home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Beijing Paradise BBS Backup
/
PARADISE.ISO
/
software
/
BBSDOORW
/
RA111DOC.ZIP
/
RA.DOC
< prev
Wrap
Text File
|
1992-01-25
|
306KB
|
8,176 lines
┌─────────┐┌───────┐ ┌────────────┐┌──────────┬───────────┬───────┐
│ ┌───┐ ││ ┌───┘ │ ┌─┐ ┌─┐ ││ ┌───┐ ├────┐ ┌───┤ ┌───┘
│ │ │ ││ └───┐ │ │ │ │ │ ││ │ │ │ │ │ │ └───┐
│ └───┘ └┤ ┌───┘ │ │ │ │ │ └┤ │ │ └┐ │ └┐ │ ┌───┘
│ ┌────┐ │ └─────┤ │ │ │ │ │ └───┘ │ │ │ │ └─────┐
│ │ │ │ │ │ │ │ │ │ │ │ │ │ │
└──┘ └──┴─────────┴──┘ └──┘ └───┴───────────┘ └───┘ └─────────┘
┌──────────┬──────┐ ┌──────┐ ┌───────┐ ┌───────┐ ┌───────┐
│ ┌───┐ │ ┌──┘ │ ┌──┘ │ ┌───┘ │ ┌───┘ │ ┌───┘
│ │ │ │ │ │ │ │ └───┐ │ └─────┤ └─────┐
│ └───┘ │ │ │ │ │ ┌───┘ └─────┐ ├─────┐ │
│ ┌────┐ │ └────┤ └────┤ └─────┬─────┘ ├─────┘ │
│ │ │ │ │ │ │ │ │
└──┘ └──┴────────┴────────┴─────────┴─────────┴─────────┘
RemoteAccess 1.11
(C) 1989-92
Andrew Milner and Continental Software, All Rights Reserved
TABLE OF CONTENTS
────────────────────────────────────────────────────────────
PREAMBLE AND CREDITS . . . . . . . . . . . . . . . . . 2
OVERVIEW AND FEATURES . . . . . . . . . . . . . . . . . 3
LICENSING INFORMATION . . . . . . . . . . . . . . . . . 5
HOW TO REGISTER . . . . . . . . . . . . . . . . . . . . 6
SHAREWARE version . . . . . . . . . . . . . . . . 6
PROFESSIONAL version . . . . . . . . . . . . . . . 7
REGISTRATION FORM . . . . . . . . . . . . . . . . 8
The key system . . . . . . . . . . . . . . . . . . 9
PRODUCT SUPPORT . . . . . . . . . . . . . . . . . . . . 10
Australia . . . . . . . . . . . . . . . . . . . . 10
USA and Canada . . . . . . . . . . . . . . . . . . 10
Europe and others . . . . . . . . . . . . . . . . 11
Support conferences . . . . . . . . . . . . . . . 13
INSTALLATION . . . . . . . . . . . . . . . . . . . . . 14
CONFIGURATION . . . . . . . . . . . . . . . . . . . . . 16
RACONFIG . . . . . . . . . . . . . . . . . . . . . 16
System . . . . . . . . . . . . . . . . . . . 16
PATHS . . . . . . . . . . . . . . . . . 16
SITE INFO . . . . . . . . . . . . . . . 16
ADDRESS . . . . . . . . . . . . . . . . 16
SECURITY . . . . . . . . . . . . . . . . 16
Options . . . . . . . . . . . . . . . . . . . 17
MESSAGES . . . . . . . . . . . . . . . . 17
FILES . . . . . . . . . . . . . . . . . 20
RESTRICTIONS . . . . . . . . . . . . . . 21
ERRORLEVELS . . . . . . . . . . . . . . 21
DISPLAY . . . . . . . . . . . . . . . . 22
COLOURS . . . . . . . . . . . . . . . . 22
PAGING . . . . . . . . . . . . . . . . . 23
NEW USERS . . . . . . . . . . . . . . . 24
SYSTEM . . . . . . . . . . . . . . . . . 26
PROMPTS . . . . . . . . . . . . . . . . 29
PRINTER . . . . . . . . . . . . . . . . 29
Modem . . . . . . . . . . . . . . . . . . . . 30
OPTIONS . . . . . . . . . . . . . . . . 30
COMMANDS . . . . . . . . . . . . . . . . 31
RESPONSES . . . . . . . . . . . . . . . 32
Manager . . . . . . . . . . . . . . . . . . . 33
MESSAGES . . . . . . . . . . . . . . . . 33
FILES . . . . . . . . . . . . . . . . . 36
INTERNAL PROTOCOLS . . . . . . . . . . . 38
EXTERNAL PROTOCOLS . . . . . . . . . . . 38
LANGUAGES . . . . . . . . . . . . . . . 43
ALT-Fn KEYS . . . . . . . . . . . . . . 45
EVENTS . . . . . . . . . . . . . . . . . 45
MENUS . . . . . . . . . . . . . . . . . 46
USERS . . . . . . . . . . . . . . . . . 46
CTL FILES . . . . . . . . . . . . . . . 46
COMBINED . . . . . . . . . . . . . . . . 46
SECURITY . . . . . . . . . . . . . . . . . . . . . . . 47
MENUS . . . . . . . . . . . . . . . . . . . . . . . . . 48
Menu functions . . . . . . . . . . . . . . . . . . 49
Automatic command execution . . . . . . . . . . . 76
Special optional data switches . . . . . . . . . . 76
Menu templates . . . . . . . . . . . . . . . . . . 77
The global menu . . . . . . . . . . . . . . . . . 78
Setting up your menus . . . . . . . . . . . . . . 79
Creating your menus . . . . . . . . . . . . . . . 80
EXTERNAL SUPPORT FILES . . . . . . . . . . . . . . . . 83
THE USER DATABASE . . . . . . . . . . . . . . . . . . . 91
Information stored in the user database . . . . . 92
Packing and sorting the user file . . . . . . . . 93
THE MESSAGE DATABASE . . . . . . . . . . . . . . . . . 94
Message database size limitations . . . . . . . . 94
Packing and renumbering the message base . . . . . 95
MAIL NETWORKING . . . . . . . . . . . . . . . . . . . . 99
Installing the nodelist files . . . . . . . . . 102
MULTI - NODE OPERATION . . . . . . . . . . . . . . . 104
REFERENCE SECTION . . . . . . . . . . . . . . . . . . 107
Sysop keys . . . . . . . . . . . . . . . . . . . 107
Command-line parameters . . . . . . . . . . . . 109
RA.EXE . . . . . . . . . . . . . . . . . . 109
RACONFIG.EXE . . . . . . . . . . . . . . . 110
Errorlevels . . . . . . . . . . . . . . . . . . 111
Text file control codes . . . . . . . . . . . . 112
User parameter codes . . . . . . . . . . . 114
System parameter codes . . . . . . . . . . 115
Colour control numbers . . . . . . . . . . 116
Modem string translation . . . . . . . . . . . . 117
Questionnaire script language . . . . . . . . . 118
Terminal emulations . . . . . . . . . . . . . . 125
Text file naming conventions . . . . . . . . . . 126
Interactive EMSI . . . . . . . . . . . . . . . . 127
BATCH FILES . . . . . . . . . . . . . . . . . . 128
This document makes reference to a number of third-party
products. All copyrights, trademarks and reserved rights
held in these products are acknowledged.
1
PREAMBLE AND CREDITS
────────────────────────────────────────────────────────────
RemoteAccess started as one of those spare-time projects in
early 1989. After about eight months of initial development
I released version 0.01 on the 25th of January, 1990. Almost
two years later as this is written, after four major
releases, a couple of maintenance releases, a few thousand
registered users (thanks!) and an uncountable number of
other changes in my life, RemoteAccess has become a full-
time occupation.
I'd like to thank Mark Anderson for his patience in updating
this documentation, Bruce Bodger, Barry Phillips and their
support groups NARAS, UKRAS and EURAS, the guys who operate
the registration sites and of course the beta test team.
I'd also like to thank the following for their contributions
(in no particular order whatsoever) - all of them have
played a part in the development of RemoteAccess:
Adam Blake, Joaquim Homrighausen, Ray Gwinn, David Nugent,
Rob van Hoeven, Tomas Bremin, Peter Janssens, Advanced
Engineering, Phil Mackay, Bob Fletcher, Adam Hudson, Gary
Smith, Scott's Pub and Restaurant, Mum, Dad, Vanessa, Matt,
Sugar, Letham Burns, James Smith and Online Communications
Inc., Guns n' Roses, Matilda Bay Brewing, Al Hays and the
Church Street Station gang, Kevin Johnson, Terry Harvey,
john barton, Andrew Russell, Mike Janke, Fred "Levis"
Horner, and the Luxembourg PTT for connecting my telephone
in just seven weeks.
Andrew Milner,
Luxembourg City.
────────────────
2
OVERVIEW AND FEATURES
────────────────────────────────────────────────────────────
RemoteAccess is a "fully-blown" remote bulletin board
package. It may be used as a stand-alone system or with a
front-end mailer if you wish to interface it to a mail
network such as FidoNet. It offers fully definable menus
with a unique template system which provides not only a
massive degree of flexibility in making your BBS look
different from any other, but also the lowest possible
maintenance. AVATAR screen control is built in, making
possible extremely efficient and complex colour and cursor
control at the user's end if an AVATAR terminal program is
used.
Access to the 200 available message areas is controlled by
your menu structure, along with a sophisticated security
system which incorporates over 64,000 security levels with a
set of user-definable flags. For each security level you can
specify maximum download limits for different log-on speeds,
daily time limits, and optionally activate the built-in file
ratio system, limiting downloads by ratio to uploads by
either number of files or kilobytes. In addition it's
possible to assign a user to one of 255 separate groups, and
in so doing segregate groups of users from each other.
Other security features include the disallowing of downloads
during peak hours, disallowing low speed callers at certain
times, and disallowing ANSI graphics at low speeds. You can
disallow one-word "pseudonyms", and optionally configure
the system to force a user to change passwords every x log-
ons. Undesirable user names and passwords are also definable
for maximum security. If you're unlikely to want to call
your own system, remote sysop access can be disabled, making
it virtually impossible for your account to be "hacked".
Direct support for high-speed modems up to 38,400 baud is
available, and RemoteAccess will optionally answer the phone
automatically to ensure that the modem will answer if your
BBS is "alive and well".
RemoteAccess supports as many as 250 lines simultaneously.
Full system access to all file and message areas is
available to each line (at your discretion), as are all
doors. Several "multi-node specific" features are provided
to augment multi-line operation. You can configure the
system to disallow one person logging on to more than one
line at a time. A "who else is on-line?" and "today's
callers" function is available to you, along with separate
system logs for each line. Logging is selectable between
either Opus (expanded) or FrontDoor (compact) styles to aid
integrated log readability. Some basic user-to-user on-line
messaging, to be expanded at a later date is also available.
RemoteAccess offers a fully configurable user environment.
Its multi-lingual support and configurable date formats mean
that your users will feel at home no matter where they are
calling from - every one of the 500+ text prompts is fully
sysop-configurable.
3
RemoteAccess does NOT do its own internal multi-tasking. To
this end, we have attempted to make it as well-behaved as
possible. It has built-in time-slicing and screen-handling
support for Windows, DESQview, TopView, MultiLink,
DoubleDOS and PC-MOS/386. It is fully overlaid and
occupies approximately 220k of memory when fired up. What
do you do if you have say a 300k DESQview window and want
to run TradeWars in a shell? No problem! Simply by
specifying a control character on the command line, you
can instruct RemoteAccess to swap itself lock, stock and
barrel to EMS and/or disk leaving only 3k resident.
A comprehensive file transfer system is also part of the
package. Six of the most popular protocols, including
Zmodem, Ymodem batch and Xmodem are built-in, and fifteen
slots for external protocols are available for you to add
any others. All protocols may be made available on an
"error free" connect basis at the your discretion. The
protocol interface system is extremely flexible, and
has been tested with DSZ, Kermit (an Opus compatible
protocol), and BiModem. There are of course many others we
haven't tested, but most should work. Support for CD-ROM and
other mass read-only media is another invaluable feature.
The file transfer system is further enhanced by
comprehensive file search and locate functions along with
the ability to tag any file or group of files as "free" and
or password protected. A large selection of transfer options
include global downloads and the ability for specific files
to be attached to a file transfer menu option.
Interactive EMSI session support is an exciting new first
for RemoteAccess! Read the section on IEMSI in the reference
section at the end of this document for details on this
revolutionary new set of features.
Extensive on-line facilities are available to the sysop. An
optional set of status bars provide a wealth of information
about both the person currently on-line and the system.
Several "hot-keys" are also available to perform a wide
range of functions, amongst which is a full screen user
attribute editor, a "sysop on next" key, shell to DOS, hang
up, lock out, and local snoop.
As an added bonus, we have decided to use the QuickBBS-style
user and message database formats. This means that you can
continue to use your favourite QuickBBS utilities with no
need to convert to another format. Any incompatibilities in
the configuration files is taken care of by an upgrade
utility. We make no apology for the similarity between
RemoteAccess and QuickBBS. QuickBBS had many features that
we wanted, and compatibility gives the added bonus of
offering the sysop ease of installation and a familiar
environment.
To cater for both Opus and QuickBBS users alike, each user
has (at the discretion of the sysop) the option of using
hot-keyed menus or command stacking. Comprehensive
messaging, file search options and support for a wide range
of "doors" ensure that your BBS will be a hit!
4
LICENSING INFORMATION (Shareware version)
────────────────────────────────────────────────────────────
"RA" refers to the executable programs and documentation
contained in RemoteAccess Bulletin Board Software
distribution archives released by Continental Software.
(Shareware version).
1. RA is the copyrighted material of Continental Software.
It may only be used in accordance with the conditions set
out in this license agreement.
2. You may use RA for a period of three weeks on a trial
basis in order to determine it's suitability for your
particular application. After this period you MUST register
each copy of RA that you run simultaneously. Multi-line
installations that share a common file base AND have the
same name need only register one copy.
3. Registration entitles you to use RA and any future
versions of RA for as long as you wish, subject to any
special licensing conditions attached to future versions.
For details on the registration procedure, refer to the
section in this document "HOW TO REGISTER".
4. Continental Software is in no way obligated to
provide future versions of, or support for, RA.
5. Site and Group registrations are available, and are dealt
with on a case by case basis.
6. You may not modify or otherwise reverse-engineer RA.
7. You are encouraged to distribute RA provided that no fee
is charged for its distribution, and that the distribution
archive is not modified in any way. Pay Bulletin Board
Systems may however charge their normal fee provided that
no additional charge for RA is levied.
8. RA may not be included as part of any software library
which is distributed on a commercial basis (commercial =
"for money") without prior written permission from
Continental Software.
9. RA may not be used in any unlawful or illegal manner.
10. Continental Software's liability resulting from your
use or inability to use RemoteAccess is limited to the
amount that the affected party has paid for it, or in the
event that RA was registered with a third party for payment
to Continental Software, liability is limited to the amount
that was received by Continental Software from that third
party.
5
HOW TO REGISTER
────────────────────────────────────────────────────────────
SHAREWARE version:
Systems that qualify for this category must be
physically run from a noncommercial site. A site is
considered to be noncommercial only if it is a private
residence at which no commercial activities are
conducted.
Print or reproduce the registration form at the end of this
section and send it with your registration payment to one of
the following sites:
AUSTRALIA: AUD60 CANADA: CDN60
"Registration/RA" "Registration/RA"
C/- Terry Harvey C/- Royce Jones
PO Box 593 624 Dolph Street N Apt #B
Burwood NSW 2134 Cambridge ON
AUSTRALIA CANADA N3H-2B4
Accepts VISACARD,
MasterCard, BankCard
EUROPE: DFL120 USA: $50
"Registration/RA" "Registration/RA"
C/- R.A. de Bruin C/- Ed Meloan
Columbusrede 17 1110 Terrace Circle Drive
2725 KL Zoetermeer North Augusta SC 29841
HOLLAND USA
GERMANY: DM90
"Registration/RA"
C/- Frank Altenburg
Wickopweg 9
6100 Darmstadt
GERMANY
ASIA: AUD60 or equivalent UNITED KINGDOM: GBP33
"Registration/RA" "Registration/RA"
C/- Andrew Russell C/- Barry Phillips
D1-1-6 R.S.G.C. View PO Box 21
Desa Pandan Ormskirk
Jalan Kampong Pandan Lancs L39 3QW
55100 Kuala Lumpur UNITED KINGDOM
Malaysia
* You MUST fill out the registration form correctly in order
for your details to be processed. Not doing so will result
in delays in your key arriving.
6
* Cheques and money orders should be made payable to the
person at your registration site.
* Please include either a FidoNet address or a stamped,
self-addressed envelope so that receipt of your payment
can be acknowledged.
PROFESSIONAL version:
If the system is physically run from a commercial site
(ie. the site is not a private residence, or commercial
activities are conducted at the site).
This is professionally packaged with an expanded ring-bound
manual and includes three modules not available in the
shareware version:
1. Real-Time Conferencing - supporting up to 250 users
concurrently, featuring public/private/password-protected
conferences, conference moderators and sub-conferences.
2. RANETMGR - The RemoteAccess Network Manager, a utility
designed to give you complete control over a busy multi-node
system. Dynamically view the status of each node as users
log on and off, what each user is doing, broadcast messages
to any combination of nodes and automatically take any
combination of nodes down for maintenance.
3. TopEd/Pro - A fully functional, specially customised and
registered version of TopEd, a premium full-screen message
editor.
The professional version supports up to 100 languages, while
the shareware version supports a maximum of eight.
The professional version of RemoteAccess is sold on a
commercial basis only. It is NOT shareware.
Enquiries for the professional version should be directed
to:
USA: Europe:
Online Communications Inc. Advanced Engineering sarl
22 State Street 8, Am For
Bangor, Maine 04401 L-5351 Oetrange
USA Luxembourg
Tel: (207) 941 1110 Tel: +352 358725
Fax: +352 355938
BBS: (207) 990 3511 BBS: +352 355936
7
*** RemoteAccess REGISTRATION FORM ***
Sysop Name _________________________________________________
System Name ________________________________________________
[The above two items are used to generate your registration
key and must appear EXACTLY as they do in RACONFIG.]
Network Address (number and network name) __________________
Any other networks you are a member of _____________________
Primary BBS telephone number and baud ______________________
Voice telephone number _____________________________________
Hours of BBS operation _____________________________________
Postal Address :
____________________________________________________________
____________________________________________________________
____________________________________________________________
Version of RemoteAccess registering ______.
Registration amount enclosed _______, for ____ copies.
What do you like about RemoteAccess?
____________________________________________________________
____________________________________________________________
____________________________________________________________
What enhancements/changes would you like to see in our next
release?
____________________________________________________________
____________________________________________________________
8
The key system
────────────────────────────────────────────────────────────
Upon registering you will receive your uniquely generated
key. Each key is a small file approximately 2k in size which
contains information about your registration. To install the
key, simply rename it (if necessary) to RA.KEY and copy it
to your RemoteAccess system directory.
When RemoteAccess detects a valid key it switches into
registered mode, identifying itself by placing a "+" at the
end of the version number as well as displaying the name of
the system and sysop it is registered to in the "version
information" menu function.
For example, logging on to a registered system you would
see:
RemoteAccess 1.11+
Please enter your full name:
Features marked in this manual with a {+} are only available
when RemoteAccess is running in registered mode. These bonus
features show our appreciation of your taking the time to
register with us.
It should be made absolutely clear that RemoteAccess is
still fully functional before it is registered; the bonus
features are "nice" but their absence makes the system no
less usable. RemoteAccess is not and never will be
"DemoWare" or "ExpireWare".
WARNING! Your key is unique, and under NO circumstances
should it be made available to anyone else. Doing so is a
direct violation of the agreement you entered into with us
by registering.
9
PRODUCT SUPPORT
────────────────────────────────────────────────────────────
You can always get the latest shareware version of
RemoteAccess and technical support from the following
systems:
Australia:
Terry Harvey
The Eagles
Sydney NSW
(02) 745 3190 V32 V42 PEP
FidoNet@3:712/704
3:712/707
USA and Canada: (North American RemoteAccess Support group)
Bruce Bodger Fred Horner
The TruckStop BBS The Private EaR
Tulsa OK Waco TX
918 254 6618 HST 817 776 9877 HST
FidoNet@1:170/400 FidoNet@1:388/10
Mike Janke Ed Meloan
Kendall BBS Augusta Forum
Miami FL N. Augusta SC
305 271 2146 HST 803 279 4124 HST
FidoNet@1:135/4 FidoNet@1:360/1
Al Bruner Royce Jones
The SW/SE Connection DAKIN BBS
San Diego CA Cambridge Ontario
619 467 0335 HST 519 653 7677 HST
FidoNet@1:202/707 FidoNet@1:221/204
Mark Howard Geoffrey Booher
Rivendell The Gateway Net BBS
Buffalo NY Freeport IL
716 646 0227 HST 815 233 5008 HST
FidoNet@1:260/1 FidoNet@1:2270/233
10
Europe and others: (European RemoteAccess Support Group)
Ruud de Bruin Orlando Castillo
HOLLAND SPAIN
+31 49 424553 V32 +34 6 543 7026 V32
FidoNet@2:281/603 FidoNet@2:346/4
Joerg Dassler Tony Van den Bogaert
GERMANY BELGIUM
+49 911 752799 HST +33 3 2720210
FidoNet@2:244/8501 FidoNet@2:295/43
Robert Soubie Reinier De.Groot
FRANCE HOLLAND, HELP 2
+33 56 89 51 12 +31 1749 48422
FidoNet@2:324/5 FidoNet@2:512/100
Malte Erikson Frank Altenburg
SWEDEN GERMANY, HELP 2
+46 300 29436 +49 6151 710809
FidoNet@2:203/302 FidoNet@2:249/7
Peter Hermann Wim Abels
GERMANY, HELP 3 GERMANY, HELP 4
+49 531 13216 +49 211 5961291
FidoNet@2:240/550 FidoNet@2:242/20
Roland Gautschi Bjarne Maschoreck
SWITZERLAND DENMARK
+64 230319 +45 31 42 72 64
FidoNet@2:30/6 FidoNet@2:231/50
Andrew Milner Clive Jones
LUXEMBOURG REPUBLIC of SOUTH AFRICA
+352 490 486 +27 11 868 4790
FidoNet@2:270/18 FidoNet@5:7101/14
Lars Eriksson Hilmar Thors
FINLAND ICELAND
+358 28 23452 +354 1 627648
FidoNet@2:222/150 FidoNet@2:257/60
11
U.K. (United Kingdom RemoteAccess Support Group):
Barry Phillips Mark Kerr
MIDLANDS IRELAND and WALES
+44 695 571117 HST DS +44 232 768163 HST DS
FidoNet@2:440/66 FidoNet@2:263/301
James Berry
S.E. ENGLAND
+44 303 862415 HST DS
FidoNet@2:440/16
Peter Burnett Mark Anderson
S.W. ENGLAND SCOTLAND
+44 424 853361 +44 236 747393 HST DS
FidoNet@2:440/80 FidoNet@2:259/11
Sweden (SWRAS):
Malte Erikson Johan Nilsson
SWRAS HQ SWRAS Coordinator
+46 300 29436 +46 42 112714
FidoNet@2:203/302 FidoNet@2:200/212
Mats Wallin Patrik Sjoberg
+46 8 6453882 +46 26 628057
FidoNet@2:201/329 FidoNet@2:205/208
12
Support conferences:
Conference Support
Name Language Area Moderators
------------- --------- -------------- --------------
RA_SUPPORT English World Wide Bruce Bodger
Mike Janke
Andrew Milner
RA_UK English United Kingdom Mark Anderson
Barry Phillips
RA.GER German Germany / Joerg Dassler
Switzerland Roland Gautschi
RA_SWE Swedish Sweden Hasse Widghal
SF.RA/FD_SP Finnish Finland Lars Eriksson
RA_SUP.028 Dutch Netherlands Ruud de Bruin
Reinier de Groot
RA_SUP.B Belgian Belgium
RA_UTIL English World Wide Andrew Leary
(For RA Utilities) John Bierrie
RA_UTIL.GER German Germany Frank Altenburg
Joerg Dassler
New releases and the RA_SUPPORT conference should also be
available from any of the beta test sites, listed in the
accompanying document.
13
INSTALLATION
────────────────────────────────────────────────────────────
RemoteAccess should run on any IBM 80x86 compatible
computer. The only two programs you will need in addition to
the release package are DOS 3.x and a FOSSIL driver. The
FOSSIL is a memory-resident program that many communications
packages use to communicate with the modem. Two FOSSILs that
have been successfully tested with RemoteAccess are Ray
Gwinn's X00, and David Nugent's BNU. Either of these should
be readily available from any local bulletin board.
You will also need a modem that is capable of accepting
Hayes-type commands. The minimum memory requirement is
approximately 350K, but 512K is recommended.
1. Ensure that your CONFIG.SYS file contains these
statements:
FILES=20
BUFFERS=25
If you intend to run a multi-node system you may
need to increase the number of file handles
that DOS can open at one time, by raising the
"FILES" value. Note: Each additional file handle
will reduce available memory by 50 to 60 bytes.
The more "BUFFERS" you allocate, the faster
RemoteAccess will run. However, each additional
buffer allocated will reduce memory available by
500 to 600 bytes.
2. Create a directory to put the main program files
in. The configuration example that follows later
assumes that this directory (the SYSTEM directory)
is C:\RA.
3. Ensure that your AUTOEXEC.BAT file contains a
command to set the environment variable RA to your
SYSTEM directory, so RemoteAccess can find its
configuration files:
SET RA=C:\RA
It is possible to increase the overall performance
of RemoteAccess by placing the file "RA.OVR" onto
a ramdrive. If you elect to do this you must also
set the following environment variable:
SET RAOVR=F:\
4. Copy all of the executable files from the RemoteAccess
distribution package into the SYSTEM directory.
14
5. Create four more sub-directories:
C:\RA\MSGBASE This will hold the message
files the system creates.
C:\RA\MENUS To put your menus in,
C:\RA\TXTFILES To put files such as welcome
and disconnect screens in.
C:\RA\ATTACH To hold message file attaches.
This completes the installation, and you are now ready to
move on to the CONFIGURATION section.
15
CONFIGURATION
────────────────────────────────────────────────────────────
RACONFIG
────────────────────────────────────────────────────────────
Return to the RemoteAccess system directory again, and fire
up the configuration utility, RACONFIG.EXE. You will use
this to select the configuration options and maintain your
particular system. You will see that there are four main
configuration menus.
RACONFIG - System
────────────────────────────────────────────────────────────
PATHS - Here is where you tell RemoteAccess where all its
associated files are stored. Paths can be defined for the
following:
System : Full path to the RA system files.
Menus : Default menu path (*.MNU).
Textfiles : Default textfile path (*.A??).
Msg base : Message-base and user files.
File attach : Local msg file attaches.
Nodelist : Network nodelist files.
File list : Alternative FILES.BBS path.
Semaphore : Alternative semaphore directory.
System log : Filename of the system log.
Enter the full directory paths to your chosen directories.
The trailing backslash is optional.
See the section on MAIL NETWORKING for details on how to set
up the NODELIST path, the section on message configuration
for details on the FILE ATTACH PATH, and the section on
files configuration for details on the FILE LIST path.
SITE INFO - Use this window to enter the sysop name
(probably your own), the name of the BBS, and the BBS's
location. The first two must be entered exactly the same as
those specified on your registration form.
ADDRESS - In this section you can enter your network
address (if any). If you have any alias addresses (AKAs),
you may enter these in one or more of the nine slots
provided. For extra information on network operation
and an explanation of addresses, see the section on MAIL
NETWORKING.
SECURITY - Here you may define a configuration password
that must be entered every time you wish to run RACONFIG and
every time you use one of the ALT keys at the local console.
{+} Registered only.
16
RACONFIG - Options
────────────────────────────────────────────────────────────
MESSAGES - This section deals with many of the global
settings in relation to mail and messages.
Logon. : When enabled, will force the system to
Newmail scan the message-base for new mail
addressed to the user (regardless of what
area it is in, provided the user has access
to that area) at log-on.
Full : This option determines the type of mail
mailcheck check that is performed. A full check
scans from the start to the end of the
message-base for all mail addressed to
the user that does not have the "Received"
flag set. If you set the option to "Off",
the msgbase is only checked from the last
message that the user read. While this is
much faster, there is the possibility that
some mail may be skipped if the user
elected not to read his/her mail during the
last logon.
Quote : This string is a highlight character that
string RemoteAccess will place in front of any
message that is replied to. For example, a
message quoted using " > " as the quoter
would look like:
> I have been using RemoteAccess for
> 2 months now and love it!
I have to agree with you there, Tom.
Flexibility-wise it can't be beaten.
A "@" character in the quote string will
be translated into the uppercase initials
of the person whose message is being quoted.
A "#" character will do the same but use the
lowercase.
External : This is the DOS command line that will be
editor used to activate a full screen message
editor, if one is installed. This option
is available only to users of ANSI graphics.
The full screen editor is a third-party
package that enables messages to be entered
in a "word-processing" environment, with
cursor movement and text formatting ability.
TopEd and QuickEd are two such packages that
interface directly with RA. The command-line
may contain any of the metacommands listed
in the description of the type 7 menu
command, including "*M" to swap RemoteAccess
out of memory before the editor is loaded.
17
Default : This option sets the default origin line
origin which is appended to all outgoing EchoMail
messages. This will take effect in all areas
except where you have entered a specific
origin line for a particular area.
Reply : The REPLY HEADER is displayed at the top of
header a message when a user replies to a message
that was not originally addressed to
him/her. The following macro characters
may be used:
@ - Person the original message was
addressed to,
# - Person who posted the original
message,
` - Date of the original message,
~ - Time of the original message.
Msg : When this option is set to "Yes", when users
uploads enter a message they are asked if they
wish to "upload a prepared message?" This
allows the user to prepare his/her messages
offline and send them using any of the
available file transfer protocols. Note
that ONLY internal protocols may be used as
RemoteAccess does not have enough control
over the external ones. The maximum size of
a message that may be uploaded is pre-set
at 20k.
Echo : If this option is enabled, when replying
netreplies to an EchoMail message, users will be asked
if they would like to reply directly to
the originator of the message via netmail,
rather than replying in the same area with
a msg that might not be of interest to the
other participants. Note: that this {+}
registered only option is only enabled if
RemoteAccess can determine where the
original message came from.
Net. : This option applies to NetMail sent through
killsent a mail network. When the msg is entered, if
set to "Ask", the user will be asked whether
to delete his/her message after it has been
exported from the message database.
Confirm : When enabled, RemoteAccess will prompt the
delete user for confirmation before deleting msgs.
18
Net.crash : This defines the minimum security level
opt at which users have the choice of
sending NetMail with the "crash" flag set.
The "crash" means the mail will be sent out
of your system immediately. This can be very
costly, so care should be taken when setting
this option.
Net.crash : This option defines the security level at
force which NetMail always has the "crash" flag
set. Again this can be costly so care
should be taken when setting this option.
Net. : This option defines the minimum security
attach level a user must have in order to attach
files to a NetMail message. Once again,
take care when setting this option as it
can be costly. NOTE: In many mail networks
sending Netmail messages with files attached
to them through other systems is not
permitted. If in doubt you should set the
"net.crash force" security level so that
all file attaches are sent direct.
Group : This option determines the minimum security
Mail a user must have in order to post mail to
a group of users. See MENU COMMANDS, menu
type 27 for detailed information on Group
Mail.
19
FILES - This section allows you to define global options
which affect the behaviour of the file transfer facilities:
Upload : The UPLOAD CREDIT provides a way of
credit rewarding your users for uploading files to
you. If this value is set to a non-zero
value, after each upload session, the user
is granted that many seconds per minute of
upload time. So, if you set the credit
factor to 30 (seconds), and a user spends
10 minutes uploading, he/she would be
granted an extra 5 minutes for that session.
Note that during uploads the timer is
"frozen" in addition to this bonus.
Touch : When a file is uploaded using a batch
dates protocol such as Zmodem or Ymodem, the
original date of the file is normally
preserved when the file is saved in the
upload area. This is of little use if the
file was originally created in 1987, so
RemoteAccess will, if the TOUCH DATES option
is enabled, reset the date stamp of the
file to the date on which it was uploaded.
Show : When a user displays a list of files, the
missing default action is to show missing files as
"<MISSING>". By disabling this option you
can make RemoteAccess remove missing files
from the users display.
Upload : It is possible to disable uploads when the
space the amount of free space on your upload
drive falls below a preset level. For
example, to disable uploads if there is less
than 1 megabyte free, set UPLOAD SPACE to
1024 (kilobytes).
Logon. : If the LOGON.NEWFILES option is enabled, the
Newfiles user will be given the opportunity to run
a check for files which are new since
his/her last call at logon.
Download : This defines the starting time during which
start users can download files.
Download : This defines the ending time during which
end users can download files. By setting this
option and the DOWNLOAD START option to
00:00, users will be able to download at any
time.
Download : This option allows you to set a minimum
speed speed at which users can download files.
20
List : You may configure the format in which file
format description lines are displayed when a user
asks for a list of available files. To
{+} achieve this you must build a template
Registered string in this field. The following macro
Only characters can be used:
% - Full filename, uppercase
^ - Full filename, lowercase
& - Filename (no extension), uppercase
! - Filename (no extension), lowercase
@ - Date (in user's selected format)
# - File size (bytes)
$ - File size (k)
| - New line
` - '*' if new, space if not
~ - Description
You may also enter colour sequences into
the templates. If a non-ANSI caller calls
these sequences will be ignored and the user
will see white text on black. To enter
the colour sequences, press CTRL-P and then
CTRL-K[<colour code> (See the section on
COLOUR CODES for more information).
To emulate the old hardcoded display use:
[0E% [0D# [0A@' [03~
RESTRICTIONS - This section allows you to set following
restrictions on your system:
Logon : Minimum speed at which callers can logon
speed to your system.
ANSI : Minimum speed at which callers may select ANSI
speed graphics.
No300 : Start time for disallowing 300 baud
start callers.
No300 : End time for disallowing 300 baud callers.
end If you wish to allow 300 baud callers to
logon at any time, you can disable the
NO300 restrictions by setting both the
START and END times to 00:00.
ERRORLEVELS - These values are used if you have activated
the "Shell to Mailer" feature. For full information on
this option, read the reference section on COMMAND LINE
PARAMETERS.
21
DISPLAY - This section allows you to set the following
video display attributes:
Monochrome : Forces monochrome operation on the local
display.
Direct : If you are not using RemoteAccess in a
write Multi-tasking environment, then set this
option to "Yes". This will cause all screen
output to be written to Video RAM directly
instead of using BIOS calls, and will
result in a significant speed increase.
Snow : If you use one of the older CGA cards that
check is prone to "snowing", enable this option.
Display : This detects the screen mode you are in.
lines "AUTO" sets RA to automatically detect the
screen mode, 25 and 43/50 options force 25
and 43/50 line modes respectively.
COLOURS - The COLOURS submenu allows you to customise
some of the more-often used colours that the user sees.
22
PAGING - The PAGING menu allows you to control the
following:
Duration : Duration, in seconds, that the paging tune
will sound at the local console.
Max number : Maximum number of times a user can page the
sysop unsuccessfully during one session.
Ask why : If enabled this option will cause Remote-
Access to ask the user why he/she wishes
to chat. The response is then displayed on
the status bar, and may be redisplayed
later by pressing F6. {+} Registered only.
Sysop msgs : If the page was unsuccessful, the user
can be prompted whether to leave a msg
addressed to the sysop. To enable this
option enter the desired message area
number that you would like these msgs to
be posted in. Setting this field to zero
disables the feature. {+} Registered only.
External : If you wish to use a external chatting
utility, you can specify the command line
to shell to run the program in this field.
{+} Registered only.
Suspend : If enabled, this option prevents time from
being deducted from the users daily time
limit during a chat with the sysop.
Auto Log : When enabled, this option will cause RA
to automatically open a capture file when
chat mode is initiated.
Sunday : In these seven fields, you can define the
Monday starting and ending times at which users
Tuesday are permitted to page the sysop, on a day
Wednesday by day basis. The first field of each day
Thursday determines the starting time and the second
Friday field determines the ending time at which
Saturday users can page the sysop. To disable the
starting and ending page times set both
fields to 00:00.
23
NEW USERS - The NEW USERS section controls how your system
will treat new users. You can configure the following for
new users:
Security : This is the security level (0 to 64000) that
will be granted to a new user who logs on
for the first time. If you run a private
system, and do not want to allow new users
to log on, set this field to zero. In
this case, the user is notified that the
system is private and is disconnected.
Flags : The 4 flag entries determine the flag
configuration that will be granted to new
users. See the section on SECURITY for a
full description of the security system.
Credit : This sets the new user's initial credit
against sending netmail messages. The
NETWORKING section provides full detail on
setting up netmail costings.
Group : This is an arbitrary number between 0 and
255 you may assign new users. It allows
you to segregate users into separate groups,
which then can be used in various menu
types. (see the menu command list for
further details)
ANSI : Determines whether a new user may use ANSI
codes (Yes/No/Ask).
AVATAR : Determines whether a new user may use AVATAR
codes (Yes/No/Ask).
Clrscr : Determines whether a new user would like
screen clearing codes enabled (Yes/No/Ask).
More : Determines whether the new user would like
to be prompted with "More Y/N" at the end of
each screen page (Yes/No/Ask).
Sub days : Number of days subscription new users are
allocated.
Data : If enabled, new users are asked for their
phone Data Phone number.
Voice : If enabled, new users are asked for their
phone Voice Phone number.
One word : If disabled, new users will be required to
names enter their name as at least 2 words with a
total length of at least three characters.
Note that this restriction only applies to
new users; a user already in the user
database may log on using his or her
"handle".
24
Handle : If this option is enabled, new users will
be asked to choose an optional unique handle
or alias. This is saved as part of the
user's record and may be used to log onto
the system later, and to send and receive
mail.
Birthdate : If enabled, new users will be prompted to
enter their full birthdate. RemoteAccess
will attempt to intelligently identify if
the date supplied is legitimate.
Hotkeys : RemoteAccess may be configured to behave
either like QuickBBS with hot-keyed menus,
or like Opus with command stacking
facilities (Yes/No/Ask).
FS msg : FS MSG VIEW, when enabled, will display
view messages to the user using a "fixed header"
format, designed for enhanced readability.
FS msg : The FS MSG EDIT setting will determine if RA
edit asks the new users if they would like to use
the external message editor (Yes/No/Ask).
IEMSI : When a new user connects to your system
using IEMSI ( explained fully in the
reference section of this manual), RA will
skip the regular new user questionnaire as
it can determine the user's screen
parameters, location, password etc. auto-
matically. If this option is disabled
however, all new users will be forced to
answer the regular questionnaire manually.
Language : This option sets the default language for
new users before they select their preferred
language. If this option is set to zero,
the new users will not be asked which
language they wish to use as their default.
Date : If set to "ASK" new users are able to select
format which date format they would like to use
when entering dates and when dates are
displayed. The available formats are:
DD-MM-YY
MM-DD-YY
YY-MM-DD
DD-Mmm-YY
The sysop may choose to force a particular
date format by selecting the format in this
field.
Cap : If enabled this will force RA to capitalise
location the users location, when entered.
25
SYSTEM - The SYSTEM submenu contains options that pertain
to the hardware/software environment plus some other
global options listed below:
Fast : Whenever RA is activated in local mode and
logons this option is set, it is assumed that it is
the sysop who is logging on, and you will be
prompted for a password only. If you press
[CR] at the password prompt RA will ask for
a full user name.
Check : When running more than one line, you should
multi set CHECK MULTI to "Yes". This will prevent
a user from logging on to more than one line
at the same time, and effectively using his
/her entire daily time limit on EACH LINE.
Remote : If you never (or rarely) call your own BBS
sysop remotely, you should disallow sysop remote
access by setting REMOTE SYSOP to "No". This
makes it almost impossible for an unknown
"hacker" to gain access to your system via
your own account.
Exclude : If enabled, this option will cause the
sysop sysops name to be omitted from a User List,
List of Today's Callers, Who Else Is Online,
and the Last Caller functions.
Text : By inserting a special control code in a
shells textfile it is possible to automatically
activate a program in a shell when the text
file is displayed. As explained in the TEXT
FILE CONTROL CODES section, there are
important security considerations that must
be looked into if you intend to use this
feature. If you aren't going to use it, set
TEXT SHELLS to "No".
Log : The logging format is determined by this
style option. The "Expanded" format mode contains
more information, including the line number
in a multi-line system. The "Compact"
format is less detailed.
Multi : If you are installing RemoteAccess on a
node multi-node site (ie. you are going to be
running more than one node), you MUST set
this option to "Yes". This enables extra
file/message checking routines to ensure
that a conflict between two lines accessing
the same data never arises. If you are
running only one line, setting this option
to "Off" will disable this checking and
significantly increases the system's
operating speed.
26
Enviro- : The ENVIRONMENT option refers to the type
nment of multi-tasking system that you will be
running RemoteAccess under. If set to "Auto-
detect", RemoteAccess will attempt to
determine the multitasker in use when it
fires up. On some hardware / software
configurations it may not be able to
correctly detect it's environment. To
overcome this, you can force RemoteAccess to
"assume" that it is running under a specific
multitasker. Those currently supported
are DoubleDOS, Windows 3.x (enhanced mode),
DESQview, TopView, MultiLink, PC-MOS/386 and
the "standard" AT BIOS. RA will time-slice,
or give up CPU time, to other tasks when it
is waiting for a call or at a prompt. The
result is a significant overall system
performance improvement.
Screen : To avoid screen "burn in" on the "waiting
blank for call" display, set the SCREEN BLANK
to the number of seconds you would like the
display to remain visible after the last
activity. This is a {+} registered only
option.
After : After RA displays a system message, the
msgs default action is to wait for one second
before returning to the current menu. You
may alter this wait period by setting the
AFTER MSGS option to the desired number of
seconds. If you set this field to zero,
instead of waiting for a few seconds, RA
will prompt the user to press the Enter key
to continue.
ALT-J : If enabled, this option will cause Remote-
swap Access to swap itself out of memory before
a sysop shell to DOS. This will enable
programs that require a large amount of
memory to be run. NOTE: the swapping
process will take a few seconds.
IEMSI : The IEMSI option simply allows you to enable
or disable RemoteAccess' IEMSI capabilities.
IEMSI is fully explained in the reference
section at the end of this manual. Setting
this option to "Only" will force RA to
permit IEMSI logons only.
Pwd echo : The PWD ECHO allows you to define which
character is echoed back to the user when
any password is entered. If this if left
blank, no character is echoed back to the
user.
27
Auto ANSI : When the user logs on, if AUTO ANSI is
enabled RA will attempt to determine if the
calling terminal has ANSI capabilities. If
it has, the file LOGO.ANS will be displayed
instead of LOGO.ASC.
Pwd : PWD TRIES sets the maximum number of invalid
tries password attempts at logon. After this is
exceeded the user will be disconnected.
Pwd : PWD CHANGE is another security feature. If
change this is set to any non-zero value, then all
users (excluding the sysop) will be forced
to change their password every number of
logons as determined by its value.
Pwd : PWD STRICT is an invaluable security feature
strict which if enabled, will check passwords that
users enter. You can specify certain
undesirable passwords in a control file (see
the section on EXTERNAL FILES), such as
"Secret" or "Test". It will also disallow
the user's first or last name as a password
and checks the old and new passwords for
phonetic similarity.
Pwd : You may specify the minimum password length
length that users may select. Longer passwords
mean better security, a value of 4 is
recommended as an absolute minimum.
Logon : This option specifies how much time to
time grant to a user before the system knows how
much time he/she is entitled to. You should
make this long enough to enable a new user
to complete the new user procedure and
questionnaire, if you have one.
User : USER TIMEOUT determines how long to wait
timeout during periods of inactivity before
disconnecting. The inactive time period is
measured from the last character sent to the
modem, and users are given a warning that
they are about to be disconnected fifteen
seconds before the timer expires. This
feature is automatically disabled in local
mode, or by a setting of zero.
28
Watchdog : If a user logs on and is disconnected
area because he/she enters his/her password
incorrectly, RemoteAccess can notify that
user of a possible attempt at guessing the
password, by way of a private message. In
the WATCHDOG AREA field, specify the message
area number (as per your msg area
configuration) that the warning message
should be placed in. A value of zero
disables this feature. In addition, you
will need to create an ASCII text file
called " WATCHDOG.MSG " in the system
directory that contains the text of the msg
that is sent to the user.
Sysop : Before a user is disconnected, after
area incorrectly entering their password, they
are given the opportunity to enter a msg
to the sysop. The SYSOP AREA defines which
area the msg is placed in.
PROMPTS - This menu allows you to define the global system
prompts. The prompts in this section are common to all
languages.
Logon : This is the prompt that the user will see
prompt when prompted for his/her name at logon.
Left & : These define which characters RemoteAccess
Right places around Yes/No and similar prompts.
brackets
For example - if the characters are "{" and
"}", a Yes/No prompt would appear as:
{Y/n}?
Language : This prompt is displayed when RemoteAccess
prompt asks the user to select a language.
Language : This prompt is displayed above the list of
header available languages.
PRINTER - In this section you may define which printer
port you wish RemoteAccess to direct output to when using
the "-P" command-line parameter or the ALT-P key to enable
log printing. (See COMMAND-LINE PARAMETERS and SYSOP KEYS
for more information on printer logging). {+} Registered
only.
29
RACONFIG - Modem
────────────────────────────────────────────────────────────
OPTIONS - This window contains general configuration
information for your modem.
Comport : Set this to the communications port you have
your modem hooked up to. Valid ports are
1-4. A setting of 0 forces RA into local
mode regardless of command-line parameters.
Speed : SPEED refers to the highest modem-computer
speed your modem supports. If you are using
a high-speed modem you should lock the speed
at the modem's maximum speed to ensure the
highest possible throughput. Refer to your
FOSSIL documentation on how to do this.
Lock : If you have a high-speed modem which is
capable of being locked at a fixed speed,
set this option to "Yes".
Answer : Setting this to "Yes" tells RemoteAccess to
make the modem answer the phone whenever it
receives the ring string by sending the
answer command to the modem (see COMMANDS).
If it is set to "No" then it is assumed that
the modem will answer the phone itself.
"Yes" is the preferred setting, as it
ensures that your BBS will only answer the
phone if it is "alive and well". Otherwise,
you are likely to upset your users when
they waste their money on a BBS that
answers the phone and then does nothing.
Delay : This refers to a delay, in tenths of a
second that RemoteAccess waits between
sending characters to the modem during
initialisation. Usually you will only
need to raise this above zero if you are
using a high-speed modem that cannot handle
commands at high speeds. A typical example
of this is the Courier HST, which requires
a delay of about 3.
30
Buffer : This field sets the size of RemoteAccess'
internal communications send buffer for baud
rates up to 2400. You can change it to
fine-tune your system for maximum
throughput. If you are using a slow machine
(ie. a 4.77 MHz XT), set it to zero. This
disables the internal buffering system and
its associated overhead. For most systems,
the default setting of 5 will not need
to be changed. In a multi-tasking
environment though, you will achieve much
better performance by increasing the buffer
size. Experimentation has shown values
around 80-150 to be most effective.
Break : Some modems (such as the Courier HST) can be
configured to clear their internal transmit
buffer when they receive a break signal from
the local console. If the BREAK option is
enabled, RemoteAccess will send a break
whenever it purges it's own internal
transmit buffer. The result will be a
faster hotkey response. Since most modems
CANNOT handle this, the recommended setting
is OFF.
Tries : This is the number of times RemoteAccess
will attempt to initialise the modem before
aborting and returning an error condition.
Offhook : If enabled, this will force RemoteAccess to
take the modem off-hook when a call is
terminated.
COMMANDS - This submenu is where the commands that are
sent to the modem are defined.
Init1 & : These fields define in the strings sent to
Init2 the modem, whenever RemoteAccess is fired
up, in order to prepare the modem to take
calls. See the reference section MODEM
STRING TRANSLATION at the end of this
document for more information.
Busy : The BUSY string is sent to the modem
whenever you either log-on locally, drop to
DOS or if you ESCape from the "wait for
call" sequence. You could either tell the
modem to go "off hook" with an "ATH1|", or
simply not to answer the phone by dropping
DTR. Note : in some countries it is
prohibited to place a telephone line "off
hook", please check with your phone company
if you are unsure.
31
Answer : The ANSWER string is sent to the modem if
you have set automatic answer on, and a
call comes in. Most modems will answer a
call upon receiving an "ATA|" from the
computer.
RESPONSES - The responses section is where you can tell
RemoteAccess what responses it can expect to receive from
your modem.
Init : The INIT response is the string that the
modem returns after RemoteAccess sends it
the init string. Most modems return "OK".
Busy : The BUSY response is the string that the
modem returns after the busy command has
been sent to place the modem "Off hook",
most modems return "OK". Check your modem
operating manual for more information.
Ring : The RING response is the string the modem
displays when someone calls your system,
to indicate that the call should be
answered. Most modems return "RING", some
use "RINGING". Check your modem manual
and set this accordingly.
Secure : The SECURE response is the response your
modem returns when it gets an MNP
connection. Ignore this entry if your
modem doesn't support MNP. Check your modem
manual to determine what string your modem
returns.
300 - : 300 - 38400 are the response strings the
38400 modem returns when a connection is made with
another modem. Most modems return a
"CONNECT <Baudrate> " string, or simply
"CONNECT" for 300 baud. Note that if this
is the case you should specify the vertical
bar after the string to indicate the end of
the string. (See MODEM STRING TRANSLATION
in the reference guide at the end of this
document).
32
RACONFIG - Manager
────────────────────────────────────────────────────────────
This is perhaps the most important part of RACONFIG. It
is where all the message and file areas, protocols, menus,
users and events are defined.
MESSAGES - From the messages menu you may define up to
200 different areas, each with it's own attributes and
security requirements.
Name : In this field you can give each message area
a name. This should be a meaningful
description of its content, for example
"IBM Users", "Cooking", or "Games". Avoid
using names like "Message Area 1". If you
wish to "delete" a message area, simply set
the area name to nothing.
Type : Each area can be one of three TYPES. LOCAL,
if the message area is available on your BBS
only, or if you are in a mail network such
as FidoNet, ECHOMAIL or NETMAIL. These
latter two types are explained more fully
in the MAIL NETWORKING section. If you are
not part of a mail network, set the type
to LOCAL.
When a user posts a message in a message
area which has the type LOCAL assigned, the
recipient must be an existing user of the
system. If RemoteAccess can not find the
recipient's name in the user database the
user will be asked if he/she would like to
search/list the user database. The only
exception to this is a message posted to
"All".
Status : This controls the types of messages that
users are allowed to post in the area. You
have the choice of PRIVATE ONLY, PUBLIC
ONLY, PRIVATE/PUBLIC and READ ONLY. It may
be desirable to allow only public messages
in general discussion areas, or likewise
private only in user-to-user message areas
to ensure that all messages in that area may
be read only by the sender or the recipient
of the message. Message areas marked as
READ ONLY may only have messages posted in
them by the sysop. This is useful for, say
a general announcement area.
33
Users : Each message area may be configured via the
USERS option, to allow users to post
messages with real names only, handles only
(this is the user's permanent "registered"
handle), or with an alias which the user
may select at the time the message is
posted. RemoteAccess will not allow the use
of the alias "Sysop" or any other users name
or handle.
Days old : This defines how long RemoteAccess should
keep old messages. The removal of messages
which are older than the number of days set
is performed by RAMSG, the message-base
maintenance utility (see MESSAGE DATABASE
FILES for more information).
Days rcvd : This defines how long RemoteAccess should
keep messages that have been read by the
addressee. As with the previous field, the
removal of these messages is performed by
RAMSG (see MESSAGE DATABASE FILES).
Max msgs : This defines how many messages RemoteAccess
will allow to be kept in each area, after
this limit has been reached RAMSG will
remove the oldest messages and maintain a
constant number of messages equal to the
number specified. (see MESSAGE DATABASE
FILES)
Echoinfo : The default action for an EchoMail message
area is to append an origin line (see the
section on MAIL NETWORKING for more on this)
to each outgoing message. This may be
disabled by setting the ECHOINFO flag to
"No".
Combined : The COMBINED flag determines whether users
may select the current message area as part
of their combined message area settings.
Attaches : RemoteAccess provides an extremely powerful
facility which allows users to attach one
or more files to a message. This means that
users can send each other files privately.
To enable this option, set ATTACHES to
"Yes". Also ensure that the FILE ATTACH path
in the SYSTEM/PATHS submenu points to a
directory which exists. When a user uploads
files with a message, RemoteAccess creates
a uniquely named subdirectory in this
directory, and places all the attached files
in it. After the recipient has received the
message and confirmed that he/she received
all the files, all the files and the
directory are deleted. This option is valid
only in areas defined as LOCAL.
34
If the user elects to attach a file to a
message when logged onto a local node,
RemoteAccess will prompt him/her for the DOS
path and filename of the file they wish to
send. {+} Registered only.
SoftCRs : This option, if on, will tell RA to treat
SoftCR characters ($8D), in this message
area, as normal printable characters.
Deletes : This, if enabled, will allow users to delete
messages in this message area provided the
message is either to or from the user.
AKA : This option allows you to specify which
network address you wish to use for this
message area. If you only have one or no
network address then you need not concern
yourself with this option. You may select
any of the AKAs you have defined in the
SYSTEM/ADDRESS menu (see MAIL NETWORKING
for more information).
Origin : This option allows you to define a separate
origin line to the message area. This origin
is appended to the bottom of all outgoing
EchoMail messages. If this is left blank
RemoteAccess will append the default origin
line specified in OPTIONS/MESSAGES submenu.
Access to the message area is controlled by READ, WRITE and
SYSOP security levels and access flags. Full information
on security levels and flags can be found in the SECURITY
section.
Read : This is the minimum security level and flag
Security combination the user needs to be allowed to
read messages in each message area.
Write : This is the minimum security level and flag
Security combination the user needs to be allowed to
post a message. When replying to a message
addressed to the user, he/she is only
permitted if the user's security level is
equal to or higher than the Write Security
setting.
Sysop : This security access combination permits
security reading of all messages in the area, even
if they are private and addressed to
another user. This is useful for message
areas which are run by assistant sysops
and the like, so they can check messages for
suitable content and delete off-topic ones.
35
FILES - The FILE submenu is where you define your file
areas. Full information on security levels and flags can
be found in the SECURITY section.
Name : NAME is the name of the file area as the
user will see it.
Path : The PATH is a fully qualified directory path
that points to where the files in this area
are stored, for example C:\FILES\IBM\GAMES\.
Note that the trailing backslash is
optional.
New files : This option determines whether to include
this file area in a new files scan, and may
be overridden by the use of optional
parameters when using the "new files" menu
command. (see MENU COMMANDS for more
information.)
Upload : When a user uploads a file, RemoteAccess has
dupes the capability to search for the file
before allowing the user to upload it. If
this option is disabled, RemoteAccess will
not scan this area for dupes.
Long : If you would like to have long descriptions
desc for your files, ie. more than one screen
line, then you should enable the LONG DESC
option. This enables RemoteAccess to handle
the descriptions correctly. When editing
your FILES.BBS file it is not necessary to
put a [CR] in the description as the text
will be wrapped when displayed.
NOTE: To enable long descriptions for
uploads in which the full upload path is
specified in the optional data field rather
than a template area number, append a /L
after the upload path.
Access to the file areas is controlled in a similar fashion
to that of the message areas, by the DL, LIST and UL
security levels and access flags.
DL : This determines the minimum security level
security and flag combination at which a user can
download files from this area.
List : This determines the minimum security level
security and flag combination at which a user can
list the files in this area.
UL : This determines the minimum security level
security and flag combination at which a user can
upload files into the area.
36
The list of files that your users see for a particular area
is generated from a textfile that you can edit yourself. By
default, this file is called FILES.BBS and is located in the
same directory as the files it describes. When a file is
uploaded to a file area, RemoteAccess creates a new
FILES.BBS if it doesn't already exist, and then appends a
single line entry for the file. The format of FILES.BBS is
simple:
<FILENAME.EXT> <Description>
Filenames that contain wildcard / pattern match characters
are expanded to full filename specs. A separate entry is
displayed for each matching file found.
The <Description> field may be up to 255 characters long.
When displayed to the user the description is automatically
word wrapped to the width of the user's screen.
If you have some kind of read-only mass storage device
online such as a CD-ROM, then it usually isn't possible to
have a FILES.BBS in each file directory. To get around this
problem simply create a separate directory to hold all of
the FILES.BBS files. The individual files should be named
FILES.n, where n is the file area number. For example -
C:\RA\CDROMLST\FILES.33
Is the file that would be read in place of FILES.BBS for
area number 33. In this example, the FILE LIST path (in the
PATHS section of RACONFIG) has been set to C:\RA\CDROMLST.
The EXTERNAL SUPPORT FILES section contains information
on marking files as free and/or password protected under
the subheading FILES.CTL.
37
PROTOCOLS - The protocols section deals with the
different transfer methods used by RemoteAccess to send
and receive files. This section also allows you to define
any new transfer protocols that you wish to add.
The INTERNAL PROTOCOLS submenu allows you to disable,
enable, or make available only on an error-free (ie. MNP)
connect, any of the six internal protocols. MNP (Microcom
Networking Protocol), also known as ARQ (Automatic Repeat
Request), is a method by which modems can detect
transmission errors and resend the incorrect data. Only
modems which both have MNP facilities can use this type of
error correction. Since, when using MNP, error correction
is carried out by the modem hardware, the software does not
need to watch the incoming data for errors or wait for the
receiving modem to confirm that it has received all the data
correctly. Some protocols are written especially for MNP
modems and therefore get very fast throughput. If you use
such a protocol you should set it for "error free" connect
only. An example of such a protocol in the internal
protocol list is "Ymodem-G".
When using an "error free" protocol, RemoteAccess will
establish whether the user is using an MNP modem by looking
at the modem connection string to see if it contains an
errorfree response code. This code is definable in RACONFIG.
{+} Available in the registered version only.
The EXTERNAL PROTOCOLS submenu. This option allows you to
interface up to fifteen external protocols for your
users to use, in addition to the six that are built-in.
Name : The NAME field is the protocol name as
it will be displayed to the user when they
download or upload. Note if you use the
textfile XFERPROT.A?? to override the hard
coded protocol selection menu then this name
will not be displayed to the user.
Key : The KEY is the keypress that should activate
the protocol. Note that the KEY must be
unique. In other words, since [Z]modem is an
internal protocol, you can't use [Z] to
activate an external protocol.
Ext ctl : Before RemoteAccess activates the external
file protocol, it creates a control file that
tells the protocol which files to send or
receive. This file consists of some general
information and a list of files, one per
line. You may define exactly what each
line looks like. If you select EXT CTL
FILE, then RemoteAccess will write the
information needed by Opus-compatible
external protocols at the beginning of the
file before the file list. Check the docs
for each protocol you install to determine
whether it is "Opus compatible".
38
Batch : If the protocol has the capability to send
or receive more than one file at a time, set
BATCH to "Yes".
Status : You may temporarily disable the current
protocol by setting its status to
NOT-AVAILABLE, re-enabling it later by
setting it to ALWAYS AVAILABLE. If you
wish to restrict a protocol's use to users
who have connected using an error correcting
modem then change the status to ERROR FREE.
This option is particularly useful if you
use protocols such as "YModem-G" which are
specifically designed for error correcting
modems. (See the section on internal
protocols for a full explanation of "Error
Free" connections and MNP).
Log file : The LOG FILE is the full path and name of
the log file that the external protocol
writes. This file contains information about
what files were actually sent or received.
Without this information, RemoteAccess will
not be able to update the user's record.
Most protocols have the facility to create
a log of the files that were actually sent
or received; if the protocol you are
installing doesn't, it is advisable not to
use it.
Control : The CONTROL FILE is the full path and name
file of the control file that RemoteAccess
creates before activating the protocol. In
order to allow the use of as many different
protocols as possible, you have full control
over the format of this file.
DL/UL : DL/UL COMMAND LINE tells RemoteAccess what
command program name to execute in order to
lines activate the external protocol. It is
possible to insert variables into the
command line using special control
characters. For example, the string:
PROTNAME.EXE Send *B
would be expanded to:
PROTNAME.EXE Send 2400
For a full list of special control codes,
refer to the description of a Type 7 menu
command in the MENU COMMANDS section. In
addition to these codes, the # symbol can be
used if the filename to send or receive
needs to be specified on the command line.
39
DL ctl : The DL CTL STRING determines the format
string of each file entry. Inserting a "@" in the
string substitutes that position with the
file name. For example, if you wanted to
download the file C:\FILES\FUN\CASINO.ZIP
using an Opus type external protocol, you
would set the control file string to:
Send @
When the control file is created, this would
be expanded to:
Send C:\FILES\IBM\FUN\CASINO.ZIP
If the user were to select a batch download,
say RA*.ARJ, the wildcard/pattern match is
expanded to a full list of fully qualified
path and file names.
UL ctl : The UL CTL STRING works in exactly the same
string way as the DL CTL STRING, except that for
batch uploads, instead of specifying the
full file name, it substitutes just the
path to the upload directory, as the
filenames are not known prior to the upload.
DL/UL : When the external protocol has finished and
log control is returned to RemoteAccess, the
keyword log file that was created is scanned to
extract information about what files were
sent or received. RemoteAccess scans the
file for the UP or DL LOG KEYWORD. As soon
as it finds that word, it will scan forward
x number of words to get the name of the
file transferred and a description, if
available. To illustrate how this works,
look at this extract from a BiModem log:
= 10 Sep 14:10:10 BMOD DL-B \GRAPH\VGA.ZIP
= 10 Sep 14:12:22 BMOD DL-B \GRAPH\MAP.ZIP
The DL/UL LOG KEYWORD can be any word in the
log file that indicates the transfer of a
single file. The keyword in the example
above should be set to "DL-B".
Log name : This option determines how many words RA
word 1 scans after it finds the UL/DL LOG KEYWORD,
to find the file name that was uploaded or
downloaded. In the previous example the LOG
NAME WORD 1 should be set to "1", as RA has
to scan ahead 1 word after finding "DL-B"
to obtain the downloaded file name.
40
Log desc : When a user uploads, RA can also obtain a
word 2 description from the log file if the
protocol used supports description logging,
and write it directly to the FILES.BBS. To
achieve this you can set the LOG DESC WORD 2
to the number of words RA has to scan after
it finds the UL/DL LOG KEYWORD. If the
protocol doesn't support description logging
or RA cannot find a description, the user is
prompted for the description.
41
Example : Installing Lynx as an external protocol
-------------------------------------------------
Select an empty protocol slot, and enter the following
information:
Name : Lynx
Key : L
Extended control file : No
Batch available : Yes
Status : Enabled
Log file name : C:\Ra\Dszlog.Txt
Control file name : C:\Ra\Lynx.Ctl
Download command line : Lynx.Exe S /*P /*B /S /H @Lynx.Ctl
Upload command line : Lynx.Exe R /*P /*B /S /D /H #
Download ctl string : @
Upload ctl string :
Download log keyword : x
Upload log keyword : X
Log : Name word # : 10
Log : Desc word # : 0
(Note the case of the upload and download log keyword
entries).
The above example assumes that your system directory is
C:\RA. To complete the installation, you'll need to set the
DSZLOG environment variable to the full path and name of the
log file that Lynx writes:
SET DSZLOG=C:\Ra\Dszlog.Txt
42
LANGUAGES - RemoteAccess contains full support for
multiple languages. This means that you can have different
prompts, textfiles and menus for any language. This version
of RemoteAccess supports up to eight languages, while the
professional version supports a maximum of one hundred.
Selecting the LANGUAGES option displays a list of all the
installed languages. To edit one of the currently
installed languages position the cursor bar over it and
press ENTER. If you wish to generate a new language
file, position the cursor over a blank entry and press
ENTER.
Name : This field holds the name for the language,
this is the name which will be displayed to
users when they are asked to select a
language. It is important that you use the
spelling of the language which would be used
by people who speak the language.
Available : If you do not wish to make the language
available set the AVAILABLE option to NO.
Language : This is where you can edit all the prompts.
There are approximately 500 different
prompts, all of which can be changed to suit
your needs. To use the editor place the
highlight bar over the text you wish to
change, press ENTER and then enter the new
text. At the top of the editor screen the
default English text appears for the
currently selected prompt. You may include
any textfile control characters in any of
the prompts (see the section on TEXT CONTROL
CHARACTERS for further information).
When editing the prompts the following keys
can be used to assist:
[ALT-C] - To change the prompt's default
colour. If set to black on black,
RA will display the prompt in the
internally hard-coded colour.
[ALT-D] - To copy the default into the
current prompt.
[ALT-I] - Display / edit the "info" field.
This usually contains information
about the revision level and author
of the language file being edited.
[ALT-S] - To search for an entry.
43
You can run the language editor directly without having
to go through the RACONFIG menus by using the "-L"
parameter on the RACONFIG command line, for example
"RACONFIG -L" (See the section on COMMAND-LINE PARAMETERS
for further information).
Editing the languages is a simple process
however there are a number of pitfalls to
watch out for :
* You will notice that some prompts (marked
with an asterisk before the prompt number)
require you to enter the keys that are
used to activate the options to which that
prompt refers. Make sure you maintain the
correct order of the keys, and that they
match your new text.
* Some prompts are the headers for listing
functions, like today's callers, who's
online etc; you'll see that these have
obvious spacing built in, which must be
maintained if you change any part of the
text.
* If you're translating the text into
another language, there are two rules of
thumb:
1. Translate all text as literally as
possible,
2. Try to use "generic" words and
phrases.
For example, RA uses the same prompt for
the "Access denied!" message if the user
gets his password wrong at logon as it
does when a user tries to access a
passworded menu and fails - therefore you
wouldn't want to change the string to
"Access denied, logging you off". Anyway,
you get the idea.
Menu path : Each language can have it's own set of
menus. With this option you can define the
paths to the menus for each specific
language.
Text path : Each language can also have it's own set of
textfiles. With this option you can define
the paths to the textfiles for each specific
language.
Ques path : In this field you may enter the path to the
directory where the questionnaire files are
stored for each individual language.
44
Filename : This option allows you to give your language
a filename to be stored in. Enter the path
and filename in this field. It is not
necessary to enter an extension for the
filename as the extension .RAL will be added
automatically.
ALT-Fn KEYS - When one of the ten function keys on your
keyboard is pressed in conjunction with the ALT key,
RemoteAccess will do one of three things : If the command
string that you have assigned to the function key that is
pressed is a standard DOS command line, then that line
will be executed in a shell while RemoteAccess remains in
memory. If, on the other hand, the first character of
the command string for the function key is the query
symbol (?) followed by a number, RemoteAccess will exit to
DOS with an errorlevel equal to the number. Alternatively,
if the first character of the command string is the hash
(#), RemoteAccess will display the named text file from the
textfile directory. For example, suppose three entries
looked like this:
5 : ?110
6 : C:\COMMAND.COM
7 : #WELCOME
Pressing ALT-F5 would cause RemoteAccess to exit to DOS with
an errorlevel of 110, ALT-F6 would execute a copy of
COMMAND.COM in a shell, and ALT-F7 would display the
appropriate (ASC/ANS/AVT) version of your WELCOME.A??
file to the user.
EVENTS - The RemoteAccess Event Editor allows you to set
pre-determined times during the week when RemoteAccess will
automatically exit to your batch file and perform certain
functions, usually some kind of system maintenance. You may
define up to 20 events to run at any time during the day.
In addition to this, it is also possible to specify that
an event only run on a particular day or days of the week.
To modify an event, simply move the highlight bar to the
event you wish to alter, and press [CR]. Use the cursor keys
to move between entries in the event edit window, and enter
the time you want the event to start at, in 24 hour format.
Next, enter the errorlevel; when the event is activated,
RemoteAccess will exit to the batch file from which it was
called at this errorlevel. Your batch file should trap this
errorlevel and act accordingly. In this window, you can also
specify what days you would like the event to run on, and
whether the event is enabled or disabled. If a user's
upload or download overruns an event which is FORCED then
the transfer will be aborted and the user disconnected to
ensure that the event runs at the proper time. More
information on trapping events is contained in the BATCH
FILES section.
45
MENUS - This option activates the RemoteAccess menu
manager. For full details on setting up menus and menu
types please refer to the MENU section of this manual.
USERS - This is where you add, delete, modify and
otherwise maintain your user database. Full details can be
found on the user editor further on in the manual under
the section THE USER DATABASE.
CTL FILES - This option allows you to edit all the *.CTL
files in addition to any other ASCII textfile, for example a
FILES.BBS list.
VIP : Very Important Persons list.
TRASHCAN : Disallowed users list.
NODECOST : Nodelist costing file.
FILES : Passworded and free file list.
BADFILES : Disallowed files for upload.
HANDLES : Disallowed handles.
PHONENUM : Disallowed phone number masks.
LIMITS : Time and file transfer restrictions.
PWDTRASH : Disallowed passwords.
NAMES : User name macros.
Other : Any other textfile. (User selectable)
COMBINED - This option allows you to specify which
message areas will by default be enabled for combined
message area reading to new users.
46
SECURITY
────────────────────────────────────────────────────────────
All user-security is controlled by a security level and set
of access flags. The security level is any number from 1 to
64,000. Setting a user's security level to zero will lock
him or her out of the BBS. There are thirty-two access flags
arranged in four sets of eight individual flags, each of
which can be either ON or OFF. An ON flag is represented by
an "X", and an OFF flag by a "-".
Firstly let's look at menu security. Each menu is made up of
a number of lines, each of which may have a command
associated with it. (The structure of menus is explained
fully in the next section). In order for a menu line to be
visible (and selectable) to a user, the user's security
level must be equal to or greater than the security level
assigned to that line. In addition to this, every flag that
is set ON in the menu line must also be set ON in the user's
flag setting.
Read/Write and Sysop access to message areas is controlled
in the same way. To be able to read messages in an area, the
user must have not only a sufficient security level, but
also at least the flags that are defined in RACONFIG for
that area. Similarly, the file area access security/flag
system works in the same way, BUT the settings only affect
the three file search menu functions. To restrict
up/download access to certain areas, you will have to use
menu security.
47
MENUS
────────────────────────────────────────────────────────────
This is possibly the most important stage in configuring
your BBS. The menus that you create will give the system
it's own "feel", and will make your system look completely
different from the one next door. The menu system gives you
one hundred percent flexibility not only cosmetically, but
in allowing and disallowing access to certain functions and
parts of your BBS to groups of users.
The menus are line-oriented. Using the menu editor supplied,
you enter the lines one at a time. Each line has a line of
text that is displayed to the user, a menu "type", a minimum
security level and flag setting required to access that
line, and some optional data that is used by some menu
types.
There are approximately seventy menu functions that may be
activated by the user pressing the key you have linked to
that function. These functions are explained fully in the
following pages.
48
Menu functions
Type : 1
Name : Goto another menu
Optional Data : <Menu Name> [Password] [/F=<File Area>|+|-]
[/M=<Message Area>|+|-]
This function causes a jump to another menu, which has been
created with the editor and saved as <Menu Name>. If
[Password] is specified then the user will be asked to
supply a non-case-sensitive password before proceeding.
<File Area> and <Message Area> set the currently selected
file and message areas respectively for the template system.
See the section on MENU TEMPLATES for a full explanation on
this.
Examples:
FILES : Jump to the menu 'FILES'.
FILES FBES : Prompt the user for a password, then jump
to the menu 'FILES' provided the user
entered the correct password of 'FBES'.
FILES /M=10 : Jump to the menu 'FILES' and set the
selected message area template to message
area '10'.
FILES /F=10 : Jump to the menu 'FILES' and set the
selected file area template to file area
'10'.
FILES /M=+ : Jump to the menu 'FILES' and set the
selected message area template to the
current message area plus 1.
FILES /F=+ : Jump to the menu 'FILES' and set the
selected file area template to the current
file area plus 1.
Type : 2
Name : Gosub another menu
Optional Data : <Menu Name> [Password] [/F=<File Area>|+|-]
[/M=<Message Area>|+|-]
As for Function 1, but saves the path to the last menu on a
"stack", making it possible to return to the calling menu
with a type 3 function. Note that menus called in this way
may be nested to a maximum of 50 levels.
49
Type : 3
Name : Return from gosub
Optional Data : None
Use this function to return from a Gosub (type 2) to the
previous menu in the menu stack.
Type : 4
Name : Goto menu after clearing menu stack
Optional Data : <Menu Name> [Password] [/F=<File Area>|+|-]
[/M=<Message Area>|+|-]
As for function 1, but before jumping to the new menu, the
gosub menu stack is cleared. Obviously you can't use a type
3 return straight after this!
Type : 5
Name : Display a *.ASC/*.ANS/*.AVT text file
Optional Data : <1-8 character name>
This menu type will display a file in your textfile
directory (as defined in RACONFIG). RemoteAccess will
display the file specified in the Optional Data field with
one of three extensions. If the user has AVATAR codes
active in their setup, RemoteAccess would display the file
<Filename.AVT> to the user. If however the file
<Filename.AVT> was missing or the user did not have AVATAR
enabled, but only ANSI, the file <Filename.ANS> would be
displayed. Finally if the user has only 'ASCII' enabled or
both the files <Filename.AVT> and <Filename.ANS> are missing
the file <Filename.ASC> would be displayed.
These files may contain any text or graphical information
up to the limitations of the text format. For example you
cannot display ANSI colour in a *.ASC file. Along with
text and graphics it is possible to display comprehensive
system and user details by inserting special control codes
in the files. These codes are listed in the TEXT FILE
CONTROL CODES section.
Examples:
STATS : This Optional Data line would display the
file 'STATS.AVT' if the user has AVATAR
enabled, 'STATS.ANS' if the user has ANSI
enabled or the file 'STATS.AVT' is missing
and 'STATS.ASC' if the user has only ASCII
enabled or both the AVT and ANS files are
missing.
50
Type : 6
Name : Bulletin menu
Optional Data : <1-8 character name>
This function will display the file <filename.ASC/ANS/AVT>
from the textfile directory. The user is then prompted
for a file suffix of length '8-<length of filename>'. The
suffix is then appended to the original filename, as
specified on the Optional Data line, and that textfile is
displayed to the users as it would be in a Type 5 command.
Examples :
BULLET : If this optional data field was specified
the file 'BULLET.ASC/ANS/AVT' would be
displayed. Then the user is prompted for a
2 character input. If the user typed "1B",
then the file "BULLET1B.ASC/ANS/AVT" would
be displayed. The original text file defined
in the optional data should therefore
contain a list of available bulletins.
51
Type : 7
Name : Run an external program in a shell
Optional Data : <Command Line> [Control Codes]
This command will run an external program (a "door") in a
shell while the user is on-line. Examples are on-line games,
mail-checking facilities and so on. (Refer also to type 15 -
Exit to DOS for an alternative way of running external
programs). The FULL name of the program must be specified if
it is an .EXE or .COM file. To run one of these two simply
put the name of the program in the optional data field. If
you wish to call a batch file, this must be done via
COMMAND.COM, the memory-resident command-line processor. So
to run your TradeWars batch file, the command line could
read:
C:\COMMAND.COM /C \BBS\DOORS\TW2.BAT
Many programs require extra information to be passed on the
command line, so the following control codes may be used. In
each case, the code is replaced by it's value:
*A : Write the user's handle (if any) in DORINFO.DEF
instead of the user's real name.
*B : User's baud rate, or 0 if local.
*C : Full path and name to COMMAND.COM.
*D : Automatically generate the Doorway DOOR.SYS
parameter file.
*F : User's first name.
*G : ANSI graphics, 0=Off/1=On.
*H : Normally the FOSSIL is de-initialised before
running an external program to avoid any possible
conflicts between the FOSSIL and the program.
Specifying this parameter leaves the FOSSIL "hot"
or active.
*L : User's last name.
*M : Activate MemorySwap feature. RemoteAccess attempts
to swap itself and all the memory it occupies to
EMS (if installed) and disk, leaving only 2k
resident. Great for running memory-hungry
programs, but it takes a few seconds to do the
swap. If it can't do the swap, it will try a
normal shell. NOTE : Some programs are notorious
for "fragmenting" memory, and will not work with
MemorySwap. Programs compiled in QuickBASIC, such
as TradeWars 1000 exhibit this problem.
*N : Line number, as specified by the -N command line
parameter.
52
*Oxxx : Override the baudrate value passed on to the
called program with xxx.
*P : Communications port being used (1-4).
*R : User's record number in the user file.
*S<filename.ext> :
Generates a custom exitfile using a template file
with the extension .RAT in the system directory
which contains any valid textfile macros. See the
"Textfile Control Codes" section of the
reference chapter for a full list of available
text macros.
The 'filename' is the base filename of the .RAT
template file. RA will process the file and create
filename.ext where the EXITINFO.BBS file is stored.
*T : Time remaining for current call.
*! : Freeze the system timer for the duration of the
shell. Useful for running external utilities like
full-screen chat programs etc.
*# : Turn off the "Wants Chat" indicator on return from
the shell. This is to facilitate the proper
installation of external chat utilities.
*0 : The full path to the currently selected file
template area.
*1 : The number of the currently selected template
message area.
In addition to this command line information that can be
passed, RemoteAccess also creates two data files before the
shell. DORINFO1.DEF, which is a RBBS-compatible file, and
EXITINFO.BBS, which contains an extremely comprehensive
amount of system and user information. The structure of this
file can be found in the RemoteAccess structures document,
RASTRUCT. It should also be noted that ALL system files are
written to and closed off before the shell is activated,
then reopened and scanned upon return. This means that
programs that modify system files (eg. USERS.BBS) can be
safely run in a type 7 shell.
RemoteAccess also supports Doorway's DOOR.SYS parameter file
directly; including a *D on the command line enables the
generation of this file.
Note that the external program must do it's own time limit
and carrier watchdogging, in the event that the user does
not exit from the program correctly.
53
Type : 8
Name : Product information
Optional Data : None
Displays product information including the version number,
licensing details and copyright information. If a user
is on-line remotely, the name and version of the FOSSIL in
use is also displayed.
Type : 9
Name : Terminate the session
Optional Data : None
Displays the GOODBYE.ASC/ANS/AVT text file and hangs up on
the user by dropping the DTR signal to the modem. To this
end, make sure your modem's DTR line is not "forced high"
continuously.
Type : 10
Name : System usage
Optional Data : None
This displays a nicely formatted full-screen autoscaling
graph that depicts system usage in terms of percentage use
per hour. Each node (line) keeps a separate system usage
graph and therefore you can see how busy each individual
node is. If you wish to reset the graph, delete the file
"TIMELOG.BBS" from your system directory or, if you are
running multi-node, the node directory.
54
Type : 11
Name : Page sysop to chat
Optional Data : <Paging string>
This function will display the <paging string> to the user
and page the sysop for a chat by playing a paging tune
sounded at the local console. If the REASON FOR PAGE option
has been enabled in RACONFIG, RemoteAccess will display a
user-defined prompt and wait for the user to enter a
reason for requesting the chat. When the paging tune
sounds the sysop may select "C" to chat with the user, or
"A" to abort the page.
You may break in for a chat at any time by pressing ALT-C.
If the remote is using an IEMSI-compatible terminal which
supports the IEMSI full-screen chat flag, RemoteAccess will
initiate a split-screen chat session. To force the "old"
style line-oriented chat, hold down the left SHIFT key when
you press ALT-C.
All sysop keys are listed in the reference section of this
manual. During a chat, the system timer is "frozen", and
is re-started when the chat is terminated. The sysop
terminates chat mode with the ESCape key. During chat,
you may open a capture file to record what is said during
the chat session by pressing CTRL-A, and again to close
the capture. If you have set the "Auto log" option in the
Paging options of RACONFIG to on, RemoteAccess will open a
chat log automatically upon entering chat.
The times at which a user is allowed to page the sysop for a
chat and the number of times a user is allowed to request a
chat in one session is controlled in RACONFIG. You can
override the times at which users can page you by pressing
ALT-O when a user is on-line and selecting between the
options.
The default paging sound is a constant "beep-beep" tone for
the duration of the page. You may define your own page sound
by creating a text file called PAGE.RA in the system
directory. The following keywords are valid:
TONE [hz] [1/100's sec] (sounds hz)
WAIT [1/100's sec] (sounds nothing)
55
The following table lists several musical octaves and the
correct frequency value associated with each note:
Note Oct - 1 2 3 4 5 6
----
C F 45 134 268 536 1071 2145
C# r 71 142 284 568 1136 2273
D e 75 150 301 602 1204 2408
D# q 80 159 319 638 1275 2551
E u 84 169 338 676 1351 2703
F e 90 179 358 716 1432 2864
F# n 95 190 379 758 1517 3034
G c 100 201 402 804 1607 3215
G# y 106 213 426 851 1703 3406
A # 113 225 451 902 1804 3608
A# 119 239 478 956 1991 3823
B 127 253 506 1012 2025 4050
The RemoteAccess distribution archive contains a sample
PAGE.RA file to get you started.
Type : 12
Name : Questionnaire
Optional Data : <1-8 character file name> [/N]
Initiates a questionnaire. The <file name> is the first part
of the name of the questionnaire file. All questionnaire
files are stored in the questionnaire directory, as
specified in the RemoteAccess Language Editor, and have
a name extension of .Q-A. User's responses are stored in an
output file named <filename>.ASW. There is a full tutorial
on questionnaires, including the script language in the
reference section of this manual.
RemoteAccess has two hard-coded questionnaires. If present,
it will initiate the questionnaire NEWUSER.Q-A for a new
user after the hard-coded text file NEWUSER2.ASC/ANS/AVT
is displayed.
The SUBDATE.Q-A questionnaire is automatically initiated
when a user logs on and his/her subscription date has
expired. You could use this questionnaire to possibly
downgrade the user's security and/or flag settings and
display a message informing the user that his/her
subscription has expired.
For information on hard-coded (external support) files,
refer to the EXTERNAL SUPPORT FILES section.
Normally the initiation of a questionnaire is noted in the
system log. Placing the /N parameter after the questionnaire
name on the optional data line will suppress this log entry.
56
Type : 13
Name : User listing
Optional Data : [/G] [/H]
Displays a list of users in the user file. Lists users name,
location, file ratio, and the last time he/she called the
system. This function has some basic pattern matching
capabilities on the name field. By default all users are
listed. However, if a /G is specified in the optional data
field then the user will only see users who are in the same
group. Note that this restriction does not apply to the
sysop. If a /H is specified in the optional data field then
the users handles will be displayed in place of the user
names. If the users handle field is blank then the user
name will be used. The /G and /H options may be used at
the same time to produce a group user listing by handle.
Type : 14
Name : Time
Optional Data : None
Shows the current date and time, time of connection and the
user's daily time limit, time used and time remaining
for the day.
Type : 15
Name : Exit to DOS
Optional Data : <Errorlevel>
This function causes RemoteAccess exit to the batch file
that executed it, with a specific errorlevel. Set the
optional data to the errorlevel you wish to pass to the
batch file. The batch file should trap the errorlevel and
act accordingly. If you exit while the user is still on-
line, to log the user back on invoke RemoteAccess with the -
R command line parameter. This will force it to read the
EXITINFO file that was written at the time of the previous
exit and take the user directly to the top menu. Note that
errorlevels 0 to 5 are reserved by RemoteAccess for system
use (see the reference section on ERRORLEVELS for a complete
list and description of these and how to use them), and
should not be used.
There are two control codes that are valid on the optional
data field:
*A : Pass the user's handle/alias in DORINFO.DEF
*D : Generate the DOOR.SYS file
See the description of the menu command type 7 for
additional information on both of these options.
57
Type : 16
Name : Alter location
Optional Data : None
Allows the user to change the "location" field in his/her
user record. RemoteAccess will automatically capitalise
users locations if the CAP LOCATION option is enabled in
RACONFIG/OPTIONS/NEW USERS.
Type : 17
Name : Alter password
Optional Data : None
Allows the user to change his/her password. Before the
user can change their password they will be asked to re-type
their current password. Frequent password changes should
be encouraged to ensure system security, and in fact there
is an option to force a change of password every certain
number of logons (refer to "RACONFIG").
Type : 18
Name : Alter screen length
Optional Data : None
Allows the user to alter the vertical length of his/her
screen display. This affects the "Continue?" prompt.
Type : 19
Name : Toggle screen clearing
Optional Data : None
Allows the user to specify whether he/she would like screen
clearing codes sent. If enabled RemoteAccess will clear
the users screen every time the user changes menus.
Type : 20
Name : Toggle page pausing
Optional Data : None
Allows the user to enable or disable the "Continue?" prompt
at the end of each screen page.
Type : 21
Name : Toggle ANSI graphics
Optional Data : None
Allows the user to select, or deselect ANSI graphics. If the
user disables ANSI, he/she will be asked whether the use of
the full-screen editor should be disabled.
58
Type : 22
Name : Check the mailbox
Optional Data : None
Checks to see if there is any mail addressed to the user
that he/she hasn't yet read. This can be done automatically
at log-on by setting the appropriate option in RACONFIG. See
the section on configuration for details of the two types of
mail-check available. All new messages are marked for later
retrieval with the "Read Marked" option. Note that the user
will only be notified of mail in areas that he/she has read
access to, as defined in RACONFIG. Although the system only
prompts the user with a "Read mail now [Yes/no]" prompt,
several options can be activated. Valid choices are [R]ead,
[S]can, [Q]uickscan, [K]ill, or [M]ark as received.
59
Type : 23
Name : Read messages
Optional Data : <Message area #> or /M
This command initiates the message reading routines. Before
a user can read any message RemoteAccess checks that the
user has read access to the message area first. The
<Message area #> as defined in RACONFIG, should be placed
in the Optional Data field or if a value of 0 is entered
RemoteAccess will allow the user to read in "combined"
mode (see function type 28 for more information on this
feature). If you put a "/M" in the optional data field in
place of the area number, RemoteAccess will automatically
substitute the currently selected template message area into
the data field. See MENU TEMPLATES for more on this. The
message area number refers to number assigned to the desired
area in RACONFIG.
After selecting this function the user may select one of
eight different reading modes, which are:
(F)orward : Read forward from the selected message
number to the last message.
(R)everse : Read reverse from the selected message
number to the first message.
(I)ndividual : Read an individual message, selected by
message number.
(H)elp : Displays the file "MAILHELP.A??" to the
user, if it exists (see EXTERNAL SUPPORT
FILES).
(M)arked : Read messages marked by the user
previously when doing a message scan,
(See Menu Type 24).
(N)ew msgs : New messages since the users last call.
(S)elected : Read messages, by a search criteria on
the "To:", "From:" or "Subject" fields.
(Q)uit. : Abort the message reading.
60
A menu bar is displayed at the end of each message, this
provides the user with the following functions:
[-] : Read previous reply
[+] : Read next reply
[A] : Redisplay message again
[N] : Go to the next message
[L] : Go back to the previous message
[R] : Post a reply to the current message
[E] : Enter a new message in the current area
[F] : Download files that are attached to the message
[D] : Delete the displayed message (check the "delete
msg" menu function for more information)
[S] : Stop reading messages
The following options are available only to users who have
sysop access to the message area:
[!] : Display ^A kludge lines normally hidden. These
lines normally contain information pertaining to
the product that created the message, echomail
information and information about replies to the
message.
[*] : Edit the current message's attributes. This
allows you to edit the following message
characteristics:
Area no. : Message area number.
From : The sender of the message.
To : The recipient of the message.
Subject : The subject of the message.
Attributes : Message attributes toggles;
Deleted, Netmail, Private,
Received, and Local flags.
Exported : If the msg is an Echomail msg,
this determines if the msg has
been exported.
[X] : Export message to a file or the printer
[/] : Forward message to another user in any msg area.
[=] : Mark message as unreceived and go to the next
message. The message will then be redisplayed
next time you do a mail check.
[U] : Modify the security level of the user who posted
the currently displayed message, provided the user
is listed in the userfile. Great for "on the fly"
user verification! NOTE - only users with a
security level less than the person making the
change may be modified, and their level may not be
upgraded higher than the person making the change.
{+} Registered only.
61
Type : 24
Name : Scan messages
Optional Data : <Message area #> or /M
Same as the READ message function (type 23) but only
displays the message header of each message. The user also
has the option of marking messages for later retrieval.
Messages marked with this method can be read later by the
user by selecting the read "Marked" option from a menu type
23 command.
Type : 25
Name : QuickScan messages
Optional Data : <Message area #> or /M
Same as the READ message function (type 23) but each message
is listed as a single-line entry containing message number,
the author of the message, who it is addressed to, and the
subject line.
Type : 26
Name : Delete message
Optional Data : None
Allows a user to delete a message provided that:
* The user has sysop access to the area the message is in,
OR
* The message is in a LOCAL or NETMAIL area, the user is the
sender or recipient of the message and the message area
allows users to delete messages (See RACONFIG Manager),
OR
* The message is in an echomail area and the user is the
sender of the message, provided the message has not been
exported from the message-base and the message area allows
users to delete messages (See RACONFIG Manager).
62
Type : 27
Name : Post message
Optional Data : <Message Area #> or /M [/L] [/U] [/T=<Name>]
Post a message in the specified area (or the currently
selected template area if the "/M" is used). The user must
have either write or sysop access to the message area, as
defined in RACONFIG. The /L option will log the user off
immediately after the message is saved (useful for a "Leave
message to sysop before disconnecting" option). The /T=
option will force the message to be addressed to a specific
user. Simply place the user's name in the optional data
field after the /T= parameter to select this option. For
example, on my "log-off" menu, I have the following entry:
Menu Type 27
Optional Data: 60 /L /T=Andrew_Milner
(Any messages to "Sysop" are redirected to the sysop's name
as defined in RACONFIG). If you do use a full name, be sure
to use underscores in place of spaces.
Specifying a message area number of zero forces RemoteAccess
to display all message areas that the user has write access
to and prompt for the message area to post the message in.
When posting a message, the user will be prompted for the
following information:
Alias? : If the message area allows users to post
messages using an Alias, the user will
be asked if they wish to do so, if they do
they will then be prompted for the alias
they wish to use.
To : In this field the user must enter the name
of the recipient of the message. In Echo-
Mail areas any name will be accepted. If
however the user is posting a message in a
local message area, RemoteAccess will search
the user database to confirm that the
recipient is a valid user of the system. If
no record of the recipient is found and the
/U parameter is on the optional data line
the user is notified and asked if he/she
would like to view/search the user database.
If the user elects not to search the user
database the message will be posted as
normal.
63
In addition to posting messages to
individual users, it is possible to post
mail to a group of users. The following
macros are valid for a user to use in the
"to" field of a message provided they have
the minimum security level required to post
a group mail message.
Send msg to :
@[g] - all users in group [g]
@ALL - all users
=[s] - all users with security = [s]
>[s] - all users with security > [s]
<[s] - all users with security < [s]
A separately addressed message is generated
for each qualifying user, so large group
mailings can take a little while to process
and occupy a large amount of disk space.
Address : If the message is being posted in a Netmail
area, the user will be prompted to enter the
network address of the system they wish to
sent the mail to. If the user is unsure
of the network address, they may browse
the nodelist obtain the correct address.
NOTE : Browse the nodelist is a {+}
registered feature only.
Subject : In this field, the user may place a short
description of the subject matter of the
message.
Private? : If private messages are permitted in the
message area, the user will be given the
option to address the mail privately for
reading by the recipient only.
Crash? : This option determines if a Netmail message
is sent immediately from your system to the
destination system. The option is only
available to users who have the minimum
security level to use Crash mail.
64
Type : 28
Name : Select combined areas
Optional Data : None
Allows the user to select any combination of message areas
for "combined" mode message reading/scanning/quickscanning.
The user is shown a list of available areas and may toggle
any of them "ON" or "OFF". This combination of areas is
saved as part of the user's permanent user record, and is
restored at next log on. To read messages in the "combined"
area, use a normal read/scan/quickscan menu function but set
the message area number in the optional data field to zero.
Area zero is hard-coded as this combined area and cannot be
defined by the sysop. Note that it is possible to define via
RACONFIG a default selection of combined message areas for
new users.
65
Type : 29
Name : Move a file
Optional Data : <Full source path>
Primarily intended as a sysop/assistant sysop function, this
allows the user to move files from a pre-defined area
<source-path> to any valid DOS directory without the need
for remote access to DOS. After the file has been copied
successfully, RemoteAccess will optionally move the file's
description (if there is one) to the destination directory.
Type : 30
Name : Directory
Optional Data : <Full path> or /F
Displays an MS-DOS style directory of the directory
specified in the optional data field, showing name, length
and date of each file. The user is prompted for an optional
wildcard pattern match filespec. For example "*.*" would
display all files.
The use of the "/F" parameter will enable you to use the
current file template in place of the <Full path>.
Type : 31
Name : List files
Optional Data : <Full path> or /F
This option displays a list of files available for download
from the directory specified by the path name in the
optional data field. The file names and descriptions are
contained in a file called FILES.BBS. This file is
automatically maintained by RemoteAccess when files are
uploaded, but it may also be edited by the sysop. The file
consists of a single word file-name per line with a
description, up to 255 characters in length. Descriptions
that exceed the width of the screen are automatically
wrapped to the next line. It is possible to define how you
want the file listing to be displayed to the user by
editing the file "list format" template in RACONFIG. The
default list format will display the file name, upload date,
size of each file and the file description. An asterisk
before the description signifies that the file is new
since the user's last call. (See RACONFIG/OPTIONS/FILES
AREA for further information on "List Format").
If, instead of the full path to the file area, you put a
"/F", RemoteAccess will substitute the path name that
corresponds to the currently selected template file area, as
defined in RACONFIG. See the MENU TEMPLATE section for
further information on this.
66
Type : 32
Name : Download a file from area
Optional Data : <Full path> or /F [Password]
Enables the user to download any file that is contained in
the specified directory. Note that the file need not be
listed in that directory's FILES.BBS for the user to be able
to download it. If a password is specified for the file in
the "FILES.CTL" file or a password is specified in the
optional data field, the user will be asked for a non
case-sensitive password before being allowed to proceed with
the transfer. The /F option works in the same way as in
function 31. (See the section EXTERNAL SUPPORT FILES for
further information on the "FILES.CTL" file).
If a user is logged onto a local node, RemoteAccess will
prompt the user for a directory to move the selected files
to.
Type : 33
Name : Upload a file
Optional Data : <Full path> or /F [/L]
Enables the user to upload (send) a file to your system. The
file will be placed in the directory specified in the
optional data path. FILES.BBS will be automatically updated
to reflect the upload. The /F option works in the same way
as in functions 31 and 32.
After uploading a file, the user is prompted to enter a
one line file description. If however the "Long desc"
option is enabled in RACONFIG for the file area to which
the file has been uploaded, the user may give the file a
description longer than one line. The file description a
user enters is appended to the end of the FILES.BBS file for
the area in which the file has been uploaded. The only
exception to this is when the user asks for the file to be
marked private for the sysop only by starting the file
description with a '/'. In this case the file details
are recorded in "PVTFILES.LOG" in the system directory.
If a user selects to upload a file while they are logged
onto a local node, RemoteAccess will prompt them for the
full DOS path and filename of the file they wish to upload.
The user will then be prompted for the file descriptions as
normal and finally the files will be copied to the correct
upload directory. When uploading a file locally it is also
possible for the user to specify a Wildcard, such as
"D:\FILES\BBS\RA*.ARJ". This would enable the user to
upload multiple files matching the wildcard criteria.
Use the /L parameter to enable long file descriptions (see
the section on FILES for more information on this feature).
67
Type : 34
Name : View archive
Optional Data : <Full path> or /F
Allows the user to view the contents of an archived file in
the specified directory. The following archive formats are
supported:
.ARC/PAK/PKA
.ZIP
.ZOO
.LZH/LZS
.DWC
.MD
.LBR
.ARJ
.HYP
Menu templating is supported with the /F option. This is
explained more fully in MENU TEMPLATES.
Type : 35
Name : File scan by keyword
Optional Data : [area1 area2 area3 ...] or /F
This function uses the data specified in RACONFIG to search
all file areas that the user has access to for a key-word
that is supplied by the user. Any FILES.BBS entries that
match are displayed with the name of the area the match was
found in. The default is to scan all areas, but you may
specify that only certain areas be searched by putting the
area numbers to include on the optional data line.
If you use the "/F" parameter you can force RA to scan only
the currently selected template file area.
Type : 36
Name : File scan by file name
Optional Data : [area1 area2 area3 ...] or /F
Same as function 35, but scans for an exact file name match.
Wildcard and pattern matching characters are valid. The
default is to scan all areas, but you may specify that only
certain areas be searched by putting the area numbers to
include on the optional data line. The /F option works in
the same way as function 35.
68
Type : 37
Name : Show new files
Optional Data : [area1 area2 area3 ...] or /F
Scans all file areas which have the "New Files" option
enabled in RACONFIG that the user has access to, for files
that have a date more recent than the date specified by
the user. The default is to search for files new since the
users last log-on. The default is to scan all areas, but you
may specify that only certain areas be searched by putting
the area numbers to include on the optional data line. The
/F option works in the same way as function 36 and 37.
Type : 38
Name : Type (view) a text file
Optional Data : <Full path> or /F
Allows the user to type to the terminal the contents of a
plain ASCII/ANSI/AVATAR text file in the specified
directory. This is useful for on-line file lists or
magazines. The /F option overrides the path name with the
currently selected template file area path.
Type : 39
Name : Display a fully named text file
Optional Data : <Full path and name>
Similar to the type 5 function, but allows you to specify
the full path and name (including extension) of the file
that will be displayed. Like the type 5 function, this also
interprets the special control characters.
Type : 40
Name : Display a ASC/ANS/AVT text file with hotkeys
Optional Data : <1-8 character name>
Displays an ASC/ANS/AVT text file the same way as a type
5 would, but leaves the current menu hot keys active while
the file is displayed. This allows the use of elaborate
graphics in your menus that would be impossible to create
with the line editor. See also AUTOMATIC COMMAND EXECUTION
for details on how to integrate these files into your menus.
Type : 41
Name : Toggle full screen editor
Optional Data : None
Allows the user to select or deselect the use of the full
screen message editor. Use of the editor is only permitted
if the user has ANSI graphics enabled.
69
Type : 42
Name : Toggle hot-keys
Optional Data : None
Allows the user to choose between hot-keys or command
stacking. In command stacking mode, several commands, or
key-presses, can be specified on one command line by putting
a semi-colon in between each command.
Type : 43
Name : NewMail {+}
Optional Data : None
Display a full list of all the message areas the user has
read access to, highlighting those that contain unread
messages. This menu command is only available in registered
mode.
Type : 44
Name : Reset combined areas setting
Optional Data : None
Allows the user to turn ON or OFF all available message
areas for his/her combined message area setting.
Type : 45
Name : Display text file and wait
Optional Data : <1-8 character name>
This is the same as a type 5 function, but prompts the user
to press [Enter] before continuing. This is useful for
displaying text files that are generated automatically by
utilities that don't append a Control-A (wait character) at
the end of the file.
Type : 46
Name : Display direct textfile with CR
Optional Data : <Full path and name>
Displays a text file with a fully qualified path and name
and waits for the user to press [Return] before continuing.
70
Type : 47
Name : Make a log entry
Optional Data : <Log entry>
When this command is executed, it simply takes the contents
of the Optional Data field and writes it to the system log
as if it were a normal hard-coded log entry. The only macro
characters that are valid are:
@ : Insert the name of the current template file area
` : Insert the name of the current template msg area
Type : 48
Name : Download a specific file
Optional Data : <Full path and name>
Enables the user to download a file or set of files that you
have pre-defined, using a protocol of the user's choice.
Note that you may specify wild-cards and pattern match
characters in the file name, but if you do, the user will be
forced to use a batch transfer protocol. For example, a type
48 command with the following optional data field:
C:\FILES\RA\RELEASE\RA*.ARJ
Would send all files in the C:\FILES\RA\RELEASE directory
that matched RA*.ARJ.
Type : 49
Name : Select message area
Optional Data : None
Displays a list of all message areas the user has read
access to, and asks the user to select one by number. The
current message template area number is set to the users
choice. This allows the sysop to run a very low maintenance
system, since all that is required to add or delete a
message area is to modify the configuration file via
RACONFIG.
Type : 50
Name : Select file area
Optional Data : None
This operates in the same way as the "select message area"
(type 49) menu function, but uses file areas instead of
message areas.
71
Type : 51
Name : List today's callers
Optional Data : [/H]
Lists every caller that has called your system since
midnight along with log on/off times, baud rate and what
line the call was taken on. The /H switch will show handles
instead of read names.
Type : 52
Name : Show all users on-line
Optional Data : [/H]
Lists all users currently on-line. This would only be useful
in a multi-node installation. It shows where each caller is
calling from, their baud rate, the line they are
connected to and what they are doing.
Type : 53
Name : Toggle "Do not disturb"
Optional Data : None
This is another multi-line feature only. It allows the user
to turn on or off the ability of other users to send him/her
messages with the type 54 function, like - "Hey Joe, I
noticed that you're on line 3. Wanna chat?" Note that the
sysop has the ability to override this.
Type : 54
Name : Send an on-line message
Optional Data : None
Allows the user to send a message to another user who is
logged on to another line at the same time. Provided that
the other user has not set his/her "do not disturb" flag,
the sender will be prompted for a one-liner to transmit.
Depending on what the recipient is doing at the time, he/she
will get the message ten to fifteen seconds later.
Type : 55
Name : Download any file
Optional Data : None
This is an extremely powerful function that should be only
accessible to the sysop. It allows the user to download a
file from any valid drive or directory using any of the
available file transfer protocols. This is the ONLY download
function that takes no account of download limits, file
ratios or transfer time, and does not update the users
record to reflect the download.
72
Type : 56
Name : Browse the nodelist {+}
Optional Data : None
Allows the user to browse the nodelist. Includes functions
to list all zones, list all nets and regions in a zone, and
list all nodes in a net or region.
Type : 57
Name : Change home/voice number
Optional Data : None
Allows the user to modify his/her home/voice phone number
permanently.
Type : 58
Name : Change business/data number
Optional Data : None
Allows the user to modify his/her business/data phone number
permanently.
Type : 59
Name : Global download {+}
Optional Data : None
Allows the user to download files as per the type 32
download command, but searches ALL areas the user has access
to for the requested file(s). All normal time and other
security restrictions apply.
Type : 60
Name : Change handle
Optional Data : None
Allows the user to select a new handle. Note that
RemoteAccess will not allow the user to choose a name or
handle which is in use by another user or a handle which is
listed in the "HANDLES.CTL" file. RemoteAccess will also
not allow the use of "SYSOP" as a handle.
Type : 61
Name : Toggle AVATAR
Optional Data : None
Toggles the use of AVATAR codes (see the section on TERMINAL
EMULATIONS for more information).
73
Type : 62
Name : Toggle full screen message viewer
Optional Data : None
Allows the user to select or deselect use of the full screen
message presentation manager. When active, this option
displays all messages with a fixed header and uses ANSI and
AVATAR codes for special screen manipulation.
Type : 63
Name : Select a new language
Optional Data : None
Allows the user to change their current language setting.
(See LANGUAGE FILES for more details)
Type : 64
Name : Select a new date format
Optional Data : None
Allows the user to change his/her currently selected date
format. The user has a choice of the following date
formats:
DD-MM-YY
MM-DD-YY
YY-MM-DD
DD-Mmm-YY
Type : 65 {+} Registered only.
Name : Change current users flags
Optional Data : <flagset><flagnum><action>
This allows you to set on, set off or toggle any of the
users security flag settings. The "action" determines how
the flag is to be set. The actions available are:
- : Turn flag OFF
+ : Turn flag ON
* : Toggle flag
For example, if the optional data was "A1+ A2- D8*", the
flag A1 would be turned on, A2 would be turned off and
flag D8 would be toggled.
74
Type : 66
Name : Toggle Text file shells
Optional Data : <ON|OFF>
Enables/Disables textfile file shells. This overrides the
default setting in RACONFIG for the one session. (see TEXT
FILE CONTROL CODES for more information)
Type : 67
Name : Toggle auto message-forwarding
Optional Data : None
If a user is going to be away for an extended period of
time, he/she may specify the name of another user to
whom all his/her mail is redirected. When this option is
toggled on the user will be asked for the name of a person
he/she wishes to forward his/her mail to. This name must be
a valid user listed in the system user database. If the name
entered can not be located in the user database, the user
will be given the option to view/search the user database
and then reselect the user to forward mail to.
75
Automatic command execution
────────────────────────────────────────────────────────────
Normally a menu function would be activated when a user
presses the key that you have linked to that function.
However, it is possible to cause a function to be executed
automatically as soon as a menu is displayed by setting the
entry to "auto execute". As soon as that particular menu
line is displayed the function is executed
automatically, without the need for the user to select the
option. This is a very powerful feature when used with the
type 40 menu function, which displays an ASCII/ANSI/AVATAR
text file while checking for menu hot-keys. By setting up
the first line of a menu as a type 40 with automatic
execution, as soon as the menu is called your text file is
displayed instead of the normal menu lines. This allows you
to design very elaborate graphical menu displays that
contain extra information about the user by inserting the
special text file control codes. What happens if a user
"passes through" a menu by using a stacked menu command?
In some cases you may want the automatic command to execute,
for example to redirect the user to another menu by
automatic execution of a type 1 or 2. On the other hand, if
the command is only for cosmetic purposes (maybe a text file
to display some user statistics) it would be better to skip
the command and continue straight to the next menu. The
rule is that the menu command will only be executed if it is
the first entry in the menu AND it is not a 'display
textfile' type function.
Special optional data switches
────────────────────────────────────────────────────────────
There are two special "switches" which may be placed at the
end of the optional data field for any menu command:
/NS : This switch suppresses the usual clear screen code
that RemoteAccess sends when a new menu is
displayed, and is only useful when used with a menu
navigation (GOTO, GOSUB etc) command.
/K=xxx : {+} Registered only. This switch places the
specified text <xxx> into the user's input buffer
to be processed exactly as if it had been entered
as a stacked command. This is an extremely powerful
facility which can be used to link a number of menu
commands together, and customise a large number of
hard-coded selection menus.
76
Menu templates
────────────────────────────────────────────────────────────
The biggest drawback of other BBS packages that allow the
sysop the flexibility of designing his or her own menus is
the amount of maintenance that is necessary in updating the
menus. Until now it was necessary to have a separate menu
for each file and message area. The RemoteAccess menu
templating system alleviates this problem by allowing you to
set up one menu that will act as a "skeleton" for all your
message and file areas. Two "variables" are available to
you; "M" for the currently selected message area and "F" for
the currently selected file area. In your template menu(s),
where you would normally put the message area number in the
optional data field for say a "Read" command, put in "/M".
When the read is selected by the user, RemoteAccess will
substitute this for a message area number. Likewise, where
you would specify a full path for a file function, put a "/F
in the optional data field. RemoteAccess will replace this
variable with the path to the currently selected file area.
To put a value into one of these two variables, simply put a
"/M=<Area Number>" or "/F=<Area Number>" in the optional
data field of a type 1, 2 or 4 menu command. For example,
say you set up a message area template menu called
"MSGMENU", using the /M in the optional data fields. Another
menu, which you have set up to list the available message
areas, simply consists of type 1 or 2 menu commands to jump
to MSGMENU. One menu line looks like this:
<H>ard Disk Conference
This is a type 2 command, which will "gosub" to the MSGMENU
menu:
Type : 2
On the optional data line, put the name of the menu to jump
to, and also set the template variable.
Optional Data : MSGMENU /M=45
45 corresponds to the hard disk conference area, as defined
in RACONFIG.
There are two other constructs that work with the template
commands. /M=+ or /F=+ will increment the currently selected
template area by one, and /M=- or /F=- will decrement the
currently selected template area by one. RemoteAccess will
automatically scan all file (or message) areas in the
specified direction to determine the next area that the user
has been given access to.
The current message and file template areas are stored at
logoff, and when the user logs back on they will be set to
these message and file template areas.
77
When user logs on for the first time, RemoteAccess will
scan the file and message areas and set the user selected
template areas to the first area found to which the user
security rights.
There are a number of special characters that you can put in
the display line of a menu which will display certain system
information:
~ : Displays time remaining today.
^ : Switches between the normal line colours and the
overall menu highlight colours.
; : Don't display a carriage return / linefeed at the
end of the line.
@ : Displays the name (as defined in RACONFIG) of the
currently selected file template area.
` : Displays the name (as defined in RACONFIG) of the
currently selected message template area.
^A : This will force RemoteAccess to wait until the
user presses the enter key. To enter this
character in the menu, press CTRL-P followed by
CTRL-A.
You may also include any valid textfile control code, as
listed in the TEXTFILE CONTROL CODES section of this manual.
The global menu
────────────────────────────────────────────────────────────
It is likely that there are some commands that you will want
to be available from every menu that the user sees. Instead
of duplicating these for every single menu, simply place
them by themselves in a menu called GLOBALRA. RemoteAccess
searches for this special menu and if it exists,
automatically appends it to the end of every menu.
RemoteAccess appends the whole menu; in other words, not
just the commands but any visible text as well. Note that
the global menu will always inherit the highlight colours of
the current menu it is appended to. This feature is only
available in the registered version {+}.
78
Setting up your menus
────────────────────────────────────────────────────────────
Spend some time thinking about how your menus will be set
up. Your BBS can be made to look as unique or as "uniform"
as you like - you can choose a subjective topology, where
the menus are organised according to area of interest, or a
functional topology, where menus are organised according to
their function. For example, a functional topology would
group all message areas together and all file areas
together, whereas a subjective topology would perhaps group
together several message and file areas that were related.
The diagram below illustrates this by depicting the same
systems using the two different topologies:
FUNCTIONAL
+----------Amiga messages
+---------Messages menu |
| +----------IBM messages
Main menu |
| +----------Amiga files
+------------Files menu |
+----------IBM files
SUBJECTIVE
+----------IBM files
+--------------IBM menu |
| +----------IBM messages
Main menu |
| +----------Amiga files
+------------Amiga menu |
+----------Amiga messages
Alternatively, you could even use a combination of the two
topology types.
The layout of your BBS is determined by how the menus are
set up. In many cases a user will not realise that he or she
is looking at a menu. The best technique for creating menus
is to create all the "low-level" menus first, then the main
menu, and then fill in between with the intermediate menus.
79
Creating your menus
────────────────────────────────────────────────────────────
Change to the system directory and fire up RACONFIG.EXE then
select MANAGERS/MENUS; this then takes you into the menu
editing utility which allows you to create and edit your
menus. When run it will present you with a list of
languages, after selecting the language of the files you
wish to edit you will then be shown a directory of menus
that have already been created for that language - select
one, with the cursor keys and press RETURN to edit, or
press INSERT to create a new menu.
A large window is opened that displays a line by line
summary of the menu. You may select a menu item to work on
by moving the highlight bar to the item with the cursor. You
can then edit the following fields :
User : This field allows you to define what will
display be displayed to the user on the menu for
this menu entry. You may use any text
control code in this field (See TEXT CONTROL
CODES section for more information). After
displaying this field RemoteAccess moves
the cursor down one line to prepare for
the next menu command. If you place a ";"
as the last character on the user display
line RemoteAccess will not move down a
and the user display from the next menu
command will be added to the same line.
Action : Determines what this menu command will do.
(See MENU TYPES for more information).
Optional : This line is associated with the ACTION line
data and contains the option parameter, which
defines how the various menu commands
function. (See MENU TYPES for further
information)
Hot-Key : In this field you specify the key you want
to activate this menu command.
Automatic : If enabled this will make this menu command
execute immediately, without the user typing
any key.
Colour : This defines the colour of the USER DISPLAY.
Security : This defines the minimum security level at
which a user can select this menu command.
(See the SECURITY section for further
details)
Flags : This sets the flag combinations the user
must have to select the menu command. (See
the SECURITY section for more details)
80
When editing the menus the following keys are available to
assist you:
[RETURN] - Edit the currently selected menu item.
[INSERT] - Insert a new menu item immediately before the
current item.
[DELETE] - Delete the currently selected menu item.
[ALT-D] - Simulate what the menu would look like to a
user.
[ALT-L] - Discard the present menu and load another
from disk.
[ALT-N] - Re-select language.
[ALT-P] - View or modify the menu prompt, its colour and
the menu highlight colours.
[ALT-S] - Save the current menu to disk.
You can run the menu editor directly, without having to go
through the RACONFIG menus by using the "-M" parameter on
the RACONFIG command line, For example "RACONFIG -M" (See
the section on COMMAND-LINE PARAMETERS for further
information).
Let's create the LOGOFF menu. Hit RETURN on the first blank
menu item to bring up the EDIT MENU ITEM window. The first
line of this menu will just display a message to the user,
so in the USER DISPLAY field, put "You have chosen to
disconnect. You may -". Move to the ACTION field and set it
to DISPLAY ONLY. Next select a suitable colour for the
display line in the COLOUR field. Since this is only a
display line, leave SECURITY and FLAGS as they are. Press
ESCAPE to return to the menu list, and note the entry you
have just created.
Now enter the user options for the menu. Move to the second
menu entry (add one with the INSERT key if necessary) and
press RETURN to edit. We'll give the user the option of
leaving a message to the sysop, so in the USER DISPLAY field
enter "<L>eave a message to the sysop". Set the ACTION to
POST A NEW MESSAGE (this is under the heading of MESSAGE-
BASE COMMANDS). This command requires a couple of parameters
in the optional data field - the number of the message area
to post the message in and the /T= parameter, to force the
message to be addressed to the sysop. It might look like
this:
80 /T=Andrew_Milner
81
(Message area 80 is set up as a "Messages to the sysop" area
that contains local private messages). Set the HOT-KEY to
"L" - this is the key that will activate the function. We
want all users to be able to leave a message, so set the
security level to 1.
The third line of the menu gives the user the option of
returning to the previous menu, so set this to a type 3,
with a suitable display line.
The actual log-off command is last. This will be a type 9
(Terminate Call). Set the hot-key to "G" and the display
line to something like "<G>oodbye (Logoff)".
The final step is to set the highlight and prompt options.
Press ALT-P from the menu list to bring up the EDIT MENU
SETTINGS window. Here you can tailor the menu by selecting
the menu prompt and its colour, along with the menu
highlight colour. Each menu line, in addition to it's own
colour, may contain an overall menu highlight colour. To
switch between the two colours on a menu line, simply insert
the ^ character; Note that this character isn't actually
displayed to the user, it just toggles the colours.
Experiment with this feature by inserting a few ^ characters
on display lines and viewing the menu with the ALT-D key.
Finally, save the menu by going back to the menu list and
pressing ALT-S. Save the menu with the name LOGOFF. Now,
whenever you need a "Goodbye" option in another menu, just
use a gosub (type 2) function to the menu LOGOFF.
There is one hard-coded menu called TOP. RemoteAccess
searches for this menu when a user logs on and displays it
first, so it MUST be present. The layout of the top menu is
up to you of course; it is recommended that you look at the
menus of other Bulletin Boards so you can incorporate their
best features into your own.
82
EXTERNAL SUPPORT FILES
────────────────────────────────────────────────────────────
There is very little that is actually "hard-coded" into
RemoteAccess. Below is a listing of text files you can place
in the text file directory to give your system just the
right "feel". See the section on TEXT FILE CONTROL CODES for
a list of special characters that can be used to display
system and user information from any of these files. Files
marked with an asterisk (*) have a default prompt if the
file is missing. All the files are plain ASCII which you can
create with your favourite text editor/wordprocessor such
as the one in RACONFIG, or optionally ANSI which you will
need a special ANSI editor to create. RemoteAccess also has
the ability to display AVATAR files, which display faster if
the user has an AVATAR terminal, and can be generated from
your ANSI files by using the AVTCONV utility supplied. See
the section on TERMINAL EMULATIONS for further information.
1ATATIME.A?? : This file is displayed if a user tries to
* log on to more than one line at once if
multi-line check has been enabled in
RACONFIG.
ALTNEWS.A?? : This file is displayed ONLY if the NEWS.A??
file was not displayed to the user because
he/she requested to skip it during an IEMSI
session. If you want all users to see your
news file regardless, simply copy NEWS.A??
to ALTNEWS.A??.
BADFILES.A?? : This file is displayed if the user attempts
* to upload a file that is listed in the
BADFILES.CTL control file.
BADPWD.ASC : This file is displayed when a user enters
an incorrect password and elects to leave a
message to the sysop.
BIRTHDAY.A?? : This file is displayed if the current date
is the same as the user's birthdate.
DATEFMT.A?? : This file is displayed just before a user
* selects a new date format.
DNLDHRS.A?? : This file is displayed if a user attempts
* a download outside the allowed hours as
defined in RACONFIG.
EDITHELP.A?? : This file is displayed if the user asks for
help while using the built-in message
editor.
ENDCHT.A?? : This file is displayed when the sysop
* terminates chat mode.
83
EXPIRED.A?? : This file is displayed if the user's
* password has just expired, just before the
user is asked for a new password.
FILEAREA.A?? : If present, this file will be displayed when
the user is asked to select a new file area
in place of the normal hard-coded list.
GOODBYE.A?? : This file is displayed when the user elects
to log off, just before the user is
disconnected.
GROUP#.A?? : These files are displayed to users of a
particular group directly after the SEC#.A??
file. For example, the file GROUP1.A??
would be displayed to all users belonging to
user group 1.
HANDLE.A?? : This file is displayed just before the user
is asked to choose a new handle.
LANGUAGE.A?? : This file is displayed in place of the hard
* coded language selection list.
LOCKOUT.A?? : This file is displayed if the sysop uses
* ALT-L while a user is on-line to lock
him/her out of the system.
LOGO.A?? : This file is displayed as soon as a
connection is made. This should contain the
name of your system and perhaps some other
general information. If the "Auto ANSI"
option is enabled in RACONFIG, RA will
attempt to automatically detect if the
remote terminal is using ANSI, and if so
will send the ANS file in place of the ASC
file.
MAILHELP.A?? : This file is displayed if the user asks for
help at the mailbox scan prompt. Note that
the user is only offered help if this file
actually exists.
MAXPAGE.A?? : This file is displayed if a user tries to
* page the sysop for a chat more times than
you have specified in RACONFIG.
MSGAREA.A?? : If present, this file is displayed when the
user is asked to select a message area in
place of the normal hard-coded list.
MSGFWD.A?? : If the user has message forwarding enabled
this file will be displayed at logon.
NEWS.A?? : This file is a general news bulletin that is
displayed after RemoteAccess checks for
waiting mail (if the option is enabled), or
straight after the WELCOME file.
84
NEWUSER1.ASC : This file is displayed to a new user as soon
as he/she confirms that he/she entered
his/her name correctly.
NEWUSER2.A?? : This file is displayed after the user has
confirmed that he/she entered all the
standard logon questions correctly.
NO300.ASC : This file is displayed if a 300 baud caller
* attempts to log on during hours when 300
baud is not allowed, as defined in
RACONFIG.
NOCREDIT.A?? : This file is displayed if a caller attempts
* to enter a netmail message for which he/she
does not have sufficient credit.
NOTAVAIL.A?? : This file is displayed if a user tries to
* page the sysop for a chat outside paging
hours, as defined in RACONFIG.
NOTFOUND.ASC : This file is displayed if RemoteAccess
* cannot locate the name of a user at logon,
but before the user is asked to confirm that
he/she entered the name correctly.
NOTSYSOP.A?? : This file is displayed if a user attempts to
* post a message to "Sysop" in an EchoMail
message area.
ONCEONLY.A?? : This file is displayed just after the
NEWS.A?? file only once whenever the file is
altered, to each user.
PAGEABRT.A?? : This file is displayed if the sysop chooses
* to abort a page for chat by the user.
PAGED.A?? : This file is displayed after the user has
paged for a chat if the sysop does not
answer the page. Something like "Okay, the
sysop has been paged and will break in for a
chat if he/she walks past."
PASSWORD.A?? : This file is displayed before the user is
asked to select a new password. This file
should stress the importance of choosing a
suitable password!
PRIVATE.ASC : This file is displayed if a new user tries
* to log on to your system and you have set it
up as a private, pre-register BBS.
RATIO.A?? : This file is displayed if the user tries to
* do a download which would exceed his/her
ratio of number of files.
RATIOK.A?? : This file is displayed if the user tries to
* do a download which would exceed his/her
ratio of K of uploads to K of downloads.
85
READHELP.A?? : This file is displayed if the user asks for
help while reading messages.
SEC#.A?? : These files are displayed to users of a
particular security level directly after the
WELCOME file, but before the mail check (if
enabled). For example, the file
SEC10.ASC/ANS/AVT, if present, would be
displayed to all users with security level
10.
STARTCHT.A?? : This file is displayed when the sysop breaks
* in for a chat via ALT-C. Using the shell
from textfile function this could
conceivably be used to activate an external
chat utility. See also ENDCHT.A??
TIMEhh.A?? : This file is displayed after WELCOME1.A??,
when "hh" matches the current hour number
(24 hour format).
TIMEWARN.A?? : This file is displayed at log on if the
* user's time limit has been adjusted to
accomodate an upcoming event.
TODAYK.A?? : This file is displayed if the user attempts
* a download which would exceed his/her daily
download limit.
TOOSLOW.ASC : This file is displayed if a user tries to
* log on at a speed lower than the minimum
required to log on to your system as defined
in RACONFIG.
TRASHCAN.ASC : This file is displayed if a user enters an
* unacceptable name at log on, as listed in
the TRASHCAN.CTL file.
VIP.A?? : If the user who has logged on is listed in
the VIP.CTL file, this file will be
displayed just before the SEC#.A?? file.
WELCOME.A?? : This file is displayed after the user logged
on, or in the case of a new user, after
completing the new user procedure. This can
be a fairly elaborate title screen that
welcomes your users to the BBS.
WELCOME1.A?? : This file is displayed directly after the
WELCOME file, and could contain extra system
information, maybe a "today in history"
quote, or something similar.
XFERHELP.A?? : This file is displayed if the user presses
the "?" key on the file transfer protocol
selection menu. It should contain general
information about the different protocols
themselves.
86
XFERPROT.A?? : This file is displayed in place of the hard
* coded file transfer protocol selection.
XFERTIME.A?? : This file is displayed if the user attempts
* a download that would exceed his/her daily
time limit.
In addition to these ASC/ANS/AVT files, there are a number
of *.CTL files that define various security aspects of the
system:
BADFILES.CTL : This file allows you to specify a list of
files that users may not upload. Simply
specify one file per line (wildcards valid),
for example:
*.GIF
NORTON*.*
Would not allow any files matching either of
these two patterns to be uploaded.
FILES.CTL : This file allows you to mark any
downloadable file on your system as free
{+} and/or password protected. The format of
Registered this file is:
Only
<filespec> [/FREE] [/PWD=xxx]
Example:
\RAFILES\RA_110.ARJ /FREE
\RABETAS\RABETA.ARJ /FREE /PWD=RACCESS
Note that each filename must be fully
qualified with a path (drive name optional).
Here, RA_110.ARJ is free. Downloading it
will not affect the user's download
statistics. Note that even though the file
is free in this regard, the user must still
have enough time remaining for the download.
RABETA.ARJ is both free and password
protected with the password RACCESS. The
user must supply the correct password before
being allowed to proceed with the download.
Passwords are case insensitive and a maximum
of 15 characters in length.
HANDLES.CTL : This file allows you to list handles that
you don't want people to be able to use. It
is identical in format to the TRASHCAN.CTL.
87
LIMITS.CTL : This file allows you specify, for each
security level, a daily time limit, file
download limit for each baud rate, and
optional file ratios, either in number of
uploads to number of downloads, or in total
kilobytes uploaded to total kilobytes
downloaded. The format of the file is as
follows:
<Sec Lvl> <Time> <300> [1200] [2400] [4800] [9600]
or:
<Sec Lvl> <Time> <300> <1200> <2400> <4800> <9600> <R#> [RK]
Where <Sec Lvl> is the security level,
<Time> is the daily time limit, <300> to
<9600> are respective download limits
depending on what baud rate the user calls
at. <R#> is the ratio of uploads to
downloads, and [RK] is the ratio of uploads
in K to downloads in K.
If you only specify a download limit for say
300, 1200 and 2400 baud, the download limits
for the higher baud rates default to the
highest baud rate specified, in this case
the limit set for 2400 baud.
If you specify a ratio by number (R#) value,
then the user will be required to upload one
file for every n they download. Similarly,
setting the ratio by K will allow the user
to download only the specified kilobytes of
files per 1 kilobyte uploaded.
This is fairly complicated, so look at this
example LIMITS.CTL:
5 35 0
10 60 100 200 350 650 900 5 10
20 90 150 250 470 750 900 5
30 120 250 400 600 900 1200
50 300 900
Security level 5 entitles the user to 35
minutes per day, but no downloads.
Security level 10 entitles the user to 60
minutes per day, 100k of downloads at 300
baud, 200k at 1200 baud, 350k at 2400 baud,
650k at 4800 baud, and 900k at 9600 baud or
faster. In addition, the user must upload at
least one file for every five downloaded,
and may not download more than ten times the
total size of files uploaded.
88
Security level 20 entitles the user to 90
minutes per day, 150k of downloads at 300
baud, 250k at 1200 baud, 470k at 2400 baud,
750k at 4800 baud and 900k at 9600 baud or
faster. In addition, the user may only
download five times the number of files
he/she uploaded.
Security level 30 entitles the user to 120
minutes per day, 250k of downloads at 300
baud, 400k at 1200 baud, 600k at 2400 baud,
900k at 4800 baud and 1,200k at 9600 baud or
faster. There are no ratio restrictions.
Security level 50 entitles the user to 300
minutes per day, and 900k of downloads at
all speeds without any ratio restrictions.
NAMES.CTL : RemoteAccess allows you to assign
"shortnames" to users you frequently send
messages to. Set up this text file with the
following format, one entry per line:
<shortname>,<realname>,<address>[,<subject>]
Eg:
rahq,Andrew Milner,2:270/18,RemoteAccess..
To use this feature, simply enter the
shortname preceded by an asterisk when
RemoteAccess asks you who the message is to.
In the above example, addressing a message
to "*rahq" would fill in the to field with
"Andrew Milner", and the subject field with
"RemoteAccess..". If the message is netmail,
it would automatically be sent to 2:270/18.
PHONENUM.CTL : Use this file to specify phone numbers or
segments of phone numbers that you know
to be false. A PHONENUM.CTL that contains:
00-
000-
-0000
Would disallow the numbers "00-123-4567",
"000-123-4567", "009-0000-1234". The rule
here is that none of the specified numbers
is allowed to be imbedded anywhere in the
user's phone number.
PWDTRASH.CTL : Allows you to specify a list of passwords
that users are not allowed to use. This
could contain passwords like SECRET, or
TEST.
89
TRASHCAN.CTL : Allows you specify a list of names that
users may not use to log on to your system.
In this file, specify the undesirable names
one per line. If for example you did not
want the names "Sysop", "Jack Daniels" or
"Superman" used, simply put the following
lines in this file:
Sysop
Jack Daniels
Superman
The tests done on names is NOT case-
sensitive, so the name "SYSOP" would also be
invalid. Names that contain any part of the
names in the list are not allowed either.
VIP.CTL : When a user who is listed in this file logs
on, a short bell is sounded at the local
console, and if the there is any text in
the user's COMMENT field (see "Information
stored in the user database"), it is
displayed on the status bar.
The format for this file is the same as the
TRASHCAN.CTL and HANDLES.CTL files.
90
THE USER DATABASE
────────────────────────────────────────────────────────────
The user file is possibly the most important single file on
your BBS. It contains all the information about each user's
history, screen settings, and vital security data. To use
the user editor fire up RACONFIG and select Users from the
Manager menu. This editor allows you to add, modify or
delete any user's record. If there are already some users
in the user-file, you will be presented with a list showing
each user's name, location and security level. Select a
user either by typing in the name, or moving the highlight
bar to the entry on the screen and pressing RETURN.
After the user is selected you will be presented with the
Edit Screen. This lists the entire user's record which can
be modified and saved if you wish.
If there are no users already in the user-file, the Edit
Screen will appear immediately for you to enter the details
of the first user. Note that the only required piece of
information (or "field") is the name, and you can't proceed
any further until you enter one. You'll want to be included
in the user file, so enter your own name in this field.
After entering the user name, you may continue to enter all
fields. When you have finished editing the user record
press [CONTROL-ENTER] to save the information and then
ESCAPE to exit. If you don't want to save, just press ESCAPE
by itself.
The following keys can be used to assist you in editing the
user database:
[INS] This allows you to add a new user, when pressed
in the user list screen, a blank record will
be created for you to edit.
[DEL] Deleting a user is accomplished by moving the
highlight bar to the user you want to delete and
pressing the DEL key. A marker will appear in
the right hand column to signify that the user
is marked for deletion. Note that the user isn't
actually removed from the user file at this
stage. Users that have been marked for deletion
are removed by packing the user-file, which
should be done regularly using the utility
RAUSER.
[ALT-S] If you want to search for a particular user
record to edit, you can press ALT-S, you are
then prompted for the search criteria at the top
of the screen.
You can run the user editor directly without having to go
through the RACONFIG menus by entering "RACONFIG -U".
91
Information stored in the user database
────────────────────────────────────────────────────────────
This section details all the information contained about
each user in the user database:
Name : User's full name
Handle : User's registered handle
Location : Where the user is calling from
Password : Secret password
Security : Security level (1-64000, 0 to lock out)
Home# : Home/voice telephone number
Business# : Business/data telephone number
A flags : "A" flag settings ("-" or "X")
B flags : "B" flag settings ("-" or "X")
C flags : "C" flag settings ("-" or "X")
D flags : "D" flag settings ("-" or "X")
Credit : Netmail credit remaining
Pending : Value of unsent (unexported) netmail
Uploads : Total number of uploads
Dnloads : Total number of downloads
UploadK : Total kilobytes of uploads
DnloadK : Total kilobytes of downloads
TodayK : Kilobytes downloaded today
Comment : Comment, can contain anything
Forward : Name person mail is being forwarded to
Last time : Time user last called
Last date : Date user last called
1st date : Date user first called
Sub date : Subscription expiry date
Birthdate : Date of birth
Time used today : Minutes used today
Screen length : User's screen length
Last Pwd change : Number of calls since last pwd change
Messages posted : Total number of messages posted
High msg read : Highest message read
Number of calls : Number of calls the user has made
Last msg area : Last msg area the user had selected
Last file area : Last file area the user had selected
Deleted : Delete user when database is packed?
Screen clear : Send screen clear codes?
Page pausing : Pause at the end of each screen?
ANSI graphics : Send ANSI codes?
AVATAR graphics : Send AVATAR codes?
No Kill : Never kill user?
Xfer priority : Ignore download hours and ratios?
Full screen editor : Use the full screen ANSI msg editor?
Quiet mode : Ignore online messages?
Hot-keys : Use hotkeys?
Full screen viewer : Use the full screen msg viewer?
Hidden : Hidden from the user list?
Group number : User's group number (1 - 255)
Language : Language number selected
Date Format : Date entry format
92
Packing and sorting the user file
────────────────────────────────────────────────────────────
RAUSER.EXE is the utility that is used to maintain the user-
file. Not only will it remove users marked for deletion, it
can also delete users that have not called your BBS for a
certain number of days as well as sort the users in order of
security level and surname. RAUSER may be run from any
directory, will automatically locate system and user files,
and will insert an activity summary in your system log. The
following command-line parameters are valid:
-P Pack the user-file, removing users marked for
deletion.
-S Sort users in order of security level and
surname.
-D[n] Delete users who have not called for [n] days.
Note that this parameter implies a pack
operation.
-V Verbose logging; list any users that were
deleted during a pack operation.
-M[s] Specify the maximum security level user to be
affected by a pack or delete operation. Put
another way : "exempt all users with security
level [s] and above from being deleted" .
93
THE MESSAGE DATABASE
────────────────────────────────────────────────────────────
RAMSG is the RemoteAccess message base maintenance utility.
It's primary function is to trim the number of messages in
local and echomail conferences and maintain them at a
manageable level. RACONFIG provides the ability to enter,
add and maintain message areas - RAMSG uses this
information (contained in MESSAGES.RA) to delete old and/or
excess messages. RAMSG will also attempt to repair
damaged message bases; it has a number of integrity checks
built in so that if it detects that the message base is
damaged in any way, it will automatically re-create index
files (even if they are missing) and warn of possible
problems.
All of RAMSG's activities are logged in the system log.
Some options are provided for statistical information.
Note that a value of 0 in any of the fields on the message
area entry screen in RACONFIG will cause RAMSG to ignore
that option. For example, if the maximum number of messages
is set to 0, RAMSG will not kill messages based on number.
Prior to running RAMSG, you should ensure that all areas
have been set up correctly.
RAMSG invoked without a command line results in a help
screen being displayed.
When one or more of the arguments below is specified, RAMSG
searches for CONFIG.RA (first the current directory, then
via the RA environment variable), MESSAGES.RA (in the
current directory, then the system directory) and then the
message base files. Failure to find one or more of these
files will result in RAMSG aborting. If CONFIG.RA is found
and the system log file can be opened, RAMSG will log any
errors there.
Message database size limitations
────────────────────────────────────────────────────────────
Due to the message database file structures, there is a
maximum physical limit on the number of messages it can
contain. The maximum number of messages the database can
hold is approximately 16,000. You should configure RAMSG so
that this limit is never exceeded.
There is also a limitation on the value of the highest
numbered message, which may never exceed 32,767. It is good
practice to regularly (preferably nightly) renumber the
message database to ensure that this limit is never
breached.
94
Packing and renumbering the message base
────────────────────────────────────────────────────────────
RAMSG Command summary
---------------------
-I Re-create index files & check
C=Kill crosslinked messages
U=Kill unknown boards
R=Renumber
-P Pack (compress) message base
K=Purge
R=Renumber
O=Overwrite
A=Overwrite if necessary
-K Purge messages from info in MESSAGES.RA
-L Link reply chains
-R Renumber messages
-S Display/log message base statistics
All options: S=Statistics V=Verbose stats
RAMSG functions (NOT case sensitive)
------------------------------------
-I INDEX [Options : C, R, U]
This option rebuilds the message base
index files, MSGIDX.BBS, MSGTOIDX.BBS and
MSGINFO.BBS. It also checks the integrity of
all message base files and rebuilds other
information as necessary. Errors in the
message base are logged.
During the index rebuild, you may choose
to delete messages from unknown message
areas (those areas which have no entry in
the name field) and messages with message
board numbers outside the valid range of
1-200.
Under some circumstances RAMSG may detect a
"sequence error" (when numbers are out of
order). Since this causes significant
problems with software using the message
base, RAMSG considers this serious, and
therefore will not proceed with any
operation other than an index rebuild until
this is corrected using the "R" option, to
force message base renumbering.
95
"Crosslinking" of message text is also
considered a serious problem, and this will
prevent RAMSG repacking the message base.
Cross-linking occurs when more than one
message references the same section of text
in MSGTXT.BBS.
Following are some examples of what an
index rebuild command might look like:
RAMSG -Icu
Rebuild indices, kill messages in unknown
areas and crosslinked messages.
RAMSG -I
Rebuild index files only.
-P PACK [options : K, R, O, A]
Packs the message base, by eliminating all
deleted messages and message text. Deleting
(the -K option, for example) messages does
not remove them from the message base
files, it simply marks them for deletion.
You MUST pack the message base to reclaim
the space occupied by these deleted
messages.
PACK also provides options to purge old/
excess messages (same as -K, except that -K
does not pack) and renumber (same as -R),
so all standard maintenance functions can
be carried out in the one command.
RAMSG normally packs the message base by
copying messages from the existing message
base into temporary files, deleting the
original files, then renaming the temporary
files to their correct names. This is the
safest option to use, since it is possible
to rebuild the message base if for any
reason the PACK process is interrupted (for
example, by power failure). However, this
requires t hat at least as much space as
occupied by the old message base files be
free on your hard disk.
96
To get around this, RAMSG provides an option
to pack the message base "on top" of the
existing one without using temporary files.
This directly overwrites the existing files;
and the problem with this is that if the
process is interrupted, the message base may
be irreparably damaged and data could be
lost. To use overwrite mode, RAMSG requires
the 'o' option in the PACK command; this
forces overwriting unconditionally. To
ensure that the message base is processed,
while taking advantage of a safer
environment, RAMSG also provides an 'a'
option, which will use overwrite mode only
if there is insufficient space for a regular
pack.
Examples:
RAMSG -Pkra
Pack the message base, kill messages
according to information in MESSAGES.RA,
renumber messages and use overwrite mode
only if insufficient disk space for a
regular pack.
RAMSG -Po
Pack the message base, using overwrite mode.
-K Purge messages
This option purges messages according to the
maximum number of messages and aging
information specified for each area in
MESSAGES.RA. Note that the messages are not
actually removed, they are simply marked for
deletion. Use the pack command to reclaim
the space that these messages occupy.
-L Link reply chains
Links reply chains in each area (this
is automatically done by other maintenance
functions where necessary). You would use
this option by itself after an import by
your echomail processor, for example.
-R Renumber messages
Renumbers the message base. This option may
also be used to cure "out of sequence"
errors.
97
-S Display/log message base statistics
Simply logs message base and disk statistics
for your own information. A 'v' after this
option displays verbose statistics for each
message area.
You may run several operations on the same command line,
but since there is some overlap in functionality, the need
to do this is rare. One instance of where you might need
this facility is to force the message base to be "clean"
prior running a pack; for example:
RAMSG -Pkra
Checks/rebuilds index files, deleting messages in unknown
areas, fixes cross-linked messages and forces a renumber
to fix sequence errors. It then will proceed to pack and
renumber the message base after killing excess/expired
messages using overwrite mode if required.
Several errorlevel exits are provided to allow management
by batch file:
1 No arguments specified; help message given.
2 Cannot access/locate CONFIG.RA
3 Out of or insufficient memory
4 Error opening/locating a file
5 Serious IO error
98
MAIL NETWORKING
────────────────────────────────────────────────────────────
What is a mail network? Basically it is a set of bulletin
board systems that are capable of exchanging messages and
files with each other without the need for human
intervention. All the discussion which follows relates to
FidoNet, the world's largest amateur mail network. FidoNet
consists of approximately 10000 bulletin board systems, each
of which is assigned a unique "address". A file called a
nodelist stores all these addresses along with other
information about each system. Think of it like an
international "telephone book".
Being part of a network has two basic attractions; NetMail
and EchoMail. NetMail allows you to send a private message
to any user of any one of the bulletins boards in the
network at little or no cost to you. EchoMail is a method of
creating a huge message area that many hundreds of systems
can potentially participate in. Usually all EchoMail areas
will contain only public messages, and are organised into
either general discussion areas, or areas that deal with
specific issues and or topics.
The net is organised into several levels, which are usually
based on geographical proximity. At the highest level there
are five "zones"; zone 1 is the USA, zone 2 is Europe, zone
3 is the Pacific Rim, zone 4 is South America, zone 5 is
Africa and zone 6 is Asia. Within each zone are a number of
"regions" that span large geographical areas. Typically
there will be between 5 and 18 regions per zone. Each region
is further divided into "nets". Each net has a unique
net number, and the distribution of these nets is also
based on geographical and technical considerations.
Finally, within the net are a number of nodes. A node
refers to a single bulletin board system.
To find out about obtaining a node number, or an "address",
contact the nearest FidoNet bulletin board. The sysop will
usually be more than happy to help you out.
Before going any further, let's talk about the extra
software you will need to set up as a node. Firstly you will
need an echomail processor. This is the program which
unpacks the mail you will receive, and imports it into your
RemoteAccess message-base, as well as packing up outbound
mail that needs to be sent out. RemoteAccess does NOT
include such a beast. There are several other processors
around that will do the job:
ZMailH, by Jason Steck,
TosScan, by Joaquim Homrighausen,
GEcho, by Gerard van der Land,
IMAIL, by Fabiano Fabris.
99
The other piece of software you'll need is a mailer.
RemoteAccess will not directly communicate with other
network bulletin boards, so a separate program fills the
gap. The two most widely used different types of mailers
are:
FrontDoor, by Joaquim Homrighausen,
BinkleyTerm, by Bit Bucket Software.
Both of these products are available on a shareware basis,
and like the echomail processors, will usually be
available on most FidoNet bulletin boards if you ask the
sysop nicely enough.
The node number you are assigned will be of the format
Zone:Net/Node.Point. This initial node number should be put
into your configuration file using the ADDRESS option of
RACONFIG. Don't worry about the AKA addresses at this stage.
The next step is to set up your EchoMail message areas. You
will usually be given a list of areas that are available to
you. Each area is identified by an uppercase alphanumeric
name. As far as RemoteAccess is concerned, all you need is a
description of each area you plan to "plug into". Fire up
RACONFIG, and go to the MESSAGE AREAS window. Select an
unused message area, and enter the area's name in the NAME
field. Next, set the TYPE OF MAIL field to ECHOMAIL, and
MESSAGE STATUS to PUBLIC. Most EchoMail areas don't allow
the use of aliases, so set the area to "real names only".
The AKA ADDRESS line shows your assigned node number. If
it doesn't, hit RETURN on this option and select the
correct address.
Each EchoMail message that is posted on your system could
potentially be read by hundred of other sysops and users, so
you can put a "one-liner" at the end of each message. In the
ORIGIN LINE field enter a short message. This should contain
at least the name of your system, and possibly where it is
or the phone-number, so that other users know where to call.
Your node number is also appended to the end of the message,
so a typical origin line might read:
* Origin : RemoteAccess Central (2:270/18)
Don't put the "* Origin" part in - this is added by the
software). If you don't specify an origin line for a
particular area, RemoteAccess will use the DEFAULT ORIGIN
LINE.
If running a multi-node system, the line number that the
message was posted on may be inserted in the origin line by
using the '@' macro character in any origin line definition.
100
The next step is to configure RemoteAccess for NetMail.
Select another unused message area, and call it "NetMail",
or something similar. Next, set the TYPE OF MAIL to NETMAIL,
and MESSAGE STATUS to PRIVATE. NetMail messages don't have
origin lines appended to them so leave the origin line entry
blank. RemoteAccess incorporates a comprehensive online
nodelist browsing facility, which allows users to search for
nodes in particular zones, regions or nets. The section
INSTALLING NODELIST FILES explains how to enable this
feature.
That's it! RemoteAccess is now fully configured for network
mail. Assuming that you have a suitable mailer and echomail
processor, all that is required is to set them up correctly
and you're in business. An explanation of setting these up
is beyond the scope of this document, full instructions are
available with each respective package.
101
Installing the nodelist files
────────────────────────────────────────────────────────────
Most other BBS software requires you to maintain large and
unwieldy custom nodelist files for NetMail operation.
RemoteAccess uses the "raw" (St. Louis) nodelist that you
already have for your front-end mailer, in addition to a
small (around 5K) index file. The key to the system is the
nodelist index compiler (RANODE.EXE). You should adjust your
batch files so it is run every time any changes are made to
your raw nodelist (when you receive a NODEDIFF update, for
example). RANODE can be run from any directory, and locates
your raw nodelist via the NODELIST PATH defined in RACONFIG.
It scans the most recent nodelist present and produces the
index files (NODEIDX.RA and NODEINC.RA) in your
RemoteAccess system directory. If you have multiple
nodelists to process, simply specify the names of any
additional nodelists on the command-line when RANODE is
executed.
Example : Compiling a FidoNet nodelist only. The raw
nodelist is in the C:\NODELIST directory. Simply set your
NODELIST PATH in RACONFIG to C:\NODELIST, and run RANODE
whenever you process a nodediff, without any command-line
parameters.
Example : Compiling a FidoNet and ParaNet combined nodelist.
The FidoNet NODELIST.nnn and ParaNet PARALIST.PVT raw
nodelist files are in C:\NODELIST. Simply run RANODE with
the following parameter:
RANODE PARALIST.PVT
Up to ten nodelists (including the FidoNet one) may be
specified - wildcards and pattern matching characters are
valid.
Note that it is not necessary to specify the FidoNet
NODELIST.nnn as well, as RANODE includes the most recent
FidoNet nodelist automatically.
In order to control the volume of netmail your users send,
each user has a "netmail credit" field in his or her record.
RemoteAccess will give all new users a credit limit
based on the NEW USER NETMAIL CREDIT setting in RACONFIG.
You define the cost of sending a single message to a
particular node in a control file called NODECOST.CTL which
is located in the RemoteAccess system directory. Each time a
user sends a netmail message, it's cost is deducted from his
or her account.
The cost structure for your entire nodelist is set up by one
or more entries of five keywords:
102
DEFAULT <cost>
Assigns <cost> to any nodes that are not assigned a specific
cost later on in the control file.
ZONE <zone> <cost>
Assigns <cost> to all nodes in <zone>. This overrides the
DEFAULT keyword.
REGION <region> <cost>
Assigns <cost> to all nodes in <region>. This overrides the
DEFAULT and ZONE keywords.
NET <net> <cost>
Assigns <cost> to all nodes in <net>. This overrides the
DEFAULT, ZONE and REGION keywords.
NODE <node> <cost>
Assigns <cost> to <node>. <Node> is a fully qualified node
address. This overrides all other keywords.
Sample NODECOST.CTL:
DEFAULT 200 ; A message to anywhere costs 200 cents,
ZONE 3 60 ; except in zone 3, which costs 60 cents.
ZONE 2 260 ; Messages to zone 2 cost a bit more,
REGION 55 30 ; Within our region only costs 30 cents.
NET 690 0 ; Msgs within our net are free,
NODE 690/999 5 ; except this node which isn't local.
The control file may contain a maximum of 150 entries of
each keyword, and duplicate entries are obviously not
permitted.
103
MULTI - NODE OPERATION
────────────────────────────────────────────────────────────
It is assumed that you have some knowledge of running
RemoteAccess already, or have at least run a single line BBS
for some time. If you haven't, it is strongly recommended
that you run one line for a little while to familiarise
yourself with the terminology and operation of RemoteAccess.
The idea of multi-node operation is that more than one user
can be on-line at the same time to the same BBS. To do this
safely, it is necessary for RemoteAccess to manage the
configuration and data files it uses very carefully.
Firstly, tell RemoteAccess that it's running in multi-node
mode by setting the MULTI LINE option to "Yes" in RACONFIG.
You should also set CHECK FOR MULTI LOGON to "Yes". Not
doing this can cause unpredictable results when a user logs
on to more than one line at once.
Set the SYSTEM LOG NAME to "RA.LOG". Make sure you do NOT
specify a full path with the name.
Next create one child directory of your system directory for
each line you intend to operate. For example, assuming that
the system directory is C:\RA, for two lines create
C:\RA\LINE1 and C:\RA\LINE2 (the actual directory names are
not important).
At this stage, ensure that the RA environment variable
points to the system directory so each line will be able to
locate the configuration files.
Why separate directories? Many on-line utilities and doors
are not multi-node aware, so they must be isolated from
themselves in the event that more than one copy of the same
door is executed at the same time. Thus it may be necessary
to place extra configuration files for some doors in each
line directory.
For example, to install QuickEd in a multi-node environment,
ensure that QUICKED.EXE is in the system directory (C:\RA in
this example) and that the EXTERNAL EDITOR setting in
RACONFIG is set to "C:\RA\QUICKED.EXE". To complete the
installation, copy the files QUICKED.HLP and QUICKED.CFG
into each line directory; these two files need not be
present in the system directory.
All that is necessary now is to create the batch files that
call each copy of RA for each line:
REM Sample batch file to fire up line 1
:START
CD \RA\LINE1
RA -N1
REM Check errorlevels etc
GOTO START
104
Note that the -N1 parameter is not required since
RemoteAccess defaults to line 1; it is included only for
completeness.
REM Sample batch file to fire up line 2, using FrontDoor
REM as a front-end mailer in shell to mailer mode
:START
CD \RA\LINE2
RA -M\FD\FD.EXE*M -N2
REM Check errorlevels etc
GOTO START
RemoteAccess will keep a separate system log (RA.LOG) and
usage graph file (TIMELOG.BBS) in each line directory.
The placement of the EXITINFO.BBS and DORINFO1.DEF door
files is handled differently in a multi-node environment. In
a single line installation these files are written to the
RemoteAccess system directory. In multi-node mode they are
written to the current (default) directory, thus ensuring
that each door has it's own set of info files from the BBS
at all times.
Additional configuration flexibility is provided in the
method RemoteAccess uses to locate the configuration (*.RA)
files. If one or more of the *.RA config files is present in
a particular line directory, then the information in those
files will override the information contained in the
corresponding config file in the system directory.
For example, it may be necessary for each line to use
different modem configuration information. This data is
contained in CONFIG.RA, so make a copy of this file in each
line directory. Change to the line 1 directory and use
RACONFIG to edit the modem settings. Save your changes and
repeat the procedure for line 2. When RemoteAccess fires up,
it will use the CONFIG.RA in the current directory that you
just edited, and the other config files in the system
directory.
The LIMITS.CTL file works in the same way; you may override
the global settings in the system directory by making a copy
of LIMITS.CTL in one or more line directories and editing
with an ASCII text editor. This enables each line to exhibit
different download and time limits for one particular
security level.
Beware of third party utilities that write to the system
files! RemoteAccess is specifically written so that many
users can read and post messages simultaneously to the same
message-base, but other programs probably AREN'T. Check the
documentation very carefully before you fire up your
favourite off-line mail editor and start posting messages
while someone else is on-line. Similarly, if your echomail
processor does not lock the message-base files while
working, you should set up your system to ensure that mail
is never imported when there is a user on-line. Exporting
messages however, IS permitted.
105
It's quite likely that you'll need to increase the FILES
setting in your CONFIG.SYS if RemoteAccess is running
several lines under a multitasker. You'll also need a
separate batch-file for each line to invoke RemoteAccess
with the correct command-line parameters. See the reference
section on command-line parameters for information on the -N
parameter.
It is ESSENTIAL that you load SHARE.EXE when operating
multi-node. SHARE is a utility that comes with DOS which
RemoteAccess uses to lock the database files it uses, to
ensure that no conflicts occur. Not using SHARE is asking
for trouble; you risk severe corruption of both your user
and message database files.
106
REFERENCE SECTION
────────────────────────────────────────────────────────────
Sysop keys
────────────────────────────────────────────────────────────
The following keys work while a user is on-line:
[F1] : This displays the users name, location,
security, time remaining, connection speed
and the line number he/she is on. If the
user has ANSI or AVATAR emulations on this
is also displayed on this line.
[F2] : This displays the users voice and data phone
numbers, the date and time on which the user
last called, the date the user first called,
the number of times the user has called and
the age and birthday of the user.
[F3] : The number of files the user has uploaded
and downloaded is displayed, including the
total kilobytes of the uploads/downloads.
Also, on this line, is the users security
flag combinations.
[F4] : This displays the system statistics such as;
Last caller, total system calls, current
time, printer status, local screen status
and the time and errorlevel of the next
system event.
[F5] : This displays the total number of messages
posted by the user, highest message number
the user has read, the users selected
language, the users group number, the
amount of netmail credit the user has and
the users handle.
[F6] : User's reason for wanting chat (if any).
[F7] : Interactive EMSI session information.
[F9] : Help! Hot-key summary.
[F10] : Turn off the status bar to show exactly what
the user is seeing. [F1] to [F5] brings it
back.
[CTL-A] : Opens and closes a capture file during a
chat session.
[ALT-Fn] : Activate one of ten programs in a shell, or
exit to DOS at a certain errorlevel.
[ALT-A] : Disable/enable answering (only available at
the "wait for call" screen).
107
[ALT-C] : Break in for a chat if there is a user on
remotely. ESC finishes chat mode and drops
the user back to the BBS.
[ALT-D] : Toggles "Snoop" mode, ie. whether the local
screen shows what the user is doing.
[ALT-E] : Activates a pop-up user attribute editor for
the user currently online.
[ALT-H] : Hang up on the user immediately.
[ALT-J] : Drop to a DOS shell while the user is still
on-line.
[ALT-L] : Lock the user out of the system by dropping
his/her security level to zero and hanging
up.
[ALT-N] : Toggle "sysop on next". When this mode is
activated (indicated by [NS] on the F1
status bar), RemoteAccess will pause and
page the sysop for two minutes when the
current user logs off. After paging the
sysop RA will then exit with and errorlevel
of "2". {+} Registered only.
[ALT-O] : Override paging hours. This allows you to
enable or disable sysop paging regardless of
the time. Note that this is permanent, and
affects all lines until reset.
[ALT-P] : Toggle printer logging.
[ALT-S] : Modify the current user's security level.
[Up-Arrow] : Increase the user's time by one minute.
[Down-Arrow] : Decrease the user's time by one minute.
[Scroll
Lock] : Disables the paging tune. When a user pages
the SysOp no sound will be produced at the
local console. {+} Registered only.
When the system is waiting for a call, the only sysop keys
that are active are [ALT-O], [ALT-J], [ALT-D], [ALT-P] and
[ALT-A]. However, pressing [L] will allow you to log-on
locally, and [ESC] will terminate the program and
return to DOS. Note that terminating in this way will
always return an errorlevel of 0 to DOS regardless of
whether the -E command-line parameter is invoked.
108
Command-line parameters
────────────────────────────────────────────────────────────
RemoteAccess accepts the following command-line parameters:
* RA.EXE
---------
-NOEMS : Forces RemoteAccess to ignore any available EMS.
-L : Run RemoteAccess in local mode.
-S : Set "snoop" mode off; disable local screen.
-D : Disable status bar by default.
-R : Log user back on-line after a menu type 15 exit.
-G : Used with the -R option; forces RemoteAccess to
{+} return to the last menu the user was in at the
time of the previous exit to DOS. The default is
to return to the TOP menu.
-P : Log user activity to printer.
-Nxx : Line (node) number in a multi-line system (1-250).
-Cx : Communications port to use (1-4).
-Bxxxxx : Log user on-line at baudrate xxxxx.
-Exxx : Exit at errorlevel xxx after caller logs off.
-Txxx : Time (in minutes) until next system event.
NOTE: Some mailers have the capability to generate
a "standard format" batch file called DOBBS.BAT to
run the BBS program. In shell-to-mailer mode (see
below) RemoteAccess will scan this batch file (if
present) to determine the time until the next
event.
-M<f> : Activate the "shell to mailer" feature. This
causes RemoteAccess, upon loading, to execute your
front-end mailer program in a DOS shell. When the
mailer exits, RemoteAccess detects the errorlevel
it would normally pass to the batch-file. If the
errorlevel matches one defined in RACONFIG, the
user is logged on to the BBS at the appropriate
baud rate. If the errorlevel is not recognised as
an incoming call, RemoteAccess exits to its
batch-file at that errorlevel. See the BATCH FILE
EXAMPLES section for more on this feature.
NOTE: RemoteAccess does the swap by storing a
"swap file" in EMS (if available) and on disk.
Normally this file would be stored in the system
directory, but it is possible to force
RemoteAccess to put the file in a directory of
your choice by setting the RATEMP environment
variable. For example, if you executed the DOS
command SET RATEMP=E:\TEMP\STORAGE, then the swap
file would be placed in the E:\TEMP\STORAGE
directory.
109
In "shell to mailer" mode, it is possible for two
errorlevels to conflict. For example, errorlevel 5
is used by RA to indicate that a user entered both
net and echomail, and by FrontDoor to indicate
modem initialise failure. If the front-end returns
an errorlevel that conflicts in this way,
RemoteAccess will pass to the batch file that
errorlevel plus 10. So, if FrontDoor returned
errorlevel 5 because the modem would not
initialise, RemoteAccess would pass errorlevel 15
to the batch file.
* RACONFIG.EXE
---------------
-B : Runs RACONFIG in black and white (mono) mode.
-L : Runs RACONFIG in language editor mode.
-M : Runs RACONFIG in menu editor mode.
-U : Runs RACONFIG in user editor mode.
110
Errorlevels
────────────────────────────────────────────────────────────
When RemoteAccess exits to DOS either after a user logs off
or because of a menu type 15 "Exit to DOS" function it
returns an errorlevel that your batchfile should test for
and act on accordingly:
Errorlevel Meaning
---------- -------
0 User logged off OK, default value. Note - this
can be overridden with the -E command line
parameter.
1 Initialisation error - couldn't find the FOSSIL
driver, or the modem failed to initialise.
2 Sysop Next function was active when the user
logged off. {+} Registered only.
3 The user entered one or more NetMail messages
during the session. The message base should be
scanned for outgoing NetMail.
4 The user entered one or more EchoMail messages
during the session. The message base should be
scanned for outgoing EchoMail.
5 Both NetMail AND EchoMail messages were entered.
You can force RemoteAccess to exit with a specific
errorlevel by creating a file called "RAXITn.e". If
this file is present in the Semaphore directory, then
node "nnn" will terminate with the errorlevel "nnn". This
file is very powerful and will disconnect any caller who
is currently online.
111
Text file control codes
────────────────────────────────────────────────────────────
There are a range of special control characters that can be
inserted in any of your ASCII/ANSI files that cause certain
system and user information to be displayed. There are three
classes of codes. Each code is a two-character combination
of a control-code followed by a normal character:
Character
ASCII# Combination Purpose
------ ----------- --------------------------------------
01 ^A Wait until the [Return] key is pressed
02 ^B Disable aborting with the "S" key
03 ^C Enable aborting with the "S" key
04 ^D Enable the "Continue?" prompt
05 ^E Disable the "Continue?" prompt
06 ^F * Insert a user parameter
07 ^G Produce a beep on the caller's console
08 ^H Backspace
09 ^I Tab (forward 8 characters)
10 ^J Linefeed
11 ^K * Insert a system parameter
12 ^L Clear screen
13 ^M Carriage return
17 ^Q RESERVED FOR XON/XOFF HANDSHAKING
19 ^S RESERVED FOR XON/XOFF HANDSHAKING
22 ^V RESERVED FOR AVATAR
23 ^W Pause for one second
24 ^X * Execute a program in a DOS shell
26 ^Z END OF FILE MARKER. DON'T USE THIS!
EXECUTING A PROGRAM IN A DOS SHELL:
This gives you the ability to run an external program in a
DOS shell whenever RemoteAccess encounters a ^X embedded in
a text file. The ^X is followed by the command line you want
to execute, and terminated with the pipe symbol (|). For
example, to run an external mail checking utility when a
user logs on you could embed the following entry in the
WELCOME.A?? file:
^X\RA\MAILCHEK.EXE *B *F *L|
RemoteAccess would then execute the following DOS command:
\RA\MAILCHEK.EXE 2400 FirstName LastName
Note that you MUST terminate the command with the pipe
symbol. All special DOS shell control codes may be used as
per the type 7 menu function.
BEWARE! Use this feature with caution. Imagine the damage
that this embedded command could do:
COPY \RA\USERS.BBS \RA\FILES\IBM\NEWFILES
112
If there is any possibility of a user being able to modify
any of the text files that your system displays, then
disable the shell feature by using the option in RACONFIG.
"Note to next user" programs are notorious for this! If you
don't think it ever happens, then maybe this will convince
you. A local sysop was watching his board one afternoon and
noticed that when a user logged off, he got the following
message:
"Hey, Joe! What sort of a password is ROCKET? Next time
choose a harder one!! ... Fred"
The sysop couldn't believe his eyes. How could this have
happened? Well, the "note to next user" utility he had
installed a few weeks earlier was to blame. It actually
allowed a user upload a short text file that was appended to
the GOODBYE disconnect file. "Fred" had simply inserted a
few control characters into the file that would display the
current user's first name and password, which of course
would always be correct for whoever viewed it. Well, it
shook that sysop up a bit, as well as teaching him a lesson.
Luckily the ^X feature wasn't enabled, or anything could
have happened...
113
* User parameter codes
----------------------
Character
ASCII# Combination Information displayed
------ ----------- ---------------------------------------
48 ^F0 Full screen editor (ON/OFF)
49 ^F1 Quiet/do not disturb mode (ON/OFF)
50 ^F2 Hot-Keys (ON/OFF)
51 ^F3 Handle
52 ^F4 Date of first call
53 ^F5 Date of birth
54 ^F6 Subscription expiry date
55 ^F7 Days until subscription expiry
56 ^F8 AVATAR setting (ON/OFF)
57 ^F9 File ratio limit (number of files)
58 ^F: File ratio limit (kilobytes)
59 ^F; Full screen message viewer (ON/OFF)
60 ^F< Users date format
61 ^F= Auto message forwarding ON/OFF
62 ^F> Name (if any) of message forwardee
63 ^F? Current file ratio (number of files)
64 ^F@ Current file ratio (kb)
65 ^FA Users full name
66 ^FB Location
67 ^FC Password
68 ^FD Business/Data phone number
69 ^FE Voice/Home phone number
70 ^FF Date of last call
71 ^FG Time of last call
72 ^FH A Flags setting
73 ^FI B Flags setting
74 ^FJ C Flags setting
75 ^FK D Flags setting
76 ^FL NetMail credit remaining (cents)
77 ^FM Total messages posted
78 ^FN Last message read
79 ^FO Security level
80 ^FP Total calls to the BBS
81 ^FQ Number of uploads
82 ^FR Kilobytes of uploads
83 ^FS Number of downloads
84 ^FT Kilobytes of downloads
85 ^FU Minutes used today
86 ^FV Current screen length
87 ^FW First name only
88 ^FX ANSI setting (ON/OFF)
89 ^FY "Continue?" prompt setting (ON/OFF)
90 ^FZ Screen clearing (ON/OFF)
91 ^F[ Kilobyte download limit remaining today
92 ^F\ Name of selected language
93 ^F] User's comment field
114
* System parameter codes
------------------------
Character
ASCII# Combination Information displayed
------ ----------- ---------------------------------------
48 ^K0 Number of msgs in selected msg area
49 ^K1 Number of current template msg area
50 ^K2 Number of current template file area
65 ^KA Total system calls
66 ^KB Last caller (any line)
67 ^KC Number of active messages
68 ^KD System starting message number
69 ^KE System ending message number
70 ^KF Number of times user has paged sysop
71 ^KG Day of the week (full form)
72 ^KH Number of users in the user file
73 ^KI Time in 24 hour format
74 ^KJ Today's date
75 ^KK Minutes connected this call
76 ^KL Seconds connected (always returns 0)
77 ^KM Minutes used today
78 ^KN Seconds used today (always returns 0)
79 ^KO Minutes remaining today
80 ^KP Seconds remaining today (always 0)
81 ^KQ Daily time limit
82 ^KR Current baud rate
83 ^KS Day of the week (abbreviated form)
84 ^KT Daily download limit (in K)
85 ^KU Minutes until next system event
86 ^KV 24 hour format time of the next event
87 ^KW Line number (as set on command line)
88 ^KX TERMINATES THE CALL
89 ^KY Name of current template message area
90 ^KZ Name of current template file area
91 ^K[cc Change foreground and background colour
(cc = colour code number. See the
section on COLOUR CODES for further
information).
92 ^K\ Clear to end of line.
93 ^K]nnn Displays the language prompt number
"nnn" from the currently selected
language. "Nnn" must be padded with
zeros.
115
Colour control numbers
────────────────────────────────────────────────────────────
Colour code numbers are used by RemoteAccess when you setup
your File list template and when using the "^F[cc"
control codes to define colours in your Menu displays,
Language prompts and textfiles.
Foreground Background Colours
(2nd "cc" digit) (1st "cc" digit)
------------------ ---------------------
0 - Black 0 - Black
1 - Blue 1 - Blue
2 - Green 2 - Green
3 - Cyan 3 - Cyan
4 - Red 4 - Red
5 - Purple 5 - Purple
6 - Brown 6 - Brown
7 - White 7 - White
8 - Grey
9 - Bright Blue
A - Bright Green
B - Bright Cyan
C - Bright Red
D - Bright Purple
E - Bright Yellow
F - Bright White
0 - Flashing Black 8 - Black
1 - Flashing Blue 9 - Blue
2 - Flashing Green A - Green
3 - Flashing Cyan B - Cyan
4 - Flashing Red C - Red
5 - Flashing Purple D - Purple
6 - Flashing Brown E - Brown
7 - Flashing White F - White
8 - Flashing Grey
9 - Flashing Bright Blue
A - Flashing Bright Green
B - Flashing Bright Cyan
C - Flashing Bright Red
D - Flashing Bright Purple
E - Flashing Bright Yellow
F - Flashing Bright White
Examples:
43 - Red foreground on a Cyan background.
01 - Blue on a black background.
FB - Flashing Bright White on a Cyan background.
116
Modem string translation
────────────────────────────────────────────────────────────
RemoteAccess recognizes certain characters embedded in your
modem initialise strings, and converts them to special
functions. The supported characters are:
^ Raise DTR, modem will answer the phone.
v Lower DTR, disconnect if connected.
~ Wait for 1/4 of a second before continuing
| Send a carriage-return [CR] to the modem
117
Questionnaire script language
────────────────────────────────────────────────────────────
Questionnaire script files are stored in the system
directory and have the extension .Q-A. Each file is plain
ASCII, and contains one command per line. The available
commands are listed below. Note that the command interpreter
is case-insensitive, so the command "Ask" could be entered
as "ASK" or "ask".
118
Ask <Len> <Var num>
-------------------
Waits for the user to input a string that is up to 80
characters long, and stores the string in the variable <Var
num>. Valid values for <Len> are 1 to 80. <Var num> may be
any number between 1 and 50.
Example : Ask 30 5
This example will ask the user for an input of up to 30
characters in length, and then store the inputted
string in variable 5.
Capitalise <ON|OFF>
-------------------
Turns on or off auto-input prompt capitalisation.
Example : Capitalise ON
ChangeColor <Foreground> <Background>
-------------------------------------
Changes the colour of the text if the user has ANSI graphics
enabled. The colour selected will remain the default colour
for all subsequent text, until the end of the questionnaire
script or the next ChangeColour command.
Valid colours are:
<Foreground> <Background>
------------ ------------
0 Black 0 Black
1 Blue 1 Blue
2 Green 2 Green
3 Cyan 3 Cyan
4 Red 4 Red
5 Magenta 5 Magenta
6 Brown 6 Brown
7 Light Grey 7 Light Grey
8 Dark Grey
9 Light Blue
10 Light Green
11 Light Cyan
12 Light Red
13 Light Magenta
14 Yellow
15 White
Example : ChangeColor 7 1
This example would change the text colour to light red
foreground on a black background.
119
ClearScreen
-----------
Clears the user's screen if the user has enabled screen
clearing.
Example : ClearScreen
This command would simply clear the users screen.
Display "<Text>"
----------------
Displays the specified text on the screen. The vertical bar
is translated to a line-feed and carriage return. If this
bar is omitted, any following text starts at the next
character on the same line.
Example : Display "Please answer ALL questions|"
In this example the text, "Please answer ALL questions"
would be displayed to the user with a linefeed/carriage
return.
DisplayFile <1-8 character file name>
-------------------------------------
Causes a text file to be displayed in the same way as a menu
type 5 would be displayed. The text file must be in the text
file directory, and have the extension .ASC/.ANS/.AVT.
Example : DisplayFile BBSRULES
This example would display the file BBRULES.ASC/ANS/AVT
(ASC to ASCII users, ANS to ANSI users and AVT to users
with AVATAR enabled) to the user. Once the file has
been displayed the user would then be returned to the
questionnaire.
EndIf
-----
Signifies the end of an IF statement. The function of "If"
and the relationship of the "EndIf" statement are more fully
explained later in this chapter under the "If" script
command.
Example : EndIf
120
If <Var num> = "<String>"
-------------------------
The IF command compares the contents of the specified
variable number with <String>. If the two do not match, then
all following lines are skipped until an ENDIF statement is
encountered.
Example : If 5 = "Perth"
Display "That's where I live|"
EndIF
The above section of script would examine the contents
of variable 5 and check to see if it matches the text,
"Perth". If it does the text "That's where I live" would
be displayed. If variable 5 does not match the text,
the script would jump to the EndIF statement and
continue with the questionnaire without displaying the
text.
Exec <commandline>
------------------
Executes a program in a DOS shell. All command-line
parameters valid in a menu type 7 command may be used.
Example : Exec C:\RA\NEWMAIL.EXE *B*M
This command would force RemoteAccess to execute the
DOS command "MAIL.EXE" whilst the user is on-line. The
"*M" tells RemoteAccess to swap itself out of memory
before executing the command. This is useful when
running programs that require large amounts of memory.
For further information on executing DOS commands see
MENU TYPE, type 7.
GetChoice <Valid choices> <Var num>
-----------------------------------
Waits for the user to enter one of the characters in <Valid
choices>, and stores the response in the variable <Var num>.
Example : GetChoice YN 2
This command would wait for the user to press "Y" or "N"
and then store the response in variable 2.
121
Goto <Label>
------------
Causes the script to jump to the specified <Label>. The
Label can be any 12 character alphanumeric sequence. Labels
can be placed into the script by placing a ':' before the
label string.
Example : If 5="Y"
Goto EXT
EndIf
Quit
:EXT
Display "You answered Yes!"
Quit
In this case, if variable 5 is "Y" RemoteAccess will
jump to the segment of script beginning with ":EXT",
then display the text, "You answered YES!". If the
variable is not equal to "Y", the questionnaire would be
terminated immediately.
ListAnswer <Var num>
--------------------
Displays (to the screen) the contents of the variable <Var
num> followed by a CR/LF.
Example : ListAnswer 5
This example would display the contents of variable 5.
MenuCmnd <Num> <Data>
---------------------
Executes a menu command. Simply specify the command number
followed by the contents of the optional data field. Note
that menu navigation commands (GOTO, GOSUB, RETURN etc) may
not be used.
Example : MenuCmnd 27 60 /T=Andrew_Milner
This example will force RemoteAccess to run the menu
command type 27, with an optional data field of
"60 /T=Andrew_Milner". This is the command to post a
message in message area 60 addressed to "Andrew Milner".
For further information on menu commands see the
section on MENU TYPES.
122
OutputAnswer "<Descriptor>" <Var num>
-------------------------------------
Outputs <Descriptor> followed by the contents of the
variable <Var num> to the questionnaire answer file. The
answer file is given the same name as the questionnaire file
but has an extension of .ASW.
Example : OutputAnswer "Hobbies : " 6
The answer stored in varable 6 will be outputted to the
file <filename.ASW>, where "filename" is the same name
as the questionnaire file. If this answer is the first
outputted answer in the questionnaire it is a good idea
to first use the command "PostInfo" to output a header
detailing information about the person who is answering
the questionnaire.
PostInfo
--------
This option tells RemoteAccess to output the users name and
the date and time to the answer file.
Example : PostInfo
Quit
----
Terminates the questionnaire and returns to the BBS.
Example : Quit
SetFlag <Flag set><Flag number> <ON|OFF>
----------------------------------------
Turns on or off the specified user flag. <Flag set> is "A",
"B", "C" or "D", and <Flag number> is a number between one
and eight. Changes to the users flag settings are
permanently recorded in the user database.
Example : SetFlag C3 OFF
In this example the users C3 flag would be turned off.
123
SetSecurity <Security level>
----------------------------
Simply sets the user's security level to the number
specified. The level may be any number from 1 to 64,000. Any
changes to the users security level will be permanently
recorded in the user database.
Example : SetSecurity 10
This would set the users security to a level of 10.
WaitEnter
---------
Waits for the user to press [ENTER]. If the user presses
any other key, then the input will be ignored.
Example : WaitEnter
When this line is encountered in the script, the
user will have to press the Enter key before he/she can
continue.
124
Terminal emulations
────────────────────────────────────────────────────────────
A terminal emulation is the method that RemoteAccess uses to
communicate with the user's software. The most basic of
these is straight ASCII. The ASCII terminal emulation can
only display normally visible characters plus a few others,
such as backspace, linefeed and clearscreen.
RemoteAccess supports two additional emulations - ANSI and
AVATAR. ANSI is currently the most popular terminal
emulation in the bulletin board world; it has the capability
to change text colour, cursor position, and can do simple
animations. Some implementations of ANSI can even play
simple tunes at the user's end. ANSI does have some
drawbacks; each special control code is several characters
long. To change the text colour for example, requires a
control code of up to 8 characters. These lengthy codes can
severely slow the user's display, and for this reason the
usefulness of ANSI at speeds of 1200 baud and lower is
limited.
AVATAR, on the other hand, uses control codes that are
typically a quarter to a third of the length of their ANSI
equivalents, making it usable at lower speeds. Not only
that, but AVATAR has much more advanced screen control,
making possible relatively complex animations and screen
displays. AVATAR is a newcomer - there are comparatively few
terminal programs that support it, even fewer that support
it properly. At this time there are no utilities for
creating AVATAR screens. You can however convert your ANSI
screens to AVATAR with the supplied utility.
RemoteAccess uses AVATAR level 0+ (AVT/0+). The only
terminal programs which have been tested successfully with
AVT/0+ are Joaquim Homrighausen's FrontDoor, Adam
Stanislav's TinyTerm and Adam Blake's Communique. If you
make use of AVT/0+ you should make it clear to your users
that they should be using one of these two, until more
terminal programs implement AVATAR support.
125
Text file naming conventions
────────────────────────────────────────────────────────────
RemoteAccess displays text files at specific points and in
response to specific events. The EXTERNAL SUPPORT FILES
section details all these text files. Files that have the
.A?? extension may be displayed in any one of three
"flavours":
.ASC : ASCII only, no special control codes
.ANS : ANSI, should only contain text and ANSI codes
.AVT : AVATAR, may contain text and AVATAR codes.
If a user has both ANSI and AVATAR enabled, RemoteAccess
will search first for a .AVT file, and if unsuccessful will
then try .ANS and then .ASC. If only ANSI *or* AVATAR is
selected and the preferred file type isn't available, the
.ASC version will be displayed.
126
Interactive EMSI
────────────────────────────────────────────────────────────
Interactive EMSI (IEMSI) is a protocol which can be used by
communications software to establish certain parameters for
an interactive session, for example a user logging on to a
bulletin board. The only BBS software to support IEMSI at
this time is RemoteAccess 1.11.
From within the Terminal setup utility, the user can define
a number of user "profiles", each of which includes a user
name, handle, password, telephone number, location etc. When
IEMSI is enabled from within the terminal and the user calls
a RemoteAccess BBS, the user's information is sent to the
BBS automatically.
This makes it possible for a user (the "client") to log on
to a BBS (the "server") without even touching the keyboard.
The terminal and RemoteAccess will automatically exchange
information such as software name and version number, screen
parameters and local time.
One useful feature is the ability of the server to
temporarily modify the user's display parameters for the
current session only. For example, normally when a user
calls a particular BBS he/she might use 25 line mode
locally, so the "screenlength" field in his/her record is
set to 25 accordingly. However, on one occasion he/she
activates the terminal in 50 line mode. RemoteAccess
will recognise this and set the screen length to 50 for
the current session only, restoring it to 25 when the user
disconnects. In addition, RemoteAccess will
automatically activate whatever terminal emulations both it
and the client supports.
Another benefit is the ability to chat to a users using a
full screen chat mode. This is accomplished by the IEMSI
remote terminal being able to maintain the chat screen.
To see if a user is connected in IEMSI mode to your BBS,
press F7. If IEMSI is active, RemoteAccess will display the
relevant information about the client's system on the status
bar. At the right hand end of the status bar the user's
request flags are displayed. A request flag is an option
that the user asked for. RemoteAccess currently supports
these request flags:
CHT : Split screen chat mode capability indicator
CLR : Clear screen codes
NEWS : Display the NEWS.A?? file
MAIL : Check for new mail
FILE : Check for new files
HOT : Use hot-keys
HUSH : Activate "do not disturb"
FSED : Use the full screen message editor
127
BATCH FILES
────────────────────────────────────────────────────────────
You will require a batch file to run RemoteAccess
successfully. A batch file is a DOS file which contains a
list of commands which will be executed in the designated
order (one per line). Along with normal DOS commands you
can execute programs and use special commands only available
in batch files. (Refer to your DOS manual for information
on BATCH file commands).
To help in the construction of batch files, the following
files are generated by RemoteAccess: {+} Registered only.
RAREADY.nnn : When there are no callers on-line
RemoteAccess will produce a file called
"RAREADY.nnn" in the semaphore directory,
"Nnn" is the node which generated the
file. When a caller logs on this file is
deleted.
RABUSY.nnn : This file will be generated in the
semaphore directory when a caller logs on.
The file extension "nnn" corresponds to
the node number. When the caller logs off
this file is deleted.
Additionally, it is possible to force RemoteAccess to
terminate and return to DOS at any time (while a user is
online or while waiting for a call) by creating the
following file in the semaphore directory:
RAXITn.e
Where 'n' is the target node, and 'e' is the errorlevel to
exit with. For example, the file RAXIT3.45 would cause node
three to exit to DOS with errorlevel 45.
128
BATCH FILE EXAMPLES
────────────────────────────────────────────────────────────
These examples are not usable in their presented form. They
are provided as a starting point for your own batch files:
Using RemoteAccess stand-alone (ie. without a mailer)
-----------------------------------------------------
:START
Cd \RA
REM Run the main program:
RA -E20
REM User logged off, cycle back:
if errorlevel 20 goto START
REM RemoteAccess exits to the batchfile with errorlevel 7
REM once a night:
if errorlevel 7 goto CLEAN
if errorlevel 3 goto START
if errorlevel 2 goto LOCAL
REM An errorlevel of 1 means a fatal error, an
REM errorlevel of 0 means that ESCape was pressed while
REM in "wait for call" mode - so we quit:
goto END
:CLEAN
REM Do nightly message and user maintenance with RAUSER
and RAMSG
goto START
:LOCAL
REM Load RemoteAccess in local mode
RA -L
goto START
:END
echo RemoteAccess HQ Line 1 Down.
NOTE: Unlike some other BBS packages, RemoteAccess will
ALWAYS exit back to DOS (or your batch file) after a caller
logs off. This means that you can only run in stand-alone
mode with a batch file that will recycle back to restart the
main program.
129
Using RemoteAccess with a mailer (FrontDoor or BinkleyTerm)
(using either TosScan or Echogen to process mail)
-------------------------------------------------
:START
cd \RA
REM Run the main program and run the mailer in a "shell".
REM The *M tells RemoteAccess to swap out of memory
REM before running the mailer.
REM Either FrontDoor : RA -m\FD\FD.EXE*M -E20
REM or BinkleyTerm : RA -m\BT\BT.EXE*M -E20
REM Any errorlevels that RemoteAccess does not understand
REM it passes back to the batchfile:
if errorlevel 150 goto CLEAN
if errorlevel 99 goto UNPACK
if errorlevel 20 goto START
if errorlevel 10 goto END
if errorlevel 5 goto NET&ECHO
if errorlevel 4 goto ECHO
if errorlevel 3 goto NET
if errorlevel 2 goto LOCAL
goto END
:CLEAN
REM Do your nightly maintenance here. In this example
REM the mailer is set to exit at errorlevel 150 nightly.
:UNPACK
REM Toss incoming mail
REM Either : TOSSCAN toss
REM or : ECHOGEN -A -P -T -U
goto START
:NET&ECHO
REM Net and EchoMail needs to be exported from the
REM message base.
REM Either : TSUTIL export
REM or : MAILSCAN
:ECHO
REM Export EchoMail.
REM Either : TOSSCAN scan
REM or : ECHOGEN -A -E -P
goto START
:NET
REM Only export NetMail
REM Either : TSUTIL export
REM or : MAILSCAN
goto START
:LOCAL
REM Load RemoteAccess in local mode
RA -L
goto START
130
:CLEAN
REM Do nightly message and user maintenance with RAUSER
and RAMSG
goto START
:END
REM Some fatal error occurred.
echo RemoteAccess HQ Line 2 Down.
* The Echogen command-line switches shown assume a FrontDoor
environment.
Note that the particular command-line switches for all of
these utilities (BinkleyTerm, FrontDoor, TosScan or
Echogen) will vary according to your set up. All of these
programs are supplied with documentation which will provide
you with this information. It is stressed again that these
examples are only intended to give you a starting point for
creating your own batch files.
131