home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
HPAVC
/
HPAVC CD-ROM.iso
/
PCBDEMO.ZIP
/
PCBDOCS.EXE
/
SETUP.DOC
< prev
next >
Wrap
Text File
|
1994-02-14
|
242KB
|
4,903 lines
5
==============================================================================
PCBSetup
Command Line Parameters
Exiting And Checking Your Configuration
The PCBOARD.DAT File
Specifying File & Paths
SysOp Information
File Locations
Modem Information
Node Configuration
Event Setup
Subscription
Configuration Options
Security Levels
PCBSetup is a utility designed to configure the operation of PCBoard.
With PCBSetup you can define new conferences, add more file directories,
and even change configuration options which determines how your system
operates.
There are three ways to access PCBSetup:
From the call waiting screen, select PCBSetup.
While logged in locally (not with the /LOCALON switch for PCBoard), you can
press ALT-S and select PCBoard Configuration (PCBSETUP).
From the DOS prompt you can load PCBSETUP.EXE. If a PCBOARD.DAT file cannot
be found in the current directory and you have not used the /FILE command
line parameter, you will receive an error message stating that PCBOARD.DAT
could not be found.
If you need to specify a different location for your PCBOARD.DAT file, use
PCBSETUP /FILE:[location of PCBOARD.DAT]. For example, to load PCBSetup and
tell it to use the data file located in C:\TEMP\, you would type:
PCBSETUP /FILE:C:\TEMP\PCBOARD.DAT
Once PCBSetup is running, you will see the Main Menu (shown on the previous
page). The various functions of PCBSetup are available from these menu
options. To select a particular option you can press the letter at the
beginning of the line, or you may move the currently highlighted option using
the cursor keys and press R. If you make a mistake, press E to return to the
previous menu. To get help with a particular screen or option, press F1 to
access the online help.
Command Line Parameters
PCBSetup has two command line parameters that you can use when executing
PCBFiler to determine how it should behave. To use a command line switch you
must execute PCBSetup from the DOS command prompt and you need to specify the
command line parameter after you enter PCBSETUP at the command prompt as
shown in the following example:
PCBSETUP /CNAMES
If you need to enter more than one command line parameter, separate each
parameter with a space.
PCBSETUP /FILE:H:\TEMP\PCBOARD.DAT /CNAMES
/CNAMES
Previous versions of PCBoard wrote conference information to a text file
called CNAMES while the current version of PCBoard writes this information to
CNAMES.@@@ and CNAMES.ADD. These two files are binary data and consequently
are not as easy to edit manually as the older CNAMES file. When this command
line switch is used, PCBSetup will reread the CNAMES file instead of using
the information stored in CNAMES.@@@ and CNAMES.ADD.
There are advantages and disadvantages to using this switch. First, the
advantages:
Files that are in text file format are easier to edit with a wide range of
editors.
If you are adding a lot of conferences, you can easily pattern the new
conferences after an existing conferences by cutting and pasting text.
The following are the disadvantages to using this switch:
The CNAMES is not updated by PCBSetup unless you do a full save when exiting.
If a quick save is used, the CNAMES file will not be updated. If you are not
careful, you could use a CNAMES file that is not up-to-date and consequently
alter your system configuration in an undesirable manner.
The CNAMES file does not contain all of the information that the combination
of CNAMES.@@@ and CNAMES.ADD does. In fact, nearly all of the fields listed
in the second conference setup screen are not stored in the CNAMES file.
This means that if you have PCBSetup re-read the CNAMES file, the default
values will be used for all fields that are not written to the CNAMES file.
This command line switch is not designed for use by novice SysOps. If you do
not have a good knowledge of text file editing, you can really foul up your
system configuration by using this switch.
If you use this command line switch, begin by making backups of your
CNAMES.@@@ and CNAMES.ADD files. Next, load PCBSetup without the /CNAMES
switch and then immediately exit answering Y when asked if you want to save
configuration files. This will insure that the CNAMES file is up-to-date.
Once you have done these steps, you may proceed to make the changes you need
to make to the CNAMES file.
/FILE:[filename]
Normally, PCBSetup requires that a PCBOARD.DAT file exists in the
subdirectory where you load it. If you want to use a PCBOARD.DAT in a
location other than the current subdirectory, use this command line switch.
To use the /FILE parameter, you need to specify the location of the
PCBOARD.DAT after you enter /FILE:. For example, if you want to use a
PCBOARD.DAT that is stored in C:\PCB\NODE1\, enter the following to have
PCBSetup use that DAT file:
PCBSETUP /FILE:C:\PCB\NODE1\PCBOARD.DAT
Exiting And Checking Your Configuration
To exit PCBSetup you need to press E at the Main Menu. When you do, you will
be asked if you wish to save your configuration. The following describes each
option available to you:
N Do not save any changes you have made to your PCBOARD.DAT
file and exit. Any changes you have made to the fields in
your conference configuration are automatically saved
whenever you exit the conference screen.
Q Save all changes to your configuration without checking the
validity of the paths and drives in your configuration. This
will probably be the selection you will use most, because it
is quicker then checking your entire configuration each time
you exit PCBSetup.
Y Saves all changes to your configuration and checks all paths
and drives to make sure they exist. In addition, your CNAMES
file will be updated for those utilities that use CNAMES
instead of CNAMES.@@@ and CNAMES.ADD for conference
information. If you have any conferences that do not have
message bases, the message bases will be initialized for you.
The following section describes in more detail what will occur when you
select either Y (full save) or Q (quick save) when asked if you wish to save
your changes.
Full Save
PCBoard divides the checking of your system into four sections. At any
section you can press E to skip over any of the following sections:
Checking Directories While Saving Files
At this junction, PCBoard is going to check the drives and paths in your
configuration to make sure they are all valid. All filenames and paths
listed in all setup screens will be checked to make sure they exist
(including conference information)
If a path does not exist, you will be shown the path that does not exist, and
then asked if you wish to create it. If a drive does not exist, you will be
shown which invalid drive you had in your configuration.
If the invalid path is in one of your conferences, you will be told what
conference and what question has the invalid path. With this in mind, you can
quickly and easily fix your configuration to point to a proper path if you
need to.
Checking BLT.LST file(s)
When you see this on your screen, PCBSetup is checking the bulletins defined
in each conference's BLT.LST file. Only the paths to each bulletin are
checked for validity. If the actual bulletin does not exist, nothing is
printed to the screen by PCBSetup.
To help speed things up, PCBSetup is smart enough to know when it has checked
a BLT.LST before and will skip it. This will save you an immense amount of
time especially if you have numerous conferences using the same BLT.LST file.
Checking DIR.LST file(s)
When you see this on your screen, PCBSetup is checking the file directories
defined in each conference's DIR.LST file. Only the paths to each DIR
(description) file and attached subdirectory are checked for validity. If
the DIR file does not exist, nothing is printed to the screen by PCBSetup.
To help speed things up, PCBSetup is smart enough to know when it has checked
a DIR.LST before and will skip it. This will save you an immense amount of
time especially if you have numerous conferences using the same DIR.LST file.
Checking SCRIPT.LST file(s)
When you see this on your screen, PCBSetup is checking the scripts defined in
each conference's SCRIPT.LST file. Only the paths to each script are checked
for validity. If the actual script file does not exist, nothing is printed
to the screen by PCBSetup.
To help speed things up, PCBSetup is smart enough to know when it has checked
a SCRIPT.LST before and will skip it. This will save you an immense amount
of time especially if you have numerous conferences using the same SCRIPT.LST
file.
Checking DLPATH.LST file(s)
When you see this on your screen, PCBSetup is checking each path listed to
insure that they are valid paths on your system. If you have specified an
index file in your DLPATH.LST file, it will only check to insure that the
path that points to your index file is valid.
To help speed things up, PCBSetup is smart enough to know when it has checked
a DLPATH.LST before and will skip it. This will save you an immense amount
of time especially if you have numerous conferences using the same DLPATH.LST
file.
Quick Save
A quick save is by far the quickest way to save your configuration. When you
choose to save your configuration in quick mode, your configuration is not
checked to make sure that all paths are valid. Instead, it simply copies the
values that were in memory at the time you exited the program and writes them
out to memory.
The PCBOARD.DAT File
The PCBOARD.DAT file is the main configuration file for PCBoard. In fact, all
fields in menu options A-H from the Main Menu are stored inside of this file.
If you are running multiple nodes, you probably have a PCBOARD.DAT file for
each node.
If each node has a separate configuration file, you may change the way the
node operates dramatically. For example, you could change one node to point
to a different PWRD file. This would allow you to limit access to this node
without effecting the other nodes on your system.
The disadvantage of having separate PCBOARD.DAT files for each node is quite
evident when you have a lot of nodes. If you have 20 nodes operating and
each has a separate configuration file, you could spend a lot of time
updating all 20 nodes to change the location of a file.
You are not forced to use a PCBOARD.DAT for each node. With the ability for
PCBOARD.EXE and all of the supporting utilities (PCBFiler, PCBSetup, etc.) to
utilize the /FILE command line parameter, you can share data files between
nodes. If you choose to share data files between nodes, remember that node
specific information such as node number, serial port to use, and other items
are all stored in the PCBOARD.DAT file. Therefore, you may want to take
advantage of the command line and environment parameters of PCBOARD.EXE to
over-ride information that is stored in the configuration file.
Specifying File & Paths
Throughout PCBSetup, you will be specifying where PCBoard should find
filenames and what paths should be used to store files. Because of this, you
should have a good knowledge of subdirectories and how they are used by DOS.
If you do not, you will most likely have a hard time configuring your PCBoard
system to operate the way that you want it to operate.
There are two ways that you can specify a path or filename -- absolute and
relative. The following sections describe the difference between absolute
and relative naming.
Absolute Naming Conventions
You are probably most familiar with this method of specifying a filename.
For example, if you tell someone to view C:\AUTOEXEC.BAT, you have given them
an absolute filename. In other words, you told them the drive, the
subdirectory (in this case the root directory), and the filename. If they
view that file they are guaranteed to view one and only one file because you
told them exactly where the file is.
To relate this to your PCBoard configuration, you would want to specify
absolute filenames when configuring the locations of files that should be
shared by all nodes (e.g., user file). That way, you can be assured that the
proper filename will be accessed by all nodes.
Relative Naming Conventions
Specifying a filename in a relative fashion is, for some, a more difficult
concept to understand. Relative addressing will take into account the
current drive and directory rather than having that information provided via
absolute addressing. For example, if you know the file is in the current
directory then you could simply reference the filename. You would not need
to specify the drive, path, and filename as it would be a waste of time.
Another example would be if you wanted to see a directory of all files in
your C:\PCB\GEN\ subdirectory while you are sitting at the C:\PCB> DOS
prompt. You could type
DIR C:\PCB\GEN
but it would be even faster to type
DIR GEN
The reason that you can get away with this is because you are already in the
C:\PCB\ subdirectory. Why type it in again? Remember that relative
addressing takes the current directory into account and adds the relative
information to the end of the filename. When you typed DIR GEN you forced
DOS to look for a GEN subdirectory underneath the current subdirectory. If
you were to change to your DOS subdirectory and then type DIR GEN you would
receive an error message that no files were found because you do not have a
C:\DOS\GEN subdirectory, but you do have a C:\PCB\GEN subdirectory.
At this point, you have to be asking yourself what good will this relative
filename information do for my PCBoard configuration? The answer to that
question is "quite a bit" if you are running multiple nodes.
Most likely all of your nodes will point to the same CNAMES file. Inside of
the CNAMES file more filenames are specified that relate to each conference
on your system. For example, the location of the NEWS file for each
conference is located in the CNAMES file. If you wanted every node to have
an individual NEWS file then you could change the location of the file to
point to NEWS instead of something like C:\PCB\GEN\NEWS Because no path or
drive information is specified, PCBoard is going to look in the default
directory for a file called NEWS. If that file is found, it will be
displayed. What really makes all of this work is the fact that no two nodes
will use the same default subdirectory. Therefore, you can have node
specific NEWS files by using relative addressing.
SysOp Information
This menu option will allow you to define information about the sysop. You
can specify if you wish to let users see your real name among other settings.
If you are looking to control the security level of SysOp related functions
then you should select the Security Levels option from the Main Menu instead.
The following describes each field on the Sysop Information screen:
Sysop's Name (when NOT using Real Name)
In this field, enter the first name of the SysOp. Enter a name in this field
only if you do not wish to use your real name as defined in record #1 of the
users file. This field is used in some of the following areas:
When entering chat mode with a user. The user will receive a message that
says "Hello, this is..."
When using F5 to shell to DOS the user is informed who has dropped to DOS.
When you are logged in, this will be used for your first name or any time the
@FIRST@ macro is used.
NOTE: This field is not recognized if you have answered Y to the Use Real
Name (Yes=Use name found in USERS file) option.
Local Password (used at the Call Waiting screen)
The local password gives you the ability to password protect the following
buttons on the call-waiting screen.
Sysop - Busy
Sysop - Not Busy
PCBSysMgr
PCBFiler
PCBSetup
and optionally (if you have answered Y to Require Local Password to Exit
PCBoard)
DOS - Busy
DOS - Not Busy
If you leave the local password field blank, no password will be asked. If
you do enter a password, enter the proper password to access the restricted
buttons on the call waiting screen. Entering an invalid password will recycle
the modem and return you to the call waiting screen.
Require Local Password to Exit PCBoard
If you want to protect people from dropping to DOS from the call-waiting
screen you can enable this option. One thing you need to keep in mind that
is that if someone has access to the keyboard they also have access to reboot
the computer and optionally abort the AUTOEXEC.BAT to access DOS.
Enabling this option is not a fool-proof way to protect others from accessing
DOS on the machine, but it will make it more difficult and maybe discourage
an unauthorized person from accessing DOS.
N Do not ask for the local password when attempting to exit to
DOS.
Y Ask for the local password when exiting PCBoard.
Use Real Name (Yes=Use name found in USERS file)
This option gives you the ability to determine how PCBoard refers to the
SysOp defined in record number 1 of the user file. The user defined in this
count can use their real name or the name SYSOP depending on how this
question is asked. Valid options for this field are:
N Any messages that you leave will be shown as having been left
by SYSOP regardless of the name in record #1 of the user
file. In addition, the Sysop Name field on this screen will
now become active.
Disabling this function has an additional benefit. A user
cannot login to the system using the name SYSOP. Hence, the
user name in record #1 must be known to access that
particular account. If you decide not to use the name
located in the user file, your users will not know the name
of that account. Not only would a user that is attempting to
hack your account have to get your password right, they would
also have to guess your name as well.
Y The user name that is found in record #1 of the user file
will be used for the operation of the bulletin board. When
you leave a message, the user name in record #1 will be
stored in the FROM: field, etc.
Use Graphics When Logged On Locally
When you access the bulletin board by using the Sysop - Busy or Sysop - Not
Busy buttons on the call-waiting screen then PCBoard will skip the question
that asks which type of graphics you wish to use, your name, password, etc.
This option will let you choose if you wish to default to color graphics mode
when logging in using the previously mentioned buttons on the call-waiting
screen. Valid options are:
N Do not use graphics mode when logging in as the SysOp. You
may want to choose this setting if you are using a monochrome
monitor on your system.
Y Assume graphics mode when logging in as the SysOp.
File Locations
When you select this menu option, you will be presented with an additional
menu that separates the file locations into categories. Select the category
of file locations that you wish to modify.
System Files & Directories
From this screen, you can edit the file locations of the most commonly
accessed files (often referred to as system files). In each of these fields
on this screen, enter the file and/or location where a particular
configuration file will be found. Each field and how it relates to your
system configuration is explained in the following sections:
Name/Loc of Conference Data
PCBoard stores the conference information (including the Main Board) in what
is referred to as the conference data file. Any fields in the conference
configuration screens (Main Board Configuration and Conference Configuration
is considered to be conference data.
The default filename is CNAMES, but a CNAMES.@@@ and CNAMES.ADD file are
also created in the same location as the CNAMES file.
The CNAMES file is a simple text file that contains most, but not all, of the
conference configuration information. This file is used by a lot of
third-party programs who wish to access configuration information about a
particular conference. The CNAMES file is only updated when you exit
PCBSetup and answer Y to the Save configuration files question.
CNAMES.@@@ and CNAMES.ADD are the primary files that are used to store
conference information. These files are random access to increase the speed
that information can be looked up for conference information. These two
files are updated automatically by PCBSetup.
Location for multiple nodes
If you are running all of your nodes from a single machine using a
multitasker, then you may store this file in any location, but you should
make sure that all nodes point to the same location.
On a network, you will want to store the CNAMES file on a server so that all
nodes may access it.
It is perfectly valid for each node to point to its own CNAMES file, but if
you use this type of configuration you will have to update each and every
node's CNAMES file whenever you make a change the configuration for a
conference.
Name/Loc of User File
The user file stores the majority of information about each caller on your
system. For example, the actual user name, password, and city data is just a
small sample of the data that is stored in the user file.
Location for multiple nodes
If you are running all of your nodes from a single machine using a
multitasker, then you may store this file in any location, but you need to
make sure that all nodes point to the same location.
On a network, you will want to store the user file on a server so that all
nodes may access it. Make sure that all nodes access the same user file.
Name/Loc of User Info File
The user info file contains additional information about each user. This is
the file where any TPA or PSA information will be stored about each caller.
Basically, you can look at this file as an extension of the user file.
Location for multiple nodes
Since this file is an extension of the user file, you should treat it in the
same manner. This means that it should be stored in a single shared location
where all nodes can access it.
Name/Loc of Caller Log
The caller logs record information about each session on your system. From
viewing the caller logs you can determine when a particular user successfully
logged in, the major functions that they performed while online (entering
messages, transferring files, joining a conference, etc.)
If you are running more than one node, the node number will be added to the
end of the filename you specify for the caller log. Therefore, if you were
running three nodes and you specified C:\PCB\MAIN\CALLER for all nodes then
you would find a CALLER1, CALLER2, and CALLER3 file in that subdirectory:
If you are running the /100 node version or higher, you should change the
name of your caller logs to something like CLR instead of the default
(CALLER). The reason you should do this is because CALLER100 would not be a
valid DOS filename.
The following is a sample log entry (when viewing online):
**************************************************************
09-06-93 (12:47) (3) RAY COOK Off Normally
Minutes Used: 15
Back from DOS at 12:47
Opened Door (MAIL) at 12:46
Batch Dnld: 1 Bytes: 76526 Avg. CPS: 1877
(D) SHOWFR11.ZIP Completed using Z (B) T/E=1 CPS=1877
Chatter (6) Conference Joined
Support (1) Conference Joined
Caller Security: 30
Caller Number: 1,061,432
=> CONNECT 14400/ARQ/V32/LAPM/V42BIS
09-06-93 (12:32) (3) RAY COOK (14400E) (G) JACKSON, TN
**************************************************************
Location for multiple nodes
When running multiple nodes, you should store your caller log files in a
common location for all nodes to access. If you are multitasking multiple
nodes on a single machine, this means that you specify the same location for
all nodes. For a multiple node installation on a network, all caller logs
should be stored in one common location on the server with each node pointing
to the same location.
If all nodes do not write their caller logs to the same location, SysOp
command 13 will not function properly because it will not be able to access
all files.
Name/Loc of Group CHAT File
When callers use the CHAT command to communicate with one another, PCBoard
uses the Group CHAT file to handle the communications between the various
nodes and chat channels.
This file will be a fixed size with the actual file size being determined by
the total number of nodes your package supports. For example, the group CHAT
file for a 250 node version of PCBoard would be larger than the group CHAT
file for a 10 node version.
Location for multiple nodes
Like the user file, your group CHAT file must be stored in the same physical
location on disk for group chat to function properly.
Location of Group CHAT .CAP files
If you have enabled the option in PCBSetup | Configuration Options |
Configuration Switches which deals with capturing the group chat session to
disk, this field will specify where the capture files will be. The contents
of the capture files include date and time stamps, the node number of the
caller, the caller's name, and the text of the complete line of information
typed.
Each channel has its own filename. The filename will be created in the
subdirectory that you have specified to store the group chat .CAP files. The
actual filename is [node#].CAP. For example, you may have a 1.CAP, 2.CAP,
etc. Also, any information such as when a caller joins the channel, leaves
the channel, makes it private, etc., will also be captured.
Location for multiple nodes
It is not required that you specify the same location for the .CAP files on
all of your nodes. However, it would be desireable to do so in case you want
to use a text search utility or something similar. You could then easily
find all of the .CAP files in one single location.
Name/Loc of Statistics File
This file is used to record the statistics that are shown on the call waiting
screen such as the number of calls to the system, the number of uploads and
downloads, the number of messages left, and the most recent caller
information.
Location for multiple nodes
Because the call-waiting screen allows you to switch between local and system
statistics, you will want to specify the same location for your Statistics
file. Otherwise, your system statistics will not be accurate.
Name/Loc of USERNET.XXX File
You can think of the USERNET.XXX file as the messenger between nodes. If
you are running a single node system, then you do not need to worry about
this file as it is not accessed. This file is used for some of the following
features in PCBoard:
Request node chats with other users
Send node broadcasts with the BR command from within PCBoard.
Protect users from logging in multiple times
Display information about who is online and what they are doing.
Drop nodes to DOS or logoff users from another node.
Location for multiple nodes
It is essential that all nodes point to the same physical file for
your USERNET.XXX file. If they do not, you will see a situation
where a particular node will be isolated from the rest of the nodes
(they will not be able to see a list of other users that are online,
etc.)
Name/Loc of Transfer Summary File
This file is created by PCBoard detailing the files that have been downloaded
or uploaded on your system. If the callers to your system transfer a lot of
information you may find that you have to periodically delete this file to
reduce the amount of disk space that it uses.
The information about each file transfer is stored on a single line in the
transfer summary file. Each item on the line is separated by a comma and
contains the following information:
Whether the transfer was an upload (U) or a download (D)
The name of the user who transferred the file
The date that the file was transferred
The time that the file was transferred
The filename that was transferred
File transfer protocol letter that was used
The number of transfer errors that occurred
Finally, the last item is the transfer rate in characters per seconds (cps)
NOTE: You may choose to not keep a record of file transfers that occur by
leaving this field blank.
Location for multiple nodes
This is another one of those files that it is not essential to have
all nodes point to the same file, but it is desirable. If you need
to keep the file transfers for a particular node seperate from the
entire system then go ahead and have that node point to a different
location.
Name/Loc of Swap File
When PCBoard is configured to swap itself out of memory during a shell
(PCBSetup | Configuration Options | System Control), it will normally be
swapped out to memory (EMS or XMS). If there is insufficient free memory to
hold the PCBoard memory image, it will instead be written out to disk.
In case the memory image has to be swapped to disk, you need to enter the
filename where you want the file to be stored. The default is to store it in
a filename called PCBSWAP.$$$ in the current directory.
Location for multiple nodes
Because the PCBSWAP.$$$ contains a memory image, it is critical that
no two nodes share the same PCBSWAP.$$$ file.
Location of PCBTEXT Files
Virtually all of the text and prompts that PCBoard displays are contained in
a PCBTEXT file. Each language on your system will have a different PCBTEXT
file that you can customize to suit your own needs with MKPCBTXT.EXE.
In this field, enter the drive and subdirectory where your PCBTEXT files will
be stored. If you are not using more than one language on your system, you
will have only one PCBTEXT file.
Location for multiple nodes
For the sake of speed you could have each node point to local copies
of your PCBTEXT files. You may find, however, that pointing all
nodes to one location and pre-loading your PCBTEXT files (PCBSetup |
Configuration Options | Configuration Switches) will increase
performance. This gives you the speed advantage and also the
advantage of editing one set of PCBTEXT files when you need to make a
change.
Locations of User Index Files
The user index files are used to quickly access the name of users on the
system and to point to their actual user record number. These files are
essential to the operation of your system.
In this field, enter the drive and subdirectory where you wish to store your
user index files.
PCBoard will maintain an index for each letter of the alphabet (PCBNDX.A
through PCBNDX.Z).
Location for multiple nodes
As with the user file, all nodes should point to the same physical
location for storing the user index files. If you are running a
network, make sure that all nodes point to the same location on the
server (since drive letters may vary from workstation to
workstation).
Location of Temporary Work Files
While users are logged into the system, it is quite likely that PCBoard will
need to create some temporary files along the way. Each node has a temporary
work directory where these files will be placed. This short list shows just
a few things that are stored in the temporary directory:
QWK mail packets (compressing and uncompressing)
Message capture files
Temporary storage (upload description until posted, etc.)
In this field, enter the drive and subdirectory where you want the temporary
files to be stored for this particular node. An ideal location for temporary
files is on a RAM drive.
Location for multiple nodes
Each node in your multinode setup must specify a unique location for
their temporary work directory. The directory that you specify must
not be the current or default directory. Usually the best solution
is to add a TEMP directory underneath the current directory.
Therefore, if you are running PCBOARD.EXE from C:\PCB\NODE1 then your
temp files may be stored in C:\PCB\NODE1\TEMP.
Location of Help Files
There are numerous help files for PCBoard. These help files detail
information about commands or areas of the system that have need a more
thorough explanation. The format for PCBoard to look for a help file is
HLP[option] where option is the command or topic that is being discussed.
You can also create help files for your doors or other new commands that you
add via CMD.LST (PCBSetup | File Locations | Configuration Files). To
accomplish this, create a text file in the directory that you specify for
help files that has the same name as the command or door. For example, if
you have a door called MAIL and you wish to create a help file, you would
create a text file called MAIL in the location you specify for your help
files. Then when your users ask for help with H command they can type MAIL
and have the text file that you created displayed to them.
Location for multiple nodes
If you do not plan to update your help files frequently it may be a
good idea to have local copies for each node if you are running on a
network. That way you can reduce un-necessary traffic. If you are
running all of your nodes on a single computer it does not matter
where you store your help files as long as all nodes point to a valid
copy.
If you can see that you will be updating your help files frequently then you
should store your help files in a single shared location to reduce the amount
of maintenance on your system.
Location of Login Security Files
When a user logs into the system, PCBoard has the capability of displaying
security specific files. These files are displayed to the user just after
they complete their login but before the conference news file is displayed.
The filenames for the login security files are simply the security level of
the caller. For example, if you want to create a file that only security
level 20 would see, then you create a file named 20 in the location that you
specify for the login security files. Because these files are normal display
files you can also make them graphics or language specific if you wish.
Location for multiple nodes
Because these files are only accessed once per login, it might be
best to store these in a single location where all of your nodes can
access the files. This will help reduce the amount of maintenance
you will have to do on your system.
Configuration Files
Name/Loc of PWRD/Security File
The PWRD file defines the security levels that you will use on your system.
For each security level you can specify the following information:
Daily/session time limit
Daily kilobyte limit
Batch file limit
File and byte ratios
Maximum total file and byte limit
Initial file and byte credits
Time limit for session or entire day
Allow alias usage
Allow multiple logins
To edit your PWRD file, press F2 while you have the Name/Loc of PWRD/Security
File field highlighted. When you do, you will see the following screen:
There are several keyboard commands that are active when you are editing your
PWRD file. These keyboard commands allow you to delete entries, insert
entries, etc. The following are valid:
ESC Exit the PWRD editor. If you have made any changes to the
PWRD file, you will be asked if you wish to save the changes
that have been made. Afterwards, you will be returned back
to the Configuration Files menu.
F1 Access on-line help. On-line help will be displayed that
relates to the PWRD file and the various fields that you can
edit.
F2 Rotate screen views. There are 16 fields that you can edit
in the PWRD file. Not all 16 can be placed on one screen. To
access the other fields, you need to press F2 to rotate to
the next set of fields.
ALT-R Repeat currently highlighted line. If you are creating
entries for security levels that are very similar in
definition, you can use this keyboard command to duplicate
the currently highlighted entry. The new entry will be
inserted just below the current line.
ALT-I Insert a new security level. If you need to add a new
security level between two existing security levels then you
would using this keyboard command. A new blank entry will be
inserted just below the current line that you can edit to
suit your needs.
ALT-D Delete current security level. This keyboard command will
delete the currently highlighted security level. There is no
undo function to get the original line back so if you make a
mistake, exit without saving and attempt to make the changes
again.
There are several fields inside this file. These fields allow you to control
time limits, byte limits, and more. The following describes each column in
the PWRD file in detail:
Password In order for a user to be assigned the values for a line not
only does their security level have to match, but also their
login password must match the one that you enter in the
Password field. If this field is blank, then the password of
the user is not checked. Do not get confused and assume that
if a user enters a password that is in this field that they
will be assigned the security level and options that you have
defined. This field does not work that way.
Sec This field determines the security level that you are
defining. When a user logs into the system, PCBoard will
lookup the security level of the user in the PWRD file. You
need to have one entry for each security level that you have
given to a user. In other words, if you have assigned
security levels 5, 10, 20, 30, 110, and 120 to actual user
records then you must have a corresponding entry in the PWRD
file. If you do not, PCBoard will print No security level
match in PWRD file and default their time to 10 minutes and 0
bytes when they login.
Time The amount of time, in minutes, you wish to give a user per
day or per session. If you have answered Y to the Enforce
Time Limit field, the time limit you enter will be for each
day. If you answered N to that question, the time limit will
be renewed each time the user calls.
If you enter a time limit of 0, it will cause PCBoard to
think that the user has accessed a Closed node or system. A
lot of systems have public and private nodes. To make a node
private, you would need to create a second PWRD file that had
a time limit of 0 for each of the security levels that you
wish to lock out.
Daily Bytes The number of kilobytes (K) that you want each security level
to have available per day. If you enter 0 for the number of
bytes available then it effectively disables downloads unless
they are defined as FREE or NOTIME downloads by the FSEC file
To give a security level unlimited download bytes you can
enter 32767. A user who has unlimited download bytes can
download files until they run out of time.
Base Baud This field allows you to adjust the maximum daily download
"K-Byte" limit based on the speed of the caller. For
example, you may want to allow 2400 bps callers to download
400k per day. You could set the kilobytes per day to 400k
per day. However, to your high speed callers who may have the
same security level, 400k may not seem to be enough. By
setting the base baud rate to 2400 and the kilobytes per day
to 400 you will be giving your 9600 bps callers 1600k. They
get four times the amount of bytes because they are calling
in at a speed which is four times greater than 2400.
As a general rule, you will want to enter the base baud rate
as the lowest bps rate that callers will be calling in. In
the previous example the base baud rate was set for 400k if a
2400 bps caller and at 1600k if the user was a 9600 bps. This
is more desirable than defining it at 1600k for 9600 bps and
letting PCBoard size it down.
Batch Limit This field defines the number of files that a user can
transfer in a batch transfer. For example, if you want a
user to download a maximum of 5 files in each batch, enter 5
in this field. You may enter any number from 0 to 99 in this
field. If you enter 0, the maximum batch is set to a default
of 30 files.
You can disable batch transfers for all users on your system
with the Disallow BATCH Uploads switch in PCBSetup |
Configuration Switches | File Transfers.
File Ratio If you want to control the number of files that a user can
download based on how many files they have uploaded to the
system, you want to enforce a file ratio. In this field,
enter the number of downloads that you want the user to be
able to download for each file that they upload. For
example, if you enter 4.0 in this field, a user must upload 1
file for every 4 files they download. Entering a value of
0.0 will disable the file ratio.
Byte Ratio If you want to control the number of bytes that a user can
download based on how many files they have uploaded to the
system, you want to enforce a byte ratio. In this field,
enter the number of bytes you want to allow the user to
download before they must upload another byte. In other
words, if you want your users to be able to download 20 bytes
for every byte they upload, enter a value of 20.0 in this
field. Entering a value of 0.0 will disable the file ratio.
File Limit If you wish to control the total number of files that a user
of the security level you are defining can download, you want
to impose a file limit. In this field, enter the maximum
number of files that a user can download from your system.
Once this limit has been reached, the caller cannot download
any more files. This type of limit would be ideal if you are
using a "pay-as-you-go" type system where you allow a user to
download a certain amount of files for some sort of
compensation.
When the file limit has been reached, you can reset the total
files downloaded field in System Manager (while editing a
user record) once more compensation has been received.
As with the other limits that you can define in the PWRD
file, entering a File Limit of 0 will disable the limit
checking.
NOTE: Any file that is specified as a FREE or NOTIME
download in the FSEC file will not be counted as a file
downloaded by a user.
KByte Limit If you wish to control the total number of bytes that a user
of the security level you are defining can download, you will
be enforcing a byte limit. In this field, enter the maximum
number of bytes a user can download from your system. Once
this limit has been reached, the caller cannot download any
more bytes. This type of limit would be ideal if you are
using a "pay-as-you-go" type system where you allow a user to
download a certain amount of bytes in exchange for some sort
of compensation.
When the byte limit has been reached, you can reset the total
bytes downloaded field in System Manager (while editing a
user record) once more compensation has been received.
As with the other limits you can define in the PWRD file,
entering a kilobyte limit of 0 will disable the limit
checking.
NOTE: Any file that is specified as a FREE or NOTIME
download in the FSEC file will not be counted as bytes
downloaded by a user.
The rest of the fields that you can define in the PWRD file must be accessed
by pressing F2 to rotate the screen view. Once you have pressed F2, you will
see the following additional fields:
File Credit This field gives you the ability to implement a grace period
if you are enforcing a file ratio. The value that you enter
in this field will be seen as an upload credit as if the user
had really uploaded this many files. Sometimes it takes
users a while to become familiar with a ratio system. In a
situation such as this, you may want to give your users an
initial upload file credit.
For instance, if the File Credit is set at 10 then the caller
may download 10 files before reaching a 1:1 ratio. A total
of 20 files can be downloaded before a 2:1 ratio would
prevent the downloading of a 21st file.
K-Byte Cred. This field gives you the ability to implement a grace period
if you are enforcing a byte ratio. The value that you enter
in this field will be seen as an upload credit as if the user
had really uploaded this many bytes. Sometimes it takes
users a while to become familiar with a ratio system. In a
situation such as this, you may want to give your users an
initial upload byte credit.
For instance, with a byte ratio of 10.0 a brand new caller
would be able to download, at most, a single 10-byte file.
To make it more fair, you could give the user an initial
credit of 20 kilobytes. Then the caller would be able to
download as much as 200 kilobytes before they would exceed
their ratio.
Enforce Time With this setting you can choose if the time limit that you
defined is a daily time limit or a session time limit. A
setting of Y enforces the time limit to be a per-day limit.
A setting of N would enforce a session limit letting the user
log back in immediately and get the time limit defined for
their security level each time they call in.
Allow Alias If you have installed the Alias PSA, you can control which
security levels will be able to use Alias names in those
conferences that allow aliases. If you want a security level
to be able to use an alias, this option must be enabled.
Force Read For some security levels, you may want to force callers to
read mail that they have been notified is waiting for them.
If you do, you should enable this option. As soon as the
user of this security level receives a you have mail
waiting... message, PCBoard will force the user to read this
mail in read-only mode (will not update the last message
read). For the user to be notified, their message waiting
flags have to be set.
NOTE: Not all third-party software will update the message
waiting flags, but PCBoard always will.
Demo Acct. Setting this answer to Y will allow a user at this security
level to log into the system multiple times. In other words,
you could have an account on your system that you could use
for demonstration purposes. With this setting, you could
have several users logging into your system using that
account whereas PCBoard normally disallows users of the same
name from logging in at the same time. If you use accounts
with this security level for demonstrating then you may want
to clear out the password field in your demonstration
accounts. With a blank password, PCBoard will not prompt the
caller to enter a password.
NOTE: When set to allow multiple logins, PCBoard protects
the W user command and also resets the last message read
pointers because they are seen as demonstration accounts.
Name/Loc of FSEC File
The FSEC file gives you the ability to control the following:
Protecting files for download by security level or by password
Determining what files are free downloads
Whenever a user attempts to download a file, PCBoard will first check your
DLPATH.LST for the current conference to see if the file can be found. If
the file is found, then PCBoard will check your FSEC file to make sure that
the user has sufficient security or knows the correct password to download
the file. To edit your FSEC file, press F2 while you have the Name/Loc of
FSEC File field highlighted. When you do, you will see the following screen:
There are several keyboard commands active when you are editing your FSEC
file. These keyboard commands allow you to delete entries, insert entries,
etc. The following are valid:
ESC Exit the FSEC editor. If you have made any changes to the
FSEC file, you will be asked if you wish to save the changes
that have been made. After answering, you will be returned
back to the Configuration Files menu.
F1 Access on-line help. On-line help will be displayed that
relates to the FSEC file and the various fields you can edit.
ALT-R Repeat currently highlighted line. If you are creating
entries that are very similar in definition, you can use
this keyboard command to duplicate the currently highlighted
entry. The new entry will be inserted just below the current
line.
ALT-I Insert a new security level. If you need to add a new entry
between two existing entries, you would using this keyboard
command. A new blank entry will be inserted just below the
current line that you can edit to suit your needs.
ALT-D Delete current security level. This keyboard command will
delete the currently highlighted entry. There is no undo
function to get the original line back so if you make a
mistake, you should exit without saving and attempt to make
the changes again.
You will notice there are three fields in this file. These fields allow you
to specify the subdirectory and/or filename(s) you wish to control and the
security and/or password required to access the file.
Drive \ Path In this field, specify the subdirectory you wish to control
access to. You can enter any valid DOS path in this field.
Make sure that whatever you enter in this field matches one
of your entries in your DLPATH.LST file or it will be
ignored. For example, if you enter C:\RESTRICT\ in this
field but in your DLPATH.LST is the entry \RESTRICT\, a match
will not occur.
If you wish to control access to an entire drive, enter the
drive letter followed by a colon. For example, to control
access to all of drive F, enter F: in the field.
If you leave this field blank, whatever you enter for the
filename will be controlled no matter what download path it
is found in. For example, if you have a bunch of files in
different subdirectories that begin with FAQ, save yourself
several entries in the FSEC file by leaving the Drive \ Path
field blank and enter FAQ*.* in the filename field.
File Name In this field you should enter the filename you wish to
protect. You may enter any valid DOS filename or wildcard in
this field. For example, if you wish to simply protect
SALE0393.ARJ, you would enter that filename in this field.
However, if you wished to protect every file that begins with
SALE, you would enter SALE*.* in this field.
If you leave this field blank, every filename that is found
in the subdirectory that you entered in the Drive \Path field
will be protected. In other words, this field defaults to
*.* (all files).
Sec In this field, enter the security level that is required to
download the file(s) defined by the first two fields. If you
enter a security level of 0, it is assumed that the file is a
FREE file that does not get recorded as a downloaded file in
the user's record.
Password The password field allows you to enter a password that is
required in order to download the files that are defined by
the first two fields. There are two exceptions and those are
the words FREE and NOTIME. These two passwords have special
meaning in PCBoard. The FREE password will make it so that
the files or bytes downloaded do not get updated when a user
downloads a FREE file. NOTIME is only slightly different in
that no time is deducted for downloading a NOTIME file.
Once the password has been entered, it will not be asked for
again during the session. This means that if the user's
login password is the same as the file password, the password
will not be asked when attempting to download a file
protected with the same password.
The order that you list the entries in your FSEC file are very important
because PCBoard will act on the first match that it finds. Therefore, you
will want to list your most specific entries at the top and your more generic
entries towards the bottom of the file. For example:
Drive \ Path File Name Sec Password
-------------------------------- -------------- ----- --------------
*.* 20
Q:\FREE\ MEMBER*.* 0 FREE
This example would not work because every file would match on the first entry
and PCBoard would act on it. Instead, you would want to reverse these
entries so that PCBoard checks to see if the file is in Q:\FREE\ first.
As a general rule, you could order your FSEC in the following
manner:
* Entry has a subdirectory and a filename specified
* Entry has a subdirectory but no filename specified
* Entry has only a filename specified
* Entry has *.* for a filename and no subdirectory specified.
* Perhaps the simplest example would be if you wanted to allow any user to
get files from your Y:\FREE\ subdirectory but only users who have a
security level of 20 or higher can download any other files. In this case
you would make the following entries in your FSEC file:
Drive \ Path File Name Sec Password
-------------------------------- -------------- ----- --------------
Y:\FREE\ *.* 0 FREE
*.* 20
As another example, let's assume you want to protect the files in two
subdirectories with a particular password. In this case, you would make the
following entries:'
Drive \ Path File Name Sec Password
-------------------------------- -------------- ----- --------------
Q:\CHARTS\ *.* 20 MAKE_MY_DAY!
R:\SALES\ *.* 20 CHERRY-PIE
Finally, let's assume that you have a CD-ROM on-line as drive X. You only
want to allow those users which have contributed to your system (level 50 or
above) to download files from your CD-ROM. You want to protect all of the
files in drive X but you certainly do not want to have to enter all of the
subdirectories into the FSEC file. In the Drive \ Path field. Instead,
enter the drive letter you wish to protect as in the following example:
Drive \ Path File Name Sec Password
-------------------------------- -------------- ----- --------------
X: *.* 50
Name/Loc of UPSEC File
The UPSEC file is very similar to the FSEC file except that it allows you to
control the files that get uploaded to your system rather than the files that
are downloaded. For instance, you may decide to only accept files that have
a .ZIP extension. If this is what you desire, then the UPSEC file is where
you will configure your system to do this.
Whenever a user attempts to download a file, PCBoard will first check your
DLPATH.LST for the current conference to see if the file can be found. If
the file is found, PCBoard will check your UPSEC file to make sure that the
user has sufficient security or knows the correct password to upload the
file. To edit your UPSEC file, press F2 while you have the Name/Loc of UPSEC
File field highlighted. When you do, you will see the following screen:
There are several keyboard commands that are active when you are editing your
UPSEC file. These keyboard commands allow you to delete entries, insert
entries, etc. The following are valid:
ESC Exit the UPSEC editor. If you have made any changes to the
UPSEC file, you will be asked if you wish to save the changes
that have been made. Afterwards, you will be returned back
to the Configuration Files menu.
F1 Access on-line help. On-line help will be displayed that
relates to the UPSEC file and the various fields you can
edit.
ALT-R Repeat currently highlighted line. If you are creating
entries that are very similar in definition, you can use
this keyboard command to duplicate the currently highlighted
entry. The new entry will be inserted just below the current
line.
ALT-I Insert a new security level. If you need to add a new entry
between two existing entries, you would using this keyboard
command. A new blank entry will be inserted just below the
current line that you can edit to suit your needs.
ALT-D Delete current security level. This keyboard command will
delete the currently highlighted entry. There is no undo
function to get the original line back so if you make a
mistake, exit without saving and attempt to make the changes
again.
You will notice there are three fields in this file. These fields allow you
to specify the subdirectory and/or filename(s) you wish to control and the
security and/or password required to access the file.
Drive \ Path In this field, specify the subdirectory you wish to control
access to. You can enter any valid DOS path in this field.
If you wish to control access to an entire drive, enter the
drive letter followed by a colon. For example, to control
access to all of drive F then you would enter F: in the
field.
If you leave this field blank, it is the same as saying any
drive and any subdirectory on the entire system.
File Name In this field you should enter the filename you wish to
protect. You may enter any valid DOS filename or wildcard in
this field. For example, if you wish to prevent users from
uploading any filename that ends with a .COM extension, enter
*.COM in this field.
If you leave this field blank, every filename that is found
in the subdirectory that you entered in the Drive \Path field
will be protected. In other words, this field defaults to
*.* (all files) when left blank.
Sec In this field, enter the security level that is required to
upload the file(s) that are defined by the first two fields.
If you enter a security level of 0, anyone may upload the
files specified.
Password The password field allows you to enter a password that is
required in order to upload the files that are defined by the
first two fields. Once the user has entered the password,
they will not be asked for it again during that session.
This means that if the user's login password is the same as
the file password, the password for the file will not be
asked for.
The order that you list the entries in your UPSEC file are very important
because PCBoard will act on the first match that it finds. Therefore, you
will want to list your most specific entries at the top and your more generic
entries towards the bottom of the file. For example:
Drive \ Path File Name Sec Password
-------------------------------- -------------- ----- --------------
*.* 20
Q:\CONF1\PRIVUPLD\ *.GIF 0
This example would not work because every file would match on the first entry
and PCBoard would act on it. Instead, you would want to reverse these
entries so that PCBoard checks to see if the upload would go to
Q:\CONF1\PRIVUPLD\ first.
As a general rule, you could order your UPSEC in the following
manner:
* Entry has a subdirectory and a filename specified
* Entry has a subdirectory but no filename specified
* Entry has only a filename specified
* Entry has *.* for a filename and no subdirectory specified.
Perhaps the most practical example would be to illustrate how you make it so
that users could only upload compressed files and only those compressed files
that you wish to allow. You could create the following FSEC file for
allowing only *.ZIP files to be uploaded to your system:
Drive \ Path File Name Sec Password
-------------------------------- -------------- ----- --------------
*.ZIP 0
*.* 100
When a user uploads a file, PCBoard will check the UPSEC file to see if the
filename ends with .ZIP. If it does not, it proceeds onto the next entry in
the file. Obviously the last entry will match any file that is uploaded.
The catch, however, is that if no matches were found on the previous entries
in your UPSEC file, they will not be able to upload the file unless their
security level is 100 or higher.
Another example would be if you wanted to allow .ZIP files to be uploaded
anywhere on your system but you only wanted .GIF files to be uploaded in
conference #3. In a case such as this, you would make the following UPSEC
file:
Drive \ Path File Name Sec Password
-------------------------------- -------------- ----- --------------
D:\CONF3\PRIVUPLD\ *.GIF 0
*.ZIP 0
*.* 100
PCBoard sends all uploads initially to the private upload directory so make
sure if you are trying to protect uploads to a particular conference, enter
the location of the private uploads regardless of whether all uploads are
public or private. This example assumes the private upload directory for
conference #3 is D:\CONF3\PRIVUPLD\. As you can see, a user could only
upload a filename that ends with .GIF if the private upload directory for the
conference is D:\CONF3\PRIVUPLD.
Name/Loc of User Trashcan File
The trashcan file gives you the ability to protect users from creating
accounts with user names that are listed in your trashcan file. This means
that you can protect users from logging into your system with words that you
may find offensive.
To edit the trashcan file, you highlight the field on the screen which says
Name/Loc of User Trashcan File and then press F2. When you do, you will see a
screen similar to the following:
In the trashcan file editor, the following keyboard commands are available:
ESC Exit the trashcan editor. If you have made any changes to
the trashcan file, you will be asked if you wish to save the
changes that have been made. Afterwards, you will be
returned back to the Configuration Files menu.
F1 Access on-line help. On-line help will be displayed that
relates to the trashcan file.
PgDn View the next 15 entries. On each screen of the trashcan
editor, 15 entries can be displayed. If you want to view the
next 15 entries in the file, use this keyboard command.
PgUp View the previous 15 entries. To view the previous 15
entries of the trashcan file, use this keyboard command.
ALT-I Insert a new line. If you need to add a new entry between two
existing entries, use this keyboard command. A new blank
entry will be inserted just below the current line that you
can edit to suit your needs.
ALT-D Delete current line. This keyboard command will delete the
currently highlighted entry. There is no undo function to
get the original line back. If you make a mistake, exit
without saving and attempt to make the changes again.
The trashcan file is accessed whenever a new user logs into a system. If any
of the entries in the trashcan file are part of the new user's name, PCBoard
will not allow them to continue. For example, if you have the word ENTER in
your trashcan file a user could login as THE ENTERPRISE, but not as ENTER THE
NIGHT. The key difference is that ENTER is not a separate word in the name.
As another example, if you have the word THE in the trashcan file, a user
name such as THE WIND, or THE WILD ONE would fail. A name such as JOHN THEOS
would not fail because the word THE does not exist as an entire single word.
Name/Loc of Protocol Data File
The protocol data file is the configuration file that stores information
about the file transfer protocols that are available on your system. In
order to transfer files from your system to the remote user's system or vice
versa, a file transfer protocol must be used. There is no one standard file
transfer protocol, therefore, PCBoard gives you the ability to define up to
36 different protocols for your system.
To edit your protocol data file, highlight the line which says Name/Loc of
Protocol Data File and press F2. When you do, you will see the following
screen:
The protocol data file consists of seven fields for each
protocol entry. The following describes each field in detail:
Use Each protocol in PCBoard is referenced by a protocol letter
rather than the name of the protocol. The letter that you
enter in this field is the letter that will be used while
on-line to reference the protocol. You may enter any letter
or number (A-Z and 0-9) for a total of 36 possible protocol
definitions.
Type This field describes the type of protocol that you are
defining. The following are the valid options:
I Internal. An internal protocol is one that is implemented
inside of PCBoard itself. You could call these built-in
protocols if you wish. There are seven protocols that are
internal to PCBoard:
(A) ASCII
(X) XModem/Checksum
(C) Xmodem/CRC
(O) 1K-Xmodem
(F) 1K-Xmodem/G
(Y) Ymodem BATCH
(G) Ymodem/G BATCH
If you are defining an internal protocol, you must use the
appropriate protocol letter (shown in parentheses in the
internal protocol list) for the internal protocol to be used.
S Shelled. This type of protocol refers to an external
protocol (one that is not built into PCBoard). You should
define an external protocol as this type if it is a single
file transfer protocol (not capable of batch transfers) or if
it does not use the DSZLOG style log for recording transfer
activity. If you define a protocol as this type, PCBoard will
not let a user transfer more than one file at a time.
D DSZLog. This type of protocol refers to an external
protocol. Any protocol that is capable of recording transfer
information in the DSZLOG style format should use this
protocol type. If you are unsure if the protocol you are
trying to add supports DSZ style logging, please refer to the
protocol documentation or the author of the protocol.
PCBoard will allow callers to use any protocol of this type
for batch file transfers.
B Bi-directional. You should only define a protocol as this
type if it is capable of sending and receiving files at the
same time. Only a handful of protocols exist that support
bi-directional transfers. If you do use a protocol that
supports bi-directional transfers, make sure that it also
supports DSZLOG style logging. If it does not, PCBoard will
not be able to properly determine the files that were
transferred.
Size Just before PCBoard begins a download it will print the size
of the file(s) that will be transferred and approximately how
many protocol blocks required to transfer the file. Each
protocol uses a packet or block size. Most of the advanced
protocols will send 1024 bytes at a time whereas protocol
like Xmodem will send 128 bytes at a time. PCBoard uses the
value that you enter in this field to determine how many
protocol blocks will be transferred. This information really
is purely statistical in nature and the protocol will
continue to function properly even if you do not enter the
right value.
MNP Some file transfers protocols will off-load the error
correction on the modems in order to get better throughput.
If you are installing a protocol which relies on error
correcting modems, enter Y in this field. When this field is
set to Y, a user may only select this protocol if they have
established an error correcting connection (e.g., MNP, v.42,
etc.) For this to work properly, both your modem and the
remote modem must have established an error-correcting
connection.
Port Open Normally, PCBoard will shut down the RTS signal and unhook
itself from the serial port interrupt prior to executing an
external protocol. It is then up to the external protocol to
initialize the serial port for proper communications. This
is the method that nearly every external protocol expects to
function properly. However, some protocols may require that
PCBoard leave the port 'as-is' before turning control over to
the external protocol. If you run into a protocol that
absolutely requires this then set this field to Y. If you
are not sure, leave this option set to N or you could see
some unpredictable results when you return back to PCBoard
from the external protocol.
Lock Lines The status lines, which PCBoard moves to the top of the
screen during a shelled protocol, may be frozen in place to
avoid having them scrolled off the top of the screen. This
way you can see who is on-line transferring files when users
are using external protocols. This only works for those
external protocols which use BIOS to write to the screen or
if the protocol does not write to the top two lines of the
screen. To lock the lines in position, set this option to Y.
Description In this field, enter a short description of the protocol that
is being defined. This description is displayed to the
caller whenever they are choosing from the list of protocols
that have been defined on your system. You may enter up to
37 characters to describe each file transfer protocol.
As mentioned previously, internal protocols are built in PCBoard. External
protocols are separate programs and are not really related to PCBoard. Batch
files are used to execute external protocols. PCBoard expects these batch
files to be named in the following manner:
PCBR?.BAT where ? is the protocol letter of the external
protocol you are defining. This batch file will be
executed whenever you receive a file (a user uploads
to your system).
PCBS?.BAT where ? is the protocol letter of the external
protocol you are defining. This batch file will be
executed whenever your send a file (a user downloads
from your system).
An external version of Zmodem is included with your package. If you look in
the directory where you installed PCBoard, you will see a PCBRZ.BAT and a
PCBSZ.BAT file. These are the two batch files that will get executed when a
user requests Zmodem for their transfer protocol. For further information on
setting up external protocols please see the Batch Files chapter of this
Manual.
NOTE: If you have defined a protocol and it is not showing up when a user
attempts to set their default protocol, it may be due to one of the
following:
The protocol that is not being listed is marked as a protocol that requires
an error-correcting session (MNP or v.42). The user that is on-line has not
established an error-correcting session (the connect speed on the status line
does not have an E on the end).
The protocol that is not listed is an external protocol and one or both of
the external protocol batch files are missing.
Name/Loc of Multi-Lang. Data File
The multi-language data file is the file that controls what languages (if
any) are defined for use on your system. The ability to configure multiple
languages on your system gives you the ability to cater to more users who may
not speak the same language.
To edit the multi-language data file highlight the line on the screen that
says Name/Loc of Multi-Lang. Data File and press F2. You will see a screen
which resembles the following:
The following describes each of the fields in this file:
Language The name of the language. This is the text that is displayed
to the caller when they are asked to choose a language at
login. You should include the number of the language on this
line. The first language in the file will be assigned
language #1, the second language will get language #2, etc.
Extension The filename extension for language specific files. For
example, if you are adding the French language, you may want
to make the extension .FRE. This means if you had a file
called WELCOME.FRE it would be displayed to anyone who
selected the French language at login.
Country If you also want PCBoard to add date, numerical separator,
and capitalization support for the language that you are
defining, you need to enter the country number to use as
defined by COUNTRY.SYS. For the French language this would
be 033.
CodePage The code page is also a function of COUNTRY.SYS and defines
what characters are available in the language you are
defining. This information should be provided in your
operating system manual. As an example, the French language
would use 850 in this field.
Yes Since Yes and No are not the same in all languages, you can
define what character will be used to represent a response of
Yes. In French, you most likely would like to use the letter
O.
No As with the Yes field, the language you are defining may use
a character other than N to represent a response of No.
Simply enter the character that you wish to use to represent
a response of No.
There are several keyboard commands which give you the ability
to add and delete entries, and more. They are as follows:
ESC Exit the multilingual editor. If you have made any changes
to the multilingual file, you will be asked if you wish to
save the changes that have been made. Afterwards, you will
be returned back to the Configuration Files menu.
F1 Access on-line help. On-line help will be displayed that
relates to the PCBML.DAT file.
PgDn View the next 15 entries. On each screen of the multilingual
editor, 15 entries can be displayed. If you want to view the
next 15 entries in the file, use this keyboard command.
PgUp View the previous 15 entries. To view the previous 15
entries, use this keyboard command.
ALT-I Insert a new line. If you need to add a new entry between
two existing entries, use this keyboard command. A new blank
entry will be inserted just below the current line that you
can edit to suit your needs.
ALT-D Delete current line. This keyboard command will delete the
currently highlighted entry. There is no undo function to
get the original line back. If you make a mistake, exit
without saving and attempt to make the changes again.
For more information about the country code and code page information please
see the discussion about COUNTRY.SYS in the Internationalization section of
the Customizing Your BBS chapter of this manual.
Name/Loc of Color Definition File
PCBFiler has a menu option you can use to customize the colors used in your
directory files. PCBoard will read this information from PCBFiler
configuration file (PCBFILER.DEF) to colorize your directory files
on-the-fly. The configuration file will be created in the same directory as
PCBFILER.EXE.
In this field, enter the location and name of your PCBFILER.DEF file. If the
PCBFILER.DEF file cannot be found in the location that you specify, your file
directories will appear in monochrome rather than the colors that you desire.
Name/Loc of Default CMD.LST File
The CMD.LST file defines commands that you can be used to add, change, or
even replace commands available to your callers. You can define commands
that stuff the keyboard with certain text, run PPE files, or execute a menu
file. In this field, enter the name and location of the default CMD.LST
file. This file will be used in any conferences that do not have a
conference specific file defined.
To edit this file, highlight the line which says Name/Loc of Default CMD.LST
File and then press F2. You will see a screen which resembles the one on the
following page:
While in this editor, these keyboard commands are available:
ESC Exit the CMD.LST editor. If you have made any changes to the
CMD.LST file, you will be asked if you wish to save the
changes that have been made. Afterwards, you will be
returned back to the Configuration Files menu.
F1 Access on-line help. On-line help will be displayed that
relates to the CMD.LST file.
PgDn View the next 15 entries. On each screen of the trashcan
editor, 15 entries can be displayed. If you want to view the
next 15 entries in the file, use this keyboard command.
PgUp View the previous 15 entries. To view the previous 15
entries of the CMD.LST file, use this keyboard command.
ALT-I Insert a new line. If you need to add a new entry between
two existing entries, use this keyboard command. A new
blank entry will be inserted just below the current line that
you can edit to suit your needs.
ALT-D Delete current line. This keyboard command will delete the
currently highlighted entry. There is no undo function to
get the original line back. If you make a mistake, exit
without saving and then attempt to make the changes again.
ALT-R Repeat current line. If you are creating entries that are
very similar in definition, use this keyboard command to
duplicate the currently highlighted entry. The new entry
will be inserted just below the current line.
There are three fields that are used to define each command in
the CMD.LST file. The following describes each field in detail:
Command You can enter up to 15 characters to define a command. The
text entered in this field will be used whenever the command
is executed. For example, if you enter MAIL in this field, a
user must type MAIL to access the command you are defining.
Security In this field, enter the security level that is required to
execute the entry you are defining. If the user does not
have a security level equal to or greater than the number
that you enter, a Menu Selection is not available message
will be displayed to the user.
Replacement When a caller executes a command you define, you can have the
command run a .PPE file, a .MNU file, or have it simulate the
user keystrokes.
If you wish to run a .PPE file then specify the full path and filename you
wish to run including the .PPE extension. If the filename that you specify
cannot be found, no action will occur when the command is executed.
To run a .MNU file specify the full path and filename that you wish to run
including the .MNU extension. If the filename that you specify cannot be
found then no action will occur when the command is executed.
If you do not specify a .MNU or a .PPE file then the text that you enter in
this field will be stuffed into the keyboard so that it appears that the user
actually typed the text that is in this field. This would be useful to
combine frequently used commands into one easy to remember command.
Any commands that you define in the CMD.LST file will be found before any
other internal command or door name is executed. This is the reason that any
commands that you define in this file will override internal commands of the
same name.
If you define a command that is more than one character in length, you do not
have to type in the entire command for PCBoard to act on it. PCBoard simply
needs is to be able to guarantee that what is typed will make it a unique
command. For example, if you have a command named ORDER as the only entry in
CMD.LST, you could enter OR to open the command because there are no others
beginning with OR either as an internal command or in your CMD.LST file.
As another example, you could create a command called NEWFILES that would
stuff N;S;A into the keyboard. This would provide an easy way for your users
to display the new files in a particular conference without having to
remember to type in a more cryptic command such as N;S;A. To define this new
command, make the following entry in CMD.LST:
Command Security PPE/MNU File -or- Keystroke Replacement
-------------- -------- ---------------------------------------
NEWFILES 0 N;S;A^M
Assuming that you have a .PPE file that you wish to run in place of the E
user command you could make the following entry in your CMD.LST file:
Command Security PPE/MNU File -or- Keystroke Replacement
-------------- -------- ---------------------------------------
E 0 C:\PCB\PPE\EMSG.PPE
As you can see by this sample entry, any time a user executes the E user
command, PCBoard will run EMSG.PPE located in the C:\PCB\PPE\ subdirectory
instead.
Having a command execute a .MNU file is just as simple as running a .PPE
file. All you have to do is to specify the name of the .MNU file that you
wish to run as shown in the following entry:
Command Security PPE/MNU File -or- Keystroke Replacement
-------------- -------- ---------------------------------------
ORDER 0 C:\PCB\MNU\ORDER.MNU
This entry will execute C:\PCB\MNU\ORDER.MNU whenever a user types in the
ORDER command.
Name/Loc of All-Files DLPATH.LST
If you have files available for download in several conferences, you may want
to use this file to protect users from uploading files which do not exist in
the current conference but may exist in another conference on the system.
Normally, PCBoard will check the DLPATH.LST file of the current conference to
see if the files a user wishes to upload duplicates any files already on the
system. Since a different DLPATH.LST file can be specified for each
conference this means you would not be able to check for duplicates across
conferences.
If there are entries in the The All-Files DLPATH.LST (ALLFILES.LST) file,
PCBoard will use that file to check for duplicates when a user is uploading a
file. The ALLFILES.LST file is not used at any time for downloading
purposes so you may include every path on your system if you wish.
To edit your ALLFILES.LST file, highlight the line on the screen that says
Name/Loc of All-Files DLPATH.LST and press F2. You will see a screen which
resembles the following:
While you are in the editor, the following keyboard commands are available:
ESC Exit the ALLFILES.LST editor. If you have made any changes
to the ALLFILES.LST file, you will be asked if you wish to
save the changes that have been made. Afterwards, you will
be returned back to the Configuration Files menu.
F1 Access on-line help. On-line help will be displayed that
relates to the all-files DLPATH.LST file.
PgDn View the next 15 entries. On each screen of the DLPATH.LST
editor, 15 entries can be displayed. If you want to view the
next 15 entries in the file, you would use this keyboard
command.
PgUp View the previous 15 entries. To view the previous 15
entries of the DLPATH.LST file, use this keyboard command.
ALT-I Insert a new line. If you need to add a new entry between
two existing entries, use this keyboard command. A new blank
entry will be inserted just below the current line.
ALT-D Delete current line. This keyboard command will delete the
currently highlighted entry. There is no undo function to
get the original line back. If you make a mistake, exit
without saving and then attempt to make the changes again.
ALT-R Repeat current line. If you are creating entries that are
very similar in definition, use this keyboard command to
duplicate the currently highlighted entry. The new entry
will be inserted just below the current line.
Perhaps the easiest way for you to create your ALLFILES.LST would be to use
the DOS COPY command to combine the DLPATH.LST files that you use in your
various conferences into one single file called ALLFILES.LST. This method
would be faster than manually entering each path or index file into the file.
NOTE: You should also add the private upload directory path for each
conference in your ALLFILES.LST if you want PCBoard to check these
directories since they are not normally included in your conference
DLPATH.LST files.
As a quick example, let's assume that you have defined two conferences on
your system. In both conferences you have different files available for
download. You decide that the ALLFILES.LST would be the best way to protect
from getting unwanted duplicate files. First, you use the COPY command in
DOS to combine your DLPATH.LST files for your conferences by typing the
following:
COPY C:\PCB\CONF1\DLPATH.LST+C:\PCB\CONF2\DLPATH.LST C:\PCB\ALLFILES.LST
Next, add the public and private upload directory paths for the two
conferences into your ALLFILES.LST so that it resembles the screen on the
following page:
Name/Loc of Upload File Trashcan
This configuration file has one purpose -- to stop users from uploading
certain filenames. If a user attempts to upload a file which is in this list
then PCBoard will print an error that says Files matching ([filename]) are
not allowed on this system. To edit your upload file trashcan you need to
highlight the line on the screen which says Name/Loc of Upload File Trashcan
and press F2.
Inside the upload file trashcan editor, you may specify any valid DOS
filename or wildcard. Use the up and down cursor keys to move between fields
and type in the filename or wildcard filename you wish to disallow all users
to upload.
Batch file for viewing compressed files
In this field, enter the name of the batch file you wish to execute when a
user executes the F;V user command to view a file available for download.
PCBoard will execute the batch file specified in this field. In addition,
PCBoard will pass the full path and filename being viewed as the first
parameter to the batch file.
The default PCBVIEW.BAT included with your package makes use of VIEWZIP.EXE
and VIEWARCH.COM that are also supplied with your package. These two
utilities allow you to list the files contained in .ZIP and .ARC compressed
files.
Filename EXTENSION for compressed files
Usually a bulletin board system will pick a particular compression program to
compress all of the files on-line. For example, you may decide that you want
all of your files to be in .ZIP format. This field allows you to specify the
default extension for compressed files. This extension will be used in the
following places:
When flagging or requesting a file for download, PCBoard will attempt to find
a filename with the compressed filename extension if no extension is supplied
by the user. This can save keystrokes because the extension would not have
to be entered.
When using the F;V command PCBoard will attempt to find a filename with the
compressed filename extension if no extension is supplied by the user. This
can save keystrokes because the extension would not have to be entered.
If a bulletin is requested for download, PCBoard will check to see if a file
exists in the same location as the bulletin file that has the same filename
and also an extension that matches the compressed filename extension. If
such a file exists, the compressed version of the file will be downloaded
instead of the ASCII text version. This allows you to have large bulletins
on-line but for users to easily (and quickly) download a compressed version
of the bulletin.
Display Files
When you select this menu option, you will be presented with the following
screen which lists some of the display files you can change the location of
or even edit:
PCBoard makes use of several display files. These display files are text
files that will be displayed to the caller. Text files allow you to easily
customize the information you wish to present to the user. You can make your
file large or small, colorized or monochrome. The point is that you have the
choice.
All of the display files that are listed on this screen can have graphics,
security, and language specific versions. See Display Files in the
Customizing Your BBS chapter of this manual for additional information.. In
each of the fields on this screen, enter the drive, path, and filename that
you wish to use for each display file.
From within PCBSetup, you can edit the normal display file and the graphics
specific version by using F2 and F3 respectively. If you edit a file,
PCBSetup is going to call the text and graphics editors that you defined in
System Manager | Define Text & Graphics Editors because these are text
display files.
Name/Loc of WELCOME File
This file will be displayed after the Do you want graphics prompt is answered
(assuming Q is not used to abort the welcome file). Typically, SysOps will
design this screen to display the system name, phone numbers, and any other
relative facts.
Name/Loc of NEWUSER File
When a new user is logging into your system, this display file will be shown
to them right after they confirm that they are a new user. In this file you
will most likely want to display rules of your system and any steps that the
user must complete to become registered on your system.
Name/Loc of CLOSED File
This file is displayed whenever PCBoard determines that a user cannot login
to a system because it is a closed system. There are two ways of creating a
closed system:
In PCBSetup | Configuration Options | System Control you have enabled the Run
System as a Closed Board option. New users will not be allowed to login to
the system.
The security level of the caller has been defined to have 0 minutes available
in the PWRD file. This will display the CLOSED file regardless of the closed
board option in PCBSetup.
You will want to display a brief explanation of why the user cannot login to
your system and provide further instructions as to what the user should do.
Name/Loc of WARNING File
The WARNING file is displayed only to those callers whose subscription is
about to expire. This file will be displayed whenever the user is within the
warning period defined in PCBSetup | Subscriptions. You will want to let the
user know that their subscription is about to expire. You may want to
purposely use color or other eye-catching effects to make this file stand out
since some of your users may miss this file.
Name/Loc of EXPIRED File
When a user's subscription has expired, PCBoard will display the EXPIRED file
every time they login. Therefore, you may want to have this file contain the
instructions necessary for a user to renew their subscription.
Name/Loc of Conference Join Menu
When a user executes the J user command with out specifying a conference name
or number to join, PCBoard will display the menu of conferences that are
available. The display file defined by this file is the one that is used to
list the conferences that are available on your system. Because it is a text
file, you can customize it to look any way that you desire. You should
include the conference number and/or name for each conference so the user may
use the name or number of the conference they wish to join.
Name/Loc of Group Chat Intro File
When a user joins group chat, this file will be displayed to them. In this
file you may want to outline general rules of courtesy in regards to node
chat. Remember that this file will be displayed every time group chat is
joined so you may not want to make this file particularly long.
Name/Loc of Group Chat Menu
While in group chat, the user can execute several different
commands. These commands allow the user to change channels,
send private messages to other users, and more. This display
file is a menu that is displayed when a user is not in expert
mode and presses ESC. Expert users would need to ask for the menu
by typing MENU at the Chat Command prompt.
Name/Loc of NOANSI Warning
Group chat makes heavy use of the ANSI terminal emulation standard. If
PCBoard determines that the user is not capable of ANSI at login and the user
attempts to join group chat, this file will be displayed. In this file, you
may simply want to warn the user that they should instruct their terminal
program to use split-screen chat mode (if available) or avoid typing while
others are typing.
New User/Logon/off Questionnaires
Besides normal script questionnaires, you can also use script questionnaires
at logon, logoff, and when a new user is logging into the system. As with
normal script questionnaires, you can use the text format questionnaires or
you can make the questionnaire files actual PPE files if you need more
control when asking questions.
Name/Loc of New Reg Questionnaire
When a new user logs into your system, this questionnaires gives
you the ability to ask for additional information that PCBoard
does not. For example, you may want to ask questions about
where the new user found out about your system or even something
like their birth date.
If you have defined a new registration questionnaire, it will be used right
after PCBoard finishes asking it's normal questions (default protocol,
password, etc.)
Name/Loc of Answers to New Reg.
The filename that you specify in this field is where the answers to the new
registration questionnaire will be stored. If you used a standard script
questionnaire, the answer file will simply print the question that was asked
followed by the answer that the user gave. If you are using a PPE for the
new registration questionnaire, the format of the answers could be in any
format since the PPE controls the output.
Name/Loc of Login Script Quest.
The login script questionnaire is executed by everyone right after they enter
their password and even before the $$LOGON.BAT file is executed. If you want
to ask a questionnaire for every login or more likely to execute a PPE at
every login, define the file to use as your questionnaire.
NOTE: You can also have this field display an additional logon
screen by specifying the filename to display in this field and leaving the
answer field blank. When the answer field is blank, no questions will be
asked.
Name/Loc of Logon Script Answers
The filename that you specify in this field is where the answers to the logon
questionnaire will be stored. If you used a standard script questionnaire,
the answer file will simply print the question that was asked followed by the
answer that the user gave. If you are using a PPE for the logon
questionnaire, the format of the answers could be in any format since the PPE
controls the output.
Name/Loc of Logoff Script Quest.
The logoff script questionnaire is executed by everyone right after they
enter the command to logoff and before the $$LOGOFF.BAT file is executed. If
you want to ask a questionnaire at every logoff or more likely to execute a
PPE at every login, define the file to use as your questionnaire.
NOTE: You can also have this field display a logoff screen by specifying the
filename to display in this field and leaving the answer field blank. When
the answer field is blank, no questions will be asked.
Name/Loc of Logoff Script Answers
The filename that you specify in this field is where the answers to the
logoff questionnaire will be stored. If you used a standard script
questionnaire, the answer file will simply print the question that was asked
followed by the answer that the user gave. If you are using a PPE for the
logoff questionnaire, the format of the answers could be in any format since
the PPE controls the output.
Modem Information
Selecting this menu option allows you to modify the setup of PCBoard in
regards to the serial port you are using. Not only can you define the serial
port you will be using, but there are options which control the behavior of
PCBoard with your serial port.
There are three menu options that you can select. If you want to configure
what serial port to use, the initialization string, or other items related to
the setup of your modem then you should select the first menu option.
Selecting the second menu option will allow you to set numerous options that
control how PCBoard interacts with your modem. Finally, the last menu option
contains items that allow you to control access to the node you are
configuring based on the connect speed of the caller.
When you installed PCBoard, the install program configured your modem with a
program named PCBMODEM.EXE. This utility will configure numerous modems to
operate properly with PCBoard. You should run PCBModem at least once to
configure your modem properly.
Modem Setup
Seconds to wait for carrier
As soon as PCBoard detects a ring coming in from the modem, it will countdown
from the number that you enter in this field to 0. If PCBoard reaches 0
without being able to determine that a connection has been established, it
will recycle and wait for the next call. Normally a good value to set for
this field is between 30 and 45 seconds to catch all connections.
Comm Driver to use (A/C/F)
Standard PCBoard software supplies only one type of comm driver and that is
Asynchronous. If you have the standard PCBoard software, you should enter A
in this field. If you attempt to enter any other answer, PCBoard will not
operate properly.
If you have the multiport version of PCBoard (sometimes referred to as the /M
version), you can select any of the comm drivers to use. The following
describes each comm driver:
A Asynchronous (Async). Select this option if you wish to use
standard serial ports (sometimes referred to as COM ports).
These serial ports all utilize standard UART chips (e.g.,
8250, 16450, 16550, etc.). With this driver PCBoard requires
that each serial port in the machine access a unique base
address and IRQ setting.
C COMM-DRV. The multiport version of PCBoard includes a TSR
that is called COMM-DRV. This TSR provides a standard
interface between numerous serial devices. Not only are
intelligent serial boards like those produced by Arnet and
Digiboard supported but also some non-intelligent serial
boards are supported. To confirm whether or not your card
will work with the multiport driver, refer to the Preparing
The Multiport Driver section in the Multiple Nodes chapter of
this manual, or contact technical support.
F FOSSIL. PCBoard can also communicate with serial devices
that provide a FOSSIL interface. Usually this requires that
you load a device driver or TSR program.
Comm Port (0=NONE/Local Only)
Enter the number of the comm port to be used by PCBoard. If you enter a comm
port of 0, no modem will be used by PCBoard and local logins will be used for
all calls.
If you have configured PCBoard to use the async comm driver, the numbers 1
and 2 correspond to COM1 and COM2 in your machine. Any number higher than 2
will require that you supply a base address and IRQ value to define the port.
If you enter a port higher than 2, your hardware must be configured for
whatever values you enter for the base address and IRQ. If they do not,
PCBoard will either refuse to load, or will not be able to properly
communicate with your comm port. Refer to the Troubleshooting section of the
PCBoard chapter for additional details.
If you have configured PCBoard to use COMM-DRV, enter the corresponding port
number that you defined in DRVSETUP. For example, if you want to use the
port 2 defined in this sample DRVSETUP
Port Card Sub- Base Card
Number Type Port Address IRQ Segment FOSSIL
------ ------ ---- ------- --- ------- ------
1 ARNET 1 300 3 D000 Y
2 ARNET 2 300 3 D000 Y
enter 2 in the comm port field because that is what is defined as the port
number in DRVSETUP.
If you selected the FOSSIL comm driver instead, enter the port number as it
is defined in your external communications driver that provides the FOSSIL
interface.
Opening Baud Rate (300-115200)
In this field, enter the speed you wish for PCBoard to initially open your
serial port. Normally you will want to set this to the maximum port rate
speed that your modem supports. The valid options are 300, 1200, 2400, 4800,
9600, 19200, 38400, 57600, and 115200.
Sometimes, your modem may be able to support a faster port rate speed then
your serial and computer hardware may be able to keep up with. If this is
the case, you will experience data loss (some bytes will be lost when
transferred). To resolve this, you can lower the opening port rate speed or
upgrade your computer hardware.
NOTE: If you enter an opening port rate speed of 19200 or higher, PCBoard
will force the port speed to be locked regardless of how you have set the
Lock in Opening Baud Rate.
Lock in Opening Baud Rate
A locked port speed tells the modem to communicate at the rate you entered
for the opening port speed. When the communications port is not locked,
PCBoard will always communicate at the same speed as the caller is connected
at.
A locked port rate will have no effect unless you are using a modem that is
capable of error-correction (e.g., V.42, MNP) and an error-correction
connection is established. With an error-correcting connection, the actual
throughput of all data transferred can be increased by up to 20% because the
start and stop bits are stripped out. In addition, most error-correcting
modems also support data compression of ASCII text (such as display screens)
very well.
If you enable this option, you need to be sure that your modem is also
configured to expect a locked port rate (sometimes referred as a fixed DTE
speed or a fixed DTE link). If both the software and hardware are not
configured to communicate at a locked port rate, you will see garbage
characters on the remote screen when calling in.
Modem Initialization String
This field contains the initializing string that PCBoard should send to the
modem when it first loads and whenever it recycles to the call-waiting
screen. The string that you enter in this field will vary between modems
because most modems have different command sets and default values. The best
thing to do is to use PCBModem to properly configure your modem for use with
PCBoard. Instructions for PCBModem can be found in the Utilities chapter of
this manual. If your modem is not listed in PCBModem, contact the technical
support staff to get your modem configured properly with PCBoard.
There are two special characters that you can use in your initialization
string to simulate a carriage return (pressing R) and to incorporate a brief
pause in your initialization string.
^M If you enter these two characters in your initialization
string, PCBoard will send a carriage return and continue
sending the rest of the initialization string. Some modems
have a problem with long initialization strings. Use the
carriage returns to break up a long initialization string.
For example
ATM0^MATH0^MATS0=0
would send the following to your modem:
ATM0 ENTER
ATH0 ENTER
ATS0=0
~ If you enter this character in your initialization string,
PCBoard will pause 1/2 of one second every time it encounters
this character. This would be useful to manually slow down
the speed at which the modem initialization string is sent.
If you run communications programs on the same modem that you use for your
system, you need to be careful to restore the modem to all of the proper
settings because your communications program has an initialization string as
well. One initialization string that you could use would be ATZ^MATM0H0.
This string will reset the modem, turn off the speaker, and put the phone
line back on hook (if it was off hook). Be forewarned, however, that some
modems have a problem with sending ATZ in the initialization string and may
report a modem reset error.
An incorrect initialization string that does not generate an OK from the
modem will result in PCBoard issuing a modem reset error. If you experience
this error, refer to the Troubleshooting section in the PCBoard chapter of
this manual for additional instructions.
Modem Off-Hook String
Sometimes PCBoard will want to take the phone off-hook to make the phone line
busy. PCBoard will send the off-hook string that you enter in this field at
the following times:
Selecting User - Busy, Sysop - Busy, or DOS-Busy from the call waiting
screen.
Enabling the Modem Off-Hook During Recycle will force the phone to be
off-hook from the time carrier is dropped until the initialization string is
sent.
Recycling the node using the 15 sysop command.
NOTE: Some modems have built in limits as to how long they will stay
off-hook. When this time expires, they will go back on hook (allowing your
phone to ring). In this type of situation there is nothing that PCBoard can
do to keep the phone line busy as this is a built in function of the modem.
Configuration Switches
Disable CTS/RTS Checking
CTS/RTS refers to a type of flow control called hardware flow control which
restricts or enables the flow of data. When data cannot be received or sent
by one side of the connection it will attempt to restrict the flow of data
via the hardware flow control signals provided by the RS-232 serial
interface. In other words, flow control is necessary to guarantee that modem
and computer buffers are not caused to overflow by incoming or outgoing data.
Normally you will want to answer N to this question unless your modem or
serial card does not support CTS/RTS flow control. For high speed
communications it is essential that you do not disable flow control or you
risk losing data over the connection.
NOTE: For high speed communications it is essential that you answer N to
this question or risk data loss over the modem.
Valid options for this field are:
N CTS/RTS flow control will be enabled by PCBoard. Similar to
locking the port rate, it is required that both the modem and
PCBoard be configured to use CTS/RTS flow control. It is
also important that your modem not be configured for XON/XOFF
or software flow control.
Y Hardware (CTS/RTS) flow control will be disabled by PCBoard.
Select this setting only if your modem does not support
hardware flow control (check your modem manual if you are
unsure).
Disable RTS-Drop During Write
While PCBoard is receiving an upload file (via an internal transfer protocol)
it will normally shut down the RTS signal while it writes to disk to avoid
data loss.
N When writing data being uploaded, PCBoard will shut down RTS
to prevent data from being lost.
Y Disables this automatic RTS shut down. While faster uploads
may be possible, it could result in data loss. You would be
most likely to experience data loss if the upload is being
written to a slow drive or across the network..
Using a FastComm 9600
If you are using a FastComm 9600 modem, you should answer Y in this field.
PCBoard has to assume certain aspects about the connection due to the way the
FastComm modem operates. If you are not using a FastComm 9600 modem, leave
this field set to N.
Reset Modem While Idle
PCBoard gives you the opportunity to reinitialize the serial port and modems
every five minutes while idling at the call waiting screen. This may be
beneficial if you experience unexplained modem reset errors. Valid options
are:
N When at the call waiting screen, PCBoard makes no attempt to
reinitialize the port.
Y While at the call waiting screen, the port and modem will be
reinitialized after five minutes of inactivity.
NOTE: In some modems this can help keep the modem from getting modem reset
errors while other modems will instead be more prone to such errors.
Experiment with this setting if you are getting modem reset errors during
recycles.
Reset Modem During Recycle
After a caller hangs up you can automatically have PCBoard send the standard
ATZ to your modem to initialize the power-on defaults of your modem. This
might be useful if your modem experiences unexplained modem reset errors.
Valid options for this field are:
N After a caller is disconnected, PCBoard will not send the ATZ
command to your modem.
Y After a caller disconnects from your system, PCBoard will
send an ATZ command to restore the power-on defaults of your
modem.
NOTE: In some modems this can help keep the modem from getting modem reset
errors while other modems will instead be more prone to such errors.
Experiment with this setting if you are getting modem reset errors during
recycles.
Modem Off-Hook During Recycle
Normally after PCBoard disconnects a caller, it will leave the phone on-hook.
Those callers calling in will get a ring. This is usually desirable because
PCBoard recycles very quickly under normal circumstances. At most, callers
may get two to three rings before the modem answers the phone. If you wish,
you can configure PCBoard to make the phone busy until it is ready for the
next caller. Valid options are:
N PCBoard will leave the phone on-hook (incoming callers will
hear rings).
Y The phone will be taken off-hook causing incoming callers to
get busy signals until after PCBoard has completely recycled
and is waiting for the next call.
NOTE: In some modems this can help keep the modem from getting modem reset
errors while other modems will instead be more prone to such errors.
Experiment with this setting if you are getting errors during recycles.
Modem Delay During Recycle
Some modems can get confused if you attempt to recycle the system too quickly
resulting in modem reset errors. Setting a value of 1 or higher can help
slow down the recycle process and give your modem more time to be reset
without experiencing a modem reset error.
In addition, this value can be used to 'tune' the speed with which PCBoard
recycles. On buffered modems, a higher setting will insure that all data
gets transmitted. If your remote callers are not receiving all of the
information before carrier is dropped, try increasing the value entered in
this field.
Packet-Switch Network
If you are running in any kind of environment where PCBoard is directly
connected to a cable and not directly connected to a modem (e.g., a PAD,
packet-switch network, X.25) you need to inform PCBoard via this field.
Valid options are:
N PCBoard operates in a normal manner expecting a modem to be
directly connected to the serial port you specify.
Y PCBoard will assume that the modem is not directly connected
to the serial port specified. PCBoard will not send an
initialization string when recycling after a call (or at
startup). PCBoard will know that a call needs to be attended
to when a ENTER is sent over the connection. You should also
use this setting if you are using a null-modem cable to
connect with another machine.
NOTE: It is important that the CTS/RTS, RD/SD and CD/DTR signals be wired
properly if you select Y for this field.
Verify CD-Loss
When the Carrier Detect (CD) signal goes out, it generally indicates that the
connection has been broken and that the caller has disconnected. However,
some modems will drop the CD signal while auto-bauding (changing baud rates)
in search of a more efficient speed. This is generally caused by changing
line noise conditions. Valid options for this field are:
N When the CD signal goes out, PCBoard will assume the caller
has hung-up and will recycle the system. In a PAD or
packet-switching environment loss of the carrier detect
signal never indicates auto-bauding. In fact, a PAD will
often bring the CD signal right back up. To avoid
accidentally putting the next caller into the last caller's
session, select this option.
Y To avoid detecting CD loss when, in fact, the caller is still
on-line, you must answer Y. When the CD signal goes out,
PCBoard will verify that the modem is not simply compensating
for line noise. This will avoid PCBoard automatically
thinking that a caller has hung up when the CD signal goes
out.
Leave DTR Up at Drop to DOS
When selecting the DOS - Not Busy button on the call waiting
screen, this option controls whether the DTR signal is left on
or not. Valid option are:
N The DTR signal will be turned off.
Y The DTR signal will be left on.
Answer on True Ring Detect
Normally, PCBoard waits for RING to be sent from the modem and then sends ATA
to the modem to answer the phone. This proves to be the most reliable method
for answering the phone. If you desire, you can choose to have PCBoard watch
the ring detect line as signaled by the serial card. Valid options are:
N PCBoard will use the more reliable method of waiting for the
RING to come from the modem before attempting to answer the
phone.
Y PCBoard will answer on a true ring detect as signaled by the
serial card. You should only enable this option for those
modems which do not return the verbose RING response when the
phone is ringing.
Number of Rings Required
This setting allows you to customize the number of times you want the phone
to ring before PCBoard tells the modem to pick it up.
For example, you may be in an environment where the phone is normally used
for voice calls but at night you want to be able to dial into the system. By
setting this value a high number most voice callers will hang up before
PCBoard answers the phone.
NOTE: For CallerID detection to work, you must set this number to at least 2
since CallerID is passed in between the 1st and 2nd ring.
Monitor Missed Connections
After an incoming phone call is detected, there are four possible outcomes.
They are:
The countdown will run to completion without establishing a connection (no
handshaking, or handshaking failed to complete)
A NO CARRIER message will be issued by the modem before the connection is
ever completed (aborted handshaking sequence)
A connection will be established but carrier is lost before the caller logs
into the system
A connection is established and the caller successfully logs into the system
Valid options for this field are:
N Only those connections which are fully established will be
written to the caller log.
Y Normally PCBoard only writes successful login information out
to the caller log. Selecting this option will instruct
PCBoard to write one of three lines corresponding to the
first three possible outcomes listed previously.
1. NO CONNECT / FULL COUNTDOWN
2. NO CONNECT / NO CARRIER
3. Carrier Lost
Force NON-16550 Usage
Some of the early 16550 UART chips are buggy. The bug is most often seen
when data output gets behind where it should be and only proceeds when typing
more characters. If the command prompt is incomplete, but gradually, one
character at a time, becomes more complete as you type a command, then you
likely have one of the buggy 16550 UARTs. Valid options for this field are:
Setting Force NON-16550A Usage to N will generally make the problem go away,
but you lose access to the FIFO buffers. A better solution is to replace the
defective UART chip.
N PCBoard will not modify the way that it treats the UART it
detects.
Y Even if PCBoard detects a 16550 UART, it will treat it as if
it was a 16450 UART. If you suspect that some of the
advanced features of your 16550 UART are defective, you may
want to select this option.
Force 16550A Usage
Some multi-tasking environments, such as OS/2 or Windows, use device drivers
to virtualize the comm port. In the process of doing so, they may hide the
16550A UART, making it appear to be a 16450 UART when accessed by a DOS
application. Valid options for this field are:
N PCBoard will assume the UART it detects is the real UART you
have installed.
Y This option forces PCBoard to operate as if a 16550A UART was
detected. This enables the use of FIFO buffers for both
transmit and receive operations. Do not set this option to Y
if you do not have a 16550A UART.
Share IRQs on MCA Buses
PS/2s and other Micro Channel based machines have the ability to share
interrupts among different hardware devices. This setting will not work
unless the IRQ is being shared with software that is loaded before the
multitasker. Valid options are:
N PCBoard will operate in normal asynchronous mode where it
expects each port to have a unique IRQ for each port.
Y PCBoard will try to share the interrupt that is used by the
serial port.
NOTE: Sharing interrupts slows down processing. Therefore, it is
recommended that you only use this option when necessary.
Allowed Access Speeds
Allow Callers at 7,E,1
The majority of PC communications will communicate at 8,N,1 which refers to 8
data bits, no parity, and 1 stop bit. However, some of your callers may use
the less frequently used 7 data bits, even parity and 1 stop bit (7,E,1).
N Callers who call in using 7,E,1 will be refused access to
your system.
Y Callers may connect with your system using 8,N,1 or 7,E,1. Be
aware that if a caller connects using 7,E,1 then file
transfers will be disabled for that session. This is done
because 7,E,1 does not have the capability of properly
transferring binary data.
Lowest Desired Baud
You can set a minimum speed that a caller must have to log into your system.
For example, if you want to let only users who have are able to connect at
1200 or higher then you would enter 1200 in this field. The next three
fields on this screen determine if you will allow slower speeds and if so, at
what time during the day lower connection speeds will be allowed.
Allow Lower Speeds
Sometimes you may want to allow callers to connect at a slower speed than the
one entered in the Lowest Desired Baud field. PCBoard will give you the
ability to let users connect at a slower speed but only during a specific
time during the day.
N Users must connect at a speed equal to or greater than the
value that you enter in the Lowest Desired Baud field. If a
caller attempts to connect at a slower speed a message
notifying the user that the connection speed is not supported
on your system will be displayed.
Y Users may connect at a slower speed than the value that you
enter in the Lowest Desired Baud field. However, the connect
must be made during the time range that you define with the
Begin Time and End Time field on this screen.
Begin Time
In this field you can specify the beginning time (hhmm format) when users can
call in at a slower speed then what is defined by the Lowest Desired Baud
field. All times you enter must be done in 24 hour format. If you answered
N to the Allow Lower Speeds, the starting and ending times are ignored.
End Time
In this field you can specify the ending time (hhmm format) when users can
call in at a slower speed then what is defined by the Lowest Desired Baud
field. All times you enter must be done in 24 hour format. If you answered
N to the Allow Lower Speeds, the starting and ending times are ignored.
Security Level Override
If you enter any security level other than 0 in this field, users that have
an equal or greater than security level will be able to login to the system
regardless of the time of the login. The security level override is valid
regardless of the Allow Lower setting.
Node Configuration
Board Name
In this field, enter here the name of your bulletin board system. This name
is shown to the caller at connect time together with the PCBoard copyright
notice. In addition, it is displayed when someone uses the I user command
and at the top of the call waiting screen. You can enter up to 63 characters
to identify your bulletin board system in this field.
Origin
This field is reserved primarily for use with netmail networks to identify
your system. The format of the information you enter here depends on the
netmail software you are using and the netmail system you are connecting to.
Contact the netmail software authors and/or your netmail system administrator
for details.
Parallel Port Num (1-3,0)
There are a few places within PCBoard where you can send output to the
printer. For example, you can press ALT-P while a user is on-line to start
capturing the text on the screen to the printer. Likewise, you can toggle
printing of the caller logs from the call waiting screen. All of these
functions need to know what LPT port to send the output to. In this field,
enter the LPT port you want PCBoard to send printout to. Valid entries are
0-3. If you enter a value of 0, no printer output will be sent.
Running a Network / Multitasker System
If you are running more than one node on your system, you need to let PCBoard
know so that it may use the proper file sharing routines and otherwise take
care of other multiple node concerns.
N PCBoard will allow a single node to operate. No file sharing
will be used and many of the user and sysop commands relating
to multiple nodes will be disabled.
Y PCBoard will enable file and record sharing so that multiple
nodes can access system files at the same time. PCBoard uses
the DOS standard for file sharing. If you enable this
option, make sure that you have either load SHARE.EXE in your
AUTOEXEC.BAT, or that your multitasker/network provide the
sharing functions that are completely compatible with
SHARE.EXE.
If you have told PCBoard that you wish to run more than one node, you will
need to assign each node a unique node number. You enter the node number in
the Node Number on the Network field.
Node Number on the Network
In this field, enter the node number you wish to assign for the node you are
configuring with PCBSetup. Node numbers must be from 1 to the highest number
supported by the software you have purchased. Numbers higher then that will
default back to 1 by PCBoard.
If you answered N to the Running a Network question, the answer to this
question will be ignored.
Float Node Number
The ability to float node numbers is a feature designed for enabling a large
group of local network users to login to a limited amount of PCBoard nodes.
What makes this feature even more desirable is that you can mix these local
nodes with your dial-in nodes (if you have any).
When this option is enabled, PCBoard will start looking for a free node
number in your system starting with the node number you defined earlier on
this screen. If a node is found, the user will be logged in, using the free
node number. If no free nodes can be found, a message is printed to the user
stating that no nodes are available and that they should try again in a few
minutes.
The setup for floating nodes is more complicated than simply enabling a
switch in PCBSetup. You will need to modify some of your batch files and
other system files to make it work properly. For additional information on
setting up float nodes, see the Networking section in the Multiple Nodes
chapter of this manual.
Valid options for this field are:
N Node numbers will not be floated. You will want to use this
switch for your dial-in nodes since you most likely want
their node numbers to remain fixed.
Y Node numbers will be floated. As mentioned previously, this
is most useful when you are operating in a local environment
where several callers are trying to get into a few single
nodes logging in across a network.
Network Timeout on Errors (20-99 secs)
This is the number of seconds that PCBoard should wait after it has detected
a network time-out before failing the operation. You can enter any value
between 20 and 99 seconds.
In other words, it is common for resources on a network to be in use at the
time that another user wants to use the same resource. This is normal and
should be allowed. You should set this value depending on the size and speed
of your system. The bigger and slower the network is, the longer the network
time-out delay might need to be.
Node Chat Frequency (once every 5-99 secs)
In this field, enter the number of seconds that PCBoard should wait in
between each checking of the USERNET.XXX file. This file is used for node
chat requests, broadcasts, drop to DOS commands, mail waiting notices, etc.
The lower the number the less delay there will be after an action is
requested. However, a low number also increases traffic on the network or
multinode system and can slow it down.
Include City Field in WHO Display
When the WHO user command is used in PCBoard, a display of the users that are
currently logged onto the system is shown. Depending on how sensitive the
city/location information is to your callers you may choose to show the
city/location information of each users from the WHO display.
N Only the node number and the user currently logged in will be
displayed in a WHO display.
Y The WHO display will include the city/location field of each
of the users currently online.
Show ALIAS Names in WHO Display
For some systems it may not be desirable to display the alias names in the
who display even though aliases are allowed. For example, a public system
with an adult section might allow adult oriented aliases in the adult
conference, but displaying those names in a public WHO display might not be
desirable.
Other systems, which are either not adult oriented or are not open to the
public, may not experience this situation in which case showing the alias
might be preferred. Valid responses for this field are:
Remember: You must install the Alias PSA for PCBoard to allow alias names on
your system.
N Always display the real name of the caller in the WHO display
even if their alias is current active. If you have only
certain areas that allow aliases it might look funny if you
have a user named JIM SMITH on one node and CAPTAIN HOOK on
another.
Y When the user's alias is active, show their alias in the WHO
display.
Using Slave Cards (slows file access)
Answer Y to this question if you have an Alloy Slave system and
are running NTNX prior to version 2.0.
NOTE: This option will slow down access to some files.
Event Setup
An event is simply a batch file that gets executed during a
specific time of the day. In this event batch file you could do
some of the following things:
* Pack your users and/or message bases
* If you are part of a mail network, you will most likely transfer mail packets
* Some third party products you use on your bulletin board may need to run
utilities to update data bases, etc.
* Create a list of files on your
system using PCBFiler and the /LIST parameter.
* Backup your system
The previous examples are but only a few of the things you can do in your
event. Since events simply execute batch files you are more or less limited
by your imagination as far as what you want to run in your event.
To define your event information you need to select Event Setup from Main
Menu of PCBSetup. When you select this option, you will see the following
screen:
Is a Timed Event Active
Enter a Y in this field if you want to run the events that you have defined
in your EVENT.DAT file. If you wish to disable running events, enter an N in
this field instead.
Name / Location of EVENT.DAT
The EVENT.DAT file holds all of the information that defines the timed events
on your system. To edit/define the events that you will run on your system,
you need to edit your EVENT.DAT file. By pressing F2 while the Name /
Location of EVENT.DAT field is highlighted, the editor for your EVENT.DAT
will be loaded Your screen should now resemble the following:
This is known as the event editor. There are several fields that you can
edit which control the batch file that will get run for an event and the
times when you event will be run.
The number to the left of each line is the event number that is being
defined. The rest of the fields on the screen are as follows:
Act You may enter either a Y or an N in this field. A Y
signifies that the event is active and should be executed as
configured. If you enter an N, the event will be considered
inactive and will not be run as defined.
Mod The mode of the event. You may enter either an E or an S in
this field. If you enter an E then the event is an expedited
or non-sliding event. If you enter an S as the event type,
the event is referred to as a sliding event which will run
the next time the node returns to the call waiting screen
after the event time.
If an event is an expedited or non-sliding event, PCBoard
will make its best attempt to execute the event at the time
you specify as the beginning time even if it means cutting
user's time short.
Batch File In this field, you need to specify the batch file you wish to
execute for the event being defined. You are given 8
characters for the batch filename. The reason for this is
that by default this batch file will be run on all nodes.
However, you can make node specific batch files by making the
node number the filename extension. For example, if you
entered a batch file of DAILY and you wanted node 5 to
execute a different batch file then you would create a
DAILY.005 file in the same directory where the DAILY file is
located.
Begin Time This is the earliest time that your event will be run. The
time that you enter in this field must be in 24 hour format
and there must be a colon between the hour and minutes.
End Time The end time is the latest possible time that you wish for
the event to run. If the event has not run by the time you
enter, the event will be skipped.
Days You may also control which days that the event you are
defining is run on. In this field all seven days of the week
are listed beginning with Sunday and ending with Saturday.
Simply enter either a Y or N which signifies whether you want
to run the event on the day listed or not.
Date This field enables you to specify the dates that PCBoard will
run the event. Entering a 00 signifies a wildcard. For
example, if you want the event to run on the first day of
every month, then you would enter a date of 00-01-00. This
event would run on the first day of any month of any year.
Another example would be to set the date to 01-01-00. This
event would run the first day of every year.
Last Date Contains the date that the event was last run on the node
number that is specified in PCBSetup | Node Configuration.
Not all events run system- wide therefore this field only
contains the last date ran for the node you are currently
editing.
While you are in the event editor, the following keyboard commands are
available to you:
E Exit the event editor. When you are finished editing your
event data file, use this keyboard command to exit the editor.
If any changes to the file have been detected, you will be asked
if you wish to save the changes.
F1 Access on-line help. If you use this keyboard command,
on-line help relating to the field that is highlighted is
displayed to you.
F2 Edit the event batch file(s). When the Batch File field is
highlighted, this keyboard command will use the text editor
defined in System Manager to edit your event batch file(s). If
you have more than one batch file for the event (node specific
events), a selection box will pop up enabling you to pick the
event batch file that you wish to edit.
PgDn View the next 15 entries. On each screen of the event
editor, 15 entries can be displayed. If you want to view the
next 15 entries in the file, use this keyboard command.
PgUp View the previous 15 entries. To view the previous 15
entries of the event data file, use this keyboard command.
ALT-I Insert a new line. If you need to add a new entry between
two existing entries, use this keyboard command. A new blank
entry will be inserted just below the current line.
ALT-D Delete current line. This keyboard command will delete the
currently highlighted entry. There is no undo function to get
the original line back. If you make a mistake, exit without
saving and attempt to make the changes again.
ALT-R Repeat current line. If you are creating entries that are
very similar in definition, you can use this keyboard command
to duplicate the currently highlighted entry. The new entry
will be inserted just below the current line.
The Events section in the SysOp's Guide chapter of this manual
contains a more thorough discussion of events and how to define
them for your system.
Location for multiple nodes
Because the event data file stores information about each node, it is
required that all nodes access the same data file. If all nodes do
not use the same file, your events may not run reliably.
Location of EVENT Files
This field stores the location where your event batch files will be located.
When an event runs, it will look for the event batch file to be located in
the subdirectory that you specify.
Location for multiple nodes
You should insure that all nodes in your system point to the same
location for event files. The event system was designed to store the
batch files in one physical location. If the nodes on your system all
point to different locations, your events will not operate properly.
Minutes Prior to Suspend All Activity
If an event is defined as an expedited event, you can define the number of
minutes prior to the event time that all activity on the system will cease.
If your event is defined to run at 2:00am and you configure PCBoard for a 15
minute suspense time, PCBoard will attempt to insure that every user has
logged off by 1:45am.
The suspense time is used as a safety zone to make sure all
users that are in doors or other applications outside of PCBoard's control
will return to the system in time for the event. Another reason why you may
want to suspend activity prior to the event actually running is to let any
file transfers finish. Even though PCBoard will make its best estimate in
regards to how long it will take to download files, sometimes line noise or
other line conditions will extend the time of the transfer. By suspending
activity prior to the event actually running, you can help insure that all of
your expedited events will run on time.
During the suspense time, the phone is taken off-hook and a message is
printed at the top of the screen to let you know that PCBoard is waiting for
the event time. During this time, the phone will be busy to all callers that
attempt to call.
Disallow Uploads Prior to Event
This field is used primarily to try to guarantee that the system will be able
to run an expedited event at the time you have defined. When downloading
files, PCBoard knows how many bytes will be downloaded and approximately how
long it will take for the transfer to take place. When a user uploads a
file, PCBoard does not know how big the upload will be or even if it will
consist of multiple files (batch protocols only). Because of this unknown
factor, you may want to restrict uploads before an expedited event runs.
Valid options for this field are:
N Do not make any special restrictions in regards to uploading
files prior to an event. If the user has any time left on
the system, they may begin an upload. This could mean that a
user could begin an upload just before they are forced off
(because they still have time available). Because no
restrictions are made on uploads, they could overrun your
suspense time and even your normally scheduled event time.
Normally when you use this setting you would want to have a
substantial suspense time to help compensate for large
uploads.
Y Disable uploads prior to a schedule event. The value that
you enter in the Minutes Prior to Disallow Uploads field will
determine when uploads will be disabled if you choose to
disable them before an event.
Minutes Prior to Disallow Uploads
For this field to have any meaning you must have chosen to disallow uploads
prior to an event. In this field enter the number of minutes prior to the
event running that you wish to disallow uploads. You can enter any value
between 0 and 99 in this field. If you enter 0 in this field, uploads will
be disabled anytime the user's time limit is adjusted for an upcoming event.
Subscription
When you have enabled subscription mode, you can control the security level
and conference access of each user based expiration date entered in the user
record. When a user logs into the system on or after their expiration date,
they are considered to be expired. PCBoard will then assign the user the
security level entered in the expired security level of their record. This
security change will be in effect until the user is no longer expired. In
addition, the user will be denied access to any conference that they do not
have the X conference registration flag set in.
By selecting Subscription from the Main Menu of PCBSetup you can choose to
enable subscription mode. If subscription mode is enabled, you can also
modify some of the parameters that control how subscription mode will be
handled.
Enable Subscription Mode
Subscription mode will make PCBoard look at the expiration date of each user
to determine if their subscription has expired or not. When the user's
subscription is current, they are given their normal security level and are
able to join any conference they are registered in. When a user is expired,
they are assigned their expired security level and may also have their
conference access restricted.
This setting will determine whether or not subscription mode will be enabled.
Valid options for this field are:
N Subscription mode is disabled. The user's expiration date is
ignored even if the user would normally be expired.
Y Subscription mode is enabled meaning that PCBoard will check
the expiration date of all users when they logon. The
security level and conference access of the user will be set
according to the user record (Expired Security Level and X
conference flags).
Default Subscription Length in Days
This field controls what the expiration date of new users will be. The
number of days entered in this field will be added to the current date to
determine the expiration date of the new user. If you enter a default length
of 0, the expiration date of new users will be 00-00-00 which is a date that
will never occur and therefore they will never expire. In other words, a
setting of 0 disables subscription mode for new users.
Default `Expired' Security Level
Just as you can set a default expiration date for new users, you can also
choose the default expired security level for new users as well. Simply
enter the security level that you wish to assign to the new user when they
expire. Remember that a security level of 0 locks the user out of the
system.
Warning Days Prior to Expiration
The value that you enter in this field will determine how many days a user
will be warned before their subscription expires. PCBoard will display the
WARNING file at login specified in PCBSetup | File Locations | Display Files
during the warning period.
Configuration Options
From the Configuration Options menu selection you can control the way PCBoard
behaves in various circumstances. There are options in fields that control
file transfers, messages, and many other things.
Messages
Number of Highest Conference Desired
In this field enter the highest conference number you want to be able to
define on your system. PCBSetup will use the number entered in this field to
determine the highest conference number you can define from the Conferences
Main Menu Option in PCBSetup.
If you enter a value higher than 39 in this field, you may have to update
your conference allocations from System Manager | Users Info File
Maintenance. Whenever you change the value in this field, you should load
System Manager and see if you need to update your conference allocations.
If you are running multiple nodes make sure all nodes have the exact same
value for this field. If all nodes do not have the same value for this
field, then it is quite possible one or more of your nodes will not load
because the conference allocations would not be in sync for all nodes.
Maximum Lines in the Message Editor
This field gives you the ability to limit the total number of lines that a
user may enter if they use PCBoard to enter their message. This means that
the limit you enter in this field will be enforced when a user uploads a REP
packet using the QWK command or even if they upload the message into the
message editor. You can enter any value between 17 and 400.
The value that you enter in this field can help control the length of
messages that are entered by your users. If your users are leaving
excessively long messages then you may want to lower the maximum number of
lines to help encourage your users to be more brief in their messages.
NOTE: Any messages that are posted by software other than PCBoard (such as
an off-line mail reading door) may not honor this limit. Anytime that third
party software adds a message to a message base it is up to the author of the
program to honor the settings you have defined.
Message Capture - Maximum Messages
This setting allows you to control the maximum number of messages that can be
captured into a message capture file or a QWK packet.
The reason for setting this value to something other than a maximum number
would be to either, limit the length of time it takes the caller to download
a set of messages, or to keep a message capture from filling up the disk
(especially if a ram disk is specified for the location of temporary files).
Message Capture - Max Per Conference
This setting allows you to control the maximum number of messages in each
conference that can be captured into a message capture file or a QWK packet.
The reason for setting this value to something other than a maximum number
would be to either, limit the length of time it takes the caller to download
a set of messages, or to keep a message capture from filling up the disk
(especially if a ram disk is specified for the location of temporary files).
Name of Capture File (blank=caller#)
The name you enter is this field will be the file that is created for message
captures. A user can create a message capture file using the C, D, and Z
subcommands of the R user command. If you leave this field blank, the caller
number will be used as the filename instead. The capture file PCBoard
creates, is stored in the Location of Temporary Work Files specified in
PCBSetup | File Locations | System Files.
It is quite conceivable that a user could exceed the limits you have set for
maximum messages per capture or conference. In a situation where this
occurs, they may decide to perform another capture. To prevent this new
packet from overwriting the packet they just barely downloaded, PCBoard will
rename the capture file using the following conventions:
If the filename field was left blank or if the capture filename is 7
characters or less, PCBoard will increment the filename by adding the letter
A to the end of the caller number after the first packet is downloaded. If
yet another packet is downloaded, PCBoard will add a B to the caller number
and so on.
If you specified a capture filename that has 8 characters in it, PCBoard
cannot add a new character to the filename and still have a valid DOS
filename. Therefore, it will increment the last letter in the capture
filename until it reaches the letter Z.
Name of QWK Packet (blank=capture name)
In this field, enter the name that will be used when creating QWK mail
packets for users to download. If you leave this field blank, then PCBoard
will use the filename that you entered as your capture filename (in the
previous field).
Be forewarned, however, that if you leave the capture filename blank as well,
that your QWK packets will not be created. The reason that no packet will be
created is that the QWK mail standard expects to have a consistent base
filename to work on. Of course, the caller number varies with each call so
that cannot be used as a QWK packet name.
Usually, the best thing to do is to summarize your board name in 7 characters
or less, use that abbreviation as the capture filename, and then leave your
QWK packet filename blank.
As with capture files, if a user attempts to download more than one packet
during a call, PCBoard is going to increment the filename so that the
recently downloaded packet does not get overwritten. QWK files are handled a
little differently. PCBoard will give the first QWK packet an extension of
QWK. If another packet is downloaded, PCBoard will give it an extension of
QW0 and so on.
Stop Clock for Capture File Download
During the download of a message capture or QWK packet file, you
can determine if you want to charge the user time for downloading the file or
not. The valid options are:
N Any time spent downloading a capture file or QWK packet will
be counted against the user's daily/session time limit. If
the user had 30 minutes available before the transfer began
and it takes them 5 minutes to download, they will have 25
minutes of time left.
Y No time will be deducted from the daily/session time limit
when the user is downloading a capture file or QWK mail
packet. You may choose to set this option to give your users
extra incentive to download messages and read them offline.
Disable Message Scan Prompt
Normally when you login to PCBoard it will ask you if you wish to scan for
messages. This option controls whether or not that question is asked. Valid
responses are:
N With this setting, PCBoard will ask if the message base
should be scanned each time a user logs into the system. In
addition, any conference that you join and did not scan at
login will also ask if you wish to scan the new mail. The
difference is that at login, PCBoard will scan all
conferences you have selected for new mail. It will show you
how many messages are new and if any are addressed to you.
If you join a conference which you have not selected for
scanning and are prompted to scan for new mail, only the
current conference will be scanned.
Y The prompt which asks the user if they wish to scan for
messages will be disabled. This means that the user will not
be asked at login or even when they join conferences.
Allow ESC Codes in Messages
ESC (escape) codes are generally used to transmit ANSI sequences across the
modem. These codes could define color changes, cursor movements, etc. To
enter the ESC character into the message editor the ASCII 029 character
should be used instead of ASCII 027. This will avoid any conflicts with the
full-screen editor and its use of ESC. From the keyboard, the ASCII 029
character can be entered by holding down A while typing 029 on the numeric
keypad (a double sided arrow will be printed). This option controls whether
or not you want to allow users to enter the ESC character in the message
editor. The valid choices are:
N Users will not be allowed to enter the ESC character in their
messages. In effect this would disable users from entering
ANSI color screens in their messages. This in itself is not
a bad idea, because not all of your callers would be capable
of ANSI color graphics. Colors can still be used in messages
using PCBoard's @X color codes. PCBoard can interpret the @X
codes to determine if the caller is capable of color and
change the color if they are.
Y Users may enter ESC characters in their messages. This would
allow users to enter ANSI screens inside of message. Remember
that not all of your callers will be capable of ANSI so the
ESC codes may appear to be garbage if a user is not capable
of ANSI.
Allow Carbon-Copy Messages
When a group of people are targeted for a particular message, one of the most
practical methods for getting the message across is to carbon copy the
message to several users. This can be done by typing SC while at the message
editor command prompt. Instead of simply saving the message, the user will be
prompted for additional names the message should be carbon copied to. Each of
the users specified in the list will be sent a copy of the message that is
saved. The valid options for this field are:
N The ability to save carbon copies of a message will not be
available to any user on the system.
Y Users may save carbon copies of messages to other users on
the system. The maximum number of carbon copies can be
adjusted for each conference from the conference options
screen.
Validate TO: Name in Messages
To insure mail gets properly addressed to users on the system, you can enable
this option to verify names entered in the TO: field of messages. When a
name is validated, PCBoard checks to see if the user name entered exists in
the user file. If no validation were done, a user could enter a message to a
user who does not exist and wonder why a response was never received. The
valid options are:
N No validation of the name that messages are addressed to will
be performed. This means that it is up to the user to
properly enter the name of the user.
Y PCBoard will make sure that the name to whom the message is
being addressed, exists on the system. If the name does not
exist, the user is warned that the user name could not be
found and given three options. The user can choose to
re-enter the name, continue with a name which does not exist,
or perform a Soundex search to see if a similar sounding name
could be found.
NOTE: Regardless of how you answer this question, no name validation will be
done in a conference which has been configured as an echo conference.
Force COMMENTS-to-the-Sysop into Main
When you have several conferences on your system, you might find it very
desirable to consolidate all of the messages that are entered using the C
user command into the Main Board. This will make it easy to read all of your
comments without having to join all of the conferences on your system to see
if you have mail waiting. The valid options are:
N Leave the comment to the SysOp in the conference that the
user was in at the time the message was written. The
advantage to selecting this option is that if the user
mentions something about the conference configuration but
does not reference the number or name you will know what
conference they are referring to. The disadvantage is that
you may find comments in any conference on your system.
Y Any comments to the SysOp (using the C user command) will be
moved transparently to the Main Board conference. The
advantage to selecting this option is that all of your
comments will be in one single location. An additional
benefit would come into play if your have netmail conferences
and do not want the comments to the SysOp to get transferred
to the other systems in the network.
Double-Byte Characters (Foreign Systems)
PCBoard supports double byte (DB) characters by allowing changing line
delimiters in the message base. If you enable this feature you will be able
to use DB characters in your messages, however, it is important to realize
that the format of messages stored in this format are not compatible with
systems or third party software that do not have DB characters enabled. Do
not enable DBCS unless you need it. The valid options are:
N When you select this menu option, PCBoard stores message in
the standard message base format.
Y Using this option will cause PCBoard to use a different line
delimiter in the message base. This may very well render any
third party software for the message bases useless (unless
they also recognize DB characters).
NOTE: If you change this setting, you will need to delete all of your
message bases because they are stored in a different format based on this
setting. If you do not delete the message bases, your users may see message
headers with no body.
Create MSGS File if Missing
If the message file is missing when a user joins a conference, PCBoard will
normally create the file. In certain situations though, it may be desirable
to let PCBSetup create any missing message files for you. In particular, if
your system has a lot of nodes (e.g., more than 75), it would be quite
possible that some other process could be accessing the message base (such as
PCBPack) and for PCBoard to not find the message base. PCBoard would create
the message base which could destroy the pre-existing message base. The
valid options are:
N PCBoard will not create the message base file if it does not
exist when a user joins a conference. This will disable all
of the message functions if the message base does not exist,
but it will still allow the user to join the conference
without the risk of interfering with other processes. The
only way to create the message base would be to exit and save
from within PCBSetup having your entire system checked. If
PCBSetup finds a missing message base file it will create it
for you.
Y For most systems, this will be the desired setting. This way
you do not have to worry about creating the message base
file. Instead, PCBoard will do all of the work for you.
Default to (Q)uick on Personal Mail Scan
There are two formats that can be used for scanning for personal mail - the
long and quick formats. The quick format uses one line per conference and
lists the number of messages scanned and how many were addressed to you. The
long format displays more information and consequently takes more than one
line for each conference. This option allows you to determine if the quick
format will be the default for message scans. Valid options are:
N All mail scans will default to the long format. If the short
format is desired, the Q subcommand can be used on those
commands which involve mail scans.
Y When you select this menu option, all mail scans will default
to quick mode. If long mode is desired, the L subcommand can
be used on those commands that involve mail scans.
Default to Scan ALL Conferences at Login
When you login and just after PCBoard scans for new bulletins, you are asked
if you wish to scan the message base since the last message you have read.
This option will decide if only the current conference will be scanned or if
all selected conferences will be scanned. Valid options are:
N When this option is used, only the current message base will
be scanned for new messages. Normally this would refer to
the Main Board, but you could define auto-rejoin conferences
so that users rejoin the conference they logged off in.
Y All conferences that have been selected for scanning will be
searched for new mail. Remember that conferences are usually
selected for scanning using the SELECT user command.
Prompt to Read Mail when Mail Waiting
When a new message has been left for a caller, that caller will be informed
of the new message with a pop-up message that indicates which conferences
have new mail. You can control whether the user is asked to read the mail
right now or if only the pop-up message is displayed. Valid options are:
N Display the pop-up message only. The user will not be asked
if they wish to read the new mail.
Y As soon as the pop-up message is displayed, the user will be
asked if they wish to read the mail that is waiting for them.
NOTE: Not all messages that are left on the system will set the mail waiting
flags. For example, some third party software will not update the flags nor
will any generic messages you enter in PCBoard (e.g., @USER@, @##@)
File Transfers
Disallow BATCH Uploads
Normally you will want to encourage uploads to your system any way possible,
and disabling batch uploads can hinder rather than promote uploads.
However, for systems that accept uploads from foreign computing environments,
such as a Macintosh, where the file naming conventions do not translate
straight across to the DOS environment, it can sometimes be necessary to
disallow batch uploads. This avoids the problem that occurs when the batch
protocol tries to convert the filenames. Valid options are:
N This option will make PCBoard operate normally -- users may
do batch uploads.
Y Users will not be able to do batch uploads when this option
is set. Because a user must enter a valid DOS filename to
begin an upload, this setting will force any file uploaded to
the filename specified by the user. As mentioned previously,
this will prevent a problem when uploading a filename from a
foreign system which may try to create an invalid DOS
filename.
Promote to Batch Transfers
PCBoard has two commands for uploading files ( U and UB ). The U command is
usually recommended if one file is going to be uploaded and the UB command
would be used to upload more than one file (a batch upload). Some of your
users may find this method complex or easy to forget and therefore, you are
given the ability to automatically promote the U command to the UB command.
Valid options are:
N The U command will always prompt for file one at a time.
Batch transfers could still occur by performing an
unannounced upload with a batch protocol. However, the
descriptions will not be asked for up front.
Y The U command will automatically be promoted to the UB
command if the caller has selected a batch protocol (or no
protocol at all).
Upload Credit for Time
The value that you enter in this value will determine how much of the time
spent while uploading files will be refunded to the user if their upload
passes your integrity checks. The default is 1.0 which means that by default
PCBoard will stop the clock during an upload. That is, for every minute a
caller spends uploading, 1 minute of credit will be refunded. Effectively,
the caller will have the same amount of time left after the upload terminates
as when the upload began.
Setting this value to something higher, such as 2.5, will refund 2.5 minutes
of time for every minute spent uploading. This means that if a user uploads
for 2 minutes, they will receive a five minute refund. Remember, that they
also spent two minutes downloading so this means that a net credit of 3
minutes would be received.. Once disconnected from the system, any time
credits are lost.
NOTE: No time credit will be added if the user's time has been adjusted for
an upcoming expedited event. This will help prevent your system from missing
the expedited event.
Upload Credit for Bytes
This value defines the number of credits given to the caller for
each byte uploaded. The default is 0 giving no credits at all. In other
words, the user would have the same amount of daily download bytes available
as when they began the upload. You can reward the user for uploading by
setting this value to any value above 0. A setting of 1 would give the
caller a 1 daily download byte credit for every byte uploaded.
The upload byte credit is a credit against the daily download byte limit.
Therefore, the credits must be used on the same day in which they are posted
or they will be lost.
NOTE: If you are testing your uploads via PCBTEST.BAT then the upload must
pass or no credit will be given.
Include 'Uploaded By' in Desc.
When a user uploads a file, this option will control whether or not the user
who uploaded the file will be added as the last line in the description.
Enabling this option is useful for quickly determining who uploaded a
particular file to the system.
N The name of the user who uploaded the file is not added to
the description by PCBoard.
Y An additional line to the end of the description entered by
the user will be added to each file uploaded. This
additional line will say Uploaded by: followed by the user
name who uploaded the file.
Verify Files Uploaded
After a file is uploaded, you can have PCBoard shell out to a batch file
called PCBTEST.BAT to perform tests on the file that is uploaded. The
filename being tested is passed to the batch file as the first parameter.
You can use any program you want in the PCBTEST.BAT file to test any criteria
that you desire. Most SysOps are quite content to verify the integrity of
compressed files and to check all files for viri. For more information on
PCBTEST.BAT please see the Batch Files chapter of this manual. Valid
options are:
N No testing will be performed on files that are uploaded.
Y PCBoard will test each file (individually) after the upload
is complete.
Disable Drive Size Check
PCBoard normally checks the size of the hard disk and the amount of free
space left before allowing an upload to take place. This information is
displayed to the caller when they begin their upload (for informational
purposes). You can choose whether or not to enable the drive size check.
Valid options are:
Y PCBoard will not check to make sure sufficient space is
available before an upload begins. Likewise, the amount of
free space on your upload drive will not be printed to your
callers. If your system does not properly support the
checking of free space or if you simply do not want the
information shown to your callers, select this option.
N PCBoard will check to ensure that there is enough free space
on the hard drive before beginning an upload. The amount of
free space that is checked for is determined by the Stop
Uploads when Free Space is less than field on this same
configuration screen.
Upload Buffer Size (4-64)
Enter the size of the upload buffer. This setting can affect the performance
of your system during uploads. You should experiment with different values
between 4 and 64 for your own system to see what works best.
It is recommended that you set this value to a multiple of the cluster size
of your hard drive. For instance, if you have a hard drive partition that is
greater than 256 megabytes but less than 512 megabytes then your cluster size
is 8 kilobytes. A setting of 8 should be the minimum used for the best
performance.
List of Slow Drive Letters
If you have a slow server, a CD-ROM, or even more importantly, a carousel
(multi-disk) CD-ROM, it may be beneficial to copy files that are to be
transferred off the slow drive down to the temporary directory which could
possibly be a faster local hard drive or ram drive.
You can indicate for which drives this copying step should be performed by
typing a list of drive letters in this field. For example, if you enter IKX
in this field, any file that is downloaded from drive I, K, or X will be
copied to the temporary directory before the download begins.
For those who have a device like a carousel CD-ROM (multiple CD-ROMs but only
one is read at a time) you can specify a range of drive letters that make up
the device. For example, let's assume that you had a CD-ROM carousel that
held 6 discs and used drive letters H, I, J, K, L, and M. To make PCBoard
treat all 6 drive letters as one device you would enter H-M in the slow drive
field. The dash is used to represent a range of drive letters. By entering
H-M you are telling PCBoard to treat drives H, I, J, K, L, and M as one
device.
When copying files from a drive on your system, PCBoard will lock access to
that slow drive so that system performance is not driven into the ground. If
the drive is already slow there is no sense to try copying two files at the
same time. PCBoard is going to impose a maximum wait period of 90 seconds
for a slow drive to finish copying a file. If the slow drive is not free by
that time, PCBoard will simply download the file directly from the slow
drive.
Now you can see why it is important to be able to specify a range of letters
to treat as one device. Without this capability, it would be quite possible
for a CD-ROM carousel device to spend most of its time swapping disks rather
than exchanging meaningful data so that users could get more done is less
time.
NOTE: If there is insufficient space in your temporary directory to hold all
files that are requested for download, PCBoard will not copy the file.
Instead, it will continue with the download of the file leaving it on the
slow drive for the transfer.
Slow Drive Batch File
If you have designated some drives as slow drives, you can optionally have
PCBoard execute a batch file once the file has been copied. PCBoard will run
the batch file that is specified in this field and pass the filename as the
first parameter to the batch file. Inside of the batch file, you can run a
program to set the comment in a compressed file or whatever your needs
dictate.
Stop Uploads when Free Space is less than
The value that you enter in this field is multiplied by 1024 to determine the
number of bytes that should be free on your upload drive before allowing an
upload to occur. For example, if you enter 100 here, you will need to have
100 kilobytes of free disk space or PCBoard will not allow the user to upload
any files.
The fact is, you do not know how big an upload is going to be and you want to
make sure that you do not run out of storage space on your drive or it may
present a problem for other users. The most detrimental situation would be if
you store your users file and your uploads on the same drive.. If you allow
that drive to fill-up, your user file could not be increased in size. If the
user file cannot grow, new users will not be allowed to log into your system.
If you store system files on the same drive as your upload drive, you should
set this value to something in excess of 3000 to give yourself some safe
breathing room. The best alternative may be to use separate drives for your
system files and files that get uploaded to your system.
System Control
Disable NS Logon Feature
If a user adds NS to their response at the Do you want graphics prompt at
login, PCBoard will not display the news file. The will enable the user to
login to the system faster than they would if they had to view the news file.
You may find that some users will use this option without ever manually
checking the news. This would not present a good situation if you use the
news file to display important information. Valid options are:
N Allow users to skip the news file at login.
Y Do not allow users to skip the news file at login.
Disable Password Check (DOS)
If you have your modem configured to automatically answer the phone (instead
of PCBoard), you run the risk of a security breach when returning back from a
non-shelled door application. What could happen is that the user could drop
carrier after they exit door but before PCBoard reloads. If it takes a while
for PCBoard to reload, a user could conceivably establish carrier before
PCBoard reloads. Of course, if there is carrier when PCBoard resumes, it
must assume that the user is still on-line. In a situation like this it might
be desirable to verify the password of the user when returning from a door.
Valid options are:
N When returning from any door application, PCBoard will not
ask for any passwords. This is the desired setting for most
systems since they will be configured to let PCBoard answer
the phone. This eliminates the possibility of having someone
connect while PCBoard is reloading.
Y The option gives you the ability to verify the password of
the user that PCBoard thinks is on-line upon returning from a
non-shelled door application. The disadvantage to this is
that your callers may become easily annoyed especially if
they open several doors. You should only enable this if you
must force your modem to answer the phone instead of PCBoard
which is not recommended.
Multi-Lingual Operation
In PCBSetup | File Locations | Configuration Files the filename for the
multi-lingual data file is specified. PCBoard uses this file to determine
which operational languages can be selected at login. You may want to be
able to quickly enable or disable multi-lingual operation. Valid options
are:
N Multi-lingual operation is disabled. Even if you have
defined the languages in your mult-lingual data file, the
user will not be prompted to select a language.
Y Select this option if you have defined your languages in the
multi-lingual data file and if you want to prompt your users
to select a language at login.
Disable Full Record Updating
You may want to protect certain user information that a user is normally
allowed to edit with the W user command. This option will determine if the
user can edit their city, phone numbers, comment #1 field of their user
record using the previously mentioned user command. The valid options are:
N All fields that can be edited using the W user command can be
modified.
Y All fields with the exception of the city, passwords, and
comment #1 fields can be edited by the user.
Allow Alias Change after Chosen
After a caller has selected an alias it may not be desirable to allow the
caller to change the alias without SysOp intervention. Preventing the caller
from changing his alias avoids problems where one caller tries to leave
messages (or do other things) using various names to create confusion.
N Once the alias is entered the first time (using the W user
command), the user may not change their alias. Instead, they
must request that the SysOp change their name.
Y The user may change their alias at any time by using the W
command.
NOTE: For aliases to be active you must install the Alias PSA
from within System Manager.
Run System as a Closed Board
Normally PCBoard will allow new callers to call in and log into the system
creating a new user record in your users file as they log into the system.
However, you may wish to restrict new users from logging into your system.
Valid options are:
N New users may login to your system without being restricted.
Y New users will not be allowed to login to your system unless
a NEWASK questionnaire exists. If the NEWASK questionnaire
exists, the user will be allowed to login, and answer the
questions. However, no user record will be created for this
user. The intention here is that you can use the NEWASK
questionnaire to screen your callers and then manually enter
a user account for them.
Enforce Daily Time Limit
Depending on the nature of your system, you may want to restrict your users
to an absolute daily time limit, or simply a session limit. With a session
limit, your users can call back as many times as desired during the day but
they are only allocated a certain amount of time for each call or session.
N With either this option set or if the Enforce Time Limit
field in the PWRD file is set to N for the security level of
the user, the time limit defined in the PWRD file will be
considered a session time limit.
Y When this option and the Enforce Time Limit field in the PWRD
file is set to Y, the time limits defined are daily time
limits.
Allow One Name Users
Normally PCBoard requires that two or more names be used when logging into
the system. There are some people that have only one name (believe it or
not) and some SysOps like to run alias systems where real names are not used
and these sometimes are only a single name. An additional possibility for a
one name user would be when you assign all of your users a number or unique
ID for their name. Valid options are:
N Users will be forced to enter at least two names to login
(e.g., first name and last name). If they attempt to login
with one name, PCBoard will inform them that they must enter
a first and last name to login.
Y Users may enter one name to login to the system. If the
majority of your users will have one name, you may want to
modify the Enter your first name prompt in PCBTEXT to say
something like Enter your user name instead.
Allow Password Failure Comment
When logging into the system, the user is given four attempts to enter the
correct password. This field controls what happens if the user does not
enter the proper password after four attempts. Valid options are:
N The user will be informed that the password is incorrect and
that they are being logged off for excessive password
failures.
Y The user will be asked if they wish to leave a comment to the
SysOp. This option would be useful because the caller could
give you a voice number or some other type of identification
so that they may login to the system again. Otherwise, they
would have to create a new user account to get your
attention.
Warning on Logoff Command
If you have users that accidentally log off of your system quite
often, you may want to use this option to ask the user if they
really wish to log off of your system. Valid options are:
N The connection will be terminated without confirmation.
Y PCBoard will ask that the user confirm that they really wish
to log off. This confirmation can be skipped even when
enabled if the BYE user command is used instead of the G
user command.
Allow Local SHELL to DOS
You may want to disable the ability for users who are logged in locally to
shell to DOS using the F5 key. Valid options are:
N Do not allow local shells to DOS. That means that whenever a
user is logged in locally, they cannot press F5 to shell to
DOS. This would be useful if you have a lot of users who log
in locally and you want to refuse their access to DOS.
Y While logged in locally, F5 will shell the user to DOS
allowing them to enter DOS commands.
Use NEWASK+Standard Questions
When a new user calls in PCBoard will normally ask either the built-in new
user questions, the ones required to set up a user record in the users file,
or it will ask the questions in the NEWASK file and not register the user (if
you are running your system as a closed board). Valid options are:
N New users will be asked only the standard questions.
Y The built-in questions (phone numbers, protocol, etc.) will
be asked in addition to the NEWASK questionnaire. This gives
you the ability to get more information out of your new
users.
Read PWRD on Conference Join
Normally PCBoard does not re-read the PWRD file after the caller joins a
conference. If, however, you have a security level increase (or decrease) in
a particular conference you may want to reread the PWRD file to determine new
limits for the user. Valid options are:
N When the user joins a conference, PCBoard uses the values
stored in memory when it initially read the PWRD file.
Y Each time a user joins a conference, PCBoard will re-read the
PWRD file to update the user's time limit, ratio, etc.
Confirm Caller Name / Address
If you have a large number of users, it is quite possible that you may have
people that attempt to login using common names. For example, you may already
have a BOB SMITH on the system (from Tulsa, Oklahoma). A few months later, a
new user attempts to login as BOB SMITH and is greeted for a password prompt.
Obviously, there is a name conflict, and the new user will have to pick a new
name. This field allows you to confirm the city name of the user before
asking for the password. Valid options are
N Do not confirm the city name after the user name is entered.
this setting is recommended if you do not have a large user
base (5000+ users)
Y This setting is recommended if you have a large user base.
After the user name is entered, PCBoard will confirm the
city/location information.
Auto-Reg in Public Conf
When a new user calls in, PCBoard will automatically register the caller in
public conferences where the security level required to join is set to 0. It
does this by scanning all existing conferences and setting the R, X, and S
conference flags in the user's record. This process can take a long time if
you have a large number of conferences. Valid options are:
N Do not automatically register users in public conferences.
Users will not have any conference flags set in the public
conferences aforementioned.
Y Users will have the R, X, and S conference flags set in
public conferences which require a security level of 0 to
join.
Encrypt Users File
For some installations of PCBoard, the ability to encrypt key information in
the user file is critical. For example, when PCBoard is used for local
access across a network it would not be unlikely for one of your users to
copy your USERS file from the network. However, if your file is encrypted,
they will not be able to easily obtain the critical information of the user
file. The following field in each user file will be encrypted:
password
city
phone numbers (data and voice)
the two comment fields
If you do plan on encrypting your user file, then you need to run ENCRYPT.EXE
on your user file. This is the utility that will actually encrypt the user
file. This field, is used only to tell PCBoard if your user file has been
encrypted. Valid options for this field are:
N Your user file has not been encrypted. This will force
PCBoard to access the user file as if it has not been
encrypted. This will be the setting for the majority of
PCBoard systems.
Y If you have already run ENCRYPT.EXE on your user file then
this will force PCBoard to work in encryption mode. Your
user's file will be encrypted on disk, but PCBoard will
properly translate the encrypted data as it reads the data
from disk. It is critical that this setting be the same on
all nodes. Otherwise, PCBoard encrypted data could be
mistaken as unmodified data (or vice versa) and end up
corrupting information in the user file.
Configuration Switches
Disable 3-minute Screen Clear
At the call waiting screen, PCBoard will automatically clear the screen after
three minutes of inactivity. In essence, PCBoard is enabling a screen-saving
feature. Valid options for this field are:
N PCBoard will enable the screen-saving feature after three
minutes of inactivity. This is especially useful if you
leave you monitor(s) on for extended lengths of time.
Y Do not clear the screen if the system has been inactive for
more than three minutes.
Disable Registration Edits
Normally, PCBoard attempts to control what the user can enter at certain
prompts when a user is logging into your system as a new user. The prompts
that are effected by the setting of this switch are:
first and last name prompts (high ASCII characters are normally disabled)
new user questions (phone numbers, city/location, etc.)
For example, when PCBoard asks for the phone number of the user, it is
expecting that only numbers and certain punctuation characters be entered in
this field. If you use MKPCBTXT to ask a question other than the user's
phone number you most likely do not want to restrict entry of that field to
numbers. Valid options are:
N PCBoard will operate in normal mode. This means that certain
fields will have restricted output.
Y Any data can be entered in the affected fields. In essence,
these fields become free-form edit fields where no checking
is performed.
Disable High-ASCII Filter
With non-error correcting modems line noise could come in the form of any
characters including high ASCII characters. Since most users do not enter
these characters at the keyboard, this switch is used to control if high
ASCII characters can be entered at various prompts and in the message editor.
Of course if you want to allow your users to enter high-ASCII characters or
if you are using a foreign language which makes use of the high-ASCII then
you may want to disable the filter. Valid options are:
N PCBoard will continue to filter high ASCII characters. If
you are doing this to prevent line noise from being input you
may want to reconsider because error-correcting modems are
gaining in popularity which will prevent line noise from
being mistaken for valid input.
Y The high ASCII filter is disabled allowing users to enter
these characters at most prompts and also inside of the
message editor. This would be the ideal setting if you use
languages that make use of these characters or if your users
upload a lot of graphics screens.
Default to Graphics At Login
Throughout the operation of PCBoard, the default choice is usually the safest
choice. In certain circumstances, however, you may not want this. For
example, if the majority of your users have ANSI capabilities but regularly
press ENTER at the Do you want graphics prompt then they will default to no
graphics. You can make it so that the default selection at that prompt is to
select ANSI graphics based on the answer you enter in this field. Valid
options are:
N This will provide the safest choice. If a user presses ENTER
when asked if they wish to have graphics, PCBoard will
default to non-graphics mode. This way a user does not see
meaningless ANSI escape sequences if they are not capable of
ANSI.
Y If the user presses ENTER when asked if they want graphics,
PCBoard will default to ANSI graphics mode. If the user is
not capable of ANSI graphics, their screen will appear to
filled with garbage characters. You may only want to use
this if a majority of your callers are capable of ANSI.
Use Non-Graphics Mode Only
If you do not want to have ANSI graphics mode available to your callers, you
may want to enable this option. When this option is enabled, PCBoard will
not even ask the user if they want graphics. Instead, it will assume that
the user does not want graphics. PCBoard will still send the ANSI detection
sequence to see if the user is capable of ANSI so that screen displays can be
drawn faster, etc. Users can still change their display mode by using the M
user command. Valid options for this field are:
N Operate if a normal fashion by letting the user determine if
they want graphics or not. This means that the question
about wanting graphics will be asked at login.
Y The user is not asked if they want to use graphics. Instead,
PCBoard is going to default to no graphics.
Exclude Local Logins from Stats
On the call-waiting screen, PCBoard keeps track of how many calls, messages
that have been entered, and files that have been transferred since the last
time you reset the stats. This option will control whether or not the
actions that take place on local logins (Sysop or user logging in from the
call-waiting screen) will affect the stats on the call-waiting screen. Valid
options are:
N All calls, whether remote or local will affect the
call-waiting stats.
Y Do not increment the statistics on the call waiting screen
when yourself or another user logs into the system locally.
Exit to DOS After Each Call
Normally PCBoard recycles after each call by closing all files and restarting
itself. However, you may need to perform some task between the time PCBoard
disconnects the caller and returns to the call waiting screen. An additional
possibility is that you may need to load another application which answers
the phone instead of PCBoard. If either of these situations fit into your
configuration, you will need to exit to DOS after each call. Valid options
for this field are:
N Recycle using the normal sequence (return directly to the
call-waiting screen).
Y Exit to DOS after each call. In the structure of the default
BOARD.BAT file, PCBoard is going to branch to the :END label.
Therefore, you should place any DOS commands that you want
executed after each call after the :END label in your
BOARD.BAT file.
Eliminate Screen Snow in PCB
When PCBoard updates the screen, it does so by writing directly to the video
buffer which can, on some CGA-based systems, cause snow to appear on the
screen while it's being updated. Your callers will not see this but it could
be distracting to you.
N Operate normally in respect to writing data directly to the
screen buffer. If you have a CGA adapter, you may need to
select Y instead.
Y Disables the screen snow that is possible with certain CGA
adapters. Selecting this option will slow down screen
updates slightly.
Display NEWS Only if Changed
This field has one purpose -- to control when the news file will
be displayed to the caller. Valid options for this field are:
A Display the news file every time a conference is joined. If
this is what you desire, you may find that the conference
INTRO (defined in the configuration for each conference) may
be better suited for this purpose.
N Display the news file for each conference once per day. Once
the news file has been displayed that day, it will not be
shown again.
Y Display the news file only if the data of the news file is
the same as or more recent than the caller's last logon date.
Display User Info at Login
This field controls whether or not you wish to display some user statistics
at login. Information such as the last call date, the number of calls made
to the system, expert mode status, and similar information is displayed.
Valid options are:
N Do not display user information at login. Nearly all the
information PCBoard displays can be accessed using @ macros.
Therefore, you can incorporate the user statistics into one
of your display screens if you wish.
Y The user statistics will be displayed just before the
conference command prompt when a user is logging in. In
addition, when a user joins a conference, they will be shown
the last message they have read, the high message number, and
the number of active messages in the conference. This will
only be displayed once per conference.
Pre-load PCBTEXT File
All of the prompts and other messages that PCBoard displays come out of the
PCBTEXT file. You can speed up some of PCBoard's displays by having PCBoard
load this file into memory. This is called pre-loading. Valid options are:
N When needed, read the information required from the PCBTEXT
file on disk. This may slow down performance, but it saves
the memory that would otherwise be taken by pre-loading the
file.
Y The PCBTEXT file will be loaded into memory. This will
reduce the amount of time that it takes to display
information from the PCBTEXT file. In addition, if you store
the PCBTEXT file on a network server this option will reduce
the network traffic on your system. The disadvantage to
selecting this option is that additional memory will be used
by pre-loading it into memory.
Pre-load CNAMES File
Whenever a caller joins a conference or scans for mail in different
conferences PCBoard must get the conference information from the CNAMES.@@@
and CNAMES.ADD files. This can put on a lot of wear on your hard disk and it
can be relatively slow depending on how fast your hard drive or network
connection is. You can choose to pre-load the CNAMES information into memory
to speed-up access to that information. However, you do so at the expense of
memory. Valid options are:
N The CNAMES information will not be pre-loaded. Instead, the
information will be obtained directly by accessing the disk
as needed.
Y The CNAMES information will be loaded into memory. This will
allow PCBoard to access the information quicker and also
increase the memory requirements of PCBoard. Approximately
650 bytes of memory will be used for each conference in your
system.
Scan for New Bulletins
This question determines if PCBoard should scan for new bulletins during
every login. Normally, the scan for new bulletins will occur around the time
that NEWS file is displayed (when it displays). You may not want to scan for
new bulletins if you have a large number of bulletins on-line.
N Do not scan for new bulletins. This setting would reduce the
amount of time it takes to login if you have a large number
of bulletins on-line.
Y Scan for new bulletins. PCBoard is able to scan hundreds of
bulletins in a very brief amount of time. If you have a lot
of bulletins on-line, you may not want to scan for new
bulletins to reduce the login time for your users.
Swap Out During Shell
Normally the PCBoard executable, and all of the data it is currently working
on, remains in memory while it is operating. This information remains in
memory even when shelling out to DOS thereby reducing the amount of free
memory by the amount that PCBoard, and its data, are occupying.
This option will control whether or not PCBoard will swap itself out of
memory during various shell to DOS operations (executing PCBTEST.BAT,
PCBVIEW.BAT, etc.). Valid options for this field are:
N When shelling out, do not swap any data out of memory. You
will have less memory available when shelling to DOS (usually
under 300 kilobytes).
Y PCBoard will swap itself out of memory (leaving about 25K of
memory behind to re-load) during a shell to DOS operation. It
will swap this information out to whichever storage medium is
available (EMS, XMS, and finally disk). This will generally
increase the amount of memory by about 200 kilobytes or more.
Swap Out During $$LOGON/LOGOFF.BAT
Due to the need to speed up the processing of $$LOGON.BAT and $$LOGOFF.BAT,
PCBoard normally does not swap itself out when running these batch files -
regardless of the previous setting (Swap Out During Shell).
If you are running software that requires more memory than is available
during a non-swap shell to $$LOGON or $$LOGOFF, you may want to swap out when
these batch files are run. Valid options are:
N The swap during shell setting will be ignored and a normal
DOS shell will be performed to execute the $$LOGON.BAT and
$$LOGOFF.BAT files.
Y PCBoard will swap memory out leaving approximately 25
kilobytes to reload whenever the logon and logoff batch files
are executed.
Create USERS.SYS for $$LOGON.BAT
In order to keep $$LOGON.BAT processing quick, PCBoard will not normally take
the time required to create a USERS.SYS file since most programs that you
would run in your $$LOGON.BAT file will not require it.
N This is the default setting. No USERS.SYS file will be
created when the logon batch file is executed.
Y If you have an application that needs USERS.SYS while running
in your logon batch file, you should choose this setting.
Capture GROUP CHAT Session to Disk
Normally PCBoard will not capture information that is typed in by callers
during group chat due to the disk intensive nature of group chat. If you
would like to keep a record of what users type while in group chat, enable
this option. Valid options for this field are:
N Do not capture what is said during group chat. This will
save you disk space and will not burden group chat with any
more disk-intensive operations.
Y PCBoard will record the what is written but only after a user
presses ENTER. The capture file will contain the date, time,
user name, node number, and what was typed. Their will be a
capture file for each channel (up to 255) in group chat. The
location of the chat capture files are determined by PCBSetup
| File Locations | System Files.
Allow Handles in GROUP CHAT
In group chat, PCBoard will normally allow the user to select a handle to be
known as while in chat. For some systems the ability for the user to hide
their identity might be very undesirable. Because of this, PCBoard will give
you the choice to allow users to use a handle while in chat. Valid options
are:
N Users may not choose a handle while in group chat. Instead,
their first name will be used while in group chat.
Y When entering group chat, users will be asked to enter a
handle they wish to use to identify themselves while in group
chat. If the user wants to change their handle while in
group chat, they can type HANDLE at the chat command prompt.
Logging Options
Log Caller Number to Disk
PCBoard stores the vital information about each call in what is termed the
caller logs. These provide a call-by-call history of each node on your
system. You may want to record the caller number of each user for reference
purposes. Valid options are:
N PCBoard will not write the caller number to the caller logs.
Y The caller number of each caller will be written to the log
file. The format will be:
Caller Number: 9,999,999
Log Connect String to Disk
With all of the various connection types and possibilities of today's modems,
it might be useful for you to be able to see what type connect a particular
user established for their session. For example, if you get a user that
complains about slow transfer rates, it could be that the modem did not
connect at full-speed initially due to poor phone lines. By logging this
information to disk, this information will be available to you. In addition,
any CallerID information will be written to disk as well.
N The connect string that the modem gave PCBoard will not be
written to the caller logs.
Y The connect string and any CallerID information will be
written to the caller logs.
NOTE: In order for CallerID information to be written to the caller logs,
you must set PCBoard to answer after at least 2 rings and have this option
enabled.
Log Security Level to Disk
Sometimes it is useful to know the security level of the user at login
written to the caller logs. This option will control whether or not the
security level at login will be written to the caller logs. Valid options
for this field are:
N The security level of the caller will not be written to the
caller logs.
Y The security level of the caller at login will be written to
the caller logs. Remember that the security level of a user
can be reduced or increased when joining a conference.
Limits
Keyboard Timeout (in min, 0=disable)
Sometimes users will have to walk away from their system or may forget they
were on-line. To prevent the connection from being active until the user's
time limit expires or they finally remember, PCBoard allows you to set a
keyboard time-out value.
If no activity is detected from the caller in the number of minutes that you
specify in this field, PCBoard will automatically disconnect the caller for
inactivity. This will free up the node for other callers to get in and may
also save money for those callers that are calling in long distance.
In this field, enter the number of minutes of inactivity a user can have
before they will be logged off of the system. As a general rule, a value
between 3 and 5 would be good for most callers. If you enter a value of 0,
the keyboard time-out will be inactive which will enable the caller to stay
on-line until their daily/session time limit expires.
No warning is given to the user about keyboard inactivity until the final
minute before they are disconnected. During this final minute, PCBoard will
send a beep every 10 seconds to alert the caller. After this minute expires,
PCBoard will disconnect the caller.
Max Number of Upload Description Lines
This field controls how many lines the user is given to enter descriptions
for their uploads. You may enter any value between 1 and 60. Each
description line may contain 45 characters of text to describe the uploaded
file. In general a limit of 8 to 10 is sufficient for most systems.
Maximum Number of Lines in Scrollback
While logged on locally, PCBoard maintains a scrollback buffer which you can
use to review information that has already scrolled off the screen. The
scrollback buffer can be viewed by pressing the o key.
The maximum lines that you can specify is about 400 which will use up
approximately 64 kilobytes of memory. Setting a lower number will save some
memory and a setting of 0 will totally disable the scrollback buffer.
NOTE: A minimum of 30 lines is required unless you disable the scroll back
buffer completely. In other words, if you set your scrollback buffer to any
value between one and 30 lines, the value of 30 will be forced regardless of
your setting.
DOS Environment Size When Shelled Out
When PCBoard shells out to DOS via COMMAND.COM it is possible to request (of
COMMAND.COM) a larger environment size. The value you set here will be
passed to COMMAND.COM as a command line parameter such as /E:768 (where 768
would be the value that you have chosen).
Increasing the environment size may be required if you have a large number of
environment variables. In general, a value of 1024 or higher is not
recommended.
Number Days Before FORCED Password Change
When you have installed the Password Changing PSA, it gives you the ability
to force the caller to change their password after a certain amount of days.
By forcing your users to regularly change their password, you can be help
increase the overall security of your system, because a user's password may
not be as easy to hack.
This particular field allows you to determine after how many days the user
will be forced to change their password. A setting of 0 will disable the
automatic renewal of forced password changes and, instead, the only way to
force a password change is to manually edit the user record (via PCBSM) and
change the expiration date on the password.
A setting such as 90 will cause the caller's password to expire every 90
days. This will cause PCBoard to automatically require a new password, for
continued access, every 90 days.
NOTE: For this field to have any effect, the Password Changing PSA must be
installed.
Number Days to Warn Prior to FORCED Change
If the user's password is set to expire, either from manually setting the
expiration date, or from the automatic setting caused by the Number of Days
Before FORCED Password Change, PCBoard will give the caller a warning of the
upcoming expiration during the login process.
In this field, specify the number of days prior to expiration that this
warning should be displayed to the caller.
NOTE: For this field to have any effect, the Password Changing PSA must be
installed.
Minimum Password Length
When the Password Changing PSA is installed, PCBoard will automatically force
a minimum length for a password. The minimum password length is determined
by the number that you enter in this field. If you enter a value of 0, there
will be no password length restriction enforced.
NOTE: For this field to have any effect, the Password Changing
PSA must be installed.
Allow Sysop Page Start Time
When the page bell is toggled on from the call-waiting screen or by pressing
F4 while logged in, this field defines the time at which you will begin
allowing callers to page the SysOp. If the user attempts to page the SysOp
during off-hours, they will be informed the SysOp is not available for chat
and asked if they wish to leave a comment instead.
For example, you might want to be available for chat between the hours of
8:00am to 5:00 pm. If this is what you desire, enter 08:00 in this field.
Allow Sysop Page Stop Time
When the page bell is toggled on from the call-waiting screen or by pressing
F4 while logged in, this field defines the end time at which callers will no
longer be able to page the SysOp. If the user attempts to page the SysOp
during off-hours, they will be informed that the SysOp is not available for
chat and asked if they wish to leave a comment instead.
For example, you might want to be available for chat between the hours of
8:00am to 5:00 pm. If this is what you desire, enter 17:00 in this field.
Colors
Default Color (@X code format)
In certain areas of your system, PCBoard uses a default color for displaying
text. The color of the text used in the body of a message is just one
example. In this field, enter the @X color you want to use as your default
color.
For example, if you want your default to be light gray on a black background,
enter 07 in this field. For more information on @X codes and the various
colors you can select, please see the Display Files section in the
Customizing Your BBS chapter of this manual.
Color for Message Header DATE Line
The color code entered in this field will control the color used for the
first line of the message header. This is the line that will display the
date, message number, etc.
For example, if you want the color to be white text on a cyan background,
enter 3F in this field. For more information on @X codes and the various
colors you can select, please see the Display Files section in the
Customizing Your BBS chapter of this manual.
Color for Message Header TO Line
The color code entered in this field, will control the color used for the
second line of the message header. This is the line that will display the
user who the message is addressed to.
For example, if you want the color to be white text on a blue background,
enter 1F in this field. For more information on @X codes and the various
colors you can select, please see the Display Files section in the
Customizing Your BBS chapter of this manual.
Color for Message Header FROM Line
The color code entered in this field will determine the color for the third
line of the message header. This is the line that displays who the message
is from.
For example, if you want the color to be white text on a blue background,
enter 1F in this field. For more information on @X codes and the various
colors you can select, please see the Display Files section in the
Customizing Your BBS chapter of this manual.
Color for Message Header SUBJ Line
The color code entered in this field will determine the color used for the
forth line of the message header. This line in the header displays the
subject of the message.
For example, if you want the color to be white text on a blue background,
enter 1F in this field. For more information on @X codes and the various
colors you can select, please see the Display Files section in the
Customizing Your BBS chapter of this manual.
Color for Message Header READ Line
The color code entered in this field will control the color displayed on the
fifth line of the message header. This line is only displayed when the long
style message header is being used by the caller. On this line PCBoard will
display whether or not the message has been read by the recipient and what
type of security is in use for the message.
For example, if you want the color to be cyan text on a blue background,
enter 13 in this field. For more information on @X codes and the various
colors you can select, please see the Display Files section in the
Customizing Your BBS chapter of this manual.
Color for Message Header CONF Line
The color code entered in this field will control the color displayed on the
sixth line of the message header. This line is only displayed when the long
style message header is being used by the caller. On this line PCBoard will
display the conference number and the type of read that is currently in use.
For example, if you want your default to be cyan on a blue background, enter
13 in this field. For more information on @X codes and the various colors
you can select, please see the Display Files section in the Customizing Your
BBS chapter of this manual.
Function Keys
Pre-defined function keys allow you to send text by holding down SHIFT and
pressing the function key listed to the left of each field on this screen.
For example, if you regularly add a signature to the bottom of your messages,
you may want to define a function key to do it for you. In other words, when
you execute the function key, your signature will be typed in for you instead
of you having to type it in.
Sending Text
You are given 60 characters to enter text you want sent when you execute a
function key. The text that you enter in this field will be sent directly to
PCBoard with one exception. If you enter ^M anywhere in a function key
field, it will be treated as if you pressed ENTER.
Sending The Contents Of A File
If you need more than 60 characters to be sent by a function key, you can
tell PCBoard to send the contents of an entire file. To do this, begin the
line with a % followed by the filename that you want to send to PCBoard.
Executing A PPE File
Another action you can define is to run a PPE file when a particular function
key is executed. To run a PPE from a function key, begin the line with an !
followed by the filename of the PPE (including the .PPE extension) you want
to execute.
Examples
Let's assume that you have entered the following information for your
function keys:
The following describes each action that would occur for the function keys
defined in the previous screen capture are executed:
SHIFT-F1 This particular example might be used as a signature when
leaving messages on your system. Instead of repetitively
typing your name you could press SHIFT-F1 to have PCBoard
enter all of this text for you.
SHIFT-F2 When PCBoard detects file access errors it will write an
entry to the caller logs. This entry will usually contain
either the word FAIL or ERROR. This particular example
would be quite useful if you wished to regularly scan your
caller logs to see if your system may have a configuration
error or problems accessing certain files. Instead of
typing the command in every day, you could use a function
key to do all of the work for you.
SHIFT-F3 This example demonstrates how to have PCBoard stuff the
contents of a file into the keyboard. When you press
SHIFT-3, PCBoard will enter the contents of
C:\PCB\GEN\NEW-WELC just as if you had typed it yourself.
Remember, when you want to have the contents of a file
stuffed, you need to begin the function key definition
with a % character.
SHIFT-F4 The simple fact that you may run a PPE opens up numerous
possibilities. The example shown in the previous screen
capture would execute C:\PCB\PPE\TAGLINES.PPE. Remember,
to specify that a PPE file should be used for a function
key definition, you need to enter an ! as the first
character of the definition field. In addition, you must
also specify the filename extension of .PPE on your file
you wish to execute.
Security Levels
This section discusses the Security Levels menu option of PCBSetup. From
this menu option, you can control the security level that is required to
execute commands or certain functions. The following page begins by
discussing how to protect SysOp functions.
Sysop Functions
The fields on this screen give you the ability to control what security level
is required to execute the SysOp Commands (1-15). Each of the 15 SysOp
commands are represented on this screen. The fact that you can assign
different levels to different commands, gives you the ability to have several
users who help with SysOp duties. You can then give users access to only
those commands that they are required to perform their tasks. The rest of
the commands can have higher security levels assigned to them to prevent
unauthorized access.
Sysop Commands
Throughout PCBoard there are certain operational characteristics that were
designed for SysOp use. For example, there are subcommands available at the
End of Message Command prompt that will enable a user to COPY or MOVE the
current message to a new conference. Obviously, you do not want all users to
have this capability. The security levels required to use functions/commands
like the previous example are controlled on this screen.
Sysop Level (for Sysop Menu and F1-Temp-Sysop Upgrade)
The value that you enter in this field determines the minimum security level
that constitutes a user being seen as a SysOp. For example, if you enter 100
in this field, any user with a security level of 100 or higher will be seen
as a SysOp by PCBoard. This means that these users will see the SysOp menu
at the conference command prompt instead of the normal user menu. Just
because a user is seen as a SysOp does not mean that they have free reign on
your system. Remember that you can control the security level required to
execute virtually all of the functions and commands.
In addition, The security level that you enter in this field will be given to
the user under the following circumstances.
You temporarily upgrade the access of a user that is online by using the F1
keyboard command. This new security level will only be in effect for the
duration of the call. When the user calls in the next time, their old
security level will be used.
There is a conference flag (C) which can be set in the user record which
designates a user as a conference SysOp. If this flag is set in a conference
that you user joins, their security level will be upgraded to the SysOp
security level. This security level change will be in effect while the
caller is in the conference where they are designated as a conference SysOp.
When they leave the conference, their access will be returned to normal.
Level Needed to Read All Comments
In this field, enter the security level that is required for a user to be
able to read comments that are left to the SysOp. Comments are seen as any
messages that are left by users using the C user command. Because comments
are assumed to be of the highest security nature, a user who meets the
security level requirements of this field may also read any message on the
system.
Level Needed to Read All Mail Except Comments
The security level that you enter in this field will be used to determine if
a user may read private mail that is not from or to the current user. If a
user has a security level that is equal to or greater than the level that is
entered in this field then they may read any private mail with the exception
of comments to the SysOp. The level needed to read comments is determined by
the previous field on the screen.
Level Needed to Copy or Move Messages Between Areas
Sometimes it is extremely useful to be able to move or copy a message to a
new conference. However, you do not want everyone to have this capability
for obvious reasons. In order for a user to have the capability of moving or
copying a message to a new conference, they must have a security level equal
to or greater than the value that you enter in this field.
Level Needed to Enter @-Variables in Message Base
With the exception of @HANGUP@ and @DELAY:nn@, all macros can be entered in a
message and displayed when viewing the message. For this reason, you may not
want all callers to have this capability. For a user to be able to enter all
@ macros such as @USER@ and @MORE@ they must have a security level equal to
or greater than the value you enter in this field.
NOTE: All users, may enter @X color codes in their messages
regardless of the security level you enter for this field.
Level Needed to Edit Any Message in the Message Base
There are two settings in PCBSetup that will determine if a user will be able
to edit a message. This setting controls whether or not a user can edit any
message they can read regardless if it was entered by them. There is also a
setting in PCBSetup | Security Levels | User Levels which controls the
security level required for a user to edit messages they have left.
Obviously, you are going to want to set the security level required to edit
any message higher than the level required to edit the user's own messages as
it follows the rules of common sense.
In order for a user to edit any message that they can read, they need to have
a security level that is greater than or equal to the value you enter in the
field on this screen. The ability to edit any message is a some-what
powerful function, because you can make it look like people said something in
a message that they really did not. Remember, to edit a message you type
EDIT at the End of Message Command prompt.
Level Needed to NOT Update Msg Read Status (R O cmd)
The R O user command enables you to read messages without having your last
message read pointer updated. This is quite useful for skimming through the
message base because you can spend more time reading the messages at a later
time. All of this is possible because when using this command, your last
message read pointers are not updated.
This particular field will control whether or not PCBoard should avoid
marking the message as having been read when you are reading messages in read
only mode. You may not want all callers to be able to have this ability and
thus defeat your ability to tell if they have read their messages yet.
Setting the security level here outside the reach of your callers will keep
them from using this capability.
Level Needed to Use the BROADCAST Command
The broadcast command is used to send a one line message to a user on another
node (or all nodes). In order for the user to be able to use the BR user
command they must have a security level that is equal to or greater than the
value that you enter in this field.
Level Needed to View the Private Upload Directory
The value you enter in this field will control whether or not a user can view
the private upload directory of the current conference while logged into the
system. If the security level of the caller is greater than or equal to the
value entered, they will be allowed to view the private upload directory.
When logged into the system, you can view file directories using the F user
command. To view the private upload directory of the current conference,
enter P at the directory prompt number.
Level Needed to Enter Generic Messages (@USER@)
When addressing a message, you can address it to @USER@, @##@ or @##-##@
(where ## is a security level) to make it appear that the single message is
a personal message for each individual user. All of these messages are
referred to as generic messages because one single message can appear to be a
personal message for every user on your system.
The advantage of this is that a personal message will get more attention from
the user than a message that is addressed to ALL. The disadvantage to using
this method is that it can be obnoxious if used too frequently. You can
control what users will be able to enter generic messages by entering the
required security level to enter these messages in the field on this screen.
Level Needed to Edit Message Headers
The security level entered in this field will determine whether or not a user
will be able to edit additional information of the message header by entering
E at the End of Message Command prompt. The ability to edit the message
header information gives you the ability to perform such operations as
re-addressing the message, changing the security on the message, changing the
FROM field, and more.
Level Needed to Protect/Unprotect a Message
At the End of Message Command prompt, you can enter U to make a message
public or P to make a message private. The value you enter in this field
will set the security level that is required for a user to be able to enter
these commands.
Level Needed to Overwrite Files on Uploads
When a file already exists on the system, PCBoard will not allow a user to
upload the same file. A user that has a security level equal to or greater
than the value entered in this field can choose to:
* Remove the existing file
* Continue with the upload (leaving both the old and new files online)
* Abort the upload.
Level Needed to Set the Pack-Out Date on Messages
When entering a message, you can set the message security to D if you have
sufficient security. This will enable you to set a date when the message you
are about to enter will be automatically removed from the message base. This
would be useful if whatever message you are entering is date sensitive. For
example, if you offering a special subscription rate until July 1, 1994, you
may want to set the pack-out date of the message to July 2, 1994 so that
people logging in after the first will not see the message.
Level Needed to See All Return Receipt Messages
Normally a Return Receipt is useful only to the person that requested the
return receipt. With this in mind, PCBoard will normally not show the Return
Receipt to other users, not even the SysOp. In order to see return receipts
that belong to others, you must have a security level equal to or greater
than the level specified in this field.
User Commands
Security Levels Required
The top portion of this screen is split into two columns. These two columns
list most of the user commands that are available inside of PCBoard. Next to
each command description is a field. In each field, enter the minimum
security level that is required to execute the command. If the user does not
have sufficient security, then the user will receive a notice stating that
the command is not available. In each field, you can enter any value between
0 and 255.
The rest of the commands (that are not listed) will be controlled by one of
those that are listed. For example, the FLAG command can be used if the D
command is accessible to the user. This makes sense, because the FLAG
command simply marks files for download. If the user is not capable of
downloading files, you do not want them flagging files. On this screen you
will also see four other fields you can define the security level for.
Level Required for BATCH File Transfers
In order for a user to transfer more than one file at a time, they must have
a security level that meets or exceeds the value you enter in this field.
When batch transfers are disabled, a user may only upload or download a
single file at a time.
Level Required to EDIT Your Own Messages
In this field, enter the security level that is required for a user to be
able to edit the contents of messages they have left on the system. Messages
are edited by typing EDIT at the End of Message Command prompt.
Users may find that editing their messages would be useful when carrier is
lost while entering their message, or if they discover a spelling/grammatical
error after saving the message. If you do not want to let your users edit
their own messages, set this value to a high security level.
Level Given to Users Who Agree to Register
This field will enable you to determine what security level new users who
agree to register on your system will be assigned. After the NEWUSER file is
displayed, PCBoard asks the new user if they would like to register on the
system. If they agree to register, they will be assigned the security level
you enter in this field.
Level Given to Users Who Refuse to Register
If a new user decides not to register on your system, they will be given the
security level that you enter in this field. By refusing to register,
PCBoard is going to allow the user to look around and will not create a user
record because they chose not to register.
You can immediately log the user off of the system if they refuse to register
by assigning them a security level of 0. The security level of 0 will tell
PCBoard to inform the user that they are being logged off because they
refused to register.