home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
HPAVC
/
HPAVC CD-ROM.iso
/
PCBDEMO.ZIP
/
PCBDOCS.EXE
/
SYSGUIDE.DOC
< prev
next >
Wrap
Text File
|
1994-02-14
|
98KB
|
2,141 lines
8
=============================================================================
SysOp's Guide
File Transfers
Messages
Conferences
Events
System Security
Maintenance Tasks
New Users
User Subscriptions
Modem Discussions
Searching for Text
File Transfers
Uploading Files
When you upload files you are adding files to the bulletin board system. The
files are posted so other users may download the files.
How to Upload Files
In order to upload a file, you must specify the filename(s) you will be
uploading and a description for each file uploaded. Once all of the files and
descriptions have been entered, you may begin the file transfer.
As an example, we will upload a file called MNHIT110.ZIP. Begin by entering
U at a conference command prompt to initiate an upload. PCBoard will display
the following prompt:
(1) Enter the Filename to Upload (Enter)=none?
At this prompt, enter the filename which is MNHIT110.ZIP. Now, you are asked
to enter a description for the filename that you just entered. You need to
enter at least 5 characters for the filename. You are told how many 45
character description lines you can enter. We will enter the following:
Before beginning, enter a description of: MNHIT110.ZIP
Begin description with (/) to make upload `Private'.
Enter your text. (Enter) alone to end. (45 chars/line, 12 lines maximum)
? (MANHIT v1.10 -- Utility you can use to enhance)
? (your computer/system security. )
On the next blank description line, press ENTER to finish entering the
description. You will now either be asked for another filename to transfer or
the transfer will begin. It all depends on how you answered the Promote to
Batch Transfers question in PCBSetup | Configuration Options | File
Transfers. If you are asked for another filename, you may enter another
filename to transfer or press ENTER to begin the transfer.
The transfer should now begin. There is a different method for uploading
from remote or locally. The following describes each.
Remote You need to transfer a file using your communications
program. With most communication programs you can do this by
pressing PgUp. You are usually prompted for the protocol
you wish to use for the transfer. Make sure you select the
same one as you did on the bulletin board system. Once you
select the protocol, you are asked for the filename(s) you
wish to transfer. Enter the location to find the files you
want to upload on your disk and press ENTER. At this point
you will see the files being transferred.
Local Local uploads are a little different because PCBoard is in
control. To perform a local upload, you need to make sure
you have selected an internal protocol to PCBoard. At the
point where you would press u from remote to begin the
transfer you will see the following prompt at the top of your
screen:
Local Upload Path or Filename? ( )
In this field, enter the filename(s) you want to upload. For
example, if you want to upload a single file called
MNHIT110.ZIP that is located in D:\TEMP\, enter
D:\TEMP\MNHIT110.ZIP at this prompt. If you want to upload
every file in D:\TEMP\, enter D:\TEMP\*.*.
If your file transfer is aborted, it may occur for any of the following
reasons:
You were using an internal protocol, and one or more of the files you were
transferring duplicated filenames already on the system. The non-duplicate
files (if any) will still be transferred, but you will receive the transfer
aborted message to let you know one or more of your files were aborted.
You took too long to begin the transfer. The internal protocols in PCBoard
give you approximately 60 seconds to begin the transfer. Most external
protocols have a built in time-out value as well.
If you are prompted for any descriptions after the transfer has taken
place, you have done an unannounced upload. This is where you send files
you did not inform PCBoard you would be sending. Because PCBoard requires
each filename to have a description, it will ask you for a description if
it cannot find one.
Before PCBoard asks for a description, however, it will check the file to
see if it has a FILE_ID.DIZ in it. If so, the file will be immediately
tested without prompting for a description. PCBoard is able to determine if
a ZIP, ARJ, LZH, PAK, or ARC file has a FILE_ID.DIZ file. If it does, the
description file will be used to describe the file. If PCBoard is unable
to find a description in the file, it will ask for a description of the
file.
All files that are successfully transferred will be tested via PCBTEST.BAT if
you have enabled the testing of uploads on your system.
Testing Uploaded Files
If you have configured your system to test all uploaded files, all
successfully uploaded files will be tested (one at a time) using PCBTEST.BAT.
Even if carrier is lost during the transfer, PCBoard will test all files that
were successfully transferred. For more information about testing files using
PCBTEST.BAT, see the Batch Files chapter of this manual.
Disabling Uploads
There are two methods you can use to disable uploads on your system. You can
set the security level required to execute the U command in PCBSetup |
Security Levels | User Commands very high so no one can upload. This would
effectively disable uploads across the entire system.
If you are looking to disable uploads on a conference by conference basis,
you may do that as well. To disable uploads for a particular conference,
clear out the field which contains the location of where uploads will be
stored. The field you need to clear depends on how you answered the Make All
Uploads Private question. If you answered with a Y, clear out the location
of private uploads. The following is a sample display:
Sort Name/Loc Upload DIR File Location of Uploads
Public Upld: 0 : C:\PCB\MAIN\UPLOAD : C:\PCB\MAIN\UPLOAD
Private Upld: 0 : C:\PCB\MAIN\PRIVATE :
If you answered with an N instead (making all uploads in the conference
public), clear out the Location of Uploads for the public upload directory
instead.
Determining Duplicates
PCBoard uses a semi-intelligent method to determine if the file that is about
to be uploaded is a duplicate of a file already on the system. A list of the
filename extensions used by the most popular file compression programs is
stored in memory. If it appears that the file is simply compressed with a
different program, the file will be rejected as a duplicate.
For example, if you have a file called SPECIAL.ARJ on your system and an
attempt is made to upload SPECIAL.ZIP, the file will be rejected as a
duplicate. However, a file such as SPECIAL.TXT could be uploaded, because
the TXT extension is not used by any compression programs. Therefore, this
file most likely has contents that are different from SPECIAL.ARJ.
NOTE: The file extensions that are recognized as being used by compression
programs are: ZIP, ARJ, LZH, LHA, ARC, PAK, ZOO, DWC, and EXE.
PCBoard checks the filename being uploaded against entries in DLPATH.LST to
determine what files exist on the system. If the file already exists, a
message stating that the upload is a duplicate of a file already on the
system is displayed. If you have a security level equal to or greater than
the value specified by the Level Needed to Overwrite Files on Uploads
(PCBSetup | Security Levels | Sysop Commands), you are given the option to
remove the file from disk or to continue with the upload.
You may also want to use what is called an ALLPATH.LST (All-Files DLPATH.LST
in PCBSetup | File Locations | Configuration Files). In this file you can
list all of the paths you want PCBoard to check when uploading a file. This
way you could include download paths from multiple conferences so users do
not upload files that may be located in another conference. Since the
ALLPATH.LST file is never checked for downloads, you do not compromise the
security of your system. If you leave this field blank, PCBoard resorts to
using only the DLPATH.LST method for duplicate checking.
Downloading Files
When you download files, you are transferring a file which exists on the
bulletin board to your machine.
How to Download Files
In order to download a file, you must enter the filename(s) you want to
download. To help find the filenames you want to download, use the L, N, Z,
and F user commands. All of these commands will list files. To actually
download the file(s), use the D command to download a single file or the DB
command to download more than one file. If you have answered Y to the
Promote to Batch Transfers question, the D command will behave like the DB
command.
You will see the following prompt:
(1) Enter the filename to Download (Enter)=none?
At this prompt enter the filename you wish to download. You may stack
multiple filenames at this prompt by separating each filename by either a
space or a semi-colon. For example, enter BLADAR10.ZIP to download a file
called BLADAR10.ZIP.
If the file is found on disk, you will be shown the filename, how many bytes
are in the file, and an estimate of how long it will take to transfer at your
current speed. You will then be asked for another filename. If you are
finished entering the files you want to download, simply press ENTER.
After the filenames have been entered, you will be ready to begin the
transfer. As with uploads, PCBoard treats remote and local transfers
differently. The following describes each method:
Remote You need to transfer a file using your communications
program. With most communications program you can do this by
pressing PgDn. You are usually prompted for the protocol
you wish to use for the transfer. Make sure you select the
same one as you did on the bulletin board system. Once you
select the protocol, you are asked for the location where you
wish to place the files you are about to download. Enter any
valid subdirectory or filename in this box as necessary for
your communications program. At this point you will see the
files being transferred.
NOTE: Some communications programs support what is called
auto-downloading. This is where the transfer automatically
begins as soon as the communications program recognizes the
protocol. This is most common with protocols like Zmodem.
Local Local downloads are a little different because PCBoard is in
control. To perform a local download, you need to make sure
you have selected an internal protocol to PCBoard. At the
point where you would usually press d from remote to begin
the transfer you will see the following prompt at the top of
your screen:
Local Download Path? ( )
In this field, enter the drive and subdirectory where you
want to store the file(s) you are about to download. For
example, if you want the files to be stored in D:\TEMP\,
enter D:\TEMP at this prompt.
If your file transfer is aborted, it may mean you took too long to start it.
Internal protocols allow you about 90 seconds before they will abort. Local
downloads will abort if you do not type anything in the box within 30
seconds.
If your download is aborted, PCBoard will remember the filenames you typed in
and they will remain as flagged files. Therefore, if you attempt to do a
download again, you will be asked if you wish to download flagged files.
Flagging Files For Download
You can mark or flag files for download while you are viewing the file
listings. When you are viewing file listings, you will notice that the More?
prompt has a (F)lag option. When you select this option, you will be asked
what filename you would like to flag for download. If the filename you enter
is found, you will be shown the filename, file size, and approximate minutes
to download. You can continue looking at the file listings without having to
begin your transfer immediately.
When you are ready to begin your transfer, simply use the D or DB commands.
You will be asked if you wish to download the files that are flagged for
download.
Disabling Downloads
Disabling downloads is a very simple process. To disable downloads across
the entire system, you would set the security level in PCBSetup | Security
Levels | User Commands for the D command very high.
To disable downloads in a particular conference is very easy. Simply make
sure that the DLPATH.LST field in the conference configuration is blank. If
it is blank, PCBoard will inform the user that downloads are currently
disabled. Below is an example from a conference configuration screen:
Directories : C:\PCB\MAIN\DIRMNU : C:\PCB\MAIN\DIR.LST
Download Paths (listing only) :
Making files FREE for download
A FREE file is considered a file which does not count towards the user's
bytes or files downloaded. In other words, if the user has 280k of bytes
available for the day and a free file is downloaded, 280k of bytes will
still be available for downloading.
To make a file free, you need to use the FSEC file which can be edited via
PCBSetup | File Locations | Configuration Files. A file is considered FREE
if the password required for the download is FREE. A couple of examples will
help illustrate the point best. For example, all files in the G:\FORALL\
subdirectory will be considered FREE files. The entry you would make in the
FSEC file looks like the following:
Drive \ Path File Name Sec Password
-------------------------------- -------------- ----- --------------
G:\FORALL\ *.* 0 FREE
Because almost all bulletin boards store files on the system as compressed
files, you may want to make the utility necessary to uncompress the files a
FREE download. For example, the decompression utility may be called
ARJ300.EXE. If so, you may want to make the following entry in the FSEC
file:
Drive \ Path File Name Sec Password
-------------------------------- -------------- ----- --------------
ARJ*.EXE 0 FREE
Notice how the Drive/Path field is left blank. This means that anytime a
user downloads a file which begins with ARJ and has an extension of EXE it
will be a FREE file.
Batch Versus Single File Transfers
As you know, you must use a file transfer protocol to transfer any files over
the modem. As it turns out, some protocols can handle sending multiple files
in a single transfer while others may be only capable of sending one file at
a time.
If a protocol can send more than one file in a single transfer, it is known
as a batch protocol. On the other hand, if the protocol is capable of
sending only one file at a time, it is sometimes termed a single file
protocol.
If you flag or attempt to download more than one file for a single transfer,
PCBoard will only allow you to transfer the files using the batch protocols
that are available on the system. If your default protocol is set to a
single file protocol, you will be prompted for the batch protocol you wish to
use for the transfer.
Aborted Transfers
An aborted file is any file which was not fully transferred. The following
details some reasons why files may be aborted:
excessive errors: Almost every protocol has some error-checking routines
built in to assure the proper transfer of information. If an error in the
transmission is detected the data packet will usually be re-sent. Most
protocols also have a built in error limit. For example, if 10 successive
errors occur, the protocol may decide to abort the transfer.
line noise: No transmission over phone lines is immune from line noise.
From time-to-time you may experience line noise. If you do not have an
error-corrected connection, this may cause transmissions errors and if bad
enough, could cause the transfer to be aborted. If you do have an
error-corrected connection, it is quite unlikely that the transfer will be
aborted (because modems are doing the error correcting automatically).
However, if the line noise is extremely bad, your modem may decide to
automatically drop carrier.
dropped bytes: With the influx of high-speed modems into the market it has
become more important than ever to have serial port hardware that is adequate
enough to handle the speed of the modem. If you plan on using a modem which
uses a port speed of 19200 or higher, you should plan on either using an
intelligent serial card supported by the /M version of PCBoard or at the very
least make sure all of your serial ports have NS16550AFN UARTs installed.
flow control: It is very important that you use the right flow control.
There are two types of flow control--software and hardware. The former is
commonly referred to as XON/XOFF flow control and the latter is referred to
as CTS/RTS flow control. It is important that your modem and your software be
configured to use CTS/RTS flow control exclusively. Protocols such as
Ymodem/G assume that flow control is operating properly. If flow control is
not working properly, you can lose an excessive amount of characters, etc.
NOTE: If the connection is set to be disconnected once the file transfer has
completed and the file transfer aborts, PCBoard will wait 45 seconds instead
of the normal 10 seconds.
Messages
Messages are a vital part of just about any bulletin board system. Messages
are used to leave messages to the SysOp or to other users. Messages are the
most common way of communicating with other users on the system.
Reading A Message
Because reading messages is one of the most commonly used functions when on a
bulletin board system, PCBoard has numerous commands and subcommands dealing
with reading messages. You can use the subcommands to view only those
messages that interest you. For example, if you only want to see messages
from JIM SMITH, use the FROM subcommand.
Reading new messages
Bulletin board systems are basically information banks. Because so much
information is stored on a bulletin board system, you most likely want to
view only new information that is placed online. Viewing any new messages on
the system is very easy to do. From the conference command prompt you can
type in the following:
R S A
This will Read mail Since the last time you were on in All conferences you
have selected for scanning. If the bulletin board brings in a lot of mail
each day, you may want to read only messages that are addressed to you. If
so, you can type in the following command instead:
R Y S A
The only change is the addition of the Y to tell PCBoard to only read
messages that are addressed to You. There are numerous other subcommands you
can use with the R command. For a detailed list, see the R user command in
the PCBoard Commands chapter of this manual.user command section.
Downloading an attached file
If you are reading a message which has an attached file, you will notice that
you have the ability to flag the attached file for download. At the End of
Message Command prompt, you simply type in FLAG -- the file will then be
flagged for download. When you are done reading messages, you can use either
the D or DB command to download the file.
Entering A Message
One of the most popular methods of communicating on a bulletin board system
is via the message system. In order to communicate with another user or
group of users on the system via a message, you need to enter a message.
This section briefly talks about how to enter a message on the system. For
more details about entering a message, you should refer to the E user command
in the User Command section of this manual.
To begin entering a message, you need to use the E user command. This means
you will type in E followed by pressing ENTER.
Addressing a Message
Once you press E and then ENTER you will see the following prompt:
To (Enter)='ALL'? ( )
This prompt asks to whom the message should be addressed to. Press ENTER to
address the message to ALL, enter any valid user name on the system, or you
can user some of the special addressees that are discussed in the Entering a
Message section of the PCBoard Commands chapter (e.g., @USER@, @LIST@, etc.).
The Subject Of The Message
Just as you would enter a subject on a memorandum or other correspondence,
you are asked to enter a subject of the message you will be entering. You
are given up to 53 characters to describe the content of your message. The
subject of the message is displayed when the message is read, when using the
Q user command, etc. If you do not enter a subject for the message, the
message you are entering will be aborted.
Assigning Message Security
Unless the current conference is defined to make all messages private, you
will be asked what type of message security to use for the message you are
about to enter. You may choose to make the message public so other users on
the system may read it or you may make the message private so only certain
persons can read the message. The most popular security options are N for a
public message and R for a message which can be read only by the receiver of
the message.
Requesting A Return Receipt
If you are entering a RECEIVER ONLY message, you may be asked if you wish to
request a return-receipt. If you request a return receipt, a message will be
sent to you when the recipient reads your message.
Echoing a Message
If you are leaving a message in a conference which has been configured to
allow echo-mail, you may be asked if you wish to echo the message. If you
choose to not echo the message, your message will remain on the local system
only.
Routing A Message
You can configure a conference to request routing information if a message
will be echoed and it is a private message. The routing information that is
entered allows the message to take a direct route to the recipient rather
than being broadcast over the entire mail network. The routing information
that is entered depends on the software you are using for echoing mail as
each can require different types of routing information. Check with the
echoing software to see if message routing is allowed, and if so, the format
that must be used.
Choosing a Message Editor
PCBoard gives you the option to ask if you wish to use the full-screen editor
each time you enter a message. If you have enabled this feature, you will be
asked this question before being allowed to enter your message. Of course,
if you find you always use the full-screen editor or the line-editor, you may
want to go use the W user command to change the Use Full Screen Editor?
prompt to reflect the appropriate default response.
The Message Editor
Once you have answered the questions about the message you want to enter, you
will be placed in the message editor. In the editor, you simply type in your
message as you want it to read. To perform various functions inside of the
editor such as deleting lines, saving the message, etc. you need to access
the editor commands. To access these commands in the full-screen editor, you
can press ESC. In the line-editor, you can access these commands by pressing
ENTER on a blank line. There are far too many commands to discuss in this
section of the manual, however they are discussed in detail in the section of
the manual which discusses the E user command. Once you have entered the
text you want for your message, you are ready to save your message.
Saving the Message
To save a message, simply access the editor command prompt by pressing either
ESC or ENTER on a blank line depending on which editor you are using. Then
press S and R. Your message is now saved to the message base on the bulletin
board system.
Attaching A File To A Message
Sometimes you need to distribute a file to a select group of users. What you
can do is attach the file to a message. That way, only users which can read
the message with the attached file can flag the file for download. To attach
the file, select SA from the editor command prompt instead of S to save the
message.
You will be asked for the filename you wish to upload or attach. You may
attach only one file to each message. If you need to attach more than one
file, use a compression program which compresses the files and combines them
into a single file.
After you have entered the filename to attach, upload the file just as you
would any other file to the system. If the transfer is successful, you will
be notified that the message was saved. On the other hand, if the transfer is
aborted, or if your file was tested and failed testing, you will be returned
to the editor command prompt.
Editing A Message
Not everyone is perfect the first time around. Sooner or later, you may need
to edit a message you have saved. You may need to edit the actual text in
the message body, or perhaps just change who the message is addressed to.
The following sections describe how to edit the header and body of a message.
Header information
If you entered a message to the wrong name, or you would like to change the
subject of a message that you left, you may do so by typing E at the End of
Message Command prompt. If you do not have SysOp security, you will only be
able to edit the header information of messages which you have left. You may
edit who the message is to, the subject of the message, the message
security/protection, and the reference number of the message. If you have
SysOp security, you will also be able to change who the message is from, and
if it has been read or not.
Body of message
You can use the EDIT command at the End of Message Command prompt to edit the
body of the current message. You may edit the message if it was left by you
or if you have SysOp security.
When you edit the message you are put back into the message editor. Make the
changes you want to make and then re-save the message. The changes that you
make will be saved to the message.
NOTE: If you make numerous changes, PCBoard may have to delete the original
message and create a new message at the end of the message base. Therefore,
if you see Message Killed when you save your message, you will know PCBoard
had to kill the original message and create a new message at the end of the
message base.
Searching
PCBoard provides extensive search capabilities. This section describes some
very simple searches you can use to help you find messages.
For Text
If you want to display any messages which contain particular text, use the TS
subcommand. For example, if you enter the following:
R;TS
You can perform a text search on any message. PCBoard will ask you for the
text you want to search for. After you enter the text, you will be asked
what message number you want to begin the search at.
You can stack all of this onto one line. For example:
R;TS;EDITOR;1+
This command will perform a text search, looking for any message in the
current conference which contains the word EDITOR.
If you wish, you may also span the search across all conferences you have
selected for scanning by using the following command:
R;TS;EDITOR;1+;A
Notice that only the A was added to the command. This tells PCBoard to
search all conferences you have selected for reading. If you wish to search
all conferences you can join, use ALL instead.
NOTE: Text searches within PCBoard are not case-sensitive. Therefore, you do
not have to worry about matching the case of the text you will be searching
for.
For User
Sometimes you may only wish to read messages which are to or from a
particular user. There is a USER subcommand you can use to read messages to
or from a user. The following is an example:
R;USER
PCBoard will ask you for the user you wish to search for. You may also stack
the user name on the command line as shown in the following example:
R;USER;JIM BROWN
The previous example will search for any messages in the current message base
which are to or from JIM BROWN.
For User & Text
If you need to perform an even more specific search, you can combine the USER
and TS commands. This will enable you to search for any message that is to
or from a particular user and contains the text that you specify. The
following is an example:
R;TS;USER
PCBoard will prompt you for the text you want to search for and the user you
want to restrict the search to. As in the previous examples, you may stack
the information on the command line:
R;TS;EDITOR;USER;JIM BROWN
In this example, it is important to place the text you want to search for
after the TS and the user you want to search for after USER. Otherwise,
PCBoard will not be able to properly discern the difference between the
search text and the user. Look at the following example:
R;TS;USER;EDITOR;JIM BROWN
If you type in the previous example, PCBoard will think the user name was
EDITOR;JIM BROWN and consequently prompt you for the text to search for.
Capturing A Single Message
The ability to capture a message to a printer or file can be important
because it gives you a method to copy a message to a format which you can
then share or use in another manner. You can capture messages to a file, or
to the printer (if you are on locally).
To The Printer
If you are on locally, you can capture text that is displayed by PCBoard to
the printer using ALT-P. Therefore, to capture a particular message, do the
following:
Read the message you want to capture.
At the End of Message Command prompt, press ALT-P to turn on the
printer.
Now type / and press ENTER. This will re-display the message.
Since you have printer capturing turned on, you will be
capturing the message.
Press ALT-P to turn off printer capturing and you are done.
To A Text File
You can easily capture a message to a file using the following
steps:
Read the message you want to capture.
At the End of Message Command prompt, enter C to capture and
download the message.
Download this file like any other file on the system and you
will have a hard-copy of the message in text file format in the
location where you download the file.
Capturing Multiple Messages
The ability to capture messages to a printer or file can be important because
it gives you a method to copy messages to a format which you can share or use
in another manner. You can capture messages to a file, or to the printer (if
you are on locally).
To The Printer
If you are on locally, you can capture text displayed by PCBoard to the
printer using ALT-P. Therefore, to capture several messages, do the
following:
Press ALT-P to turn on printer capturing.
Read the messages you want to capture.
When done reading the messages, press ALT-P to turn off printer
capturing.
To A File
The easiest way to capture messages to a file is to use the C subcommand of
the R user command. Simply tack the C on to the end of your read command and
those messages will be sent to a file instead of being displayed on the
screen. Example:
R;S;A;C
would read new messages in all conferences that you have selected and capture
them to a file. Once the messages have been captured to the file, you will
be directed to download the capture file to your system. Of course, once you
download it, you have an ASCII text capture of those messages.
To a QWK Packet
One of the most popular ways to read messages off-line is via an off-line
mail reader which can handle QWK packets. PCBoard can capture messages into
a QWK packet you can use with an off-line mail reader. If you want all of
the new messages on the system, use the QWK command from the conference
command prompt. If you want to capture a certain range of messages, or
perhaps only messages that contain certain text, use the QWK subcommand that
is available with the R user command.
To captures messages to a packet, simply tack on QWK to the end of your read
command. For example, if you want the new messages in the current conference
instead of all conferences you have selected, enter the following command:
R;S;QWK
Taking this idea one step further, you can capture all messages that contain
the word INERTIA in the current message base. To do this, enter the
following:
R;TS;INERTIA;1+;QWK
Conferences
Conferences provide you a way to separate information on your bulletin board
system. Each conference can have different message bases, file areas,
bulletins, scripts, etc.
Creating
Because the conference configuration screens are so extensive, it can take a
while to create a conference. PCBoard does try to help you out with your
conference configuration when you decide to create a new conference.
To create a conference, you need to first load PCBSetup, and select
Conferences from the Main Menu. You will see a list of conferences on your
system. To create a conference, press ENTER on a blank conference number.
You will be informed that you are setting up a new conference. You are then
asked if you want PCBSetup to provide the defaults for this conference. If
you did not see this screen, but heard a beep instead, it means you need to
increase the Number of Highest Conference Desired in PCBSetup | Configuration
Options | Messages.
If you choose not to have PCBSetup provide the defaults, you will be placed
in the conference screen for the conference you are creating. All of the
fields will be blank and you will need to fill in the fields as described in
the Conference Setup chapter of this manual.
If you choose to let PCBSetup enter the defaults, you will be asked some
additional information:
Conference Name: You may enter up to 13 characters to describe the new
conference. You may use both upper and lower case letters.
Number of conference to clone (leave blank to skip): Sometimes your
conferences may be very similar in configuration with only a field or two in
the configuration screen being different. If you enter a number in this
field, PCBoard will copy the conference settings for a conference and use
them for your new conference. Before the conference is cloned, you are asked
for the Default Conference Location. This is where your MSGS, INTRO, and
NEWS files will be stored for this conference. These are the only files that
will change from the conference that you are cloning. The rest of the file
locations and the settings will be copied from the conference you enter in
this field.
For systems that have a lot of NetMail conferences, cloning conferences can
save a lot of time because the MSGS file location is about the only thing
that is different between each NetMail conference.
Enter the Conference # on which to base the defaults: If you decide not to
clone a conference, you will be asked what conference you wish to base your
defaults on for the new conference. Once you enter the conference to base
your defaults on, you will be asked for the Default Conference Location.
This is the location where all of your conference specific information will
be stored (message base, etc.)
PCBSetup will now proceed to ask you about various file locations in the
conference configuration screen to see how you want them to be configured.
You will first be asked about your Upload definitions. These will specify
information about your public and private upload directories. The following
options are available at this prompt:
1 Copy the default upload paths and DIR file specifications.
The sort method, name/location of the upload DIR file, and
the location of uploads will be copied from the conference
you are basing the defaults on. In other words, the
following fields will be copied:
Sort Name/Loc Upload DIR File Location of Uploads
Public Upld: 0 : :
Private Upld: 0 : :
2 Create new upload paths and DIR files for this conference.
PCBSetup will create defaults for your private and public
upload directories based on what you entered for your Default
Conference Location. For example, if you entered C:\CONF\1\
for your default conference location, your description files
will be stored in C:\CONF\1\, your private uploads will be
stored in C:\CONF\1\PRIVUPLD\, and your public uploads will
be stored in C:\CONF\1\UPLOAD\.
3 Leave the upload path and DIR file specifications blank. If
you select this option, your private and public uploads
locations will be left blank. You would want to select this
option if you did not want to accept uploads in this new
conference.
Next, you will be asked about the following file locations:
DOORS Files: The locations of your door menu and door configuration files.
These are commonly referred to as DOORS and DOORS.LST.
BULLETINS Files: The locations of your bulletin menu and bulletin
configuration files. These are commonly referred to as BLT and BLT.LST.
SCRIPTS File: The locations of your script menu and script configuration
files. These are commonly referred to as SCRIPT and SCRIPT.LST.
DIR File: The locations of your file directory menu and file directory
configuration files. These are commonly referred to as DIR and DIR.LST.
Download Paths File: The location of your download path list file. This
file is sometimes referred to as DLPATH.LST.
For each of these locations, you will be given the following options:
1 Use the default conference definitions directly. If you make
any changes it will affect all conferences sharing the same
defenitions. If you select this option, PCBSetup will store
the same file locations you used in the conference you are
basing the new conference on. Because the new conference and
the conference you based the defaults on will share the same
file, any changes you make in one conference will also be
reflected in the other conference.
2 Copy the default conference definitions into a
conference-specific file which you may then add to or delete
from without affecting any other conference. PCBSetup will
use new files based on your Default Conference Location, but
will copy the data from the files in your base conference.
This way, you can have conference specific files that you may
change freely without affecting the conference you used to
base your defaults on.
3 Start out with an empty conference-specific file which may be
modified without affecting any other conference. PCBSetup
will create new files based on your Default Conference
Location. These files will be empty so you may customize/edit
them to suit your needs.
Once you have answered these questions, you will be returned to the
conference configuration screen where you may fine-tune or edit any of the
fields.
Registering Users In A Conference
There are several methods for registering users in a particular conference.
Some methods will only register one user at a time. Other methods will
register an entire group of users.
Registering A Group Of Users In A Conference
You can register a group of users in a conference at the same time. To
accomplish this, load System Manager. Next, select Users File Maintenance,
followed by Insert Group Conference. You will see the following fields on
your screen:
First number of conferences to be inserted in registrations : 0
Last number of conferences to be inserted in registrations : 0
Adjust conferences user is normally allowed to join : Y
Adjust conferences user can join with expired subscription : Y
Adjust the user selected conferences for scanning : Y
Adjust conferences where user becomes a sysop when joining : N
Reset user's last message read to zero in these conferences : N
Adjust users with a security level greater than or equal to : 0
and less than or equal to : 110
Begin by specifying the beginning conference number followed by the ending
conference number to register the users in. If you want to register the
users in one conference, specify the same number for the first and last
conference number.
Next, you need to determine the conference flags that will be set in the user
record. The following lists the flag that will be set in the user record
based on how you answer the questions in the second section:
R Adjust conferences user is normally allowed to join. If you
put a Y in this field, the R flag will be put in the
conference flag section of the user record. This flag
controls if the user is able to join a particular conference
or not.
X Adjust conferences user can join with expired subscription.
If you put a Y in this field, an X will be placed in the
conference flag section of the user record. When the X flag
is set, the user can join the conference if their
subscription has expired.
S Adjust the user selected conferences for scanning. If you
put a Y in this field, an S will be placed in the conference
flag section of the user record. This means that conference
has been selected for scanning/reading.
C Adjust conferences where user becomes a sysop when joining.
Putting a Y in this field will put the C flag in the
conference flag section of the users file. When users who
have this flag join the conference, they will automatically
be upgraded to the security level specified by the Sysop
Level field in PCBSetup | Security Levels | Sysop Commands.
Finally, you need to specify the security levels that the conference flags
will be altered for. In the first field, enter the lowest security level you
want the flags to be altered for. In the last field, enter the highest
security level you want the flags altered for. All security levels between
the low and high security levels will also have their flags altered.
Registering A Single User Via System Manager
If you need to register just one or two users in a particular conference, the
easiest way to do it is via System Manager. Select Users File Maintenance,
then Edit Users File. You should see your record on this screen. Now press
A-F and type in the name of the user that you want to register in the
conference. Once their record is on the screen, press 2 twice to go into
conference view. You will see the conferences you have configured on the
system with a Flags column next to each conference.
To move between the fields on the screen use the TAB key. When you are in
the Flags field, you can enter any of the flags that were described
previously (R, X, S, and C). To save the new information, press ESC and tell
System Manager that you want to save the changes made to the user record.
Registering A Single User While Online
If you have SysOp security level and you have sufficient security level to
access the 7 command, you can edit almost any user record on the system. See
the SysOp Commands section in the PCBoard Commands chapter of this manual for
more information on the 7 command. First, locate the user record that you
want to edit, then select C to change the current user record. As you step
through the various items, you will see one which says Select Conferences.
You may then select the conference number(s) to register the user in. Once
you have selected the conference(s) you will be asked which conference flags
you would like to set for the user. Simply enter the flags, and press ENTER.
Restricting Access To A Conference
There are five methods you can use to keep a particular user out of a
conference. They are as follows:
User does not have the R conference flag set in their user
record for a private conference.
User does not have sufficient security required to join a public
conference or does not have the R conference flag set.
User does not know the password for the conference if defined in
the conference configuration screen and if the conference is a
private conference.
You have set the L conference flag in the user record to lock
the user out of the conference in question.
The subscription for the user has expired and the X conference
flag is not set for the conference you are restricting them from.
Deleting
PCBSetup does not provide a method for deleting a conference. However, you
can have PCBSetup re-ask you the initial questions for the conference so that
you can re-configure it. To do this, clear out the name of the conference in
the configuration screen by positioning your cursor in the name field and
pressing CTRL-END. Next, press ESC to get back to the conference listing.
Select the conference number that you just cleared the name out of. PCBSetup
will now think that you are configuring a new conference and you can proceed
to answer the questions.
NOTE: You can temporarily disable a conference by clearing out the
conference name or the location of the MSGS file. If a user attempts to join
a conference when either of these fields are blank, they will be told the
conference is an invalid conference.
Sharing Information Between Conferences
A conference has a few fields which give the location for configuration
fields. If you have more than one conference which needs to share the
information the easiest way to do it is to specify the same filenames in both
conference configuration screens.
For example, let's say that you have one conference which has
the following information stored for your BLT and BLT.LST file:
Bulletins : C:\PCB\GEN\BLTMENU : C:\PCB\GEN\BLT.LST
If you want another conference to have the same bulletins available, enter
the same filenames on the second conference. Because both conferences point
to the same configuration files, the information stored in those files will
be shared between the two conferences. When you edit one of the
configuration files, any changes you make will be written to the
configuration files. Any conferences that use these configuration files will
see the changes because they all read from the same files.
You can use this method to share data for any fields in the conference
configuration screens which point to files.
Creating Conference Menu
In order for your users to know what conferences are available on your system
(if any), you need to edit the Name/Loc of Conference Join Menu in PCBSetup |
File Locations | Display Files. This is file is commonly referred to as
CNFN.
This file is a text file which you may edit with the editors you have defined
in System Manager by pressing F2 or F3. You may make the menu look anyway
you wish. As a bare minimum, you should include the conference name and/or
number and a description of each conference. The following is a sample:
# Name Description
--- ------------- --------------------------------------------
1 PARANOID Discussions include paranoia and fears.
The user can join a conference either by typing in the number or the name.
Therefore you do not necessarily have to include the conference number and
name. You could instead, list the conference number or conference name.
You can create this text file using just about any text editor. Better yet,
if you have defined your text editor or graphics editor in PCBSM, you can
simply press 2 or 3 (depending on which file you want to edit). Otherwise
you will have to manually edit the files while at the DOS prompt.
Events
An event is simply a batch file that gets executed during a specific time of
the day. In this event batch file you can do some of the following things:
Pack your users and/or message bases
If you are part of a mail network, you will most likely transfer
mail packets
Some third party products you use on your bulletin board may
need to run utilities to update databases, etc.
Create a list of files on your system using PCBFiler and the
/LIST parameter.
Backup your system
The previous examples are but only a few of the things you can do in your
event. Since events execute batch files, you are more or less limited by
your imagination as far as what you want to run in your event.
Adding An Event
To define the events on your system, you need to go to PCBSetup | Event
Setup. Next, you need to make sure that you have answered Y to the Is a
Timed Event Active question.
Finally, if you cursor down to the EVENT.DAT line and press F2 you will a
screen that resembles the following:
The number to the left of each line is the event number that is being
defined. The rest of the fields on the screen are as follows:
Act You may enter either a Y or an N in this field. A Y signifies
that the event is active and should be executed as configured.
If you enter an N then the event will be considered inactive
and will not be run as defined.
Mod The mode of the event. You may enter either an E or an S in
this field. If you enter an E, the event is a "rigid" or
non-sliding event. If you enter an S as the event type, the
event is referred to as a sliding event.
If an event is an expedited or non-sliding event, PCBoard will
make its best attempt to execute the event at the time you
specify as the beginning time even if it means cutting users
time short.
Batch File In this field, specify the batch file you wish to execute for
the event you are defining. Note that you are only given 8
characters for the batch filename. The reason for this is that
by default this batch file will be run on all nodes. However,
you can make node specific batch files by making the node
number the filename extension. For example, if you entered a
batch file of DAILY and you want node 5 to execute a different
batch file, create a DAILY.005 file in the same directory where
the DAILY file is located.
Begin Time In this field, enter the earliest time that you want your event
to run. The time you enter in this field must be in 24 hour
format and there must be a colon between the hour and minutes.
End Time The end time is the latest possible time you wish for the event
to run. If the event has not run by the time you enter, the
event will be skipped.
Days You may also control which days the event you are defining is
run on. In this field all seven days of the week are listed
beginning with Sunday and ending with Saturday. Simply enter
either a Y or N which signifies whether you want to run the
event on the day listed or not.
Date This field enables you to specify the dates PCBoard will run
the event. For example, if you want the event to run on the
first day of every month, enter a date of 00-01-00. Entering a
00 signifies a wildcard. Using the previous example, this
means it would run for any month, and any year, but only when
the day of the month is equal to 01. Another example would be
to set the date to 07-04-00. This means the event would run
every July 4th, no matter what the year is.
Last Date Contains the date the event was last run on the node number
specified in PCBSetup | Node Configuration. Not all events run
system- wide - therefore, this field only contains the last
date ran for the node you are currently editing.
As an example, let's say you want to have an event that runs at 3:00am every
morning and packs your message bases. The first step would be to edit your
EVENT.DAT file in PCBSetup | Event Setup.
First, place Y in the Act column, because this is an active event and you do
want it to run. Next, place an S in the Mod column because you would like
for this event to run at 3:00am but you would not mind waiting for a caller
to logoff before running the event.
Next, you need to enter a batch filename. For lack of a better name you can
enter PACKMSGS as the batch filename. Now you must enter the earliest time
that you wish for the event to run. As outlined earlier, you want this event
to begin at 3:00am so you would enter 03:00 in this column. If the latest
that you want the event to run is 08:00am, you would need to enter 08:00 in
the End Time column.
Finally, you need to specify the date and days that the event will run. If
you leave the Date column blank or filled with 00-00-00 it will run for every
day of the week that you specify in the Days columns. Because the event will
pack the message bases, you probably want it to run every day of the week so
put a Y in every day of the Days column. Once you have done this you will
have an entry which looks like the following:
Batch Begin End Last
Act Mod File Time Time SMTWTFS Date Date
--- --- -------- ----- ----- -------- -------- -------
1) Y S PACKMSGS 03:00 08:00 YYYYYYY 00-00-00 00-00-00
Next, you need to create the actual batch file that will execute
your event. In actuality, this is very easy to do. Simply highlight the
batch file field you want to edit and press F2. Your default text editor
defined in System Manager | Define Text & Graphics Editors will be used to
edit the batch file.
For example, your batch file might look like this:
PCBPACK /AREA:ALL /MAXMSGS:1024 /PURGE
BOARD
This batch file simply runs PCBPack on all message bases. Once the message
bases have been packed, BOARD.BAT is reloaded which will make the system once
again available for callers.
By default this event will run on every node of the system. Obviously this
would not be a good idea to have every node packing the message base at the
same time. What you should do is rename your batch file to make it a node
specific event batch file. For example, to make this batch file run on node
3 only, rename the batch file from PACKMSGS to PACKMSGS.003. Adding the .003
to the end of the filename, tells PCBoard it is a node specific file and only
node 3 should run the event.
Multiple Nodes
Frequently you will need more than one node to participate in an event.
Whether you want each node to perform a particular task, or if you need all
nodes to be down, it is important to understand how to control your events.
Node Specific Events
Most likely you do not want all of your nodes to run the event batch file.
You may have one node that does all of the work while the others wait or do
other tasks. In the EVENT.DAT file, specify the base event batch filename.
This is the batch file that will be executed for all nodes unless there is a
node specific event batch file.
To create a node specific event batch file, create a file with the batch
filename and an extension of the node number. For example, if your event
batch file is called MAINT1 and if you want to make a batch file that only
node 6 will execute, create a batch file called MAINT1.006.
When event time rolls around, all of the nodes except node 6 will run the
event using the MAINT1 file. Of course, node 6 will use the MAINT1.006 file.
If you wanted only node 6 to run the event and the other nodes to not even
both going down for the event, create the MAINT1.006 file and then delete the
MAIN1 file. Since the other nodes would not have a batch file to execute,
they will not execute the event.
Making Sure All Nodes Are Down
To perform global changes to the system such as sorting the user file, or
doing a total backup of your system, you will need all of your nodes to be
down. Perhaps the easiest way to accomplish this is to have your nodes
simply run a program as they begin the event that will count for a certain
amount of minutes or seconds while the event is running. When the nodes are
down counting, they can then reload the board.
As an example, let's assume that you are operating a three node system. You
want node 1 to sort the users file. In order to do this, nodes 2, and 3 must
not be operating. Quite simply, you create a node specific event file for
node 1. If your event batch file is called USRSORT then you would create an
event file called USRSORT.001. This batch file might look like the
following:
@ECHO OFF
PCBSM /SORT;SECURITY;PRIREVERSE
BOARD
In your testing, you have found out that it takes about 4 minutes to complete
the sorting process. Therefore, you need to make sure that the other nodes
stay down for a bare minimum of 4 minutes. Just to be safe, you could even
keep them down for 10 minutes or so because the time it takes to sort the
file will increase as the number of users on your system increases.
You should be able to find several utilities will count for seconds or
minutes on the PCBoard Support BBS. For example, if you found one called
Count which counts for the number of seconds specified, make your USRSORT
batch file look like the following:
@ECHO OFF
COUNT 480
BOARD
Quite simply, this would make nodes 2 and 3 (because a USRSORT.002 or
USRSORT.003 file was not found) count for 480 seconds and then reload the
bulletin board. This should give more than ample time for the sort process
to be completed.
There are several other methods you can use to make sure all events are down
and stay down. Most of these have been addressed by third party authors and
are available on the PCBoard Support BBS by using the Z user command and
searching for EVENT.
System Security
An integral part in operating a bulletin board system is the security of the
system. You need to be able to control what actions or commands a user can
execute based on their security level. In fact, you should use security
levels to determine what a user can do while online.
Protecting SysOp Related Commands
If you allow unauthorized users to access SysOp related commands they could
do a great deal of damage to your system. That is why it is so important
that you properly protect these commands with a security enabling only
authorized users access to the SysOp commands.
Some commands can be more dangerous than others if put in the wrong hands.
Therefore, PCBoard enables you to specify the security level required to
execute each SysOp related function. A command like the 11 which displays
information about the callers currently online would not be as dangerous as
the 9 command which enables you to drop to DOS from remote. Careful planning
of your SysOp security levels and making sure you trust the users whom you
give access to is the best way to prevent unauthorized users from accessing
sensitive commands.
There are two sections in PCBSetup that you will use to determine the
security levels that protect SysOp commands and functions. These sections
are found by selecting Security Levels from the Main Menu of PCBSetup. From
there you can choose to define security levels for SysOp Functions or SysOp
Commands
Defining Which User Is The Main SysOp
The user in record #1 of the USERS file is considered to be the Main SysOp.
This record has certain privileges that are not associated with any other
record. For example, when you select Sysop - Busy or Sysop - Not Busy from
the call-waiting screen the user in record #1 is logged into the system.
In addition, the user in record #1 is the only user that can join a
conference even if they are not registered in the conference or do not have
sufficient security to join the conference.
Protecting SysOp Accounts
There are no back-doors which users can log into PCBoard and gain SysOp
access. The only way a user may log in using a SysOp account is to know the
name of the account to log in under and the password for that account.
Therefore, it is very important for you to change your password frequently to
prevent an unauthorized user from hacking your account.
To prevent users from knowing the name of the user in record #1 of the USERS
file, you can answer N to the User Real Name question in PCBSetup | Sysop
Information. If you do this, you will simply be known as SYSOP on the BBS.
Any messages that you enter on the system will be from SYSOP and when a user
displays who is online you will be listed as SYSOP.
You could then have a different name in record #1 of the USERS file which
means that a user attempting to hack your account would need to know two
items of information -- your user name and your password. To prevent a
breech in security, PCBoard will not allow a user to login with a user name
of SYSOP.
Protecting Files For Download
PCBoard provides a method to protect any filename that is available for
download by security level, password or both. This protection is done via the
FSEC file which can be edited from PCBSetup | File Locations | Configuration
Files. If you have sensitive files online, you should use the FSEC file to
protect those files. As an example, if you want to protect the filename
SENS0001.ARJ so only users with a security level greater than 100 and those
that know the password can download it, make an entry like the following in
your FSEC file:
Drive \ Path File Name Sec Password
-------------------------------- -------------- ----- --------------
SENS0001.ARJ 100 ENTER_THISPW
The FSEC file is discussed in more depth in the PCBSetup chapter of this
manual.
Protecting Files From Being Uploaded
PCBoard also provides a method to protect files from being uploaded to the
system. Uploading files does not usually present a problem to system
security however PCBoard still provides the capability. This protection is
done via the UPSEC file which can be edited from PCBSetup | File Locations |
Configuration Files.
A good example would be if you were just informed that a file called
VIRALM33.LZH contained a virus and was being distributed around your area.
To protect this file from being uploaded, you could make the following entry
in your UPSEC file:
Drive \ Path File Name Sec Password
-------------------------------- -------------- ----- --------------
VIRALM33.LZH 255
With this entry a user must have a security level of 255 or higher in order
to upload the VIRALM33.LZH file to your system. Since it is quite likely that
not many users have a security level of 255 on your system, it would be safe
to assume that the file could not be uploaded to your system. The UPSEC file
is discussed in greater detail in the PCBSetup chapter of this manual.
Maintenance Tasks
Once you have more or less finished your system configuration, the majority
of your time will be spent maintaining your system. You will need to answer
questions and comments left to the SysOp, pack your message base and user
files, back-up your system in case of data loss, etc. The following section
describes various examples of maintaining your system.
File Maintenance
If your bulletin board system encourages file transfers, you will most likely
have a lot of uploads to your system. You may want to use PCBFiler on a
regular basis to move the files in the upload directories to one of the file
directories you have defined. By regularly moving the new files out of the
upload directories, it will be easier for your users to find the files they
are looking for.
Log Maintenance
PCBoard uses two system log files to record activity on the system.
The caller log files record items of interest that occur while a user was
logged into the system. The time the user logged in and logged out is
recorded. In addition, events such as joining a conference, transferring a
file, and entering a message are also recorded. If a user tries to access a
command that is not available to them, it is also recorded in the log file to
help keep you informed of possible breeches in security.
The DOWNLOAD.TXT file stores information about every transfer (both uploads
and downloads) on the system. Each line in this file stores the name of the
file, the user who transferred the file, transfer speed, size of the file,
and number of errors.
If you do not delete or archive these log files frequently you may find that
your drive space is being eaten up unnecessarily. On a daily, weekly, or even
monthly basis, you may want to delete or archive these log files in one of
your events.
Packing files
Both your USERS file and your message bases should be packed on a regular
basis to help ensure data integrity and also to physically remove any
unwanted entries or those which have been marked for deletion.
Users File
You can pack in interactive mode by loading System Manager and selecting
Users File Maintenance. However, most SysOps elect to pack the users file
during a daily event instead. System Manager provides command line
parameters that you can specify to pack the USERS file. For example, to
simply pack the file and ensure data integrity you may issue the following
command:
PCBSM /PACK
You may choose to pack-out or delete any user which has not called the system
within the last 90 days. In this case, you would issue the following command:
PCBSM /PACK;DAYS:90
For more information on the command line parameters for System
Manager see the Command Line Parameters section in the System
Manager chapter of this manual.
Message Bases
If you have a lot of conferences on your system, you probably also have a lot
of active message bases. In that case, it becomes essential that you pack
the message bases down on a regular basis to prevent your message bases from
taking too much space. Like the USERS file, most SysOps elect to pack the
message bases in the events. You must use a program called PCBPack to pack
your message bases -- this program is included with your purchase of PCBoard.
To help keep the size of your message bases down, you can choose to pack all
of your message bases so that no message base contains more than 500
messages. This is very easy to accomplish by entering the following:
PCBPACK /AREA:ALL /MAXMSGS:500
You may choose to pack only messages older than 45 days by entering the
following command:
PCBPACK /AREA:ALL /DAYS:45
PCBPack has several other options available as well. See the Utilities
chapter of this manual for additional details.
Backing Up
Most bulletin board systems will contain several megabytes or gigabytes of
data. Therefore, it always wise to have some sort of backup system in place
so you can regularly back up your system in case of data loss, hardware
failure, etc.
While you do not have to back up your system every day, it certainly would be
a good idea to do a backup every other day, or perhaps once a week. Sooner
or later, you will probably experience some sort of data loss where you need
to access a backup to restore files.
New Users
Whenever users who have not established an account on your system logsinto
your system, they will become a new users to your system. When the user
enters a name not in the current user file, PCBoard will ask to confirm if
their name is correct. If the name is correct, the user will be logged in as
a new user. First of all, the NEWUSER will be displayed (as defined in
PCBSetup | File Locations | Display Files). This file usually contains an
introduction to your system.
Once that information is displayed, the user is asked if they wish to
register. If they choose to register, they will be asked to fill out some
additional questions in order to become a registered user on the system.
Asking Questions
PCBoard begins by asking for the following information:
Password
City/State
Business/Data Phone
Home/Voice Phone
Brand of CPU
Clear Screen Between Messages
Default Protocol for File Transfers
The answers to these questions are stored in the user file record. The
answer to the Brand of CPU question is stored in the Comment #1 field.
All of the above questions are records in the PCBTEXT and may be configured
to ask any question you wish. However, the location of where the answers are
written cannot be changed. If you want to disable some of the questions,
blank out the appropriate record in your PCBTEXT file using MKPCBTXT.
Defining Security Level
There are two security levels whch come into play for new users to your
system. The security level of the new user depends on if they choose to
register or not. If you look at PCBSetup | Security Levels | User Levels you
will see the following fields:
Level Given to Users Who Agree to Register :
Level Given to Users Who Refuse to Register :
You can specify the security level that users get when they agree or refuse
to register. When a user agrees to register, a new record in the user file
is created. However, when they refuse to register, no user record is
created.
By default the security level given to users who refuse to register is 0.
This means that if the user refuses to register they will be immediately
logged off of the system. You may want to change this value to another
security if you wish to enable new users to look around the system without
creating an account on your system.
Defining Expiration Date
If you have enabled subscription mode on your system, PCBoard will assign new
users the value you have entered for the Default Subscription Length in
PCBSetup | Subscription. If you have not enabled subscription mode, your new
users will have an expirate date of 00-00-00 which means their accounts will
never expire.
The Default Subscription Length is in days and you can enter any value up to
9999 in that field although something like 365 may be more reasonable.
Disallowing
If you do not wish to allow new users to your system, there are two ways you
can accomplish this setup:
In PCBSetup | Configuration Options | System Control set the Run System as a
Closed Board to Y. If you do not have a NEWASK questionnaire defined, when
the user attempts to log in as a new user they will be shown the CLOSED file
which explains that your system is a closed system.
If you do have a NEWASK questionnaire defined, the user will be allowed to
continue and fill out the NEWASK questionnaire. However, no user account is
created. You would want to use this type of system if you want to screen
your new users and manually add them to the user file after they answer some
questions.
Modify the security level entry that you assign to new users who agree to
register. Set the time limit for that security level to 0. Any new user
that attempts to call the system will be displayed the CLOSED file and
promptly logged off. This will occur even if you do have a NEWASK
questionnaire defined.
User Subscriptions
You may desire your users to have access to your system for a specified
amount of time after which their security level will be dropped. The users
can then follow further instructions to gain access again. This is called
subscription mode.
You can assign a date in the user record after which the user will become
expired. When the user is expired, their security level is dropped to their
expired security level. By dropping their security level, you can perhaps
reduce the commands or functions they can access when they logon the system.
Enabling Subscription Mode
Enabling subscription mode is very easy. Load PCBSetup, and select
Subscription from the Main Menu. The first option on the screen asks if you
wish to enable subscription mode.
If you enable subscription mode, PCBoard will pay attention to the expiration
date and will also assign the default expiration length to all new users who
call into the system.
Setting Expiration Date
When you enable subscription mode, new users will be assigned the default
expiration length. However, you may have existing users on the system who
logged in before you enabled subscription mode. This is one reason you may
need to manually set the expiration dates. Another reason you may need to
manually set expiration date is when your users expire and follow the
instructions you provide them to renew their subscription
Manually Entering Expiration Date
If you need to manually edit the expiration date of a user so it is a
non-expiring account, load System Manager, select Users File Maintenance,
then Edit Users File. You will now see record number one on your screen.
Next, locate the user name you need to update by pressing ALT-F. Cursor down
to the expiration date field and type in the date the user will expire. If
you enter 00-00-00, the user will be set to never expire.
Group Security Levels
Sometimes you may need to modify the expiration date of an entire group of
users. Within System Manager there is a function which allows you to change
the expiration date of users based on their security level.
To access this function you need to load System Manager, select Users File
Maintenance and then select Adjust Expiration Dates. Your screen should
resemble the following:
If you want to adjust everyone with a security level between 20 and 30 to an
expiration date of 05-05-94, modify the following fields:
Base Security Level Criteria on NORMAL or EXPIRED Level (N/E) : N
Adjust Expiration Date if level is Greater than or equal to : 20
Adjust Expiration Date if level is Less than or equal to : 30
New Expiration Date (01/01/80 is ignored) : 05-05-94
Current Date in record plus XXXX days : 0
Once you press PgDn, all users with a security level between 20 and 30 will
be assigned an expiration date of 05-05-93.
Setting Expired Security Level
If the expiration date in the user record is equal to or prior to the current
date, the user is considered expired and will be given the expired security
level as shown in the user record by the following field:
Expired Sec :
When a new-user logs into the system, they will be given the default expired
security level as defined in PCBSetup | Subscriptions. If you would like to
assign a different expired security level to a user, you will need to
manually edit the expired security field in the user record.
Warning Users Who Are About To Expire
Another option you can configure within PCBSetup | Subscription is the number
of days prior to expiring that users will be warned. For example, if you set
this value to 30 and a user is due to expire on 03-31-94 a notification of
expiration will be displayed from 03-01-94 all of the way up until the
expiration date.
PCBoard provides a file called WARNING which may be edited in PCBSetup | File
Locations | Display Files. This is a display file which you can customize to
suit your own tastes. As described in the Customizing Your BBS chapter of
this manual, you can make security, language, and graphic specific versions
of this file because it is a normal display file.
Notification Of Expiration
If a user has expired, PCBoard will display the EXPIRED file. This file
location can be found in PCBSetup | File Locations | Display Files. Like the
WARNING file, you can make security, graphic, and language specific versions
of this file.
Modem Discussions
Most likely, the majority of your logins will be via modem connection.
Therefore, it is to your advantage to have a general knowledge of how serial
ports work. This section is dedicated to lightly cover some of the more
advanced serial port topics to help answer many common questions.
Serial Port Hardware
PCBoard supports a wide variety of serial port software. Not only does it
work with standard RS-232 serial port hardware but also with many intelligent
and non-intelligent serial boards. Of course, to use the intelligent or
non-intelligent serial boards, you will need to be using the /M version of
PCBoard so it can properly access the serial port hardware.
Standard RS-232
This type of serial board is the one that is installed in most computers when
you originally buy them. Until the advent of the /M version of PCBoard,
these were the only type of serial ports you could use with PCBoard.
Non-intelligent Serial Board
This type of serial board is quite similar to the standard boards except all
of the serial ports share the same IRQ. With standard serial ports each has
to have a unique IRQ. To use these serial ports with PCBoard you need to use
the /M version.
Intelligent Serial Board
Perhaps the most proficient and consequently most expensive serial port
hardware that you can buy is an intelligent serial board. These boards
usually have at least 4 ports on a single card, but could easily have 16
ports as well. To help off-load some of the CPU processing, the board
includes its own processor. The Arnet SmartPort Plus and the DigiBoard
COM/xI boards are examples of intelligent serial boards that are supported by
the /M version of PCBoard.
The Importance Of Flow Control
Serial communications is a two-way street. You send data and you also
receive data. Therefore, it becomes important to have some sort of control
in regards to the flow of data. This is where flow control comes into play.
What Is Flow Control?
Flow Control simply controls the sending or receiving of data. If one end of
the connection can no longer send or receive data, the proper signal should
be sent to signify that no more data should be received or sent. There are
two types of flow control -- software and hardware.
Software Versus Hardware Flow Control
Software flow control is commonly referred to as XON/XOFF flow control. With
software flow control, control characters are sent to signify that data
transfer should stop. For example, sending a CTRL-S will stop the flow of
data and CTRL-Q will restart the flow. The problem with software flow
control is that it is very easy for these characters to accidentally be
transmitted due to line noise or to be embedded inside of a perfectly valid
binary file.
Hardware flow control, on the other hand, is handled by the RS-232 (serial
port) specification. The cable between your modem and your serial port has
several wires inside of it. Two of these wires are labeled CTS and RTS.
These wires can either be "up" or "down" (referring to their electrical
state). The state of these wires, determines how the flow of data is
controlled.
Why Hardware Flow Control Should Be Used
Both your hardware and your software should be configured to use hardware
flow control. In fact, hardware flow control is a necessity when you lock in
your port rate or transfer using Ymodem/G. If you are not using flow control
or it is not working properly, it is quite possible for you to experience
data loss.
UARTs
What is a UART
The UART (Universal Asynchronous Receiver Transmitter) is a chip on most
serial boards and is used to input and output data from the serial device.
NOTE: Intelligent serial boards do not have UART chips. Instead, the
multiport driver will communicate directly with the CPU on the serial board.
Types of UARTs
There are three basic types of UART chips with each chip being identified by
a unique number. One of the first UARTs was the 8250 UART. It was replaced
with the 8250A which fixed some bugs with the original 8250 UART. Both the
8250 and 8250A are capable of handling one byte at a time.
Around the time when the original PC AT was introduced, the 16450 UART was
also introduced. This chip was better designed for the faster architecture
of the AT. Each type is determined by their part number. Although it
handled the speed of the AT fine, the 16450 still handled data one byte at a
time.
In the late 1980's, the 16550 UART was introduced. This chip, while
compatible with the 16450, also included the ability to handle more than one
byte at a time via its 16 byte buffer. This buffer helps prevent data loss
because more than one byte can be handled at a time. Some bugs were
discovered in the original design and subsequent versions of the chip were
released. If you have a 16550 UART, make sure that it is either the 16550A
or 16550AFN model to ensure proper operation.
Determining What UART(s) You Have
Most good system diagnostic utilities will have some way or reporting the
type of UART you have for each port. If you do not have any diagnostic
utilities, PCBoard will report the UART that it finds in your system via the
status line. You need to first load PCBoard, then select Sysop - Not Busy.
At this point, you can press ALT-H four times and you will see your status
line change to something like the following sample:
Towards the bottom right-hand side of the status line you see the UART model
(next to the ErrCorr field. You will then know what model UART PCBoard has
been able to determine that you have. Typically you will see either
8250A/16450 or 16550A.
Locking Opening Baud Rate
High-speed modems (9600 bps or higher) are very popular on bulletin board
services. Additionally, most of the modems being sold now have built in
error-correction and data-compression. To get the highest transfer rate out
of your connections, you must lock your port speed. While your modem may be
only able to connect at 14400 bps, you can lock your port rate at 19200,
38400, or even 57600 bps. As a matter of fact, PCBoard will automatically
lock the port for you at any speed above 9600 bps.
Advantages
By locking your port rate, you can give data to the modem faster rather than
having the modem wait on the computer to send more data. This usually
translates to higher transfer rates and is most noticeable when you are
sending uncompressed data over the modem (such as a text file).
In reality, PCBModem should configure your modem to operate properly under
PCBoard. Therefore, you really do not need to worry about setting up either
PCBoard or your modem to work with a locked port rate, as PCBModem will do
that for you if your modem supports it.
Troubleshooting
The most common problem with locked port rates is that you have only
configured either the modem or the software (but not both) to use a locked
port rate. What happens in this case is that users will get a line of
characters on their screen which looks like garbage. In fact, the user will
not be able to type anything either. If you see this type of problem, double
check and make sure both your modem and your software are configured to use
locked port rates.
Line Noise
Line noise will always be around as long as modems are in use. Modems convert
computer data into audio signals. Anytime there is interference with the
audio signals it will generate line noise because the signals have been
modified by interference.
Non-Error Correcting Modems
If your modem is not an error-correcting modem, line-noise will be displayed
on your screen. This happens because your modem does not know the
interference is line noise. Quite simply, the modem is translating the audio
signals that it received back into computer data. If something interferes
with these signals, you will see the interference as line noise when the
modem translates the audio signals back into data.
Error Correcting Modems
Error correcting modems packet the information they send out so when the
receiving modems receive the packets, they can check to insure the data is
the same as it was sent out. If the data is not the same, the packet will be
resent until it is properly transmitted. Of course, this means there will be
a delay on the receiving end until the packet is received properly. The
length of this delay could be un-noticeable or it could be quite noticable
depending on how many times the packet must be resent.
Nearly always when you see jerky screens, pauses, or your file transfer rates
are noticeable slower it can be attributed to line noise. About the only
thing that you could do in this case is to hang up and call back hoping to
get a clearer line.
Searching for Text
Throughout this manual you have seen references to searching for text and the
fact that PCBoard supports Boolean operands. This section discusses how you
enter the text to search for when you are at the Enter the Text to Scan for
(Enter)=none prompt.
To begin with, you will be shown how to do some simple searches. From there,
you will be shown how to do some more complex searches that involve Boolean
operands.
Simple Searches
Single Word
The simplest search you can perform is the single word search. You enter the
word to search for and PCBoard will search the criteria you have specified
for that word. For example, if you are using the Z command, the file
directories will be searched. If you are using the TS command, the message
base will be searched.
For example, you may wish to search all messages in the current conference
for the word monitor. If so, type the following at a conference command
prompt:
TS ENTER
Enter the Text to Scan for (Enter)=none? monitor R
Msg # to Begin Search from (1052-3904)? 1 R
At this point, the search begins for the word monitor. PCBoard will display
any message that has the word monitor in it. While searching, PCBoard does
not pay attention to the case of the word so it can be either upper or lower
case and it will still be found.
Phrase
Taking the single word approach one step further, you can search for a phrase
that consists of one or more words. If you find that searching for monitor
finds to many matches and consequently was not being effective, you may
decide to search for something more specific like vga monitor instead. This
may help reduce the number of matches and help find the messages you are
after. This time, type the following at the conference command prompt:
TS <ENTER>
Enter the Text to Scan for (Enter)=none? VGA monitor <ENTER>
Msg # to Begin Search from (1052-3904)? 1 <ENTER>
At this point the search will begin again. However, this time, only messages
which have the word VGA immediately followed by the word monitor will be
displayed. When the message is displayed to you, PCBoard will highlight the
match (f your graphics mode allows)so you can see where the match occurs.
Complex (Boolean) Searches
Boolean operands allow you to perform more complex searches than you would be
able to perform searching for a word or phrase. With Boolean operators you
can tell PCBoard to display a match only if it meets certain conditions you
specify.
An expression is made up of an operator which acts on one or more operands.
With text searches, your operators are the Boolean operators. The operands
are the word or phrases you are searching for. Do not over-burden yourself
trying to remember the difference between operands and operators as you will
find that the examples in this section will help you better understand the
concept of Boolean text searching. The following discusses each of the
Boolean operators.
& - The And Operator
The Boolean AND operator enables you to search in disjointed mode. In other
words, both operands must exist in the target (message, file description,
etc.) but they do not have to be in consecutive order. To help illustrate
this, let's say you attempt to search for text editors that may exist on the
system.
Because you have no idea what the filename is, you decide to use the Z user
command to search for text in the file directories. When prompted for the
text to search for, you enter text editor because that is what you are
looking for. From there you begin the search which may list a fewprograms
that may interest you.
The problem with this type of search is that you may have missed some files
because you told PCBoard to find anything that had the text editor phrase in
the description. What you may discover later when viewing file directories
is the following file description:
TXED100.ZIP 168046 12-28-93 TexEdit v1.00 -- Utility you can use to
| edit any text file. Supports VGA text
| mode. Includes mouse support.
Obviously, this looks like a file that you would be interested in. Why did
this description not show in your previous search? Quite simply, nowhere in
the description is the phrase text editor contained. Obviously your previous
search is not catching all of the files you want to find.
This is not only where the Boolean AND operator becomes useful but also where
it makes sense. If you had to sum up what you were looking for, you may say
any file that can edit text. The italicized words are the key. You want to
find any description which has both the word text and the word edit somewhere
in the description. You do not know if the description will say something
like "A utility to edit text" or if it will say "a wonderful text editor".
Therefore, enter the following expression to search for:
TEXT & EDIT
The & in the search string represents the Boolean AND operator. If your
translate the & into the actual word and it makes even more sense. This
search would mean that you are searching for text and edit to be in the same
description. It does not matter in what order, just simply that they occur
in the description to become a match.
You can have as many Boolean operands as you wish in your search string. For
example, you can enter the following search:
DISK & FORMAT & FLOPPY
This would search for the words DISK, FORMAT, and FLOPPY must all occur in
order for a record to match.
| - The Or Operator
Like the Boolean AND operator, this operator enables you to search in
disjointed mode. With this operator only one of the words or phrases need to
be in the target (message, file description, etc.) to be considered a match.
As an example, you may wish to search the message bases using the TS user
command for any message which talks about hard drives. You remember that
some people call them hard drives and others may call them hard disks. In a
case like this, use the OR operator to find any message that matches either
phrase. Type the following Enter the Text to Scan for (Enter)=none prompt:
HARD DISK | HARD DRIVE
Any message that contains either the phrase hard disk or the phrase hard
drive will be displayed to you.
! - The Not Operator
Sometimes you may not want to display all matching records. Instead, you may
want to search all records which do not match the text you enter to search
for. This is precisely the user of the Boolean NOT operator.
For example, you may want to search a directory that contains a bunch of GIF
graphic images. All of the descriptions in this directory contain the
resolution of the file. You decide that you do not wish to see the
description of any pictures which are 320x200. If this is the case, type the
following at the Enter the Text to Scan for prompt:
! 320x200
Any description which contains the phrase 320x200 will not be displayed to
you because of the Boolean NOT operator ( ! ). Continuing on with the GIF
examples, let's assume you want to see all pictures on the system that have a
resolution of 1024x768 but you do not want to see any files that have swim in
the description. If so, enter the following:
1024x768 &! SWIM
If you read that out in English it says 1024x768 and not SWIM. This would
display all file descriptions that have a 1024x768 in the description
(denoting the resolution of the picture) and that do not have the word SWIM
anywhere in the description.
Using Parentheses To Group
Remember in mathematics how you used parentheses not only make your problems
clearer and easier to understand but more importantly to control the order of
operations to suit your needs? With Boolean operators you can do the exact
same thing. If you take the example that illustrates using the AND Boolean
operator one step further you can easily see how parentheses help group
things together.
If you recall, you were using the AND operator to search for any description
which contains both the words TEXT and EDIT. What happens if someone chooses
to use the word ASCII instead of TEXT when they enter their description? To
help you find this description, you can use parentheses to group items
together. This may result in the following search string.
EDIT & (TEXT | ASCII)
This will tell PCBoard to find any description that contains the word edit,
and either the word text or the word ASCII. If you don not use the
parentheses, PCBoard will evaluate from the left to the right. This means
that it would only display files that contained both the words EDIT and TEXT
or the word ASCII.
While it appears to be a very subtle difference, parentheses can make or
break your search. Remember the easiest way to do Boolean searching is to
read out the search in English. If you look at the previous example which
uses parentheses you could read it as follows:
EDIT and either Text or ASCII.
Including The Boolean Characters In Your Search
If you need to include any of the following characters in your search, use
quote marks to prevent them from being interpreted by PCBoard's searching
routine:
&
|
!
(
)
[space]
Obviously, these characters all have special meanings when involved in a
search so you need some way of specifying them. For example, you may want to
search for the phrase SMITH & JONES. If you type that phrase in as-is, the
search will turn up anything with the word SMITH and the word JONES. What
you would do in this case is to simply surround then entire search phrase
with quote marks as illustrated in the following:
"SMITH & JONES"