EZY.DOC

355.3 KB 0f50d5dba72090a9…
















                                 Ezycom V1.01.

                          Copyright Peter Davies 1992.

                              All Rights Reserved.

                             Released 20 May, 1992.






          Table of Contents

          Features                                                   4
          Conditions of Use                                          7
          Registration                                               9
          Copyrights                                                10
          Installation                                              11
          Configuration (General)                                   13
          Configuration (Misc)                                      21
          Configuration (File Areas)                                32
          Configuration (Ezyprot, Protocols)                        44
          Configuration (Bimodem)                                   46
          Configuration (Setting Up Your Own Protocols)             47
          Configuration (Message Areas)                             50
          Configuration (Echoarea Manager)                          56
          Configuration (Message Misc)                              59
          Configuration (Message Security)                          63
          Configuration (Message Netmail)                           64
          Configuration (Compression of Echomail)                   66
          Configuration (Global Message Options)                    67
          Configuration (Modem Set-(Up)                             70
          Configuration (Baud Rate Set-up)                          73
          Networking with Ezycom                                    74
          Sysop Function Keys                                       76
          Ezycom Command Line Parameters                            78
          Errorlevels                                               79
          Ezycom External Support Files                             80
          Ans/Asc/Asl/Avt Files                                     81
          File Points                                               85
          Page Tunes                                                85
          Menu System (Ezymenu)                                     86
          Menu System (Defining a Menu System)                      86
          Menu System (Templates)                                   90
          Menu System (Global Menus)                                91
          Menu System (Automatic Options)                           91
          Menu System (Special Characters)                          91
          Menu System (Keyboard Stuffing)                           92
          Menu System (Groups)                                      93
          Utilities (Ezymaint, Maintenance Program)                 95
          Utilities (Conversion Files, Doconv.bat Upconv.bat)       97
          Utilities (Fedit, Filebase Editor)                        98
          Utilities (Usercomp, Userbase Utility Program)           105
          Utilities (Anstoavt, Makes Avatar Screens)               106
          Utilities (Ezymail, Echomail Utility)                    107
          Utilities (Ezynet, Netmail, Areafix Utility)             108
          Utilities (Msgcomp, Messagebase Utility)                 111
          Utilities (Ezyff, Filebase Utility)                      112
          Utilities (Ezyutil, General Utility)                     113
          Utilities (Ezyed, Userbase Editor)                       118
          Utilities (EzyNode, Nodelist Compiler)                   122





                                    Page 2.






          Appendix A (Questionnaire Language)                      125
          Appendix B (Multiline Operation)                         136
          Appendix C (File Control Characters)                     139
          Appendix D (Menu Commands)                               143
          Appendix E (Operating Batch Files)                       166
          Appendix F (Credits)                                     174
          Appendix G (Colour Changer)                              175
          Index                                                    176















































                                    Page 3.






          Features of Ezycom

           o   Ezycom used advanced file system technology to get high
               performance when is use with Mass Storage Devices such
               as CD-Roms.  Typically, file searches can find a file
               in approximately one second, where as on other older
               systems, it takes well over five minutes.

           o   Database type file system, allowing high performance
               file listing, without continually accessing the hard
               disk to find a files date/size.  This gives MASSIVE
               speed increases on CD Roms, Multiline and Networked
               BBS's.  The system also allows classifying of files
               into separate areas, no matter WHERE the files are on
               your Hard Disk.  You are not restricted to a file area
               for each file path.  This allows CD Roms, which
               normally have their files laid out in no particular
               order (such as the RBBS-In-a-Box), to function well
               under Ezycom.

           o   Ezycom is a fully fido compatible Bulletin board.

           o   Ezycom has a full-blown Mail Tosser/Scanner.  Which is
               built around Ezycom to enable integration between it
               and Ezycom itself.  Thus enabling many exciting
               features, such as automatically adding conferences into
               the BBS package.

           o   Up to 65,000 security levels, with Up to 32 flags that
               can be defined on each level to make your BBS more
               secure.

           o   Four ratio systems, including Post/Call ratios,
               Kilobyte Ratios, File Ratios and a VERY Powerful File
               Points System are included.

           o   The File Points System is the answer to many sysop's
               prayers.  As it will can (Sysop Definable) credit the
               uploader of the file, only if the file was downloaded
               many times.  Thus, avoiding problems with Ratio
               systems, where users upload rubbish so they can
               download. (Registered Versions Only)

           o   Database message system, increasing speed in message
               base handling, and decreasing space used by each
               message.  This method is different to many other
               Database systems as two files are used per message
               area.  Thus, if something dreadful happened to one of
               your message base files, you do not loose your entire
               message base.





                                    Page 4.






           o   Message Base packing system allowing you to define 4
               different ways of deleting messages.  The most exciting
               is deleting by Kilobytes, enabling you to keep your
               message base at a fixed size.

           o   Comprehensive Paging system allowing configuration of
               page times on a per day basis.  As most people are home
               more on weekends than weekdays, this allows your users
               to page you more on weekends (If so desired).

           o   Comprehensive File Management system taking care of all
               file area needs.  Including sorting file areas, archive
               conversion, master list generation, virus checking,
               integrity checking and much more.

           o   A Full-Blown file area editor, allowing multiple tag
               and move of files, deletion of multiple files, viewing
               of file info including uploader and other various
               options.

           o   Security can be placed on downloading of file areas but
               still allowing the viewing of the files.  A look but
               not touch environment.

           o   Passwording of files, on per directory or per file
               basis can be done.

           o   Allowing certain files to be 'FREE' for the user to
               download, again on per directory or per file basis.

           o   Support for Up to 250 lines, running under either a
               network, multitasker or both.

           o   A full-blown chat system between nodes is available.
               Avatar/local users will be opened up into a full screen
               user to user chat.  Allowing messages to popup even
               while they are typing them in.  Up to 200 different
               chats can take place at any one time.  Private messages
               can also be sent between nodes.

           o   Ezycom also allows (sysop definable) restricted access
               to any function that Ezycom performs.  This restricted
               access can vary dramatically.  Different types of
               restrictions include Security, Flags, Age, Time On-
               Line, Time Of Day, File Ratio, Kilobyte Ratio and
               Post/Call Ratio.

           o   An intelligent duplicate upload detection system, that
               stops users from being credited for files that are
               already on your system.  The file will then be removed
               from your system, thus not taking up precious disk
               space.



                                    Page 5.






           o   A full screen ANSI/AVATAR chat, which has full local
               and remote scrolling.

           o   Local uploads and downloads, which allows an easy way
               to place files on your system.

           o   Full conferencing style system, allowing message and
               file areas to be grouped, to allow users to only view
               areas of their choosing such as IBM and/or Amiga.














































                                    Page 6.






          Conditions of Use

           o   Ezycom is the copyrighted materials of Peter Davies and
               authors of respective products.  The material it covers
               it the executable files, overlays, documentation and
               anything contained in the Ezycom Package.

           o   If, you classify as a SHAREWARE registration (see
               "Registration"), you are allowed to evaluate Ezycom for
               1 month, and after that period, you MUST either
               REGISTER Ezycom or stop using it.  Non-Profit
               organisations/Commercial customers may ONLY evaluate
               Ezycom for a period of 7 days, before Ezycom must be
               bought, or discontinued in use.  If, Ezycom is being
               used in a multi-line situation,  then only one
               Registration is required.  Providing that the
               registration key in use, will only be on one hard disk
               and only in one directory of that hard disk.  If, this
               is not the case, then a site licensing agreement is
               required.

           o   Before registration, you miss out on a few 'Nice'
               features, taken out to help encourage registration.  It
               must be stated however, that Ezycom is usable without
               these features, and is not now and never will be
               'Cripple Ware'.

           o   Ezycom may never be used in an unlawful, or illegal
               manner.

           o   Ezycom distribution is encouraged.  So long as no
               charge is levied for the distribution.  Pay Systems are
               exempt from this, so long as there is no extra charge
               for Ezycom.  Commercial Software Libraries may not
               include Ezycom in their libraries without the written
               permission of Peter Davies.

           o   Ezycom archive's may not be altered in any shape or
               form.  The conversion to a different archive format is
               allowed, but we prefer that you do not convert it.
               Adding of BBS comment files or headers to the archive,
               is NOT permitted.

           o   You are NOT allowed to modify Ezycom executables,
               Overlays, registration keys or documentation in any
               shape or form.  Tampering with messages inside
               executables is NOT permitted.

           o   Site / Group licensing agreements will be reviewed on a
               case by case basis.

           o   The registration key may not be distributed to other
               person(s).  Doing so, will violate the licensing
               agreement you made when Registering Ezycom.

                                    Page 7.






           o   In using this program agree that in no event shall
               Peter Davies and respective authors, be liable for any
               indirect, incidental, consequential, special, or
               exemplary damage or lost profits, even if Peter Davies
               and respective authors have been advised of the
               possibility of such damages or lost profits.  You
               further agree that if for any reason Peter Davies and
               respective Authors are found to be liable to you as a
               result of your use of the program and software, that as
               partial consideration of Peter Davies and respective
               Authors granting you this license, you agree that Peter
               Davies and respective Authors, sole and exclusive
               cumulative liability to you or others shall be no
               greater than the amount of any registration fee paid by
               you.  If no such registration fee was paid, then Peter
               Davies and respective  Authors are not liable for any
               amount.

           o   Peter Davies or the associated Authors are in no way
               obligated to provide support for or future versions of
               Ezycom.

           o   Registration of Ezycom entitles you to the use of the
               current version of Ezycom.  Any future versions may
               have new licensing conditions, which may change the
               terms of your current licensing agreement.

           o   The use of tampered versions of Ezycom, or the use keys
               not distributed by Registration Sites is an
               infringement of the Copyright Act.  We will not
               hesitate in prosecuting offenders.

           o   The copying and/or distribution of your license key is
               strictly prohibited.  Except, of course for backup or
               archival purposes.




















                                    Page 8.






          Registration

               Included with the package are two registration files,
          REGISTER.FRM, (registrations using Cheques/Money Orders),
          and CREDIT.CRD, (registrations using VISA/Master Credit
          Cards (NO BANKCARD)).  Please select the correct file for
          your purposes.  Please make sure you complete these forms
          when registering to avoid delays.

          $50AUD for use of Ezycom in a private home, for non-
               commercial activities.  This special introductory offer
               to Ezycom, will only remain at this price for V1.00 and
               V1.01.

          $150AUD for use of Ezycom in a non-commercial environment.
               That is, the business is a non-profit organization and
               makes no money in the use of Ezycom.  Example: Public
               School, University, Church, Tennis Club, etc.

          $250AUD for use of Ezycom in a commercial environment.
               That is, none of the above conditions are met.

          Prices subject to change without prior notice.

          Support Sites

          Footrot Flats
          +61-3-578-0968 (300/1200/2400/9600)
          Fido      3:636/213
          Internet daviesex@brt.deakin.edu.au
          24 Hours a day

          Hitch Hikers Guide to The Galaxy
          +61-3-546-3038 (300/1200/2400/9600)
          Fido      3:636/204
          24 Hours a day

          Offline
          +61-3-808-4510 (300/1200/2400/9600)
          Fido      3:633/374
          Internet rjstocksex@brt.deakin.edu.au
          24 Hours a day

          EzyAccess
          +61-3-585-0495 (300/1200/2400/9600)
          Fido      3:636/200
          24 Hours a day

               Ezycom support conference (EC_SUPPORT) and the latest
          version, should be available at any of the support sites or
          beta test sites.




                                    Page 9.






          Copyrights

               The following products are copyrighted to the following
          people.  Unlisted products, are also copyrighted to their
          respective authors.

               Arj                    Robert Jung
               Async Professional     Turbo Power
               BNU                    David Nugent
               D'Bridge               Mosaic Press
               DESQView               Quarterdeck Office Systems
               DSZ, GSZ               Chuck Forensberg
               Ezycom                 Peter Davies
               Ezyed                  Wayne Burnside
               EzyEdit                Brad Vonarx
               Ezymenu                Richard Stocks
               Ezyup                  Colin Berg
               Front Door             Joaquim Homrighausen
               IBM                    International Business Machines
               Lha                    H Yoshizaki
               MSDOS                  Microsoft
               PkZip                  Pkware
               Scan                   McAfee Associates
               Turbo Pascal           Borland International
               Windows                Microsoft
               X00                    Ray Gwinn





























                                    Page 10.






                                  Installation

          Install
          -------

          Requirements
          ------------
               Ezycom can run on IBM PC or compatible.  A modem with
          Hayes compatible commands (such as CONNECT/RING/etc) and
          hardware flow control (CTS/RTS) is required also for
          communications and  DOS version 3.X, 4.X, 5.X or later,
          although MSDOS V5.0 is recommended.

               Ezycom requires a machine with at least 512K of Ram,
          although 640K is preferable.  A Hard Disk is also required
          with a minimum of 1 meg recommended.  If, you have EMS
          memory, XMS memory or Extended memory, Ezycom can make use
          of this.  It, can directly use EMS to Swap itself out to, or
          to load the Overlay into, or it can indirectly use XMS or
          Extended memory, by using it to make a Ram Disk, and placing
          the overlay/swap files on there.

          Set-up
          ------
               Ezycom requires one other program to run it
          successfully stand alone.  That is, a FOSSIL driver.  X00,
          by Ray Gwinn, and BNU by David Nugent have successfully been
          tested with Ezycom.  See their documentation for the
          installation of those programs.

               If, you are using Ezycom in a mail Network which is
          FidoNet compatible, you will also require a Mailer.
          D'Bridge and Front Door have both been successfully used
          with Ezycom.  Ezycom, has its own fido compatible mail
          tosser / scanner.

               In your CONFIG.SYS add the following lines...
          FILES=20
          BUFFERS=20

          FILES=20, tells DOS how many files can be open at once.

          BUFFERS=20, tells DOS how many buffers are to be open.
          Generally, 20 is good, as it does not use too much memory,
          and it speeds up disk access.

             In your AUTOEXEC.BAT add the following lines depending on
          the drive you set EZYCOM to run on...

          SET EZY=C:\EZY
          SET TASK=1




                                    Page 11.






               SET EZY, tells Ezycom where to find the system
          directory.  It can optionally be the directory where your
          BBS runs from.

               SET TASK, The node number to execute Ezycom under.
          Note: -N overrides this variable.
          Eg SET TASK=1

               Extract SETUP.ARJ in a temporary directory and run
          INSTALL.  An example command to perform this is "ARJ e
          SETUP.ARJ".  It will automatically install a default setup
          of menus, messages, files and text files for the operator to
          observe as a sample system, to learn from, or to work from.

               Ezycom sample setup will now be located in the path
          specified, but the executables will still be where you
          unarchived them from.

               You are now ready to start configuring Ezycom.




































                                    Page 12.






                                 Configuration

          General
          -------

          Paths
          -----
               When you load the config file you will presented with a
          list of options.  That you access by moving the cursor on
          the option you want to change then hit ENTER.  You will have
          to set up many of these options in order to get Ezycom up
          and running.  First Set-up all the directories that will be
          used by your system with Ezycom the directories you have to
          set up are as follows.

          Eg
             Overlay Path : C:\EZY\
             System Log   : C:\EZY\EZY*N.LOG
             Maintain Log : C:\EZY\EZY*N.LOG
             Swap File    : C:\EZY\EZYSWAP
             AVT Files    : C:\EZY\TXT\
             ANS Files    : C:\EZY\TXT\
             ASC Files    : C:\EZY\TXT\
             ASL Files    : C:\EZY\TXT\
             Menu Files   : C:\EZY\MENUS\
             Menu 2nd     : [UnUsed]
             Netmail      : C:\EZY\NETMAIL\
             Nodelist     : C:\EZY\NODELIST\
             Message Base : C:\EZY\MSGBASE\
             File Base    : C:\EZY\FILEBASE\
             File Index   : C:\EZY\FASTBASE\
             File Sec     : C:\EZY\
             User Base    : C:\EZY\USERBASE\
             Bimodem Path : [UnUsed]
             Node Message : C:\EZY\
             Temp Path    : C:\EZY\TEMP\
             Upload Path  : C:\EZY\UPLOADS
             OutSide Page : [Unused]
             Editor Path  : *C /C EDIT.EXE


               Overlay Path.  This is where Ezycom looks to find its
          overlay file (EZY.OVR).  You can set this to a Ram Disk, for
          improved efficiency.

               System Log.  This is the path and filename of where
          Ezycom will write its log file.  If you place a *N in the
          log name, it will be translated into the current node
          number. So EZY*N.LOG would actually become EZY1.LOG for node
          one.





                                    Page 13.






               Maintenance Log.  This is where Ezycom writes the logs
          for all the utilities that come with it.  You should NEVER
          have this the same filename as the other log, if you are
          running more than one line.  Here, you can also place a *N
          in the filename for translation into node number.  Each
          Ezycom utility has a unique identifier for logging, so if
          you place a *T in the maintenance log name, many logs will
          be written out for each utility.

               Swap File.  When Ezycom swaps out its memory, it can
          (sysop definable) swap itself to DISK.  This is the path and
          filename to the swap file(s).  The extension is not allowed,
          as Ezycom will append its own extension for node number.
          Ezymaint and Ezymail append different extensions, so they
          can be run at the same time as nodes.

               Text Files.  These are the paths to where the text
          files are kept.  They may all point to the same directory if
          you like.  Since ANSI are the most popular, you may like to
          put .ANS on a Ram Disk, but leave the rest on your hard
          disk.

               Menu Files.  Your Menu Files are stored in this path.
          This may be a Ram Disk or Physical Disk Path.

               Menu 2nd.  This is a second menu path, for when the
          first path points to a Ram Disk.  Take the situation where
          you alter a menu on a Ram Disk.  All modifications are
          stored to the Ramdisk, not the physical disk.  Placing a
          path here, makes all modifications be stored at this path as
          well.

               Netmail/Nodelist.  Simply, this is your Netmail and
          Nodelist paths.  A more full explanation is explained in the
          Echomail/Netmail section of this document.

               Message Base.  This is the location of Ezycom's message
          base.  It should be noted that you MUST use the SAME
          userbase with the message base.  You can NOT have several
          message bases per userbase or vice versa, without totally
          destroying lastread pointers.

               File Base.  This is the location of where the filebase
          is located.

               File Index.  The Fast Find Index is stored here.  This
          is an index to EVERY file downloadable in your BBS system.

               File Sec.  The FILESEC.EZY is stored in this path.  A
          path is provided to allow you to point this file to the
          ramdrive.




                                    Page 14.






               Userbase.  Simply, where the userbase is stored.

               BiModem Path.  This is where BiModem.COM and
          BIMODEM.1/BIMODEM.2/etc should be found.  Normally this path
          would be null.  If there is a path here, you MUST have
          BiModem fully Set-up to run Ezycom.

               Node Message.  This is where the internode
          communication files are stored.  If, you plan to use the
          inbuilt multiuser chat, it might be advisable to point this
          path to a ram disk.  Only 10k would be required maximum in
          the ramdisk.

               Temp Path.  This is where Ezycom stores its temporary
          files.

               OutSide Page.  If, you wish your pages to use other
          tunes besides the default, or the tune files, you can use
          Page modules written for Ezycom.  EZYSB100 is one such page
          program, which plays sound blaster VOC files.  Please see
          your PAGE programs (such as EZYSB100) for more details on
          this.

               Upload Path.  This is a temporary path where ALL
          uploads will be uploaded to, before they are moved.  If, the
          upload is aborted, then the file is left in this directory
          for later resumption.  It is advisable to have a daily
          maintenance routine to delete all files in your upload path.
          (Remove aborted uploads)  A statement like "Echo Y | del
          c:\ezy\uploads\*.*" would delete them.  This path MUST be
          unique and NOT used in the file base system.

               Editor Path.  This is the path and filename that the
          CONFIG will load when you choose to edit the text files.
          Any text editor will do Dos's edlin, Nortons Editor,
          WordStar Etc.

             Eg: *C /C C:\WS\WS.EXE
          This would run Wordstar as your editor for the Ctl and Q-A
          files such as TRASHCAN.CTL, PHONEDUP.CTL, NEWUSER.Q-A Etc.















                                    Page 15.






          Netmail Addresses
          -----------------
               You can now set your Net Address, if you are going to
          be using Ezycom in one of the many PC Networks.  ie FidoNet


             Main Address     : 3:636/213
             Aka  Address #1  : 80:1000/153
             Aka  Address #2  : 0:0/0
             Aka  Address #3  : 0:0/0
             Aka  Address #4  : 0:0/0
             Aka  Address #5  : 0:0/0


            Main Address :  3:636/213

               This is to say you are node 213 in net 636 in region 3.
          You can also enter up to 15 aka Address's.

               The Aka Address is for people that are members of more
          than one Network.  In the above example, the Aka shows that
          the you are also in region 80 and are node 153 of net 1000.

               For more information about Network Addresses, see the
          Echomail/Netmail section of this document.






























                                    Page 16.






          Limits
          ------
               Next option is setting the Limits. These are the
          settings that implement the Security Levels you set for your
          BBS.  First set the Security Level.


           Security Level                    : 10
           Maximum Time                      : 30
             300 Baud Daily k limit          : 100
            1200 Baud Daily k limit          : 200
            1275 Baud Daily k limit          : 200
            2400 Baud Daily k limit          : 300
            4800 Baud Daily k limit          : 300
            7200 Baud Daily k limit          : 300
            9600 Baud Daily k limit          : 300
           12000 Baud Daily k limit          : 300
           14400 Baud Daily k limit          : 300
           19200 Baud Daily k limit          : 300
           38400 Baud Daily k limit          : 0
           Downloads per One Upload          : 15
           Initial Download Credit (Files)   : 15
           Downloads in k per One K Uploaded : 0
           Initial Download K Credit         : 0
           Post Call Ratio               (%) : 10
           Initial Message Credit            : 2
           Number of Days till Rego Expires  : 365


               This example shows the security level <10>

               To open a new security level you hit the INSERT key and
          all the options are blank.  Type the security level that you
          wish to enable.  Then fill out the blanks as you see fit for
          that level.

               Maximum Time : This sets the time that you allow for
          this security level.

               The next options are the DAILY Kilobyte Download limits
          which you can set for each Baud rate that logs onto your
          System.   Unlike other options you will use later, 0 does
          not disable daily K limits, it makes the users daily K limit
          0.  To effectively give the user unlimited download
          Kilobytes, make the limit 65000.
             Eg.
               300 Baud Daily k Limit        :20    (Eg 20k download)
              1200 Baud Daily k Limit        :40    (Eg 40k download)
              1275 Baud Daily k Limit        :40    (Eg 40k download)
              2400 Baud Daily k Limit        :80    (Eg 80k download)
              9600 Baud Daily k Limit        :65000 (Eg Unlimited k)

          Continue this for all Baud Rates that you use.


                                    Page 17.






               Downloads Per Upload : Sets your Download Ratio
          Factor's (FILES) which is the amount of Downloads a user can
          have before he/she must Upload a file.  This ratio means
          that when it is set to one, a user must upload 1 file for
          every file he/she downloads.  When the ratio is set to 2,
          the user must upload 1 file for every 2 files the user
          downloads.  When the ratio is set to 3, the user must upload
          1 file for every 3 files the user downloads.  To disable
          this option, set the ratio to 0.  The initial credit for the
          file ratio, means how many files the user can download
          before the ratio is enforced.  That is, if set to 1, a user
          can download 1 file, before he/she has to upload.  Setting
          the credit to 0, means the user must UPLOAD BEFORE he/she
          can download.

               The Next two options are similar to the above but are
          Ratios for Kilobytes.  The Ratio for Kilobytes is the
          Downloads in k per ONE k Uploaded.  For instance, if this
          was set to 5, then for every Kilobyte the user uploads,
          he/she can download 5 kilobytes.  The Initial Download K
          credit is the Initial Free Kilobytes Credit you give the
          user.  The examples used above are similar to this
          situation, except that the ratio applies to Kilobytes not
          Files.

               Next is that Ratio on Calls/Messages Posted.  This is a
          percentage.  Just enter the percent of calls to message
          ratio you want the user to use.  Setting the percentage
          100%, means that a user MUST post one message for every call
          he/she makes.  Setting the percentage to 200%, means the
          user MUST post 2 messages for every call he/she makes.
          Setting the percentage to 50%, means the user MUST post 1
          message every two calls he/she makes.  Setting the
          percentage to 0%, disables the option for the security
          level.  Again the initial credit, gives the user some
          "breathing space" before the ratio is enforced.

               This Post Call Ratio actually works differently to the
          other two cited above.  If the user does not meet the
          required PCR, then there is actually nothing stopping
          him/her from doing anything on the BBS.  Through the use of
          the Menu System flag "Test Message/Call Ratio", you can stop
          users who have exceeded this ratio by setting it to YES.

               And lastly is the number of days until the users Rego
          Expires for this Security level.  This is used to calculate
          when the user registration date will expire for this user.
          At the point of expiring, REGEXP.Q-A is executed at logon
          for that user.  See "Questionnaires" for more details on
          "REGEXP.Q-A".  Setting this value to 365, would mean that
          the user's registration would expire 365 days after the
          setting of the user's registration date (usually the date of
          when they first logon).


                                    Page 18.






               To create another Security Level just hit your INSERT
          key.

               To delete a Security Level just hit the DELETE key.

               Hit (P) to get a great Pick List of all the Security
          Levels you have set-up.

               Moving between the Security Levels can also be made by
          hitting the Page Up and Page Down keys.

          Events
          ------
               Setting of System Events is easy, just hit the INSERT
          key and you will be entering the time you want the event to
          start.  Then you can set whether the event is enabled or
          disabled.  Next set the ERRORLEVEL you want Ezycom to exit
          with.  And the last thing to do is tell Ezycom when to use
          the Event, just pick the days required or all days.  Events
          can be used to trigger events on your systems, such as
          system maintenance.  If, the user is on-line when an event
          should take place, they are automatically dropped off, so
          that the event can be processed.  Events are triggered 5
          minutes earlier than the actual start time, so it could be
          possible for Ezycom to come back on-line before the actual
          event start time.  If this occurs, Ezycom will NOT trigger
          the event again, it will continue as per normal.  If, Ezycom
          is not running when an event occurs, then Ezycom will NOT
          execute the event when fired up.

           Start Time  : 07:30
           Status      : Enabled
           Errorlevel  : 20
           Days Active : Sun Mon Tue Wed Thu Fri Sat
           Last Run    : 23-04-1992

               This example shows that there is an event at 7:30,
          which will exit Ezycom with errorlevel 20 on all days of the
          week.
















                                    Page 19.






          Textfiles
          ---------
               These are the textfiles you are able to edit with the
          editor you set up as the Editor, in the Path section of the
          config.

               Trashcan.Ctl.  This is the list of names not allowed on
          your system.

               PhoneDup.Log.  This is a log file created by Ezycom
          that tells you if there are more than one user using the
          same phone number.

               PhoneNum.Ctl.  This file has the list of phone numbers
          that you have deemed not allowed on your system.

               Newuser.Q-A.  This file is displayed to all new users
          to fill out.  See the Questionair Documation later in this
          file to see the laungage used in this file.

               RegExp.Q-A.  This file is displayed to users that have
          loged on after there regodate has expired.


          Drop Dos
          --------
               This will let you shell out to DOS.  Type EXIT to
          return to Ezycom.



























                                    Page 20.






          Misc
          ----

          New User
          --------
               Choosing this option you will be able to set all the
          options that need to be set and ask when a new user logs on
          to your BBS.

               First set if you want your New Users to be asked for
          there Home/Voice Phone Number. (Toggle with the ENTER Key).

               Next is Ask NewUser Phone Number 2 which can be Toggled
          between NoPhone (don't ask for number), Business or Data.

               You will then have to set if you want to use a forced
          phone format which is configurable in the next option.

               After setting the phone format you set the following
          options by toggling each one with the ENTER key.

             Ask NewUser for Alias         : Yes
             Ask NewUser for Date of Birth : Yes
             NewUser Ansi                  : Ask
             NewUser Avatar                : Ask
             NewUser Full Screen Editor    : Ask
             NewUser Clear Screens         : Ask
             NewUser More Prompt           : Ask
             NewUser IBM Characters        : Yes
             NewUser Date Format           : Ask

               The toggles are as follows Ask, No or Yes.


          Alias...............User alias for systems that allow them.
          Date of Birth.......Date of Birth (used for Security Check).
          Ansi................Ansi Graphics (On or Off).
          Avatar..............Avatar Graphics (On or Off).
          FSE.................Full Screen Editor (On or Off).
          Clear Screens.......Clear Screen codes sent.
          More Prompt.........More Prompt or not.
          IBM Characters......HighBit Characters to be sent.
          Date Format.........Either DD-MM-YYYY or MM-DD-YYYY

               Now set the NewUsers Logon Security Level.  This is the
          level that you set for ALL New Users to your BBS.  Set a low
          one so you can enhance it as you feel.  You can override
          this if you set one in the NEWUSER.Q-A file but more on that
          later.

               Next is the New Users Flags.
          The Flags are labelled A..D with each flag having 8 settings
          that is to say A1..A8 B1..B8 etc. you can use these flags to
          enhance your Security Levels.

                                    Page 21.






               Next is the Minimum Length of the Password you want
          your New Users to use. (The longer the better!!)

               Next is the Minimum baud rate for Ansi and Avatar.  Any
          user logging on under this baud rate will get ASCII graphics
          only.

               FilePoints are the next option you are able to set.
          This sets the initial amount of file points a user receives
          when logging on for the first time.

               The last option in this screen is the New User Net Mail
          Credit.  This allows New Users the option to use Net Mail
          from there first logon.


          Logon Info
          ----------
               This section shows options that are used to set the way
          Ezycom handles each Logon attempt.  I will List them here
          and then explain.

             Forced Password Change  (Calls) : 0
             Ask for Date of Birth   (Calls) : 0
             Ask for Phone Number    (Calls) : 0
             WatchDog Message Board  (0=Off) : 0
             Minimum Logon Security          : 5
             Number of Logon Attempts        : 3
             Allow OneWord Logon Names       : No
             Minimum Logon Baud Rate         : 300
             Minimum Slow Baud Rate          : 300
             Slow Baud    Start : 00:00  End : 23:59
             Low Security Start : 00:00  End : 23:59
             Minimum Baud for File Transfers : 300
             First Registration Expire Warn  : 30
             2nd Expire Warning (Days)       : 10
             Check for Mail at Logon         : Ask
             Check for Files at Logon        : Ask
             Fast Local Login                : Yes
             Display Remote User's Password  : No
             Allow Sysop Remote              : Yes
             Auto Detect ANSI                : Yes
             IEMSI                           : Yes


               Forced Password Change.  Allows the Sysop to set at
          what number of calls the user's should change there
          Passwords.  This is for better Security on your System as
          users have to keep changing there passwords to stay on the
          system.

               Ask for Date of Birth.  Is also a Security feature that
          Ezycom uses to make sure that the user logged on is who they
          say they are.  They will be asked every XX calls.

                                    Page 22.






               Ask for Phone Number.  This is also a Security feature.
          The user will be asked to enter there Phone Number (Last
          four digits) to stay logged on to the system.  You set the
          number of called between asking for this check.

               WatchDog Message Board.  This tells Ezycom where to
          post a message, that you have written to be posted.  This
          message should let the User know that someone has tried to
          log in under there password and failed.  A good place for
          this message is the Sysop's Conference if you allow users to
          read messages in this area.  A file called WATCHDOG.ASL must
          be placed in the Ezycom system directory, which is a plain
          text file, that contains the message you wish to send to the
          user.

               Minimum Logon Security.  Is the lowest security level
          that you will allow users to login under.  Eg. if you set
          New User Security Level to 5 but have a level lower than
          this for Users that may have Upset you, you can give them
          this access.  Users between security level 1 and this
          security level, can logon between the times allocated by low
          security start and end time.  Note that users with Security
          Level 0, are ALWAYS barred from the system.

               Number of Logon Attempts.  If the user goes over this
          setting they will not be logged on to the system.  As they
          would have failed to enter the correct Password in the
          amount of attempts that you have set here.  If you have set
          the WatchDog Message to a message board the user will be
          notified when he/she logs on next.

               Allow OneWord Logon Names.  This is for Systems that
          allow there Users to login under an Alias (First time on) or
          allow Users to use there First Name as a Login Name.

               Minimum Logon Baud Rate.  Is the slowest Baud Rate that
          Ezycom will allow users to gain access to your system.

               Minimum Slow Baud Rate.  Is a baud rate the you can set
          so you can pick the time the users with slow modems can
          access your BBS.

               Slow Baud Start and End.  This is the time that you
          allow users with the SLOW modems to access your system.

               Low Security Start and End.  Is the time that you allow
          the users that have the Security level less than that set in
          the Minimum Logon Security.  Eg.  If the minimum security
          was 5, then those users from security levels 1 through 4,
          could logon between these times.  A start and end time of
          00:00, would indicate users can logon all the time, but any
          other time intervals where start and end times match, would
          indicate these users can NEVER logon.


                                    Page 23.






               Minimum Baud for File Transfers.  This sets the slowest
          baud rate that you will allow your users to download/upload
          from/to your file areas.

               First Registration Expire Warning.  Is when Ezycom will
          let the user know that there registration will expire in the
          number of days you set here.

               2nd Expire Warning (Days).  The user will be notified
          again about there registration expiring soon.  This expiry
          warning should be LATER than the first warning, for it to
          function correctly.

               Check for Mail at Logon.  With this option you are able
          to toggle whether you want the system to Check for NEW Mail
          at each Logon, Ask the User each Logon or Never ask the
          user.

               If you pick not to ask or check for mail make sure that
          you have an option in one of your menus or the user will
          never know when they have new mail.

               Check for Files at Logon.  This is similar to the Mail
          Checking option above but for New Files on your system.

               Fast Local Login.  With this option set to Yes all you
          have to do is hit Enter at the Logon Prompt, and the Sysop
          will be logged into the system.

               Display Remote User's Password.  This option when set
          will display the Remote User's Password on your screen.

               Ask for Local Password.  If you have this option set
          you will have to enter your password when logging into the
          system.

               Auto Detect ANSI.  With this set Ezycom will Auto
          detect ANSI so it will display ANSI graphic files and menus.
          If the User has another graphic setting in his/her UserBase
          Record that one will be used.

               IEMSI.  This allows users to logon to Ezycom using the
          IEMSI portocol.  Just set it to Yes to trun it on.












                                    Page 24.






          Colours
          -------
               In this screen you can define the way Ezycom displays
          colour in your BBS.  You will be able to set many different
          colours for many different options.

             Status Bar Foreground   :
             Status Bar Background   :
             PopUp Window Foreground :
             PopUp Border Foreground :
             PopUp Background        :
             PopUp Text Colour       :
             PopUp HighLight Colour  :
             Foreground Colour       :
             Default Message Quote   :
             Default Message Colour  :
             Default Message Prompt  :
             Default Prompt Bkgrnd   :
             Default FileName Col    :
             Default FileStata Col   :
             Default FileDate Col    :
             Default Descrip Col     :
             Default Uploader Col    :
             NewUser Colour 1        :
             NewUser Colour 2        :
             Change Stats Colour     :
             Enter Prompt Colour     :

               By moving to the one you want to change with the up and
          down arrows all you have to do is hit ENTER to toggle the
          colour change.  So as you can see its easy to get a
          different looking BBS just by changing a few colours.























                                    Page 25.






          Prompts
          -------
               In this section you can modify all the Prompts that
          Ezycom uses in the course of running your BBS.

           Name            : Please Enter Your Name :
           Password        : Enter Password :
           Jump To Dos     : Sysop shelled to DOS!
           Back from Dos   : Sysop back from DOS!
           Enter           : Press [Enter] to continue
           Enter Chat      : Sysop breaking in for a chat..
           Exit Chat       : Sysop ending chat..
           Bulletin        : Please Select an option.
           Type 7/15 Exit  : It's here somewhere??
           Alias           : Please Enter your Alias (Return=None)
           ANSI            : Can Your Terminal Support ANSI Graphics
           Avatar          : Can Your Terminal Support Avatar Graphics
           Phone Check     : Scanning for duplicate Phone Numbers...
           Full Screen Ed  : Use the Full Screen Editor
           Location        : Please Enter your Suburb and City :
           Screen Length   : What is your Screen Length :
           Scan UserBase   : Searching the UserBase
           Screen Clear    : Do you want Screen Clearing Codes Sent

               As you can see, you have plenty of options to make your
          BBS look the way you want it.

          Paging
          ------
               As most people are home more on the weekend than the
          rest of the week, we at Ezycom thought that you would like
          to be able to set the paging hours to what ever you like.
          You can also set the number of times that the user can page
          you per session.  If you have a Sound Blaster Card, Ezycom
          will use it (if you like) to play a tune when a user asks
          for a chat.  You can do this by setting the Hex address and
          IRQ of the sound blaster card, and defining the External
          Pager (in paths set-up) to run the Ezycom Sound Blaster
          module.  When a user requests a chat, you can optionally ask
          the user for a reason.  Setting this option to Yes enables
          this feature.  After a chat request has failed, you can
          optionally, allow the user to post a message to you. Setting
          the message board number to a number greater than 0, enables
          this feature, and will post the message in this conference.











                                    Page 26.






          Screen Options
          --------------
               In this screen you will be able to tell Ezycom will
          handle how it operates on your system.  Like how it writes
          to the screen, if it checks for snow etc.  The following
          points should help when filling out this section.

               Direct Screen Writes.  This tell Ezycom if you want it
          to write the information directly to the screen or use the
          bios.

               Check for Snow.  If you have an old Cga Card Ezycom may
          cause snow on your screen by its way of writing to the
          screen.  If you enable this option Ezycom will check your
          system set-up and if it detects snow it will do its writes
          in a way to stop it.

               40/50 Line Mode.  If you have an EGA/VGA card and
          screen, you can utilize its enhanced capabilities, by
          setting this option to Yes.  This will display more lines on
          the screen depending on the Card/Screen you have.  This will
          enable you to see more files/more of a message on the screen
          at any one time.

               Screen Blanking.  When Ezycom is in Waiting for Caller
          mode, you could possibly get screen burn in, if your monitor
          is left on all the time.  Setting this option to an amount
          of seconds, will tell Ezycom to BLANK the screen after
          waiting that time, thus SAVING your monitor.


          Alt - Ctrl Function Keys
          ------------------------
               The Alt-Function keys enable you to set an option to be
          executed while users are online.  Much in the same way as a
          Type 7 Exit.  These options could include, running FEdit,
          running EzyMenu etc.  An example of Alt-Function keys is

               Alt-F1 EzyEd.Exe

          Pressing Alt-F1 would run EzyEd.

             Note:  The Ctrl-Function keys are not yet available for
          use in Ezycom, but will be used in upcoming versions.











                                    Page 27.






          Sound
          -----
               If you set start and ending time this will enable the
          bell (Speaker) to chime when a user logs on in stand alone
          mode.  A start time of 00:00 and end time of 00:00 enables
          full 24 hour chimes, whereas a start time of 00:01 and end
          time of 00:01 disables it completly.  Any other times, only
          enables it during those times.

               Incoming Call Bell Start Time : 00:00
               Incoming Call Bell End   Time : 00:00

          Access
          ------
               These access settings are to set your system up in
          special ways.

          Guest Account    : EZYCOM
          System Password  : [UnUsed]
          Logon Password   : [UnUsed]
          Newuser Password : [UnUsed]

               The example above shows that you don't need to use all
          the features in this section.  Just the ones you want.

               Guest Account : This allows you to make an account.
          That lets you configure your system to allow special users
          to have a special security level that can do differant
          things on the system.  You have to open an account with
          ezyed (userbase editor) with the same name.  If you use the
          Topmenu option in the user editor (page 2) you can setup an
          entirely differant system to your nomal one.  If you have
          mulitable lines, currently only 1 user can use this account
          at a time.  As the system will think that the user is trying
          to logon twice and kick the second user off the BBS.


               System Password : This password is used to lock out all
          the special "Alt" keys from the local keyboard.  When an
          "Alt" key is pressed, the user is prompted for a password.
          If the user types in the correct password, then the "Alt"
          keys become free to use for the remainder of the session.


               Logon Password : This password is used to stop user(s)
          logging on your system unless they know this password.  If,
          they do not get it correct, then they are denied access to
          the system. (Not implemented)


               NewUser Password : This password is used to stop new
          users gaining an account on your BBS, unless they know this
          password. (Not implemented)


                                    Page 28.






          System
          ------
               Now the most important part of this section as it tells
          Ezycom how to operate on your computer.  This is a list of
          options:

             System                     : Your BBS System Name
             Sysop                      : Your Name
             Sysop's Alias              : Your Alias if you use one
             System Location            : Your City and Country
             Inactivity (Mins)          : 5
             Multiline Messages         : Yes
             Multi Tasker               : Auto-Detect
             Use Extended IBM Chars     : Yes
             Swap Out on Jump to Dos    : Yes
             Top Menu                   : Top
             Log to Printer             : No
             Printer Port               : LPT1
             Password Echo Character    : *
             High Bit Replace Char      : o
             Max Time to Bank           : 0
             Max ks to Bank             : 0
             Freq of Message Check      : 1    secs
             Minimum Age for .MNU Test  : 18
             Utility Date Format        : DDMMYY
             Use EMS for Overlays       : Yes
             Swapping Type              : EMS
             Enclosing Brackets         : ()
             Left Bracket               : (
             Right Bracket              : )

               System.  Is where you place the name you wish to use
          for your BBS.

               Sysop.  Place your name here so all messages addressed
          to the Sysop will be sent to you, also it will be the name
          used for the fast logon if you have set it to on.

               System Location.  This is the city and suburb where
          your BBS is location.  Eg: Moorabbin Melbourne

               Inactivity (Mins).  If the user online hasn't hit a key
          in the time set in this option he/she will be logged off.

               Multiline.  This tells Ezycom to perform multiline
          capabilities, including internode messages, user to user
          chats, and other various updates.

               Multi Tasker.  Allow you to toggle how it detects if
          your system is running under a Multi Tasker such as Desqview
          or Double Dos or others.  Just hit Enter to toggle the
          display.



                                    Page 29.






               Use Extended IBM Chars.  This allows users to type in
          Extended characters.  ie If your user are not always English
          speaking, then their name might include some Extended IBM
          characters, although disabling this option, helps reduce
          line noise.

               Swap Out on Jump to Dos.  With this set to Yes Ezycom
          will swap out to either EMS or your hard disk (depending on
          the setting for swapping) this will give you more room in
          Dos on the swap out.

               Top Menu.  The name of the first menu Ezycom is to
          display.  This can be any menu you like but it must be in
          the menu path on your computer.

               Log to Printer.  This will send all the Log information
          to your printer, except for local logins.

               Printer Port.  Is the port that Ezycom will send the
          Log to.  This can either be LPT1->3, or COM1->4.  Make sure
          that you do not log to the comport being used for modem
          communications.

               Password Echo Character.  Is the character that the
          user will see when they enter there password on your system.

               High Bit Replace Char  . This character will be sent to
          users that can only access low bit ANSI screens.

               Max Time to Bank.  Is the maximum time that you will
          allow users Bank.  This time will allow them to stay on the
          system longer than the normal setting for there security
          level, only until this time is used up.

               Max ks to Bank.  Similar to the above option but it
          deals with the users Kilobytes access, so the user can get
          that file which is a little over there limit.

               Freq of Message Check.  Is how often Ezycom checks for
          inter-node messages for multi node systems.  Internode
          messages are ONLY checked with in User/User chats or in
          moving around menus.

               Minimum Age for .MNU Test.  If you have message areas
          or file areas that have information that maybe XXX.  Or you
          feel that young user should not have access to these areas,
          all you have to do is set the age limit that your users have
          to be over to get access to those areas.  You also have to
          set this option in your menus otherwise it won't work.

               Utility Date Format.  Toggles the two date formats that
          Ezycom can use either DDMMYY or MMDDYY.



                                    Page 30.






               Use EMS for Overlays.  Tells Ezycom if its allowed to
          use your EMS memory (if you have it) for its overlay files.
          This will speed the system if set to Yes.

               Swapping Type.  This option allows you define what type
          of swapping type used in Ezycom.  The swapping techniques
          ranges from EMS, XMS, DISK, EMS then XMS then DISK, or XMS
          then EMS then DISK.















































                                    Page 31.






          File Areas
          ----------

          File Area
          ---------
               Here we set-up your file areas for the BBS.  Please
          read this and the following sections very carefully as the
          information shown here will take a while to get through.
          But one you understand how Ezycom file areas are set-up, you
          will then have one of the best file area managers and
          filebase's in the world of BBS's.

             Category    1 Name : General IBM Files
             Area Path          :   1-C:\FILES\GENERAL\
             Upload File Area   :  10-New Uploads
             Conversion         : ZIP
             Offline Allowed    : No
             Sort by            : Alpha
             Master List        : No
             User Security      : 5
             User Flags
             Sysop Security     : 1000
             Sysop Flags

               Category   ## Name.  This is the name you wish to call
          this file area, try to be as informative as possible as this
          name what is displayed to your users.

               Area Path.  This is the path where all uploads, and all
          moves (of files) to this path are placed.  The actual path
          is defined in the "File Paths" section of the config.  This
          allows multiple paths for one file area, or multiple file
          areas for one path.  Generally, the Area Path Number, would
          be the same Number as the File Area.  You can press "P" for
          a pick list, if you forget the Area Path number.
          Example:
          File Area 1
          -----------
          Category            : IBM New Uploads
          Area Path           : 1-C:\F\IBMUPLD
          Upload File Area    : 1-IBM New Uploads

          File Area 2
          -----------
          Category            : IBM General Files
          Area Path           : 2-C:\F\IBMGEN
          Upload File Area    : 1-IBM New Uploads

          File Area 3
          -----------
          Category            : IBM Virus Support
          Area Path           : 3-C:\F\IBMVIRUS
          Upload File Area    : 1-IBM New Uploads


                                    Page 32.






               Upload File Area.  This is the file area where ALL
          UPLOADS that are done to this template file area (explained
          in the menu configuration documentation).  Eg.  If you had
          an IBM Uploads area, you would place that number in all IBM
          areas, so that all uploads would go to that file area.  You
          can also press "P" for a pick list of file areas, in case
          you forget the file area number of IBM Uploads.

               Conversion.  You can pick the conversion type you wish
          your files converted to.  If you like ZIP then if a user
          uploads a file called FRED.LZH then in the next maintenance
          Ezycom will convert the file to the format you place here.
          The formats supported are None, ZIP, LZH, ARJ, PAK, ARC and
          ZOO.  So as you see we have covered most formats.  If, you
          have any other formats you wish added, please contact us,
          and we should be able to provide support for it in future
          versions.  To set up conversion mechanisms, see
          "Conversion".

               Offline Allowed. This option tells Ezycom, whether
          offline descriptions are allowed.  If, set to No, then any
          file descriptions that do not have the associated file on
          your hard disk, will be removed file list.  If, Offline
          allowed is set to Yes, then all file descriptions without an
          associated file on your hard disk, is set Offline.  If, you
          have large file lists, that hold all files that used to be
          on the hard disk, but are now offline, then to stop Ezycom
          checking to see if the file is now online, set Offline
          Allowed to "Offline, Keep Offline".

               Sort by.  This tells Ezycom in what way you would like
          your users to see the file listing.  The options are None,
          Date and Alpha.

               Use in Master List.  This tells Ezycom if the
          particular file area, should be used in Master Lists
          generated with EzyMaint.  However, this does not effect the
          Online Master List Generator.

               User Security.  Is the security level that users need
          to gain access to this file area.

               User Flags.  These are the flags that the user MUST
          have set to gain access to this file area.

               SysOp Security.  This security level is the one needed
          to gain SYSOP access to the file area listed.

               SysOp Flags.  As for the user flags but applying to the
          SYSOP.  As you can see if you like you can set some users as
          SysOps to selected file areas.  For Co-SysOps and alike.




                                    Page 33.






          File Paths
          ----------
               The paths you set up here are the file area paths that
          your BBS uses for all your users at any security level you
          might have set.

           File Path      : C:\FILE\GENERAL\
           Dnld Security  : 5
           Dnld Flags
           New Files Area :   1-GENERAL IBM FILES
           Password       : [UnUsed]
           CD Rom Path    : No
           Sec Action     : File Displayed as Not Enough Security
           Free Path      : No
           Check Age      : No

               File Path.  Is the path to the file area to be
          displayed to the user.

               Download Security.  This is the minimum security needed
          to be able to download off this path.  This security also
          effects functions such as view archive, and view text file.

               Download Flags.  Are the flags needed by the user to
          download off this file area.

               New Files Area.  When Ezycom finds a file in this
          directory, that is NOT in ANY of the file lists, it can
          optionally place this file in a file area for you.  This is
          the file area that it should place it in.  You can press "P"
          for a pick list, if you forget the file area number.

               Password.  If you place a password here the user must
          enter it to download a file in this path.

               CD Rom Path.  If this path is on a CD Rom, then make
          this "Yes" to tell Ezycom, not to MOVE/DELETE files in this
          area.  It also aids in efficiency, in maintenance.

               Sec Action.  When a user tries to download a file in
          this area, and does not have enough Security/Flags/Age to
          download it, this is the type of message that Ezycom will
          display to the user.  Eg.  If you set it to "Not Found",
          then Ezycom will tell the user that this file is not found,
          whereas if you set it to "Security File", ezycom will tell
          the user they do not have enough access, to access the file.

               Free Path.  You toggle this option with the enter key.
          If this option is set to "Yes", then ALL files in this path
          are TOTALLY FREE to the user.





                                    Page 34.






               Check Age.  If you select Yes to this feature Ezycom
          will test the users age against the Age set in the system
          set-up. If the user is below this age the user will not get
          access to this file path.

               To move around the file paths you can hit the page up
          or page down keys or hit P to get a pick list of the file
          paths that you have already entered.


          Misc File Options
          -----------------
               With these choices you tell Ezycom how to behave when
          using Bimodem, Archiving and many other options.

                  Minimum Upload Space (k)  : 20
                  Swap Out on Bimodem       : Yes
                  Ezymaint Conversion Swap  : EMS/XMS
                  Swap Out on Upload Checks : Yes
                  Minimum Ignore FPs Given  : 1000
                  FPs credited for Download : 100%
                  Time of Upload FPs Given  : 100%
                  1 File Point is worth (k) : 1
                  Maximum File Areas        : 50
                  Upload Time Credit Factor : 100%
                  Min Description Length    : 5
                  Max Description Length    : 50
                  Delete Incomplete Uploads : No

               Minimum Upload Space.  This is the minimum space that
          your hard disk must have to let Ezycom allow a user to
          upload to your system.

               Swap Out on Bimodem.  If set to Yes Ezycom will swap
          out to either disk or EMS.  (depending on what you have set
          the swap outs to)  This will give Bimodem more room to use
          in its shell, thus making sure of it running with no
          problems.

               Ezymaint Conversion Swap.  This tells Ezymaint whether
          to Swap out Memory (leaving 4k resident), when processing
          DOCONV.BAT (Conversion).  You can select either EMS, XMS or
          DISK.  Two other options XMS/EMS and EMS/XMS exist to allow
          Ezymaint to check for the existance/use of these memory
          management devices in the order shown.

               Swap Out on Upload Checks.  If you use the upconv.bat
          file that comes with Ezycom it will check the file for
          integrity, scan for Viruses (if you have and use Scan by
          McAFEE) and convert archive types if needed.  So if you do
          set this option to Yes it will give the running programs
          plenty of room to do its work.



                                    Page 35.






               Minimum Ignore FPs Security.  This option sets the
          lowest limit that your users must have to not worry about
          being caught by the filepoint ratios.

               FilePoints Credited for Download.  This sets the
          percentage of a filepoint which is given to the uploader of
          the file the user downloaded.  That is, the more downloads
          of the file, the more filepoints the upload will receive.

               Time of Upload FilePoints Given.   This sets the
          percentage of filepoints given, when the user UPLOADS the
          file to the system.  You may wish to set this to NULL, so
          that the user ONLY receive filepoints for POPULAR files.
          That is, files that are download.

               1 File Point is Worth (k).  This tells Ezycom what in
          kilobytes a file point is worth.  Any amount you think fit
          could be used here anywhere from 1k to 255k.  The higher the
          amount in k, the less accurate filepoints is.  That is, if
          you set this to 30k, downloading a 10k file is free in terms
          of filepoints.  Setting this option to 0k, disables the
          filepoints system.

               Maximum File Areas.  With this option you set the
          amount of file areas you wish to have as a maximum for your
          BBS.  Ezycom can handle Up to 400 file areas.

               Upload time Credit Factor.  Is the percentage of time
          the user receives for uploading a file.  Eg.  100% would
          mean that the user looses no time for uploading, whereas
          200% would give the user double the time he spent uploading.

               Minimum Description Length.  As it says this set the
          minimum length you wish the user to describe the file's
          he/she just uploaded.

               Maximum Description Length.  Is similar to the above
          option only that it sets the maximum description length.
          One point to note is that if you have it set over 50 you
          will find that it might cause a slight hassle with the
          master lists generated.

               Delete Incomplete Uploads.  If set to Yes Ezycom will
          kill the incomplete upload.  But if you do set this, Zmodem
          or any other protocol that allows recovery of aborted
          uploads, will not function correctly.









                                    Page 36.






          File List
          ---------
               This section sets how Ezycom displays file information
          to you the Sysop and your users.  This is another way you
          can make your BBS look different to the others.

             User Show Date           : Yes
             User Show FileSize       : K
             User Uploader            : No
             User Download Count      : Yes
             User Show New File       : Yes
             User Show Security       : No
             User Transfer Time       : No
             User Show File Points    : No
             User Show Security Files : No

               This is the User part of the File List section.  This
          only applies to people that have access to your files for
          downloading.

               User Show Date.  This will show the date of the files
          in the list.  The options are either Yes or No.

               User Show FileSize.  Tells Ezycom how to display the
          file size to the user online either in Kilobytes, Bytes or
          not to display the file size at all.  If you pick None you
          can display the file points for the file instead.

               User Uploader.  If set to Yes, Ezycom will show the
          user who uploaded the files that they are looking at.

               User Download Count.  This shows the user how many
          times the files listed have been downloaded by your users.
          Either Yes or No.

               User Show New File.  This will show the new files to
          your user's when they ask for that list.

               User Show Security.  When a file is marked with a
          Security flag (using FEdit), you can optionally show that
          these files are security files.  The default would display
          an "S" on any security files.

               User Transfer Time.  With this option on Ezycom will
          tell  the user's online how long it would take them to
          download the files.  This is an estimate based on the baud
          rate used.








                                    Page 37.






               User Show File Points.  This shows how many file points
          each file is worth so the user's can quickly workout if they
          can download the file, as long as they know how many points
          they have left.  This option only displays file points if
          the user does not have the "Ignore File Points" Flag set on,
          or their security is below the "Ignore File Points"
          Security.  As File Points is only in registered versions,
          this feature also only works in registered versions.

               User Show Security Files.  If option allows the sysop
          to decide whether or not to show the user "Security Files",
          that is files marked with Security.  Setting this option to
          No, makes Security work in the same was as Private.

               The following list is what you can show the Sysop.
          This is the same as the User list so its the same to set-up
          the only difference are the last two options which are set
          for both User's and the Sysop.

             Sysop Show Date          : No
             Sysop Show Filesize      : K
             Sysop Uploader           : No
             Sysop Download Count     : Yes
             Sysop Show New File      : Yes
             Sysop Show Security      : Yes
             Sysop Transfer Time      : No
             Sysop Show File Points   : No
             Highlight New Files      : Yes
             Show New Files Character : Yes
             Security Files Char      : S

               Show New Files Character.  This option selects whether
          you wish a new files character ("*") is shown, not shown or
          just shown to ASCII users.

               Highlight New Files.  If this option is set, then all
          new files are highlighted, and non new files are dull.

               Security Files Character.  This is the same as the
          above option only that it applies to files that the user has
          not enough security to download.














                                    Page 38.






          File Security
          -------------
               The file security options listed in this area are about
          what files can be password protected separately or if its a
          free download off your system.

             Filename    : BADFILE.BAD
             Security    : 0
             Flags
             Password    : [UnUsed]
             Sec Action  : File Displayed as Not Enough Security
             Free File   : No
             Age Check   : Yes

               Filename.  Is the file that the following options will
          apply to.  This can contain wildcards such as "*.GIF".  Note
          that Ezycom will "translate" wildcards for performance
          reasons into something like "????????.GIF".

               Security.  The security level needed to download/view
          the file(s) listed.

               Flags.  The security flags for the file listed.
































                                    Page 39.






               Password. If one is placed here the user will have to
          supply the correct password to download/view the file.  Note
          that this password overrides that found in filepaths.

               Security Action.  You have two options to pick from ans
          here they are.

             File Displayed as Not Enough Security
             File Displayed as Not Found

          Depending on which one you have picked the user will either
          be display that the file requested had not enough security
          to download or it wasn't found.

               Free File.  Either yes or no on this option and as it
          implies the file is either free to download or not.  Note
          that this setting overrides the setting in FilePaths.

               Age Check.  If set to yes Ezycom will check the user's
          age against the age set in the system's config.  If the user
          is younger than the test age the user will not have access
          to that file.

































                                    Page 40.






          Global File Options
          -------------------

               These option operate on the file areas GLOBALLY so be
          careful as they are very powerful.

             Set Default Security
             Set Default Flags
             Set File Area Conversion
             Set File Area Sort
             Set File Area Offline
             Set File Area Master List
             Set CD Rom Drive
             Set Security/Not Found
             Set Protocol DSZLOG Style
             Set File Area Delete Old
             Set File Area Upload Area
             Set File Area Upload Path
             Set File Path Upload Area
             Centre File Area Name

             Set Global Security.  This will enable a popup window
          that shows the following options.  That deal with security
          on all aspects of the file base.

             User File Area Security
             Sysop File Area Security
             Protocol Security
             File Path Security
             Individual File Sec
             Quit


               User File Area Security.  If you use this option you
          will be setting the user security for ALL of your file
          area's.  This maybe the best option to use if you have many
          file areas that all your users have access to, if you only
          have a few areas that the normal users don't have access to
          then just go to that one and change it as in the file area
          section.

               Sysop File Area Security.  As with the above option
          this sets all the file area's sysop security.  If you have
          different sysops for different file areas you would/should
          have different security levels for each sysop.  If they are
          the same all of them would be sysop's of each others area.
          The other way to make them different is to use the flags,
          more on this later.

               Protocol Security.  This will set the security level
          needed for any user to gain access to the file transfer
          protocols.  If set too high none of your users will be able
          to upload or download files off your system.


                                    Page 41.






               File Path Security.  This will set the level of
          security needed to gain access to the file path's and files
          on the system.

               Individual File Security.  If you have files that you
          want protected by a separate security level you can set them
          all to the same security level with this option.

             Quit.  As is implies this quits back to the previous menu
          list.

               Set Default Flags.  As with the set default security
          this option also displays another popup window.

             User File Area Security
             Sysop File Area Security
             Protocol Security
             File Path Security
             Individual File Sec
             Quit

               Each option list is the same as the previous menu and
          affect the flags in the same way.


               Set File Area Conversion.  This displays a smaller
          popup window which shows you how to change the conversion
          type.

             SPACE=Change, ENTER=Accept and ESC=Quit : None

               By toggling the option with the space bar you can set
          the default conversion type to None, Zip, Lzh, Arj, etc. You
          then hit the Enter key to tell Ezycom that the type
          displayed is the type you want, or hit ESC to exit with NO
          change.

               Set File Area Sort.  As with the above option this also
          displays a small popup window the same as the last one.

             SPACE=Change, ENTER=Accept and ESC=Quit : None

               Again by hitting the space bar you are able to toggle
          between the options, which are None, Date or Alpha.  The
          Enter and Esc keys behave the same as the previous option.

               Set File Area Offline.  Yet another option with a popup
          that looks like the last and behaving the same.

             SPACE=Change, ENTER=Accept and ESC=Quit : No





                                    Page 42.






               This time the options are No, Yes or Keep OFF.  The
          Keep Off option will set the file OFFLINE all the time
          unless you set it otherwise.

               Set File Master List. You only have two options in this
          popup window Yes or No.  Again Space to toggle Enter to
          accept and Esc to exit.

               Set CD Rom Drive.  This is to set the drive letter's of
          your CD's if you have them.  The options are C to Z for the
          drive letters.  This option basically sets the CD Rom Flag
          of All Paths using these Drives letters to Yes.

               Set Security / Not Found.  With this option you can set
          Files or Paths to NOT FOUND if you want.

               Set Protocol DSZLOG Style.  This sets your log style to
          enable you to use the Dsz log style needed when using DSZ or
          GSZ or another protocol that uses this type of logging
          style.

               Set File Area Upload Area.  This sets the default
          Upload file Area for all of your file areas.  All you have
          to do is enter the area number you wish to use as the
          default upload file area.  You can chose form a Pick list of
          all of your file areas if you like.

               Set File Area Upload Path.  This sets the default
          Upload file Path for all of your file areas.  As in the
          previous option this allows you to also chose the path from
          a pick list of the paths.

               Centre File Area Names.  As it implies this will Centre
          all the file area names so when you display them to your
          users in an ansi, ascii or avatar screen they will be
          Centred.



















                                    Page 43.






          Ezyprot, Protocols
          ------------------

          Default Set-up Protocols
          ------------------------
               Ezycom comes with its own external protocol engine
          called EzyProt.  Currently, it does not use the Fossil
          Driver, but this will come in later versions.  This set-up
          is made to work regardless of whether you have locked com
          ports or not.  The protocol engine comes with XModem, XModem
          CRC, XModem-1K, XModem-1KG, YModem, YModem-G, ZModem, Kermit
          and ASCII.  These protocols automatically dupe check on the
          fly, that is, when a new file is sent, it checks it for a
          duplicate file, and if so, stops that file from being sent.
          If, the user is using ZModem, then the file is simply
          skipped, but if YModem/Kermit is being used, then the whole
          transfer is aborted, unfortunately.  Single file transfers
          are different, since, Ezycom stops the user from uploading
          the duplicate file before it passes to Ezycom.

               Ezycom also comes with a sample setup for Moby Turbo
          (in registered versions of DSZ), Lynx and Puma.  They have
          been disabled, in case you do not have these protocols.  If,
          these protocols are installed, then DSZLOG must be set for
          them to work.  Normally, the DSZLOG path would look like
          "set DSZLOG=C:\EZY\DSZ.1" for node 1, "set
          DSZLOG=C:\EZY\DSZ.2" for node 2, and so on.

               As stated earlier Ezycom at the moment does not use the
          fossil, so if you have non-standard comport assignments then
          you will need to alter the defaults.

               Default Comport Assignments

             Comport      Base Address     IRQ     Comport Vector
                1             3F8           4             C
                2             2F8           3             B
                3             3E8           4             C
                4             2E8           3             B
                5             4220          3             B
                6             4228          3             B
                7             5220          3             B
                8             5228          3             B

               If this is not correct for the comport that you are
          using, then you can SET an enviorment variable to tell
          Ezyprot to use special values for that session.

               This is done by setting the "EZYPROT" enviorment
          variable this way.
               EZYPROT=<baseaddress>,<irq>,<comportvector>.

          Eg to set com1 using the above information would be.
               SET EZYPROT=3F8,4,C

                                    Page 44.






               Of course if multinode operation is being used, and the
          default setup is not the same as you have.  You will need to
          set the enviorment for each comport for the nodes you have.

          Eg If you are running multinode under Desqview you would
          have to set the environment variable in each Desqview
          window.
          As long as the default does not work on your system.

               This is what you see when ezyprot is running.


           Protocol:       Zmodem         Bytes sent:        322283
           Block check:    Crc32          Bytes remaining:     4004
           File name:      EZYCOM1.ZIP    Blocks sent:           21
           File size:        326287       Blocks remaining:       4
           Block size:         1024       Block errors:           0
           Total blocks:         26       Total errors:           0

           Est. time:     21:51           Throughput:       226 CPS
           Elapsed time:  21:38           Efficiency:           94%
           Remaining time: 0:17

           Progress:       #################################*******
           Status:         Ok
          ---| EzyProt V1.00 |--------------------------------------
           Baud Rate:          2400       Start:              18:18

               As you can see you have all the information on the
          download in progress you will need.

























                                    Page 45.






          Bimodem
          -------
               Ezycom has a menu option (Type 30) to run BiModem. This
          is a full blown BiModem interface.  No external utilities
          are required.  You are required to have a version of BiModem
          V1.24 or later to use with this option.

               Place the path where BiModem will reside in your
          CONFIG->Paths->BiModem_Path (Usually C:\EZY\BIMODEM).  In
          this directory, you are required to place BIMODEM.COM,
          BICONFIG.COM and the configuration for each Node (BIMODEM.1,
          BIMODEM.2 etc from PROTCFG.ZIP).  When Ezycom executes
          BiModem, it tells BiModem to use BiModem.<node> as the
          configuration file for it.  To edit the configuration for
          each node, you use

             BICONFIG /C BIMODEM.1    for node 1
             BICONFIG /C BIMODEM.2    for node 2 etc

               If, your system path is not C:\EZY, then you will need
          to alter the filenames and paths accordingly in BiModem
          Config.  Ezycom automatically makes a list of download
          directories on execution of BiModem.  This list of paths,
          contains only those of which the user has access to.  It
          creates a DOWN.<node> in your BiModem directory.  If, you
          want to reject uploads, then make sure your rejection list
          of directories points to this file as well.  As users might
          not have access to all directories, it could be possible for
          them to upload duplicate files.  If, you do not want this to
          occur, make up your own list of paths (or with EZYFF -
          L<filename>), and make the rejection list point to that
          file.

               All BiModem uploads should go to the CONFIG-> Paths->
          Upload_Path.  Ezycom will then move the files to the
          directory, which you actually wish to upload to go.  ie IBM
          Uploads, Amiga Upload, etc.


















                                    Page 46.






          Setting Up Your Own Protocols
          -----------------------------

          Name             : XModem                      Record #1
          Key              : X
          Status           : Up/Down
          Batch            : No
          BiDir (Not Imp)  : No
          Log Name         : C:\EZY\PROT1\DSZ.*N
          Ctrl Name        : [UnUsed]
          Minimum Security : 0
          Flags
          Download Command : C:\EZY\PROT1\DSZ.COM port *P speed *O
          Download Ctrl    : [UnUsed]
          Download Log Key : S
          Download Err Key : E
          Dnload Err2  Key : L
          Upload Command   : C:\EZY\PROT1\DSZ.COM port *P speed *O
          Upload Log Key   : R
          Upload Err Key   : E
          Upload Err2 Key  : L
          Efficiency       : 78%
          Log : FileName   : 11
          Log : CPS        : 5

          As you can see you are able to add extra protocols to
          Ezycom.  You will have to read the documentation on the
          protocol on how to set it up for Uploading and Downloading.

               Name.  Is the name of the protocol used in this record.
          Eg Zmodem, Puma etc.  Ezycom will use this to display the
          name to the user online.

               Key.  This is a ONE character key that the user will
          hit to gain access to this protocol.  This should be a
          unique key (not used in other protocols).

               Status.  The status tells Ezycom what the protocol will
          be able to do.  Either Upload, Download, Both or if the
          protocol is Disabled.  Use the Enter Key to toggle the
          status of this option.  The options are Up/Down, Upload,
          Download or Disabled.  If the protocol is disabled it will
          NOT be shown to the user.

               Batch.  This option tells Ezycom if the protocol is
          able to handle batch uploads or downloads.  Eg Zmodem.

               BiDir.  This is for the new bidirectional protocols Not
          Implemented in this version of Ezycom.

               Log Name.  Is the name of the log file used.  The most
          common will be C:\EZY\PROT1\DSZ.*N.  The *N will translate
          to the Node being used.


                                    Page 47.






               Ctrl Name.  If the protocol is capable of a batch
          transfer it will most likely need a control file to tell it
          what files to download.  So you would set this to something
          like C:\EZY\PROT1\FILES.*N  as in the previous section the
          *N will translate to the Node being used at the time of
          calling the protocol.

               Minimum Security.  This is the minimum security the
          user must have to gain access to this protocol.

               Flags.  This will display a popup window that you will
          be able to edit.  Using the up and down arrows you can
          access the flag that you want.

               Download Command.  This the actual command line that
          will be sent to the protocol file area to get the protocol
          to download.  Make sure that you read the documentation on
          the protocol to get it right.  All the usual Type 7 control
          codes can be placed in the command line.  One SPECIAL
          character exists, that can be used for translation.  "#" is
          a list of All the Files that will be sent in this session.
          Although, if you are using a BATCH protocol, the number of
          files in the batch could exceed the maximum length allowed
          by DOS for parameters, so that only a few files are sent.
          In this case, the download control file is recommended.  "#"
          is nearly ALWAYS used on non-batch protocols.  (Eg XModem)

               Download Ctrl.  This is the control character used by
          the protocol.  Used in batch protocols.  Special
          "characters" exist that can be translated.  That is, @ will
          translate into the path and filename of a file to be
          downloaded.  If multiple files are being sent, then each
          line will contain a path and filename.  Text can also be
          placed in there, such as "Send @", could translate into
          "Send C:\FRED1.ZIP" on line 1, and "Send C:\FRED2.ZIP" on
          line 2, and so forth.

               Download Log Key.  Is the key used by the protocol to
          log the download in the log file.
               Download Err Key.  Is the error key used by the
          protocol if there is an error that aborts the sending of the
          file.  As users now receive "FREE" downloads by aborting
          downloads near the end, it is in your best interests to have
          aborted downloads LOGGED.

               Dnload Err2  Key.  This is the second error key if the
          protocol has one.

               Upload Command.  Like the download command this is the
          actual command line used by the protocol to upload a file to
          your BBS.  Two SPECIAL characters exist for translation
          before the protocol is executed.  The "#" is again used, but
          this time indicates the upload directory WITH a trailing
          backslash.  If, you do NOT want a trailing backslash, simply

                                    Page 48.






           add a "." after it.  Also, a "$" can be used to indicate
          the filename of the file to be uploaded.  This is only for
          use with NON-BATCH protocols, as they generally require the
          filename of the file to be uploaded.  (Eg XModem)

               Upload Log Key.  Is the key character used by the
          protocol in the log file it uses.

               Upload Err Key.  The error character is used by Ezycom
          to determine files that were aborted during the upload
          process. Primarily, this is used to delete aborted uploads,
          if the sysop has configured Ezycom for it.

               Upload Err2 Key.  The second error key if the protocol
          has one.

               Efficiency.  This how efficient the protocol is.
          Ezycom uses this to work out how long the download will
          take.

               Log : FileName.  Is the position of the filename in
          words in the log file.  In a DSZ Log format, the position is
          11.

               Log : CPS.  Is the position of the CPS rate in words in
          the log file that the protocol generates.  In a DSZ Log
          format, the position is 5.

          Example DSZ Log format

                          CPS Rate
                            v
          Z 10007 2400 bps 240 cps  0 errors    0  512 C:\CONFIG.SYS
          ^                                                ^^^^^
          Upload Log Keyword                             Filename




















                                    Page 49.






          Message Areas
          -------------

          Message Area Name
          -----------------
               Place a unique title for the message area here to
          identify  it from all others.  Try to make the name of the
          area reflect the contents of the messages that the area will
          contain.

               As an example "Messages to Sysop".

          Msg Area Name   : MESSAGE TO THE SYSOP        Rec   1
          Area Tag        : Not Needed
          Message Type    : Local
          Message Kind    : Private Only   Kill Messages After 30 Days
          Alias Allowed   : Real Names Only    Kill Recv After 10 Days
          Area Group      : Not Needed          Maximum Messages    50
          Read Security   : 5                  Maximum Kilobytes     0
          Read Flags                           Combined Access     Yes
          Write Security  :     5               Initial Combined   Yes
          Write Flags                           Test for Cfg Age    No
          Sysop Security  : 50000          Keep Private Bit Not Needed
          Sysop Flags                     Show SeenBy Lines Not Needed
          Uplink          : Not Needed         Clear SeenBy Not Needed
          Origin Aka      : Not Needed              Visible Not Needed
          Origin Line     : Not Needed
          SeenBy

          Export To


               The message area name can be up to 30 characters long.
          To delete an area just remove the area name.

          Areafix Tag
          -----------
               This is where you put the name of the echomail
          conference.  It must be a unique Conference tag and reflect
          the actual echomail name.  It can be up to 30 characters
          long, but can not contain spaces.

               For example EC_SUPPORT, EC_BETA.

          Message Types
          -------------
               There are 6 possible types of messages you can
          configure in EZYCOM.

             1/LOCAL    - Allows the exchange of messages only between
          users of the BBS.

             2/NETMAIL  - Allows you to send a private message to any
          user on another bbs that is part of the same network.

                                    Page 50.






             3/ECHOMAIL - Allows the exchange of messages  between
          users on BBS'S that are linked to the same Network.  Usually
          these messages are public and deal with a specific topic.

             4/PASSTHRU - This option if enabled tells Ezymail that
          the conference is forward only.  i.e. No mail will be
          unpacked onto your system but will be forwarded to those in
          your export list.

             5/WAITTHRU - This option is mainly used by HUBS and HOSTS
          of NETWORKS.  If a conference is in WaitThru mode it is not
          active.  It does however, allow a node to turn a conference
          on at his HUB  site by making his HUB request the conference
          from his HOST.

             6/ALLMAIL  - Messages posted to "All" in this conference
          are shown to "All" users on Mail Scan.


          Message Kinds
          -------------
               There are 3 types of message kinds

             1/PUBLIC - These are message areas that contain messages
          that any user can read on the bbs.

             2/PUBLIC / PRIVATE -  This allows you to have both public
          or private messages in the same area.  When leaving a
          message in one of these areas you will be prompted if you
          would like to make it private.

             3/PRIVATE - Messages in this area are private only.
          Private messages being distinct from public messages in that
          only the user who the message is addressed to or the user
          who wrote it can read it.

          Alias Allowed
          -------------
             1/USE ALIAS - Only your alias can be used in this message
          area.

             2/ALIAS - ask for alias - This enables the user to be
          prompted  to use another alias as long as it is not used by
          another user on the bbs.

             3/REAL NAMES ONLY - Only real names can be used in this
          area. This is particularly used for Fidonet echomail
          conferences.

             4/ASK FOR ALIAS - This gives the user the option to write
          a message in the area using an alias. The alias selected
          however can not be used if it already exists on the bbs.



                                    Page 51.






          Areafix Group
          -------------
               This function allows the sysop to define which group
          the Echomail conference belongs to.  The valid range is A
          through Z.  You should categorize your Echomail areas.

             Example: You could use 'F' for all your Fidonet areas and
          S for all your Signet areas.

               This function is used in conjunction with Echo area
          manager (Described later).

          Read Security
          -------------
               This is the minimum security level required by the user
          to read mail in this area.
          Security levels can be set from 0-64000.

             Eg. If the read security is set to 100 then only users
          with security 100 and above can read the messages in that
          area.  If however you wish all users to have access to read
          mail then set security to 0.

          Read Flags
          ----------
               These are the flags required to read mail in the area.
          There are 32 flags available from A1-D8.  These flags work
          in conjunction with the read security level.

             Eg. If you have set the Read Security level to 100 and A1
          flag is turned on then only users with security level of 100
          and above PLUS the A1 flag can read the messages.  To set a
          flag ON place the cursor over the flag you wish to set and
          press X.

          Write Security
          --------------
               This is the minimum security level required by the user
          to write mail in the area.  Security levels can be set from
          0 - 64000.

             Eg.  If the right security is set to 200 then only users
          with security level 200 and above can write in this area.
          If however you want all users to be able to write in this
          area then set the security level to 0.


          Write Flags
          -----------
               These flags work the same as the Read Flags except work
          in conjunction with the write security.




                                    Page 52.






          Sysop Security
          --------------
               This is the security level required to carry out sysop
          functions on the message area.  This enables the sysop to
          read all messages in the area even if they are private,
          delete mail, edit users forward messages, export messages to
          disk or printer and also edit the message header.

          Uplink
          ------
               This is used with Echomail, Netmail and WaitThru areas.
          It is where you put the network address of the system you
          are collecting your conferences from.  (Usually your HUB or
          HOST).

          Origin Aka
          ----------
               This specifies which address should be placed on the
          origin line of an Echomail conference.  If you choose to use
          an alias press Return and a window will open presenting you
          with a list of addresses you defined under "GENERAL
          ADDRESS". This is particularly used if you are a member of
          more than one Network.

          Origin Line
          -----------
               Defines the origin line placed at the bottom of
          Echomail messages which originate from your BBS.  It can be
          up to 50 characters long, and should contain at least the
          name, location and phone number of your system.  You can
          optionally place a *N in the origin line, to indicate the
          node number.

             Eg. Ezycom Support Melbourne 613-xxx-xxxx.  If you do not
          define an origin line here then the default origin line
          specified in Messages Misc will be used.

          Seenby
          ------
               This is a list of your current Seenbys, as defined
          using F8.  For a detailed explanation of Seenbys, see "(F8)
          SEENBYS" further on in this chapter.

          Kill Messages After
          -------------------
               This field is used by Msgcomp and determines how long a
          message resides in the message area before being deleted.

             Eg.  If you set the field to " 7days " then all mail
          older than 07 days will be removed.  If the field is set to
          ZERO then the age of the messages will be ignored.




                                    Page 53.






          Kill Recv After
          ---------------
               This works the same as "Kill Messages After" except
          that Msgcomp wont delete the messages until the specified
          number of days after the message has been read (received).
          If the field is set to ZERO then the age after the messages
          have been read will be ignored.

          Maximum Messages
          ----------------
               This is the maximum numbers of messages that can be
          posted in the area.

             Eg.  If you set Max Messages for 100 then Msgcomp wont
          start deleting messages till 100 messages have been reached
          and then will maintain the area at 100.  When the number of
          msgs exceeds this limit and you invoke Msgcomp, old messages
          get removed till your max messages is equal to the number
          you specified.

          Maximum Kilobytes
          -----------------
               This is the same as Max Msgs except instead of
          determining how many individual messages an area can hold,
          it is determined by how big the message area is in
          kilobytes.  This is especially useful for those sysops who
          have limited disk space.

          Combined Access
          ---------------
               This option determines whether the user is allowed to
          have Combined Access to the Message Area.  Combined Access,
          is whether they can do a Mail Check and/or Globally Read New
          messages for that conference.  Normally this would be set to
          yes, but under some circumstances a NO might be required.
          The user also has the ability to turn Combined Areas Off,
          but if this option is set OFF, they can NEVER turn it on.
          Use Initial Combined if you want them to have it OFF to
          start with, but be able to turn it ON.

          Initial Combined
          ----------------
               This option if selected will determine if a new user
          will initially have combined access to that message area.

          Test For Config Age
          -------------------
               This makes Ezycom test the users age, before allowing
          them to access that conference.  It stops them READING and
          WRITING to the conference.  The AGE is defined in CONFIG-
          >MISC->SYSTEM.




                                    Page 54.






          Keep Private Bit
          ----------------
               This allows you to keep the private bit set on Netmail
          messages and enables only the person who the message is
          addressed to, to read it.  If you set the option to NO then
          the private bit will be removed and the message will become
          PUBLIC.


          Show Seenby Lines
          -----------------
               This is for the sysop and if you decide to set the
          option to "YES" then when the sysop presses ! from the
          message reader he can see the path the message has taken.


          Clear Seenby
          ------------
               This gives you the option to remove seenbys on the
          echomail you are forwarding through your system.  Only the
          systems you echo with directly are left in the SeenBy
          information.  This option is normally only used by
          Zonegates.


          Visible
          -------
               This determines whether or not a conference should
          appear in a system area listing when an authorized system
          requests a list of available conferences, but does not have
          access to the group.  If the visible option is set to "NO"
          then the conference will not appear in the list.


          Page Up/Down
          ------------
               By pressing PAGE UP / DOWN you can scroll through each
          message area in numerical order.


          (F8)  Seenbys
          -------------
               Seenby lines contain useful information for
          Echomail/Passthru/Waitthru software.  Seenbys are a list of
          systems that have already seen /forwarded the message.  By
          pressing F8 you will be presented with a list of your
          network addresses you defined under General Addresses.  Use
          up/dn arrow key to highlight the address you wish to use and
          then press enter.

          The address you pick should be relevant to the conference
          you are forwarding.  Note : At least one seenby should be
          defined in each
          Echomail/Passthru/Waitthru area.

                                    Page 55.






          (F10) Export List
          -----------------
               To access the export list press F10.  You will be
          presented with a list of addresses you defined in NODE
          Manager.  Use your arrow keys to highlight the address you
          wish to forward mail onto and press Enter.  A small square
          will the be presented next to that address.

          Pick
          ----
               By pushing (P) a window will be displayed presenting
          you with all message areas.  Use your UP/DN arrow keys or
          Page UP/DL keys till you highlight the area you wish to
          edit.  Press Enter on the area to accept it.

          Echoarea Manager
          ----------------

          Node
          ----
               Defines a network address for your export list. Eg
          3:636/200 You can have up to 128 nodes.

               Node  (Rec  1)        : 3:636/200
               EchoMail Active       : Yes
               Echo Manager Groups   : AB
               Compress to           : ARJ
               Password to EchoMgr   : XXXX
               Password from EchoMgr : XXXX
               Mail Status           : Normal Mail
               Days to Hold Mail     : 30
               Send .PKT Type        : Type 2+
               Can Create New Echos  : Yes
               Add to New Echos      : Yes

          Echomail Active
          ---------------
               Toggled between YES/NO by the return key to determine
          if the system is active or not.  This can be useful if you
          know one of your NODES is going away on holiday for a few
          weeks and wont be able to pick mail up.  Simply set the
          field to NO and no mail will be forwarded to that NODE until
          you reset it to YES.  Generally, this option would be set to
          YES.

          Echo Manager Groups
          -------------------
               This specifies which groups a system has access to.
          Valid range is A through Z.  If you have given a system
          access to GROUP "F" then that system can access all the
          conferences that you have designated "F" in field Areafix
          Group in the message areas.



                                    Page 56.






          Compress To
          -----------
               This allows you to select which compression method you
          wish to pack your mail packets with.  You have a choice of 7
          archivers and they can be toggled by pressing the return key
          till you reach your selected choice.

          Password To Echomgr
          -------------------
               This is the password that is used when you are
          requesting conferences from this node.  This password would
          generally be the same password as Password From Echomgr.

          Password From Echomgr
          ----------------------
               This is the password your downlinks use when requesting
          areas off you.

          Mail Status
          -----------
               This specifies the status of the mail for this system.
          You can toggle 3 choices of mail by pressing RETURN.

             1/NORMAL MAIL - If mail is flagged as normal it will not
          be transmitted till a scheduled mail event or the system who
          the mail is address to calls you to pick up mail.

             2/CRASH - Mail flagged as Crash is allowed to be sent any
          time of the day.  However Crash mail does require the
          destination system to be qualified.

             3/HOLD MAIL - When mail is flagged as hold, it will not
          be sent until the destination system polls your system to
          pick their mail up.

          Days To Hold Mail
          -----------------
               This determines how long you hold mail for a system
          before it is deleted.  For instance, if a node does not pick
          up mail after 7 days, Ezymail could delete it for you.

          Send .PKT Type
          --------------
               Currently in FidoNet there are two standards at which
          EchoMail can be packed as.  They are both compatible, but
          Type 2+ is 4D, that is, it has Zone, Net, Node and Point,
          whereas Type 2 only has Net and Node information.  Ezycom
          does not handle the fakenet approach, as we do not believe
          in kludging things to make them work.  Most echomail
          processors are now going to the new Type 2+ format.





                                    Page 57.






          Can Create New Echos
          --------------------
               If this option is enabled, then any conference that is
          sent to you by this node, can be automatically added to your
          message areas, whereas if it is not, then this node can not
          create a new conference on your system.  This might be
          enabled for your Host.

          Add to New Echos
          ----------------
               If this option is enabled, then if a new conference is
          made in one of the groups this node has access to, then this
          node is automatically added to the conference.  This might
          be enabled for your Downlinks (Hubs/Nodes/Points) for
          instance.

          Page Up/Down
          ------------
               By pressing Page UP / Down you can scroll through each
          Area Manager area in numerical order.

          Pick
          ----
               By pressing (P) a window will open presenting you with
          a list of all Nodes.  Use your UP/DN arrow keys or Page
          up/down keys till you highlight the Node you wish to edit.
          Press enter on the Node to except it.




























                                    Page 58.






          Message Misc
          ------------

          Usable Message Areas
          --------------------

          Usable Msg Areas     : 32 of 500
          Inbound Mail Path    : D:\DB\FILES\
          Outbound Mail Path   : D:\EZY\OUTFILES\
          ARCmail 0.6 Compat   : No
          Delete Net on Import : Yes
          EchoMail Routing     : Direct
          Swap Out EzyMail     : EMS/XMS
          Dupe Detection       : Yes
          Keep EchoArea Recpt  : No
          Bad Message Board    : 32
          Unknown Area Action  : EchoMail*
          Kill Bad Archive(s)  : Yes
          Quote String         : @>
          External Editor      : EZYEDIT.EXE -N*N
          Old Style MSGTMP     : No
          Default Origin Line  : EzyCom Registration's 61-3-546-3038
          Mark Netmail as Kill/Sent : Ask
          Kill Null Netmail         : Yes

               You can have a total of 500 messages areas, 400 normal
          plus 100 passthru.  It is however unlikely that most people
          would have this many areas.  So for efficiency reasons, you
          can put the actual number of message areas you have.

             Eg. If you use only 32 message areas, you can select 32.
          This will speed up some operations in Ezycom dramatically.

          Note: You can only define the number of message areas in
          jumps of 16, and the minimum is 32.  Also, when you do
          change the number of message areas, it effects the size
          required by the LastRead Pointers.  So, you MUST delete
          LASTCOMB.BBS, which resides in your userbase directory.  If,
          you are using more than one configuration, then EVERY
          configuration MUST have the same number of message areas.
          (Assuming you share the message and userbase).


          Inbound Mail Path
          -----------------
               Path where your incoming mail packets are delivered.

             Eg. C:\EZY\INFILES\







                                    Page 59.






          Outbound Mail Path
          ------------------
               Path where your outgoing mail packets reside till they
          are picked up.  This path, must be ONLY used by EzyMail.  If
          any other files are found in this directory, EzyMail will
          remove them.  This is done to help keep the area 'Clean' of
          files.

             Eg. C:\FD\OUTFILES\

          Arc Mail 0.6 Compatibility
          --------------------------
               By pressing Return you toggle YES/NO to ARCmail 0.6
          compatibility.  Ezycom uses its own naming convention for
          the mail bundles.  Turning this to on, forces Ezycom to use
          the ArcMail method.

          Delete Netmail On Import
          ------------------------
               Normally when a netmail message is imported to the
          Ezycom message base, it is deleted in the netmail path, this
          option stops Ezycom from doing that.
          Swap On Archiving
          -----------------
               If enabled EzyMail will swap out all except for 20k of
          its memory to either EMS or disk.

          Use EMS With Swap
          -----------------
               If enabled EzyMail will swap out to EMS memory.  If
          however you have insufficient EMS, then it will swap to
          disk.

          Dupe Detection
          --------------
               If enabled, EzyMail will do Dupe Detection on Inbound
          Echomail with MSGID kludge lines.

          Keep Echomail Node Receipts
          ---------------------------
               If you require to keep EchoArea requests from other
          systems requesting conferences to be turned on or off, or a
          list of available conferences your system carries then
          enable this function.











                                    Page 60.






          Bad Message Board
          -----------------
               Defines the message area you wish to use to inform you
          of bad conferences you have received.  This works in
          conjunction with Unknown Areas Action.  If you have selected
          Kill in Unknown Areas then a message will be posted in the
          bad message area telling you that an unselected conference
          was sent to your system.

          Unknown AREAS Action
          --------------------
               There are 3 options to select from:

             1/ECHOMAIL (Registered Version Only).
          If you select "ECHOMAIL" then any new undefined "Conference
          Tags" that are detected by your system will automatically be
          added to the message area.  This works in conjunction with
          Message Security options.  Also if you have "New Echo Area
          Notify Board defined, a message will be left in that area
          informing you of the new conferences added.

             2/PASSTHRU - If this option is selected then any new
          undefined "Conference Tags" that are detected by your system
          will be automatically added as passthru conferences in the
          message area.

             3/KILL -  If this option is selected then any new
          Undefined "Conference Tags" that are detected by your system
          will be deleted, and not added to your message area.  If you
          have "Bad Message Board" defined then a message will be
          posted in that area informing you of the Bad conferences.

          Kill Bad Archives
          -----------------
               Lets you select if you wish to delete incomplete or
          corrupted mail packet archives.

          Quote String
          ------------
               This is the string used when you quote a message using
          a full screen message editor.  An example is @> the @ will
          insert the users initials and the > just acts as a prompt
          but this is sysop definable.

          External Editor
          ---------------
               This is the DOS command line that will be used to call
          up a full screen external message editor.  All control codes
          used in a type 7 menu are supported.  For example *P for
          command port, *B for baud rate and *T for time.





                                    Page 61.






          Old Style MSGTMP
          ----------------
               This option allows the System Operator to configure,
          which style of External Full Screen Editor Format should
          Ezycom support.  Currently, two formats exist, the MSGTMP
          format, and the MSGTMP.<node> format.  The MSGTMP format is
          the most common, and this is used by QUICKED and TOPED full
          screen editors, whereas the other format is only used by
          EzyEdit (by Brad Vonarx).  The first two editors place a
          very big restriction on Ezycom, in that for every node used,
          there must be a seperate directory for each node, containing
          that editor inside the path, whereas EzyEdit interfaces
          better with Ezycom, allowing all nodes to run in the one
          directory if so desired.  More information about Full Screen
          Editors and multitasking can be found in the "Multiline"
          part of the document.
          Default Origin Line
          -------------------
               Used to define your default origin line.  Each Echomail
          area can be set with different Origin lines to be attached
          to the end of messages that are posted in each area.
          However if you choose not to put individual Origin lines in
          each area then the Origin line defined here will be used.
          Remember to at least put your system Name, location and
          phone number in the Origin line.  You can also optionally
          add a *N to indicate which node the message was written on.

             Eg. Ezycom Beta site1  MELBOURNE  61-3-XXX-XXXX

          Kill Null Netmail
          -----------------
               If this option is set, then any packed netmail messages
          sent to EzyMail and your system (not passing through), will
          be purged if there is no text within the message.

          Mark Netmail As Kill / Sent
          ---------------------------
               Allows you to set the Status Bit to Kill/Sent by
          default on created Netmail messages from your system.  What
          this means is that once the Netmail message has been sent it
          will then be deleted.  Hit Return to toggle between YES / NO
          / ASK.













                                    Page 62.






          Message Security Option
          -----------------------

          Force Crash Mail Security
          -------------------------

          Force Crash Mail Security      : 64000
          Optional Crash Mail Security   : 1000
          Netmail File Attach Security   : 1000
          Netmail File Request Security  : 1000
          Security to Update Users       : 1000
          Read Sec on New EchoMail Area  : 1000
          Write Sec on New EchoMail Area : 1000
          Sysop Sec on New EchoMail Area : 1000
          Reply Via Netmail Security     : 1000
          Request Receipt Security       : 1000

               Force Crash Mail Security.  This is the minimum
          security level required to send Crash Netmail messages.

          Optional Crash Mail Security
          ----------------------------
               This is the minimum security level required for a user
          to be prompted if he wishes to send a Crash Netmail message.
          If he selects no then the message will be sent in a normal
          mail session.

          Netmail File Attach Security
          ----------------------------
               This is the minimum security level to allow users to
          attach a file to a Netmail message.

          Security To Update Users
          ------------------------
               This is the minimum security level to allow (usually
          the sysop) to upgrade users from the message reader by
          pressing "U" or from the user listing by selecting "Edit".
          In either case you can edit the users security level and
          flags.

          Read Security On New Echomail Area
          ----------------------------------
               This is the minimum Security level set to "Read"
          Echomail in newly created Echomail Areas if you have
          selected "ECHOMAIL" in Unknown Areas Action under Messages
          MISC.

          Write Security On New Echomail Area
          -----------------------------------
               This is the minimum Security level set to "Write"
          Echomail in newly created Echomail Areas if you have
          selected "ECHOMAIL" in Unknown Areas Action  under Message
          MISC.


                                    Page 63.






          Sysop Security On New Echomail Area
          -----------------------------------
               This is the sysop Security level set in newly created
          Echomail Areas if you have selected "ECHOMAIL" in Unknown
          Areas Action under Message MISC.


          Reply Via Netmail Security
          --------------------------
               This sets the security level for replying to a message
          using NetMail.  For this to work fully a few things have to
          be right.  First the user has to have the security level
          needed to access this feature, second the user MUST have
          access to the WRITE netmail access for the area that the
          message belongs to Eg Fido.  And finely the message being
          replyed to MUST have a MSGID.  Note Only NEW messages tossed
          to your system will have the correct return address for the
          reply.  After you have set up EZYCOM V1.01 set this to the
          sysop for a week to make sure that only new messages are
          able to be replied to.


          Request Receipt Security
          ------------------------
               This sets the security level needed to ask for a
          receipt on the message you post ONLY in local mail.  If you
          have this security level you will be asked if you require a
          receipt, if you ask for one, ezycom will send you a message
          that the user has recived the message that you set the
          receipt on.  You MUST have a file called RETRECPT.ASL in
          your text file path.  A sample of retrecpt.asl in in the
          setup.dat file that comes with Ezycom.  This file handels
          all the smart text codes except the change current colour
          ones.




          Netmail Boards
          --------------

               3:636/204            : 4
               80:1000/6            : 4
               0:0/0                : 1
               0:0/0                : 1
               0:0/0                : 1

               This allows you to define which message area Netmail
          messages will be imported to for each Network address.

          Domains
          -------

               3:636/204  : fidonet.org

                                    Page 64.






               80:1000/6  : ezynet.org
               0:0/0      : [UnUsed]
               0:0/0      : [UnUsed]
               0:0/0      : [UnUsed]

               Allows you to define each Network address against a
          NETWORK.
          For example:  If your Fidonet Network addresses is 3:636/200
          you would place "fidonet.org" as the domain.














































                                    Page 65.






          Compression
          -----------
               This is where you define the compression line
          parameters for your Archives.

                     -----------------------------------
                     ZIP   : PKZIP.EXE     -ao
                     LHA   : LHA.EXE       a-tm
                     ARJ   : ARJ.EXE       a-ey
                     ARC   : PKARC.COM     -oct -a
                     PAK   : PAK.EXE       A /O /WA /L
                     ZOO   : ZOO.EXE       a:
                     LHARC : LHA           a -otm
                     -----------------------------------

               Ezycom is already set up to handle 7 different
          archives, so usually you can just leave the above parameters
          as default.

          Uncompress
          ----------

               This is where you define the decompression command line
          parameters for your Archive utilities.


             Eg.
                        ------------------------------

                        ZIP     : PKUNZIP.EXE    -o
                        LHA     : LHA.EXE       e /cnm
                        ARJ     : ARJ.EXE       e -y
                        ARC     : PKXARC.COM    -r
                        PAK     : PAK.EXE       e /wa
                        ZOO     : ZOO.EXE       -e

                        -------------------------------

               Ezycom is already set up to handle 6 different archives
          so usually you can just leave these parameters as default.















                                    Page 66.






          Global Message Options
          ----------------------
               The options listed below give the sysop great
          versatility plus the added advantage of saving time by
          allowing you to set values for all message areas at once
          instead of editing each individual area.  By selecting any
          one of the below fields will set all defined message areas
          for that option to the same value. I will now discuss each
          option individually.

               Set Default Security
               Set Default Flags
               Centre Message Area Name
               Set Maximum Kilobytes
               Set Maximum Messages
               Kill Messages After XX Days Old
               Kill Recv Messages After XX Days
               Add/Rem Node to/from Area Groups
               Add/Rem Net Address to/from Area Groups

          Set Default Security
          --------------------
               By pressing RETURN on this option you will be presented
          with another small window -

                         ------------------------------
                              (R)ead      (W)rite
                              (S)ysop     (Q)UIT
                         ------------------------------

               By selecting "R" you will be able to change the read
          security on All message areas if you wish to have them set
          at the same security level.

               By selecting "W" you will be able to change the write
          security on All message areas if you wish to have them set
          at the same security level.

               By selecting "S" you will be able to change the Sysop
          security on All message areas if you wish to have them set
          at the same security level.

               By selecting "Q" - it will take you back to Global
          Message Menu.











                                    Page 67.






          Set Default Flags
          -----------------
               Works the same as Default Security but changes the
          "READ", "WRITE" or Sysop flags for all message areas to the
          same flag settings.
          Centre Message Area Name
          ------------------------
               This centres the Message Area Names on all message
          areas.  To activate this function just press RETURN on this
          option and all message area names will be centred.

          Set Maximum Kilobytes
          ---------------------
               By pressing  RETURN on this option another window will
          open.  Just type the value you wish to set Maximum kilobytes
          to and then press RETURN.

          Set Maximum Messages
          --------------------
               By pressing RETURN on this option another window will
          open.  Just type the value you wish to set Max Messages to
          and then press RETURN.  All message areas will then be set
          to this value.

          Kill Messages After XX Days Old
          -------------------------------
               By pressing RETURN on this option another window will
          open.  Just type the value you wish to set KILL MESSAGES
          AFTER XX days old to then press RETURN.  All message areas
          will then be set to this value.

          Kill Received Messages After XX Days
          ------------------------------------
               By pressing RETURN on this option another window will
          open.  Just type the value you wish to set the KILL RECEIVED
          MESSAGES AFTER XX DAYS to then press return.  All message
          areas will then be set to this value.

          Add/Rem Node from area list.
          ---------------------------
               This allows you to add or remove a Node in your export
          list from / or to a Group of conferences.  When you hit
          RETURN another window will open prompting you if you want to
          add or remove.  Select what option you require.  You will
          then prompted for the Node number, and then which groups.
          For example if you wish to remove a Node from receiving
          group "F" Echomail conferences you would
             1)SELECT REMOVE
             2)TYPE the Node number in Eg. 3:636/200
             3)Type the group(s) - in our example "F"
             4)THEN PRESS RETURN

             This will then remove Node (3:636/200) from all group "F"
          conferences.

                                    Page 68.






          Add/Rem Node from area list.
          ---------------------------
               This option is basically the same as the previous one,
          except that it works on your seenbys rather than your export
          list.


















































                                    Page 69.






          Modem Set-Up
          -----------

          Comport
          -------
               Specify which "COM PORT" your modem is connected to.

             Eg. 1 for COM1, or 2 for COM2.


          Max Baud Rate
          -------------
               Select the maximum baud rate your modem supports.  To
          select a baud rate press RETURN till your baud rate appears.
          This is the speed your modem will be initialized at.  Valid
          bauds rates are 300, 1200, 2400, 4800, 9600, 19200, 38400.


          Locked Port
          -----------
               Usually "NO" for most low speed modems (2400 or lower),
          but with high speed modems it is usually YES.


          Connect Responses
          -----------------
               This option selects if your modem sends "Connect
          Commands" or not.  If, this is set to NO, then Ezycom always
          logs the user on at Maximum Baud Rate.  Usually this would
          be set to "YES".  For example Connect 2400.

          Init Response
          -------------
               The response sent back by the modem after a command has
          been issued.  Usually set this to "OK".

          Ring String
          -----------
               This field allows you to define the "RING RESPONSE"
          from your modem when a ring signal has been detected from an
          incoming call.  Usually set this to RING.

          Modem Delay
          -----------
               Many modems cannot accept command strings at full
          speed.  Because of this an inter-character delay in tenths
          of a
          second is needed.  For high speed modems this can be between
          1 or 2 but for most modems set it to a value between 4 and
          8.





                                    Page 70.






          Auto Answer
          -----------
               This determines if Ezycom should answer the phone or
          the modem.  If you select YES then EZYCOM will send the
          manual answer string to the modem to make it answer.  Make
          sure ATS0 = 0 is in your INIT string for this option.  If
          you select NO then the modem will answer the call.  Make
          sure you have ATS0=1 in your init string for this option.
          However the recommend setting is NO as it proves EZYCOM is
          up and running.

          Start Time
          ----------
               This allows you to define the start time for EZYCOM to
          answer the modem.  Make sure Auto Answer is set to NO.  This
          is useful if you are only running a part time bbs.

          End Time
          --------
               This defines when EZYCOM will cease to answer the
          modem.

          Init Tries
          ----------
               Specifies how many times EZYCOM will send the
          initialization string to the modem.  Usually you set this
          between 5 and 10.

          Init String 1
          -------------
               Type your modem initialization string in here.  These
          are the commands which are sent to the modems to intialize
          it and prepare it to answer calls.

          Init String 2
          -------------
               Used if you wont to send more than one initialization
          string to your modem.

          Set Busy String
          ---------------
               Used to make your modem in the busy state.  (Offhook)
          Usually set this to ATH1|

          Manual Answer String
          --------------------
               If you selected "NO" to auto answer, then this is the
          string that is sent to your modem to force it to answer the
          call.  The default is ATA|






                                    Page 71.






          Send Break To Modem
          -------------------
               This option tells Ezycom to Send a Break to your Modem
          when clearing the Fossil Buffer.  This is mainly for use
          with High Speed modems with Internal Buffers (such as the US
          Robotics Courier HST).  If you are not sure whether to place
          this option On or Off, leave it Off.
















































                                    Page 72.






          Baud Rate Set-Up
          ----------------

          Baud Rate
          ---------
               Define the baud rates your modem supports in a separate
          window.  For example if you have 2400 baud modem and it
          supports 300,1200 and 2400 use the PAGEUP/PAGEDOWN keys, and
          place a single baud rate in each window.  If, you are using
          a modem that does NOT support LOCKED baud rates, then only
          300, 1200, 1275, 2400, 4800, 9600, 19200 and 38400 baud
          rates are supported, however, if you lock your modem at a
          particular baud rate, then you can select/make baud rates of
          any amount.

          Efficiency (CPS)
          ----------------
               Usually worked out on 10 % of the modem baud rate.
             For example:     300 baud would be 30
                             1200 baud would be 120
                             1275 baud would be 120
                             2400 baud would be 240
                             9600 baud would be 1920
                            38400 baud would be 3840

               However for HST modems this is not quite true as a HST
          can do 1600(cps) or greater for 14400 baud.  For HST users
          the best setting would be about 1650(cps).  This efficiency
          setting is used to work out download times.

          Connect
          -------
               These are the connect strings that the modem passes to
          EZYCOM for a particular baud rate.
          For example: CONNECT 2400    CONNECT 9600

          Make sure you end the CONNECT for 300 baud with a pipe '|'
          or else all CONNECTS will be 300 baud.

















                                    Page 73.






          Networking with Ezycom
          ----------------------
               A mail network is basically a set of bulletin board
          systems that are capable of exchanging messages and files
          with each other without the Sysop's needing to intervene.
          Of these mail networks FidoNet is the world's largest, this
          is an amateur mail network which has  approximately 10,000
          bulletin board systems.  Each of these is assigned a unique
          address.  All networks have this type of address setup to
          keep all the different bulletin boards separate across the
          network.  A file called a nodelist stores all these
          addresses along with other information about each system.

               Being part of such a network will give you access to
          NetMail and EchoMail.  NetMail allows you to send a private
          message to any user of any one of the bulletins boards in
          the network.  EchoMail also allows you post messages to many
          bulletin board systems in your mail network, but this method
          is different to NetMail, in that the messages are usually
          public, and are organised into either general discussion
          areas, or areas that deal with specific issues and or
          topics.

               The FidoNet network is organised into several levels,
          which are usually based on geographical proximity.  At the
          highest level there are six ZONES;  zone 1 is the USA, zone
          2 is Europe, zone 3 is the Pacific Rim, zone 4 is  South
          America, zone 5 is Africa and zone 6 is Asia.  Within each
          zone are a number of REGIONS  that span  large geographical
          areas.  Typically there will be between 5 and 18 regions per
          zone. Each region is further divided into NETS.  Each net
          has a unique net number, and the distribution of these nets
          is also based on geographical and technical considerations.
          Finally, within the net are a number of NODES.  A node
          refers to a single bulletin board system.

               To find out about obtaining a node number, or an
          ADDRESS, contact the nearest FidoNet bulletin board.  The
          sysop will usually be more than happy to help you out.

               The only piece of software that you will need to
          connect your Ezycom software to such a network is a frontend
          mailer.  This is will answer the telephone for you and if
          it's a mail call, it will send the mail you have waiting and
          receive the mail from the system that has called.  In most
          cases you will have to place the call to your host to pickup
          your mail, this is called POLLING for mail.  When you
          receive your mail you use Ezymail to toss the mail into the
          message base.  The most common mailers are D'Brigde and
          Frontdoor.  Note Ezymail will NOT work with BinkleyTerm at
          the moment.  D'Bridge is a commercial mail package whereas
          FrontDoor is freely available for use.  Frontdoor is
          available off most bulletin boards, if you check with the
          sysop of one of these bulletin boards they might give you

                                    Page 74.






          the access to get them.

               The node number you will be assigned should be of the
          format Zone:Net/Node.Point.  This initial node number should
          be put into your configuration file.

          Eg 3:636/213.0  Which means you are in Zone 3 in 636 Net and
          are Node 213 the .0 is there incase you are a point off a
          boss.  This is more fully explained in the mailer's
          documents and out of the scope of this document.

               Each EchoMail message that is posted on your system
          could potentially be read by hundreds of other sysops and
          users, with this in mind please abide by the rules of your
          respective networks.  EzyCom allows you to be a member of
          many networks like FidoNet, SigNet, MysticNet the list is
          endless all you have to do is place their address's they
          send you in your AKA address section of the config file.

               Conferences, these are the message areas that you can
          receive from the networks you are connected to.  To add a
          conference to ezycom all you have to do is enter the
          conference tag into the message base configuration and make
          sure you set up the seenby's, export list (other BBS's that
          might get this message conference off you), and so on.

               For further assistance you can contact your proposed
          host or ezycom support for help, as this is beyond the scope
          of this document.


























                                    Page 75.






          Sysop Function Keys
          -------------------

          The following function keys are only available when a user
          in online.

               (F1-F6)
          Toggling between these keys displays complete user
          information on the status bar at the bottom of the screen.

               (F7)
          Pressing this key makes the system available for the sysop
          when the user logs off.

               (F8-F9)
          Provides help on the ALT and 'F'unction keys.

               (F10)
          Turns the status bar on the bottom of the screen off.  Press
          any of the other 'F'unction keys to turn it back on.

               (ALT-S)
          Allows you to change the online users security level.

               (ALT-C)
          Brings online users into chat allowing you to "talk" to the
          user via the keyboard.  Press escape to end the chat mode.
          The standard Alt-C brings up the full screen chat.  To bring
          up the line chat, press SHIFT at the same time as pressing
          ALT-C.

               (ALT-M)
          This is very useful feature when you log on locally.  It
          allows you to completely edit (page 1) of the users record
          when you read mail from that user.

               (ALT-J)
          Performs a shell to DOS while the user is on line.

               (ALT-E)
          Allows modification of Page 1 of the user on-line.

               (ALT-P)
          Toggles whether the user activity should be sent to the
          printer.

               (ALT-D)
          Toggles local screen on/off to see what the user is doing.

               (ALT-G)
          Sends an ASCII bell character (character 0x07) to the user
          online to gain their attention.



                                    Page 76.






               (ALT-H)
          Disconnects the user immediately.

               (ALT-N)
          Displays fake line noise to the user and local screens.

               (ALT-L)
          Drops the user's security level to zero (0) thereby locking
          them out of the system permanently, then logs them off.

               (ALT-I)
          Send inactivity timeout message to the user, and then log
          him/her off.

               (ALT-U)
          Allows you to make up a message to send to the user, and
          then it will hang them up immediately.

               (ALT-X)
          Allows the sysop to edit certain system parameters for the
          current session.  The statistics that can be edited are Next
          Sysop, Minimum Disk Free Space, Swap on Jump to DOS,
          Swapping Type, Number of Pages, Page Sound, User Ratios and
          Download Limit.  Note that Type 15 Exits will reset some of
          these options.

               (UP ARROW)
          Increases the user time by one minute.

               (SHIFT-UP ARROW)
          Increases user time by ten minutes.

               (DOWN ARROW)
          Decreases the user time by one minute.

               (SHIFT-DOWN ARROW)
          Decreases user time by ten minutes.


















                                    Page 77.






          Ezycom Command Line Parameters
          ------------------------------

          The following is a list of command line parameters supported
          by Ezycom:

              -Px = Com port selected (1-8).

              -L  = Local logon.

           -BXXXX = Log users on at baud rate xxxxx (300-38400).

           -EXXX  = Exit after caller logs off at error level xxx
                   (20-255).

              -S  = Set display to off. (no local screen)

              -D  = Disable status bar at the bottom of the screen.

              -T  = Time (in minutes) till next system event.

              -R  = Re-logon user after Type 15 exit.

            -NXXX = Node number if running Multi line.(1-250)
                    This can also be used with the -R parameter when
                    relogging a user back on a Multi line system.
                    EG. -R -N2




























                                    Page 78.






          Errorlevels
          -----------

          When Ezycom exits after a user logs off or due to a type 15
          menu exit it returns an errorlevel that the batch file you
          ran Ezycom from should trap and act upon.

          The errorlevels Ezycom produces are:-
             0 = Normal exit
             1 = Set-up error
             2 = Software error
             3 = Fossil error
             4 = Modem Init Error
             5 = Echomail Entered
             6 = Netmail Entered
             7 = Echomail and Netmail Entered
             8 = NextSysop
             9-19 = Reserved.





































                                    Page 79.






          Ezycom External Support Files
          -----------------------------

          Trashcan.ctl (Optional)
          ----------------------

               This file contains a list of names specified by you as
          unacceptable to be used.  Place one name per line.  The
          standard check that Ezycom makes is look for the Text you
          specify in the users name.  ie "Sysop" would not be allowed
          in a user who logged on as "Fred Sysop" or "Sysop".  Whereas
          if you placed a "*" in front of Sysop, for example "*Sysop"
          then "Fred Sysop" would be allowed to logon, but "Sysop"
          would not be allowed to logon.
          Eg.  If you wish the following names not to be used "sysop"
          "all" then place each name in TRASHCAN.CTL as below:

          SYSOP
          IDIOT
          *ALL

          Therefore if a user tries to logon using "SYSOP" or "IDIOT"
          as a first or last name they will be unable to.

          NOTE: If you are allowing aliases on your system be careful
          they don't use a single name like "John".  If this user was
          to be put in the TRASHCAN.CTL file then any user whose name
          contained "John" as a first or last name would not be able
          to logon the system.  If, you do want to stop the single
          word names, MAKE sure you place a "*" in front of the name
          to stop this from happening.


          Phonenum.ctl (Optional)
          -----------------------
               This file contains phone numbers or partial phone
          numbers you know to be false or unacceptable.  Place the
          phone numbers one per line.
          Example: If Phonenum.Ctl contained,
          12-
          -123-
          Then no user could logon with a phone number that contained
          12-xxx-xxxx or xx-123-xxxx.

          Regexp.q-a (Optional)
          ---------------------
               Runs a questionnaire defined by you when the users
          registration has run out.
          This is only used if you have enabled regodays in config
          under "General->Limits".
          See Script Files for help on REGEXP.Q-A.




                                    Page 80.






          Newuser.q-a (Optional)
          ----------------------
               Allows you to define a new user questionnaire.
          (Consult questionnaire section for more details).

          Newuser2.q-a (Optional)
          -----------------------
               Allows you to define a new user questionnaire, but the
          user record has already been written to the user records at
          this point, so MENUCMNDs are valid.

          Phonedup.ctl (Optional)
          -----------------------
               If a user logs on using a phone number the same as
          another user, then you are notified in this file of the
          occurrence.
          Eg. John Doe logged on using same phone number as Jane Doe.


          Ans/Asc/Asl/Avt Files
          ---------------------

               Listed below are the ANS and ASCII support files which
          you can define.  All files must reside either in the
          AVT/ANS/ASC/ASL directory.


          *** Means a default prompt will be displayed if the text
          file is not present.

               ALIAS.A*     This file is displayed before the user
          enters their alias.

               AREAHELP.ASL This file is displayed when an EchoArea
          help message is processed.

               DOBSEC.A*    This is displayed before the user is asked
          for their date of birth for logon security verification.

               DOWNHELP.A*  This file is displayed when the user
          selects "Help" from the download command.

               EDITHELP.A*  This file is displayed when the user
          selects help inside the line editor.

               FLSPHELP.A*  This file is displayed when the user
          selects "Help" from the filespec search command.








                                    Page 81.






               FILEXXX.ASC  These files can be implempted if you
          require Ezycom to display a comment file before displaying
          the files listed in the file area that the user is about to
          look at.  The XXX is the file area number and this file is
          placed in the same path as the file base information is
          stored.  So if you want a comment file for file area 10 you
          would have a file called FILE010.ASC placed in the path
          C:\EZY\FILEBASE\AREA1\FILE010.ASC


               KEYWHELP.A*  This file is displayed when the user
          selects "Help" from the keyword search command.

          ***  LOCKOUT.A*   This message is displayed when you either
          lockout a user, or a user who has been locked out logs on.

               LOGO.A*      This file is displayed just before the
          system asks the user for their name and password.

          ***  MAXPAGE.A*   This file is displayed if the user exceeds
          the maximum number of pages specified in config.

          ***  MNUAGE.A*    This file is displayed to inform a user
          that he/she has to be a certain age before they can use the
          menu option.

          ***  MNUHOUR.A*   This file is displayed to inform a user
          they are trying to use a menu option outside the menu time.

          ***  MNUTIME.A*   This file is displayed to inform a user
          that he/she has to be online for a certain time before they
          can use a menu option.

               MNUMESS.A*   This file is displayed to a user if their
          post call ratio is bad.

               NEWS.A*      This file is displayed after Newuser 2 or
          welcome files and check for waiting mail.

               NEWUSER1.A*  This file is displayed to a new user when
          they confirm that they have entered their name correctly.

               NEWUSER2.A*  This file is displayed before the
          Newuser.Q-A, but after the system questionnaire specified in
          config.

          ***  NOTAVAIL.A*  This file is displayed when a user pages
          outside the paging hours defined in Config.

          ***  PAGEABRT.A*  This file is displayed if the sysop aborts
          the page.




                                    Page 82.






          ***  PAGED.A*     This file is displayed after the user has
          paged the sysop but before the sysop answers.  This could be
          something like your chat has been noted, the sysop will
          break in when available.

          ***  PAGESTOP.A*  This file is displayed if the sysop aborts
          the current page and stops all further paging.

               PASSWORD.A*  This file is displayed before a user is
          asked to enter their system password.

               PHONESEC.A*  This is displayed before the user is asked
          for their phone number for verification.

          ***  PRIVATE.A*   This is displayed to newusers if the
          newuser security level is 0.  It would advise them that the
          system is a PRIVATE system.

               PROTHELP.A*  This file is displayed when the user
          presses (?) at the list of selectable upload and download
          protocols.

          ***  REGWARN1.A*  Last warning before registration runs out.

          ***  REGWARN2.A*  First warning before registration runs
          out.

               READHELP.A*  This file is displayed when the user
          selects help just after selecting to Read a message area.

               SECXXXXX.A*  This file is displayed when a user logs on
          with XXXXX security.  That is, if a user logged on with
          security 10, then SEC10.A* would be displayed to him/her.

          ***  TIMESLOW.A*  When a user logs on in the slow baud rate
          speeds, but is out of hours, this message is displayed.

          ***  TIMESEC.A*   This is displayed when the user logs on
          below the minimum logon security, and has not logged on
          between the low security start and end times.

               UPHELP.A*    This file is displayed when the user
          selects "Help" from the upload command.

               WATCHDOG.ASL This file is sent in a message to a user
          who has had a previous unsuccessful logon.  Typically this
          message would say something along the lines of "someone has
          tried to logon onto your account and failed.  Please change
          your password.".

               WELCOME.A*   This file is displayed after the user logs
          on.  You can use this file to show the user a colourful
          display about your BBS.


                                    Page 83.






               WELCOME1.A*  This file is displayed after the
          Welcome.A*.  This can be used to tell the user more about
          your system.

               WELCOME2.A*  This file is displayed after Welcome1.A*.

               WELCOMHH.A*  This file is displayed between 00:00 and
          23:00.  You can have an individual WELCOME ANSI or ASCII
          displayed every hour.
          Eg: Welcom11.A* would be displayed between 1pm and midday.













































                                    Page 84.






          File Points
          -----------
               File Points is a file management system that doesn't
          incur the problems associated with the normal File/Kilobyte
          Ratio Systems.  The unique facility of file points, is that
          when user(s) download the file, the uploader is given credit
          for the download.  So, if user(s) upload old/boring files
          that will not be popular, then they will not receive many/no
          (depending on configuration) filepoints for the upload.
          This system encourages user(s) to upload decent files, as
          the more times their files downloaded, the more points they
          get, therefore the more downloads they can make.  File
          Points can be configured in the "Files Misc" part of the
          "File Areas" of the config.  The options to alter are
          "FPs credited for Download", "Time of Upload FPs given" and
          "1 File Point is worth XXk".  See the documentation on these
          options for configuring them. (Registered Versions of
          Ezycom)


          Page Tunes
          ----------
               Ezycom also has the ability to play page tunes while
          the user is paging the sysop.  They take the form of
          PAGExx.EZY in the Ezycom systempath.  This first tune should
          be named "PAGE01.EZY", the second "PAGE02.EZY" and so on.

               These are plain text files, and they contain either a
          comment (indicated by a semicolon ";" at the start of the
          line), the TONE [hz] [1/100's second] and the WAIT [1/100's
          second].  The [hz] indicates the frequency (pitch) of the
          tone to be played.  Following is a list of frequencies
          together with their respective musical notes.

          Note                  Octaves
          -----------------------------------------
                        #1   #2   #3   #4   #5   #6
          -----------------------------------------
          C             45  134  268  536 1071 2145
          C#            71  142  284  568 1136 2273
          D             75  150  301  602 1204 2408
          D#            80  159  319  638 1275 2551
          E             84  169  338  676 1351 2703
          F             90  179  358  716 1432 2864
          F#            95  190  379  758 1517 3034
          G            100  201  402  804 1607 3215
          G#           106  213  426  851 1703 3406
          A            113  225  451  902 1804 3608
          A#           119  239  478  956 1991 3823
          B            127  253  506 1012 2025 4050

          Eg:
          TONE 71 100
          WAIT 100

                                    Page 85.







          Menu System
          -----------

          Defining a Menu System
          ----------------------
               Ezycom allows the use of fully user defined menu
          system.  That is, you can make the menus appear exactly as
          YOU want, not how the authors want.  For instance, you could
          combine a file area and message area into the one menu.
          With the addition of this feature, a certain amount of
          complexity is added to the Ezycom package, as you have to
          understand the menu system, so that you can build a system
          that you want.  Included with Ezycom, is a sample setup,
          this allows you to have a look at a full blown menu system,
          to help you understand how it was put together.

               First of all, a decision must be made on the format of
          the menu structure.  The structure appears much like a tree.
          A sample menu structure is:

                  --UTILITIES
                /
               -----FILES
          TOP-|
               -----MESSAGES
                \
                 ---GAMES

               Here, you have a TOP menu, this the name of the menu
          give to the first menu that is loaded when you run Ezycom.
          You can configure this in misc->system->top_menu.  The "TOP"
          menu allows a various range of options, which includes
          allowing the moving to menus such as "FILES", "UTILITIES",
          "MESSAGES" and "GAMES".

               When defining a menu, you can use the GOTO or GOSUB
          commands to move you to one of these menus.  From these
          menus (ie "FILES" etc), you would most likely want to be
          able to move back to the "TOP" menu.  This can be done in
          three ways.  First of all, you can use the GOTO command.
          This would move you to whichever menu you place in the
          "optional data" of the menu type.  Another option could be
          using RETURN FROM GOSUB.  This would return you to the menu
          who previously called it using GOSUB.  For instance, if you
          had the MESSAGES menu coming off the TOP menu and the FILES
          menu, you would never know which menu actually called you if
          you wished to return to it.  Using the GOSUB/RETURN FROM
          GOSUB, it would automatically return you to the menu that
          called it.  The other option is GOTO MENU AND CLEAR GOSUB
          STACK.  This is similar to the GOTO menu type, except that
          it also CLEARS any previous information about the menu stack
          (GOSUBs make a menu stack).


                                    Page 86.






               You can now load EZYMENU.  This program is used to
          build a menu system for Ezycom.  First of all, you are
          greeted by a Menu called NONAME.MNU.  You can either load a
          new menu (Press F3), or create a new menu (F6).  If, we were
          making the previous menu structure, you would press F6.
          Then, type in the name TOP.  This would create the MENU TOP,
          and give it the same information as the current menu
          (NONAME).  To load a different menu on startup with EZYMENU
          use the command line parameter -L<filename>.
          Eg: EZYMENU -LSYSOP
               Would load the menu SYSOP.MNU on startup.

               Now, you can define the ways in which you will move to
          the higher level MENUs (FILES, MESSAGES, etc).  Press ENTER
          to edit current MENU line.  You, will now be editing the top
          menu line of the MENU called TOP.  Here, you can place in
          the menu option necessary to allow the USER to move to the
          MENU FILES.

               The DISPLAY, is the information that will be displayed
          to the user for this Menu option.  This could be something
          like " [F] File Area".  Although, there are 90 characters
          available for use in the DISPLAY information, it must be
          noted that even when using "Special Characters" documented
          later, that the line length should never exceed 79
          characters when actually displayed on the screen, or else
          weird side effects could occur.

               The OPTIONAL DATA is specific information for the menu
          command you are about to use.  Since, we will be using the
          GOTO command, we need to place the MENU NAME in the OPTIONAL
          DATA.  We are calling the MENU we are calling FILES, so
          "FILES" will be placed in the OPTIONAL DATA.

               The MENU TYPE number for GOTO is 1, so "1" will be
          placed in the Menu Type field.  Optionally, you could press
          F1 to scan through a list of all the menu types, if you
          can't remember their number.

               After moving the cursor to the HOT KEY field, you will
          notice a box in the lower-right corner of the screen.  This
          gives you HELP on the menu type you have just edited.  Thus,
          if you forget the OPTIONAL DATA for a menu command, this
          could be used to quickly remind yourself.  The HOT KEY, is
          the key you wish to use to activate the menu command.  In
          our example, "F" would be placed in this field.  Automatic
          Option should be left as "No", this will be explained under
          "Automatic Menu Options".

               SECURITY, is the security the USER must have (or the
          users could have above that security), to activate this menu
          option.  As you would probably want all users to have access
          to this menu, the security field would be 0.


                                    Page 87.






               The FLAGS fields, are the FLAGS which the user MUST
          have to allow them to use the menu option.  Pressing X while
          editing the flags fields, tells Ezycom that the USER must
          have that flag.  A "-" value means that you do not care
          whether the user has the FLAG or not.

               Foreground and Background colours are used when
          displaying the "Display" information for this menu command.

               The TIME ONLINE field, is the amount of time, the user
          must have been online before they can access the menu
          option.  Setting the value to 0, means they always have
          access to the menu option.  The setting of the MENU-TIME
          flag in the user editor for a user, would STOP this field
          from restricting that users access.

               TIME-START and TIME-END, is the start times and end
          times in which the menu option can be activated.  The time
          is entered in 24Hour format, ie 1300 is 1:00pm.  Setting
          both times to 0000 and 0000 would actually make the menu
          option function ANY TIME of day, whereas setting it to 0001
          and 0001 would make the menu option only function at 1
          minute past midnight.  In our example, you would leave this
          is the default, all the time.

               NODE, is what node number can access this menu option.
          In multiline environments, it might be desirable to have
          different menu options for different nodes.  Setting it to
          0, allows all nodes to activate the menu option, whereas
          setting it to 1 only allows node 1 to activate it.

               AGE, is a flag that allows you to restrict access to
          this menu option depending on the users age defined in the
          config (Usually 18 years old).  If, this flag is set to YES,
          then no one with an age less than 18, can use this menu
          option.

               The next three options are RATIO options, and if they
          are set to Yes, then ONLY users with Ratios that pass each
          of the tests that are set on will be able to use the option.
          In our case, we would not want a post/call ratio enforced on
          the user, to go to the files menu, so that would be set to
          No.  Likewise with the File and Kilobyte Ratios.  You can
          also define tell Ezycom to disregard these flags for
          particular users if Ignore Ratios and Ignore Message Ratios
          are turned On.









                                    Page 88.






               Now, press ESCAPE to save the current menu option.  You
          should notice that the pick list now shows that menu option
          at the top.  You can now complete the other menu options,
          that is, do the menu commands to GOTO MESSAGES, UTILITIES
          and GAMES.  After you have finished, you should SAVE the
          menu, using the F2 key.  The TOP menu has now been
          completed.  It will allow users that logon to your system,
          to go to all the menus laid out in your menu structure.

               Now, you can make the Second-Level menus.  To begin
          with, just make the menu options to allow users to return to
          the main menus.  As stated before, you can use the GOTO
          command to accomplish this.

               After, defining the basic menu structure, all the
          options must be placed in each menu.  Work out what options
          will be in each menu.  The options are listed later in the
          document under "MENU COMMANDS".  You might wish to place
          options such as File List, Download, Upload and other
          various options in your FILES menu.  In much the same way as
          the Menu Structure was defined in the MENUS, the options can
          be added.  The major change, is the MENU TYPE and OPTIONAL
          DATA that varies for each menu option.  After adding the
          menu options to the menu system, you will find that you NOW
          have a fully defined menu system for users to logon and use.






























                                    Page 89.






          Menu Templates
          --------------
               Ezycom allows a special menu templating system, which
          allows user defined menu systems, to be less maintenance
          orientated.  Instead of creating a File Menu for EACH file
          area, it is possible to define ONE File Menu.  This can be
          accomplished by placing /F in certain file area commands, to
          tell Ezycom to use the current file area template number for
          use in this command.  For example, when doing a file list,
          instead of placing the file area number in there, you could
          place a /F in the OPTIONAL DATA.  This tells Ezycom to do a
          file list of the current file area template number.  The
          problem now arises of how to tell Ezycom, which file area
          template to use.  There are a number of ways in which this
          can be done, the most used is the /F= command, which is
          placed on the GOTO/GOSUB/GOTO MENU and CLEAR GOSUB STACK
          commands.
          Eg: GOTO   FILES /F=1

               Would tell Ezycom to GOTO the FILES menu, and make the
          current file area template number 1.  So, that any functions
          in the FILES menu, would act on file area 1.

               Ezycom, allows another way in which you can change the
          current file area, that is Select the Current File Area.
          This allows the USER to select the current file area.  This
          command would typically be placed in the FILES menu.

               Ezycom also allows the current file area to be
          incremented/decremented by the use of +/- respectively.
          This can be done by placing the + or - after the /F=
          command.
          Eg: GOTO FILES /F=+

               Would tell Ezycom to GOTO the FILES menu, and increment
          the current file area by One.  If the user does not have
          access to that file area, Ezycom keeps on searching till it
          finds an area that the user has access to.  The "-" option
          works in exactly the same manor, except that it goes
          decrements the file areas.

               The message areas, also contain this templating
          approach, except that instead of using /F, /M is used
          instead.  /M is used to tell Ezycom to change the current
          Message Area template number on GOTO/GOSUBS/etc commands.
          Instead of using /F on the message area commands, the /M is
          used instead.  Thus, making it easier to differentiate
          between file areas and message areas.  The only other
          difference, is that the command to allow the user to select
          the current message area is Select Current Message Area,
          instead of File Area.




                                    Page 90.






          Global Menus
          ------------
               Ezycom also allows Up to 10 menu commands to be defined
          GLOBALLY.  Thus, instead of having a command in EACH MENU to
          return the user to the main menu, you could have a GLOBAL
          menu command to do the same function.  The MENU name used
          for global menus is "GLOBAL".  If, this is in the menus
          directory on loading Ezycom, then ALL menu commands in the
          GLOBAL menu will become GLOBAL.  If, a normal menu has the
          same menu command as the GLOBAL menu, then the normal menu
          command will override the GLOBAL option.  It is also
          possible to DISABLE the GLOBAL menu for a specific menu,
          using menu type 81 "Disable Global Menu".  This command HAS
          to be an automatic option (Explained later) to function
          correctly.

          Automatic Options
          -----------------
               Ezycom enables menu options to be automatically
          executed when the menu is loaded.  When combined with Menu
          Type 40 (Display ANS/ASC/ASL/AVATAR), you can display these
          pictures automatically every time the menu is loaded, or
          after a menu function has been performed in that menu.
          Eg: If you made the top line in a menu a Type 40, and
          Automatic set to Yes, then that picture will be displayed
          every time that menu is loaded.  Since, you are displaying a
          picture to the users, you may not want to have all the
          Display lines shown to the users, to stop these from being
          shown, the only thing on the display line should be a ";".
          This stops anything being displayed.


          Special Characters
          ----------------
               Ezycom provides some "SPECIAL" characters that may be
          used in the DISPLAY line of each menu option.

               ^      This changes the colours between the highlight
                      and the normal menu lines colours.
               ;      This stops a carriage return being placed on
                      the displaying of that line.  This should be
                      placed ONLY at the end of EACH line.

               The Ctrl-F/K smart text codes can also be embedded into
          the Display and/or Miscdata options.










                                    Page 91.






               Ezycom also provides a means for accommodating
          "SPECIAL" characters in the OPTIONAL DATA line of each menu
          option.  You can do this by placing a $<hex code> in the
          menu line.  The <hex code> is a two digit hexadecimal
          number.  If, for example the number was A, then the code
          would be $0F.  To place a $ in the OPTIONAL DATA, the code
          would be $24.  This features main inclusion was to cater for
          the placement of non-alphanumeric characters for use in the
          /SK= option.

          Keyboard Stuffing
          -----------------
               Ezycom allows characters to be stuffed into the
          keyboard buffer of the IBM PC on ANY menu option.  This
          allows the simulation of a keypress to Ezycom.  For example,
          if there was a need to pass through one menu, to get to
          another, you could stuff the keyboard with the character
          that the user needs to press to go to the other menu.  This
          option could also be used to press keys in external programs
          run by Ezycom.
          Eg: GAME.BAT /SK=$0D

               This would place a return character in the keyboard, so
          that when the GAME is run, a return is pressed
          automatically.






























                                    Page 92.






          Groups
          ------
               Groups is a method in which file and message areas can
          be categorized into "Groups" or "Conferences".  Its main
          purpose is for use with templating, so if you are not using
          that, then you can skip this part of the documentation.  For
          instance, this would allow all of the Amiga areas to be
          grouped into one area, totally seperate from the IBM areas.
          Special commands in the questionnaire language can be used
          to allow users to select the groups they wish to view.  For
          information on this, see the Questionnaire language.

               In the message and file area configuration, there are
          to options called "message group" and "file group"
          respectively.  These options, allow the group for which the
          file/message area belongs to, to be configured.  The groups
          can be configured from the letters of the alphabetic A
          through to Z.  Also, to ALWAYS enable access to a certain
          message/file area, you can make the group a "*".  Note that
          file and message areas use the SAME group.  That is, Group A
          in message areas, is ALSO group A in file areas.  Possible
          group naming might be "A" for Amiga, "I" for IBM.

               With the use of the questionnaire language group
          commands and the group settins, it is possible for the users
          to select which groups they wish to see.  All they have to
          do is turn on the groups they want, for instance group "A",
          and turn off the groups they don't want (eg group "I").
          Then, whenever they do a new files listing, combined read,
          message area change, file area change, search for files, or
          any other "global" type command on message or file areas,
          then only those groups the user selects will be display.
          Please note that groups is NOT a security feature, and the
          user will STILL be allowed to access areas even if they have
          the group turned off, or if you make it available using
          /F=<area> or /M=<area> commands.

               Users can now select which groups they wish to select,
          but if they have all groups turned on, then they still could
          be presented with many file/message areas when doing area
          change commands.  It is possible to override the group
          commands on the goto menu (with /F=+ or - or /M=+ or -), the
          change file area, change message area (and equivalents), and
          all global message area/file commands.  To override group
          settings the sysop MUST place a /G=<group> on the miscdata
          line.  The <group> is either a letter from A through to Z,
          or "*" (meaning ALL groups).  For instance, to change to a
          file area only in the IBM group, a "/G=I" would be used on
          the miscdata (optionial data) line of the menu command.  So,
          using a totally seperate menu for IBM files, the sysop could
          use "/G=I" command on all global type commands in the file
          area, thus allowing only IBM files to be viewed and/or
          changed to.


                                    Page 93.






               A problem now arises when the user changes between two
          "overridden" groups.  The problem is, that when they go into
          the other group (eg Amiga), they are still in an area of the
          group they were last in (eg IBM).  To overcome this, a new
          option has been added to the /F= /M= command.  The option
          allows you to specify the <group>, which the user should be
          placed into.

          eg: Goto Menu    FILEMENU /F=A

               This would place the user into the last Amiga file area
          they were in.  If, the user has not yet been in an Amiga
          File Area, then they are placed in the first available Amiga
          File Area.

               We realise that this is a hard concept to grasp for
          some people.  We suggest that first of all, the sysop should
          become totally familiar with the menu templating approach,
          before tackling groups.  The best way to learn groups, is to
          experiment with them, and see what happens.  If, you are
          still having problems, please do not hesitate in contacting
          any of the support/beta sites for help.

































                                    Page 94.






          Utilities

          Ezymaint
          --------
               This program will do all the required daily maintenance
          required by you system to keep it up and running fully.
          There are a few command line parameters that will help you
          do what you need to get done.

               Available Command Line Options are
               : -D            Check for Deleted and Offline Files.
                               Make Offline files, On-line if found.
               : -C            Activate Daily Maintenance Routine.
               : -M<filename>  Make a Master List for Selected File
                               Areas.
               : -F<date>      From Date for Master List Maker.
               : -T<date>      To Date for Master List Maker.
                               (Date Format - DDMMYYYY).
               : -O<days old>  Master List with files from days old.
               : -E            Enter Descriptions for Non-Described
                               Files.
               : -U            Update File Size and File Date.
               : -P            File Download/Points Maintenance
                               (Part 1).
               : -I            Add Missing Files to File Lists
                               (Part 1).
               : -N<1..250>    Node Number.
               : -H<Filename>  Header for the Master List that was
                               generated with the -M option.

               If the -D option is used, Ezymaint will check every
          file to see if it is still in the Fast Find Index (It is
          suggested to run Ezyff -C before this option).  If, a file
          is not found, then it is either marked Offline or Deleted
          depending on your configuration for that file area.  If, an
          Offline file is found, Ezycom assumes that it has been made
          Online, and will mark the file as Online.

               If the -C option is used, and you have told Ezymaint
          that you want to convert the files that have been uploaded
          to your system, to another file compression type then
          Ezymaint will call a batch file called DOCONV.BAT and that
          will scan the file for Virii using the McAfee Scan program
          if you have that program in your path.  It will also do the
          conversion that will be needed by your system.

               If the -M option is used, Ezymaint will create a Master
          List file called the name you placed after the -M.
               
          Eg EZYMAINT -MC:\BBSFILES\MASTER.LST

          Will create a file called MASTER.LST in the C:\BBSFILES
          directory.  The -F and -T options are also used with this
          option.

                                    Page 95.






               If the -F<DDMMYYYY> option is used, in conjunction with
          the -M option.  Ezymaint will create a Master List FROM the
          date specified after the -F the date format is DDMMYYYY.

               If the -T<DDMMYYYY> option is used, Ezymaint will use
          the date after the -T create the Master List to that date.

          Eg EZYMAINT -MC:\BBSFILES\1992.LST -F01011992 -T31121992

               Will create a Master List of all the files on your
          system dated form 01/01/1992 to 31/12/1992 using of course
          the DD/MM/YYYY date format.  Note that the -F and -T options
          don't have to be used together.

               If the -Odays  option is used, you can get Ezymaint to
          create a Master List with the files only a few days old
          every day.

          Eg EZYMAINT -MC:\BBSFILES\NEWFILES.LST -O5

               Will create a Master List file of only file files on
          your system that are 5 days old.

               If the -E option is used, Ezymaint will prompt you for
          a description for all the files in the filebase that have no
          description.  If you don't know the description just hit the
          Enter Key to go to the next file.

               If the -U option is used, Ezymaint will update all the
          files with there correct file size and date.  This is very
          handy if you convert your files outside the Ezycom
          enviorment and you converter is changing the date and the
          file size of the file.

               If the -P option is used, the Ezymaint will start the
          first part of the filepoint management.  In finding the
          files that have been downloaded, and then adding all the
          points together to send to the user that upload the file, as
          per the setting in the config file.  Usercomp does the 2nd
          part.  This option also maintains the download count, so if
          you do not use the filepoints system, then this option
          should still be used.

               If the -I option is used, Ezymaint will start (Part 1)
          in adding missing files to your filebase.  If you just place
          a file in one of the directories that your system uses for
          it's file areas, then this option will start the process of
          adding it to your system.  Ezyff does the 2nd part.
          Ezyff -I should be run immediately after this option, or
          else new files will appear that are already in your
          database.




                                    Page 96.






               If the -N<1..250> option is used, Ezymaint will use
          that log file so you can use a node higher than the ones you
          use for online and ezymaint will not cause any problems if
          you are running under a multitasker on a network.

               The -H<Filename> option is used to add a header file to
          the master list that is generated by EZYMAINT.  This file is
          inserted into the master list.
               eg EZYMAINT -MMASTER.LST -HHEADER.LST

          Conversion
          ----------
               The two conversion files supplied with Ezycom do all
          the conversions from one archive type to another archive
          type.  As well as scanning the files inside the archive for
          any virii that might be hiding in there.  They are just
          batch files that we have been using ever since we started
          this project and have found them to work very well.  You
          must have your archive programs in your PATH statement if
          you want to use these batch files.  Also as we have made
          them to scan for virii you will have to also have that file
          in the PATH as well. We have made the batch files to use
          McAfee's SCAN as this seems to be the most popular here in
          OZ.  If you use a mailer like FrontDoor, D'Bridge or use
          Ezycom to answer the phone with the ATS0=1 command you
          should ONLY use Doconv.bat.  If you however decide to use
          the Upconv.bat you will have to remember that the file is
          converted upon the finish of the upload and it will take
          time to do the conversion.


          Doconv.bat Upconv.bat
          ----------------------
               As stated above two batch files which are supplied do
          the conversion of archive types in your file base to what
          ever archive type you want.  If however you use Upconv.bat,
          remember it will take time after the upload to do the
          conversion, so the user online might be slightly upset by
          the time it could take.  So look into using doconv.bat in
          your daily maintenance when your system is not getting a lot
          of calls like late at night or early in the morning.














                                    Page 97.






          Fedit
          -----
               This is a menu driven file area editor that allows you
          to
          move, delete edit and rename files.  It is run from your BBS
          System directory, by typing Fedit at the Dos prompt and
          hitting Return.  You will presented with a screen as below:

          +---------------------------------------------------------+
          |   Help    Edit    File    Tag          |    FEdit       |
          |---------------------------------------------------------|
          |  Num  Tag  Filename   Description   (C) Easy Soft  1991 |
          |                                                         |
          |  1  +-----------------------------------------------+   |
          |  2  | Num:   1   File Area: * IBM New Uploads *     |   |
          |  3  | Num:   2   File Area: * IBM General Files *   |   |
          |  4  | Num:   3   File Area: * IBM PD Games *        |   |
          |  5  | Num:   4   File Area: * IBM Archivers *       |   |
          |  6  | Num:   5   File Area: * IBM Communications *  |   |
          |  7  | Num:   6   File Area: * IBM Viruses *         |   |
          |  8  | Num:   7   File Area: * IBM Solutions *       |   |
          |  9  | Num:   8   File Area: * IBM Sound *           |   |
          | 10  | Num:   9   File Area: * GIF Clean *           |   |
          | 11  | Num:  10   File Area: * GIF Misc Pics *       |   |
          |     +-----------------------------------------------+   |
          |---------------------------------------------------------|
          | File Size : 11831 File Date: 01-04-91 Downloads : 0     |
          | Uploader  : Sysop                                       |
          | Checked: On  Gif Info: Off  Offline: Off  Incmplte:Off  |
          | Private: Off Deleted : Off  No Desc: Off  Security: Off |
          |---------------------------------------------------------|
          | ......................................................  |
          +---------------------------------------------------------+
                                 Figure 1

               In the Centre of the screen as you can see is a list of
          the file areas you defined in config.  Use the Pgup/Pgdn
          keys to move from file area to file area till you locate the
          one you wish to edit.  Press RETURN on the highlighted area
          and you will now be presented with another window, (See
          Figure 2) showing all the files and their statistics, again
          press pgup/pgdn or up/dn arrow keys to select the file you
          wish to edit.  As you move from file to file you will notice
          at the bottom of the screen various data fields changing.
          We will discuss each field later in this document.










                                    Page 98.






          +---------------------------------------------------------+
          |   Help    Edit    File    Tag          |    FEdit       |
          |---------------------------------------------------------|
          |  Num  Tag  Filename   Description   (C) Easy Soft  1991 |
          |                                                         |
          |  1     >   HIGH.ZIP   High Program                      |
          |  2         GAME.ZIP   On-line Game                      |
          |  3         OLD.LZH    Deleted                           |
          |  4         OFFY.ARJ   Offline                           |
          |  5         NOS.DOC    No Description Available          |
          |  6         NORM.ARC   Normal phone                      |
          |  7                                                      |
          |  8                                                      |
          |  9                                                      |
          | 10                                                      |
          | 11                                                      |
          |                                                         |
          |---------------------------------------------------------|
          | File Size : 11831 File Date: 01-04-91 Downloads : 0     |
          | Uploader  : Sysop                                       |
          | Checked: On  Gif Info: Off  Offline: Off  Incmplte: Off |
          | Private: Off Deleted : Off  No Desc: Off  Security: Off |
          |---------------------------------------------------------|
          | ......................................................  |
          +---------------------------------------------------------+
                                Figure 2

               At the top of the screen (see figure 2) you will notice
          four headings:- HELP, EDIT, FILE and TAG.

               To activate any of these functions press the ALT key
          and the first letter of the option.  For example to select
          "File" options press ALT-F.  We will now discuss each area
          in detail.

               1)HELP (ALT-H) OR F1.  By activating this option you
          will be presented with another window which will give your
          quick reference Key Functions.

               2)EDIT (ALT-E).  When this is activated you will
          presented with a pull down menu which has three options.
          Move the highlighted bar over the function you wish to use
          or press the desired ALT key plus letter as defined in the
          menu.

          THE OPTIONS LISTED ARE:


               a)Edit description (ALT-D).  This allows you to Edit
          the file description or add one if the uploader failed to
          give it.

               b)Edit UP/DN load (ALT-U).  This allows you to Edit the
          Uploaders name and the download count.

                                    Page 99.







               c)Edit statistics (ALT-S).  These are the 8 fields at
          the bottom of figure 2.  We will discuss each one
          individually.

               i)Checked-This informs you if ezymaint has done a
          virus, integrity and missing file description check.  If it
          is on, then it has been done.

              ii)Private-This informs you if the file is for the sysop
          only,(or for those with sysop security).  The file will not
          be shown in the file listing to those beneath sysop access.

            iii)Delete-Informs you if the description has been
          deleted.  This does not mean that the actual file has been
          deleted.

             iv)Offline-Informs you whether the file is offline or
          not.

             v)Security-Used in conjunction with File list and File
          Sec in config.  Depending on what you have defined in those
          2 config areas will determine what security the file has.

               Eg: A password, certain security level, if the file is
          free or a flag. (see docs on config for more details on File
          list and File Sec).

               By toggling security on /off will determine if security
          is activated on that file(s).


               d)View an Archive (ALT-V), this option allows you to
          view the contents of the archive that is highlighted in the
          file list.  From this option you can view a TEXT file within
          this archive with the V key.  This a very useful feature if
          you whish to check the files that your users upload to you.
          The formats that are able to be viewed are GIF, JPG, ARC,
          PAK, ARJ, ZIP, LZH and ZOO.  This is done with batch files
          which there are examples in the file SETUP.DAT this file is
          in the LZH format, and the files to look for are the ones
          starting with "FED" eg FEDGIF.BAT will be the batch file
          that the view option uses to view the GIF files.












                                   Page 100.








          3)FILE (ALT-F)
          --------------
               By pressing ALT-F a pull down menu will be presented
          with three options.  Move the highlight bar over the
          function you wish to use or press the desired ALT key plus
          letter as defined in the menu.
          The option listed are:

               a)New file Edit (ALT-L).  This allows you to select
          another file area to edit.

               b)Rename File (ALT-N).  This allows you to rename the
          file.

               c)Update file (ALT-B).  This updates the file size and
          date in the database.

               Eg.  If, you added a system comment to the file, so
          that its size was now incorrect, this would get the new size
          for it.

































                                   Page 101.







               4)TAG (ALT-T).  By pressing ALT-T a pull down menu will
          be presented with 7 options.  Move the highlight bar over
          the function you wish to use or press the defined ALT key
          plus letter as defined in the menu.

          The options listed are:

               a)Tag All (ALT-A).  By pressing this option you will
          tag all files in the file list.  You can also do a single
          file tag by pressing either the T-key, spacebar, or return
          key.  A small triangle will appear next to tagged files.

               b)Clear ALL (ALT-C).  This option clears or (untags)
          all files in the directory that were tagged.

               c)Delete Tagged (ALT-K).  This will delete all tagged
          file descriptions.

               d)Move Tagged (ALT-M).  This will move all tagged
          file(s) description to another file area but the file(s)
          will remain in the current directory.  This will not
          interfere with EZYCOM as it works on Global principles and
          knows where the file is even if the description is in
          another file area.

               e)Remove Tagged (ALT-R).  This will delete all tagged
          file(s) and their descriptions.  Be careful using this
          option as it physically deletes the file from the disk.

               f)Tagged Offline (ALT-O).  This will place all tagged
          file(s) offline.  When a user does a file listing the files
          will be shown as Offline.

               g)Physical Move (ALT-P).  This will move tagged file(s)
          and their descriptions to another selected file area as
          opposed to ALT-M that only moved the description.

               Fedit can also be run from the DOS prompt with command
          line switches.
          The switches are:
               -A <Filearea number>
               -N <Node number>

               When you have finished using Fedit press escape to
          return to the DOS prompt.









                                   Page 102.








          FEDGIF.BAT

          @echo off
          rem %1 is the Drive of the Gif
          rem %2 is the Path of the Gif
          rem %3 is the Filename (no extension)
          rem %4 is the Extension (including ".")
          rem For VPic, if you wish to choose Screen Mode inside
          vpic %2%3.* /a
          rem For VPic, if you just want to display it automatically
          rem vpic %2%3%4 /a

          This batch file is used for viewing Gif Files.  In its
          present state, it requires VPIC to work.

          FEDJPG.BAT

          @echo off
          rem %1 is the Drive of the JPG
          rem %2 is the Path of the JPG
          rem %3 is the Filename (no extension)
          rem %4 is the Extension (including ".")
          rem Change to Drive of JPG
          %1
          rem Change to directory of JPG
          cd %2.
          rem Convert JPG to GIF file (JPG2GIF.EXE must be in PATH)
          jpg2gif %3%4
          rem For VPic, if you wish to choose Screen Mode inside
          vpic %3.* /a
          rem For VPic, if you just want to display it automatically
          rem vpic %3.GIF /a
          del %3.GIF

          This batch file is used to convert JPG files to GIF files,
          then view the GIF file.  After viewing the GIF file, it is
          deleted off of your hard disk.  In its present state, it
          requires VPIC and JPG2GIF to work.















                                   Page 103.







          FEDVIEW.BAT

          @echo off
          rem ********************************************
          rem **                                        **
          rem **             FEdView.Bat                **
          rem **                                        **
          rem **      Copyright Peter Davies 1992       **
          rem **        All Rights Reserved             **
          rem **                                        **
          rem **        For use with Ezycom Only        **
          rem **                                        **
          rem ********************************************
          echo Extracting %1 from %2
          rem If called stand alone, it checks to see if enough
          parameters were
          rem passed to the batch file
          if !%3! == !! goto endit
          rem This is a list of the command line in FEdView.Bat
          (Ezycom)
          rem %1 EZYCOM.PAS                Filename to Extract
          rem %2 C:\EZY\FILES\EZYSRC.ZIP   Filename to Extract From
          rem %3 ZIP                       Archive Type
          if not exist %2 goto :endit
          goto :get%3
          :getzip
          pkunzip -o %2 %1
          goto endit
          :getlzh
          lha e /cnm %2 %1
          goto endit
          :getarc
          PKXARC -r %2 %1
          goto endit
          :getpak
          PAK e /wa %2 %1
          goto endit
          :getarj
          arj e -y %2 %1
          goto endit
          :getzoo
          ZOO -e %2 %1
          :endit
          echo Finished Extraction

          This batch file is used by FEdit to extract a text file for
          viewing in any archive format.  It requires all the standard
          de-archive programs.






                                   Page 104.






          Usercomp
          --------
               Usercomp is a userbase compacter that will do
          maintenance on your Userbase files.  There are several
          command line switches that can be used with Usercomp.  We
          will discuss each one separately below:

            -S1    Sort By Security then Surname.
            -S2    Sort By Security then first name.
            -S3    Sort By Security then Alias.
            -S4    Sort By Surname.
            -S5    Sort By First name.
            -S6    Sort By alias.
            -DXXX  Delete Users After xxx days.
                   This will delete users who have not called the
                   system for the amount of days specified by XXX.
                   Eg. If you set -d30 then all users who have not
                   called for 30 days will be deleted, unless you have
                   set "Don't kill user" in the user record.
            -UXXX  No Delete Users >= xxx security.
                   This will not delete users with a security level
                   greater than or equal to the one specified by XXX.
                   Eg. If you set -U100 then users with security
                   level 100 and above will not be deleted.
            -ADD   Add 0 Security Users to TRASHCAN.CTL.
                   (See docs for more information on Trashcan.Ctl)
            -P     Credit File Points for Downloads of their Upload.
                   This function will credit file points to uploaders
                   who's files have been downloaded if this option has
                   been implemented in "files-misc" in config.
            -BXX   Make XX Best User Information.
                   This allows you to assign how many users you want
                   shown in your best users information screens.
                   Eg. If you assign -B10 then the best 10 users
                   will be shown.
            -ALIAS When Usercomp makes the best lists, it will make
                   them up using the users aliases instead of their
                   real names with this switch.
            -N<1..250> Node Number.

               Any combination of these command line switches can be
          used simultaneously if you wish with usercomp.

          Eg.  Usercomp -S1 -D20 -P -B1O -ALIAS -N1
          If you forget these switches, you can type usercomp -? at
          the DOS prompt for quick reference help.









                                   Page 105.






          Anstoavt
          --------
          This enables you to convert your .ans (ANSI) files to .Avt
          (Avatar) files.
          Eg. to convert mess.ans to mess.avt do the following at the
          Dos prompt type Anstoavt mess.ans.  Wild cards are supported
          so if you wish to convert ALL your .Ans files type
          Anstoavt *.ans.  This will convert all of your ansi screens
          to Avatar screens.














































                                   Page 106.






          Ezymail
          -------
               This is a Fido compatible Echomail tosser / scanner.
          It can be used in any Fidonet Mailer that uses the .MSG
          approach to file attaching.  That is, Front Door, D'Bridge,
          etc, Binkley will however, NOT work with EzyMail.
          There are several command line switches that can be used.
          They are explained below:

            -SCAN    Scan Message Base for Waiting Echomail.
                     This function scans all echomail conferences
                     and exports all messages, that have not been
                     exported before to the systems listed in your
                     export list.

            -TOSS    Toss Echomail into Message Base.
                     This function is used to import mail packets into
                     Ezycom's Echomail areas.  If Ezymail detects a
                     message for a conference in which you have
                     systems defined in your export list, it will
                     automatically forward the message to those
                     systems.

            -N<NODE> Node Number. (1-99)


          Ezymail and Multiline BBS's
          ---------------------------
               Ezymail creates an EZYMAIL.NOW file in your Ezycom
          systempath while running.  This tells EzyMail and other
          programs that EzyMail is running.  For instance, you would
          not want a mail session sending out mail, while Ezycom is
          packing up mail for that session.  Ezymail can NOT run
          simultaneously with another Ezymail, so if EZYMAIL.NOW is
          present, then the second Ezymail will not run.

          FrontDoor
          ---------
               If, Ezymail finds an FD environment variable, it will
          update FDRESCAN.NOW and FMRESCAN.NOW after completion of
          execution.  The commercial versions of Front Door make a
          file called FDINSESS.<task> in the Front Door System
          Directory, while a mail session is in process.  If, Ezymail
          detects one of these files, then it will not execute as
          imagine what could happen, if it was updating a mail bundle,
          which was being sent in that session.

          D'Bridge
          -------
               If, Ezymail finds a D'BRIDGE environment variable, it
          will update DBRIDGE.RSN after completion of execution.  This
          tells D'Bridge to rescan its netmail.



                                   Page 107.






          Ezynet
          ------
               EzyNet is used to import and export your NetMail from
          your Frontend mailer. Like FrontDoor, D'Bridge etc. It also
          will pass EchoArea messages to EzyCom for processing.  Using
          EzyNet is easy, just have the following lines in your batch
          file that you use to run Ezycom.  In the section you use to
          scan the message base for echomail add the following line.

          EZYNET -EXPORT

               This will export all the NetMail from Ezycom and place
          it in to the correct path for your Frontend Mailer to send.

               In the section you use to toss echomail into your BBS
          add the following lines.

          EZYNET -IMPORT -ECHOAREA
                          ^^^^^^^^
               This will import all the NetMail from the directory
          that your Frontend mailer puts then and places them into
          your message base. The line ezynet -echoarea tells Ezycom's
          EchoMail area processor to read a message sent to it and act
          upon it as follows.

          What is EchoArea?

               EchoArea is a part of the Ezycom mail processor.  It is
          used to update and maintain your echomail profile without
          needing to bother your host with requests - EchoArea will
          process them automatically.

          How to use EchoArea.

               To access EchoArea send a netmail message to your host,
          addressed to EchoArea.

          Eg.  To: EchoArea, 3:633/374

               To safeguard your echomail profile, you must specify a
          password on the subject line of the netmail message.  If you
          don't have a password, or you don't know what it is then
          contact your host.

          Eg.  To: EchoArea, 3:633/374
               Re: foo

               Echomail profile maintenance.  EchoArea's main use is
          to add/remove your node to/from your host's export list. To
          do this, you simply tell EchoArea the area tag of the
          conference you want to pick up or drop.  For example, to add
          the Ezycom support conference (EC_SUPPORT) to your system
          you would send a message like:


                                   Page 108.






             To: EchoArea, 3:633/374
             Re: foo
             ----------------------------------------
             +EC_SUPPORT

               Note that the '+' sign in front of the name is
          optional.  To remove a conference is very similar, only you
          put a '-' sign in front of the conference name instead of a
          '+'.  In this case the prefix is NOT optional.

               For example, to get rid of an echo you are no longer
          interested in send a message like:

             To: EchoArea, 3:633/374
             Re: foo
             ----------------------------------------
             -BORING_ECHO_CONF
             ---

               As many of these commands as you like can be combined
          into the one message, so both of the above examples could
          have been in one request:

             To: EchoArea, 3:633/374
             Re: foo
             ----------------------------------------
             EC_SUPPORT
             -BORING_ECHO_CONF
             ---

               Note the tear line (row of dashes) at the end of this
          example.  Everything after the tear line is ignored, so you
          can also send comments or queries to your host.  This is
          useful if you have a question relating to your conference
          set-up or have problems using EchoArea.

          Options

               There are several optional commands that can be invoked
          by putting a parameter after your password on the subject
          line.

             -Q   : Query.

               The query command will cause EchoArea to create list of
          all the echomail areas available to your system and send it
          back to you. The list will have the conference tag, a
          description, and one of either "On", "Off" or "Sec". On :
          The conference is already active for your system, Off: The
          conference is not active for your system, Sec: The
          conference is not available to your system.




                                   Page 109.






             -L  : List.

               This is similar to the -Q command above, but does not
          add the conference status (on/off/sec) to the list.

             -H   : Help.

               EchoArea will send a help file back to you in a netmail
          message.

             -All : All on.

               The all command will turn on all available areas to
          your system. Saves doing thirty or so areanames.

             -NoAll : All off.

               The all off command is the exact opposite to the all
          command.  It will turn all echomail areas off for your
          system.

          Eg.  To: EchoArea, 3:633/374
               Re: foo -q
               ----------------------------------------
               EC_SUPPORT
               -BORING_ECHOMAIL_CONF
               ---

               This will turn on the EC_SUPPORT conference, turn off
          the BORING_ECHOMAIL_CONF area, and send back a list of
          available areas and their status.
























                                   Page 110.






          Msgcomp
          -------
               This is Ezycom's message base compacter and will do
          maintenance on your message areas.  Its function is to keep
          your message areas to the limits you set in Config "Message
          Areas".  For example if you set "Max number of msgs" to 200
          and the area has 300, Msgcomp will delete the first 100
          messages to maintain the area at 200.  However if you set
          any of the message limits to 0 then Msgcomp will ignore
          these fields.  Msgcomp should be run once a day in a nightly
          event.

               The message compacter is limited to a maximum of 16000
          messages per message area, and so if the number of messages
          in an area exceeds 15000, it will automatically compress
          that message area to 15000 messages.  Depending on how much
          free RAM is available, MSGCOMP will handle more messages per
          area, with an upper limit of 16000.  Ezycom and other
          utilities can handle up to 65,000 messages per conference.

               MSGCOMP also has four command line switches :
          -LINK, -LINKALL, -NODELETE and -CLEANUP.

               -LINK will LINK all message areas that has had new
          echomail/netmail, since MSGCOMP -LINK was last run.

               -LINKALL, will unconditionally LINK ALL echomail and
          netmail areas.  Local areas are NOT linked, as Ezycom does
          this when you reply to messages, so trying to LINK them,
          would be waisting system time.  MSGCOMP links the messages
          (makes reply chains), by matching those with the same
          subjects together.

               -NODELETE, will stop MSGCOMP from deleting messages by
          days, received days, number of messages, or number of
          kilobytes.

               -CLEANUP, will tell MSGCOMP to delete conference(s)
          that no longer exist in your configuration setup.  Thus, if
          you delete a message area with Alt-D, MSGCOMP -CLEANUP with
          actually delete the messages in that message area, and reset
          lastread pointers.  Conferences should NEVER be deleted by
          using DOS commands, as the lastread pointers are not reset.

          Eg MSGCOMP -LINK










                                   Page 111.






          Ezyff
          -----
               This is used to keep all your file area index's up to
          date.  It will add and remove files tell you of duplicates
          and sort the file index's.  There are seven command line
          switches that can be used with Ezyff.  These are listed
          below in detail:

               -C  This creates/updates the Fast File index.  This is
          a list of index to all the files available on your BBS for
          downloading.  If you add files to your file areas or remove
          them, this should be run, to update the index.  This should
          be run at least once a week, to make sure your index is
          correct.

               -S  Sorts the fast file index.  It makes it faster if
          you don't do -C everyday.

               -L<textfile> This makes a list of all your file paths
          to the text file name.

               -F  This creates a QuickBBS compatible FLSEARCH.CTL.

               -D  This lists all the duplicate files in directories
          to your maintenance log.

               ie.FRED.ARC was in C:\Files and FRED.LZH was in
          C:\NEWFILES, then it would place in the log that Fred.* was
          in both of those directories.

               -I This is the second part of maintenance to place
          files in your files lists which are in your directories but
          not in the files lists.  The file area the files are placed
          in, is the upload area in CONFIG->FILEPATHS.

               -ID Does the above check, but also logs duplicate file
          descriptions, much like the -D option. It will also log
          duplicates when the same file area has duplicate
          descriptions, again on a .* level.

               -N<node> Node number to run EZYFF under. (1-250)














                                   Page 112.






          Ezyutil
          -------
               EzyUtil is a program that will import a file <Text>
          into your message base. It will also import files into a
          specified file area, while updating your fast file index
          with the information from a files.bbs file (Great if you use
          a program like TICK).  It can also undelete messages in one
          or ALL of your message areas and lastly EzyUtil will sort
          your Echo Node Information.  Ezyutil will also export
          message/file area configuration, and make message base
          statistics on a message area.

               Importing a message file.  To import a message file
          into your message base use the following line.

               EZYUTIL -IMPORT -A<1..400> -F<Who_From> -T<Who_To>
                       -S<Subject> -LC:\DOCS\HITHERE.DOC

               -A Message area to send the file to. (Message area
          number in your Config)

               -F Who the message is to be from. (Note the Underline
          between the First_LastName) it MUST be there.

               -T Is who the message is sent to. (Again Must have the
          Underline)

               -S The Subject of the message to be imported. (Remember
          the Underline)

               -L The path and file to import.

               Eg EZYUTIL -IMPORT -A1 -FPeter_Davies -Tall -SHigh_All
                          -LTest.TXT

               Importing a file with Description. (Using a Files.bbs)
          To import the file and description use the following line.

               EZYUTIL -FILESBBS -A<1..400> [-L<Files.bbs Path>]

               -A File area to import the file to. (File area number
          in your Config)

               -L Path to the files.bbs (This is the path where the
          FILES.BBS, and the files IN the files.bbs are located).  If,
          this option is omitted, then the area path for the filearea
          is used.

               Eg EZYUTIL -FILESBBS -A1 -LC:\BBS\FILES\GAMES






                                   Page 113.







          Sort EchoNode information.

          Use the following line.

          EZYUTIL -NODE

             This will sort all your EchoManager Nodes in Ascending
          order, while updating the export list for each message area
          at the same time.

          Undelete Messages.

          Use the following line.

          EZYUTIL -UNDELETE

               EzyUtil will then prompt you for the message area
          number where you wish to undelete the messages contained
          within it.  If you select a valid message area, then EzyUtil
          will undelete all the messages in that conference.  Only
          messages that were deleted AFTER the last MSGCOMP will be
          undeleted however.  After a MSGCOMP, you can NOT retrieve
          any messages that were deleted.

          Strip Log.

          Use the following line.

          EZYUTIL -STRIPLOG -L<logfile> -D<days old>

               To strip Ezycom's log, and to leave a certain number of
          days log remaining use "EZYUTIL -STRIPLOG -L<logfile> -
          D<days old>".
          The <logfile> is the name of the Ezycom log which you wish
          to be stripped.  The <days old> is the number of days of
          log, which you wish to keep.  Eg -D7 would keep the last 7
          days of log file.  When using EzyUtil -STRIPLOG, you MUST
          not be using any other utility or Ezycom that uses this
          logfile.















                                   Page 114.







          File Area Information.
               Ezyutil can export file area configuration information
          to a file called FILES.TXT.  This file contains all the
          information on your file areas.  It is placed in the system
          path.
               eg:  EZYUTIL -EXPORT -FILEAREA

          The following is an example of what to expect in the
          FILES.TXT file that is created with this option.

             File Area Num: 1
            File Area Name:         GENERAL FILES
          Upload File Area:          NEW UPLOADS
          Upload File Path: D:\BBS\FILE\GENERAL\
                File Group: *
             User Security: 5
               User Flag A: --------
               User Flag B: --------
               User Flag C: --------
               User Flag D: --------
            Sysop Security: 1000
              Sysop Flag A: --------
              Sysop Flag B: --------
              Sysop Flag C: --------
              Sysop Flag D: --------
                   Sort By: Alpha
           Offline Allowed: No
               Master List: Yes
                 Age Check: No
                Conversion: Zip
























                                   Page 115.







          Message Base Information.

               As for the file base Ezyutil will create an information
          file for the message base.  The file created is called
          MESSAGES.TXT.  This will give you the following information
          about your message base.

             Mess Area Num: 2
            Mess Area Name:        LOCAL CHIT CHAT
            Mess Area Type: Local
            Mess Area Kind: Public and Private
                Mess Group: *
                 Days Kill: 30
              Receive Kill: 10
                Count Kill: 500
             Kilobyte Kill: 0
             Read Security: 1
              Read Flags A: --------
              Read Flags B: --------
              Read Flags C: --------
              Read Flags D: --------
            Write Security: 1
             Write Flags A: --------
             Write Flags B: --------
             Write Flags C: --------
             Write Flags D: --------
            Sysop Security: 50000
             Sysop Flags A: --------
             Sysop Flags B: --------
             Sysop Flags C: --------
             Sysop Flags D: --------
             Alias Allowed: Use Alias, Alias Allowed
           Combined Access: Yes
          Initial Combined: Yes
                  Age Test: No



















                                   Page 116.







          Message base Statistics.
               Ezyutil can generate a set of statistics for your
          message base the file created is called STAT<area>.  This
          will include the number of participants in that message
          area, the average message length in bytes then a list of the
          users names, number of messages posted by that user, the
          total length in bytes for all their messages posted then an
          average of the length of their messages posted.  At the end
          of the file there is a section showing the person that
          posted the longest message and the person that posted the
          shortese message.  This text file could be imported into the
          message base useing the EZYUTIL message import command to
          show the users the stats of the message area being used.

          Eg: EZYUTIL -MBS -A1

          Message area statistics for "     MESSAGE TO THE SYSOP     "

          Number of participants : 13
          Average message length : 343 bytes

          Poster                         Posted     Length     Average
          ------------------------------------------------------------
          Fred Basset                         3        739        246
          Anthony Jones                       1        526        526
          Charles Manson                      2        131         65
          Ian Mason                           1        219        219
          Jack the Ripper                     1        577        577
          Ned Kelly                           1         38         38
          Randy Mandy                         1        269        269
          Mr Squiggle                         2        337        168
          Fat Cat                             1        598        598
          Peter Davies                        3       1378        459
          Mr Ed                               1        279        279
          Elvis Presley                       1        453        453
          Wayne Burnside                     25       9224        368

          Longest message  : Peter Davies, 1090 bytes
          Shortest message : Wayne Burnside, 35 bytes















                                   Page 117.






          Ezyed
          -----
               On loading Ezyed you will be presented with the first
          User in your Ezycom userbase.  This Should Normally be the
          SysOp as He/She would usually be the first person to use the
          system, also he/she should have the Highest Security Level.
          Display Mode Options


          F1      : Displays the online Help Screens for Ezyed

          P       : This gives you a very elaborate Pick List for you
                    to chose a user from. To move around in the Pick
                    List you just use the Arrow Keys to go up and down
                    one user at a time or the PgUp and PgDn Keys to
                    move up and down the list a page at a time.

          E       : This launches you in to the Edit Mode more on this
                    later.

          F10     : Toggles you to and from the 2 display screens.

          Arrow   : These keys move you to and from the next and
          Keys      previous record this includes PgUp and PgDn.

          F2      : You will be given a choice to Search for either
                    the User's Name-Alias or by the User's Security
                    Level. the search will being up the First
                    occurrence of the pattern you chose ie(Name = Pet)
                    will find the first record that has (Pet) in the
                    Name/Alias Field case is not used in the search so
                    (Peter = peter).

          F3      : This will continue the search using the (Last)
                    pattern used. When the search doesn't find a user
                    to match the pattern you will be told then EzyEd
                    will take you to the (First) user in your
                    userbase.

          F4      : This command allows certain global options to be
                    performed on the userbase.  These include flag
                    editing and group editing.  When editing global
                    flags, a "-" sign means, do not change the flag, a
                    "X" sign means, turn the flag ON for all users,
                    and an "O" sign means, turn the flag OFF for all
                    users.  When editing global groups, the setting
                    that you make will affect all users, so every user
                    will have that global group setting.

          Esc     : Exit from Ezyed.

          Insert  : This will add a New Record to your user base.



                                   Page 118.






          Delete  : This key will Toggle the (Deleted) Flag of the
                    user displayed.

          Edit Mode.

          Ctl A   : Abort any changes made to this record.

          Ctl P   : This gives you a very elaborate Pick List for you
                    to chose a user from. To move around in the Pick
                    List you just use the Arrow Keys to go up and down
                    one user at a time or the PgUp and PgDn Keys to
                    move up and down the list a page at a time.

          Ctl S   : Saves the record you are editing. Esc will do the
                    same.

          Arrow   : These keys move you to and from the next and
          Keys      previous entries.

          PgUp    : These two keys move you to the next and previous
          PgDn      records after saving your changes first.

          Esc     : Exit from Edit Mode.

               The function keys (F1, F2, F3, F4, F10) function in
          exactly the same was as in display mode.





























                                   Page 119.






               There are some user variables in Ezyed that you should
          know about, here is a list of them.  All of these variables
          are changed by placing the highlight on the Yes or the No
          displayed.  Then tap the space bar to toggle between Yes or
          No.

              Deleted              : No
              Clear Screen         : Yes
              Continue             : Yes
              ANSI Capable         : Yes
              Don't Kill User      : No
              Ignore File Points   : No
              Full Screen Ed       : Yes
              Quiet Mode           : No
              Ignore Ratios        : No
              Avatar Capable       : No
              IBM Chars            : Yes
              Ignore Paging        : No
              Exclude User         : No
              Menu Time            : No
              Ignore Message Ratio : No
              No Page Sound        : No
              Page on Logon        : No

               Deleted.  If this is set to Yes then the next time you
          run usercomp the user will be deleted from the userbase.

               Clear Screen.  This will set ezycom to send this user
          screen clearing codes when required.

               Continue.  Tells ezycom that this user requires a
          continue prompt to be sent when displaying file lists and
          screens longer than there screen length.

               ANSI Capable.  Tells ezycom whether the user will
          accept Ansi characters or not.

               Don't Kill User.  If this option is set to Yes, then
          even if the user hasn't called in the amount of days you set
          to kill users when using usercomp this user will not be
          killed from the userbase.

               Ignore File Points.  This option will stop the user
          from using his/her filepoints.  So this user will not be
          stopped by this powerful ratio system in downloading files.

               Full Screen Ed.  Enables the external full screen
          editor.

               Quite Mode.  If enabled this user will not be able to
          be called by another node with the multinode chat system.




                                   Page 120.






               Ignore Ratios.  This is similar to the ignore file
          points option but it applies to all the other file ratios
          used in the ezycom package.  So if this option is Yes and
          ignore file points is No the users can download all they
          like until there file points are used up (Providing they
          don't exceed the daily download limit/time limit).

               Avatar Capable.  If set this option will set ezycom to
          send avatar screen codes to the user with this set to Yes.

               IBM Characters.  When this option is Yes ezycom will
          send the highbit IBM characters to the user.  If set to no
          the user will get the character you have set in the replace
          IBM character in the config, This is set to (o) by default.

               Ignore Paging.  If this option is set, then the user
          will be able to overide all paging hours, hence page the
          sysop 24 hours a day, seven days a week.

               Exclude User.  With this option on Yes the user will
          NOT be displayed in any user display lists.
          Eg Best User Stats, User Lists, Last Caller, etc.

               Menu Time.  If this option is set the user will NOT
          have to wait for the time restrictions in any of the menu
          option.

               Ignore Message Ratio.  If this option is set, then the
          user will NOT have to abide by the post/call ratios.

               No Page Sound.  When a user pages you with this option
          turned on, no page sound will be heard, although the user
          will be under the impression that he is paging you.

               Page on Logon.  When the user logs on, five short beeps
          are sounded, to indicate to you that a very important user
          has logged on.  Note that this option works 24 hours a day,
          7 days a week, and is not restricted by page times.

















                                   Page 121.






          EzyNode
          -------
               This utility (thanks to Colin Berg for donating it)
          compiles your Nodelists for your network addresses, for use
          in Ezycom.  If, you do not know what these terms mean, or do
          not belong to a network, then you can skip the documentation
          on EzyNode.

               Ezycom has a very different style of nodelist compiling
          than many other BBS packages.  It allows the sysop to
          configure the nodelists to be viewed for each address that
          the sysop has.  In all, the sysop has a maximum of 16
          network address, and for each network address, the sysop can
          have upto 5 nodelists.  So, Ezycom can cater for upto 80
          nodelists.  This feature, can be used to secure your network
          from unwanted user access.  For instance, if you could allow
          your users to post messages into FidoNet, but NOT allow them
          to post messages into EzyNet (Network of Ezycom Beta Sites).

               Ezynode requires a nodelist control file for it to
          operate.  This file is called EZYNODE.CTL, and should be
          located in your ezycom system directory.

               Comments may be placed in this control file, by placing
          a ";" at the start of the comment.

          Eg:

          ;Ezynode control file

               This is a valid comment, since the ";" preceeds the
          comment.  Also, blank lines are ignored by ezynode.

               Ezynode accepts 4 different keywords.  START, AKA, LIST
          and PLIST.  A description of how each command is used and
          applied to the control file follows.

               The "START" command tells Ezynode that a NEW index
          should be created for the following AKAs/NODELISTs.  Upto 16
          START commands (indexs) maybe present in EZYNODE.CTL.















                                   Page 122.






               The "AKA" command tells Ezynode which network address
          should be used for this index.  This is very important as,
          only those network addresses that use the nodelists
          indicated after this command, should be used.  However, a
          short cut command can be used, called "ALL".  That is, "AKA
          ALL" will tell Ezynode that all network addresses are to be
          used for these nodelists.  If the "ALL" command is used for
          the network addresses, then no other network addresses
          should be stated.

          Syntax: AKA <network address or ALL>
          Eg: AKA 3:636/213
              AKA 3:636/213.3
              AKA ALL

               After entering the AKAs for the index, the nodelists to
          be used for the index must be specified.  This can be
          accomplished using the "LIST" or "PLIST" commands.

               The "LIST" command indicates that the nodelist that
          follows it compiles to the StLousis nodelist format, or in
          simpler terms that it has at least 1 Zone statement at the
          top of the nodelist.

          Syntax: LIST <nodelist> [optionial zones]
          Eg: LIST nodelist.* 1 2 3

               If, the [optionial zones] are left out, then Ezynode
          assumes that all Zones are to be processed.  In this
          example, NODELIST.* will be compiled (the latest version of
          NODELIST in the nodelist directory).  Note that all
          nodelists MUST be located in your nodelist directory.  That
          is, paths are not valid.

               The "PLIST" command indicates that the nodelist which
          follow will be a private nodelist that does not contain any
          Zone statements.  You must indicate which Zone Ezynode is to
          use.

          Syntax: PLIST <nodelist> <zone to use>
          Eg: PLIST ezynode.* 80

               In this example, ezycoms network nodelist will be
          compiled, but because no valid zones are in the nodelist,
          ezynode will use zone 80 for the network address.  The <zone
          to use> parameter MUST be present for the "PLIST" command to
          function.

               In Ezycom version 1.01, only limited nodelist support
          is present, but this will be expanded upon in later versions
          including point list support, costing, crashmail detection,
          and other delights.



                                   Page 123.






          EzyNode, Sample EZYNODE.CTL
          ---------------------------
               
          ; First Block will create EzyIndex.01
          START
          AKA 3:636/213
          LIST NODELIST.* 1 2 3 4 5 6
          ;
          ; Second block will create EzyIndex.02
          START
          AKA 80:1000/153
          LIST EZYNODE.*
          ;
          ;end of ezynode.ctl









































                                   Page 124.






                      Appendix A (Questionnaire Language)

          Questionnaire
          -------------
               Questionnaire languages are like a miniature
          interpreter language built around the BBS.  It is simple,
          but a very powerful way in which tasks can be accomplished.
          Some ideas for the use of Q-A language are, asking newusers
          details which the BBS doesn't ask them (NEWUSER.Q-A) or
          (NEWUSER2.Q-A which allows MENUCMND unlike NEWUSER.Q-A),
          handling registration expiry (REGEXP.Q-A), writing door
          information files (DOOR.Q-A), turning off access to certain
          file/message areas (Eg. If a Amiga user doesn't want to view
          IBM Files), and much more.  Throughout this appendix, <var
          num> is referred to, and the range of variables it has is 1
          through 50.

               The commands are case-insensitive, that is 'Quit',
          'QUIT' and 'quit' are all valid commands.

               DisplayFlag <flagnum A-D><flagbit 1-8>
          This option displays the current status of a user's flag.

          Eg.  DisplayFlag A1

          Would display ON/OFF depending on the value of the user's
          flag A1.

               SETFLAG <flagnum A-D><flagbit 1-8> <ON|OFF|TOGGLE>
          This option is used to set the user's flag to a value.  ON
          would turn the user's flag on, OFF would turn the user's
          flag OFF, and TOGGLE would turn the user's flag OFF if it
          was ON, or ON if it was OFF.

          Eg.  SetFlag D8 ON

          Would set the user's flag D8 to ON.

               SETSECURITY <security>
          SetSecurity changes the user's current security level to
          that defined in the command.

          Eg.  SetSecurity 100

               SETIGNOREFP       <ON|OFF|TOGGLE>
          SetIgnoreFp, sets the file points ignore flag ON or OFF for
          the user.

          Eg.  SetFP OFF
          Would set the file points ignore flag OFF.





                                   Page 125.






               SETANSI     <ON|OFF|TOGGLE>
          SetANSI, sets the ANSI graphics ON or OFF for the user.

          Eg.  SetANSI OFF
          Would set ANSI graphics OFF.

               SETAVATAR   <ON|OFF|TOGGLE>
          SetAVATAR, sets AVATAR graphics ON or OFF for the user.

          Eg.  SetAVATAR TOGGLE
          Would turn AVATAR OFF, if it was currently ON, or ON if it
          was currently OFF for the user.

               SETFSE      <ON|OFF|TOGGLE>
          SetFSE, sets the ANSI Full Screen Editor ON or OFF for the
          user.

               SETRATIO    <ON|OFF|TOGGLE>
             SetRatio, sets the File Ratio Ignore Flag ON or OFF for
          the user.

               SETPOSTCALL <ON|OFF|TOGGLE>
          SetPOSTCALL, sets the Ignore Post Call Ratio Flag ON or OFF
          for the current user on-line.

               SETMNUTIME  <ON|OFF|TOGGLE>
          SetMNUTIME, sets the Ignore Menu Time Restrictions, that is,
          time on-line, start time and end time, ON or OFF for the
          current user on-line.

               SETVARS     "<text>" <var num>
          SetVARS, is a special command, where you can set on the of
          the 50 variables (each of maximum 255 characters), to a
          default value.  This value can be anything from a number to
          a word.  The 'SPECIAL' feature about this command is that
          most Type 7 codes can be used to place 'SPECIAL' information
          in the variable for testing.  The <text> field also supports
          the Ctrl-F/K smart text codes.

          Eg.  SetVars "Hi There" 1
          Would place "Hi There" in Variable 1.

          Eg.  SetVars "Ctrl-FA" 1
          Would place <username in Variable 1.

          Eg.  SetVars "COM*P" 1
          Would place "COM1" in Variable 1 in the current comport was
          1.  "COM2" in Variable 1, if the current comport was 2, and
          so on.

               Valid codes from Type 7 are *P, *B, *O, *F, *L, *A, *G,
          *V, *R, *S, *N, *7, *8, *9, *0, *1, *2.



                                   Page 126.






               Some new codes have been added specifically for the
          SETVARS statement.

               *E is the errorlevel returned from the last Type 7
          Shell.  If, the program to be run in the Type 7 shell could
          not be found to run, then *E will give a value of 65535.

          Eg
          MENUCMND 7 TEST.EXE
          SETVARS "*E" 1
          IF 1 = 65535
             DISPLAY "File Not Found|"
          ELSE
             DISPLAY "Errorlevel Returned "
             DISPLAYASW 1
          ENDIF

               *AGE is the users age.  This can be used to set user
          flags on or off, for restricting their access to message
          areas and/or file areas.  If, their Birth Date is Invalid,
          then *AGE will return 255.

          Eg
          SETVARS "*AGE" 1
          IF 1 = 255
             DISPLAY "Sorry, your Birth Date is Invalid|"
             SETFLAGS A1 OFF
          ELSE
             DISPLAY "Your Age is "
             DISPLAYASW 1
             IF 1 <= 17
                SETFLAGS A1 OFF
                DISPLAY "Sorry, you can not access Adult Areas.|"
             ELSE
                SETFLAGS A1 ON
                DISPLAY "Yes, you are old enough for Adult Areas.|"
             ENDIF
          ENDIF
          WAITENTER

               *TIME is the current time.  This can be used to further
          restrict users from doing things at certain times, run a
          program in the BBS, and still keep the user on-line and so
          on.  The time is made into the numeric format HHMM.

          Eg
          SETVARS "*TIME" 1
          IF 1 < 1600
             DISPLAY "It is not 4pm yet.|"
          ELSE
             DISPLAY "Enjoy our On-line Game.|"
             MENUCMND 7 *C /C GAME.BAT
          ENDIF


                                   Page 127.






               SETCOMMENT <var num>
          SETCOMMENT sets the user's comment field the the variable
          number.  Only the first 40 characters of the variable number
          is used.

          Eg
          SETVARS "High"
          SETCOMMENT 1

               SETTOPMENU <menuname>
          SETTOPMENU sets the user's top menu field to <menuname>.
          Menuname should NOT include the .MNU extension.

          Eg
          SETTOPMENU TOP

               WAITENTER
          WaitEnter displays the enter prompt, and waits till Enter is
          pressed.

               MENUMMND  <option number> [miscdata]
          MenuCmnd executes ANY of the menu commands, except for the
          questionnaire (type 12) command.  These are used exactly the
          same as the normal menu commands.  Note that Menu Commands
          are NOT allowed in NEWUSER.Q-A.

          Eg
          MenuCmnd 7 *C /C GAME.BAT

          MenuCmnd 27 1 /T=Peter_Davies

               DISPLAY "<message>"
          This displays message to the user.  It does NOT
          automatically place a carriage return on the end.  Use | to
          force a carriage return.

          Eg  Display "High"

               DISPLAYASW <var num>
          DISPLAYASW or LISTANSWER, displays <variable number> to the
          user WITH a carriage return.

          Eg  SetVars "High" 1
              DisplayAsw 1

               DISPLAYGROUP <group>
          DISPLAYGROUP will display the current status of a group (A
          through to Z).  If the particular group is ON, then ON is
          displayed, or if it is OFF, then OFF is displayed.

          Eg  DisplayGroup A




                                   Page 128.






               CLEARSCREEN
          CLEARSCREEN clears the user's screen if he/she has the
          clearscreen flag set to ON.

               POSTINFO
          POSTINFO writes the users name, time and date to the answer
          file.

               OUTPUTANSWER "<message>" [var num]
          OUTPUTANSWER writes the <message> then the variable contents
          to the answer file.  The [var num] is an optionial parameter
          and allows just <message> to be written to the answer file,
          if so desired.  The <message> also supports all the CtrlK/F
          commands, such as Ctrl-FA.

          Eg.
          SETVARS "High" 1
          OUTPUTANSWER "Current Value of Var 1 " 1
          OUTPUTANSWER ""
          OUTPUTANSWER "Ctrl-FA"

          (The Ctrl-F represents Control F key)

               QUIT
          QUIT terminates execution of the script IMMEDIATELY.  This
          is useful inside an IF statement or at the end of a GOTO.

               CAPITALIZE <ON|OFF|FIRSTLETTER|>
          CAPITALIZE or CAPITALIZE, turns ON or OFF the capitalizing
          of all input statements to the script.  FirstLetter however,
          will Capitize the first letter of ever word, and force lower
          case on every other letter.























                                   Page 129.






               CHANGECOLOR   <foreground color>  <background color>
          CHANGECOLOR or CHANGECOLOUR, changes the current foreground
          and background colours to those specified in the command.

          Eg
          CHANGECOLOR 15 0
          Would change the current colour to White with a black
          background.

             The colour assignments are

               Foreground                    Background

                0 - Black                    0 - Black
                1 - Blue                     1 - Blue
                2 - Green                    2 - Green
                3 - Cyan                     3 - Cyan
                4 - Red                      4 - Red
                5 - Magenta                  5 - Magenta
                6 - Brown                    6 - Brown
                7 - LightGray                7 - LightGray
                8 - DarkGray
                9 - LightBlue
               10 - LightGreen
               11 - LightCyan
               12 - LightRed
               13 - LightMagenta
               14 - Yellow
               15 - White

               GETCHOICE <key list> <var num> [default]
          GetChoice waits until a key in <key list> is pressed and
          stores the result in <var num>.  If a [default] key is in
          the command, then if ENTER is pressed, the default key will
          be placed in <var num>.  If, GetChoice is used in
          conjunction with Capitalise ON or FIRSTLETTER, then all
          input is capitalized.

          Eg GetChoice YN 1 Y
          Would wait until either Y(es) or N(o) or ENTER is pressed.
          If, ENTER is pressed, then Variable would contain Y.

          Eg GetChoice YN 1

               Is exactly the same as the previous example, but if
          ENTER is pressed, it is ignored.  ie The user MUST type in
          Y(es) or N(o).








                                   Page 130.






          IF ... [ELSE] ... ENDIF

               This is a very powerful way of manipulating responses
          from the user.  Ezycom's IF's can be up to 65,000 levels
          deep.  The ELSE is optional.

          Eg
          SETVARS "X" 1
          IF 1 = "Y"
             DISPLAY "Y Was Entered|"
          ELSE
             DISPLAY "Y Was Not Entered|"
          ENDIF

               Since the contents of 1 was "X", the test failed when
          testing for "Y", so the result would be "Y Was Not Entered|"

          Eg
          SETVARS "X" 1
          IF 1 = "Y"
             DISPLAY "Y Was Entered|"
          ELSE
             DISPLAY "Y Was Not Entered|"
             IF 1 = "X"
                DISPLAY "X Was Entered|"
          ELSE
                DISPLAY "I Can not work it Out|"
             ENDIF
          ENDIF

               In this example, the result would be "Y Was Not
          Entered" and on the next line "X Was Entered".  Notice how
          the IF's can be deep.






















                                   Page 131.






          Eg
          :jumpback
          GETCHOICE WXY 1
          IF 1 = "Y"
             DISPLAY "Y Was Entered|"
          ELSE
             DISPLAY "Y Was Not Entered|"
             IF 1 = "X"
                DISPLAY "I actually wanted a W or Y|"
                GOTO jumpback
             ENDIF
             DISPLAY "W Was Entered|"
          ENDIF

               In this example, the script keeps on asking the user
          until he/she enters W or Y.  Whenever an X is entered, it
          jumps back to the start for another Choice.

               IF's can also use other testing methods, than use
          equals.  They can also use <=, >=, <, > and <>.  This makes
          the possibilities endless.

          Eg
          ASK 1 1
          IF 1 <= "M"
             DISPLAY "A letter less than or equal to M was entered.|"
          ELSE
             DISPLAY "A letter greater than M was entered.|"
          ENDIF

               This, testing might be all well and good, but what
          about numeric testing?  Well, Ezycom does this as well.
          Simply do NOT place quotes around the number you wish to be
          tested.  If a number was expected in the variable, but a
          letter was placed there instead, then Ezycom gives the
          variable a value of 2,000,000,000.  Although, no commas can
          be placed in the command.


















                                   Page 132.






          Eg
          :jumpback
          ASK 4 1
          IF 1 < 2000
             DISPLAY "The Number was less than 2000.|"
          ELSE
             IF 1 = 2000000000
                DISPLAY "Please ENTER a numeric value.|"
                GOTO jumpback
             ENDIF
             DISPLAY "The Number was greater than or equal to 2000.|"
          ENDIF
          :<label>
          GOTO <label>

               Ezycom, also allows you to move around the script using
          GOTOs.  These are common in BASIC languages.  A GOTO moves
          the current position in the script to the next command after
          :<label>.  If Ezycom, finds a :<label> without GOTOing to
          it, it is simply ignored.  The labels are NOT case
          sensitive.

          Eg
          :JumPiT
          DISPLAY "Enter Something "
          ASK 4 1
          IF 1 = ""
             DISPLAY "Please Enter Something|"
             GOTO jumPIT
          ENDIF

               GOTOXY  <xpos> <ypos>
          GOTOXY moves the text cursor to that defined in the command
          line.  Note that this does not work in ASCII.

          Eg
          SETVARS "*G" 1
          IF 1 = "0"
             DISPLAY "ASCII User|"
             GOTO :getoutofhere
          ENDIF
          MENUCMND 5 DISP
          GOTOXY 5 5
          ASK 5 1
          OUTPUTANSWER "Answer " 1
          GOTO skip
          :getoutofhere
          MENUCMND 5 DISP
          ASK 5 1
          OUTPUTANSWER "Answer " 1
          :skip
          QUIT



                                   Page 133.






               CREATE
          Create deletes the current Answer file, and restarts it.
          This can be used ANYWHERE within the Script language.  If
          you are Creating DOOR files, this is an good option to use.

               SETREGRESET
          SETREGRESET, resets the registration date to Today's Date.
          This would typically be used in REGEXP.Q-A.  As the user's
          registration has just expired.  His/her registration date is
          then started again, but you would lower his/her security
          level.  So, when he/she paid you more money, then all you
          have to do is up their security level, and they are back on
          target.

          Eg (REGEXP.Q-A)
          DISPLAY "Your Registration has Just Expired|"
          SETREGRESET
          SETVARS "*S" 1
          IF 1 = 10
             DISPLAY "Didn't register again... You Now have hardly"
             DISPLAY "any time per day|"
             setsecurity 5
          ELSE
             setsecurity 10
          ENDIF

               ASK <length> <var num>
          ASK, asks the user for a string (A sequence of characters).
          The string length maximum is that defined with <length>.
          The result is placed in <var num>.  If, used in conjunction
          with CAPITALIZE, then the text entered can be forcefully
          capitalized.  The <var num> can be a number from 1 to 50.
          Length can be from 1 to 255.

          Eg
          ASK 20 1
          DISPLAYASW 1

          Would ASK the user for a string of maximum length 20
          characters, and store it in variable 1.















                                   Page 134.






               SETGROUP <group> <ON|OFF|TOGGLE>
          SETGROUP, sets the current group (file and message) for the
          user.  <group> is the group letter (A through Z), which you
          wish the command to act on.  Instead of specifying a group,
          "*" can be used, to globally set ALL groups ON or OFF
          (TOGGLE is NOT support for Global Group Setting).  The
          second switch (ON|OFF|TOGGLE) sets the user's group to
          either ON or OFF or TOGGLE's the group.

          Eg
          SETGROUP * OFF
          SETGROUP A ON

          This would set all groups off, then set Group A to ON.









































                                   Page 135.






                        Appendix B (Multiline Operation)

          Multiline Operation
          -------------------
               Ezycom has been tested successfully with Desqview,
          Lantastic and Novell.  It has been tried on Double DOS, but
          this has not been extensive testing.  Ezycom provides
          support for Desqview, Double DOS, Taskview, Topview and
          MultiDOS Plus Multitaskers in that when Ezycom is waiting
          for something to happen, it will give away its time slice so
          that other tasks may use it.  Ezycom's file locking routines
          require SHARE to be loaded, and a common problem if it is
          not loaded, is internode communication does not work.

               When using Ezycom in multiline operation, you do not
          have to place each line in separate directories.  Ezycom has
          been written in such a way, to allow all nodes to be run in
          the one directory.  As every node is in one directory, a
          problem might arise with using different configurations for
          each node.  This can be solved by copying the configuration
          (CONFIG.EZY) to CONFIG.<node> (Eg CONFIG.1).  Then, Ezycom
          will ALWAYS loaded CONFIG.1 for node 1.  Also, you can have
          a few nodes reading the same CONFIG.EZY in one directory,
          and have other nodes reading different CONFIG.EZY in a
          different directory.  This might be desirable if you had
          4x2400 baud modems and 4x9600 baud modems for instance.
          Ezycom looks for CONFIG.<node> firstly, then CONFIG.EZY in
          the current directory, then CONFIG.EZY in the systempath
          (pointed to by the EZY environment variable).  To edit
          CONFIG.2, the config would be run as "CONFIG -N2".

               However, if Ezycom is being used with either the
          QUICKED, or TOPED full screen editors, then each line of
          Ezycom MUST be run in seperate directories.  If, EzyEdit or
          the Internal Editor is being used, then Ezycom will run
          every line in one directory (if so desired).

               Not only can CONFIG.EZY be arrange using this
          CONFIG.<node> method, but all the other configuration files
          including EVENTS, PROTOCOL, etc. The only exceptions to this
          rule are STRING.EZY, MESSAGES.EZY, FILES.EZY and
          ECHOMGR.EZY.  Ezycom will ALWAYS locate these files in the
          systempath, and can not be overridden.  So it is quite
          possible to have different events for each node using
          EVENTS.1 for node 1 and EVENTS.2 for node 2.  Do not forget,
          that to edit any configuration files for nodes other than 1,
          you MUST place a -N<node> on the command line of CONFIG.  Eg
          CONFIG -N2.

               Ezycom supports up to 8 nodes locally, that is COM1
          through COM8.  You must however, be able to configure your
          FOSSIL driver to this.  Remember, that the external programs
          (Eg Door Games) also have to support it!


                                   Page 136.






               Each node will most likely require a different batch
          file to run it, although you could use a command line
          parameter and use %1 (etc) for the node number.

               When using external programs, you MUST make sure if
          they are multinode capable, and if NOT, then only allow one
          user to access them at anyone time.  Another method would be
          to restrict certain DOORs to nodes, using the Menu Option
          "Node".  If, you have any problems with multinode operation,
          please don't hesitate to write us a message in our Support
          Conference.

          Multidos Plus
          -------------
               Ezycom can not detect this, so you have to change the
          configuration to point to MultiDOS Plus.  It has NOT been
          tested with MultiDOS.  We have used information from various
          people to give time slices away for it.  If you have any
          problems, simply unselect it.  Please let us know how it
          works with MultiDOS PLUS.

          Networks
          --------
               Ezycom works basically like a Multitasker in a network.
          It doesn't need to know anything about the Network, so it
          doesn't detect its presence.  You must however, load SHARE
          (or equivalent) on the File Servers of the Network.  When
          using Novell, Ezycom detects "Double DOS" multitasker.  To
          stop this, turn off multitasker detection.

          Ezycom Utilities
          ----------------
               Although Ezycom can have multiple nodes running at the
          same time, its utilities do not function while
          nodes/utilities are running, with the exception of EZYMAIL,
          EZYNET and FEdit.

               EzyMail will function fine while one or more lines are
          running, as long as you are using a different log file for
          EzyMail, than the other nodes running.  For instance, if
          node 1 was running, and you wanted to run EzyMail, then you
          might run EzyMail as node 2.

          Eg: EZYMAIL -TOSS -N2
          Note: You can NOT run two versions of EzyMail or Ezynet
          simultaneously.

          EzyNet functions exactly the same way as EzyMail.

          FEdit does not log to a log file, so there are no
          restrictions whatsoever while nodes are running.

          EYZFF does not function while any nodes are active, this
          prevents you from adding New Files to your Database, while

                                   Page 137.






          users are online.  To overcome this, you can logon local,
          and upload the files locally, or you can use Colin Berg's
          (Fido 3:635/500) EzyUp to accomplish the same thing, but
          without logging on.



















































                                   Page 138.






                      Appendix C (File Control Characters)

          Avt/Ans/Asc/Asl File Control Characters
          ---------------------------------------
               These are control charterers that can be placed in any
          of your Avt/Ans/Asc/Asl files.  These functions will be
          initiated once the imbedded control character is reached
          within the Avt/Ans/Asc/Asl file.  For example to show the
          user's name you would have a control code of ^FA (Ctrl-F A).
          To wait for a key, you would have a control code of ^A
          (Ctrl-A).  To display the total system calls you would have
          a control code of ^FA (Ctrl-F A).

               The first set of control characters do not require ^F
          or ^K to precede the required function, but the others
          require ^F or ^K to precede them, as shown.

          ASCII     Ctrl-Code   Description
          -----     ---------   ----------------------------
            01          ^A      Wait for [Enter] Key to be Pressed.
            02          ^B      Disable Abort with "S" key
            03          ^C      Enable  Abort with "S" key
            04          ^D      Disable "Continue" Prompt
            05          ^E      Enable  "Continue" Prompt
            06          ^F     @Insert User Parameter
            07          ^G      Beep at User's End
            08          ^H      Backspace
            09          ^I      Move Forward 8 spaces
            10          ^J      Line Feed
            11          ^K     @Insert System Parameter
            12          ^L      Clear Screen
            13          ^M      Carriage Return
            22          ^W      Pause for One Second
            23          ^V      Reserved for Avatar
            24          ^Y      Reserved for Avatar




















                                   Page 139.






                     User Parameters

          Add a Control-F to Precede The User Parameters.

          ASCII     Character   Description
          -----     ---------   -------------------
            65         A        User's Name
            66         B        Location
            67         C        Password
            68         D        Business/Data Phone
            69         E        Voice Phone
            70         F        Date of Last Call
            71         G        Time of Last Call
            72         H        Flag A
            73         I        Flag B
            74         J        Flag C
            75         K        Flag D
            76         L        Netmail Credit
            77         M        Messages Posted
            78         N        Date Format (DDMMYY/MMDDYY)
            79         O        Security Level
            80         P        Number of Calls to BBS
            81         Q        Number of Uploads (Files)
            82         R        Number of Uploads (Kilobytes)
            83         S        Number of Downloads (Files)
            84         T        Number of Downloads (Kilobytes)
            85         U        User/Sysop Comment
            86         V        Screen Length
            87         W        First Name Only
            88         X        ANSI (On/Off)
            89         Y        Continue (On/Off)
            90         Z        Screen Clearing (On/Off)
            48         0        Full Screen Editor (On/Off)
            49         1        Quiet (Multi-Line) (On/Off)
            50         2        Extended IBM Characters (On/Off)
            51         3        Time Banked
            52         4        Kilobytes Banked
            53         5        FilePoints
            54         6        User's Alias
            55         7        Date of First Call
            56         8        Date of Birth
            57         9        Subscription Expiry Date (Registered)
            96         a        Days till Expiry Date (Registered)
            97         b        AVATAR (On/Off)
            98         c        Ratio for Files
            99         d        Credit for Files
           100         e        Number of Files Downloadable
                                until Ratio Expires.
           101         f        Number of Files to Upload
                                until Ratio is Even.





                                   Page 140.






               User Parameters (Continued)

          ASCII     Character   Description
          -----     ---------   --------------
           102         g        Ratio for Kilobytes
           103         h        Credit for Kilobytes
           104         i        Number of Kilobytes Left
                                until ratio Expires.
           105         j        Number of Kilobytes to
                                upload until ratio is even.
           106         k        Default Protocol
           107         l        Number of Kilobytes for File Points
           108         m        Last NEW File Search Date
           109         n        Post/Call Percentage for Security
           110         o        Credit for Post/Call ratio
           111         p        Number of Msgs behind Post / Call
                                ratio
           112         q        Number of Msgs in front of  Post/ Call
           113         r        Graphics Mode (Verbose)
           114         s        Users Post/Call Percentage
           115         t        File Points awarded since last session
            33         !        Message Quote Colour
            64         @        Message Text Colour
            35         #        Message Prompt Foreground Colour
            36         $        Message Prompt Background Colour
            37         %        Filename Colour
            94         ^        File Size Colour
            38         &        File Date Colour
            42         *        File Description Colour
            40         (        Uploader Colour

























                                   Page 141.






          System Parameters (Preceded by Ctrl-K)

          ASCII    Character    Description
          -----    ---------    ------------------------------------

            65         A        Total System Calls
            66         B        Last Caller (any line)
            67         C        Number of Messages (Total)
            68         D        Number of Msgs in Template Msg Area
            69         E        Maximum K Download
            70         F        Number of Times user has Paged Sysop
            71         G        Day of Week (Complete)
            72         H        Number of Users
            73         I        Time in 24 format
            74         J        Today's Date
            75         K        Minutes Connected this Call
            76         L        Number of Current Template file area
            77         M        Minutes Used Today
            78         N        Number of Current Template Msg Area
            79         O        Minutes Remaining Today
            80         P        Downloads (K) Left Today
            81         Q        Daily Time Limit
            82         R        Current Baud Rate
            83         S        Day of the week (abbreviated)
            84         T        Daily Download limit
            85         U        Minutes Until Next System Event
            86         V        24 hour format time of the next event
            87         W        Node Number (Multi-Line)
            88         X        Terminates Session
            89         Y        Name of Message Area
            90         Z        Name of File Area
            48         0        Time before a menu option can be
                                activated.
            49         1        Start Time for last invalid menu Opt
            50         2        End Time for last invalid Menu Opt
            51         3        Number of Files in Template file Area
            52         4        Total Number of Files
            53         5        Number of New Users Today
            54         6        Number of New Messages Today
            55         7        Number of New Files Today
            56         8        Total Amount of Files in Kilobytes
            57         9        Last Callers Alias
            96         a        Ezycom Version Number
            97         b<hex>   Changes the users current colour to
                                <hex>.  See Appendix G.
            98         c        Number of session failures since last
                                session.








                                   Page 142.







                           Appendix D (Menu Commands)

               The following commands are used to create your menus.

               Ezycom has approximately 80 different menu types for
          use in menus.  Following is a list these commands.  A few
          conventions have been used:

           <....>  : Means that is a necessary option and must be
               included for the menu command to function correctly
           [....]  : This means that it is optional information.
           |       : This means "or".  Eg 1 | 2 would mean 1 or 2, but
               not 1 and 2.

          Menu Types

          Option 0    Display

          Miscdata    None

               This command simply does NOTHING, and is included for
          display line purposes only.


          Option  1   Goto Menu

          Miscdata    <MENUNAME> | /TOPMENU
                      [Password]
                      [/F=<file area template number>
                         | + | - | <group>]

                      [/M=<message area template number>
                         | + | - | <group>]

                      [/NC]

               This command allows the movement from the current menu
          to another.  The menu name, which Ezycom will move to when
          activated is indicated in the <MENUNAME>.  The <MENUNAME>
          must not include the .MNU extension, as that is appended by
          Ezycom automatically.  If, /TOPMENU is used instead of
          <MENUNAME>, then the user will be moved to the TOP MENU when
          selecting this option.  Optionally, a [Password] may be
          specified.  The user must then type in the Password
          correctly before he/she can gain entry to the menu.  As
          stated in the Menu Templating documentation the /F= and /M=
          commands are valid for the Goto Menu Command.  The Optional
          parameter /NC means, that NO CLEAR SCREEN command will be
          sent to the user when displaying the new menu.

          Eg: Miscdata  /TOPMENU ourpassword /F=+



                                   Page 143.






          Option  2   Gosub Menu

          Miscdata    <MENUNAME> | /TOPMENU>
                      [Password]
                      [/F=<file area template number>
                         | + | - | <group>]

                      [/M=<message area template number>
                         | + | - | <group>]

                      [/NC]

               This command works exactly like the GOTO menu command
          except that it leaves its FILENAME on the GOSUB MENU STACK,
          so you can later return to this MENU using Option 3 (Return
          from Gosub).

          Option  3   Return from Gosub

          Miscdata    None

               This commands returns to the last menu where a GOSUB
          menu command was used.


          Option  4   Goto and Clear Gosub Stack

          Miscdata    <MENUNAME> | /TOPMENU
                      [Password]
                      [/F=<file area template number>
                         | + | - | <group>]

                      [/M=<message area template number>
                         | + | - | <group]

                      [/NC]

               This command behaves exactly like the GOTO menu command
          except that it CLEARS the GOSUB menu stack, so you can not
          return from anymore menus until you have GOSUB'd to more.


          Option  5   Display ANS/ASC/ASL/AVT

          Miscdata    <Textfile>

               This command Displays a <textfile> onto the users
          screens.  This command does NOT support MENU hotkeys.  The
          <textfile> name should not include the extension, as Ezycom
          automatically determines this, according to the users
          Terminal Emulation Options.




                                   Page 144.






          Option  6   Bulletin Menu

          Miscdata    <1-8 character name>

               Displays the <1-8 character name> file in the text file
          directories.  The user is then prompted for a remaining part
          of the file name (8 - <length of file>).  The file is then
          displayed.  No extension should be placed in the filename.















































                                   Page 145.






          Option  7   DOS Shell

          Miscdata    <program to execute> [parameters]

               The <program to execute> is the name of the program you
          wish to run.  If, a COM or EXE file is being executed, then
          just the name of the program and extension is required.
          Eg: EZYED.EXE

               However, if a batch file is being run, then a command
          line interpreter needs to be loaded (COMMAND.COM).
          Eg: C:\COMMAND.COM /C GAME.BAT

               Instead of specifying the entire path to COMMAND.COM,
          the COMSPEC environment variable can be used to retrieve the
          path.  In this case, the C:\COMMAND.COM would be replaced by
          *C.
          Eg: *C /C GAME.BAT

               On executing a Type 7 Shell, Ezycom writes two files,
          EXITINFO.<node> and DORINFOx.DEF.  The name for DORINFOx.DEF
          is configurable and can be changed with the list of special
          commands later.  The EXITINFO.<node> holds ezycom specific
          information, that it uses to run.  On returning to Ezycom
          after the Type 7 Shell, Ezycom reads in the EXITINFO.<node>
          file, to process any information that might have been
          changed.

           *F  User's First Name
           *L  User's Last Name
           *H  The Fossil Driver is left "Hot" during the Type 7
               Shell. Generally this option is not used.
           *M  Swap out Ezycom leaving using 9k ram.  This enables
               larger programs to be executed in the Type 7 Shell,
               although swapping can take a few seconds, if Disk
               Swapping is used.
           *P  Comport Number
           *R  User Record Number
           *G  ANSI On/Off On=1 Off=0
           *V  ANSI/Avatar On/Off
               3  ANSI & Avatar
               2  Avatar
               1  ANSI
               0  ASCII
           *A  Users Alias (Real Name if there is no alias)
           *C  COMSPEC Environment variable (COMMAND.COM)
           *S  User's Security Level
           *N  Node : Format 1..250
           *9  Node : Format FO1..250






                                   Page 146.






                This format could be used for renaming/copying
          dorinfoX.def to a naming convention that some door programs
          might prefer.

            *0  This switch is replaced by the current File Area
          Template number.
            *1  This switch is replaced by the current Message Area
          Template number.
            *2  This is the upload path for the current file area
          template.
            &V  This is the same as *V, except that it places the *V
          information in the Dorinfox.def and DOOR.SYS files.
            &A  This is the same as *A, except that it places the
          Alias of the user in the Dorinfox.def and DOOR.SYS files
          instead of the user's real name.
            &O  This is the same as *O, except that it places the
          Locked Baud rate in the Dorinfox.def and DOOR.SYS files
          instead of the effective baud rates.  That is, if the
          comport is locked.
            *D1 This option creates the Dorinxxx.def on executing the
          Type 7 Shell where xxx is the *9 Node Format.
            *D2 This option creates the Dorinfo1.Def on executing the
          Type 7 Shell.
            *D3 This option creates Doorx.Def on executing the Type 7
          Shell where x is the *N Node Format
            *D4 This option creates a doorway compatible Door.sys file
          in executing the Type 7 Shell.
            *!  This option stops the clock when the user is in the
          Type 7 Exit.  That is, the user does not loose anytime in
          the Shell.
            *#  This option turns off the Type 7 Exit Flag.
            *B  This is the users effective Baud Rate.  If, the user
          is local then the baud rate is 0.
            *O  This is the users actual Baud Rate between the
          computer and modem.  If the comport is NOT locked, then it
          is the same value as the effective Baud Rate.

               These options can be used in the parameters field of
          the Type 7 Exit.
          Eg: GAME.EXE *F *L *P
               This would translate to for instance,
          GAME.EXE Peter Davies 1.


          Option  8   Version of Ezycom

          Miscdata    None

               This option displays the current version of Ezycom.






                                   Page 147.






          Option  9   Logoff/Terminate Call

          Miscdata    [/NOHANGUP] [/ERR=<errorlevel>]

               This option displays GOODBYE.A* (if it exists), before
          hanging up the user.  If, the /NOHANGUP flag is used, then
          the users Carrier, is not dropped during the termination of
          the call.  The [/ERR=<errorlevel>] command, tells Ezycom
          that you wish to exit Ezycom with an errorlevel.  The
          errorlevel must be from 20 through to 255.
          Eg: /NOHANGUP /ERR=25
               If, both of these options are used together, and with
          some intelligent batch file programming, it is possible to
          make a relogon option.

          Option  10  Display System Usage Graph for Each Line

          Miscdata    None

               This option displays the system Usage of the node
          number, since TIME<node>.BBS was created.


          Option  11  Page System Operator for Chat

          Miscdata    String to Display to User (about chat)

               This option pages the sysop for a chat request, and
          sends the miscdata line to the user.  A suitable line for
          miscdata might be "Paging Sysop for a Chat... Please
          Wait...".


          Option  12  Questionnaire Language

          Miscdata    <questionnaire name>  [output file]

               This option executes a Questionnaire.  The
          Questionnaires are named <questionnaire name>.Q-A in your
          system directory.  [output file] is the name of the answer
          file you wish to use.  See "Questionnaires" in Appendix A
          for information about Questionnaires.













                                   Page 148.






          Option  13  User List

          Miscdata    [/A] [/C] [/S] [>=<security] [<=<security>]
                                     [=<security>] [<<security>]
                                     [><security>]

               This option displays a list of all the users on the
          system.  Various options exist.  They are

            /A : Show user's aliases instead of real names
            /C : Displays user's comments, instead of their location
            /S : Displays user's security, instead of number of calls

          >=<security>
               : User's security must be equal to or greater than the
               security to be displayed
          <=<security>
               : User's security must be less than or equal to the
               security to be displayed
          =<security>
               : User's security must be less than or equal to the
               security to be displayed
          <<security>
               : User's security must be less than the security to be
               displayed
          ><security>
               : User's security must be greater than the security to
               be displayed

          Option  14  Display Time Statistics

          Miscdata    None

               This option displays time statistics about the user on-
          line.


          Option  15  Exit with Errorlevel

          Miscdata    <errorlevel>

               This option exits Ezycom with <errorlevel>, which must
          be in range from 20 to 255.  Ezycom can relogon the user
          using the -R option.  This option would only be used if the
          door games are so big that they can not run inside of a Type
          7 Shell, even with Swapping.


          Option  16  Change User's Location

          Miscdata    None

               This option allows the user to change his/her location.


                                   Page 149.






          Option  17  Change User's Password

          Miscdata    None

               This option allows the user to change his/her password.


          Option  18  Change User's Screen Length

          Miscdata    None

               This option allows the user to change his/her screen
          length.


          Option  19  Toggle Screen Clearing

          Miscdata    None

               This option allows the user to toggle screen clearing
          codes being sent to him/her.


          Option  20  Toggle Page Pausing

          Miscdata    None

               This option allows the user to toggle page pausing.

          Option  21  Toggle ANSI Graphics

          Miscdata    None

               This option allows the user to toggle ANSI Graphics.


          Option  22  Check Mail

          Miscdata    [/G=<groups>]

               This option allows the user to check for mail waiting.
          Optionially, the groups used for checking mail can be used
          to override the user's groups.

          Eg: Miscdata /G=ABC










                                   Page 150.






          Option  23  Read Message

          Miscdata    <message board> | /M

               This option allows the user to read a particular
          conference.  If /M is placed in Miscdata, then the current
          message area template is used, otherwise the message board
          selected is used.

               While reading messages, the user/sysop is presented
          with various keys, they are:
               [A]gain   : Display the message again.
               [L]ast    : Go back to the previous message.
               [N]ext    : Move to the next message.
               [R]eply   : Reply to the message.
               [W]rite   : Write a message.
               [D]elete  : Delete a message.
               [F]orward : Forward the message to someone else.
               [E]dit    : Edit the message.
               [K]eep    : Keep the message unread.
               [!]       : Shows hidden information in the message.
               [S]top    : Stop reading messages.
               [U]pdate  : Update the user who the message is from.
               Alt-M     : (Local Only) Fully Update User who the
                           message is from.
               e[X]port  : (Local Only) Export the message to Disk.
                           If, the filename is PRN/LTP1/LPT2/LPT3,
                           then the message is printed.

               In the [E]dit mode, various attributes of the message
          can be edited.  The most powerful feature is the No-Kill
          flag.  If, this is set to On, then MSGCOMP will NEVER delete
          the message, until the message is deleted by a User.


          Option  24  Scan Messages

          Miscdata    <message board> | /M

               This option is the same as Option 23, except that none
          of the message body is display to the user.


          Option  25  Quick Scan Messages

          Miscdata    <message board> | /M

               This option is the same as Option 24, except that the
          information displayed, is on one line, allowing an even
          briefer view of the messages.





                                   Page 151.






          Option  26  Delete Message

          Miscdata    <message board> or /M

               This option allows the user to delete individual
          messages for a particular message area.  The user can only
          delete message(s), if they are A) A Sysop of that Message
          Area, B) They wrote the message and it is not an echomail
          message, or C) They received the message and it is not an
          echomail message.  If, the user does not fall into one of
          these categories, then they will not be able to delete the
          message(s).


          Option  27  Post Message

          Miscdata    <message board> | /M
                      [/T=<to_user_name>] [/S=<subject>]
                      [/L]

               Post Message, allows users to post a message into a
          conference pointed to <message board> or /M (the current
          message area template).  The menu creator can FORCE the name
          of the message to be posted to, by placing a
          /T=<to_user_name> in.  Note that when using this command, if
          the name has TWO words, an underscore must be placed between
          them.
          Eg: /T=Peter_Davies
               Also, the subject can be forced as well.  This can be
          accomplished by using the /S=<subject> field.  As with the
          /T option, an underscore MUST be used to separate words.
               The /L option can be used to logoff the user
          immediately after he/she posts the message.  The special
          feature about this option, is that if the user does not post
          the message, they are not logged off.


          Option  28  Set Combined Area

          Miscdata    None

               This option allows the user to individually select
          which message areas they want on/off for Global Message
          Options.  Ezycom has two Global Message Options, Check For
          Mail, and Read Global New Messages.  If, a user turned off a
          conference, then they would never read any messages for
          those conferences using those two options.








                                   Page 152.






          Option  29  Read Global New Messages

          Miscdata    [/SCAN | /LIST] [/G=<groups>]

               This option allows the user to read all messages which
          he/she has not read.  Optionially, /SCAN can be used to tell
          Ezycom to do scanning for new mail, instead of reading new
          mail.  Optionially, /LIST can be used to tell Ezycom to list
          the messages, instead of readnew new mail.  Optionially, the
          user's groups can be over ridden with the /G=<groups>
          command.


          Option  30  BiModem

          Miscdata    <upload area> | /F

               This option allows users to transfer BIDIRECTIONALLY
          using the BiModem External Protocol.  The path for BiModem
          must be set before this option will work.  Also, the
          configuration files for BiModem (Bimodem.1 Bimodem.2 etc)
          must have also been placed in the path.  See "BiModem" for
          more information on it.  The <upload area> | /F, specifies
          what upload area do you wish the uploads to be placed in.
          If, /F is used, then uploads could be redirected to another
          file area if "Upload File Area" for that file area, points
          to a different file area.  If, the actual file area number
          is used, then all the uploads are always placed in that file
          area, that is, no redirection can occur.


          Option  31  View File List

          MiscData    <file area> | /F
                      [/NEW]
                      [/G=<groups>]

               View a file list for <file area> or /F (current file
          area template).  Simply, if the user has access to the file
          area, they can view the file list for it.  If, /NEW is used,
          then only NEW files in that file list will be displayed.
          Optionially, the user's groups for viewing can be over
          ridden using the /G=<groups> command.  While viewing the
          file list, the user is given an option to add to batch (if
          more prompt is turned on).  The user can add files to the
          batch, using filenames (wildcards supported), or by typing
          in the number of the file.  Eg: +1 +2.  Instead of typing in
          the numbers of the files for say 1 to 10, the user could
          also do +1-10.  It is suggested that you make up a standard
          msg to send to all newusers telling them how to use this
          feature.  It makes file batching VERY quick.




                                   Page 153.






          Option  32  Global Download

          Miscdata    None

               Globally download files from the BBS.  The users can
          download files from anywhere on the system, so long as they
          have access to the file areas.  This option also supports
          all the batch commands.


          Option  33  Upload

          Miscdata    <upload area> | /F

               This option allows the user to upload files to the
          system.  If <upload area> is used, then uploads are ALWAYS
          uploaded to that file area, no redirection can take place.
          If, /F (current file area template) is used, then uploads
          are placed in that file areas template upload area.  That
          is, if the file areas upload area pointed to another file
          area, then uploads would be placed in that other file area.


          Option  34  View Contents of Archive

          Miscdata    None

               This option allows users to view the contents of ZIP,
          LZH, PAK, ARC, ZOO, GIF and ARJ files anywhere on the
          system, as long as they have download accesss to those
          files.


          Option  35  Scan File Areas by Keyword

          Miscdata    [file areas to search and/or /F]
                      [/G=<groups>]

               This option allows users to search through the file
          areas by using a keyword.  Miscdata can Optionally contain a
          list of file areas that can be used to search.  If, miscdata
          is blank, then all file areas are searched.  An example
          miscdata might be
          Miscdata    1 /F
               This would mean that first of all, file area 1 is
          scanned, then the current file area template is scanned.
          If, they were reversed on the Miscdata line, that is "/F 1",
          then the current file area template would be searched first,
          then file area 1.
               Optionially, /G=<groups> can be used to override the
          user's groups for viewing.




                                   Page 154.






          Option  36  Scan File Areas by Filespec

          Miscdata    [file areas to search and/or /F]
                      [/G=<groups>]

               This option allows users to search through the file
          areas by using a filespec.  A filespec, is a file
          specification.  This could include DOS/UNIX valid wild cards
          such as * and ?, for example to list all files, *.* would be
          used.  As with Menu Type 35, the file areas to list can be
          selected for this Menu Type.  They work in EXACTLY the same
          way as Option 35.  Optionially, the user's groups can be
          used to override the user's groups for viewing using the
          /G=<groups>.


          Option  37  List of New Files Since Last Time Viewed

          Miscdata    [file areas to search and/or /F]
                      [/G=<groups>]

               This option allows users to view new files, since the
          last time they executed this option, or the view new files
          option at logon.  For instance, if the user logged on, and
          did not did a new files list in that session, then the next
          time they do a new files list, they will see all the files
          since the last time the did this option, not the last time
          they logged on.  The Miscdata also allows the specification
          of which file areas to scan.  The file areas are listed
          EXACTLY the same way as with Option 35.  Optionially, the
          /G=<groups> can be used, to override the current user's
          groups for this command.


          Option  38  View Text File Specified by the User

          Miscdata    None

               This option allows users to view text files, that are
          in file areas.  The user is asked for the filename of the
          text file to view.  Note that this is a GLOBAL option, so
          the users do not have to be in the correct file area to view
          the text file.


          Option  39  Display Direct Text File

          Miscdata    <Textfile Name>

               This option allows the viewing of a textfile name,
          specified by <Textfile Name>.  This filename should also
          include the extension.
          Eg: C:\EZY\SOLUTION\PQ3.SOL


                                   Page 155.






          Option  40  Display AVT/ANS/ASC/ASL with Menu Hotkeys

          Miscdata    <FileName> | /MENU

               This option allows the displaying of AVT/ANS/ASC/ASL
          with the use of Menu Hotkeys.  Typically, this option would
          be used as an automatic option at the top of a MENU.  The
          <FileName> should NOT include an extension.
          Eg: QUICKF
               The /MENU command can be used instead of the filename,
          this option automatically replaces itself, with the FileName
          of the current Menu.  For example, if Ezycom was in the Menu
          Top, and if the /MENU command was used in the miscdata, then
          Ezycom would display the TOP.A* textfile.


          Option  41  Toggle Full Screen Editor

          Miscdata    None

               This option allows the user to toggle the use of the
          full screen editor.


          Option  42  Toggle IBM Extended Characters

          Miscdata    None

               This option allows the user to toggle the user of the
          IBM Extended Character Set.  This will tell Ezycom whether
          or not to use the .ASC files or the .ASL files for menu
          display for ASCII users.























                                   Page 156.






          Option  43  View Nodelist

          Miscdata    /M | <msgboard> | /N=<network address>

               This option allows you to view a nodelist, which has
          been setup with EZYNODE (See EZYNODE for configuration).
          If, /M is used on the command line, then the current message
          template area is used to view the nodelist.  If, <msgboard>
          is used, then that message board's nodelist will be used.
          If, /N=<network address> is used, then that <network
          address> is used to view the nodelist.  Note that when
          viewing the nodelist from a message board, only echomail or
          netmail areas will work.

          Eg: Miscdata:  /M                (Current Message Area)
                         1                 (Message Board 1)
                         /N=3:636/213      (Network Address 3:636/213)


          Option  44  Set Combined Areas (Global)

          Miscdata     None

               This option allows the user to set all of their
          combined areas to either ON, OFF or the DEFAULT values.


          Option  45  Display AVT/ANS/ASC/ASL with Pause at End

          Miscdata    <FileName> or /MENU

               This option displays the text file, then asks the user
          to press enter after the displaying of it has finished.
          Again, the /MENU command can be used to substitute the MENU
          name for the filename.  The FileName should not include
          paths, or extensions.
          Eg: QUICKF


          Option  46  Display Direct ASC File with Pause at End

          Miscdata    <TextFile>

               This option displays <TextFile> to the screen and
          pauses at the end.  This option is basically the same as
          Option 39, except the pause is at the end.  In this option,
          the FULL path, name and extension should be given.
          Eg: C:\EZY\FILES\PQ3.SOL







                                   Page 157.






          Option  47  Make a System Log Entry

          Miscdata    Text to Place in Log

               This option allows an entry in the log to be used.
          Typically, this would be an automatic option, and would be
          used to indicate that the user moved into a menu on the
          board.  The smart text codes of "@" and "`" can be used to
          indicate the current file area template and the current
          message area template respectively.


          Option  48  Download Specific

          Miscdata    <filename> [/FREE]

               This option allows the user to download the file
          pointed to be <filename>.  <filename> should be a full path
          and extension of the file.  Optionally, the /FREE switch can
          be used, to signify a free download for the user.


          Option  49  Message Area Change

          Miscdata    [text file] [/G=<groups>]

               This option gives the user a list of message areas, and
          changes the current message area template to the message
          area they select.  If, you want to make your own list of
          message areas, then place the filename (no extension) of the
          textfile to be used instead in the miscdata like.
          Optionially, /G=<groups> can be used to override the default
          user's groups for this command.
          Eg: Miscdata   MESSAREA


          Option  50  File Area Change

          Miscdata    [text file] [/G=<groups>]

               This option is basically the same as Option 49, except
          that it changes the current file area template instead.
          Optionially, /G=<groups> can be used to override the default
          user's groups for this command.











                                   Page 158.






          Option  51  Today/Yesterday's Callers

          Miscdata    [/A] [/Y]

               This option displays a list of todays or yesterdays
          callers to the Bulletin Board Service.  If, /Y is placed in
          miscdata, then Yesterday's callers are shown, otherwise
          Today's callers are shown.  If, /A is used in Miscdata, then
          aliases are used instead of real names.

               When a list of today's callers is displayed, a DidWhat?
          field is shown.  They represent certain actions the user did
          while online.  They are:

          N = NewUser
          R = Read Messages
          S = Sent Messages
          D = Downloaded
          U = Uploaded
          P = Paged Operator
          C = Chatted with Sysop
          O = Outside Ezycom (type 7/15 shell)


          Option  52  Display Who's On-Line

          Miscdata    [/A]

               This option displays a list of users who are currently
          online.  This option works across networks and/or
          multitaskers, to show every user, who is using Ezycom.  If,
          the /A switch is used on the Miscdata line, then Aliases are
          shown instead of real names.


          Option  53  Toggle Quiet Mode

          Miscdata    None

               This option toggles the Quiet Mode.  Quiet Mode, stops
          users of other lines from sending a message to your node.


          Option  54  Send Message To Other Line

          Miscdata    [/A]

               This option allows the user currently online, to send a
          message to a user on another line.  The message arrives only
          while users are in the menu system, not while reading
          messages, or in an menu option, and more.  If, the /A switch
          is used, aliases are shown instead of real names.



                                   Page 159.






          Option  55  Download anyfile

          Miscdata    None

               This option allows user(s) to download files from
          ANYWHERE on the system.  They can specify a full pathname to
          download the files.  This option should only be made
          available to the Sysop, or not used at all.


          Option  56  Import a text file into a message

          Miscdata    <message boad> | /M
                      [/U=<from_username>]
                      [/T=<to_username>]
                      /S=<subject>
                      /L=<text file>

               This option is used for importing a text file, into the
          BBS.  The main use for this option, would be to post a
          message to a newuser.  The <message board> | /M specify
          which message area the message will be posted in.  The /U
          command specifies the from user name.  All spaces in the
          names must use an UNDERSCORE characters.
          Eg: /U=Peter_Davies

               If, the /U command is left out, then the from user name
          defaults to the name of the user currently online.  The /T
          command is mostly the same as the /U command, except that it
          specifies the name of who the message is to be posted to.
          If, the /T command is omitted, then the message is posted to
          the name of the user online.  The /S command specifies the
          subject of the message and is not an optional parameter.
          The /L commands specifies a fully qualified filename (path,
          name and extension), of the file which contains the message
          to be imported into a message area and is not an optional
          parameter.

               This command supports the Ctrl-F/K smart text codes in
          the text file to be imported.















                                   Page 160.






          Option  57  Change home/voice number

          Miscdata    None

               This option allows the user to change his/her home
          voice phone number.


          Option  58  Change business/data number

          Miscdata    None

               This option allows the user to change his/her
          business/data phone number.


          Option  59  Reserved for Future Expansion

          Option  60  Reserved for Future Expansion


          Option  61  Avatar On/Off

          Miscdata    None

               This option allows the user to turn Avatar Graphics
          On/Off.


          Option  62  List Batch

          Miscdata    None

               This option displays the current contents of the user's
          download batch.


          Option  63  Erase Batch

          Miscdata    None

               This option erases the entire contents of the user's
          download batch.


          Option  64  Add Files to Batch

          Miscdata    None

               This option allows the user to add files to his/her
          download batch.




                                   Page 161.






          Option  65  Erase Single Files from Batch

          Miscdata    None

               This option allows the user to erase single/multiple
          files from the download batch.


          Option  66  Multiline Chat

          Miscdata    [/A]

               This option allows the chatting between two or more
          users on different nodes of the Bulletin Board.  The
          optional /A switch, forces Aliases instead of Real Names.


          Option  67  Change to Message Area and Unread Mail

          Miscdata    None

               This option is the same as option 49 (change to message
          area), except that the user is told if their is new/unread
          mail in an area.


          Option  68  Produce Online Master List

          Miscdata    [/FREE] (Free Download)
                      [/RAW]  (Allow Raw File Download)
                      [/ZIP]  (Allow ZIP Compression)
                      [/LZH]  (Allow LZH Compression)
                      [/ARJ]  (Allow ARJ Compression)
                      [/SWAP] (Swap Out Ezycom on Compression)

               This option allows the user to download a master list
          that is generated online.  /RAW, /ZIP, /LZH, /ARJ allows the
          sysop to define which archive formats are allowable for the
          download of the master list.  The /SWAP command will swap
          ezycom out, only leaving 8K of memory resident.  If, the
          /FREE command is used, the download is free.  It is
          recommended, the systems with large file areas to not use
          this option, and just make a master file list daily.












                                   Page 162.






          Option  69  Turn Local Display On or Off

          Miscdata    ON | OFF | TOGGLE

               This option turns on/off the local display, when a
          remote user is on-line.  (Does nothing in local mode).  If
          ON is used, then the display is turned ON.  If, OFF is used,
          then the display is turned OFF.  If, TOGGLE is used, then
          the display is turned ON or OFF depending on its current
          state.


          Option  70  Toggle MMDDYY/DDMMYY Date Format

          Miscdata    None

               This option allows the user to toggle between the
          American and European date formats.


          Option  71  Change User Colour

          Miscdata    <1..8> <+ | ->

               This option allows the user to change colours for the
          display of message/file areas.  The <1..8> is which colour
          to change.  If "+" is used, then the colour number is
          incremented by one.  If "-" is used, then the colour number
          is decremented by one.


          Option  72  Change Alias

          Miscdata    None

               This option allows the user to change his/her alias to
          any other name, besides that of another users name/alias.


          Option  73  Change Comment

          Miscdata    None

               This option allows the user to define a comment about
          him/herself.










                                   Page 163.






          Option  74  Clear Screen

          Miscdata    None

               This option simply clears the screen, if the user has
          clear screen codes set to On.


          Option  75  Display ASC Textfile with Menu Hotkeys

          Miscdata    <FileName>

               This option is the same as Type 40, except only ASC/ASL
          menus can be displayed.  That can give the user fast menus,
          but still have ANSI/AVATAR for other options like the Full
          Screen Editor for instance.


          Option  76  Get Default Protocol

          Miscdata    None

               This option allows the user to select a default
          protocol for download/upload.


          Option  77  Add to Time/KiloBytes Bank

          MiscData    [/K]

               This option allows the user to deposit time/kilobytes
          into the time/kilobyte bank respectively.  The /K switch,
          forces the kilobytes bank, instead of the time bank.

          Option  78  Withdraw from Time/KiloBytes Bank

          MiscData    [/K]

               This option allows the user to withdraw time/kilobytes
          from the time/kilobyte bank respectively.  The /K switch,
          forces the kilobytes bank, instead of the time bank.














                                   Page 164.






          Option  79  Display Best User Stats

          MiscData    [/M]     Display Best Messages
                      [/C]     Display Best Caller
                      [/UP]    Display Best Uploader (Files)
                      [/DN]    Display Best Downloader (Files)
                      [/FP]    Display Best File Points
                      [/UK]    Display Best Uploader (KiloBytes)
                      [/DK]    Display Best Downloader (KiloBytes)

               This option displays a users' best list.  If, no
          options are selected, then all best lists are display.  It
          is possible to have more than one best list displayed at a
          time.


          Option  80  Turn off GLOBAL.MNU for this MENU

          Miscdata    None

               This option turns off the GLOBAL menu for this menu.
          This should be used as an automatic option, and should be
          the first line in the MENU.


          Option  81  Write door information files

          MiscData    [DOORWAY=<filename>]
                      [DORINFO=<filename>]

                      *A   Place Alias in the Files to written.
                      *O   Place the Locked Port Baud Rate (MaxBaud)
                           in the Files to written.
                      *V   Use Avatar Standard for Graphics Flags in
                           DORINFOx.DEF.
                      *9   Use FO1..250 for Nodes  1 to 250
                      *N   Use   1..250 for Nodes  1 to 250

               This option writes the doorway DOOR.SYS, and/or
          DORINFO1.DEF file(s) to the filenames of your choosing.  The
          type 7 parameters listed, can be placed in any parts of the
          command line, and will be translated into their meaning.

          Eg: DORINFO=DORIN*9.DEF *A *O *V











                                   Page 165.







                       Appendix E (Operating Batch Files)

               The following is a batch file for running Ezycom as a
          stand alone system.  This batch file will work for any
          amount of nodes you like up to 250 that is.  For Node 1 just
          type BBS with no parameters after the batch file name.  For
          any other Node type the node number (up to 250) after the
          batch file name.
          Eg for node 4 type BBS 4

          BBS.BAT from the startup file that comes with Ezycom.

          @echo off
          rem    Ezycom Standalone Batch File V1.0
          rem    Command Format :
          rem        BBS        (for node 1 operation)
          rem        BBS [node] (for node X operation)
          rem    [node] is the node number from 1 through to 250
          rem    Eg  BBS 2
          cd %EZY%
          if %1! == !     SET TASK=1
          if not %1! == ! SET TASK=%1
          :start
          ezy -E25
          if errorlevel 27 goto start
          if errorlevel 26 goto tossmail
          if errorlevel 25 goto start
          if errorlevel 24 goto weeklyevent
          if errorlevel 23 goto dailyevent
          if errorlevel  9 goto start
          if errorlevel  8 goto sysopnext
          if errorlevel  7 goto netecho
          if errorlevel  6 goto netmail
          if errorlevel  5 goto echomail
          if errorlevel  4 goto modeminit
          if errorlevel  3 goto fossil
          if errorlevel  2 goto runtimeerror
          if errorlevel  1 goto setuperror
          goto finish
          :weeklyevent
          echo Weekly Maintenance Being performed
          cd %EZY%
          ezyff -c
          ezymaint -D
          goto start
          :dailyevent
          echo Daily Maintenance Being performed
          cd %EZY%
          ezyff -c
          ezymaint -p -i -c
          ezyff -i
          usercomp -B20 -S1 -P -D90 -A
          msgcomp  -LINK

                                   Page 166.






          ezyutil  -STRIPLOG -TEZY%TASK%.LOG -D21goto start
          :tossmail
          cd %EZY%
          ezymail -toss
          ezynet  -import -echoarea
          :netecho
          echo Net/Echo Mail Entered
          cd %EZY%
          EZYMAIL -SCAN
          :netmail
          cd %EZY%
          EZYNET  -EXPORT
          goto start
          :echomail
          cd %EZY%
          EZYMAIL -SCAN
          goto start
          :fossil
          echo Fossil Error
          goto finish
          :modeminit
          echo Modem Init Error
          goto finish
          :runtimeerror
          echo Runtime Error Please consult Errors.log
          goto start
          :setuperror
          echo Setup Error
          :finish
          echo Ezycom is Down

























                                   Page 167.







               The following Batch file is for running D'Bridge with
          Ezycom.  Again this batch file will run any amount of Nodes
          you want (up to 250).  The syntax is the same as the BBS.BAT
          example DBMAILER 2 would run dbridge with node 2 operating.

          DBMAILER.BAT

          @echo off
          rem    Ezycom DB Mailer Batch File V1.0
          rem    Command Format :
          rem    DBMAILER        (for node 1 operation)
          rem    DBMAILER [node] (for node XX operation)
          rem    [node] is the node number from 1 through to 250
          rem    Eg  BBS 2
          set DBRIDGE=C:\DB {You may have to change this to suit}
          rem NOTE : no trailing backslash
          if %1! == !     SET TASK=1
          if not %1! == ! SET TASK=%1
          :EXECDB
          cd %DBRIDGE%
          echo scan >dbridge.rsn
          Db
          if errorlevel 100 goto WEEKEND
          if errorlevel 90  goto DAILY
          if errorlevel 60  goto MAILIN
          if errorlevel 50  goto BBS
          if errorlevel 45  goto EDITOR
          if errorlevel 1   goto EXIT
          if errorlevel 0   goto EXIT
          goto execdb

          :DAILY
          cd %EZY%
          ezymail -scan
          ezynet  -export
          ezyff -C
          ezymaint -C -I -P
          ezyff -ID
          usercomp -A -S1 -P -B10 -D90
          msgcomp -LINK
          goto execdb

          :MAILIN
          ezynet  -import -echoarea
          ezymail -toss
          goto execdb

          :BBS
          CALL bbs.bat
          goto execdb




                                   Page 168.






          :EDITOR
          cd %DBRIDGE%
          dbedit
          goto execdb

          :WEEKEND
          rem weekend event like stuff goes here
          cd %EZY%
          ezyff -c
          ezymaint -D
          goto execdb

          :EXIT
          echo Ezycom is Down

               Here is also an excerpt of a d'bridge.aut to show you
          how to set the exit to the bbs section in d'bridge setup.

          * D'Bridge "Exported Configuration"
          * Execute BBS Segment From Dbridge.aut file

          After hours filename C:\DB\AHOURS.TXT
          Please wait text   Please wait...20 sec or Press <esc> <esc>
          Loading BBS text   Loading another Ezycom bbs.
          BBS DOS commands   ECHO @C: >BBS.BAT
          BBS DOS commands   ECHO @CD\EZY >>BBS.BAT
          BBS DOS commands   ECHO @EZY -B*b -T*t >>bbs.bat
          BBS DOS commands   *X50

               This is explained far better in the D'Bridge user
          manual that comes with D'Bridge.
























                                   Page 169.






               The following batch file is for users of FrontDoor, it
          will also run as many Nodes you want.  Don't forget to check
          if you have to change the set command in your batch file.


          @echo off
          rem    Ezycom FD Mailer Batch File V1.0
          rem    Command Format :
          rem    FDMAILER        (for node 1 operation)
          rem    FDMAILER [node] (for node XX operation)
          rem    [node] is the node number from 1 through to 250
          rem    Eg  BBS 2
          set FD=C:\FD
          rem NOTE : no trailing backslash
          if %1! == !     SET TASK=1
          if not %1! == ! SET TASK=%1
          :start
          cd %FD%
          fd
          if errorlevel 210 goto 38400baud
          if errorlevel 209 goto 19200baud
          if errorlevel 208 goto 14400baud
          if errorlevel 207 goto 12000baud
          if errorlevel 206 goto 9600baud
          if errorlevel 205 goto 7200baud
          if errorlevel 204 goto 4800baud
          if errorlevel 203 goto 2400baud
          if errorlevel 202 goto 1275baud
          if errorlevel 201 goto 1200baud
          if errorlevel 200 goto 300baud
          if errorlevel 191 goto scanecho
          if errorlevel 190 goto unpackmail
          if errorlevel  51 goto localbbs
          if errorlevel  50 goto cleanup
          if errorlevel  10 goto end
          if errorlevel   6 goto fossil
          if errorlevel   5 goto modeminit
          if errorlevel   4 goto modemresp
          if errorlevel   3 goto fulldisk
          if errorlevel   2 goto external
          if errorlevel   1 goto internal
          goto start

          :38400baud
          cd %EZY%
          ezy -b38400 -E20
          goto after_ezy

          :19200baud
          cd %EZY%
          ezy -b19200 -E20
          goto after_ezy



                                   Page 170.






          :14400baud
          cd %EZY%
          ezy -b14400 -E20
          goto after_ezy

          :12000baud
          cd %EZY%
          ezy -b12000 -E20
          goto after_ezy

          :9600baud
          cd %EZY%
          ezy -b9600 -E20
          goto after_ezy

          :7200baud
          cd %EZY%
          ezy -b7200 -E20
          goto after_ezy

          :4800baud
          cd %EZY%
          ezy -b4800 -E20
          goto after_ezy

          :2400baud
          cd %EZY%
          ezy -b2400 -E20
          goto after_ezy

          :1275baud
          cd %EZY%
          ezy -b1275 -E20
          goto after_ezy

          :1200baud
          cd %EZY%
          ezy -b1200 -E20
          goto after_ezy

          :300baud
          cd %EZY%
          ezy -b300 -E20
          goto after_ezy

          :localbbs
          cd %EZY%
          ezy -L -E20







                                   Page 171.






          :after_ezy
          if errorlevel 20 goto start
          if errorlevel 8 goto sysopnext
          if errorlevel 7 goto scanecho
          if errorlevel 6 goto scanecho
          if errorlevel 5 goto scanecho
          if errorlevel 4 goto modeminit
          if errorlevel 3 goto fossil
          if errorlevel 2 goto runtimeerror
          if errorlevel 1 goto setuperror
          goto start

          :unpackmail
          cd %EZY%
          ezymail -toss -verbose
          ezynet  -import -echoarea
          goto start

          :scanecho
          cd %EZY%
          ezymail -scan -verbose
          ezynet  -export
          goto start

          :cleanup
          cd %EZY%
          ezyff -c
          ezymaint -i -p -c
          ezyff -i
          usercomp -b20 -p -d90 -s1 -a
          msgcomp -LINK
          goto start

          :sysopnext
          echo Yo!!!! Your LOGON NOW!!!
          pause
          goto start

          :weekly
          cd %EZY%
          ezyff -c
          ezymaint -d
          goto start

          :setuperror
          echo Setup Error!
          goto end

          :runtimeerror
          echo Runtime Error! Consult Errors.Log
          goto start




                                   Page 172.






          :modeminit
          echo Modem Init Error!
          goto End

          :fossil
          Echo Wrong Fossil Version!
          goto end

          :modeminit
          Echo EZY Unable To Initialize Modem!
          goto start

          :modemresp
          Echo FD Modem NOT Responding!
          goto end

          :fulldisk
          Echo Insufficient Disk Space TO Proceed!
          goto end

          :external
          Echo External FD Error - System File Missing!
          goto end

          :internal
          Echo Internal FD Error!
          goto end

          :end
          Echo Ezycom Is Down!
          cd %EZY%


               As you can see Ezycom will run with most mailers as
          well as a stand alone system.  The only mailer we have found
          that Ezycom will NOT work with is BinkleyTerm.



















                                   Page 173.






           
                              Appendix F (Credits)

          Credits

             I would like to thank Wayne Burnside, Richard Stocks,
          Garry Gillard, Colin Berg, Neil Lees, Geoff Edes, Steven
          Schnitzer, Brad Vonarx, Stuart Healey, Brendan McCarthy, Ian
          Mason, Donald Grover, Christian Kraus, Lloyd Bayley, Matthew
          Taylor, John Buetefuer, Dean Harry, Bernard Holkner and all
          the other Beta/Gamma Testers.  Definitely, Ezycom would not
          have been what it is, without the aid and support of these
          people.










































                                   Page 174.






                          Appendix G (Colour Changer)

               Ezycom now supports a colour changer which can be
          embedded in text files or in menus.  Ctrl-Kb initiates the
          colour changer, then a hex code is required to actually tell
          Ezycom what colour to change to.  The <hex> code is a two
          digit hexadecimal number that indicates the colour to change
          to.  The first digit indicates the background colour and
          whether the forground colour should be blinking or not.  The
          second digit is the forground colour.

                Foreground                   Background

                0 - Black                    0 - Black
                1 - Blue                     1 - Blue
                2 - Green                    2 - Green
                3 - Cyan                     3 - Cyan
                4 - Red                      4 - Red
                5 - Magenta                  5 - Magenta
                6 - Brown                    6 - Brown
                7 - LightGray                7 - LightGray
                8 - DarkGray                 8 - Black     + Blinking
                9 - LightBlue                9 = Blue      + Blinking
                A - LightGreen               A - Green     + Blinking
                B - LightCyan                B - Cyan      + Blinking
                C - LightRed                 C - Red       + Blinking
                D - LightMagenta             D - Magenta   + Blinking
                E - Yellow                   E - Brown     + Blinking
                F - White                    F - LightGray + Blinking

          Eg CtrlKb07

          Would set the background colour to black (0) and the
          foreground colour to LightGray (7).

          Eg CtrlKb4F

          Would set the background colour to Red (4) and the
          foreground colour to White (F).

          Eg CtrlKbCF

          Would set the background colour to Red ((4) + (8) = C) and
          the foreground colour to White Blinking (F)











                                   Page 175.







          Table of Contents                                          2
          Features of Ezycom                                         4
          Conditions of Use                                          7
          Registration                                               9
          Ezycom Support Sites                                       9
          Copyrights                                                10
          Installation                                              11
          Installation Requirements                                 11
          Installation Set-up                                       11
          Config (General)                                          13
          Config (General, Paths)                                   13
          Config (General, Netmail Addresses)                       16
          Config (General, Limits)                                  17
          Config (General, Events)                                  19
          Config (General, Textfiles)                               20
          Config (General, Drop Dos)                                20
          Config (Misc)                                             21
          Config (Misc, New User)                                   21
          Config (Misc, Logon Info)                                 22
          Config (Misc, Colours)                                    25
          Config (Misc, Prompts)                                    26
          Config (Misc, Paging)                                     26
          Config (Misc, Screen Options)                             27
          Config (Misc, Alt - Ctrl Function Keys)                   27
          Config (Misc, Sound)                                      28
          Config (Misc, Access)                                     28
          Config (Misc, System)                                     29
          Config (File Areas)                                       32
          Config (File Areas, File Area)                            32
          Config (File Areas, File Paths)                           34
          Config (File Areas, Misc File Options)                    35
          Config (File Areas, File List)                            37
          Config (File Areas, File Security)                        39
          Config (File Areas, Global File Options)                  41
          Config (Ezyprot, Protocols)                               44
          Config (Protocols, Default Set-up Protocols)              44
          Config (Protocols, Bimodem)                               46
          Config (Protocols, Setting Up Your Own Protocols)         47
          Config (Msg Areas)                                        50
          Config (Msg Areas, Message Area Name)                     50
          Config (Msg Areas, Areafix Tag)                           50
          Config (Msg Areas, Message Types)                         50
          Config (Msg Areas, Message Kinds)                         51
          Config (Msg Areas, Alias Allowed)                         51
          Config (Msg Areas, Areafix Group)                         52
          Config (Msg Areas, Read Security)                         52
          Config (Msg Areas, Read Flags)                            52
          Config (Msg Areas, Write Security)                        52
          Config (Msg Areas, Write Flags)                           52
          Config (Msg Areas, Sysop Security)                        53
          Config (Msg Areas, Uplink)                                53
          Config (Msg Areas, Origin Aka)                            53
          Config (Msg Areas, Origin Line                            53

                                   Page 176.






          Config (Msg Areas, Seenby)                                53
          Config (Msg Areas, Kill Messages After)                   53
          Config (Msg Areas, Kill Recv After)                       54
          Config (Msg Areas, Maximum Messages)                      54
          Config (Msg Areas, Maximum Kilobytes)                     54
          Config (Msg Areas, Combined Access)                       54
          Config (Msg Areas, Initial Combined)                      54
          Config (Msg Areas, Test For Config Age)                   54
          Config (Msg Areas, Keep Private Bit)                      55
          Config (Msg Areas, Show Seenby Lines)                     55
          Config (Msg Areas, Clear Seenby)                          55
          Config (Msg Areas, Visible)                               55
          Config (Msg Areas, Page Up/Down)                          55
          Config (Msg Areas, (F8)  Seenbys)                         55
          Config (Msg Areas, (F10) Export List)                     56
          Config (Msg Areas, Pick)                                  56
          Config (Echoarea Manager)                                 56
          Config (Echoarea Manager, Node)                           56
          Config (Echoarea Manager, Echomail Active)                56
          Config (Echoarea Manager, Echo Manager Groups)            56
          Config (Echoarea Manager, Compress To)                    57
          Config (Echoarea Manager, Password To Echomgr)            57
          Config (Echoarea Manager, Password From Echomgr)          57
          Config (Echoarea Manager, Mail Status)                    57
          Config (Echoarea Manager, Days To Hold Mail)              57
          Config (Echoarea Manager, Send .PKT Type)                 57
          Config (Echoarea Manager, Can Create New Echos)           58
          Config (Echoarea Manager, Add to New Echos)               58
          Config (Echoarea Manager, Page Up/Down)                   58
          Config (Echoarea Manager, Pick)                           58
          Config (Msg Misc)                                         59
          Config (Msg Misc, Usable Message Areas)                   59
          Config (Msg Misc, Inbound Mail Path)                      59
          Config (Msg Misc, Outbound Mail Path)                     60
          Config (Msg Misc, Arc Mail 0.6 Compatibility)             60
          Config (Msg Misc, Delete Netmail On Import)               60
          Config (Msg Misc, Swap On Archiving)                      60
          Config (Msg Misc, Use EMS With Swap)                      60
          Config (Msg Misc, Dupe Detection)                         60
          Config (Msg Misc, Keep Echomail Node Receipts)            60
          Config (Msg Misc, Bad Message Board)                      61
          Config (Msg Misc, Unknown AREAS Action)                   61
          Config (Msg Misc, Kill Bad Archives)                      61
          Config (Msg Misc, Quote String)                           61
          Config (Msg Misc, External Editor)                        61
          Config (Msg Misc, Old Style MSGTMP)                       62
          Config (Msg Misc, Default Origin Line)                    62
          Config (Msg Misc, Kill Null Netmail)                      62
          Config (Msg Misc, Mark Netmail As Kill / Sent)            62
          Config (Msg Sec)                                          63
          Config (Msg Sec, Force Crash Mail Security)               63
          Config (Msg Sec, Optional Crash Mail Security)            63
          Config (Msg Sec, Netmail File Attach Security)            63
          Config (Msg Sec, Security To Update Users)                63

                                   Page 177.






          Config (Msg Sec, Read Security On New Echomail Area)      63
          Config (Msg Sec, Write Security On New Echomail Area)     63
          Config (Msg Sec, Sysop Security On New Echomail Area)     64
          Config (Msg Sec,Reply Via Netmail Security)               64
          Config (Msg Sec,Request Receipt Security)                 64
          Config (Msg Netmail Boards)                               64
          Config (Msg Netmail, Domains)                             64
          Config (Compression of Echomail)                          66
          Config (Echomail Uncompress)                              66
          Config (Global Msg Options)                               67
          Config (Global Msg, Set Default Security)                 67
          Config (Global Msg, Set Default Flags)                    68
          Config (Global Msg, Centre Message Area Name)             68
          Config (Global Msg, Set Maximum Kilobytes)                68
          Config (Global Msg, Set Maximum Messages)                 68
          Config (Global Msg, Kill Messages After XX Days Old)      68
          Config (Global Msg, Kill Received Messages After XX Days) 68
          Config (Global Msg, Add/Rem Node from area list.)         68
          Config (Global Msg, Add/Rem Node from area list.)         69
          Config (Modem Set-Up)                                     70
          Config (Modem Set-Up, Comport)                            70
          Config (Modem Set-Up, Max Baud Rate)                      70
          Config (Modem Set-Up, Locked Port)                        70
          Config (Modem Set-Up, Connect Responses)                  70
          Config (Modem Set-Up, Init Response)                      70
          Config (Modem Set-Up, Ring String)                        70
          Config (Modem Set-Up, Modem Delay)                        70
          Config (Modem Set-Up, Auto Answer)                        71
          Config (Modem Set-Up, Start Time)                         71
          Config (Modem Set-Up, End Time)                           71
          Config (Modem Set-Up, Init Tries)                         71
          Config (Modem Set-Up, Init String 1)                      71
          Config (Modem Set-Up, Init String 2)                      71
          Config (Modem Set-Up, Set Busy String)                    71
          Config (Modem Set-Up, Manual Answer String)               71
          Config (Modem Set-Up, Send Break To Modem)                72
          Config (Baud Rate Set-Up)                                 73
          Config (Baud Rate Set-Up Efficiency (CPS))                73
          Config (Baud Rate Set-Up Connect)                         73
          Networking with Ezycom                                    74
          Sysop Function Keys                                       76
          Ezycom Command Line Parameters                            78
          Errorlevels                                               79
          Ezycom External Support Files                             80
          External Files (Trashcan.ctl)                             80
          External Files (Phonenum.ctl)                             80
          External Files (Regexp.q-a)                               80
          External Files (Newuser.q-a)                              81
          External Files (Newuser2.q-a)                             81
          External Files (Phonedup.ctl)                             81
          Graphic Support Files                                     81
          Graphic Support Files, (ALIAS.A*)                         81
          Graphic Support Files, (AREAHELP.ASL)                     81
          Graphic Support Files, (DOBSEC.A*)                        81

                                   Page 178.






          Graphic Support Files, (DOWNHELP.A*)                      81
          Graphic Support Files, (EDITHELP.A*)                      81
          Graphic Support Files, (FLSPHELP.A*)                      81
          Graphic Support Files, (FILEXXX.ASC)                      82
          Graphic Support Files, (KEYWHELP.A*)                      82
          Graphic Support Files, (LOCKOUT.A*)                       82
          Graphic Support Files, (LOGO.A*)                          82
          Graphic Support Files, (MAXPAGE.A*)                       82
          Graphic Support Files, (MNUAGE.A*)                        82
          Graphic Support Files, (MNUHOUR.A*)                       82
          Graphic Support Files, (MNUTIME.A*)                       82
          Graphic Support Files, (MNUMESS.A*)                       82
          Graphic Support Files, (NEWS.A*)                          82
          Graphic Support Files, (NEWUSER1.A*)                      82
          Graphic Support Files, (NEWUSER2.A*)                      82
          Graphic Support Files, (NOTAVAIL.A*)                      82
          Graphic Support Files, (PAGEABRT.A*)                      82
          Graphic Support Files, (PAGED.A*)                         83
          Graphic Support Files, (PAGESTOP.A*)                      83
          Graphic Support Files, (PASSWORD.A*)                      83
          Graphic Support Files, (PHONESEC.A*)                      83
          Graphic Support Files, (PRIVATE.A*)                       83
          Graphic Support Files, (PROTHELP.A*)                      83
          Graphic Support Files, (REGWARN1.A*)                      83
          Graphic Support Files, (REGWARN2.A*)                      83
          Graphic Support Files, (READHELP.A*)                      83
          Graphic Support Files, (SECXXXXX.A*)                      83
          Graphic Support Files, (TIMESLOW.A*)                      83
          Graphic Support Files, (TIMESEC.A*)                       83
          Graphic Support Files, (UPHELP.A*)                        83
          Graphic Support Files, (WATCHDOG.ASL)                     83
          Graphic Support Files, (WELCOME.A*)                       83
          Graphic Support Files, (WELCOME1.A*)                      84
          Graphic Support Files, (WELCOME2.A*)                      84
          Graphic Support Files, (WELCOMHH.A*)                      84
          File Points                                               85
          Page Tunes                                                85
          Menu System (Ezymenu)                                     86
          Menu System (Defining a Menu System)                      86
          Menu System (Templates)                                   90
          Menu System (Global Menus)                                91
          Menu System (Automatic Options)                           91
          Menu System (Special Characters)                          91
          Menu System (Keyboard Stuffing)                           92
          Menu System (Groups)                                      93
          Utilities (Ezymaint, Maintenance Program)                 95
          Utilities (Conversion Files)                              97
          Utilities (Conversion Files, Doconv.bat Upconv.bat)       97
          Utilities (Fedit, Filebase Editor)                        98
          Utilities (Fedit, Edit Options)                           99
          Utilities (Fedit, Edit Descriptions)                      99
          Utilities (Fedit, Edit Up/Dnload)                         99
          Utilities (Fedit, Edit Statistics)                       100
          Utilities (Fedit, View Archive)                          100

                                   Page 179.






          Utilities (Fedit, File Options)                          101
          Utilities (Fedit, New File Edit)                         101
          Utilities (Fedit, Rename File)                           101
          Utilities (Fedit, Update File)                           101
          Utilities (Fedit, Tag Options)                           102
          Utilities (Fedit, Tag All)                               102
          Utilities (Fedit, Clear All)                             102
          Utilities (Fedit, Delete Tagged)                         102
          Utilities (Fedit, Move Tagged)                           102
          Utilities (Fedit, Remove Tagged)                         102
          Utilities (Fedit, Tagged Offline)                        102
          Utilities (Fedit, Physical Move)                         102
          Utilities (Fedit, Batch Files)                           103
          Utilities (Usercomp, Userbase Utility Program)           105
          Utilities (Anstoavt, Makes Avatar Screens)               106
          Utilities (Ezymail, Echomail Utility)                    107
          Utilities (Ezymail and Multiline BBS's)                  107
          Utilities (Ezynet, Netmail, Areafix Utility)             108
          Utilities (Ezynet, What is EchoArea?)                    108
          Utilities (Ezynet, How to use EchoArea.)                 108
          Utilities (Ezynet, Options)                              109
          Utilities (Msgcomp, Messagebase Utility)                 111
          Utilities (Msgcomp, Command Line Options)                111
          Utilities (Ezyff, Filebase Utility)                      112
          Utilities (Ezyff, Command Line Options)                  112
          Utilities (Ezyutil, General Utility)                     113
          Utilities (Ezyutil, Message Importing)                   113
          Utilities (Ezyutil, Importing a File with Description)   113
          Utilities (Ezyutil, Sorting EchoNode Information)        114
          Utilities (Ezyutil, Undelete Messages)                   114
          Utilities (Ezyutil, Strip Logs)                          114
          Utilities (Ezyutil, File Area Information)               115
          Utilities (Ezyutil, Message Base Information)            116
          Utilities (Ezyutil, Message Base Stats)                  117
          Utilities (Ezyed, Userbase Editor)                       118
          Utilities (Ezyed, Display Mode Options)                  118
          Utilities (Ezyed, Edit Mode Options)                     119
          Utilities (EzyNode, Nodelist Compiler)                   122
          Utilities (EzyNode, Sample EZYNODE.CTL)                  124
          Appendix A (Questionnaire Language)                      125
          Appendix B (Multiline Operation)                         136
          Appendix C (File Control Characters)                     139
          Appendix D (Menu Commands)                               143
          Appendix E (Operating Batch Files)                       166
          Appendix E (Stand Alone Batch File)                      166
          Appendix E (D'Bridge Batch File)                         168
          Appendix E (FrontDoor Batch File)                        170
          Appendix F (Credits)                                     174
          Appendix G (Colour Changer)                              175






                                   Page 180.