RA.DOC

299.2 KB 85019e29d4b2d380…
                




                                                                    
                               
                                                                    
                                   
                                                                    
                                   
                                                                    
                                   
                                                                    
                                   
                                                                    
                                   
         
                                                                               
                                                                               
      ┌─────────┐┌───────┐ ┌────────────┐┌──────────┬───────────┬───────┐
      │  ┌───┐  ││   ┌───┘ │  ┌─┐  ┌─┐  ││  ┌───┐   ├────┐  ┌───┤   ┌───┘
      │  │   │  ││   └───┐ │  │ │  │ │  ││  │   │   │    │  │   │   └───┐
      │  └───┘  └┤   ┌───┘ │  │ │  │ │  └┤  │   │   └┐   │  └┐  │   ┌───┘
      │  ┌────┐  │   └─────┤  │ │  │ │   │  └───┘    │   │   │  │   └─────┐
      │  │    │  │         │  │ │  │ │   │           │   │   │  │         │
      └──┘    └──┴─────────┴──┘ └──┘ └───┴───────────┘   └───┘  └─────────┘
        
                                                                               
           ┌──────────┬──────┐ ┌──────┐ ┌───────┐ ┌───────┐ ┌───────┐
           │  ┌───┐   │   ┌──┘ │   ┌──┘ │   ┌───┘ │   ┌───┘ │   ┌───┘
           │  │   │   │   │    │   │    │   └───┐ │   └─────┤   └─────┐
           │  └───┘   │   │    │   │    │   ┌───┘ └─────┐   ├─────┐   │
           │  ┌────┐  │   └────┤   └────┤   └─────┬─────┘   ├─────┘   │
           │  │    │  │        │        │         │         │         │
           └──┘    └──┴────────┴────────┴─────────┴─────────┴─────────┘
            
                                                         
                                                                               
  
                                  RemoteAccess 1.11

                  
                                     (C) 1989-92
             
            Andrew Milner and Continental Software, All Rights Reserved
             














       TABLE OF CONTENTS
       ────────────────────────────────────────────────────────────

       PREAMBLE AND CREDITS  . . . . . . . . . . . . . . . . .    2

       OVERVIEW AND FEATURES . . . . . . . . . . . . . . . . .    3

       LICENSING INFORMATION . . . . . . . . . . . . . . . . .    5

       HOW TO REGISTER . . . . . . . . . . . . . . . . . . . .    6
            SHAREWARE version  . . . . . . . . . . . . . . . .    6
            PROFESSIONAL version . . . . . . . . . . . . . . .    7
            REGISTRATION FORM  . . . . . . . . . . . . . . . .    8
            The key system . . . . . . . . . . . . . . . . . .    9

       PRODUCT SUPPORT . . . . . . . . . . . . . . . . . . . .   10
            Australia  . . . . . . . . . . . . . . . . . . . .   10
            USA and Canada . . . . . . . . . . . . . . . . . .   10
            Europe and others  . . . . . . . . . . . . . . . .   11
            Support conferences  . . . . . . . . . . . . . . .   13

       INSTALLATION  . . . . . . . . . . . . . . . . . . . . .   14

       CONFIGURATION . . . . . . . . . . . . . . . . . . . . .   16
            RACONFIG . . . . . . . . . . . . . . . . . . . . .   16
                 System  . . . . . . . . . . . . . . . . . . .   16
                      PATHS  . . . . . . . . . . . . . . . . .   16
                      SITE INFO  . . . . . . . . . . . . . . .   16
                      ADDRESS  . . . . . . . . . . . . . . . .   16
                      SECURITY . . . . . . . . . . . . . . . .   16
                 Options . . . . . . . . . . . . . . . . . . .   17
                      MESSAGES . . . . . . . . . . . . . . . .   17
                      FILES  . . . . . . . . . . . . . . . . .   20
                      RESTRICTIONS . . . . . . . . . . . . . .   21
                      ERRORLEVELS  . . . . . . . . . . . . . .   21
                      DISPLAY  . . . . . . . . . . . . . . . .   22
                      COLOURS  . . . . . . . . . . . . . . . .   22
                      PAGING . . . . . . . . . . . . . . . . .   23
                      NEW USERS  . . . . . . . . . . . . . . .   24
                      SYSTEM . . . . . . . . . . . . . . . . .   26
                      PROMPTS  . . . . . . . . . . . . . . . .   29
                      PRINTER  . . . . . . . . . . . . . . . .   29
                 Modem . . . . . . . . . . . . . . . . . . . .   30
                      OPTIONS  . . . . . . . . . . . . . . . .   30
                      COMMANDS . . . . . . . . . . . . . . . .   31
                      RESPONSES  . . . . . . . . . . . . . . .   32
                 Manager . . . . . . . . . . . . . . . . . . .   33
                      MESSAGES . . . . . . . . . . . . . . . .   33
                      FILES  . . . . . . . . . . . . . . . . .   36
                      INTERNAL PROTOCOLS . . . . . . . . . . .   38
                      EXTERNAL PROTOCOLS . . . . . . . . . . .   38
                      LANGUAGES  . . . . . . . . . . . . . . .   43
                      ALT-Fn KEYS  . . . . . . . . . . . . . .   45
                      EVENTS . . . . . . . . . . . . . . . . .   45
                      MENUS  . . . . . . . . . . . . . . . . .   46
                      USERS  . . . . . . . . . . . . . . . . .   46
                      CTL FILES  . . . . . . . . . . . . . . .   46
                      COMBINED . . . . . . . . . . . . . . . .   46

       SECURITY  . . . . . . . . . . . . . . . . . . . . . . .   47

       MENUS . . . . . . . . . . . . . . . . . . . . . . . . .   48
            Menu functions . . . . . . . . . . . . . . . . . .   49
            Automatic command execution  . . . . . . . . . . .   76
            Special optional data switches . . . . . . . . . .   76
            Menu templates . . . . . . . . . . . . . . . . . .   77
            The global menu  . . . . . . . . . . . . . . . . .   78
            Setting up your menus  . . . . . . . . . . . . . .   79
            Creating your menus  . . . . . . . . . . . . . . .   80

       EXTERNAL SUPPORT FILES  . . . . . . . . . . . . . . . .   83

       THE USER DATABASE . . . . . . . . . . . . . . . . . . .   91
            Information stored in the user database  . . . . .   92
            Packing and sorting the user file  . . . . . . . .   93

       THE MESSAGE DATABASE  . . . . . . . . . . . . . . . . .   94
            Message database size limitations  . . . . . . . .   94
            Packing and renumbering the message base . . . . .   95

       MAIL NETWORKING . . . . . . . . . . . . . . . . . . . .   99
            Installing the nodelist files  . . . . . . . . .    102

       MULTI - NODE OPERATION  . . . . . . . . . . . . . . .    104

       REFERENCE SECTION . . . . . . . . . . . . . . . . . .    107
            Sysop keys . . . . . . . . . . . . . . . . . . .    107
            Command-line parameters  . . . . . . . . . . . .    109
                 RA.EXE  . . . . . . . . . . . . . . . . . .    109
                 RACONFIG.EXE  . . . . . . . . . . . . . . .    110
            Errorlevels  . . . . . . . . . . . . . . . . . .    111
            Text file control codes  . . . . . . . . . . . .    112
                 User parameter codes  . . . . . . . . . . .    114
                 System parameter codes  . . . . . . . . . .    115
                 Colour control numbers  . . . . . . . . . .    116
            Modem string translation . . . . . . . . . . . .    117
            Questionnaire script language  . . . . . . . . .    118
            Terminal emulations  . . . . . . . . . . . . . .    125
            Text file naming conventions . . . . . . . . . .    126
            Interactive EMSI . . . . . . . . . . . . . . . .    127
            BATCH FILES  . . . . . . . . . . . . . . . . . .    128





















       This  document makes  reference to  a number  of third-party
       products.  All copyrights,  trademarks  and reserved  rights
       held in these products are acknowledged.

























































                                     1

       PREAMBLE AND CREDITS
       ────────────────────────────────────────────────────────────

       RemoteAccess started as one  of those spare-time projects in
       early 1989. After about  eight months of initial development
       I released version 0.01 on the 25th of January, 1990. Almost
       two  years  later  as  this  is  written,  after  four major
       releases, a  couple of maintenance releases,  a few thousand
       registered  users (thanks!)  and  an  uncountable number  of
       other changes in  my life, RemoteAccess  has become a  full-
       time occupation.


       I'd like to thank Mark Anderson for his patience in updating
       this documentation,  Bruce Bodger, Barry  Phillips and their
       support groups NARAS, UKRAS and EURAS, the guys who  operate
       the registration sites and of course the beta test team. 


       I'd also like to thank the following for their contributions
       (in no  particular  order whatsoever)  -  all of  them  have
       played a part in the development of RemoteAccess:

       Adam Blake, Joaquim  Homrighausen, Ray Gwinn,  David Nugent,
       Rob  van  Hoeven,  Tomas  Bremin, Peter  Janssens,  Advanced
       Engineering, Phil  Mackay, Bob  Fletcher, Adam Hudson,  Gary
       Smith, Scott's Pub and  Restaurant, Mum, Dad, Vanessa, Matt,
       Sugar, Letham  Burns, James Smith and  Online Communications
       Inc.,  Guns n' Roses, Matilda  Bay Brewing, Al  Hays and the
       Church  Street Station  gang, Kevin  Johnson, Terry  Harvey,
       john  barton,  Andrew  Russell,  Mike  Janke,  Fred  "Levis"
       Horner, and  the Luxembourg PTT for  connecting my telephone
       in just seven weeks.


                                                   Andrew Milner,
                                                   Luxembourg City.
                                                   ────────────────






















                                     2

       OVERVIEW AND FEATURES
       ────────────────────────────────────────────────────────────

       RemoteAccess   is  a  "fully-blown"  remote  bulletin  board
       package.  It  may be used as a stand-alone system or with  a
       front-end  mailer  if  you wish to interface it  to  a  mail
       network  such as FidoNet.  It offers fully  definable  menus
       with  a  unique  template system which provides not  only  a
       massive  degree  of  flexibility in  making  your  BBS  look
       different  from  any  other,  but also the  lowest  possible
       maintenance.  AVATAR  screen  control  is built  in,  making
       possible extremely efficient and  complex colour and  cursor
       control at the user's  end if an AVATAR terminal  program is
       used.

       Access  to the 200 available message areas is controlled  by
       your  menu structure,  along with a  sophisticated  security
       system which incorporates over 64,000 security levels with a
       set of user-definable flags. For each security level you can
       specify maximum download limits for different log-on speeds,
       daily time limits, and optionally activate the built-in file
       ratio  system,  limiting  downloads by ratio to  uploads  by
       either  number  of  files  or kilobytes.  In  addition  it's
       possible to assign a user to one of 255 separate groups, and
       in so doing segregate groups of users from each other.

       Other security features include the disallowing of downloads
       during peak hours,  disallowing low speed callers at certain
       times,  and disallowing ANSI graphics at low speeds. You can
       disallow  one-word "pseudonyms",  and  optionally  configure
       the system to force a user to change passwords every x  log-
       ons. Undesirable user names and passwords are also definable
       for  maximum  security.  If you're unlikely to want to  call
       your own system, remote sysop access can be disabled, making
       it virtually impossible for your account to be "hacked".

       Direct  support  for high-speed modems up to 38,400 baud  is
       available, and RemoteAccess will optionally answer the phone
       automatically  to ensure that the modem will answer if  your
       BBS is "alive and well".

       RemoteAccess  supports as many as 250 lines  simultaneously.
       Full  system  access  to  all  file  and  message  areas  is
       available  to  each line (at your discretion),  as  are  all
       doors.  Several  "multi-node specific" features are provided
       to  augment  multi-line operation.  You  can  configure  the
       system  to  disallow one person logging on to more than  one
       line  at  a  time.  A "who else is  on-line?"  and  "today's
       callers" function is available to you,  along with  separate
       system  logs  for each line.  Logging is selectable  between
       either Opus (expanded) or  FrontDoor (compact) styles to aid
       integrated  log readability. Some basic user-to-user on-line
       messaging, to be expanded at a later date is also available.

       RemoteAccess offers a  fully configurable user  environment.
       Its multi-lingual support and configurable date formats mean
       that your users will  feel at home no matter  where they are
       calling from - every one of  the 500+ text prompts is  fully
       sysop-configurable.

                                     3

       RemoteAccess does NOT do its own internal multi-tasking.  To
       this  end,  we have attempted to make it as well-behaved  as
       possible.  It  has built-in time-slicing and screen-handling
       support    for   Windows,  DESQview,   TopView,   MultiLink,
       DoubleDOS  and    PC-MOS/386.  It is    fully  overlaid  and
       occupies approximately  220k of  memory when fired up.  What
       do  you do if you have say   a 300k DESQview window and want
       to  run TradeWars  in  a  shell?   No  problem!   Simply  by
       specifying  a control character on  the  command  line,  you
       can instruct RemoteAccess to swap  itself  lock,  stock  and
       barrel to EMS and/or disk leaving only 3k  resident. 

       A  comprehensive  file transfer system is also part  of  the
       package.  Six  of  the  most  popular  protocols,  including
       Zmodem,  Ymodem batch and Xmodem are built-in,  and  fifteen
       slots  for  external protocols are available for you to  add
       any   others.  All  protocols may  be made  available on  an
       "error  free"  connect basis  at  the  your discretion.  The
       protocol interface   system   is  extremely  flexible,   and
       has   been tested  with DSZ,   Kermit  (an  Opus  compatible
       protocol),   and BiModem. There are of course many others we
       haven't tested, but most should work. Support for CD-ROM and
       other mass  read-only media  is another  invaluable feature.
       The  file   transfer   system   is   further   enhanced   by
       comprehensive file search  and locate  functions along  with
       the ability to tag any file  or group of files as "free" and
       or password protected. A large selection of transfer options
       include global downloads and  the ability for specific files
       to be attached to a file transfer menu option.

       Interactive EMSI  session support  is an exciting  new first
       for RemoteAccess! Read the section on IEMSI in the reference
       section  at the  end of  this document  for details  on this
       revolutionary new set of features.

       Extensive on-line facilities are available to the sysop.  An
       optional set of status bars provide a wealth of  information
       about  both  the  person currently on-line and  the  system.
       Several  "hot-keys"  are also available to  perform  a  wide
       range  of functions,  amongst which  is a  full  screen user
       attribute  editor, a "sysop on next" key, shell to DOS, hang
       up, lock out, and local snoop.

       As an added bonus, we have decided to use the QuickBBS-style
       user  and message database formats.  This means that you can
       continue  to use your favourite QuickBBS utilities  with  no
       need to convert to another format.  Any incompatibilities in
       the  configuration  files  is taken care of  by  an  upgrade
       utility.  We  make  no  apology for the  similarity  between
       RemoteAccess and QuickBBS.  QuickBBS had many features  that
       we  wanted,  and  compatibility  gives the  added  bonus  of
       offering  the  sysop  ease  of  installation  and a familiar
       environment.

       To  cater for both Opus and QuickBBS users alike,  each user
       has  (at  the discretion of the sysop) the option  of  using
       hot-keyed   menus   or   command   stacking.   Comprehensive
       messaging, file search  options and support for a wide range
       of "doors" ensure that your BBS will be a hit!

                                     4

       LICENSING INFORMATION (Shareware version)
       ────────────────────────────────────────────────────────────

       "RA"  refers  to the executable programs  and  documentation
       contained    in   RemoteAccess   Bulletin   Board   Software
       distribution  archives  released  by  Continental  Software.
       (Shareware version).

       1.  RA  is the copyrighted material of Continental Software.
       It  may only be used  in accordance with  the conditions set
       out in this license agreement.

       2.  You  may  use RA for a period of three weeks on a  trial
       basis  in  order  to determine  it's  suitability  for  your
       particular application.  After this period you MUST register
       each  copy  of RA that you  run  simultaneously.  Multi-line
       installations  that share  a common  file base AND  have the
       same name need only register one copy.

       3. Registration  entitles  you  to  use RA  and  any  future
       versions of  RA  for  as long as you wish,  subject  to  any
       special  licensing conditions  attached to  future versions.
       For  details on  the  registration procedure,  refer to  the
       section in this document "HOW TO REGISTER".
                    
       4. Continental   Software   is  in   no   way  obligated  to
       provide future versions of, or support for, RA.   

       5. Site and Group registrations are available, and are dealt
       with on a case by case basis.

       6.  You  may  not  modify or otherwise  reverse-engineer RA.

       7.  You are encouraged to distribute RA provided that no fee
       is charged  for its distribution, and  that the distribution
       archive  is not  modified  in any  way.  Pay Bulletin  Board
       Systems  may however charge  their  normal fee provided that
       no additional charge for RA is levied.  

       8. RA may not  be included as  part of any software  library
       which  is distributed  on a  commercial basis  (commercial =
       "for  money")   without   prior  written   permission   from
       Continental Software.

       9. RA may not be used in any unlawful or illegal manner.

       10.   Continental Software's  liability resulting from  your
       use or   inability   to use  RemoteAccess is limited  to the
       amount that the  affected party has paid  for it, or in  the
       event  that RA was registered with a third party for payment
       to Continental Software, liability  is limited to the amount
       that was  received by  Continental Software from  that third
       party.







                                     5

       HOW TO REGISTER
       ────────────────────────────────────────────────────────────

       SHAREWARE version:

            Systems that qualify for this category must be         
            physically run from a noncommercial site. A site is    
            considered to be noncommercial only if it is a private 
            residence at which no commercial activities are        
            conducted.

       Print  or reproduce the registration form at the end of this
       section and send it with your registration payment to one of
       the following sites:


       AUSTRALIA: AUD60              CANADA: CDN60

            "Registration/RA"             "Registration/RA"
            C/- Terry Harvey              C/- Royce Jones
            PO Box 593                    624 Dolph Street N Apt #B
            Burwood NSW 2134              Cambridge ON
            AUSTRALIA                     CANADA N3H-2B4
            Accepts VISACARD,
            MasterCard, BankCard


       EUROPE: DFL120                USA: $50

            "Registration/RA"             "Registration/RA"
            C/- R.A. de Bruin             C/- Ed Meloan       
            Columbusrede 17               1110 Terrace Circle Drive
            2725 KL Zoetermeer            North Augusta SC 29841
            HOLLAND                       USA


       GERMANY: DM90

            "Registration/RA"
            C/- Frank Altenburg
            Wickopweg 9
            6100 Darmstadt
            GERMANY

       ASIA: AUD60 or equivalent     UNITED KINGDOM: GBP33

            "Registration/RA"             "Registration/RA"
            C/- Andrew Russell            C/- Barry Phillips
            D1-1-6 R.S.G.C. View          PO Box 21
            Desa Pandan                   Ormskirk
            Jalan Kampong Pandan          Lancs L39 3QW
            55100 Kuala Lumpur            UNITED KINGDOM
            Malaysia


       * You MUST fill out the registration form correctly in order
         for your details to be processed. Not doing so will result
         in delays in your key arriving.


                                     6

       * Cheques and money orders should be made payable to the    
         person at your registration site.

       * Please include either a FidoNet address or a stamped,     
         self-addressed envelope so that receipt of your payment   
         can be acknowledged.






       PROFESSIONAL version:

            If the system is physically run from a commercial site 
            (ie. the site is not a private residence, or commercial
            activities are conducted at the site).

       This is  professionally packaged with an expanded ring-bound
       manual  and  includes three  modules  not  available in  the
       shareware version:

       1.  Real-Time  Conferencing -  supporting  up  to 250  users
       concurrently,   featuring  public/private/password-protected
       conferences, conference moderators and sub-conferences.

       2. RANETMGR -   The RemoteAccess Network  Manager, a utility
       designed to give you complete control over a busy multi-node
       system. Dynamically  view the status  of each node  as users
       log  on and off, what each user is doing, broadcast messages
       to  any  combination of  nodes  and  automatically take  any
       combination of nodes down for maintenance.

       3. TopEd/Pro - A  fully functional, specially customised and
       registered version  of TopEd, a premium  full-screen message
       editor.

       The professional version supports up to 100 languages, while
       the shareware version supports a maximum of eight.

       The  professional  version  of  RemoteAccess is  sold  on  a
       commercial basis only. It is NOT shareware.


       Enquiries  for the  professional version should  be directed
       to:

       USA:                            Europe:

       Online Communications Inc.      Advanced Engineering sarl 
       22 State Street                 8, Am For
       Bangor, Maine 04401             L-5351 Oetrange
       USA                             Luxembourg

       Tel: (207) 941 1110             Tel: +352 358725
                                       Fax: +352 355938
       BBS: (207) 990 3511             BBS: +352 355936



                                     7

                  *** RemoteAccess REGISTRATION FORM ***


       Sysop Name _________________________________________________

       System Name ________________________________________________

       [The above two items are used to generate your registration 
        key and must appear EXACTLY as they do in RACONFIG.]


       Network Address (number and network name) __________________


       Any other networks you are a member of _____________________


       Primary BBS telephone number and baud ______________________


       Voice telephone number _____________________________________


       Hours of BBS operation _____________________________________


       Postal Address :

       ____________________________________________________________

       ____________________________________________________________

       ____________________________________________________________



       Version of RemoteAccess registering ______.


       Registration amount enclosed _______, for ____ copies.


       What do you like about RemoteAccess?

       ____________________________________________________________

       ____________________________________________________________

       ____________________________________________________________



       What enhancements/changes  would you like to see in our next
       release?

       ____________________________________________________________

       ____________________________________________________________


                                     8

       The key system
       ────────────────────────────────────────────────────────────

       Upon registering you  will receive  your uniquely  generated
       key. Each key is a small file approximately 2k in size which
       contains information about your registration. To install the
       key, simply rename it  (if necessary) to RA.KEY and  copy it
       to your RemoteAccess system directory.

       When  RemoteAccess  detects a  valid  key  it switches  into
       registered mode, identifying itself by placing a "+"  at the
       end of the version number as well as displaying the  name of
       the system and  sysop it  is registered to  in the  "version
       information" menu function.

       For  example, logging  on to a  registered system  you would
       see:

       RemoteAccess 1.11+
       Please enter your full name:

       Features marked in this manual with a {+} are only available
       when RemoteAccess is running in registered mode. These bonus
       features  show our appreciation  of your taking  the time to
       register with us.

       It  should be  made  absolutely clear  that RemoteAccess  is
       still fully  functional before  it is registered;  the bonus
       features are  "nice" but their  absence makes the  system no
       less  usable.   RemoteAccess  is  not  and   never  will  be
       "DemoWare" or "ExpireWare".

       WARNING!  Your key  is  unique, and  under NO  circumstances
       should it be  made available to  anyone else. Doing so  is a
       direct violation of the  agreement you entered into with  us
       by registering.
























                                     9

       PRODUCT SUPPORT                    
       ────────────────────────────────────────────────────────────

       You    can  always  get  the  latest  shareware  version  of
       RemoteAccess  and  technical   support  from  the  following
       systems:


       Australia:

            Terry Harvey
            The Eagles
            Sydney NSW
            (02) 745 3190 V32 V42 PEP
            FidoNet@3:712/704
                    3:712/707
                

       USA and Canada: (North American RemoteAccess Support group)

            Bruce Bodger                       Fred Horner
            The TruckStop BBS                  The Private EaR
            Tulsa OK                           Waco TX
            918 254 6618 HST                   817 776 9877 HST
            FidoNet@1:170/400                  FidoNet@1:388/10

            Mike Janke                         Ed Meloan
            Kendall BBS                        Augusta Forum
            Miami FL                           N. Augusta SC
            305 271 2146 HST                   803 279 4124 HST
            FidoNet@1:135/4                    FidoNet@1:360/1

            Al Bruner                          Royce Jones
            The SW/SE Connection               DAKIN BBS
            San Diego CA                       Cambridge Ontario
            619 467 0335 HST                   519 653 7677 HST
            FidoNet@1:202/707                  FidoNet@1:221/204

            Mark Howard                        Geoffrey Booher
            Rivendell                          The Gateway Net BBS
            Buffalo NY                         Freeport IL
            716 646 0227 HST                   815 233 5008 HST
            FidoNet@1:260/1                    FidoNet@1:2270/233

















                                    10

       Europe and others: (European RemoteAccess Support Group)


       Ruud de Bruin                      Orlando Castillo
       HOLLAND                            SPAIN
       +31 49 424553 V32                  +34 6 543 7026 V32
       FidoNet@2:281/603                  FidoNet@2:346/4

       Joerg Dassler                      Tony Van den Bogaert
       GERMANY                            BELGIUM
       +49 911 752799 HST                 +33 3 2720210
       FidoNet@2:244/8501                 FidoNet@2:295/43

       Robert Soubie                      Reinier De.Groot
       FRANCE                             HOLLAND, HELP 2
       +33 56 89 51 12                    +31 1749 48422
       FidoNet@2:324/5                    FidoNet@2:512/100

       Malte Erikson                      Frank Altenburg
       SWEDEN                             GERMANY, HELP 2
       +46 300 29436                      +49 6151 710809
       FidoNet@2:203/302                  FidoNet@2:249/7

       Peter Hermann                      Wim Abels
       GERMANY, HELP 3                    GERMANY, HELP 4
       +49 531 13216                      +49 211 5961291
       FidoNet@2:240/550                  FidoNet@2:242/20

       Roland Gautschi                    Bjarne Maschoreck
       SWITZERLAND                        DENMARK
       +64 230319                         +45 31 42 72 64
       FidoNet@2:30/6                     FidoNet@2:231/50

       Andrew Milner                      Clive Jones
       LUXEMBOURG                         REPUBLIC of SOUTH AFRICA
       +352 490 486                       +27 11 868 4790
       FidoNet@2:270/18                   FidoNet@5:7101/14

       Lars Eriksson                      Hilmar Thors
       FINLAND                            ICELAND
       +358 28 23452                      +354 1 627648
       FidoNet@2:222/150                  FidoNet@2:257/60


















                                    11

       U.K. (United Kingdom RemoteAccess Support Group):


       Barry Phillips                     Mark Kerr
       MIDLANDS                           IRELAND and WALES
       +44 695 571117 HST DS              +44 232 768163 HST DS
       FidoNet@2:440/66                   FidoNet@2:263/301

                                          James Berry
                                          S.E. ENGLAND
                                          +44 303 862415 HST DS
                                          FidoNet@2:440/16

       Peter Burnett                      Mark Anderson
       S.W. ENGLAND                       SCOTLAND
       +44 424 853361                     +44 236 747393 HST DS
       FidoNet@2:440/80                   FidoNet@2:259/11




       Sweden (SWRAS):


       Malte Erikson                      Johan Nilsson
       SWRAS HQ                           SWRAS Coordinator
       +46 300 29436                      +46 42 112714
       FidoNet@2:203/302                  FidoNet@2:200/212

       Mats Wallin                        Patrik Sjoberg
       +46 8 6453882                      +46 26 628057
       FidoNet@2:201/329                  FidoNet@2:205/208




























                                    12

       Support conferences:


       Conference                   Support
       Name            Language     Area            Moderators     
       -------------   ---------    --------------  --------------
       RA_SUPPORT      English      World Wide      Bruce Bodger   
                                                    Mike Janke     
                                                    Andrew Milner

       RA_UK           English      United Kingdom  Mark Anderson  
                                                    Barry Phillips

       RA.GER          German       Germany /       Joerg Dassler  
                                    Switzerland     Roland Gautschi

       RA_SWE          Swedish      Sweden          Hasse Widghal

       SF.RA/FD_SP     Finnish      Finland         Lars Eriksson

       RA_SUP.028      Dutch        Netherlands     Ruud de Bruin  
                                                   Reinier de Groot

       RA_SUP.B        Belgian      Belgium         

       RA_UTIL         English      World Wide      Andrew Leary   
       (For RA Utilities)                           John Bierrie

       RA_UTIL.GER     German       Germany         Frank Altenburg
                                                    Joerg Dassler


       New releases  and the  RA_SUPPORT conference should  also be
       available from any of the beta test sites, listed in the    
       accompanying document.

























                                    13

       INSTALLATION
       ────────────────────────────────────────────────────────────

       RemoteAccess   should  run  on  any  IBM  80x86   compatible
       computer. The only two programs you will need in addition to
       the  release  package are DOS 3.x and a FOSSIL  driver.  The
       FOSSIL is a memory-resident program that many communications
       packages use to communicate with the modem. Two FOSSILs that
       have  been  successfully tested with  RemoteAccess  are  Ray
       Gwinn's X00,  and David Nugent's BNU. Either of these should
       be readily available from any local bulletin board.

       You  will  also  need a modem that is capable  of  accepting
       Hayes-type  commands.  The  minimum  memory  requirement  is
       approximately 350K, but 512K is recommended.

       1.  Ensure  that  your CONFIG.SYS file  contains  these     
           statements:

                 FILES=20
                 BUFFERS=25
                            
           If you intend  to run a multi-node  system you  may     
           need  to  increase  the  number  of   file  handles     
           that DOS  can  open at  one time,  by  raising  the     
           "FILES" value.   Note: Each additional  file handle     
           will reduce available memory by 50 to 60 bytes.

           The  more  "BUFFERS"  you  allocate,  the   faster      
           RemoteAccess  will run.  However,  each additional      
           buffer  allocated  will reduce memory available by      
           500 to 600 bytes.
           
       2.  Create  a directory to put the main program  files      
           in.  The  configuration example that follows  later     
           assumes that this directory (the SYSTEM  directory)     
           is C:\RA.

       3.  Ensure  that  your  AUTOEXEC.BAT  file  contains  a     
           command to set the environment variable RA to  your     
           SYSTEM  directory,  so  RemoteAccess can  find  its     
           configuration files:

                 SET RA=C:\RA

           It is possible  to increase the overall performance     
           of  RemoteAccess by placing  the file "RA.OVR" onto     
           a ramdrive.   If you elect to do this you must also     
           set the following environment variable:

                 SET RAOVR=F:\

        4. Copy all of the executable files from the RemoteAccess  
           distribution package into the SYSTEM directory. 
                           





                                    14

       5.  Create four more sub-directories:

           C:\RA\MSGBASE          This will hold  the  message     
                                  files the system creates.

           C:\RA\MENUS            To put your menus in,

           C:\RA\TXTFILES         To put files such as welcome     
                                  and disconnect screens in.

           C:\RA\ATTACH           To hold message file attaches. 


       This completes  the installation, and  you are now  ready to
       move on to the CONFIGURATION section.













































                                    15

       CONFIGURATION                              
       ────────────────────────────────────────────────────────────


       RACONFIG
       ────────────────────────────────────────────────────────────

       Return to the RemoteAccess system directory again,  and fire
       up  the configuration utility,  RACONFIG.EXE.  You will  use
       this to select the configuration options and  maintain  your
       particular system.  You will  see that  there are  four main
       configuration menus.



       RACONFIG  -  System
       ────────────────────────────────────────────────────────────

       PATHS  -  Here is where you  tell RemoteAccess where all its
       associated files  are stored.   Paths can be defined for the
       following:

                 System      : Full path to the RA system files.
                 Menus       : Default menu path (*.MNU).
                 Textfiles   : Default textfile path (*.A??).
                 Msg base    : Message-base and user files.
                 File attach : Local msg file attaches.
                 Nodelist    : Network nodelist files.
                 File list   : Alternative FILES.BBS path.
                 Semaphore   : Alternative semaphore directory.    
                 System log  : Filename of the system log. 

       Enter the  full directory paths  to your chosen directories.
       The trailing backslash is optional.
           
       See the section on MAIL NETWORKING for details on how to set
       up the NODELIST path,  the section  on message configuration
       for details on the FILE  ATTACH  PATH,  and  the section  on
       files configuration for details on the FILE LIST path.


       SITE  INFO   -   Use  this window  to  enter the  sysop name
       (probably  your own),  the name  of the  BBS, and  the BBS's
       location.  The first two must be entered exactly the same as
       those specified on your registration form.


       ADDRESS  -  In  this  section  you can  enter  your  network
       address (if any).  If you have  any alias  addresses (AKAs),
       you may enter  these in  one  or  more  of  the  nine  slots
       provided.   For   extra  information  on  network  operation
       and  an  explanation  of addresses,  see the section on MAIL
       NETWORKING.
              

       SECURITY  -  Here you  may define  a configuration  password
       that must be entered every time you wish to run RACONFIG and
       every time you use one of the ALT keys at the local console.
       {+} Registered only.

                                    16

       RACONFIG  -  Options
       ────────────────────────────────────────────────────────────

       MESSAGES  -  This  section  deals  with  many of  the global
       settings in relation to mail and messages. 


       Logon.     : When  enabled,  will force  the   system  to   
       Newmail      scan   the  message-base   for   new    mail   
                    addressed  to the  user  (regardless of what   
                    area it is  in, provided the user has access   
                    to that area) at log-on.

       Full       : This  option  determines  the  type of  mail   
       mailcheck    check   that  is  performed.  A  full  check   
                    scans from  the  start  to  the  end of  the   
                    message-base  for  all   mail  addressed  to   
                    the user  that  does not have the "Received"   
                    flag  set.  If you set  the option to "Off",   
                    the msgbase is  only checked  from the  last   
                    message that  the user  read.  While this is   
                    much faster,  there  is the possibility that   
                    some  mail  may  be  skipped  if  the   user   
                    elected not to read his/her mail during the    
                    last logon.

       Quote      : This string is  a highlight  character  that   
       string       RemoteAccess  will  place  in  front  of any   
                    message that is replied to. For  example,  a   
                    message quoted using  " > "  as  the  quoter   
                    would look like:

                          > I have been using RemoteAccess for     
                          > 2 months now and love it!

                         I have to agree with you there, Tom.      
                         Flexibility-wise it can't be beaten.

                    A  "@" character in  the  quote string  will   
                    be translated  into the  uppercase  initials   
                    of the person whose message is being quoted.   
        
                    A "#" character will do the same but use the   
                    lowercase.

       External   : This is the DOS command line  that  will  be   
       editor       used  to  activate  a  full  screen  message   
                    editor,  if  one is installed.   This option   
                    is  available only to users of ANSI graphics.  
                    The  full screen  editor  is  a  third-party   
                    package that enables messages to  be entered   
                    in a "word-processing"   environment,   with   
                    cursor movement and text formatting ability.   
                    TopEd and QuickEd are two such packages that   
                    interface directly with RA. The command-line   
                    may contain any of the  metacommands  listed   
                    in  the  description  of  the  type  7  menu 
                    command, including "*M" to swap RemoteAccess   
                    out  of memory before the editor is loaded.

                                    17

       Default    : This option  sets the  default  origin  line   
       origin       which is appended to all  outgoing  EchoMail   
                    messages. This will take effect in all areas   
                    except where you  have  entered  a  specific   
                    origin line for a particular area.

       Reply      : The REPLY HEADER is  displayed at the top of   
       header       a message when a  user replies to  a message   
                    that  was   not   originally   addressed  to   
                    him/her.   The  following  macro  characters   
                    may be used:

                       @ - Person  the original message was        
                           addressed to,

                       # - Person who posted  the  original        
                           message,
               
                       ` - Date of the original message,           
              
                       ~ - Time of the original message.

       Msg        : When this option is set to "Yes", when users   
       uploads      enter  a message  they   are  asked if  they   
                    wish to "upload  a prepared message?"   This   
                    allows  the user to prepare his/her messages   
                    offline  and  send  them   using  any of the   
                    available  file   transfer  protocols.  Note   
                    that ONLY  internal protocols may be used as   
                    RemoteAccess   does  not have enough control   
                    over the external ones.  The maximum size of   
                    a  message that may  be uploaded  is pre-set   
                    at 20k.

       Echo       : If this  option is  enabled,  when  replying   
       netreplies   to an EchoMail message,  users will be asked   
                    if they  would  like  to  reply directly  to   
                    the originator  of the  message via netmail,   
                    rather  than replying in the same  area with   
                    a msg that  might not be  of interest to the   
                    other  participants.   Note:  that  this {+}   
                    registered  only option  is only  enabled if   
                    RemoteAccess    can   determine   where  the   
                    original message came from.

       Net.       : This option applies to  NetMail sent through   
       killsent     a mail network.  When the msg is entered, if   
                    set to "Ask", the user will be asked whether   
                    to delete his/her message after it has  been   
                    exported from  the  message  database.

       Confirm    : When enabled, RemoteAccess  will  prompt the   
       delete       user for confirmation before deleting msgs.







                                    18

       Net.crash  : This  defines  the  minimum  security  level   
       opt          at  which   users   have   the   choice   of   
                    sending  NetMail  with the "crash" flag set.   
                    The "crash" means the mail will be sent  out   
                    of your system immediately. This can be very   
                    costly, so care should be taken when setting   
                    this option. 

       Net.crash  : This option  defines the  security level  at   
       force        which  NetMail  always  has the "crash" flag   
                    set.   Again  this  can  be  costly  so care   
                    should  be taken when  setting this option.  

       Net.       : This  option  defines  the minimum  security   
       attach       level  a user must  have in order to  attach   
                    files  to a  NetMail message.   Once  again,   
                    take care when setting this   option  as  it   
                    can be costly.  NOTE:  In many mail networks   
                    sending Netmail messages with files attached   
                    to  them   through  other   systems  is  not 
                    permitted. If in  doubt you  should set  the   
                    "net.crash force"  security  level  so  that   
                    all file attaches are sent direct.

       Group      : This  option determines the minimum security   
       Mail         a user  must  have in order  to post mail to   
                    a group of users.   See MENU COMMANDS,  menu   
                    type 27  for detailed  information  on Group   
                    Mail.































                                    19

       FILES   -  This section allows  you to define global options
       which affect the behaviour of the file transfer facilities:


       Upload     : The   UPLOAD  CREDIT   provides  a  way   of   
       credit       rewarding your users  for uploading files to   
                    you.  If this  value is  set to  a  non-zero   
                    value,  after each upload session,  the user   
                    is granted that many  seconds  per minute of   
                    upload time.  So,  if  you  set  the  credit   
                    factor to 30 (seconds),  and a  user  spends   
                    10 minutes   uploading,   he/she  would   be   
                    granted an extra 5 minutes for that session.   
                    Note  that   during  uploads  the  timer  is   
                    "frozen" in addition to this bonus.

       Touch      : When  a  file  is   uploaded  using  a batch   
       dates        protocol  such  as  Zmodem  or  Ymodem,  the   
                    original   date  of  the  file  is  normally   
                    preserved when  the  file  is  saved  in the   
                    upload  area.  This is of little use  if the   
                    file  was  originally  created  in 1987,  so   
                    RemoteAccess will, if the TOUCH DATES option   
                    is  enabled,  reset  the  date stamp  of the   
                    file to the date  on  which it was uploaded.

       Show       : When a  user displays a list  of files,  the   
       missing      default action is to  show missing files  as   
                    "<MISSING>".  By  disabling this option  you   
                    can make RemoteAccess remove  missing  files   
                    from the users display.

       Upload     : It is possible to  disable uploads  when the   
       space        the amount  of  free  space  on  your upload   
                    drive  falls  below  a  preset  level.   For   
                    example, to disable uploads if there is less   
                    than 1 megabyte free, set  UPLOAD  SPACE  to   
                    1024 (kilobytes).

       Logon.     : If the LOGON.NEWFILES option is enabled, the   
       Newfiles     user  will  be given the opportunity  to run   
                    a  check  for  files  which  are  new  since   
                    his/her last call at logon. 

       Download   : This defines the starting  time during which   
       start        users can download files.

       Download   : This defines  the ending  time  during which   
       end          users  can  download  files. By setting this   
                    option and  the  DOWNLOAD  START  option  to   
                    00:00, users will be able to download at any   
                    time. 
                                    
       Download   : This option  allows you  to set  a  minimum    
       speed        speed at which users can download files.





                                    20

       List       : You may configure the  format in  which file   
       format       description lines  are displayed when a user   
                    asks for  a  list  of  available files.   To   
       {+}          achieve  this  you  must  build  a  template   
       Registered   string in this field.   The following  macro   
       Only         characters can be used:

                          % - Full filename, uppercase
                          ^ - Full filename, lowercase
                          & - Filename (no extension), uppercase   
                          ! - Filename (no extension), lowercase   
                          @ - Date (in user's selected format)     
                          # - File size (bytes)
                          $ - File size (k)
                          | - New line
                          ` - '*' if new, space if not
                          ~ - Description

                    You may  also enter  colour  sequences  into   
                    the templates.  If a non-ANSI caller   calls   
                    these sequences will be ignored and the user   
                    will see   white text  on  black.  To  enter   
                    the colour  sequences, press CTRL-P and then   
                    CTRL-K[<colour code>   (See  the section  on   
                    COLOUR CODES for more information).
                    
                    To emulate the old hardcoded display use:  
                     
                     [0E%  [0D#  [0A@' [03~
        

       RESTRICTIONS  -  This  section  allows you to set  following
       restrictions on your system:

       Logon      : Minimum  speed at which  callers  can  logon   
       speed        to your system. 

       ANSI       : Minimum speed at which callers may  select ANSI
       speed        graphics.

       No300      : Start   time   for   disallowing  300   baud   
       start        callers.

       No300      : End time for disallowing  300 baud callers.    
       end          If you wish  to  allow  300 baud callers to    
                    logon  at  any  time, you  can  disable the    
                    NO300  restrictions  by  setting  both  the    
                    START and END times to 00:00.


       ERRORLEVELS  -  These values are used if you have  activated
       the  "Shell to Mailer"  feature.   For  full information  on
       this option,  read  the reference  section  on  COMMAND LINE
       PARAMETERS.






                                    21

       DISPLAY  -   This section  allows you to  set the  following
       video display attributes:


       Monochrome : Forces  monochrome  operation  on  the local   
                    display. 

       Direct     : If  you  are  not using  RemoteAccess  in  a   
       write        Multi-tasking  environment,  then  set  this   
                    option to "Yes".  This will cause all screen   
                    output  to be written to Video RAM  directly   
                    instead  of  using  BIOS  calls,   and  will   
                    result in a significant speed increase.

       Snow       : If  you use one of the  older CGA cards that
       check        is prone to "snowing", enable this option. 

       Display    : This detects  the  screen  mode you  are in.   
       lines        "AUTO" sets RA  to automatically  detect the   
                    screen mode,  25 and 43/50  options force 25   
                    and 43/50 line modes respectively.


       COLOURS  -  The  COLOURS submenu  allows  you  to  customise
       some  of the more-often  used colours  that  the  user sees.



































                                    22

       PAGING  -  The  PAGING  menu  allows   you  to  control  the
       following:


       Duration   : Duration, in  seconds, that the paging  tune   
                    will sound at the local console.

       Max number : Maximum number  of times a user can page the   
                    sysop  unsuccessfully  during one session.   

       Ask why    : If enabled this  option  will  cause Remote-   
                    Access to ask  the  user  why  he/she wishes   
                    to chat.  The response is  then displayed on   
                    the status  bar,   and  may  be  redisplayed   
                    later by  pressing F6.  {+} Registered only.

       Sysop msgs : If  the  page  was  unsuccessful,  the  user   
                    can  be   prompted  whether  to leave  a msg   
                    addressed  to  the  sysop.   To  enable this   
                    option   enter   the  desired  message  area   
                    number  that you  would like  these msgs  to   
                    be posted  in.  Setting  this  field to zero   
                    disables the feature.  {+} Registered only.

       External   : If  you  wish  to use  a  external  chatting   
                    utility,  you  can specify the  command line   
                    to shell to run  the program in this  field.   
                    {+} Registered only.

       Suspend    : If enabled, this option prevents  time  from   
                    being  deducted  from the  users  daily time
                    limit during a chat with the sysop.

       Auto Log   : When enabled,  this  option  will  cause  RA   
                    to automatically  open  a  capture file when   
                    chat mode is initiated.
             
       Sunday     : In these seven fields,  you  can  define the   
       Monday       starting  and  ending times  at  which users   
       Tuesday      are  permitted to page  the sysop,  on a day   
       Wednesday    by day basis.    The first field of each day   
       Thursday     determines the starting  time and the second   
       Friday       field determines the  ending  time  at which   
       Saturday     users can page the sysop.   To  disable  the   
                    starting and  ending  page  times  set  both   
                    fields to 00:00.  














                                    23

       NEW USERS  -  The NEW USERS section controls how your system
       will treat new users.   You can configure the  following for
       new users:


       Security   : This is the security level (0 to 64000) that   
                    will be granted to a new user  who  logs  on   
                    for the first time.   If  you  run a private   
                    system,  and do not want to allow  new users   
                    to  log  on,  set  this field to  zero.   In   
                    this case,  the user  is notified  that  the   
                    system is private and is disconnected.

       Flags      : The  4  flag  entries   determine  the  flag   
                    configuration that will be  granted  to  new   
                    users.  See the section on  SECURITY  for  a   
                    full description of the security system.

       Credit     : This sets  the  new  user's  initial  credit   
                    against   sending  netmail   messages.   The   
                    NETWORKING  section provides full  detail on   
                    setting up netmail costings.

       Group      : This is an arbitrary  number  between 0  and   
                    255 you  may  assign new users.   It  allows   
                    you to segregate users into separate groups,   
                    which then can  be  used  in  various   menu   
                    types.  (see  the  menu  command  list   for   
                    further details)

       ANSI       : Determines  whether a new user may use  ANSI   
                    codes (Yes/No/Ask).

       AVATAR     : Determines whether a new user may use AVATAR   
                    codes (Yes/No/Ask).

       Clrscr     : Determines whether a  new  user  would  like   
                    screen clearing codes enabled  (Yes/No/Ask).

       More       : Determines whether the new user  would  like   
                    to be prompted with "More Y/N" at the end of   
                    each screen page (Yes/No/Ask).

       Sub days   : Number  of  days subscription new users  are   
                    allocated.

       Data       : If enabled,  new  users  are asked for their   
       phone        Data Phone number.

       Voice      : If enabled,  new  users  are asked for their   
       phone        Voice Phone number.

       One word   : If disabled, new users will be  required  to   
       names        enter their name as at least 2 words with  a   
                    total length of  at least three  characters.   
                    Note that this restriction only  applies  to   
                    new users;  a  user  already  in  the   user   
                    database  may  log  on   using  his  or  her 
                    "handle".

                                    24

       Handle     : If this  option is  enabled,  new users will   
                    be asked to choose an optional unique handle   
                    or alias.   This  is  saved  as part of  the   
                    user's  record and may be used  to  log onto   
                    the system  later, and to  send and  receive   
                    mail. 

       Birthdate  : If enabled, new users will  be  prompted  to   
                    enter  their  full  birthdate.  RemoteAccess   
                    will  attempt  to intelligently  identify if   
                    the date supplied is legitimate.

       Hotkeys    : RemoteAccess   may  be  configured to behave   
                    either like QuickBBS  with hot-keyed  menus,   
                    or   like   Opus  with   command    stacking   
                    facilities (Yes/No/Ask).

       FS msg     : FS  MSG  VIEW,   when enabled,  will display   
       view         messages to the user using a "fixed  header"   
                    format, designed  for  enhanced readability.

       FS msg     : The FS MSG EDIT setting will determine if RA   
       edit         asks the new users if they would like to use   
                    the external message editor (Yes/No/Ask).

       IEMSI      : When  a  new  user  connects to your  system   
                    using  IEMSI   (  explained  fully  in   the   
                    reference section of this manual),   RA will   
                    skip the regular  new user questionnaire  as   
                    it   can   determine   the   user's   screen   
                    parameters,  location,  password  etc. auto-   
                    matically.   If   this  option  is  disabled   
                    however,  all new users  will be  forced  to   
                    answer the regular questionnaire manually.

       Language   : This option sets the  default  language  for   
                    new users before they select their preferred   
                    language.  If  this option  is set  to zero,   
                    the new  users  will  not  be  asked   which   
                    language they wish to use as their default.  

       Date       : If set to "ASK" new users are able to select   
       format       which date  format they  would like  to  use   
                    when  entering  dates  and  when  dates  are   
                    displayed. The available formats are:

                                     DD-MM-YY
                                     MM-DD-YY
                                     YY-MM-DD
                                     DD-Mmm-YY

                    The sysop  may  choose to force a particular   
                    date format by selecting the format  in this   
                    field.
        
       Cap        : If enabled  this will force RA to capitalise   
       location     the  users  location,  when  entered.



                                    25

       SYSTEM  -  The SYSTEM submenu contains  options that pertain
       to  the  hardware/software  environment   plus  some   other
       global options listed below:


       Fast       : Whenever RA is activated in local  mode  and 
       logons       this option is set, it is assumed that it is   
                    the sysop who is logging on, and you will be   
                    prompted for a password only.  If  you press   
                    [CR]  at the password prompt RA will ask for   
                    a full user name.

       Check      : When running more than one line,  you should   
       multi        set CHECK MULTI to "Yes".  This will prevent   
                    a user from logging on to more than one line   
                    at the same time,  and effectively using his   
                    /her entire daily time limit  on  EACH LINE.

       Remote     : If you never (or rarely) call  your own  BBS   
       sysop        remotely,  you should disallow sysop  remote   
                    access by setting REMOTE SYSOP to "No". This   
                    makes it  almost impossible  for  an unknown   
                    "hacker" to gain  access to your system  via   
                    your own  account.

       Exclude    : If enabled,   this  option  will  cause  the   
       sysop        sysops name  to be omitted from a User List,   
                    List of Today's Callers, Who Else Is Online,   
                    and the Last Caller functions.

       Text       : By  inserting a special control  code  in  a   
       shells       textfile  it is  possible  to  automatically   
                    activate a program in a shell when the  text   
                    file is displayed.  As explained in the TEXT   
                    FILE  CONTROL  CODES   section,   there  are   
                    important security considerations  that must   
                    be looked  into if  you intend  to use  this   
                    feature. If you aren't going to use it,  set   
                    TEXT SHELLS to "No".

       Log        : The logging  format  is  determined  by this   
       style        option.  The "Expanded" format mode contains   
                    more information, including  the line number   
                    in  a  multi-line  system.   The   "Compact"   
                    format is less detailed.

       Multi      : If  you  are  installing  RemoteAccess  on a   
       node         multi-node site (ie.  you  are going  to  be   
                    running more  than one  node),  you MUST set   
                    this option  to "Yes".  This  enables  extra   
                    file/message  checking  routines  to  ensure   
                    that a conflict between two lines  accessing   
                    the same data  never  arises.   If  you  are   
                    running only one line,  setting  this option   
                    to "Off"   will  disable  this  checking and   
                    significantly    increases    the   system's   
                    operating speed.



                                    26

       Enviro-    : The ENVIRONMENT option  refers  to  the type   
       nment        of multi-tasking  system that  you  will  be   
                    running RemoteAccess under. If set to "Auto-   
                    detect",   RemoteAccess  will   attempt   to   
                    determine the multitasker  in  use  when  it   
                    fires  up.   On    some  hardware / software   
                    configurations  it  may   not   be  able  to   
                    correctly  detect   it's   environment.   To   
                    overcome this, you can force RemoteAccess to   
                    "assume" that it is running under a specific   
                    multitasker.   Those   currently   supported   
                    are  DoubleDOS, Windows  3.x   (enhanced mode),
                    DESQview,  TopView,  MultiLink, PC-MOS/386  and
                    the "standard" AT BIOS. RA will  time-slice,
                    or give up CPU time, to other tasks when  it
                    is waiting  for a call or  at  a   prompt.  The
                    result    is   a  significant   overall  system
                    performance improvement.

       Screen     : To avoid screen  "burn in"  on  the "waiting   
       blank        for call"  display,   set  the  SCREEN BLANK   
                    to the number of  seconds you would like the   
                    display to remain  visible  after  the  last   
                    activity.   This  is  a {+} registered  only   
                    option.

       After      : After RA  displays  a  system  message,  the   
       msgs         default action is  to wait  for  one  second   
                    before returning to the  current  menu.  You   
                    may alter  this  wait  period by setting the   
                    AFTER MSGS option to the  desired number  of   
                    seconds.  If  you  set  this  field to zero,   
                    instead  of waiting for  a few  seconds,  RA   
                    will prompt  the user to press the Enter key   
                    to continue.

       ALT-J      : If enabled,  this option will  cause Remote-   
       swap         Access to swap itself out of memory   before   
                    a  sysop shell  to DOS.   This  will  enable   
                    programs   that  require  a large  amount of   
                    memory  to  be  run.    NOTE:  the  swapping   
                    process will take a few seconds.
         
       IEMSI      : The IEMSI option simply allows you to enable   
                    or disable RemoteAccess' IEMSI capabilities.   
                    IEMSI is  fully explained in  the  reference   
                    section at the end of  this  manual. Setting   
                    this  option  to  "Only"  will  force  RA to 
                    permit IEMSI logons only.

       Pwd echo   : The  PWD ECHO allows  you  to  define  which   
                    character is echoed  back to  the  user when   
                    any password  is  entered. If  this  if left   
                    blank,  no  character is  echoed back to the   
                    user.





                                    27

       Auto ANSI  : When the  user  logs  on,  if AUTO  ANSI  is   
                    enabled RA will attempt to determine if  the   
                    calling terminal has ANSI  capabilities.  If   
                    it has, the file LOGO.ANS will be  displayed   
                    instead of LOGO.ASC.

       Pwd        : PWD TRIES sets the maximum number of invalid   
       tries        password  attempts at logon. After  this  is   
                    exceeded the user will be disconnected.

       Pwd        : PWD CHANGE is another security  feature.  If   
       change       this is set to any  non-zero value, then all   
                    users  (excluding the sysop)  will be forced   
                    to change their  password  every  number  of   
                    logons as determined by its value.

       Pwd        : PWD STRICT is an invaluable security feature   
       strict       which  if enabled, will check passwords that   
                    users  enter.   You  can   specify   certain   
                    undesirable passwords in a control file (see   
                    the  section  on  EXTERNAL FILES),  such  as   
                    "Secret" or "Test".  It  will also  disallow   
                    the user's  first or last name as a password   
                    and  checks the  old and  new  passwords for   
                    phonetic similarity. 

       Pwd        : You  may specify the minimum password length   
       length       that  users  may  select.  Longer  passwords   
                    mean  better   security,   a  value  of 4 is   
                    recommended  as  an  absolute minimum.

       Logon      : This option  specifies   how  much  time  to   
       time         grant to a user  before the system knows how   
                    much time he/she  is entitled to. You should   
                    make this long  enough to  enable a new user   
                    to  complete the   new  user  procedure  and   
                    questionnaire, if you  have one.

       User       : USER TIMEOUT determines  how  long  to  wait   
       timeout      during   periods   of   inactivity    before   
                    disconnecting.   The inactive time period is   
                    measured from the last character sent to the   
                    modem, and users are  given a  warning  that   
                    they  are  about to be disconnected  fifteen   
                    seconds  before   the  timer  expires.  This   
                    feature is automatically disabled  in  local   
                    mode, or by a setting of zero.













                                    28

       Watchdog   : If a  user  logs  on   and  is  disconnected   
       area         because   he/she   enters  his/her  password   
                    incorrectly,  RemoteAccess  can notify  that   
                    user of a possible attempt  at guessing  the   
                    password,  by  way of a private message.  In   
                    the WATCHDOG AREA field, specify the message   
                    area  number   (as   per   your   msg   area   
                    configuration)  that  the   warning  message   
                    should be  placed   in.  A  value   of  zero   
                    disables  this  feature.  In  addition,  you   
                    will need  to  create  an  ASCII  text  file   
                    called   " WATCHDOG.MSG "  in   the   system   
                    directory that contains the text of the  msg   
                    that is sent to the user.



       Sysop      : Before  a   user  is   disconnected,   after   
       area         incorrectly  entering  their  password, they   
                    are given the opportunity  to  enter  a  msg   
                    to the  sysop.  The SYSOP AREA defines which   
                    area the  msg is placed in. 




       PROMPTS  -  This menu allows you to define the global system
       prompts.  The  prompts in  this  section are  common  to all
       languages.


       Logon      : This is the  prompt that the  user will  see   
       prompt       when  prompted for his/her name at logon.

       Left &     : These define which characters RemoteAccess     
       Right        places around Yes/No and similar prompts.      
       brackets
                    For example - if the characters are "{" and    
                    "}", a Yes/No prompt would appear as:

                       {Y/n}?

       Language   : This prompt is displayed when RemoteAccess     
       prompt       asks the user to select a language.

       Language   : This prompt is displayed above the list of     
       header       available languages.



       PRINTER  -  In this  section  you  may define which  printer
       port you wish RemoteAccess to direct  output to  when  using
       the "-P" command-line parameter  or the  ALT-P key to enable
       log printing.   (See COMMAND-LINE PARAMETERS  and SYSOP KEYS
       for more  information  on printer  logging). {+}  Registered
       only.




                                    29

       RACONFIG  -  Modem
       ────────────────────────────────────────────────────────────

        
       OPTIONS    -   This  window  contains general  configuration
       information for your modem.


       Comport    : Set this to the communications port you have   
                    your modem hooked up  to.  Valid  ports  are
                    1-4. A setting  of 0  forces  RA  into local   
                    mode regardless of command-line parameters.

       Speed      : SPEED refers  to the highest  modem-computer   
                    speed your modem supports.  If you are using   
                    a high-speed modem you should lock the speed   
                    at the modem's maximum speed  to  ensure the   
                    highest possible  throughput.  Refer to your   
                    FOSSIL documentation on how to do this.

       Lock       : If  you  have  a  high-speed  modem which is   
                    capable  of  being  locked at a fixed speed,   
                    set this option to "Yes".

       Answer     : Setting this to "Yes" tells  RemoteAccess to   
                    make the modem answer the  phone whenever it   
                    receives  the ring  string  by   sending the   
                    answer command  to the modem (see COMMANDS).   
                    If it is set to "No" then it is assumed that   
                    the  modem  will  answer  the  phone itself.   
                    "Yes"  is   the  preferred  setting,  as  it   
                    ensures that your  BBS will  only answer the   
                    phone if it is "alive  and well". Otherwise,   
                    you  are likely to  upset  your  users  when   
                    they  waste  their  money  on   a  BBS  that   
                    answers the phone and then does nothing.

       Delay      : This refers  to a  delay,   in  tenths  of a   
                    second  that  RemoteAccess   waits   between   
                    sending  characters  to  the  modem   during   
                    initialisation.   Usually   you   will  only   
                    need to  raise this above  zero  if  you are   
                    using a high-speed modem that cannot  handle   
                    commands  at high speeds.  A typical example   
                    of  this is  the Courier HST, which requires   
                    a delay of about 3.














                                    30

       Buffer     : This field  sets the  size of  RemoteAccess'   
                    internal communications send buffer for baud   
                    rates  up to  2400.  You  can  change it  to   
                    fine-tune    your   system    for    maximum   
                    throughput.  If you are using a slow machine   
                    (ie.  a 4.77 MHz XT),  set it to zero.  This   
                    disables  the internal buffering  system and   
                    its  associated overhead.  For most systems,   
                    the  default setting  of  5  will  not  need   
                    to   be   changed.     In   a  multi-tasking   
                    environment  though, you  will  achieve much   
                    better performance by increasing  the buffer   
                    size.  Experimentation   has   shown  values   
                    around 80-150 to be most effective.

       Break      : Some modems (such as the Courier HST) can be   
                    configured to  clear their internal transmit   
                    buffer when they receive a break signal from   
                    the  local console.  If the  BREAK option is   
                    enabled,  RemoteAccess  will  send  a  break   
                    whenever   it  purges  it's   own   internal   
                    transmit  buffer.   The  result  will  be  a   
                    faster  hotkey response. Since  most  modems   
                    CANNOT  handle this, the recommended setting
                    is OFF.

       Tries      : This is  the number  of  times  RemoteAccess   
                    will attempt to initialise  the modem before   
                    aborting and returning an  error  condition.

       Offhook    : If enabled,  this will force RemoteAccess to   
                    take  the modem  off-hook  when  a  call  is   
                    terminated.


       COMMANDS  -  This submenu is where the commands that are    
       sent to the modem are defined.

       Init1 &    : These fields define in the  strings sent  to   
       Init2        the  modem,  whenever  RemoteAccess is fired   
                    up,  in order  to prepare  the modem to take   
                    calls.  See  the  reference   section  MODEM   
                    STRING  TRANSLATION  at   the  end  of  this   
                    document  for  more information.

       Busy       : The   BUSY  string  is   sent  to  the modem   
                    whenever you either log-on locally,  drop to   
                    DOS  or if you  ESCape from  the  "wait  for   
                    call" sequence.  You could either  tell  the   
                    modem  to  go "off hook" with an "ATH1|", or   
                    simply not to answer the phone  by  dropping   
                    DTR.   Note :  in  some  countries   it   is   
                    prohibited to  place a telephone  line  "off   
                    hook",  please check with your phone company   
                    if you are unsure.
        




                                    31

       Answer     : The ANSWER string is  sent  to the  modem if   
                    you have set  automatic  answer  on,  and  a   
                    call comes in.   Most  modems will answer  a   
                    call  upon  receiving  an  "ATA|"  from  the   
                    computer.


       RESPONSES  -  The responses section is  where you  can  tell
       RemoteAccess what  responses it  can expect to  receive from
       your modem. 

       Init       : The INIT  response is  the  string that  the   
                    modem  returns  after  RemoteAccess sends it   
                    the init  string.   Most modems return "OK".   

       Busy       : The BUSY  response  is  the  string that the   
                    modem returns after  the  busy  command  has   
                    been sent to  place  the  modem  "Off hook",   
                    most modems return  "OK".  Check  your modem   
                    operating manual for more information.

       Ring       : The  RING response  is the  string the modem   
                    displays  when  someone  calls  your system,   
                    to   indicate   that  the  call   should  be   
                    answered.   Most  modems return "RING", some   
                    use  "RINGING".   Check  your  modem  manual   
                    and set this accordingly.

       Secure     : The SECURE  response  is  the response  your   
                    modem   returns   when   it   gets  an   MNP   
                    connection.   Ignore   this  entry  if  your   
                    modem doesn't support MNP.  Check your modem   
                    manual to determine  what string  your modem   
                    returns.

       300 -      : 300 - 38400  are  the  response  strings the   
       38400        modem returns when a connection is made with   
                    another  modem.    Most   modems   return  a   
                    "CONNECT  <Baudrate> "  string,  or   simply   
                    "CONNECT"  for 300 baud.  Note that  if this   
                    is the case  you should specify the vertical   
                    bar  after the string to indicate the end of   
                    the string.  (See  MODEM STRING  TRANSLATION   
                    in the reference guide  at the  end of  this   
                    document).

        













                                    32

       RACONFIG  -  Manager
       ────────────────────────────────────────────────────────────

       This is   perhaps  the most important part  of  RACONFIG. It
       is where all  the message and file  areas, protocols, menus,
       users and events are defined.   
              
             
       MESSAGES  -  From the  messages menu  you may  define  up to
       200 different  areas,  each  with it's  own  attributes  and
       security requirements.

       Name       : In this field you can give each message area   
                    a name.  This   should   be   a   meaningful   
                    description of  its  content,   for  example   
                    "IBM  Users", "Cooking",  or "Games".  Avoid   
                    using  names  like "Message Area 1".  If you   
                    wish to "delete" a message area,  simply set   
                    the area name to nothing.

       Type       : Each area can be one of three TYPES.  LOCAL,   
                    if the message area is available on your BBS   
                    only,  or if you are in a mail  network such   
                    as  FidoNet,  ECHOMAIL  or  NETMAIL.   These   
                    latter  two  types  are explained more fully   
                    in the MAIL  NETWORKING  section. If you are   
                    not  part of  a  mail  network, set the type   
                    to LOCAL. 
                                
                    When a user  posts a  message in  a  message   
                    area which has  the type LOCAL assigned, the   
                    recipient  must be  an  existing user of the   
                    system.  If RemoteAccess  can  not  find the   
                    recipient's  name in  the  user database the   
                    user will  be asked if he/she would  like to   
                    search/list  the user database.   The   only   
                    exception  to  this  is a message  posted to
                    "All".

       Status     : This controls  the types  of  messages  that   
                    users are  allowed to post in the area.  You   
                    have the  choice   of  PRIVATE ONLY,  PUBLIC   
                    ONLY,  PRIVATE/PUBLIC and READ ONLY.  It may   
                    be  desirable to allow only public  messages   
                    in  general  discussion  areas,  or likewise   
                    private only in user-to-user  message  areas   
                    to ensure that all messages in that area may   
                    be read only by  the sender or the recipient   
                    of the message.    Message  areas  marked as   
                    READ ONLY may only  have messages posted  in   
                    them by the sysop.  This is useful for,  say   
                    a general announcement area.
        







                                    33

       Users      : Each message area  may be configured via the   
                    USERS  option,  to  allow   users  to   post   
                    messages with real names only,  handles only   
                    (this is the user's  permanent  "registered"   
                    handle),  or with an  alias  which the  user   
                    may  select  at  the time   the  message  is   
                    posted. RemoteAccess will  not allow the use   
                    of the alias "Sysop" or any other users name   
                    or handle.

       Days old   : This defines  how long  RemoteAccess  should   
                    keep  old messages. The  removal of messages   
                    which  are older than the number of days set
                    is  performed  by  RAMSG,  the  message-base   
                    maintenance utility  (see  MESSAGE  DATABASE   
                    FILES for more information).

       Days rcvd  : This defines how  long  RemoteAccess  should   
                    keep messages  that  have been  read by  the   
                    addressee.   As with the previous field, the   
                    removal of these  messages  is  performed by   
                    RAMSG (see MESSAGE DATABASE FILES).         

       Max msgs   : This defines how many  messages RemoteAccess   
                    will allow to  be kept  in each area,  after   
                    this  limit  has  been  reached  RAMSG  will   
                    remove the  oldest messages  and maintain  a   
                    constant  number of  messages  equal  to the   
                    number  specified.   (see  MESSAGE  DATABASE   
                    FILES)

       Echoinfo   : The  default action  for an EchoMail message   
                    area is to append  an  origin  line (see the   
                    section on MAIL NETWORKING for more on this)   
                    to  each  outgoing  message.   This  may  be   
                    disabled by  setting  the  ECHOINFO  flag to   
                    "No".

       Combined   : The  COMBINED  flag determines whether users   
                    may select the current message area  as part   
                    of their combined message area settings.

       Attaches   : RemoteAccess provides an extremely  powerful   
                    facility which  allows users  to  attach one   
                    or more files to a message.  This means that   
                    users can send  each other files  privately.   
                    To  enable  this  option,  set  ATTACHES  to   
                    "Yes". Also ensure that the FILE ATTACH path   
                    in the  SYSTEM/PATHS  submenu  points  to  a   
                    directory which exists.  When a user uploads   
                    files with a message,  RemoteAccess  creates   
                    a   uniquely  named  subdirectory  in   this   
                    directory, and places all the attached files   
                    in it.  After the recipient has received the   
                    message and  confirmed that he/she  received   
                    all   the  files,  all  the  files  and  the   
                    directory are  deleted. This option is valid   
                    only in areas defined as LOCAL.


                                    34

                    If the  user  elects to attach  a file  to a   
                    message  when  logged  onto  a  local  node,   
                    RemoteAccess will prompt him/her for the DOS   
                    path and filename of the file  they  wish to   
                    send.   {+} Registered only.

       SoftCRs    : This option,  if on,  will tell RA to  treat   
                    SoftCR  characters ($8D),  in  this  message   
                    area, as  normal printable characters.

       Deletes    : This, if enabled, will allow users to delete   
                    messages in this message  area provided  the   
                    message is either to or from the user.

       AKA        : This  option  allows  you to  specify  which   
                    network  address  you wish  to use for  this   
                    message area.   If  you only  have one or no   
                    network address  then you  need not  concern   
                    yourself with  this option.   You may select   
                    any  of the  AKAs you  have  defined  in the   
                    SYSTEM/ADDRESS   menu (see  MAIL  NETWORKING   
                    for more information).

       Origin     : This option  allows you to define a separate   
                    origin line to the message area. This origin   
                    is appended to  the bottom  of all  outgoing   
                    EchoMail messages.  If  this  is left  blank   
                    RemoteAccess will append the default  origin   
                    line specified in OPTIONS/MESSAGES submenu.


       Access to the message area is controlled by READ,  WRITE and
       SYSOP security  levels  and access  flags.  Full information
       on  security  levels and flags  can be found in the SECURITY
       section.


       Read       : This is the minimum  security level and flag   
       Security     combination the user  needs to be allowed to   
                    read messages in each message area.

       Write      : This is the minimum  security level and flag   
       Security     combination the  user needs to be allowed to   
                    post a message.  When replying to a  message   
                    addressed   to  the  user,  he/she  is  only   
                    permitted if the user's  security  level  is   
                    equal  to or higher  than the Write Security   
                    setting.

       Sysop      : This  security  access  combination  permits   
       security     reading  of all messages in the area,   even   
                    if   they  are  private  and  addressed   to   
                    another  user.  This is useful  for  message   
                    areas  which  are  run by  assistant  sysops   
                    and the like, so they can check messages for   
                    suitable content and  delete off-topic ones.




                                    35

       FILES  -  The FILE submenu is  where  you define  your  file
       areas.  Full information on  security  levels and flags  can
       be found in the SECURITY section.


       Name       : NAME is the  name of  the file  area as  the   
                    user will  see it. 

       Path       : The PATH is a fully qualified directory path   
                    that points to where the files in  this area   
                    are stored, for example C:\FILES\IBM\GAMES\.   
                    Note   that   the   trailing  backslash   is   
                    optional.

       New files  : This  option  determines  whether to include 
                    this file  area in a new files scan, and may 
                    be  overridden   by  the  use  of   optional 
                    parameters when  using  the "new files" menu   
                    command.   (see   MENU  COMMANDS   for  more   
                    information.) 

       Upload     : When a user uploads a file, RemoteAccess has   
       dupes        the  capability   to  search  for  the  file   
                    before  allowing  the user  to upload it. If   
                    this  option is  disabled, RemoteAccess will 
                    not scan this area for dupes.

       Long       : If you would like  to have long descriptions   
       desc         for  your  files,  ie.  more than one screen
                    line, then  you  should enable the LONG DESC   
                    option. This enables RemoteAccess to  handle   
                    the  descriptions  correctly.  When  editing
                    your FILES.BBS  file it is not  necessary to   
                    put a [CR] in  the  description  as the text   
                    will be wrapped when displayed. 

                    NOTE:   To  enable  long   descriptions  for   
                    uploads  in which  the full  upload  path is   
                    specified in the optional data field  rather   
                    than  a template  area  number, append  a /L   
                    after the upload path.

       Access  to the file areas is controlled in a similar fashion
       to that  of  the message  areas,  by  the DL,  LIST  and  UL
       security levels and access flags.


       DL         : This  determines the minimum security  level   
       security     and  flag  combination at  which a user  can   
                    download files from this area.
               
       List       : This determines the  minimum security  level   
       security     and flag  combination  at which  a  user can   
                    list the files in this area. 

       UL         : This determines  the minimum  security level   
       security     and  flag  combination  at which  a user can 
                    upload files into the area. 


                                    36

       The list  of files that your users see for a particular area
       is  generated from a textfile that you can edit yourself. By
       default, this file is called FILES.BBS and is located in the
       same directory as  the files  it describes. When  a file  is
       uploaded  to  a  file   area,  RemoteAccess  creates  a  new
       FILES.BBS  if it doesn't  already exist, and  then appends a
       single line entry for  the file. The format of  FILES.BBS is
       simple:

              <FILENAME.EXT> <Description>

       Filenames that  contain wildcard / pattern  match characters
       are expanded  to full  filename specs.  A separate entry  is
       displayed for each matching file found.

       The <Description> field  may be up  to 255 characters  long.
       When displayed to the  user the description is automatically
       word wrapped to the width of the user's screen.

       If  you have  some  kind of  read-only  mass storage  device
       online such as a  CD-ROM, then it usually isn't  possible to
       have  a FILES.BBS in each file directory. To get around this
       problem simply  create a separate  directory to hold  all of
       the FILES.BBS  files. The  individual files should  be named
       FILES.n, where n is the file area number. For example -

       C:\RA\CDROMLST\FILES.33

       Is the  file that  would be read  in place of  FILES.BBS for
       area number 33. In this example,  the FILE LIST path (in the
       PATHS section of RACONFIG) has been set to C:\RA\CDROMLST.  

       The   EXTERNAL SUPPORT FILES   section  contains information
       on  marking files as  free and/or  password  protected under
       the subheading FILES.CTL.

























                                    37

       PROTOCOLS  -  The   protocols   section   deals   with   the
       different  transfer  methods  used  by RemoteAccess  to send
       and receive files.  This section  also allows  you to define
       any new transfer protocols that you wish to add.

       The INTERNAL PROTOCOLS   submenu  allows  you  to   disable,
       enable, or  make available only  on an error-free  (ie. MNP)
       connect, any of the six internal protocols.    MNP (Microcom
       Networking Protocol),  also known  as ARQ (Automatic  Repeat
       Request),   is  a  method  by   which  modems   can   detect
       transmission errors  and  resend  the incorrect  data.  Only
       modems which both  have MNP  facilities can use this type of
       error correction.   Since, when using MNP,  error correction
       is carried out by the modem hardware,  the software does not
       need to watch the incoming  data for errors  or wait for the
       receiving modem to confirm that it has received all the data
       correctly.   Some protocols are  written especially  for MNP
       modems and  therefore get  very fast  throughput. If you use
       such a protocol  you should  set it for "error free" connect
       only.    An  example  of such  a  protocol  in  the internal
       protocol list is "Ymodem-G".     

       When  using  an "error  free"  protocol,  RemoteAccess  will
       establish whether the user is using an MNP modem by  looking
       at  the  modem  connection string  to see if  it contains an
       errorfree response code. This code is definable in RACONFIG.
       {+} Available in the registered version only.


       The EXTERNAL PROTOCOLS submenu.   This option allows you  to
       interface  up  to  fifteen  external   protocols  for   your
       users to  use,  in addition   to the six that are  built-in.
            
       Name       : The  NAME  field  is  the  protocol name  as   
                    it  will be  displayed to the user when they   
                    download or  upload.   Note if  you  use the   
                    textfile XFERPROT.A??  to override the  hard   
                    coded protocol selection menu then this name   
                    will not be displayed to the user.

       Key        : The KEY is the keypress that should activate   
                    the  protocol.  Note  that  the  KEY must be   
                    unique. In other words, since [Z]modem is an   
                    internal  protocol,  you  can't  use [Z]  to   
                    activate an external protocol.

       Ext ctl    : Before RemoteAccess  activates the  external   
       file         protocol,  it   creates  a control file that   
                    tells the protocol which  files to  send  or   
                    receive.  This file consists of some general   
                    information  and a  list of  files,  one per   
                    line.  You  may  define  exactly  what  each   
                    line  looks  like.  If  you  select  EXT CTL   
                    FILE,  then   RemoteAccess  will  write  the   
                    information   needed   by    Opus-compatible   
                    external protocols at  the  beginning of the   
                    file before  the file list.   Check the docs   
                    for each protocol you  install to  determine   
                    whether it is "Opus compatible".             

                                    38

       Batch      : If  the protocol has  the capability to send   
                    or receive more than one file at a time, set   
                    BATCH to "Yes".

       Status     : You may  temporarily  disable  the   current   
                    protocol   by   setting   its   status    to   
                    NOT-AVAILABLE,   re-enabling   it  later  by   
                    setting it  to  ALWAYS  AVAILABLE.   If  you   
                    wish to restrict  a protocol's  use to users   
                    who have connected using an error correcting   
                    modem then change the status to  ERROR FREE.   
                    This option  is particularly  useful  if you   
                    use protocols  such as "YModem-G" which  are   
                    specifically designed  for error  correcting   
                    modems.    (See  the  section  on   internal   
                    protocols  for a full explanation  of "Error   
                    Free" connections and MNP).

       Log file   : The LOG FILE is the  full path  and  name of   
                    the log  file  that  the  external  protocol   
                    writes. This file contains information about   
                    what files were  actually sent  or received.   
                    Without this information,  RemoteAccess will   
                    not  be able  to  update the  user's record.   
                    Most protocols  have the facility to  create   
                    a log of the files  that were actually  sent   
                    or  received;  if  the   protocol  you   are   
                    installing doesn't, it  is  advisable not to   
                    use it.

       Control    : The  CONTROL FILE is the full path and  name   
       file         of   the  control  file  that   RemoteAccess   
                    creates before activating the  protocol.  In   
                    order to allow the use of as  many different   
                    protocols as possible, you have full control   
                    over the format of  this file.
                
       DL/UL      : DL/UL COMMAND LINE  tells RemoteAccess  what   
       command      program  name  to   execute   in  order   to   
       lines        activate   the   external  protocol.  It  is   
                    possible  to   insert  variables   into  the   
                    command   line    using    special   control   
                    characters.  For example, the string:

                           PROTNAME.EXE Send *B

                    would be expanded to:

                           PROTNAME.EXE Send 2400

                    For  a  full  list of special control codes,   
                    refer  to  the description  of a Type 7 menu   
                    command in the  MENU  COMMANDS  section.  In   
                    addition to these codes, the # symbol can be   
                    used  if the  filename  to  send or  receive   
                    needs to be specified on the command line.




                                    39

       DL ctl     : The DL CTL  STRING  determines  the   format   
       string       of  each file entry.  Inserting a "@" in the   
                    string  substitutes that  position  with the   
                    file name.  For  example, if you  wanted  to   
                    download  the  file  C:\FILES\FUN\CASINO.ZIP   
                    using an  Opus type  external  protocol, you   
                    would set the control file string to:

                          Send @

                    When the control file is created, this would   
                    be expanded to:

                          Send C:\FILES\IBM\FUN\CASINO.ZIP

                    If the user were to select a batch download,   
                    say  RA*.ARJ, the  wildcard/pattern match is   
                    expanded to a full list  of fully  qualified   
                    path and file names.

       UL ctl     : The  UL CTL STRING works in exactly the same   
       string       way as the DL CTL STRING, except  that   for   
                    batch uploads,  instead of  specifying   the   
                    full  file name,  it  substitutes  just  the   
                    path   to  the  upload  directory,   as  the   
                    filenames are not known prior to the upload.

       DL/UL      : When  the external protocol has finished and   
       log          control  is  returned  to RemoteAccess,  the   
       keyword      log file  that  was  created  is  scanned to   
                    extract  information about  what  files were   
                    sent or received.  RemoteAccess  scans   the   
                    file for the  UP or DL LOG KEYWORD.  As soon   
                    as it finds that word, it will scan  forward   
                    x number of  words to  get the  name  of the   
                    file  transferred   and  a  description,  if   
                    available.  To  illustrate  how this  works,   
                    look at this extract from a BiModem log:

                      = 10 Sep 14:10:10 BMOD DL-B \GRAPH\VGA.ZIP   
                      = 10 Sep 14:12:22 BMOD DL-B \GRAPH\MAP.ZIP

                    The DL/UL LOG KEYWORD can be any word in the   
                    log  file  that  indicates the transfer of a   
                    single file.  The  keyword  in  the  example   
                    above should be set to "DL-B".

       Log name   : This  option determines  how  many  words RA   
       word 1       scans after it finds  the UL/DL LOG KEYWORD,   
                    to find the file name that  was uploaded  or   
                    downloaded.  In the previous example the LOG   
                    NAME WORD 1 should be  set to "1", as RA has   
                    to scan ahead 1 word  after  finding  "DL-B"   
                    to obtain the downloaded file name.






                                    40

       Log desc   : When a user uploads,  RA can  also  obtain a   
       word 2       description   from  the  log  file   if  the   
                    protocol used supports description  logging,   
                    and write it directly to  the  FILES.BBS. To   
                    achieve this you can set the LOG DESC WORD 2   
                    to the number of words RA has to scan  after 
                    it finds the  UL/DL  LOG  KEYWORD.  If   the   
                    protocol doesn't support description logging   
                    or RA cannot find a description, the user is   
                    prompted for the description.


















































                                    41

       Example : Installing Lynx as an external protocol
       -------------------------------------------------

       Select  an  empty  protocol slot,  and enter  the  following
       information:

        Name                  : Lynx
        Key                   : L
        Extended control file : No
        Batch available       : Yes
        Status                : Enabled
        Log file name         : C:\Ra\Dszlog.Txt
        Control file name     : C:\Ra\Lynx.Ctl
        Download command line : Lynx.Exe S /*P /*B /S /H @Lynx.Ctl 
        Upload command line   : Lynx.Exe R /*P /*B /S /D /H #      
        Download ctl string   : @
        Upload ctl string     :
        Download log keyword  : x
        Upload log keyword    : X
        Log : Name word #     : 10
        Log : Desc word #     : 0

       (Note  the  case  of  the upload and  download  log  keyword
        entries).

       The  above  example assumes that your  system  directory  is
       C:\RA.  To complete the installation, you'll need to set the
       DSZLOG environment variable to the full path and name of the
       log file that Lynx writes:

                   SET DSZLOG=C:\Ra\Dszlog.Txt





























                                    42

       LANGUAGES  -  RemoteAccess   contains   full   support   for
       multiple languages.  This means that you can have  different
       prompts,  textfiles and menus for any language. This version
       of RemoteAccess supports up  to eight  languages, while  the
       professional version supports a maximum of one hundred.


       Selecting the LANGUAGES option  displays a list of all   the
       installed   languages.   To  edit  one  of   the   currently
       installed  languages   position the cursor bar   over it and
       press ENTER.  If   you  wish to  generate   a  new  language
       file, position the  cursor over   a blank  entry and   press
       ENTER.         

       Name       : This field holds the name for the  language,   
                    this is  the name which will be displayed to   
                    users  when  they  are  asked  to  select  a   
                    language.  It is important  that you use the   
                    spelling of the language which would be used 
                    by people who speak the language.

       Available  : If you do  not  wish  to  make  the language   
                    available  set  the  AVAILABLE option to NO.   
        
       Language   : This is where you can edit all the  prompts.   
                    There   are   approximately  500   different   
                    prompts, all of which can be changed to suit   
                    your  needs.  To  use the  editor  place the   
                    highlight  bar over  the  text you  wish  to   
                    change,  press  ENTER and then enter the new   
                    text. At the top  of  the  editor screen the   
                    default   English   text  appears  for   the   
                    currently  selected prompt. You may  include   
                    any  textfile  control  characters in any of   
                    the prompts (see the section on TEXT CONTROL   
                    CHARACTERS for further information).

                    When editing the  prompts the following keys
                    can be used to assist:

                    [ALT-C] - To  change  the  prompt's  default   
                              colour. If set to  black on black,   
                              RA  will display the prompt in the   
                              internally hard-coded colour.

                    [ALT-D] - To  copy   the  default  into  the   
                              current prompt.

                    [ALT-I] - Display / edit  the  "info"  field. 
                              This  usually  contains information  
                              about the revision level and author  
                              of the language file being edited.

                    [ALT-S] - To search for an entry.






                                    43

       You  can  run the  language  editor directly without  having
       to  go  through  the  RACONFIG  menus  by   using  the  "-L"
       parameter  on  the   RACONFIG  command  line,   for  example
       "RACONFIG -L"  (See the section on  COMMAND-LINE  PARAMETERS
       for further information).


                    Editing the languages  is a   simple process   
                    however there  are  a number  of pitfalls to   
                    watch out for :

                    * You will  notice that some prompts (marked   
                      with an asterisk before the prompt number)   
                      require  you  to  enter  the keys that are   
                      used to activate the options to which that   
                      prompt refers. Make sure you maintain  the   
                      correct  order  of the keys, and that they   
                      match your new text.                

                    * Some  prompts are the headers  for listing   
                      functions,  like  today's  callers,  who's   
                      online  etc; you'll  see  that  these have   
                      obvious spacing  built in,  which  must be   
                      maintained if you change  any part  of the   
                      text.

                    * If   you're  translating  the  text   into   
                      another  language, there  are two rules of   
                      thumb:
                    
                        1. Translate all  text as  literally  as   
                           possible,

                        2. Try to use "generic" words and 
                           phrases.
         
                      For example,  RA uses the same  prompt for   
                      the "Access denied!"  message if the  user   
                      gets his  password  wrong at  logon  as it   
                      does  when  a  user  tries  to  access   a   
                      passworded  menu and fails - therefore you   
                      wouldn't want   to change  the  string  to   
                      "Access denied, logging you off".  Anyway,   
                      you  get the idea.    


       Menu path  : Each  language can  have  it's  own  set  of   
                    menus. With this option you  can  define the   
                    paths   to  the   menus  for   each specific   
                    language.

       Text path  : Each  language can also have it's own set of   
                    textfiles. With this option you  can  define   
                    the paths to the textfiles for each specific   
                    language.
        
       Ques path  : In this field you may enter the  path to the   
                    directory where the questionnaire  files are   
                    stored for each individual language.

                                    44

       Filename   : This option allows you to give your language   
                    a  filename to  be stored in. Enter the path 
                    and  filename  in  this  field.  It  is  not   
                    necessary  to  enter  an  extension  for the   
                    filename as the extension .RAL will be added 
                    automatically.


       ALT-Fn KEYS  -  When one of the  ten function  keys  on your
       keyboard  is  pressed  in  conjunction   with  the  ALT key,
       RemoteAccess will do one  of three things : If  the  command
       string that  you  have assigned to the  function key that is
       pressed is a standard DOS  command  line,   then  that  line
       will be executed in a  shell  while RemoteAccess  remains in
       memory.   If,  on  the  other hand, the first   character of
       the command  string for  the  function   key  is  the  query
       symbol (?) followed by  a number,  RemoteAccess will exit to
       DOS with an errorlevel  equal to the number.  Alternatively,
       if  the first character of the  command string is  the  hash
       (#),  RemoteAccess will display the named text file from the
       textfile  directory.  For example,  suppose  three   entries
       looked like this:

                   5 : ?110
                   6 : C:\COMMAND.COM
                   7 : #WELCOME

       Pressing ALT-F5 would cause RemoteAccess to exit to DOS with
       an   errorlevel  of  110, ALT-F6  would execute a  copy   of
       COMMAND.COM  in  a  shell,  and  ALT-F7  would  display  the
       appropriate  (ASC/ANS/AVT)  version  of   your   WELCOME.A??
       file to the user.



       EVENTS  -  The  RemoteAccess  Event Editor allows you to set
       pre-determined times  during the week when RemoteAccess will
       automatically  exit to your batch file and  perform  certain
       functions,  usually some kind of system maintenance. You may
       define up to 20 events to run  at  any  time during the day.
       In addition to this,  it is  also  possible  to specify that
       an event only run on a  particular  day or days of the week.

       To  modify  an event,  simply move the highlight bar to  the
       event you wish to alter, and press [CR]. Use the cursor keys
       to move between entries in the event edit window,  and enter
       the time you want the event to start at,  in 24 hour format.

       Next,  enter  the errorlevel;  when the event is  activated,
       RemoteAccess  will exit to the batch file from which it  was
       called at this errorlevel.  Your batch file should trap this
       errorlevel and act accordingly. In this window, you can also
       specify  what days you would like the event to run  on,  and
       whether  the  event is  enabled or  disabled.   If  a user's
       upload or download  overruns an event  which is FORCED  then
       the transfer  will be aborted  and the user  disconnected to
       ensure  that  the  event  runs  at  the  proper  time.  More
       information  on trapping  events is  contained in  the BATCH
       FILES section.

                                    45

       MENUS   -   This   option   activates the  RemoteAccess menu
       manager. For   full details  on setting   up menus and  menu
       types please refer to the MENU section of  this manual.


       USERS   -    This  is where  you  add,  delete,  modify  and
       otherwise maintain your user database. Full details  can  be
       found   on the user editor  further on in the   manual under
       the  section  THE USER DATABASE.  


       CTL FILES  -  This option allows you to edit all the  *.CTL 
       files in addition to any other ASCII textfile, for example a
       FILES.BBS list.

           VIP        :  Very Important Persons list.
           TRASHCAN   :  Disallowed users list.
           NODECOST   :  Nodelist costing file.
           FILES      :  Passworded and free file list.            
           BADFILES   :  Disallowed files for upload.
           HANDLES    :  Disallowed handles.
           PHONENUM   :  Disallowed phone number masks.
           LIMITS     :  Time and file transfer restrictions.      
           PWDTRASH   :  Disallowed passwords.
           NAMES      :  User name macros.
           Other      :  Any other textfile.  (User selectable)



       COMBINED    -    This option  allows  you to  specify  which
       message  areas  will  by  default be  enabled  for  combined
       message area reading to new users.




























                                    46

       SECURITY            
       ────────────────────────────────────────────────────────────

       All user-security is controlled by a security level and  set
       of access flags.  The security level is any number from 1 to
       64,000.  Setting  a user's security level to zero will  lock
       him or her out of the BBS. There are thirty-two access flags
       arranged  in  four sets of eight individual flags,  each  of
       which can be either ON or OFF.  An ON flag is represented by
       an "X", and an OFF flag by a "-".

       Firstly let's look at menu security. Each menu is made up of
       a number  of  lines,  each  of  which  may  have  a  command
       associated with it.  (The  structure  of menus  is explained
       fully  in the next section).  In order for a menu line to be
       visible  (and  selectable) to a user,  the  user's  security
       level  must be equal to or greater than the  security  level
       assigned to that line.  In addition to this, every flag that
       is set ON in the menu line must also be set ON in the user's
       flag setting. 

       Read/Write  and Sysop access to message areas is  controlled
       in the same way. To be able to read messages in an area, the
       user  must  have not only a sufficient security  level,  but
       also  at  least the flags that are defined in  RACONFIG  for
       that  area.  Similarly,  the file area access  security/flag
       system works in the same way,  BUT the settings only  affect
       the   three   file  search  menu  functions.   To   restrict
       up/download  access to certain areas,  you will have to  use
       menu security.






























                                    47

       MENUS
       ────────────────────────────────────────────────────────────

       This  is  possibly the most important stage  in  configuring
       your  BBS.  The  menus that you create will give the  system
       it's own "feel",  and will make your system look  completely
       different from the one next door.  The menu system gives you
       one hundred percent flexibility not  only  cosmetically, but
       in allowing and disallowing access to certain functions  and
       parts of your BBS to groups of users.

       The menus are line-oriented. Using the menu editor supplied,
       you  enter the lines one at a time.  Each line has a line of
       text that is displayed to the user, a menu "type", a minimum
       security  level  and flag setting required  to  access  that
       line,  and  some  optional  data that is used by  some  menu
       types. 

       There are approximately seventy menu functions that  may  be
       activated  by the user pressing the key you have  linked  to
       that  function.  These functions are explained fully in  the
       following pages.






































                                    48

       Menu functions


       Type          : 1
       Name          : Goto another menu
       Optional Data : <Menu Name> [Password] [/F=<File Area>|+|-] 
                       [/M=<Message Area>|+|-] 

       This function causes a jump to another menu,  which has been
       created  with  the  editor  and saved  as  <Menu  Name>.  If
       [Password]  is  specified  then the user will  be  asked  to
       supply  a  non-case-sensitive  password  before  proceeding.
       <File  Area> and <Message Area> set the  currently  selected
       file and message areas respectively for the template system.
       See the section on MENU TEMPLATES for a full explanation  on
       this.


       Examples:

          FILES        : Jump to the menu 'FILES'.

          FILES FBES   : Prompt the user for a password,  then jump
                         to the  menu 'FILES'  provided   the  user
                         entered the correct password of 'FBES'.

          FILES /M=10  : Jump to  the  menu  'FILES'  and  set  the
                         selected message area template to  message
                         area '10'.

          FILES /F=10  : Jump  to  the  menu  'FILES'  and set  the
                         selected file area  template  to file area
                         '10'.

          FILES /M=+   : Jump to  the  menu  'FILES'  and  set  the
                         selected  message  area  template  to  the
                         current message area plus 1.

          FILES /F=+   : Jump  to  the  menu  'FILES'  and set  the
                         selected file area template to the current
                         file area plus 1.




       Type          : 2
       Name          : Gosub another menu
       Optional Data : <Menu Name> [Password] [/F=<File Area>|+|-] 
                       [/M=<Message Area>|+|-] 

       As for Function 1,  but saves the path to the last menu on a
       "stack",  making  it possible to return to the calling  menu
       with  a type 3 function.  Note that menus called in this way
       may be nested to a maximum of 50 levels.






                                    49

       Type          : 3
       Name          : Return from gosub 
       Optional Data : None

       Use  this  function to return from a Gosub (type 2)  to  the
       previous menu in the  menu stack.



       Type          : 4
       Name          : Goto menu after clearing menu stack         
       Optional Data : <Menu Name> [Password] [/F=<File Area>|+|-] 
                       [/M=<Message Area>|+|-] 

       As for function 1,  but  before jumping to the new menu, the
       gosub menu stack is cleared.  Obviously you can't use a type
       3 return straight after this!



       Type          : 5
       Name          : Display a *.ASC/*.ANS/*.AVT text file       
       Optional Data : <1-8 character name>

       This  menu  type  will  display  a  file  in  your  textfile
       directory  (as  defined  in  RACONFIG).   RemoteAccess  will
       display the file specified in the  Optional Data  field with
       one of three extensions.   If  the  user  has  AVATAR  codes
       active in their setup,  RemoteAccess would  display the file
       <Filename.AVT>  to   the  user.    If   however   the   file
       <Filename.AVT> was missing or the  user did  not have AVATAR
       enabled,  but only ANSI,  the file  <Filename.ANS>  would be
       displayed.   Finally if the user has only 'ASCII' enabled or
       both the files <Filename.AVT> and <Filename.ANS> are missing
       the file <Filename.ASC> would be displayed.

       These files  may contain any text  or graphical  information
       up to the limitations of  the text  format.  For example you
       cannot  display  ANSI colour  in a  *.ASC file.   Along with
       text and graphics it  is possible  to  display comprehensive
       system and  user details by inserting  special control codes
       in  the  files.  These  codes  are  listed  in the TEXT FILE
       CONTROL CODES section. 

           
       Examples:

       STATS      : This  Optional Data line   would display the   
                    file  'STATS.AVT'  if  the  user  has AVATAR   
                    enabled,  'STATS.ANS' if  the  user has ANSI   
                    enabled or the  file  'STATS.AVT' is missing   
                    and 'STATS.ASC' if the  user  has only ASCII   
                    enabled or both  the AVT  and ANS  files are   
                    missing.






                                    50

       Type          : 6
       Name          : Bulletin menu
       Optional Data : <1-8 character name>

       This function  will display  the file <filename.ASC/ANS/AVT>
       from the  textfile  directory.   The user  is then  prompted
       for a file suffix  of length  '8-<length of filename>'.  The
       suffix  is then  appended  to  the  original  filename,   as
       specified on  the Optional  Data line,  and that textfile is
       displayed  to the users  as it would be in a Type 5 command.

       Examples :

          BULLET     : If this  optional  data  field was specified
                       the   file  'BULLET.ASC/ANS/AVT'  would   be
                       displayed.  Then the  user is prompted for a
                       2 character input.  If  the user typed "1B",
                       then the file  "BULLET1B.ASC/ANS/AVT"  would
                       be displayed. The original text file defined
                       in  the  optional   data  should   therefore
                       contain a list of available bulletins.







































                                    51

       Type          : 7
       Name          : Run an external program in a shell
       Optional Data : <Command Line> [Control Codes]

       This  command  will run an external program (a "door") in  a
       shell while the user is on-line. Examples are on-line games,
       mail-checking facilities and so on. (Refer also to type 15 -
       Exit  to  DOS  for an alternative way  of  running  external
       programs). The FULL name of the program must be specified if
       it is an .EXE or .COM file.  To run one of these two  simply
       put  the name of the program in the optional data field.  If
       you  wish  to  call a batch file,  this  must  be  done  via
       COMMAND.COM,  the memory-resident command-line processor. So
       to  run  your TradeWars batch file,  the command line  could
       read:

                   C:\COMMAND.COM /C \BBS\DOORS\TW2.BAT

       Many programs require extra information to be passed on  the
       command line, so the following control codes may be used. In
       each case, the code is replaced by it's value:

            *A : Write the user's handle (if any) in DORINFO.DEF   
                 instead of the user's real name.

            *B : User's baud rate, or 0 if local.

            *C : Full path and name to COMMAND.COM.

            *D : Automatically generate the Doorway DOOR.SYS       
                 parameter file.

            *F : User's first name.

            *G : ANSI graphics, 0=Off/1=On.

            *H : Normally  the  FOSSIL  is  de-initialised   before
                 running an external program to avoid any possible 
                 conflicts  between  the  FOSSIL and  the  program.
                 Specifying this parameter leaves the FOSSIL  "hot"
                 or active. 

            *L : User's last name.

            *M : Activate MemorySwap feature. RemoteAccess attempts
                 to  swap itself and all the memory it occupies  to
                 EMS  (if  installed) and  disk,  leaving  only  2k
                 resident.    Great   for   running   memory-hungry
                 programs,  but  it  takes a few seconds to do  the
                 swap.  If  it  can't do the swap,  it will  try  a
                 normal shell.  NOTE :  Some programs are notorious
                 for  "fragmenting" memory,  and will not work with
                 MemorySwap.  Programs compiled in QuickBASIC, such
                 as TradeWars 1000 exhibit this problem.

            *N : Line number,  as specified  by the -N command line
                 parameter.



                                    52

         *Oxxx : Override the baudrate value passed on to the      
                 called program with xxx.

            *P : Communications port being used (1-4).

            *R : User's record number in the user file.

       *S<filename.ext> :
              Generates a  custom exitfile using a template file   
              with the extension .RAT in the system directory      
              which contains any valid textfile macros. See the    
              "Textfile  Control Codes"  section  of  the          
              reference chapter for a full  list of available      
              text macros.

              The 'filename'  is the  base  filename  of  the  .RAT
              template file.  RA will process the file  and  create
              filename.ext where  the EXITINFO.BBS file is stored.

            *T : Time remaining for current call.

            *! : Freeze  the  system timer  for the duration of the
                 shell.  Useful for running external utilities like
                 full-screen chat programs etc.

            *# : Turn off the "Wants Chat" indicator on return from
                 the   shell.  This  is  to  facilitate  the proper
                 installation of external chat utilities.

            *0 : The full path to the currently selected file      
                 template area.

            *1 : The number of the currently selected template     
                 message area.


       In  addition  to this command line information that  can  be
       passed,  RemoteAccess also creates two data files before the
       shell.  DORINFO1.DEF,  which is a RBBS-compatible file,  and
       EXITINFO.BBS,  which  contains  an  extremely  comprehensive
       amount of system and user information. The structure of this
       file  can be found in the RemoteAccess structures  document,
       RASTRUCT.  It should also be noted that ALL system files are
       written  to  and closed off before the shell  is  activated,
       then  reopened  and scanned upon  return.  This  means  that
       programs  that  modify system files (eg.  USERS.BBS) can  be
       safely run in a type 7 shell.

       RemoteAccess also supports Doorway's DOOR.SYS parameter file
       directly; including  a *D on  the command  line enables  the
       generation of this file.

       Note  that the external program must do it's own time  limit
       and  carrier watchdogging,  in the event that the user  does
       not exit from the program correctly.





                                    53

       Type          : 8
       Name          : Product information
       Optional Data : None

       Displays  product information including the version  number,
       licensing  details  and  copyright  information.  If  a user
       is on-line  remotely,  the name and version of the FOSSIL in
       use is also displayed.



       Type          : 9
       Name          : Terminate the session
       Optional Data : None

       Displays  the GOODBYE.ASC/ANS/AVT text file and hangs up  on
       the user  by dropping  the DTR signal to the modem.  To this
       end, make  sure your modem's DTR line  is not "forced  high"
       continuously.



       Type          : 10
       Name          : System usage
       Optional Data : None

       This displays  a nicely  formatted  full-screen  autoscaling
       graph that depicts system usage  in terms of  percentage use
       per hour.   Each node (line)  keeps a separate system  usage
       graph and therefore  you can see  how  busy each  individual
       node is. If  you  wish to reset the graph,  delete the  file
       "TIMELOG.BBS"  from  your system  directory  or,  if you are
       running multi-node, the node directory.



























                                    54

       Type          : 11
       Name          : Page sysop to chat
       Optional Data : <Paging string>

       This function will display  the <paging string>  to the user
       and page  the  sysop  for a chat  by  playing  a paging tune
       sounded at the local console.  If the REASON FOR PAGE option
       has been enabled in RACONFIG,  RemoteAccess will  display  a
       user-defined  prompt   and  wait  for  the  user to  enter a
       reason  for  requesting the chat.    When  the  paging  tune
       sounds the sysop may select "C"  to chat with the  user,  or
       "A" to abort the page.

       You may break in for a  chat at any time by pressing  ALT-C.
       If the  remote is  using an IEMSI-compatible  terminal which
       supports the IEMSI full-screen  chat flag, RemoteAccess will
       initiate  a split-screen  chat session.  To force  the "old"
       style line-oriented chat, hold down  the left SHIFT key when
       you press ALT-C.

       All sysop  keys are  listed in the reference section of this
       manual.  During a chat, the system timer  is  "frozen",  and
       is re-started  when  the  chat  is   terminated.  The  sysop
       terminates chat  mode  with the  ESCape  key.  During  chat,
       you may open a capture file  to record  what is  said during
       the  chat  session  by pressing CTRL-A,  and  again to close
       the capture.  If you have set  the "Auto log"  option in the
       Paging options of RACONFIG  to on, RemoteAccess  will open a
       chat log automatically upon entering chat.

       The times at which a user is allowed to page the sysop for a
       chat and  the number of times a user is allowed to request a
       chat in one  session  is controlled in  RACONFIG.   You  can
       override  the times at which  users can page you by pressing
       ALT-O  when  a  user is  on-line  and selecting  between the
       options.

       The default paging sound is a  constant "beep-beep" tone for
       the duration of the page. You may define your own page sound
       by creating  a  text  file  called  PAGE.RA  in  the  system
       directory. The following keywords are valid:

          TONE [hz] [1/100's sec]   (sounds hz)
          WAIT [1/100's sec]        (sounds nothing)
















                                    55

       The following  table lists  several musical octaves  and the
       correct frequency value associated with each note:

          Note  Oct - 1    2    3    4    5    6
          ----        
          C       F   45  134 268  536 1071 2145
          C#      r   71  142 284  568 1136 2273
          D       e   75  150 301  602 1204 2408
          D#      q   80  159 319  638 1275 2551
          E       u   84  169 338  676 1351 2703
          F       e   90  179 358  716 1432 2864
          F#      n   95  190 379  758 1517 3034
          G       c   100 201 402  804 1607 3215
          G#      y   106 213 426  851 1703 3406
          A       #   113 225 451  902 1804 3608
          A#          119 239 478  956 1991 3823
          B           127 253 506 1012 2025 4050

       The  RemoteAccess distribution  archive  contains  a  sample
       PAGE.RA file to get you started.



       Type          : 12
       Name          : Questionnaire
       Optional Data : <1-8 character file name> [/N]

       Initiates a questionnaire. The <file name> is the first part
       of  the  name of the questionnaire file.  All  questionnaire
       files  are   stored  in  the  questionnaire   directory,  as
       specified in  the  RemoteAccess  Language  Editor,  and have
       a name extension of .Q-A.  User's responses are stored in an
       output file named <filename>.ASW.  There is a full  tutorial
       on  questionnaires,  including the script  language  in  the
       reference section of this manual.

       RemoteAccess has two hard-coded questionnaires.  If present,
       it will   initiate the  questionnaire NEWUSER.Q-A for  a new
       user after   the hard-coded text  file  NEWUSER2.ASC/ANS/AVT
       is displayed.  

       The  SUBDATE.Q-A  questionnaire  is automatically  initiated
       when  a  user  logs on  and  his/her  subscription date  has
       expired.  You  could  use  this  questionnaire  to  possibly
       downgrade  the  user's  security and/or  flag  settings  and
       display   a  message   informing   the  user   that  his/her
       subscription has expired.

       For  information on  hard-coded  (external  support)  files,
       refer to the EXTERNAL SUPPORT FILES section.

       Normally the initiation of  a questionnaire is noted  in the
       system log. Placing the /N parameter after the questionnaire
       name on the optional data line will suppress this log entry.






                                    56

       Type          : 13
       Name          : User listing
       Optional Data : [/G] [/H]

       Displays a list of users in the user file. Lists users name,
       location,  file ratio,  and the last time he/she called  the
       system.  This  function  has  some  basic  pattern  matching
       capabilities  on the  name field.  By default all  users are
       listed. However, if a  /G is specified in the  optional data
       field then the user will only see users who are  in the same
       group.  Note that  this  restriction does  not apply  to the
       sysop.  If a /H is specified in the optional data field then
       the users handles  will be  displayed  in place of  the user
       names.  If the users  handle field  is blank  then  the user
       name will be  used.   The  /G and  /H options may be used at
       the same time to produce a group user listing by handle. 


       Type          : 14
       Name          : Time
       Optional Data : None

       Shows the current date and time, time of connection and  the
       user's  daily  time  limit,  time  used  and  time remaining
       for the day.


       Type          : 15
       Name          : Exit to DOS
       Optional Data : <Errorlevel>

       This  function  causes RemoteAccess exit to the  batch  file
       that  executed  it,  with  a specific  errorlevel.  Set  the
       optional  data  to the errorlevel you wish to  pass  to  the
       batch  file.  The batch file should trap the errorlevel  and
       act  accordingly.  If  you exit while the user is still  on-
       line, to log the user back on invoke RemoteAccess with the -
       R  command line parameter.  This will force it to  read  the
       EXITINFO  file that was written at the time of the  previous
       exit  and take the user directly to the top menu.  Note that
       errorlevels  0 to 5 are reserved by RemoteAccess for  system
       use (see the reference section on ERRORLEVELS for a complete
       list  and  description of these and how to  use  them),  and
       should not be used.

       There are two control  codes that are valid on  the optional
       data field:

            *A : Pass the user's handle/alias in DORINFO.DEF
            *D : Generate the DOOR.SYS file 

       See  the  description  of  the  menu  command  type  7   for
       additional information on both of these options.







                                    57

       Type          : 16
       Name          : Alter location
       Optional Data : None

       Allows  the user to change the "location" field  in  his/her
       user  record.  RemoteAccess  will  automatically  capitalise
       users  locations  if the  CAP LOCATION  option is enabled in
       RACONFIG/OPTIONS/NEW USERS. 



       Type          : 17
       Name          : Alter password
       Optional Data : None

       Allows the  user to  change his/her  password.   Before  the
       user can change their password they will be asked to re-type
       their current password.   Frequent password  changes  should
       be encouraged to  ensure system security,  and in fact there
       is an option to force a change of  password   every  certain
       number of logons (refer to "RACONFIG").



       Type          : 18
       Name          : Alter screen length
       Optional Data : None

       Allows  the  user  to alter the vertical length  of  his/her
       screen display.   This affects the "Continue?" prompt.



       Type          : 19
       Name          : Toggle screen clearing
       Optional Data : None

       Allows  the user to specify whether he/she would like screen
       clearing codes  sent.  If enabled  RemoteAccess  will  clear
       the users screen every time the user changes menus.



       Type          : 20
       Name          : Toggle page pausing
       Optional Data : None

       Allows the user to enable or disable the "Continue?"  prompt
       at the end of each screen page.


       Type          : 21
       Name          : Toggle ANSI graphics
       Optional Data : None

       Allows the user to select, or deselect ANSI graphics. If the
       user  disables ANSI, he/she will be asked whether the use of
       the full-screen editor should be disabled.


                                    58

       Type          : 22
       Name          : Check the mailbox
       Optional Data : None

       Checks  to  see if there is any mail addressed to  the  user
       that he/she hasn't yet read.  This can be done automatically
       at log-on by setting the appropriate option in RACONFIG. See
       the section on configuration for details of the two types of
       mail-check available.  All new messages are marked for later
       retrieval with the "Read Marked" option.  Note that the user
       will  only be notified of mail in areas that he/she has read
       access to,  as defined in RACONFIG. Although the system only
       prompts  the  user with a "Read mail now  [Yes/no]"  prompt,
       several options can be activated.  Valid choices are [R]ead,
       [S]can, [Q]uickscan, [K]ill, or [M]ark as received.













































                                    59

       Type          : 23
       Name          : Read messages
       Optional Data : <Message area #> or /M

       This command initiates the message reading routines.  Before
       a user  can read  any message  RemoteAccess checks that  the
       user  has  read  access  to the  message area  first.    The
       <Message area #>  as defined in RACONFIG,   should be placed
       in  the  Optional Data field or if a  value  of 0 is entered
       RemoteAccess will  allow  the  user to  read  in  "combined"
       mode  (see function type 28  for more  information  on  this
       feature).   If you put a "/M" in the optional data field  in
       place  of the area number,  RemoteAccess will  automatically
       substitute the currently selected template message area into
       the  data field.  See MENU TEMPLATES for more on  this.  The
       message area number refers to number assigned to the desired
       area in RACONFIG.

       After selecting this function the  user  may   select one of
       eight different reading modes,  which are:


          (F)orward     : Read forward  from  the selected  message
                          number to the last message. 

          (R)everse     : Read reverse  from  the selected  message
                          number to the first message.

          (I)ndividual  : Read an individual  message,  selected by
                          message number.

          (H)elp        : Displays the file  "MAILHELP.A??"  to the
                          user,  if it exists (see EXTERNAL SUPPORT
                          FILES).

          (M)arked      : Read   messages   marked   by   the  user
                          previously  when  doing  a  message scan,
                          (See Menu Type 24).

          (N)ew msgs    : New messages since the users last call.

          (S)elected    : Read messages,  by  a search  criteria on
                          the "To:", "From:" or "Subject" fields.

          (Q)uit.       : Abort the message reading. 















                                    60

       A menu bar is  displayed at the  end of each  message,  this
       provides the user with the following functions:

          [-]  : Read previous reply
          [+]  : Read next reply
          [A]  : Redisplay message again
          [N]  : Go to the next message
          [L]  : Go back to the previous message
          [R]  : Post a reply to the current message
          [E]  : Enter a new message in the current area
          [F]  : Download files that are attached to the message   
          [D]  : Delete the displayed  message  (check the  "delete
                 msg"  menu function for more information)
          [S]  : Stop reading messages


       The following options  are available only to  users who have
       sysop access to the message area:

          [!]  : Display ^A  kludge  lines normally  hidden.  These
                 lines normally contain  information  pertaining to
                 the product that  created the  message,   echomail
                 information and information about  replies to  the
                 message.

          [*]  : Edit   the  current  message's  attributes.   This
                 allows  you  to   edit   the   following   message
                 characteristics:
                   
                    Area no.     : Message area number.
                    From         : The sender of the message.
                    To           : The recipient of the message.   
                    Subject      : The subject of the message.     
                    Attributes   : Message   attributes    toggles;
                                   Deleted,    Netmail,    Private,
                                   Received, and Local flags.
                    Exported     : If the msg is  an Echomail  msg,
                                   this  determines if the  msg has
                                   been exported.

          [X]  : Export message to a file or the printer

          [/]  : Forward message to another user in any msg area.

          [=]  : Mark message as  unreceived  and  go to  the  next
                 message.   The  message  will then  be redisplayed
                 next time you do a mail check.

          [U]  : Modify the security level  of the user  who posted
                 the currently displayed message, provided the user
                 is listed in the userfile.  Great for "on the fly"
                 user  verification!  NOTE  -  only  users  with  a
                 security  level  less  than  the person making the
                 change may be modified, and their level may not be
                 upgraded higher than the person making the change.
                 {+}  Registered only.




                                    61

       Type          : 24
       Name          : Scan messages
       Optional Data : <Message area #> or /M

       Same  as  the  READ  message function  (type  23)  but  only
       displays  the message header of each message.  The user also
       has the  option  of marking  messages for  later  retrieval.
       Messages marked with this  method  can  be read later by the
       user by selecting the read  "Marked" option from a menu type
       23 command.    



       Type          : 25
       Name          : QuickScan messages
       Optional Data : <Message area #> or /M

       Same as the READ message function (type 23) but each message
       is listed as a single-line entry containing message  number,
       the author of the message,  who it is addressed to,  and the
       subject line.  



       Type          : 26
       Name          : Delete message
       Optional Data : None

       Allows a user to delete a message provided that:

       * The user has sysop access to the  area the message is  in,
         OR

       * The message is in a LOCAL or NETMAIL area, the user is the
         sender or recipient of  the message  and the  message area
         allows  users to  delete  messages (See RACONFIG Manager),
         OR

       * The message  is in  an echomail area  and the user is  the
         sender of the message,  provided the message  has not been
         exported from the message-base and the message area allows
         users to  delete  messages (See RACONFIG Manager).
         

















                                    62

       Type          : 27
       Name          : Post message
       Optional Data : <Message Area #> or /M [/L] [/U] [/T=<Name>]

       Post  a  message  in the specified area  (or  the  currently
       selected  template area if the "/M" is used).  The user must
       have  either write or sysop access to the message  area,  as
       defined  in RACONFIG.  The /L option will log the  user  off
       immediately  after the message is saved (useful for a "Leave
       message  to  sysop before disconnecting"  option).  The  /T=
       option will force the message to be addressed to a  specific
       user.  Simply  place  the user's name in the  optional  data
       field  after  the /T= parameter to select this  option.  For
       example, on my "log-off" menu, I have the following entry:

       Menu Type 27
       Optional Data: 60 /L /T=Andrew_Milner

       (Any messages to "Sysop" are redirected to the sysop's  name
       as defined in RACONFIG).  If you do use a full name, be sure
       to use underscores in place of spaces.

       Specifying a message area number of zero forces RemoteAccess
       to  display all message areas that the user has write access
       to and prompt for the message area to post the message in.


       When  posting a message,  the  user will be prompted for the
       following information:

          
          Alias?     : If the  message  area allows  users to  post
                       messages  using   an  Alias,  the user  will
                       be asked if they wish  to do so,  if they do
                       they  will  then  be prompted for  the alias
                       they wish to use.

          To         : In this  field the user  must enter the name
                       of the  recipient of  the message.  In Echo-
                       Mail areas any  name will  be  accepted.  If
                       however the user  is posting a  message in a
                       local message area, RemoteAccess will search
                       the user  database   to  confirm   that  the
                       recipient is a valid  user of the system. If
                       no  record of the recipient is found and the
                       /U  parameter  is on  the optional data line
                       the user  is  notified and  asked if  he/she
                       would like to view/search the user database.
                       If  the  user elects not to search  the user
                       database  the  message  will  be  posted  as
                       normal.









                                    63

                       In   addition   to   posting   messages   to
                       individual users,   it is  possible  to post
                       mail  to a  group of  users.   The following
                       macros  are valid  for a user to  use in the
                       "to" field  of a  message provided they have
                       the minimum security level  required to post
                       a group mail message.

                       Send msg to :

                          @[g] - all users in group [g]
                          @ALL - all users
                          =[s] - all users with security = [s]     
                          >[s] - all users with security > [s]     
                          <[s] - all users with security < [s]

                       A separately addressed message is generated 
                       for  each  qualifying user,  so large group 
                       mailings can take a little while to process 
                       and occupy a large amount of disk space.

          Address    : If the message is being posted in a Netmail 
                       area, the user will be prompted to enter the
                       network address of the system they  wish to 
                       sent the mail  to.    If the user is unsure 
                       of the network  address,  they  may  browse 
                       the nodelist  obtain the  correct  address. 
                       NOTE :   Browse  the   nodelist  is  a  {+} 
                       registered feature only. 

          Subject    : In this field,  the  user may  place a short
                       description  of the  subject  matter of  the
                       message.

          Private?   : If private  messages  are  permitted  in the
                       message area,  the  user  will be  given the
                       option to   address  the mail  privately for
                       reading by the recipient only.

          Crash?     : This option  determines if a Netmail message
                       is sent immediately from your system  to the
                       destination  system.   The  option  is  only
                       available  to  users  who have  the  minimum
                       security level to use Crash mail.          


          













                                    64

       Type          : 28
       Name          : Select combined areas
       Optional Data : None

       Allows  the user to select any combination of message  areas
       for  "combined" mode message reading/scanning/quickscanning.

       The  user is shown a list of available areas and may  toggle
       any  of  them "ON" or "OFF".  This combination of  areas  is
       saved  as part of the user's permanent user record,  and  is
       restored at next log on.  To read messages in the "combined"
       area, use a normal read/scan/quickscan menu function but set
       the message area number in the optional data field to  zero.

       Area  zero is hard-coded as this combined area and cannot be
       defined by the sysop. Note that it is possible to define via
       RACONFIG a  default selection of combined  message areas for
       new users.










































                                    65

       Type          : 29
       Name          : Move a file
       Optional Data : <Full source path>

       Primarily intended as a sysop/assistant sysop function, this
       allows  the  user  to move files  from  a  pre-defined  area
       <source-path>  to  any valid DOS directory without the  need
       for remote access  to DOS.  After the file  has been  copied
       successfully,  RemoteAccess will optionally  move the file's
       description (if there is one) to the destination directory.



       Type          : 30
       Name          : Directory
       Optional Data : <Full path> or /F

       Displays   an  MS-DOS  style  directory  of  the   directory
       specified in the optional data field,  showing name,  length
       and date of each  file. The user is prompted for an optional
       wildcard pattern match  filespec.   For  example "*.*" would
       display all files.

       The use  of  the "/F"  parameter will  enable you to use the
       current file template in place of the <Full path>.



       Type          : 31
       Name          : List files
       Optional Data : <Full path> or /F

       This option displays a list of files available for  download
       from  the  directory  specified  by the  path  name  in  the
       optional  data  field.  The file names and descriptions  are
       contained  in  a  file  called  FILES.BBS.   This  file   is
       automatically  maintained  by  RemoteAccess when  files  are
       uploaded,  but it may also be edited by the sysop.  The file
       consists  of  a  single  word  file-name  per  line  with  a
       description,  up to 255 characters in  length.  Descriptions
       that  exceed  the  width  of the  screen  are  automatically
       wrapped to the next line.  It is possible  to define how you
       want  the file  listing to  be  displayed  to  the  user  by
       editing  the file "list format"  template in RACONFIG.   The
       default list format will display the file name, upload date,
       size of  each file  and the  file  description.  An asterisk
       before  the  description   signifies  that the  file  is new
       since  the user's  last  call.  (See  RACONFIG/OPTIONS/FILES
       AREA for further information on "List Format").

       If,  instead  of the full path to the file area,  you put  a
       "/F",  RemoteAccess  will  substitute  the  path  name  that
       corresponds to the currently selected template file area, as
       defined  in  RACONFIG.  See the MENU  TEMPLATE  section  for
       further information on this.





                                    66

       Type          : 32
       Name          : Download a file from area
       Optional Data : <Full path> or /F [Password]

       Enables  the user to download any file that is contained  in
       the  specified  directory.  Note that the file need  not  be
       listed in that directory's FILES.BBS for the user to be able
       to download it.  If a password  is specified for the file in
       the "FILES.CTL"  file  or  a password  is  specified  in the
       optional data field,   the user  will  be  asked for  a  non
       case-sensitive password before being allowed to proceed with
       the transfer.  The /F option  works in  the  same way  as in
       function 31.   (See the section  EXTERNAL SUPPORT  FILES for
       further information on the "FILES.CTL" file).

       If  a user  is logged onto a local node,   RemoteAccess will
       prompt the  user for a directory to move  the selected files
       to.                        


       Type          : 33
       Name          : Upload a file
       Optional Data : <Full path> or /F [/L]

       Enables the user to upload (send) a file to your system. The
       file  will  be  placed in the  directory  specified  in  the
       optional data path.  FILES.BBS will be automatically updated
       to reflect the upload.  The /F option works in the same  way
       as in functions 31 and 32.

       After uploading a file,  the  user is  prompted  to  enter a
       one line  file  description.   If  however  the  "Long desc"
       option is enabled in RACONFIG   for  the file  area to which
       the file has  been uploaded, the user may  give  the  file a
       description  longer than  one line.   The file description a
       user enters is appended to the end of the FILES.BBS file for
       the  area in  which the  file has been  uploaded.  The  only
       exception  to this is when the  user asks for the file to be
       marked  private  for the  sysop only  by  starting  the file
       description with a '/'.   In  this  case   the  file details
       are recorded in "PVTFILES.LOG" in the system directory.

       If a user  selects to upload a file   while they are  logged
       onto a local node,  RemoteAccess  will  prompt them  for the
       full DOS path and filename of  the file they wish to upload.
       The user will then be prompted for  the file descriptions as
       normal and  finally the files will be  copied to the correct
       upload directory.  When uploading a  file locally it is also
       possible  for the  user  to  specify  a  Wildcard,  such  as
       "D:\FILES\BBS\RA*.ARJ".  This  would  enable  the   user  to
       upload multiple files matching the wildcard criteria.   

       Use the /L parameter  to enable long file descriptions  (see
       the section on FILES for more information on this feature).






                                    67

       Type          : 34
       Name          : View archive
       Optional Data : <Full path> or /F

       Allows  the user to view the contents of an archived file in
       the specified  directory. The following  archive formats are
       supported:
             
                  .ARC/PAK/PKA
                  .ZIP
                  .ZOO
                  .LZH/LZS
                  .DWC
                  .MD
                  .LBR
                  .ARJ
                  .HYP

       Menu templating   is supported with the /F option.   This is
       explained more fully in MENU TEMPLATES.



       Type          : 35
       Name          : File scan by keyword
       Optional Data : [area1 area2 area3 ...] or /F

       This function uses the data specified in RACONFIG to  search
       all  file  areas that the user has access to for a  key-word
       that  is supplied by the user.  Any FILES.BBS  entries  that
       match  are displayed with the name of the area the match was
       found in.  The default  is to  scan all  areas, but  you may
       specify  that only certain areas  be searched by putting the
       area numbers to include on the optional data line. 

       If you use the "/F" parameter you  can force RA to scan only
       the currently selected template file area.



       Type          : 36
       Name          : File scan by file name
       Optional Data : [area1 area2 area3 ...] or /F

       Same as function 35, but scans for an exact file name match.
       Wildcard and  pattern  matching characters  are  valid.  The
       default is to scan all areas, but you may specify that  only
       certain  areas be  searched by  putting the area  numbers to
       include on the optional data line.   The /F option works  in
       the same way as function 35.










                                    68

       Type          : 37
       Name          : Show new files
       Optional Data : [area1 area2 area3 ...] or /F

       Scans  all file  areas  which have  the  "New Files"  option
       enabled in RACONFIG  that  the user has access to, for files
       that   have  a date  more recent than the  date specified by
       the user. The default is  to search for files new  since the
       users last log-on. The default is to scan all areas, but you
       may specify that  only certain areas be searched  by putting
       the area numbers to include on the optional data line.   The
       /F option  works in  the same  way  as function 36 and 37.



       Type          : 38
       Name          : Type (view) a text file
       Optional Data : <Full path> or /F

       Allows  the  user to type to the terminal the contents of  a
       plain  ASCII/ANSI/AVATAR   text   file  in   the   specified
       directory.   This  is useful  for  on-line  file  lists   or
       magazines.  The /F option overrides  the path  name with the
       currently selected template file area path.   



       Type          : 39
       Name          : Display a fully named text file
       Optional Data : <Full path and name>

       Similar  to the type 5 function,  but allows you to  specify
       the  full  path and name (including extension) of  the  file
       that will be displayed.  Like the type 5 function, this also
       interprets the special control characters.



       Type          : 40
       Name          : Display a ASC/ANS/AVT text file with hotkeys
       Optional Data : <1-8 character name>

       Displays  an  ASC/ANS/AVT  text file the same way as  a type
       5 would,  but leaves  the current menu hot keys active while
       the  file is displayed.   This allows  the use  of elaborate
       graphics in  your menus  that would  be impossible to create
       with the line editor.   See also AUTOMATIC COMMAND EXECUTION
       for details on how to integrate these files into your menus.



       Type          : 41
       Name          : Toggle full screen editor
       Optional Data : None

       Allows  the  user to select or deselect the use of the  full
       screen message editor.  Use of the editor is only  permitted
       if the user has ANSI graphics enabled.


                                    69

       Type          : 42
       Name          : Toggle hot-keys
       Optional Data : None

       Allows  the  user  to choose  between  hot-keys  or  command
       stacking.  In  command stacking mode,  several commands,  or
       key-presses, can be specified on one command line by putting
       a semi-colon in between each command.



       Type          : 43
       Name          : NewMail {+}
       Optional Data : None

       Display a  full list of all  the message areas the  user has
       read  access  to,  highlighting  those  that contain  unread
       messages. This menu command  is only available in registered
       mode.



       Type          : 44
       Name          : Reset combined areas setting
       Optional Data : None

       Allows  the  user  to  turn  ON or OFF all available message
       areas for his/her combined message area setting.



       Type          : 45
       Name          : Display text file and wait
       Optional Data : <1-8 character name>

       This is the same as a type 5 function,  but prompts the user
       to  press  [Enter]  before continuing.  This is  useful  for
       displaying  text  files that are generated automatically  by
       utilities that don't append a Control-A (wait character)  at
       the end of the file.



       Type           : 46
       Name           : Display direct textfile with CR
       Optional Data  : <Full path and name>

       Displays  a text file with  a fully qualified  path and name
       and waits for the user to press [Return] before continuing.











                                    70

       Type          : 47
       Name          : Make a log entry
       Optional Data : <Log entry>

       When this command is executed,  it simply takes the contents
       of  the Optional Data field and writes it to the system  log
       as if it were a normal hard-coded log entry. The only  macro
       characters that are valid are:

            @ : Insert the name of the current template file area  
            ` : Insert the name of the current template msg area



       Type          : 48
       Name          : Download a specific file
       Optional Data : <Full path and name>

       Enables the user to download a file or set of files that you
       have  pre-defined,  using  a protocol of the user's  choice.
       Note  that  you  may specify wild-cards  and  pattern  match
       characters in the file name, but if you do, the user will be
       forced to use a batch transfer protocol. For example, a type
       48 command with the following optional data field:

            C:\FILES\RA\RELEASE\RA*.ARJ

       Would  send all files in the  C:\FILES\RA\RELEASE  directory
       that matched RA*.ARJ.



       Type          : 49
       Name          : Select message area
       Optional Data : None

       Displays  a  list of  all message  areas  the user  has read
       access to, and  asks the user to  select one by number.  The
       current message  template area  number is set  to the  users
       choice.  This allows the sysop to run a very low maintenance
       system,  since all  that  is required  to  add or  delete  a
       message  area  is  to  modify  the  configuration  file  via
       RACONFIG.



       Type          : 50
       Name          : Select file area
       Optional Data : None

       This operates in the  same way as the "select  message area"
       (type 49)  menu function,  but  uses file  areas instead  of
       message areas.







                                    71

       Type          : 51
       Name          : List today's callers
       Optional Data : [/H]

       Lists  every  caller  that  has  called  your  system  since
       midnight  along with log on/off times,  baud rate  and  what
       line the call was taken on. The /H switch will show  handles
       instead of read names.



       Type          : 52
       Name          : Show all users on-line
       Optional Data : [/H]

       Lists all users currently on-line. This would only be useful
       in a multi-node installation.  It shows where each caller is
       calling   from,  their   baud   rate, the   line  they   are
       connected to and what they are doing.



       Type          : 53
       Name          : Toggle "Do not disturb"
       Optional Data : None

       This is another multi-line feature only. It allows the  user
       to turn on or off the ability of other users to send him/her
       messages  with  the  type 54 function,  like - "Hey  Joe,  I
       noticed  that you're on line 3.  Wanna chat?" Note that  the
       sysop  has the ability to override this.



       Type          : 54
       Name          : Send an on-line message
       Optional Data : None

       Allows  the  user to send a message to another user  who  is
       logged on to  another line at the same time.  Provided  that
       the  other  user has not set his/her "do not disturb"  flag,
       the  sender  will be prompted for a one-liner  to  transmit.

       Depending on what the recipient is doing at the time, he/she
       will get the message ten to fifteen seconds later.



       Type          : 55
       Name          : Download any file
       Optional Data : None

       This  is an extremely powerful function that should be  only
       accessible  to the sysop.  It allows the user to download  a
       file  from  any  valid drive or directory using any  of  the
       available file transfer protocols. This is the ONLY download
       function that  takes no  account of  download  limits,  file
       ratios  or  transfer time, and does  not  update  the  users
       record to reflect the download.

                                    72

       Type           : 56
       Name           : Browse the nodelist {+}
       Optional Data  : None

       Allows the  user to browse the  nodelist. Includes functions
       to list  all zones, list all nets and regions in a zone, and
       list all nodes in a net or region.



       Type           : 57
       Name           : Change home/voice number
       Optional Data  : None

       Allows the  user to  modify his/her home/voice  phone number
       permanently.



       Type           : 58
       Name           : Change business/data number
       Optional Data  : None

       Allows the user to modify his/her business/data phone number
       permanently.



       Type           : 59
       Name           : Global download {+}
       Optional Data  : None

       Allows  the  user  to download  files  as  per  the type  32
       download command, but searches ALL areas the user has access
       to for  the requested  file(s). All  normal  time and  other
       security restrictions apply.



       Type           : 60
       Name           : Change handle
       Optional Data  : None

       Allows  the  user  to   select  a  new  handle.    Note that
       RemoteAccess will  not  allow the  user to choose a  name or
       handle which is in use by another user or a handle  which is
       listed in the "HANDLES.CTL" file.    RemoteAccess  will also
       not allow the use of "SYSOP" as a  handle.



       Type           : 61
       Name           : Toggle AVATAR
       Optional Data  : None

       Toggles the use of AVATAR codes (see the section on TERMINAL
       EMULATIONS for more information).



                                    73

       Type           : 62
       Name           : Toggle full screen message viewer
       Optional Data  : None

       Allows the user to select or deselect use of the full screen
       message  presentation  manager.  When  active,  this  option
       displays  all messages with a fixed header and uses ANSI and
       AVATAR codes for special screen manipulation.



       Type           : 63
       Name           : Select a new language
       Optional Data  : None

       Allows the user to  change their current  language  setting.
       (See LANGUAGE FILES for more details)



       Type           : 64
       Name           : Select a new date format
       Optional Data  : None

       Allows the user to change  his/her currently  selected  date
       format.   The  user   has  a choice  of  the following  date
       formats:


                   DD-MM-YY
                   MM-DD-YY
                   YY-MM-DD
                   DD-Mmm-YY




       Type           : 65 {+} Registered only.
       Name           : Change current users flags
       Optional Data  : <flagset><flagnum><action>

       This allows  you to  set on,  set off or toggle  any of  the
       users security flag  settings.  The "action"  determines how
       the flag  is to  be set.   The actions available are:


                          - : Turn flag OFF
                          + : Turn flag ON
                          * : Toggle flag


       For example,  if the  optional data was  "A1+ A2- D8*",  the
       flag A1  would  be turned  on,  A2 would  be turned  off and
       flag D8 would be toggled.






                                    74

       Type           : 66
       Name           : Toggle Text file shells
       Optional Data  : <ON|OFF>

       Enables/Disables textfile  file  shells.  This overrides the
       default  setting in RACONFIG for the one session.  (see TEXT
       FILE CONTROL CODES for more information)



       Type           : 67
       Name           : Toggle auto message-forwarding
       Optional Data  : None

       If a user  is going  to be  away for an  extended period  of
       time,  he/she  may  specify  the  name of  another  user  to
       whom all his/her mail is  redirected.    When this option is
       toggled on  the user  will be asked for the name of a person
       he/she wishes to forward his/her mail to. This name  must be
       a valid user listed in the system user database. If the name
       entered can not be located in  the user  database,  the user
       will  be given  the option  to view/search the user database
       and then reselect the user to forward mail to.





































                                    75

       Automatic command execution
       ────────────────────────────────────────────────────────────

       Normally  a  menu  function would be activated when  a  user
       presses  the  key  that you have linked  to  that  function.
       However,  it is possible to cause a function to be  executed
       automatically  as soon as a menu is displayed by setting the
       entry to "auto execute". As  soon as  that  particular  menu
       line    is     displayed  the     function    is    executed
       automatically,  without the need for the user to select  the
       option.  This  is a very powerful feature when used with the
       type 40 menu function,  which displays an  ASCII/ANSI/AVATAR
       text file  while  checking for menu hot-keys.  By setting up
       the  first line  of  a menu  as  a  type 40  with  automatic
       execution, as  soon  as the menu is called your text file is
       displayed instead of the normal menu lines.  This allows you
       to  design very  elaborate  graphical  menu  displays   that
       contain  extra information  about  the user by inserting the
       special  text   file  control codes.  What happens if a user
       "passes through"    a  menu by using a stacked menu command?
       In some cases you may want the automatic command to execute,
       for  example  to  redirect  the user  to  another  menu   by
       automatic execution of  a type 1 or 2. On the other hand, if
       the command is only for cosmetic purposes (maybe a text file
       to display some user statistics)  it would be better to skip
       the  command  and continue   straight to the next  menu. The
       rule is that the menu command will only be executed if it is
       the first entry in  the  menu  AND  it  is  not  a  'display
       textfile'  type function. 





       Special optional data switches
       ────────────────────────────────────────────────────────────

       There  are two special "switches" which may be placed at the
       end of the optional data field for any menu command:

       /NS    : This switch suppresses the usual clear screen  code
                that   RemoteAccess   sends  when  a  new  menu  is
                displayed, and is only useful when used with a menu
                navigation (GOTO, GOSUB etc) command.

       /K=xxx : {+}  Registered  only.    This  switch  places  the
                specified text <xxx> into  the user's  input buffer
                to be processed  exactly as  if it had been entered
                as a stacked command. This is an extremely powerful
                facility which can be used to link a number of menu
                commands together,  and customise a large number of
                hard-coded selection menus.








                                    76

       Menu templates                      
       ────────────────────────────────────────────────────────────

       The  biggest  drawback of other BBS packages that allow  the
       sysop  the flexibility of designing his or her own menus  is
       the amount of maintenance that is necessary in updating  the
       menus.  Until  now it was necessary to have a separate  menu
       for  each  file  and message  area.  The  RemoteAccess  menu
       templating system alleviates this problem by allowing you to
       set  up one menu that will act as a "skeleton" for all  your
       message  and  file areas.  Two "variables" are available  to
       you; "M" for the currently selected message area and "F" for
       the currently selected file area.  In your template menu(s),
       where you would normally put the message area number in  the
       optional  data field for say a "Read" command,  put in "/M".

       When  the read is selected by the  user,  RemoteAccess  will
       substitute this for a message area number.  Likewise,  where
       you would specify a full path for a file function, put a "/F
       in  the optional data field.  RemoteAccess will replace this
       variable with the path to the currently selected file area.

       To put a value into one of these two variables, simply put a
       "/M=<Area  Number>"  or "/F=<Area Number>" in  the  optional
       data field of a type 1,  2 or 4 menu command.  For  example,
       say   you  set  up  a  message  area  template  menu  called
       "MSGMENU", using the /M in the optional data fields. Another
       menu,  which  you have set up to list the available  message
       areas,  simply consists of type 1 or 2 menu commands to jump
       to MSGMENU. One menu line looks like this:

            <H>ard Disk Conference

       This is a type 2 command,  which will "gosub" to the MSGMENU
       menu:

            Type : 2

       On the optional data line,  put the name of the menu to jump
       to, and also set the template variable.

            Optional Data : MSGMENU /M=45

       45 corresponds to the hard disk conference area,  as defined
       in RACONFIG.

       There  are two other constructs that work with the  template
       commands. /M=+ or /F=+ will increment the currently selected
       template area  by one, and /M=- or /F=- will  decrement  the
       currently  selected template area by one.  RemoteAccess will
       automatically  scan  all  file (or  message)  areas  in  the
       specified direction to determine the next area that the user
       has been given access to.

       The current message and file  template  areas are  stored at
       logoff,  and when the user logs  back on they will be set to
       these message and file template areas.      



                                    77

       When user  logs on  for the  first time,   RemoteAccess will
       scan the file and message areas  and set  the user  selected
       template areas to  the first  area found to  which the  user
       security rights.

       There are a number of special characters that you can put in
       the display line of a menu which will display certain system
       information:


            ~  :  Displays time remaining today.

            ^  :  Switches between the normal line colours and  the
                  overall menu highlight colours. 

            ;  :  Don't display a carriage return / linefeed at the
                  end of the line.

            @  :  Displays the name (as defined in RACONFIG) of the
                  currently selected file template area.

            `  :  Displays the name (as defined in RACONFIG) of the
                  currently selected message template area.

           ^A  :  This will force RemoteAccess  to  wait until  the
                  user  presses   the  enter key.    To  enter this
                  character in the menu,  press CTRL-P  followed by
                  CTRL-A.
        
       You may also include  any valid  textfile control  code,  as
       listed in the TEXTFILE CONTROL CODES section of this manual.





       The global menu
       ────────────────────────────────────────────────────────────

       It is likely that there are some commands that you will want
       to  be available from every menu that the user sees. Instead
       of  duplicating these  for every  single menu,  simply place
       them by  themselves in a menu  called GLOBALRA. RemoteAccess
       searches   for  this   special  menu   and  if   it  exists,
       automatically appends it to the end of every menu.

       RemoteAccess  appends the  whole menu;  in other  words, not
       just  the commands but any  visible text as  well. Note that
       the global menu will always inherit the highlight colours of
       the current menu  it is  appended to. This  feature is  only
       available in the registered version {+}.









                                    78

       Setting up your menus                      
       ────────────────────────────────────────────────────────────

       Spend  some  time thinking about how your menus will be  set
       up.  Your BBS can be made to look as unique or as  "uniform"
       as  you like - you can choose a subjective  topology,  where
       the  menus are organised according to area of interest, or a
       functional topology,  where menus are organised according to
       their  function.  For example,  a functional topology  would
       group  all  message  areas  together  and  all  file   areas
       together,  whereas a subjective topology would perhaps group
       together  several message and file areas that were  related.

       The  diagram  below illustrates this by depicting  the  same
       systems using the two different topologies:

       FUNCTIONAL
                                         +----------Amiga messages 
                 +---------Messages menu |
                 |                          +----------IBM messages
       Main menu |
                 |                       +----------Amiga files    
                 +------------Files menu |
                                         +----------IBM files


       SUBJECTIVE
                                         +----------IBM files
                 +--------------IBM menu | 
                 |                       +----------IBM messages
       Main menu |
                 |                       +----------Amiga files    
                 +------------Amiga menu |
                                         +----------Amiga messages


       Alternatively,  you  could even use a combination of the two
       topology types.

       The  layout of your BBS is determined by how the  menus  are
       set up. In many cases a user will not realise that he or she
       is looking at a menu.  The best technique for creating menus
       is to create all the "low-level" menus first,  then the main
       menu, and then fill in between with the intermediate menus.
















                                    79

       Creating your menus                               
       ────────────────────────────────────────────────────────────

       Change to the system directory and fire up RACONFIG.EXE then
       select MANAGERS/MENUS;  this  then  takes  you into the menu
       editing  utility  which allows you to create and  edit  your
       menus.   When  run  it  will  present  you  with  a  list of
       languages,  after  selecting  the language  of the files you
       wish  to edit  you will then  be shown a  directory of menus
       that have already  been  created for that  language - select
       one,  with  the  cursor  keys and  press RETURN to edit,  or
       press INSERT to create a new menu.

       A  large  window  is opened that displays  a  line  by  line
       summary  of the menu.  You may select a menu item to work on
       by moving the highlight bar to the item with the cursor. You
       can then edit the following fields :


          User       : This field allows  you to  define what  will
          display      be displayed  to the  user on  the  menu for
                       this  menu  entry.   You may  use  any  text
                       control code in this field (See TEXT CONTROL
                       CODES section for  more information).  After
                       displaying  this  field  RemoteAccess  moves
                       the cursor down  one  line  to  prepare  for
                       the next menu command.   If you place  a ";"
                       as  the last  character on  the user display
                       line  RemoteAccess  will  not  move  down  a
                       and the  user  display  from the  next  menu
                       command will be added to the same line.

          Action     : Determines  what this  menu command will do.
                       (See MENU TYPES for more information).

          Optional   : This line is associated with the ACTION line
          data         and  contains  the option  parameter,  which
                       defines  how  the  various   menu   commands
                       function.   (See  MENU  TYPES   for  further
                       information) 

          Hot-Key    : In this field you specify the  key you  want
                       to activate this menu command.

          Automatic  : If enabled  this will make this menu command
                       execute immediately, without the user typing
                       any key.

          Colour     : This defines the colour of the USER DISPLAY.

          Security   : This defines the  minimum security level  at
                       which  a  user can select this menu command.
                       (See   the  SECURITY  section  for   further
                       details)

          Flags      : This sets  the flag  combinations  the  user
                       must have to select the  menu command.  (See
                       the SECURITY section for more details)


                                    80

       When editing the menus the following  keys are  available to
       assist you:


          [RETURN] - Edit the currently selected menu item.

          [INSERT] - Insert  a new menu item immediately before the
                     current item.

          [DELETE] - Delete the currently selected menu item.

          [ALT-D]  - Simulate what  the menu would look like  to  a
                     user.

          [ALT-L]  - Discard the  present  menu  and  load  another
                     from disk.

          [ALT-N]  - Re-select language.

          [ALT-P]  - View or modify the menu prompt, its colour and
                     the menu highlight colours.

          [ALT-S]  - Save the current menu to disk.



       You can run the menu editor directly,  without  having to go
       through the RACONFIG menus by  using the "-M"  parameter  on
       the RACONFIG command line,  For  example "RACONFIG -M"  (See
       the   section   on  COMMAND-LINE  PARAMETERS   for   further
       information).


       Let's create the LOGOFF menu.  Hit RETURN on the first blank
       menu  item to bring up the EDIT MENU ITEM window.  The first
       line  of this menu will just display a message to the  user,
       so  in  the  USER DISPLAY field,  put "You  have  chosen  to
       disconnect.  You may -". Move to the ACTION field and set it
       to  DISPLAY  ONLY.  Next select a suitable  colour  for  the
       display  line  in  the COLOUR field.  Since this is  only  a
       display line,  leave SECURITY and FLAGS as they  are.  Press
       ESCAPE  to return to the menu list,  and note the entry  you
       have just created.

       Now enter the user options for the menu.  Move to the second
       menu  entry  (add one with the INSERT key if necessary)  and
       press  RETURN  to edit.  We'll give the user the  option  of
       leaving a message to the sysop, so in the USER DISPLAY field
       enter  "<L>eave a message to the sysop".  Set the ACTION  to
       POST  A NEW  MESSAGE (this is under the heading of  MESSAGE-
       BASE COMMANDS). This command requires a couple of parameters
       in the optional data field - the number of the message  area
       to  post the message in and the /T= parameter,  to force the
       message  to be addressed to the sysop.  It might  look  like
       this:


       80 /T=Andrew_Milner


                                    81

       (Message area 80 is set up as a "Messages to the sysop" area
       that  contains local private messages).  Set the HOT-KEY  to
       "L"  - this is the key that will activate the  function.  We
       want  all  users to be able to leave a message,  so set  the
       security level to 1.

       The  third  line of the menu gives the user  the  option  of
       returning  to  the previous menu,  so set this to a type  3,
       with a suitable display line.

       The  actual log-off command is last.  This will be a type  9
       (Terminate  Call).  Set the hot-key to "G" and  the  display
       line to something like "<G>oodbye (Logoff)".

       The  final step is to set the highlight and prompt  options.
       Press  ALT-P  from the menu list to bring up the  EDIT  MENU
       SETTINGS  window.  Here you can tailor the menu by selecting
       the  menu  prompt  and  its  colour,  along  with  the  menu
       highlight colour.  Each menu line,  in addition to it's  own
       colour,  may  contain an overall menu highlight  colour.  To
       switch between the two colours on a menu line, simply insert
       the  ^  character;  Note that this character isn't  actually
       displayed  to  the  user,   it  just  toggles  the  colours.

       Experiment with this feature by inserting a few ^ characters
       on display lines and viewing the menu with the ALT-D key.

       Finally,  save  the menu by going back to the menu list  and
       pressing  ALT-S.  Save the menu with the name  LOGOFF.  Now,
       whenever  you need a "Goodbye" option in another menu,  just
       use a gosub (type 2) function to the menu LOGOFF.

       There  is  one  hard-coded  menu  called  TOP.  RemoteAccess
       searches  for this menu when a user logs on and displays  it
       first,  so it MUST be present. The layout of the top menu is
       up to you of course;  it is recommended that you look at the
       menus of other Bulletin Boards so you can incorporate  their
       best features into your own.






















                                    82

       EXTERNAL SUPPORT FILES
       ────────────────────────────────────────────────────────────
                    
       There  is  very little that is  actually  "hard-coded"  into
       RemoteAccess. Below is a listing of text files you can place
       in  the  text  file directory to give your system  just  the
       right "feel". See the section on TEXT FILE CONTROL CODES for
       a  list  of special characters that can be used  to  display
       system  and user information from any of these files.  Files
       marked  with  an asterisk (*) have a default prompt  if  the
       file is missing. All the files are plain ASCII which you can
       create  with your favourite  text  editor/wordprocessor such
       as the one in  RACONFIG,  or optionally ANSI  which you will
       need a special ANSI editor to create. RemoteAccess also  has
       the ability to display AVATAR files, which display faster if
       the user has an AVATAR terminal, and  can be  generated from
       your ANSI files by using the AVTCONV utility  supplied.  See
       the section on TERMINAL  EMULATIONS for further information.



       1ATATIME.A?? :  This file is displayed  if  a user tries  to
        *              log  on  to more  than one  line at once  if
                       multi-line  check  has   been   enabled   in
                       RACONFIG.

       ALTNEWS.A??  :  This file is displayed ONLY if  the NEWS.A??
                       file was not displayed to the  user  because
                       he/she requested to  skip it during an IEMSI
                       session.  If you want  all users to see your
                       news file regardless,  simply  copy NEWS.A??
                       to ALTNEWS.A??.

       BADFILES.A?? :  This file is displayed if the  user attempts
        *              to upload a  file  that  is  listed  in  the
                       BADFILES.CTL control file.

       BADPWD.ASC   :  This file is  displayed  when a user  enters
                       an incorrect  password and elects to leave a
                       message to the sysop.

       BIRTHDAY.A?? :  This file is displayed if  the current  date
                       is the same as the user's birthdate.

       DATEFMT.A??  :  This file is  displayed  just before  a user
        *              selects a new date format.   

       DNLDHRS.A??  :  This file is  displayed  if a  user attempts
        *              a  download  outside  the  allowed  hours as
                       defined in RACONFIG.

       EDITHELP.A?? :  This  file is displayed if the user asks for
                       help   while  using  the  built-in   message
                       editor.  
        
       ENDCHT.A??   :  This  file  is  displayed  when   the  sysop
        *              terminates chat  mode.



                                    83

       EXPIRED.A??  :  This   file   is  displayed  if  the  user's
        *              password has just expired,  just before  the
                       user is asked for a new password.

       FILEAREA.A?? :  If present, this file will be displayed when
                       the user is asked to select a  new file area
                       in place of the normal hard-coded list.

       GOODBYE.A??  :  This file is displayed when the  user elects
                       to   log  off,   just  before  the  user  is
                       disconnected.

       GROUP#.A??   :  These  files are  displayed  to users  of  a
                       particular group directly after the SEC#.A??
                       file.    For example,  the  file  GROUP1.A??
                       would be displayed to all users belonging to
                       user group 1.

       HANDLE.A??   :  This file is displayed just  before the user
                       is asked to choose a new handle.

       LANGUAGE.A?? :  This file is displayed in place  of the hard
        *              coded language selection list.

       LOCKOUT.A??  :  This  file is  displayed if  the sysop  uses
        *              ALT-L  while  a  user  is  on-line  to  lock
                       him/her out of the system.

       LOGO.A??     :  This   file  is   displayed  as  soon  as  a
                       connection is made.  This should contain the
                       name  of your system and perhaps some  other
                       general   information.  If  the  "Auto ANSI"
                       option  is enabled  in  RACONFIG,   RA  will
                       attempt  to  automatically   detect  if  the
                       remote terminal  is using  ANSI,  and  if so
                       will send the ANS file in place  of the  ASC
                       file. 

       MAILHELP.A?? :  This file is displayed if the  user asks for
                       help at the mailbox scan  prompt.  Note that
                       the user is only offered  help if  this file
                       actually exists.

       MAXPAGE.A??  :  This  file  is displayed  if a user tries to
        *              page  the sysop for a chat more  times  than
                       you have specified in RACONFIG.

       MSGAREA.A??  :  If present, this file is displayed  when the
                       user is  asked  to  select a message area in
                       place of the normal hard-coded list.

       MSGFWD.A??   :  If the user has message forwarding enabled  
                       this file will be displayed at logon.  

       NEWS.A??     :  This file is a general news bulletin that is
                       displayed  after  RemoteAccess  checks   for
                       waiting mail (if the option is enabled),  or
                       straight after the WELCOME file.     


                                    84

       NEWUSER1.ASC :  This file is displayed to a new user as soon
                       as  he/she  confirms  that  he/she   entered
                       his/her name correctly.

       NEWUSER2.A?? :  This  file  is displayed after the user  has
                       confirmed  that   he/she  entered  all   the
                       standard logon questions correctly.

       NO300.ASC    :  This file is  displayed if a 300 baud caller
        *              attempts  to log  on during hours  when  300
                       baud   is   not  allowed,   as  defined   in
                       RACONFIG.

       NOCREDIT.A?? :  This  file is displayed if a caller attempts
        *              to  enter a netmail message for which he/she
                       does not have sufficient credit.

       NOTAVAIL.A?? :  This  file  is displayed  if a user tries to
        *              page  the  sysop for a chat  outside  paging
                       hours, as defined in RACONFIG.

       NOTFOUND.ASC :  This   file  is  displayed  if  RemoteAccess
        *              cannot  locate the name of a user at  logon,
                       but before the user is asked to confirm that
                       he/she entered the name correctly.

       NOTSYSOP.A?? :  This file is displayed if a user attempts to
        *              post  a  message to "Sysop" in  an  EchoMail
                       message area.

       ONCEONLY.A?? :  This  file  is   displayed  just  after  the
                       NEWS.A?? file only once whenever the file is
                       altered, to each user.

       PAGEABRT.A?? :  This  file is displayed if the sysop chooses
        *              to abort a page for chat by the user.

       PAGED.A??    :  This  file is  displayed  after the user has
                       paged  for  a  chat if the  sysop  does  not
                       answer the page.  Something like "Okay,  the
                       sysop has been paged and will break in for a
                       chat if he/she walks past."

       PASSWORD.A?? :  This  file  is displayed before the user  is
                       asked  to select a new password.  This  file
                       should  stress the importance of choosing  a
                       suitable password!

       PRIVATE.ASC  :  This file  is displayed  if a new user tries
        *              to log on to your system and you have set it
                       up as a private, pre-register BBS. 

       RATIO.A??    :  This  file is displayed if the user tries to
        *              do  a  download which would  exceed  his/her
                       ratio of number of files.

       RATIOK.A??   :  This  file is displayed if the user tries to
        *              do  a  download which would  exceed  his/her
                       ratio of K of uploads to K of downloads.

                                    85

       READHELP.A?? :  This  file is displayed if the user asks for
                       help while reading messages.

       SEC#.A??     :  These  files are  displayed  to users  of  a
                       particular security level directly after the
                       WELCOME file,  but before the mail check (if
                       enabled).     For    example,    the    file
                       SEC10.ASC/ANS/AVT,  if  present,  would   be
                       displayed  to all users with security  level
                       10. 

       STARTCHT.A?? :  This file is displayed when the sysop breaks
        *              in for a chat  via  ALT-C.  Using the  shell
                       from    textfile    function    this   could
                       conceivably  be used to activate an external
                       chat utility.  See also ENDCHT.A??

       TIMEhh.A??   :  This  file is  displayed after WELCOME1.A??,
                       when  "hh" matches  the current  hour number
                       (24  hour  format). 

       TIMEWARN.A?? :  This  file  is displayed  at log  on if  the
        *              user's  time  limit  has  been  adjusted  to
                       accomodate an upcoming event.

       TODAYK.A??   :  This  file is displayed if the user attempts
        *              a download which would exceed his/her  daily
                       download limit.

       TOOSLOW.ASC  :  This  file  is displayed if a user tries  to
        *              log  on  at a speed lower than  the  minimum
                       required to log on to your system as defined
                       in RACONFIG. 

       TRASHCAN.ASC :  This  file  is displayed if a user enters an
        *              unacceptable  name at log on,  as listed  in
                       the TRASHCAN.CTL file. 

       VIP.A??      :  If  the user  who has logged on is listed in
                       the   VIP.CTL   file,  this  file   will  be
                       displayed just before the SEC#.A?? file.    

       WELCOME.A??  :  This file is displayed after the user logged
                       on,  or  in the case of a  new  user,  after
                       completing the new user procedure.  This can
                       be  a  fairly  elaborate title  screen  that
                       welcomes your users to the BBS.

       WELCOME1.A?? :  This file is  displayed  directly after  the
                       WELCOME file, and could contain extra system
                       information,   maybe  a  "today  in history"
                       quote, or something similar.

       XFERHELP.A?? :  This file is  displayed if the user  presses
                       the "?" key  on the  file  transfer protocol
                       selection menu.  It  should contain  general
                       information about  the  different  protocols
                       themselves.


                                    86

       XFERPROT.A?? :  This file is displayed  in place of the hard
        *              coded file transfer protocol selection.

       XFERTIME.A?? :  This  file is displayed if the user attempts
        *              a  download that would exceed his/her  daily
                       time limit.




       In   addition to these ASC/ANS/AVT files, there are a number
       of *.CTL files  that define various security aspects  of the
       system:

       BADFILES.CTL :  This file  allows you to  specify a list  of
                       files  that  users  may not  upload.  Simply
                       specify one file per line (wildcards valid),
                       for example:

                       *.GIF
                       NORTON*.*

                       Would not allow any files matching either of
                       these two patterns to be uploaded.

       FILES.CTL     : This   file   allows   you   to   mark   any
                       downloadable  file  on  your  system as free
       {+}             and/or  password  protected.  The  format of
       Registered      this file is:
       Only
                       <filespec> [/FREE] [/PWD=xxx]


                       Example:

                       \RAFILES\RA_110.ARJ /FREE
                       \RABETAS\RABETA.ARJ /FREE /PWD=RACCESS


                       Note  that  each   filename  must  be  fully
                       qualified with a path (drive name optional).

                       Here, RA_110.ARJ is  free.   Downloading  it
                       will   not   affect   the  user's   download
                       statistics.  Note that  even though the file
                       is free in this regard,  the user must still
                       have enough time remaining for the download.

                       RABETA.ARJ   is  both  free   and   password
                       protected with  the  password  RACCESS.  The
                       user must supply the correct password before
                       being allowed to  proceed with the download.
                       Passwords are case insensitive and a maximum
                       of 15 characters in length. 


       HANDLES.CTL   : This  file  allows you to list handles  that
                       you don't want people to be able to use.  It
                       is identical in format  to the TRASHCAN.CTL.

                                    87

       LIMITS.CTL    : This   file  allows  you  specify,  for each
                       security  level,  a daily time  limit,  file
                       download  limit  for  each  baud  rate,  and
                       optional  file ratios,  either in number  of
                       uploads to number of downloads,  or in total
                       kilobytes   uploaded   to  total   kilobytes
                       downloaded.  The  format of the file  is  as
                       follows:

       <Sec Lvl> <Time> <300> [1200] [2400] [4800] [9600]
         or:
       <Sec Lvl> <Time> <300> <1200> <2400> <4800> <9600> <R#> [RK]

                       Where  <Sec  Lvl>  is  the  security  level,
                       <Time>  is  the daily time limit,  <300>  to
                       <9600>   are  respective   download   limits
                       depending  on what baud rate the user  calls
                       at.   <R#>   is  the  ratio  of  uploads  to
                       downloads,  and [RK] is the ratio of uploads
                       in K to downloads in K.

                       If you only specify a download limit for say
                       300, 1200 and 2400 baud, the download limits
                       for  the  higher baud rates default  to  the
                       highest  baud rate specified,  in this  case
                       the limit set for 2400 baud.

                       If you specify a ratio by number (R#) value,
                       then the user will be required to upload one
                       file for every n they  download.  Similarly,
                       setting  the ratio by K will allow the  user
                       to  download only the specified kilobytes of
                       files per 1 kilobyte uploaded.


                       This is fairly complicated,  so look at this
                       example LIMITS.CTL:  

                           5  35  0
                           10 60  100 200 350 650 900 5 10
                           20 90  150 250 470 750 900 5
                           30 120 250 400 600 900 1200
                           50 300 900


                       Security  level  5 entitles the user  to  35
                       minutes per day, but no downloads.

                       Security  level 10 entitles the user  to  60
                       minutes  per day,  100k of downloads at  300
                       baud,  200k at 1200 baud, 350k at 2400 baud,
                       650k at 4800 baud,  and 900k at 9600 baud or
                       faster. In addition, the user must upload at
                       least  one  file for every five  downloaded,
                       and may not download more than ten times the
                       total size of files uploaded.




                                    88

                       Security  level 20 entitles the user  to  90
                       minutes  per day,  150k of downloads at  300
                       baud,  250k at 1200 baud, 470k at 2400 baud,
                       750k  at 4800 baud and 900k at 9600 baud  or
                       faster.  In  addition,  the  user  may  only
                       download  five  times  the number  of  files
                       he/she uploaded.

                       Security  level 30 entitles the user to  120
                       minutes  per day,  250k of downloads at  300
                       baud,  400k at 1200 baud, 600k at 2400 baud,
                       900k at 4800 baud and 1,200k at 9600 baud or
                       faster. There are no ratio restrictions.

                       Security  level 50 entitles the user to  300
                       minutes  per day,  and 900k of downloads  at
                       all speeds without any ratio restrictions.

       NAMES.CTL     : RemoteAccess    allows    you   to    assign
                       "shortnames"  to  users  you frequently send
                       messages to. Set up this  text file with the
                       following format, one entry per line:

                       <shortname>,<realname>,<address>[,<subject>]

                       Eg:
                       rahq,Andrew Milner,2:270/18,RemoteAccess..

                       To  use  this  feature,   simply  enter  the
                       shortname   preceded  by  an  asterisk  when
                       RemoteAccess asks you who the message is to.
                       In the above  example,  addressing a message
                       to "*rahq" would fill  in the to  field with
                       "Andrew Milner",  and the subject field with
                       "RemoteAccess..". If the message is netmail,
                       it would automatically be sent to 2:270/18.


       PHONENUM.CTL  : Use this file to  specify phone  numbers or 
                       segments  of phone  numbers  that you  know 
                       to be false. A PHONENUM.CTL  that contains:

                           00-
                           000-
                           -0000

                       Would  disallow  the numbers  "00-123-4567",
                       "000-123-4567",  "009-0000-1234".  The  rule
                       here  is that none of the specified  numbers
                       is  allowed to be imbedded anywhere  in  the
                       user's phone number.

       PWDTRASH.CTL  : Allows  you  to specify a list of  passwords
                       that  users  are not allowed  to  use.  This
                       could  contain  passwords  like  SECRET,  or
                       TEST.




                                    89

       TRASHCAN.CTL  : Allows  you  specify  a list of  names  that
                       users may not use to log on to your  system.
                       In this file,  specify the undesirable names
                       one  per  line.  If for example you did  not
                       want  the names "Sysop",  "Jack  Daniels" or
                       "Superman"  used,  simply put the  following
                       lines in this file:

                           Sysop
                           Jack Daniels
                           Superman

                       The   tests  done  on  names  is  NOT  case-
                       sensitive, so the name "SYSOP" would also be
                       invalid. Names that contain any part of  the
                       names in the list are not allowed either.


       VIP.CTL       : When a user who is listed in this file logs 
                       on,  a  short  bell is sounded at the local 
                       console,  and  if  the there is any text in 
                       the user's COMMENT  field (see "Information 
                       stored  in  the  user   database"),  it  is 
                       displayed on the status bar.

                       The format for this file is the same as the 
                       TRASHCAN.CTL and HANDLES.CTL files.

































                                    90

       THE USER DATABASE
       ────────────────────────────────────────────────────────────

       The  user file is possibly the most important single file on
       your BBS.  It contains all the information about each user's
       history, screen settings,  and vital security  data.  To use
       the user editor  fire up RACONFIG and  select Users from the
       Manager menu.  This  editor  allows  you  to add,  modify or
       delete any  user's record.  If  there are already some users
       in the user-file,  you will be presented with a list showing
       each user's  name,  location and  security  level.  Select a
       user either by typing in the name,  or moving the  highlight
       bar to the entry on the screen and pressing RETURN.

       After  the  user is selected you will be presented with  the
       Edit Screen.  This lists the entire user's record which  can
       be modified and saved if you wish. 

       If  there  are no users already in the user-file,  the  Edit
       Screen will appear immediately for you to enter the  details
       of  the  first user.  Note that the only required  piece  of
       information (or "field") is the name,  and you can't proceed
       any further until you enter one.  You'll want to be included
       in  the  user file,  so enter your own name in  this  field.

       After entering the user name,  you may continue to enter all
       fields.    When  you have finished  editing the  user record
       press  [CONTROL-ENTER]  to  save  the information  and  then
       ESCAPE to exit. If you don't want to save, just press ESCAPE
       by itself.

        
       The following keys can be used to assist  you in editing the
       user database:


          [INS]    This allows  you to add a new user, when pressed
                   in the  user list  screen,  a blank record  will
                   be created for you to  edit.

          [DEL]    Deleting a user  is accomplished  by  moving the
                   highlight bar to the user you want to delete and
                   pressing the DEL  key.  A marker  will appear in
                   the right hand column to  signify that the  user
                   is marked for deletion. Note that the user isn't
                   actually  removed  from  the user  file at  this
                   stage.  Users that have been marked for deletion
                   are  removed  by  packing  the user-file,  which
                   should be  done  regularly  using   the  utility
                   RAUSER.

          [ALT-S]  If you  want  to search  for a  particular  user
                   record to  edit,  you can  press ALT-S,  you are
                   then prompted for the search criteria at the top
                   of the screen.

       You can  run the user editor directly   without having to go
       through the RACONFIG menus by entering "RACONFIG -U".


                                    91

       Information stored in the user database
       ────────────────────────────────────────────────────────────

       This  section  details all  the information  contained about
       each user in the user database:


       Name               : User's full name
       Handle             : User's registered handle
       Location           : Where the user is calling from
       Password           : Secret password
       Security           : Security level (1-64000, 0 to lock out)
       Home#              : Home/voice telephone number
       Business#          : Business/data telephone number
       A flags            : "A" flag settings ("-" or "X")
       B flags            : "B" flag settings ("-" or "X")
       C flags            : "C" flag settings ("-" or "X")
       D flags            : "D" flag settings ("-" or "X")
       Credit             : Netmail credit remaining
       Pending            : Value of unsent (unexported) netmail
       Uploads            : Total number of uploads
       Dnloads            : Total number of downloads
       UploadK            : Total kilobytes of uploads
       DnloadK            : Total kilobytes of downloads
       TodayK             : Kilobytes downloaded today
       Comment            : Comment, can contain anything
       Forward            : Name person mail is being forwarded to
       Last time          : Time user last called
       Last date          : Date user last called
       1st date           : Date user first called
       Sub date           : Subscription expiry date
       Birthdate          : Date of birth
       Time used today    : Minutes used today
       Screen length      : User's screen length
       Last Pwd change    : Number of calls since last pwd change
       Messages posted    : Total number of messages posted
       High msg read      : Highest message read
       Number of calls    : Number of calls the user has made 
       Last msg area      : Last msg area the user had selected 
       Last file area     : Last file area the user had selected
       Deleted            : Delete user when database is packed?
       Screen clear       : Send screen clear codes?
       Page pausing       : Pause at the end of each screen?
       ANSI graphics      : Send ANSI codes?
       AVATAR graphics    : Send AVATAR codes?
       No Kill            : Never kill user?
       Xfer priority      : Ignore download hours and ratios? 
       Full screen editor : Use the full screen ANSI msg editor?
       Quiet mode         : Ignore online messages?
       Hot-keys           : Use hotkeys?
       Full screen viewer : Use the full screen msg viewer?
       Hidden             : Hidden from the user list?
       Group number       : User's group number (1 - 255)
       Language           : Language number selected
       Date Format        : Date entry format





                                    92

       Packing and sorting the user file               
       ────────────────────────────────────────────────────────────

       RAUSER.EXE is the utility that is used to maintain the user-
       file.  Not only will it remove users marked for deletion, it
       can  also delete users that have not called your BBS  for  a
       certain number of days as well as sort the users in order of
       security  level  and surname.  RAUSER may be  run  from  any
       directory,  will automatically locate system and user files,
       and will insert an activity summary in your system log.  The
       following command-line parameters are valid:


            -P       Pack the user-file, removing users marked  for
                     deletion.

            -S       Sort users in  order  of  security  level  and
                     surname.

            -D[n]    Delete users who have not called for [n] days.
                     Note that this parameter implies a pack       
                     operation.

            -V       Verbose logging; list any users that were     
                     deleted during a pack operation.

            -M[s]    Specify the maximum security level user to be 
                     affected by a pack or delete  operation.  Put 
                     another way : "exempt all users with security 
                     level [s] and above from being deleted" .






























                                    93

       THE MESSAGE DATABASE
       ────────────────────────────────────────────────────────────

       RAMSG is the RemoteAccess message  base maintenance utility.
       It's primary function is  to trim the number of  messages in
       local   and echomail conferences  and maintain them   at   a
       manageable   level. RACONFIG provides the  ability to enter,
       add  and  maintain     message  areas  -  RAMSG  uses   this
       information (contained in MESSAGES.RA)  to delete old and/or
       excess  messages.   RAMSG will   also   attempt   to  repair
       damaged  message bases; it has a  number of integrity checks
       built  in so that  if it detects  that the message  base  is
       damaged in  any way,  it will automatically  re-create index
       files  (even   if  they are  missing)  and warn  of possible
       problems.

       All of   RAMSG's activities are logged in  the  system  log.
       Some options are provided for statistical information.

       Note that a value of 0 in any of  the fields on the  message
       area entry  screen in  RACONFIG will cause  RAMSG to  ignore
       that  option. For example, if the maximum number of messages
       is set  to 0, RAMSG will not  kill messages based on number.
       Prior to running  RAMSG, you  should  ensure  that all areas
       have been set up correctly.

       RAMSG invoked  without a command line  results  in   a  help
       screen being displayed.

       When  one or more of the arguments below is specified, RAMSG
       searches  for CONFIG.RA  (first the current  directory, then
       via the  RA  environment  variable),  MESSAGES.RA  (in   the
       current directory,  then the system directory)  and then the
       message base files.   Failure to  find one or more  of these
       files will result in  RAMSG aborting. If CONFIG.RA is  found
       and the system  log file can be  opened, RAMSG will  log any
       errors there.






       Message database size limitations
       ────────────────────────────────────────────────────────────

       Due  to the  message  database file  structures, there  is a
       maximum  physical limit  on the  number  of messages  it can
       contain.  The maximum  number of  messages the  database can
       hold is approximately 16,000.  You should configure RAMSG so
       that this limit is never exceeded.

       There  is  also a  limitation on  the  value of  the highest
       numbered message, which may never  exceed 32,767. It is good
       practice  to regularly  (preferably  nightly)  renumber  the
       message  database  to  ensure   that  this  limit  is  never
       breached.



                                    94

       Packing and renumbering the message base
       ────────────────────────────────────────────────────────────

       RAMSG Command summary
       ---------------------

        -I Re-create index files & check
           C=Kill crosslinked messages
           U=Kill unknown boards
           R=Renumber

        -P Pack (compress) message base
           K=Purge 
           R=Renumber
           O=Overwrite
           A=Overwrite if necessary 

        -K Purge messages from info in MESSAGES.RA

        -L Link reply chains

        -R Renumber messages

        -S Display/log message base statistics
           All options:  S=Statistics  V=Verbose stats




       RAMSG functions (NOT case sensitive)
       ------------------------------------

               -I      INDEX [Options : C, R, U]

                       This  option  rebuilds   the   message  base
                       index files,  MSGIDX.BBS,  MSGTOIDX.BBS  and
                       MSGINFO.BBS. It also checks the integrity of
                       all  message  base  files and rebuilds other
                       information  as  necessary.  Errors  in  the
                       message base are logged.

                       During the  index  rebuild,  you  may choose
                       to  delete  messages  from  unknown  message
                       areas (those areas which  have no  entry  in
                       the name field)  and  messages  with message
                       board  numbers  outside  the valid  range of
                       1-200.

                       Under some circumstances RAMSG  may detect a
                       "sequence error" (when  numbers are  out  of
                       order).  Since   this   causes   significant
                       problems with  software  using  the  message
                       base,  RAMSG  considers  this  serious,  and
                       therefore   will   not  proceed   with   any
                       operation other than an index  rebuild until
                       this is corrected using the "R"  option,  to
                       force message base renumbering.



                                    95

                       "Crosslinking"   of  message  text  is  also
                       considered a serious problem, and this  will
                       prevent  RAMSG  repacking  the message base.
                       Cross-linking  occurs  when  more  than  one
                       message references the  same section of text
                       in MSGTXT.BBS.

                       Following are some examples  of  what  an   
                       index rebuild command might look like:

                       RAMSG -Icu

                       Rebuild indices,  kill  messages in  unknown
                       areas and crosslinked messages.

                       RAMSG -I

                       Rebuild index files only.


               -P      PACK  [options : K, R, O, A]
               
                       Packs the message base, by  eliminating all 
                       deleted messages and message text. Deleting 
                       (the -K option, for example) messages  does 
                       not  remove  them  from  the  message  base
                       files, it simply marks them  for  deletion. 
                       You  MUST  pack the message base to reclaim 
                       the   space   occupied  by  these   deleted 
                       messages.

                       PACK also provides options  to  purge  old/ 
                       excess messages (same as -K, except that -K 
                       does  not  pack) and renumber (same as -R), 
                       so all standard  maintenance  functions can 
                       be carried out in the one command.
                       
                       RAMSG  normally  packs  the message base by 
                       copying messages from the existing  message 
                       base  into  temporary  files,  deleting the 
                       original files, then renaming the temporary 
                       files to their  correct names.  This is the 
                       safest option to  use, since it is possible 
                       to  rebuild  the  message  base if  for any 
                       reason the PACK process is interrupted (for 
                       example, by  power  failure). However, this 
                       requires t hat  at least as  much  space as 
                       occupied by  the  old message base files be 
                       free on your hard disk.                     
            










                                    96

                       To get around this, RAMSG provides an option
                       to pack the  message  base "on top"  of  the
                       existing one without using temporary  files.
                       This directly overwrites the existing files;
                       and  the problem with  this is  that  if the
                       process is interrupted, the message base may
                       be irreparably  damaged and  data  could  be
                       lost.  To use overwrite mode, RAMSG requires
                       the 'o'  option  in the  PACK  command; this
                       forces   overwriting   unconditionally.   To
                       ensure that the message  base  is processed,
                       while    taking   advantage   of   a   safer
                       environment,  RAMSG  also  provides  an  'a'
                       option, which will use  overwrite  mode only
                       if there is insufficient space for a regular
                       pack.

                       Examples:

                       RAMSG -Pkra

                       Pack  the   message   base,  kill   messages
                       according  to  information  in  MESSAGES.RA,
                       renumber  messages  and  use overwrite  mode
                       only  if   insufficient  disk  space  for  a
                       regular pack.

                       RAMSG -Po

                       Pack the message base, using overwrite mode.


               -K      Purge messages

                       This option purges messages according to the
                       maximum  number  of   messages   and   aging
                       information  specified  for  each   area  in
                       MESSAGES.RA. Note  that the messages are not
                       actually removed, they are simply marked for
                       deletion.  Use the  pack command  to reclaim
                       the space that these messages occupy.


               -L      Link reply chains

                       Links  reply  chains  in  each  area   (this
                       is  automatically  done by other maintenance
                       functions  where  necessary). You  would use
                       this  option by  itself  after  an import by
                       your echomail processor, for example.


               -R      Renumber messages

                       Renumbers the message base.  This option may
                       also  be  used to  cure  "out  of  sequence"
                       errors.



                                    97

               -S      Display/log message base statistics

                       Simply logs message base and disk statistics
                       for  your  own information. A 'v' after this
                       option  displays verbose statistics for each
                       message area.


       You may  run several  operations on  the same  command line,
       but since there is  some overlap in functionality,  the need
       to do  this is rare.   One instance of where  you might need
       this  facility  is  to force the message base to  be "clean"
       prior running a pack; for example:

               RAMSG -Pkra

       Checks/rebuilds index files, deleting  messages in unknown  
       areas,  fixes cross-linked messages and forces a  renumber  
       to fix sequence errors.  It then will proceed to pack and   
       renumber the message base   after  killing  excess/expired  
       messages using overwrite mode if required.


       Several errorlevel  exits are provided to  allow  management
       by batch file:

               1       No arguments specified; help message given. 
               2       Cannot access/locate CONFIG.RA
               3       Out of or insufficient memory
               4       Error opening/locating a file
               5       Serious IO error





























                                    98

       MAIL NETWORKING
       ────────────────────────────────────────────────────────────
                   
       What  is a mail network?  Basically it is a set of  bulletin
       board  systems  that are capable of exchanging messages  and
       files   with   each  other  without  the  need   for   human
       intervention.  All  the discussion which follows relates  to
       FidoNet,  the world's largest amateur mail network.  FidoNet
       consists of approximately 10000 bulletin board systems, each
       of  which is assigned a unique "address".  A file  called  a
       nodelist   stores  all  these  addresses  along  with  other
       information  about  each  system.   Think  of  it  like   an
       international "telephone book".

       Being  part of a network has two basic attractions;  NetMail
       and EchoMail.  NetMail allows you to send a private  message
       to  any  user  of  any one of the bulletins  boards  in  the
       network at little or no cost to you. EchoMail is a method of
       creating  a huge message area that many hundreds of  systems
       can potentially participate in.  Usually all EchoMail  areas
       will  contain only public messages,  and are organised  into
       either  general  discussion areas,  or areas that deal  with
       specific issues and or topics.

       The net is organised into several levels,  which are usually
       based on geographical proximity.  At the highest level there
       are five "zones";  zone 1 is the USA, zone 2 is Europe, zone
       3  is the Pacific Rim,   zone 4 is  South America, zone 5 is
       Africa and zone 6 is Asia.  Within each zone are a number of
       "regions"  that span  large geographical  areas.   Typically
       there will be between 5 and 18 regions per zone. Each region
       is further divided into "nets".   Each  net  has  a   unique
       net   number,   and   the distribution of these nets is also
       based  on  geographical   and  technical     considerations.
       Finally,  within   the net are  a number   of nodes.  A node
       refers to a single bulletin  board system. 

       To find out about obtaining a node number,  or an "address",
       contact  the nearest FidoNet bulletin board.  The sysop will
       usually be more than happy to help you out.

       Before  going  any  further,  let's  talk  about  the  extra
       software you will need to set up as a node. Firstly you will
       need  an  echomail  processor.  This is  the  program  which
       unpacks the mail you will receive,  and imports it into your
       RemoteAccess  message-base,  as well as packing up  outbound
       mail  that  needs  to be sent  out.  RemoteAccess  does  NOT
       include  such  a beast.  There are several other  processors
       around that will do the job:

            ZMailH, by Jason Steck,
            TosScan, by Joaquim Homrighausen,
            GEcho, by Gerard van der Land,
            IMAIL, by Fabiano Fabris.






                                    99

       The  other  piece  of  software you'll  need  is  a  mailer.
       RemoteAccess  will  not  directly  communicate  with   other
       network  bulletin  boards,  so a separate program fills  the
       gap. The  two most  widely used  different types of  mailers
       are:

            FrontDoor, by Joaquim Homrighausen,
            BinkleyTerm, by Bit Bucket Software.

       Both of these products  are available on a  shareware basis,
       and  like  the  echomail processors,    will    usually   be
       available   on  most  FidoNet bulletin boards if you ask the
       sysop nicely enough.

       The  node  number  you are assigned will be  of  the  format
       Zone:Net/Node.Point.  This initial node number should be put
       into  your  configuration file using the ADDRESS  option  of
       RACONFIG. Don't worry about the AKA addresses at this stage.

       The next step is to set up your EchoMail message areas.  You
       will  usually be given a list of areas that are available to
       you.  Each  area is identified by an uppercase  alphanumeric
       name. As far as RemoteAccess is concerned, all you need is a
       description  of each area you plan to "plug into".  Fire  up
       RACONFIG,  and  go to the MESSAGE AREAS  window.  Select  an
       unused  message area,  and enter the area's name in the NAME
       field.  Next,  set the TYPE OF MAIL field to  ECHOMAIL,  and
       MESSAGE  STATUS to PUBLIC.  Most EchoMail areas don't  allow
       the  use of aliases,  so set the area  to "real names only".
       The AKA   ADDRESS line shows  your assigned node number.  If
       it   doesn't,   hit  RETURN on  this option  and  select the
       correct address.

       Each  EchoMail message  that is posted on your system  could
       potentially be read by hundred of other sysops and users, so
       you can put a "one-liner" at the end of each message. In the
       ORIGIN LINE field enter a short message. This should contain
       at least the name of your system,  and possibly where it  is
       or the phone-number, so that other users know where to call.
       Your node number is also appended to the end of the message,
       so a typical origin line might read:

            * Origin : RemoteAccess Central (2:270/18)

       Don't  put  the "* Origin" part in - this is added  by   the
       software).  If  you  don't  specify an  origin  line  for  a
       particular  area,  RemoteAccess will use the DEFAULT  ORIGIN
       LINE.

       If running  a multi-node  system, the  line number  that the
       message was posted on may be inserted in the origin line  by
       using the '@' macro character in any origin line definition.








                                    100

       The  next  step  is to configure RemoteAccess  for  NetMail.
       Select another unused message area,  and call it  "NetMail",
       or something similar. Next, set the TYPE OF MAIL to NETMAIL,
       and  MESSAGE STATUS to PRIVATE.  NetMail messages don't have
       origin lines appended to them so leave the origin line entry
       blank.  RemoteAccess  incorporates  a  comprehensive  online
       nodelist browsing facility, which allows users to search for
       nodes  in particular zones,  regions or  nets.  The  section
       INSTALLING  NODELIST  FILES  explains  how  to  enable  this
       feature.

       That's it!  RemoteAccess is now fully configured for network
       mail.  Assuming that you have a suitable mailer and echomail
       processor,  all that is required is to set them up correctly
       and you're in business.  An explanation of setting these  up
       is beyond the scope of this document,  full instructions are
       available with each respective package.











































                                    101

       Installing the nodelist files 
       ────────────────────────────────────────────────────────────

       Most  other BBS software requires you to maintain large  and
       unwieldy   custom  nodelist  files  for  NetMail  operation.
       RemoteAccess  uses the "raw" (St.  Louis) nodelist that  you
       already  have for your front-end mailer,  in addition  to  a
       small  (around 5K) index file.  The key to the system is the
       nodelist index compiler (RANODE.EXE). You should adjust your
       batch files so it is run every time any changes are made  to
       your  raw nodelist (when you receive a NODEDIFF update,  for
       example).  RANODE can be run from any directory, and locates
       your raw nodelist via the NODELIST PATH defined in RACONFIG.

       It  scans the most recent nodelist present and produces  the
       index     files    (NODEIDX.RA  and NODEINC.RA)   in    your
       RemoteAccess     system directory.   If   you  have multiple
       nodelists  to process,    simply specify  the  names of  any
       additional  nodelists  on  the command-line  when  RANODE is
       executed.  

       Example  :  Compiling  a  FidoNet  nodelist  only.  The  raw
       nodelist  is in the C:\NODELIST directory.  Simply set  your
       NODELIST  PATH  in RACONFIG to C:\NODELIST,  and run  RANODE
       whenever you process  a nodediff,  without any  command-line
       parameters.

       Example : Compiling a FidoNet and ParaNet combined nodelist.
       The  FidoNet  NODELIST.nnn  and  ParaNet  PARALIST.PVT   raw
       nodelist  files  are in C:\NODELIST. Simply run  RANODE with
       the following parameter:

            RANODE PARALIST.PVT

       Up  to ten  nodelists  (including the  FidoNet  one) may  be
       specified -  wildcards and pattern  matching characters  are
       valid.

       Note that  it  is  not  necessary  to  specify  the  FidoNet
       NODELIST.nnn  as well,  as RANODE  includes the  most recent
       FidoNet nodelist automatically.


       In  order to control the volume of netmail your users  send,
       each user has a "netmail credit" field in his or her record.
       RemoteAccess   will  give  all  new  users  a  credit  limit
       based  on  the NEW USER NETMAIL CREDIT setting in  RACONFIG.

       You  define  the  cost  of sending a  single  message  to  a
       particular node in a control file called NODECOST.CTL  which
       is located in the RemoteAccess system directory. Each time a
       user sends a netmail message, it's cost is deducted from his
       or her account.

       The cost structure for your entire nodelist is set up by one
       or more entries of five keywords:




                                    102

       DEFAULT <cost>

       Assigns <cost> to any nodes that are not assigned a specific
       cost later on in the control file.



       ZONE <zone> <cost>

       Assigns  <cost> to all nodes in <zone>.  This overrides  the
       DEFAULT keyword.



       REGION <region> <cost>

       Assigns <cost> to all nodes in <region>.  This overrides the
       DEFAULT and ZONE keywords.



       NET <net> <cost>

       Assigns  <cost>  to all nodes in <net>.  This overrides  the
       DEFAULT, ZONE and REGION keywords.



       NODE <node> <cost>

       Assigns  <cost> to <node>. <Node>  is a fully qualified node
       address. This overrides all other keywords.


       Sample NODECOST.CTL:

       DEFAULT       200 ; A message to anywhere costs 200 cents,
       ZONE      3    60 ; except in zone 3, which costs 60 cents.
       ZONE      2   260 ; Messages to zone 2 cost a bit more,
       REGION   55    30 ; Within our region only costs 30 cents.
       NET     690     0 ; Msgs within our net are free,
       NODE    690/999 5 ; except this node which isn't local.


       The  control  file may contain a maximum of 150  entries  of
       each  keyword,  and  duplicate  entries  are  obviously  not
       permitted.













                                    103

       MULTI - NODE OPERATION
       ────────────────────────────────────────────────────────────

       It  is  assumed  that  you have some  knowledge  of  running
       RemoteAccess already, or have at least run a single line BBS
       for some time.  If you haven't,  it is strongly  recommended
       that   you run one line  for a little while  to  familiarise
       yourself with the terminology and operation of RemoteAccess.

       The  idea of multi-node operation is that more than one user
       can be on-line at the same time to the same BBS.  To do this
       safely,  it  is  necessary for RemoteAccess  to  manage  the
       configuration   and  data  files  it  uses  very  carefully.

       Firstly,  tell RemoteAccess that it's running in  multi-node
       mode  by setting the MULTI LINE option to "Yes" in RACONFIG.
       You  should  also set CHECK FOR MULTI LOGON  to  "Yes".  Not
       doing this can cause unpredictable  results when a user logs
       on to more than one line at once.

       Set the  SYSTEM LOG NAME to  "RA.LOG". Make sure you  do NOT
       specify a full path with the name.

       Next create one child directory of your system directory for
       each line you intend to operate. For example, assuming  that
       the  system  directory  is   C:\RA,  for  two  lines  create
       C:\RA\LINE1 and C:\RA\LINE2 (the actual directory  names are
       not important).

       At  this  stage, ensure  that  the  RA environment  variable
       points to the system  directory so each line will be able to
       locate the configuration files.

       Why  separate directories? Many  on-line utilities and doors
       are not  multi-node aware,  so they  must  be isolated  from
       themselves in the  event that more than one copy of the same
       door is executed at the same  time. Thus it may be necessary
       to place  extra configuration files  for some doors  in each
       line directory. 

       For example, to install QuickEd in a multi-node environment,
       ensure that QUICKED.EXE is in the system directory (C:\RA in
       this  example)  and  that  the EXTERNAL  EDITOR  setting  in
       RACONFIG  is set  to  "C:\RA\QUICKED.EXE".  To complete  the
       installation, copy  the  files QUICKED.HLP  and  QUICKED.CFG
       into  each  line  directory; these  two  files  need not  be
       present in the system directory.

       All that is necessary now is to  create the batch files that
       call each copy of RA for each line:

       REM Sample batch file to fire up line 1
       :START
         CD \RA\LINE1
         RA -N1
         REM Check errorlevels etc
         GOTO START



                                    104

       Note  that   the  -N1   parameter  is  not   required  since
       RemoteAccess defaults  to line 1;  it is  included only  for
       completeness.

       REM Sample batch  file to  fire up line  2, using  FrontDoor
       REM as a front-end mailer in shell to mailer mode
       :START
         CD \RA\LINE2
         RA -M\FD\FD.EXE*M -N2
         REM Check errorlevels etc
         GOTO START

       RemoteAccess will  keep a  separate system log  (RA.LOG) and
       usage graph file (TIMELOG.BBS) in each line directory.

       The  placement  of the EXITINFO.BBS  and  DORINFO1.DEF  door
       files is handled differently in a multi-node environment. In
       a  single  line installation these files are written to  the
       RemoteAccess system directory.  In multi-node mode they  are
       written  to the current  (default) directory,  thus ensuring
       that each door has it's  own set of info files from  the BBS
       at all times.

       Additional  configuration  flexibility  is  provided  in the
       method RemoteAccess uses to locate  the configuration (*.RA)
       files. If one or more of the *.RA config files is present in
       a particular  line directory, then the  information in those
       files  will  override  the   information  contained  in  the
       corresponding config file in the system directory.

       For  example, it  may  be necessary  for  each line  to  use
       different  modem  configuration  information. This  data  is
       contained in CONFIG.RA, so make a copy of  this file in each
       line  directory.  Change to  the  line 1  directory  and use
       RACONFIG to edit the  modem settings. Save your changes  and
       repeat the procedure for line 2. When RemoteAccess fires up,
       it  will use the CONFIG.RA in the current directory that you
       just edited,  and  the  other  config files  in  the  system
       directory.

       The  LIMITS.CTL file works in the same way; you may override
       the global settings in the system directory by making a copy
       of LIMITS.CTL in  one or more  line directories and  editing
       with an ASCII text editor. This enables each line to exhibit
       different  download  and  time  limits  for  one  particular
       security level.

       Beware  of  third party utilities that write to  the  system
       files!  RemoteAccess  is specifically written so  that  many
       users  can read and post messages simultaneously to the same
       message-base,  but other programs probably AREN'T. Check the
       documentation  very  carefully  before  you  fire  up   your
       favourite  off-line  mail editor and start posting  messages
       while someone else is on-line.  Similarly,  if your echomail
       processor  does  not  lock  the  message-base  files   while
       working,  you  should set up your system to ensure that mail
       is  never imported when there is a user  on-line.  Exporting
       messages however, IS permitted.


                                    105

       It's  quite  likely that you'll need to increase  the  FILES
       setting  in  your  CONFIG.SYS  if  RemoteAccess  is  running
       several  lines  under  a multitasker.  You'll  also  need  a
       separate  batch-file  for each line to  invoke  RemoteAccess
       with the correct command-line parameters.  See the reference
       section on command-line parameters for information on the -N
       parameter.

       It  is  ESSENTIAL that  you  load  SHARE.EXE when  operating
       multi-node. SHARE is  a utility  that comes  with DOS  which
       RemoteAccess uses  to lock the  database files  it uses,  to
       ensure  that no conflicts  occur. Not using  SHARE is asking
       for trouble; you  risk severe corruption  of both your  user
       and message database files.














































                                    106

       REFERENCE SECTION
       ────────────────────────────────────────────────────────────


       Sysop keys                     
       ────────────────────────────────────────────────────────────

       The following keys work while a user is on-line:


       [F1]          : This  displays   the  users name,  location,
                       security,  time remaining,  connection speed
                       and the line  number he/she is on.   If  the
                       user has ANSI or AVATAR emulations  on  this
                       is also displayed on this line.

       [F2]          : This displays the users voice and data phone
                       numbers, the date and time on which the user
                       last called, the date the user first called,
                       the number of times the user  has called and
                       the age and birthday of the user.   

       [F3]          : The number  of files  the user  has uploaded
                       and downloaded is displayed,  including  the
                       total  kilobytes  of the  uploads/downloads.
                       Also,  on  this line,  is the users security
                       flag combinations.

       [F4]          : This displays the system statistics such as;
                       Last caller,  total  system  calls,  current
                       time,  printer  status,  local screen status
                       and the  time  and errorlevel  of  the  next
                       system  event.  

       [F5]          : This displays the total  number of  messages
                       posted by the user,  highest  message number
                       the   user  has  read,  the  users  selected
                       language,  the  users   group   number,  the
                       amount of  netmail  credit the  user has and
                       the users handle.

       [F6]          : User's reason for wanting chat (if any).

       [F7]          : Interactive EMSI session information.

       [F9]          : Help! Hot-key summary.

       [F10]         : Turn off the status bar to show exactly what
                       the  user is seeing. [F1] to [F5] brings  it
                       back.

       [CTL-A]       : Opens  and  closes a capture file  during  a
                       chat session.

       [ALT-Fn]      : Activate one of ten programs in a shell,  or
                       exit to DOS at a certain errorlevel.

       [ALT-A]       : Disable/enable answering (only available at 
                       the "wait for call" screen).

                                    107

       [ALT-C]       : Break in for  a chat  if there is a user  on
                       remotely.  ESC finishes chat mode and  drops
                       the user back to the BBS.

       [ALT-D]       : Toggles  "Snoop" mode, ie. whether the local
                       screen shows what the user is doing.

       [ALT-E]       : Activates a pop-up user attribute editor for
                       the user currently online. 

       [ALT-H]       : Hang up on the user immediately.

       [ALT-J]       : Drop to a DOS shell while the user is  still
                       on-line.

       [ALT-L]       : Lock the  user out of the system by dropping
                       his/her security level to zero  and  hanging
                       up.  

       [ALT-N]       : Toggle "sysop on next".  When  this mode  is
                       activated   (indicated  by  [NS]  on  the F1
                       status  bar),  RemoteAccess  will pause  and
                       page  the  sysop  for  two  minutes when the
                       current user  logs  off.  After  paging  the
                       sysop RA will then exit with  and errorlevel
                       of "2".    {+} Registered only.

       [ALT-O]       : Override paging  hours.  This allows you  to
                       enable or disable sysop paging regardless of
                       the time.  Note that this is permanent,  and
                       affects all lines until reset.

       [ALT-P]       : Toggle printer logging.

       [ALT-S]       : Modify the current user's security level.

       [Up-Arrow]    : Increase the user's time by one minute.

       [Down-Arrow]  : Decrease the user's time by one minute.

       [Scroll
        Lock] : Disables the paging tune. When a user  pages       
                the SysOp no sound will be  produced  at the       
                local console. {+} Registered only.


       When  the system is waiting for a call,  the only sysop keys
       that are  active are [ALT-O], [ALT-J],  [ALT-D], [ALT-P] and
       [ALT-A]. However,  pressing [L]  will  allow  you  to log-on
       locally,   and   [ESC]   will terminate   the   program  and
       return   to  DOS.   Note  that terminating in this way  will
       always  return  an  errorlevel of 0  to  DOS  regardless  of
       whether  the  -E  command-line parameter is invoked.







                                    108

       Command-line parameters 
       ────────────────────────────────────────────────────────────

       RemoteAccess accepts the following command-line parameters: 
                  

       * RA.EXE
       ---------

       -NOEMS  : Forces RemoteAccess to ignore any available EMS. 
       -L      : Run RemoteAccess in local mode.
       -S      : Set "snoop" mode off; disable local screen.
       -D      : Disable status bar by default.
       -R      : Log user back on-line after a menu type 15 exit.

       -G      : Used with the -R option;  forces  RemoteAccess  to
            {+}  return to  the last  menu the user  was in  at the
                 time of the  previous exit to DOS.  The default is
                 to return to the TOP menu.

       -P      : Log user activity to printer.
       -Nxx    : Line (node) number in a multi-line system (1-250).
       -Cx     : Communications port to use (1-4).
       -Bxxxxx : Log user on-line at baudrate xxxxx.
       -Exxx   : Exit at errorlevel xxx after caller logs off. 
       -Txxx   : Time (in minutes) until next system event.

                 NOTE: Some mailers have the capability to generate
                 a "standard format" batch file called DOBBS.BAT to
                 run the BBS program. In shell-to-mailer mode  (see
                 below) RemoteAccess will scan this  batch file (if
                 present) to  determine  the  time  until  the next
                 event.

       -M<f>   : Activate  the "shell to  mailer"   feature.   This
                 causes RemoteAccess, upon loading, to execute your
                 front-end mailer program in a DOS shell.  When the
                 mailer exits,  RemoteAccess detects the errorlevel
                 it  would normally pass to the batch-file.  If the
                 errorlevel  matches one defined in  RACONFIG,  the
                 user  is logged on to the BBS at  the  appropriate
                 baud rate.  If the errorlevel is not recognised as
                 an  incoming  call,  RemoteAccess   exits  to  its
                 batch-file at that errorlevel.  See the BATCH FILE
                 EXAMPLES section for more on this feature.

                 NOTE:  RemoteAccess  does  the swap by  storing  a
                 "swap  file"  in EMS (if available) and  on  disk.
                 Normally  this file would be stored in  the system
                 directory,   but   it   is   possible   to   force
                 RemoteAccess  to  put the file in a  directory  of
                 your  choice  by setting  the  RATEMP  environment
                 variable.  For  example,  if you executed the  DOS
                 command SET RATEMP=E:\TEMP\STORAGE,  then the swap
                 file   would  be  placed  in  the  E:\TEMP\STORAGE
                 directory.




                                    109

                 In "shell to mailer" mode,  it is possible for two
                 errorlevels to conflict. For example, errorlevel 5
                 is used by RA to indicate that a user entered both
                 net  and  echomail,  and by FrontDoor to  indicate
                 modem initialise failure. If the front-end returns
                 an   errorlevel  that  conflicts  in   this   way,
                 RemoteAccess  will  pass  to the batch  file  that
                 errorlevel  plus 10.  So,  if  FrontDoor  returned
                 errorlevel   5   because  the  modem   would   not
                 initialise,  RemoteAccess would pass errorlevel 15
                 to the batch file. 



       * RACONFIG.EXE
       --------------- 

       -B      : Runs RACONFIG in black and white (mono) mode.

       -L      : Runs RACONFIG in language editor mode.
       -M      : Runs RACONFIG in menu editor mode.
       -U      : Runs RACONFIG in user editor mode.  






































                                    110

       Errorlevels
       ────────────────────────────────────────────────────────────

       When  RemoteAccess exits to DOS either after a user logs off
       or  because  of  a menu type 15 "Exit to  DOS"  function  it
       returns  an errorlevel that your batchfile should  test  for
       and act on accordingly:


       Errorlevel  Meaning
       ----------  -------

           0       User logged off OK,  default value.  Note - this
                   can  be  overridden  with the  -E  command  line
                   parameter. 

           1       Initialisation error - couldn't  find the FOSSIL
                   driver, or the modem failed to initialise.

           2       Sysop Next  function  was active  when  the user
                   logged off.  {+} Registered only.

           3       The  user  entered one or more NetMail  messages
                   during the session.  The message base should  be
                   scanned for outgoing NetMail.

           4       The  user entered one or more EchoMail  messages
                   during  the session.  The message base should be
                   scanned for outgoing EchoMail.

           5       Both NetMail AND EchoMail messages were entered.



       You can  force   RemoteAccess  to   exit   with  a  specific
       errorlevel  by   creating  a  file  called   "RAXITn.e".  If
       this file  is present  in   the  Semaphore  directory,  then
       node  "nnn" will terminate with  the errorlevel "nnn".  This
       file is  very powerful  and  will  disconnect any caller who
       is currently online.




















                                    111

       Text file control codes                                     
       ────────────────────────────────────────────────────────────

       There are a range of special control characters that can  be
       inserted  in any of your ASCII/ANSI files that cause certain
       system and user information to be displayed. There are three
       classes of codes.  Each code is a two-character  combination
       of a control-code followed by a normal character:

                Character
       ASCII#   Combination  Purpose
       ------   -----------  --------------------------------------
       01         ^A         Wait until the [Return] key is pressed
       02         ^B         Disable aborting with the "S" key 
       03         ^C         Enable aborting with the "S" key
       04         ^D         Enable the "Continue?" prompt
       05         ^E         Disable the "Continue?" prompt
       06         ^F       * Insert a user parameter 
       07         ^G         Produce a beep on the caller's console
       08         ^H         Backspace
       09         ^I         Tab (forward 8 characters)
       10         ^J         Linefeed
       11         ^K       * Insert a system parameter
       12         ^L         Clear screen
       13         ^M         Carriage return
       17         ^Q         RESERVED FOR XON/XOFF HANDSHAKING 
       19         ^S         RESERVED FOR XON/XOFF HANDSHAKING 
       22         ^V         RESERVED FOR AVATAR
       23         ^W         Pause for one second
       24         ^X       * Execute a program in a DOS shell
       26         ^Z         END OF FILE MARKER. DON'T USE THIS!

       EXECUTING A PROGRAM IN A DOS SHELL:
       This  gives you the ability to run an external program in  a
       DOS  shell whenever RemoteAccess encounters a ^X embedded in
       a text file. The ^X is followed by the command line you want
       to  execute,  and terminated with the pipe symbol  (|).  For
       example,  to  run an external mail checking utility  when  a
       user  logs  on  you could embed the following entry  in  the
       WELCOME.A?? file:

            ^X\RA\MAILCHEK.EXE *B *F *L|

       RemoteAccess would then execute the following DOS command:

            \RA\MAILCHEK.EXE 2400 FirstName LastName

       Note  that  you  MUST terminate the command  with  the  pipe
       symbol.  All special DOS shell control codes may be used  as
       per the type 7 menu function.

       BEWARE!  Use this feature with caution.  Imagine the  damage
       that this embedded command could do:

            COPY \RA\USERS.BBS \RA\FILES\IBM\NEWFILES





                                    112

       If  there is any possibility of a user being able to  modify
       any  of  the  text files that  your  system  displays,  then
       disable  the shell feature by using the option in  RACONFIG.
       "Note to next user"  programs are notorious for this! If you
       don't  think it ever happens, then maybe this will  convince
       you.  A local sysop was watching his board one afternoon and
       noticed  that when a user logged off,  he got the  following
       message:


       "Hey,  Joe!  What  sort of a password is ROCKET?  Next  time
       choose a harder one!!    ... Fred"

       The  sysop  couldn't believe his eyes.  How could this  have
       happened?  Well,  the  "note  to next user" utility  he  had
       installed  a  few weeks earlier was to  blame.  It  actually
       allowed a user upload a short text file that was appended to
       the  GOODBYE disconnect file.  "Fred" had simply inserted  a
       few control characters into the file that would display  the
       current  user's  first name and password,  which  of  course
       would  always  be correct for whoever viewed  it.  Well,  it
       shook that sysop up a bit, as well as teaching him a lesson.

       Luckily  the ^X feature wasn't enabled,  or  anything  could
       have happened...



































                                    113

       * User parameter codes
       ----------------------

               Character
       ASCII#  Combination  Information displayed
       ------  -----------  ---------------------------------------
       48        ^F0        Full screen editor (ON/OFF)
       49        ^F1        Quiet/do not disturb mode (ON/OFF) 
       50        ^F2        Hot-Keys (ON/OFF)
       51        ^F3        Handle
       52        ^F4        Date of first call
       53        ^F5        Date of birth
       54        ^F6        Subscription expiry date
       55        ^F7        Days until subscription expiry
       56        ^F8        AVATAR setting (ON/OFF)
       57        ^F9        File ratio limit (number of files)
       58        ^F:        File ratio limit (kilobytes)
       59        ^F;        Full screen message viewer (ON/OFF) 
       60        ^F<        Users date format
       61        ^F=        Auto message forwarding ON/OFF
       62        ^F>        Name (if any) of message forwardee
       63        ^F?        Current file ratio (number of files)
       64        ^F@        Current file ratio (kb)
       65        ^FA        Users full name
       66        ^FB        Location
       67        ^FC        Password
       68        ^FD        Business/Data phone number
       69        ^FE        Voice/Home phone number
       70        ^FF        Date of last call
       71        ^FG        Time of last call
       72        ^FH        A Flags setting
       73        ^FI        B Flags setting
       74        ^FJ        C Flags setting
       75        ^FK        D Flags setting
       76        ^FL        NetMail credit remaining (cents)
       77        ^FM        Total messages posted
       78        ^FN        Last message read
       79        ^FO        Security level
       80        ^FP        Total calls to the BBS
       81        ^FQ        Number of uploads
       82        ^FR        Kilobytes of uploads
       83        ^FS        Number of downloads
       84        ^FT        Kilobytes of downloads
       85        ^FU        Minutes used today
       86        ^FV        Current screen length
       87        ^FW        First name only
       88        ^FX        ANSI setting (ON/OFF)
       89        ^FY        "Continue?" prompt setting (ON/OFF) 
       90        ^FZ        Screen clearing (ON/OFF)
       91        ^F[        Kilobyte download limit remaining today
       92        ^F\        Name of selected language
       93        ^F]        User's comment field








                                    114

       * System parameter codes
       ------------------------

               Character
       ASCII#  Combination  Information displayed
       ------  -----------  ---------------------------------------
       48        ^K0        Number of msgs in selected msg area 
       49        ^K1        Number of current template msg area 
       50        ^K2        Number of current template file area 
       65        ^KA        Total system calls
       66        ^KB        Last caller (any line)
       67        ^KC        Number of active messages
       68        ^KD        System starting message number
       69        ^KE        System ending message number
       70        ^KF        Number of times user has paged sysop 
       71        ^KG        Day of the week (full form)
       72        ^KH        Number of users in the user file
       73        ^KI        Time in 24 hour format
       74        ^KJ        Today's date
       75        ^KK        Minutes connected this call
       76        ^KL        Seconds connected (always returns 0) 
       77        ^KM        Minutes used today
       78        ^KN        Seconds used today (always returns 0)
       79        ^KO        Minutes remaining today
       80        ^KP        Seconds remaining today (always 0) 
       81        ^KQ        Daily time limit
       82        ^KR        Current baud rate
       83        ^KS        Day of the week (abbreviated form) 
       84        ^KT        Daily download limit (in K)
       85        ^KU        Minutes until next system event
       86        ^KV        24 hour format time of the next event
       87        ^KW        Line number (as set on command line) 
       88        ^KX        TERMINATES THE CALL
       89        ^KY        Name of current template message area
       90        ^KZ        Name  of  current  template  file  area
       91        ^K[cc      Change foreground and background colour
                            (cc  =  colour   code  number.  See the
                            section on  COLOUR CODES  for   further
                            information).
       92        ^K\        Clear to end of line.
       93        ^K]nnn     Displays  the  language  prompt  number
                            "nnn"  from   the   currently  selected
                            language. "Nnn"  must  be  padded  with
                            zeros.
















                                    115

       Colour control numbers
       ────────────────────────────────────────────────────────────

       Colour code numbers are used by RemoteAccess  when you setup
       your   File  list  template   and  when  using  the  "^F[cc"
       control codes  to  define  colours  in  your  Menu displays,
       Language prompts and textfiles.    


       Foreground                       Background Colours
       (2nd "cc" digit)                 (1st "cc" digit)  
       ------------------               ---------------------

       0  -  Black                      0  -  Black
       1  -  Blue                       1  -  Blue
       2  -  Green                      2  -  Green
       3  -  Cyan                       3  -  Cyan
       4  -  Red                        4  -  Red
       5  -  Purple                     5  -  Purple
       6  -  Brown                      6  -  Brown
       7  -  White                      7  -  White
       8  -  Grey                   
       9  -  Bright Blue            
       A  -  Bright Green           
       B  -  Bright Cyan            
       C  -  Bright Red             
       D  -  Bright Purple          
       E  -  Bright Yellow           
       F  -  Bright White           

       0  -  Flashing Black             8  -  Black
       1  -  Flashing Blue              9  -  Blue
       2  -  Flashing Green             A  -  Green 
       3  -  Flashing Cyan              B  -  Cyan
       4  -  Flashing Red               C  -  Red
       5  -  Flashing Purple            D  -  Purple
       6  -  Flashing Brown             E  -  Brown
       7  -  Flashing White             F  -  White
       8  -  Flashing Grey
       9  -  Flashing Bright Blue
       A  -  Flashing Bright Green
       B  -  Flashing Bright Cyan
       C  -  Flashing Bright Red
       D  -  Flashing Bright Purple
       E  -  Flashing Bright Yellow
       F  -  Flashing Bright White



       Examples:

       43  -  Red foreground on a Cyan background. 
       01  -  Blue on a black background.
       FB  -  Flashing Bright White on a Cyan background.




           

                                    116

       Modem string translation
       ────────────────────────────────────────────────────────────

       RemoteAccess recognizes certain characters embedded in  your
       modem  initialise  strings,  and  converts them  to  special
       functions. The supported characters are:

       ^  Raise DTR, modem will answer the phone.

       v  Lower DTR, disconnect if connected.

       ~  Wait for 1/4 of a second before continuing

       |  Send a carriage-return [CR] to the modem














































                                    117

       Questionnaire script language
       ────────────────────────────────────────────────────────────

       Questionnaire   script  files  are  stored  in  the   system
       directory  and have the extension .Q-A.  Each file is  plain
       ASCII,  and  contains one command per  line.  The  available
       commands are listed below. Note that the command interpreter
       is case-insensitive,  so the command "Ask" could be  entered
       as "ASK" or "ask". 



















































                                    118

       Ask <Len> <Var num>
       -------------------

       Waits  for  the  user  to input a string that is  up  to  80
       characters long,  and stores the string in the variable <Var
       num>.  Valid values for <Len> are 1 to 80. <Var num>  may be
       any number between 1 and 50.


           Example : Ask 30 5

           This example  will ask the user for an input of up to 30
           characters in  length,  and  then  store   the  inputted
           string in variable 5.


       Capitalise <ON|OFF>
       -------------------

       Turns on or off auto-input prompt capitalisation.  

       Example : Capitalise ON 


       ChangeColor <Foreground> <Background>
       -------------------------------------

       Changes the colour of the text if the user has ANSI graphics
       enabled.  The colour selected will remain the default colour
       for all subsequent text,  until the end of the questionnaire
       script or the next ChangeColour command.

       Valid colours are:

            <Foreground>                        <Background>
            ------------                        ------------

            0    Black                          0   Black
            1    Blue                           1   Blue
            2    Green                          2   Green
            3    Cyan                           3   Cyan
            4    Red                            4   Red
            5    Magenta                        5   Magenta
            6    Brown                          6   Brown
            7    Light Grey                     7   Light Grey     
            8    Dark Grey
            9    Light Blue
           10    Light Green
           11    Light Cyan
           12    Light Red
           13    Light Magenta
           14    Yellow
           15    White


           Example : ChangeColor 7 1

           This example would change the  text colour to light  red
           foreground on a black background.    

                                    119

       ClearScreen
       -----------

       Clears  the  user's  screen if  the user has  enabled screen
       clearing.


           Example : ClearScreen

           This command would simply clear the users screen. 


       Display "<Text>"
       ----------------

       Displays the specified text on the screen.  The vertical bar
       is  translated to a line-feed and carriage return.  If  this
       bar  is  omitted,  any  following  text starts at  the  next
       character on the same line.


           Example : Display "Please answer ALL questions|"

           In this example the text, "Please  answer ALL questions"
           would be displayed to the user with a linefeed/carriage 
           return.
            

       DisplayFile <1-8 character file name>
       -------------------------------------

       Causes a text file to be displayed in the same way as a menu
       type 5 would be displayed. The text file must be in the text
       file directory, and have the extension .ASC/.ANS/.AVT.

           Example : DisplayFile BBSRULES

           This example would display  the file BBRULES.ASC/ANS/AVT
           (ASC to ASCII users, ANS to  ANSI users and AVT to users
           with AVATAR enabled) to the  user.   Once  the file  has
           been displayed the user  would  then be  returned to the
           questionnaire.        


       EndIf
       -----
        
       Signifies the end of an IF statement.   The function of "If"
       and the relationship of the "EndIf" statement are more fully
       explained  later  in  this  chapter   under  the "If" script
       command.

            Example : EndIf







                                    120

       If <Var num> = "<String>"
       -------------------------

       The  IF  command  compares the  contents  of  the  specified
       variable number with <String>. If the two do not match, then
       all following lines are skipped until an ENDIF statement  is
       encountered.


           Example : If 5 = "Perth"
                     Display "That's where I live|"
                     EndIF

           The above section  of script would examine  the contents
           of variable 5 and check  to see if it matches  the text,
           "Perth". If it does the text "That's where I live" would
           be displayed.  If  variable  5 does not match  the text,
           the  script  would  jump  to  the  EndIF  statement  and
           continue  with  the questionnaire without displaying the
           text. 



       Exec <commandline>
       ------------------

       Executes  a  program  in   a  DOS  shell.  All  command-line
       parameters valid in a menu type 7 command may be used.


           Example : Exec C:\RA\NEWMAIL.EXE *B*M

           This  command would  force RemoteAccess  to execute  the
           DOS command "MAIL.EXE"  whilst the user is on-line.  The
           "*M" tells RemoteAccess  to swap itself  out  of  memory
           before  executing  the command.   This  is  useful  when
           running  programs that  require large amounts of memory.
           For further  information on  executing DOS commands  see
           MENU TYPE, type 7. 



       GetChoice <Valid choices> <Var num>
       -----------------------------------

       Waits  for the user to enter one of the characters in <Valid
       choices>, and stores the response in the variable <Var num>.


           Example : GetChoice YN 2

           This command would wait for the user to press "Y" or "N"
           and then store the response in variable 2.







                                    121

       Goto <Label> 
       ------------

       Causes the script to jump to  the  specified  <Label>.   The
       Label can be any 12 character alphanumeric sequence.  Labels
       can be placed into the  script by  placing  a ':' before the
       label string.


            Example : If 5="Y"
                      Goto EXT
                      EndIf
                      Quit
                      
                      :EXT
                        Display "You answered Yes!"
                        Quit


           In this case,  if  variable 5 is "Y"  RemoteAccess  will
           jump to the  segment of script  beginning  with  ":EXT",
           then  display  the text,  "You answered YES!".  If   the
           variable is not equal to "Y", the questionnaire would be
           terminated immediately.



       ListAnswer <Var num>
       --------------------

       Displays  (to the screen) the contents of the variable  <Var
       num> followed by a CR/LF.


           Example : ListAnswer 5

           This example would display  the contents of variable 5.



       MenuCmnd <Num> <Data>
       ---------------------

       Executes a  menu command. Simply specify  the command number
       followed by  the contents of  the optional data  field. Note
       that menu navigation commands  (GOTO, GOSUB, RETURN etc) may
       not be used.


           Example : MenuCmnd 27 60 /T=Andrew_Milner

           This example  will force  RemoteAccess to  run  the menu
           command  type  27,  with  an   optional  data  field  of
           "60 /T=Andrew_Milner".  This  is the  command to  post a
           message in message area 60 addressed to "Andrew Milner".
           For  further  information  on  menu   commands  see  the
           section on MENU TYPES.
        


                                    122

       OutputAnswer "<Descriptor>" <Var num>
       -------------------------------------

       Outputs  <Descriptor>  followed  by  the  contents  of   the
       variable  <Var  num> to the questionnaire answer  file.  The
       answer file is given the same name as the questionnaire file
       but has an extension of .ASW.


           Example : OutputAnswer "Hobbies  : " 6

           The answer  stored in varable 6 will be outputted to the
           file <filename.ASW>,  where  "filename" is the same name
           as the questionnaire file.  If  this answer is the first
           outputted answer in the questionnaire it  is a good idea
           to first  use the command  "PostInfo" to output a header
           detailing information about the  person who is answering
           the  questionnaire.



       PostInfo
       --------

       This option tells RemoteAccess to output the users name  and
       the date and time to the answer file.


           Example : PostInfo



       Quit
       ----

       Terminates the questionnaire and returns to the BBS.

            Example : Quit



       SetFlag <Flag set><Flag number> <ON|OFF>
       ----------------------------------------

       Turns on or off the specified user flag.  <Flag set> is "A",
       "B",  "C" or "D",  and <Flag number> is a number between one
       and  eight.   Changes   to  the   users  flag  settings  are
       permanently recorded in the user database.


           Example : SetFlag C3 OFF

           In this example the users C3 flag would be turned off.







                                    123

       SetSecurity <Security level>
       ----------------------------

       Simply   sets  the  user's  security  level  to  the  number
       specified. The level may be any number from 1 to 64,000. Any
       changes  to the  users  security  level will be  permanently
       recorded in the user database.


           Example : SetSecurity 10

           This  would  set the users  security to a level of 10.



       WaitEnter
       ---------

       Waits for the user  to press [ENTER].   If the user  presses
       any other key,  then the input will be ignored.


           Example :  WaitEnter

           When   this  line  is  encountered  in  the script,  the
           user will  have to press the Enter key before he/she can
           continue.

































                                    124

       Terminal emulations
       ────────────────────────────────────────────────────────────

       A terminal emulation is the method that RemoteAccess uses to
       communicate  with the  user's  software. The  most basic  of
       these is  straight ASCII.  The ASCII terminal  emulation can
       only display normally visible  characters plus a few others,
       such as backspace, linefeed and clearscreen.

       RemoteAccess supports two  additional emulations -  ANSI and
       AVATAR.  ANSI  is   currently  the  most  popular   terminal
       emulation in the bulletin board world; it has the capability
       to change text  colour, cursor position,  and can do  simple
       animations.  Some  implementations  of ANSI  can  even  play
       simple  tunes  at  the  user's  end.  ANSI  does  have  some
       drawbacks; each  special control code is  several characters
       long. To  change the  text colour  for  example, requires  a
       control  code of up to 8 characters. These lengthy codes can
       severely slow the  user's display, and  for this reason  the
       usefulness  of  ANSI at  speeds of  1200  baud and  lower is
       limited.

       AVATAR,  on the  other  hand, uses  control  codes that  are
       typically a quarter to  a third of the length  of their ANSI
       equivalents,  making it  usable  at lower  speeds. Not  only
       that,  but AVATAR  has  much more  advanced screen  control,
       making possible  relatively  complex animations  and  screen
       displays. AVATAR is a newcomer - there are comparatively few
       terminal programs  that support it, even  fewer that support
       it properly.  At  this  time  there  are  no  utilities  for
       creating AVATAR  screens. You can however  convert your ANSI
       screens to AVATAR with the supplied utility.

       RemoteAccess  uses  AVATAR  level  0+  (AVT/0+).   The  only
       terminal programs  which have been tested  successfully with
       AVT/0+    are   Joaquim   Homrighausen's   FrontDoor,   Adam
       Stanislav's TinyTerm  and  Adam Blake's Communique.  If  you
       make use of AVT/0+  you should make  it clear  to your users
       that they should  be  using  one of  these  two,  until more
       terminal programs  implement AVATAR support.




















                                    125

       Text file naming conventions
       ────────────────────────────────────────────────────────────

       RemoteAccess displays  text files at specific  points and in
       response  to  specific  events. The  EXTERNAL  SUPPORT FILES
       section  details all these  text files. Files  that have the
       .A??  extension  may  be  displayed  in  any  one  of  three
       "flavours":

       .ASC : ASCII only, no special control codes
       .ANS : ANSI, should only contain text and ANSI codes
       .AVT : AVATAR, may contain text and AVATAR codes.

       If a  user has  both ANSI  and AVATAR  enabled, RemoteAccess
       will  search first for a .AVT file, and if unsuccessful will
       then try .ANS  and then .ASC.  If only  ANSI *or* AVATAR  is
       selected and  the preferred  file type isn't  available, the
       .ASC version will be displayed.










































                                    126

       Interactive EMSI
       ────────────────────────────────────────────────────────────

       Interactive  EMSI (IEMSI) is a protocol which can be used by
       communications software to  establish certain parameters for
       an interactive session, for  example a user logging on  to a
       bulletin board.  The only BBS  software to  support IEMSI at
       this time is RemoteAccess 1.11.

       From within the Terminal setup utility,  the user can define
       a number of user  "profiles", each of which includes  a user
       name, handle, password, telephone number, location etc. When
       IEMSI is enabled from within the terminal and the user calls
       a RemoteAccess  BBS, the user's  information is sent  to the
       BBS automatically.

       This  makes it possible for a  user (the "client") to log on
       to a BBS (the "server")  without even touching the keyboard.
       The terminal and RemoteAccess will   automatically  exchange
       information such as software name and version number, screen
       parameters and local time.

       One  useful  feature  is  the   ability  of  the  server  to
       temporarily modify  the user's  display  parameters for  the
       current  session only.  For  example, normally  when a  user
       calls  a particular  BBS  he/she  might  use  25  line  mode
       locally, so  the "screenlength"  field in his/her  record is
       set  to  25 accordingly.  However,  on  one occasion  he/she
       activates the terminal   in   50   line  mode.  RemoteAccess
       will   recognise this and set   the screen length  to 50 for
       the  current session only, restoring it to 25 when the  user
       disconnects.     In    addition,       RemoteAccess     will
       automatically activate whatever terminal emulations  both it
       and the client supports.

       Another benefit is the ability  to chat to a  users using  a
       full screen chat mode.   This  is accomplished  by the IEMSI
       remote terminal being able to maintain the chat screen.

       To  see if a  user is connected  in IEMSI mode  to your BBS,
       press F7. If IEMSI is active,  RemoteAccess will display the
       relevant information about the client's system on the status
       bar. At  the right hand  end of  the status  bar the  user's
       request flags  are displayed.  A request  flag is an  option
       that the  user  asked for.  RemoteAccess currently  supports
       these request flags:


            CHT : Split screen chat mode capability indicator
            CLR : Clear screen codes
           NEWS : Display the NEWS.A?? file
           MAIL : Check for new mail
           FILE : Check for new files
            HOT : Use hot-keys
           HUSH : Activate "do not disturb"
           FSED : Use the full screen message editor




                                    127

       BATCH FILES       
       ────────────────────────────────────────────────────────────

       You  will  require   a  batch   file  to  run   RemoteAccess
       successfully.  A batch file is a  DOS file which  contains a
       list of  commands  which  will be executed in the designated
       order (one per line).   Along  with normal DOS  commands you
       can execute programs and use special commands only available
       in batch files.  (Refer to  your DOS manual  for information
       on BATCH file commands).  


       To help in  the construction of  batch files,  the following
       files are generated by RemoteAccess: {+} Registered only.


          RAREADY.nnn  : When   there   are   no   callers  on-line
                         RemoteAccess  will  produce  a file called
                         "RAREADY.nnn" in the semaphore  directory,
                         "Nnn"  is  the  node  which  generated the
                         file. When a caller logs on  this file  is
                         deleted.

          RABUSY.nnn   : This  file  will   be  generated   in  the
                         semaphore directory when a caller logs on.
                         The file  extension "nnn"  corresponds  to
                         the node number. When the caller  logs off
                         this file is deleted.

       Additionally,  it  is  possible  to  force  RemoteAccess  to
       terminate and return  to DOS  at any time  (while a user  is
       online  or  while  waiting  for  a  call)  by  creating  the
       following file in the semaphore directory:

          RAXITn.e

       Where 'n' is  the target node, and 'e' is  the errorlevel to
       exit with. For example, the file RAXIT3.45 would  cause node
       three to exit to DOS with errorlevel 45.





















                                    128

       BATCH FILE EXAMPLES       
       ────────────────────────────────────────────────────────────

       These examples are not usable in their presented form.  They
       are provided as a starting point for your own batch files:


       Using RemoteAccess stand-alone (ie. without a mailer)
       -----------------------------------------------------

       :START
          Cd \RA

          REM Run the main program:
          RA -E20

          REM User logged off, cycle back:
          if errorlevel 20 goto START

          REM RemoteAccess exits to the batchfile with errorlevel 7
          REM once a night:
          
          if errorlevel  7 goto CLEAN

          if errorlevel  3 goto START

          if errorlevel  2 goto LOCAL

          REM An errorlevel of 1 means a fatal error, an
          REM errorlevel of 0 means that ESCape was pressed while  
          REM in "wait for call" mode - so we quit:  
          goto END

       :CLEAN
          REM Do nightly message and user maintenance with RAUSER  
          and RAMSG
          goto START

       :LOCAL
          REM Load RemoteAccess in local mode
          RA -L 
          goto START

       :END
          echo RemoteAccess HQ Line 1 Down.


       NOTE:    Unlike some other BBS packages,  RemoteAccess  will
       ALWAYS exit back to DOS (or your batch file) after a  caller
       logs  off.  This means that you can only run in  stand-alone
       mode with a batch file that will recycle back to restart the
       main program.








                                    129

       Using RemoteAccess with a mailer (FrontDoor or  BinkleyTerm)
       (using either TosScan or Echogen to process mail)
       -------------------------------------------------

       :START 

          cd \RA

          REM Run the main program and run the mailer in a "shell".
          REM The *M tells RemoteAccess to swap out of memory      
          REM before running the mailer.

          REM Either FrontDoor : RA -m\FD\FD.EXE*M -E20
          REM   or BinkleyTerm : RA -m\BT\BT.EXE*M -E20

          REM Any errorlevels that RemoteAccess does not understand
          REM it passes back to the batchfile:
          if errorlevel 150 goto CLEAN
          if errorlevel  99 goto UNPACK
          if errorlevel  20 goto START
          if errorlevel  10 goto END
          if errorlevel   5 goto NET&ECHO
          if errorlevel   4 goto ECHO
          if errorlevel   3 goto NET
          if errorlevel   2 goto LOCAL
          goto END

       :CLEAN
          REM Do your nightly maintenance here. In this example    
          REM the mailer is set to exit at errorlevel 150 nightly.

       :UNPACK
          REM Toss incoming mail
          REM Either : TOSSCAN toss
          REM     or : ECHOGEN -A -P -T -U
          goto START

       :NET&ECHO
          REM Net and EchoMail needs to be exported from the 
          REM message base.
          REM Either : TSUTIL export
          REM     or : MAILSCAN

       :ECHO
          REM Export EchoMail.
          REM Either : TOSSCAN scan
          REM     or : ECHOGEN -A -E -P
          goto START

       :NET
          REM Only export NetMail
          REM Either : TSUTIL export
          REM     or : MAILSCAN
          goto START
                
       :LOCAL
          REM Load RemoteAccess in local mode
          RA -L 
          goto START

                                    130

       :CLEAN
          REM Do nightly message and user maintenance with RAUSER  
        and RAMSG
          goto START 

       :END
          REM Some fatal error occurred.
          echo RemoteAccess HQ Line 2 Down.





       * The Echogen command-line switches shown assume a FrontDoor
         environment.

       Note  that the  particular command-line  switches for all of
       these      utilities  (BinkleyTerm,  FrontDoor,  TosScan  or
       Echogen)  will vary according to your set up.  All of  these
       programs are supplied with documentation which will  provide
       you  with this information.  It is stressed again that these
       examples are only intended to give you a starting point  for
       creating your own batch files.





































                                    131