Ezycom V1.01.
Copyright Peter Davies 1992.
All Rights Reserved.
Released 20 May, 1992.
Table of Contents
Features 4
Conditions of Use 7
Registration 9
Copyrights 10
Installation 11
Configuration (General) 13
Configuration (Misc) 21
Configuration (File Areas) 32
Configuration (Ezyprot, Protocols) 44
Configuration (Bimodem) 46
Configuration (Setting Up Your Own Protocols) 47
Configuration (Message Areas) 50
Configuration (Echoarea Manager) 56
Configuration (Message Misc) 59
Configuration (Message Security) 63
Configuration (Message Netmail) 64
Configuration (Compression of Echomail) 66
Configuration (Global Message Options) 67
Configuration (Modem Set-(Up) 70
Configuration (Baud Rate Set-up) 73
Networking with Ezycom 74
Sysop Function Keys 76
Ezycom Command Line Parameters 78
Errorlevels 79
Ezycom External Support Files 80
Ans/Asc/Asl/Avt Files 81
File Points 85
Page Tunes 85
Menu System (Ezymenu) 86
Menu System (Defining a Menu System) 86
Menu System (Templates) 90
Menu System (Global Menus) 91
Menu System (Automatic Options) 91
Menu System (Special Characters) 91
Menu System (Keyboard Stuffing) 92
Menu System (Groups) 93
Utilities (Ezymaint, Maintenance Program) 95
Utilities (Conversion Files, Doconv.bat Upconv.bat) 97
Utilities (Fedit, Filebase Editor) 98
Utilities (Usercomp, Userbase Utility Program) 105
Utilities (Anstoavt, Makes Avatar Screens) 106
Utilities (Ezymail, Echomail Utility) 107
Utilities (Ezynet, Netmail, Areafix Utility) 108
Utilities (Msgcomp, Messagebase Utility) 111
Utilities (Ezyff, Filebase Utility) 112
Utilities (Ezyutil, General Utility) 113
Utilities (Ezyed, Userbase Editor) 118
Utilities (EzyNode, Nodelist Compiler) 122
Page 2.
Appendix A (Questionnaire Language) 125
Appendix B (Multiline Operation) 136
Appendix C (File Control Characters) 139
Appendix D (Menu Commands) 143
Appendix E (Operating Batch Files) 166
Appendix F (Credits) 174
Appendix G (Colour Changer) 175
Index 176
Page 3.
Features of Ezycom
o Ezycom used advanced file system technology to get high
performance when is use with Mass Storage Devices such
as CD-Roms. Typically, file searches can find a file
in approximately one second, where as on other older
systems, it takes well over five minutes.
o Database type file system, allowing high performance
file listing, without continually accessing the hard
disk to find a files date/size. This gives MASSIVE
speed increases on CD Roms, Multiline and Networked
BBS's. The system also allows classifying of files
into separate areas, no matter WHERE the files are on
your Hard Disk. You are not restricted to a file area
for each file path. This allows CD Roms, which
normally have their files laid out in no particular
order (such as the RBBS-In-a-Box), to function well
under Ezycom.
o Ezycom is a fully fido compatible Bulletin board.
o Ezycom has a full-blown Mail Tosser/Scanner. Which is
built around Ezycom to enable integration between it
and Ezycom itself. Thus enabling many exciting
features, such as automatically adding conferences into
the BBS package.
o Up to 65,000 security levels, with Up to 32 flags that
can be defined on each level to make your BBS more
secure.
o Four ratio systems, including Post/Call ratios,
Kilobyte Ratios, File Ratios and a VERY Powerful File
Points System are included.
o The File Points System is the answer to many sysop's
prayers. As it will can (Sysop Definable) credit the
uploader of the file, only if the file was downloaded
many times. Thus, avoiding problems with Ratio
systems, where users upload rubbish so they can
download. (Registered Versions Only)
o Database message system, increasing speed in message
base handling, and decreasing space used by each
message. This method is different to many other
Database systems as two files are used per message
area. Thus, if something dreadful happened to one of
your message base files, you do not loose your entire
message base.
Page 4.
o Message Base packing system allowing you to define 4
different ways of deleting messages. The most exciting
is deleting by Kilobytes, enabling you to keep your
message base at a fixed size.
o Comprehensive Paging system allowing configuration of
page times on a per day basis. As most people are home
more on weekends than weekdays, this allows your users
to page you more on weekends (If so desired).
o Comprehensive File Management system taking care of all
file area needs. Including sorting file areas, archive
conversion, master list generation, virus checking,
integrity checking and much more.
o A Full-Blown file area editor, allowing multiple tag
and move of files, deletion of multiple files, viewing
of file info including uploader and other various
options.
o Security can be placed on downloading of file areas but
still allowing the viewing of the files. A look but
not touch environment.
o Passwording of files, on per directory or per file
basis can be done.
o Allowing certain files to be 'FREE' for the user to
download, again on per directory or per file basis.
o Support for Up to 250 lines, running under either a
network, multitasker or both.
o A full-blown chat system between nodes is available.
Avatar/local users will be opened up into a full screen
user to user chat. Allowing messages to popup even
while they are typing them in. Up to 200 different
chats can take place at any one time. Private messages
can also be sent between nodes.
o Ezycom also allows (sysop definable) restricted access
to any function that Ezycom performs. This restricted
access can vary dramatically. Different types of
restrictions include Security, Flags, Age, Time On-
Line, Time Of Day, File Ratio, Kilobyte Ratio and
Post/Call Ratio.
o An intelligent duplicate upload detection system, that
stops users from being credited for files that are
already on your system. The file will then be removed
from your system, thus not taking up precious disk
space.
Page 5.
o A full screen ANSI/AVATAR chat, which has full local
and remote scrolling.
o Local uploads and downloads, which allows an easy way
to place files on your system.
o Full conferencing style system, allowing message and
file areas to be grouped, to allow users to only view
areas of their choosing such as IBM and/or Amiga.
Page 6.
Conditions of Use
o Ezycom is the copyrighted materials of Peter Davies and
authors of respective products. The material it covers
it the executable files, overlays, documentation and
anything contained in the Ezycom Package.
o If, you classify as a SHAREWARE registration (see
"Registration"), you are allowed to evaluate Ezycom for
1 month, and after that period, you MUST either
REGISTER Ezycom or stop using it. Non-Profit
organisations/Commercial customers may ONLY evaluate
Ezycom for a period of 7 days, before Ezycom must be
bought, or discontinued in use. If, Ezycom is being
used in a multi-line situation, then only one
Registration is required. Providing that the
registration key in use, will only be on one hard disk
and only in one directory of that hard disk. If, this
is not the case, then a site licensing agreement is
required.
o Before registration, you miss out on a few 'Nice'
features, taken out to help encourage registration. It
must be stated however, that Ezycom is usable without
these features, and is not now and never will be
'Cripple Ware'.
o Ezycom may never be used in an unlawful, or illegal
manner.
o Ezycom distribution is encouraged. So long as no
charge is levied for the distribution. Pay Systems are
exempt from this, so long as there is no extra charge
for Ezycom. Commercial Software Libraries may not
include Ezycom in their libraries without the written
permission of Peter Davies.
o Ezycom archive's may not be altered in any shape or
form. The conversion to a different archive format is
allowed, but we prefer that you do not convert it.
Adding of BBS comment files or headers to the archive,
is NOT permitted.
o You are NOT allowed to modify Ezycom executables,
Overlays, registration keys or documentation in any
shape or form. Tampering with messages inside
executables is NOT permitted.
o Site / Group licensing agreements will be reviewed on a
case by case basis.
o The registration key may not be distributed to other
person(s). Doing so, will violate the licensing
agreement you made when Registering Ezycom.
Page 7.
o In using this program agree that in no event shall
Peter Davies and respective authors, be liable for any
indirect, incidental, consequential, special, or
exemplary damage or lost profits, even if Peter Davies
and respective authors have been advised of the
possibility of such damages or lost profits. You
further agree that if for any reason Peter Davies and
respective Authors are found to be liable to you as a
result of your use of the program and software, that as
partial consideration of Peter Davies and respective
Authors granting you this license, you agree that Peter
Davies and respective Authors, sole and exclusive
cumulative liability to you or others shall be no
greater than the amount of any registration fee paid by
you. If no such registration fee was paid, then Peter
Davies and respective Authors are not liable for any
amount.
o Peter Davies or the associated Authors are in no way
obligated to provide support for or future versions of
Ezycom.
o Registration of Ezycom entitles you to the use of the
current version of Ezycom. Any future versions may
have new licensing conditions, which may change the
terms of your current licensing agreement.
o The use of tampered versions of Ezycom, or the use keys
not distributed by Registration Sites is an
infringement of the Copyright Act. We will not
hesitate in prosecuting offenders.
o The copying and/or distribution of your license key is
strictly prohibited. Except, of course for backup or
archival purposes.
Page 8.
Registration
Included with the package are two registration files,
REGISTER.FRM, (registrations using Cheques/Money Orders),
and CREDIT.CRD, (registrations using VISA/Master Credit
Cards (NO BANKCARD)). Please select the correct file for
your purposes. Please make sure you complete these forms
when registering to avoid delays.
$50AUD for use of Ezycom in a private home, for non-
commercial activities. This special introductory offer
to Ezycom, will only remain at this price for V1.00 and
V1.01.
$150AUD for use of Ezycom in a non-commercial environment.
That is, the business is a non-profit organization and
makes no money in the use of Ezycom. Example: Public
School, University, Church, Tennis Club, etc.
$250AUD for use of Ezycom in a commercial environment.
That is, none of the above conditions are met.
Prices subject to change without prior notice.
Support Sites
Footrot Flats
+61-3-578-0968 (300/1200/2400/9600)
Fido 3:636/213
Internet daviesex@brt.deakin.edu.au
24 Hours a day
Hitch Hikers Guide to The Galaxy
+61-3-546-3038 (300/1200/2400/9600)
Fido 3:636/204
24 Hours a day
Offline
+61-3-808-4510 (300/1200/2400/9600)
Fido 3:633/374
Internet rjstocksex@brt.deakin.edu.au
24 Hours a day
EzyAccess
+61-3-585-0495 (300/1200/2400/9600)
Fido 3:636/200
24 Hours a day
Ezycom support conference (EC_SUPPORT) and the latest
version, should be available at any of the support sites or
beta test sites.
Page 9.
Copyrights
The following products are copyrighted to the following
people. Unlisted products, are also copyrighted to their
respective authors.
Arj Robert Jung
Async Professional Turbo Power
BNU David Nugent
D'Bridge Mosaic Press
DESQView Quarterdeck Office Systems
DSZ, GSZ Chuck Forensberg
Ezycom Peter Davies
Ezyed Wayne Burnside
EzyEdit Brad Vonarx
Ezymenu Richard Stocks
Ezyup Colin Berg
Front Door Joaquim Homrighausen
IBM International Business Machines
Lha H Yoshizaki
MSDOS Microsoft
PkZip Pkware
Scan McAfee Associates
Turbo Pascal Borland International
Windows Microsoft
X00 Ray Gwinn
Page 10.
Installation
Install
-------
Requirements
------------
Ezycom can run on IBM PC or compatible. A modem with
Hayes compatible commands (such as CONNECT/RING/etc) and
hardware flow control (CTS/RTS) is required also for
communications and DOS version 3.X, 4.X, 5.X or later,
although MSDOS V5.0 is recommended.
Ezycom requires a machine with at least 512K of Ram,
although 640K is preferable. A Hard Disk is also required
with a minimum of 1 meg recommended. If, you have EMS
memory, XMS memory or Extended memory, Ezycom can make use
of this. It, can directly use EMS to Swap itself out to, or
to load the Overlay into, or it can indirectly use XMS or
Extended memory, by using it to make a Ram Disk, and placing
the overlay/swap files on there.
Set-up
------
Ezycom requires one other program to run it
successfully stand alone. That is, a FOSSIL driver. X00,
by Ray Gwinn, and BNU by David Nugent have successfully been
tested with Ezycom. See their documentation for the
installation of those programs.
If, you are using Ezycom in a mail Network which is
FidoNet compatible, you will also require a Mailer.
D'Bridge and Front Door have both been successfully used
with Ezycom. Ezycom, has its own fido compatible mail
tosser / scanner.
In your CONFIG.SYS add the following lines...
FILES=20
BUFFERS=20
FILES=20, tells DOS how many files can be open at once.
BUFFERS=20, tells DOS how many buffers are to be open.
Generally, 20 is good, as it does not use too much memory,
and it speeds up disk access.
In your AUTOEXEC.BAT add the following lines depending on
the drive you set EZYCOM to run on...
SET EZY=C:\EZY
SET TASK=1
Page 11.
SET EZY, tells Ezycom where to find the system
directory. It can optionally be the directory where your
BBS runs from.
SET TASK, The node number to execute Ezycom under.
Note: -N overrides this variable.
Eg SET TASK=1
Extract SETUP.ARJ in a temporary directory and run
INSTALL. An example command to perform this is "ARJ e
SETUP.ARJ". It will automatically install a default setup
of menus, messages, files and text files for the operator to
observe as a sample system, to learn from, or to work from.
Ezycom sample setup will now be located in the path
specified, but the executables will still be where you
unarchived them from.
You are now ready to start configuring Ezycom.
Page 12.
Configuration
General
-------
Paths
-----
When you load the config file you will presented with a
list of options. That you access by moving the cursor on
the option you want to change then hit ENTER. You will have
to set up many of these options in order to get Ezycom up
and running. First Set-up all the directories that will be
used by your system with Ezycom the directories you have to
set up are as follows.
Eg
Overlay Path : C:\EZY\
System Log : C:\EZY\EZY*N.LOG
Maintain Log : C:\EZY\EZY*N.LOG
Swap File : C:\EZY\EZYSWAP
AVT Files : C:\EZY\TXT\
ANS Files : C:\EZY\TXT\
ASC Files : C:\EZY\TXT\
ASL Files : C:\EZY\TXT\
Menu Files : C:\EZY\MENUS\
Menu 2nd : [UnUsed]
Netmail : C:\EZY\NETMAIL\
Nodelist : C:\EZY\NODELIST\
Message Base : C:\EZY\MSGBASE\
File Base : C:\EZY\FILEBASE\
File Index : C:\EZY\FASTBASE\
File Sec : C:\EZY\
User Base : C:\EZY\USERBASE\
Bimodem Path : [UnUsed]
Node Message : C:\EZY\
Temp Path : C:\EZY\TEMP\
Upload Path : C:\EZY\UPLOADS
OutSide Page : [Unused]
Editor Path : *C /C EDIT.EXE
Overlay Path. This is where Ezycom looks to find its
overlay file (EZY.OVR). You can set this to a Ram Disk, for
improved efficiency.
System Log. This is the path and filename of where
Ezycom will write its log file. If you place a *N in the
log name, it will be translated into the current node
number. So EZY*N.LOG would actually become EZY1.LOG for node
one.
Page 13.
Maintenance Log. This is where Ezycom writes the logs
for all the utilities that come with it. You should NEVER
have this the same filename as the other log, if you are
running more than one line. Here, you can also place a *N
in the filename for translation into node number. Each
Ezycom utility has a unique identifier for logging, so if
you place a *T in the maintenance log name, many logs will
be written out for each utility.
Swap File. When Ezycom swaps out its memory, it can
(sysop definable) swap itself to DISK. This is the path and
filename to the swap file(s). The extension is not allowed,
as Ezycom will append its own extension for node number.
Ezymaint and Ezymail append different extensions, so they
can be run at the same time as nodes.
Text Files. These are the paths to where the text
files are kept. They may all point to the same directory if
you like. Since ANSI are the most popular, you may like to
put .ANS on a Ram Disk, but leave the rest on your hard
disk.
Menu Files. Your Menu Files are stored in this path.
This may be a Ram Disk or Physical Disk Path.
Menu 2nd. This is a second menu path, for when the
first path points to a Ram Disk. Take the situation where
you alter a menu on a Ram Disk. All modifications are
stored to the Ramdisk, not the physical disk. Placing a
path here, makes all modifications be stored at this path as
well.
Netmail/Nodelist. Simply, this is your Netmail and
Nodelist paths. A more full explanation is explained in the
Echomail/Netmail section of this document.
Message Base. This is the location of Ezycom's message
base. It should be noted that you MUST use the SAME
userbase with the message base. You can NOT have several
message bases per userbase or vice versa, without totally
destroying lastread pointers.
File Base. This is the location of where the filebase
is located.
File Index. The Fast Find Index is stored here. This
is an index to EVERY file downloadable in your BBS system.
File Sec. The FILESEC.EZY is stored in this path. A
path is provided to allow you to point this file to the
ramdrive.
Page 14.
Userbase. Simply, where the userbase is stored.
BiModem Path. This is where BiModem.COM and
BIMODEM.1/BIMODEM.2/etc should be found. Normally this path
would be null. If there is a path here, you MUST have
BiModem fully Set-up to run Ezycom.
Node Message. This is where the internode
communication files are stored. If, you plan to use the
inbuilt multiuser chat, it might be advisable to point this
path to a ram disk. Only 10k would be required maximum in
the ramdisk.
Temp Path. This is where Ezycom stores its temporary
files.
OutSide Page. If, you wish your pages to use other
tunes besides the default, or the tune files, you can use
Page modules written for Ezycom. EZYSB100 is one such page
program, which plays sound blaster VOC files. Please see
your PAGE programs (such as EZYSB100) for more details on
this.
Upload Path. This is a temporary path where ALL
uploads will be uploaded to, before they are moved. If, the
upload is aborted, then the file is left in this directory
for later resumption. It is advisable to have a daily
maintenance routine to delete all files in your upload path.
(Remove aborted uploads) A statement like "Echo Y | del
c:\ezy\uploads\*.*" would delete them. This path MUST be
unique and NOT used in the file base system.
Editor Path. This is the path and filename that the
CONFIG will load when you choose to edit the text files.
Any text editor will do Dos's edlin, Nortons Editor,
WordStar Etc.
Eg: *C /C C:\WS\WS.EXE
This would run Wordstar as your editor for the Ctl and Q-A
files such as TRASHCAN.CTL, PHONEDUP.CTL, NEWUSER.Q-A Etc.
Page 15.
Netmail Addresses
-----------------
You can now set your Net Address, if you are going to
be using Ezycom in one of the many PC Networks. ie FidoNet
Main Address : 3:636/213
Aka Address #1 : 80:1000/153
Aka Address #2 : 0:0/0
Aka Address #3 : 0:0/0
Aka Address #4 : 0:0/0
Aka Address #5 : 0:0/0
Main Address : 3:636/213
This is to say you are node 213 in net 636 in region 3.
You can also enter up to 15 aka Address's.
The Aka Address is for people that are members of more
than one Network. In the above example, the Aka shows that
the you are also in region 80 and are node 153 of net 1000.
For more information about Network Addresses, see the
Echomail/Netmail section of this document.
Page 16.
Limits
------
Next option is setting the Limits. These are the
settings that implement the Security Levels you set for your
BBS. First set the Security Level.
Security Level : 10
Maximum Time : 30
300 Baud Daily k limit : 100
1200 Baud Daily k limit : 200
1275 Baud Daily k limit : 200
2400 Baud Daily k limit : 300
4800 Baud Daily k limit : 300
7200 Baud Daily k limit : 300
9600 Baud Daily k limit : 300
12000 Baud Daily k limit : 300
14400 Baud Daily k limit : 300
19200 Baud Daily k limit : 300
38400 Baud Daily k limit : 0
Downloads per One Upload : 15
Initial Download Credit (Files) : 15
Downloads in k per One K Uploaded : 0
Initial Download K Credit : 0
Post Call Ratio (%) : 10
Initial Message Credit : 2
Number of Days till Rego Expires : 365
This example shows the security level <10>
To open a new security level you hit the INSERT key and
all the options are blank. Type the security level that you
wish to enable. Then fill out the blanks as you see fit for
that level.
Maximum Time : This sets the time that you allow for
this security level.
The next options are the DAILY Kilobyte Download limits
which you can set for each Baud rate that logs onto your
System. Unlike other options you will use later, 0 does
not disable daily K limits, it makes the users daily K limit
0. To effectively give the user unlimited download
Kilobytes, make the limit 65000.
Eg.
300 Baud Daily k Limit :20 (Eg 20k download)
1200 Baud Daily k Limit :40 (Eg 40k download)
1275 Baud Daily k Limit :40 (Eg 40k download)
2400 Baud Daily k Limit :80 (Eg 80k download)
9600 Baud Daily k Limit :65000 (Eg Unlimited k)
Continue this for all Baud Rates that you use.
Page 17.
Downloads Per Upload : Sets your Download Ratio
Factor's (FILES) which is the amount of Downloads a user can
have before he/she must Upload a file. This ratio means
that when it is set to one, a user must upload 1 file for
every file he/she downloads. When the ratio is set to 2,
the user must upload 1 file for every 2 files the user
downloads. When the ratio is set to 3, the user must upload
1 file for every 3 files the user downloads. To disable
this option, set the ratio to 0. The initial credit for the
file ratio, means how many files the user can download
before the ratio is enforced. That is, if set to 1, a user
can download 1 file, before he/she has to upload. Setting
the credit to 0, means the user must UPLOAD BEFORE he/she
can download.
The Next two options are similar to the above but are
Ratios for Kilobytes. The Ratio for Kilobytes is the
Downloads in k per ONE k Uploaded. For instance, if this
was set to 5, then for every Kilobyte the user uploads,
he/she can download 5 kilobytes. The Initial Download K
credit is the Initial Free Kilobytes Credit you give the
user. The examples used above are similar to this
situation, except that the ratio applies to Kilobytes not
Files.
Next is that Ratio on Calls/Messages Posted. This is a
percentage. Just enter the percent of calls to message
ratio you want the user to use. Setting the percentage
100%, means that a user MUST post one message for every call
he/she makes. Setting the percentage to 200%, means the
user MUST post 2 messages for every call he/she makes.
Setting the percentage to 50%, means the user MUST post 1
message every two calls he/she makes. Setting the
percentage to 0%, disables the option for the security
level. Again the initial credit, gives the user some
"breathing space" before the ratio is enforced.
This Post Call Ratio actually works differently to the
other two cited above. If the user does not meet the
required PCR, then there is actually nothing stopping
him/her from doing anything on the BBS. Through the use of
the Menu System flag "Test Message/Call Ratio", you can stop
users who have exceeded this ratio by setting it to YES.
And lastly is the number of days until the users Rego
Expires for this Security level. This is used to calculate
when the user registration date will expire for this user.
At the point of expiring, REGEXP.Q-A is executed at logon
for that user. See "Questionnaires" for more details on
"REGEXP.Q-A". Setting this value to 365, would mean that
the user's registration would expire 365 days after the
setting of the user's registration date (usually the date of
when they first logon).
Page 18.
To create another Security Level just hit your INSERT
key.
To delete a Security Level just hit the DELETE key.
Hit (P) to get a great Pick List of all the Security
Levels you have set-up.
Moving between the Security Levels can also be made by
hitting the Page Up and Page Down keys.
Events
------
Setting of System Events is easy, just hit the INSERT
key and you will be entering the time you want the event to
start. Then you can set whether the event is enabled or
disabled. Next set the ERRORLEVEL you want Ezycom to exit
with. And the last thing to do is tell Ezycom when to use
the Event, just pick the days required or all days. Events
can be used to trigger events on your systems, such as
system maintenance. If, the user is on-line when an event
should take place, they are automatically dropped off, so
that the event can be processed. Events are triggered 5
minutes earlier than the actual start time, so it could be
possible for Ezycom to come back on-line before the actual
event start time. If this occurs, Ezycom will NOT trigger
the event again, it will continue as per normal. If, Ezycom
is not running when an event occurs, then Ezycom will NOT
execute the event when fired up.
Start Time : 07:30
Status : Enabled
Errorlevel : 20
Days Active : Sun Mon Tue Wed Thu Fri Sat
Last Run : 23-04-1992
This example shows that there is an event at 7:30,
which will exit Ezycom with errorlevel 20 on all days of the
week.
Page 19.
Textfiles
---------
These are the textfiles you are able to edit with the
editor you set up as the Editor, in the Path section of the
config.
Trashcan.Ctl. This is the list of names not allowed on
your system.
PhoneDup.Log. This is a log file created by Ezycom
that tells you if there are more than one user using the
same phone number.
PhoneNum.Ctl. This file has the list of phone numbers
that you have deemed not allowed on your system.
Newuser.Q-A. This file is displayed to all new users
to fill out. See the Questionair Documation later in this
file to see the laungage used in this file.
RegExp.Q-A. This file is displayed to users that have
loged on after there regodate has expired.
Drop Dos
--------
This will let you shell out to DOS. Type EXIT to
return to Ezycom.
Page 20.
Misc
----
New User
--------
Choosing this option you will be able to set all the
options that need to be set and ask when a new user logs on
to your BBS.
First set if you want your New Users to be asked for
there Home/Voice Phone Number. (Toggle with the ENTER Key).
Next is Ask NewUser Phone Number 2 which can be Toggled
between NoPhone (don't ask for number), Business or Data.
You will then have to set if you want to use a forced
phone format which is configurable in the next option.
After setting the phone format you set the following
options by toggling each one with the ENTER key.
Ask NewUser for Alias : Yes
Ask NewUser for Date of Birth : Yes
NewUser Ansi : Ask
NewUser Avatar : Ask
NewUser Full Screen Editor : Ask
NewUser Clear Screens : Ask
NewUser More Prompt : Ask
NewUser IBM Characters : Yes
NewUser Date Format : Ask
The toggles are as follows Ask, No or Yes.
Alias...............User alias for systems that allow them.
Date of Birth.......Date of Birth (used for Security Check).
Ansi................Ansi Graphics (On or Off).
Avatar..............Avatar Graphics (On or Off).
FSE.................Full Screen Editor (On or Off).
Clear Screens.......Clear Screen codes sent.
More Prompt.........More Prompt or not.
IBM Characters......HighBit Characters to be sent.
Date Format.........Either DD-MM-YYYY or MM-DD-YYYY
Now set the NewUsers Logon Security Level. This is the
level that you set for ALL New Users to your BBS. Set a low
one so you can enhance it as you feel. You can override
this if you set one in the NEWUSER.Q-A file but more on that
later.
Next is the New Users Flags.
The Flags are labelled A..D with each flag having 8 settings
that is to say A1..A8 B1..B8 etc. you can use these flags to
enhance your Security Levels.
Page 21.
Next is the Minimum Length of the Password you want
your New Users to use. (The longer the better!!)
Next is the Minimum baud rate for Ansi and Avatar. Any
user logging on under this baud rate will get ASCII graphics
only.
FilePoints are the next option you are able to set.
This sets the initial amount of file points a user receives
when logging on for the first time.
The last option in this screen is the New User Net Mail
Credit. This allows New Users the option to use Net Mail
from there first logon.
Logon Info
----------
This section shows options that are used to set the way
Ezycom handles each Logon attempt. I will List them here
and then explain.
Forced Password Change (Calls) : 0
Ask for Date of Birth (Calls) : 0
Ask for Phone Number (Calls) : 0
WatchDog Message Board (0=Off) : 0
Minimum Logon Security : 5
Number of Logon Attempts : 3
Allow OneWord Logon Names : No
Minimum Logon Baud Rate : 300
Minimum Slow Baud Rate : 300
Slow Baud Start : 00:00 End : 23:59
Low Security Start : 00:00 End : 23:59
Minimum Baud for File Transfers : 300
First Registration Expire Warn : 30
2nd Expire Warning (Days) : 10
Check for Mail at Logon : Ask
Check for Files at Logon : Ask
Fast Local Login : Yes
Display Remote User's Password : No
Allow Sysop Remote : Yes
Auto Detect ANSI : Yes
IEMSI : Yes
Forced Password Change. Allows the Sysop to set at
what number of calls the user's should change there
Passwords. This is for better Security on your System as
users have to keep changing there passwords to stay on the
system.
Ask for Date of Birth. Is also a Security feature that
Ezycom uses to make sure that the user logged on is who they
say they are. They will be asked every XX calls.
Page 22.
Ask for Phone Number. This is also a Security feature.
The user will be asked to enter there Phone Number (Last
four digits) to stay logged on to the system. You set the
number of called between asking for this check.
WatchDog Message Board. This tells Ezycom where to
post a message, that you have written to be posted. This
message should let the User know that someone has tried to
log in under there password and failed. A good place for
this message is the Sysop's Conference if you allow users to
read messages in this area. A file called WATCHDOG.ASL must
be placed in the Ezycom system directory, which is a plain
text file, that contains the message you wish to send to the
user.
Minimum Logon Security. Is the lowest security level
that you will allow users to login under. Eg. if you set
New User Security Level to 5 but have a level lower than
this for Users that may have Upset you, you can give them
this access. Users between security level 1 and this
security level, can logon between the times allocated by low
security start and end time. Note that users with Security
Level 0, are ALWAYS barred from the system.
Number of Logon Attempts. If the user goes over this
setting they will not be logged on to the system. As they
would have failed to enter the correct Password in the
amount of attempts that you have set here. If you have set
the WatchDog Message to a message board the user will be
notified when he/she logs on next.
Allow OneWord Logon Names. This is for Systems that
allow there Users to login under an Alias (First time on) or
allow Users to use there First Name as a Login Name.
Minimum Logon Baud Rate. Is the slowest Baud Rate that
Ezycom will allow users to gain access to your system.
Minimum Slow Baud Rate. Is a baud rate the you can set
so you can pick the time the users with slow modems can
access your BBS.
Slow Baud Start and End. This is the time that you
allow users with the SLOW modems to access your system.
Low Security Start and End. Is the time that you allow
the users that have the Security level less than that set in
the Minimum Logon Security. Eg. If the minimum security
was 5, then those users from security levels 1 through 4,
could logon between these times. A start and end time of
00:00, would indicate users can logon all the time, but any
other time intervals where start and end times match, would
indicate these users can NEVER logon.
Page 23.
Minimum Baud for File Transfers. This sets the slowest
baud rate that you will allow your users to download/upload
from/to your file areas.
First Registration Expire Warning. Is when Ezycom will
let the user know that there registration will expire in the
number of days you set here.
2nd Expire Warning (Days). The user will be notified
again about there registration expiring soon. This expiry
warning should be LATER than the first warning, for it to
function correctly.
Check for Mail at Logon. With this option you are able
to toggle whether you want the system to Check for NEW Mail
at each Logon, Ask the User each Logon or Never ask the
user.
If you pick not to ask or check for mail make sure that
you have an option in one of your menus or the user will
never know when they have new mail.
Check for Files at Logon. This is similar to the Mail
Checking option above but for New Files on your system.
Fast Local Login. With this option set to Yes all you
have to do is hit Enter at the Logon Prompt, and the Sysop
will be logged into the system.
Display Remote User's Password. This option when set
will display the Remote User's Password on your screen.
Ask for Local Password. If you have this option set
you will have to enter your password when logging into the
system.
Auto Detect ANSI. With this set Ezycom will Auto
detect ANSI so it will display ANSI graphic files and menus.
If the User has another graphic setting in his/her UserBase
Record that one will be used.
IEMSI. This allows users to logon to Ezycom using the
IEMSI portocol. Just set it to Yes to trun it on.
Page 24.
Colours
-------
In this screen you can define the way Ezycom displays
colour in your BBS. You will be able to set many different
colours for many different options.
Status Bar Foreground :
Status Bar Background :
PopUp Window Foreground :
PopUp Border Foreground :
PopUp Background :
PopUp Text Colour :
PopUp HighLight Colour :
Foreground Colour :
Default Message Quote :
Default Message Colour :
Default Message Prompt :
Default Prompt Bkgrnd :
Default FileName Col :
Default FileStata Col :
Default FileDate Col :
Default Descrip Col :
Default Uploader Col :
NewUser Colour 1 :
NewUser Colour 2 :
Change Stats Colour :
Enter Prompt Colour :
By moving to the one you want to change with the up and
down arrows all you have to do is hit ENTER to toggle the
colour change. So as you can see its easy to get a
different looking BBS just by changing a few colours.
Page 25.
Prompts
-------
In this section you can modify all the Prompts that
Ezycom uses in the course of running your BBS.
Name : Please Enter Your Name :
Password : Enter Password :
Jump To Dos : Sysop shelled to DOS!
Back from Dos : Sysop back from DOS!
Enter : Press [Enter] to continue
Enter Chat : Sysop breaking in for a chat..
Exit Chat : Sysop ending chat..
Bulletin : Please Select an option.
Type 7/15 Exit : It's here somewhere??
Alias : Please Enter your Alias (Return=None)
ANSI : Can Your Terminal Support ANSI Graphics
Avatar : Can Your Terminal Support Avatar Graphics
Phone Check : Scanning for duplicate Phone Numbers...
Full Screen Ed : Use the Full Screen Editor
Location : Please Enter your Suburb and City :
Screen Length : What is your Screen Length :
Scan UserBase : Searching the UserBase
Screen Clear : Do you want Screen Clearing Codes Sent
As you can see, you have plenty of options to make your
BBS look the way you want it.
Paging
------
As most people are home more on the weekend than the
rest of the week, we at Ezycom thought that you would like
to be able to set the paging hours to what ever you like.
You can also set the number of times that the user can page
you per session. If you have a Sound Blaster Card, Ezycom
will use it (if you like) to play a tune when a user asks
for a chat. You can do this by setting the Hex address and
IRQ of the sound blaster card, and defining the External
Pager (in paths set-up) to run the Ezycom Sound Blaster
module. When a user requests a chat, you can optionally ask
the user for a reason. Setting this option to Yes enables
this feature. After a chat request has failed, you can
optionally, allow the user to post a message to you. Setting
the message board number to a number greater than 0, enables
this feature, and will post the message in this conference.
Page 26.
Screen Options
--------------
In this screen you will be able to tell Ezycom will
handle how it operates on your system. Like how it writes
to the screen, if it checks for snow etc. The following
points should help when filling out this section.
Direct Screen Writes. This tell Ezycom if you want it
to write the information directly to the screen or use the
bios.
Check for Snow. If you have an old Cga Card Ezycom may
cause snow on your screen by its way of writing to the
screen. If you enable this option Ezycom will check your
system set-up and if it detects snow it will do its writes
in a way to stop it.
40/50 Line Mode. If you have an EGA/VGA card and
screen, you can utilize its enhanced capabilities, by
setting this option to Yes. This will display more lines on
the screen depending on the Card/Screen you have. This will
enable you to see more files/more of a message on the screen
at any one time.
Screen Blanking. When Ezycom is in Waiting for Caller
mode, you could possibly get screen burn in, if your monitor
is left on all the time. Setting this option to an amount
of seconds, will tell Ezycom to BLANK the screen after
waiting that time, thus SAVING your monitor.
Alt - Ctrl Function Keys
------------------------
The Alt-Function keys enable you to set an option to be
executed while users are online. Much in the same way as a
Type 7 Exit. These options could include, running FEdit,
running EzyMenu etc. An example of Alt-Function keys is
Alt-F1 EzyEd.Exe
Pressing Alt-F1 would run EzyEd.
Note: The Ctrl-Function keys are not yet available for
use in Ezycom, but will be used in upcoming versions.
Page 27.
Sound
-----
If you set start and ending time this will enable the
bell (Speaker) to chime when a user logs on in stand alone
mode. A start time of 00:00 and end time of 00:00 enables
full 24 hour chimes, whereas a start time of 00:01 and end
time of 00:01 disables it completly. Any other times, only
enables it during those times.
Incoming Call Bell Start Time : 00:00
Incoming Call Bell End Time : 00:00
Access
------
These access settings are to set your system up in
special ways.
Guest Account : EZYCOM
System Password : [UnUsed]
Logon Password : [UnUsed]
Newuser Password : [UnUsed]
The example above shows that you don't need to use all
the features in this section. Just the ones you want.
Guest Account : This allows you to make an account.
That lets you configure your system to allow special users
to have a special security level that can do differant
things on the system. You have to open an account with
ezyed (userbase editor) with the same name. If you use the
Topmenu option in the user editor (page 2) you can setup an
entirely differant system to your nomal one. If you have
mulitable lines, currently only 1 user can use this account
at a time. As the system will think that the user is trying
to logon twice and kick the second user off the BBS.
System Password : This password is used to lock out all
the special "Alt" keys from the local keyboard. When an
"Alt" key is pressed, the user is prompted for a password.
If the user types in the correct password, then the "Alt"
keys become free to use for the remainder of the session.
Logon Password : This password is used to stop user(s)
logging on your system unless they know this password. If,
they do not get it correct, then they are denied access to
the system. (Not implemented)
NewUser Password : This password is used to stop new
users gaining an account on your BBS, unless they know this
password. (Not implemented)
Page 28.
System
------
Now the most important part of this section as it tells
Ezycom how to operate on your computer. This is a list of
options:
System : Your BBS System Name
Sysop : Your Name
Sysop's Alias : Your Alias if you use one
System Location : Your City and Country
Inactivity (Mins) : 5
Multiline Messages : Yes
Multi Tasker : Auto-Detect
Use Extended IBM Chars : Yes
Swap Out on Jump to Dos : Yes
Top Menu : Top
Log to Printer : No
Printer Port : LPT1
Password Echo Character : *
High Bit Replace Char : o
Max Time to Bank : 0
Max ks to Bank : 0
Freq of Message Check : 1 secs
Minimum Age for .MNU Test : 18
Utility Date Format : DDMMYY
Use EMS for Overlays : Yes
Swapping Type : EMS
Enclosing Brackets : ()
Left Bracket : (
Right Bracket : )
System. Is where you place the name you wish to use
for your BBS.
Sysop. Place your name here so all messages addressed
to the Sysop will be sent to you, also it will be the name
used for the fast logon if you have set it to on.
System Location. This is the city and suburb where
your BBS is location. Eg: Moorabbin Melbourne
Inactivity (Mins). If the user online hasn't hit a key
in the time set in this option he/she will be logged off.
Multiline. This tells Ezycom to perform multiline
capabilities, including internode messages, user to user
chats, and other various updates.
Multi Tasker. Allow you to toggle how it detects if
your system is running under a Multi Tasker such as Desqview
or Double Dos or others. Just hit Enter to toggle the
display.
Page 29.
Use Extended IBM Chars. This allows users to type in
Extended characters. ie If your user are not always English
speaking, then their name might include some Extended IBM
characters, although disabling this option, helps reduce
line noise.
Swap Out on Jump to Dos. With this set to Yes Ezycom
will swap out to either EMS or your hard disk (depending on
the setting for swapping) this will give you more room in
Dos on the swap out.
Top Menu. The name of the first menu Ezycom is to
display. This can be any menu you like but it must be in
the menu path on your computer.
Log to Printer. This will send all the Log information
to your printer, except for local logins.
Printer Port. Is the port that Ezycom will send the
Log to. This can either be LPT1->3, or COM1->4. Make sure
that you do not log to the comport being used for modem
communications.
Password Echo Character. Is the character that the
user will see when they enter there password on your system.
High Bit Replace Char . This character will be sent to
users that can only access low bit ANSI screens.
Max Time to Bank. Is the maximum time that you will
allow users Bank. This time will allow them to stay on the
system longer than the normal setting for there security
level, only until this time is used up.
Max ks to Bank. Similar to the above option but it
deals with the users Kilobytes access, so the user can get
that file which is a little over there limit.
Freq of Message Check. Is how often Ezycom checks for
inter-node messages for multi node systems. Internode
messages are ONLY checked with in User/User chats or in
moving around menus.
Minimum Age for .MNU Test. If you have message areas
or file areas that have information that maybe XXX. Or you
feel that young user should not have access to these areas,
all you have to do is set the age limit that your users have
to be over to get access to those areas. You also have to
set this option in your menus otherwise it won't work.
Utility Date Format. Toggles the two date formats that
Ezycom can use either DDMMYY or MMDDYY.
Page 30.
Use EMS for Overlays. Tells Ezycom if its allowed to
use your EMS memory (if you have it) for its overlay files.
This will speed the system if set to Yes.
Swapping Type. This option allows you define what type
of swapping type used in Ezycom. The swapping techniques
ranges from EMS, XMS, DISK, EMS then XMS then DISK, or XMS
then EMS then DISK.
Page 31.
File Areas
----------
File Area
---------
Here we set-up your file areas for the BBS. Please
read this and the following sections very carefully as the
information shown here will take a while to get through.
But one you understand how Ezycom file areas are set-up, you
will then have one of the best file area managers and
filebase's in the world of BBS's.
Category 1 Name : General IBM Files
Area Path : 1-C:\FILES\GENERAL\
Upload File Area : 10-New Uploads
Conversion : ZIP
Offline Allowed : No
Sort by : Alpha
Master List : No
User Security : 5
User Flags
Sysop Security : 1000
Sysop Flags
Category ## Name. This is the name you wish to call
this file area, try to be as informative as possible as this
name what is displayed to your users.
Area Path. This is the path where all uploads, and all
moves (of files) to this path are placed. The actual path
is defined in the "File Paths" section of the config. This
allows multiple paths for one file area, or multiple file
areas for one path. Generally, the Area Path Number, would
be the same Number as the File Area. You can press "P" for
a pick list, if you forget the Area Path number.
Example:
File Area 1
-----------
Category : IBM New Uploads
Area Path : 1-C:\F\IBMUPLD
Upload File Area : 1-IBM New Uploads
File Area 2
-----------
Category : IBM General Files
Area Path : 2-C:\F\IBMGEN
Upload File Area : 1-IBM New Uploads
File Area 3
-----------
Category : IBM Virus Support
Area Path : 3-C:\F\IBMVIRUS
Upload File Area : 1-IBM New Uploads
Page 32.
Upload File Area. This is the file area where ALL
UPLOADS that are done to this template file area (explained
in the menu configuration documentation). Eg. If you had
an IBM Uploads area, you would place that number in all IBM
areas, so that all uploads would go to that file area. You
can also press "P" for a pick list of file areas, in case
you forget the file area number of IBM Uploads.
Conversion. You can pick the conversion type you wish
your files converted to. If you like ZIP then if a user
uploads a file called FRED.LZH then in the next maintenance
Ezycom will convert the file to the format you place here.
The formats supported are None, ZIP, LZH, ARJ, PAK, ARC and
ZOO. So as you see we have covered most formats. If, you
have any other formats you wish added, please contact us,
and we should be able to provide support for it in future
versions. To set up conversion mechanisms, see
"Conversion".
Offline Allowed. This option tells Ezycom, whether
offline descriptions are allowed. If, set to No, then any
file descriptions that do not have the associated file on
your hard disk, will be removed file list. If, Offline
allowed is set to Yes, then all file descriptions without an
associated file on your hard disk, is set Offline. If, you
have large file lists, that hold all files that used to be
on the hard disk, but are now offline, then to stop Ezycom
checking to see if the file is now online, set Offline
Allowed to "Offline, Keep Offline".
Sort by. This tells Ezycom in what way you would like
your users to see the file listing. The options are None,
Date and Alpha.
Use in Master List. This tells Ezycom if the
particular file area, should be used in Master Lists
generated with EzyMaint. However, this does not effect the
Online Master List Generator.
User Security. Is the security level that users need
to gain access to this file area.
User Flags. These are the flags that the user MUST
have set to gain access to this file area.
SysOp Security. This security level is the one needed
to gain SYSOP access to the file area listed.
SysOp Flags. As for the user flags but applying to the
SYSOP. As you can see if you like you can set some users as
SysOps to selected file areas. For Co-SysOps and alike.
Page 33.
File Paths
----------
The paths you set up here are the file area paths that
your BBS uses for all your users at any security level you
might have set.
File Path : C:\FILE\GENERAL\
Dnld Security : 5
Dnld Flags
New Files Area : 1-GENERAL IBM FILES
Password : [UnUsed]
CD Rom Path : No
Sec Action : File Displayed as Not Enough Security
Free Path : No
Check Age : No
File Path. Is the path to the file area to be
displayed to the user.
Download Security. This is the minimum security needed
to be able to download off this path. This security also
effects functions such as view archive, and view text file.
Download Flags. Are the flags needed by the user to
download off this file area.
New Files Area. When Ezycom finds a file in this
directory, that is NOT in ANY of the file lists, it can
optionally place this file in a file area for you. This is
the file area that it should place it in. You can press "P"
for a pick list, if you forget the file area number.
Password. If you place a password here the user must
enter it to download a file in this path.
CD Rom Path. If this path is on a CD Rom, then make
this "Yes" to tell Ezycom, not to MOVE/DELETE files in this
area. It also aids in efficiency, in maintenance.
Sec Action. When a user tries to download a file in
this area, and does not have enough Security/Flags/Age to
download it, this is the type of message that Ezycom will
display to the user. Eg. If you set it to "Not Found",
then Ezycom will tell the user that this file is not found,
whereas if you set it to "Security File", ezycom will tell
the user they do not have enough access, to access the file.
Free Path. You toggle this option with the enter key.
If this option is set to "Yes", then ALL files in this path
are TOTALLY FREE to the user.
Page 34.
Check Age. If you select Yes to this feature Ezycom
will test the users age against the Age set in the system
set-up. If the user is below this age the user will not get
access to this file path.
To move around the file paths you can hit the page up
or page down keys or hit P to get a pick list of the file
paths that you have already entered.
Misc File Options
-----------------
With these choices you tell Ezycom how to behave when
using Bimodem, Archiving and many other options.
Minimum Upload Space (k) : 20
Swap Out on Bimodem : Yes
Ezymaint Conversion Swap : EMS/XMS
Swap Out on Upload Checks : Yes
Minimum Ignore FPs Given : 1000
FPs credited for Download : 100%
Time of Upload FPs Given : 100%
1 File Point is worth (k) : 1
Maximum File Areas : 50
Upload Time Credit Factor : 100%
Min Description Length : 5
Max Description Length : 50
Delete Incomplete Uploads : No
Minimum Upload Space. This is the minimum space that
your hard disk must have to let Ezycom allow a user to
upload to your system.
Swap Out on Bimodem. If set to Yes Ezycom will swap
out to either disk or EMS. (depending on what you have set
the swap outs to) This will give Bimodem more room to use
in its shell, thus making sure of it running with no
problems.
Ezymaint Conversion Swap. This tells Ezymaint whether
to Swap out Memory (leaving 4k resident), when processing
DOCONV.BAT (Conversion). You can select either EMS, XMS or
DISK. Two other options XMS/EMS and EMS/XMS exist to allow
Ezymaint to check for the existance/use of these memory
management devices in the order shown.
Swap Out on Upload Checks. If you use the upconv.bat
file that comes with Ezycom it will check the file for
integrity, scan for Viruses (if you have and use Scan by
McAFEE) and convert archive types if needed. So if you do
set this option to Yes it will give the running programs
plenty of room to do its work.
Page 35.
Minimum Ignore FPs Security. This option sets the
lowest limit that your users must have to not worry about
being caught by the filepoint ratios.
FilePoints Credited for Download. This sets the
percentage of a filepoint which is given to the uploader of
the file the user downloaded. That is, the more downloads
of the file, the more filepoints the upload will receive.
Time of Upload FilePoints Given. This sets the
percentage of filepoints given, when the user UPLOADS the
file to the system. You may wish to set this to NULL, so
that the user ONLY receive filepoints for POPULAR files.
That is, files that are download.
1 File Point is Worth (k). This tells Ezycom what in
kilobytes a file point is worth. Any amount you think fit
could be used here anywhere from 1k to 255k. The higher the
amount in k, the less accurate filepoints is. That is, if
you set this to 30k, downloading a 10k file is free in terms
of filepoints. Setting this option to 0k, disables the
filepoints system.
Maximum File Areas. With this option you set the
amount of file areas you wish to have as a maximum for your
BBS. Ezycom can handle Up to 400 file areas.
Upload time Credit Factor. Is the percentage of time
the user receives for uploading a file. Eg. 100% would
mean that the user looses no time for uploading, whereas
200% would give the user double the time he spent uploading.
Minimum Description Length. As it says this set the
minimum length you wish the user to describe the file's
he/she just uploaded.
Maximum Description Length. Is similar to the above
option only that it sets the maximum description length.
One point to note is that if you have it set over 50 you
will find that it might cause a slight hassle with the
master lists generated.
Delete Incomplete Uploads. If set to Yes Ezycom will
kill the incomplete upload. But if you do set this, Zmodem
or any other protocol that allows recovery of aborted
uploads, will not function correctly.
Page 36.
File List
---------
This section sets how Ezycom displays file information
to you the Sysop and your users. This is another way you
can make your BBS look different to the others.
User Show Date : Yes
User Show FileSize : K
User Uploader : No
User Download Count : Yes
User Show New File : Yes
User Show Security : No
User Transfer Time : No
User Show File Points : No
User Show Security Files : No
This is the User part of the File List section. This
only applies to people that have access to your files for
downloading.
User Show Date. This will show the date of the files
in the list. The options are either Yes or No.
User Show FileSize. Tells Ezycom how to display the
file size to the user online either in Kilobytes, Bytes or
not to display the file size at all. If you pick None you
can display the file points for the file instead.
User Uploader. If set to Yes, Ezycom will show the
user who uploaded the files that they are looking at.
User Download Count. This shows the user how many
times the files listed have been downloaded by your users.
Either Yes or No.
User Show New File. This will show the new files to
your user's when they ask for that list.
User Show Security. When a file is marked with a
Security flag (using FEdit), you can optionally show that
these files are security files. The default would display
an "S" on any security files.
User Transfer Time. With this option on Ezycom will
tell the user's online how long it would take them to
download the files. This is an estimate based on the baud
rate used.
Page 37.
User Show File Points. This shows how many file points
each file is worth so the user's can quickly workout if they
can download the file, as long as they know how many points
they have left. This option only displays file points if
the user does not have the "Ignore File Points" Flag set on,
or their security is below the "Ignore File Points"
Security. As File Points is only in registered versions,
this feature also only works in registered versions.
User Show Security Files. If option allows the sysop
to decide whether or not to show the user "Security Files",
that is files marked with Security. Setting this option to
No, makes Security work in the same was as Private.
The following list is what you can show the Sysop.
This is the same as the User list so its the same to set-up
the only difference are the last two options which are set
for both User's and the Sysop.
Sysop Show Date : No
Sysop Show Filesize : K
Sysop Uploader : No
Sysop Download Count : Yes
Sysop Show New File : Yes
Sysop Show Security : Yes
Sysop Transfer Time : No
Sysop Show File Points : No
Highlight New Files : Yes
Show New Files Character : Yes
Security Files Char : S
Show New Files Character. This option selects whether
you wish a new files character ("*") is shown, not shown or
just shown to ASCII users.
Highlight New Files. If this option is set, then all
new files are highlighted, and non new files are dull.
Security Files Character. This is the same as the
above option only that it applies to files that the user has
not enough security to download.
Page 38.
File Security
-------------
The file security options listed in this area are about
what files can be password protected separately or if its a
free download off your system.
Filename : BADFILE.BAD
Security : 0
Flags
Password : [UnUsed]
Sec Action : File Displayed as Not Enough Security
Free File : No
Age Check : Yes
Filename. Is the file that the following options will
apply to. This can contain wildcards such as "*.GIF". Note
that Ezycom will "translate" wildcards for performance
reasons into something like "????????.GIF".
Security. The security level needed to download/view
the file(s) listed.
Flags. The security flags for the file listed.
Page 39.
Password. If one is placed here the user will have to
supply the correct password to download/view the file. Note
that this password overrides that found in filepaths.
Security Action. You have two options to pick from ans
here they are.
File Displayed as Not Enough Security
File Displayed as Not Found
Depending on which one you have picked the user will either
be display that the file requested had not enough security
to download or it wasn't found.
Free File. Either yes or no on this option and as it
implies the file is either free to download or not. Note
that this setting overrides the setting in FilePaths.
Age Check. If set to yes Ezycom will check the user's
age against the age set in the system's config. If the user
is younger than the test age the user will not have access
to that file.
Page 40.
Global File Options
-------------------
These option operate on the file areas GLOBALLY so be
careful as they are very powerful.
Set Default Security
Set Default Flags
Set File Area Conversion
Set File Area Sort
Set File Area Offline
Set File Area Master List
Set CD Rom Drive
Set Security/Not Found
Set Protocol DSZLOG Style
Set File Area Delete Old
Set File Area Upload Area
Set File Area Upload Path
Set File Path Upload Area
Centre File Area Name
Set Global Security. This will enable a popup window
that shows the following options. That deal with security
on all aspects of the file base.
User File Area Security
Sysop File Area Security
Protocol Security
File Path Security
Individual File Sec
Quit
User File Area Security. If you use this option you
will be setting the user security for ALL of your file
area's. This maybe the best option to use if you have many
file areas that all your users have access to, if you only
have a few areas that the normal users don't have access to
then just go to that one and change it as in the file area
section.
Sysop File Area Security. As with the above option
this sets all the file area's sysop security. If you have
different sysops for different file areas you would/should
have different security levels for each sysop. If they are
the same all of them would be sysop's of each others area.
The other way to make them different is to use the flags,
more on this later.
Protocol Security. This will set the security level
needed for any user to gain access to the file transfer
protocols. If set too high none of your users will be able
to upload or download files off your system.
Page 41.
File Path Security. This will set the level of
security needed to gain access to the file path's and files
on the system.
Individual File Security. If you have files that you
want protected by a separate security level you can set them
all to the same security level with this option.
Quit. As is implies this quits back to the previous menu
list.
Set Default Flags. As with the set default security
this option also displays another popup window.
User File Area Security
Sysop File Area Security
Protocol Security
File Path Security
Individual File Sec
Quit
Each option list is the same as the previous menu and
affect the flags in the same way.
Set File Area Conversion. This displays a smaller
popup window which shows you how to change the conversion
type.
SPACE=Change, ENTER=Accept and ESC=Quit : None
By toggling the option with the space bar you can set
the default conversion type to None, Zip, Lzh, Arj, etc. You
then hit the Enter key to tell Ezycom that the type
displayed is the type you want, or hit ESC to exit with NO
change.
Set File Area Sort. As with the above option this also
displays a small popup window the same as the last one.
SPACE=Change, ENTER=Accept and ESC=Quit : None
Again by hitting the space bar you are able to toggle
between the options, which are None, Date or Alpha. The
Enter and Esc keys behave the same as the previous option.
Set File Area Offline. Yet another option with a popup
that looks like the last and behaving the same.
SPACE=Change, ENTER=Accept and ESC=Quit : No
Page 42.
This time the options are No, Yes or Keep OFF. The
Keep Off option will set the file OFFLINE all the time
unless you set it otherwise.
Set File Master List. You only have two options in this
popup window Yes or No. Again Space to toggle Enter to
accept and Esc to exit.
Set CD Rom Drive. This is to set the drive letter's of
your CD's if you have them. The options are C to Z for the
drive letters. This option basically sets the CD Rom Flag
of All Paths using these Drives letters to Yes.
Set Security / Not Found. With this option you can set
Files or Paths to NOT FOUND if you want.
Set Protocol DSZLOG Style. This sets your log style to
enable you to use the Dsz log style needed when using DSZ or
GSZ or another protocol that uses this type of logging
style.
Set File Area Upload Area. This sets the default
Upload file Area for all of your file areas. All you have
to do is enter the area number you wish to use as the
default upload file area. You can chose form a Pick list of
all of your file areas if you like.
Set File Area Upload Path. This sets the default
Upload file Path for all of your file areas. As in the
previous option this allows you to also chose the path from
a pick list of the paths.
Centre File Area Names. As it implies this will Centre
all the file area names so when you display them to your
users in an ansi, ascii or avatar screen they will be
Centred.
Page 43.
Ezyprot, Protocols
------------------
Default Set-up Protocols
------------------------
Ezycom comes with its own external protocol engine
called EzyProt. Currently, it does not use the Fossil
Driver, but this will come in later versions. This set-up
is made to work regardless of whether you have locked com
ports or not. The protocol engine comes with XModem, XModem
CRC, XModem-1K, XModem-1KG, YModem, YModem-G, ZModem, Kermit
and ASCII. These protocols automatically dupe check on the
fly, that is, when a new file is sent, it checks it for a
duplicate file, and if so, stops that file from being sent.
If, the user is using ZModem, then the file is simply
skipped, but if YModem/Kermit is being used, then the whole
transfer is aborted, unfortunately. Single file transfers
are different, since, Ezycom stops the user from uploading
the duplicate file before it passes to Ezycom.
Ezycom also comes with a sample setup for Moby Turbo
(in registered versions of DSZ), Lynx and Puma. They have
been disabled, in case you do not have these protocols. If,
these protocols are installed, then DSZLOG must be set for
them to work. Normally, the DSZLOG path would look like
"set DSZLOG=C:\EZY\DSZ.1" for node 1, "set
DSZLOG=C:\EZY\DSZ.2" for node 2, and so on.
As stated earlier Ezycom at the moment does not use the
fossil, so if you have non-standard comport assignments then
you will need to alter the defaults.
Default Comport Assignments
Comport Base Address IRQ Comport Vector
1 3F8 4 C
2 2F8 3 B
3 3E8 4 C
4 2E8 3 B
5 4220 3 B
6 4228 3 B
7 5220 3 B
8 5228 3 B
If this is not correct for the comport that you are
using, then you can SET an enviorment variable to tell
Ezyprot to use special values for that session.
This is done by setting the "EZYPROT" enviorment
variable this way.
EZYPROT=<baseaddress>,<irq>,<comportvector>.
Eg to set com1 using the above information would be.
SET EZYPROT=3F8,4,C
Page 44.
Of course if multinode operation is being used, and the
default setup is not the same as you have. You will need to
set the enviorment for each comport for the nodes you have.
Eg If you are running multinode under Desqview you would
have to set the environment variable in each Desqview
window.
As long as the default does not work on your system.
This is what you see when ezyprot is running.
Protocol: Zmodem Bytes sent: 322283
Block check: Crc32 Bytes remaining: 4004
File name: EZYCOM1.ZIP Blocks sent: 21
File size: 326287 Blocks remaining: 4
Block size: 1024 Block errors: 0
Total blocks: 26 Total errors: 0
Est. time: 21:51 Throughput: 226 CPS
Elapsed time: 21:38 Efficiency: 94%
Remaining time: 0:17
Progress: #################################*******
Status: Ok
---| EzyProt V1.00 |--------------------------------------
Baud Rate: 2400 Start: 18:18
As you can see you have all the information on the
download in progress you will need.
Page 45.
Bimodem
-------
Ezycom has a menu option (Type 30) to run BiModem. This
is a full blown BiModem interface. No external utilities
are required. You are required to have a version of BiModem
V1.24 or later to use with this option.
Place the path where BiModem will reside in your
CONFIG->Paths->BiModem_Path (Usually C:\EZY\BIMODEM). In
this directory, you are required to place BIMODEM.COM,
BICONFIG.COM and the configuration for each Node (BIMODEM.1,
BIMODEM.2 etc from PROTCFG.ZIP). When Ezycom executes
BiModem, it tells BiModem to use BiModem.<node> as the
configuration file for it. To edit the configuration for
each node, you use
BICONFIG /C BIMODEM.1 for node 1
BICONFIG /C BIMODEM.2 for node 2 etc
If, your system path is not C:\EZY, then you will need
to alter the filenames and paths accordingly in BiModem
Config. Ezycom automatically makes a list of download
directories on execution of BiModem. This list of paths,
contains only those of which the user has access to. It
creates a DOWN.<node> in your BiModem directory. If, you
want to reject uploads, then make sure your rejection list
of directories points to this file as well. As users might
not have access to all directories, it could be possible for
them to upload duplicate files. If, you do not want this to
occur, make up your own list of paths (or with EZYFF -
L<filename>), and make the rejection list point to that
file.
All BiModem uploads should go to the CONFIG-> Paths->
Upload_Path. Ezycom will then move the files to the
directory, which you actually wish to upload to go. ie IBM
Uploads, Amiga Upload, etc.
Page 46.
Setting Up Your Own Protocols
-----------------------------
Name : XModem Record #1
Key : X
Status : Up/Down
Batch : No
BiDir (Not Imp) : No
Log Name : C:\EZY\PROT1\DSZ.*N
Ctrl Name : [UnUsed]
Minimum Security : 0
Flags
Download Command : C:\EZY\PROT1\DSZ.COM port *P speed *O
Download Ctrl : [UnUsed]
Download Log Key : S
Download Err Key : E
Dnload Err2 Key : L
Upload Command : C:\EZY\PROT1\DSZ.COM port *P speed *O
Upload Log Key : R
Upload Err Key : E
Upload Err2 Key : L
Efficiency : 78%
Log : FileName : 11
Log : CPS : 5
As you can see you are able to add extra protocols to
Ezycom. You will have to read the documentation on the
protocol on how to set it up for Uploading and Downloading.
Name. Is the name of the protocol used in this record.
Eg Zmodem, Puma etc. Ezycom will use this to display the
name to the user online.
Key. This is a ONE character key that the user will
hit to gain access to this protocol. This should be a
unique key (not used in other protocols).
Status. The status tells Ezycom what the protocol will
be able to do. Either Upload, Download, Both or if the
protocol is Disabled. Use the Enter Key to toggle the
status of this option. The options are Up/Down, Upload,
Download or Disabled. If the protocol is disabled it will
NOT be shown to the user.
Batch. This option tells Ezycom if the protocol is
able to handle batch uploads or downloads. Eg Zmodem.
BiDir. This is for the new bidirectional protocols Not
Implemented in this version of Ezycom.
Log Name. Is the name of the log file used. The most
common will be C:\EZY\PROT1\DSZ.*N. The *N will translate
to the Node being used.
Page 47.
Ctrl Name. If the protocol is capable of a batch
transfer it will most likely need a control file to tell it
what files to download. So you would set this to something
like C:\EZY\PROT1\FILES.*N as in the previous section the
*N will translate to the Node being used at the time of
calling the protocol.
Minimum Security. This is the minimum security the
user must have to gain access to this protocol.
Flags. This will display a popup window that you will
be able to edit. Using the up and down arrows you can
access the flag that you want.
Download Command. This the actual command line that
will be sent to the protocol file area to get the protocol
to download. Make sure that you read the documentation on
the protocol to get it right. All the usual Type 7 control
codes can be placed in the command line. One SPECIAL
character exists, that can be used for translation. "#" is
a list of All the Files that will be sent in this session.
Although, if you are using a BATCH protocol, the number of
files in the batch could exceed the maximum length allowed
by DOS for parameters, so that only a few files are sent.
In this case, the download control file is recommended. "#"
is nearly ALWAYS used on non-batch protocols. (Eg XModem)
Download Ctrl. This is the control character used by
the protocol. Used in batch protocols. Special
"characters" exist that can be translated. That is, @ will
translate into the path and filename of a file to be
downloaded. If multiple files are being sent, then each
line will contain a path and filename. Text can also be
placed in there, such as "Send @", could translate into
"Send C:\FRED1.ZIP" on line 1, and "Send C:\FRED2.ZIP" on
line 2, and so forth.
Download Log Key. Is the key used by the protocol to
log the download in the log file.
Download Err Key. Is the error key used by the
protocol if there is an error that aborts the sending of the
file. As users now receive "FREE" downloads by aborting
downloads near the end, it is in your best interests to have
aborted downloads LOGGED.
Dnload Err2 Key. This is the second error key if the
protocol has one.
Upload Command. Like the download command this is the
actual command line used by the protocol to upload a file to
your BBS. Two SPECIAL characters exist for translation
before the protocol is executed. The "#" is again used, but
this time indicates the upload directory WITH a trailing
backslash. If, you do NOT want a trailing backslash, simply
Page 48.
add a "." after it. Also, a "$" can be used to indicate
the filename of the file to be uploaded. This is only for
use with NON-BATCH protocols, as they generally require the
filename of the file to be uploaded. (Eg XModem)
Upload Log Key. Is the key character used by the
protocol in the log file it uses.
Upload Err Key. The error character is used by Ezycom
to determine files that were aborted during the upload
process. Primarily, this is used to delete aborted uploads,
if the sysop has configured Ezycom for it.
Upload Err2 Key. The second error key if the protocol
has one.
Efficiency. This how efficient the protocol is.
Ezycom uses this to work out how long the download will
take.
Log : FileName. Is the position of the filename in
words in the log file. In a DSZ Log format, the position is
11.
Log : CPS. Is the position of the CPS rate in words in
the log file that the protocol generates. In a DSZ Log
format, the position is 5.
Example DSZ Log format
CPS Rate
v
Z 10007 2400 bps 240 cps 0 errors 0 512 C:\CONFIG.SYS
^ ^^^^^
Upload Log Keyword Filename
Page 49.
Message Areas
-------------
Message Area Name
-----------------
Place a unique title for the message area here to
identify it from all others. Try to make the name of the
area reflect the contents of the messages that the area will
contain.
As an example "Messages to Sysop".
Msg Area Name : MESSAGE TO THE SYSOP Rec 1
Area Tag : Not Needed
Message Type : Local
Message Kind : Private Only Kill Messages After 30 Days
Alias Allowed : Real Names Only Kill Recv After 10 Days
Area Group : Not Needed Maximum Messages 50
Read Security : 5 Maximum Kilobytes 0
Read Flags Combined Access Yes
Write Security : 5 Initial Combined Yes
Write Flags Test for Cfg Age No
Sysop Security : 50000 Keep Private Bit Not Needed
Sysop Flags Show SeenBy Lines Not Needed
Uplink : Not Needed Clear SeenBy Not Needed
Origin Aka : Not Needed Visible Not Needed
Origin Line : Not Needed
SeenBy
Export To
The message area name can be up to 30 characters long.
To delete an area just remove the area name.
Areafix Tag
-----------
This is where you put the name of the echomail
conference. It must be a unique Conference tag and reflect
the actual echomail name. It can be up to 30 characters
long, but can not contain spaces.
For example EC_SUPPORT, EC_BETA.
Message Types
-------------
There are 6 possible types of messages you can
configure in EZYCOM.
1/LOCAL - Allows the exchange of messages only between
users of the BBS.
2/NETMAIL - Allows you to send a private message to any
user on another bbs that is part of the same network.
Page 50.
3/ECHOMAIL - Allows the exchange of messages between
users on BBS'S that are linked to the same Network. Usually
these messages are public and deal with a specific topic.
4/PASSTHRU - This option if enabled tells Ezymail that
the conference is forward only. i.e. No mail will be
unpacked onto your system but will be forwarded to those in
your export list.
5/WAITTHRU - This option is mainly used by HUBS and HOSTS
of NETWORKS. If a conference is in WaitThru mode it is not
active. It does however, allow a node to turn a conference
on at his HUB site by making his HUB request the conference
from his HOST.
6/ALLMAIL - Messages posted to "All" in this conference
are shown to "All" users on Mail Scan.
Message Kinds
-------------
There are 3 types of message kinds
1/PUBLIC - These are message areas that contain messages
that any user can read on the bbs.
2/PUBLIC / PRIVATE - This allows you to have both public
or private messages in the same area. When leaving a
message in one of these areas you will be prompted if you
would like to make it private.
3/PRIVATE - Messages in this area are private only.
Private messages being distinct from public messages in that
only the user who the message is addressed to or the user
who wrote it can read it.
Alias Allowed
-------------
1/USE ALIAS - Only your alias can be used in this message
area.
2/ALIAS - ask for alias - This enables the user to be
prompted to use another alias as long as it is not used by
another user on the bbs.
3/REAL NAMES ONLY - Only real names can be used in this
area. This is particularly used for Fidonet echomail
conferences.
4/ASK FOR ALIAS - This gives the user the option to write
a message in the area using an alias. The alias selected
however can not be used if it already exists on the bbs.
Page 51.
Areafix Group
-------------
This function allows the sysop to define which group
the Echomail conference belongs to. The valid range is A
through Z. You should categorize your Echomail areas.
Example: You could use 'F' for all your Fidonet areas and
S for all your Signet areas.
This function is used in conjunction with Echo area
manager (Described later).
Read Security
-------------
This is the minimum security level required by the user
to read mail in this area.
Security levels can be set from 0-64000.
Eg. If the read security is set to 100 then only users
with security 100 and above can read the messages in that
area. If however you wish all users to have access to read
mail then set security to 0.
Read Flags
----------
These are the flags required to read mail in the area.
There are 32 flags available from A1-D8. These flags work
in conjunction with the read security level.
Eg. If you have set the Read Security level to 100 and A1
flag is turned on then only users with security level of 100
and above PLUS the A1 flag can read the messages. To set a
flag ON place the cursor over the flag you wish to set and
press X.
Write Security
--------------
This is the minimum security level required by the user
to write mail in the area. Security levels can be set from
0 - 64000.
Eg. If the right security is set to 200 then only users
with security level 200 and above can write in this area.
If however you want all users to be able to write in this
area then set the security level to 0.
Write Flags
-----------
These flags work the same as the Read Flags except work
in conjunction with the write security.
Page 52.
Sysop Security
--------------
This is the security level required to carry out sysop
functions on the message area. This enables the sysop to
read all messages in the area even if they are private,
delete mail, edit users forward messages, export messages to
disk or printer and also edit the message header.
Uplink
------
This is used with Echomail, Netmail and WaitThru areas.
It is where you put the network address of the system you
are collecting your conferences from. (Usually your HUB or
HOST).
Origin Aka
----------
This specifies which address should be placed on the
origin line of an Echomail conference. If you choose to use
an alias press Return and a window will open presenting you
with a list of addresses you defined under "GENERAL
ADDRESS". This is particularly used if you are a member of
more than one Network.
Origin Line
-----------
Defines the origin line placed at the bottom of
Echomail messages which originate from your BBS. It can be
up to 50 characters long, and should contain at least the
name, location and phone number of your system. You can
optionally place a *N in the origin line, to indicate the
node number.
Eg. Ezycom Support Melbourne 613-xxx-xxxx. If you do not
define an origin line here then the default origin line
specified in Messages Misc will be used.
Seenby
------
This is a list of your current Seenbys, as defined
using F8. For a detailed explanation of Seenbys, see "(F8)
SEENBYS" further on in this chapter.
Kill Messages After
-------------------
This field is used by Msgcomp and determines how long a
message resides in the message area before being deleted.
Eg. If you set the field to " 7days " then all mail
older than 07 days will be removed. If the field is set to
ZERO then the age of the messages will be ignored.
Page 53.
Kill Recv After
---------------
This works the same as "Kill Messages After" except
that Msgcomp wont delete the messages until the specified
number of days after the message has been read (received).
If the field is set to ZERO then the age after the messages
have been read will be ignored.
Maximum Messages
----------------
This is the maximum numbers of messages that can be
posted in the area.
Eg. If you set Max Messages for 100 then Msgcomp wont
start deleting messages till 100 messages have been reached
and then will maintain the area at 100. When the number of
msgs exceeds this limit and you invoke Msgcomp, old messages
get removed till your max messages is equal to the number
you specified.
Maximum Kilobytes
-----------------
This is the same as Max Msgs except instead of
determining how many individual messages an area can hold,
it is determined by how big the message area is in
kilobytes. This is especially useful for those sysops who
have limited disk space.
Combined Access
---------------
This option determines whether the user is allowed to
have Combined Access to the Message Area. Combined Access,
is whether they can do a Mail Check and/or Globally Read New
messages for that conference. Normally this would be set to
yes, but under some circumstances a NO might be required.
The user also has the ability to turn Combined Areas Off,
but if this option is set OFF, they can NEVER turn it on.
Use Initial Combined if you want them to have it OFF to
start with, but be able to turn it ON.
Initial Combined
----------------
This option if selected will determine if a new user
will initially have combined access to that message area.
Test For Config Age
-------------------
This makes Ezycom test the users age, before allowing
them to access that conference. It stops them READING and
WRITING to the conference. The AGE is defined in CONFIG-
>MISC->SYSTEM.
Page 54.
Keep Private Bit
----------------
This allows you to keep the private bit set on Netmail
messages and enables only the person who the message is
addressed to, to read it. If you set the option to NO then
the private bit will be removed and the message will become
PUBLIC.
Show Seenby Lines
-----------------
This is for the sysop and if you decide to set the
option to "YES" then when the sysop presses ! from the
message reader he can see the path the message has taken.
Clear Seenby
------------
This gives you the option to remove seenbys on the
echomail you are forwarding through your system. Only the
systems you echo with directly are left in the SeenBy
information. This option is normally only used by
Zonegates.
Visible
-------
This determines whether or not a conference should
appear in a system area listing when an authorized system
requests a list of available conferences, but does not have
access to the group. If the visible option is set to "NO"
then the conference will not appear in the list.
Page Up/Down
------------
By pressing PAGE UP / DOWN you can scroll through each
message area in numerical order.
(F8) Seenbys
-------------
Seenby lines contain useful information for
Echomail/Passthru/Waitthru software. Seenbys are a list of
systems that have already seen /forwarded the message. By
pressing F8 you will be presented with a list of your
network addresses you defined under General Addresses. Use
up/dn arrow key to highlight the address you wish to use and
then press enter.
The address you pick should be relevant to the conference
you are forwarding. Note : At least one seenby should be
defined in each
Echomail/Passthru/Waitthru area.
Page 55.
(F10) Export List
-----------------
To access the export list press F10. You will be
presented with a list of addresses you defined in NODE
Manager. Use your arrow keys to highlight the address you
wish to forward mail onto and press Enter. A small square
will the be presented next to that address.
Pick
----
By pushing (P) a window will be displayed presenting
you with all message areas. Use your UP/DN arrow keys or
Page UP/DL keys till you highlight the area you wish to
edit. Press Enter on the area to accept it.
Echoarea Manager
----------------
Node
----
Defines a network address for your export list. Eg
3:636/200 You can have up to 128 nodes.
Node (Rec 1) : 3:636/200
EchoMail Active : Yes
Echo Manager Groups : AB
Compress to : ARJ
Password to EchoMgr : XXXX
Password from EchoMgr : XXXX
Mail Status : Normal Mail
Days to Hold Mail : 30
Send .PKT Type : Type 2+
Can Create New Echos : Yes
Add to New Echos : Yes
Echomail Active
---------------
Toggled between YES/NO by the return key to determine
if the system is active or not. This can be useful if you
know one of your NODES is going away on holiday for a few
weeks and wont be able to pick mail up. Simply set the
field to NO and no mail will be forwarded to that NODE until
you reset it to YES. Generally, this option would be set to
YES.
Echo Manager Groups
-------------------
This specifies which groups a system has access to.
Valid range is A through Z. If you have given a system
access to GROUP "F" then that system can access all the
conferences that you have designated "F" in field Areafix
Group in the message areas.
Page 56.
Compress To
-----------
This allows you to select which compression method you
wish to pack your mail packets with. You have a choice of 7
archivers and they can be toggled by pressing the return key
till you reach your selected choice.
Password To Echomgr
-------------------
This is the password that is used when you are
requesting conferences from this node. This password would
generally be the same password as Password From Echomgr.
Password From Echomgr
----------------------
This is the password your downlinks use when requesting
areas off you.
Mail Status
-----------
This specifies the status of the mail for this system.
You can toggle 3 choices of mail by pressing RETURN.
1/NORMAL MAIL - If mail is flagged as normal it will not
be transmitted till a scheduled mail event or the system who
the mail is address to calls you to pick up mail.
2/CRASH - Mail flagged as Crash is allowed to be sent any
time of the day. However Crash mail does require the
destination system to be qualified.
3/HOLD MAIL - When mail is flagged as hold, it will not
be sent until the destination system polls your system to
pick their mail up.
Days To Hold Mail
-----------------
This determines how long you hold mail for a system
before it is deleted. For instance, if a node does not pick
up mail after 7 days, Ezymail could delete it for you.
Send .PKT Type
--------------
Currently in FidoNet there are two standards at which
EchoMail can be packed as. They are both compatible, but
Type 2+ is 4D, that is, it has Zone, Net, Node and Point,
whereas Type 2 only has Net and Node information. Ezycom
does not handle the fakenet approach, as we do not believe
in kludging things to make them work. Most echomail
processors are now going to the new Type 2+ format.
Page 57.
Can Create New Echos
--------------------
If this option is enabled, then any conference that is
sent to you by this node, can be automatically added to your
message areas, whereas if it is not, then this node can not
create a new conference on your system. This might be
enabled for your Host.
Add to New Echos
----------------
If this option is enabled, then if a new conference is
made in one of the groups this node has access to, then this
node is automatically added to the conference. This might
be enabled for your Downlinks (Hubs/Nodes/Points) for
instance.
Page Up/Down
------------
By pressing Page UP / Down you can scroll through each
Area Manager area in numerical order.
Pick
----
By pressing (P) a window will open presenting you with
a list of all Nodes. Use your UP/DN arrow keys or Page
up/down keys till you highlight the Node you wish to edit.
Press enter on the Node to except it.
Page 58.
Message Misc
------------
Usable Message Areas
--------------------
Usable Msg Areas : 32 of 500
Inbound Mail Path : D:\DB\FILES\
Outbound Mail Path : D:\EZY\OUTFILES\
ARCmail 0.6 Compat : No
Delete Net on Import : Yes
EchoMail Routing : Direct
Swap Out EzyMail : EMS/XMS
Dupe Detection : Yes
Keep EchoArea Recpt : No
Bad Message Board : 32
Unknown Area Action : EchoMail*
Kill Bad Archive(s) : Yes
Quote String : @>
External Editor : EZYEDIT.EXE -N*N
Old Style MSGTMP : No
Default Origin Line : EzyCom Registration's 61-3-546-3038
Mark Netmail as Kill/Sent : Ask
Kill Null Netmail : Yes
You can have a total of 500 messages areas, 400 normal
plus 100 passthru. It is however unlikely that most people
would have this many areas. So for efficiency reasons, you
can put the actual number of message areas you have.
Eg. If you use only 32 message areas, you can select 32.
This will speed up some operations in Ezycom dramatically.
Note: You can only define the number of message areas in
jumps of 16, and the minimum is 32. Also, when you do
change the number of message areas, it effects the size
required by the LastRead Pointers. So, you MUST delete
LASTCOMB.BBS, which resides in your userbase directory. If,
you are using more than one configuration, then EVERY
configuration MUST have the same number of message areas.
(Assuming you share the message and userbase).
Inbound Mail Path
-----------------
Path where your incoming mail packets are delivered.
Eg. C:\EZY\INFILES\
Page 59.
Outbound Mail Path
------------------
Path where your outgoing mail packets reside till they
are picked up. This path, must be ONLY used by EzyMail. If
any other files are found in this directory, EzyMail will
remove them. This is done to help keep the area 'Clean' of
files.
Eg. C:\FD\OUTFILES\
Arc Mail 0.6 Compatibility
--------------------------
By pressing Return you toggle YES/NO to ARCmail 0.6
compatibility. Ezycom uses its own naming convention for
the mail bundles. Turning this to on, forces Ezycom to use
the ArcMail method.
Delete Netmail On Import
------------------------
Normally when a netmail message is imported to the
Ezycom message base, it is deleted in the netmail path, this
option stops Ezycom from doing that.
Swap On Archiving
-----------------
If enabled EzyMail will swap out all except for 20k of
its memory to either EMS or disk.
Use EMS With Swap
-----------------
If enabled EzyMail will swap out to EMS memory. If
however you have insufficient EMS, then it will swap to
disk.
Dupe Detection
--------------
If enabled, EzyMail will do Dupe Detection on Inbound
Echomail with MSGID kludge lines.
Keep Echomail Node Receipts
---------------------------
If you require to keep EchoArea requests from other
systems requesting conferences to be turned on or off, or a
list of available conferences your system carries then
enable this function.
Page 60.
Bad Message Board
-----------------
Defines the message area you wish to use to inform you
of bad conferences you have received. This works in
conjunction with Unknown Areas Action. If you have selected
Kill in Unknown Areas then a message will be posted in the
bad message area telling you that an unselected conference
was sent to your system.
Unknown AREAS Action
--------------------
There are 3 options to select from:
1/ECHOMAIL (Registered Version Only).
If you select "ECHOMAIL" then any new undefined "Conference
Tags" that are detected by your system will automatically be
added to the message area. This works in conjunction with
Message Security options. Also if you have "New Echo Area
Notify Board defined, a message will be left in that area
informing you of the new conferences added.
2/PASSTHRU - If this option is selected then any new
undefined "Conference Tags" that are detected by your system
will be automatically added as passthru conferences in the
message area.
3/KILL - If this option is selected then any new
Undefined "Conference Tags" that are detected by your system
will be deleted, and not added to your message area. If you
have "Bad Message Board" defined then a message will be
posted in that area informing you of the Bad conferences.
Kill Bad Archives
-----------------
Lets you select if you wish to delete incomplete or
corrupted mail packet archives.
Quote String
------------
This is the string used when you quote a message using
a full screen message editor. An example is @> the @ will
insert the users initials and the > just acts as a prompt
but this is sysop definable.
External Editor
---------------
This is the DOS command line that will be used to call
up a full screen external message editor. All control codes
used in a type 7 menu are supported. For example *P for
command port, *B for baud rate and *T for time.
Page 61.
Old Style MSGTMP
----------------
This option allows the System Operator to configure,
which style of External Full Screen Editor Format should
Ezycom support. Currently, two formats exist, the MSGTMP
format, and the MSGTMP.<node> format. The MSGTMP format is
the most common, and this is used by QUICKED and TOPED full
screen editors, whereas the other format is only used by
EzyEdit (by Brad Vonarx). The first two editors place a
very big restriction on Ezycom, in that for every node used,
there must be a seperate directory for each node, containing
that editor inside the path, whereas EzyEdit interfaces
better with Ezycom, allowing all nodes to run in the one
directory if so desired. More information about Full Screen
Editors and multitasking can be found in the "Multiline"
part of the document.
Default Origin Line
-------------------
Used to define your default origin line. Each Echomail
area can be set with different Origin lines to be attached
to the end of messages that are posted in each area.
However if you choose not to put individual Origin lines in
each area then the Origin line defined here will be used.
Remember to at least put your system Name, location and
phone number in the Origin line. You can also optionally
add a *N to indicate which node the message was written on.
Eg. Ezycom Beta site1 MELBOURNE 61-3-XXX-XXXX
Kill Null Netmail
-----------------
If this option is set, then any packed netmail messages
sent to EzyMail and your system (not passing through), will
be purged if there is no text within the message.
Mark Netmail As Kill / Sent
---------------------------
Allows you to set the Status Bit to Kill/Sent by
default on created Netmail messages from your system. What
this means is that once the Netmail message has been sent it
will then be deleted. Hit Return to toggle between YES / NO
/ ASK.
Page 62.
Message Security Option
-----------------------
Force Crash Mail Security
-------------------------
Force Crash Mail Security : 64000
Optional Crash Mail Security : 1000
Netmail File Attach Security : 1000
Netmail File Request Security : 1000
Security to Update Users : 1000
Read Sec on New EchoMail Area : 1000
Write Sec on New EchoMail Area : 1000
Sysop Sec on New EchoMail Area : 1000
Reply Via Netmail Security : 1000
Request Receipt Security : 1000
Force Crash Mail Security. This is the minimum
security level required to send Crash Netmail messages.
Optional Crash Mail Security
----------------------------
This is the minimum security level required for a user
to be prompted if he wishes to send a Crash Netmail message.
If he selects no then the message will be sent in a normal
mail session.
Netmail File Attach Security
----------------------------
This is the minimum security level to allow users to
attach a file to a Netmail message.
Security To Update Users
------------------------
This is the minimum security level to allow (usually
the sysop) to upgrade users from the message reader by
pressing "U" or from the user listing by selecting "Edit".
In either case you can edit the users security level and
flags.
Read Security On New Echomail Area
----------------------------------
This is the minimum Security level set to "Read"
Echomail in newly created Echomail Areas if you have
selected "ECHOMAIL" in Unknown Areas Action under Messages
MISC.
Write Security On New Echomail Area
-----------------------------------
This is the minimum Security level set to "Write"
Echomail in newly created Echomail Areas if you have
selected "ECHOMAIL" in Unknown Areas Action under Message
MISC.
Page 63.
Sysop Security On New Echomail Area
-----------------------------------
This is the sysop Security level set in newly created
Echomail Areas if you have selected "ECHOMAIL" in Unknown
Areas Action under Message MISC.
Reply Via Netmail Security
--------------------------
This sets the security level for replying to a message
using NetMail. For this to work fully a few things have to
be right. First the user has to have the security level
needed to access this feature, second the user MUST have
access to the WRITE netmail access for the area that the
message belongs to Eg Fido. And finely the message being
replyed to MUST have a MSGID. Note Only NEW messages tossed
to your system will have the correct return address for the
reply. After you have set up EZYCOM V1.01 set this to the
sysop for a week to make sure that only new messages are
able to be replied to.
Request Receipt Security
------------------------
This sets the security level needed to ask for a
receipt on the message you post ONLY in local mail. If you
have this security level you will be asked if you require a
receipt, if you ask for one, ezycom will send you a message
that the user has recived the message that you set the
receipt on. You MUST have a file called RETRECPT.ASL in
your text file path. A sample of retrecpt.asl in in the
setup.dat file that comes with Ezycom. This file handels
all the smart text codes except the change current colour
ones.
Netmail Boards
--------------
3:636/204 : 4
80:1000/6 : 4
0:0/0 : 1
0:0/0 : 1
0:0/0 : 1
This allows you to define which message area Netmail
messages will be imported to for each Network address.
Domains
-------
3:636/204 : fidonet.org
Page 64.
80:1000/6 : ezynet.org
0:0/0 : [UnUsed]
0:0/0 : [UnUsed]
0:0/0 : [UnUsed]
Allows you to define each Network address against a
NETWORK.
For example: If your Fidonet Network addresses is 3:636/200
you would place "fidonet.org" as the domain.
Page 65.
Compression
-----------
This is where you define the compression line
parameters for your Archives.
-----------------------------------
ZIP : PKZIP.EXE -ao
LHA : LHA.EXE a-tm
ARJ : ARJ.EXE a-ey
ARC : PKARC.COM -oct -a
PAK : PAK.EXE A /O /WA /L
ZOO : ZOO.EXE a:
LHARC : LHA a -otm
-----------------------------------
Ezycom is already set up to handle 7 different
archives, so usually you can just leave the above parameters
as default.
Uncompress
----------
This is where you define the decompression command line
parameters for your Archive utilities.
Eg.
------------------------------
ZIP : PKUNZIP.EXE -o
LHA : LHA.EXE e /cnm
ARJ : ARJ.EXE e -y
ARC : PKXARC.COM -r
PAK : PAK.EXE e /wa
ZOO : ZOO.EXE -e
-------------------------------
Ezycom is already set up to handle 6 different archives
so usually you can just leave these parameters as default.
Page 66.
Global Message Options
----------------------
The options listed below give the sysop great
versatility plus the added advantage of saving time by
allowing you to set values for all message areas at once
instead of editing each individual area. By selecting any
one of the below fields will set all defined message areas
for that option to the same value. I will now discuss each
option individually.
Set Default Security
Set Default Flags
Centre Message Area Name
Set Maximum Kilobytes
Set Maximum Messages
Kill Messages After XX Days Old
Kill Recv Messages After XX Days
Add/Rem Node to/from Area Groups
Add/Rem Net Address to/from Area Groups
Set Default Security
--------------------
By pressing RETURN on this option you will be presented
with another small window -
------------------------------
(R)ead (W)rite
(S)ysop (Q)UIT
------------------------------
By selecting "R" you will be able to change the read
security on All message areas if you wish to have them set
at the same security level.
By selecting "W" you will be able to change the write
security on All message areas if you wish to have them set
at the same security level.
By selecting "S" you will be able to change the Sysop
security on All message areas if you wish to have them set
at the same security level.
By selecting "Q" - it will take you back to Global
Message Menu.
Page 67.
Set Default Flags
-----------------
Works the same as Default Security but changes the
"READ", "WRITE" or Sysop flags for all message areas to the
same flag settings.
Centre Message Area Name
------------------------
This centres the Message Area Names on all message
areas. To activate this function just press RETURN on this
option and all message area names will be centred.
Set Maximum Kilobytes
---------------------
By pressing RETURN on this option another window will
open. Just type the value you wish to set Maximum kilobytes
to and then press RETURN.
Set Maximum Messages
--------------------
By pressing RETURN on this option another window will
open. Just type the value you wish to set Max Messages to
and then press RETURN. All message areas will then be set
to this value.
Kill Messages After XX Days Old
-------------------------------
By pressing RETURN on this option another window will
open. Just type the value you wish to set KILL MESSAGES
AFTER XX days old to then press RETURN. All message areas
will then be set to this value.
Kill Received Messages After XX Days
------------------------------------
By pressing RETURN on this option another window will
open. Just type the value you wish to set the KILL RECEIVED
MESSAGES AFTER XX DAYS to then press return. All message
areas will then be set to this value.
Add/Rem Node from area list.
---------------------------
This allows you to add or remove a Node in your export
list from / or to a Group of conferences. When you hit
RETURN another window will open prompting you if you want to
add or remove. Select what option you require. You will
then prompted for the Node number, and then which groups.
For example if you wish to remove a Node from receiving
group "F" Echomail conferences you would
1)SELECT REMOVE
2)TYPE the Node number in Eg. 3:636/200
3)Type the group(s) - in our example "F"
4)THEN PRESS RETURN
This will then remove Node (3:636/200) from all group "F"
conferences.
Page 68.
Add/Rem Node from area list.
---------------------------
This option is basically the same as the previous one,
except that it works on your seenbys rather than your export
list.
Page 69.
Modem Set-Up
-----------
Comport
-------
Specify which "COM PORT" your modem is connected to.
Eg. 1 for COM1, or 2 for COM2.
Max Baud Rate
-------------
Select the maximum baud rate your modem supports. To
select a baud rate press RETURN till your baud rate appears.
This is the speed your modem will be initialized at. Valid
bauds rates are 300, 1200, 2400, 4800, 9600, 19200, 38400.
Locked Port
-----------
Usually "NO" for most low speed modems (2400 or lower),
but with high speed modems it is usually YES.
Connect Responses
-----------------
This option selects if your modem sends "Connect
Commands" or not. If, this is set to NO, then Ezycom always
logs the user on at Maximum Baud Rate. Usually this would
be set to "YES". For example Connect 2400.
Init Response
-------------
The response sent back by the modem after a command has
been issued. Usually set this to "OK".
Ring String
-----------
This field allows you to define the "RING RESPONSE"
from your modem when a ring signal has been detected from an
incoming call. Usually set this to RING.
Modem Delay
-----------
Many modems cannot accept command strings at full
speed. Because of this an inter-character delay in tenths
of a
second is needed. For high speed modems this can be between
1 or 2 but for most modems set it to a value between 4 and
8.
Page 70.
Auto Answer
-----------
This determines if Ezycom should answer the phone or
the modem. If you select YES then EZYCOM will send the
manual answer string to the modem to make it answer. Make
sure ATS0 = 0 is in your INIT string for this option. If
you select NO then the modem will answer the call. Make
sure you have ATS0=1 in your init string for this option.
However the recommend setting is NO as it proves EZYCOM is
up and running.
Start Time
----------
This allows you to define the start time for EZYCOM to
answer the modem. Make sure Auto Answer is set to NO. This
is useful if you are only running a part time bbs.
End Time
--------
This defines when EZYCOM will cease to answer the
modem.
Init Tries
----------
Specifies how many times EZYCOM will send the
initialization string to the modem. Usually you set this
between 5 and 10.
Init String 1
-------------
Type your modem initialization string in here. These
are the commands which are sent to the modems to intialize
it and prepare it to answer calls.
Init String 2
-------------
Used if you wont to send more than one initialization
string to your modem.
Set Busy String
---------------
Used to make your modem in the busy state. (Offhook)
Usually set this to ATH1|
Manual Answer String
--------------------
If you selected "NO" to auto answer, then this is the
string that is sent to your modem to force it to answer the
call. The default is ATA|
Page 71.
Send Break To Modem
-------------------
This option tells Ezycom to Send a Break to your Modem
when clearing the Fossil Buffer. This is mainly for use
with High Speed modems with Internal Buffers (such as the US
Robotics Courier HST). If you are not sure whether to place
this option On or Off, leave it Off.
Page 72.
Baud Rate Set-Up
----------------
Baud Rate
---------
Define the baud rates your modem supports in a separate
window. For example if you have 2400 baud modem and it
supports 300,1200 and 2400 use the PAGEUP/PAGEDOWN keys, and
place a single baud rate in each window. If, you are using
a modem that does NOT support LOCKED baud rates, then only
300, 1200, 1275, 2400, 4800, 9600, 19200 and 38400 baud
rates are supported, however, if you lock your modem at a
particular baud rate, then you can select/make baud rates of
any amount.
Efficiency (CPS)
----------------
Usually worked out on 10 % of the modem baud rate.
For example: 300 baud would be 30
1200 baud would be 120
1275 baud would be 120
2400 baud would be 240
9600 baud would be 1920
38400 baud would be 3840
However for HST modems this is not quite true as a HST
can do 1600(cps) or greater for 14400 baud. For HST users
the best setting would be about 1650(cps). This efficiency
setting is used to work out download times.
Connect
-------
These are the connect strings that the modem passes to
EZYCOM for a particular baud rate.
For example: CONNECT 2400 CONNECT 9600
Make sure you end the CONNECT for 300 baud with a pipe '|'
or else all CONNECTS will be 300 baud.
Page 73.
Networking with Ezycom
----------------------
A mail network is basically a set of bulletin board
systems that are capable of exchanging messages and files
with each other without the Sysop's needing to intervene.
Of these mail networks FidoNet is the world's largest, this
is an amateur mail network which has approximately 10,000
bulletin board systems. Each of these is assigned a unique
address. All networks have this type of address setup to
keep all the different bulletin boards separate across the
network. A file called a nodelist stores all these
addresses along with other information about each system.
Being part of such a network will give you access to
NetMail and EchoMail. NetMail allows you to send a private
message to any user of any one of the bulletins boards in
the network. EchoMail also allows you post messages to many
bulletin board systems in your mail network, but this method
is different to NetMail, in that the messages are usually
public, and are organised into either general discussion
areas, or areas that deal with specific issues and or
topics.
The FidoNet network is organised into several levels,
which are usually based on geographical proximity. At the
highest level there are six ZONES; zone 1 is the USA, zone
2 is Europe, zone 3 is the Pacific Rim, zone 4 is South
America, zone 5 is Africa and zone 6 is Asia. Within each
zone are a number of REGIONS that span large geographical
areas. Typically there will be between 5 and 18 regions per
zone. Each region is further divided into NETS. Each net
has a unique net number, and the distribution of these nets
is also based on geographical and technical considerations.
Finally, within the net are a number of NODES. A node
refers to a single bulletin board system.
To find out about obtaining a node number, or an
ADDRESS, contact the nearest FidoNet bulletin board. The
sysop will usually be more than happy to help you out.
The only piece of software that you will need to
connect your Ezycom software to such a network is a frontend
mailer. This is will answer the telephone for you and if
it's a mail call, it will send the mail you have waiting and
receive the mail from the system that has called. In most
cases you will have to place the call to your host to pickup
your mail, this is called POLLING for mail. When you
receive your mail you use Ezymail to toss the mail into the
message base. The most common mailers are D'Brigde and
Frontdoor. Note Ezymail will NOT work with BinkleyTerm at
the moment. D'Bridge is a commercial mail package whereas
FrontDoor is freely available for use. Frontdoor is
available off most bulletin boards, if you check with the
sysop of one of these bulletin boards they might give you
Page 74.
the access to get them.
The node number you will be assigned should be of the
format Zone:Net/Node.Point. This initial node number should
be put into your configuration file.
Eg 3:636/213.0 Which means you are in Zone 3 in 636 Net and
are Node 213 the .0 is there incase you are a point off a
boss. This is more fully explained in the mailer's
documents and out of the scope of this document.
Each EchoMail message that is posted on your system
could potentially be read by hundreds of other sysops and
users, with this in mind please abide by the rules of your
respective networks. EzyCom allows you to be a member of
many networks like FidoNet, SigNet, MysticNet the list is
endless all you have to do is place their address's they
send you in your AKA address section of the config file.
Conferences, these are the message areas that you can
receive from the networks you are connected to. To add a
conference to ezycom all you have to do is enter the
conference tag into the message base configuration and make
sure you set up the seenby's, export list (other BBS's that
might get this message conference off you), and so on.
For further assistance you can contact your proposed
host or ezycom support for help, as this is beyond the scope
of this document.
Page 75.
Sysop Function Keys
-------------------
The following function keys are only available when a user
in online.
(F1-F6)
Toggling between these keys displays complete user
information on the status bar at the bottom of the screen.
(F7)
Pressing this key makes the system available for the sysop
when the user logs off.
(F8-F9)
Provides help on the ALT and 'F'unction keys.
(F10)
Turns the status bar on the bottom of the screen off. Press
any of the other 'F'unction keys to turn it back on.
(ALT-S)
Allows you to change the online users security level.
(ALT-C)
Brings online users into chat allowing you to "talk" to the
user via the keyboard. Press escape to end the chat mode.
The standard Alt-C brings up the full screen chat. To bring
up the line chat, press SHIFT at the same time as pressing
ALT-C.
(ALT-M)
This is very useful feature when you log on locally. It
allows you to completely edit (page 1) of the users record
when you read mail from that user.
(ALT-J)
Performs a shell to DOS while the user is on line.
(ALT-E)
Allows modification of Page 1 of the user on-line.
(ALT-P)
Toggles whether the user activity should be sent to the
printer.
(ALT-D)
Toggles local screen on/off to see what the user is doing.
(ALT-G)
Sends an ASCII bell character (character 0x07) to the user
online to gain their attention.
Page 76.
(ALT-H)
Disconnects the user immediately.
(ALT-N)
Displays fake line noise to the user and local screens.
(ALT-L)
Drops the user's security level to zero (0) thereby locking
them out of the system permanently, then logs them off.
(ALT-I)
Send inactivity timeout message to the user, and then log
him/her off.
(ALT-U)
Allows you to make up a message to send to the user, and
then it will hang them up immediately.
(ALT-X)
Allows the sysop to edit certain system parameters for the
current session. The statistics that can be edited are Next
Sysop, Minimum Disk Free Space, Swap on Jump to DOS,
Swapping Type, Number of Pages, Page Sound, User Ratios and
Download Limit. Note that Type 15 Exits will reset some of
these options.
(UP ARROW)
Increases the user time by one minute.
(SHIFT-UP ARROW)
Increases user time by ten minutes.
(DOWN ARROW)
Decreases the user time by one minute.
(SHIFT-DOWN ARROW)
Decreases user time by ten minutes.
Page 77.
Ezycom Command Line Parameters
------------------------------
The following is a list of command line parameters supported
by Ezycom:
-Px = Com port selected (1-8).
-L = Local logon.
-BXXXX = Log users on at baud rate xxxxx (300-38400).
-EXXX = Exit after caller logs off at error level xxx
(20-255).
-S = Set display to off. (no local screen)
-D = Disable status bar at the bottom of the screen.
-T = Time (in minutes) till next system event.
-R = Re-logon user after Type 15 exit.
-NXXX = Node number if running Multi line.(1-250)
This can also be used with the -R parameter when
relogging a user back on a Multi line system.
EG. -R -N2
Page 78.
Errorlevels
-----------
When Ezycom exits after a user logs off or due to a type 15
menu exit it returns an errorlevel that the batch file you
ran Ezycom from should trap and act upon.
The errorlevels Ezycom produces are:-
0 = Normal exit
1 = Set-up error
2 = Software error
3 = Fossil error
4 = Modem Init Error
5 = Echomail Entered
6 = Netmail Entered
7 = Echomail and Netmail Entered
8 = NextSysop
9-19 = Reserved.
Page 79.
Ezycom External Support Files
-----------------------------
Trashcan.ctl (Optional)
----------------------
This file contains a list of names specified by you as
unacceptable to be used. Place one name per line. The
standard check that Ezycom makes is look for the Text you
specify in the users name. ie "Sysop" would not be allowed
in a user who logged on as "Fred Sysop" or "Sysop". Whereas
if you placed a "*" in front of Sysop, for example "*Sysop"
then "Fred Sysop" would be allowed to logon, but "Sysop"
would not be allowed to logon.
Eg. If you wish the following names not to be used "sysop"
"all" then place each name in TRASHCAN.CTL as below:
SYSOP
IDIOT
*ALL
Therefore if a user tries to logon using "SYSOP" or "IDIOT"
as a first or last name they will be unable to.
NOTE: If you are allowing aliases on your system be careful
they don't use a single name like "John". If this user was
to be put in the TRASHCAN.CTL file then any user whose name
contained "John" as a first or last name would not be able
to logon the system. If, you do want to stop the single
word names, MAKE sure you place a "*" in front of the name
to stop this from happening.
Phonenum.ctl (Optional)
-----------------------
This file contains phone numbers or partial phone
numbers you know to be false or unacceptable. Place the
phone numbers one per line.
Example: If Phonenum.Ctl contained,
12-
-123-
Then no user could logon with a phone number that contained
12-xxx-xxxx or xx-123-xxxx.
Regexp.q-a (Optional)
---------------------
Runs a questionnaire defined by you when the users
registration has run out.
This is only used if you have enabled regodays in config
under "General->Limits".
See Script Files for help on REGEXP.Q-A.
Page 80.
Newuser.q-a (Optional)
----------------------
Allows you to define a new user questionnaire.
(Consult questionnaire section for more details).
Newuser2.q-a (Optional)
-----------------------
Allows you to define a new user questionnaire, but the
user record has already been written to the user records at
this point, so MENUCMNDs are valid.
Phonedup.ctl (Optional)
-----------------------
If a user logs on using a phone number the same as
another user, then you are notified in this file of the
occurrence.
Eg. John Doe logged on using same phone number as Jane Doe.
Ans/Asc/Asl/Avt Files
---------------------
Listed below are the ANS and ASCII support files which
you can define. All files must reside either in the
AVT/ANS/ASC/ASL directory.
*** Means a default prompt will be displayed if the text
file is not present.
ALIAS.A* This file is displayed before the user
enters their alias.
AREAHELP.ASL This file is displayed when an EchoArea
help message is processed.
DOBSEC.A* This is displayed before the user is asked
for their date of birth for logon security verification.
DOWNHELP.A* This file is displayed when the user
selects "Help" from the download command.
EDITHELP.A* This file is displayed when the user
selects help inside the line editor.
FLSPHELP.A* This file is displayed when the user
selects "Help" from the filespec search command.
Page 81.
FILEXXX.ASC These files can be implempted if you
require Ezycom to display a comment file before displaying
the files listed in the file area that the user is about to
look at. The XXX is the file area number and this file is
placed in the same path as the file base information is
stored. So if you want a comment file for file area 10 you
would have a file called FILE010.ASC placed in the path
C:\EZY\FILEBASE\AREA1\FILE010.ASC
KEYWHELP.A* This file is displayed when the user
selects "Help" from the keyword search command.
*** LOCKOUT.A* This message is displayed when you either
lockout a user, or a user who has been locked out logs on.
LOGO.A* This file is displayed just before the
system asks the user for their name and password.
*** MAXPAGE.A* This file is displayed if the user exceeds
the maximum number of pages specified in config.
*** MNUAGE.A* This file is displayed to inform a user
that he/she has to be a certain age before they can use the
menu option.
*** MNUHOUR.A* This file is displayed to inform a user
they are trying to use a menu option outside the menu time.
*** MNUTIME.A* This file is displayed to inform a user
that he/she has to be online for a certain time before they
can use a menu option.
MNUMESS.A* This file is displayed to a user if their
post call ratio is bad.
NEWS.A* This file is displayed after Newuser 2 or
welcome files and check for waiting mail.
NEWUSER1.A* This file is displayed to a new user when
they confirm that they have entered their name correctly.
NEWUSER2.A* This file is displayed before the
Newuser.Q-A, but after the system questionnaire specified in
config.
*** NOTAVAIL.A* This file is displayed when a user pages
outside the paging hours defined in Config.
*** PAGEABRT.A* This file is displayed if the sysop aborts
the page.
Page 82.
*** PAGED.A* This file is displayed after the user has
paged the sysop but before the sysop answers. This could be
something like your chat has been noted, the sysop will
break in when available.
*** PAGESTOP.A* This file is displayed if the sysop aborts
the current page and stops all further paging.
PASSWORD.A* This file is displayed before a user is
asked to enter their system password.
PHONESEC.A* This is displayed before the user is asked
for their phone number for verification.
*** PRIVATE.A* This is displayed to newusers if the
newuser security level is 0. It would advise them that the
system is a PRIVATE system.
PROTHELP.A* This file is displayed when the user
presses (?) at the list of selectable upload and download
protocols.
*** REGWARN1.A* Last warning before registration runs out.
*** REGWARN2.A* First warning before registration runs
out.
READHELP.A* This file is displayed when the user
selects help just after selecting to Read a message area.
SECXXXXX.A* This file is displayed when a user logs on
with XXXXX security. That is, if a user logged on with
security 10, then SEC10.A* would be displayed to him/her.
*** TIMESLOW.A* When a user logs on in the slow baud rate
speeds, but is out of hours, this message is displayed.
*** TIMESEC.A* This is displayed when the user logs on
below the minimum logon security, and has not logged on
between the low security start and end times.
UPHELP.A* This file is displayed when the user
selects "Help" from the upload command.
WATCHDOG.ASL This file is sent in a message to a user
who has had a previous unsuccessful logon. Typically this
message would say something along the lines of "someone has
tried to logon onto your account and failed. Please change
your password.".
WELCOME.A* This file is displayed after the user logs
on. You can use this file to show the user a colourful
display about your BBS.
Page 83.
WELCOME1.A* This file is displayed after the
Welcome.A*. This can be used to tell the user more about
your system.
WELCOME2.A* This file is displayed after Welcome1.A*.
WELCOMHH.A* This file is displayed between 00:00 and
23:00. You can have an individual WELCOME ANSI or ASCII
displayed every hour.
Eg: Welcom11.A* would be displayed between 1pm and midday.
Page 84.
File Points
-----------
File Points is a file management system that doesn't
incur the problems associated with the normal File/Kilobyte
Ratio Systems. The unique facility of file points, is that
when user(s) download the file, the uploader is given credit
for the download. So, if user(s) upload old/boring files
that will not be popular, then they will not receive many/no
(depending on configuration) filepoints for the upload.
This system encourages user(s) to upload decent files, as
the more times their files downloaded, the more points they
get, therefore the more downloads they can make. File
Points can be configured in the "Files Misc" part of the
"File Areas" of the config. The options to alter are
"FPs credited for Download", "Time of Upload FPs given" and
"1 File Point is worth XXk". See the documentation on these
options for configuring them. (Registered Versions of
Ezycom)
Page Tunes
----------
Ezycom also has the ability to play page tunes while
the user is paging the sysop. They take the form of
PAGExx.EZY in the Ezycom systempath. This first tune should
be named "PAGE01.EZY", the second "PAGE02.EZY" and so on.
These are plain text files, and they contain either a
comment (indicated by a semicolon ";" at the start of the
line), the TONE [hz] [1/100's second] and the WAIT [1/100's
second]. The [hz] indicates the frequency (pitch) of the
tone to be played. Following is a list of frequencies
together with their respective musical notes.
Note Octaves
-----------------------------------------
#1 #2 #3 #4 #5 #6
-----------------------------------------
C 45 134 268 536 1071 2145
C# 71 142 284 568 1136 2273
D 75 150 301 602 1204 2408
D# 80 159 319 638 1275 2551
E 84 169 338 676 1351 2703
F 90 179 358 716 1432 2864
F# 95 190 379 758 1517 3034
G 100 201 402 804 1607 3215
G# 106 213 426 851 1703 3406
A 113 225 451 902 1804 3608
A# 119 239 478 956 1991 3823
B 127 253 506 1012 2025 4050
Eg:
TONE 71 100
WAIT 100
Page 85.
Menu System
-----------
Defining a Menu System
----------------------
Ezycom allows the use of fully user defined menu
system. That is, you can make the menus appear exactly as
YOU want, not how the authors want. For instance, you could
combine a file area and message area into the one menu.
With the addition of this feature, a certain amount of
complexity is added to the Ezycom package, as you have to
understand the menu system, so that you can build a system
that you want. Included with Ezycom, is a sample setup,
this allows you to have a look at a full blown menu system,
to help you understand how it was put together.
First of all, a decision must be made on the format of
the menu structure. The structure appears much like a tree.
A sample menu structure is:
--UTILITIES
/
-----FILES
TOP-|
-----MESSAGES
\
---GAMES
Here, you have a TOP menu, this the name of the menu
give to the first menu that is loaded when you run Ezycom.
You can configure this in misc->system->top_menu. The "TOP"
menu allows a various range of options, which includes
allowing the moving to menus such as "FILES", "UTILITIES",
"MESSAGES" and "GAMES".
When defining a menu, you can use the GOTO or GOSUB
commands to move you to one of these menus. From these
menus (ie "FILES" etc), you would most likely want to be
able to move back to the "TOP" menu. This can be done in
three ways. First of all, you can use the GOTO command.
This would move you to whichever menu you place in the
"optional data" of the menu type. Another option could be
using RETURN FROM GOSUB. This would return you to the menu
who previously called it using GOSUB. For instance, if you
had the MESSAGES menu coming off the TOP menu and the FILES
menu, you would never know which menu actually called you if
you wished to return to it. Using the GOSUB/RETURN FROM
GOSUB, it would automatically return you to the menu that
called it. The other option is GOTO MENU AND CLEAR GOSUB
STACK. This is similar to the GOTO menu type, except that
it also CLEARS any previous information about the menu stack
(GOSUBs make a menu stack).
Page 86.
You can now load EZYMENU. This program is used to
build a menu system for Ezycom. First of all, you are
greeted by a Menu called NONAME.MNU. You can either load a
new menu (Press F3), or create a new menu (F6). If, we were
making the previous menu structure, you would press F6.
Then, type in the name TOP. This would create the MENU TOP,
and give it the same information as the current menu
(NONAME). To load a different menu on startup with EZYMENU
use the command line parameter -L<filename>.
Eg: EZYMENU -LSYSOP
Would load the menu SYSOP.MNU on startup.
Now, you can define the ways in which you will move to
the higher level MENUs (FILES, MESSAGES, etc). Press ENTER
to edit current MENU line. You, will now be editing the top
menu line of the MENU called TOP. Here, you can place in
the menu option necessary to allow the USER to move to the
MENU FILES.
The DISPLAY, is the information that will be displayed
to the user for this Menu option. This could be something
like " [F] File Area". Although, there are 90 characters
available for use in the DISPLAY information, it must be
noted that even when using "Special Characters" documented
later, that the line length should never exceed 79
characters when actually displayed on the screen, or else
weird side effects could occur.
The OPTIONAL DATA is specific information for the menu
command you are about to use. Since, we will be using the
GOTO command, we need to place the MENU NAME in the OPTIONAL
DATA. We are calling the MENU we are calling FILES, so
"FILES" will be placed in the OPTIONAL DATA.
The MENU TYPE number for GOTO is 1, so "1" will be
placed in the Menu Type field. Optionally, you could press
F1 to scan through a list of all the menu types, if you
can't remember their number.
After moving the cursor to the HOT KEY field, you will
notice a box in the lower-right corner of the screen. This
gives you HELP on the menu type you have just edited. Thus,
if you forget the OPTIONAL DATA for a menu command, this
could be used to quickly remind yourself. The HOT KEY, is
the key you wish to use to activate the menu command. In
our example, "F" would be placed in this field. Automatic
Option should be left as "No", this will be explained under
"Automatic Menu Options".
SECURITY, is the security the USER must have (or the
users could have above that security), to activate this menu
option. As you would probably want all users to have access
to this menu, the security field would be 0.
Page 87.
The FLAGS fields, are the FLAGS which the user MUST
have to allow them to use the menu option. Pressing X while
editing the flags fields, tells Ezycom that the USER must
have that flag. A "-" value means that you do not care
whether the user has the FLAG or not.
Foreground and Background colours are used when
displaying the "Display" information for this menu command.
The TIME ONLINE field, is the amount of time, the user
must have been online before they can access the menu
option. Setting the value to 0, means they always have
access to the menu option. The setting of the MENU-TIME
flag in the user editor for a user, would STOP this field
from restricting that users access.
TIME-START and TIME-END, is the start times and end
times in which the menu option can be activated. The time
is entered in 24Hour format, ie 1300 is 1:00pm. Setting
both times to 0000 and 0000 would actually make the menu
option function ANY TIME of day, whereas setting it to 0001
and 0001 would make the menu option only function at 1
minute past midnight. In our example, you would leave this
is the default, all the time.
NODE, is what node number can access this menu option.
In multiline environments, it might be desirable to have
different menu options for different nodes. Setting it to
0, allows all nodes to activate the menu option, whereas
setting it to 1 only allows node 1 to activate it.
AGE, is a flag that allows you to restrict access to
this menu option depending on the users age defined in the
config (Usually 18 years old). If, this flag is set to YES,
then no one with an age less than 18, can use this menu
option.
The next three options are RATIO options, and if they
are set to Yes, then ONLY users with Ratios that pass each
of the tests that are set on will be able to use the option.
In our case, we would not want a post/call ratio enforced on
the user, to go to the files menu, so that would be set to
No. Likewise with the File and Kilobyte Ratios. You can
also define tell Ezycom to disregard these flags for
particular users if Ignore Ratios and Ignore Message Ratios
are turned On.
Page 88.
Now, press ESCAPE to save the current menu option. You
should notice that the pick list now shows that menu option
at the top. You can now complete the other menu options,
that is, do the menu commands to GOTO MESSAGES, UTILITIES
and GAMES. After you have finished, you should SAVE the
menu, using the F2 key. The TOP menu has now been
completed. It will allow users that logon to your system,
to go to all the menus laid out in your menu structure.
Now, you can make the Second-Level menus. To begin
with, just make the menu options to allow users to return to
the main menus. As stated before, you can use the GOTO
command to accomplish this.
After, defining the basic menu structure, all the
options must be placed in each menu. Work out what options
will be in each menu. The options are listed later in the
document under "MENU COMMANDS". You might wish to place
options such as File List, Download, Upload and other
various options in your FILES menu. In much the same way as
the Menu Structure was defined in the MENUS, the options can
be added. The major change, is the MENU TYPE and OPTIONAL
DATA that varies for each menu option. After adding the
menu options to the menu system, you will find that you NOW
have a fully defined menu system for users to logon and use.
Page 89.
Menu Templates
--------------
Ezycom allows a special menu templating system, which
allows user defined menu systems, to be less maintenance
orientated. Instead of creating a File Menu for EACH file
area, it is possible to define ONE File Menu. This can be
accomplished by placing /F in certain file area commands, to
tell Ezycom to use the current file area template number for
use in this command. For example, when doing a file list,
instead of placing the file area number in there, you could
place a /F in the OPTIONAL DATA. This tells Ezycom to do a
file list of the current file area template number. The
problem now arises of how to tell Ezycom, which file area
template to use. There are a number of ways in which this
can be done, the most used is the /F= command, which is
placed on the GOTO/GOSUB/GOTO MENU and CLEAR GOSUB STACK
commands.
Eg: GOTO FILES /F=1
Would tell Ezycom to GOTO the FILES menu, and make the
current file area template number 1. So, that any functions
in the FILES menu, would act on file area 1.
Ezycom, allows another way in which you can change the
current file area, that is Select the Current File Area.
This allows the USER to select the current file area. This
command would typically be placed in the FILES menu.
Ezycom also allows the current file area to be
incremented/decremented by the use of +/- respectively.
This can be done by placing the + or - after the /F=
command.
Eg: GOTO FILES /F=+
Would tell Ezycom to GOTO the FILES menu, and increment
the current file area by One. If the user does not have
access to that file area, Ezycom keeps on searching till it
finds an area that the user has access to. The "-" option
works in exactly the same manor, except that it goes
decrements the file areas.
The message areas, also contain this templating
approach, except that instead of using /F, /M is used
instead. /M is used to tell Ezycom to change the current
Message Area template number on GOTO/GOSUBS/etc commands.
Instead of using /F on the message area commands, the /M is
used instead. Thus, making it easier to differentiate
between file areas and message areas. The only other
difference, is that the command to allow the user to select
the current message area is Select Current Message Area,
instead of File Area.
Page 90.
Global Menus
------------
Ezycom also allows Up to 10 menu commands to be defined
GLOBALLY. Thus, instead of having a command in EACH MENU to
return the user to the main menu, you could have a GLOBAL
menu command to do the same function. The MENU name used
for global menus is "GLOBAL". If, this is in the menus
directory on loading Ezycom, then ALL menu commands in the
GLOBAL menu will become GLOBAL. If, a normal menu has the
same menu command as the GLOBAL menu, then the normal menu
command will override the GLOBAL option. It is also
possible to DISABLE the GLOBAL menu for a specific menu,
using menu type 81 "Disable Global Menu". This command HAS
to be an automatic option (Explained later) to function
correctly.
Automatic Options
-----------------
Ezycom enables menu options to be automatically
executed when the menu is loaded. When combined with Menu
Type 40 (Display ANS/ASC/ASL/AVATAR), you can display these
pictures automatically every time the menu is loaded, or
after a menu function has been performed in that menu.
Eg: If you made the top line in a menu a Type 40, and
Automatic set to Yes, then that picture will be displayed
every time that menu is loaded. Since, you are displaying a
picture to the users, you may not want to have all the
Display lines shown to the users, to stop these from being
shown, the only thing on the display line should be a ";".
This stops anything being displayed.
Special Characters
----------------
Ezycom provides some "SPECIAL" characters that may be
used in the DISPLAY line of each menu option.
^ This changes the colours between the highlight
and the normal menu lines colours.
; This stops a carriage return being placed on
the displaying of that line. This should be
placed ONLY at the end of EACH line.
The Ctrl-F/K smart text codes can also be embedded into
the Display and/or Miscdata options.
Page 91.
Ezycom also provides a means for accommodating
"SPECIAL" characters in the OPTIONAL DATA line of each menu
option. You can do this by placing a $<hex code> in the
menu line. The <hex code> is a two digit hexadecimal
number. If, for example the number was A, then the code
would be $0F. To place a $ in the OPTIONAL DATA, the code
would be $24. This features main inclusion was to cater for
the placement of non-alphanumeric characters for use in the
/SK= option.
Keyboard Stuffing
-----------------
Ezycom allows characters to be stuffed into the
keyboard buffer of the IBM PC on ANY menu option. This
allows the simulation of a keypress to Ezycom. For example,
if there was a need to pass through one menu, to get to
another, you could stuff the keyboard with the character
that the user needs to press to go to the other menu. This
option could also be used to press keys in external programs
run by Ezycom.
Eg: GAME.BAT /SK=$0D
This would place a return character in the keyboard, so
that when the GAME is run, a return is pressed
automatically.
Page 92.
Groups
------
Groups is a method in which file and message areas can
be categorized into "Groups" or "Conferences". Its main
purpose is for use with templating, so if you are not using
that, then you can skip this part of the documentation. For
instance, this would allow all of the Amiga areas to be
grouped into one area, totally seperate from the IBM areas.
Special commands in the questionnaire language can be used
to allow users to select the groups they wish to view. For
information on this, see the Questionnaire language.
In the message and file area configuration, there are
to options called "message group" and "file group"
respectively. These options, allow the group for which the
file/message area belongs to, to be configured. The groups
can be configured from the letters of the alphabetic A
through to Z. Also, to ALWAYS enable access to a certain
message/file area, you can make the group a "*". Note that
file and message areas use the SAME group. That is, Group A
in message areas, is ALSO group A in file areas. Possible
group naming might be "A" for Amiga, "I" for IBM.
With the use of the questionnaire language group
commands and the group settins, it is possible for the users
to select which groups they wish to see. All they have to
do is turn on the groups they want, for instance group "A",
and turn off the groups they don't want (eg group "I").
Then, whenever they do a new files listing, combined read,
message area change, file area change, search for files, or
any other "global" type command on message or file areas,
then only those groups the user selects will be display.
Please note that groups is NOT a security feature, and the
user will STILL be allowed to access areas even if they have
the group turned off, or if you make it available using
/F=<area> or /M=<area> commands.
Users can now select which groups they wish to select,
but if they have all groups turned on, then they still could
be presented with many file/message areas when doing area
change commands. It is possible to override the group
commands on the goto menu (with /F=+ or - or /M=+ or -), the
change file area, change message area (and equivalents), and
all global message area/file commands. To override group
settings the sysop MUST place a /G=<group> on the miscdata
line. The <group> is either a letter from A through to Z,
or "*" (meaning ALL groups). For instance, to change to a
file area only in the IBM group, a "/G=I" would be used on
the miscdata (optionial data) line of the menu command. So,
using a totally seperate menu for IBM files, the sysop could
use "/G=I" command on all global type commands in the file
area, thus allowing only IBM files to be viewed and/or
changed to.
Page 93.
A problem now arises when the user changes between two
"overridden" groups. The problem is, that when they go into
the other group (eg Amiga), they are still in an area of the
group they were last in (eg IBM). To overcome this, a new
option has been added to the /F= /M= command. The option
allows you to specify the <group>, which the user should be
placed into.
eg: Goto Menu FILEMENU /F=A
This would place the user into the last Amiga file area
they were in. If, the user has not yet been in an Amiga
File Area, then they are placed in the first available Amiga
File Area.
We realise that this is a hard concept to grasp for
some people. We suggest that first of all, the sysop should
become totally familiar with the menu templating approach,
before tackling groups. The best way to learn groups, is to
experiment with them, and see what happens. If, you are
still having problems, please do not hesitate in contacting
any of the support/beta sites for help.
Page 94.
Utilities
Ezymaint
--------
This program will do all the required daily maintenance
required by you system to keep it up and running fully.
There are a few command line parameters that will help you
do what you need to get done.
Available Command Line Options are
: -D Check for Deleted and Offline Files.
Make Offline files, On-line if found.
: -C Activate Daily Maintenance Routine.
: -M<filename> Make a Master List for Selected File
Areas.
: -F<date> From Date for Master List Maker.
: -T<date> To Date for Master List Maker.
(Date Format - DDMMYYYY).
: -O<days old> Master List with files from days old.
: -E Enter Descriptions for Non-Described
Files.
: -U Update File Size and File Date.
: -P File Download/Points Maintenance
(Part 1).
: -I Add Missing Files to File Lists
(Part 1).
: -N<1..250> Node Number.
: -H<Filename> Header for the Master List that was
generated with the -M option.
If the -D option is used, Ezymaint will check every
file to see if it is still in the Fast Find Index (It is
suggested to run Ezyff -C before this option). If, a file
is not found, then it is either marked Offline or Deleted
depending on your configuration for that file area. If, an
Offline file is found, Ezycom assumes that it has been made
Online, and will mark the file as Online.
If the -C option is used, and you have told Ezymaint
that you want to convert the files that have been uploaded
to your system, to another file compression type then
Ezymaint will call a batch file called DOCONV.BAT and that
will scan the file for Virii using the McAfee Scan program
if you have that program in your path. It will also do the
conversion that will be needed by your system.
If the -M option is used, Ezymaint will create a Master
List file called the name you placed after the -M.
Eg EZYMAINT -MC:\BBSFILES\MASTER.LST
Will create a file called MASTER.LST in the C:\BBSFILES
directory. The -F and -T options are also used with this
option.
Page 95.
If the -F<DDMMYYYY> option is used, in conjunction with
the -M option. Ezymaint will create a Master List FROM the
date specified after the -F the date format is DDMMYYYY.
If the -T<DDMMYYYY> option is used, Ezymaint will use
the date after the -T create the Master List to that date.
Eg EZYMAINT -MC:\BBSFILES\1992.LST -F01011992 -T31121992
Will create a Master List of all the files on your
system dated form 01/01/1992 to 31/12/1992 using of course
the DD/MM/YYYY date format. Note that the -F and -T options
don't have to be used together.
If the -Odays option is used, you can get Ezymaint to
create a Master List with the files only a few days old
every day.
Eg EZYMAINT -MC:\BBSFILES\NEWFILES.LST -O5
Will create a Master List file of only file files on
your system that are 5 days old.
If the -E option is used, Ezymaint will prompt you for
a description for all the files in the filebase that have no
description. If you don't know the description just hit the
Enter Key to go to the next file.
If the -U option is used, Ezymaint will update all the
files with there correct file size and date. This is very
handy if you convert your files outside the Ezycom
enviorment and you converter is changing the date and the
file size of the file.
If the -P option is used, the Ezymaint will start the
first part of the filepoint management. In finding the
files that have been downloaded, and then adding all the
points together to send to the user that upload the file, as
per the setting in the config file. Usercomp does the 2nd
part. This option also maintains the download count, so if
you do not use the filepoints system, then this option
should still be used.
If the -I option is used, Ezymaint will start (Part 1)
in adding missing files to your filebase. If you just place
a file in one of the directories that your system uses for
it's file areas, then this option will start the process of
adding it to your system. Ezyff does the 2nd part.
Ezyff -I should be run immediately after this option, or
else new files will appear that are already in your
database.
Page 96.
If the -N<1..250> option is used, Ezymaint will use
that log file so you can use a node higher than the ones you
use for online and ezymaint will not cause any problems if
you are running under a multitasker on a network.
The -H<Filename> option is used to add a header file to
the master list that is generated by EZYMAINT. This file is
inserted into the master list.
eg EZYMAINT -MMASTER.LST -HHEADER.LST
Conversion
----------
The two conversion files supplied with Ezycom do all
the conversions from one archive type to another archive
type. As well as scanning the files inside the archive for
any virii that might be hiding in there. They are just
batch files that we have been using ever since we started
this project and have found them to work very well. You
must have your archive programs in your PATH statement if
you want to use these batch files. Also as we have made
them to scan for virii you will have to also have that file
in the PATH as well. We have made the batch files to use
McAfee's SCAN as this seems to be the most popular here in
OZ. If you use a mailer like FrontDoor, D'Bridge or use
Ezycom to answer the phone with the ATS0=1 command you
should ONLY use Doconv.bat. If you however decide to use
the Upconv.bat you will have to remember that the file is
converted upon the finish of the upload and it will take
time to do the conversion.
Doconv.bat Upconv.bat
----------------------
As stated above two batch files which are supplied do
the conversion of archive types in your file base to what
ever archive type you want. If however you use Upconv.bat,
remember it will take time after the upload to do the
conversion, so the user online might be slightly upset by
the time it could take. So look into using doconv.bat in
your daily maintenance when your system is not getting a lot
of calls like late at night or early in the morning.
Page 97.
Fedit
-----
This is a menu driven file area editor that allows you
to
move, delete edit and rename files. It is run from your BBS
System directory, by typing Fedit at the Dos prompt and
hitting Return. You will presented with a screen as below:
+---------------------------------------------------------+
| Help Edit File Tag | FEdit |
|---------------------------------------------------------|
| Num Tag Filename Description (C) Easy Soft 1991 |
| |
| 1 +-----------------------------------------------+ |
| 2 | Num: 1 File Area: * IBM New Uploads * | |
| 3 | Num: 2 File Area: * IBM General Files * | |
| 4 | Num: 3 File Area: * IBM PD Games * | |
| 5 | Num: 4 File Area: * IBM Archivers * | |
| 6 | Num: 5 File Area: * IBM Communications * | |
| 7 | Num: 6 File Area: * IBM Viruses * | |
| 8 | Num: 7 File Area: * IBM Solutions * | |
| 9 | Num: 8 File Area: * IBM Sound * | |
| 10 | Num: 9 File Area: * GIF Clean * | |
| 11 | Num: 10 File Area: * GIF Misc Pics * | |
| +-----------------------------------------------+ |
|---------------------------------------------------------|
| File Size : 11831 File Date: 01-04-91 Downloads : 0 |
| Uploader : Sysop |
| Checked: On Gif Info: Off Offline: Off Incmplte:Off |
| Private: Off Deleted : Off No Desc: Off Security: Off |
|---------------------------------------------------------|
| ...................................................... |
+---------------------------------------------------------+
Figure 1
In the Centre of the screen as you can see is a list of
the file areas you defined in config. Use the Pgup/Pgdn
keys to move from file area to file area till you locate the
one you wish to edit. Press RETURN on the highlighted area
and you will now be presented with another window, (See
Figure 2) showing all the files and their statistics, again
press pgup/pgdn or up/dn arrow keys to select the file you
wish to edit. As you move from file to file you will notice
at the bottom of the screen various data fields changing.
We will discuss each field later in this document.
Page 98.
+---------------------------------------------------------+
| Help Edit File Tag | FEdit |
|---------------------------------------------------------|
| Num Tag Filename Description (C) Easy Soft 1991 |
| |
| 1 > HIGH.ZIP High Program |
| 2 GAME.ZIP On-line Game |
| 3 OLD.LZH Deleted |
| 4 OFFY.ARJ Offline |
| 5 NOS.DOC No Description Available |
| 6 NORM.ARC Normal phone |
| 7 |
| 8 |
| 9 |
| 10 |
| 11 |
| |
|---------------------------------------------------------|
| File Size : 11831 File Date: 01-04-91 Downloads : 0 |
| Uploader : Sysop |
| Checked: On Gif Info: Off Offline: Off Incmplte: Off |
| Private: Off Deleted : Off No Desc: Off Security: Off |
|---------------------------------------------------------|
| ...................................................... |
+---------------------------------------------------------+
Figure 2
At the top of the screen (see figure 2) you will notice
four headings:- HELP, EDIT, FILE and TAG.
To activate any of these functions press the ALT key
and the first letter of the option. For example to select
"File" options press ALT-F. We will now discuss each area
in detail.
1)HELP (ALT-H) OR F1. By activating this option you
will be presented with another window which will give your
quick reference Key Functions.
2)EDIT (ALT-E). When this is activated you will
presented with a pull down menu which has three options.
Move the highlighted bar over the function you wish to use
or press the desired ALT key plus letter as defined in the
menu.
THE OPTIONS LISTED ARE:
a)Edit description (ALT-D). This allows you to Edit
the file description or add one if the uploader failed to
give it.
b)Edit UP/DN load (ALT-U). This allows you to Edit the
Uploaders name and the download count.
Page 99.
c)Edit statistics (ALT-S). These are the 8 fields at
the bottom of figure 2. We will discuss each one
individually.
i)Checked-This informs you if ezymaint has done a
virus, integrity and missing file description check. If it
is on, then it has been done.
ii)Private-This informs you if the file is for the sysop
only,(or for those with sysop security). The file will not
be shown in the file listing to those beneath sysop access.
iii)Delete-Informs you if the description has been
deleted. This does not mean that the actual file has been
deleted.
iv)Offline-Informs you whether the file is offline or
not.
v)Security-Used in conjunction with File list and File
Sec in config. Depending on what you have defined in those
2 config areas will determine what security the file has.
Eg: A password, certain security level, if the file is
free or a flag. (see docs on config for more details on File
list and File Sec).
By toggling security on /off will determine if security
is activated on that file(s).
d)View an Archive (ALT-V), this option allows you to
view the contents of the archive that is highlighted in the
file list. From this option you can view a TEXT file within
this archive with the V key. This a very useful feature if
you whish to check the files that your users upload to you.
The formats that are able to be viewed are GIF, JPG, ARC,
PAK, ARJ, ZIP, LZH and ZOO. This is done with batch files
which there are examples in the file SETUP.DAT this file is
in the LZH format, and the files to look for are the ones
starting with "FED" eg FEDGIF.BAT will be the batch file
that the view option uses to view the GIF files.
Page 100.
3)FILE (ALT-F)
--------------
By pressing ALT-F a pull down menu will be presented
with three options. Move the highlight bar over the
function you wish to use or press the desired ALT key plus
letter as defined in the menu.
The option listed are:
a)New file Edit (ALT-L). This allows you to select
another file area to edit.
b)Rename File (ALT-N). This allows you to rename the
file.
c)Update file (ALT-B). This updates the file size and
date in the database.
Eg. If, you added a system comment to the file, so
that its size was now incorrect, this would get the new size
for it.
Page 101.
4)TAG (ALT-T). By pressing ALT-T a pull down menu will
be presented with 7 options. Move the highlight bar over
the function you wish to use or press the defined ALT key
plus letter as defined in the menu.
The options listed are:
a)Tag All (ALT-A). By pressing this option you will
tag all files in the file list. You can also do a single
file tag by pressing either the T-key, spacebar, or return
key. A small triangle will appear next to tagged files.
b)Clear ALL (ALT-C). This option clears or (untags)
all files in the directory that were tagged.
c)Delete Tagged (ALT-K). This will delete all tagged
file descriptions.
d)Move Tagged (ALT-M). This will move all tagged
file(s) description to another file area but the file(s)
will remain in the current directory. This will not
interfere with EZYCOM as it works on Global principles and
knows where the file is even if the description is in
another file area.
e)Remove Tagged (ALT-R). This will delete all tagged
file(s) and their descriptions. Be careful using this
option as it physically deletes the file from the disk.
f)Tagged Offline (ALT-O). This will place all tagged
file(s) offline. When a user does a file listing the files
will be shown as Offline.
g)Physical Move (ALT-P). This will move tagged file(s)
and their descriptions to another selected file area as
opposed to ALT-M that only moved the description.
Fedit can also be run from the DOS prompt with command
line switches.
The switches are:
-A <Filearea number>
-N <Node number>
When you have finished using Fedit press escape to
return to the DOS prompt.
Page 102.
FEDGIF.BAT
@echo off
rem %1 is the Drive of the Gif
rem %2 is the Path of the Gif
rem %3 is the Filename (no extension)
rem %4 is the Extension (including ".")
rem For VPic, if you wish to choose Screen Mode inside
vpic %2%3.* /a
rem For VPic, if you just want to display it automatically
rem vpic %2%3%4 /a
This batch file is used for viewing Gif Files. In its
present state, it requires VPIC to work.
FEDJPG.BAT
@echo off
rem %1 is the Drive of the JPG
rem %2 is the Path of the JPG
rem %3 is the Filename (no extension)
rem %4 is the Extension (including ".")
rem Change to Drive of JPG
%1
rem Change to directory of JPG
cd %2.
rem Convert JPG to GIF file (JPG2GIF.EXE must be in PATH)
jpg2gif %3%4
rem For VPic, if you wish to choose Screen Mode inside
vpic %3.* /a
rem For VPic, if you just want to display it automatically
rem vpic %3.GIF /a
del %3.GIF
This batch file is used to convert JPG files to GIF files,
then view the GIF file. After viewing the GIF file, it is
deleted off of your hard disk. In its present state, it
requires VPIC and JPG2GIF to work.
Page 103.
FEDVIEW.BAT
@echo off
rem ********************************************
rem ** **
rem ** FEdView.Bat **
rem ** **
rem ** Copyright Peter Davies 1992 **
rem ** All Rights Reserved **
rem ** **
rem ** For use with Ezycom Only **
rem ** **
rem ********************************************
echo Extracting %1 from %2
rem If called stand alone, it checks to see if enough
parameters were
rem passed to the batch file
if !%3! == !! goto endit
rem This is a list of the command line in FEdView.Bat
(Ezycom)
rem %1 EZYCOM.PAS Filename to Extract
rem %2 C:\EZY\FILES\EZYSRC.ZIP Filename to Extract From
rem %3 ZIP Archive Type
if not exist %2 goto :endit
goto :get%3
:getzip
pkunzip -o %2 %1
goto endit
:getlzh
lha e /cnm %2 %1
goto endit
:getarc
PKXARC -r %2 %1
goto endit
:getpak
PAK e /wa %2 %1
goto endit
:getarj
arj e -y %2 %1
goto endit
:getzoo
ZOO -e %2 %1
:endit
echo Finished Extraction
This batch file is used by FEdit to extract a text file for
viewing in any archive format. It requires all the standard
de-archive programs.
Page 104.
Usercomp
--------
Usercomp is a userbase compacter that will do
maintenance on your Userbase files. There are several
command line switches that can be used with Usercomp. We
will discuss each one separately below:
-S1 Sort By Security then Surname.
-S2 Sort By Security then first name.
-S3 Sort By Security then Alias.
-S4 Sort By Surname.
-S5 Sort By First name.
-S6 Sort By alias.
-DXXX Delete Users After xxx days.
This will delete users who have not called the
system for the amount of days specified by XXX.
Eg. If you set -d30 then all users who have not
called for 30 days will be deleted, unless you have
set "Don't kill user" in the user record.
-UXXX No Delete Users >= xxx security.
This will not delete users with a security level
greater than or equal to the one specified by XXX.
Eg. If you set -U100 then users with security
level 100 and above will not be deleted.
-ADD Add 0 Security Users to TRASHCAN.CTL.
(See docs for more information on Trashcan.Ctl)
-P Credit File Points for Downloads of their Upload.
This function will credit file points to uploaders
who's files have been downloaded if this option has
been implemented in "files-misc" in config.
-BXX Make XX Best User Information.
This allows you to assign how many users you want
shown in your best users information screens.
Eg. If you assign -B10 then the best 10 users
will be shown.
-ALIAS When Usercomp makes the best lists, it will make
them up using the users aliases instead of their
real names with this switch.
-N<1..250> Node Number.
Any combination of these command line switches can be
used simultaneously if you wish with usercomp.
Eg. Usercomp -S1 -D20 -P -B1O -ALIAS -N1
If you forget these switches, you can type usercomp -? at
the DOS prompt for quick reference help.
Page 105.
Anstoavt
--------
This enables you to convert your .ans (ANSI) files to .Avt
(Avatar) files.
Eg. to convert mess.ans to mess.avt do the following at the
Dos prompt type Anstoavt mess.ans. Wild cards are supported
so if you wish to convert ALL your .Ans files type
Anstoavt *.ans. This will convert all of your ansi screens
to Avatar screens.
Page 106.
Ezymail
-------
This is a Fido compatible Echomail tosser / scanner.
It can be used in any Fidonet Mailer that uses the .MSG
approach to file attaching. That is, Front Door, D'Bridge,
etc, Binkley will however, NOT work with EzyMail.
There are several command line switches that can be used.
They are explained below:
-SCAN Scan Message Base for Waiting Echomail.
This function scans all echomail conferences
and exports all messages, that have not been
exported before to the systems listed in your
export list.
-TOSS Toss Echomail into Message Base.
This function is used to import mail packets into
Ezycom's Echomail areas. If Ezymail detects a
message for a conference in which you have
systems defined in your export list, it will
automatically forward the message to those
systems.
-N<NODE> Node Number. (1-99)
Ezymail and Multiline BBS's
---------------------------
Ezymail creates an EZYMAIL.NOW file in your Ezycom
systempath while running. This tells EzyMail and other
programs that EzyMail is running. For instance, you would
not want a mail session sending out mail, while Ezycom is
packing up mail for that session. Ezymail can NOT run
simultaneously with another Ezymail, so if EZYMAIL.NOW is
present, then the second Ezymail will not run.
FrontDoor
---------
If, Ezymail finds an FD environment variable, it will
update FDRESCAN.NOW and FMRESCAN.NOW after completion of
execution. The commercial versions of Front Door make a
file called FDINSESS.<task> in the Front Door System
Directory, while a mail session is in process. If, Ezymail
detects one of these files, then it will not execute as
imagine what could happen, if it was updating a mail bundle,
which was being sent in that session.
D'Bridge
-------
If, Ezymail finds a D'BRIDGE environment variable, it
will update DBRIDGE.RSN after completion of execution. This
tells D'Bridge to rescan its netmail.
Page 107.
Ezynet
------
EzyNet is used to import and export your NetMail from
your Frontend mailer. Like FrontDoor, D'Bridge etc. It also
will pass EchoArea messages to EzyCom for processing. Using
EzyNet is easy, just have the following lines in your batch
file that you use to run Ezycom. In the section you use to
scan the message base for echomail add the following line.
EZYNET -EXPORT
This will export all the NetMail from Ezycom and place
it in to the correct path for your Frontend Mailer to send.
In the section you use to toss echomail into your BBS
add the following lines.
EZYNET -IMPORT -ECHOAREA
^^^^^^^^
This will import all the NetMail from the directory
that your Frontend mailer puts then and places them into
your message base. The line ezynet -echoarea tells Ezycom's
EchoMail area processor to read a message sent to it and act
upon it as follows.
What is EchoArea?
EchoArea is a part of the Ezycom mail processor. It is
used to update and maintain your echomail profile without
needing to bother your host with requests - EchoArea will
process them automatically.
How to use EchoArea.
To access EchoArea send a netmail message to your host,
addressed to EchoArea.
Eg. To: EchoArea, 3:633/374
To safeguard your echomail profile, you must specify a
password on the subject line of the netmail message. If you
don't have a password, or you don't know what it is then
contact your host.
Eg. To: EchoArea, 3:633/374
Re: foo
Echomail profile maintenance. EchoArea's main use is
to add/remove your node to/from your host's export list. To
do this, you simply tell EchoArea the area tag of the
conference you want to pick up or drop. For example, to add
the Ezycom support conference (EC_SUPPORT) to your system
you would send a message like:
Page 108.
To: EchoArea, 3:633/374
Re: foo
----------------------------------------
+EC_SUPPORT
Note that the '+' sign in front of the name is
optional. To remove a conference is very similar, only you
put a '-' sign in front of the conference name instead of a
'+'. In this case the prefix is NOT optional.
For example, to get rid of an echo you are no longer
interested in send a message like:
To: EchoArea, 3:633/374
Re: foo
----------------------------------------
-BORING_ECHO_CONF
---
As many of these commands as you like can be combined
into the one message, so both of the above examples could
have been in one request:
To: EchoArea, 3:633/374
Re: foo
----------------------------------------
EC_SUPPORT
-BORING_ECHO_CONF
---
Note the tear line (row of dashes) at the end of this
example. Everything after the tear line is ignored, so you
can also send comments or queries to your host. This is
useful if you have a question relating to your conference
set-up or have problems using EchoArea.
Options
There are several optional commands that can be invoked
by putting a parameter after your password on the subject
line.
-Q : Query.
The query command will cause EchoArea to create list of
all the echomail areas available to your system and send it
back to you. The list will have the conference tag, a
description, and one of either "On", "Off" or "Sec". On :
The conference is already active for your system, Off: The
conference is not active for your system, Sec: The
conference is not available to your system.
Page 109.
-L : List.
This is similar to the -Q command above, but does not
add the conference status (on/off/sec) to the list.
-H : Help.
EchoArea will send a help file back to you in a netmail
message.
-All : All on.
The all command will turn on all available areas to
your system. Saves doing thirty or so areanames.
-NoAll : All off.
The all off command is the exact opposite to the all
command. It will turn all echomail areas off for your
system.
Eg. To: EchoArea, 3:633/374
Re: foo -q
----------------------------------------
EC_SUPPORT
-BORING_ECHOMAIL_CONF
---
This will turn on the EC_SUPPORT conference, turn off
the BORING_ECHOMAIL_CONF area, and send back a list of
available areas and their status.
Page 110.
Msgcomp
-------
This is Ezycom's message base compacter and will do
maintenance on your message areas. Its function is to keep
your message areas to the limits you set in Config "Message
Areas". For example if you set "Max number of msgs" to 200
and the area has 300, Msgcomp will delete the first 100
messages to maintain the area at 200. However if you set
any of the message limits to 0 then Msgcomp will ignore
these fields. Msgcomp should be run once a day in a nightly
event.
The message compacter is limited to a maximum of 16000
messages per message area, and so if the number of messages
in an area exceeds 15000, it will automatically compress
that message area to 15000 messages. Depending on how much
free RAM is available, MSGCOMP will handle more messages per
area, with an upper limit of 16000. Ezycom and other
utilities can handle up to 65,000 messages per conference.
MSGCOMP also has four command line switches :
-LINK, -LINKALL, -NODELETE and -CLEANUP.
-LINK will LINK all message areas that has had new
echomail/netmail, since MSGCOMP -LINK was last run.
-LINKALL, will unconditionally LINK ALL echomail and
netmail areas. Local areas are NOT linked, as Ezycom does
this when you reply to messages, so trying to LINK them,
would be waisting system time. MSGCOMP links the messages
(makes reply chains), by matching those with the same
subjects together.
-NODELETE, will stop MSGCOMP from deleting messages by
days, received days, number of messages, or number of
kilobytes.
-CLEANUP, will tell MSGCOMP to delete conference(s)
that no longer exist in your configuration setup. Thus, if
you delete a message area with Alt-D, MSGCOMP -CLEANUP with
actually delete the messages in that message area, and reset
lastread pointers. Conferences should NEVER be deleted by
using DOS commands, as the lastread pointers are not reset.
Eg MSGCOMP -LINK
Page 111.
Ezyff
-----
This is used to keep all your file area index's up to
date. It will add and remove files tell you of duplicates
and sort the file index's. There are seven command line
switches that can be used with Ezyff. These are listed
below in detail:
-C This creates/updates the Fast File index. This is
a list of index to all the files available on your BBS for
downloading. If you add files to your file areas or remove
them, this should be run, to update the index. This should
be run at least once a week, to make sure your index is
correct.
-S Sorts the fast file index. It makes it faster if
you don't do -C everyday.
-L<textfile> This makes a list of all your file paths
to the text file name.
-F This creates a QuickBBS compatible FLSEARCH.CTL.
-D This lists all the duplicate files in directories
to your maintenance log.
ie.FRED.ARC was in C:\Files and FRED.LZH was in
C:\NEWFILES, then it would place in the log that Fred.* was
in both of those directories.
-I This is the second part of maintenance to place
files in your files lists which are in your directories but
not in the files lists. The file area the files are placed
in, is the upload area in CONFIG->FILEPATHS.
-ID Does the above check, but also logs duplicate file
descriptions, much like the -D option. It will also log
duplicates when the same file area has duplicate
descriptions, again on a .* level.
-N<node> Node number to run EZYFF under. (1-250)
Page 112.
Ezyutil
-------
EzyUtil is a program that will import a file <Text>
into your message base. It will also import files into a
specified file area, while updating your fast file index
with the information from a files.bbs file (Great if you use
a program like TICK). It can also undelete messages in one
or ALL of your message areas and lastly EzyUtil will sort
your Echo Node Information. Ezyutil will also export
message/file area configuration, and make message base
statistics on a message area.
Importing a message file. To import a message file
into your message base use the following line.
EZYUTIL -IMPORT -A<1..400> -F<Who_From> -T<Who_To>
-S<Subject> -LC:\DOCS\HITHERE.DOC
-A Message area to send the file to. (Message area
number in your Config)
-F Who the message is to be from. (Note the Underline
between the First_LastName) it MUST be there.
-T Is who the message is sent to. (Again Must have the
Underline)
-S The Subject of the message to be imported. (Remember
the Underline)
-L The path and file to import.
Eg EZYUTIL -IMPORT -A1 -FPeter_Davies -Tall -SHigh_All
-LTest.TXT
Importing a file with Description. (Using a Files.bbs)
To import the file and description use the following line.
EZYUTIL -FILESBBS -A<1..400> [-L<Files.bbs Path>]
-A File area to import the file to. (File area number
in your Config)
-L Path to the files.bbs (This is the path where the
FILES.BBS, and the files IN the files.bbs are located). If,
this option is omitted, then the area path for the filearea
is used.
Eg EZYUTIL -FILESBBS -A1 -LC:\BBS\FILES\GAMES
Page 113.
Sort EchoNode information.
Use the following line.
EZYUTIL -NODE
This will sort all your EchoManager Nodes in Ascending
order, while updating the export list for each message area
at the same time.
Undelete Messages.
Use the following line.
EZYUTIL -UNDELETE
EzyUtil will then prompt you for the message area
number where you wish to undelete the messages contained
within it. If you select a valid message area, then EzyUtil
will undelete all the messages in that conference. Only
messages that were deleted AFTER the last MSGCOMP will be
undeleted however. After a MSGCOMP, you can NOT retrieve
any messages that were deleted.
Strip Log.
Use the following line.
EZYUTIL -STRIPLOG -L<logfile> -D<days old>
To strip Ezycom's log, and to leave a certain number of
days log remaining use "EZYUTIL -STRIPLOG -L<logfile> -
D<days old>".
The <logfile> is the name of the Ezycom log which you wish
to be stripped. The <days old> is the number of days of
log, which you wish to keep. Eg -D7 would keep the last 7
days of log file. When using EzyUtil -STRIPLOG, you MUST
not be using any other utility or Ezycom that uses this
logfile.
Page 114.
File Area Information.
Ezyutil can export file area configuration information
to a file called FILES.TXT. This file contains all the
information on your file areas. It is placed in the system
path.
eg: EZYUTIL -EXPORT -FILEAREA
The following is an example of what to expect in the
FILES.TXT file that is created with this option.
File Area Num: 1
File Area Name: GENERAL FILES
Upload File Area: NEW UPLOADS
Upload File Path: D:\BBS\FILE\GENERAL\
File Group: *
User Security: 5
User Flag A: --------
User Flag B: --------
User Flag C: --------
User Flag D: --------
Sysop Security: 1000
Sysop Flag A: --------
Sysop Flag B: --------
Sysop Flag C: --------
Sysop Flag D: --------
Sort By: Alpha
Offline Allowed: No
Master List: Yes
Age Check: No
Conversion: Zip
Page 115.
Message Base Information.
As for the file base Ezyutil will create an information
file for the message base. The file created is called
MESSAGES.TXT. This will give you the following information
about your message base.
Mess Area Num: 2
Mess Area Name: LOCAL CHIT CHAT
Mess Area Type: Local
Mess Area Kind: Public and Private
Mess Group: *
Days Kill: 30
Receive Kill: 10
Count Kill: 500
Kilobyte Kill: 0
Read Security: 1
Read Flags A: --------
Read Flags B: --------
Read Flags C: --------
Read Flags D: --------
Write Security: 1
Write Flags A: --------
Write Flags B: --------
Write Flags C: --------
Write Flags D: --------
Sysop Security: 50000
Sysop Flags A: --------
Sysop Flags B: --------
Sysop Flags C: --------
Sysop Flags D: --------
Alias Allowed: Use Alias, Alias Allowed
Combined Access: Yes
Initial Combined: Yes
Age Test: No
Page 116.
Message base Statistics.
Ezyutil can generate a set of statistics for your
message base the file created is called STAT<area>. This
will include the number of participants in that message
area, the average message length in bytes then a list of the
users names, number of messages posted by that user, the
total length in bytes for all their messages posted then an
average of the length of their messages posted. At the end
of the file there is a section showing the person that
posted the longest message and the person that posted the
shortese message. This text file could be imported into the
message base useing the EZYUTIL message import command to
show the users the stats of the message area being used.
Eg: EZYUTIL -MBS -A1
Message area statistics for " MESSAGE TO THE SYSOP "
Number of participants : 13
Average message length : 343 bytes
Poster Posted Length Average
------------------------------------------------------------
Fred Basset 3 739 246
Anthony Jones 1 526 526
Charles Manson 2 131 65
Ian Mason 1 219 219
Jack the Ripper 1 577 577
Ned Kelly 1 38 38
Randy Mandy 1 269 269
Mr Squiggle 2 337 168
Fat Cat 1 598 598
Peter Davies 3 1378 459
Mr Ed 1 279 279
Elvis Presley 1 453 453
Wayne Burnside 25 9224 368
Longest message : Peter Davies, 1090 bytes
Shortest message : Wayne Burnside, 35 bytes
Page 117.
Ezyed
-----
On loading Ezyed you will be presented with the first
User in your Ezycom userbase. This Should Normally be the
SysOp as He/She would usually be the first person to use the
system, also he/she should have the Highest Security Level.
Display Mode Options
F1 : Displays the online Help Screens for Ezyed
P : This gives you a very elaborate Pick List for you
to chose a user from. To move around in the Pick
List you just use the Arrow Keys to go up and down
one user at a time or the PgUp and PgDn Keys to
move up and down the list a page at a time.
E : This launches you in to the Edit Mode more on this
later.
F10 : Toggles you to and from the 2 display screens.
Arrow : These keys move you to and from the next and
Keys previous record this includes PgUp and PgDn.
F2 : You will be given a choice to Search for either
the User's Name-Alias or by the User's Security
Level. the search will being up the First
occurrence of the pattern you chose ie(Name = Pet)
will find the first record that has (Pet) in the
Name/Alias Field case is not used in the search so
(Peter = peter).
F3 : This will continue the search using the (Last)
pattern used. When the search doesn't find a user
to match the pattern you will be told then EzyEd
will take you to the (First) user in your
userbase.
F4 : This command allows certain global options to be
performed on the userbase. These include flag
editing and group editing. When editing global
flags, a "-" sign means, do not change the flag, a
"X" sign means, turn the flag ON for all users,
and an "O" sign means, turn the flag OFF for all
users. When editing global groups, the setting
that you make will affect all users, so every user
will have that global group setting.
Esc : Exit from Ezyed.
Insert : This will add a New Record to your user base.
Page 118.
Delete : This key will Toggle the (Deleted) Flag of the
user displayed.
Edit Mode.
Ctl A : Abort any changes made to this record.
Ctl P : This gives you a very elaborate Pick List for you
to chose a user from. To move around in the Pick
List you just use the Arrow Keys to go up and down
one user at a time or the PgUp and PgDn Keys to
move up and down the list a page at a time.
Ctl S : Saves the record you are editing. Esc will do the
same.
Arrow : These keys move you to and from the next and
Keys previous entries.
PgUp : These two keys move you to the next and previous
PgDn records after saving your changes first.
Esc : Exit from Edit Mode.
The function keys (F1, F2, F3, F4, F10) function in
exactly the same was as in display mode.
Page 119.
There are some user variables in Ezyed that you should
know about, here is a list of them. All of these variables
are changed by placing the highlight on the Yes or the No
displayed. Then tap the space bar to toggle between Yes or
No.
Deleted : No
Clear Screen : Yes
Continue : Yes
ANSI Capable : Yes
Don't Kill User : No
Ignore File Points : No
Full Screen Ed : Yes
Quiet Mode : No
Ignore Ratios : No
Avatar Capable : No
IBM Chars : Yes
Ignore Paging : No
Exclude User : No
Menu Time : No
Ignore Message Ratio : No
No Page Sound : No
Page on Logon : No
Deleted. If this is set to Yes then the next time you
run usercomp the user will be deleted from the userbase.
Clear Screen. This will set ezycom to send this user
screen clearing codes when required.
Continue. Tells ezycom that this user requires a
continue prompt to be sent when displaying file lists and
screens longer than there screen length.
ANSI Capable. Tells ezycom whether the user will
accept Ansi characters or not.
Don't Kill User. If this option is set to Yes, then
even if the user hasn't called in the amount of days you set
to kill users when using usercomp this user will not be
killed from the userbase.
Ignore File Points. This option will stop the user
from using his/her filepoints. So this user will not be
stopped by this powerful ratio system in downloading files.
Full Screen Ed. Enables the external full screen
editor.
Quite Mode. If enabled this user will not be able to
be called by another node with the multinode chat system.
Page 120.
Ignore Ratios. This is similar to the ignore file
points option but it applies to all the other file ratios
used in the ezycom package. So if this option is Yes and
ignore file points is No the users can download all they
like until there file points are used up (Providing they
don't exceed the daily download limit/time limit).
Avatar Capable. If set this option will set ezycom to
send avatar screen codes to the user with this set to Yes.
IBM Characters. When this option is Yes ezycom will
send the highbit IBM characters to the user. If set to no
the user will get the character you have set in the replace
IBM character in the config, This is set to (o) by default.
Ignore Paging. If this option is set, then the user
will be able to overide all paging hours, hence page the
sysop 24 hours a day, seven days a week.
Exclude User. With this option on Yes the user will
NOT be displayed in any user display lists.
Eg Best User Stats, User Lists, Last Caller, etc.
Menu Time. If this option is set the user will NOT
have to wait for the time restrictions in any of the menu
option.
Ignore Message Ratio. If this option is set, then the
user will NOT have to abide by the post/call ratios.
No Page Sound. When a user pages you with this option
turned on, no page sound will be heard, although the user
will be under the impression that he is paging you.
Page on Logon. When the user logs on, five short beeps
are sounded, to indicate to you that a very important user
has logged on. Note that this option works 24 hours a day,
7 days a week, and is not restricted by page times.
Page 121.
EzyNode
-------
This utility (thanks to Colin Berg for donating it)
compiles your Nodelists for your network addresses, for use
in Ezycom. If, you do not know what these terms mean, or do
not belong to a network, then you can skip the documentation
on EzyNode.
Ezycom has a very different style of nodelist compiling
than many other BBS packages. It allows the sysop to
configure the nodelists to be viewed for each address that
the sysop has. In all, the sysop has a maximum of 16
network address, and for each network address, the sysop can
have upto 5 nodelists. So, Ezycom can cater for upto 80
nodelists. This feature, can be used to secure your network
from unwanted user access. For instance, if you could allow
your users to post messages into FidoNet, but NOT allow them
to post messages into EzyNet (Network of Ezycom Beta Sites).
Ezynode requires a nodelist control file for it to
operate. This file is called EZYNODE.CTL, and should be
located in your ezycom system directory.
Comments may be placed in this control file, by placing
a ";" at the start of the comment.
Eg:
;Ezynode control file
This is a valid comment, since the ";" preceeds the
comment. Also, blank lines are ignored by ezynode.
Ezynode accepts 4 different keywords. START, AKA, LIST
and PLIST. A description of how each command is used and
applied to the control file follows.
The "START" command tells Ezynode that a NEW index
should be created for the following AKAs/NODELISTs. Upto 16
START commands (indexs) maybe present in EZYNODE.CTL.
Page 122.
The "AKA" command tells Ezynode which network address
should be used for this index. This is very important as,
only those network addresses that use the nodelists
indicated after this command, should be used. However, a
short cut command can be used, called "ALL". That is, "AKA
ALL" will tell Ezynode that all network addresses are to be
used for these nodelists. If the "ALL" command is used for
the network addresses, then no other network addresses
should be stated.
Syntax: AKA <network address or ALL>
Eg: AKA 3:636/213
AKA 3:636/213.3
AKA ALL
After entering the AKAs for the index, the nodelists to
be used for the index must be specified. This can be
accomplished using the "LIST" or "PLIST" commands.
The "LIST" command indicates that the nodelist that
follows it compiles to the StLousis nodelist format, or in
simpler terms that it has at least 1 Zone statement at the
top of the nodelist.
Syntax: LIST <nodelist> [optionial zones]
Eg: LIST nodelist.* 1 2 3
If, the [optionial zones] are left out, then Ezynode
assumes that all Zones are to be processed. In this
example, NODELIST.* will be compiled (the latest version of
NODELIST in the nodelist directory). Note that all
nodelists MUST be located in your nodelist directory. That
is, paths are not valid.
The "PLIST" command indicates that the nodelist which
follow will be a private nodelist that does not contain any
Zone statements. You must indicate which Zone Ezynode is to
use.
Syntax: PLIST <nodelist> <zone to use>
Eg: PLIST ezynode.* 80
In this example, ezycoms network nodelist will be
compiled, but because no valid zones are in the nodelist,
ezynode will use zone 80 for the network address. The <zone
to use> parameter MUST be present for the "PLIST" command to
function.
In Ezycom version 1.01, only limited nodelist support
is present, but this will be expanded upon in later versions
including point list support, costing, crashmail detection,
and other delights.
Page 123.
EzyNode, Sample EZYNODE.CTL
---------------------------
; First Block will create EzyIndex.01
START
AKA 3:636/213
LIST NODELIST.* 1 2 3 4 5 6
;
; Second block will create EzyIndex.02
START
AKA 80:1000/153
LIST EZYNODE.*
;
;end of ezynode.ctl
Page 124.
Appendix A (Questionnaire Language)
Questionnaire
-------------
Questionnaire languages are like a miniature
interpreter language built around the BBS. It is simple,
but a very powerful way in which tasks can be accomplished.
Some ideas for the use of Q-A language are, asking newusers
details which the BBS doesn't ask them (NEWUSER.Q-A) or
(NEWUSER2.Q-A which allows MENUCMND unlike NEWUSER.Q-A),
handling registration expiry (REGEXP.Q-A), writing door
information files (DOOR.Q-A), turning off access to certain
file/message areas (Eg. If a Amiga user doesn't want to view
IBM Files), and much more. Throughout this appendix, <var
num> is referred to, and the range of variables it has is 1
through 50.
The commands are case-insensitive, that is 'Quit',
'QUIT' and 'quit' are all valid commands.
DisplayFlag <flagnum A-D><flagbit 1-8>
This option displays the current status of a user's flag.
Eg. DisplayFlag A1
Would display ON/OFF depending on the value of the user's
flag A1.
SETFLAG <flagnum A-D><flagbit 1-8> <ON|OFF|TOGGLE>
This option is used to set the user's flag to a value. ON
would turn the user's flag on, OFF would turn the user's
flag OFF, and TOGGLE would turn the user's flag OFF if it
was ON, or ON if it was OFF.
Eg. SetFlag D8 ON
Would set the user's flag D8 to ON.
SETSECURITY <security>
SetSecurity changes the user's current security level to
that defined in the command.
Eg. SetSecurity 100
SETIGNOREFP <ON|OFF|TOGGLE>
SetIgnoreFp, sets the file points ignore flag ON or OFF for
the user.
Eg. SetFP OFF
Would set the file points ignore flag OFF.
Page 125.
SETANSI <ON|OFF|TOGGLE>
SetANSI, sets the ANSI graphics ON or OFF for the user.
Eg. SetANSI OFF
Would set ANSI graphics OFF.
SETAVATAR <ON|OFF|TOGGLE>
SetAVATAR, sets AVATAR graphics ON or OFF for the user.
Eg. SetAVATAR TOGGLE
Would turn AVATAR OFF, if it was currently ON, or ON if it
was currently OFF for the user.
SETFSE <ON|OFF|TOGGLE>
SetFSE, sets the ANSI Full Screen Editor ON or OFF for the
user.
SETRATIO <ON|OFF|TOGGLE>
SetRatio, sets the File Ratio Ignore Flag ON or OFF for
the user.
SETPOSTCALL <ON|OFF|TOGGLE>
SetPOSTCALL, sets the Ignore Post Call Ratio Flag ON or OFF
for the current user on-line.
SETMNUTIME <ON|OFF|TOGGLE>
SetMNUTIME, sets the Ignore Menu Time Restrictions, that is,
time on-line, start time and end time, ON or OFF for the
current user on-line.
SETVARS "<text>" <var num>
SetVARS, is a special command, where you can set on the of
the 50 variables (each of maximum 255 characters), to a
default value. This value can be anything from a number to
a word. The 'SPECIAL' feature about this command is that
most Type 7 codes can be used to place 'SPECIAL' information
in the variable for testing. The <text> field also supports
the Ctrl-F/K smart text codes.
Eg. SetVars "Hi There" 1
Would place "Hi There" in Variable 1.
Eg. SetVars "Ctrl-FA" 1
Would place <username in Variable 1.
Eg. SetVars "COM*P" 1
Would place "COM1" in Variable 1 in the current comport was
1. "COM2" in Variable 1, if the current comport was 2, and
so on.
Valid codes from Type 7 are *P, *B, *O, *F, *L, *A, *G,
*V, *R, *S, *N, *7, *8, *9, *0, *1, *2.
Page 126.
Some new codes have been added specifically for the
SETVARS statement.
*E is the errorlevel returned from the last Type 7
Shell. If, the program to be run in the Type 7 shell could
not be found to run, then *E will give a value of 65535.
Eg
MENUCMND 7 TEST.EXE
SETVARS "*E" 1
IF 1 = 65535
DISPLAY "File Not Found|"
ELSE
DISPLAY "Errorlevel Returned "
DISPLAYASW 1
ENDIF
*AGE is the users age. This can be used to set user
flags on or off, for restricting their access to message
areas and/or file areas. If, their Birth Date is Invalid,
then *AGE will return 255.
Eg
SETVARS "*AGE" 1
IF 1 = 255
DISPLAY "Sorry, your Birth Date is Invalid|"
SETFLAGS A1 OFF
ELSE
DISPLAY "Your Age is "
DISPLAYASW 1
IF 1 <= 17
SETFLAGS A1 OFF
DISPLAY "Sorry, you can not access Adult Areas.|"
ELSE
SETFLAGS A1 ON
DISPLAY "Yes, you are old enough for Adult Areas.|"
ENDIF
ENDIF
WAITENTER
*TIME is the current time. This can be used to further
restrict users from doing things at certain times, run a
program in the BBS, and still keep the user on-line and so
on. The time is made into the numeric format HHMM.
Eg
SETVARS "*TIME" 1
IF 1 < 1600
DISPLAY "It is not 4pm yet.|"
ELSE
DISPLAY "Enjoy our On-line Game.|"
MENUCMND 7 *C /C GAME.BAT
ENDIF
Page 127.
SETCOMMENT <var num>
SETCOMMENT sets the user's comment field the the variable
number. Only the first 40 characters of the variable number
is used.
Eg
SETVARS "High"
SETCOMMENT 1
SETTOPMENU <menuname>
SETTOPMENU sets the user's top menu field to <menuname>.
Menuname should NOT include the .MNU extension.
Eg
SETTOPMENU TOP
WAITENTER
WaitEnter displays the enter prompt, and waits till Enter is
pressed.
MENUMMND <option number> [miscdata]
MenuCmnd executes ANY of the menu commands, except for the
questionnaire (type 12) command. These are used exactly the
same as the normal menu commands. Note that Menu Commands
are NOT allowed in NEWUSER.Q-A.
Eg
MenuCmnd 7 *C /C GAME.BAT
MenuCmnd 27 1 /T=Peter_Davies
DISPLAY "<message>"
This displays message to the user. It does NOT
automatically place a carriage return on the end. Use | to
force a carriage return.
Eg Display "High"
DISPLAYASW <var num>
DISPLAYASW or LISTANSWER, displays <variable number> to the
user WITH a carriage return.
Eg SetVars "High" 1
DisplayAsw 1
DISPLAYGROUP <group>
DISPLAYGROUP will display the current status of a group (A
through to Z). If the particular group is ON, then ON is
displayed, or if it is OFF, then OFF is displayed.
Eg DisplayGroup A
Page 128.
CLEARSCREEN
CLEARSCREEN clears the user's screen if he/she has the
clearscreen flag set to ON.
POSTINFO
POSTINFO writes the users name, time and date to the answer
file.
OUTPUTANSWER "<message>" [var num]
OUTPUTANSWER writes the <message> then the variable contents
to the answer file. The [var num] is an optionial parameter
and allows just <message> to be written to the answer file,
if so desired. The <message> also supports all the CtrlK/F
commands, such as Ctrl-FA.
Eg.
SETVARS "High" 1
OUTPUTANSWER "Current Value of Var 1 " 1
OUTPUTANSWER ""
OUTPUTANSWER "Ctrl-FA"
(The Ctrl-F represents Control F key)
QUIT
QUIT terminates execution of the script IMMEDIATELY. This
is useful inside an IF statement or at the end of a GOTO.
CAPITALIZE <ON|OFF|FIRSTLETTER|>
CAPITALIZE or CAPITALIZE, turns ON or OFF the capitalizing
of all input statements to the script. FirstLetter however,
will Capitize the first letter of ever word, and force lower
case on every other letter.
Page 129.
CHANGECOLOR <foreground color> <background color>
CHANGECOLOR or CHANGECOLOUR, changes the current foreground
and background colours to those specified in the command.
Eg
CHANGECOLOR 15 0
Would change the current colour to White with a black
background.
The colour assignments are
Foreground Background
0 - Black 0 - Black
1 - Blue 1 - Blue
2 - Green 2 - Green
3 - Cyan 3 - Cyan
4 - Red 4 - Red
5 - Magenta 5 - Magenta
6 - Brown 6 - Brown
7 - LightGray 7 - LightGray
8 - DarkGray
9 - LightBlue
10 - LightGreen
11 - LightCyan
12 - LightRed
13 - LightMagenta
14 - Yellow
15 - White
GETCHOICE <key list> <var num> [default]
GetChoice waits until a key in <key list> is pressed and
stores the result in <var num>. If a [default] key is in
the command, then if ENTER is pressed, the default key will
be placed in <var num>. If, GetChoice is used in
conjunction with Capitalise ON or FIRSTLETTER, then all
input is capitalized.
Eg GetChoice YN 1 Y
Would wait until either Y(es) or N(o) or ENTER is pressed.
If, ENTER is pressed, then Variable would contain Y.
Eg GetChoice YN 1
Is exactly the same as the previous example, but if
ENTER is pressed, it is ignored. ie The user MUST type in
Y(es) or N(o).
Page 130.
IF ... [ELSE] ... ENDIF
This is a very powerful way of manipulating responses
from the user. Ezycom's IF's can be up to 65,000 levels
deep. The ELSE is optional.
Eg
SETVARS "X" 1
IF 1 = "Y"
DISPLAY "Y Was Entered|"
ELSE
DISPLAY "Y Was Not Entered|"
ENDIF
Since the contents of 1 was "X", the test failed when
testing for "Y", so the result would be "Y Was Not Entered|"
Eg
SETVARS "X" 1
IF 1 = "Y"
DISPLAY "Y Was Entered|"
ELSE
DISPLAY "Y Was Not Entered|"
IF 1 = "X"
DISPLAY "X Was Entered|"
ELSE
DISPLAY "I Can not work it Out|"
ENDIF
ENDIF
In this example, the result would be "Y Was Not
Entered" and on the next line "X Was Entered". Notice how
the IF's can be deep.
Page 131.
Eg
:jumpback
GETCHOICE WXY 1
IF 1 = "Y"
DISPLAY "Y Was Entered|"
ELSE
DISPLAY "Y Was Not Entered|"
IF 1 = "X"
DISPLAY "I actually wanted a W or Y|"
GOTO jumpback
ENDIF
DISPLAY "W Was Entered|"
ENDIF
In this example, the script keeps on asking the user
until he/she enters W or Y. Whenever an X is entered, it
jumps back to the start for another Choice.
IF's can also use other testing methods, than use
equals. They can also use <=, >=, <, > and <>. This makes
the possibilities endless.
Eg
ASK 1 1
IF 1 <= "M"
DISPLAY "A letter less than or equal to M was entered.|"
ELSE
DISPLAY "A letter greater than M was entered.|"
ENDIF
This, testing might be all well and good, but what
about numeric testing? Well, Ezycom does this as well.
Simply do NOT place quotes around the number you wish to be
tested. If a number was expected in the variable, but a
letter was placed there instead, then Ezycom gives the
variable a value of 2,000,000,000. Although, no commas can
be placed in the command.
Page 132.
Eg
:jumpback
ASK 4 1
IF 1 < 2000
DISPLAY "The Number was less than 2000.|"
ELSE
IF 1 = 2000000000
DISPLAY "Please ENTER a numeric value.|"
GOTO jumpback
ENDIF
DISPLAY "The Number was greater than or equal to 2000.|"
ENDIF
:<label>
GOTO <label>
Ezycom, also allows you to move around the script using
GOTOs. These are common in BASIC languages. A GOTO moves
the current position in the script to the next command after
:<label>. If Ezycom, finds a :<label> without GOTOing to
it, it is simply ignored. The labels are NOT case
sensitive.
Eg
:JumPiT
DISPLAY "Enter Something "
ASK 4 1
IF 1 = ""
DISPLAY "Please Enter Something|"
GOTO jumPIT
ENDIF
GOTOXY <xpos> <ypos>
GOTOXY moves the text cursor to that defined in the command
line. Note that this does not work in ASCII.
Eg
SETVARS "*G" 1
IF 1 = "0"
DISPLAY "ASCII User|"
GOTO :getoutofhere
ENDIF
MENUCMND 5 DISP
GOTOXY 5 5
ASK 5 1
OUTPUTANSWER "Answer " 1
GOTO skip
:getoutofhere
MENUCMND 5 DISP
ASK 5 1
OUTPUTANSWER "Answer " 1
:skip
QUIT
Page 133.
CREATE
Create deletes the current Answer file, and restarts it.
This can be used ANYWHERE within the Script language. If
you are Creating DOOR files, this is an good option to use.
SETREGRESET
SETREGRESET, resets the registration date to Today's Date.
This would typically be used in REGEXP.Q-A. As the user's
registration has just expired. His/her registration date is
then started again, but you would lower his/her security
level. So, when he/she paid you more money, then all you
have to do is up their security level, and they are back on
target.
Eg (REGEXP.Q-A)
DISPLAY "Your Registration has Just Expired|"
SETREGRESET
SETVARS "*S" 1
IF 1 = 10
DISPLAY "Didn't register again... You Now have hardly"
DISPLAY "any time per day|"
setsecurity 5
ELSE
setsecurity 10
ENDIF
ASK <length> <var num>
ASK, asks the user for a string (A sequence of characters).
The string length maximum is that defined with <length>.
The result is placed in <var num>. If, used in conjunction
with CAPITALIZE, then the text entered can be forcefully
capitalized. The <var num> can be a number from 1 to 50.
Length can be from 1 to 255.
Eg
ASK 20 1
DISPLAYASW 1
Would ASK the user for a string of maximum length 20
characters, and store it in variable 1.
Page 134.
SETGROUP <group> <ON|OFF|TOGGLE>
SETGROUP, sets the current group (file and message) for the
user. <group> is the group letter (A through Z), which you
wish the command to act on. Instead of specifying a group,
"*" can be used, to globally set ALL groups ON or OFF
(TOGGLE is NOT support for Global Group Setting). The
second switch (ON|OFF|TOGGLE) sets the user's group to
either ON or OFF or TOGGLE's the group.
Eg
SETGROUP * OFF
SETGROUP A ON
This would set all groups off, then set Group A to ON.
Page 135.
Appendix B (Multiline Operation)
Multiline Operation
-------------------
Ezycom has been tested successfully with Desqview,
Lantastic and Novell. It has been tried on Double DOS, but
this has not been extensive testing. Ezycom provides
support for Desqview, Double DOS, Taskview, Topview and
MultiDOS Plus Multitaskers in that when Ezycom is waiting
for something to happen, it will give away its time slice so
that other tasks may use it. Ezycom's file locking routines
require SHARE to be loaded, and a common problem if it is
not loaded, is internode communication does not work.
When using Ezycom in multiline operation, you do not
have to place each line in separate directories. Ezycom has
been written in such a way, to allow all nodes to be run in
the one directory. As every node is in one directory, a
problem might arise with using different configurations for
each node. This can be solved by copying the configuration
(CONFIG.EZY) to CONFIG.<node> (Eg CONFIG.1). Then, Ezycom
will ALWAYS loaded CONFIG.1 for node 1. Also, you can have
a few nodes reading the same CONFIG.EZY in one directory,
and have other nodes reading different CONFIG.EZY in a
different directory. This might be desirable if you had
4x2400 baud modems and 4x9600 baud modems for instance.
Ezycom looks for CONFIG.<node> firstly, then CONFIG.EZY in
the current directory, then CONFIG.EZY in the systempath
(pointed to by the EZY environment variable). To edit
CONFIG.2, the config would be run as "CONFIG -N2".
However, if Ezycom is being used with either the
QUICKED, or TOPED full screen editors, then each line of
Ezycom MUST be run in seperate directories. If, EzyEdit or
the Internal Editor is being used, then Ezycom will run
every line in one directory (if so desired).
Not only can CONFIG.EZY be arrange using this
CONFIG.<node> method, but all the other configuration files
including EVENTS, PROTOCOL, etc. The only exceptions to this
rule are STRING.EZY, MESSAGES.EZY, FILES.EZY and
ECHOMGR.EZY. Ezycom will ALWAYS locate these files in the
systempath, and can not be overridden. So it is quite
possible to have different events for each node using
EVENTS.1 for node 1 and EVENTS.2 for node 2. Do not forget,
that to edit any configuration files for nodes other than 1,
you MUST place a -N<node> on the command line of CONFIG. Eg
CONFIG -N2.
Ezycom supports up to 8 nodes locally, that is COM1
through COM8. You must however, be able to configure your
FOSSIL driver to this. Remember, that the external programs
(Eg Door Games) also have to support it!
Page 136.
Each node will most likely require a different batch
file to run it, although you could use a command line
parameter and use %1 (etc) for the node number.
When using external programs, you MUST make sure if
they are multinode capable, and if NOT, then only allow one
user to access them at anyone time. Another method would be
to restrict certain DOORs to nodes, using the Menu Option
"Node". If, you have any problems with multinode operation,
please don't hesitate to write us a message in our Support
Conference.
Multidos Plus
-------------
Ezycom can not detect this, so you have to change the
configuration to point to MultiDOS Plus. It has NOT been
tested with MultiDOS. We have used information from various
people to give time slices away for it. If you have any
problems, simply unselect it. Please let us know how it
works with MultiDOS PLUS.
Networks
--------
Ezycom works basically like a Multitasker in a network.
It doesn't need to know anything about the Network, so it
doesn't detect its presence. You must however, load SHARE
(or equivalent) on the File Servers of the Network. When
using Novell, Ezycom detects "Double DOS" multitasker. To
stop this, turn off multitasker detection.
Ezycom Utilities
----------------
Although Ezycom can have multiple nodes running at the
same time, its utilities do not function while
nodes/utilities are running, with the exception of EZYMAIL,
EZYNET and FEdit.
EzyMail will function fine while one or more lines are
running, as long as you are using a different log file for
EzyMail, than the other nodes running. For instance, if
node 1 was running, and you wanted to run EzyMail, then you
might run EzyMail as node 2.
Eg: EZYMAIL -TOSS -N2
Note: You can NOT run two versions of EzyMail or Ezynet
simultaneously.
EzyNet functions exactly the same way as EzyMail.
FEdit does not log to a log file, so there are no
restrictions whatsoever while nodes are running.
EYZFF does not function while any nodes are active, this
prevents you from adding New Files to your Database, while
Page 137.
users are online. To overcome this, you can logon local,
and upload the files locally, or you can use Colin Berg's
(Fido 3:635/500) EzyUp to accomplish the same thing, but
without logging on.
Page 138.
Appendix C (File Control Characters)
Avt/Ans/Asc/Asl File Control Characters
---------------------------------------
These are control charterers that can be placed in any
of your Avt/Ans/Asc/Asl files. These functions will be
initiated once the imbedded control character is reached
within the Avt/Ans/Asc/Asl file. For example to show the
user's name you would have a control code of ^FA (Ctrl-F A).
To wait for a key, you would have a control code of ^A
(Ctrl-A). To display the total system calls you would have
a control code of ^FA (Ctrl-F A).
The first set of control characters do not require ^F
or ^K to precede the required function, but the others
require ^F or ^K to precede them, as shown.
ASCII Ctrl-Code Description
----- --------- ----------------------------
01 ^A Wait for [Enter] Key to be Pressed.
02 ^B Disable Abort with "S" key
03 ^C Enable Abort with "S" key
04 ^D Disable "Continue" Prompt
05 ^E Enable "Continue" Prompt
06 ^F @Insert User Parameter
07 ^G Beep at User's End
08 ^H Backspace
09 ^I Move Forward 8 spaces
10 ^J Line Feed
11 ^K @Insert System Parameter
12 ^L Clear Screen
13 ^M Carriage Return
22 ^W Pause for One Second
23 ^V Reserved for Avatar
24 ^Y Reserved for Avatar
Page 139.
User Parameters
Add a Control-F to Precede The User Parameters.
ASCII Character Description
----- --------- -------------------
65 A User's Name
66 B Location
67 C Password
68 D Business/Data Phone
69 E Voice Phone
70 F Date of Last Call
71 G Time of Last Call
72 H Flag A
73 I Flag B
74 J Flag C
75 K Flag D
76 L Netmail Credit
77 M Messages Posted
78 N Date Format (DDMMYY/MMDDYY)
79 O Security Level
80 P Number of Calls to BBS
81 Q Number of Uploads (Files)
82 R Number of Uploads (Kilobytes)
83 S Number of Downloads (Files)
84 T Number of Downloads (Kilobytes)
85 U User/Sysop Comment
86 V Screen Length
87 W First Name Only
88 X ANSI (On/Off)
89 Y Continue (On/Off)
90 Z Screen Clearing (On/Off)
48 0 Full Screen Editor (On/Off)
49 1 Quiet (Multi-Line) (On/Off)
50 2 Extended IBM Characters (On/Off)
51 3 Time Banked
52 4 Kilobytes Banked
53 5 FilePoints
54 6 User's Alias
55 7 Date of First Call
56 8 Date of Birth
57 9 Subscription Expiry Date (Registered)
96 a Days till Expiry Date (Registered)
97 b AVATAR (On/Off)
98 c Ratio for Files
99 d Credit for Files
100 e Number of Files Downloadable
until Ratio Expires.
101 f Number of Files to Upload
until Ratio is Even.
Page 140.
User Parameters (Continued)
ASCII Character Description
----- --------- --------------
102 g Ratio for Kilobytes
103 h Credit for Kilobytes
104 i Number of Kilobytes Left
until ratio Expires.
105 j Number of Kilobytes to
upload until ratio is even.
106 k Default Protocol
107 l Number of Kilobytes for File Points
108 m Last NEW File Search Date
109 n Post/Call Percentage for Security
110 o Credit for Post/Call ratio
111 p Number of Msgs behind Post / Call
ratio
112 q Number of Msgs in front of Post/ Call
113 r Graphics Mode (Verbose)
114 s Users Post/Call Percentage
115 t File Points awarded since last session
33 ! Message Quote Colour
64 @ Message Text Colour
35 # Message Prompt Foreground Colour
36 $ Message Prompt Background Colour
37 % Filename Colour
94 ^ File Size Colour
38 & File Date Colour
42 * File Description Colour
40 ( Uploader Colour
Page 141.
System Parameters (Preceded by Ctrl-K)
ASCII Character Description
----- --------- ------------------------------------
65 A Total System Calls
66 B Last Caller (any line)
67 C Number of Messages (Total)
68 D Number of Msgs in Template Msg Area
69 E Maximum K Download
70 F Number of Times user has Paged Sysop
71 G Day of Week (Complete)
72 H Number of Users
73 I Time in 24 format
74 J Today's Date
75 K Minutes Connected this Call
76 L Number of Current Template file area
77 M Minutes Used Today
78 N Number of Current Template Msg Area
79 O Minutes Remaining Today
80 P Downloads (K) Left Today
81 Q Daily Time Limit
82 R Current Baud Rate
83 S Day of the week (abbreviated)
84 T Daily Download limit
85 U Minutes Until Next System Event
86 V 24 hour format time of the next event
87 W Node Number (Multi-Line)
88 X Terminates Session
89 Y Name of Message Area
90 Z Name of File Area
48 0 Time before a menu option can be
activated.
49 1 Start Time for last invalid menu Opt
50 2 End Time for last invalid Menu Opt
51 3 Number of Files in Template file Area
52 4 Total Number of Files
53 5 Number of New Users Today
54 6 Number of New Messages Today
55 7 Number of New Files Today
56 8 Total Amount of Files in Kilobytes
57 9 Last Callers Alias
96 a Ezycom Version Number
97 b<hex> Changes the users current colour to
<hex>. See Appendix G.
98 c Number of session failures since last
session.
Page 142.
Appendix D (Menu Commands)
The following commands are used to create your menus.
Ezycom has approximately 80 different menu types for
use in menus. Following is a list these commands. A few
conventions have been used:
<....> : Means that is a necessary option and must be
included for the menu command to function correctly
[....] : This means that it is optional information.
| : This means "or". Eg 1 | 2 would mean 1 or 2, but
not 1 and 2.
Menu Types
Option 0 Display
Miscdata None
This command simply does NOTHING, and is included for
display line purposes only.
Option 1 Goto Menu
Miscdata <MENUNAME> | /TOPMENU
[Password]
[/F=<file area template number>
| + | - | <group>]
[/M=<message area template number>
| + | - | <group>]
[/NC]
This command allows the movement from the current menu
to another. The menu name, which Ezycom will move to when
activated is indicated in the <MENUNAME>. The <MENUNAME>
must not include the .MNU extension, as that is appended by
Ezycom automatically. If, /TOPMENU is used instead of
<MENUNAME>, then the user will be moved to the TOP MENU when
selecting this option. Optionally, a [Password] may be
specified. The user must then type in the Password
correctly before he/she can gain entry to the menu. As
stated in the Menu Templating documentation the /F= and /M=
commands are valid for the Goto Menu Command. The Optional
parameter /NC means, that NO CLEAR SCREEN command will be
sent to the user when displaying the new menu.
Eg: Miscdata /TOPMENU ourpassword /F=+
Page 143.
Option 2 Gosub Menu
Miscdata <MENUNAME> | /TOPMENU>
[Password]
[/F=<file area template number>
| + | - | <group>]
[/M=<message area template number>
| + | - | <group>]
[/NC]
This command works exactly like the GOTO menu command
except that it leaves its FILENAME on the GOSUB MENU STACK,
so you can later return to this MENU using Option 3 (Return
from Gosub).
Option 3 Return from Gosub
Miscdata None
This commands returns to the last menu where a GOSUB
menu command was used.
Option 4 Goto and Clear Gosub Stack
Miscdata <MENUNAME> | /TOPMENU
[Password]
[/F=<file area template number>
| + | - | <group>]
[/M=<message area template number>
| + | - | <group]
[/NC]
This command behaves exactly like the GOTO menu command
except that it CLEARS the GOSUB menu stack, so you can not
return from anymore menus until you have GOSUB'd to more.
Option 5 Display ANS/ASC/ASL/AVT
Miscdata <Textfile>
This command Displays a <textfile> onto the users
screens. This command does NOT support MENU hotkeys. The
<textfile> name should not include the extension, as Ezycom
automatically determines this, according to the users
Terminal Emulation Options.
Page 144.
Option 6 Bulletin Menu
Miscdata <1-8 character name>
Displays the <1-8 character name> file in the text file
directories. The user is then prompted for a remaining part
of the file name (8 - <length of file>). The file is then
displayed. No extension should be placed in the filename.
Page 145.
Option 7 DOS Shell
Miscdata <program to execute> [parameters]
The <program to execute> is the name of the program you
wish to run. If, a COM or EXE file is being executed, then
just the name of the program and extension is required.
Eg: EZYED.EXE
However, if a batch file is being run, then a command
line interpreter needs to be loaded (COMMAND.COM).
Eg: C:\COMMAND.COM /C GAME.BAT
Instead of specifying the entire path to COMMAND.COM,
the COMSPEC environment variable can be used to retrieve the
path. In this case, the C:\COMMAND.COM would be replaced by
*C.
Eg: *C /C GAME.BAT
On executing a Type 7 Shell, Ezycom writes two files,
EXITINFO.<node> and DORINFOx.DEF. The name for DORINFOx.DEF
is configurable and can be changed with the list of special
commands later. The EXITINFO.<node> holds ezycom specific
information, that it uses to run. On returning to Ezycom
after the Type 7 Shell, Ezycom reads in the EXITINFO.<node>
file, to process any information that might have been
changed.
*F User's First Name
*L User's Last Name
*H The Fossil Driver is left "Hot" during the Type 7
Shell. Generally this option is not used.
*M Swap out Ezycom leaving using 9k ram. This enables
larger programs to be executed in the Type 7 Shell,
although swapping can take a few seconds, if Disk
Swapping is used.
*P Comport Number
*R User Record Number
*G ANSI On/Off On=1 Off=0
*V ANSI/Avatar On/Off
3 ANSI & Avatar
2 Avatar
1 ANSI
0 ASCII
*A Users Alias (Real Name if there is no alias)
*C COMSPEC Environment variable (COMMAND.COM)
*S User's Security Level
*N Node : Format 1..250
*9 Node : Format FO1..250
Page 146.
This format could be used for renaming/copying
dorinfoX.def to a naming convention that some door programs
might prefer.
*0 This switch is replaced by the current File Area
Template number.
*1 This switch is replaced by the current Message Area
Template number.
*2 This is the upload path for the current file area
template.
&V This is the same as *V, except that it places the *V
information in the Dorinfox.def and DOOR.SYS files.
&A This is the same as *A, except that it places the
Alias of the user in the Dorinfox.def and DOOR.SYS files
instead of the user's real name.
&O This is the same as *O, except that it places the
Locked Baud rate in the Dorinfox.def and DOOR.SYS files
instead of the effective baud rates. That is, if the
comport is locked.
*D1 This option creates the Dorinxxx.def on executing the
Type 7 Shell where xxx is the *9 Node Format.
*D2 This option creates the Dorinfo1.Def on executing the
Type 7 Shell.
*D3 This option creates Doorx.Def on executing the Type 7
Shell where x is the *N Node Format
*D4 This option creates a doorway compatible Door.sys file
in executing the Type 7 Shell.
*! This option stops the clock when the user is in the
Type 7 Exit. That is, the user does not loose anytime in
the Shell.
*# This option turns off the Type 7 Exit Flag.
*B This is the users effective Baud Rate. If, the user
is local then the baud rate is 0.
*O This is the users actual Baud Rate between the
computer and modem. If the comport is NOT locked, then it
is the same value as the effective Baud Rate.
These options can be used in the parameters field of
the Type 7 Exit.
Eg: GAME.EXE *F *L *P
This would translate to for instance,
GAME.EXE Peter Davies 1.
Option 8 Version of Ezycom
Miscdata None
This option displays the current version of Ezycom.
Page 147.
Option 9 Logoff/Terminate Call
Miscdata [/NOHANGUP] [/ERR=<errorlevel>]
This option displays GOODBYE.A* (if it exists), before
hanging up the user. If, the /NOHANGUP flag is used, then
the users Carrier, is not dropped during the termination of
the call. The [/ERR=<errorlevel>] command, tells Ezycom
that you wish to exit Ezycom with an errorlevel. The
errorlevel must be from 20 through to 255.
Eg: /NOHANGUP /ERR=25
If, both of these options are used together, and with
some intelligent batch file programming, it is possible to
make a relogon option.
Option 10 Display System Usage Graph for Each Line
Miscdata None
This option displays the system Usage of the node
number, since TIME<node>.BBS was created.
Option 11 Page System Operator for Chat
Miscdata String to Display to User (about chat)
This option pages the sysop for a chat request, and
sends the miscdata line to the user. A suitable line for
miscdata might be "Paging Sysop for a Chat... Please
Wait...".
Option 12 Questionnaire Language
Miscdata <questionnaire name> [output file]
This option executes a Questionnaire. The
Questionnaires are named <questionnaire name>.Q-A in your
system directory. [output file] is the name of the answer
file you wish to use. See "Questionnaires" in Appendix A
for information about Questionnaires.
Page 148.
Option 13 User List
Miscdata [/A] [/C] [/S] [>=<security] [<=<security>]
[=<security>] [<<security>]
[><security>]
This option displays a list of all the users on the
system. Various options exist. They are
/A : Show user's aliases instead of real names
/C : Displays user's comments, instead of their location
/S : Displays user's security, instead of number of calls
>=<security>
: User's security must be equal to or greater than the
security to be displayed
<=<security>
: User's security must be less than or equal to the
security to be displayed
=<security>
: User's security must be less than or equal to the
security to be displayed
<<security>
: User's security must be less than the security to be
displayed
><security>
: User's security must be greater than the security to
be displayed
Option 14 Display Time Statistics
Miscdata None
This option displays time statistics about the user on-
line.
Option 15 Exit with Errorlevel
Miscdata <errorlevel>
This option exits Ezycom with <errorlevel>, which must
be in range from 20 to 255. Ezycom can relogon the user
using the -R option. This option would only be used if the
door games are so big that they can not run inside of a Type
7 Shell, even with Swapping.
Option 16 Change User's Location
Miscdata None
This option allows the user to change his/her location.
Page 149.
Option 17 Change User's Password
Miscdata None
This option allows the user to change his/her password.
Option 18 Change User's Screen Length
Miscdata None
This option allows the user to change his/her screen
length.
Option 19 Toggle Screen Clearing
Miscdata None
This option allows the user to toggle screen clearing
codes being sent to him/her.
Option 20 Toggle Page Pausing
Miscdata None
This option allows the user to toggle page pausing.
Option 21 Toggle ANSI Graphics
Miscdata None
This option allows the user to toggle ANSI Graphics.
Option 22 Check Mail
Miscdata [/G=<groups>]
This option allows the user to check for mail waiting.
Optionially, the groups used for checking mail can be used
to override the user's groups.
Eg: Miscdata /G=ABC
Page 150.
Option 23 Read Message
Miscdata <message board> | /M
This option allows the user to read a particular
conference. If /M is placed in Miscdata, then the current
message area template is used, otherwise the message board
selected is used.
While reading messages, the user/sysop is presented
with various keys, they are:
[A]gain : Display the message again.
[L]ast : Go back to the previous message.
[N]ext : Move to the next message.
[R]eply : Reply to the message.
[W]rite : Write a message.
[D]elete : Delete a message.
[F]orward : Forward the message to someone else.
[E]dit : Edit the message.
[K]eep : Keep the message unread.
[!] : Shows hidden information in the message.
[S]top : Stop reading messages.
[U]pdate : Update the user who the message is from.
Alt-M : (Local Only) Fully Update User who the
message is from.
e[X]port : (Local Only) Export the message to Disk.
If, the filename is PRN/LTP1/LPT2/LPT3,
then the message is printed.
In the [E]dit mode, various attributes of the message
can be edited. The most powerful feature is the No-Kill
flag. If, this is set to On, then MSGCOMP will NEVER delete
the message, until the message is deleted by a User.
Option 24 Scan Messages
Miscdata <message board> | /M
This option is the same as Option 23, except that none
of the message body is display to the user.
Option 25 Quick Scan Messages
Miscdata <message board> | /M
This option is the same as Option 24, except that the
information displayed, is on one line, allowing an even
briefer view of the messages.
Page 151.
Option 26 Delete Message
Miscdata <message board> or /M
This option allows the user to delete individual
messages for a particular message area. The user can only
delete message(s), if they are A) A Sysop of that Message
Area, B) They wrote the message and it is not an echomail
message, or C) They received the message and it is not an
echomail message. If, the user does not fall into one of
these categories, then they will not be able to delete the
message(s).
Option 27 Post Message
Miscdata <message board> | /M
[/T=<to_user_name>] [/S=<subject>]
[/L]
Post Message, allows users to post a message into a
conference pointed to <message board> or /M (the current
message area template). The menu creator can FORCE the name
of the message to be posted to, by placing a
/T=<to_user_name> in. Note that when using this command, if
the name has TWO words, an underscore must be placed between
them.
Eg: /T=Peter_Davies
Also, the subject can be forced as well. This can be
accomplished by using the /S=<subject> field. As with the
/T option, an underscore MUST be used to separate words.
The /L option can be used to logoff the user
immediately after he/she posts the message. The special
feature about this option, is that if the user does not post
the message, they are not logged off.
Option 28 Set Combined Area
Miscdata None
This option allows the user to individually select
which message areas they want on/off for Global Message
Options. Ezycom has two Global Message Options, Check For
Mail, and Read Global New Messages. If, a user turned off a
conference, then they would never read any messages for
those conferences using those two options.
Page 152.
Option 29 Read Global New Messages
Miscdata [/SCAN | /LIST] [/G=<groups>]
This option allows the user to read all messages which
he/she has not read. Optionially, /SCAN can be used to tell
Ezycom to do scanning for new mail, instead of reading new
mail. Optionially, /LIST can be used to tell Ezycom to list
the messages, instead of readnew new mail. Optionially, the
user's groups can be over ridden with the /G=<groups>
command.
Option 30 BiModem
Miscdata <upload area> | /F
This option allows users to transfer BIDIRECTIONALLY
using the BiModem External Protocol. The path for BiModem
must be set before this option will work. Also, the
configuration files for BiModem (Bimodem.1 Bimodem.2 etc)
must have also been placed in the path. See "BiModem" for
more information on it. The <upload area> | /F, specifies
what upload area do you wish the uploads to be placed in.
If, /F is used, then uploads could be redirected to another
file area if "Upload File Area" for that file area, points
to a different file area. If, the actual file area number
is used, then all the uploads are always placed in that file
area, that is, no redirection can occur.
Option 31 View File List
MiscData <file area> | /F
[/NEW]
[/G=<groups>]
View a file list for <file area> or /F (current file
area template). Simply, if the user has access to the file
area, they can view the file list for it. If, /NEW is used,
then only NEW files in that file list will be displayed.
Optionially, the user's groups for viewing can be over
ridden using the /G=<groups> command. While viewing the
file list, the user is given an option to add to batch (if
more prompt is turned on). The user can add files to the
batch, using filenames (wildcards supported), or by typing
in the number of the file. Eg: +1 +2. Instead of typing in
the numbers of the files for say 1 to 10, the user could
also do +1-10. It is suggested that you make up a standard
msg to send to all newusers telling them how to use this
feature. It makes file batching VERY quick.
Page 153.
Option 32 Global Download
Miscdata None
Globally download files from the BBS. The users can
download files from anywhere on the system, so long as they
have access to the file areas. This option also supports
all the batch commands.
Option 33 Upload
Miscdata <upload area> | /F
This option allows the user to upload files to the
system. If <upload area> is used, then uploads are ALWAYS
uploaded to that file area, no redirection can take place.
If, /F (current file area template) is used, then uploads
are placed in that file areas template upload area. That
is, if the file areas upload area pointed to another file
area, then uploads would be placed in that other file area.
Option 34 View Contents of Archive
Miscdata None
This option allows users to view the contents of ZIP,
LZH, PAK, ARC, ZOO, GIF and ARJ files anywhere on the
system, as long as they have download accesss to those
files.
Option 35 Scan File Areas by Keyword
Miscdata [file areas to search and/or /F]
[/G=<groups>]
This option allows users to search through the file
areas by using a keyword. Miscdata can Optionally contain a
list of file areas that can be used to search. If, miscdata
is blank, then all file areas are searched. An example
miscdata might be
Miscdata 1 /F
This would mean that first of all, file area 1 is
scanned, then the current file area template is scanned.
If, they were reversed on the Miscdata line, that is "/F 1",
then the current file area template would be searched first,
then file area 1.
Optionially, /G=<groups> can be used to override the
user's groups for viewing.
Page 154.
Option 36 Scan File Areas by Filespec
Miscdata [file areas to search and/or /F]
[/G=<groups>]
This option allows users to search through the file
areas by using a filespec. A filespec, is a file
specification. This could include DOS/UNIX valid wild cards
such as * and ?, for example to list all files, *.* would be
used. As with Menu Type 35, the file areas to list can be
selected for this Menu Type. They work in EXACTLY the same
way as Option 35. Optionially, the user's groups can be
used to override the user's groups for viewing using the
/G=<groups>.
Option 37 List of New Files Since Last Time Viewed
Miscdata [file areas to search and/or /F]
[/G=<groups>]
This option allows users to view new files, since the
last time they executed this option, or the view new files
option at logon. For instance, if the user logged on, and
did not did a new files list in that session, then the next
time they do a new files list, they will see all the files
since the last time the did this option, not the last time
they logged on. The Miscdata also allows the specification
of which file areas to scan. The file areas are listed
EXACTLY the same way as with Option 35. Optionially, the
/G=<groups> can be used, to override the current user's
groups for this command.
Option 38 View Text File Specified by the User
Miscdata None
This option allows users to view text files, that are
in file areas. The user is asked for the filename of the
text file to view. Note that this is a GLOBAL option, so
the users do not have to be in the correct file area to view
the text file.
Option 39 Display Direct Text File
Miscdata <Textfile Name>
This option allows the viewing of a textfile name,
specified by <Textfile Name>. This filename should also
include the extension.
Eg: C:\EZY\SOLUTION\PQ3.SOL
Page 155.
Option 40 Display AVT/ANS/ASC/ASL with Menu Hotkeys
Miscdata <FileName> | /MENU
This option allows the displaying of AVT/ANS/ASC/ASL
with the use of Menu Hotkeys. Typically, this option would
be used as an automatic option at the top of a MENU. The
<FileName> should NOT include an extension.
Eg: QUICKF
The /MENU command can be used instead of the filename,
this option automatically replaces itself, with the FileName
of the current Menu. For example, if Ezycom was in the Menu
Top, and if the /MENU command was used in the miscdata, then
Ezycom would display the TOP.A* textfile.
Option 41 Toggle Full Screen Editor
Miscdata None
This option allows the user to toggle the use of the
full screen editor.
Option 42 Toggle IBM Extended Characters
Miscdata None
This option allows the user to toggle the user of the
IBM Extended Character Set. This will tell Ezycom whether
or not to use the .ASC files or the .ASL files for menu
display for ASCII users.
Page 156.
Option 43 View Nodelist
Miscdata /M | <msgboard> | /N=<network address>
This option allows you to view a nodelist, which has
been setup with EZYNODE (See EZYNODE for configuration).
If, /M is used on the command line, then the current message
template area is used to view the nodelist. If, <msgboard>
is used, then that message board's nodelist will be used.
If, /N=<network address> is used, then that <network
address> is used to view the nodelist. Note that when
viewing the nodelist from a message board, only echomail or
netmail areas will work.
Eg: Miscdata: /M (Current Message Area)
1 (Message Board 1)
/N=3:636/213 (Network Address 3:636/213)
Option 44 Set Combined Areas (Global)
Miscdata None
This option allows the user to set all of their
combined areas to either ON, OFF or the DEFAULT values.
Option 45 Display AVT/ANS/ASC/ASL with Pause at End
Miscdata <FileName> or /MENU
This option displays the text file, then asks the user
to press enter after the displaying of it has finished.
Again, the /MENU command can be used to substitute the MENU
name for the filename. The FileName should not include
paths, or extensions.
Eg: QUICKF
Option 46 Display Direct ASC File with Pause at End
Miscdata <TextFile>
This option displays <TextFile> to the screen and
pauses at the end. This option is basically the same as
Option 39, except the pause is at the end. In this option,
the FULL path, name and extension should be given.
Eg: C:\EZY\FILES\PQ3.SOL
Page 157.
Option 47 Make a System Log Entry
Miscdata Text to Place in Log
This option allows an entry in the log to be used.
Typically, this would be an automatic option, and would be
used to indicate that the user moved into a menu on the
board. The smart text codes of "@" and "`" can be used to
indicate the current file area template and the current
message area template respectively.
Option 48 Download Specific
Miscdata <filename> [/FREE]
This option allows the user to download the file
pointed to be <filename>. <filename> should be a full path
and extension of the file. Optionally, the /FREE switch can
be used, to signify a free download for the user.
Option 49 Message Area Change
Miscdata [text file] [/G=<groups>]
This option gives the user a list of message areas, and
changes the current message area template to the message
area they select. If, you want to make your own list of
message areas, then place the filename (no extension) of the
textfile to be used instead in the miscdata like.
Optionially, /G=<groups> can be used to override the default
user's groups for this command.
Eg: Miscdata MESSAREA
Option 50 File Area Change
Miscdata [text file] [/G=<groups>]
This option is basically the same as Option 49, except
that it changes the current file area template instead.
Optionially, /G=<groups> can be used to override the default
user's groups for this command.
Page 158.
Option 51 Today/Yesterday's Callers
Miscdata [/A] [/Y]
This option displays a list of todays or yesterdays
callers to the Bulletin Board Service. If, /Y is placed in
miscdata, then Yesterday's callers are shown, otherwise
Today's callers are shown. If, /A is used in Miscdata, then
aliases are used instead of real names.
When a list of today's callers is displayed, a DidWhat?
field is shown. They represent certain actions the user did
while online. They are:
N = NewUser
R = Read Messages
S = Sent Messages
D = Downloaded
U = Uploaded
P = Paged Operator
C = Chatted with Sysop
O = Outside Ezycom (type 7/15 shell)
Option 52 Display Who's On-Line
Miscdata [/A]
This option displays a list of users who are currently
online. This option works across networks and/or
multitaskers, to show every user, who is using Ezycom. If,
the /A switch is used on the Miscdata line, then Aliases are
shown instead of real names.
Option 53 Toggle Quiet Mode
Miscdata None
This option toggles the Quiet Mode. Quiet Mode, stops
users of other lines from sending a message to your node.
Option 54 Send Message To Other Line
Miscdata [/A]
This option allows the user currently online, to send a
message to a user on another line. The message arrives only
while users are in the menu system, not while reading
messages, or in an menu option, and more. If, the /A switch
is used, aliases are shown instead of real names.
Page 159.
Option 55 Download anyfile
Miscdata None
This option allows user(s) to download files from
ANYWHERE on the system. They can specify a full pathname to
download the files. This option should only be made
available to the Sysop, or not used at all.
Option 56 Import a text file into a message
Miscdata <message boad> | /M
[/U=<from_username>]
[/T=<to_username>]
/S=<subject>
/L=<text file>
This option is used for importing a text file, into the
BBS. The main use for this option, would be to post a
message to a newuser. The <message board> | /M specify
which message area the message will be posted in. The /U
command specifies the from user name. All spaces in the
names must use an UNDERSCORE characters.
Eg: /U=Peter_Davies
If, the /U command is left out, then the from user name
defaults to the name of the user currently online. The /T
command is mostly the same as the /U command, except that it
specifies the name of who the message is to be posted to.
If, the /T command is omitted, then the message is posted to
the name of the user online. The /S command specifies the
subject of the message and is not an optional parameter.
The /L commands specifies a fully qualified filename (path,
name and extension), of the file which contains the message
to be imported into a message area and is not an optional
parameter.
This command supports the Ctrl-F/K smart text codes in
the text file to be imported.
Page 160.
Option 57 Change home/voice number
Miscdata None
This option allows the user to change his/her home
voice phone number.
Option 58 Change business/data number
Miscdata None
This option allows the user to change his/her
business/data phone number.
Option 59 Reserved for Future Expansion
Option 60 Reserved for Future Expansion
Option 61 Avatar On/Off
Miscdata None
This option allows the user to turn Avatar Graphics
On/Off.
Option 62 List Batch
Miscdata None
This option displays the current contents of the user's
download batch.
Option 63 Erase Batch
Miscdata None
This option erases the entire contents of the user's
download batch.
Option 64 Add Files to Batch
Miscdata None
This option allows the user to add files to his/her
download batch.
Page 161.
Option 65 Erase Single Files from Batch
Miscdata None
This option allows the user to erase single/multiple
files from the download batch.
Option 66 Multiline Chat
Miscdata [/A]
This option allows the chatting between two or more
users on different nodes of the Bulletin Board. The
optional /A switch, forces Aliases instead of Real Names.
Option 67 Change to Message Area and Unread Mail
Miscdata None
This option is the same as option 49 (change to message
area), except that the user is told if their is new/unread
mail in an area.
Option 68 Produce Online Master List
Miscdata [/FREE] (Free Download)
[/RAW] (Allow Raw File Download)
[/ZIP] (Allow ZIP Compression)
[/LZH] (Allow LZH Compression)
[/ARJ] (Allow ARJ Compression)
[/SWAP] (Swap Out Ezycom on Compression)
This option allows the user to download a master list
that is generated online. /RAW, /ZIP, /LZH, /ARJ allows the
sysop to define which archive formats are allowable for the
download of the master list. The /SWAP command will swap
ezycom out, only leaving 8K of memory resident. If, the
/FREE command is used, the download is free. It is
recommended, the systems with large file areas to not use
this option, and just make a master file list daily.
Page 162.
Option 69 Turn Local Display On or Off
Miscdata ON | OFF | TOGGLE
This option turns on/off the local display, when a
remote user is on-line. (Does nothing in local mode). If
ON is used, then the display is turned ON. If, OFF is used,
then the display is turned OFF. If, TOGGLE is used, then
the display is turned ON or OFF depending on its current
state.
Option 70 Toggle MMDDYY/DDMMYY Date Format
Miscdata None
This option allows the user to toggle between the
American and European date formats.
Option 71 Change User Colour
Miscdata <1..8> <+ | ->
This option allows the user to change colours for the
display of message/file areas. The <1..8> is which colour
to change. If "+" is used, then the colour number is
incremented by one. If "-" is used, then the colour number
is decremented by one.
Option 72 Change Alias
Miscdata None
This option allows the user to change his/her alias to
any other name, besides that of another users name/alias.
Option 73 Change Comment
Miscdata None
This option allows the user to define a comment about
him/herself.
Page 163.
Option 74 Clear Screen
Miscdata None
This option simply clears the screen, if the user has
clear screen codes set to On.
Option 75 Display ASC Textfile with Menu Hotkeys
Miscdata <FileName>
This option is the same as Type 40, except only ASC/ASL
menus can be displayed. That can give the user fast menus,
but still have ANSI/AVATAR for other options like the Full
Screen Editor for instance.
Option 76 Get Default Protocol
Miscdata None
This option allows the user to select a default
protocol for download/upload.
Option 77 Add to Time/KiloBytes Bank
MiscData [/K]
This option allows the user to deposit time/kilobytes
into the time/kilobyte bank respectively. The /K switch,
forces the kilobytes bank, instead of the time bank.
Option 78 Withdraw from Time/KiloBytes Bank
MiscData [/K]
This option allows the user to withdraw time/kilobytes
from the time/kilobyte bank respectively. The /K switch,
forces the kilobytes bank, instead of the time bank.
Page 164.
Option 79 Display Best User Stats
MiscData [/M] Display Best Messages
[/C] Display Best Caller
[/UP] Display Best Uploader (Files)
[/DN] Display Best Downloader (Files)
[/FP] Display Best File Points
[/UK] Display Best Uploader (KiloBytes)
[/DK] Display Best Downloader (KiloBytes)
This option displays a users' best list. If, no
options are selected, then all best lists are display. It
is possible to have more than one best list displayed at a
time.
Option 80 Turn off GLOBAL.MNU for this MENU
Miscdata None
This option turns off the GLOBAL menu for this menu.
This should be used as an automatic option, and should be
the first line in the MENU.
Option 81 Write door information files
MiscData [DOORWAY=<filename>]
[DORINFO=<filename>]
*A Place Alias in the Files to written.
*O Place the Locked Port Baud Rate (MaxBaud)
in the Files to written.
*V Use Avatar Standard for Graphics Flags in
DORINFOx.DEF.
*9 Use FO1..250 for Nodes 1 to 250
*N Use 1..250 for Nodes 1 to 250
This option writes the doorway DOOR.SYS, and/or
DORINFO1.DEF file(s) to the filenames of your choosing. The
type 7 parameters listed, can be placed in any parts of the
command line, and will be translated into their meaning.
Eg: DORINFO=DORIN*9.DEF *A *O *V
Page 165.
Appendix E (Operating Batch Files)
The following is a batch file for running Ezycom as a
stand alone system. This batch file will work for any
amount of nodes you like up to 250 that is. For Node 1 just
type BBS with no parameters after the batch file name. For
any other Node type the node number (up to 250) after the
batch file name.
Eg for node 4 type BBS 4
BBS.BAT from the startup file that comes with Ezycom.
@echo off
rem Ezycom Standalone Batch File V1.0
rem Command Format :
rem BBS (for node 1 operation)
rem BBS [node] (for node X operation)
rem [node] is the node number from 1 through to 250
rem Eg BBS 2
cd %EZY%
if %1! == ! SET TASK=1
if not %1! == ! SET TASK=%1
:start
ezy -E25
if errorlevel 27 goto start
if errorlevel 26 goto tossmail
if errorlevel 25 goto start
if errorlevel 24 goto weeklyevent
if errorlevel 23 goto dailyevent
if errorlevel 9 goto start
if errorlevel 8 goto sysopnext
if errorlevel 7 goto netecho
if errorlevel 6 goto netmail
if errorlevel 5 goto echomail
if errorlevel 4 goto modeminit
if errorlevel 3 goto fossil
if errorlevel 2 goto runtimeerror
if errorlevel 1 goto setuperror
goto finish
:weeklyevent
echo Weekly Maintenance Being performed
cd %EZY%
ezyff -c
ezymaint -D
goto start
:dailyevent
echo Daily Maintenance Being performed
cd %EZY%
ezyff -c
ezymaint -p -i -c
ezyff -i
usercomp -B20 -S1 -P -D90 -A
msgcomp -LINK
Page 166.
ezyutil -STRIPLOG -TEZY%TASK%.LOG -D21goto start
:tossmail
cd %EZY%
ezymail -toss
ezynet -import -echoarea
:netecho
echo Net/Echo Mail Entered
cd %EZY%
EZYMAIL -SCAN
:netmail
cd %EZY%
EZYNET -EXPORT
goto start
:echomail
cd %EZY%
EZYMAIL -SCAN
goto start
:fossil
echo Fossil Error
goto finish
:modeminit
echo Modem Init Error
goto finish
:runtimeerror
echo Runtime Error Please consult Errors.log
goto start
:setuperror
echo Setup Error
:finish
echo Ezycom is Down
Page 167.
The following Batch file is for running D'Bridge with
Ezycom. Again this batch file will run any amount of Nodes
you want (up to 250). The syntax is the same as the BBS.BAT
example DBMAILER 2 would run dbridge with node 2 operating.
DBMAILER.BAT
@echo off
rem Ezycom DB Mailer Batch File V1.0
rem Command Format :
rem DBMAILER (for node 1 operation)
rem DBMAILER [node] (for node XX operation)
rem [node] is the node number from 1 through to 250
rem Eg BBS 2
set DBRIDGE=C:\DB {You may have to change this to suit}
rem NOTE : no trailing backslash
if %1! == ! SET TASK=1
if not %1! == ! SET TASK=%1
:EXECDB
cd %DBRIDGE%
echo scan >dbridge.rsn
Db
if errorlevel 100 goto WEEKEND
if errorlevel 90 goto DAILY
if errorlevel 60 goto MAILIN
if errorlevel 50 goto BBS
if errorlevel 45 goto EDITOR
if errorlevel 1 goto EXIT
if errorlevel 0 goto EXIT
goto execdb
:DAILY
cd %EZY%
ezymail -scan
ezynet -export
ezyff -C
ezymaint -C -I -P
ezyff -ID
usercomp -A -S1 -P -B10 -D90
msgcomp -LINK
goto execdb
:MAILIN
ezynet -import -echoarea
ezymail -toss
goto execdb
:BBS
CALL bbs.bat
goto execdb
Page 168.
:EDITOR
cd %DBRIDGE%
dbedit
goto execdb
:WEEKEND
rem weekend event like stuff goes here
cd %EZY%
ezyff -c
ezymaint -D
goto execdb
:EXIT
echo Ezycom is Down
Here is also an excerpt of a d'bridge.aut to show you
how to set the exit to the bbs section in d'bridge setup.
* D'Bridge "Exported Configuration"
* Execute BBS Segment From Dbridge.aut file
After hours filename C:\DB\AHOURS.TXT
Please wait text Please wait...20 sec or Press <esc> <esc>
Loading BBS text Loading another Ezycom bbs.
BBS DOS commands ECHO @C: >BBS.BAT
BBS DOS commands ECHO @CD\EZY >>BBS.BAT
BBS DOS commands ECHO @EZY -B*b -T*t >>bbs.bat
BBS DOS commands *X50
This is explained far better in the D'Bridge user
manual that comes with D'Bridge.
Page 169.
The following batch file is for users of FrontDoor, it
will also run as many Nodes you want. Don't forget to check
if you have to change the set command in your batch file.
@echo off
rem Ezycom FD Mailer Batch File V1.0
rem Command Format :
rem FDMAILER (for node 1 operation)
rem FDMAILER [node] (for node XX operation)
rem [node] is the node number from 1 through to 250
rem Eg BBS 2
set FD=C:\FD
rem NOTE : no trailing backslash
if %1! == ! SET TASK=1
if not %1! == ! SET TASK=%1
:start
cd %FD%
fd
if errorlevel 210 goto 38400baud
if errorlevel 209 goto 19200baud
if errorlevel 208 goto 14400baud
if errorlevel 207 goto 12000baud
if errorlevel 206 goto 9600baud
if errorlevel 205 goto 7200baud
if errorlevel 204 goto 4800baud
if errorlevel 203 goto 2400baud
if errorlevel 202 goto 1275baud
if errorlevel 201 goto 1200baud
if errorlevel 200 goto 300baud
if errorlevel 191 goto scanecho
if errorlevel 190 goto unpackmail
if errorlevel 51 goto localbbs
if errorlevel 50 goto cleanup
if errorlevel 10 goto end
if errorlevel 6 goto fossil
if errorlevel 5 goto modeminit
if errorlevel 4 goto modemresp
if errorlevel 3 goto fulldisk
if errorlevel 2 goto external
if errorlevel 1 goto internal
goto start
:38400baud
cd %EZY%
ezy -b38400 -E20
goto after_ezy
:19200baud
cd %EZY%
ezy -b19200 -E20
goto after_ezy
Page 170.
:14400baud
cd %EZY%
ezy -b14400 -E20
goto after_ezy
:12000baud
cd %EZY%
ezy -b12000 -E20
goto after_ezy
:9600baud
cd %EZY%
ezy -b9600 -E20
goto after_ezy
:7200baud
cd %EZY%
ezy -b7200 -E20
goto after_ezy
:4800baud
cd %EZY%
ezy -b4800 -E20
goto after_ezy
:2400baud
cd %EZY%
ezy -b2400 -E20
goto after_ezy
:1275baud
cd %EZY%
ezy -b1275 -E20
goto after_ezy
:1200baud
cd %EZY%
ezy -b1200 -E20
goto after_ezy
:300baud
cd %EZY%
ezy -b300 -E20
goto after_ezy
:localbbs
cd %EZY%
ezy -L -E20
Page 171.
:after_ezy
if errorlevel 20 goto start
if errorlevel 8 goto sysopnext
if errorlevel 7 goto scanecho
if errorlevel 6 goto scanecho
if errorlevel 5 goto scanecho
if errorlevel 4 goto modeminit
if errorlevel 3 goto fossil
if errorlevel 2 goto runtimeerror
if errorlevel 1 goto setuperror
goto start
:unpackmail
cd %EZY%
ezymail -toss -verbose
ezynet -import -echoarea
goto start
:scanecho
cd %EZY%
ezymail -scan -verbose
ezynet -export
goto start
:cleanup
cd %EZY%
ezyff -c
ezymaint -i -p -c
ezyff -i
usercomp -b20 -p -d90 -s1 -a
msgcomp -LINK
goto start
:sysopnext
echo Yo!!!! Your LOGON NOW!!!
pause
goto start
:weekly
cd %EZY%
ezyff -c
ezymaint -d
goto start
:setuperror
echo Setup Error!
goto end
:runtimeerror
echo Runtime Error! Consult Errors.Log
goto start
Page 172.
:modeminit
echo Modem Init Error!
goto End
:fossil
Echo Wrong Fossil Version!
goto end
:modeminit
Echo EZY Unable To Initialize Modem!
goto start
:modemresp
Echo FD Modem NOT Responding!
goto end
:fulldisk
Echo Insufficient Disk Space TO Proceed!
goto end
:external
Echo External FD Error - System File Missing!
goto end
:internal
Echo Internal FD Error!
goto end
:end
Echo Ezycom Is Down!
cd %EZY%
As you can see Ezycom will run with most mailers as
well as a stand alone system. The only mailer we have found
that Ezycom will NOT work with is BinkleyTerm.
Page 173.
Appendix F (Credits)
Credits
I would like to thank Wayne Burnside, Richard Stocks,
Garry Gillard, Colin Berg, Neil Lees, Geoff Edes, Steven
Schnitzer, Brad Vonarx, Stuart Healey, Brendan McCarthy, Ian
Mason, Donald Grover, Christian Kraus, Lloyd Bayley, Matthew
Taylor, John Buetefuer, Dean Harry, Bernard Holkner and all
the other Beta/Gamma Testers. Definitely, Ezycom would not
have been what it is, without the aid and support of these
people.
Page 174.
Appendix G (Colour Changer)
Ezycom now supports a colour changer which can be
embedded in text files or in menus. Ctrl-Kb initiates the
colour changer, then a hex code is required to actually tell
Ezycom what colour to change to. The <hex> code is a two
digit hexadecimal number that indicates the colour to change
to. The first digit indicates the background colour and
whether the forground colour should be blinking or not. The
second digit is the forground colour.
Foreground Background
0 - Black 0 - Black
1 - Blue 1 - Blue
2 - Green 2 - Green
3 - Cyan 3 - Cyan
4 - Red 4 - Red
5 - Magenta 5 - Magenta
6 - Brown 6 - Brown
7 - LightGray 7 - LightGray
8 - DarkGray 8 - Black + Blinking
9 - LightBlue 9 = Blue + Blinking
A - LightGreen A - Green + Blinking
B - LightCyan B - Cyan + Blinking
C - LightRed C - Red + Blinking
D - LightMagenta D - Magenta + Blinking
E - Yellow E - Brown + Blinking
F - White F - LightGray + Blinking
Eg CtrlKb07
Would set the background colour to black (0) and the
foreground colour to LightGray (7).
Eg CtrlKb4F
Would set the background colour to Red (4) and the
foreground colour to White (F).
Eg CtrlKbCF
Would set the background colour to Red ((4) + (8) = C) and
the foreground colour to White Blinking (F)
Page 175.
Table of Contents 2
Features of Ezycom 4
Conditions of Use 7
Registration 9
Ezycom Support Sites 9
Copyrights 10
Installation 11
Installation Requirements 11
Installation Set-up 11
Config (General) 13
Config (General, Paths) 13
Config (General, Netmail Addresses) 16
Config (General, Limits) 17
Config (General, Events) 19
Config (General, Textfiles) 20
Config (General, Drop Dos) 20
Config (Misc) 21
Config (Misc, New User) 21
Config (Misc, Logon Info) 22
Config (Misc, Colours) 25
Config (Misc, Prompts) 26
Config (Misc, Paging) 26
Config (Misc, Screen Options) 27
Config (Misc, Alt - Ctrl Function Keys) 27
Config (Misc, Sound) 28
Config (Misc, Access) 28
Config (Misc, System) 29
Config (File Areas) 32
Config (File Areas, File Area) 32
Config (File Areas, File Paths) 34
Config (File Areas, Misc File Options) 35
Config (File Areas, File List) 37
Config (File Areas, File Security) 39
Config (File Areas, Global File Options) 41
Config (Ezyprot, Protocols) 44
Config (Protocols, Default Set-up Protocols) 44
Config (Protocols, Bimodem) 46
Config (Protocols, Setting Up Your Own Protocols) 47
Config (Msg Areas) 50
Config (Msg Areas, Message Area Name) 50
Config (Msg Areas, Areafix Tag) 50
Config (Msg Areas, Message Types) 50
Config (Msg Areas, Message Kinds) 51
Config (Msg Areas, Alias Allowed) 51
Config (Msg Areas, Areafix Group) 52
Config (Msg Areas, Read Security) 52
Config (Msg Areas, Read Flags) 52
Config (Msg Areas, Write Security) 52
Config (Msg Areas, Write Flags) 52
Config (Msg Areas, Sysop Security) 53
Config (Msg Areas, Uplink) 53
Config (Msg Areas, Origin Aka) 53
Config (Msg Areas, Origin Line 53
Page 176.
Config (Msg Areas, Seenby) 53
Config (Msg Areas, Kill Messages After) 53
Config (Msg Areas, Kill Recv After) 54
Config (Msg Areas, Maximum Messages) 54
Config (Msg Areas, Maximum Kilobytes) 54
Config (Msg Areas, Combined Access) 54
Config (Msg Areas, Initial Combined) 54
Config (Msg Areas, Test For Config Age) 54
Config (Msg Areas, Keep Private Bit) 55
Config (Msg Areas, Show Seenby Lines) 55
Config (Msg Areas, Clear Seenby) 55
Config (Msg Areas, Visible) 55
Config (Msg Areas, Page Up/Down) 55
Config (Msg Areas, (F8) Seenbys) 55
Config (Msg Areas, (F10) Export List) 56
Config (Msg Areas, Pick) 56
Config (Echoarea Manager) 56
Config (Echoarea Manager, Node) 56
Config (Echoarea Manager, Echomail Active) 56
Config (Echoarea Manager, Echo Manager Groups) 56
Config (Echoarea Manager, Compress To) 57
Config (Echoarea Manager, Password To Echomgr) 57
Config (Echoarea Manager, Password From Echomgr) 57
Config (Echoarea Manager, Mail Status) 57
Config (Echoarea Manager, Days To Hold Mail) 57
Config (Echoarea Manager, Send .PKT Type) 57
Config (Echoarea Manager, Can Create New Echos) 58
Config (Echoarea Manager, Add to New Echos) 58
Config (Echoarea Manager, Page Up/Down) 58
Config (Echoarea Manager, Pick) 58
Config (Msg Misc) 59
Config (Msg Misc, Usable Message Areas) 59
Config (Msg Misc, Inbound Mail Path) 59
Config (Msg Misc, Outbound Mail Path) 60
Config (Msg Misc, Arc Mail 0.6 Compatibility) 60
Config (Msg Misc, Delete Netmail On Import) 60
Config (Msg Misc, Swap On Archiving) 60
Config (Msg Misc, Use EMS With Swap) 60
Config (Msg Misc, Dupe Detection) 60
Config (Msg Misc, Keep Echomail Node Receipts) 60
Config (Msg Misc, Bad Message Board) 61
Config (Msg Misc, Unknown AREAS Action) 61
Config (Msg Misc, Kill Bad Archives) 61
Config (Msg Misc, Quote String) 61
Config (Msg Misc, External Editor) 61
Config (Msg Misc, Old Style MSGTMP) 62
Config (Msg Misc, Default Origin Line) 62
Config (Msg Misc, Kill Null Netmail) 62
Config (Msg Misc, Mark Netmail As Kill / Sent) 62
Config (Msg Sec) 63
Config (Msg Sec, Force Crash Mail Security) 63
Config (Msg Sec, Optional Crash Mail Security) 63
Config (Msg Sec, Netmail File Attach Security) 63
Config (Msg Sec, Security To Update Users) 63
Page 177.
Config (Msg Sec, Read Security On New Echomail Area) 63
Config (Msg Sec, Write Security On New Echomail Area) 63
Config (Msg Sec, Sysop Security On New Echomail Area) 64
Config (Msg Sec,Reply Via Netmail Security) 64
Config (Msg Sec,Request Receipt Security) 64
Config (Msg Netmail Boards) 64
Config (Msg Netmail, Domains) 64
Config (Compression of Echomail) 66
Config (Echomail Uncompress) 66
Config (Global Msg Options) 67
Config (Global Msg, Set Default Security) 67
Config (Global Msg, Set Default Flags) 68
Config (Global Msg, Centre Message Area Name) 68
Config (Global Msg, Set Maximum Kilobytes) 68
Config (Global Msg, Set Maximum Messages) 68
Config (Global Msg, Kill Messages After XX Days Old) 68
Config (Global Msg, Kill Received Messages After XX Days) 68
Config (Global Msg, Add/Rem Node from area list.) 68
Config (Global Msg, Add/Rem Node from area list.) 69
Config (Modem Set-Up) 70
Config (Modem Set-Up, Comport) 70
Config (Modem Set-Up, Max Baud Rate) 70
Config (Modem Set-Up, Locked Port) 70
Config (Modem Set-Up, Connect Responses) 70
Config (Modem Set-Up, Init Response) 70
Config (Modem Set-Up, Ring String) 70
Config (Modem Set-Up, Modem Delay) 70
Config (Modem Set-Up, Auto Answer) 71
Config (Modem Set-Up, Start Time) 71
Config (Modem Set-Up, End Time) 71
Config (Modem Set-Up, Init Tries) 71
Config (Modem Set-Up, Init String 1) 71
Config (Modem Set-Up, Init String 2) 71
Config (Modem Set-Up, Set Busy String) 71
Config (Modem Set-Up, Manual Answer String) 71
Config (Modem Set-Up, Send Break To Modem) 72
Config (Baud Rate Set-Up) 73
Config (Baud Rate Set-Up Efficiency (CPS)) 73
Config (Baud Rate Set-Up Connect) 73
Networking with Ezycom 74
Sysop Function Keys 76
Ezycom Command Line Parameters 78
Errorlevels 79
Ezycom External Support Files 80
External Files (Trashcan.ctl) 80
External Files (Phonenum.ctl) 80
External Files (Regexp.q-a) 80
External Files (Newuser.q-a) 81
External Files (Newuser2.q-a) 81
External Files (Phonedup.ctl) 81
Graphic Support Files 81
Graphic Support Files, (ALIAS.A*) 81
Graphic Support Files, (AREAHELP.ASL) 81
Graphic Support Files, (DOBSEC.A*) 81
Page 178.
Graphic Support Files, (DOWNHELP.A*) 81
Graphic Support Files, (EDITHELP.A*) 81
Graphic Support Files, (FLSPHELP.A*) 81
Graphic Support Files, (FILEXXX.ASC) 82
Graphic Support Files, (KEYWHELP.A*) 82
Graphic Support Files, (LOCKOUT.A*) 82
Graphic Support Files, (LOGO.A*) 82
Graphic Support Files, (MAXPAGE.A*) 82
Graphic Support Files, (MNUAGE.A*) 82
Graphic Support Files, (MNUHOUR.A*) 82
Graphic Support Files, (MNUTIME.A*) 82
Graphic Support Files, (MNUMESS.A*) 82
Graphic Support Files, (NEWS.A*) 82
Graphic Support Files, (NEWUSER1.A*) 82
Graphic Support Files, (NEWUSER2.A*) 82
Graphic Support Files, (NOTAVAIL.A*) 82
Graphic Support Files, (PAGEABRT.A*) 82
Graphic Support Files, (PAGED.A*) 83
Graphic Support Files, (PAGESTOP.A*) 83
Graphic Support Files, (PASSWORD.A*) 83
Graphic Support Files, (PHONESEC.A*) 83
Graphic Support Files, (PRIVATE.A*) 83
Graphic Support Files, (PROTHELP.A*) 83
Graphic Support Files, (REGWARN1.A*) 83
Graphic Support Files, (REGWARN2.A*) 83
Graphic Support Files, (READHELP.A*) 83
Graphic Support Files, (SECXXXXX.A*) 83
Graphic Support Files, (TIMESLOW.A*) 83
Graphic Support Files, (TIMESEC.A*) 83
Graphic Support Files, (UPHELP.A*) 83
Graphic Support Files, (WATCHDOG.ASL) 83
Graphic Support Files, (WELCOME.A*) 83
Graphic Support Files, (WELCOME1.A*) 84
Graphic Support Files, (WELCOME2.A*) 84
Graphic Support Files, (WELCOMHH.A*) 84
File Points 85
Page Tunes 85
Menu System (Ezymenu) 86
Menu System (Defining a Menu System) 86
Menu System (Templates) 90
Menu System (Global Menus) 91
Menu System (Automatic Options) 91
Menu System (Special Characters) 91
Menu System (Keyboard Stuffing) 92
Menu System (Groups) 93
Utilities (Ezymaint, Maintenance Program) 95
Utilities (Conversion Files) 97
Utilities (Conversion Files, Doconv.bat Upconv.bat) 97
Utilities (Fedit, Filebase Editor) 98
Utilities (Fedit, Edit Options) 99
Utilities (Fedit, Edit Descriptions) 99
Utilities (Fedit, Edit Up/Dnload) 99
Utilities (Fedit, Edit Statistics) 100
Utilities (Fedit, View Archive) 100
Page 179.
Utilities (Fedit, File Options) 101
Utilities (Fedit, New File Edit) 101
Utilities (Fedit, Rename File) 101
Utilities (Fedit, Update File) 101
Utilities (Fedit, Tag Options) 102
Utilities (Fedit, Tag All) 102
Utilities (Fedit, Clear All) 102
Utilities (Fedit, Delete Tagged) 102
Utilities (Fedit, Move Tagged) 102
Utilities (Fedit, Remove Tagged) 102
Utilities (Fedit, Tagged Offline) 102
Utilities (Fedit, Physical Move) 102
Utilities (Fedit, Batch Files) 103
Utilities (Usercomp, Userbase Utility Program) 105
Utilities (Anstoavt, Makes Avatar Screens) 106
Utilities (Ezymail, Echomail Utility) 107
Utilities (Ezymail and Multiline BBS's) 107
Utilities (Ezynet, Netmail, Areafix Utility) 108
Utilities (Ezynet, What is EchoArea?) 108
Utilities (Ezynet, How to use EchoArea.) 108
Utilities (Ezynet, Options) 109
Utilities (Msgcomp, Messagebase Utility) 111
Utilities (Msgcomp, Command Line Options) 111
Utilities (Ezyff, Filebase Utility) 112
Utilities (Ezyff, Command Line Options) 112
Utilities (Ezyutil, General Utility) 113
Utilities (Ezyutil, Message Importing) 113
Utilities (Ezyutil, Importing a File with Description) 113
Utilities (Ezyutil, Sorting EchoNode Information) 114
Utilities (Ezyutil, Undelete Messages) 114
Utilities (Ezyutil, Strip Logs) 114
Utilities (Ezyutil, File Area Information) 115
Utilities (Ezyutil, Message Base Information) 116
Utilities (Ezyutil, Message Base Stats) 117
Utilities (Ezyed, Userbase Editor) 118
Utilities (Ezyed, Display Mode Options) 118
Utilities (Ezyed, Edit Mode Options) 119
Utilities (EzyNode, Nodelist Compiler) 122
Utilities (EzyNode, Sample EZYNODE.CTL) 124
Appendix A (Questionnaire Language) 125
Appendix B (Multiline Operation) 136
Appendix C (File Control Characters) 139
Appendix D (Menu Commands) 143
Appendix E (Operating Batch Files) 166
Appendix E (Stand Alone Batch File) 166
Appendix E (D'Bridge Batch File) 168
Appendix E (FrontDoor Batch File) 170
Appendix F (Credits) 174
Appendix G (Colour Changer) 175
Page 180.