSOPS' MEETING

     The  November  Fido/Collie  Sysops'  meeting  was   attended   by
     Tatsuyuki Arai,  Yoshi Mikami,  Maki Ohtoh and Junsei Yamada.  It
     was held on 11/14/86 at 7:00,  at Renoir coffee shop  (phone  03-
     493-1454)  near  the  east exit of Osaki Station in Tokyo.  Arai,
     Jun Moriya, John Takiguchi and Yamada had started this meeting on
     every second Friday of the month  from  last  August  to  discuss
     common FidoNet issues and concerns.  For Mikami and Ohtoh, it was
     the first time to meet these people.

     We  jointly  decided  that we will write to International FidoNet
     Association,  St.  Louis,  Missouri,  to get the  FidoNet  region
     number  for  Japan.  We  do  not  want  a host node under Pacific
     Region  12,  out  of  Honolulu,  Hawaii,  as  other  Asia-Pacific
     countries  such  as  Australia  and  New  Zealand  are operating.
     Mikami will write the letter.

     Arai wants to use the POLL and PICKUP functions on  the  receive-
     only  FIDO  node in Tokyo from his FIDO at home.  Those functions
     do not work properly for him.  Tom Jenning's  8/85  documentation
     that  he  has  does  not  explain in sufficient detail how to use
     these functions.  We will get assistance from Fido  operators  in
     U.S.

     We  know that there is a Usenet gateway,  run by Bob Hartman,  on
     FidoNet 101/101,  according to the 8/86 Fido documentation.  Does
     anyone know how to contact a Usenet node in Japan?

     Before switching to Fido, Arai ran Collie in October to find that
     Collie  handles the Japanese Kanji characters nicely.  (Ohtoh and
     Mikami have some Japanese messages in  their  systems.)  However,
     Collie  has  a minor problem in handling Japanese characters,  in
     the sense  that  some  Japanese  characters  are  interpreted  as
     Collie's  control characters.  We will write to D.  Plunkett when
     Jun Moriya returns from his trip to Australia to get the author's
     help (because he knows the technical details).

     Arai wanted to confirm,  and all the  meeting  attendees  agreed,
     that  FidoNet  in  Japan  will be operated on a non-profit basis,
     without discrimination of any kind.

     The  name  of  FidoNet  Japan  was  authorized  to  be  used   on
     Takiguchi's Fido BBS by Tom Jennings earlier this year, according
     FidoNews 4-28                Page 7                   27 Jul 1987


     to  Arai.   (The  Newsletter  Editor  doubt  that  this  has  any
     significance,  but it is documented here as this was discussed at
     the meeting.)

     Any  would-be  Fido/Collie  sysops  are  welcome  to  attend this
     monthly meeting.  The next meeting is on December 12, at the same
     time,  at the same place.  If English assistance is needed,  help
     will be provided.


     COLLIE NET TEST IN KANSAI AREA

     After some pioneering work in April and May 1986, the Fido/Collie
     activities  picked up in the Kansai area recently.  Geki Hagiwara
     provided the following experience report:

         *         *         *         *         *         *         *

         A BBS network FidoNet was formed and tested in Kansai area in
         Sep/Oct 1986.  Actually the software  was  Collie  (Colossus)
         which simulates FidoNet packet transfer protocol.  One of the
         reasons we chose Collie, not Fido, was that Collie resets the
         modem  every  time  the session is over.  It is believed that
         some  modems  cannot  detect  1200/300  and   CCITT/BELL   in
         particular  sequences.  In  such case resetting the modem may
         be effective.  Through our experience Hi-Modem  1200C  looked
         working satisfactorily.

         The members of TMCNET and their equipments are:

         NET NODE  Name          Area  Phone         H/W
         --- ----  ------------- ----- ------------  --------
         001  001  Joe Takemura  Osaka 06-674-1933   JX-5+HDD
              002  K.  Sawaguchi Osaka 06-XXX-XXXX   JX-4
         002  001  Geki Hagiwara Yasu  0775-86-0919  JX-4+HDD
              002  Ken Iwamoto   Kyoto 075-XXX-XXXX  JX-5
              003  Junji Tanaka  Shiga 0778-XX-XXXX  JX-5

         First, each node operator entered messages to several members
         and  the other sysops;  then we set Net mail time and watched
         how Collie sends and receives packets.  We had a hard time to
         find the best combination of  modem  initialization  commands
         and DIP switch setting. (We were helped by Maki Ohtoh.)

         We used the following MODMINIT.BBS file:

                 ATX1
                 ATH1
                 (one blank line - wait 2 seconds)
                 ATS0=1
                 ATV0
                 ATH0

     FidoNews 4-28                Page 8                   27 Jul 1987


         The Collie startup command was:

                 A>COLLIE /2 /M2 /I1200 /C32
                          |   |   |      |____ Carrier mask bit
                          |   |   |____ Modem init. baud rate
                          |   |____ Modem type
                          |____ COM2 port

         The modem DIP switch setting was:

                 SW1 DTR          OFF
                 SW2 Result       no effective
                 SW3 Return       ON (should have no effect)
                 SW4 Echo         no effective
                 SW5 Answer       no effective
                 SW6 CD           OFF
                 SW7 Tel.line     OFF (depends on phone line)
                 SW8 Command      ON

         Although the modem operation was unstable like trying to call
         while  the  modem  is off hook,  the test resulted in a great
         success.  We just tested the network formed  by  JX  systems,
         but  this  network would not be open to public until the mail
         charge system is established.

         *         *         *         *         *         *         *

     For other details,  contact Hagiwara or Joe Takemura at  the  BBS
     sytem number (at night only) listed above.


     FIDO/COLLIE SYSTEMS IN OPERATION

     To our knowledge,  the following five Fido/Collie BBS systems are
     currently operating on regular basis:

         017-653-5181 ext. 226-7408, Loki BBS (Fido), by Jon
            Spelbring, 24 hours, 1200/300 (CCITT & Bell)
         045-761-9406, SurfSide Net (Fido), by Tatsuyuki Arai,
            24 hours, 2400/1200/300 bps (CCITT & Bell)
         045-894-7656, Collie Yokohama, by Maki Ohtoh,
            24 hours, 1200/300 bps (CCITT & Bell)
         0466-27-2077, Big Blue BBS (Collie), by Yoshi Mikami,
            10:00-11:30 PM Japan Std Time, 1200/300 (C&B)
         082-842-6401, Strawberry Doughnut Net (Collie), by
            Hitoshi Sugimoto, 10:30-11:55 PM JST, 200/300 (C&B)

     Fido Japan 03-432-0185 by John Takiguchi is temporarily closed.

     Mikami, Ohtoh and Sugimoto have been exchanging net messages very
     successfully at 10:45-11:00 PM time slot,  since  early  October,
     between Fujisawa/Yokohama and Hiroshima, a distance of 500 miles.
     After  much  experiment,  Infotech's  Hi-Modem  1200C  among  the
     several JATE-approved  Hayes-compatible  (AT-command  compatible)
     modems   was   found   to  handle  the  Fido/Collie  net  message
     transmission.  They would like to hear other people's experiences
     FidoNews 4-28                Page 9                   27 Jul 1987


     on other modems, because there definitely is a need here for good
     modem competition.

     Ken Sugimoto has translated most of the Collie  .MNU  files  into
     Japanese for easier operator interface,  and has been operating a
     Collie node since October,  somewhere near  the  Fish  Market  in
     Tsukiji, Tokyo.  We'll get his phone number shortly.

     We  do  not claim to know everything happening in Japan regarding
     Fido or Collie.  Please contact anyone of us to let  others  know
     what's going on.


     LETTER TO REQUEST JAPANESE REGION NUMBER SENT

     A  letter  was  sent  11/16/86 by Mikami to International FidoNet
     Association requesting a region number for Japan,  with copies to
     Tom  Jennings  (author  of  Fido  BBS  software) and Dan Plunkett
     (author of Colossus  BBS  sofware).  A  fifty  dollar  check  was
     enclosed  as  our  donation.  Copies  were  also  sent  to people
     mentioned in Item 1.a. above.


                         *** INTERNATIONAL NEWS ***


     MESSAGE EXCHANGE WITH HONG KONG

     Katsu Shintani called FIDO BBS in Hong Kong  00852-5-893-7856  in
     October.  This  is  the  nearest Fido/Collie BBS overseas that we
     know of.  In return,  Fido Japan and Collie Yokohama  received  a
     few messages from Hong Kong.


     ASSISTANCE TO OTHER ASIAN COUNTRIES

     There  are  several  FidoNet  systems  running  in  Australia and
     Indonesia according to  the  3/86  nodelist.  We  would  like  to
     identify  other Fido systems that may be operating in this region
     of the world.  We also offer assistance if help is needed to  set
     up Fido or Collie BBS in the Asia-Pacific countries.

     For  those  who  may  not  know,  Colossus  ("Collie")  is  Fido-
     compatible software that is beginning to be used this year.

     -----------------------------------------------------------------

     FidoNews 4-28                Page 10                  27 Jul 1987


     Chris Irwin
     Miami Shareware, 135/68

                                  MegaList
                        A Cross-System File Listing
                           (YOU can easily join!)


          I was in one of my more creative moods the other  day;  I've
     finally  written a system that I've wanted to for quite some time
     now:  MegaList.  The "MegaList" is an alphabetized  file  listing
     that combines the files from ALL PARTICIPATING Fido/Opus systems.
     If  you've ever needed a file,  but didn't know where to find it,
     the MegaList is a good place to look;  scan down the list for the
     file  you  need,  and listed next to it are the BBSs that have it
     online.

          The MegaList  is  available  for  download  or  SEAdog  file
     request from 135/68.  The following files are online now:

          MEGALIST.ARC/TXT    The National (unfiltered) MegaList
          MEGA-ARC.ARC/TXT    The National ARChive MegaList
          MEGA-TXT.ARC/TXT    The National TXT/DOC MegaList
          ML-UPD.ARC          MegaList Update Software

          YOUR  system  can  be  added to the NATIONAL MegaList if you
     simply run the update program,  ML-UPD.  This program will create
     an  update  file  based  on YOUR system information and FILES.BBS
     contents.  This data is then ARCed and Net-mailed to  135/68  for
     central collection.  The NATIONAL MegaList is updated each day at
     6:15AM and posted for download or file request.

          Placing your system in the MegaList will let the rest of the
     world  know what's on your system without everyone having to call
     and look.  The ML-UPD program is easy and only  takes  about  1-2
     minutes  to  run.  All  you  must do is send a MegaList update to
     Miami at least once every 45 days,  and you will be in the  daily
     MegaList update.

          As  of this writing,  I haven't released ML-COL,  the "host"
     processing/collection program.  I will be releasing  this  system
     in  its  entirety before the end of August.  If you're interested
     in creating a LOCAL MegaList for YOUR area, please contact me for
     the list creation software.


             Chris Irwin, Miami Shareware, 135/68
             (305) 232-9365  (300/1200/2400/9600-HST)

             Other Miami Shareware releases:  (as of July 14th)

             ARCMSG17.ARC    ARC and Purge message bases (Fido/Opus)
             MS-AR25.ARC     Accounts Receivable System
             MS-IC25.ARC     Inventory Control System

     -----------------------------------------------------------------
     FidoNews 4-28                Page 11                  27 Jul 1987


        AUTHENTIC SECURE SECRET FIDO MAIL WITH PUBLIC KEY ENCRYPTION

     INTRODUCTION
     ============
     This article was written by  Prodex  Labs,  for  examination  and
     comment  by  IFNA  (International  Fidonet  Association)  Sysops,
     members, Fidonet users,  and others interested in electronic mail
     and  security.  Prodex  Labs  (Lee  Rothstein,  Phil Zimmermann &
     Steve Welch)  is  very  much  interested  in  your  comments  and
     suggestions.

     PRODEX LABS, PUBLIC KEY ENCRYPTION & FIDO
     -----------------------------------------
     We  are now about ready to deliver C-based modules that can carry
     out public key encryption.

     We are writing this article because of the extreme  relevance  we
     see  of  public  key  cryptography to electronic mail.  We assume
     electronic mail is near and dear to your hearts, and we think you
     might be interested in the application of public  key  encryption
     to  Fidomail  and Fidonet transfers.  The discussion,  we provide
     here,  on public key cryptography aims specifically at electronic
     mail applications.

     Public   key   encryption   technology   allows   the  convenient
     distribution of messages through an electronic mail system secure
     against other  users,  sysops  ("superusers")  and  even  systems
     programmers.  It  allows  this security in the face of inherently
     insecure networks and hosts.  This we think is  a  feature  whose
     time has come.  We think it lends itself well to the expansion of
     Fidonet  services,  as well as the opportunity for Fido sysops to
     unobtrusively draw revenue  from  a  subset  of  Fido  services--
     specifically  those  that  have to do with private and commercial
     mail.

     Specifically,  we suspect the lack of privacy of  messages  (from
     Sysops  and  technotwits)  has  discouraged  the use of Fido as a
     national distribution medium  for  personal  mail,  and  business
     mail.  Second,  the  lack  of  an  authentication  mechanism  has
     discouraged  commercial  concerns  from  using  Fidomail   as   a
     distribution  mechanism  for  authentic  marketing  programs  and
     documents such as ads,  coupons and purchase  orders.  By  adding
     these commercial services to Fido,  the revenue produced could be
     used to subsidize  other  Fido  services  such  as  mass  storage
     (downloads) and Techline distribution (long distance charges).

     The authentication capability mentioned in the previous paragraph
     might   also   be  of  use  directly  to  Fidonet  as  it  grows.
     Authentication would allow nodes that are operating  in  a  store
     and  forward  sub-net  to prove their legitimacy prior to a relay
     operation.  Since we are not familiar with the daily  operational
     problems of Hosts,  we do not know if we have proposed a solution
     to a non-existent problem.

     Finally,  we think that the recent introduction of "Dutchie"  may
     be  one of the key ingredients to the success of the introduction
     FidoNews 4-28                Page 12                  27 Jul 1987


     and use of public key encryption in Fidonet.  For  those  of  you
     not  yet familiar with it,  Dutchie is the private delivery point
     implementation for Fidonet by Henk Wevers.

     SINGLE KEY ENCRYPTION: WHY PUBLIC KEY ENCRYPTION IS REQUIRED!
     --------------------------------------------------------------
     Public key encryption technology differs from the more well-known
     single key technology in that each person has two keys associated
     with  him/her--a  public  key,  and  a  private  key.  (DES--Data
     Encryption Standard--is the most well-known example of single key
     encryption.)

     In public key encryption, the public key is known by everyone and
     either  can  be looked up by the user from a table of keys versus
     user  names  or  automatically  looked  up  by  the  applications
     software (e.g., electronic mail software).

     In single key encryption,  Fred encrypts file 'nerd.msg' with the
     key "secret_potion".  When Bill wants to  decrypt  the  file,  he
     must  have  been  told by Fred what the key for decrypting (i.e.,
     encrypting) 'nerd.msg' is.  Specifically,  Bill must  supply  the
     key "secret_potion" to decrypt 'nerd.msg'.  If "secret_potion" is
     always associated with Fred's files,  then Bill knows the key for
     those files that Fred does not want him to see.  More succinctly,
     the decryption and encryption  functions  are  inverses  of  each
     other.  Symbolically:

         (1)  encrypted_file <- sk_encrypt(file, key)
         (2)  file <- sk_encrypt(encrypted_file, key) i.e., decryption
                                                      is encryption
                                                      and the key is
                                                      the same going
                                                      in both
                                                      directions

          The  above  notation assumes that objects with the same name
          and only objects with the same name are identical.

     Let's look at  the  consequences  of  the  logic  of  single  key
     encryption  within  an electronic mail system.  Anyone that wants
     to send secret messages to someone  else  must  either  know  the
     recipient's  one  and  only  secret key,  or relinquish their own
     secret key,  or maintain a list of secret keys  by  recipient  or
     file; not a very attractive alternative.

     What's  worse,  if  the  key  information  is  exchanged by users
     through the mail system,  then the sysop has a crack at the  key.
     This  seems  very likely when you consider that you probably want
     the mail system itself to  automatically  monitor,  maintain  and
     administer the keys because of the previously described problems.

     PUBLIC KEY ENCRYPTION
     =====================

     PUBLIC KEY ENCRYPTION EXPLAINED
     -------------------------------
     FidoNews 4-28                Page 13                  27 Jul 1987


     These  and  other problems can be made to disappear with a public
     key encryption  system.  The  public  and  private  keys  make  a
     matched, idiosyncratic set.  A file encrypted with the public key
     can  only  be  decrypted by the private key.  A file encrypted by
     the private key can only be decrypted by the  public  key.  These
     properties  can be used to significant advantage in an electronic
     mail system.  The obvious advantage of the public key  technology
     over  the  more normal single private key technology such as DES,
     is that a user does not have to give away his/her private key.

     Secrecy
     -------
     If you want secrecy in a message that you send  us,  you  encrypt
     the  message  with our public key and then we decrypt it with our
     private key.

     Signature Function
     ------------------
     If you want to authenticate a message as really coming from  you,
     you  encrypt it with your private key and then we decrypt it with
     your public key.  If your public key does not  make  the  message
     intelligible  then  it wasn't encrypted with your private key and
     therefore it didn't come from you--the one and  only  person  who
     has access to your private key.

     Secrecy & Authentication
     ------------------------
     The  secrecy and authentication encryptions outlined above can be
     combined sequentially to provide a complete framework of security
     for electronic mail.

     Symbolically, we could describe these properties as:

     If A were sending a message to B:

          (1)  encrypted_file <- pk_encrypt(file, public_key_B)
          (2)  file           <- pk_decrypt(encrypted_file,
               private_key_B)

               (1)  Would be used by the sender to achieve privacy.
               (2)  Would be used by the receiver to achieve
                    "legibility."

               AND

          (3)  encrypted_file <- pk_encrypt(file, private_key_A)
          (4)  file           <- pk_decrypt(encrypted_file,
               public_key_A)

               (3)  Would be used by the sender to achieve
                    authentication.
               (4)  Would be used by the receiver to prove
                    authentication and achieve "legibility."

     If we wished privacy and authentication in a message from A to B:

     FidoNews 4-28                Page 14                  27 Jul 1987


          (5)  double_encrypted_file <-
                    pk_encrypt(pk_encrypt(file, public_key_B),
                    private_key_A)
          (6)  file <- pk_decrypt(pk_decrypt(double_encrypted_file,
                    private_key_B), public_key_A)

               (5)  Would be used by the sender to achieve privacy and
                    authentication.
               (6)  Would be used by the receiver to achieve
                    "legibility", and prove authentication.

          In the above notation we again assume that objects with  the
          same   name   and  only  objects  with  the  same  name  are
          equivalent.

     OTHER REQUIREMENTS & PROPERTIES
     -------------------------------
     Several  other  properties  of  public  key  encryption   require
     explanation  to  fully  understand how security can be maintained
     and how a mail system can work.

     First,  the program that generates the key pairs  can  be  widely
     distributed  so  that  it  can be used by each user privately and
     securely.

     Second,  the algorithm that generates the  public  key  from  the
     private key is not reversible either by the generating program or
     by any other program a hacker would write.

     Third,  the kinds of keys generated and required by the encrypt /
     decrypt function(s) are on the order of  a  1000  bits.  This  is
     what  makes  trial  and  error  computation  of  the  private key
     extremely unlikely to the point of impossibility,  and also  what
     makes users generating like public keys unlikely.

     Fourth, the electronic mail nodes (for Fidonet, Fido nodes) would
     have  to  provide  a  key  server  function.   Once  a  user  had
     calculated his public key from a private key  he  would  have  to
     submit  it  to  a  node  to  be paired with his/her user ID.  The
     server function would also have  to  supply  the  public  key  to
     private  mail  sent  to the corresponding user ID.  Another major
     function of the key server is an automatic certification  process
     that  is  beyond  the  scope  of  a first release product or this
     paper.

     Finally,  for performance sake,  any reasonable implementation of
     public  key  cryptography  would transparently (unknown to users)
     invoke an internal method of single key encryption.  However, all
     user and crackers would ever (or could ever) see  is  the  public
     key mechanisms.

     IMPLEMENTING PUBLIC KEY ENCRYPTION WITHIN THE FIDO ENVIRONMENT
     ==============================================================

     THE IMPOSSIBLE DREAM
     --------------------
     FidoNews 4-28                Page 15                  27 Jul 1987


     If  we  were  to  directly  implement  an  automatic,  public key
     cryptography security system into  Fido  mail  that  would  avoid
     sysops  having  any  possibility of access to the private keys or
     the mail prior to encryption,  we would have  to  accomplish  the
     following:

     (a)  We  would  have  to add a secure mail option to the terminal
          emulation program.  We would  further  have  to  modify  the
          user's  terminal  emulation  program  so  that all mail text
          entered was encrypted before each line was sent by the  user
          to the mail edit/entry function on the BBS.

          There  are  some  outs  here,   but  they  are  pretty  well
          invalidated by several properties of  BBS  software.  First,
          mail  entry  is  designed  to  be an online editing activity
          rather than via upload.  Second,  the mail entry function is
          designed  to  handle pure text and not the binary files that
          result from encryption.  Third,  most  mail  input  software
          strongly  limits  the length and format (e.g.,  line length,
          blank lines,  use of tabs) of input messages.  If  one  uses
          "ASCII  transfer" capability there is a possibility the file
          will fail the length test  or  be  modified  by  the  format
          assumptions,  because  it was not edited with the length and
          format tests operative.  Fourth,  the prompting  feature  of
          the mail editor very often interferes with ASCII upload.

     (b)  We  would  have  to  make  modifications  to  the  BBS  mail
          edit/entry function  so  that  some  text  was  accepted  in
          unencrypted format (i.e., 'To:' and 'From:' information) and
          the remainder was in encrypted format (i.e.,  'Subject:' and
          body of message. ('From:' can be hidden if BBS Sysops do not
          object.)

     (c)  We would have to add a public key server function to the BBS
          that would maintain and  service  public  keys.  This  would
          also have to allow for the distribution of keys from node to
          node.

     (d)  We would have to make sure that encryption did not interfere
          with Fidomail routing line additions to the text body.

     This  theory  will  not  work  or  rather will not work without a
     ground swell of support for private mail.  We cannot get  control
     of  all  of  the  following  simultaneously:  (a)  user  terminal
     emulation software,  (b)  Fido  mail  entry  software,  (c)  Fido
     general  BBS  software,  (d)  Fido  networking  and mail exchange
     software.  How do we create the ground swell, then?

     FIRST STEPS
     -----------

     Step 1
     ------
     We develop two program functions (they may or may not actually be
     separate programs) that can be distributed via  Fido.  Currently,
     we  estimate  we  can  have  these  two  programs done within two
     FidoNews 4-28                Page 16                  27 Jul 1987


     months.

     The first program is a  DOS  (Unix  style)  filter.  It  has  two
     functions.  First,  given  one file that contains the private key
     and a second file that contains the text to  be  encrypted,  this
     first program,  which I will call 'pk_crypt',  provides an output
     file that is encrypted and can be decrypted with the public  key.
     This serves the authentication function.  Second,  'pk_crypt' can
     encrypt a file with public key so that it can be  decrypted  with
     the private key.  This provides the privacy function.

     The second program generates unique key pairs.

     Step 2
     ------
     Sysops  provide a message section and a coordinated file section.
     The message section allows users to notify each other that  there
     are  secure  messages  that  have been uploaded to the respective
     users that have been notified via  standard  Fido  text  message.
     The  file section is not only a safe (reliable,  not secure) port
     for uploaded secure message files but also for a single text file
     that contains a list of the mapping of user IDs to  public  keys.
     Users  upload  their  public  keys  as they generate them and the
     sysops collate these  standard  format  subfiles  into  a  single
     standard format public key-user ID list.

     We  will  provide  documentation  not  only  for  the  use of the
     program,  but also for how users can "certify" new users and  new
     keys,  since  we  will not at this stage be able to provide a key
     server automated certification process.

     Step 3
     ------
     Sysops provide a standard service that allows binary files to  be
     "attached to" Fidomail messages.  Nothing automatic is implied by
     the previous sentence.

     Step 4
     ------
     We would have to provide a mail function that from the same level
     of  menu allowed the entry of a text tag message into the message
     system, followed by the immediate upload of an encrypted (perhaps
     archived) file to the secure message file section.

     The inverse  of  these  two  processes  would  also  have  to  be
     provided.  Users  would  have to be able,  from the same level of
     message  menu,   to  first  read  a  tag  message,   and,   then,
     immediately, download the associated secure binary message file.

          .
          .
          .

     WHAT DO YOU THINK?
     ==================
     This  is  a  lot to lay on anyone in one swell foop.  What do you
     FidoNews 4-28                Page 17                  27 Jul 1987


     think  about  practically  any  of  this?   We   are   especially
     interested  in  your views and ideas as to how (or if) it can fit
     into Fidonet.  We await your responses.


     Lee Rothstein, Phil Zimmermann, Steve Welch


                            Prodex Laboratories
                            ------ ------------

                    COMPUTER AND COMMUNICATIONS SYSTEMS
                      PRODUCT DEVELOPMENT CONSULTING

          o    Computer and communications system product development:
               Software, Hardware & Integration
          o    Marketing requirements,  product,  business & strategic
               plans
          o    Market research
          o    New venture evaluation
          o    Technical   marketing,   marketing  programs,   seminar
               development
          o    Product definition,  architecture development,  systems
               engineering, human interface design
          o    Strategic information systems & computerized marketing

                             Lee D. Rothstein
                            Prodex Laboratories
                           7723 Arlington Drive
                          Boulder, CO  80303-3207
                          (303) 499-8716  (Voice)

     We can be contacted via any of these BBSes, or via FidoNet at one
     of these BBSes:

          o    Microlink B Fido.   Fido 104/108.   (303) 972-4181.
          o    Eighth Sea Fido.    Fido 104/610.   (303) 252-9235.
          o    Day's End Fido.     Fido 104/ 20.   (303) 650-5636.
          o    Mile Hi Tech Fido.  Fido 104/ 56.   (303) 973-9338.

     -----------------------------------------------------------------

     FidoNews 4-28                Page 18                  27 Jul 1987


     Patrick McDonald, 109/657

           Sirius v0.50 - The FOS-Compatible Message Base Manager

     "... and all I ask is a tall ship and a star to steer her by"
                                       --- Masefield

          Sirius,  a star in Canis Major also known as the  dog  star,
     has   been  guiding  mariners  in  the  Northern  hemisphere  for
     centuries. Sirius, the message base manager by Bob Klahn of 150/1
     will now add a new twist to  the  common  definition  by  helping
     solve your message base manipulation and navigation problems.  No
     matter  what  software  you  currently  use to interact with your
     Fido/Opus/SEAdog message base, Sirius has features that will help
     make it the message manager of choice on your system.

     In particular, Sirius 0.50:

     *  Provides universal context-sensitive help via the "?" key.

     *  Adapts its prompting to your  needs  and  level  of  expertise
        while keeping required keystrokes to a minimum.

     *  Supports one hundred message areas.

     *  Recognizes  EchoMail and NetMail areas,  and allows them to be
        addressed by name as well as by number.

     *  Edits new or existing messages with the  configurable  outside
        text  editor  of  your  choice,  or with its own line-oriented
        editor.

     *  Quotes replied-to message text with prefixing that YOU choose,
        and with the option to prefix the quoted author's lines only.

     *  Moves and copies messages to flat files,  to the  printer,  to
        other  message  areas,  low or high,  up or down,  and with or
        without "stamping".

     *  Groups messages logically, in ways YOU define, using a library
        of over three dozen Boolean,  integer,  and string  functions.
        Operations  may be performed on a message group as a unit,  or
        group definitions may be  used  to  filter  the  retrieval  of
        individual messages.

     *  Can  record  your  interactive  keystrokes  in script form for
        later playback.  Yes, Sirius will write your scripts for you!

     *  Allows its complete  functionality  to  be  accessed  locally,
        remotely, or through its automated scripts.

     *  Provides access to DOS from within the Sirius environment.

     The Basics
     ~~~~~~~~~~

     FidoNews 4-28                Page 19                  27 Jul 1987


          The  entire  interactive  interface of Sirius is designed to
     minimize the number of keystrokes entered.  Many of the main menu
     commands have lower submenus,  and commands  may  be  stacked  as
     appropriate,  with  white  space needed only when ambiguity might
     otherwise result.  In addition, the "?" character is available at
     all menus to provide context sensitive help to guide you along.

          As a message base manager,  Sirius provides you with all the
     usual  functions,  and  then some.  You may select a message area
     not only  by  the  usual  method  of  area  number,  but  by  the
     associated  EchoMail  area tag as well.  If you have many message
     areas or are in  the  habit  of  occasionally  reorganizing  your
     message areas,  this feature makes it easier to jump into an echo
     area.  The entire area name need not be specified when  utilizing
     this feature, but only enough to uniquely identify it.

          Messages  may  be  retrieved  in  a number of ways (forward,
     backward,  and by links),  and when retrieving messages it is not
     necessary  to  view the entire text.  You may tell Sirius to only
     view message text until a given text string is encountered  (such
     as 'SEEN-BY: '), and as indicated in the example, this is usually
     used to squelch the EchoMail routing information.

     Shifting into 2nd Gear
     ~~~~~~~~~~~~~~~~~~~~~~

          You  can do a lot more with messages than just retrieve them
     and display them to your screen.  Sirius  provides  features  for
     moving  messages  around  to  various  locations.  You  may  copy
     messages to a file (optionally either  appending  or  overwriting
     the file),  to your printer, or to other locations in the message
     system.  These "other locations" encompass copying the message to
     another area as well as different spots  within  the  same  area.
     When moving a message, you may optionally ask Sirius to include a
     "stamp" line in the copied message (much like the Opus forwarding
     information but much more concise).

     The Doctor's Office
     ~~~~~~~~~~~~~~~~~~~

         So, you want to change something about a message?  The Doctor
     function provides the means of changing virtually every aspect of
     a message IN PLACE,  including message header fields,  body text,
     flags,  and attach filenames.  The Body doctor is also a powerful
     tool all by itself,  providing a full-featured line-oriented text
     editor for the message body.  The line editor makes extensive use
     of PC editing keys while providing control key mapping for remote
     usage and local keyboards that don't have  these  keys.  Selected
     portions of the message body may be re-wrapped at will and to any
     line width that you like.  You may also import text from external
     files.  As  powerful  as  the editing features inherent to Sirius
     are,  you may need to do something to a message body not provided
     by  Sirius,  or  may  simply  have a preference for a full-screen
     editor.  This is no problem since  Sirius  provides  support  for
     editing  message  bodies  with  the  external text editor of your
     choice.
     FidoNews 4-28                Page 20                  27 Jul 1987


     ... And you may quote me on that!
     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

          When replying to an  existing  message,  Sirius  provides  a
     quoting  feature that is unsurpassed by any other message system.
     You are not locked into any particular reply prefix,  but  rather
     may  specify  your  own "designer quote" to be used for prefixing
     selected portions of the text of the replied-to  message.  Sirius
     does  not  just  blindly  prefix the entire original message text
     when forming the reply-quoted message (although  it  can  if  you
     desire)  but  actually  has  the  ability  to  prefix  only those
     portions of the original message that ARE NOT  ALREADY  PREFIXED!
     This  becomes especially useful when responding to a message that
     already has text reply-quoted from one or more authors.

     Join the Group
     ~~~~~~~~~~~~~~

          Sirius provides a group definition facility that is  perhaps
     the  single  most  powerful  capability in its arsenal.  Using an
     extensive set of message-oriented  functions  and  an  expression
     formation language similar to many general programming languages,
     you  may  define  up  to  twenty-six different message groups.  A
     group definition may be  used  in  one  of  two  different  ways.
     First,  a  message group may be used as a retrieval filter.  That
     is,  by virtue of a group definition being in force,  the message
     area  appears  to  only  contain  messages  that  match the group
     specification.  This might be used for  something  as  simple  as
     only  considering  messages  addressed  specifically to you,  for
     example.

          The second use of a group definition is in conjunction  with
     group  operations.  Group  operations  mirror,  in some respects,
     those functions available for single messages (such as copying to
     a file,  deleting,  moving elsewhere) but act on the entire group
     of  messages  as  a  unit.  Some  of  these  group operations are
     unavailable in 0.50,  but will be there  in  0.51.  The  built-in
     functions for use in group definitions include the following:

         Boolean (Message Flags):

         @Private       @Xpress     @Received   @Sent
         @FileAttach    @InTransit  @Orphan     @KillSent
         @Local         @Hold       @FileReq    @AuditReq
         @ReceiptReq    @UpdateReq

         Boolean (Other):

         @FromYou       @ToYou      @NoBody     @ReadOnly

         Integer Functions:

         @DaysHere      @DaysOld    @FileSize   @Zenith
         @HighMsg#      @LowMsg#    @Msg#       @MsgCount
         @NetFrom       @NetTo      @NodeFrom   @NodeTo

     FidoNews 4-28                Page 21                  27 Jul 1987


         String Functions (case insensitive):

         @From          @To         @Subject    @Header
         @Body          @Msg        @Keyin

     Sirius provides the usual conditional operators (EQ,  NE, GT, LT,
     GE, LE, AND, OR), as well as some additional ones:

         CO     contains
         NC     does not contain
         IN     is contained in
         NI     is not contained in

     A few simple examples of Sirius expressions will make  clear  the
     power intrinsic in their usage:

     1. @ToYou OR @FromYou

     This expression will match only those messages that are to you or
     from you.

     2. @ToYou AND @Private

     This expressions will match those messages addressed to you which
     are private.

     3. @From CO 'arcmail' AND NOT @Local

     This expression would match your inbound ARCmail attach messages.

     4. @DaysHere GT 7 AND @InTransit

     Suppose  you  are  a hub and want to identify those messages that
     have been sitting waiting for delivery for more than  a  week  (a
     possible indication of trouble)?  This will do it.

     5. @Msg CO 'Heinlein'

     A science fiction fanatic?  This will find those messages related
     to your favorite author.


          As  is  the case elsewhere,  the Sirius expression parser is
     built with the  user  in  mind.  When  entering  a  Sirius  group
     definition,  you  need  only type enough to uniquely identify the
     token, and Sirius will fill in the rest automagically.

     Shifting into High Gear
     ~~~~~~~~~~~~~~~~~~~~~~~

          What has been mentioned before,  but which  might  not  have
     been  truly  appreciated  until  now,  is  the  fact  that Sirius
     provides a scripting language that allows you to do anything from
     a  script  that  can  be  done  online  (including  creating  new
     messages,  replying  to  old ones,  etc...).  The script language
     uses a Lisp-like syntax,  and the verbs match  exactly  the  menu
     FidoNews 4-28                Page 22                  27 Jul 1987


     commands  which  you  use  online,  including a conditional and a
     while loop construct driven by  the  same  types  of  expressions
     listed  above.  Sirius scripts may call other Sirius scripts in a
     nestable fashion,  and I/O commands allow you easily design menus
     and other forms of interaction with the user at the keyboard.  In
     combination  with  DOS  parameterized  batch files,  your Sirius-
     driven system can almost  run  itself  in  some  respects.  As  a
     simple example, consider the following script:

     (View (Xpertise (High))
      View (Continuous)
      Area (NetMail)
      Group (Define (@ToYou AND NOT @Received))
      0 Next
      ! (While (@Msg# LE @HighMsg#))
         Copy (Flat file ('NEWTOME.TXT'))
         Next
         ! (End)
      Quit (Bbs))

          This  simple  script  will append all of the new messages to
     you in your netmail area to the file NEWTOME.TXT in your  current
     directory.  For  the new Sirius user who might want to dive right
     in writing Sirius scripts,  there is a recording option that  you
     may  use  to allow Sirius to write the script for you,  simply by
     recording  in  the  proper  format  operations  that  you   enter
     interactively.

     Winding Down
     ~~~~~~~~~~~~

          Sirius  is  still  a growing project.  Many enhancements are
     planned and  there  is  an  active  national  Sirius  echo  being
     coordinated  by  150/1.  The Sirius author,  Bob Klahn,  is quite
     receptive to user suggestions for Sirius enhancements.  There are
     subtleties and details to Sirius that were  not  appropriate  for
     inclusion  in  this  brief  introduction.  At  the  time  of this
     writing,  there does not exist a single,  comprehensive,  set  of
     documentation for Sirius.  This problem is being addressed by the
     Beta  Test  Group and hopefully will be remedied shortly.  In the
     interim,  there does exist a complete set of  release  notes  for
     Sirius  that  cover  major features,  and these combined with the
     online help and sample  scripts  shipped  with  Sirius  serve  to
     offset  the lack of formal documentation.  The best bet for a new
     Sirius user is simply to dive in and try  it  (and  to  join  the
     Sirius  echo  where  experienced  users will be able to lend some
     help).  Bob's practice in  the  past  has  been  to  release  new
     versions  of  Sirius  on  a  regular  schedule.  Due to the major
     enhancements  in  version  0.50  (most  dealing  with  the  group
     definition  facility),  this  latest version has been almost four
     months in development and testing,  and we are sure you will find
     it worth the wait.

     -----------------------------------------------------------------

     FidoNews 4-28                Page 23                  27 Jul 1987


     Mike Brisson
     The Augusta Forum 360/1

                       THE SPORTSNET ECHO CONFERENCE

     The SportsNet Echo Conference was started by the Augusta Forum in
     February of this year to give FidoNet boards  a  chance  to  talk
     coast  to  coast  about  their  favorite  sports  topics.  Almost
     everyone has at least a little interest in sports of one type  or
     another,  either  as a participant or a spectator ...  if you do,
     this conference is for you.

     SportsNet is NOT just a "my team's better than yours" conference!
     It is a place for discussions about  WHY  teams  or  players  are
     better  ...  or  worse.  On  SportsNet you have to be prepared to
     discuss your  choices  for  the  World  Series,  Super  Bowl,  or
     whatever ... someone's bound to differ with you.

     You'll find a place for participants, spectators, and media.  The
     net  has had discussions among bicycling racers ...  and also has
     heard from a TV station director.

     Of course,  the obvious sports  (football,  baseball,  etc.)  are
     discussed  but  there's  also  lively discussion about the lesser
     known ones (we've even gotten into  snake  handling  and  buffalo
     chip throwing)!  What-ever the sport, we'll discuss it.

     SportsNet  can be a learning place,  too.  If you don't know what
     an ERA (base-ball) or a blue line (hockey)  are,  you  can  learn
     those  things  there.  Also,  the  conference has a weekly trivia
     quiz, possibly the first of its kind among echo conferences.

     Football fans will  find  a  place,  this  fall,  to  test  their
     prediction  skills  on  NFL games,  and possibly selected college
     games as well.

     If  you're  not  already  a  part  of  SportsNet,  this  is  your
     invitation to give us a try.  We aren't one of those 100-message-
     a-day  conferences  that  sometimes  can overwhelm a newcomer ...
     we're still small enough for anyone to fit right in.  We do  have
     boards  in  New York,  Baltimore,  Pittsburgh,  Dallas,  Indiana,
     Arkansas,  and Oklahoma,  as well as  most  of  the  Southeastern
     states.  If  you're  interested  in SportsNet,  drop me a NetMail
     message.  We'd like to have you join us!

           SportsNet Host:  Mike Brisson
           Host Sysop:  Ed Meloan
           Host System:  Augusta Forum (360/1), N. Augusta, SC
           Host System Numbers:  (803) 279-4124 or 279-5392

     -----------------------------------------------------------------

     FidoNews 4-28                Page 24                  27 Jul 1987


     =================================================================
                                  COLUMNS
     =================================================================

     Glen Jackson
     Broadcast Software
     SEAdog/Fido 100/517

                           Where are we at Now ?

     We're still at it,  going strong in the echos.  We've added  some
     more nodes. Colorado is a real busy state with the Broadcasters.

     If  you  know  of  any  BBS's  (in  the  net or not) that address
     themselves to the  broadcasting  Industry,  drop  us  a  line  at
     100/517.

     If  you  are in the industry,  we welcome your call and feedback.
     We'll point you to the closest node involved in our echos.

     We're here to encourage communications among the  industry.  Here
     we are, a communuications group, and we rarely talk to each other
     across the country. Why would we want to?

     To exchange information. Information on what we use our computers
     at  work for.  How we use them.  Programs that benefit all of us.
     How about issues that will be or do affect us?  In such a  highly
     competetive  market,  are  we  so  afraid we'll help someone else
     grow???

     We want to invite you to become a part of our growing echos.  One
     of  the echos is not limited to broadcasters only.  It is a place
     that the public can talk with the people  in  the  industry.  The
     decision makers. People with the answers.

     If  you'd  like  to  become  a  part of our growing family in the
     Broadcast Echos, let us know.  You don't need to run a broadcast-
     specific  board to do so.  We can be reached by routing a message
     to us at 100/517 - or calling direct at 314-928-2501.

                       Broadcast Software Industries
                      > Home of the Broadcast Echos <

     -----------------------------------------------------------------

     FidoNews 4-28                Page 25                  27 Jul 1987


                    -- The Regular Irregular Column --
                                Dale Lovell
                                1:157/504.1

          Things are  going very  well this past week. I've found some
     more programs that will run with SIMCGA (Ancient Art of War and a
     few others  by Broderbund). In addition, I'm finally getting used
     to this new keyboard. My old XT had an original  PC style layout,
     but with  10 function keys at the top and a cursor pad as well as
     a numeric keypad. The keyboard with  the AT  is one  of the "new"
     101 key style keyboards, 12 function keys and such. I'm still not
     entirely used  to it,  but things  are a  lot easier  after a few
     weeks of  use (and  some customizing with SuperKey). Just goes to
     show how flexible the human mind can be when it has to adjust.

     -- Ventura Publisher Version 1.1 (Xerox, List $895.00) --

          Some of you may recall  how  much  I  liked  version  1.0 of
     Ventura Publisher  when I  got to  try it  out a few months back.
     Well Xerox has been busy working on an update, and  it improves a
     product I wouldn't have thought could be improved. On the surface
     it still looks (and acts) the same, but  once you  get beyond the
     initial  pull  down  screens  it  has a lot of new (yet familiar)
     functions and improvements. While it costs  $100.00 to  update to
     the  new  version  of  Ventura,  it is money well spent (the list
     price is still the  same,  it  didn't  go  up).  Even  the manual
     appears to be written better than the version 1.0 manual.

          I still  thinks it's amusing that Xerox's DeskTop Publishing
     program supports  PostScript  printers  better  than  Xerox's own
     printers. PostScript  users will  greatly appreciate  some of the
     new features in 1.1. The font  names now  match the  names you're
     used  to  calling  them,  and  Ventura  lists  all  of  the Adobe
     supported fonts. If you have something like the QMS PS800+ (or an
     Allied Linotronic  typesetter), you  won't have to do anything to
     make Ventura know about your additional fonts. Instead of the box
     selections of  fonts and sizes in 1.0, you now see something that
     resembles the box you're used to using to select files (only they
     aren't files,  they're several dozen fonts). You are also free to
     enter the point size of the font, no limitations under PostScript
     (other  than  those  your  printer  has built into it). If you're
     using download fonts to your PostScript device, it's very easy to
     tell Ventura  about them.  Once told,  it will download the fonts
     you're using automatically. While Ventura still doesn't take full
     advantage of  PostScript's powerful capabilities, it brings it up
     a step from the previous version (and while I'm not sure, I think
     it beats PageMaker's PostScript support).

          In  version  1.0  there  were  some  wonderful features when
     bringing in a short text file, or some  form of  art. Ventura 1.1
     increases it's list of generally useful features by being able to
     make these frames follow a specific part of the main text around.
     Xerox calls  this "anchoring"  a frame  to text and may be reason
     enough for many people to spend  the  $100  on  the  upgrade. The
     reasoning behind anchoring a picture to text is that pictures are
     meant to go along with the text. An  example would  be a business
     FidoNews 4-28                Page 26                  27 Jul 1987


     report with several graphs, each graph goes along with a specific
     part of the report.  You  certainly  wouldn't  want  the employee
     attendance graph  to be  above the  section of the report dealing
     with quarterly sales, would you? Yet  this is  exactly what could
     happen if you added a few paragraphs of text or added the company
     logo to the top of the report. Ventura 1.1 puts an end  to having
     to  manually  readjust  every  graphics  (or text) frame when you
     change an earlier part of the publication. The  frame will follow
     the text  around every  time you make a change and Ventura allows
     you to anchor frames to text so that the frame will appear above,
     below or  on the  same page as the text it accompanies. I can see
     this having a large impact on the educational community as thesis
     papers  (especially  in  the  sciences,  maybe even the arts as I
     think  about  it)  won't  have  to  be  such  monumental efforts.
     Including  a  relevant  graph  in  the  text of the paper becomes
     trivial, and it will always show up where it belongs.

          One of the nicer additions to  me personally  is the support
     for Macintosh  MacPaint and PICT files. The MacPaint file support
     is nice because I have several of these already on my system. You
     may know  them better  as READMAC  pictures. All  of these can be
     brought right into Ventura. I no longer need to find a program to
     convert them  into PC  Paintbrush or  GEM Paint files. Sysops may
     see a renewed interest in their READMAC file area as people start
     looking around  for digitized  pictures to put into their work. I
     know I've spent quite a bit of time the past  week looking around
     several of the local boards and downloading such files.

          There are a few disappointments in Ventura 1.1. In the front
     of the  manual  there  is  an  errata  sheet.  While  support for
     Hewlett-Packard DDL  printers and Windows clipboard line art were
     not able to be included in this release  of Ventura.  It seems HP
     still hasn't  finalized the specification for DDL (not to mention
     not  shipping  any  printers   that  use   DDL)  and   until  the
     specification in finished and the printers shipped, Ventura won't
     support it. The Windows clipboard line art is  supposedly missing
     because   Xerox   has   been   unable   to  obtain  the  complete
     specifications on the metafile format. Support for both  of these
     items is  promised however,  and Xerox gives you a number to call
     if you need support  for DDL  or Windows  clipboard line  art. As
     soon as it is ready, they'll send it out to you.

          Overall I am still impressed with Ventura Publisher. Version
     1.1 includes  enough new  items (as  opposed to  bug fixes, which
     weren't to  many from what I hear) to make it a solid improvement
     over version 1.0. The  new  features  only  add  to  an excellent
     product. I may be prejudiced, but I think this product is an easy
     winner  over  PageMaker.  Most  of  the  people  in  the LASERPUB
     echomail conference  also seem  to think  the same  way. The only
     complaint I can recall on Ventura was due to someone  not knowing
     how  to  do  something  (as  opposed  to  not  being  able  to do
     something). If  you're going  to have  to buy  a page composition
     package in  the near  future, do  yourself a  favor and go find a
     dealer who really knows how to use Ventura and have  him give you
     a demonstration.

     FidoNews 4-28                Page 27                  27 Jul 1987


     -- WordPerfect 4.2 (WordPerfect Corp., list price $495.00) --

          I'll admit  it, I've been using WordPerfect for the past few
     weeks and haven't admitted it until  now. I  conned my  boss into
     buying it  for me at work and have been getting used to it before
     I "reviewed" it. I didn't want to say anything right away because
     it takes  me awhile to become accustomed to a new word processor.
     I didn't want to make the mistake of  saying it's  a poor product
     just because  I hit control-K Q to exit (Wordstar style commands)
     when it wants F7 Y Y (WordPerfect). I must admit that I  hated it
     when  I  was  still  becoming  accustomed  to  it,  but  am now a
     WordPerfect convert  and am  seriously considering  buying a copy
     for home  as well.  After getting  used to  how the function keys
     work (WordPerfect uses all 40 combinations on the  function keys;
     alone, alt-key,  ctrl-key, and shift-key) it is a remarkably easy
     word processor to use. My  boss  also  purchased  the WordPerfect
     Library, although I won't start going over it until next week.

          One of  the first things I noticed about WordPerfect is that
     it is fast. Supposedly this  is  because  WordPerfect  is written
     completely  in   assembler  while  many  other  word  processors,
     Microsoft Word included, are written in a mix of C and assembler.
     I don't know if this is actually true, but I do know that it is a
     lot quicker than Word. While it  doesn't do  some of  Word's nice
     displays,  in  many  cases  it's  easier  to use WordPerfect than
     Microsoft Word. In Word  I  could  only  spell  check  the entire
     document and that could take a long time (go to the library, tell
     it I want to do a spell check, etc.). WordPerfect  let's me check
     either  a  word,  page  or  entire  document.  I've  become  very
     accustomed to hitting Ctrl-F2 1  and  checking  the  word  I just
     entered.

          While  it  doesn't  have  Word's  style sheets, it does have
     built in macros;  either  the  Alt-key  variety  or  as  an eight
     character name.  The only  thing it is sadly missing is an editor
     for the  macros (they  aren't stored  in a  straight ASCII format
     like Superkey's  macros). In order to get a macro editor you must
     purchase the  WordPerfect  library.  The  macros  aren't  hard to
     learn, and in many cases are much more flexible than Word's style
     sheets. One of the first things I did when I started playing with
     it's macros  was create  one for  the start  of these columns and
     another with the complete signature. I used a variety of Superkey
     macros to  do this  in Word  and while  they were very similar, I
     decided to learn how to  do  it  in  WordPerfect.  If  you aren't
     familiar with  keyboard macros,  it's basically  a way of turning
     several keystrokes into one  (although that's  a weak comparison,
     it's the best I can do for now).

          Overall I've  been very  impressed with  it. While I haven't
     really gone into it very deeply, bear with  me over  the next few
     weeks while  I keep  learning more about it. Right now I can tell
     that it's going to become my word processor  of choice  (at least
     until I  come across something I like better). I just wish I been
     using it when all  I had  was a  4.77 mhz  XT, the  difference in
     speed would  have been  very nice. If you're looking around for a
     new word processor, I would definitely  say try  out WordPerfect.
     FidoNews 4-28                Page 28                  27 Jul 1987


     It is  fast, powerful,  and fairly easy to use. My biggest advice
     is to give yourself a chance to get used to it before  you decide
     against it.  I'll still  probably use Word when I'm looking for a
     variety of fonts (especially if I ever get a laser printer) since
     Word handles different fonts better than WordPerfect, but for all
     my other work I'll be using WordPerfect.

     -- Winding Down... --

          I've found a book  that may  help many  of you  as you break
     away  from   BASIC  into   Pascal  or  C.  It's  called  "Puzzled
     Programmers" by Michael Wiesenberg (Microsoft Press $12.95). It's
     a little  different as  it has several short stories accompanying
     each problem (of which there's  fifteen)  and  while  the problem
     doesn't actually relate to the story, they make for cute reading.
     Also included are hints to every problem as well as the solution.
     The solutions  are presented  in BASIC,  Pascal and C. One of the
     things Wiesenberg was  trying  to  accomplish  was  to  aid those
     learning a  new language. All three solutions to each problem use
     the same basic algorithm, so you can examine the solution  in the
     language  you  already  know  and  compare  it to the one you are
     trying to learn. This is supposed  to help  you see  how they are
     similar, and  how to  take advantage of the special techniques or
     principles  of  the  different  languages  (like  being  able  to
     initialize several  variables at the start of a loop in C). Since
     I already know all three of the languages used, I  wasn't able to
     really learn  anything with this book, but I can see how it might
     help someone  learn about  a new  language. The  problems are all
     mathematical problems,  several of  which could be solved without
     the aid of a computer. The hints rarely tell you  how to  write a
     program,  they  merely  guide  you  along  the way by helping you
     figure out how to solve a problem.

          I really support this method of learning. I've seen too many
     Computer Science  or MIS people graduate with honors and yet have
     no idea on how to solve  problems. To  many courses  on computers
     only deal  with syntax  and modifying  an existing program, often
     given to the students in  a  lecture  or  text,  to  do something
     slightly different.  To much of programming is determining HOW to
     do  something  to  ignore  teaching  the  students  how  to solve
     problems (or as I call it, thinking...but I'm fairly sarcastic in
     my attitudes these days). Books like this can  help out  those of
     you trying  to learn  how to  program more than many of the other
     books I've recommended  in  this  column.  Most  of  the  books I
     recommend already assume you can determine the steps necessary to
     accomplish a task, I think "Puzzled Programmers" will  help teach
     you this necessary skill. As I look over this paragraph I realize
     that I starting to climb up on my soapbox again, so I'm  going to
     wind  up  by  giving  high  marks  to  MIchael Wiesenberg on this
     excellent book.

          As always down below  you'll find  my US  mail address, uucp
     address and  FidoNet address.  If you're  sending me mail through
     FidoNet, please have your sysop route it through 157/1 (or 157/0)
     as I  am a  private node.  I'd like  to thank any of you I missed
     answering. While I try to  answer  every  message  (electronic or
     FidoNews 4-28                Page 29                  27 Jul 1987


     otherwise) I  receive, I'm  not the most organized person and I'm
     fairly certain  I missed  a few  somewhere. I'm  still waiting to
     hear from  the person  using the pseudonym "Ender Wiggin," unless
     you're worried about Jane eavesdropping? (for an understanding of
     this  read  "Ender's  Game"  and  "Speaker for the Dead" by Orson
     Scott Card). I'd like to thank  you  for  the  package  you sent,
     although I don't have much use for it now. Hope to see all of you
     at FidoCon.


     Dale Lovell
     3266 Vezber Drive
     Seven Hills, OH  44131

     FidoNet  1:157/504.1
     uucp:

     decvax\
            >!cwruecmp!hal\
     cbosgd/               \
                            >!ncoast
           ames\           /
        talcott \         /
                 >!necntc/
        harvard /
        sri-nic/


     -----------------------------------------------------------------

     FidoNews 4-28                Page 30                  27 Jul 1987


     =================================================================
                                  NOTICES
     =================================================================

                          The Interrupt Stack


      1 Aug 1987
        Third Annual BBS Picnic in Edison, NJ.  Please register before
        July 10th.  Admission is $7 for adults, $4 for 12 and under,
        free for 5 and under.  Contact John Kelley at 107/331 for
        details.

     20 Aug 1987
        Start of the Fourth International FidoNet Conference, to be
        held at the Radisson Mark Plaza Hotel in Alexandria, VA.
        Contact Brian Hughes at 109/634 for more information.  This is
        FidoNet's big annual get-together, and is your chance to meet
        all the people you've been talking with all this time.  We're
        hoping to see you there!

     24 Aug 1989
        Voyager 2 passes Neptune.


     If you have something which you would like to see on this
     calendar, please send a message to FidoNet node 1:1/1.

     -----------------------------------------------------------------

                          Latest Software Versions

     BBS Systems            Node List              Other
     & Mailers   Version    Utilities   Version    Utilities   Version

     Dutchie        2.51    EDITNL          3.3    ARC            5.21
     Fido            11w    LISTGEN    05.25.86    ARCmail        1.00*
     Opus           1.00*   Prune          1.40    EchoMail       1.31
     SEAdog         4.00    TestList        8.3    FastEcho       2.00
     TBBS           2.0M    XlatList       2.81    Renum          3.30

     * Recently changed

     Utility authors:  Please  help  keep  this  list  as  current  as
     possible  by  reporting  new  versions  to  1:1/1.  It is not our
     intent to list all utilities here,  only  those  which  verge  on
     necessity.

     -----------------------------------------------------------------

     FidoNews 4-28                Page 31                  27 Jul 1987


                         OFFICIAL REGISTRATION FORM
                  FOURTH INTERNATIONAL FIDONET CONFERENCE
                         RADISSON MARK PLAZA HOTEL
                              ALEXANDRIA, VA.
                            AUGUST 20 - 23, 1987

         Name _________________________________     Date _____________
         Address ______________________________
         City & State _________________________
         Phone (Voice) ________________________
         Net/Node Number ______________________
         Phone (Data) _________________________

         Number in Your Party _________________
         Staying at the Radisson? _____________
         Number of Rooms? _____________________
         Arrival Date? ________________________
         Departure Date? ______________________

     Registration Fees:                         How Many        Total

         Full Conference        $60.00 each     ________    $________
         Late registration      $10.00 each     ________    $________
              (after Aug. 1)

         Friday Night Banquet   $30.00 each     ________    $________
         Saturday Luncheon      $16.50 each     ________    $________

         Total Amount Included (Registration and Meals)     $________

     IFNA MEMBERS ONLY:
         How many in your party will
         be attending the Sunday morning
         Board of Directors meeting?            ________

     Send your registration form and a check or money order to:

                  Fourth International FidoNet Conference
                 212 E. Capitol St., Washington, D.C. 20003
               Attn: Brian H. Hughes -- voice: (202) 543-4200

     This registration form does not include hotel  accomodations.  If
     you wish to stay at the Radisson Mark Plaza Hotel, please contact
     them  directly  and  mention you are with the FidoNet Conference.
     Conference  room  rates  are  $80/night  for  single  or   double
     occupancy, and $20/night for an extra cot.

                         Radisson Mark Plaza Hotel
                 5000 Seminary Rd., Alexandria, Va.  22311
                               1-800-228-9822

     -----------------------------------------------------------------

     FidoNews 4-28                Page 32                  27 Jul 1987


     Bob Morris 141/333
     Chairman, Elections and Nominations Committee

     The next two pages are your Official ballot for the  Election  of
     the  IFNA  Board  of  Directors.  The following are the few rules
     which must prevail in this election:

     1. You must send a legible copy of this  ballot  to  the  address
        listed  on  the  ballot.  It  must  be  signed  and  bear your
        net/node number.

     2. You  may  vote  for  any  one  person  in  your region for the
        position of Regional Director.  This vote is to be cast in the
        LEFT column of the ballot.

     3. You may vote for any eleven people  in  any  regions  for  the
        position  of Director at Large.  These votes are to be cast in
        the RIGHT column of the ballot.

     4. Voting will continue until the  end  of  registration  at  the
        Conference  in  August.  The  results  will be read during the
        opening of the business  meeting  on  the  first  day  of  the
        conference.

     5. Write-in Votes will be accepted and are requested during  this
        election.



     FidoNews 4-28                Page 33                  27 Jul 1987


                          IFNA Board Of Directors
                                   Ballot

                              Regional         At Large
     Region 10:
         Steve Jordan         _________        ________


     Region 11:
         Ryugen Fisher        _________        ________
         Theodore Polczynski  _________        ________


     Region 12:


     Region 13:
         Don Daniels          _________        ________
         John Penberthy       _________        ________
         Thom Henderson       _________        ________
         Gee Wong             _________        ________
         Brian Hughes         _________        ________


     Region 14:
         Ben Baker            _________        ________
         Ken Kaplan           _________        ________
         Brad Hicks           _________        ________


     Region 15:
         David Dodell         _________        ________
         Larry Wall           _________        ________


     Region 16:
         Bob Hartman          _________        ________
         Hal Duprie           _________        ________


     Region 17:
         Rob Barker           _________        ________
         Bob Swift            _________        ________


     Region 18:
         Wes Cowley           _________        ________
     FidoNews 4-28                Page 34                  27 Jul 1987


     Region 19:
         Mark Grennan         _________        ________
         Wynn Wagner          _________        ________


     Region 2:
         Henk Wevers          _________        ________


     Write-in candidates:
         ___________________  _________        ________
         ___________________  _________        ________





        Name ______________________________  Net/Node ___________

        Signature______________________________  Date ___________


     Please complete this and mail it to:

              Robert Morris
              IFNA Elections Committee
              210 Church Street
              West Haven, Ct.   06516

     or bring it with you when you come to the conference in August.


     These  ballots  will  be counted by myself since with 200 members
     the charges for a CPA would be very high.  Hard  copies  will  be
     made  available  to  anyone wishing to insure that their vote was
     included.

                               Thank You

                               Bob Morris
                               Elections and Nominations Committee

     -----------------------------------------------------------------

-- 
        Tim Pozar
UUCP    pozar@hoptoad.UUCP
Fido    125/406
USNail  KLOK-FM
	77 Maiden Lane
	San Francisco CA 94108