2AMSYS3.DOC

185.7 KB cf6255864bf9cd96…























                             2AM-BBS, Version 3.0


                                Sysop's Manual




















                                        (c) Copyright 1986,1987,1988 by:
                                        Chris Gorman
                                        Neil Clarke
                                        Tom Vogl
                                        2AM Associates
                                        May 8, 1988


















                                 Table Of Contents


     Chapter 1  Introduction
        1.1  The 2AM-BBS Documentation Set.................................1-1
        1.2  System requirements...........................................1-1
        1.3  Setup.........................................................1-1
        1.4  Sub-Directories...............................................1-2
        1.5  Your AUTOEXEC.BAT File........................................1-3
        1.6  Technical Support.............................................1-4
        1.7  Networks......................................................1-5

     Chapter 2  Keyboard Functions
        2.1  Logging In From The Console...................................2-1
        2.2  Stopping & Restarting The BBS.................................2-1
        2.3  Help Key......................................................2-1
        2.4  Input/Output In 2AM-BBS.......................................2-1
           2.4.1  The Printer..............................................2-1
           2.4.2  Output To Disk...........................................2-2
        2.5  View/Edit Current User........................................2-2
        2.6  Reserving The Terminal........................................2-2
        2.7  Bell Toggle...................................................2-2
        2.8  Jumping To DOS................................................2-2

     Chapter 3  Further Setup and Customization
        3.1  Menus.........................................................3-1
        3.2  Text Files....................................................3-2

     Chapter 4  The User Validator
        4.1  Files.........................................................4-1
           4.1.1  USERLOG.DAT..............................................4-1
           4.1.2  User Application File....................................4-2
           4.1.3  System Logs..............................................4-2
           4.1.4  Lookup Files.............................................4-3
           4.1.5  ACCESS.DAT...............................................4-3
        4.2  Privilege Bits For New Users..................................4-3
        4.3  Validator Commands............................................4-3
        4.4  The Sweeper...................................................4-5
        4.5  Privileges For The Validator..................................4-8

     Chapter 5  User Logins
        5.1  New User Logins...............................................5-1
        5.2  The Standard Login ...........................................5-2
        5.3  NEWUSER.DAT...................................................5-3
        5.4  .DEF Files....................................................5-3
        5.5  Special Login Messages........................................5-4
        5.6  Rejects.Dat...................................................5-4

     Chapter 6  The Editor
        6.1  Privileged Options ...........................................6-1
        6.2  Privilege Bits Used...........................................6-1








                                         i






     Chapter 7  Message Bases
        7.1  File Formats (BASEINFO).......................................7-1
        7.2  Base Maintenance .............................................7-4
        7.3  Privilege Bits Used...........................................7-6
        7.4  Base Cleanups  ...............................................7-6

     Chapter 8  Email Utility
        8.1  Email Commands................................................8-1
        8.2  Special Options During Read Incoming..........................8-1
        8.3  Maintenance Commands..........................................8-2
        8.4  Files.........................................................8-2
        8.5  Privilege Bits and Mail Quotas................................8-3

     Chapter 9  Files Section
        9.1  File Credits and Times........................................9-1
        9.2  File Formats..................................................9-1
           9.2.1  Download Files ..........................................9-1
           9.2.2  Upload Files.............................................9-3
           9.2.3  External Protocols.......................................9-3
        9.3  The Maint Utility.............................................9-4
           9.3.1  From A File Library......................................9-4
           9.3.2  From The Upload Library..................................9-5
        9.4  Privilege Bits Used...........................................9-5

     Chapter 10  BBS Lister Utility
        10.1  File Formats................................................10-1
        10.2  Maintenance Commands........................................10-1
        10.3  Privilege Bits Used.........................................10-1

     Chapter 11  JumpDoors
        11.1  File Formats................................................11-1
           11.1.1  PASSAGES.DAT...........................................11-1
           11.1.2  JUMPER.DAT.............................................11-2
        11.2  The Maint Utility...........................................11-2
        11.3  Notes On Writting Jumpdoors.................................11-3
        11.4  Privilege Bits Used.........................................11-3

     Chapter 12  Trivia
        12.1  File Formats................................................12-1
        12.2  Maintenance Section.........................................12-2
        12.3  Privilege Bits Used.........................................12-3

     Chapter 13  Voter
        13.1  File Format.................................................13-1
        13.2  Maintenance Commands........................................13-1
        13.3  Privilege Bits Used.........................................13-1

     Chapter 14  Chat Utility
        14.1  Request Chat................................................14-1
        14.2  Accept/Deny Chat............................................14-1
        14.3  Leaving Chat................................................14-1
        14.4  Chat Files..................................................14-1







                                        ii






     Chapter 15  Other Main Menu Options...
        15.1  Configure...................................................15-1
        15.2  Feedback....................................................15-1
        15.3  System Info.................................................15-1
        15.4  Off.........................................................15-1
        15.5  Daily Log...................................................15-1
        15.6  Login Notes.................................................15-2
        15.7  User Application............................................15-2
        15.8  Error!  ....................................................15-2

     Chapter 16  Main Menu Maintenance

     Chapter 17  Miscellaneous Options
        17.1  Loggin In From The Console..................................17-1
        17.2  Timeouts....................................................17-1
        17.3  Carrier Drops...............................................17-1
        17.4  The Scheduler...............................................17-1
        17.5  A Note About Backups........................................17-2

     Chapter 18  Utilities
        18.1  BASEEDIT.EXE................................................18-1
        18.2  BSMAINT.EXE.................................................18-3
        18.3  DAYVIEW.EXE.................................................18-4
        18.4  DBMAINT.EXE.................................................18-4
        18.5  DIRSORT.EXE.................................................18-5
        18.6  DRIVER.EXE..................................................18-6
        18.7  HLPMAINT.EXE................................................18-6
        18.8  LOOKER.EXE..................................................18-7
        18.9  MAKEVOTE.EXE................................................18-7

     Appendix 1  Privilege Bits
        1.1  By Number............................................Appendix 1-1
        1.2  By Use...............................................Appendix 1-2

     Appendix 2  2AM File Map

     Appendix 3  Multiuser Setup and Commands

     Appendix 4  Bit Encoded Responses

     Appendix 5  The DRIVE.DAT File
        5.1  System Specifics.....................................Appendix 5-1
        5.2  Drive Paths..........................................Appendix 5-1
        5.3  Prompts..............................................Appendix 5-1
        5.4  Headers And Messages.................................Appendix 5-2
        5.5  Modem And Port Information...........................Appendix 5-2

     Appendix 6  ANSI Color Commands

     Appendix 7  Trouble Shooting

     Index







                                        iii





     2AM BBS
     Sysop's Manual                                               Introduction
     _________________________________________________________________________


                                   Introduction
                                     Chapter 1


       1.1  THE 2AM-BBS DOCUMENT SET

     The documentation for this Bulletin Board System is divided into two
     manuals.  Each is tailored for a certain kind of user.  The first manual
     is the 2AM-BBS User's Manual.  It contains all the information that one
     of your users needs to use every public feature of this board.  In
     purchasing this product, you are given full rights to copy the user's
     manual, and we encourage you to do so.  Also, you will find the user's
     manual helpful for yourself in learning simple principles behind the
     board's operation.  This manual, the second manual, is the 2AM-BBS
     Sysop's Manual.  It is a reference manual and contains notes on sysop
     sections as well as file formats for all the utilities and any other
     information you might need to operate the board.


       1.2  SYSTEM REQUIREMENTS

     2AM-BBS will run on any IBM-PC or IBM compatible computer with at least
     256K of memory running under the MS-DOS or PC-DOS operating system.  You
     need DOS 2.1 or higher, a hard drive and a Hayes compatible modem.


       1.3  SETUP

     Setup is simple.  You should have 2 or more disks labeled 2AM-BBS disk
     #1, 2AM-BBS disk #2, etc.  Place the first disk into drive A: of your
     computer and make sure you are at an "A>" prompt, and type INSTALL at the
     DOS prompt.  This program will copy all the files from the distribution
     disks onto the drive you want to keep the BBS files on.  By default, it
     would like to put all files on Drive C (probably some kind of hard disk)
     in a subdirectory c:\bbs.  If you do not want to use this configuration,
     you will have the opportunity to change all of these parameters during
     installation.

     After you have completed the install procedure, log onto the drive and
     subdirectory where the system files are (sys_disk in the installation
     procedure) using the DOS command: CD \BBS .   Make sure your modem is
     turned on, and type: BBS .  You are now up and running.  Note, if you are
     planning on running a multiport system, please refer to the multiuser
     section of this documentation.  To log in locally (not through the
     modem), hit the ESCAPE key.  An account has already been setup for you.
     Account number 1 is the sysop account.  Its password is 2AM-BBS.  We
     strongly suggest that you change the password as soon as you log in since
     this default account exists on all 2AM-BBS's and people know the number
     and password for it.

     At this point, you are running 2AM-BBS with the default files that we
     gave you.  Nothing is customized to your tastes and you will obviously





                                        1-1



     2AM BBS
     Sysop's Manual                                               Introduction
     _________________________________________________________________________


     want to make a lot of changes.  In order to do so, you will need two
     things: An ASCII editor and this manual.

     Many of the files 2AM uses can be modified with an ASCII editor.  An
     ASCII editor is any editor that does NOT but special characters in the
     file.  DOS's EDLIN program is an ASCII editor.  If you are not sure if an
     editor is ASCII or not, try TYPEing a file that it wrote from DOS.  If
     the file lists exactly how it looked in the editor, the editor is
     probably an ASCII editor.  If you do not have an ASCII editor - do not
     panic, you can use 2AM's editor to modify most of these files.

     You will need this manual for reference purposes since many files have a
     specific format that they must be in.  Please keep this manual in a
     convenient location since you will probably refer to it often during your
     initial setup.


       1.4   SUB-DIRECTORIES

     2AM-BBS uses many different files to operate.  These files are neatly
     grouped into subdirectories.  Two notes about these subdirectories:

     1. There is a file in with the program files called DRIVEx.DAT.  The "x"
        can be a number (1, 2, 3 etc..) or it could be non-existent.  If the
        BBS is to be run as a single user system, DRIVE.DAT is all you will
        need.  If you plan to run more than one line, then please refer to the
        multiuser section of this manual.  For the sake of clarity, we will
        refer to this file simply as DRIVE.DAT.   DRIVE.DAT is a text files
        and contains, among other things, a list of all the subdirectories
        that have been created for the board.  It must exist on the system
        disk or the BBS will not be able to start.  When the system runs, it
        reads this file to find out where to go to get things.  If you want to
        move files, you can create different subdirectories and modify
        DRIVE.DAT to look at these new subdirectories.  For example, if you
        wanted to move the help files from "c:\bbs\help\" to "b:\help\", mkdir
        b:\help, copy the files to that directory, and edit DRIVE.DAT.  Now
        use the utility DRIVER.EXE (supplied with 2AM-BBS) to edit this file.
        DRIVER can be used to edit any DRIVE.DAT file and is recommend over
        the use of a standard text editor.

     2. Since people are really fond of moving subdirectories around in this
        manner, we can't just say things like "change directory to
        c:\bbs\help".  Some people might not have their help files there.  As
        a result, we have come up with logical name for each subdirectory.
        For example, the logical name for the subdirectory with the help files
        in it is help disk.  You will see these names used constantly in this
        manual.

     Now, let us give you a listing of all the subdirectories with there
     logical names and a brief statement of what sort of files are in each:







                                        1-2



     2AM BBS
     Sysop's Manual                                               Introduction
     _________________________________________________________________________



     Base_disk	Message bases reside here.

     BBS_disk   	Contains the database files for the BBS lister.

     Chat_disk	Contains all the CHAT text files.

     Dload_disk	Contains library files for the download section

     Help_disk	Contains the system HELP files.

     Jump_disk	Contains files for the JumpDoors Utility

     Log_disk  	Contains all the daily logs.

     Look_disk	Contains user lookup tables.  DO NOT ALTER THESE FILES!  If
                  you have a problem with these files, refer to the LOOKER
                  utility supplied with 2AM-BBS.

     Mail_disk	All EMAIL will reside here.

     Menu_disk	Contains the system MENUS.

     Sem_disk  	Directory for internal use by 2AM-BBS.

     Sys_disk  	Contains 2AM-BBS itself and some key system files.

     Text_disk	Contains TEXT files such as login notes and bulletins.

     Trivia_disk	Contains all the files for trivia.

     Uload_disk	Contains the uploads and the files that handle them.

     Vote_disk	Contains files for the voting booth.


       1.5  YOUR AUTOEXEC.BAT FILE

     When your computer boots up, it reads the file autoexec.bat.  So that the
     BBS will re-boot if power goes out, put lines to change directory to
     sys_disk and execute BBS in this file.  For example:

     		C:
     		CD \BBS
     		BBS


       1.6  TECHNICAL SUPPORT

     The authors of this software are just as excited about seeing your board
     in operation as you are.  We are happy to help you out if you should get
     stuck.  However, we also would like you to be able to solve problems on





                                        1-3



     2AM BBS
     Sysop's Manual                                               Introduction
     _________________________________________________________________________


     your own (since there are many little things to keep track of).  We
     really do not anticipate too much worry; everything has been tested
     thoroughly before it was shipped to you by our beta test sites.  However,
     if anything goes wrong, or you need help, here are steps you can take:

     1. Check the manual first PLEASE!.  Some setups are tricky, and you might
        have to do a little file debugging to get everything working.  Most
        problems can be fixed if you are careful to compare the files you have
        setup against the samples in this manual.

     2. All registered owners of this program have access to special bases at
        the DREW Underground, 201-377-8245, 201-377-8193, 201-377-7861, 201-
        377-6810 or 201-377-4538 (yes - it is a 5 line 2AM-BBS).  Any
        questions left in these bases will be answered promptly.  If you are
        an experienced sysop, we encourage you to help out others through
        these bases.  Also, discussions on improvements for the board are very
        much encouraged.  This is your best approach to getting answers.  We
        would appreciate it if you would try to reach us via The Underground
        before calling us voice.

     3. If you have access to BITNET, you can contact us via the following
        accounts:

             Neil  : NCLARKE@DREW
             Chris : CGORMAN@CITCHEM

     4. Above we mentioned that all registered users of this program have
        special access at the Drew Underground.  Since this is a demonstration
        copy of 2AM-BBS, you do not have to register your copy with us.

        If you find you have problems, you can still call the Underground 
        (numbers above) and leave feedback.  The authors will get in touch
        with you as soon as possible.

        Should you decide to purchase a full copy of 2AM-BBS, you will 
        receive the home phone numbers of all the 2AM Associates.  If you
        encounter a problem or have any questions with a full 2AM-BBS 
        system, you can call us direct and get immediate assistance from
        us.


       1.7  NETWORKS

     Currently, there is a version of 2AM-BBS available for the BI-TECH
     network.  If you are interested in obtaining a version of 2AM-BBS for any
     other network system, contact 2AM Associates.  We will be happy to
     develop a version of 2AM-BBS for any network for which you can provide us
     specifications.









                                        1-4



     2AM BBS
     Sysop's Manual                                         Keyboard Functions
     _________________________________________________________________________


                                Keyboard Functions
                                     Chapter 2


       2.1  LOGGING IN FROM THE CONSOLE

     If a user has privilege bit #72, he can access the BBS from the terminal
     (local mode).  This privilege bit prevents anyone from walking up to your
     terminal and logging in.  It is especially useful when the terminal is
     easily accessed by many people that you don't want logging in locally.
     To log on in local mode, hit the ESCAPE key.


       2.2  STOPPING AND RE-STARTING 2AM-BBS

     When running 2AM-BBS from the terminal (not via the modem), remember the
     following keys:

     1. Shift-F10 stops the program and returns you to DOS.
     2. Shift-F9 will halt the system and re-start it.  Using either of these
        function keys while a user is online will drop the user from the
        board.


       2.3  HELP KEY

     F1 is the help function key.  A window appears at the top of the screen
     with all of the function keys and their definitions displayed alongside.


       2.4  INPUT/OUTPUT IN 2AM-BBS

       2.4.1  THE PRINTER

     If you have a printer and wish calls to be logged to it, create the file
     sys disk:pon.cnf.  2AM-BBS just checks to see if it exists before logging
     calls to the printer - the file need not contain anything.

     In addition to logging calls, the printer can be used with the following
     keys:

     1. F3 will send everything that appears on the screen to the printer.
        Hitting F3 again will turn the printer off.  When this is in use, the
        letter P will appear in the status line at the top of your screen.
        Note that this option may not be used while file save (F5) is active.
     2. F4 will dump whatever is currently on the screen to the printer.


       2.4.2  OUTPUT TO DISK

     F5 sends everything that appears on the screen to a disk file.  The
     system will pause and you will be prompted for a file name when you hit





                                        2-1



     2AM BBS
     Sysop's Manual                                         Keyboard Functions
     _________________________________________________________________________


     this key.  Hitting F5 again will stop sending output to a file.  When
     this is in use, the letter F will appear in the status line at the top of
     your screen.  Note that this option cannot be used while output to
     printer (F4) is active.


       2.5  VIEW/EDIT CURRENT USER

     1. F7 allows the sysop to view the user currently online.  A window
        appears on the top of the screen with information about the user such
        as the user's name, number, time limit, time remaining, file credits,
        e-mail limit, e-mail sent, etc.
     2. F8 allows the sysop to edit the user online.  A definition file may be
        used, or the sysop may edit the user manually.  Options include
        adjusting the user's time remaining, adding or subtracting privilege
        bits, changing the e-mail limits, file credits, etc.  Note: if
        security mode is ACTIVE (set in the Validator), this function is
        disabled.


       2.6  RESERVING THE TERMINAL

     F6 reserves the next available login for the sysop.  When the current
     user logs out, the board takes itself offline and sounds an alarm to
     notify you that the board is available.  The letter R will appear in the
     status line at the top of the screen when this function is in use.


       2.7  BELL TOGGLE

     F2 toggles the bell on and off.  Default is bells on.  Resetting the
     board with Shift-F9 will not turn the bell toggle off, but a system
     reboot will return the toggle to its default mode.  The letter B will
     appear in the status line at the top of the screen when the bell toggle
     is on.


       2.8  JUMPING TO DOS

     Hitting ALT-J from almost anywhere in the system (when a user is logged
     in) will take you into DOS if you are running 2AM-BBS locally (from the
     terminal).  Any user on-line when you jump to DOS will have his/her
     screen "freeze".  They will not see what you are doing in DOS.  Type EXIT
     at a DOS prompt to return to 2AM-BBS.  NOTE: You cannot jump to DOS when
     a user is in the editor.












                                        2-2



     2AM BBS
     Sysop's Manual                            Further Setup and Customization
     _________________________________________________________________________


                          Further Setup and Customization
                                     Chapter 3


     2AM-BBS uses many text files that the sysop can configure to his or her
     tastes, and this chapter covers some general principles for modifying
     these files.


       3.1  MENUS

     Menus are pre-created but can be changed to suit your tastes.  If you
     intend to customize your system, this is a good place to start.  As they
     stand now, menus display all options open to a new user.  Privileged
     options are not displayed.  As a rule of thumb, we do not generally show
     a user anything that he does not have access to.

     2AM-BBS supports 40 and 80 columns as well as standard ANSI color
     commands.  If the menu contains IBM extended graphics characters and the
     user cannot display them, then these characters are displayed as periods.

     Menu names have three different formats.  Below are examples for 2AM's
     Main menu:

     1. If the file main80x.mnu exists and the user has responded that he or
        she can display ANSI graphics, this file will be output.  If you have
        an ANSI editor and want to make ANSI menus, put the addition "80x" on
        the menu name to create files of the form "abcd80x.mnu" where "abcd"
        is the menu name shown below.

     2. If the ANSI menu does not exist OR if the user cannot display ANSI,
        but has an 80 column screen, the file main80.mnu will be output if it
        exists.   When writing 80 column menus, create files of the form
        "abcd80.mnu" where "abcd" is the menu name shown below.

     3. If both cases 1 and 2 fail (either only one menu is set up OR the user
        cannot display ANSI or 80 columns) then the file main.mnu will be
        output.  If you do not wish to have more than one menu for a section,
        use menus without the "80" or "80x" additions to the name.

     The menus are as follows (just the "abcd" part here, you add the "80" or
     "80x" additions as appropriate:

        1.  base : Menu for the message bases
        2.  bbsls: Menu for the BBS Lister
        3.  bmain: Menu for base maintenance
        4.  conf : Menu for the configure section
        5.  door : Menu for the jumpdoors section
        6.  edcom: Menu for the editor
        7.  email: Menu for Email
        8.  files: Menu for the FILES section






                                        3-1



     2AM BBS
     Sysop's Manual                            Further Setup and Customization
     _________________________________________________________________________


        9.  main : Main menu
        10. maint: Menu for the main maintenance section
        11. triv : Menu for the trivia section
        12. valid: Menu for the user validator
        13. voter: Menu for the voter section

     NOTE:  All of these files are straight ASCII with one exception.  If the
     character ASCII 250 is embedded in the file as the first character on a
     line, it will be intercepted and the message:

                              Hit RETURN to continue

     will be output.  Different editors will allow you to put ASCII 250's in
     files in different ways, but the most standard way is to hold down the
     ALT key, and, holding it down, type "250" on the numeric keypad on the
     right of the keyboard.  This feature allows both you and us to paginate
     various text files.  You can make use of this special ASCII character in
     any text file that the BBS outputs.


       3.2  TEXT FILES

     These files are in text_disk and also may be customized.  Specifics for
     introduction and information files in text_disk will have to be filled
     in.  All of the features (the "80" and "80x" additions, the Ascii 250,
     etc.) that existed for the menus exist for text and information files as
     well.  If the first character in a text file is a "w", (note: lower case)
     the text file will be displayed in either 40 or 80 columns depending on
     the user's configuration.

     Please examine the help files supplied with 2AM-BBS for examples of files
     using the "w" format.  For best effect, "w" format files should be
     created with a word processor that supports hard and soft carriage
     returns.























                                        3-2



     2AM BBS
     Sysop's Manual                                             User Validator
     _________________________________________________________________________


                                The User Validator
                                     Chapter 4


     The validator is the section of the BBS that allows the sysop to edit,
     view, and maintain all user accounts.  You enter the validator by typing
     "@" at the main menu.  Please note: if you do not have the privlege bit
     required for the validator, you will receive an "Invalid Command" message
     when typing "@" here.


       4.1  FILES

     This section describes all the files used by the validator section of
     2AM-BBS.

       4.1.1  USERLOG.DAT

     The userlog file is sys disk:userlog.dat.  It contains all nonpersonal
     data about the users.  The following information is stored:

     1. Username.  The name the person uses on the board, not necessarily a
        real name.
     2. Password.
     3. Date of first login.
     4. Date of most recent login.
     5. Total time on system (hours : minutes).
     6. Total number of calls ever made by the person.
     7. Time limit on system.  The maximum time allowed is 1439 minutes per
        day  (23 hours, 59 minutes).
     8. File credits (stored in terms of kilobytes) that the user can
        download.  This number is governed by the upload/download ratio you
        have set in Drive.dat (see Utilities section for more information).
     9. User privs.  A list of the privilege bits and their functions is
        contained in the file sys disk:access.dat.
     10. Number of logfails.  If a person gives an account number but the
         wrong password for that account, a logfail will be recorded in that
         account.  When the real owner of that account logs in, if the number
         is three or more, the message:

                      XX LOGFAILS SINCE LAST SUCCESSFUL LOGIN

         will appear.  XX is the number of times an incorrect password was
         given for the account number.  This number is reset to zero after a
         successful login.  If the logfails are high (5 and up), someone may
         be attempting to break into this account, or the user has forgotten
         his password.
     11. Daily E-mail limit.  Setting this to zero allows the user to send an
         unlimited amount of mail.  Valid limits are 1 through 255.
     12. Other information that the different sections of the BBS may need
         (whether the user voted on a topic, what the person's last post






                                        4-1



     2AM BBS
     Sysop's Manual                                             User Validator
     _________________________________________________________________________


         number was (to tell if a message was posted before or after the last
         time a person called in), whether the user needs linefeeds, has an 80
         column screen, can display ANSI graphics, etc.)


     The first user on the system (probably you) will be account number
     (record number) one.  Record zero is reserved for the 2AM-BBS authors so
     that they can go in and do maintenance or upload utilities or updates
     when necessary.  The userlog will then contain one record for each user.


       4.1.2  USER APPLICATION FILE

     This file contains personal information.  It is collected during the user
     application procedure when a user logs in for the first time.  The
     following information is stored:

     1. Person's last name
     2. Person's first name
     3. Person's street address
     4. Person's city
     5. Person's state (2 letter abbreviation)
     6. Person's zip code
     7. Person's voice phone number (area code mandatory)
     8. Person's modem phone number
     9. Person's age
     10. A one line statement from the person as to where they heard about the
         board.
     11. Does the person want this information kept confidential (Y/N).
     12. Bit encoded answers to up to three questions that you can pose during
         the  user application.  Bit encoding is explained its own chapter in
         this manual.


       4.1.3  SYSTEM LOGS

     The logs, sys disk:sys.log, sys disk:chat.log, sys disk:files.log,
     sys disk:handle.log, and sys disk:gen.log are kept by the system.  Syslog
     (sys.log) keeps information about new users, system errors, BBS Lister
     entries, and other information that you might need to know.  Chat.log
     keeps a record of all chat requests.  Files.log keeps a record of all
     files uploaded and downloaded through the Files section and the users who
     transferred the files.  Handle.log records all users who use the /name
     command in the editor.  Gen.log records logfails, carrier drops, and
     system startup times.  To read, copy, or delete these logs, use the [S]
     command in the validator.


       4.1.4  LOOKUP FILES

     The directory look disk contains a set of user lookup tables.  When
     someone refers to a user by name (e.g. sending Email), these files are





                                        4-2



     2AM BBS
     Sysop's Manual                                             User Validator
     _________________________________________________________________________


     consulted to find the person's usernumber.  The lookup files are just
     there to make access to the userlog quicker.  They do not need to be
     changed, and must always be present when the BBS is running.  If there
     are ever problems with them, you can delete all the files in look disk
     and run the utility LOOKER.EXE (refer to the Utilities chapter of this
     manual).  It will regenerate the lookup tables by reading from the
     userlog.


       4.1.5  ACCESS.DAT

     sys disk:access.dat contains descriptions of all the privilege bits.  The
     descriptions for each privlege bit are used when a user uses the [Y]our
     status command off the main menu.  You may view and edit the privlege
     bits descriptions in the file with the [A] command in the validator.
     Some privilege bits are reserved by the software; some are for you to
     use.  You may assign users privilege bits when you make up message bases
     and protect files in and around the BBS.


       4.2  PRIVILEGE BITS FOR NEW USERS

     When a user logs in as new, he or she ONLY gets privlege bit 1 unless the
     sysop has created the file NEWUSER.DAT in sys disk.  (See the chapter on
     new users for more information.)  The rest (Email, FILES access, etc.),
     may be given through the edit functions in the validator.


       4.3  VALIDATOR COMMANDS


          [E] - Edit User          [V] - View User
          [D] - Delete user        [A] - Access list
          [S] - Show a log         [!] - View User applic.
          [N] - New user validator [L] - Load Sweeper
          [Q] - Quick scan users   [R] - Range edit users
          [W] - Wipe users         [T] - Toggle security mode
          [M] - Main Menu

     The [E], [D], [V], [!], and [N] options all support either the username
     or user number as parameters.  Example:

                                 VALIDATOR > D203

                                        Or:

                               VALIDATOR > D DEAD ED

     If you put the option without the argument, you will be prompted for more
     information:







                                        4-3



     2AM BBS
     Sysop's Manual                                             User Validator
     _________________________________________________________________________



        Validator > D
        Username/number to delete > 203


     1. [V]iew username or number.  Displays the information in the user's
        userlog record.

     2. [!] username or number.  Displays the information in the user's user
        application record.

     3. [E] username or number.  Displays each field in the user's record to
        you one field at a time and then stops and prompts you.  Users may be
        edited manually or with a definition (.DEF) file.  If you hit return
        here, the  information will not be changed.  If you type in new
        information at this prompt, the information you just typed will
        replace the old information.  If you change a user's name, the
        validator will ask you if the user lookup tables should be modified.
        If the name change is not temporary, change the user lookup tables.
        The user's record cannot be found (when sending email to the person,
        etc) if the lookup tables are not modified.  When changing usernames,
        CHECK to make sure you don't assign two users the same username.  Both
        will be able to read each other's mail and the user lookup tables may
        not function correctly.  When it comes to the user privilege bits, all
        the user privilege bits are shown and you are prompted to add or
        delete privilege bits.  You can specify ranges of privilege bits here.
        Placing a minus sign (-) at the beginning of the line will delete
        those privilege bits from the user.  Hit RETURN when you are finished
        adding or deleting privileges.

     4. [N]ew user.  Validates username, number, or return.  (This option is a
        shortcut for [!]username or number then [E]username or number.)  If a
        name or number is not supplied, the system gives you all the new users
        in the SYS.LOG to be edited.  It is recommended that you do not clear
        the SYS.LOG until after this command has been used.  First the user
        application record is displayed.  Then you are prompted to edit the
        userlog fields.

     5. [D]elete username or number.  Will delete the user viewing the user
        record and asking you to confirm.

     6. [Q]uickscan users.  This feature outputs a two line summary of the
        user record for a range of users.  Full range parsing is available.
        Q* means quickscan all users. (NOTE: To see what the last active
        record in the userlog is, use q9999.   The last active record will be
        displayed.)

     7. [A]ccess allows you to maintain sys disk:access.dat.  You may choose
        to [E]dit a description for a privilege bit (normally done when you
        assign it to something), [L]ist privlege bits (give a range of bits to
        list or "*" to list all of them), or [S]can through the file looking






                                        4-4



     2AM BBS
     Sysop's Manual                                             User Validator
     _________________________________________________________________________


        for a bit.  When you scan, you will be asked for some characters to
        match against.  If you are trying to find the privlege bit to use
        /load in the editor, for instance, give the characters "/load".

     8. [S]how log allows you to look at a log.  After the log is displayed,
        you will be prompted to [m]ove, [p]rint, [e]rase, [c]opy, or [q]uit.
        Copying a log will create a file with the number 1 appended to the
        file name (i.e. SYS1.LOG).  The [e]rase command will clear and restart
        the log.  The [m]ove command will first copy, then erase the log.
        NOTE: Log files are just text files.

     9. [R]ange editor allows you to change file credits, mail and time
        limits, and privilege bits on a range of users.  When prompted for one
        of the first three items, you will have the option to change these,
        relative to what they are already set for, by placing a plus (+) or a
        minus (-) before this number.  For example, using +5 for e-mail on a
        user who has a 10 message e-mail limit will give that user a total of
        15 e-mail messages.  If a plus or minus is not supplied, the range
        sets it exactly to the number given.  NOTE: The range editor is a
        powerful supplement to the sweeper.

     10. [W]ipe users is a quick method of deleting a range of users.  Use
         this with the sweeper when purging users.

     11. [T]oggle security mode.  When security mode is activated, you can no
         longer jump to DOS and privacy mode will be turned on.  Privacy mode
         blanks the screen when a user enters e-mail and for selected message
         bases.  When security mode is on, an S appears in the status bar at
         the top of the screen.

     12. [L]oad Sweeper.  This is a feature of 2AM that allows you to select
         users by almost any criteria you can think of.  The sweeper is
         explained below.


       4.4  THE SWEEPER

     	The sweeper is enabled by selecting option "L" from the validator
     ([L]oad Sweeper).  It allows the sysop to select a group of users based
     on various criteria.  The sysop can then edit or view those users in a
     number of ways.  Once in the sweeper, a question mark [?] will display
     the sweeper menu.  The sweeper is automatically cleared when you enter
     the sweeper or exit the validator.

     The following options can be used in the Sweeper:

     A - Abort: Cancels and clears the sweeper, returning you to the
        validator.

     C - Call dates ( [F]irst and [L]ast ):  Allows you to select users by
        first or last call dates.  Once a date is chosen, you are then asked
        if you want the calls compared to calls made before, after, or on that
        date .




                                        4-5



     2AM BBS
     Sysop's Manual                                             User Validator
     _________________________________________________________________________



     E - E-mail limit: Allows you to select users based on their e-mail limits

     F - File credits:  Allows you to select users based on total file credits

     H - Handles - [A]dd or [R]emove a specific handle: Allows you to add or
        remove a specific handle to the sweeper at any time.

     I - Input to sweeper from text file:  Retrieves a file stored with the
        [O]utput command.  Enter a file name without any extension.  Files
        must be on sys_disk and have a .SWE extension (see "O" below).

     M - Return to validator with data (Done): Brings you back to the
        validator prompt.  If the sweeper is loaded, you will see the message
        "Sweeper is loaded".  The next validator command that directly affects
        users (i.e., range edit, quickscan) will effect that command for ALL
        users in the sweeper list.  After the sweeper list has been used, it
        is cleared.  If you wish to do more than one ranged function, output
        the sweeper list to a text file (see below).	

     O - Output sweeper to text file: Outputs the current sweeper list into a
        text file.  Supply a file name only (no extenstion).  2AM will put all
        text files created by the sweeper in the sys_disk with the extension
        .SWE.

     P - Privs: Allows you to create a sweeper list from a specific privilege
        bit.

     R - Range: Allows you to add users to the sweeper list via a range of
        user numbers.

     S - Show sweeper list: Outputs to the screen the list of users in the
        sweeper.

     T - Time allowed each day: Allows you to add users by time allowed.


     Note: File credits, time, and e-mail limits all give you the option of
     selecting a value greater than, less than, or equal to the value you
     enter.

     After entering a criteria into the sweeper using one of the above
     options, you must select a sub-command.  Sub-commands determine what is
     to be done with users that match the criteria you entered.  You can add
     and remove users to the sweeper list via the various sub-commands.  The
     following sub-commands apply when adding/subtracting users to the sweeper
     list:

        [1] Add matches and remove non-matches
        [2] Add non matches and remove matches
        [3] Add matches only
        [4] Add non matches only
        [5] Remove matches only
        [6] Remove non matches only



                                        4-6



     2AM BBS
     Sysop's Manual                                             User Validator
     _________________________________________________________________________



     Example 1:

     Below is an example of the purging users with [C]all date option.  Users
     who have not called since 1-23-88 are selected, then deleted using the
     [W]ipe command.

     Sweeper is empty
     Sweeper  >c
     Which call?  [F]irst, [L]ast, [Q]uit  >L
     Enter date to check against Last call date (xx-xx-xx) >01-23-88

     Select users whose Last call is BEFORE/AFTER/ON this date? <B/A/O>  >B
     Selection option [1-6],[?] >3
     Working..
     Completed.

     Users in Sweeper: 35
     Sweeper  >m
     Sweeper Loaded
     Validator >w
     4 : CHRIS                                   01-17-87 -- 07-18-87
     Delete this user ([Y]/n/q) >

     (We cut out the other 34 users in the interests of brevity.)


     Example 2:

     Below is an example of using the [P]riv bit option.  We selected all
     users who have privlege bit 101, then removed all users who had privlege
     bit 65.

     Sweeper is empty
     Sweeper  >p
      Enter the Priv to Check: 101
     Selection option [1-6],[?] >3
     Working...
     Completed.

     Users in Sweeper: 53
     Sweeper  >p
      Enter the Priv to Check: 65
     Selection option [1-6],[?] >5
     Working...
     Completed.

     Users in Sweeper: 47









                                        4-7



     2AM BBS
     Sysop's Manual                                             User Validator
     _________________________________________________________________________


       4.5  PRIVILEGE BITS FOR THE VALIDATOR

     The following privilege bits are reserved for the validator:

     1. #89:  User may enter the validator
     2. #90:  User may view user applications in the validator.
     3. #91:  User may view passwords when reading user records.
     4. #92:  RESERVED for future validator expansion
     5. #93:  User may edit user records in the validator.
     6. #94:  User may delete user records in the validator.

     You can give limited validator access by giving out privilege bit #89,
     bits #89 and #90 or privilege bits #89, #90 and #91.  These combinations
     allow partial viewing of user records.











































                                        4-8



     2AM BBS
     Sysop's Manual                                                User Logins
     _________________________________________________________________________


                                    User Logins
                                     Chapter 5


     This chapter will describe the login process from the sysop's point of
     view and point out some of the changes you can make to the new user
     process.


       5.1  NEW USER LOGINS

     When first logging in, a user will get the Board Name, communications
     parameters, and a <HIT RETURN> prompt.  After hitting return, the file
     text disk:start.txt is output.  Most BBSes use this as an introduction to
     the board.  NOTE: this file, like most other files MUST exist or users
     logging in will get "file not found" messages on their screens.  If you
     do not wish text to output in certain places (such as here), just create
     a blank file.

     The user will then answer some questions that will be used to set up his
     or her account.  Details of these questions are in the user's manual.
     All the information that is entered here is stored in
     sys disk:userlog.dat.

     Next the file text disk:userapp.txt will be output.  This marks the
     beginning of the user application procedure.  The user will then be asked
     for real name, address, etc.  This information is stored in
     sys disk:userapp.dat.  Most questions are pre-configured, but a few can
     be modified by the sysop.  There are three multiple choice questions that
     can be asked in the user application process.  Each question can have up
     to 8 choices for answers.  If you want to ask these questions, create any
     of the following files:


        text disk:appq1.txt
        text disk:appq2.txt
        text disk:appq3.txt


     List the choices in the file with numbers next to each choice.  This file
     will be output and the user will be instructed:

        Input all choices that apply
        Input one choice per line
        Hit RETURN on a blank line when done

     Responses to these questions will be stored as three bit encoded numbers.
     Bit encoding is discussed in its own chapter in this manual.

     Each BBS has a policy for releasing information, and your policy should
     be written up and saved in the file text disk:privacy.txt.  A standard
     statement usually goes something like:





                                        5-1



     2AM BBS
     Sysop's Manual                                                User Logins
     _________________________________________________________________________



        Do you mind if the sysop releases your account name to users of
        similar interest?  Under NO condition will your user information be
        released without your permission.

     This statement is followed by the text:

                      Do you agree to the above terms [Y/N] >

     If the person answers NO, his or her user application will contain the
     words "Information marked Confidential!"

     Now, closing comments for the user application are output
     (text disk:append.txt).

     The user is assigned an account number and is then tested to make sure he
     has written it down and remembered it.

     Now the file text disk:nuser.txt (or nuser80.txt or nuser80x.txt) is
     output.  This file contains comments to the new user (board policy, any
     special features or functions of the board, etc.).

     After hitting return, the new user is placed where an old user would
     first come into the board.  The file text disk:notes.txt is output.
     NOTE:  this file is the file output for the "read bulletin" option (the
     [+] option on the main menu).


       5.2  THE STANDARD LOGIN

     Any user can login with either his or her account number OR by typing his
     or her user name at the first prompt.  NOTE:  if a user supplies an
     illegal account name/password combination, the account with the incorrect
     password will be marked as having a logfail on it.  After 3 logfails, the
     board will drop carrier on a user and will continue to drop carrier on
     anyone who gives an incorrect name or password for that account.

     Once the user has logged in, a check on their daily time limit is made.
     If they have used all their time for the day, they are notified that they
     have exceeded their daily time limit and the board resets.  If the user
     is attempting to log in from local mode and does not have privilege bit
     72, they are given the message "Insufficient access to enter local mode"
     and the board resets.  When a user successfully logs in, the file
     text disk:notes.txt will be output.  Then some of the following lines
     will appear:


        Welcome USERNAME
        You are caller number 44, 21 for today
        Last caller was LAST USER
        4 Logfails since last login
        You have 3 new Email messages
        New voting topics have been created
        New trivia questions have been created



                                        5-2



     2AM BBS
     Sysop's Manual                                                User Logins
     _________________________________________________________________________



     The caller number and name of the last caller is stored in the file
     sys disk:last.  This file is specially formatted, and it should not be
     changed.

     If there were more than two logfails on the account, a notice of the form
     above will be output.  Also, if there is new Email for the user, the user
     will be notified upon login as above. Note also that when new
     trivia/voting topics are created, the user will get the last two lines in
     the example.


       5.3  NEWUSER.DAT

     Newuser.dat allows you to alter the default configurations for new users.
     The example below will use these defaults.

     The file sys disk:newuser.dat can contain the configurations shown below,
     or any variation you wish to grant a new user.  Each line contains a
     number to be assigned, followed by a description of what that number is
     used for.  The file must contain these items in the following order:

        100 - File credits (in kilobytes) a new user can download before
        uploading
          0 - E-mail limit (0 equals no limit on e-mail messages per day)
         35 - Time limit for a new user
          1 - Privilege bit to give to new user

     These quotas and privileges will automatically be given to all new users
     on their first call.  NOTE: Additional privileges can be added, one per
     line, after the last line in this example.  The descriptions after the
     numbers are not necessary but help guide modification of the file.

     Please note: Do NOT give out important privilege bits to new users.  2AM-
     BBS will not allow you to grant bits 81 through 100 with this file.  It
     is recommended that sysops give out privilege bit 1.  This bit is not
     used by the program, but it is convenient to use for message base access
     and it is the default bit to assign to all files, voting, and trivia
     sections.


       5.4  .DEF FILES

     .DEF files are a fast method for sysops to edit users' accounts.  The
     format is identical to the format of NEWUSER.DAT above.  If Time Limit,
     E-Mail Limit of File Credits are 0 in a .DEF file, the users' current
     values will not be altered.  .DEF files allows a sysop to create lists of
     standard privs that are given to validated users.  Using .DEF files
     insures that you give the same privilege bits to users when you are doing
     some kind of standard account editing (ie: validating a new user).







                                        5-3



     2AM BBS
     Sysop's Manual                                                User Logins
     _________________________________________________________________________



       5.5  SPECIAL LOGIN MESSAGES

     There are three special login messages that can be displayed when a user
     logs in.  Each is triggered by a privilege bit.  If privilege bit #75 is
     on, the file text disk:splogin1.txt is output.  If privilege bit #76 is
     on, the file text disk:splogin2.txt is output.  If privilege bit #77 is
     on, two things happen.  The file text disk:splogin3.txt is output, and
     the user is forced to fill out another new user application.  Set
     privilege bit #77 when a user supplies false information in the user
     application.  Then set up file splogin3.txt with some message indicating
     that you rejected the application.  The file will be output, and the user
     will be taken to the user application section.  Privilege bit #77 is
     reserved for this purpose, but you are free to use the other two bits as
     you see fit.  NOTE: All three special login messages are non-abortable.


       5.6  REJECTS.DAT

     The file REJECTS.DAT in SYS_DISK can be used as a means of disabling
     certain handles from being used by new users on your BBS.  Pattern
     matching is also available.

     This is an example of the REJECTS.DAT file:

        NEIL
        *LARK
        -*SYSOP

     The above set of lines show all three possible modes selected in the
     rejection list.  The first line is an example of a direct pattern match.
     If a user tried to create an account called NEIL then they would get the
     message that that name is reserved or restricted on this bbs.  The second
     line would do the same thing, but restrict any handle containing LARK (ie
     CLARKE, LARK BARK, LARKING).  The final example performs the same as the
     previous examples except that the "-" at the beginning of the line tells
     it to let the person fill out an application before telling them the name
     is bad.  This option is there just in case you are really sick of people
     using foul handles, and you want to make then suffer through the
     application before they find out they can't use that handle.  The system
     puts them through the entire application procedure, but does not save
     their information anywhere.















                                        5-4



     2AM BBS
     Sysop's Manual                                                 The Editor
     _________________________________________________________________________


                                    The Editor
                                     Chapter 6


     The board has one editor, and it is called whenever you post a message on
     a message base, in feedback, in Email, and in the BBS Lister.  If you
     wish, you can use the editor to edit text files as well using the /LOAD
     and /SVE commands described below.


       6.1  PRIVILEGED OPTIONS

     All commands are explained in the user's manual except for three
     privileged commands:

     1. /LOAD will prompt you for a text file name, and will load that text
        file into the editor.  You will be placed right after the last line of
        the file you have loaded in.  You can then edit this file.  REMEMBER:
        the editor will only allow at most 100 lines, so if your file is
        larger than 100 lines, it will be truncated.

     2. /SVE will prompt you for a file name and will then save the contents
        of the editor into that file.  Using this feature, you can "/load" in
        files and edit them and then "/sve" them.  If you are editing a file
        for the bbs or something like that, just "/a" (abort) out of the
        editor after you are done editing (otherwise, the file will be saved
        as a message).  Note: You can overwrite files using "/sve". If the
        file already exists, you will be prompted as to whether or not you
        wish to overwrite it.

     3. /NAME this command allows the user to change to name appearing in the
        heading of a message.  The name used must be a name that is not
        currently in the user log.  This prevents people from "impersonating"
        other users.  /NAME can NOT be used in email.  Also /NAME can not be
        used in certain types of message bases.  Please refer to the Message
        Base section of this manual for more information.


       6.2  PRIVILEGE BITS USED

     Privilege bits can be assigned to give users privilege to enter longer
     messages into the editor.  If you do not give any privilege bit out, the
     user will have a 40 line editor.  If you wish a user to be able to type
     in more than 40 lines, you may use the following bits:

     1. #78 - Gives a user a 60 line editor
     2. #79 - Gives a user a 100 line editor

     In addition, the following other privilege bits pertain to the editor:

     1. #81 - /LOAD command in the editor
     2. #82 - /SVE command in the editor
     3. #87 - Allows change of handle (/NAME)
     4. #80 - Allows ANSI color escapes sequences in the editor



                                        6-1



     2AM BBS
     Sysop's Manual                                                 The Editor
     _________________________________________________________________________



























































                                        6-2



     2AM BBS
     Sysop's Manual                                              Message Bases
     _________________________________________________________________________


                                   Message Bases
                                     Chapter 7

       7.1  FILE FORMATS

     There are three files to each message base.  These files are baseXX.ptr,
     baseXX.dat, and baseinfo in the base_disk directory.  (XX equals base
     number.)  Baseinfo is a directory of what bases are available.  The file
     contains all of the information necessary for accessing, describing, and
     maintaining the bases.  A base cannot be accessed unless there is a line
     in baseinfo that refers to that base.

     BASEINFO STRUCTURE

     The following is the format for a line in baseinfo:
     (| = one blank space)

     base_number | read_priv | write_priv | maint_priv | base_window |
     base_selection | base_name

     OR

     0 | priv to view comment | 0 | 0 | 0 | 0 | comment

     1. Base_number is the number for the base.  NOTE: it is not necessarily
        the base number that every user sees.  For instance, when a user goes
        to base 3  the user will be taken to the third base in the baseinfo
        file that he has access to.  This may be any base number, not
        necessarily physical base number three.  The base number a user sees
        is called the logical base number and will be dependent upon the
        user's access level.  The physical base number is the number you
        assign the base in baseinfo.  For example, a line in baseinfo
        containing a base number of 3 will refer to files base3.ptr and
        base3.dat.  If this base is at the end of the baseinfo file, it may
        have a logical number of 10 if it is the tenth base the user can
        access.  For the most part, you do not have to be concerned by logical
        base numbers.  They are automatically determined by 2AM according to
        the order you list information in the baseinfo file.  The physical
        base numbers are used to determine what files will hold the message
        for a specific base.  In addition, the physical base numbers also are
        used to select different base types.  The following base numbers give
        the sysop several options:

        1-199    Normal bases
        200-299  No /NAME allowed unless user has privilege bit 99 (system
                 access)
        300-399  Anonymous posting is automatic
        400-499  Real names are used automatically
        500-699  Normal bases/privacy mode on
        700-799  No /NAME without privilege bit 99/privacy mode on
        800-899  Anonymous posting is automatic/privacy mode on
        900-999  Real names are used/privacy mode on





                                        7-1



     2AM BBS
     Sysop's Manual                                              Message Bases
     _________________________________________________________________________



     Normal bases are bases in which there are no added restrictions or
        features. Handle change (/NAME) is allowed on all bases from 1-199 and
        500-699 if the user has the /NAME privilege bit.
     Anonymous posts are messages in which the time is left blank and the
        poster's name is changed to ANONYMOUS.  This is an automatic feature
        and cannot be overridden with /NAME.
     Real name bases are bases that will change the user's handle to the name
        that they supplied in their user application.  This is an automatic
        feature and cannot be overridden with /NAME.
     Privacy mode will cause the screen to blank when a user enters this base
        whenever security mode is enabled (see validator T command).  NOTE:
        Privacy mode will NOT go into effect during a local mode login.

     2. Read_priv is the privilege bit necessary to read in this base.  A user
        will not know a base exists without read access to the base.

     3. Write_priv is the privilege bit necessary to write in this base.  You
        may give a user read_priv for the base without write_priv if you wish.
        If a user does not have the write privilege for the base, an asterisk
        will appear next to the base name in the [S]how bases option.

     4. Maintenance_priv is the privilege bit necessary to do maintenance in
        this base.  By giving each base a different maintenance privilege bit,
        you can allow individual users to govern particular bases.  With
        maintenance privileges, a user can delete or edit any message on the
        base.  The user can also access base maintenance while on the base.
        It is not necessary to give all bases different maintenance bits.  If
        you do not wish to give users maintenance access, assign it one of the
        system bits such as 99.

     5. Base_window allows you to set a finite amount of messages per base
        that you wish to remain visible.  Messages outside of this window will
        not automatically be deleted.  Messages may be retrieved if they
        scroll off the window by altering the window size or by deleting newer
        messages.  Messages may be deleted by using the BSMaint Utility (see
        Utilities chapter for more information.)  A window of zero allows for
        unlimited messages on that base.

     6. Base_selection is one of the "invisible" privilege bits or zero.  The
        number assigned must be between 213 and 252 if you want to allow the
        users to de-select this base.  This option is used for the Read
        Selected command.  NOTE: whenever you create a new base, it would be a
        good idea to grant all users the access bit you have assigned for this
        field.  If you assign this field a zero, a user cannot de-select the
        base.

     7. Base_name is the name of the base.  Examples: "Public", "System News",
        "IBM computer user's forum".  The name can be up to 35 characters and
        can contain any legitimate ASCII characters or ANSI color sequences.







                                        7-2



     2AM BBS
     Sysop's Manual                                              Message Bases
     _________________________________________________________________________



     The following is an example baseinfo line:

                        12  1  4  45  100  215  Public Base

        12: The messages for "Public Base" are in base disk:base12.ptr and
        base disk:base12.dat.

        1: Anyone with privilege bit 1 can read messages in this base.  If a
        user does not have privilege bit 1, he or she will not even know that
        this base exists.

        4: Anyone with privilege bit 4 can post messages on this base if they
        have privilege bit 1 as well.

        45: Anyone with privilege bit 45 can do maintenance on this base if
        they have privilege bit 1 as well.

        100: is the maximum number of messages visible on this base.

        215: is the privilege bit used for selection purposes.

     An example baseinfo file:

        1)      1  65  65  99    0     0 Feedback
        2)      0   1   0   0    0     0
        3)      0   1   0   0    0     0 System Boards
        4)      0   1   0   0    0     0 :::::::::::::
        5)     16   1   1  12   200  215 Public Base
        6)      3   1  99  99    0     0 System News

     The numbers in boldface are NOT part of the baseinfo file.  They are for
     referencing purposes only.  Also, please note the spacing in the sample.
     Please make your baseinfo file easy to read.

     1. Feedback messages are in base 1 (ie. base1.dat and base1.ptr), and
        feedback will appear as base 1 to any user with privilege bit 65.

        You must have feedback as the FIRST base in the list, and you must
        have privilege bit 65 in both the read and write fields.

        Users are temporarily given privilege bit 65 whenever they leave
        feedback.  If you put ANY other number down, people will not be able
        to send you feedback. Instead, feedback will go to the first base that
        they have access to.  If you want to make feedback public, this is a
        good way to do it.

     2. Comment line.  This causes a blank line to be printed in the [S]how
        bases command provided the user has privilege bit 1.

     3. Comment line.  This prints out the words "System Boards" to be printed
        in the [S]how bases command provided the user has privilege bit 1.





                                        7-3



     2AM BBS
     Sysop's Manual                                              Message Bases
     _________________________________________________________________________



     4. Comment line.  This prints out the underscore in the [S]how bases
        command provided the user has privilege bit 1.

     5. Public Base.  Read access is privilege bit 1, write access is
        privilege bit 1, maintenance access is privilege bit 12, window size
        is 100, and selection is allowed with privilege bit 215.

     6. System News.  Read access is privilege bit 1, write access is
        privilege bit 99, maintenance access is privilege bit 99, window size
        is unlimited, and de-selection is not allowed.

     The baseinfo file may be edited with any text editor, or you may use the
     baseedit utility described in the utilities chapter.  We highly recommend
     you use the baseedit program provided with 2AM-BBS since it will reduce
     the possibility of making errors when editing the baseinfo file.


     .PTR AND .DAT FILES

     2AM-BBS comes with a few of these files.  Keep one baseXX.ptr and one
     baseXX.dat file for feedback and assign the rest to user bases.  You can
     create more base files with the [X] option in maintenance (see below) or
     with the BASEEDIT program covered in the utilities section of this
     manual.


       7.2  BASE MAINTENANCE

     A user can do maintenance on a base if he or she has the master base
     maintenance privilege bit (86) or the privilege bit to do maintenance on
     that particular base.  Base maintenance allows the following:

     1. In a [S]how bases command, a dash '-' will appear next to any base
        that a user has base maintenance privileges for.

     2. Users with base maintenance privileges can read deleted messages and
        undelete messages (from the maintenance section).

     3. Users with base maintenance privilege bits have the option to compact
        deleted messages.  A compacted message cannot be undeleted.  If you
        choose to compact a deleted message, any number from 1 to the size of
        the base (ie., 200) is valid.  NOTE: The closer to the beginning of
        the base, the longer it takes.  Compacting from message one causes the
        compaction to run through the entire base.  It is recommended that you
        compact from the message previous to the one being deleted.

     4. Users with base maintenance can delete or edit any message on the
        base, or delete a range of messages.








                                        7-4



     2AM BBS
     Sysop's Manual                                              Message Bases
     _________________________________________________________________________


     Typing "maint"  from any base prompt puts you into the base maintenance
     section.  Typing "m" will get you back to the main base prompt.  The
     following options are available:

     1. [X] Base Create.  This option allows a user to generate new baseXX.dat
        and baseXX.ptr files.  Bases cannot be seen by the public until there
        is a line for the base in baseinfo.  When creating a base, you will be
        prompted for the physical base number of the base (the number that
        corresponds to the XX in the baseXX.ptr and baseXX.dat files).  Don't
        confuse this physical base number with the logical base number.  If
        you try to create a base and it already exists, you will be prompted
        as to whether or not you want to overwrite the existing files.  If you
        choose yes, the messages will be erased and a new base will be
        generated.  A user needs privilege bit 85 to create bases.

     2. [U]ndelete messages.  Any message that is marked deleted can be
        undeleted here.  NOTE:  compacted messages are lost forever.  Only
        messages marked "Deleted" in their header may be undeleted.

     3. [C]opy Message.  Allows a user to copy a message to another base.  You
        may copy either by the logical base number or by the base name.
        (Example: in copying a message to the feedback base, you can enter
        "Feedback" or any significant string of characters from that base
        name.)  A user needs privilege bit 83 to copy messages.

     4. [G]rant access.  Allows a base-op to grant users read and write access
        to a base.  Users may be entered by handle only.

     5. [R]emove access.  Allows a base-op to remove users' read and write
        access to a base.  Users may be entered by handle only.  NOTE: If you
        use the same privilege bit to read or write on more than one base, and
        a baseop removes a user's privilege for one of those bases, the user
        loses access to ALL bases containing the same read/write privilege
        bit.

     6. [L]ist users.  This prints out a list of all users with read, write,
        and maintenance access to a base.  Asterisks appear in the appropriate
        category for each user.

     7. [W]ho command.  This shows the actual handle of users who posted a
        message or range of messages.  It is used as a quick way of
        determining who changed handles in a message base.  It may also be
        used on bases that are restricted to anonymous or real name posting.

     8. [I]nformation command.  This allows a base-op to create the base
        information (the message that is displayed via the "I" command in the
        bases).  When you type "I" from base maintenance, you are put into the
        editor of the current base information message.  If base information
        does not exist, just input what you want the message to contain.  If
        the base information already exists, you will be placed at the last
        line of the current base information message.  You must restart or






                                        7-5



     2AM BBS
     Sysop's Manual                                              Message Bases
     _________________________________________________________________________


        delete the current message if you want to change the information
        completely.


       7.3  PRIVILEGE BITS USED

     1. You may reserve whatever unused privilege bits you want to give a user
        read access, write access, and maintenance access to a base.  You
        specify the privilege to read and/or write to a base in the file
        base disk:baseinfo (described above).  Use the access list in the
        validator to see which bits are currently unused.  When you reserve a
        privilege bit, add it to your access list so that you have an accurate
        record of what bits you used.
     2. Privilege bit #65 allows a user to read/write in feedback.
     3. Privilege bit #83 allows a user to copy messages.
     4. Privilege bit #85 allows a user to create bases.
     5. Privilege bit #86 gives the user master base maintenance privileges


       7.4  BASE CLEANUPS

     When messages are deleted or edited, excess data collects in the base
     files.  Running the utility BSMAINT (see Utilities chapter for complete
     information) cleans out the excess data and compresses the message bases.
     NOTE: if you want to completely wipe a base, just use the base create
     option in maint.  It will delete the old base files and generate new,
     empty ones.






























                                        7-6



     2AM BBS
     Sysop's Manual                                                      Email
     _________________________________________________________________________


                                       Email
                                     Chapter 8


       8.1  EMAIL COMMANDS

     The following commands can be issued by any user who has access to the
     email section of 2AM-BBS:

        1. [M] - Return to main menu.
        2. [P] - Post.  Send an email message to a user.  If you would like to
           send the same message to several people, enter all their account
           names separated by a comma.  For example:

        		E-mail > P CAT, LARRY E., CHRIS,TV

           will send the message to users: CAT, LARRY E., CHRIS and TV all at
           once.
        3. [R] - Read email.  You will be asked if you would like to read your
           incoming or outgoing mail.  You could enter [RI] or [RO] to read
           you mail thus avoiding the prompt 2AM displays if you enter only an
           [R].
        4. [L] - List all your email messages that are still outgoing.
        5. [U] - User lookup.  This is identical to the [U] option on the main
           menu.
        6. [H] - Identical to every menu in 2AM-BBS, option [H] calls the help
           system.

     During a Read Incoming, a user has the ability to:

        1. [A] - Answer the message
        2. [F] - Forward the message to another user.
        3. [N] - Go to the next message.  Note - this option will DELETE the
           currently displayed message.
        4. [R] - Re-Read the currently displayed message.


       8.2  SPECIAL OPTIONS DURING READ INCOMING

     There are two extra options in the Email read incoming command that the
     sysop has control over.  The first is the option to [D]isksave a message,
     and the second is to [S]kip a message.  These functions need individual
     privilege bits (listed at the end of the chapter).

     [D]isksave prompts you for a file name (to be stored in MAIL_DISK), and
     then saves the message.

     [S]kip message allows the reader to pass by this message without deleting
     it.  A skipped message will remain in the user's mail file.  It will
     appear every time the user reads incoming mail until it is deleted with
     the [N]ext message command.






                                        8-1



     2AM BBS
     Sysop's Manual                                                      Email
     _________________________________________________________________________




       8.3  MAINTENANCE COMMANDS

     There are two maintenance commands in the Email section.  These commands
     are used to view mail and print a list of a user's outgoing mail.  They
     both require the Email maintenance privilege bit.

     By adding a username to the [L] command, one may get the outgoing list
     for that username.  For example

     		E-Mail > L MADD HATTER

     will give the outgoing mail listing for the user named MADD HATTER,
     instead of your own list.

     The second maintenance command is SPY.  [SPY] allows you to view a user's
     incoming and outgoing mail as if you were that user.  All the prompts
     will be the same and have the same effect as if that user executed them.
     In other words, using the Answer option in a SPY on a user's incoming
     mail will allow you to answer as that particular user.  It will in no way
     state that you, and not the user, answered that mail.  It is not expected
     that this option will be used, as it is rather unethical.  NOTE:  This
     option automatically gives you access to skip Email messages.  NOTE:  In
     SPYing on a user's incoming mail, the [N]ext message command will delete
     the message.  Use skip to go onto the next letter.

     Example:

     		E-Mail > SPY MADD HATTER

     will prompt you as to whether you wish to read incoming, outgoing, or
     both, and then read MADD HATTER's mail as if you were him.


       8.4  FILES

     All files pertaining to Email are stored in MAIL_DISK.  The files are as
     follows:  (XX = usernumber)

     minXX.dat      Incoming mail data file for user XX.
     minXX.ptr      Incoming mail pointer file for user XX.
     moutXX.        Outgoing mail pointers for user XX.

     Each mail file is self-maintaining.  When a user is deleted, so are all
     their mail files, but not their outgoing messages.  NOTE: Once a user is
     deleted, you will be unable to list their outgoing messages.  NOTE: The
     message "Message count for this user incorrect"  may appear if a user has
     had outgoing mail to a user who has since been deleted.

     All mail files are referenced by usernumber.  Thus, changing a user's
     handle will have no effect on their incoming mail, but other users will





                                        8-2



     2AM BBS
     Sysop's Manual                                                      Email
     _________________________________________________________________________


     not be able to list outgoing messages to a user whose handle you have
     changed.  Also, if you changed a user's handle, they will not be able to
     read their outgoing mail written with their old handle.


       8.5  PRIVILEGE BITS AND MAIL QUOTAS

     2  - Access to Email
     60 - Skip messages in RI
     62 - Email Maintenance
     63 - Disksave messages in RI

     Email quotas may be set on individual users.  It is often used on
     multiuser boards to prevent people from having online conversations via
     Email.  The quota may be set at any number from 1 to 254.  Setting the
     mail limit to 0 allows a user unlimited Email messages.









































                                        8-3



     2AM BBS
     Sysop's Manual                                                      Files
     _________________________________________________________________________


                                   FILES Section
                                     Chapter 9


       9.1  FILE CREDITS AND TIMES

     In your DRIVE.DAT file there are three fields that control parts of the
     files section.  The first allows you to set a file credit system based on
     the number of Kilobytes (K) a user uploads.  This number is multiplied by
     the amount in K that the user uploads, and then added to the users file
     credits.  The other two fields control the opening and closing times for
     the files section.  (This is overridden if the user has privilege bit
     64).  Setting these two times to equal values leaves the Files Section
     open 24 hours a day.  However, setting these to two different values will
     allow you to open and close your Files Section during certain parts of
     the day.  If you wish to change these settings at any time, use the
     utility DRIVER (for more information, see the chapter on Utilities).


       9.2  FILE FORMATS

     There are several files you will use in managing uploads and downloads.
     You will note that there are two directories for the FILES utility, one
     for uploads (uload_disk) and one for downloads (dload_disk).


       9.2.1.  DOWNLOAD FILES

     There are two sets of files for downloads.  The first file is
     dload_disk:library.dat.  It holds the titles of all the libraries
     available, and you will create it yourself with a text editor.  The
     format for each line is as follows: (| = one space)


              privilege bit to access | library number | library name

                                        OR

                    0 | privilege bit to read comment | comment

     Below is a sample library.dat for two sets of libraries, one accessed by
     privilege bit #22 and one accessed by privilege bit #23:















                                        9-1



     2AM BBS
     Sysop's Manual                                                      Files
     _________________________________________________________________________



               0   22
               0   22  Normal libraries for priv #22 users
               0   22
     :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
     :::::::
               0   22
               22   8  Games
               22   7  Utilities
               0   23
               0   23  Libraries for priv #23 users
               0   23
     :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
               0   23
               23   4  Pascal programs
               23   6  Cobol programs
               71   0  Upload directory
               0    1

     Please note that the upload directory has a file number of 0 and a
     privilege number of 71.  This entry must be in library.dat or you will
     not be able to process uploads.  Also noticed that the files do not have
     to be in numerical order. The user will view the files sections in
     numerical order.  In the above example, a user with privilege bit 22 will
     see the Games directory as directory 1, even though it is physically
     directory 8. If a user does not have access to any files sections, he
     will not be allowed into the files area.


     The other set of files are dload disk:dirX.dat.  They are the directories
     of files for library section X.  Each has the following format: (| = one
     blank space)


          Privilege bit to access | Entry type | Disk file name
          Filename to display | Number of bytes | Date | Description

        OR

          Privilege bit to access | 0
          Comment line



     There are four entry types, numbering from one to four.

     1 - Non-readable
     2 - Readable
     3 - Free Non-readable
     4 - Free and readable







                                        9-2



     2AM BBS
     Sysop's Manual                                                      Files
     _________________________________________________________________________


     A free file is one that may be downloaded with the loss of any download
     credits.  A readable file is a text file in the downloader.  A non-
     readable file is a program or archive.

     Example:

        1 0
         #   Filename      Bytes     Date      Description
        1 0
        ----------------------------------------------------
        1 1 C:\PROG1.COM
        PROG1.COM       21888  11-15-87 PROGRAM TO TIE SHOES
        4 3 C:\FW\BBS\UMAN\OUTPUT\2AMUSER.ARC
        2AMUSER.ARC     36944  11-15-87 2AM USER'S MANUAL (FREE DOWNLOAD)
        1 0
        THIS IS A COMMENT -- NOTE THE ZERO IN THE COMMENT FIELD
        1 2 C:\BBS\DLOAD\THINKER.DOC
        THINKER.DOC      1031  11-15-87 COMPUTER THOUGHT (READ ME)


       9.2.2.  UPLOAD FILES

     1. The uploaded files themselves are called uload disk:up-XX.YY where XX
        is the upload number and YY is the port number (if the system is
        running more than one).
     2. uload disk:lastu.dat contains the number of the last upload.  It will
        be created automatically when an upload is made if it does not exist.
     3. text disk:uplod.txt is a non-abortable text file that will be output
        when a user requests an upload.  It is normally used to explain system
        rules concerning uploads.


       9.2.3.  EXTERNAL PROTOCOLS

     This option allows the sysop to add additional file transfer protocols.
     There are three variables that may be passed to these programs.  BAUDRATE
     (note uppercase), COMPORT, and NAME.  BAUDRATE is the buad rate the user
     is calling at.  COMPORT is the COM port the user is on.  NAME is the
     filename to send/receive.  All but NAME are optional.

     1. dload disk:protocol.dat contains the necessary information for calling
        external download protocols.
     2. uload disk:protocol.dat contains the necessary information for calling
        external upload protocols.

     The format for these files, is two lines for each protocol.  The first
     line contains the protocol and necessary information.  The second line
     contains the name of the protocol that you wish to display in the list.

     Example:







                                        9-3



     2AM BBS
     Sysop's Manual                                                      Files
     _________________________________________________________________________


        %C:\PROTOCOL\DSZ.COM  port  COMPORT  speed  BAUDRATE  D  sz  NAME
        Zmodem
        %C:\PROTOCOL\DSZ.COM  port  COMPORT  speed  BAUDRATE  D  sb  -k  NAME
        Ymodem  1K  (True  Ymodem)
        %C:\PROTOCOL\DSZ.COM  port  COMPORT  speed  BAUDRATE  D  sx  -k  NAME
        Xmodem  1K

     The above example shows you how to use Omen Technologies DSZ external
     protocol program for downloads.  This file would reside in DLOAD_DISK.
     NOTE:  There are percent signs at the beginning of each program line to
     let the BBS know that these are .COM/.EXE files.  They follow the same
     format used by JUMPDOORs.


       9.3  THE MAINTENANCE UTILITY

     This utility in the FILES section is accessed by typing "maint" at one of
     the FILES prompts.  You will need privilege bit #64 to access this
     maintenance section.  There are different maintenace options depending on
     whether you are in the upload library or one of the files libraries.


       9.3.1  FROM A FILE LIBRARY

     When calling MAINTENANCE from any library (except the upload library),
     you have several options:

     1. Add [C]omment.  You are asked for the comment to add and the privilege
        to view it.  It is placed at the end of the library listing.

     2. Add [F]ile.  You are asked for:

          1) Privilege bit to read the file (default is 1)
          2) Full Filename on Disk (include drive name and path)
          3) Description (up to 40 characters) for the file.
          4) File type (1 through 4)

        The MAINTENANCE utility will stamp the date and size into the entry
        and add it to the end of the library list.

     3. [U]pdate dir.  All files in the directory will be checked to see if
        they exist.  If a file is not found on the disk, but is listed in the
        library,  it will be listed and you will be asked if you want to keep
        it in the directory.  An answer of [Y] will write the word 'OFFLINE'
        as the size of the file, but leave the directory entry.  An answer of
        [N] will remove the file entry from the library directory.


     If you want to put comments in the middle of the list, move files around,
     or do any other fancy stuff, you will have to edit the dirX.dat file,
     taking care to stick to the proper format.






                                        9-4



     2AM BBS
     Sysop's Manual                                                      Files
     _________________________________________________________________________




       9.3.2  FROM THE UPLOAD LIBRARY

     If you are in the upload library and type MAINTENANCE you will get two
     options:

     Would you like to move files to their proper directories ([Y],n)
     File movement will show you each upload listing in reverse order (from
     the end of the library list to the beginning) and ask questions
     pertaining to what should be done with the file:

     Do you wish to keep this file [Y]/N/Save
     1. Hitting N erases the file and entry and skips the rest of the
        questions.
     2. Hitting S asks for a new name for the file.  The file cannot be moved
        out of the uload_disk directory with this command, so DO NOT put a
        drive name or path name in the file name.  Use the Save command for
        files that you wish to keep for yourself and not put in file
        libraries.
     3. Hitting Y (or return) continues.

     New disk filename for file >.  Give the filename that you wish the upload
     to be renamed to.  Include drive and path!

     Privilege bit to download DEF=1.  Give the privilege bit necessary to
     download the file.

     Which library to add to.  Give the library number you wish to add the
     upload to.  Hit "?" if you forget the list and the list of libraries will
     be output.

     Can this file be read online y/[N]?  This is to differentiate text files
     from program or archived files.

     Process next file [Y]/N.  Hit Y or RETURN to keep going, N to stop.

     At the end, the message:

                          No uploads online at this time

     will appear.  All uploads have been moved into libraries, deleted or
     renamed.


       9.4  PRIVILEGE BITS USED

     1. The user must have user privilege bit #7 on to download at 300 baud.
     2. The user must have privilege bit #8 to download at 1200 or 2400 baud.
     3. When downloading, a user is not allowed to go seriously over his or
        her time limit.  The time limit is checked before the transfer is






                                        9-5



     2AM BBS
     Sysop's Manual                                                      Files
     _________________________________________________________________________


        started.  A transfer is never aborted halfway through.  If you wish to
        allow users to exceed their time limits for a download by any amount
        (some may not be able to download a large file in the time allotted
        them), give them privilege bit #9.
     4. Privilege bits to download each individual file are stored in the
        library files.
     5. Privilege bit to access the maintenance utility is 64.
     6. Privilege bit to access the upload library is 71.  More about the
        upload library in the section on upload files.
     7. If an upload is marked for the sysop only ('/' as first character of
        the description), it will have privilege bit 99 to access it.














































                                        9-6



     2AM BBS
     Sysop's Manual                                                 BBS Lister
     _________________________________________________________________________


                                    BBS Lister
                                    Chapter 10


     This utility will keep statistics on other  BBSes and will allow you to
     compile lists of boards based on several criteria.


       10.1  FILE FORMATS

     Three files are used:  bbs disk:bbslist.dat, bbs disk:bbslist.ptr and
     bbs disk:bbslist.sr1.  They are all random access and thus cannot be
     typed out or edited.  Each will be automatically created when the first
     entry is made for it.


       10.2  MAINTENANCE COMMANDS

     In maintenance, the following commands are available:

     1. [D]elete board.  You will be asked for the entry number and the board
        listing will be removed from the database.
     2. [E]dit board.  You will be asked to re-enter the entire BBS
        description.
     3. [U]ndelete board.  You will be asked for the entry number and the
        board listing will be reinstated to the database.


       10.3  PRIVILEGE BITS USED

     1. Privilege bit #69 allows a user to add one board to the list.  After
        the board is added, this privilege bit is automatically revoked.
     2. Privilege bit #70 allows a user to add any number of boards.  This bit
        is not taken away after adding a board.
     3. Privilege bit #61 allows a user to access the maintenance commands for
        this module.





















                                       10-1



     2AM BBS
     Sysop's Manual                                                   Jumpdoor
     _________________________________________________________________________


                                     JumpDoors
                                    Chapter 11


     This allows you to offer programs that the other users can run.  These
     programs can be anything that fits in memory and can communicate through
     the serial (modem) port.  If the sysop wishes to run programs in local
     mode only, then serial port support is not required.


       11.1  FILE FORMATS

     Two files are used by JumpDoors: jump disk:Passages.dat and
     jump disk:Jumper.dat.


     11.1.1  JUMP_DISK:PASSAGES.DAT

     This is the library of available JumpDoors.  This file is not required to
     operate the BBS.  It is only necessary if you wish to make jumpdoors
     available.  Each entry in the file takes two lines and has the format: (|
     = one blank space).

        Priv | local | full file name and command line
        Description

        Or:

        0
        Comment

     Priv is the privilege required to use the jumpdoor.  Any user with this
     privilege set will be able to see and use this jumpdoor.  Local is 1 if
     the program can only be used from the console, otherwise it should be 0.
     File or command name is the full file name and command line.  The command
     line is optional.  NOTE: People running multi-user versions of 2AM-BBS
     may wish to pass the port number to a jumpdoor.  To do this, place
     PORTNUM (please note uppercase) in the command line.  When the BBS
     executes this door, it will translate PORTNUM to the actual port number.
     .COM and .EXE programs should have a % sign in front of them to identify
     them as such.  Otherwise, a " /c " (single space before and after /c)
     must be used.  These conditions are automatically added if the door is
     installed via the maintenance section.  Description is the title of the
     jumpdoor output in the [S]how command.

     Example:

        0  0
                 Jumpdoors Available
        0  0
              :::::::::::::::::::::::::






                                       11-1



     2AM BBS
     Sysop's Manual                                                   Jumpdoor
     _________________________________________________________________________


        0  0

        99  0  %C:\2AM\UTILS\BSMAINT.EXE  C:\BBS\BASES\  N  BASEINFO.ALT
        Compress  bases  with  Alternate  Baseinfo  and  BSMAINT
        1  0   /c  c:\bbs\jump\chess.bat  PORTNUM
        Play  Chess

     The above example shows three types of entries: comments, exe/com file,
     and other file types.  Note the placement of the percent and the " /c" in
     the above example.


     11.1.2  JUMP_DISK:JUMPER.DAT

     This is a file that the BBS writes before it sends a user through a door.
     It contains some information about the user that any jumpdoor program can
     make use of if it wishes.  The file is a text file and contains the
     following (each item on a separate line):

         1. System Name
         2. System Owner
         3. Username
         4. Usernumber (i.e. account number)
         5. User's first name (from application)
         6. User's last name (from application)
         7. User's City, State
         8. Time Remaining
         9. Communications port (1 or 2).
         10. Baud rate ('300','1200','2400')
         11. Number of nulls needed (an integer from 0 to 15).
         12. Linefeeds?  'TRUE' if user needs linefeeds.  Otherwise: 'FALSE'.
         13. Upper Case only? 'TRUE' or 'FALSE'.
         14. 80 columns?  'TRUE' or 'FALSE'.
         15. IBM Graphics?  'TRUE' or 'FALSE'
         16. Ansi menus?  'TRUE' if the user can display ANSI, otherwise
         'FALSE'.
         17. Bell?  'TRUE' or 'FALSE'. Current setting of the system bell.


       11.2  THE MAINTENANCE UTILITY

     Maintenance is accessed by typing MAINT at the jumpdoors prompt.  Users
     need privilege bit #100 to use jumpdoors maint.  It will add jumpdoors or
     comments to jump disk:passages.dat.  It will automatically create this
     file if it does not exist.

     If you select add [C]omment, you will be prompted for a comment to add to
     jump disk:passages.dat.  If you select add [J]umpdoor, you will be asked
     the following:

     1. Priv bit to use [DEF=1].  Give the privilege bit that a user must have
        to use this jumpdoor.





                                       11-2



     2AM BBS
     Sysop's Manual                                                   Jumpdoor
     _________________________________________________________________________


     2. Local mode only Y/N.  If the jumpdoor cannot communicate through the
        serial port, select NO here.
     3. Full name of program or command.  Give the full name of the program to
        be executed, including drive and path and extension.  Also include the
        command line  (ie. c:\myprogs\vroom.com 1 PORTNUM).
     4. Is this a COM or EXE file?  Answer yes or no.  (Is the extension of
        this program .COM or .EXE?)
     5. Description.  This is what will be displayed in the [S]how jumpdoors
        command.


       11.3  NOTES ON WRITING JUMPDOORS

     The jumpdoor must send its output to the screen and serial port to be
     useful to users who call through the modem port.  2AM-BBS de-installs all
     its serial input and output routines when it exits to a jumpdoor, so it
     will not interfere with modem communications.  You may install jumpdoors
     for programs that do not access the serial port, but users who call in
     cannot use them.  Be sure to mark these programs as LOCAL only (as shown
     above) so users do not get stuck in them.

     Any program that uses the serial port should run as a jumpdoor.  Please
     ensure, however, that it does NOT:

     1. Reset or change anything in the modem.
     2. Change the baudrate, parity, etc.  You may disconnect the user with
        these actions.
     3. Permanently alter any interrupts or interfere with memory used by the
        bbs.  2AM-BBS is in memory along with the door and will not work if
        you write all over it, obviously.

     Jumpdoors can be written in any language (C, Pascal, Basic, etc, or even
     assembly language).  Libraries of serial input/output procedures are
     readily available both commercially and in the public domain.

     If you write a jumpdoor, the 2AM Associates would be most interested in
     seeing it and, if it does anything reasonable, will be glad to distribute
     it with the BBS package if you wish.


       11.4  PRIVILEGE BITS USED

     Users must have privilege bit #100 to do jumpdoors maintenance.
     Privileges to access each individual jumpdoor is kept in the jumpdoors
     files.












                                       11-3



     2AM BBS
     Sysop's Manual                                                     Trivia
     _________________________________________________________________________


                                      Trivia
                                    Chapter 12


     This section lets you create sets of trivia questions for your users to
     answer.  Scores must be manually tallied by the sysop or a user with
     trivia maintenance.


       12.1  FILE FORMATS

     For all sections below, X refers to the physical trivia section number.
     As in the message bases, the physical numbers may not always be the same
     as the logical numbers.  For instance, the prompt may tell you that you
     are in Trivia Section 3, but may actually be in any physical section 1
     through 20.

     1. trivia.lvl -  This is a text file that you must create or modify.
        Each entry in this file consists of two numbers followed by a title.
        The first number is the privilege bit to access the section or
        library.  If this value is set to 0 then the text is considered a
        comment field.  The second number is the physical file number except
        in comment lines.  In comment lines, the second number is the
        privilege bit needed to view the comment.  This number is used to
        associate the section with a set of corresponding files.  The numbers
        used in this field must be between 1 and 20.  Note: This is the same
        layout used for the LIBRARY.DAT file in the FILES section.

       Example: (| = one space)

        0  | 1 |
        0  | 1 |  Trivia Sections Available
        0  | 1 |  ::::::::::::::::::::::::::::::::::::::::::::::::::
        1  | 3 |  General Trivia
        20 | 8 |  Star Trek Trivia
        20 | 2 |  Computer Trivia
        0  | 1 |

     In the above example, users with privilege bit 1 will see only General
     Trivia and all the comment lines.  Users who also have privilege bit 20
     will see all three sections.

     2. trivqX.dat - These files are created with the [C] option in maint.  It
        holds between 1 and 10 trivia questions that are currently available
        in trivia section X.  If you are in trivia section X and this file
        does not exist, when you try to answer the questions, the message: 'No
        Questions Available in this group' will appear.

     3. trivaX.dat - These files contain the questions and answers for the
        last trivia set if one exists.  If you are in trivia section X and
        this file does not exist, when you ask for last week's answers, the
        message 'No answers available' will appear.





                                       12-1



     2AM BBS
     Sysop's Manual                                                     Trivia
     _________________________________________________________________________



     4. tscorcX.dat - These files contain the current scores for section X,
        sorted according to percentage.  This file is automatically restarted
        when you create new questions.  If this file does not exist or is
        empty, the message 'No scores compiled' will appear if you ask for the
        scores option.

     5. tscorlX.dat - These files contain the last set of scores for section
        X, sorted according to percentage.  This file is automatically
        generated when you create new questions.  If this file does not exist
        or is empty, the message 'No scores compiled' will appear if you ask
        for the scores option.

     6. tansX.dat - These files contain answers to questions for trivia
        section X that have not been graded yet.  When you view and correct
        these responses, these files will be altered.  If this file does not
        exist, there are no uncorrected trivia answers.


       12.2  MAINTENANCE SECTION

     The "MAINT" command allows you to create question files, correct answers,
     and allow certain users to retake trivia.  A user with privileges to
     maintain a trivia section will see a "-" before the section name when
     listing the available sections.  With this section, you can have users
     correct trivia scores.  This command may be accessed if you have either
     master trivia maintenance or trivia maintenance for that physical
     section.  Privileges for each physical section are bits 193 through 212
     and are in sequential order for each section.  The following commands are
     available:

     1. [C]reate question set - The first thing this does is check to see if a
        question set already exists.  If there is an active question set, you
        are forced to answer each question.  These answers are then used to
        create the trivax.dat file (described above).  You then can input a
        new set of up to 10 questions.  Each question may take up to five
        lines.  If you do not use all five lines, just leave it blank by
        hitting return.  The old and new score files are then created.  All
        user accounts with the appropriate privilege bits are then granted the
        ability to take these questions and are notified that new questions
        have been created.

     2. [A]nswer correct - If there are answers that have not been corrected,
        they are output here for grading.  If there are no new answers, you
        will be told so.  The trivia questions and users' answers will be
        displayed one at a time.  You have the option of giving full or
        partial credit for each answer.  If you only wish to see the answers,
        select [D] and the questions will no longer be displayed.  Hitting [D]
        again will re-display the questions.  If you see the word 'quit' for
        any answer, you know the  person has aborted the question set.  After
        you correct the questions for a user, you will be prompted as to






                                       12-2



     2AM BBS
     Sysop's Manual                                                     Trivia
     _________________________________________________________________________


        whether or not you wish to adjust the score.  After this you will be
        prompted to either save and go on to the next user, save and quit,
        skip this score and go on to the next user, or skip this score and
        quit from grading.

     3. [M]odify taker.  A person is only allowed to answer trivia questions
        once.  If you wish to allow a user to retake a set of trivia
        questions, use this option.  You will be asked for the name of the
        user.  If that person exists, he will then be allowed to re-answer the
        questions.  Note for multi-user systems:  If the person is online
        while you are modifying his account, it will have no effect.


       12.3  PRIVILEGE BITS USED

     Privilege bits to do maintenance in a trivia section range from 193 to
     212  for trivia sections 1 to 20 respectively.  Master trivia maintenance
     is privilege bit 67.







































                                       12-3



     2AM BBS
     Sysop's Manual                                                      Voter
     _________________________________________________________________________


                                       Voter
                                    Chapter 13


     In the 2AM-BBS voter, you can create up to 24 topics with between 2 and
     10 choices for each topic.


       13.1  FILE FORMAT

     The only file for this section is vote disk:voter.dat.  All topics,
     descriptions and votes are kept here.  Use the utility MAKEVOTE.EXE to
     create or reset this file if necessary.


       13.2  MAINTENANCE COMMANDS

     The maintenance section is accessible to anyone with privilege bit 68 and
     contains the following commands:

     1. [C]reate vote topic allows you to create a topic.  All topics are in
        sequential order according to the date they were created.  Users with
        the correct privilege bits will be notified when a new voting topic is
        created.  When you make up a voting topic, you will be prompted for
        the following information:

        1) Vote priv:  Privilege to view and use this topic
        2) Topic Title:  This is what is displayed with the [S]how topics
           command.
        3) A three-line description of the topic.
        4) Between 2 and 10 answers of no more than 35 characters each.

     2. [D]elete vote topic.  You are prompted for the topic to delete.


       13.3  PRIVILEGE BITS USED

     Privilege bit 68 is the maintenance bit for the voter.
     Privileges for individual voting topics are determined by the sysop when
     creating a voting topic.

















                                       13-1



     2AM BBS
     Sysop's Manual                                                       Chat
     _________________________________________________________________________


                                       Chat
                                    Chapter 14


     Chat is used to speak directly to a user.  Everything you type will
     appear on your screen as well as the on the user's screen.


       14.1  REQUEST CHAT

     When a user types "chat" from the main menu, he will be prompted for a
     reason (in 80 characters or less).  The chat page is a series of nine
     bells.  If the sysop does not answer by the last bell, the user is put
     back at main menu.  A "C" will be placed in the status line at the top of
     the screen that will stay there for the rest of the user's login or until
     the sysop answers chat.  The reason for the chat request remains stored
     in memory.


       14.2  ACCEPT/DENY CHAT

     The sysop can accept/deny chat by hitting the ESCAPE key.  You are
     prompted for the following: [A]ccept, [D]eny, [C]ustom, [N]o Message.
     All but the last option outputs a text file (see below).  The sysop can
     initiate chat anywhere but at a single-character input prompt and during
     a file transfer.  If the user has already requested chat, the reason will
     be displayed when you hit the escape key. After you accept chat, the "C"
     will disappear from the status line.


       14.3  LEAVING CHAT

     To leave chat, hit the ESCAPE key again.  You are prompted for the
     following: [R]eturn user, [D]ump file.  The [D]ump file option will allow
     you to dump an ASCII text file from your computer to the user's screen.
     You cannot dump a program to the screen.  It is strongly recommended that
     you only dump ASCII text files, as other files may have unpredictable
     results on yours or your users' screens.


       14.4  CHAT FILES

     Chat uses the following files:

     1. chat disk:chat.req:  This file is output when a user requests chat.
        It is usually on the order of, "Why do you request chat?"
     2. chat disk:chat.acc:  This file is output if you accept a user's
        request.
     3. chat disk:chat.abt:  This file is output if the user hits the return
        key at the reason prompt.
     4. chat disk:chat.ext:  This file is output when you leave chat.






                                       14-1



     2AM BBS
     Sysop's Manual                                                       Chat
     _________________________________________________________________________


     5. chat disk:chat.den:  This file is output if you do not get back to the
        user requesting chat.  It basically says "could not find sysop".
     6. chat disk:chat.dni:  This file is output if you select to deny chat.
     7. chat disk:chat.2nd:  This file is output if the user tries to call
        chat a second time without the sysop having accepted the first call.

     A log of chat requests is kept in memory. For more information, see the
     validator section.

















































                                       14-2



     2AM BBS
     Sysop's Manual                                    Other Main Menu Options
     _________________________________________________________________________


                            Other Main Menu Options...
                                    Chapter 15


       15.1  CONFIGURE

     The Configure Utility allows a user to configure the BBS to his computer
     and terminal program, as well as to his own likings.  All of this
     information is kept in sys disk:userlog.dat, but can only be changed by
     the user.  There are no sysop options here.  All the options are covered
     in the user's manual.


       15.2  FEEDBACK

     This option is available during logoff or if you hit "F" at the main
     menu.  Feedback is a way for users to communicate quickly with the
     sysop(s).  The privilege bit for feedback is 65.  For more information on
     feedback, there is a section on it in the message base chapter.


       15.3  SYSTEM INFO

     This command is invoked by typing "I" at the main menu.  System info
     outputs the text file text disk:sysin.txt.  Appending an '80' or '80x' to
     the filename will output an 80 column or ANSI version of the file if
     these files exist.  This file normally contains:

     1. Computer Type
     2. Memory and Storage
     3. Peripherals on system (printer/modem/etc.)
     4. Serial number of 2AM-BBS you are running
     5. Any other system specific information.

     However, you may put any information in it that you wish.


       15.4  OFF

     The file text disk:offnotes.txt is output when a user logs off.  Many
     sysops use the logoff notes to list other BBSes that they are affiliated
     with.


       15.5  DAILY LOG

     The caller's log for the current day is stored as log disk:mm-dd-yy.log
     where mm is current month, dd is current day and yy is current year.  All
     the old logs for any past days will be here as well (in log_disk).  You
     may keep as many logs around as you wish.  When you need space, delete
     some old logs.  If a user tries to read a deleted log, he will be






                                       15-1



     2AM BBS
     Sysop's Manual                                    Other Main Menu Options
     _________________________________________________________________________


     notified that the log for that day is unavailable.  DAYVIEW (see the
     chapter on utilities) allows the sysop to read and delete log entries.


       15.6  LOGIN NOTES

     If you hit "+" at the main menu, the file text disk:notes.txt will be
     output.  If 'notes80.txt' or 'notes80x.txt' exist, they will be output as
     appropriate.  This is the same file that is displayed when a user logs
     in.


       15.7  USER APPLICATION

     If a user is online and you would like him to refile his user
     application, give him privilege bit 77 and type "!" at main menu.  (See
     the chapter on Keyboard Functions for more information on editing users
     online.)  It is used primarily to force people who have filed false
     information to refile correctly.


       15.8  ERROR!

     If 2AM-BBS encounters an error that it does not know how to deal with, it
     will give the following message:

        Error encountered... system shutdown initiated.
        The system will be back up in 1 minute.
        Disconnecting....

     A message will also be written in the syslog.  Check the files you have
     created for the section where the error occurred.  If you are positive
     your files are in order, and if the error repeats itself, please get in
     touch with 2AM Associates.  We need the EXACT line from the syslog and as
     much additional information as you can provide.  We will either fix the
     error or point out the error on your side.  All fixes of this nature are
     bug fixes and are free, so please do speak up if something strange crops
     up.



















                                       15-2



     2AM BBS
     Sysop's Manual                                      Main Menu Maintenance
     _________________________________________________________________________


                               Main Menu Maintenance
                                    Chapter 16


     This allows you to manipulate files on the disk and requires user
     privilege bit #66 to access.  Type [MAINT] at the main menu prompt to
     enter main menu maint.  The menu is (menu disk:maint.mnu) and offers the
     following commands:

     1. [A]dd directory mimics the DOS mkdir command.  You will be asked for
        the name of the directory to add.

     2. [C]opy file will ask for a file to copy from and a filename to copy
        to.  It works exactly as the DOS copy  command with the exception that
        it will NOT copy groups of files (ie. copy *.dat *.old).

     3. [D]irectory will ask for a path, and output a directory in the form
        that DOS 'dir /w' does.  Two things here:  put a '\' at the end of the
        path name or directory will not work.  Also, sub directories will not
        appear.

     4. [E]rase a file asks for a filename and then deletes that file.  It
        works exactly as the DOS erase or delete commands do, with the
        exception that you cannot delete more than one file at a time (ie.
        erase *.dat).

     5. [F]orce login notes goes through the entire userlog and sets
        everyone's forced login notes read flag to true.  Every user will have
        to read the login notes in their entirety once, after which theis
        login flag will be turned off.

     6. [R]emove directory will ask for a directory name and remove that
        directory.  It works exactly as the DOS rmdir command works.

     7. [V]iew text file will ask for a text file name and then will output
        that file.

     8. [X]-fer files allows a remote user to send/receive a file.  The user
        is asked whether the file should be sent to the BBS or received, and
        then for the filename (give full filename including drive letter and
        path) on disk.  Note: this option does not make an entry in the
        FILES.LOG.

     9. [S]top port (available only in multi-user mode) will notify and then
        log out the user on the port specified.












                                       16-1



     2AM BBS
     Sysop's Manual                                      Miscellaneous Options
     _________________________________________________________________________


                               Miscellaneous Options
                                    Chapter 17


       17.1  LOGGING IN FROM THE CONSOLE

     If a user has privilege bit #72, he can access the bbs from the terminal
     (local mode).  This privilege bit prevents anyone from walking up to your
     terminal and logging in.  It is especially useful when the terminal is
     easily accessed by many people that you don't want logging in locally.
     To log on in local mode, hit the ESCAPE key.


       17.2  TIMEOUTS

     The system will not just sit forever waiting for a user to do something.
     So that no one is able to log in and hold the system forever, all prompts
     are set to timeout after a certain time.  Timeouts run as follows:

     1. A user has 5 minutes to get a valid username and password entered from
        the "account number" prompt.
     2. If the user is a new user, 35 minutes are allotted for filling out the
        new user application.
     3. Once the user is inside the board, a user's time limit is governed by
        the time limit set in the user record.  New users get 35 minutes
        online by default.  NOTE: This may be altered by creating or editing
        the Newuser.dat file.
     4. If a user is at one of the many single-character prompts, the user has
        5 minutes to pick an option before a default option is picked for the
        user.  For example:

                             Leave feedback? (y,[N]) >

     If a user times out, he will automatically default to the [N] option and
     continues to the next prompt.


       17.3  CARRIER DROPS

     If the user drops carrier, the bbs will restart.  Users lose two minutes
     each time they drop carrier unless they have the two minute time penalty
     disable (privilege bit number #73).   If a user has call waiting, you may
     want to give him or her this privilege bit.


       17.4  THE SCHEDULER

     The scheduler allows the sysop to run other programs at prescheduled
     times.  Such programs might be used to run utilities or place your board
     offhook at certain times of the day.  Scheduler data is stored in a the
     file: sys_disk:schedulX.dat where X is the port number to be run.  The
     file is in the following format.





                                       17-1



     2AM BBS
     Sysop's Manual                                      Miscellaneous Options
     _________________________________________________________________________


     (| equals one space).

     Hour (0 through 23) | minutes (0 through 59) | 0 or 1 | Command to pass
                                      to DOS


     The third field (0 or 1) is used to signal a priority shutdown.  If this
     is set to 1, the board will shut down at that time no matter what is
     being done by the user.  If it is set to 0, the user's time limit will be
     truncated but they will not be forced offline at the exact time of the
     scheduled shutdown.  For instance, if a user is leaving feedback, he will
     be allowed to finish it before the board takes itself offline.

     Example:

      4  30  0   /c  C:\BBS\SCHEDULE\BACKUP.BAT
      6  25  1   /c  C:\BBS\UTIL\BSMAINT.EXE  C:\BBS\BASES\  Y  BASEINFO.ALT

     At 4:30 AM, the board will shut down (non-priority) and execute the
     BACKUP.BAT program.  Note the extra space before the /c as well as the /c
     itself.  This is identical to the system used for jumpdoors.

     At 6:25 AM, the board will shut down (priority) and compress the bases
     listed in BASEINFO.ALT.  The Y indicates that it will compress messages
     outside the window limit (See utilities chapter for more info).

     NOTE: All tasks are expected to be in order of execution.  In other
     words, a task to be executed at 3 AM should be before a task to be
     executed at 4 AM.  If a task runs over time into the next task, the
     second task will not be executed.  When the scheduler is active, the main
     screen will notify you with the message "Shutdown time scheduled".


       17.5  A NOTE ABOUT BACKUPS

     Since it is likely that you will be producing backups via the scheduler,
     this note is placed here.  Many commercial back-up program have an
     interesting quirk to them.  If for some reason you have to restore your
     system from a backup you made, they usually do not recreate "empty"
     subdirectories.  The sem_disk used by 2AM will normally be empty when
     there are no users on line.  If this directory does not exist, 2AM will
     NOT run properly in multiuser mode.  When restoring from any backup
     program, make certain that ALL directories are in place since some many
     not have had anything in them when the backup was made.













                                       17-2



     2AM BBS
     Sysop's Manual                                                  Utilities
     _________________________________________________________________________


                                     Utilities
                                    Chapter 18


     A utility is a stand-alone program that must be run from outside the BBS.
     Each of the following utilities must be run from DOS.  To run any of the
     utilities, input the program name at the DOS prompt.


       18.1  BASEEDIT.EXE

     This program is designed to assist the 2AM sysop in creating his/her
     message base "BASEINFO" file.  It provides a simple to use editor that
     will eliminate the possibility of confusing access bits while creating
     the file.  It also provides the option to view the baseinfo file as it
     would be output by 2AM-BBS.  This output can be the entire file or
     limited to certain access bits to see exactly what user with a given
     access bit would see.

     Please note:  Previous version of this program were called EZ-BI.

     To run the program type:

                                     BASEEDIT

     It is strongly suggested that you take the BBS off-line when using BASE
     EDIT.

     The title screen appears. Press ENTER at this screen to continue.

     BASE EDIT now asks for the path to the BASEINFO file.  If you installed
     2AM-BBS using the default directories, just press <Enter> here.  If the
     file is in another location, enter the directory.  Be sure to include the
     drive and the ending "\".  If BASE EDIT does not find a file named
     BASEINFO in the directory it will offer to create one.

     Once the file is found, BASE EDIT loads it and enters the command mode.
     This mode consists of a three part screen.  Part 1 is the biggest
     section.  It occupies the top left half of the screen.  In this location,
     BASE EDIT will display the contents of the BASEINFO file along with line
     numbers for your reference.  Up and down arrows, Page Up and Page Down
     keys scroll this display.  HOME will take you to the first line.  END
     will take you to the last line.  These are only for display purposes.
     You do NOT have to be on a given line to enact a command on it.

     Part 2 is in the upper right hand corner of the screen.  This is the menu
     of commands that you can call from the command mode.

     Part 3 is the command window.  It is the bottom of the screen.  It is
     here that you enter your commands and BASE EDIT tells you what is going
     on.






                                       18-1



     2AM BBS
     Sysop's Manual                                                  Utilities
     _________________________________________________________________________



       Explanation of Command Mode Options:
       ------------------------------------

     ? - HELP: Summary of all the commands available from BASE EDIT.

     A - Access.Dat: This option will allow you to edit the information in the
        access.dat file for a privilege bit.  This way when you assign a bit
        to a base, you can edit the message for that bit from BASE EDIT.

     D - Delete Line: This option will remove a line from the file.  It will
        also check to see if that base exists.  If so, it will offer to delete
        it for you. If you receive this prompt and answer YES then THAT BASE
        WILL BE TOTALLY REMOVED FROM YOUR BBS!  All messages on it will be
        deleted.

     E - Edit a line:  BASE EDIT will display the old data for the line number
        you provide and ask you for new inputs.  A valid line number must be
        given.

     F - File and Exit:  This command will first save you BASEINFO file and
        exit the BASE EDIT program in a single step.

     I - Insert line:  This will add a line to the file.  If the line number
        you provide is within the file already, BASE EDIT will insert a new
        line at that point and prompt you for the data input.  If you provide
        a line number of 0, BASE EDIT will append a new line to the end of the
        file and ask for the appropriate data.

     M - Move a line to another location: This command will allow you to move
        one line to another location in the file.  The syntax is: line-to-
        move, where-to-move-it-to.  This comes in handy for modifying an
        existing BASEINFO file.  Both the line numbers must be valid lines.

     Q - Quit WITHOUT save:  This option exits BASE EDIT.  You will be asked
        to verify it since the file you are working with is NOT saved
        automatically.

     S - Save:  This option will save your file.  The original file will have
        its named changed to BASEINFO.OLD for backup purposes.  NOTE:  If you
        save a work file more than once in a session, your original file is
        lost!  PLEASE make a back-up of your BASEINFO file before running this
        program just to be on the safe side.

     T - Toggle Display: This option changes the primary display mode.  It
        allows you to tell what lines in your baseinfo file are comments and
        what type of bases they are in a single glance.

     V - View:  This option lets you view how the BASEINFO will appear through
        2AM-BBS.  There are two types of View commands.  View ALL lists the
        entire file regardless of access bits.  This is helpful to get an






                                       18-2



     2AM BBS
     Sysop's Manual                                                  Utilities
     _________________________________________________________________________


        overall evaluation of your work.  View Privilege will ask you for a
        list of access bits.  The BASEINFO file will then be listed as it
        would appear to someone with those access bits, including read-only
        and maintenance markers.  If the View command takes up more than one
        screen - BASE EDIT will pause after it draws the first screen.  You
        can then Scroll the file line by line using the UP and DOWN arrow
        keys.  In the View screen - Press 'Q' to return to the command mode.
        The View Privilege screen does not take into account the TAG bits.
        It only reflects the READ, WRITE and MAINT bit settings.


       18.2  BSMAINT.EXE

     This utility is used to compress message bases.  This is a complete
     compression as compared to the partial compression (pointer file
     compression) that the BBS prompts you for when you delete messages.  It
     removes all deleted messages, and optionally removes messages outside
     your base window limits.

     BSMAINT may be run in two different ways.  In the first method, you are
     prompted for the location of BASE_DISK and whether or not you want to
     delete messages that are outside any window limits you have set.  The
     second method involves using the command line, and was included so that
     you could run this program via the scheduler (see scheduler in the
     Miscellaneous chapter).  Instead of typing BSMAINT at the DOS prompt,
     additional information must be entered in the following format:

                  C>  BSMAINT  BASE_DISK  YN  ALTERNATE_BASEINFO

     Where:
         Base_disk is the name of the directory where your message bases
     reside (same format as used in drive.dat)

         YN is either a Y or an N--not both.  Y signifies that BSMAINT should
     delete all messages outside any set base windows.

         Alternate_baseinfo is not required.  If you leave this blank it will
     assume that you want to compress ALL your bases.  An alternate baseinfo
     is a file which is of the same format as your baseinfo, but without some
     of your bases.  This is included basically to save time during the base
     compression.  You may have bases with no window assigments that are
     thousands of messages long.  If you don't want them to go through the
     compression process, don't include them in your alternate baseinfo list.
     It must be in BASE_DISK, and may be any name you desire.

     Examples of the second method:

     	BSMAINT  c:\bbs\bases\  Y  baseinfo.alt
     	(total compression of bases listed in baseinfo.alt)

     	BSMAINT  d:\bases\  N
     	(compress only delete messages in all bases)





                                       18-3



     2AM BBS
     Sysop's Manual                                                  Utilities
     _________________________________________________________________________




       18.3  DAYVIEW.EXE

     DAYVIEW allows you to view a user's call-by-call statistics, and also
     allows you to delete entries in your daily logs.

     The first thing DAYVIEW will prompt you for is the location of LOG_DISK.
     If you hit return it will assume that LOG_DISK is the installation
     default of C:\BBS\LOG\.  Next it will ask you for the date of the log to
     display.  After you choose a date, DAYVIEW shows you each log entry for
     that day, one at a time.  You have the option to go forward or backward
     one user at a time, delete a specific entry, or quit the date.  The
     entries include the user's name, length of call, number of posts made,
     number of e-mail messages sent, whether or not the user is new, baud
     rate, port number, and uploads/downloads made.  After reading all the
     entries for a day, DAYVIEW will prompt you for another date to view.
     Hitting return will abort the utility.

     NOTE:  NEVER delete entries in the current day's log when someone is
     logged into the BBS!  This includes jumping to DOS from the BBS.  You
     will cause errors to occur if you do this!


       18.4  DBMAINT.EXE

     This utility is used to compress the help and BBSlister files.  It
     removes deleted entries, and restructures these files to try to increase
     their access speeds.

     DBMAINT may be run in two different ways.  The first method requires you
     to run the program and supply the name of the files you wish compressed.
     The second involves using the command line, and was included so that you
     could run this program via the scheduler. (See scheduler in the
     Miscellaneous chapter).  Instead of typing DBMAINT at the DOS prompt,
     additional information must be entered in the following format:

                          C>  DBMAINT  INFO_DISK\FILENAME

     Where:
         info_disk\filename is the name of the directory and the type of files
     you will compress.

     Examples

         DBMAINT  c:\bbs\bbslist\bbslist
         (compression of BBSlister files)

         DBMAINT  c:\bbs\help\help
         (compression of help files)







                                       18-4



     2AM BBS
     Sysop's Manual                                                  Utilities
     _________________________________________________________________________


     Note that the help files should only be compressed if you have been
     adding and removing help topics via the HLPMAINT utility.


       18.5  DIRSORT.EXE

     DirSort sorts the DIRx.DAT files used in the files section of 2AM-BBS.
     This sort is numeric by access bit then alphabetically by file name or
     numeric by date.  Comments will remain with the files they relate to.

     To call DIRSORT from a DOS prompt, type:

                                      DIRSORT

     If you are running in more than one port on the BBS and it is possible
     that one of the other ports is in use, type:

                                    DIRSORT  M

     This will activate all the necessary record locking for a multiuser BBS.

     The first screen appears and asks for the path name for the LIBRARY.DAT
     file that 2AM-BBS uses.  If you installed 2AM by using the installation
     program that came with it and did not change any of the directories, just
     hit return.  To quit here, enter a Q.  To specify any other directory,
     type it here.

     If you enabled the Multiuser mode a special screen will now appear here.
     It will ask for the location of the SEM_DISK.  You must enter the path
     name, for example:

                                    c:\bbs\sem\

     You must include the ending "\".   Dirsort can not check to make sure you
     entered the correct path so please make sure you do it correctly!!

     DirSort will then ask if you want to see all the file loads as they
     occur.  You can answer Yes if you need to view the files as they are
     loaded so you can determine the way comments are contained in the file.
     If you answer no - the file load will be faster.

     The LIBRARY.DAT file will be displayed to you as the MAIN MENU.  From
     this menu you will be asked to select the DIRx file to be sorted.
     Selecting a Q will quit this program.  Selecting an A will cause DirSort
     to sort ALL the DIR files using one set of sort parameters.

     Once a directory is selected, DirSort will ask for the sort parameter.
     It can sort by FILENAME or by DATE.  Enter an F or D for your selection.
     To obtain an alphabetical listing by date - enter option B.  This will
     sort the file first by Filename then Date.







                                       18-5



     2AM BBS
     Sysop's Manual                                                  Utilities
     _________________________________________________________________________


     Once the file has been loaded, DirSort will ask how comments are placed
     in this file.  The two choices are: [A]bove the file, or [B]elow the file
     they refer to.

     DirSort does two sorts.  The first sort is a numeric sort by access bit
     (1 first, 252 last).  Once this is completed, DirSort then sorts by
     filename (or date) within the access bit.

     The original file is renamed to have a '.OLD' extension.  DirSort also
     creates a temporary file named TEMPSORT.OUT in the same directory as the
     DIRx.DAT files.  If a file already exists by that name, it is erased.


       18.6  DRIVER.EXE

     This utility allows you to change various system configurations that are
     stored in the DRIVEx.DAT file.  It is completely menu driven, and may
     only be run from DOS.

     DRIVER will prompt you for the path and name of your DRIVEx.DAT file.  If
     you hit return, it assumes that you mean DRIVE.DAT in the current
     directory.  In a single user version, the filename should be something
     like c:\bbs\drive.dat.  In the multiuser version, you must indicate which
     drive.dat you wish to edit. Example, c:\bbs\drive1.dat.).  NOTE:
     Multiuser systems will have to run this program on each of the DRIVEx.DAT
     files in order to effect all nodes.

     If the file you supplied does not exist, it will question you as to
     whether or not you wish to create a new file or quit.

     After DRIVER has loaded or created the necessary information, it places
     windows on the screen.  To select an item the use arrow keys and hit
     RETURN when the item you wish to change is in reverse mode.


       18.7  HLPMAINT.EXE

     HLPMAINT allows the sysop to add or remove help topics from the help
     library.  This is generally useful if you wish to remove help topics on
     sections of the BBS that you do not plan to use, or if you want to add
     help topics that are more specific to your bbs.

     When you run HLPMAINT, it will prompt you to enter the current help
     directory.  Hitting return at this prompt will go to the system default
     directory (c:\bbs\help.)

     Next it will prompt you to Add or Remove help files.  Enter either an A
     or an R. Q will quit the utility.  If you choose to add a help topic, it
     will prompt you for three items: help topic name, privilege to read this
     topic, and the name of the help file you will use. All help files must be
     kept in HELP_DISK.  If you remove a help file, it will prompt you for the






                                       18-6



     2AM BBS
     Sysop's Manual                                                  Utilities
     _________________________________________________________________________


     name of the topic to be removed.  NOTE: When you remove a topic it does
     NOT compress the help system files, or erase the help file used by that
     name.  To compress the help files, see DBMAINT.


       18.8  LOOKER.EXE

     LOOKER creates/recreates the lookup tables that are used by the BBS to
     locate users by their names/handles.  It can be run by typing LOOKER from
     the DOS prompt.

     Before running LOOKER, you must delete all files from the LOOK_DISK.
     After you run LOOKER it will ask you for both the locations of SYS_DISK
     and LOOK_DISK.  After this information is supplied, LOOKER will proceed
     to rebuild the tables based upon your userlog.

     If you cannot send e-mail to a user, or cannot edit them by name, your
     lookup tables may be damaged and you should run this program.


       18.9  MAKEVOTE.EXE

     MAKEVOTE is used to create a blank voter file.  It should only be used if
     VOTER.DAT does not exist, or if you wish to delete all your current
     voting topics.
































                                       18-7



     2AM BBS
     Sysop's Manual                                                  Utilities
     _________________________________________________________________________



























































                                   Appendix 1-8



     2AM BBS
     Sysop's Manual                                                  Priv Bits
     _________________________________________________________________________


                                  Privilege Bits
                                    Appendix 1

     This section lists all the privalige bits used by 2AM-BBS.  If any bits
     are not listed here, they are free for you to assign as you see fit.

       1.1  BY NUMBER

     Bit	Purpose

     2	Use Email
     7	Download at 300 Baud
     8	Download at 1200/2400 Baud
     9	Go over time limit on downloads
     60	May skip messages in Email
     61	MAINT commands for BBS Lister
     62	MAINT commands for Email
     63	File messages in Email ([D])
     64	MAINT section for Files
     65	Feedback Access
     66	MAINT section for Main Menu
     67	MAINT section for Trivia Master
     68	MAINT commands for Voter
     69	May add one BBS to BBS Lister
     70	Permanent BBS Lister Access
     71	Access Uploads in Files
     72	Local Mode Access
     73	Two Minute Time Penalty Disable
     75	Special Login Message #1
     76	Special Login Message #2
     77	Refile User Application/Special Login Message #3
     78	60 Line editor
     79	100 Line editor
     80	ANSI in editor
     81	/LOAD in editor
     82	/SVE in editor
     83	May copy messages
     85	May create bases
     86	MAINT: Master bases
     87	/NAME in editor
     88	RESERVED for future expansion
     89	Access Validator
     90	May View user applications in validator
     91	May View user passwords in validator
     92	RESERVED for future validator use
     93	May Edit users in validator
     94	May Delete users in validator
     95	Protect User from deletion
     96-98  RESERVED for future expansion
     99	System Access
     100 	MAINT: Jumpdoors






                                   Appendix 1-1



     2AM BBS
     Sysop's Manual                                                  Priv Bits
     _________________________________________________________________________


     193	TRIVIA Section 1
     194	TRIVIA Section 2
     195	TRIVIA Section 3
     ...	.....
     211	TRIVIA Section 19
     212	TRIVIA Section 20
     213-255  "INVISIBLE" bits.  Used for base selection by user.


       1.2  BY USE

     		BBS Lister:
     61	MAINT commands for BBS Lister
     69	May add one BBS to BBS Lister
     70	Permanent BBS Lister Access

     		Email:
     2	Use Email
     60	May skip messages in Email
     62	MAINT commands in Email
     63	File messages in Email during Read Incomming ([D])

     		Editor:
     78	60  Line editor
     79	100 Line editor
     80	ANSI  in editor
     81	/LOAD in editor
     82	/SVE  in editor
     87	/NAME in editor

     		Files:
     7	Download at 300 Baud
     8	Download at 1200/2400 Baud
     9	Go over time limit on downloads
     64	MAINT section for Files
     71	Access Uploads in Files

     		Jumpdoors:
     100 	MAINT section for Jumpdoors

     		Message Bases:
     83	May copy messages
     85	May create bases
     86	MAINT: Master bases
     213-255  "INVISIBLE".  May be used for base selection bits.












                                   Appendix 1-2



     2AM BBS
     Sysop's Manual                                                  Priv Bits
     _________________________________________________________________________


     		Maint:
     61	MAINT commands in BBS Lister
     62	MAINT commands in Email
     64	MAINT section for Files
     66	MAINT section for Main Menu
     67	MAINT section for Trivia Master
     68	MAINT commands in Voter
     86	MAINT section for Master bases
     100 	MAINT section for Jumpdoors

     		Trivia:
     67	MAINT: Trivia Master
     193	TRIVIA Section 1
     194	TRIVIA Section 2
     195	TRIVIA Section 3
     ...	.....
     211	TRIVIA Section 19
     212	TRIVIA Section 20

     		Validator:
     89	Access Validator
     90	May View user applications in validator
     91	May View user passwords in validator
     92	RESERVED for future validator use
     93	May Edit users in validator
     94	May Delete users in validator

     		Voter:
     68	MAINT section for Voter

     		Miscel.
     65	Feedback Access
     66	MAINT section for Main Menu
     72	Local Mode Access
     73	Two Minute Time Penalty Disable
     75	Special Login Message #1
     76	Special Login Message #2
     77	Refile User Application/Special Login Message #3
     95	Protect User from Deletion
     99	System Access

     		Reserved:
     88	RESERVED for future expansion
     92	RESERVED for future validator use
     96-98  RESERVED for future expansion












                                   Appendix 1-3



     2AM BBS
     Sysop's Manual                                               2AM File Map
     _________________________________________________________________________


                                   2AM File Map
                                    Appendix 2

     	Key
     		+ = text files
     		$ = sysop created files
     		% = supplied with system
     		X, XX, YY = number


     Base_disk

      $%	baseXX.dat		Data file for message base
      $%	baseXX.ptr		Pointer file for message base
     +$%	baseinfo.		Master Base file
       %	newmsg.dat		New Message counter.  Do NOT tamper with
                                     this.
     +$	[alternate baseinfo]	Optional baseinfo for BSMAINT


     BBS_disk

     	bbslist.dat		BBSlist data file
     	bbslist.ptr		BBSlist pointer file
     	bbslist.sr1		BBSlist sort file


     Chat_disk

     + %	chat.2nd		Chat message for second request
     + %	chat.abt		Chat message for aborting
     + %	chat.acc		Chat message for accepting
     + %	chat.den		Chat message for timeout
     + %	chat.dni		Chat message for denial
     + %	chat.ext		Chat message for exit
     + %	chat.req		Chat message for initial request


     Dload_disk

     + %	dirX.dat		Section library
     +$% 	library.dat		Master files library
     +$	protocol.dat		Download external protocol list


     Help_disk

     + %	*.hlp			Text for help system
       %	help.dat		Data file for help system
       %	help.ptr		Pointer file for help system
       %	help.sr1		Sort file for help system






                                   Appendix 2-1



     2AM BBS
     Sysop's Manual                                               2AM File Map
     _________________________________________________________________________




     Jump_disk

     +	jumperX.dat		User information for jumpdoor
     +$	passages.dat		Jumpdoor directory


     Log_disk

     	XX-XX-XX.log		Daily log for date XX-XX-XX


     Look_disk

       %	lookXX			User lookup tables


     Mail_disk

       	minXX.dat		Incoming mail data
       	minXX.ptr		Incoming mail pointer
       	moutXX.			Outgoing mail flag file


     Menu_disk

     + %	base[80x].mnu		Message base menu
     + %	bbsls[80x].mnu		BBSList menu
     + %	bmain[80x].mnu		Base Maint menu
     + %	conf[80x].mnu		Configure menu
     + %	door[80x].mnu		Jumpdoors menu
     + %	edcom[80x].mnu		Editor menu
     + %	email[80x].mnu		Email menu
     + %	files[80x].mnu		Files menu
     + %	main[80x].mnu		Main menu
     + %	maint[80x].mnu		Main menu Maint menu
     + %	triv[80x].mnu		Trivia menu
     + %	valid[80x].mnu		Validator menu
     + % 	voter[80x].mnu		Voter menu


     Sem_disk

     +	*.sem			Temporary sem file (multiuser only)
     +	mboxX.			Temporary mailbox file (multiuser only)
     	us#XX.			User lock, flags user online
     				(erase files if present & no one logged in)









                                   Appendix 2-2



     2AM BBS
     Sysop's Manual                                               2AM File Map
     _________________________________________________________________________


     Sys_disk

     +$	        *.def			Validator definition files
     + %	*.log			System logs for validator
     +$  	*.swe			Sweeper output files
       %	bbs.*			2AM-BBS executable program
     +$%	drive[x].dat		System configuration file
       %	last			Special format last caller file
     +$ 	newuser.dat		New user configuration file
     +$ 	pon.cnf			Existance causes logging to printer
     +$ 	rejects.dat		Handles not allowed on system
     +$ 	schedul[x].dat		Scheduler time schedule
       %	userapp.dat		User Application file, contains
                                        personal info
       % 	userlog.dat		Userlog, contains all account
                                        information


     Text_disk

     + %	append.txt		Application closing comments
     + %	appq1.txt		Applications questions file 1
     + %	appq2.txt		"			  " 2
     + %	appq3.txt		"			  " 3
     + %	notes[80x].txt		Login notes
     + %	nuser.txt		New user notes
     + %	offnotes.txt		Logout notes
     + %	privacy.txt		User information policy
     + %	splogin1.txt		Special Login message 1
     + %	splogin2.txt		"		    " 2
     + %	splogin3.txt		"		    " 3, refile
                                         application
     + %	start.txt		System introduction message
     + %	sysin[80x].txt		System information
     +  	uplod[80x].txt		Notice for uploads
     + %	userapp.txt		Userapplication introduction


     Trivia_disk

     +	        tansX.dat		Trivia last Q&A file
      	        trivaX.dat		Trivia answers
     +$%	trivia.lvl		Master trivia directory
     + %	trivqX.dat		Trivia questions
     	        tscorcX.dat		Trivia current scores
     	        tscorlX.dat		Trivia last scores













                                   Appendix 2-3



     2AM BBS
     Sysop's Manual                                               2AM File Map
     _________________________________________________________________________


     Uload_disk

     +	lastu.dat		Last upload number
     +$	protocol.dat		Upload external protocol list
     	up-XX.YY		Uploaded programs

     Vote_disk

      $	voter.dat		Voter data file
















































                                   Appendix 2-4



     2AM BBS
     Sysop's Manual                               Multiuser Setup and Commands
     _________________________________________________________________________


                           Multiuser Setup and Commands
                                    Appendix 3



       3.1  CHANGES TO DRIVE.DAT

     When using the multiuser configuration, the name of DRIVE.DAT changes to
     either DRIVE1.DAT or DRIVE2.DAT depending on the port you are using.  You
     are responsible for creating these files.  NOTE: Make sure that you set
     the value for the COM port to two different values in these files.


       3.2  CHANGES TO BBS PARAMETERS

     The first parameter when running the bbs is now controlling the port
     number of the bbs that will run.
     Example:

     	C>  BBS  1
     	Will execute the BBS, using DRIVE1.DAT, and run port 1.

     The second parameter controls whether or not the bell can be heard.
     Example:

     	C>  BBS  0  1
     	Will run the BBS in single user mode with the bells off.

     Never pass more than two parameters to the BBS.  The third parameter is
     reserved for the system.  Do NOT use it.


       3.3  SEM DISK AND EXECUTION

     Always erase any files from sem disk before running the BBS.  NOTE: Be
     sure that none of these files are in use by the other port if a user is
     online.  Each file contains the port number of who is using it.

     Never run only one line in the multiuser setting unless the other line
     has executed at least once.  There are memory locks, and each port is
     responsible for clearing those locks when it starts up.  If you run one
     line, the system may end up waiting for the other line to unlock that
     memory.  There is a single user mode, use it if you are running one line.


       3.4  ADDITIONAL COMMANDS IN MULTIUSER MODE

     The WHO command is available from the main menu ([W]) when in multiuser
     mode.  This will display the other users and what they are doing.

     In main menu MAINT there is a command [S] that can be used to STOP the
     other line.  This will toss the user on the other line off the board at





                                   Appendix 3-1



     2AM BBS
     Sysop's Manual                               Multiuser Setup and Commands
     _________________________________________________________________________


     the first chance it gets.  As a safety feature of this option, you must
     supply the port number with the S command.
     Example:

     	MAINT > S2

     Will through the user off port two.


       3.5  EMAIL NOTIFICATION

     If a user is online when mail is sent to them, they will receive a
     message to inform them that they have new mail from user ABCD, where ABCD
     is the user who sent the mail.











































                                   Appendix 3-2



     2AM BBS
     Sysop's Manual                                      Bit Encoded Responses
     _________________________________________________________________________


                               Bit Encoded Responses
                                    Appendix 4

     This chapter will cover the bit encoding method used for the three
     optional questions asked a user during his/her application.

     When you make up a question for the user application, you can have up to
     8 possible answers for that question.

     A user can potentially select more than one answer from the list.  Now, a
     user could select just one choice (example, choice 8), or a user could
     select many choices (say, 1,3,4).  The bit-encoded method allows you to
     store all the choices in one integer (actually a byte).

     Each user application has room for 3 bit encoded response questions.  Ask
     these questions by creating the files text disk:appq1.txt,
     text disk:appq2.txt, and text disk:appq3.txt respectively.  If any of
     these files do not exist, the question corresponding to that file will be
     skipped, and the user response for that question will be 0.

     The following table describes how to convert the data (stored in encoded
     form) back to the responses the user gave.



































                                   Appendix 4-1



     2AM BBS
     Sysop's Manual                                      Bit Encoded Responses
     _________________________________________________________________________


             ----------------------------------------------------------
             code    choices     code    choices     code    choices
             ----------------------------------------------------------
             0	none           43	1 2 4 6        86	2 3 5 7
             1	1              44	3 4 6          87	1 2 3 5 7
             2	2              45	1 3 4 6        88	4 5 7
             3	1 2            46	2 3 4 6        89	1 4 5 7
             4	3              47	1 2 3 4 6      90	2 4 5 7
             5	1 3            48	5 6            91	1 2 4 5 7
             6	2 3            49	1 5 6          92	3 4 5 7
             7	1 2 3          50	2 5 6          93	1 3 4 5 7
             8	4              51	1 2 5 6        94	2 3 4 5 7
             9	1 4            52	3 5 6          95	1 2 3 4 5 7
             10	2 4            53	1 3 5 6        96	6 7
             11	1 2 4          54	2 3 5 6        97	1 6 7
             12	3 4            55	1 2 3 5 6      98	2 6 7
             13	1 3 4          56	4 5 6          99	1 2 6 7
             14	2 3 4          57	1 4 5 6        100	3 6 7
             15	1 2 3 4        58	2 4 5 6        101	1 3 6 7
             16	5              59	1 2 4 5 6      102	2 3 6 7
             17	1 5            60	3 4 5 6        103	1 2 3 6 7
             18	2 5            61	1 3 4 5 6      104	4 6 7
             19	1 2 5          62	2 3 4 5 6      105	1 4 6 7
             20	3 5            63	1 2 3 4 5 6    106	2 4 6 7
             21	1 3 5          64	7              107	1 2 4 6 7
             22	2 3 5          65	1 7            108	3 4 6 7
             23	1 2 3 5        66	2 7            109	1 3 4 6 7
             24	4 5            67	1 2 7          110	2 3 4 6 7
             25	1 4 5          68	3 7            111	1 2 3 4 6 7
             26	2 4 5          69	1 3 7          112	5 6 7
             27	1 2 4 5        70	2 3 7          113	1 5 6 7
             28	3 4 5          71	1 2 3 7        114	2 5 6 7
             29	1 3 4 5        72	4 7            115	1 2 5 6 7
             30	2 3 4 5        73	1 4 7          116	3 5 6 7
             31	1 2 3 4 5      74	2 4 7          117	1 3 5 6 7
             32	6              75	1 2 4 7        118	2 3 5 6 7
             33	1 6            76	3 4 7          119	1 2 3 5 6 7
             34	2 6            77	1 3 4 7        120	4 5 6 7
             35	1 2 6          78	2 3 4 7        121	1 4 5 6 7
             36	3 6            79	1 2 3 4 7      122	2 4 5 6 7
             37	1 3 6          80	5 7            123	1 2 4 5 6 7
             38	2 3 6          81	1 5 7          124	3 4 5 6 7
             39	1 2 3 6        82	2 5 7          125	1 3 4 5 6 7
             40	4 6            83	1 2 5 7        126	2 3 4 5 6 7
             41	1 4 6          84	3 5 7          127	1 2 3 4 5 6 7
             42	2 4 6          85	1 3 5 7        128	8

     If the code is over 128, subtract 128 from the code and look up the
     result.  The choices will be 8 (from the 128 subtracted off) plus the
     choices you just looked up.







                                   Appendix 4-2



     2AM BBS
     Sysop's Manual                                                  DRIVE.DAT
     _________________________________________________________________________


                                The Drive.Dat File
                                    Appendix 5


     Here is a list of all the items in sys disk:driveX.dat.  Each item should
     be on a separate line.


       5.1  SYSTEM SPECIFICS [Lines 1-5]

     1. System Name (up to 80 characters)
     2. Maximum Baudrate system can handle (300, 1200, 2400 - one number)
     3. Upload/download ratio file credits on a per K basis.
     4. Opening time for the Files section
     5  Closing time for the files section.  If this line is identical to line
        4, the Files section is open 24 hours a day.


         5.2  DRIVE PATHS [6-21]

     6. sys_disk
     7. base_disk
     8. help_disk
     9. mail_disk
     10. trivia_disk
     11. dload_disk
     12. bbs_disk
     13. log_disk
     14. menu_disk
     15. text_disk
     16. vote_disk
     17. uload_disk
     18. chat_disk
     19. sem_disk
     20. look_disk
     21. jump_disk


       5.3  PROMPTS [22 - 34]

     When installation is done, default prompts are written in.  Any may be
     changed by editing this file.

     22. Prompt extension (EX: '>')
     23. Prompt for BBSLister
     24. Prompt for Email
     25. Prompt for FILES
     26. Prompt for Help
     27. Prompt for Config
     28. Prompt for Main
     29. Prompt for Maintenance (from Main Menu)






                                   Appendix 5-1



     2AM BBS
     Sysop's Manual                                                  DRIVE.DAT
     _________________________________________________________________________


     30. Prompt for Message Bases
     31. Prompt for Trivia
     32. Prompt for Validator
     33. Prompt for Voter
     34. Prompt for JumpDoors


       5.4  HEADERS AND MESSAGES [35 - 45]

     Various section headers and messages are on these lines.  If you do not
     like a phrase that the board outputs somewhere, go to this file and see
     if you can find that phrase.  If you can, edit this file and change the
     phrase.  Not all phrases are here; just the ones that got changed most
     from our experiences.  If you find a phrase that you don't like, contact
     us and in a future version, we may make it a line here.  NOTE: 2AM
     Associates will resist changing error or informational messages to avoid
     ambiguity in user or sysop documentation.


       5.5  MODEM AND PORT INFORMATION [lines 46 - 51]

     46. DOS COM port for this line. (0 = Local mode only, 1=COM1, 2=COM2)
     47. Initialization string for the modem. 
         ATE0M0V1X1F1S2=128S7=10S10=20S0=1
         Please note that this is ALL UPPER CASE.  Owners may wish to set X0
         for 300 only, X1 for 1200 baud and X4 for 2400 baud modems.
     48. Pause between characters during initalization.  50 seems to work
         fine.  You may wish to increase it if the modem does not respond
         correctly.
     49. Pause between initization commands.  We use 250, but if the modem
         does not respond correctly, increase it.
     50. Priv needed to log into this port.  Can be 0, which allows everyone.
     51. The name of this port of the BBS. (blank line on a single user
         system)























                                   Appendix 5-2



     2AM BBS
     Sysop's Manual                                                 ANSI Codes
     _________________________________________________________________________


                                    Appendix 6
                                ANSI Color Commands


     2AM-BBS supports ANSI color in many places.  Prompts, text file, menus,
         email messages and message base posts may all contain ANSI color
         commands.  Below is a list of color commands recognized as standard
         ANSI commands.  All ANSI color commands begin with a ESCAPE
         character, a "[" and end with a LOWER CASE "m".
     ( ^ = ESCAPE character)

     	Code			Meaning
     	^[0m 			Reset Attributes.  Return to normal colors.
     	^[1m			Foreground color will be bold until reset.
     	^[5m			Foreground color will blink until reset.
     	^[30m			Black Foreground
     	^[31m			Red Foreground
     	^[32m			Green Foreground
     	^[33m			Yellow Foreground
     	^[34m			Blue Foreground
     	^[35m			Magenta Foreground
     	^[36m			Cyan Foreground
     	^[37m			White Foreground
     	^[40m			Black Background
     	^[41m			Red Background
     	^[42m			Green Background
     	^[43m			Yellow Background
     	^[44m			Blue Background
     	^[45m			Magenta Background
     	^[46m			Cyan Background
     	^[47m			White Background

     Notes:

     1)  Yellow will appear to be BROWN unless BOLD is on.
     2)  Due to limitations of Turbo Pascal, some colors may not appear to be
         correct on the local terminal (SYSOP'S screen).  Be assured that they
         appear correct to the user.
     3)  It may be helpful to point out that Background colors are the same as
         foreground colors plus 10.
     4)  ^[0m and ^[m are identical to each other.  (The 0 is optional).
     5)  Commands may be nested with semi-colons (;).  For example:

                                    ^[33;1;44m

         will turn on yellow foreground, make it bold and make the background
         blue.










                                   Appendix 6-1



     2AM BBS
     Sysop's Manual                                           Trouble Shooting
     _________________________________________________________________________


                                    Appendix 7
                                 Trouble Shooting


     If you have a problem with 2AM-BBS, please read through this appendix.
     It contains several of the more common problems we receive from other
     sysops.


     Problem:
        The "Waiting for Connect" message does not come up when I start my
        BBS.

     Solution:
        There are a few problems that could cause this.  They are all related
        to your modem.

        1. If you are using an external modem, make sure it is turned on and
           plugged in.
        2. Check DRIVEx.DAT and make sure that you have it configured for the
           correct COM port (1 or 2), and the correct baud rate (300, 1200, or
           2400).
        3. Make sure that your modem supports all the commands in your
           initialization string.
        4. Adjust the Modem EOLN Pause and Modem Init Nulls in DRIVEx.DAT to a
           number about 20-40 higher.  This slows down the initialization
           string.  Restart the board, and see if this works.
        5. If all else fails test it with a terminal program and see if modem
           works.



     Problem:
        My modem does not detect a carrier drop.

     Solution:
        Some modems require an extra command in the modem initialization
        string, or a specific dip switch setting.  Consult your modem manual
        and alter the initialization string in DRIVEx.DAT accordingly.  (You
        will want the CD line to follow the line, and not always be "high".)



     Problem:
        My modem does not hangup on people when they log out.

     Solution:
        Some modems require an extra command in the modem initialization
        string, or a specific dip switch setting.  Consult your modem manual
        and alter the initialization string in DRIVEx.DAT accordingly.  (You
        will want the DTR line to follow the line, and not always be "high".)






                                   Appendix 7-1



     2AM BBS
     Sysop's Manual                                           Trouble Shooting
     _________________________________________________________________________





     Problem:
        I get an ERROR 16 "Owner Generated Error in File Format".

     Solution:
        Check the data files in the section in which this occurred.  Generally
        this will happen if there is blank line at the end of one of the data
        files, or a line in the file that does not follow the format we
        describe in this manual.  If you recently changed any system files,
        you should go back and look at them.



     Problem:
        The system crashes everytime I try to log into the BBS in multiuser
        mode.

     Solution:
        Check that SEM_DISK exists.



     Problem:
       My userlog is a 2 meg file!

    Solution:
       This shouldn't happen unless you are using a multitasker and a program
       that does direct disk writing, or you are using a version of DOS older
       than version 2.1.  Being that not everyone is so careful to watch these
       things, we have a utility that will help you restore the file to its
       former glory, or as close to it as possible.  It will be made available
       on request.



    Problem:
       My message counters are all wrong.

    Solution:
       This can happen when you delete the file NEWMSG.DAT in BASE_DISK.  It
       will attempt to fix itself, by resetting itself to the next callers new
       post number.  If this happens to be a new user or someone who hasn't
       called in a while, you might want to delete the file again and post a
       message from your account.



    Problem:
       There is a username in the [U]serlog list that I cannot send mail to or
       edit by name in the validator.





                                   Appendix 7-2



     2AM BBS
     Sysop's Manual                                           Trouble Shooting
     _________________________________________________________________________



    Solution:
       You should erase the files in LOOK_DISK and run the utility LOOKER.
       This happens when you either delete a file in LOOK_DISK or change
       someones handle and answer no to the "Change Lookup Tables?" question
       in the validator.



    Problem:
       My users complain that they are recieving "garbage" characters on their
       screen.

    Solution:
       1. They are not calling at 8-N-1.
       2. They are calling at the wrong baud rate.
       3. Their terminal is configured for a graphics mode they don't support.
       4. They are getting "Line Noise".  If this happens to most/all of your
          users, you might want to have your phone line checked.  This is not
          a software problem.



    Problem:
       I get DOS ERROR 8 whenever I try to Jump to Dos, Use a Jumpdoor, Use
       the Scheduler, or Use an External Protocol.

    Solution:
       You are out of memory.  Either remove some memory resident programs or
       add more memory to your computer.



    Problem:
       The BBS is in multiuser mode and and appears to be frozen, but it
       checks the disk every now and then.

    Solution:
       From the other port, erase all .sem files from SEM_DISK.



    Problem:
       I am in multiuser mode, and the output on my screen seems jerky.

    Solution:
       This is a side effect of multitasking.  The user shouldn't see any
       pauses in the output, but you will.  The faster your computer is, the
       less likely this is to be noticed.








                                   Appendix 7-3




     2AM BBS
     Sysop's Manual                                                      Index
     _________________________________________________________________________


                                       Index


                                         A

     Access................................................................4-3
     Access List...........................................................7-6
     ACCESS.DAT......................................................4-1, 18-2
     Account 0.............................................................4-2
     ANSI...............................................11-2, 15-1, Appendix 6
     ANSI Menus............................................................3-1
     ASCII.................................................................7-2
       250.................................................................3-2

                                         B

     BASEEDIT.EXE.........................................................18-1
     BaseInfo..............................................................7-1
     Bit Encoding.....................................................4-2, 5-1
     Board Id........................................................5-1, 15-1
     BSMAINT.EXE..........................................................18-3

                                         C

     Caller Number.........................................................4-2
     Carrier Drop.........................................................17-1
     Carrier Drops........................................................17-1
     Chat.................................................................13-1
       Files..............................................................14-1
     Chat Bell............................................................14-1
     Compaction
       In BBSLister.......................................................18-4
       In Help Files......................................................18-4
       In Message Bases....................................................7-6

                                         D

     Daily Time Limit......................................................5-2
     DAYVIEW.EXE..........................................................18-4
     DBMAINT.EXE..........................................................18-4
     DEF Files........................................................4-4, 5-3
     Definition File.........................................................2
     DIRSORT.EXE..........................................................18-5
     DOS
       Copy...............................................................16-1
       Delete.............................................................16-1
       Dir................................................................16-1
       Erase..............................................................16-1
       MkDir..............................................................16-1
       RmDir..............................................................16-1
     Drive.Dat.................................9-1, Appendix 3-1, Appendix 5-1






                                      Index-1



     2AM BBS
     Sysop's Manual                                                      Index
     _________________________________________________________________________


     DRIVER.EXE...........................................................18-6

                                         E

     Editor Commands
       /LOAD...............................................................6-1
       /NAME...............................................................6-1
       /SVE................................................................6-1
     Email.................................................................7-1
       Message Counter.....................................................4-2
     Email Limit...........................................................4-6
     Error................................................................15-2
     ESCAPE key................................................2-1, 14-1, 17-1

                                         F

     Feedback........................................................7-3, 15-1
     File Map.....................................................Appendix 2-1
     Files
       BaseInfo............................................................7-1
       BBSLIST.DAT........................................................10-1
       BBSLIST.PTR........................................................10-1
       BBSLIST.SR1........................................................10-1
       DirX.dat............................................................9-2
       Drive.dat...............................9-1, Appendix 3-1, Appendix 5-1
       In Chat............................................................14-1
       In Files............................................................9-1
       In Message Bases....................................................7-1
       In Validator........................................................4-1
       Jumper.dat.........................................................11-1
       Lastu.dat...........................................................9-3
       Library.dat.........................................................9-1
       Main80.mnu..........................................................3-1
       Main80x.mnu.........................................................3-1
       Menus...............................................................3-1
       NEWUSER.DAT...................................................5-3, 17-1
       Passages.dat.......................................................11-1
       Pon.cnf.............................................................2-1
       Protocol.dat........................................................9-3
       Up-XX.YY............................................................9-3
       uplod.txt...........................................................9-3
       x.DEF...............................................................5-3
     Files Section.........................................................8-1
     Rejects.dat...........................................................5-4

                                         H

     HLPMAINT.EXE.........................................................18-6

                                         L







                                      Index-2



     2AM BBS
     Sysop's Manual                                                      Index
     _________________________________________________________________________


     Local Mode...........................................................17-1
     Log Fails.............................................................4-2
     Logical Base..........................................................7-1
     Login Messages........................................................5-4
     LOOKER.EXE...........................................................18-7

                                         M

     Main Menu Maint......................................................15-1
     Maint...........................................................7-5, 15-1
       In BBS Lister......................................................10-1
       In Files Section....................................................9-4
       In Message Bases....................................................7-2
       In Trivia..........................................................12-2
       In Voter...........................................................13-1
     MAKEVOTE.EXE.........................................................18-7
     Menu Files............................................................3-1
     Modem........................................................Appendix 5-2
     Multiuser....................................................Appendix 3-1

                                         N

     NEWUSER.DAT................................................4-3, 5-3, 17-1

                                         P

     Password..............................................................4-2
     Pattern matching......................................................4-5
     Physical Base.........................................................7-1
     Priv Bits
       Changing............................................................4-4
       Description.........................................................4-1
       For Local Login...............................................2-1, 17-1
       In BBS Lister......................................................10-1
       In Editor...........................................................6-1
       In Files Section....................................................9-5
       In Message Bases....................................................7-6
       In Trivia..........................................................12-3
       In Validator........................................................4-8
       In Voter...........................................................13-1
       List................................................................4-3
       User Applix........................................................15-2
     Privacy Mode..........................................................7-2

                                         R

     Ranges................................................................4-4
     Rejects.dat...........................................................5-4

                                         S







                                      Index-3



     2AM BBS
     Sysop's Manual                                                      Index
     _________________________________________________________________________


     Scheduler................................................17-1, 18-3, 18-4
     Sweeper...............................................................4-5
     SYS.LOG...............................................................4-4
     Syslog..........................................................4-2, 15-2

                                         T

     Text Files............................................................3-2
     Time Penalties.......................................................17-1
     Timeout..............................................................17-1
     Timeouts.............................................................17-1
     Trivia...............................................................12-1
     Trouble Shooting.............................................Appendix 7-1

                                         U

     User App..............................................................4-2
     Userlog...............................................................4-1
     Utilities
     Utilities............................................................17-1
       BSMAINT.............................................................7-2
       DAYVIEW............................................................15-2
       Driver..............................................................9-1

                                         V

     Validator.............................................................3-1
       Files...............................................................4-1
     Voter................................................................13-1




























                                      Index-4