










                                                                     
                                                                  
                                                                  
                                                                  
                                                                  
                                                                  
                            D'Bridge EMAIL System                 

		      Single-line 1.51 / 28 October '92

                      Copyright 1987-1992 by Chris Irwin







                     USER'S MANUAL AND TECHNICAL REFERENCE








          ------------------------------------------------------------
          Mosaic Press                800-932-4044  Credit card orders
          358 Oliver Road             513-821-1270  Other inquiries
          Cincinnati, OH 45215        513-821-1387  Data

                             201:100/0  DBNET
                             1:108/68   Fidonet
          ------------------------------------------------------------

TABLE OF CONTENTS
--------------------------------------------------------------------------------G






TABLE OF CONTENTS



               GSection   Title                                    PageH
               -------   -----                                    ----

               0.00      NOTE FROM THE AUTHOR                       1
               0.01      HARDWARE / SOFTWARE REQUIREMENTS           2


               1.00      GENERAL OVERVIEW                           3


               2.00      SOFTWARE INSTALLATION                      8
               2.01      BASIC EMAIL SETUP                          9
               2.02      BASIC ECHOMAIL SETUP                      12


               3.00      SYSTEM CONFIGURATION AND MAINTENANCE      17
               3.01      BASIC CONFIGURATION                       18
               3.02      DIRECTORY PATHS                           27
               3.03      COMM / MODEM SETUP                        34
               3.04      SCHEDULE MAINTENANCE                      44
               3.05      NODELIST CONFIGURATION                    56
               3.06      PACKET MAIL CONTROL                       63
               3.07      XMAIL CONTROL                             71
               3.08      TIME CONTROL SYSTEM                       76
               3.09      FUNCTION KEYS                             81
               3.10      BBS CONFIGURATION                         82
               3.11      SECURITY MISCELLANEOUS                    88
               3.12      DISK SPACE MINIMUMS                       97
               3.13      ACCOUNTING TRANSLATION                    98
               3.14      ZMODEM PARAMETERS                        102
               3.15      SETUP EDITOR OPTIONS                     104
               3.16      ECHOMAIL AREAS                           109
               3.17      WINDOW COLORS                            115
               3.18      KEYBOARD MACROS                          116
               3.19      TRANSLATION TABLE                        117


               4.00      SYSTEM IDLE COMMANDS                     118







-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
TABLE OF CONTENTS
--------------------------------------------------------------------------------G





               GSection   Title                                    PageH
               -------   -----                                    ----

               5.00      EMAIL MESSAGE EDITOR                     139
               5.01      USING EDIT MODE                          145
               5.02      USING READ MODE                          152
               5.03      ADVANCED FEATURES                        155


               6.00      UNDERSTANDING THE QUEUE                  158
               6.01      CREATING A PRIVATE NODELIST              163
               6.02      DUTIES OF A NETWORK ADMINISTRATOR        165
               6.03      PUBLIC EMAIL NETWORKS                    166


               7.00      DBUTIL / UTILITY PROGRAM                 167
               7.01      FIDO AND QUICKBBS STORAGE                170
               7.02      USING THE SCRIPTING LANGUAGE             171
               7.03      EXAMPLE SCRIPT FILE                      176


               8.00      BBS SYSTEMS                              177
               8.01      GENESIS DELUXE BBS                       181
               8.02      MAXIMUM BBS                              186
               8.03      OPUS CBBS                                189
               8.04      PC-BOARD                                 191
               8.05      PHOENIX BBS                              195
               8.06      QUICKBBS                                 198
               8.07      REMOTEACCESS                             200
               8.08      SUPERBBS                                 208
               8.09      SEARCHLIGHT BBS                          211
               8.10      TBBS                                     214
               8.11      TELEGARD                                 217
               8.12      WILDCAT                                  222


               9.00      GLOSSARY OF TERMS                        226


               A.00      ACKNOWLEDGEMENTS                         258











-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
0.00  NOTE FROM THE AUTHOR
                                                                               1
--------------------------------------------------------------------------------G






0.00  NOTE FROM THE AUTHOR

Thank you for selecting D'Bridge, a state-of-the-art electronic mail
system for the IBM PC. The ability to send and receive data electro-
nically has now become almost as common as the telephone for business.
More and more companies are realizing that the most efficient and
cost-effective way to move data is digital. FAX is fine for printed
documents and voice is the most direct way to convey a thought; but
data is the best way for businesses to communicate when the informa-
tion sent and received becomes routine or needs to be fed directly
into one or more remote computers for instant processing.

It is rapidly becoming commonplace for companies to have a "data" num-
ber, just like they had "voice" and "FAX" numbers. In fact, it is al-
ready possible to replace the "FAX" number with a combined "Data/FAX"
number, since reasonably inexpensive modems supporting protocols for
both are already being offered on a fast growing scale.

What can D'Bridge do?  Simple - it can move data, programs, documents,
spreadsheets, pictures, drawings and sounds between continents in just
seconds or minutes, depending on the size. Anything that can be stored
in your computer may be automatically transmitted to other computers
using compatible EMAIL systems anywhere in the world.

D'Bridge isn't alone; there are many other programs out there that can
communicate with it. We chose to implement the most widely used point-
to-point EMAIL system in the world, Fidonet. This means you may commu-
nicate with anyone using the programs: FrontDoor, BinkleyTerm, Intermail,
Fido, Opus, SEAmail, TIMS, SEAmail, TrapDoor and many others.

D'Bridge is just a beginning; look for our release of many innovative
products using our EMAIL system as a "hub". The possibilities of how
D'Bridge can be used are virtually limitless. Worry-free, automated
communications is the key to many new applications: Shared databases,
unattended data collection and automatic order processing to name a few.
I would be happy to discuss your custom application; after all, I am
still a consultant too...


                                     Sincerely,

                                     Chris Irwin
                                     201:201/0@dbnet
                                     1:110/68@fidonet.org






-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
0.01  HARDWARE / SOFTWARE REQUIREMENTS
                                                                               2
--------------------------------------------------------------------------------G






0.01  HARDWARE / SOFTWARE REQUIREMENTS

      GHARDWAREH

            GCOMPUTERH

                - IBM PC, XT, AT, PS/2 or compatible
                - 512K RAM  (640K recommended)
                - Monochrome, CGA, EGA, VGA, PGA adapter and monitor
                - Serial port (if an external modem is used)
                - Printer (optional)

            GSTORAGEH

                - A hard disk or any other DOS-compatible electronic
                  read/write data storage medium with at least 2.5
                  megabytes available before installation

            GMODEMH

                - Hayes or Hayes-compatible modem
                  The modem used MUST be capable of using both the
                  DTR (Data Terminal Ready) and the CD (Carrier Detect)
                  signals.
                - Modem cable (if external)

            GTELEPHONE LINEH

                - A regular telephone line
                - A "cellular" phone (with a compatible modem)
                - Most PBX systems (check with your vendor)


      GSOFTWAREH

            GOPERATING SYSTEMH

                - D'Bridge requires DOS 3.0 or higher (DOS 5.0 suggested)
                - PKZIP.EXE and PKUNZIP.EXE from PKWARE are both required*.




4(*PKWARE, Inc., 7545 N. Port Washington Rd., Glendale, WI 53217)5






-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
1.00  GENERAL OVERVIEW
                                                                               3
--------------------------------------------------------------------------------G






1.00  GENERAL OVERVIEW

D'Bridge is one of the most flexible EMAIL systems on the market today
and its menu-driven operation makes it one of the easiest to use. The
communications between D'Bridge systems use the powerful ZMODEM proto-
col, ensuring that your data arrives as quickly and accurately as
possible.

In its simplest form, D'Bridge acts like a messenger between two or more
points; at its best and most complex, it can be a multi-tired network
connecting hundreds (or thousands) of cities using a "hub and spoke"
topology (much like our major airlines and parcel services.)


       GMESSAGESH

D'Bridge can send messages (text) from one location to another automatically.
Messages may be prepared by using the built-in D'Bridge Message Editor or a
third-party product.  Messages are a simple and cost-effective way for offices
to communicate with each other. It is usually more cost-effective to send
EMAIL messages between offices than to use FAX or TELEX.  With a high-speed
modem, D'Bridge acan transfer hundreds of messages in just a minute or two.


       GFILESH

Along with messaging, D'Bridge can send files.  Word processor files, spread-
sheets, database files and graphic images are just a few of the types of files
D'Bridge can transfer. Any file which can be put on a standard DOS storage
medium may be sent anywhere in the world within minutes using D'Bridge.

       GFUNCTION-REQUESTSH

D'Bridge also has the ability to spawn GFUNCTION-REQUESTH server tasks.  These
programs are designed to process received data then generate output to send
back to the calling sytstem.  Examples of function requests are the programs
that issue "DEMO keys" and collect registration data.













-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
1.00  GENERAL OVERVIEW
                                                                               4
--------------------------------------------------------------------------------G






DESIGN PHILOSOPHY / BASIC CONCEPTS

D'Bridge is a complex program that allows a user complete control over
its operation. Four integrated programs are involved in the routine
operation of the EMAIL system:

GDB.EXEH         This is the "shell" program that runs the mailer and editor.

GDB01.151H       This is the MAILER portion. It controls your modem
               both answering and originating calls; it can control
               your FAX card or the FAX options inside your modem at
               the same time. Think of the MAILER as a fancy timer/
               clock allowing you to program different "events" to
               happen using a weekly schedule. EMAIL is transmitted
               only when the schedule permits; mail schedules can be
               set up to send all mail at the least-expensive over-
               night rates.

GDB04.151H       This is the EDITOR portion. It is very much like a
               word-processor in operation, but instead of documents,
               there are EMAIL messages. The editor allows you to
               enter, read and reply to messages.

GDBUTIL.EXEH     This is the utility program. It allows for additional
               functions such as SEND FILE or POLL to be executed from
               a batch file so that nightly data transmissions can be
               automated. With the PURGE option, DBUTIL will purge the
               message base.


There are some basic terms that are important to understand when dealing with
D'Bridge. There is also a complete glossary of terms located in appendix A, but
here are the ones you will need in order to get started:


GEMAILH          Electronic mail, or in D'Bridge terms, messages that
               are sent directly between systems or routed through
               a host. EMAIL messages may be public or private and
               may be sent in normal or compressed (XMAIL) form.

GNETmailH        NETmail or network mail is the name of the EMAIL message
               area for messages sent directly between systems. Each
               NETmail message has an ORIGIN and a specific DESTINATION
               where it is to be sent.





-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
1.00  GENERAL OVERVIEW
                                                                               5
--------------------------------------------------------------------------------G


G  ECHOmailH       ECHOmail is a form of conferencing. When an ECHOmail
                 message is entered on your system, it is automatically
                 "echoed" to all other systems participating in the given
                 conference. ECHOmail messages are generally not private
                 since they can be read by the system operator of each
                 node receiving it.
  
                 ECHOmail conferences are generally topic-specific. For
                 example, there may be an ECHOmail conference about SKIING
                 and one about SCUBA_DIVING. This provides a means of
                 linking lots of people throughout the world in a common
                 forum for discussion.
  
G  XMAILH          In D'Bridge terms, XMAIL simply means compressed mail.
                 Compression is achieved through the use of common com-
                 pression/archival programs that store a series of files
                 inside a single archive. By default, ARC by System En-
                 hancement Associates is used to store and compress the
                 mail so that telephone costs may be cut. ZIP, LHA, ARJ,
                 PAK and ZOO are also supported as standard compression
                 methods.
  
                 If you wish to use the XMAIL features of D'Bridge, you
                 will need to get one of these supported archive programs:
  
  
                 GZIPH      PKWARE, Inc.
                          7545 N. Port Washington Rd.
                          Glendale, WI 53217
  
                 GLHAH      Copyright by Haruyasu Toshizaki
                          Japan
                          Distributed via electronic means
  
                 GARJH      Robert K. Jung
                          2606 Village Road West
                          Norwood, MA 02062
  
                 GPAKH      NoGate Consulting
                          P.O. Box 88115
                          Grand Rapids, MI 49518-0115
  
                 GARCH      System Enhancement Associates
                          21 New Street
                          Wayne, NJ 07470
  
                 GZOOH      Copyright by Rahul Dhesi
                          Free noncommercial use permitted





-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
1.00  GENERAL OVERVIEW
                                                                               6
--------------------------------------------------------------------------------G


G  NETWORKH        A NETWORK is a group of computer systems with the
                 ability to send EMAIL on a scheduled or continuous basis.
                 In D'Bridge, NETWORKS are defined by a NODELIST file.
  
G  NODELISTH       A NODELIST is a text file containing a list of EMAIL
                 systems in a given NETWORK. The list is in a structured
                 form, known as the "St. Louis" format. D'Bridge needs to
                 compile the raw list(s) into its database before a new
                 nodelist file may be used. If you are joining a public
                 NETWORK, you will need to obtain a copy of their NODELIST
                 from a "network administrator". If you are setting up a
                 private NETWORK, you will need to create your own
                 NODELIST file.
  
G  MESSAGEH        A MESSAGE is the basis of EMAIL communications. A user
                 enters a MESSAGE in the editor and ADDRESSES it to any
                 other system in the NODELIST.
  
G  ADDRESSH        Each EMAIL MESSAGE has two addresses: the ORIGIN and
                 DESTINATION ADDRESS. The ORIGIN is simply the ADDRESS of
                 the system on which the message was written and the DESTI-
                 NATION is the ADDRESS of the system where the message is
                 being sent. In D'Bridge, addresses are broken up into
                 four segments: ZONE, NET, NODE and POINT. Each of these
                 segments is a number between 0 and 32767. The normal for-
                 mat for an EMAIL ADDRESS is ZONE:NET/NODE.POINT.
  
G  ZONEH           The ZONE ADDRESS is a number between 1 and 32767 desig-
                 nating a NETWORK or geographic region. In the case of pu-
                 blic NETWORKS, different ZONES have been used to designate
                 completely separate NODELISTS.
  
G  NETH            The NET ADDRESS is a number between 1 and 32767 designa-
                 ting LOCAL NETWORKS. A LOCAL NETWORK consists of a HOST
                 NODE, BOSS NODES and POINTS.
  
G  NODEH           The NODE ADDRESS is a number between 0 and 32767 desig-
                 nating the ADDRESS of an individual system. If the NODE
                 number is 0, the system is a HOST NODE.
  
G  POINTH          The POINT ADDRESS is a number between 0 and 32767 desig-
                 nating the ADDRESS of an individual system acting as a
                 POINT. If the POINT number is 0, the system is a BOSS
                 NODE; otherwise, the system uses its BOSS NODE to receive mail.
  
G  BOSS NODEH      A BOSS NODE is any system operating with a point address
                 of zero. The difference between a BOSS NODE and a POINT
                 is that BOSS NODES are listed in the NODELIST of a
                 NETWORK, while POINTS are not. A BOSS NODE will HOLD and
                 FORWARD EMAIL and files to its POINTS.



-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
1.00  GENERAL OVERVIEW
                                                                               7
--------------------------------------------------------------------------------G


G  HOST NODEH      A HOST NODE acts as a collecting point for EMAIL and
                 HOST-ROUTED files. When a message and/or file is ROUTED,
                 it is automatically FORWARDED for the appropriate NODES.
  
G  EVENTH          An EVENT comprises of a number of scheduled parameter
                 changes in order to control EMAIL routing or to execute
                 a series of DOS commands at preprogrammed intervals.
                 The SCHEDULE may hold a maximum of 64 EVENTS that tell
                 D'Bridge what to do.
  
  
D'Bridge features four basic modes of operation:


GMAILERH         The normal mode of operation, the MAILER mode of D'Bridge
               is normally running 24-hours/day unless you are running
               D'Bridge only at certain times. While in the MAILER mode,
               D'Bridge sends and receives EMAIL and files based on a
               preprogrammed schedule. The MAILER mode offers a completely
               unattended method for scheduled transfers of data between
               personal computer systems.

               The user has the ability to control the queue of outbound
               file-transmissions and file-requests as well as XMAIL and
               standard EMAIL. No mail will be sent if the system is
               not left in MAILER mode when not in use by the operator.


GEDITORH         The EDITOR mode allows you to enter and read EMAIL
               messages sent and received by D'Bridge. The EDITOR is
               a specialized word-processor designed to offer powerful
               functions through a clear and simple user interface.
               The editor can be configured to read hundreds of local and
               ECHOmail areas as well as standard EMAIL.


GTERMINALH       The TERMINAL mode allows D'Bridge to act as a ANSI
               terminal allowing the user to call other systems such
               as Bulletin Board Systems (BBS) or commercial systems
               such as CompuServe<TM>. This mode provides upload and
               download capability plus the ability to set up a
               custom dialing directory of systems frequently called.


GCONFIGURATIONH  The CONFIGURATION mode of D'Bridge consists of a series
               of parameter screens providing complete control over
               the operation of the software. There are hundreds of
               user-definable parameters controlling the scheduling,
               communications and routing of the EMAIL. For added
               security, a password may be required to enter the various
               CONFIGURATION screens.



-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
2.00  SOFTWARE INSTALLATION
                                                                               8
--------------------------------------------------------------------------------G






2.00  SOFTWARE INSTALLATION

  
Installing D'Bridge from the release GZIPH file is quick and easy.


First, make sure that you mave a copy of both GPKZIP.EXEH and GPKUNZIP.EXEH in
the DOS PATH.   PKZIP is a compression/decompression system available from:

                           GPKWARE, Inc.H
                           G7545 N. Port Washington Rd.H
                           GGlendale, WI 53217H

4This program is available as a SHAREWARE product and is available for file-5
4request from most of our dealers in the DBNET nodelist.  It is REQUIRED for5
4D'Bridge operation.5

Next, unZIP the release file, DB-G140.ZIPH into a subdirectory of your choice.
Assuming that the ZIP file is on a floppy in drive B: type the following DOS
commands:

                ie.

                C>GMD \DBH
                C>GCD \DBH
                C>GPKUNZIP B:DB-140H


At this point, you should have three files in the \DB directory that came
from the release ZIP file:

                GDB-140.EXEH
                GDB-140.DOCH
                GREAD.MEH


To install 4or5 upgrade D'Bridge, simply type the command DB-140 in the \DB
directory:

                C>GDB-140H

The installation program will walk you through the installation process.
Once the installation is complete, the file GDB-140.EXEH will be erased.


Proceed to the next chapter for basic EMAIL configuration.




-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
2.01  BASIC EMAIL SETUP
                                                                               9
--------------------------------------------------------------------------------G






2.01  BASIC EMAIL SETUP

In order to gain a complete understanding of D'Bridge, we suggest that
you use the following guideline to initially configure the software.
Using this section, follow along step-by-step as we install an operati-
onal system.


1.   When D'Bridge is first loaded, it will perform a series of tests on
     its environment, files and peripherals. There are several warning
     messages you may see in the LOG window. Here's a summary of these
     warnings and what they mean:


         GWARNING: Unable to initialize modemH

         This warning means that there is a modem defined but D'Bridge
         is unable to communicate with it. The software expects an "OK"
         response when the initialization string is sent to the modem.
         A number of things could cause this problem, the most likely
         being that a cable is loose, the modem is off or something is
         set wrong in the COMM/MODEM setup screen; see SECTION 3.03 for
         more information.


         GWARNING: 64K free RAM needed for ECHOmailH

         If there is not at least 64K of memory free when you run
         D'Bridge, ECHOmail processing is not possible. Increase the
         environment size, remove unnecessary TSR programs, try to
         load DOS into High RAM, if your systems is equipped with that
         feature or, if possible, install additional RAM chips in your
         computer.


         GWARNING: Unable to open log fileH

         The LOG FILE that is defined on the BASIC CONFIG screen has
         an invalid name or can't be created for some reason.
         Check the drive and path; see SECTION 3.01 for more information.









-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
2.01  BASIC EMAIL SETUP
                                                                              10
--------------------------------------------------------------------------------G


  
         GNOTE: "Demo" key has 27 days left!H

         Your demonstration license key will expire in 27 days. This
         warning will only appear if you are running a demo copy of
         D'Bridge. This is here for two reasons: to remind you that
         the software is not free and to make sure that you order a
         permanent license before your demo key expires.


         GERROR: Insufficient disk space on C:H

         There is not enough disk space for D'Bridge to operate. This
         is based on the values established on the DISK MINIMUMS screen.
         The solution to this problem is either to free some disk space
         on the "offending" drive or use DB SETUP to change the DISK
         MINIMUMS. (Typing "DB SETUP" from the DOS command line will
         allow you to use the configuration menus without D'Bridge
         coming online).


2.   When the top-left corner of the screen says "IDLE," you may press
     the ESC key to display the main menu. Pressing the ESC key a second
     time will return the system to IDLE mode. Select menu items by
     using the ARROW keys to move to the desired option, then press ENTER.
     Pressing the first letter of any option will select that option im-
     mediately without any other keystrokes.


3.   On the EDITOR menu, select the SETUP EDITOR OPTIONS option.
     (Pressing ESC-E-S is a quick way of getting to this menu from the
     IDLE state.)  Choose answers for all the fields on this screen.
     If you're not sure about a field, leave it blank or accept the pre-
     programmed "default"; refer to SECTION 3.15 for more information.


4.   On the CONFIG menu, select each of the following options and
     fill-in all the fields with the appropriate information. Again,
     if you don't understand something, just accept the "default"
     value or leave it blank.

        Screen                   Section

        BASIC CONFIGURATION        3.01
        DIRECTORY PATHS            3.02
        COMM/MODEM SETUP           3.03
        NODELIST CONFIGURATION     3.05






-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
2.01  BASIC EMAIL SETUP
                                                                              11
--------------------------------------------------------------------------------G


GH  
  
  
  
  5.   If you run a bulletin board system (BBS,) setup the information on
       the ADVANCED MENU, BBS CONFIGURATION screen; refer to SECTION 3.10
       for more information on this screen.
  
  
  6.   Next, if there are certain mail schedules required for your
       NETWORK, you can set them up in the SCHEDULE MAINTENANCE option
       of the CONFIG menu. Typically, a NETWORK will have at least one
       MAIL EVENT each night. During these events, EMAIL and files are
       allowed to be sent; this allows EMAIL entered during the day to
       be transmitted at night, yielding the highest savings in tele-
       communication costs. See SECTION 3.04 for more information.
  
  
  7.   At this point, your system should be configured for basic EMAIL
       operation. Assuming that you defined a NODELIST on the NODELIST
       CONFIGURATION screen, it must be compiled before D'Bridge can use
       it. The NODELIST always gets compiled when the system is brought
       up and a new NODELIST exists. If you haven't left the program,
       you can force a nodelist compile by using the BUILD NODELIST
       DATABASE on the UTILITIES menu. This process takes a few minutes,
       so be patient.
  
  8.   Now EMAIL is fully configured and you may continue by reading
       SECTION 2.02, BASIC ECHOMAIL SETUP.

























-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
2.02  BASIC ECHOMAIL SETUP
                                                                              12
--------------------------------------------------------------------------------G






2.02  BASIC ECHOMAIL SETUP

It is assumed you've completed the previous section and set up most
of the parameters on all the menus listed. If you haven't done this,
please go back and read the previous section as you configure D'Bridge.

Before you configure the ECHOmail subsystem, it is a good idea to have
a general understanding of what it is and how it works. Once properly
configured, the D'Bridge ECHOmail processor is completely automatic in
operation.


  - What is ECHOmail?


    ECHOmail is a facility allowing for EMAIL-based conferencing in
    any number of message areas at the same time. An ECHOmail message
    differs from a NETmail message only in that there is no DESTINATI-
    ON ADDRESS for an ECHOmail message; it gets sent to ALL systems
    participating in a given conference.

    With ECHOmail, you have the capability of sharing ideas with other
    people in SPECIAL INTEREST GROUPS or SIGS. A conference is created
    for each topic of discussion and you may participate in as few or
    as many as you wish. When you enter a message, it is automatically
    forwarded to all the other nodes you are linking to the conference.
    In turn, all the other nodes forward the message to all the nodes
    they link to; the process continues until your message has been seen
    by every system participating in the conference. Your message can
    be sent to THOUSANDS of systems if a conference is interesting
    enough to attract a large and widespread "audience"!

    ECHOmail is a unique form of communications. People living thousands
    of miles apart can carry on a public discussion on any topic or in-
    terest they have in common. During the Gulf War the CNN television
    network featured a report about D'Bridge being used for fast commu-
    nications between American soldiers and their families at home.
    In fact, within several days a special purpose all-D'Bridge SaudiNet
    had been set up for this particular purpose. While it took regular
    mail several weeks to get to its destination, D'Bridge carried Mega-
    bytes of messages back and forth between the Gulf Region and the
    States within minutes!







-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
2.02  BASIC ECHOMAIL SETUP
                                                                              13
--------------------------------------------------------------------------------G


      An example of some public ECHOmail conferences anyone may partici-
      pate in are:
  
    DBRIDGE       D'Bridge users conference
    HUMOR         Sick jokes and humor
    POLITICS      International political discussion
    SYSOP         International Sysop ECHO
    ZMODEM        Discussion about the ZMODEM protocol

    For more information about how to receive public ECHOmail, contact
    any of our support nodes and we'll be glad to help you.


  - How does ECHOmail work?

    Each ECHOmail conference is actually an entire network within
    itself. An ECHOmail network is defined by its TOPOLOGY or the
    way in which the network interconnects. The following chart
    describes the topology of an ECHOmail conference from my system's
    point-of-view. (This is just an example...)


                         --------------------
                         1:110/68 (my system)
                         ---------+----------
                                  |
                                  |
                                  |
   /-----------+------------+-----+-----+-------------+-------------\
   |           |            |           |             |             |
---+---    ----+----    ----+----    ---+-----    ----+-----    ----+-----
1:105/3    1:107/150    1:150/613    1:3601/14    2:512/1006    1:110/68.1
---+---    ---------    ---------    ---+-----    ----+-----    ----------
   |                                    |             |
   +-----------+------------\           |             +-------\
   |           |            |           |             |       |
---+----    ---+----    ----+----    ---+-----     ---+-----  |
1:105/10    1:105/50    1:105/300    1:3601/14.1   2:280/280  |
--------    --------    ----+----    ---------     ---------  |
                            |                                 |
                            +----------------\                |
                            |                |                |
                       -----+------     -----+------     -----+------
                       1:105/300.14     1:105/300.68     2:512/1006.1
                       ------------     ------------     ------------








-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
2.02  BASIC ECHOMAIL SETUP
                                                                              14
--------------------------------------------------------------------------------G



    To understand what topology is and how messages get to all the
    systems in the conference, let's take an example of a message
    entered on 1:105/300.68 replying to a message from 2:512/1006.1...

    The message would pass through the following systems to make it
    to its final destination:

    1:105/300.68, 1:105/300, 1:105/3, 1:110/68, 2:512/1006, 2:512/1006.1

    This could take anywhere from a few hours to a few days depending
    on the events running on the different systems; the message must
    be forwarded through four different systems before making it to
    2:512/1006.1!


    You will notice the topology (interconnection) is in the form of a
    tree starting with my address at the top. ECHOmail topology is
    different from every system's point-of-view. In the above network,
    there may be links I am not aware of. For example, I have no way
    of knowing to which points 1:105/300 is sending the ECHOmail.
    The tree looks completely different from his point-of-view.

    The main thing to remember is never to have more than once "source"
    of an ECHO. It is fine to forward an echo to several other systems,
    but make sure all topology follows this tree structure and never
    causes any loops.

    Most networks have an ECHOmail coordinator whose job it is to ensure
    the validity of the local network topology. If you are a member of
    a public network, you should always contact the ECHOmail coordinator
    before setting up any ECHOmail links.


           IMPROPER TOPOLOGY             ACCEPTABLE TOPOLOGY

             /-----------\                 /-----------\
             |           |                 |           |
          ---+---     ---+---           ---+---     ---+---
          1:134/2     1:134/5           1:134/2     1:134/5
          ---+---     ---+---           ---+---     ---+---
             |           |                 |           |
          ---+---    ----+----          ---+---    ----+----
          1:134/3    1:134/150          1:134/3    1:134/150
          ---+---    ----+----          -------    ---------
             |           |
             \-----------/






-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
2.02  BASIC ECHOMAIL SETUP
                                                                              15
--------------------------------------------------------------------------------G




                                                OPTIMUM TOPOLOGY
System     FORWARD TO                               a
------     ----------                                 -------
1:134/2    1:134/3 1:134/5 1:134/150                  1:134/2
1:134/3    1:134/2                                    ---+---
1:134/5    1:135/2                                       |
1:134/150  1:135/2                           /-----------+-----------\
                                        b    |      c    |     d     |
                                          ---+---     ---+---    ----+----
                                          1:134/3     1:134/5    1:134/150
                                          -------     -------    ---------


    While configuring basic ECHOmail capabilities, read the follo-
    wing sequence of instructions to gain a greater understanding of
    D'Bridge.


    1.   From the CONFIG menu, select the PACKET/MAIL CONTROL screen.
         Using this screen, set the ECHOmail-related parameters like
         this:

            Inbound mail handling? Automatic
                   Kill null msgs? Yes
             Kill In-transit msgs? Yes
                In-transit rescan? Yes
            Secured ECHOmail only? No
            Save ECHOmail SEENBYs? No
          Save duplicate messages? No
          Auto-add ECHOmail areas? No   (for now)
          Accept AREAFIX requests? Yes
           Remove empty PASSTHRUs? Yes


    2.   Next, select the XMAIL CONTROL screen. Here, you should
         already have defaults displayed for each of the compression
         commands. If you are using different archive programs than
         the ones specified, change them as appropriate, but remember
         the formats of the ARC, ZIP, LHA, ARJ, PAK or ZOO files must
         be the same.

         Specify "30" for "XMAIL processing interval"
         Specify "200" for XMAIL packet size limit"

         XMAIL uses the ARC program by default, but you may specify
         which compression methods to use for which systems on this
         screen.




-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
2.02  BASIC ECHOMAIL SETUP
                                                                              16
--------------------------------------------------------------------------------G


GH  
  
  
  
      3.   On the ADVANCED menu, select the DISK SPACE MINIMUMS screen.
           D'Bridge comes preprogrammed with suggested minimum disk
           space criteria. If you plan to use more than one hard-drive
           to store the message bases or queue directory, make sure you
           specify minimums for them on this screen.
  
  
      4.   On the EDITOR menu, select the ECHOMAIL AREAS screen.
           Following the directions listed in SECTION 3.16, create all
           the ECHOmail areas you will be using. In the FORWARD TO
           fields, list the addresses of the systems you want to set
           up ECHOmail links for.
  
  
      5.   That's all there is to it. For ECHOmail to work, you must
           verify the following things:
  
           a. D'Bridge reports at least enough free memory as it takes to
              run the compression and decompression programs specified on
              the XMAIL CONTROL screen. When D'Bridge first comes online,
              it says how many bytes of memory are available. Typically,
              this must be around 100K, depending on the compression
              programs you are using.
  
           b. The compression programs specified must exist in the current
              default path.
  
           c. There is enough free disk space; there will be a warning
              at the bottom of the screen if disk space is too low to
              unpack or forward ECHOmail.
  



















-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.00  SYSTEM CONFIGURATION AND MAINTENANCE
                                                                              17
--------------------------------------------------------------------------------G






3.00  SYSTEM CONFIGURATION AND MAINTENANCE

D'Bridge is configured by using a series of configuration options on the
GEDITORH, GCONFIGH and GADVANCEDH menus.  These options give you complete
control over all features and settings and, if improperly set, result in bad
performance or malfunction.  It is therefore advised that only the system
operator have access to the maintenance functions.  Configuration screens may
have a password assigned, using the GConfig passwordH parameter on the GBASICH
GCONFIGURATIONH screen.


The following menu options comprise the configuration/maintenance sub-system
of D'Bridge:


           GSetup editor optionsH
           GECHOmail areasH
           GKeyboard macrosH
           GTranslation tableH
           GBasic configurationH
           GDirectory pathsH
           GComm/modem setupH
           GSchedule maintenanceH
           GNodelist configurationH
           GPacket/Mail controlH
           GXMail controlH
           GTime adjustment dataH
           GFunction keysH
           GBBS configurationH
           GSecurity/MiscellaneousH
           GDisk space minimumsH
           GAccounting/TranslationH
           GZMODEM parametersH
           GXport configurationH
           GWindow colorsH



All these options are described in detail in the following sections.











-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.01  BASIC CONFIGURATION
                                                                              18
--------------------------------------------------------------------------------G






3.01  BASIC CONFIGURATION

  
The GBASIC CONFIGURATIONH screen allows control over the "basic" functions
of D'Bridge such as:


   - System log
   - Primary and Alias EMAIL addresses
   - System name
   - Operator name
   - Location or City
   - Data phone number
   - Flags
   - Alarms
   - Configuration password




SYSTEM LOG LEVEL

System log level: GVerboseH (GNHone/GTHerse/GVHerbose/GDHebug)

This controls the level of detail being written to the system log
file. D'Bridge allows three levels of activity logging; it is high-
ly recommended you select VERBOSE until you are familiar with the
complete operation of D'Bridge Email System.

  /---------+----------------------------------------------------------------\
  | GNONEH    |   Creates NO log whatsoever.  Using this option, problems will |
  |         |   be difficult to resolve, once detected.                      |
  |         |                                                                |
  | GTERSEH   |   Writes only the important data, such as connections, events, |
  |         |   and file-transfer information.                               |
  |         |                                                                |
  | GVERBOSEH |   Writes ALL information displayed in the log window.          |
  |         |                                                                |
  | GDEBUGH   |   Same as VERBOSE, except the times are recorded in the log    |
  |         |   using fractional seconds. (HH:MM:SS.hh)                      |
  \---------+----------------------------------------------------------------/









-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.01  BASIC CONFIGURATION
                                                                              19
--------------------------------------------------------------------------------G






PURGE LOG AFTER

Purge log after: G7  H (days)

This specifies the number of days to retain the information in the system
log file. Every day, all log entries older than the specified number of
days will be erased from the current log file. This purge occurs during
the GAutoUpdateH event at midnight.

4 * NOTE * 5  This feature is not yet implemented.




LOG FILENAME

Log filename: GC:\DB\DBRIDGE.LOG                          H

D'Bridge normally keeps a "log" of all activity so that you may review
its performance. Here, you specify the name of the file (including the
directory if you wish) to which D'Bridge will write its log. This file
contains the information displayed in the upper-left window including
such data as incoming and outgoing calls, file-transfer statistics and
event activation.




CPS DISPLAY UNIT

CPS display unit: GbpsH (GbpsH/GcpsH/GkpmH/G%H)

This setting determines the method to use when reporting the effective speed
of a data transfer. These measurements are displayed in the ACTIVITY window
during an online mail session. The value of this parameter has absolutely
no effect on the actual speed of a transfer.

    /-----+----------------------------------------------------------------\
    | GbpsH |  Bits per second @ 10 bits per byte.             ie. 17100 bps |
    |     |                                                                |
    | GcpsH |  Characters or bytes per second.                 "   228 cps   |
    |     |                                                                |
    | GkpmH |  Kilobytes per minute.  (cps x 1024)             "   94.2 kpm  |
    |     |                                                                |
    | G%H   |  Percentage of reported baud rate.               "   113.2%    |
    \-----+----------------------------------------------------------------/




-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.01  BASIC CONFIGURATION
                                                                              20
--------------------------------------------------------------------------------G






PRIMARY ADDRESS

Primary address: G1:110/68.1                        H

This specifies your primary system address. This (like all addresses)
must be in the format: <GZONEH:GNETH/GNODEH.GPOINTH@GdomainH>

If you are a member of an already-existing network, contact your network
coordinator for an address assignment. If you're not sure, just pick
arbitrary numbers for now and change them later.

       /--------+------------------------------------------------------------\
       | GZONEH   |  Continent or nodelist designator 1=US, 2=Europe, etc.     |
       |        |                                                            |
       | GNETH    |  Usually represents a local calling area (1..32767.)       |
       |        |                                                            |
       | GNODEH   |  Specific system address within a ZONE and NET.            |
       |        |                                                            |
       | GPOINTH  |  Zero unless running as a "point" of another system.       |
       |        |                                                            |
       | GDOMAINH |  4 * NOTE * 5  Domains are not supported yet.                |
       \--------+------------------------------------------------------------/




ALIAS ADDRESSES

Alias addresses: G201:201/0 FOR 201:ALL                  H

This specifies your secondary (alias) addresses. The field must be in the
format:  <GaddressH> [FOR <GfilterH>]

If you are a member of multiple networks, specify your main address in the
"Primary address" field and all other origin addresses here.  The filter
controls the automatic alias function.  In the above example, any mail,
AREAFIX requests or transactions with any zone 201 address will be sent
using 201:201/0 as the origin address.  The primary address is used in
all cases where there is no match with an alias address filter.

(See GPRIMARY ADDRESSH for information about EMAIL address formats.)









-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.01  BASIC CONFIGURATION
                                                                              21
--------------------------------------------------------------------------------G






SYSTEM NAME

System name: GFactory Second Parachutes, Inc.               H

When D'Bridge communicates with a remote site, the SYSTEM NAME is
displayed on the other system's screen along with OPERATOR NAME, CITY
and your primary and alias addresses.

This field should match the SYSTEM NAME field of your nodelist entry.




SYSTEM CITY

System city: GMiddletown, OH        H

When D'Bridge communicates with a remote site, the SYSTEM CITY is
displayed on the other system. Make sure it is not duplicated in
the SYSTEM NAME field (it would be redundant...).

This field should match the CITY field of your nodelist entry.




OPERATOR NAME

Operator name: GChris Irwin           H

When D'Bridge communicates with a remote site, the OPERATOR NAME is
displayed on the other system and placed in its system log file.
This name will also be used in the "FROM" field in the editor, when
entering a NETmail or ECHOmail message.

This field should match the OPERATOR field of your nodelist entry.














-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.01  BASIC CONFIGURATION
                                                                              22
--------------------------------------------------------------------------------G






DATA PHONE

Data phone: G1-513-821-1387       H

When D'Bridge communicates with a remote site, the DATA PHONE field
is transmitted to the other system for automatic addition to their
nodelist database. If you fail to specify this number correctly,
it will not be possible for the remote site to return an answer to
your mail directly.

If you are using a voice line or do not wish to disclose this number
to the public, DO NOT LIST IT HERE. Use "G-Unlisted-H" to designate
the number as private. This data is exchanged during the initial
EMSI handshake.

4* NOTE *5  For proper translation, phone number MUST be in the format:

          <GCOUNTRY CODEH>-<GCITY CODEH>-<GNUMBERH>




CAPABILITY FLAGS

Capability flags: GXX,CM,V32                       H

This specifies your system's capabilities. Each Gcapability flagH is
separated by commas. These flags are transmitted to the remote site
during the initial EMSI handshake. With this information stored in
a system's nodelist, it is possible to determine modem type, hours of
operation and file-request capability. Following is a partial list
of standard capability flags:

          /-----+----------------------------------------------------------\
          | GCMH  |  Continuous mail system.  (On 24-hours every day)        |
          |     |                                                          |
          | GXXH  |  WaZOO file-requests and update-requests are accepted.   |
          |     |                                                          |
          | GV32H |  Modem conforms to the V.32 standard.                    |
          |     |                                                          |
          | GHSTH |  Modem conforms to the US Robotics HST standard.         |
          |     |                                                          |
          | GPEPH |  Modem conforms to the Telebit Trailblazer standard.     |
          \-----+----------------------------------------------------------/






-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.01  BASIC CONFIGURATION
                                                                              23
--------------------------------------------------------------------------------G






AUDIO ALARMS

Audio alarms? GYesH  (GYHes/GNHo)

This parameter controls the PC's speaker, enabling or disabling the
audio alarms. These alarms will alert the operator of incoming calls
and new mail received. If you specify GNoH, all automatic alarms will
be disabled.




ALARM HOURS

Alarm hours: G24 hoursH
   -or-
Alarm hours: G08:00H until G23:00H

This parameter controls the time of day during which the audio alarms
may be heard. This has no effect if the GAudio alarmsH are disabled.

Either specify nothing (for 24 hours) or enter both starting and ending
times. Use 24-hour format to describe times after 12 noon. If the
starting time is before the ending time, the period includes midnight.




RING SIGNAL

Ring signal? GYesH  (GYHes/GNHo)

This parameter enables or disables the PC's speaker when the phone is
ringing because of an incoming call. This has no effect unless the
GAnswering methodH is configured for GHardwareH or GRingMasterH on the
COMM/MODEM SETUP screen.

This signal is only heard during the allowed time period.












-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.01  BASIC CONFIGURATION
                                                                              24
--------------------------------------------------------------------------------G






CALL ALARM

Call alarm: GT120L8CGL4E                          H

This parameter would normally be blank, indicating that the standard
alarm tones should be used. However, some people get tired of hearing
the same alarm every day, so this field gives you the opportunity to
write your own musical alarm. Either specify the music codes or the
name of a text file containing the notes.


Standard ANSI music codes are used, in fact, they are the same as the
"PLAY" statement in MicroSoft's BASICA. Following is a chart of legal
music commands:


           /--------+--------------------------------------------------------\
           | GAH .. GGH |  The musical notes A thru G.  A note may be followed   |
           |        |  by an accidental ('G#H' or 'G+H' for sharp and 'G-H' for    |
           |        |  flat.)  Additionally, a note (With optional sharp or  |
           |        |  flat) may also be followed by a number denoting the   |
           |        |  note length (1 for a whole note thru 64 for a 64th)   |
           |        |  The note, with optional accidental and length, may    |
           |        |  also be followed by one or more dots ("G.H"), each of   |
           |        |  which extends the note by one half of its existing    |
           |        |  value.  For example, two dots produce a length 9/4ths |
           |        |  the original value, and three dots 27/8ths the value. |
           |        |                                                        |
           | GLHn     |  Specifies the default length of the notes following   |
           |        |  ("n" must be G1H for a whole note thru G64H for a 64th    |
           |        |   note.)  The default value is G4H (quarter note.)       |
           |        |                                                        |
           | GMHz     |  Specifies the fraction of the note length that the    |
           |        |  note is actually sounding.  "z" is either "GSH," "GNH"    |
           |        |  or "GLH", which have these meanings:                    |
           |        |                                                        |
           |        |       GMSH   Music staccato   (3/4 of note length)       |
           |        |       GMNH   Music normal     (7/8 of note length)       |
           |        |       GMLH   Music legato     (all of note length)       |
           |        |                                                        |
           | GOHn     |  Specifies the octave in which the notes following     |
           |        |  are to be played (G0H thru G7H).  The initial default     |
           |        |  octave is G3H, which is the octave beginning at         |
           |        |  middle C.                                             |
           |        |                                                        |




-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.01  BASIC CONFIGURATION
                                                                              25
--------------------------------------------------------------------------------G


GH  
  
  
             | GPHn     |  Specifies that no sound is to be made for an          |
             |        |  interval.  "n" (optional) is the note length (G1H       |
             |        |  for a whole note thru G64H for a 64th note.)  If "n"    |
             |        |  is omitted, the current default note length is used.  |
             |        |  One or more dots may follow, each of which extends    |
             |        |  the rest by one half of its existing value.           |
             |        |                                                        |
             | GTHn     |  Specifies the tempo in beats per minute (G32H thru      |
             |        |  G255H.)  The initial default value is G120H.              |
             \--------+--------------------------------------------------------/




SPECIAL ALARMS

Special alarms: G135/ALL T180L8O4GGGAAACD.            H

If you would like to be notified when certain systems call, specify
the address followed by the music codes you wish to hear. The format
for the music is specified in the preceding section. The alarm will
be heard after the call is complete, but only if new messages or files
have been received.




CONFIG PASSWORD

Config password: GSECRET  H

In a corporate environment where there may be several people using the
EMAIL system, it may be desirable to put a "lock" on the configuration
menu to prevent accidental changes of the D'Bridge configuration. If
a password is specified here, then it must be entered when any of the
SETUP menu options are selected. It only needs to be entered once for
each time D'Bridge is run.














-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.01  BASIC CONFIGURATION
                                                                              26
--------------------------------------------------------------------------------G






HISTORY DAYS

Keep history for: G7   H (days)

D'Bridge automatically maintains history files for INBOUND and OUTBOUND
EMAIL calls as well as ECHOmail and AREAFIX requests. These files are
automatically purged every night at midnight. This field defines how
many days of history to keep before purging it. The default value for
this option is 7, providing one week's history.




DISPLAY TIMEOUT

Display timeout: G5  H  (Minutes)

D'Bridge features a built-in "screen-saver" which will blank your video
screen after a specified period of inactivity. The DISPLAY TIMEOUT
parameter specifies the number of MINUTES of inactivity before the
screen goes blank. If a call comes in, a scheduled event starts, or you
press any key, the screen will re-display and the timer starts over.
When the screen is blank, D'Bridge is still fully-functional - just
waiting for something to happen!  If you do not want the screen to ever
go blank, enter a zero ("0") and the display timeout will be disabled.




BLANKOUT GRAPHICS

Blankout graphics? GYesH  (GYHes/GNHo)

When the D'Bridge screen is blanked due to inactivity, you have the
option to display "blankout graphics."  If you answer YES to this
question, there will be a bouncing pattern of dots that will tell you
at a glance D'Bridge is still running and you haven't had a system
crash or something terrible like that. Most computers hate to be bored
and do nothing all day; blankout graphics make your system happy by
giving it something to do when nothing else is going on...










-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.02  DIRECTORY PATHS
                                                                              27
--------------------------------------------------------------------------------G






3.02  DIRECTORY PATHS

  
The GDIRECTORY PATHSH screen allows you to set which drives and subdirectories
D'Bridge will use.  Parameters include:

   - Network mail storage
   - Inbound files path
   - Temporary queue path
   - Outbound queue path
   - Script file path
   - Bad ECHOmail path
   - New ECHO area path
   - "ABOUT" and "FILES" filenames
   - Request paths
   - Specific requests
   - Inbound, outbound, ECHOmail and AREAFIX history




NETWORK MAIL STORAGE

Network mail storage: GFido    H  (GFHido/GQHuickBBS)

D'Bridge gives you the option of two storage methods for NETmail:

  /----------+---------------------------------------------------------------\
  | GFIDOH     |  This method uses one .MSG file for each message.  This has   |
  |          |  the advantage of being compatible with a great number of     |
  |          |  third-party utility programs.                                |
  |          |                                                               |
  | GQUICKBBSH |  This method uses a single set of database files for all the  |
  |          |  messages.  The advantage is increased speed and a savings    |
  |          |  of disk space.                                               |
  \----------+---------------------------------------------------------------/














-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.02  DIRECTORY PATHS
                                                                              28
--------------------------------------------------------------------------------G






NETWORK MAIL PATH

Network mail path: GC:\DB\MESSAGES                  H

Specify the directory path to use for Fido-style NETmail messages.

This directory will contain the files such as:

GDirectory of  C:\DB\MESSAGESH

G1        MSG     1847  12-06-91  11:15aH
G2        MSG     1511  12-06-91  11:15aH
G3        MSG     1459  12-06-91  11:54pH
.
.
Gnnnn     MSG      505  12-15-91  11:07aH




QUICKBBS AREA NUMBER

QuickBBS area number: G17 H

Specify the area number you would like to use for NETmail messages
using the QuickBBS message base. (G1H-G200H)




INBOUND FILES PATH

Inbound files path: GC:\DB\FILES                           H

This designates the drive and path for the directory where inbound
files will be stored. Make sure there is always enough disk space
available to store any files which may be received. This may be
changed at any time without adversely affecting the system, as long
as the specified directory path actually exists.











-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.02  DIRECTORY PATHS
                                                                              29
--------------------------------------------------------------------------------G






TEMPORARY QUEUE PATH

Temporary queue path: GC:\DB\PACKETS                       H

This designates the drive and path for the temporary directory where
the outbound NETmail queue will be created.

4* NOTE *5  GAll files in this directory will be automatically erasedH
          Geach time the queue is rebuilt.H




OUTBOUND QUEUE PATH

Outbound queue path: GC:\DB\QUEUE                          H

This designates the drive and path for the outbound queue directory.
XMAIL archives and poll, transmit, and request queue entries are
stored in this directory.




SCRIPT FILE PATH

Script file path: GC:\DB\SCRIPTS                           H

This designates the drive and path where the dialing script files
are located. Script files provide an alternate method of dialing
when using carriers other than standard long-distance telephone
lines.




BAD ECHO PATH

Bad echo path: GC:\DB\BADECHO                              H

This designates the drive and path where invalid or unknown ECHOmail
messages should be stored. The GBADECHOH messages are stored in Fido
format and may be accessed using area 9999 in the editor.







-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.02  DIRECTORY PATHS
                                                                              30
--------------------------------------------------------------------------------G






NEW ECHO PATH

New echo path: GC:\DB\NEWECHO                              H

This designates the drive and path where Fido-style ECHOmail message
bases will be created if GAuto-add areasH is configured for "GFHido."

4* NOTE * 5  See GPACKET/MAIL CONTROLH for further information.




QUICK DIRECTORY PATH

Quick directory path: GC:\QUICKBBS                         H

This designates the drive and path where the QuickBBS database files
will be stored. If they do not already exist, D'Bridge will create
them automatically. The following files are used:

GDirectory of  C:\QUICKBBSH

GMSGINFO  BBS      406  06-05-92  11:01aH
GMSGIDX   BBS     2346  06-05-92  11:01aH
GMSGHDR   BBS   146234  06-05-92  11:01aH
GMSGTOIDX BBS    28152  06-05-92  11:01aH
GMSGTXT   BBS  1012480  06-05-92  11:01aH




DFB PATH

DFB path: GC:\DB\DFB                                 H

This designates the drive and path where the DFB files are located. This is
for the GD'Bridge FileBaseH indexing system.













-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.02  DIRECTORY PATHS
                                                                              31
--------------------------------------------------------------------------------G






ABOUT FILENAME

"ABOUT" filename: GC:\DB\110-68.TXT                     H

The "ABOUT" file is used mainly with the "Public Amateur Network"
to contain general information about your system. The "ABOUT" file name
should specify the name of a text file to be transmitted when a file-
request for "ABOUT" is received. (For more information, see the section
about file-requests.)




FILES FILENAME

"FILES" filename: GC:\DB\110-68.LST                     H

The "FILES" file is used primarily with the "Public Amateur Network"
to provide a list of all requestable files on your system. The GFILESH
GfilenameH should point to this text file or archive.




REQUEST PATHS

Request paths: GC:\PRIVATE\ SECRET                       H

D'Bridge has a feature allowing other systems to call in and request
files from your system. If you wish to enable this option, you must
specify which directories will be available for request. You may also
specify a password that must accompany a request. If you use no pass-
word, any system will have access to the specified directory.
The format for the request paths is:

    <GDIRECTORY PATHH> <GOPTIONAL PASSWORDH>

Where password is an optional parameter. Any number of directories may
be specified in the REQUEST PATHS window. Make sure to use passwords
on any directory containing sensitive or confidential information.










-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.02  DIRECTORY PATHS
                                                                              32
--------------------------------------------------------------------------------G






SPECIFIC REQUESTS

Specific requests: GDBRIDGE C:\FREQ\DB*.ZIP               H

This window allows you to specify any number of "magic filenames" that
may be requested from your system. An example of this might be where
you distribute a newsletter and the filename changes every month. You
might have a line like:

    GNEWS \NEWSLTR\PC-NEWS.021H

The above line means that when a file-request arrives for "NEWS" - the
file \newsltr\pc-news.021 will be transmitted instead of searching the
directories specified in REQUEST PATHS. The format for this window is:

    <GMAGIC NAMEH> <GFILE PATHH> <GOPTIONAL PASSWORDH>

Once again, password is optional, but should be specified if any of this
information is not public.




OUTBOUND HISTORY FILENAME

Outbound history file: GC:\DB\OUTBOUND.TXT                  H

The OUTBOUND HISTORY FILENAME parameter specifies a text file to write
an outbound EMAIL history log. Every outbound connection is logged to
a the specified text file listing the date/time, address, data sent and
received, elapsed time and total cost. If you do not want such a log,
leave this field blank.




INBOUND HISTORY FILENAME

Inbound history file: GC:\DB\INBOUND.TXT                    H

The INBOUND HISTORY FILENAME parameter specifies a text file to write
an inbound EMAIL history log. Every outbound connection is logged to
the specified text file listing the date/time, address, data sent and
received and elapsed time. If you do not want such a log, leave this
field blank.





-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.02  DIRECTORY PATHS
                                                                              33
--------------------------------------------------------------------------------G






ECHOMAIL HISTORY FILENAME

ECHOmail history file: GC:\DB\ECHOMAIL.TXT                      H

The ECHOMAIL HISTORY FILENAME specifies what text file to use for the
inbound ECHOmail history. This log lists date/time, address, area name,
messages and duplicates received.




AREAFIX HISTORY FILENAME

AREAFIX history file: GC:\DB\AREAFIX.TXT                        H

The AREAFIX HISTORY FILENAME specifies what text file to use for an
AREAFIX history log. This includes information about conferences added
and removed either by remote AREAFIX request or New ECHOmail link, ALT-N.
































-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.03  COMM / MODEM SETUP
                                                                              34
--------------------------------------------------------------------------------G






3.03  COMM / MODEM SETUP

  
The GCOMM/MODEM SETUPH screen allows you to define your serial port(s) and
modem(s) as well as control such things as:


   - Answering method
   - Line assignment
   - CostGuard limits
   - DimeSaver
   - Auto-initialization time
   - Dialing overrides
   - Printer setup
   - Inbound, outbound, ECHOmail and AREAFIX history


Before D'Bridge can function as an EMAIL system, it must be able to control
the serial port and modem.  This screen allows the definition of modem and
printer types: MCF and PCF files (Modem Control and Printer Control Files.)













PORT

     Port  Base/IRQ  Status   Ident  MCF name  Description
     GCOM3H  G    H  G H   G       H  G     H  G        H  G                    H


The PORT identifies the name of the serial I/O channel connected to your
modem. Standard values are GCOM1H-GCOM7H, but any other name is allowed
also. If you select one of the standard ports, the GBASE ADDRESSH an GIRQH
values will be calculated automatically.







-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.03  COMM / MODEM SETUP
                                                                              35
--------------------------------------------------------------------------------G






BASE ADDRESS

     Port  Base/IRQ  Status   Ident  MCF name  Description
     G    H  G03E8H  G H   G       H  G     H  G        H  G                    H

The BASE ADDRESS determines the CPU's I/O port address to use. If you do
not understand what this means, you should use a standard port, like GCOM1H
or GCOM2H. If you do have a non-standard configuration, consult your vendor
for this information. This field must contain a 16-bit 4hexadecimal5 value.
Standard values are listed below.

            IBM PC/XT/AT                        IBM PS/2
          /------+--------\         /------+--------+------+--------\
          | GCOM1H |  03F8  |         | GCOM1H |  03F8  | GCOM5H |  4220  |
          | GCOM2H |  02F8  |         | GCOM2H |  02F8  | GCOM6H |  4228  |
          | GCOM3H |  03E8  |         | GCOM3H |  3220  | GCOM7H |  5220  |
          | GCOM4H |  02E8  |         | GCOM4H |  3228  | GCOM8H |  5228  |
          \------+--------/         \------+--------+------+--------/




IRQ

     Port  Base/IRQ  Status   Ident  MCF name  Description
     G    H  G    H  G4H   G       H  G     H  G        H  G                    H


The IRQ 4(Interrupt ReQuest)5 level determines the hardware-specific interrupt
vector that will be used. (G3H and G4H are most common)  This field must con-
tain a 4-bit 4decimal5 value from 0 to 15. Standard values are listed below.

            IBM PC/XT/AT                        IBM PS/2
          /------+-----\         /------+-----+------+-----\
          | GCOM1H |  4  |         | GCOM1H |  4  | GCOM5H |  3  |
          | GCOM2H |  3  |         | GCOM2H |  3  | GCOM6H |  3  |
          | GCOM3H |  4  |         | GCOM3H |  3  | GCOM7H |  3  |
          | GCOM4H |  3  |         | GCOM4H |  3  | GCOM8H |  3  |
          \------+-----/         \------+-----+------+-----/











-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.03  COMM / MODEM SETUP
                                                                              36
--------------------------------------------------------------------------------G






MCF NAME

     Port  Base/IRQ  Status   Ident  MCF name  Description
     G    H  G    H  G H   G       H  G     H  GUSRC1438H  GUS Robotics HST 14400  H

The MCF NAME specifies the name of a D'Bridge "4Modem Control File5."
Included, you will find an 4ZIP5 file which contains our standard
MCF collection. If you press GF10H, you will receive a list of all
modems currently supported. Simply select the 4Modem Control File5
to use for the specified serial port. When you select a different
MCF or specify one for the first time, D'Bridge will 4unZIP5 the file
if needed from GMCFILES.ZIPH. A list of files, modems and ident (ATI)
codes are displayed from the list in GMCFILES.LSTH.

MCF files are simple control files that may be changed using any standard
text editor. The following control language is used. Keywords are not
case-sensitive, but must start in column 1 or they will be ignored. Invalid
syntax is ignored without error to allow backward / forward compatibility.


MCF <GNAMEH> <GDESCRIPTIONH>

ie. 4MCF USRC1419 US Robotics HST 144005

<GNAMEH> must match the DOS filename (without the extension.)
<GDESCRIPTIONH> is the displayed modem type.
GMCFH This must always be the first line of a 4Modem Control File5.


BAUD <GBAUD RATEH>

ie. 4BAUD 192005

<GBAUD RATEH> is 300, 1200, 2400, 4800, 9600, 19200 or 38400.


LOCKED

ie. 4LOCKED5  (no parameters)

This causes D'Bridge to always use the specified baud rate, regardless
of the "GCONNECTH" results reported by the modem. If you are using this
mode, the modem must also be configured to use a fixed DTE rate. 4&B15 is
used on HST's, for example.





-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.03  COMM / MODEM SETUP
                                                                              37
--------------------------------------------------------------------------------G


  
  
  DELAY <GMILLISECONDSH>
  
  ie. 4DELAY5 50
  
  This specifies the inter-character delay in milliseconds when sending
  commands to the modem. The default is G20H, but some modems may require
  values as high as G50H or G60H.
  
  
  TIMEOUT <GSECONDSH>
  
  ie. 4TIMEOUT5 75
  
  This specifies the failsafe timeout when dialing or answering the phone.
  This defaults to G60H, but might need to be increased if overseas calls
  take longer than one minute to complete.
  
  
  DIAL <GBAUD RATEH> <GMODEM STRINGH>
  
  ie. 4DIAL 19200 ATDT5
  
  <GBAUD RATEH> is 300, 1200, 2400, 4800, 9600, 19200 or 38400.
  <GMODEM STRINGH> is the command sent to the modem before the phone number.
  
  
  ANSWER <GMODEM STRINGH>
  
  ie. 4ANSWER ATA5
  
  <GMODEM STRINGH> is the command sent to the modem to answer the phone.
  
  
  INIT <GMODEM STRINGH>
  
  ie. 4INIT ATZ5
  
  <GMODEM STRINGH> is a command to configure the modem as desired.













-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.03  COMM / MODEM SETUP
                                                                              38
--------------------------------------------------------------------------------G


  
  
  
  TRANSLATE <GBAUD RATEH> <GRESPONSEH>|<G*C STRINGH>
  
  ie. 4TRANSLATE 2400 CONNECT 2400/ARQ|2400MNP5
  
  <GBAUD RATEH> is 300, 1200, 2400, 4800, 9600, 14400, 19200 or 38400.
  <GRESPONSEH> is the connection result string from the modem.
  <G*C STRINGH> is the translated response code for the BBS "4*C5" code.
  
  
  PREINIT <GMODEM STRINGH>
  
  ie. 4PREINIT AT&C1&D2&W5
  
  <GMODEM STRINGH> is a command to pre-configure the modem as desired.




ANSWERING METHOD

Answering method: GHardware H (GHHardware/GSHoftware/GMHodem/GRHingmaster/GDHisable)

This specifies the method D'Bridge will use to answer incoming calls.

/------------+---------------------------------------------------------------\
| GHARDWAREH   |  Answers using hardware ring detection.  (4RS-232 pin 225)      |
|            |                                                               |
| GSOFTWAREH   |  Answers using software ring detection.  (4RING from modem5     |
|            |                                                               |
| GMODEMH      |  Assumes that modem will auto-answer.  (4S0=1 assumed5)         |
|            |                                                               |
| GRINGMASTERH |  Hardware ring detection with multi-pattern ring detection.   |
|            |  3 different ring patterns are detected, see GLINE ASSIGNMENTH. |
|            |                                                               |
| GDISABLEH    |  Answering completely disabled.                               |
\------------+---------------------------------------------------------------/















-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.03  COMM / MODEM SETUP
                                                                              39
--------------------------------------------------------------------------------G






LINE ASSIGNMENT

Line assignment: GV11H (G1H/G2H/G3H/GVHoice)

When using 4the RingMaster5 answering method, it is necessary to assign
the three possible ring patterns to the desired DATA lines. G1H, G2H and G3H
correspond to the GDATA/1H, G2H and G3H. GVoiceH designates a ring pattern
to be ignored by D'Bridge and logged as a voice call.

4* NOTE *5  It is recommended to use the first ring pattern as 4voice5.




COSTGUARD TIME

CostGuard limits: G240H (minutes)   G       H (cost)

The COSTGUARD TIME specifies the absolute maximum amount of time an
EMAIL session may last. When the elapsed time for any 4inbound5 or
4outbound5 call reaches the number of minutes specified, DTR is lowered
and the call is aborted by D'Bridge.




COSTGUARD COST

CostGuard limits: G   H (minutes)   G100.00 H (cost)

The COSTGUARD COST specifies the absolute maximum cost of an 4outbound5
EMAIL session. When the accumulated cost for any 4outbound5 call reaches
the amount specified, DTR is lowered and the call is aborted by D'Bridge.




COLLISION DETECTION

Collision detection? GYesH

This specifies whether or not D'Bridge will detect collision of outbound
dialing attempts with inbound calls.  This is usually desirable, but it
is possible that it will not work well with every kind of modem, so you
should disable it if it incorrectly detects collisions.





-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.03  COMM / MODEM SETUP
                                                                              40
--------------------------------------------------------------------------------G






DIMESAVER ENABLED

DimeSaver enabled? GYesH  (GYHes/GNHo)

This specifies whether or not the 4DimeSaver5 feature should be used.
4DimeSaver5 causes D'Bridge to answer a potential inbound call if the
modem reports GNO DIAL TONEH when placing an outbound call. If there
was no incoming call, subsequent 4DimeSaver5 activations will not occur.




AUTO INITIALIZATION

Auto-Initialization: G5  H (minutes)

This parameter specifies the number of minutes idle before automatically
re-initializing the modem. Sometimes, modems go "out-to-lunch" because
of 4brown-outs5, cats and so forth. Re-programming the modem every few
minutes certainly can't hurt and sometimes solves problems of unattended
operation.

If you specify zero, this feature will be disabled and the modem will
only be initialized after each call and upon startup.




BUSY WHEN OFFLINE

Busy when offline? GNo H (GYHes/GNHo)

D'Bridge does many things. During the time calls may not be answered,
the phone can either be 4busy5 or just keep ringing. If you answer GYesH
to this question, the phone will be taken 4off hook5 whenever D'Bridge is
not ready to accept a call.

  - If you are using a dedicated data line, GYesH is preferred.

  - If you are using a voice/data line, in most cases, use GNoH.










-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.03  COMM / MODEM SETUP
                                                                              41
--------------------------------------------------------------------------------G






TOUCH TONE DIALING

Touch-Tone dialing? GYesH (GYHes/GNHo)

If you have a Touch-Tone<tm> telephone line, answer GYesH to this question.
Pulse (rotary) dialing will be used if you specify GNoH.




MAXIMUM RINGS

Maximum rings: G4 H

Some modems will report 4RINGING5 when placing an outbound call. This
allows D'Bridge to count the number of times the remote phone rings.
If this count exceeds the maximum specified by this parameter, dialing
will be aborted.

If the maximum ring count is exceeded on two consecutive attempts at
calling the same system, the call will be placed on 4Ten minute hold5.
Unless overridden by GVIEW/MODIFY QUEUEH, no further attempts will be
made for at least ten minutes.




FLAG DIAL

"Flag" dial: GHST ATB1DT                         H

This field is only used to define the exceptions to the normal dialing
commands. The 4flag5 specifies a substring to match in the GnodelistH
GflagsH field. When D'Bridge places an outbound call, it searches the
nodelist flags fields for a match in the "Flag" dial list. The first
match found will determine the <GDIAL STRINGH> to use. The format is:

    <GNODELIST FLAGH> <GDIAL STRINGH>












-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.03  COMM / MODEM SETUP
                                                                              42
--------------------------------------------------------------------------------G






SPECIFIC DIAL

Specific dial: G2:280/280 ATX0M1DT               H

This field lists exceptions to the normal and "Flag" dialing commands.
After D'Bridge searches the "Flag" dial list, it looks for the first
match in Specific dial. If you are using an address such as G2:ALLH,
make sure any specific systems are listed 4before5 the wildcard entry.
The format is:

    <GADDRESS MASKH> <GDIAL STRINGH>

    ie. 2:280/280 should come before 2:280/ALL, etc.




PRINTER PORT

Printer port: GPRN                                     H

Define the printer device here. If you wish to route output to a file for
later printing, you may specify the filename here.



























-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.03  COMM / MODEM SETUP
                                                                              43
--------------------------------------------------------------------------------G






PCF NAME

PCF name: GOKIOL400 H GOKIDATA OL400 LED page printerH

The PCF NAME specifies the name of a D'Bridge "4Printer Control File5."
Included, you will find an 4ZIP5 file which contains our standard
PCF collection. If you press GF10H, you will receive a list of all
printers currently supported. Simply select the 4Printer Control File5
to use for the printer port. When you select a different PCF or specify
one for the first time, D'Bridge will 4unZIP5 the file if needed from
GPCFILES.ZIPH. A list of printers supported is displayed from the list
in GPCFILES.LSTH.

PCF files are simple control files that may be changed using any standard
text editor. The following control language is used. Keywords are not
case-sensitive, but must start in column 1 or they will be ignored. Invalid
syntax is ignored without error to allow backward / forward compatibility.


            PCF <GNAMEH> <GDESCRIPTIONH>

            ie. 4PCF OKIOL400 OKIDATA OL400 LED page printer5

            <GNAMEH> must match the DOS filename (without the extension.)


            FIXED FONT <GPRINTER CODESH>
            PROPORTIONAL FONT <GPRINTER CODESH>
            TITLE FONT <GPRINTER CODESH>
            START BOLD <GPRINTER CODESH>
            END_BOLD <GPRINTER CODESH>
            START_ITALIC <GPRINTER CODESH>
            END_ITALIC <GPRINTER CODESH>
            GRAPHICS <ON or OFF>

            ie. 4FIXED FONT <ESC>&l0O<ESC>(10U<ESC>(s0p10h12v0s0b3T5
                4PROPORTIONAL FONT <ESC>&l0O<ESC>(0U<ESC>(s1p10v0s0b5T5
                4TITLE FONT <ESC>&l0O<ESC>(0U<ESC>(s1p14.4v0s3b4T5
                4START BOLD <ESC>(s7B5
                4END BOLD <ESC>(s0B5
                4START ITALIC <ESC>(s1S5
                4END ITALIC <ESC>(s0S5
                4GRAPHICS ON5







-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.04  SCHEDULE MAINTENANCE
                                                                              44
--------------------------------------------------------------------------------G






3.04  SCHEDULE MAINTENANCE

  
The GSCHEDULE MAINTENANCEH screen allows you to program the weekly event
schedule as well as set up routing, and access rules.  Parameters include:

   - Schedule day/time
   - Time between caalls
   - Maximum tries, sessions and failures
   - Priorities allowed
   - Polling
   - Routing
   - Forwarding
   - Many more...





EVENT TAG

Event "tag": GNMH     H

The "TAG" is an arbitrary 8-letter name by which you identify the event.
In the above example, I've used "NMH" to stand for "National Mail Hour."
This "TAG" must be unique; it is used on the screen and in the log to
identify events.




EVENT ENABLED

Enabled? GYesH

This Yes/No question simply specifies whether this event should be
currently enabled or not. Normally, you would answer YES but if you
ever want to temporarily disable the event, you may change it to NO.
This option is provided so you may disable events without actually
removing them.










-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.04  SCHEDULE MAINTENANCE
                                                                              45
--------------------------------------------------------------------------------G






EVENT TYPE

Type: GMail     H (GMHail/GDHOS/GEHxit/GCHlockSync)

There are four types of events; each functions differently:

     GMailH

     A "mail" event defines a period of time when certain mail
     may be sent. The default is to send ALL mail, unless you
     specify ADVANCED ROUTING.

     GDOSH

     A "DOS" event defines a list of DOS commands, programs and
     batch files to execute at a pre-defined time. These tasks
     are all "spawned" while D'Bridge remains in memory. This
     will only work if you have enough memory.

     GExitH

     An "exit" event specifies that you want D'Bridge to terminate
     at the specified time. This would normally be used in a
     batch file to transfer control to another program - instead
     of "spawning" it as above. With EXIT, you specify which DOS
     errorlevel you want to use.

     GClockSyncH

     A ClockSync event will set the system clock using the atomic
     clock or another D'Bridge system. The accuracy should be within
     a tenth of a second (plus the propagation delay) of the Timebase
     system.




EVENT DAYS

Weekday(s): [ ]All  [GXH]Sun  [ ]Mon  [ ]Tue  [GXH]Wed  [ ]Thu  [ ]Fri  [GXH]Sat

With the EVENT DAYS field, you put an "GXH" next to all days that you wish
to run this event. If you specify GALLH, then all the days of the week
are marked. To access individual days, erase the "X" next to GALLH by
pressing the GSPACE BARH.





-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.04  SCHEDULE MAINTENANCE
                                                                              46
--------------------------------------------------------------------------------G






EVENT START

Start time: G14:30H

Specify the time you wish to activate the event. This time should be
specified in 24-hour format and must not conflict with any other
scheduled event. To specify a START TIME, just enter a time using 3 or
4 digits. For example:

300 is 3:00 AM;  2250 is 10:50 PM




EVENT END

End time: G15:20H

Specify the time you wish a mail event to end. This time should be
specified in 24-hour format and must not conflict with any other
scheduled event. To specify an END TIME, just enter a time using 3 or
4 digits. For example:

300 is 3:00 AM;  2250 is 10:50 PM




EVENT ERRORLEVEL

Errorlevel: G200H

For GEXITH EVENTS, you simply specify the DOS ERRORLEVEL to return when
terminating. This number would normally be used by an "IF ERRORLEVEL"
directive in a batch file.















-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.04  SCHEDULE MAINTENANCE
                                                                              47
--------------------------------------------------------------------------------G






EVENT DOS COMMANDS

DOS commands: GMAILCHEK -S                            H

For GDOSH events, you may specify any number of DOS commands, programs
or batch files to execute. It is even possible to use DOS primitives
like CD (change directory) and COPY. It is up to you to make sure none
of the commands specified require human interaction. For example, if
you specify the command to start your word processor, odds are the word
processor will continue running until someone comes along...




BETWEEN CALLS

Between calls: G15 H to G45 H (seconds)

Here, you specify the period of time to wait between outbound calls.
This is entered as a "range."  If you say "30 to 60," then D'Bridge
will wait a random amount of time between 30 and 60 seconds before
placing a subsequent call. This period of time is used to receive
incoming mail; if this event is supposed to send mail only, you may
specify a very short time period.




EVENT CRITICAL

Critical? GYesH (GYHes/GNHo)

For GDOSH and GEXITH EVENTS, you should specify "GYESH" if you want the event
to execute even if D'Bridge is not running at the time of the event. A
CRITICAL event is one that D'Bridge will execute even after the START
TIME specified; it is only executed once. Specify "GNOH" if you want the
event to occur ONLY if D'Bridge is running at that time.




MAX DIALING TRIES

Max tries: G30 H

The MAX TRIES parameter indicates the maximum number of times D'Bridge
should attempt to dial a specific system during the current GMAILH EVENT.



-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.04  SCHEDULE MAINTENANCE
                                                                              48
--------------------------------------------------------------------------------G






MAX SESSIONS

Max sessions: G3  H

The MAX SESSIONS parameter specifies the maximum number of actual
connects allowed during the given mail event. This is handy for
limiting ECHOmail turnaround to long-distance systems.




MAX SESSION FAILURES

Max failures: G2  H

The MAX FAILURES parameter specifies the maximum number of aborted or
bad sessions allowed with each system during the specified mail event.
This parameter may help control costs when the answering system has
crashed or is not functioning properly.




EVENT CLOCKSYNC TIMEBASE

TimeBase: G1:3601/14        H

For GClockSyncH events, this field designates the TimeBase to use for
setting the system clock. Either specify the EMAIL address of another
D'Bridge system, or leave the field blank to use the Atomic Clock.

4* Note *5  If the clock is wrong on the D'Bridge system specified,
your clock will also be set to an incorrect time. Make sure you use
a trust-worthy system.




ACCEPT EMAIL CALLS

Accept EMAIL calls? GYesH (GYHes/GNHo)

This specifies whether or not D'Bridge should answer the phone to accept
EMAIL/BBS calls during this event. If you answer GNoH, the phone will
not be answered and will remain 4on-hook5 for the duration of the event.





-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.04  SCHEDULE MAINTENANCE
                                                                              49
--------------------------------------------------------------------------------G






PRIORITIES ALLOWED

Priorities allowed? GNCIH (GNH/GCH/GIH)

This field specifies what mail priorities (if any) may be sent during
this event. For most events, specify GNCIH (Normal, Crash and Immediate),
as allowable priorities. Keep in mind that outbound calls are still con-
trolled by the cost-accounting system.

This field simply serves as a 4master override5 to cost-accounting.




HOST ROUTE PRIVATES

Host-route privates? GNo H (GYHes/GNHo)

If you want NETmail messages destined for private or unlisted systems
to be 4host-routed5, answer GYesH to this question. If you answer GNoH,
the mail will be held, waiting for the remote system to poll to pick
it up.

4* Note *5  Host-routed mail may not be picked-up by the destination.




CM SYSTEMS ONLY

CM/Non-CM systems only? GBoth  H (GCHM/GNHon-CM/GBHoth)

"CM" stands for 4Continuous Mail5, a system designated as being able
to receive EMAIL calls anytime. Certain events might be designated
to send mail only to CM systems just as other scheduled events might
be reserved for sending mail only to NON-CM systems. Specify GBothH
if you want to send all mail regardless of the CM nodelist flag.













-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.04  SCHEDULE MAINTENANCE
                                                                              50
--------------------------------------------------------------------------------G






EVENT SCAN ECHOMAIL

Scan ECHOmail areas? GYesH (GYHes/GNHo)

If you want D'Bridge to scan all ECHOmail areas for new outbound
traffic each time this event begins, answer GYesH here. Only when
the event starts for the first time each day will the ECHOmail scan
be performed.




EVENT DYNAMIC

Dynamic event? GNo H (GYHes/GNHo)

If you answer GYesH to this question, a mail event will terminate when
there are no more outbound calls to make. When a dynamic event ends
early, the 4UN-EVENT5 is resumed and the queue is rebuilt.




ALLOW REQUESTS

Process requests? GYesH (GYHes/GNHo)

If you want to allow file-requests during this event, answer GYesH to
this question. Otherwise, file-requests (FREQs) will be rejected.




ACCEPT HUMAN CALLS

Accept human calls? GYesH (GYHes/GNHo)

If you want to allow human (BBS) calls during this event, answer GYesH to
this question. If you answer GNoH, human calls will be rejected for the
duration of the event and callers will be notified that the system is cur-
rently accepting EMAIL calls only.









-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.04  SCHEDULE MAINTENANCE
                                                                              51
--------------------------------------------------------------------------------G






EVENT ALLOW XMAIL

Allow XMAIL? GYesH (GYHes/GNHo)

If you want to allow XMAIL (compressed mail) traffic to be sent
during this event, answer GYesH to this question. If you answer
GNoH, all XMAIL will be held, disallowing pickup by remote systems.

Specify GNoH only for dedicated NETmail events. In most cases, GYesH
is the appropriate answer.




PACKETS FOR

Packets for: GALL                                            H

Here's where we get into the filters and addresses!  In PACKETS FOR,
specify a 4filter5 as defined previously in this section. This will
determine for which systems you want to create packets.

4* Note *5 This does not necessarily mean D'Bridge will call the
system, since the packet might be on "HOLD" or "ROUTED" to a diffe-
rent system.




HOLD FOR

Hold for: GNONE                                            H

If you wish to hold all outbound traffic for certain systems, specify
them here with a 4filter5. With a system on "hold", no calls will be
made to it during this event, regardless of priority.




EVENT POLL

Poll: G1:110/68                                            H

If you wish to poll certain systems each time this event is started, list
the EMAIL addresses here. Polling means: to call a system in order to
pick up any mail that is "on hold."



-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.04  SCHEDULE MAINTENANCE
                                                                              52
--------------------------------------------------------------------------------G






PICKUP FROM

Pickup from: GALL                                          H

Normally, D'Bridge will pick up mail from GALLH systems it calls.
However, if you wish, you may specify a 4filter5 to control from which
systems you would like to receive "hold" mail from when you call to
deliver outbound traffic.




ALLOW PICKUP FROM

Allow pickup from: GALL                                     H

Normally, D'Bridge will allow GALLH systems to pick up their "hold" mail
when they poll or call to deliver mail. If you want to run a completely
secure system, you might not want to allow pickup for certain systems.
Since D'Bridge has password-security, it would be rare to use anything
other than GALLH here.




ROUTE TO

Route to: GNONE                                     H

Normally, D'Bridge sends mail directly to the receiving system when you
write EMAIL messages. "Routing" is a way to cut costs by sending mail
through other EMAIL systems or networks to be delivered to its final
destination.

"Route to" may control specific routing and/or host-routing. This field
may contain multiple lines, so the last line should contain GHOSTSH or
host/hub-routing or GNONEH for direct delivery.

Specific routing may be done by specifying:

Route to: <GADDRESSH> FOR <GFILTERH>

ie.
Route to: 110/68 for 110/ALL 2:ALL 3:ALL






-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.04  SCHEDULE MAINTENANCE
                                                                              53
--------------------------------------------------------------------------------G






ROUTE FILES FOR

Route files for: GNONE                                     H

D'Bridge has the capability of routing attached data files along with
EMAIL messages. This should be used only by special arrangement between
the system operators involved.

Specify the 4filter5 describing the systems willing to route in-transit
files from your system. This is only applicable if you are using a rou-
ting other than GNONEH.




FORWARD FOR

Forward for: GALL                                      H

D'Bridge will forward in-transit mail for the systems specified in this
4filter5. In most cases, GALLH should be specified.




FORWARD TO

Forward to: GOURNET                                    H

D'Bridge will forward in-transit mail to the systems specified in this
4filter5. Using GOURNETH means D'Bridge will only forward in-transit mail
destined for systems with the same NET number as your own. (It is assumed
there is no cost associated with calls within your NET.)




FORWARD FILES FOR

Forward files for: GALL                                   H

D'Bridge will forward in-transit files for the systems specified in this
4filter5. In most cases, GALLH should be specified.







-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.04  SCHEDULE MAINTENANCE
                                                                              54
--------------------------------------------------------------------------------G






FORWARD FILES TO

Forward files to: GOURNET                                    H

D'Bridge will forward in-transit files to the systems specified in this
4filter5. Using GOURNETH means D'Bridge will only forward in-transit mail
destined for systems with the same NET number as your own.




MAIL RECEIVED DOS COMMANDS

DOS commands: G                                      H

During certain events, you may wish to have D'Bridge terminate or
execute DOS commands every time mail is received from a remote system.
The DOS COMMANDS field allows you to specify any number of DOS commands
or programs to be executed when mail arrives. Any DOS command or
program may be used, but you must make sure they don't require any human
interaction or D'Bridge will be "stuck" until you give the program the
input it wants.

As well as DOS commands, the following functions are available from
the DOS COMMANDS field:
/----------------+-----------------------------------------------------------\
| G+H(command)     |  Causes D'Bridge to swap to disk, leaving more memory     |
|                |  available to the application program.                    |
|                |                                                           |
| G-H(command)     |  Causes the command to be executed inside the queue       |
|                |  window.  Only use this for programs that do standard     |
|                |  DOS I/O.                                                 |
|                |                                                           |
| G*RH             |  This will force a rescan of the queue.  Same as ALT-Q    |
|                |                                                           |
| G*SH             |  This will force a complete ECHOmail rescan.              |
|                |                                                           |
| G*X<errorlevel>H |  This causes an exit with the specified DOS errorlevel.   |
\----------------+-----------------------------------------------------------/











-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.05  NODELIST CONFIGURATION
                                                                              55
--------------------------------------------------------------------------------G






3.05  NODELIST CONFIGURATION

  
The GNODELIST CONFIGURATIONH screen allows you to setup the nodelist database
that D'Bridge uses to make outbound calls.  Parameters include:

   - St. Louis nodelists
   - Private nodelists
   - Pointlist
   - Zonegate data
   - Exclude/Translate NETs
   - Prefixes
   - Baud, Flag and Phone overrides




ST LOUIS NODELISTS

"St. Louis" nodelists? GC:\DB\FILES\ DBNET DBDIFF                 H

"St. Louis" refers to a standard format for NODELIST text files. This
includes a "nodelist" and a "nodediff". You may have any number of
St. Louis-style nodelists at one time by listing each separately in
the window. Each line in the window describes one nodelist and should
contain:

<GDIRECTORY PATHH> <GNODELIST BASEH> <GNODEDIFF BASEH>

     For example:

     C:\DB\FILES\ NODELIST NODEDIFF 7567 153
     C:\DB\FILES\ ANETLIST ANETDIFF 38791 153

The two numbers on the right are the CRC of the nodelist name and the
currently installed nodelist. These numbers are maintained by D'Bridge
and the user need not concern himself with them.

D'Bridge automatically determines which nodelist is the most-recent based
on the extension of the "list" or "diff" file. The St. Louis format is
based on weekly update files called "diff" files; these files contain
the differences between last week's and this week's nodelists and are
generally smaller than the nodelist itself. If a diff file exists for
a nodelist, it will be automatically decompressed and installed when
it arrives (if applicable).





-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.05  NODELIST CONFIGURATION
                                                                              56
--------------------------------------------------------------------------------G






PRIVATE NODELISTS

Private nodelist(s): GMYLIST.PVT                      H

You may also use any number of private nodelists. In this field you
may specify any number of text files to be included in your compiled
nodelist. You may notice D'Bridge adds two numbers after the filename
once the nodelist is compiled; these numbers are the date and time of
the private nodelist file. If these numbers are changed or the node-
list is replaced or edited, D'Bridge will automatically recompile the
nodelist when it is started next.




POINTLIST

Pointlist: GPOINTS.LST                          H

If you are part of a point system, you will want to specify the name of
your POINTLIST file.
This is a list of POINTS under the same ZONE:NET/NODE as your system.
Just like the PRIVATE NODELISTS, the numbers after the filename indicate
the date and time of the POINTLIST when the nodelist was last compiled.
If these are changed, D'Bridge will automatically recompile the nodelist.




FAKE POINTNET

Fake pointnet: G32001H

To maintain compatibility with older EMAIL systems, a "FAKE POINTNET"
has been established to allow Fidonet-based mailers to act as points
of a D'Bridge BOSS. Since there is no definition of a "point" address
in Fidonet, a fake NET number is used. Specify the fake net to use
here. When a system calls in using that NET number, the node number
used will be translated to a point address.











-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.05  NODELIST CONFIGURATION
                                                                              57
--------------------------------------------------------------------------------G






FAKE POINTS

Fake points: G1 2 4 22                              H

This field specifies which systems require the FAKE POINT addressing.
Specify the point numbers of the systems for which FAKE POINT addressing
is required. This affects the way in which ECHOmail packets are created.
This is never required with points running D'Bridge EMAIL System; it is
provided for compatibility with older Fidonet-based systems.




USERNAME INDEX

Create username index? GYesH

D'Bridge will optionally create a USERNAME index when it compiles the
nodelist. If you answer "YES" to this field, the index will be created
and D'Bridge (and the editor) will be able to cross-reference operator
name to address. This feature is quite handy, but makes the nodelist
compile much slower. If you don't want the index created, answer "NO."




USERLIST FILE

Additional user file: GUSER.LST                        H

You may specify the name of a text file containing an additional user-
list to merge with the nodelists. Typically, this file will contain a
list of people who use certain EMAIL systems but are not listed as
the primary operator. The format for this file is:

<GADDRESSH> <GUSER NAMEH>

ie.  1:135/68.2  George Meyers
     .20         John Smith
     107/27.5    Oliver South










-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.05  NODELIST CONFIGURATION
                                                                              58
--------------------------------------------------------------------------------G






OUTBOUND GATEWAY

Outbound gateway: G1:110/68       H

Most networks do not use an outbound gateway, but if your NET has a
system designated to send all outbound mail, then put its address here.
You would use this in conjunction with the ROUTE TO field in the schedule
maintenance subsystem. (ROUTE TO: OGATE FOR OTHERS)




USE ZONEGATES

Use zonegates? GNo H

Fidonet (as well as other international networks) maintain so called
ZONEGATES that allow mail to be sent from one ZONE to another without
placing an overseas call. If you are part of Fidonet, and you are sen-
ding mail from the U.S. to Europe, you have the option of sending the
mail through the ZONE 1 gateway (1/2) or going direct to your destination.
Specify "YES" if you wish all interzone traffic (without attached files)
to be routed through the ZONEGATE; specify "NO" if you always want to use
direct routing.




EXCLUDE NETS

Exclude ZONE:NET(s): G2:ALL 3:ALL                       H

Some systems (that use a large NODELIST like Fidonet) may want to
completely eliminate certain ZONES and/or NETS from their nodelist.
If there is no reason to communicate with people in other countries,
you can greatly reduce the NODELIST size and compile-time by excluding
those addresses you don't use. For example, if you live in the U.S.
and don't plan to do any mail to Europe or Australia, you may exclude
these continents completely by using the statement from the example
above.










-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.05  NODELIST CONFIGURATION
                                                                              59
--------------------------------------------------------------------------------G






TRANSLATE NETS

Translate NET(s): G                            H

This field gives you the option to actually translate one NET to
another. This will let you move a NET from one zone to another or
simply change the NET number to something else. This will not be
used for most systems, but is a feature found in other EMAIL systems
and I am including it for compatibility. The syntax is:

<Goriginal ZONE:NETH> <Gnew ZONE:NETH>




COUNTRY CODE

Country code: G1     H

Here, you MUST specify your country code. This is the prefix found
before the "area code" in the nodelist. For the U.S. and Canada,
specify "1" - other countries, specify your country code (in the same
way you do with DOS)




LOCAL PREFIX

Local prefix: G              H

If there is a prefix you must dial before NO-COST (local) calls, speci-
fy it here. In the U.S. and Canada, this field will be left blank in
most cases. (Some PBX systems might require you to dial "9" to get a
local outside line.)




DOMESTIC PREFIX

Domestic prefix: G                     H

If there is a prefix in your country that you must dial before all
domestic calls, specify it here. For the U.S. and Canada, this field
should be left blank; we need no PREFIX. (Some PBX systems might
require you to dial an "8" to get a long-distance line.)



-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.05  NODELIST CONFIGURATION
                                                                              60
--------------------------------------------------------------------------------G






INTERNATIONAL PREFIX

International prefix: G011      H

Specify the prefix to dial before any international calls are made.
In the U.S., use "011" - other countries, check with your phone company.
An international call is defined as one where the COUNTRY PREFIX of the
system being called differs from your own.




PHONE NUMBER OVERRIDES

Phone number overrides: G110/68 1-513-424-5167            H

If you wish to override the phone number for an existing address, or
define the phone number for an unlisted NODE or POINT, the PHONE NUMBER
OVERRIDES field is the place to do this.

<GADDRESSH> <GPHONE NUMBERH> <GACCOUNTING/CONTROL PREFIXH>




BAUD RATE OVERRIDES

Baud rate overrides: G110/68 9600                   H

This is where you may specify temporary overrides to the baud rate for
specified addresses.

<GADDRESSH> <GBAUD RATEH>

4* NOTE *5  This does not affect modems with a locked baud rate.




FLAG OVERRIDES

Flag overrides: G110/68 CM,XX,HST              H

This is where you may specify temporary overrides to the nodelist flags
for specified addresses.

<GADDRESSH> <GFLAGSH>



-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.05  NODELIST CONFIGURATION
                                                                              61
--------------------------------------------------------------------------------G






SYNONYMS

Synonyms: GARTHUR   1:3601/14             H

This field defines a list of 4synonyms5 that will substitute a KEYWORD
for an EMAIL ADDRESS. These mnemonic 4keywords5 allow for quick and easy
entry of commonly used systems.

<GKEYWORDH> <GADDRESSH>




AUTO COMPILE NODELIST

Auto-compile nodelists: G        H (GSHtartup/GMHidnight/GNHever)

Before a nodelist can be used, it must be compiled and indexed in the
nodelist database files. This process can take anywhere from 5 seconds
to 45 minutes, depending on the speed of your computer. Three options
are available to specify when to test the nodelist for currency:

  /----------+---------------------------------------------------------------\
  | GSTARTUPH  |  Tests and/or rebuilds the database every time D'Bridge is    |
  |          |  fired up.  (This includes the nightly 4auto-restart5.)         |
  |          |                                                               |
  | GMIDNIGHTH |  Tests and/or rebuilds the database after the 4auto-restart5    |
  |          |  routine.                                                     |
  |          |                                                               |
  | GNEVERH    |  Only rebuilds the database upon request or if it is missing. |
  \----------+---------------------------------------------------------------/



















-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.06  PACKET MAIL CONTROL
                                                                              62
--------------------------------------------------------------------------------G






3.06  PACKET MAIL CONTROL

  
The GPACKET/MAIL CONTROLH screen allows you to set up general mailer controls.
Parameters include:

   - Outbound/Inbound mail archives
   - NETmail purge criteria
   - Renaming of duplicate files
   - Pre-unpack command
   - ECHOmail controls
   - AREAFIX controls





OUTBOUND MAIL ARCHIVE

Outbound mail archive: GC:\DB\OLDMAIL\OUTBOUND.TXT              H

This specifies the name of the text file (if any) to write messages
flagged ARCHIVE/SENT to before they are erased. This is quite useful
as a history of NETmail; it includes the full message text and the
date and time it was sent.




INBOUND MAIL ARCHIVE

Inbound mail archive: GC:\DB\OLDMAIL\INBOUND.TXT              H

The INBOUND MAIL ARCHIVE parameter specifies the text file (if any) into
which the DBUTIL PURGE option will archive NETmail messages before era-
sing them. If you do not wish to save old NETmail messages, leave this
field blank.













-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.06  PACKET MAIL CONTROL
                                                                              63
--------------------------------------------------------------------------------G






NETMAIL PURGE CRITERIA

Purge NETmail after: G30 H days

-or-

Purge NETmail except: G100 H messages

In the DBUTIL PURGE program, there are two options for deciding which
messages to erase from the system. When the cursor is on this field,
you may press the F10 key to switch between the methods: PURGE EXCEPT
and PURGE AFTER. With PURGE EXCEPT, DBUTIL will erase all but "x"
messages; specify "x" in this field as how many messages to save after
purging. With the PURGE AFTER option, DBUTIL will purge messages based
on their age. PURGE AFTER 30 DAYS means to erase all messages over 30
days old when DBUTIL PURGE is run.




RENAME DUPLICATE FILES

Rename duplicate files? GYesH

There will be occasions when you receive different files with the same
name. If you answer YES to this question, any files received having a
duplicate name in the INBOUND FILES DIRECTORY will be renamed by "se-
quencing" the last character of the extension.
A duplicate README.TXT would become README.TX1 if it existed; if "1"
was already there as well, "2" would be used, etc. If you answer NO,
the existing file will simply be replaced by the one just received.



















-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.06  PACKET MAIL CONTROL
                                                                              64
--------------------------------------------------------------------------------G






MAIL PROCESSING

Inbound mail handling? GAutomaticH  (GAHutomatic/GMHanual/GEHxternal/GDHisabled)

This parameter controls the method used for receiving and processing
inbound mail traffic. For most cases, GAutomaticH would be the best
choice because mail is unpacked and possibly forwarded continuously
allowing immediate access to all ECHOmail and forwarded NETmail for
the nodes served by your system. The options available are:

  /-----------+--------------------------------------------------------------\
  | GAUTOMATICH |  Automatically processes mail after each call. Exceptions    |
  |           |  are low disk-space, event override or QuickDial active.     |
  |           |                                                              |
  | GMANUALH    |  Processes mail only when activated by the operator.         |
  |           |                                                              |
  | GEXTERNALH  | Completely disables internal processing and causes inbound   |
  |           | XMAIL and EMAIL packets to be received as normal data files. |
  |           |                                                              |
  | GDISABLEDH  | Completely disables processing of inbound mail.              |
  \-----------+--------------------------------------------------------------/




PACKET PREPROCESSOR

Pre-unpack command: G                                     H

If you wish to run an external program before processing inbound .PKT
files, specify a DOS command here. The use for this varies from running
archival/statistical analyzers to executing a "Message Police" program
of some type.

4WARNING:5 Modifying packets might upset some people...




KILL NULL MESSAGES

Kill null messages? GYesH  (GYHes/GNHo)

Usually, you would answer YES to KILL NULL MESSAGES. A null message
means a message that has a TO, FROM and SUBJECT, but no text. These
are usually just messages associated with a file-attach and should
be ignored anyway. If you answer YES to this question, all messages
that are unpacked and have no text will be ignored.


-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.06  PACKET MAIL CONTROL
                                                                              65
--------------------------------------------------------------------------------G






KILL IN TRANSIT MESSAGES

Kill in-transit messages? GYesH  (GYHes/GNHo)

An IN-TRANSIT message is a message which was neither originated from
nor destined for your system. This message exists on your system just
to be forwarded elsewhere. If you answer YES to this question, IN-
TRANSIT messages will be flagged KILL/SENT when they arrive. If you
answer NO here, forwarded mail will "pile-up" until it is purged or
manually killed.




IN TRANSIT RESCAN

In-transit rescan? GYesH  (GYHes/GNHo)

If your system acts as a hub or boss-node, you might want to provide
immediate turnaround when "routed" mail is received. If you answer
YES to IN-TRANSIT RESCAN, the NETmail area will be rescanned after each
in-transit message is received. This will cause the message to be made
available to the destination system immediately rather than at the be-
ginning of the next event.




LIMIT NO COST CALLS

Limit no-cost calls? GNo H  (GYHes/GNHo)

D'Bridge has a limit for the number of connections with a given system
in each mail event. This limit exists to make sure ECHOmail traffic
only 4turns-around5 a few times each mail event. Since local calls are
usually free, you can circumvent this limit for no-cost calls. Answering
GYesH here will make unlimited local calls for ECHOmail turnaround.













-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.06  PACKET MAIL CONTROL
                                                                              66
--------------------------------------------------------------------------------G






SECURED ECHOMAIL ONLY

Secured ECHOmail only? GNo H (GYHes/GNHo)

Some hubs may wish to run a more secure system by only allowing
ECHOmail from passworded systems. It makes sense that routine
mail links should be secured for the benefit of the whole network.
If you answer GYesH to this question, all ECHOmail received from
non-passworded systems will be tossed into the BADECHO area.




LEAVE SEENBYS

Save ECHOmail SEENBYs? GYesH (GYHes/GNHo)

If you wish to save the text containing the SEEN-BY lines in your
message base, answer YES. It really doesn't matter how you respond
to this question; the system will perform the same way.

4* NOTE *5  This field only affects the Quick storage method.




SAVE DUPLICATE MESSAGES

Save duplicate messages? GNo H (GYHes/GNHo)

Personally, I would answer NO to this question, but if you would like
to see what messages are received more than once, answer YES here. If
you save the duplicate messages, they will be tossed into the BADECHO
area for your inspection.
















-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.06  PACKET MAIL CONTROL
                                                                              67
--------------------------------------------------------------------------------G






FORCED PRIORITIES

Forced priorities: G1:110/68         CRASH     H

This window allows you to absolutely override the priority for any
system on a semi-permanent basis. The overrides are listed one per
line and the format is:

<GADDRESSH> <GIMMEDIATEH/GCRASHH/GHOLDH>

This field is also maintained in the VIEW/MODIFY QUEUE, ALT-V screen.




AUTO ADD ECHOMAIL AREAS

Auto-add ECHOmail areas? GFido    H (GNHo/GFHido/GQHuickBBS)

D'Bridge has the capability of automatically adding ECHOmail areas that
don't exist when undefined CONFERENCE TAGS are detected. This can save
lots of work in setting up areas; all you need to do once they are added
is to enter the area security and description using LOCAL/ECHOMAIL AREAS.
Specify which ECHOmail storage format to use for new areas:

  /-----------+--------------------------------------------------------------\
  | GNOH        |  Unknown ECHOmail messages will be tossed to BADECHO.        |
  |           |                                                              |
  | GFIDOH      |  A new subdirectory will be created and messages will be     |
  |           |  tossed there. The area will be created with Fido storage.   |
  |           |                                                              |
  | GQUICKBBSH  | Scans for the highest-used QuickBBS message base number.     |
  |           | The mail will be tossed and a Quick-type area is created.    |
  \-----------+--------------------------------------------------------------/




PROCESS AREAFIX REQUESTS

Process AREAFIX requests? GYesH (GYHes/GNHo)

If D'Bridge should accept and process AREAFIX requests, answer YES here.
If you answer NO, the requests received will just appear in your NETMAIL
area and never be processed. D'Bridge only processes requests as they
are unpacked, not from them existing in the NETMAIL area.




-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.06  PACKET MAIL CONTROL
                                                                              68
--------------------------------------------------------------------------------G






AREAFIX INFORMATION

Areafix information: G1:110/68 PASSWORD ABC,501 Normal Yes Yes AREAS68.BBSH

This window controls the AREAFIX subsystem, allowing automated area
list and ECHOmail distribution management. For each system, specify:

<GADDRESSH> <GPASSWORDH> <GGROUPS,LEVELH> <GPRIORITYH> <GRESCAN?H> <GFWD REQ?H> <GAREAS.BBSH>

Where:

<GADDRESSH> is the address of the system in the form ZONE:NET/NODE.POINT

<GPASSWORDH> is a codeword agreed upon by both systems (you and the system
specified.)  The password may be from 1 to 32 characters.

<GGROUPS,LEVELH> contains the groups allowed and security level assigned to
the system. ie. ABC,501 allows groups GAH, GBH and GCH and areas with a security
level equal to or less than G501H.

<GPRIORITYH> is the EMAIL priority associated with the link. In most cases,
you would use CRASH for systems in your local calling area and NORMAL or
HOLD for long-distance links. Valid priorities are: Immediate, Crash,
Normal and Hold.

<GRESCAN OK?H> asks whether the specified system should be allowed to
request a complete rescan of a conference as it is added. Normally,
this is acceptable, but if your system is particularly busy, you may
want to disallow this by answering NO.

<GFWD REQ?H> determines whether requests for unavailable ECHOmail areas
will be forwarded to your ECHO hub(s). If you answer GYesH, all unknown
requests will be passed along to the first applicable ECHOmail hub.

<GAREAS.BBSH> specifies the filename of the system's AREAS.BBS file to
use when forwarding requests. This should only be specified for the
systems which are your ECHOmail hubs or feeds. Any conference listed
in this file may be requested by other allowed systems. Make sure these
lines are listed in the desired search order.

4* REMEMBER *5  GCTL-NH inserts lines, GCTL-YH deletes lines in a window.









-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.06  PACKET MAIL CONTROL
                                                                              69
--------------------------------------------------------------------------------G






REMOVE EMPTY PASSTHRUS

Remove empty passthrus? GYesH (GYHes/GNHo)

ECHOmail hubs which carry many passthru areas may wish to remove
unused conferences automatically. D'Bridge will erase these unused
areas a few days after the last ECHOmail feed is cut. GAREAFIXH
GTIMEOUT DAYSH controls the number of inactive days to wait
before killing the last feed and sending an AREAFIX request to
your feed, removing the conference.




AREAFIX TIMEOUT DAYS

Areafix forwarding days? G3 H

This parameter controls the number of days to wait for a new conference
to arrive after forwarding a request. After this many days, if a new
conference requested has not been received, a message is generated to
the original requesting system, explaining why their request was not
honored.

This also controls the number of days before removing a passthru area
with no links left.




UNKNOWN AREA FORWARDING

Unknown area forwarding: G                             H

Here, you may specify the address of an ECHOmail hub to use "blindly",
forwarding AREAFIX requests for unknown areas. If the area is not found
in any listed AREAS.BBS file, it will be sent to the specified system.













-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.07  XMAIL CONTROL
                                                                              70
--------------------------------------------------------------------------------G






3.07  XMAIL CONTROL

  
The GXMAIL CONTROLH screen allows you to configure the various compression
and decompression software that is used to bundle XMAIL packets.  Parameters
include:


   - XMAIL processing interval
   - Size limits
   - Default format
   - Specific formats
   - ZIP, LHA, ARJ, PAK, ARC and ZOO Compress and Decompress commands





XMAIL PROCESSING INTERVAL

XMAIL processing interval: G30 H (minutes)

This parameter specifies the minimum time interval between XMAIL processing
cycles. In the above example, there will be a 30 minute delay between the
end of one cycle and the start of the next. Any XMAIL received during this
delay period will not be processed immediately. At the end of the period,
processing will resume automatically.




XMAIL ARCHIVE SIZE LIMIT

4* NOTE *5  This feature is not currently supported.




XMAIL PACKET SIZE LIMIT

XMAIL packet size limit: G200 H (kilobytes)

This parameter controls the maximum size of outbound ECHOmail .PKT files.
When ECHOmail is scanned or forwarded, a new packet is started when the
origin address changes, or the Gpacket size limitH is exceeded. Making
this field smaller than 50k is not a good idea; neither is exceeding 250k
in a network using mailers other than D'Bridge.



-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.07  XMAIL CONTROL
                                                                              71
--------------------------------------------------------------------------------G






COMPRESSED MAIL FORMAT

Compressed mail format: GZIPH [Press GSPACEH to change]

This specifies the 4default5 compression format for outbound XMAIL files.
Choose either GZIPH, GLHAH, GARJH, GPAKH, GARCH or GZOOH. For D'Bridge
EMAIL networks, the GZIPH format is most often used. Many public networks
still require the ARC format. (D'Bridge is capable of unpacking any of
these archives, providing the decompression program is correctly specified.)


             GZIPH      PKWARE, Inc.
                      7545 N. Port Washington Rd.
                      Glendale, WI 53217
                      U.S.A.

             GLHAH      Copyright by Haruyasu Toshizaki
                      Japan
                      Distributed via electronic means

             GARJH      Robert K. Jung
                      2606 Village Road West
                      Norwood, MA 02062
                      U.S.A.

             GPAKH      NoGate Consulting
                      P.O. Box 88115
                      Grand Rapids, MI 49518-0115
                      U.S.A.

             GARCH      System Enhancement Associates
                      21 New Street
                      Wayne, NJ 07470
                      U.S.A.

             GZOOH      Copyright by Rahul Dhesi
                      U.S.A.
                      Free noncommercial use permitted












-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.07  XMAIL CONTROL
                                                                              72
--------------------------------------------------------------------------------G






ALTERNATE COMPRESSION FORMATS

System-specific formats: GARJ 1:110/68                    H

This field allows you to define specific compression formats for certain
systems. The format is as follows:

<GZIPH/GLHAH/GARJH/GPAKH/GARCH/GZOOH> <Gfilter>

ie.

ARC ALL EXCEPT 1:110/68 .10 .20




ZIP COMPRESS COMMAND

ZIP compress command: GPKZIP -M                            H

This specifies the command to move files to a ZIP archive. For PKZIP,
the G-MH option must be specified.




ZIP DECOMPRESS COMMAND

ZIP decompress command: GPKUNZIP -O                          H

This specifies the command to extract files from a ZIP archive. PKUNZIP
requires the G-OH option to overwrite existing files.




LHA COMPRESS COMMAND

LHA compress command: GLHA M -M                            H

This specifies the command to move files to a LHA archive. LHA
requires the GMH command and the G-MH option.








-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.07  XMAIL CONTROL
                                                                              73
--------------------------------------------------------------------------------G






LHA DECOMPRESS COMMAND

LHA decompress command: GLHA E -CM                             H

This specifies the command to extract files from a LHA archive. LHA
requires the GEH command and the G-CMH option to overwrite existing files.




ARJ COMPRESS COMMAND

ARJ compress command: GARJ M                               H

This specifies the command to move files to an ARJ archive.
ARJ requires the GMH command.




ARJ DECOMPRESS COMMAND

ARJ decompress command: GARJ E /U                               H

This specifies the command to extract files from an ARJ archive.
ARJ requires the GEH command to decompress and the G/UH switch
to update (overwrite) files.




PAK COMPRESS COMMAND

PAK compress command: GPAK M                                 H

This specifies the command to move files to a PAK archive.
PAK requires the GMH command.




PAK DECOMPRESS COMMAND

PAK decompress command: GPAK E /WA                             H

This specifies the command to extract files from a PAK archive.
PAK requires the GEH command to decompress and the G/WAH option
to overwrite existing files.


-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.07  XMAIL CONTROL
                                                                              74
--------------------------------------------------------------------------------G






ARC COMPRESS COMMAND

ARC compress command: GARCA | /D                              H

This specifies the command to move files to an ARC archive.
ARCA requires the G/DH option to move the files to the archive.
Note that there is a vertical bar (|) separating the command
from the G/DH option. This indicates the option comes after
the file names.




ARC DECOMPRESS COMMAND

ARC decompress command: GARCE | /R                             H

This specifies the command to extract files from an ARC archive.
ARCE requires the G/RH option to overwrite existing files. Note that
there is a vertical bar (|) separating the command from the G/RH option.
This indicates the option comes after the file names.




ZOO COMPRESS COMMAND

ZOO compress command: GZOO -M                                H

This specifies the command to move files to a ZOO archive.
ZOO requires the G-MH command.




ZOO DECOMPRESS COMMAND

ZOO decompress command: GZOO -E                             H

This specifies the command to extract files from a ZOO archive.
ZOO requires the G-EH command.









-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.08  TIME CONTROL SYSTEM
                                                                              75
--------------------------------------------------------------------------------G






3.08  TIME CONTROL SYSTEM

  
The GTIME CONTROL SYSTEMH screen allows you to set time-related parameters
and display historical data.  Functions and parameters include:

   - UTC offset
   - Daylight savings time status
   - Timezone names
   - Default ClockSync systems
   - Remote clock history
   - Adjustment history




OBSERVE DAYLIGHT SAVINGS TIME

Observe DAYLIGHT SAVINGS TIME at this site? GYesH

In most locations, the time changes twice a year for daylight
savings time. If your country/state observes this, answer GYesH.




ADJUST MAIL EVENTS

4* NOTE *5  This feature is not currently supported.




ADJUST CLOCKSYNC EVENTS

4* NOTE *5  This feature is not currently supported.




ADJUST DOS EVENTS

4* NOTE *5  This feature is not currently supported.







-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.08  TIME CONTROL SYSTEM
                                                                              76
--------------------------------------------------------------------------------G






DAYLIGHT TIME STARTS

Daylight time starts: G04/23/92H

Specify the date on which daylight savings time starts. If daylight
time is currently in effect, use the date last spring when it started.
If it is late fall or winter and daylight savings time is not in
effect, use the date on which it will start next spring.




DAYLIGHT TIME ENDS

Daylight time ends: G10/21/92H

Specify the date on which daylight savings time ends. Always make sure
the ending date is greater than the starting date, next spring.




DAYLIGHT TIME CHANGES

Time of automatic change: G02:01H

Specify the exact time at which daylight savings time changes. In the USA
it is always 2:01 on a Sunday morning in the spring and fall. For times
in the afternoon, make sure to use 24-hour format (ie. 13:00 is 1:00pm).




LOCAL STANDARD TIME

Name of local STANDARD time: GEastern Standard Time    H

Specify the name of your timezone during standard time.




LOCAL STANDARD TIME ABBREVIATION

Abbreviation for local STANDARD time: GEST   H

Specify the commonly accepted abbreviation for your local standard time.



-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.08  TIME CONTROL SYSTEM
                                                                              77
--------------------------------------------------------------------------------G






LOCAL DAYLIGHT TIME

Name of local DAYLIGHT time: GEastern Daylight Time    H

Specify the name of your timezone during daylight savings time.




LOCAL DAYLIGHT TIME ABBREVIATION

Abbreviation for local DAYLIGHT time: GEDT   H

Specify the commonly accepted abbreviation for your local daylight time.




DISPLAY TIME DATA

Display comparative time data? GNo H

On inbound as well as outbound calls D'Bridge will compare its time
with that on other systems it connects to.   If you want this data to
be displayed in the LOG window, answer GYesH here.




TIME WARNING THRESHOLD

Display average time-difference if: G5  H minute(s) or more

On inbound as well as outbound calls D'Bridge will compare its time
with that on other systems it connects to. A history is kept and
average differences are computed. If you wish to see a warning when
the average time difference exceeds a certain threshold, specify the
number of minutes here.
In this example, a warning will be displayed when the average time
difference exceeds 5 minutes.

To reset this warning display, you will need to GZHero the clock history
screen.







-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.08  TIME CONTROL SYSTEM
                                                                              78
--------------------------------------------------------------------------------G






CLOCK HISTORY FOR

Store data from the clocks on: GALL                            H

Specify a 4filter5 controlling which systems will be included in
your time/clock history screen. If there are some systems you
wish to exclude, use: GALL EXCEPT nnn/nnn nnn/nnn ... etcH.




CLOCKSYNC SYSTEM

Always synchronize clock with: G1:3601/14     H

You have the option of setting your clock using a certain system both on
demand and every time you connect with it. In this example, my system
will always synchronize its clock to 1:3601/14, a "D'Bridge Universal
TimeBase."

In most cases, leave this blank.




AUTOMATIC CLOCKSYNC SYSTEM

Default ClockSync timebase: GAtomic clock    H

If you start D'Bridge with the clock obviously wrong, it will set its
clock using the specified system. Leaving it blank will make it call
the atomic clock at the U.S. Naval Observatory near Washington D.C.

The only time this happens automatically is when the date is set to
before this release of D'Bridge occurred -- the clock is wrong without
a doubt. (This occurs when there is no battery-backed clock on an
XT most frequently.)













-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.08  TIME CONTROL SYSTEM
                                                                              79
--------------------------------------------------------------------------------G






CLOCK SET COMMAND

DOS command after clock adjustment: G                       H

Some computers, usually XTs, require a command to be issued to set
the battery-backed clock which is not on the motherboard. If you own
such a clock, you probably know what this means. If you don't, leave
this field blank.










































-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.09  FUNCTION KEYS
                                                                              80
--------------------------------------------------------------------------------G






3.09  FUNCTION KEYS

  
The GFUNCTION KEYSH screen allows you to define programmable function keys
for use within D'Bridge.






USER FUNCTION

There are 19 programmable function keys that may be made available from
the main menu or D'Bridge idle state. GF2H through GF10H and GALT-F1H through
GALT-F10H may be programmed to execute any number of DOS commands or spe-
cial functions.

As well as DOS commands, the following functions are available here:

/----------------+-----------------------------------------------------------\
| G+H(command)     |  Causes D'Bridge to swap to disk, leaving more memory     |
|                |  available to the application.                            |
|                |                                                           |
| G-H(command)     |  Causes the command to be executed inside the queue       |
|                |  window. Only use this for programs that do standard      |
|                |  DOS I/O.                                                 |
|                |                                                           |
| G*RH             |  This will force a rescan of the queue. Same as ALT-Q     |
|                |                                                           |
| G*SH             |  This will force a complete ECHOmail rescan.              |
|                |                                                           |
| G*X<errorlevel>H |  This causes an exit with the specified DOS errorlevel.   |
\----------------+-----------------------------------------------------------/

4* NOTE *5  You must NEVER load a TSR using this method. It will cause
a system crash when D'Bridge resumes.













-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.10  BBS CONFIGURATION
                                                                              81
--------------------------------------------------------------------------------G






3.10  BBS CONFIGURATION

  
The GBBS CONFIGURATIONH screen allows you to set up an interface between your
BBS system and D'Bridge.  Parameters include:

   - EMAIL calls only text
   - Press ESC for BBS text
   - Loading BBS text and filename
   - Human caller timeout
   - BBS online hours
   - After hours file
   - Minimum baud rate
   - Too slow file
   - ECHOmail scan
   - DOS commands for BBS




BBS SOFTWARE INSTALLED

BBS software installed? GYesH

If you are using D'Bridge as the "front-end" for a bulletin board system
(BBS), answer "YES" to this question. If you do not want D'Bridge to run
another program (such as a BBS) when "humans" call, specify "NO."




EMAIL CALLS ONLY TEXT

"EMAIL calls only" text: GPlease hang up... accepting EMAIL calls only.  H

If a human caller dials in when D'Bridge is not accepting human callers
during the current mail event, this line of text will be displayed on
the caller's terminal. This is also displayed if you have answered GNoH
to "BBS software installed."











-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.10  BBS CONFIGURATION
                                                                              82
--------------------------------------------------------------------------------G






PRESS ESC FOR BBS TEXT

"Press ESC for BBS" text: GPress the ESC key twice to access the BBS.   H

When someone first dials into D'Bridge, it displays its copyright notice
and this text. You may specify any message you wish to replace the stan-
dard message, but remember you should inform the caller to 'press the
GESCH key twice for faster access' in this line.




LOADING BBS TEXT

"Loading BBS" text: GBBS now loading - Please wait...             H

This text will be displayed when a human caller presses the GESCH key
twice or the "human caller timeout" has expired. This is to inform
the caller that the BBS is currently loading and that he should wait.




LOADING BBS FILE

"Loading BBS" file: GC:\DB\LOADBBS.TXT                     H

If you wish to display some sort of "banner" file when the BBS is
loading, specify the name of a text file here. You may use ANSI codes
and IBM graphics if you wish, but keep in mind that not all callers
have computers compatible with IBM ANSI. You're best off keeping it
printable ASCII (32-126 decimal).




HUMAN CALLER TIMEOUT

"Human" caller timeout: G20H

Specify the number of seconds D'Bridge should wait before determining
that a call is "human" and not an EMAIL call. The minimum value for
this field is 10 (seconds), but you may want to make this time longer
if you have "noisy" phone lines or trouble with inbound connections.






-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.10  BBS CONFIGURATION
                                                                              83
--------------------------------------------------------------------------------G






BBS ONLINE HOURS

BBS online hours: G06:00H until G23:00H

This field allows you to specify the hours of operation for your BBS.
If a human caller is detected outside of these hours, the "After hours"
file will be transmitted and D'Bridge will hang-up. This is another
way besides the use of mail events to restrict BBS access times.




AFTER HOURS FILE

"After hours" file: GC:\DB\BBSHOURS.TXT                H

If you restrict the hours of operation of your BBS, you need to prepare
a text file in which you explain your policy to human callers. Specify
the name of a text file here; it will be transmitted to all human callers
dialing in outside the specified time frame.




MINIMUM BAUD RATE

Minimum baud rate: G1200 H

If you wish to restrict BBS access to those callers that have a faster
modem, specify the minimum allowable baud rate here. In this example,
300 baud callers will be rejected and the "Too slow" file will be sent.




TOO SLOW FILE

"Too slow" file: GC:\DB\TOOSLOW.TXT                 H

If you have specified a minimum baud rate for BBS access, this file
will be transmitted to callers with slower modems. If you're going
to reject callers based on baud rate, the least you can do is explain
your policy...







-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.10  BBS CONFIGURATION
                                                                              84
--------------------------------------------------------------------------------G






SCAN ECHOMAIL AFTER CALL

Scan ECHOmail after call? GYesH

If you wish to rescan all ECHOmail areas after each BBS call, answer
GYesH here. This allows for immediate turnaround on ECHOmail entered
through the BBS software.











































-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.10  BBS CONFIGURATION
                                                                              85
--------------------------------------------------------------------------------G






DOS COMMANDS FOR BBS

DOS commands for BBS: G                             H


Here, you specify the DOS commands that will be used to invoke the BBS,
telling it you already have a caller on. There are two methods for
doing this: SPAWNING and EXITING. The most popular method is to SPAWN
the BBS - leaving D'Bridge in memory. EXITING is used only when there
is not enough memory to SPAWN the entire BBS system. In this field,
you simply list the DOS commands you want D'Bridge to run to invoke
the BBS. There are several "special" commands that substitute values
or cause an EXIT:



/----------------+-----------------------------------------------------------\
| G+H(command)     |  Causes D'Bridge to swap to disk, leaving more memory     |
|                |  available to the application program.                    |
|                |                                                           |
| G-H(command)     |  Causes the command to be executed inside the queue       |
|                |  window. Only use this for programs that do standard      |
|                |  DOS I/O.                                                 |
|                |                                                           |
| G*BH             |  This is replaced by the baud rate of the connection.     |
|                |                                                           |
| G*CH             |  This is replaced by the actual or translated connect     |
|                |  string from the modem.                                   |
|                |                                                           |
| G*PH             |  This is replaced by the comm port number (G1H-G8H)           |
|                |                                                           |
| G*RH             |  This will force a rescan of the queue. Same as ALT-Q     |
|                |                                                           |
| G*SH             |  This will force a complete ECHOmail rescan.              |
|                |                                                           |
| G*TH             |  This is replaced by number of minutes until the next     |
|                |  event defined in "schedule maintenance."                 |
|                |                                                           |
| G*XH             |  This causes an exit with the errorlevel corresponding    |
|                |  to the baud rate divided by 100.  ie. 1200 baud = 12     |
|                |                                                           |
| G*X<errorlevel>H |  This causes an exit with the specified DOS errorlevel.   |
\----------------+-----------------------------------------------------------/






-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.10  BBS CONFIGURATION
                                                                              86
--------------------------------------------------------------------------------G


  
  
As an example, here's what my DOS BBS COMMANDS field looks like to run
Opus, then execute the MYMAIL program (An Opus MAIL-CHECK program by
Steve Sullivan):

    cd \opus
    opus opus -t*t -p*p -b*b
    mymail -u

When a caller dials in at 2400 baud with 120 minutes until the next
event, D'Bridge runs the following DOS commands:

    cd \opus
    opus opus -t120 -p1 -b2400
    mymail -u

After all these commands are complete, D'Bridge initializes the modem
and returns to its previous status (Mail event, IDLE, etc.).



































-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.11  SECURITY MISCELLANEOUS
                                                                              87
--------------------------------------------------------------------------------G






3.11  SECURITY MISCELLANEOUS

The GSECURITY/MISCELLANEOUSH screen allows you to setup various parameter
which affect security or are somehow "miscellanneous."  Parameters include:

   - Hang-up on security violation
   - Ignore unauthorized mail packets
   - Rename unauthorized files
   - Allow unlisted nodes to send mail
   - File request controls
   - Session passwords
   - Automatic password request control
   - Function requests
   - Gateways
   - External receivers
   - Fidonet and WaZOO protocol overrides





HANG UP ON SECURITY VIOLATION

Hang-up on security violation? GNo H

If you are using SESSION PASSWORDS to protect any or all of your
links, you may choose to hang-up and not accept any mail from any
system with a missing or invalid password.  This option has no effect
on systems that have no password specfied.  Used in conjunction with
GSecured ECHOmail onlyH, this provides a fairly good security method
for ECHOmail traffic.




IGNORE UNAUTHORIZED MAIL PACKETS

Ignore unauthorized mail packets? GNo H

If you are using SESSION PASSWORDS to protect any or all of your
links, you may choose to completely ignore incoming mail from a link
using the wrong (or no) password. If you indeed wish to ignore this
mail, specify GYesH to this field. If you want to receive the mail
normally, answer GNoH.






-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.11  SECURITY MISCELLANEOUS
                                                                              88
--------------------------------------------------------------------------------G






RENAME UNAUTHORIZED INBOUND FILES

Rename unauthorized inbound files? GYesH

If you are using SESSION PASSWORDS to protect any or all of your
links, you may choose to rename incoming files to BADFILE.001,
BADFILE.002, etc.
The reason for doing this is to prevent unauthorized ECHOMAIL and
FUNCTION REQUESTS from being executed. Specify GYesH if you want to
automatically rename incoming files or GNoH if you want to receive
them normally.




ALLOW UNLISTED NODES TO SEND MAIL

Allow unlisted nodes to send mail? GYesH

In a private network, possibly the BEST way to discourage hackers from
the outside is to hang-up on them immediately. If you specify GYesH to
this question, D'Bridge will immediately reject any incoming call from
a system not listed in your nodelist. This should only be used in a
private network - public networks often have communications from new
addresses or private addresses that are not in the nodelist (yet).




FILE REQUESTS FOR UNLISTED NODES

File-requests for unlisted nodes? GYesH

If you support file-requests, you must decide whether or not you wish
to allow systems that are NOT in your nodelist to request files. Some
people (kids, usually) will abuse your system's file-request privilege
by calling back many times, using many fake node numbers to file-request.
If you say GYesH to this question, any system, listed or not will be able
to issue file-requests. If you say GNoH then only requests from systems
found in your nodelist will be honored.










-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.11  SECURITY MISCELLANEOUS
                                                                              89
--------------------------------------------------------------------------------G






TIME LIMIT FOR FILE REQUESTS

Time limit for file-requests: G30 H (minutes)

When you are running a public system, you may find you have trouble with
people abusing the file-request privilege by constantly requesting too
many files and keeping your system busy for hours. D'Bridge allows you
to limit the time allowed for file-requests. Here you may limit the num-
ber of minutes allowed before refusing to honor a request.




FILE REQUEST LIMIT

File-request limit: G500 H (kilobytes)

You may limit the total number of kilobytes allowed for file-request
by specifying it here. It is suggested you make this larger than the
biggest file you have available for request.




MAXIMUM FILES FOR FILE REQUEST

Maximum files for file-request: G10 H

You may limit the total number of files allowed for request. This
is really not as meaningful as the other limits because time is the
main factor requiring a limitation.




CHECK LIMITS BEFORE OR AFTER

Check limits BEFORE or AFTER? GAfter H

This specifies whether the file-request limits are tested BEFORE or
AFTER each file is transferred. Personally, I prefer testing AFTER
because I like to allow people to request any file on my system; some
files on my system are larger than the FILE-REQUEST LIMIT (K.)
If the limits are checked BEFORE each transfer, it would be impossible
to file-request any file larger than the size limit.





-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.11  SECURITY MISCELLANEOUS
                                                                              90
--------------------------------------------------------------------------------G






ENFORCE LIMITS FOR 24 HOURS

Enforce limits for 24-hours? GNo H

If you wish to accumulate these file-request limits for a 24-hour
period, answer GYesH here. If you want the limits enforced on a
per-call basis, answer GNoH. If the limits are enforced for 24-hours,
a file is created containing the address, timestamp and limit data.
The limit will be reset exactly 24-hours from the START of the first
file-request. If you must manually reset these limits, delete the
file "DBRIDGE.FRS."




MINIMUM BAUD RATE FOR REQUESTS

Minimum baud rate for request? G1200 H

This specifies the minimum link rate (baud) allowed for file-requests.
(300/1200/2400/4800/9600... Etc.)




SESSION PASSWORDS

Session passwords: G1:3601/14 SECRET       H

In a corporate environment, or a public network where security is
becoming a problem, you may specify a SESSION PASSWORD for each system
you plan to communicate with directly. This password must be specified
by BOTH systems and must be agreed upon in advance. Once in place, it
becomes impossible to communicate with the other system if you don't
use the same password.

A password will prevent an unauthorized system from picking up mail.
With HiTek comes Hi-Tech hackers. It is not hard to change your address
to something else, then poll your host to see what mail you can "steal".
Any "link" protected with a password is not vulnerable to this simple
form of "mail-stealing". For a password with 135/20, type:

135/20 WALLY     (Where "WALLY" is the desired SESSION PASSWORD)

Any number of session passwords may be defined. Remember, in the above
example, it is important 135/20 also sets up a SESSION PASSWORD for my
address, 110/68, or it won't work. Both ends must use the same password!
(Passwords must be eight letters or less).


-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.11  SECURITY MISCELLANEOUS
                                                                              91
--------------------------------------------------------------------------------G






AUTOMATIC PASSWORD REQUEST FOR

Automatic password request for: G201:ALL 1:110/ALL                 H

D'Bridge has the capability to automatically establish session passwords
with new links.  This field specifies a 4filter5 that controls which EMAIL
addresses that you wish to request an automatic session password be added.
If you wish to disable this feature, specify GNONEH as the 4filter5.

4* NOTE *5  This field only affects GoutboundH calls.




ALLOW PASSWORD REQUESTS FROM

Allow password requests from: GALL                               H

The D'Bridge GAutomatic Password Request SystemH allows a remote system to
request that a session password be established automatically.  If a calling
system makes this request, the answering system creates a random 8-character
password and transmits it back using the EMSI handshake.

This field specifies a 4filter5 that controls which EMAIL addresses that you
wish to allow password requests from.  If you wish to disable this feature,
specify GNONEH as the 4filter5.

4* NOTE *5  This field only affects GinboundH calls.






















-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.11  SECURITY MISCELLANEOUS
                                                                              92
--------------------------------------------------------------------------------G






FUNCTION REQUESTS

Function requests: G                                      H

A FUNCTION REQUEST is an online service provided to calling systems
while they are still "on the line". FUNCTION REQUESTS only work with
other WaZOO-based EMAIL systems such as D'Bridge, FrontDoor, Opus and
BinkleyTerm. This is a VERY advanced feature and will not be used by
most systems, so don't feel bad if you don't understand this...

A function request can be defined in four steps:

    1) The caller sends the REQUEST FILE.

    2) D'Bridge recognizes the filename as being a FUNCTION REQUEST
       and spawns the REQUEST SERVER task. (user-provided)

    3) The REQUEST SERVER (a program provided by the user) takes its
       input data from the REQUEST FILE and the CALLER.FIL file cre-
       ated by D'Bridge. It prepares output file(s) to send back to
       the caller plus an OUTPUT FILE LIST telling D'Bridge which
       files to send.

    4) When the REQUEST SERVER has terminated, D'Bridge then transmits
       all the files listed in the OUTPUT FILE LIST, deletes them, and
       continues to send the rest of the "pickup" mail.


To use this feature, you must either write your own REQUEST SERVER or
use one of the existing systems such as ML-INQ.

The format for the FUNCTION REQUESTS field is:

    <REQUEST FILE> <OUTPUT FILE LIST> <DOS COMMAND>

For an example, I'll explain how I run the ML-INQ program on my system.
ML-INQ stands for Megalist Inquiry. The Megalist is another program I
wrote that creates a "master file listing" for all participating Fido
and Opus systems. The list got so huge, I decided to add an on in-
quiry service. To access the MegaList Inquiry feature, the calling sys-
tem simply creates a text file containing a list of filenames to search
for; this file is called MEGALIST.INQ. Anytime D'Bridge receives a file
called MEGALIST.INQ, the REQUEST SERVER "ML-INQ" is executed.
Here's what I have in my FUNCTION REQUEST field:

    MEGALIST.INQ MEGALIST.LST ML-INQ



-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.11  SECURITY MISCELLANEOUS
                                                                              93
--------------------------------------------------------------------------------G



The ML-INQ program first opens the file "CALLER.INF" to get general
information about the system and the caller. CALLER.INF is a text
file created automatically by D'Bridge just before spawning the REQUEST
SERVER task. Here's what my CALLER.INF contains at the moment:

    1:101/200          (The Fidonet address)
    TC-Trader          (The system name)
    Cheryl Buzzell     (The operator name)
    C:\DB\FILES\       (My INBOUND FILES DIRECTORY path)

ML-INQ then opens the file "C:\DB\FILES\MEGALIST.INQ" to get the actual
request from the caller. Then, it prepares the file "MEGALIST.OUT" con-
taining the results of the search. Finally, ML-INQ creates the OUTPUT
FILE LIST, this time called MEGALIST.LST (in the current directory);
this file contains the list of files to send back to the caller, then
erase. In this case, the OUTPUT FILE LIST only contains MEGALIST.OUT.

Finally, ML-INQ returns control to D'Bridge and the file gets sent and
deleted as specified. The request file, MEGALIST.INQ, is also erased.

A request server may transmit files without erasing them (if they are
available for file-request) simply by creating a WaZOO-style request
file (with the extension .REQ) in the INBOUND FILES DIRECTORY. D'Bridge
will treat these files like inbound file requests.

IMPORTANT:  It is essential that any REQUEST SERVER takes no more than
            30 seconds to execute. Taking more time than this can cause
            the calling system to timeout and hang-up.




EXTERNAL RECEIVERS

External receivers: GCONNECT FAX|*X50                           H

This feature is designed for use with combination modems that also
handle FAX and/or VoiceMail. The above example causes D'Bridge to
exit with errorlevel 50 when a "GCONNECT FAXH" response is received
from the modem.

The syntax for this field is:  <GMODEM RESPONSEH>|<GDOS commandH>











-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.11  SECURITY MISCELLANEOUS
                                                                              94
--------------------------------------------------------------------------------G






EXTERNAL GATEWAYS

External gateways: G                                       H

Again, this is a VERY advanced feature and will not be used by 99% of
the D'Bridge systems out there; this is for the other 1%:

An EXTERNAL GATEWAY allows D'Bridge to act as a "front-end" for up to
20 other EMAIL receivers at the same time. The way this works, is by
defining a specific "SYNC" sequence; D'Bridge can look for that sequence
and spawn another EMAIL system while the calling system is still on.
This way, D'Bridge can be compatible with as many systems as possible.
As of this time, I know there are gateway programs for UUCP and USENET.
I'm sure there are others I just don't know about.

As an example, let's say I want to install a UUCP mail receiver "on
top" of D'Bridge. I have a program written for the IBM PC which will
receive mail when a call is received. Assuming this program features
an option to respond to a call already in progress and terminate after
finishing the session, it is compatible. The first thing you need to do
is figure out what the SYNC sequence is.

A SYNC sequence is the sequence of bytes the calling system sends to
the receiving system (multiple times) until the receiver responds with
an acknowledgment that it is ready to begin a mail session.
D'Bridge can be programmed to recognize up to 20 separate sequences of
up to 16 bytes each and spawn a different task depending on which one
is received. For example, let's say your UUCP transmitter continuously
sends the sequence: 9F, A9, 9F, A9... (hex) until the receiving system
acknowledges. For this sequence, simply specify your EXTERNAL GATEWAYS
field as:

    9F/A9 UUCP_RCV -b*b -p*p

As soon as an incoming call is detected sending the sequence 9F, A9,
D'Bridge will spawn the UUCP mail receiver with the following command
line:

    UUCP_RCV -b2400 -p1

Just like described in DOS BBS COMMANDS, the BAUD RATE and PORT NUMBER
can be substituted by using a *B and *P respectively.
It is up to the spawned task (UUCP_RCV in this case) to handle the mail
session from this point on; it should terminate as soon as the mail is
received and make sure it doesn't answer any calls itself.




-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.11  SECURITY MISCELLANEOUS
                                                                              95
--------------------------------------------------------------------------------G


GH  
  
  
  
Because of the normal operation of D'Bridge, we've restricted three
characters: 1B (Escape), AE (Fidonet TSYNC), and F1 (WaZOO YOOHOO
character). These three bytes may not be a part of your SYNC string.
It is also suggested you use bytes with high parity (greater than 7F
(hex)) to prevent "human" users from easily activating your alternate
mailer.




FIDONET PROTOCOL FOR

Fidonet protocol for: GNONE                           H

If you want to override the default EMSI/WAZOO protocol D'Bridge uses
and revert to XMODEM/TELINK protocols, specify the NET/NODE filter here.
This field should contain "NONE" in all but the strangest setups.




WAZOO PROTOCOL FOR

WaZOO protocol for: GNONE                             H

If you want to override the default EMSI protocol D'Bridge uses and
revert to the YOOHOO-YOOHOO/2U2 handshake, specify the NET/NODE filter
here. This field should contain "NONE" in all but the strangest setups.






















-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.12  DISK SPACE MINIMUMS
                                                                              96
--------------------------------------------------------------------------------G






3.12  DISK SPACE MINIMUMS

  
The GDISK SPACE MINIMUMH screen allows you to set minimum criteria for system
operation:

   - System operation minimum
   - BBS operation minimum
   - Unpack/forward minimum




SYSTEM OPERATION

The system operation line specifies the minimum disk space allowed (in Kb)
before D'Bridge will completely shut down. Once shut down, D'Bridge will
not reactivate without human interaction. Either disk space must be
freed, or DB SETUP must be used to change the minimum.





BBS OPERATION

The BBS operation line specifies minimum disk space criteria for BBS
operation. If disk space is below specified criteria, human callers
will be told the BBS is offline due to disk space shortage.




UNPACK FORWARD

The unpack/forward line specifies the minimum disk space required before
a mail packet may be decompressed or unpacked. Once this limit is
reached, all ECHOmail and NETMAIL unpacking will be halted.












-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.13  ACCOUNTING TRANSLATION
                                                                              97
--------------------------------------------------------------------------------G






3.13  ACCOUNTING TRANSLATION

  
The GACCOUNTING/TRANSLATIONH screen allows you to set up costing data and
controls which determine where D'Bridge calls and when.  This system allows
for minimum telecommunications cost when NORMAL priority is used.  A default
table of USA-EAST.COS (an exported file) is included by default.  Contact your
nearest D'Bridge dealer for a local, more recent cost file.




PREFIX

Prefix: G1-513-                              H

This is the "key" to the database record. You cannot change it. If
you must, you need to remove and add the record again. The PREFIX field
is the first part of a phone number (which will be replaced with the
4TRANSLATE TO5 field when a number is dialed).





TRANSLATE TO

Translate to: G1-                           H

When phone number are translated, this field will be used to replace the
PREFIX for dialing. The field is actually broken down into two subfields:
4PREFIX5 and 4SUFFIX5. If you need to dial something after the number,
such as a credit card or billing account number, you may specify a 4SUFFIX5
by using a vertical pipe ( | ) to separate the 4PREFIX5 from the 4SUFFIX5.
An example would be: 1-305-370|,,3188. ",,3188" would be sent to the modem
after dialing. The two commas represent a modem command meaning "pause a
few seconds before dialing the following digits".





LOCATION

Location: GSouthwestern Ohio                   H

This is just a description field for your information.



-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.13  ACCOUNTING TRANSLATION
                                                                              98
--------------------------------------------------------------------------------G






COST DATA SOURCE

Cost data source: GTableH

Here, you either specify GTableH or GXrefH for the data source. If you
use GXrefH, you will be prompted for another prefix to cross-reference.
Otherwise, you will use the table listed below...

The box at the bottom of the screen contains the cost information.
In order to keep communications costs low, D'Bridge has adopted a
system of "cost-based control". This means the system can be programmed
to place all calls during the most economical periods based on this
cost screen entirely. The cost-information for calling a given country
or city can be acquired by calling your long-distance company.
Typically, there are different rates on different days and at different
times. This table allows you to specify up to 5 cost-periods for
accounting and control purposes.

When D'Bridge looks at these cost-tables, it searches from the top of
the list to the bottom, stopping on the first match. For this reason,
"catch-all" entries, like the one shown at the bottom of our example
should be listed last. For flexibility and simplicity, you are allowed
to define overlapping periods, but nevertheless D'Bridge will always
select the first applicable period for accounting and control.
Please note that any time-ranges left undefined are assumed "free" and
D'Bridge will actually try to dial out during these times. Therefor:
GDON'T LEAVE ANY TIME-RANGE UNSPECIFIED.H





REFERENCE PREFIX

Reference prefix: G1-                      H

When using a cross-referenced table, you must specify the prefix whose
table you wish to use for costing and control purposes. The translation
will still be based on the data listed above, but now it will be applied
to the referenced table.










-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.13  ACCOUNTING TRANSLATION
                                                                              99
--------------------------------------------------------------------------------G






TABLE WEEKDAYS

All  S M T W T F S H

In these fields, specify for which day(s) the costing-line is applicable.
Any non-blank character will designate a weekday. GHH stands for holiday.




TABLE START TIME

Here, you specify the starting time for the cost period. Make sure you
use 24-hour time format (e.g. 23:00 is 11:00 pm).




TABLE END TIME

In this field, you specify the ending time for the cost period.




TABLE NCI

Here's the CRITICAL part to understand. During a given cost-period, you
may choose which priorities of mail you would like to be sent. In the
NCI field, you may specify any or all of the letters GNH, GCH and GIH, desig-
nating the priorities NORMAL, CRASH and IMMEDIATE. If you list all three
"GNCIH," then all priorities of mail are allowed to be sent during this
cost-period. If you enter "GCIH," then just CRASH and IMMEDIATE mail
will be sent. This allows you to send NORMAL priority mail during the
low-cost periods and higher priority mail anytime (that's what this
example shows).




TABLE FIRST PERIOD COST

In this field, enter the cost associated with the first billing period.
This is a decimal number with three digits after the decimal point.






-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.13  ACCOUNTING TRANSLATION
                                                                             100
--------------------------------------------------------------------------------G






TABLE FIRST PERIOD SECONDS

Specify the number of seconds on which the FIRST PERIOD COST field
is based. In the United States, this is normally "60", but other
countries and/or long-distance carriers may have a different billing
increment.




TABLE SUBSEQUENT PERIOD COST

In this field, enter the cost associated with the subsequent billing
periods. This is a number with three digits after the decimal point.




TABLE SUBSEQUENT PERIOD SECONDS

Specify the number of seconds on which the SUBSEQUENT PERIOD COST field
is based. In the United States, this is normally "60", but other
countries and/or long-distance carriers may have a different billing
increment.


























-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.14  ZMODEM PARAMETERS
                                                                             101
--------------------------------------------------------------------------------G






3.14  ZMODEM PARAMETERS

The GZMODEM PARAMETERSH screen allows you to set the behavior of the ZMODEM
protocol which D'Bridge uses to send EMAIL.  Parameters include:

   - Starting block size
   - Maximum block size
   - Recover block size
   - Block step rate
   - Direct ZMODEM




STARTING BLOCK SIZE

This is the block size to be used at the start of a ZMODEM file-transfer.
This must be a power of two between G32H and G8192H (G32H, G64H, G128H, G256H, G512H,
G1024H, G2048H, G4096H or G8192H).




MAXIMUM BLOCK SIZE

This is the largest block size D'Bridge will use in ZMODEM. The value
will increase from the STARTING BLOCK SIZE to MAXIMUM BLOCK SIZE using
the BLOCK STEP RATE specified here.




RECOVERY BLOCK SIZE

This is the block size to be used after an error has been reported by
the receiver. Normally, this value should be less than the starting
block size because where there is one error (phone noise) there may im-
mediately be another. Making the recovery block size small reduces the
amount of time it takes the system to recover from bad line noise.











-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.14  ZMODEM PARAMETERS
                                                                             102
--------------------------------------------------------------------------------G






BLOCK STEP RATE

When the ZMODEM sender is not receiving error reports from the receiver,
it will increase the block size by doubling it after "x" successful
blocks until it reaches the MAXIMUM BLOCK SIZE specified. The BLOCK
STEP RATE is "x". In other words, it tells the system after how many con-
secutive good blocks it may increase the block size. By default, D'Bridge
uses a factor of 4.




DIRECT ZMODEM

When D'Bridge communicates with other EMAIL systems capable of the GDZAH or
GIZEH protocols, you have the option of increasing throughput an average of
1.6% by selecting direct ZMODEM. By answering GYesH to this parameter, the
protocol will transmit the XON and XOFF characters transparently rather than
"escaping" them as the ZMODEM specification calls for. If you are having
ZMODEM trouble, try setting this to GNoH to see if it makes a difference.






























-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.15  SETUP EDITOR OPTIONS
                                                                             103
--------------------------------------------------------------------------------G






3.15  SETUP EDITOR OPTIONS

The GSETUP EDITOR OPTIONSH screen allows you to control the behavior of the
internal editor or configure an extrernal editor such as GoldED.






EMAIL EDITOR

EMAIL editor: GInternalH  (GIHnternal/GGHoldED/GOHther)

This selects the EMAIL editor to be used when ALT-E is pressed or the menu
option "READ/EDIT EMAIL" is selected. The default is GInternalH, but GGoldEDH
and many other Fidonet-compatible editors may just as well be used.




EDITOR REBUILD QUEUE

Rebuild queue? GYesH

This parameter gives you the option to automatically rescan the NETmail
area after EMAIL has been entered or deleted. This scan will happen im-
mediately after exiting the editor. If you want the mail scanned automa-
tically, specify GYesH here. It will not scan automatically if you spe-
cify GNoH.




EDITOR SCAN ECHOMAIL

Scan ECHOmail? GYesH

If you want to send ECHOmail messages immediately after leaving the
editor, specify YES here. The D'Bridge ECHOmail scanner knows what
areas need to be scanned if any. If you don't say YES here, then
ECHOmail will not be sent until an ECHOscan is run either in an event
or manually using the menu option: GUTILITIESH/GProcess ECHOmailH.







-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.15  SETUP EDITOR OPTIONS
                                                                             104
--------------------------------------------------------------------------------G






EDITOR SOUND EFFECTS

Sound effects? GYesH

This specifies whether the "warning beeps" will be active in the internal
editor. Answer GYesH, and change it to GNoH later if the noise bothers you.




EDITOR DEFAULT PRIORITY

DEFAULT: Priority? GNormalH    (GIHmmediate/GCHrash/GNHormal/GHHold)

This specifies the default priority for EMAIL messages. The priority de-
termines when (if at all) the message will be transmitted from the system.
Four priorities are available, listed here from highest to lowest:


    GIMMEDIATEH     When a message is flagged as IMMEDIATE, it has the
                  ultimate priority on the system. All IMMEDIATE
                  messages must be transmitted before any other out-
                  bound calls are possible. Using this priority is
                  quite effective in getting the mail out fast, but
                  has the disadvantage of slowing down outbound mail
                  traffic if the IMMEDIATE systems are busy or not
                  answering.

    GCRASHH         Messages flagged as CRASH are allowed to be sent
                  anytime, 24-hours a day. Unless a "hold" override
                  is placed on a system, an EMAIL message with CRASH
                  priority will be sent during the UNEVENT or any
                  scheduled event. If entered during the day, CRASH-
                  priority messages will most-likely be sent at the
                  highest phone rates.

    GNORMALH        When a message is flagged as NORMAL, it will not
                  be transmitted until a scheduled mail event occurs.
                  Using this priority (usually overnight delivery) is
                  the most cost-effective way to use D'Bridge for EMAIL.

    GHOLDH          When a message is flagged as HOLD, it will not be
                  sent until the destination system polls or another
                  non-HOLD message is entered. Use HOLD priority if
                  you intend for most systems to call to pickup their
                  mail.




-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.15  SETUP EDITOR OPTIONS
                                                                             105
--------------------------------------------------------------------------------G






EDITOR FORCED ROUTING

Forced Routing: GNone  H  (GDHirect/GHHub/GNHone)

Choose the desired routing method for NETmail messages entered using the
internal editor:

    GDIRECTH     This designates all messages (by default) to go directly
               to the destination systems, bypassing any event-specific
               routing controls.

    GHUBH        This defaults all messages to be HUB- or HOST-routed.

    GNONEH       This defaults to standard routing as defined in each
               mail event.




EDITOR DEFAULT PRIVATE

Default private? GYesH

This specifies whether the editor will default all new messages to
private status or not. "Private" usually means the EMAIL is only
intended for the receiver. However, you should note that mail can
be read on all systems it passes through (unless the messages are
encrypted somehow).




EDITOR DEFAULT KILL SENT

Default Kill/Sent? GNo H

This specifies the default for the "Kill when sent" flag in the editor.
If you have no use for a copy of outbound mail, you might want to
specify GYesH here. Mail flagged KILL/SENT is erased after being sent
to the next destination.










-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.15  SETUP EDITOR OPTIONS
                                                                             106
--------------------------------------------------------------------------------G






EDITOR DEFAULT ARCHIVE SENT

Default Archive/Sent? GYesH

This specifies the default for the "Archive when sent" flag in the
editor. If you want to save a copy of the outbound mail in a text
file "archive", answer GYesH here. When a message is sent, it will
be added to the text file, showing the date and time of transmis-
sion; the original message will subsequently be erased.




EDITOR DEFAULT XMAIL

Default XMAIL? GNo H

This specifies the default setting for the "XMAIL" flag. If set to GYesH, all
NETmail entered using the internal editor will, by default, be sent as com-
pressed mail utilizing the compression method defined in the XMAIL CONTROL
screen. When NETmail is marked as XMAIL, it will be marked as sent, deleted
and/or archived when the queue is built, making it impossible to re-edit the
message later. Unless this is really what you want, it is suggested you spe-
cify GNoH here.




EDITOR DEFAULT INSERT

Default insert? GNo H

This specifies the default state of the "insert mode" in the editor.
Some people prefer to work in insert mode; others don't. If you want
"insert" to be on in the editor by default, answer GYesH here.




EDITOR DEFAULT INTL ADDRESSING

INTL addressing? GYesH

In the multi-zone world of EMAIL today, it is almost mandatory for all
NETmail to contain international (zone-aware) addressing. Answer GYesH to
this question unless there's a REALLY GOOD reason not to do so.




-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.15  SETUP EDITOR OPTIONS
                                                                             107
--------------------------------------------------------------------------------G






EDITOR QUOTE SEENBYS

Quote SEEN-BYs? GNo H

When entering a quoted reply with the internal editor, this field gives you
the option of including ECHOmail SEEN-BY information in the reply text. If
you want this, answer GYesH, otherwise specify GNoH.




EDITOR USERS

Valid users: GChris Irwin,SECRET          H

Here, you specify a list of valid users and their "passwords". The
correct format for a user line with a password is:

<GUSERNAMEH>[,<GOPTIONAL PASSWORDH>]

If more than one line is entered here, every time the editor is run,
you must specify which user you are. This is for the "FROM" field in
the message editor. If you only specify one line, you won't have to
confirm anything (except your password, if specified).




GOLDED PATH

GoldED path: GC:\GOLDED                 H

If you have chosen GGoldEDH as your EMAIL reader/editor, specify the directory
path where this program is located.




EDITOR DOS COMMANDS

DOS commands: GC:\MYEDIT\MYEDITOR /C /U                     H

If you have chosen GOtherH as your EMAIL reader/editor, specify the DOS
commands to invoke your editor here.






-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.16  ECHOMAIL AREAS
                                                                             108
--------------------------------------------------------------------------------G






3.16  ECHOMAIL AREAS

  
The GECHOMAIL AREASH screen allows you to define the local and ECHOmail areas
that you wish to use with D'Bridge.




ECHOMAIL CODEWORD

Codeword: GDBRIDGE        H

The CODEWORD is a word from 1 to 16 characters which you designate as a
mnemonic reference to an area. It could be a word like POL for politics
or PROG for programming conference. CODEWORDs must be unique - "NETMAIL"
and "BADECHO" are predefined by the system and may not be used here.




ECHOMAIL ALERT FLAG

Alert flag: GDH

If you wish to be notified (on the status line) about new mail in this
area, specify a one character "flag" here. When mail is received, the
mailer will show it by listing the defined "flag" character on the right
side of the bottom status line.




ECHOMAIL SECURITY LEVEL

Security level: G500 H

The SECURITY LEVEL is used by the AREAFIX subsystem to allow other
systems to automatically add or delete themselves from ECHO links.
Security levels range from G0H to G9999H; if a system has a security
level of 50, it has access to all areas with a SECURITY LEVEL of 50
or less. If you don't want anyone to have access to an area, define
its level to be 9999.







-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.16  ECHOMAIL AREAS
                                                                             109
--------------------------------------------------------------------------------G






ECHOMAIL GROUP SORT

Group/Sort: GA1H

GROUP/SORT is a two-byte field; the first character is the AREAFIX access
group; the second is the sort code for use with DBUTIL SORT AREAS.
In AREAFIX, each area is assigned a GROUP code. Each system with an AREAFIX
password also has one or more group codes associated with it. Only those
systems with matching GROUP codes have access to a given area.




ECHOMAIL DESCRIPTION

Description: GD'Bridge Support Conference          H

This description field will be used throughout the system to describe the
conference.




ECHOMAIL STORAGE

Storage method: GFido    H  (GFHido/GQHuickBBS/GNHone)

There are three choices for the storage method of a message base:

    GFIDOH       With FIDO format, each message is stored in a separate
               file in the specified directory. This is the most
               common storage format among Fidonet-based systems, but
               has the disadvantage of being slower than the other
               formats.

    GQUICKBBSH   With the QUICKBBS format, messages are stored directly
               in a QuickBBS message base. This base may exist stand-
               alone or in conjunction with a QuickBBS system.

    GNONEH       If NONE is specified, the area is regarded as an area
               "passing through" your system. The messages are not ac-
               tually stored on this system, just forwarded to the spe-
               cified systems.







-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.16  ECHOMAIL AREAS
                                                                             110
--------------------------------------------------------------------------------G






ECHOMAIL DIRECTORY PATH

Directory path: GC:\FIDOMAIL\DBRIDGE\                  H

Specify the directory path to use for Fido-style messages.

This directory will contain the message files, such as:

GDirectory of  C:\FIDOMAIL\DBRIDGEH

G1        MSG     1847  12-06-92  11:15aH
G2        MSG     1511  12-06-92  11:15aH
G3        MSG     1459  12-06-92  11:54pH
.
.
Gnnnn     MSG      505  12-15-92  11:07aH




ECHOMAIL QUICKBBS AREA NUMBER

QuickBBS areas #: G32 H

Each QuickBBS area must have a unique area number in a range from G1H
to G200H. If you accidentally assign the same number to different areas,
you will locally "crosslink" the conferences. Specify a GUNIQUEH number
here or match your existing BBS setup.




ECHOMAIL DEFAULT PRIVATE

Default private? GNo H

If you want the editor to flag messages as PRIVATE by default, answer GYesH.
This only affects the internal message editor when entering or replying to
messages. Most ECHOmail conferences are by nature "public" - Private ECHOmail
can be read by all receiving system operators.










-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.16  ECHOMAIL AREAS
                                                                             111
--------------------------------------------------------------------------------G






ECHOMAIL ARCHIVE FILE

Area archive: GC:\ECHO\DBRIDGE.TXT                  H

If you want D'Bridge to save a copy of each message purged when GDBUTILH
GPURGEH is run, specify a text file to "archive" them in. Each area may
write messages to a different file, or you may combine several areas into
a single text file. If you don't want to save a copy of the messages, just
leave this field blank.




ECHOMAIL PURGE CRITERIA

Purge except: G100 H messages

Purge after: G30 H days

In the DBUTIL PURGE program, there are two options for deciding which
messages to erase from the system. When the cursor is on this field,
you may press the GF10H key to switch between the methods: PURGE EXCEPT
and PURGE AFTER.

With PURGE EXCEPT, DBUTIL will erase all but "x" messages; specify "x"
in this field as "how many messages to save after purging". With the
PURGE AFTER option, DBUTIL will purge messages based on their age.
PURGE AFTER 30 DAYS means to erase all messages over 30 days old when
the utility is run.




ECHOMAIL PRESERVE MESSAGES

Preserve: G200 H messages

In DBUTIL PURGE, you may specify a certain number of messages to ignore
while purging. These will be the lowest-numbered messages in the area
and contain information you don't want erased such as conference rules,
etc.









-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.16  ECHOMAIL AREAS
                                                                             112
--------------------------------------------------------------------------------G






ECHOMAIL AREA TYPE

Area type: GECHOmailH (GEHCHOmail/GLHocal)

User-defined areas are either GLocalH or GECHOmailH. The default is GECHOmailH.
D'Bridge ignores LOCAL areas except while in the editor; when an ECHOscan is
executed, all ECHOmail areas are scanned for outbound mail.




ECHOMAIL CONFERENCE NAME

Conference name: GDBRIDGE                               H

Each ECHOmail area must have a unique CONFERENCE NAME. This may be the
same as or different from the CODEWORD specified above, but must reflect
the actual ECHOmail name or conference tag used for the specified area.
The CONFERENCE NAME may be up to 54 characters and must not contain any
spaces; when creating a new ECHOmail conference, it is suggested your
CONFERENCE TAG should not exceed 16 characters if at all possible to
maintain compatibility with other systems.




ECHOMAIL ORIGIN LINE

Origin line: GNancy's BBS - Middletown, Ohio            H

The ORIGIN LINE defaults from your SYSTEM NAME (specified on the BASIC
CONFIGURATION screen) and will be added to the bottom of all ECHOmail
messages originating from your system. Typically, sysops use the name
of their system and the city where it is located.




ECHOMAIL ALIAS ADDRESS

Alias address: G                     H

If you are a member of more than one network, it might be necessary to
use an "alias" address on an ECHOmail area. This means that the address
put on the ORIGIN-LINE of the messages will be different than your pri-
mary address.
Most systems would leave this blank.



-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.16  ECHOMAIL AREAS
                                                                             113
--------------------------------------------------------------------------------G






ECHOMAIL TINY SEENBYS

Tiny SEEN-BYs? GNo H

If you say GYESH to TINY SEEN-BYs, then only the systems you are forwar-
ding a conference to will appear on the SEEN-BY lines. This is fine if
you are a "leaf node" or a local ECHO hub; GPLEASE NOTE THAT USING THISH
GOPTION IS NOT ALLOWED IN SOME NETWORKS - CONTACT YOUR LOCAL ECHOMAILH
GCOORDINATOR FOR MORE INFORMATIONH.




ECHOMAIL DEFAULT PRIORITY

Default priority: GNormal     H (GIHmmediate/GCHrash/GNHormal/GHHold)

For each conference, you specify a DEFAULT PRIORITY for forwarding of
ECHOmail. Choose either GIMMEDIATEH, GCRASHH, GNORMALH or GHOLDH; This
default may be overridden for any specific system.




ECHOMAIL FORWARD TO

Forward to: G1:110/68 22 .20                                  H

The FORWARD TO fields allow you to specify a list of systems to whom you
wish to forward this ECHOmail conference. You may specify as many systems
as will fit on the 5 lines available; the systems should be separated by
spaces and be in the format:

GZONEH:GNETH/GNODEH[,GPRIORITYH] or .GPOINTH[,GPRIORITYH]

Here's an example:

G1:18/0 1:105/3 1:110/22,C .20,HH

In this example, G1:110/22H has GCRASHH priority as an override and G.20H has
GHOLDH priority specified. Please note that you may only forward ECHOmail to
points or your own node. You may not send NETmail or ECHOmail directly to a
point of another system.

With this example, if I enter an ECHOmail message in this area, it will
automatically be forwarded to these four systems, who will in turn send my
message on to all the other systems participating in the conference.



-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.17  WINDOW COLORS
                                                                             114
--------------------------------------------------------------------------------G






3.17  WINDOW COLORS

  
The GWINDOW COLORSH screen allows you to set the screen colors that D'Bridge
will use.













































-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.18  KEYBOARD MACROS
                                                                             115
--------------------------------------------------------------------------------G






3.18  KEYBOARD MACROS

The GKEYBOARD MACROSH option allows the operator to define "macros" that
cause keys, ALT F1-F10 and CONTROL F1-F10, to substitute preprogrammed
text while editing. This might be handy for "canned" introductions,
signatures or whatever you can think of. Twenty keys may be defined and
each key can have any amount of text desired. Note: This limit is RAM-
based, so check your memory status if in question.

The cursor will appear on the top line. Fields may be changed by typing
over the current values or by using the field edit keys: INSERT, DELETE,
LEFT and RIGHT arrows. Pressing ENTER or the DOWN arrow advances to the
next line and pressing the UP arrow moves the cursor to the previous
line. You must press the ESC key to exit this window and save the setup.
The above example shows the definition for the CONTROL-F1 key as being
my mailing address. Each key is defined in its own window. All vertical
pipe characters "|" are translated to hard-returns in the editor.

































-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
3.19  TRANSLATION TABLE
                                                                             116
--------------------------------------------------------------------------------G






3.19  TRANSLATION TABLE

The GTRANSLATION TABLEH screen allows you to redefine how certain characters
will be displayed. This may be used to allow line-drawing or foreign
character sets to be used in the internal message editor. The ALT-keys
(a-z) may be defined as displaying any character and transmitting it as a
normal printable character in the range of 33-126.

This is an advanced option and is not normally needed, so if you have no
need for foreign character sets, skip this screen.

It allows you to redefine part of the printable character set as translating
to non-standard characters. Pressing the GLEFTH and GRIGHTH arrow keys scans
through the characters, helping you to locate the proper ASCII code.




































-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
4.00  SYSTEM IDLE COMMANDS
                                                                             117
--------------------------------------------------------------------------------G






4.00  SYSTEM IDLE COMMANDS

When D'Bridge is idle, you have full control over its functions. The
following single-key commands are available when the word "GIDLEH" appears
in the upper-left corner of the screen:

     GCHall         Makes the next outbound call immediately, if any
     GRHetry        Retries the last outbound call, if any
     GNHext         Advances the pointer to the next outbound call
     GPHrev         Returns the pointer to the previous outbound call
     GHHold         Places the queue entry selected on hold status
     GQHuickDial    Activates QuickDial mode; no pause between calls
     GESCH          Displays the main menu
     GF1H           Activates the Help system
     GALT-CH        Call a system from the nodelist in terminal mode
     GALT-DH        Call a system from your directory in terminal mode
     GALT-EH        Read/Edit EMAIL messages
     GALT-FH        Request file(s)
     GALT-HH        History display
     GALT-IH        Information display
     GALT-KH        KatGuard (electronic keyboard cover)
     GALT-LH        View system log file
     GALT-NH        New ECHOmail link
     GALT-PH        Poll a node
     GALT-QH        Rebuild outbound queue
     GALT-RH        Request ECHOmail link
     GALT-SH        Toggle display of the schedule window
     GALT-TH        Transmit file(s)
     GALT-VH        View/Modify queue
     GALT-XH        Exit D'Bridge (Quit)
     GALT-YH        Push to DOS shell (small)
     GALT-ZH        Drop to DOS shell (large)




HOLD ALL MAIL

Selecting the GHOLD ALL MAILH menu option will immediately place all outbound
mail on HOLD. The hold will come off at midnight, when a new event starts or
by using the GVIEW/MODIFY QUEUEH command, GALT-VH.

This command only holds mail until midnight at the latest.







-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
4.00  SYSTEM IDLE COMMANDS
                                                                             118
--------------------------------------------------------------------------------G






VIEW MODIFY QUEUE

Selecting the GVIEW MODIFY QUEUEH option (or pressing ALT-V from IDLE mode)
allows you direct access to the outbound mail queue allowing you to view,
erase or change priorities of queue entries.

The top line of the queue should be highlighted. To view or change a queue
item, first move the highlight bar to the desired entry using the GUPH and
GDOWNH arrows. Next select one of the following commands by pressing the
first letter of the option (I for Immediate, etc.)


GQUEUE: NHext, GPHrevious, GIHmmediate, GSHend, GHHold, GRHeset, GFHorce, GVHiew, GKHill



      GNEXTH       The NEXT option advances to the next outbound call.


      GPREVIOUSH   The PREVIOUS option returns to the previous outbound call.


      GIMMEDIATEH  The IMMEDIATE option will change the priority of an
                 entire queue entry to immediate until the next NETmail
                 scan. If the queue entry is FORCED or is a unlisted
                 system, this option is not valid and the computer will
                 sound the "foghorn".


      GSENDH       The SEND option will change the priority of an entire
                 queue entry to crash priority. This change only lasts
                 until the next NETmail scan. If the queue entry is
                 FORCED or unlisted, the computer will sound the "foghorn".


      GHOLDH       The HOLD option causes an entire queue entry to be held
                 and not transmitted unless the receiving system poll for
                 it. This option is not valid if there is a FORCED
                 PRIORITY for the system.


      GRESETH      When you RESET LIMITS for a queue entry, both the number
                 of TRIES and CONNECTS is reset to zero, allowing the
                 queue entry to be transmitted during this event even if
                 the retries limit has been exceeded.




-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
4.00  SYSTEM IDLE COMMANDS
                                                                             119
--------------------------------------------------------------------------------G


  
  
  
        GFORCEH      When you FORCE a priority for a certain system, that
                   system will be forced to that priority "until further
                   notice". The only way to override the FORCE is to remove
                   it by specifying "NONE" here. When you press "F" for
                   FORCE, a menu is displayed:
  
                   GFORCED MODE: IHmmediate, GCHrash, GHHold or GNHone
  
                   Choose which priority to force this system to; if you don't
                   want to do this, just press ESC and no change will be
                   made. Select the priority or "N" to remove the "force".
                   When a node is forced, it is designated by an exclamation
                   point "!" next to the address.
  
  
        GVIEWH       Viewing a queue entry lets you "look inside" a queue entry
                   and see which messages and files are queued to send. Some
                   general information about a system is displayed on the
                   left; on the right is a detail window which may be scrolled
                   up and down by using the UP, DOWN, PGUP and PGDN keys. Press
                   ESC to exit view mode.
  
  
        GKILLH       KILL is a very dangerous option because it allows you to
                   erase any or all outbound mail and requests with one extra
                   keystroke. Pressing "K" will display a window asking what
                   you would like to KILL. If you don't want to KILL any
                   part of the entry, press ESC to cancel. Otherwise, choose
                   from the menu which lets you erase everything or just one
                   "part" of the queued entry. You'll have to try it to really
                   understand - just be careful.
  
  
When you are finished VIEWING and MODIFYING the queue, just press ESC
to exit this screen.
















-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
4.00  SYSTEM IDLE COMMANDS
                                                                             120
--------------------------------------------------------------------------------G






REBUILD QUEUE

The GREBUILD QUEUEH option causes D'Bridge to erase all the packets
currently in the QUEUE window and re-scan for outbound mail.
This is the same thing that happens when D'Bridge begins a mail event.
This is handy for recreating packets if you had previously aborted the
scan when D'Bridge first came up or you entered some messages in the
editor (although there IS an option to automatically re-scan NETmail after
leaving the editor).

GREBUILD QUEUEH will normally create packets for all outbound mail
regardless of whether it is CRASH priority or not; typically, all crash-
mail will be sent, and all other mail will be on hold. This can easily
be changed by using the GVIEW/MODIFY QUEUEH command, GALT-VH.




POLL A NODE

The GPOLL A NODEH option causes D'Bridge to call the specified system to
pick up mail which may be on "hold" there. D'Bridge will simply ask you
"Poll whom?" and you enter either the address of the system to call or the
operator's name. If you enter a name, it will display a list of all systems
with the Operator name you specify (if you enter "JOE," it will display all
the "JOEs" in your nodelist and allow you to select the one you wish.

If you don't know the address, five function keys (GF1H-GF5H) will aid you in
your search. Once you have determined the system to call and pressed ENTER,
D'Bridge will add a POLL entry to the queue with the specified priority.
If you use IMMEDIATE or CRASH priority, the POLL will happen right away.



















-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
4.00  SYSTEM IDLE COMMANDS
                                                                             121
--------------------------------------------------------------------------------G






TRANSMIT FILES

The GTRANSMIT FILE(S)H option gives you a simple and quick way to send
files to another system. Any file which can be copied using the DOS
"COPY" command can be sent with D'Bridge. Similar to the GPOLL A NODEH
command, the GTRANSMIT FILE(S)H option asks you for the destination
address. Here, you may enter the address of the system or part of the
operator's name. Once you've entered the address, D'Bridge will ask
you for a list of files to transmit. You may enter as many files as
you wish, one per line. Make sure you've included the DOS subdirectory
if they aren't in the current directory. If D'Bridge can't find a file,
the cursor will simply be stuck on the line until you press ESC (to
cancel the entire request), press the UP arrow or enter a valid (exis-
ting) DOS filename. When you're satisfied you've entered the list cor-
rectly, press ENTER. You may also use the DOS "wildcard" characters "*"
and "?" to specify a group of files to send.

To use a priority other than the default, enter <GFILENAMEH> <GPRIORITYH>
in the window:

  GC:\AUTOEXEC.BAT             ImmediateH
  GC:\DATA\BIGFILE.ZIP         HoldH




























-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
4.00  SYSTEM IDLE COMMANDS
                                                                             122
--------------------------------------------------------------------------------G






FILE REQUEST

The GFILE REQUESTH option allows you to request that a remote system sends
you file(s). With a network of all D'Bridge systems, all file requests
are really update requests. This means that if you already have a file
and you re-request it, it will only be sent if the file size or date/time
are different.
To use the FILE-REQUEST option, simply enter the address of the system you
wish to call (just like MANUAL POLL and TRANSMIT FILE(S)) and enter a list
of files you wish to receive.

If you're not sure of the exact filenames, you may use the DOS "wild-
card" characters "*" and "?."  After you have entered the entire list of
files to request, press ENTER and D'Bridge will add the request to the
outbound mail queue.

To use a priority other than the default or file-request passwords, use:

<GFILENAMEH>[,<GPASSWORDH>] <GPRIORITYH>


                 GFILE1,SECRET          ImmediateH
                 GFILE2                 CrashH

Note that HOLD is not a valid priority for file-requests. Requests only
work when you call the remote system.




INFORMATION DISPLAY

The GINFORMATION DISPLAYH screens provide summary information about D'Bridge.
Execution times and traffic-volume information are collected and available for
display in three different forms:


GSUMMARYH          This provides traffic and data volumes for the year, month,
                 week, yesterday and today.

GTIME USAGEH       History of execution times is displayed on this screen.

GACTIVITY GRAPHH   This shows a graphical representation of the operation
                 of D'Bridge.






-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
4.00  SYSTEM IDLE COMMANDS
                                                                             123
--------------------------------------------------------------------------------G






READ / EDIT EMAIL

The GREAD/EDIT EMAILH option causes D'Bridge to load the selected EMAIL
editor. The screen will clear and the editor will be loaded, ready for you
to read and respond to EMAIL messages.

GDB EDITH may also be run directly from the dos prompt; it is used to enter
and read the EMAIL messages D'Bridge sends and receives. D'Bridge utilizes
the Fidonet standard message format used by so many other EMAIL systems,
bulletin boards and utilities. This will allow you to use a great variety
of external programs such as "robot" mailers, form-letter generators and
editors.






































-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
4.00  SYSTEM IDLE COMMANDS
                                                                             124
--------------------------------------------------------------------------------G






HISTORY DISPLAY

When you select the GHISTORY DISPLAYH option, GALT-HH, you will receive
a menu of available history screens. There are four screens on the menu:


GOUTBOUND HISTORYH

The outbound history screen simply displays a log of all outbound mail
calls within the last "n" days (specified on the BASIC CONFIGURATION
screen). This display always starts at the end by showing you the most
recent call. The GUPH, GDOWNH, GPGUPH and GPGDNH keys scroll the screen, GESCH
exits. This display lists the date, time, destination, bytes sent/received,
elapsed time and actual cost of the connection.


GINBOUND HISTORYH

The inbound history screen simply displays a log of all incoming mail
calls within the last "n" days. This display lists the date, time,
origin, bytes sent/received, elapsed time. Since this is inbound mail,
there is no cost involved.


GRECEIVED ECHOMAIL HISTORYH

The received ECHOmail history screen displays a log of all ECHOmail
messages received within the last "n" days. This display lists the
date, time, destination, bytes sent/received, elapsed time and actual
cost of the connection.


GAREAFIX LOGH

The AREAFIX log screen displays a log of all automatic additions to
your "forward-to" list in the area manager. These may be in the form
of AREAFIX requests or may be entered manually by using the GNEWH
GECHOMAIL LINKH, GALT-NH option.












-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
4.00  SYSTEM IDLE COMMANDS
                                                                             125
--------------------------------------------------------------------------------G






VIEW SYSTEM LOG

The GVIEW SYSTEM LOGH command allows you to scroll through the system log file
and search it for keywords. Besides the standard cursor control keys, the
following keys are active here:


          G+H/G-H              The GPLUSH and GMINUSH keys change the date of
                             the display  (pressing the minus key three
                             times displays the log from 3 days ago.)


          GMHorning        Displays log entries starting at midnight.

          GAHfternoon      Displays log entries starting at noon.

          GEHvening        Displays log entries starting at 6:00 PM.

          GSHearch         Enters "search mode"

          GHHighlight      Allows entry of highlight keywords and colors.




GUSING SEARCH MODEH

Search mode has two ways to look for log entries:


          GKEYWORD SEARCHH    Searches for any match in a list of keywords.

          GTEXT SEARCHH       Searches for the first occurrence of a substring.


The GNHext and GPHrevious commands actually invoke the search.














-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
4.00  SYSTEM IDLE COMMANDS
                                                                             126
--------------------------------------------------------------------------------G






REQUEST ECHOMAIL LINK

AREAFIX is a subsystem within D'Bridge enabling you to remotely
request new ECHOmail links from a HOST or FEED system. This system,
designed by Greg Dawson, eliminates the need for manual intervention
on the part of the HOST system operator. Now that handling hundreds
of ECHOmail conferences on a single system is a daily reality, this
automated system of forwarding maintenance is required.

The GREQUEST ECHOMAIL LINKH, GALT-RH command allows you to request a
remote system, either STARTs or STOPs forwarding of ECHOmail conferences.
To use this feature, you must pre-arrange a PASSWORD with the operator
of your ECHOmail feed.

First, enter the address of the system to request ECHOmail from. If you
have not established an AREAFIX password for the specified system,
D'Bridge will ask you to assign one at this time. AREAFIX will not
function without a security password (for good reason!). AREAFIX pass-
words may also be entered on the PACKET/MAIL CONTROL screen.

Next, enter a list of CONFERENCE TAGS desired, one per line; press
ENTER on a blank line when finished. If you wish to remove a conference
rather than adding it, simply put a minus sign "-" before the tag.

If you wish to receive a list of available ECHOmail from your ECHO link,
answer YES to "Area listing?". If you want the host system to rescan the
message base, sending you all the old messages, answer YES to "Get old
messages?".

Finally, choose the EMAIL priority you wish to use for transmitting the
request. This priority has no connection to the one with which you will
receive the ECHOmail - that's up to the other system's operator.

When the request is received by the remote system, it will add or remove
your system from its "forward-to" list as you have specified; it will
send you a confirmation message which will explain the changes made and
errors or violations you have made. This message may be sent automatical-
ly, or you may have to poll later to receive it; this depends on how your
ECHOmail link has his system configured.











-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
4.00  SYSTEM IDLE COMMANDS
                                                                             127
--------------------------------------------------------------------------------G






NEW ECHOMAIL LINK

The GNEW ECHOMAIL LINKH, GALT-NH command allows you to add systems to the
FORWARD-TO list in your area manager. This command queues up the same
type of entry as an inbound AREAFIX request with the exception of the
security check. When a system is added or removed from an area, an
audit trail is created in the AREAFIX LOG and a confirmation message
is created and sent to the receiving system.

First, enter the address of the system to send the ECHOmail conference(s)
to. You do not have to have an AREAFIX password just to enter a manual
request.

Next, enter a list of CONFERENCES to add or remove, one per line; press
ENTER on a blank line when finished. If you wish to remove a conference
rather than adding one, simply put a minus sign "-" before the tag.

If you wish to have D'Bridge rescan the entire ECHOmail area and send all
the mail currently stored, answer YES to "Rescan?". If you wish to send a
list of areas available, answer YES to "Send area list?".

Choose the EMAIL priority you wish to use to transmit the request.
This priority has no connection to the one with which you will receive
the ECHOmail - that's up to the other system's operator.

Finally, if you want the request to be processed immediately, answer
YES to "Process now?". If the request is not processed immediately,
you may enter several requests and subsequently run the PROCESS ECHOMAIL
option on the UTILITIES menu.





















-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
4.00  SYSTEM IDLE COMMANDS
                                                                             128
--------------------------------------------------------------------------------G






TERMINAL EMULATOR

  
  
The D'Bridge terminal mode is designed to let you communicate with
online services such as a bulletin board system (BBS), CompuServe<TM>
and other such electronic information systems. Terminal mode acts
like a glass Teletype, having an 24x80 display plus a status line
giving information such as current baud rate, parity, etc. It is not
the intention of D'Bridge to provide many terminal features such as you
might find in other communication programs; D'Bridge is an EMAIL system
and only provides this terminal mode as a simple means for you to tie-
in with other systems through a direct connection.


Terminal mode transmits all printable and control characters without
translation to your modem. The ALT keys are used to control the various
functions in terminal mode. Pressing ALT-X exits the terminal and
returns to mailer mode.


Once in the terminal mode, you will notice that pressing ALT-H displays
a help screen. These are the commands currently supported:




                 /-TERMINAL MODE COMMANDS----------------\
                 |                                       |
                 | ALT-C   Dial system(s) from nodelist  |
                 | ALT-D   Dial system(s) from directory |
                 | ALT-P   Set terminal parameters       |
                 | ALT-L   Capture log ON/OFF            |
                 | ALT-T   Terminate connection          |
                 | ALT-W   Wipe (clear) screen           |
                 | ALT-X   Exit terminal mode            |
                 | ALT-Y   PUSH to DOS                   |
                 | ALT-Z   DROP to DOS                   |
                 | PgUp    Upload file(s)                |
                 | Pgdn    Download file(s)              |
                 |                                       |
                 \---------------------------------------/







-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
4.00  SYSTEM IDLE COMMANDS
                                                                             129
--------------------------------------------------------------------------------G


  
  
GALT-C / Call system from nodelistH


D'Bridge can dial any systems in your nodelist that are not "unlisted
nodes". Pressing ALT-C will display the following window:


/-CALL SYSTEM(S) FROM NODELIST--------------------------------------------\
|                                                                         |
|                                           F1-List nodes in NET 1:110    |
|                                           F2-Change ZONE:NET            |
|                                           F3-List all NETS              |
|                                           F4-List NETS in ZONE 1        |
|  Dial which node(s)?                      F5-Scan user names            |
|                                                                         |
|  _____________________________________________________________________  |
|                                                                         |
\-------------------------------------------------------------------------/


Simply enter a list of addresses you wish to call, separated by spaces.
D'Bridge will auto-dial the entire list until a connection is made. The
function keys F3-F7 are available to assist you in locating the proper
addresses. When a connection has been made, D'Bridge will "beep" and
return to terminal mode with the remote system online at the proper
baud rate.


   GF3H      Scans the entire nodelist by username (first names).

   GF4H      Pressing the F3 key displays all the NODES and POINTS in the
           currently selected NET. Pressing ENTER while using this display
           selects a system; pressing ESC cancels.

   GF5H      Gives a listing of all NETs in the entire nodelist and allows
           you to select a new NET.

   GF6H      Lists all ZONEs in the nodelist

   GF7H      Allows you to change the currently selected NET by entering the
           ZONE:NET desired. After you change NETs, you can use the F1 key
           to list the systems in the new NET.

   GENTERH   Starts the cycle-dialing window; D'Bridge will continue dialing
           until connected or interrupted by the operator.

   GESCH     Cancels dialing mode




-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
4.00  SYSTEM IDLE COMMANDS
                                                                             130
--------------------------------------------------------------------------------G


  
  
GALT-D / Dialing directoryH

D'Bridge terminal mode has a built-in dialing directory enabling you
to program the phone numbers for up to 100 systems you call frequently.
Pressing ALT-D will display the following window:



/-DIALING DIRECTORY---------------------------------------------------------\
|  Entry  Name                      Phone number                 Baud/Parms |
|  -----  ----                      ------------                 ---------- |
|    1    D'Bridge Support/Cincinn  1-513-821-1387                 9600 8N1 |
|    2    D'Bridge Support/West     1-503-292-7233                 9600 8N1 |
|    3    D'Bridge Support/West     1-503-292-7237                 9600 8N1 |
|    4    D'Bridge Support/East     1-215-879-3310                 9600 8N1 |
|    5    D'Bridge Support/Canada   1-416-823-4521                 9600 8N1 |
|    6    D'Bridge Support/Europe   31-85-459034                   2400 8N1 |
|    7    D'Bridge Support/Italy    39-766-540-899                 2400 8N1 |
|    8    D'Bridge Support/Austral  61-3-848-3331                  9600 8N1 |
|    9    D'Bridge Support/Austral  61-3-563-2496                  9600 8N1 |
|   10                                                                      |
|   11                                                                      |
|   12                                                                      |
|                                                                           |
| Edit entry, Delete entry, UP, DOWN, PGUP, PGDN, #, ENTER-Dial, ESC-Cancel |
|                                                                           |
| Command?                                                                  |
\---------------------------------------------------------------------------/


You may easily enter or change numbers in this list by using the EDIT
ENTRY command. Move the highlight bar to the entry you wish to add or
edit then press "E". It will display the following window:


             /-EDIT DIRECTORY ENTRY---------------------\
             |                                          |
             | Entry number: 1                          |
             |         Name: D'Bridge Support/Cincinn   |
             | Phone number: 1-513-821-1387             |
             |    Baud rate: 9600                       |
             |       Parity: NONE                       |
             |    Data bits: 8                          |
             |    Stop bits: 1                          |
             |   Save entry?                            |
             |                                          |
             \------------------------------------------/




-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
4.00  SYSTEM IDLE COMMANDS
                                                                             131
--------------------------------------------------------------------------------G



Enter the NAME, PHONE NUMBER, BAUD RATE, PARITY, DATA BITS and STOP BITS
desired, then answer YES for "Save entry?". Pressing ESC will abort the
change. After you have answered YES, the window will disappear and the
entry will be permanently added to your personal dialing directory.

To dial a number, simply type the ENTRY NUMBERS desired, separated by
spaces, then press ENTER. You can also move the highlight bar to the
desired line and press ENTER. Either will do the same thing.

If you wish to use the D'Bridge scripting language, simply enter the
phone number with the following format:

    "SCRIPT.FIL"aaa-nnn-nnnn

Where SCRIPT.FIL is the name of your script file, aaa is the AREA CODE
you are calling and nnn-nnnn is the PHONE NUMBER.



GALT-H / Terminate connectionH


Pressing ALT-H will terminate the current call immediately by dropping
the DTR signal to the modem for 1.2 seconds.



GALT-P / Set terminal parametersH

The ALT-P command will allow you to set the default settings for
terminal mode. Pressing ALT-P displays the following window:



            /-SET TERMINAL PARAMETERS--\
            |                          |
            |    Comm port: COM1       |
            |    Baud rate: 2400       |
            |       Parity: NONE       |
            |    Data bits: 8          |
            |    Stop bits: 1          |
            |       Duplex: FULL       |
            |    Emulation: ANSI       |
            | Capture ANSI: YES        |
            | AutoDownload: YES        |
            |                          |
            \--SPACE-Change, ESC-Exit--/





-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
4.00  SYSTEM IDLE COMMANDS
                                                                             132
--------------------------------------------------------------------------------G





By using the UP and DOWN arrow keys to select an option and pressing
the SPACE bar to change, you can configure the terminal to any setting
you wish. This setting will be recalled when terminal mode is entered,
but the communications settings can also be changed by ALT-C and ALT-D.



GCOMM PORTH

The COMM PORT specifies which serial interface channel you wish to
use. This could allow you to select between modems or even direct
links to other PC's. COM1 through COM7 are allowable values.


GBAUD RATEH

This allows you to select the speed or BAUD RATE of the serial link with
your modem. Allowable values are 300, 1200, 2400, 4800, 9600, 19200 and
38400, but may not exceed the value specified in the COMMUNICATIONS/MODEM
SETUP screen. If you have LOCKED your modem at its top speed, this baud
rate setting has no effect.


GPARITYH

The PARITY setting allows you to communicate with systems that require
parity-error checking. Valid settings are NONE, EVEN, ODD, MARK and SPACE,
but most newer networks are using "NONE."


GDATA BITSH

This setting is included for compatibility with old-style 7-bit systems.
Allowable values are 7 and 8, but be warned file-transfers will not
function properly with a 7-bit link.


GSTOP BITSH

Almost all baud rates use 1 stop bit, but "weird" configurations might
require a value of 2 (highly unlikely!).









-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
4.00  SYSTEM IDLE COMMANDS
                                                                             133
--------------------------------------------------------------------------------G






GDUPLEXH

Some older systems require your own system to provide the "echo" of
the characters typed. This is called HALF DUPLEX. Newer systems all
echo back the characters you type, eliminating the need for a HALF
DUPLEX setting. Use FULL DUPLEX for systems such as CompuServe, The
Source and BBS networks.


GEMULATIONH

D'Bridge terminal program has only one emulation, ANSI. You may either
select ANSI or NONE. The ANSI emulation does not require the use of
an ANSI.SYS driver; it includes full color support plus ANSI-MUSIC!


GCAPTURE ANSIH

If you have the capture log enabled, D'Bridge has the option to either
save or strip the ANSI codes from the file. If you want to SAVE the
ANSI codes in the capture file, answer YES here.


GAUTODOWNLOADH

D'Bridge terminal mode has the capability to detect when the remote
system has initiated a ZMODEM send request. If you answer YES to this
question, when such a request is detected, D'Bridge automatically starts
a ZMODEM receive session saving you the trouble.



GALT-L / Capture log ON/OFFH

The ALT-L key "toggles" the capture log ON or OFF. If you wish every-
thing displayed on the screen to be captured to a text file, press
ALT-L to turn on the capture log. It will ask you for a DOS filename
to store the information in; it defaults to CAPTURE.LOG, but you may
change it to any directory or filename you wish. Pressing ALT-L a
second time or exiting terminal mode will close the text file. If a
capture file already exists, D'Bridge will add on to the end of it,
preserving its previous contents.







-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
4.00  SYSTEM IDLE COMMANDS
                                                                             134
--------------------------------------------------------------------------------G




GALT-W / Wipe (clear) screenH


Pressing ALT-W simply clears the current screen, moving the cursor to
the upper-right corner.


GALT-X / Exit terminal modeH

Pressing ALT-X will take you out of the terminal mode and back to
D'Bridge. Your modem will be re-initialized and should be ready
to receive incoming mail almost immediately.


GALT-Y / PUSH to DOSH

Pressing ALT-Y will allow you access to DOS commands while you are
still connected to a remote system. To get back into D'Bridge, type
EXIT. This is handy for doing directory listings, etc. while you're
connected to an online service.


GALT-Z / DROP to DOSH

Pressing ALT-Z will also allow you access to DOS commands. The only
difference is that with ALT-Z, D'Bridge is totally swapped out of memory
to EMS or disk so you have as much free memory as possible.


GPgUp / UploadH

The PgUp key allows you to transmit a list of files to the host
computer. The way to do this is typically to tell the remote computer
you are ready to send some files, then press the PgUp button, select
the desired protocol, XMODEM, Telink or ZMODEM, then enter a list of
files to send. Note: With XMODEM, you can only send one file at a
time - XMODEM is not a "batch" protocol.


GPgDn / DownloadH

The PgDn key allows you to receive files from the host computer. This
is normally done by first telling the remote system which files to send
then pressing the PgDn key. You then tell D'Bridge which protocol you
want to use, XMODEM, Telink or ZMODEM and specify which directory to
put the files in. With XMODEM you must specify the actual filename
because it is not a batch protocol.





-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
4.00  SYSTEM IDLE COMMANDS
                                                                             135
--------------------------------------------------------------------------------G






BUILD NODELIST DATABASE

This forces D'Bridge to recompile the nodelist database index. This is
normally an automatic process happening at midnight, but you can force
it to happen by selecting this option.




PROCESS MAIL

This enables you to manually start inbound mail processing and scanning
for outbound ECHOmail and AREAFIX requests. This shouldn't be necessary
unless you have mail processing set to "Manual" in the PACKET/MAIL CONTROL
screen.




FILEBASE SEARCH

This option (GCTL-FH) allows you to search through the D'Bridge FileBase
for a partial match on a specified filespec.

The FileBase is a combined listing of files available for request on other
systems. This enables you to easily locate files and request them with the
ease of point-and-shoot operation.

After you specify a search key to start (like "DB" for filenames starting
with DB), a list of partial matches will be displayed. You can highlight the
file you want to request by using the arrow keys; request it by pressing "R",
then the priority: GImmediateH, GCrashH, or GNormalH.

If you need to make a passworded request, set the current password with the
"GPH" option. Since the FileBase is not zone-aware, you may select another
zone with the "GZH" option.














-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
4.00  SYSTEM IDLE COMMANDS
                                                                             136
--------------------------------------------------------------------------------G






LICENSE REGISTRATION

D'Bridge requires a 4registered5 license key be used in accordance with our
software license policy.  This registraion process will allow you to be added
to our mailing list and at the same time request that a new license key file,
customized with YOUR name or handle will be created for you within ten days.

Complete the registration form, send it in, then look for "GNEWKEY.ZIPH" to
arrive about ten days after your registration was sent.

If you have more than one license key to register, put them all in a directory
and specify it in the registration screen.




EXPORT CONFIGURATION

With this option, D'Bridge will produce an "exported configuration" file.
Normally called GDBRIDGE.CFGH, the output is a standard text file designed
to transfer the entire D'Bridge parameter configuration to another system or
for upgrading to a newer version.

Every night at midnight, D'Bridge automatically exports its configuration to
a file called GDBRIDGE.AUTH and puts it in an archive called GDBCONFIG.ZIPH.




LEAVE DBRIDGE

This option, GCTL-CH or GALT-XH will exit to DOS and completely unload the
D'Bridge software.




DROP TO DOS

This option or GALT-ZH will "drop" to DOS, creating the largest possible
DOS shell using the secondary command processor specified by the environment
variable "COMSPEC" (usually COMMAND.COM).

D'Bridge swaps its memory either to EMS or disk, depending on free memory
available.





-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
4.00  SYSTEM IDLE COMMANDS
                                                                             137
--------------------------------------------------------------------------------G






PUSH TO DOS

This option or GALT-YH will "push" to DOS, creating a DOS shell using the
secondary command processor specified by the environment variable "COMSPEC".














































-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
5.00  EMAIL MESSAGE EDITOR
                                                                             138
--------------------------------------------------------------------------------G






5.00  EMAIL MESSAGE EDITOR

The EMAIL message editor is activated by selecting the READ/ENTER EMAIL
option from the main menu or by pressing ALT-E. The editor may also be
accessed directly from the DOS prompt by typing:

C> DB EDIT

Assuming the DB EDIT command was found, you quickly get a display
similar to the following:


F1-Enter, F2-Reply, F3-Edit, F4-List, F5-Kill, F6-Areas, ESC-Menu      D'Bridge
                                                                    1.30/001002
/-READ/EDIT EMAIL-------------------------------------------------------------\
|Msg # 250                                                                    |
|Date: 11 Jun 92 18:10:34                                                     |
|From: Chris Irwin                                                            |
|  To: Tom Ordelman on 201:200/0  D'Bridge Support/Europe                     |
|Subj: Greetings from freezing Cincinnati!                                    |
|-----------------------------------------------------------------------------|
|Hello Tom,                                                                   |
|                                                                             |
|I was just writing to let you know that I've been sitting out in the snow    |
|finishing the D'Bridge documentation. I think that you will find that it     |
|is well-written and quite clear. It's Thursday, so I'll be out playing poker |
|this evening... Give me a call when you get a chance tomorrow!               |
|                                                                             |
|Regards,                                                                     |
|Chris, 201:201/0                                                             |
|                                                                             |
|                                                                             |
|                                                                             |
|                                                                             |
\-----------------------------------------------------------------------------/
Area: D'Bridge network mail         Msgs: 273   Highest: 298   Last read: 276


This is the "READ" mode of D'Bridge. Using this screen, you can enter,
read and reply to messages along with a variety of utility functions.
Each function will be described in detail in the next few sections.
Remember that a quick way to get out of the editor is to press CONTROL-C.
This is a perfectly acceptable way to get out, it's just like using
the QUIT menu option.





-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
5.00  EMAIL MESSAGE EDITOR
                                                                             139
--------------------------------------------------------------------------------G


  


      GRIGHT and LEFT arrows - NEXT and PREVIOUS MESSAGEH

      Pressing the RIGHT arrow key will display the next message in the
      current area; pressing the LEFT arrow will display the previous one.


      GF1 or E - ENTER A MESSAGEH

      As soon as you press the F1 key or the letter "E" D'Bridge will go into
      "EDIT" mode, clearing the screen and starting with a blank message.


      GF2, R, Q or > - REPLY TO A MESSAGEH

      Replying to a message is the same as entering a new one; the difference
      is that the "TO" name and address is taken automatically from the
      message currently on the screen. The editor will move the "FROM" infor-
      mation to the "TO" field. This is handy to keep from making a mistake
      typing the name or network address. There are four keys that create a
      reply message:

          GF2H   Asks for QUOTED or NORMAL reply.
          GRH    Creates a NORMAL reply.
          GQH    Creates a QUOTED reply.
          G>H    Same as Q.

      If you select a NORMAL reply, the screen will clear and just the "TO"
      and "FROM" information will be displayed. If you specify a QUOTED re-
      ply, the entire message you are replying to will be QUOTED, so that
      you may remind who you are communicating with and exactly what it is
      you are replying to. QUOTED text has each line starting with a ">"
      character indicating that the text came from the other person.
      For example, if a message reads:


          What time can I call you about the pricing information?


      Your QUOTED reply might look like:


          CI> What time can I call you about the pricing information?

          Give me a call around 4:00, if I'm not in, please leave the
          information with my secretary.





-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
5.00  EMAIL MESSAGE EDITOR
                                                                             140
--------------------------------------------------------------------------------G






      QUOTED replies are quite valuable for reminding the receiver exactly
      what you're talking about. In fact, if the receiver of the above message
      wanted to reply to you, the reply might look like:


          CI> What time can I call you about the pricing information?

          TO> Give me a call around 4:00, if I'm not in, please leave the
          TO> information with my secretary.

          I can't - I'm flying to Paris today. I'll call you when I
          get back.



      GF3 or O - EDIT AN OLD MESSAGEH

      Sometimes, you will enter a message, then realize you wish to make a
      change before sending it. The F3 or "O" option does just that. It
      allows you to edit the currently displayed message. If the message
      displayed is not from you, you will be asked "You didn't enter this
      message, edit anyway?". Generally, it's not "nice" to edit other
      people's mail, but D'Bridge allows you to do this anyway.


      GF4 or L - LIST MESSAGESH

      Pressing F4 or "L" will put the editor into "LIST" mode. While in
      "LIST" mode, the display changes to show you all the message headers.
      This is handy when you want to scan for a particular message quickly.
      Until you press the ESC key, the editor will remain in LIST mode and
      the function keys have a different meaning. While in this mode, you
      may view message headers and select a group of messages to KILL or
      PRINT.


LIST: Include, Exclude, All, None, Page, Display, Group, ESC-Exit      D'Bridge
                                                                    1.50/001002
/-READ/EDIT EMAIL-------------------------------------------------------------\
|/-LIST MESSAGES--------------------------------------------------------------\
||Msg #  Date   From                   To                      Subject        |
|| 292   20 Apr Chris Irwin            Tom Ordelman  201:200/0 D'Bridge Suppor|
|| 293   20 Apr Chris Irwin            Joaquim Homri 135/20    Re: ZMODEM     |
|| 294   20 Apr ARCmail                Sysop         107/246   FF239209.MO1   |
|| 295   20 Apr ARCmail                Sysop         108/871   F98429E1.MO1   |
|| 296   20 Apr ML-UPD 1.5   11/109    Megalist Admi           000B0071.MLA   |



-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
5.00  EMAIL MESSAGE EDITOR
                                                                             141
--------------------------------------------------------------------------------G


  

      The first line will be highlighted with a light bar. Using the UP, DOWN,
      PGUP and PGDN keys, you can move the light bar to the desired message.
      When you press the ESC key, the specified message will be displayed and
      DBEDIT will return to READ mode.


      While the LIST window is on the screen, the following commands are
      enabled:


          GI - INCLUDEH

          When you press the I key, a star ( * ) will appear next to the
          message number on the highlighted line. This means this message
          is "included" for processing by group commands.


          GE - EXCLUDEH

          Pressing the E key will remove a star "*" from the highlighted
          line. This is used to un-include (de-select) the current message
          from processing by the group commands.


          GA - ALLH

          If you press A, all of the messages will be included for processing
          by group commands and they will all have a star "*" next to them.
          This is handy to use in conjunction with "E" (EXCLUDE) when you
          want to process most of the messages with group commands.


          GN - NONEH

          Pressing N will remove all the stars "*" from the LIST MESSAGES
          window. None of the messages will be selected for group commands.


          GP - PAGEH

          Pressing P will select all messages on the currently displayed page.


          GD - DISPLAYH

          Pressing D will toggle the LIST display between showing the TO, FROM
          and SUBJECT and showing the entire SUBJECT line.




-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
5.00  EMAIL MESSAGE EDITOR
                                                                             142
--------------------------------------------------------------------------------G




          GG - GROUPH

          Pressing G will display another list of options called GROUP COM-
          MANDS. With these commands, you can PRINT or KILL all of the
          selected messages automatically. This can be a very "dangerous"
          command, so make sure you know exactly what you're doing if you
          use it. The following GROUP COMMANDS are allowed:


              GP - PRINT  (group command)H

              The P group command will PRINT all messages that have stars "*"
              next to them and were previously included while in the "LIST"
              mode. Obviously this option will work only if you have a printer
              connected; press the ESC key to cancel the PRINT operation.


              GK - KILL  (group command)H

              The Kill group command will KILL all messages that were included
              and have a star "*" next to them. Make sure you have double-
              checked which messages were included because once they are
              KILLED, they are permanently gone. (Perhaps Professor Norton
              could get them back... ).


      GF5 or K - KILL A MESSAGEH

      Pressing F5 or "K" allows you to permanently KILL (erase) a message from
      your disk. It will ask you "ARE YOU SURE?" just in case you pressed it
      accidentally; use this option with caution!


      GF6 or A - CHANGE MESSAGE AREASH

      The editor allows you to have any number of local and ECHOmail areas.
      Pressing F6 or "A" will display a list of all the areas you have de-
      fined in your configuration. Select the desired area by moving the
      light bar up and down, then pressing ENTER when the desired area is
      highlighted. You may also enter the AREA NUMBER and press ENTER. Both
      ways accomplish the same thing. If you are running a basic EMAIL
      system, you probably will not have any use for this option.









-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
5.00  EMAIL MESSAGE EDITOR
                                                                             143
--------------------------------------------------------------------------------G




      GESC - EDITOR MENUH

      All of the other editor features are accessible by using the EDITOR
      MENU. Pressing ESC will display the menu and allow you to select any
      of the following options:

        - Area information
        - Display statistics
        - Forward message
        - Copy/move message
        - Print message
        - Write message to file
        - Username AKAs/Alias addresses
        - Search headers/text
        - PUSH/DROP to DOS





































-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
5.01  USING EDIT MODE
                                                                             144
--------------------------------------------------------------------------------G






5.01  USING EDIT MODE

After you have selected either the ENTER, REPLY or EDIT command, the
editor will be in "EDIT" mode. When you are using this mode, all of the
keys have different meanings than they do in READ mode. The top line of
the screen lists all the valid commands.

      The cursor will first appear on the "TO" field. Here, you enter the
      name of the person to whom the message is addressed. If you have
      selected the USERNAME INDEX option (in the nodelist configuration),
      the editor scans for a username simply by entering part of the name.
      For example, if you enter "CHRIS", DBEDIT will display all of the
      users who have a first name of Chris, Christine, Christy or Christo-
      pher and allow you to select the desired person. This search is based
      on FIRST NAME, so entering a last name won't work.

      If you wish to send the same message/files to different destinations,
      press the F8 key while on the "TO" field. This will display a window
      which allows you to enter any number of destinations, one per line in
      the following form:

      <ADDRESS>[,<PRIORITY>] <USER NAME>

      ie.

      1:110/68 Chris Irwin

                        Valid priorities are: GHH - Hold
                                              GNH - Normal
                                              GCH - Crash
                                              GIH - Immediate

      If you routinely send information to the same list of systems, you
      will want to take advantage of the "distribution list" feature.
      Instead of an address and a username, you can specify the names of
      any number of distribution lists to include. A distribution list is
      simply a text file containing the same information as above: address
      and username.

      After you have entered or selected the name of the person you are
      writing the message to, the editor will say "on" and expect you to
      enter the address of the user. If you selected the username from the
      D'Bridge database, the address should already be there and you simply
      press ENTER. If you are entering this message to someone not in the
      database or have specified NO in the CREATE USERNAME INDEX field in
      the nodelist setup, you will need to enter the address.



-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
5.01  USING EDIT MODE
                                                                             145
--------------------------------------------------------------------------------G


  
  

      The editor provides 5 function keys to help you to find an address:

        GF3 - List nodesH

        Pressing F3 will display a list of all the systems in the currently
        selected ZONE:NET. Moving the light bar, highlight the desired system
        and press ENTER. If you can't find the address in this NET, press the
        ESC key.

        GF4 - Change netH

        The F4 key allows you to change the currently selected ZONE and NET
        numbers. Enter the ZONE and NET numbers desired separated by a colon
        ( : ) character. If you specify just one number, it is assumed to be
        the NET; the ZONE remains the same. After changing the ZONE and NET
        you may use the F3 key again to scan for individual systems.

        GF5 - List netsH

        Pressing F5 will give you a list of all ZONE and NET numbers in your
        nodelist and allow you to choose one as the currently selected NET.
        Similar to the F6 function, move the light bar to the desired line
        and press the ENTER key.

        GF6 - List zonesH

        This function is identical to F5 above except it lists the ZONES that
        are compiled into the nodelist.

        GF7 - Set ZONE:NETH

        Allows you to directly set the ZONE and NET defaults.


     After you have selected the destination address, the cursor will move to
     the SUBJECT line. If you want to send a file along with this message or
     if you wish to request one, you must enter the filename(s) as the sub-
     ject. If you are SENDING files, you must specify the actual filename
     including drive and directory. If you are requesting a file, just specify
     the filenames you wish to receive. Obviously, if you are neither SENDING
     nor REQUESTING files, the SUBJECT line is simply a field which briefly
     states the purpose of the message.








-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
5.01  USING EDIT MODE
                                                                             146
--------------------------------------------------------------------------------G



     While the cursor is on the SUBJECT field, the following function keys are
     in effect:

       GF3 - Send fileH

       Pressing F3 sets the FILE-ATTACH attribute for the message. This means
       all the files listed in the SUBJECT line (labeled ENCL) will be sent
       with the message.

       GF4 - File requestH

       Pressing the F4 key sets the FILE-REQUEST attribute for the message.
       This means that when the message is sent, D'Bridge will request that
       the remote system sends you all the listed files.

       GF5 - Update requestH

       The F5 key sets the UPDATE-REQUEST attribute for the message. UPDATE-
       REQUESTS are the same as FILE-REQUESTS in D'Bridge.

       GF6 - CancelH

       Pressing F6 cancels a FILE-ATTACH, FILE-REQUEST or UPDATE-REQUEST and
       makes the SUBJECT line be just informational.


When the cursor is BELOW the line separating the heading from the message
text, the editor acts just like most word-processing systems.
You may simply type in your message, using the BACKSPACE and ARROW keys
to edit. You may notice that when you press the ENTER key, a "HARD RETURN
SYMBOL" is generated. Normally, you should not press the ENTER key unless
you wish to start a new paragraph or are entering a list of some kind
which should not be "rejustified" on the receiving system. Because D'Bridge
can communicate with other EMAIL systems and bulletin boards, the messages
might not look exactly the same on the receiving system as they look on
your screen when you enter them. For example, some EMAIL editors only
allow the display of 66-column text. If you were to use HARD RETURNS (by
pressing ENTER on each line), your message would be very hard to read on
the other EMAIL system. Get in the habit of only pressing the ENTER key
when you want to start a new paragraph.

While in the "EDIT" mode, the following function keys are in effect:

       GF1 or ESC-Q-A - ABORTH

       If you have accidentally gone into "EDIT" mode or wish to cancel your
       edit session and completely "throw away" the message you are entering,
       use the ABORT option. The editor will ask "ARE YOU SURE?", just to
       make sure you didn't press F1 accidentally. ABORTING your editor will
       return you to "READ" mode.


-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
5.01  USING EDIT MODE
                                                                             147
--------------------------------------------------------------------------------G




       GF2 or ESC-Q-S - SAVE MESSAGEH

       Pressing F2 will immediately save the current message to disk. Unless
       otherwise specified, it will be sent during the next scheduled mail
       event. If you press F2 by accident, you can always use the EDIT OLD
       option to continue or change it. SAVING your message will return you
       to "READ" mode.

       GF3 or CONTROL-N - INSERT LINEH

       The INSERT LINE option will add a blank line BEFORE the line where the
       cursor is located.

       GF4 or CONTROL-Y - DELETE LINEH

       The DELETE LINE option does just that; it erases the line that the
       cursor is on.

       GF5/F6 - MARKH

       This is an "advanced" feature; The F5 key marks the beginning of a
       block of text; the F6 key marks the end. "Marked" text is designated
       by reverse video for the selected block. This is used in conjunction
       with the BLOCK commands described later; they allow you to COPY, MOVE,
       DELETE or WRITE the selected block of text to a file.

       GF10  - FLAGSH

       D'Bridge allows you to set up to 15 different "FLAGS" on an EMAIL
       message. Pressing F10 displays a menu of all the flags; only the
       ones that are "bright" are allowed. Depending on certain criteria,
       such as FAX addressing, etc, certain options are not always available.
       The currently defined flags are as follows:


          GPrivateH         This message is intended for the addressee only.
                          If the receiving system is a BBS, only the Sysop
                          should be able to read the message.

          GHoldH            HOLD priority should be used for this message.
                          Please note that unless you specify XMAIL for this
                          message, the message will be sent if there is any
                          other outbound traffic for the destination system;
                          if you enter a CRASH message to the same system,
                          both messages will be sent unless you XMAIL it.






-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
5.01  USING EDIT MODE
                                                                             148
--------------------------------------------------------------------------------G




          GCrashH           CRASH priority means the message should be sent
                          right-away, even during the UNEVENT. Only messages
                          with CRASH or IMMEDIATE priority will be sent during
                          the UNEVENT. CRASH messages might cost more due to
                          making a long-distance phone call during the day
                          rather than during a late-night scheduled event.
                          CRASH priority messages never get routed, but go
                          directly to their destination.

          GImmediateH       An IMMEDIATE priority message means the message will
                          be sent right away and have priority over other out-
                          bound traffic that has no IMMEDIATE priority.
                          This is handy for getting an important message out
                          when there's a lot of other outbound traffic in the
                          queue.

          GXMailH           If you specify an EMAIL message to be XMAIL, this
                          means the D'Bridge mail scanner will pack the
                          message in an outbound XMAIL archive using the
                          specified archive program: ZIP, LHA, ARJ, PAK, ARC
                          or ZOO. If you use this method, all priorities:
                          IMMEDIATE, CRASH, NORMAL and HOLD are treated
                          separately; HOLD mail will never be sent unless the
                          other system calls to pick it up or the operator
                          specifically overrides it in the VIEW/MODIFY QUEUE,
                          ALT-V mode.

          GKill/SentH       If a message has the KILL/SENT flag, it will be
                          erased from your NETmail area as soon as it has been
                          successfully transmitted. This is good for messages
                          that have been sent to multiple destinations.

          GArchive/SentH    The ARCHIVE/SENT flag causes a message to be written
                          to the specified OUTBOUND MAIL ARCHIVE specified on
                          the PACKET/MAIL CONTROL screen. After the message
                          text has been stored in this file, the message is
                          erased from the system.

          GDirectH          If a message is flagged as DIRECT, the normal
                          routing specified in the ADVANCED ROUTING screen of
                          the event setup is ignored; the message is sent
                          directly to its final destination.

          GUse ZonegateH    If you wish an inter-zone message to be routed
                          through the official "zonegate", use this flag.

          GRoute/HUBH       If you want a message to be HOST- or HUB-ROUTED,
                          specify this flag.



-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
5.01  USING EDIT MODE
                                                                             149
--------------------------------------------------------------------------------G



       You can change the flags either by moving the highlight bar with the
       UP and DOWN arrows and pressing ENTER, or by pressing the first letter
       of the desired flag. Press ESC when you are finished setting message
       flags.


       GESC - MENUH

       The rest of the "EDIT" mode commands are activated from the menu.
       Pressing the ESC key will display the menu.


       GBLOCK: READH

       The BLOCK READ option allows you to read in text from a standard text
       file. It will ask for the name of a text file and whether you want to
       use HARD of SOFT returns. If the text is in the form of paragraphs, use
       the SOFT option; if you are reading in columns of numbers or some sort
       of text you don't want to be reformatted, specify HARD.

       GBLOCK: WRITEH

       Assuming you have already used the F5 and F6 keys to highlight a
       block of text, the BLOCK WRITE option allows you to write it to a
       standard text file.

       GBLOCK: COPYH

       The BLOCK COPY option will move the text highlighted with the F5 and
       F6 keys to the position where the cursor is currently located. This
       option will not work if the cursor is within the highlighted region.

       GBLOCK: MOVEH

       The BLOCK MOVE option is the same as the BLOCK COPY command except
       the text is actually moved rather than copied to the current cursor
       position.

       GBLOCK: DELETEH

       The BLOCK DELETE command will erase all text you highlighted with
       the F5 and F6 keys.

       GQUIT: SAVEH

       The SAVE option is the same as the F2 key. It saves the current message
       and returns to "READ" mode.

       GQUIT: ABORTH

       The ABORT option allows you to "throw away" the current edit session.
       This is the same as the F1 key.

-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
5.01  USING EDIT MODE
                                                                             150
--------------------------------------------------------------------------------G




       GQUIT: DROP TO DOSH

       The DROP TO DOS command allows you access to DOS while you are editing
       a message. This method frees all available memory by swapping the
       editor to EMS or disk. When you are finished using DOS commands or
       programs, type "EXIT" to return to your edit.

       GQUIT: PUSH TO DOSH

       The PUSH TO DOS command allows you access to DOS while you are editing
       a message. When you are finished using DOS commands or programs, simply
       type "EXIT" to return to the editor.


       To summarize, we have included the following table of keys and their
       effect in various "edit" modes:


      Mode/field   Key(s)      Effect
      -------------------------------------------------------------------
      G"TO"         F3H          List users starting with the one entered
                   GF8H          Multiple destinations/Distribution list(s)

      G"ADDRESS"    F3H          List all NODEs in the currently selected NET
                   GF4H          Select a new ZONE and NET
                   GF5H          List all NETs in the nodelist
                   GF6H          List all NETs in the selected ZONE
                   GF7H          List FAX entries

      G"SUBJECT"    F3H          Send file(s)
                   GF4H          File-request
                   GF5H          Update-request
                   GF6H          Cancel send/request

      GEDITOR       UPH          Moves the cursor up one line
                   GDOWNH        Moves the cursor down one line
                   GLEFTH        Moves the cursor left one character
                   GRIGHTH       Moves the cursor right one character
                   GDELETEH      Deletes the character under the cursor
                   GINSERTH      Toggles "insert mode" ON/OFF
                   GHOMEH        Moves cursor to the start of line/page/message
                   GENDH         Moves cursor to the end of line/page/message
                   GTABH         Moves cursor to the next tab position
                   GBACKSPACEH   Moves cursor left one character and erases
                               previous character if at the end of a line or
                               "insert mode" is ON.
                   GF1H          Aborts the current edit, returns to READ mode
                   GF2H          Saves the message, returns to READ mode




-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
5.02  USING READ MODE
                                                                             151
--------------------------------------------------------------------------------G






5.02  USING READ MODE



"Read" mode allows the user to read EMAIL messages in any of the defined
message areas. There are several keys that are used to control "read" mode
with a single keystroke:



      GUP and DOWN arrowsH

      The UP and DOWN arrow keys move the currently displayed message UP and
      DOWN on your screen allowing you to read more text than will fit on the
      screen.


      GPGUP and PGDNH

      The PGUP and PGDN keys work like the UP and DOWN arrows except they
      advance the text one page at a time.


      GHOME and ENDH

      The HOME key displays the first page of a message; the END key displays
      the last page.


      GLEFT and RIGHT arrowsH

      The RIGHT arrow displays the NEXT message; the LEFT arrow displays the
      previous message.


      G+ and - keysH

      The PLUS and MINUS keys allow you to read by "thread". If a message
      says "Reply to #nnn", you can read the original message (the one replied
      to) by pressing the MINUS (-) key. Pressing PLUS (+) displays the next
      message in the "thread". This is most useful for "local" areas and does
      not usually work in your Network mail area.


      GNumber keys (0-9)H

      You can advance to the desired message simply by entering the message
      number and pressing ENTER.


-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
5.02  USING READ MODE
                                                                             152
--------------------------------------------------------------------------------G




D'Bridge allows for virtually any number of message areas to be defined
in the area manager. While in READ mode, you may select between the
different message areas by using the F6 or "A" command. This command
displays the following screen which allows you to select a new message
area:



F1-Enter, F2-Reply, F3-Edit, F4-List, F5-Kill, F6-Areas, ESC-Menu      D'Bridge
                                                                    1.50/001002
/-READ/EDIT EMAIL-------------------------------------------------------------\
|Msg # 251                                                                    |
|Date: 07/-AREA CHANGE-----------------------------------------------------\  |
|From: Ch|  0    NETMAIL             Network mail area                     |  |
|  To: To|  2    COMPLAIN            Complaint Department                  |  |
|Subj: Gr|  4    DB_ALPHA            D'Bridge ALPHA conference             |  |
|--------|  6    FTSC                Technical standards committee         |--|
|Hello To|  7    NETDEV              Network developer's conference        |  |
|        |  10   SYSOP18             Region 18 Sysop conference            |  |
|I was ju|  11   ZMODEM              ZMODEM conference                     |  |
|finishin|  12   ECHOECHO            ECHOmail working group                |  |
|is well-|  19   SYSOP110            NET 110 Sysop conference              |  |
|I won't |  21   DBRIDGE             D'Bridge ECHO                         |  |
|        |  22   QUICKBBS            QuickBBS ECHO                         |  |
|Regards,|  24   TBBS                TBBS ECHO                             |  |
|Chris, 2|  9999 BADECHO             Bad ECHOmail area                     |  |
|        |                                                                 |  |
|        |                                                                 |  |
|        \-----------------------------------------------------------------/  |
|                                                                             |
|                                                                             |
\-----------------------------------------------------------------------------/


Change areas either by highlighting the desired area using the UP and
DOWN arrows and pressing ENTER or by entering the TAG or NUMBER of the
message area you desire. Pressing ESC will leave you in the same area
you were in before.

Once DBEDIT is displaying another message area, it should be displaying
the same message as was there the last time you exited from that area.
This is a feature of the so-called LAST READ POINTER, which is maintained
for each user in the editor separately. D'Bridge stores the LAST READ
POINTERS on your disk so that they are the same the next time you read
your mail.






-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
5.02  USING READ MODE
                                                                             153
--------------------------------------------------------------------------------G





      To summarize, we have included the following table of keys and their
      effect in various "read" modes:


      Mode         Key(s)       Effect
      --------------------------------------------------------------------
      GREAD         F1, EH        Enter a new message
                   GF2H           Enter a reply to a message (see REPLY mode)
                   GRH            Enter a normal reply
                   GQ, >H         Enter a quoted reply
                   GF3, OH        Edit an old message
                   GF4, LH        Change to LIST mode
                   GF5, KH        Kill (erase) the current message
                   GF6, AH        Change message areas
                   GESCH          Displays the main menu (advanced functions)
                   GLEFT arrowH   Displays the previous message
                   GRIGHT arrowH  Displays the next message
                   G0..9H         Selects message number
                   GENTERH        Selects message or advances to the next one
                   GUP arrowH     Scrolls the message up one line
                   GDOWN arrowH   Scrolls the message down one line
                   GPgUpH         Scrolls the message up one screen
                   GPgDnH         Scrolls the message down one screen
                   GHOMEH         Displays the beginning of the message
                   GENDH          Moves to the end of the message
                   GCTL-CH        Leave editor

      GREPLY        F1H           Enter a quoted reply
                   GF2H           Enter a normal reply
                   GESCH          Cancel reply

      GLIST         UP arrowH     Moves the highlight bar up one line
                   GDOWN arrowH   Moves the highlight bar down one line
                   GPgUpH         Scrolls the screen back one page
                   GPgDnH         Scrolls the screen forward one page
                   GENTERH        Select current message, return to READ mode
                   GIH            Includes the highlighted message
                   GEH            Excludes the highlighted message
                   GAH            Includes all messages
                   GNH            Includes no messages (excludes all)
                   GPH            Includes all messages on the current page
                   GGH            Enters GROUP mode
                   GESCH          Exits LIST mode, displaying the same message

      GGROUP        PH            Print all included messages
                   GKH            Kills (erases) all included messages
                   GESCH          Exits GROUP mode, returns to LIST mode




-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
5.03  ADVANCED FEATURES
                                                                             154
--------------------------------------------------------------------------------G






5.03  ADVANCED FEATURES



There are several other features available from DBEDIT; they include
forwarding, copying, moving or printing messages, searching text and
selecting alternate addresses or "AKA" usernames. To activate the
EDITOR MENU, press ESC while in "READ" mode; the following menu will
be displayed:



Editor menu:  UTILITIES    SEARCH    QUIT                              D'Bridge
              /--------------------\                                1.50/001002
/-READ/EDIT EM| Area information   |------------------------------------------\
|Msg # 252 Wri| Forward message    |                                          |
|Date: 11 Jun | Copy message       |                                          |
|From: Chris I| Move message       |                                          |
|  To: Tom Ord| Print message      |Bridge Support/Europe                     |
|Subj: Greetin| Write msg to file  |                                          |
|-------------| New username       |------------------------------------------|
|Hello Tom,   | Use alias address  |                                          |
|             \--------------------/                                          |
|I was just writing to let you know that I've been sitting out in the snow    |
|finishing the D'Bridge documentation.  I think that you will find that it    |
|is well-written and quite clear.  It's Thursday, so I'll be playing poker    |
|tonight... Give me a call when you get a chance tomorrow!                    |
|                                                                             |
|Regards,                                                                     |
|Chris, 1:110/68                                                              |
|                                                                             |
\-----------------------------------------------------------------------------/



      Following are descriptions of all the options available from the main
      editor menu:


      GUTILITIES: AREA INFORMATIONH

      The AREA INFORMATION screen functions identically to the AREA CHANGE
      function described in the previous section. The difference is that
      AREA INFORMATION displays the number of messages, last read, low and
      high message numbers in each area. D'Bridge displays the areas that
      have new, unread mail in the selected BRIGHT color. Areas which have
      new mail have the HIGHEST message different than the LAST READ.


-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
5.03  ADVANCED FEATURES
                                                                             155
--------------------------------------------------------------------------------G


  

The information screen looks like this:


/-AREA INFORMATION------------------------------------------------------------\
|#     Name                Description                   Low  High    LR  Msgs|
|0     NETMAIL             Network mail area              16  1477  1471   190|
|2     COMPLAIN            Complaint Department            1  1458  1458    17|
|4     DB_ALPHA            D'Bridge ALPHA conference     279  1479  1479   268|
|6     FTSC                Technical standards committee   1   295   261   295|
|7     NETDEV              Network developer's conferenc   1   107   107    95|
|10    SYSOP18             Region 18 Sysop conference      1   479   479   402|
|11    ZMODEM              ZMODEM conference               1    29    29    29|
|12    ECHOECHO            ECHOmail working group          1     3     3     3|
|19    SYSOP135            NET 135 Sysop conference        1   178   175    15|
|21    DBRIDGE             D'Bridge ECHO                   4  1332  1332   125|
|22    QUICKBBS            QuickBBS ECHO                 130  1450  1450   199|
|24    TBBS                TBBS ECHO                     621  1182  1080   102|
|9999  BADECHO             Bad ECHOmail area               1     1     1     1|
|                                                                             |
|                                                                             |
|                                                                             |
\-----------------------------------------------------------------------------/



      GUTILITIES: FORWARD MESSAGEH

      The FORWARD MESSAGE option allows you to re-route or send a copy of the
      current message to another system. You simply enter the TO, ADDRESS and
      specify the priority and whether to keep a the original copy of the
      message.


      GUTILITIES: COPY/MOVE MESSAGEH

      The COPY and MOVE MESSAGE commands can only be used when you have
      specified alternate message areas. It will copy or move the current
      message from one area to another.


      GUTILITIES: PRINT MESSAGEH

      Assuming you have a printer connected to your "PRN" port, DBEDIT will
      print the current message.







-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
5.03  ADVANCED FEATURES
                                                                             156
--------------------------------------------------------------------------------G




      GUTILITIES: WRITE MSG TO FILEH

      The WRITE MSG TO FILE option allows you to export a message to a
      standard text file. This might be used to transfer data from D'Bridge
      to a word processor or spreadsheet.


      GUTILITIES: NEW USERNAMEH

      If you have defined more than one USER NAME in the SETUP EDITOR PARAM-
      ETERS menu, you can select from any of these to be the current user.
      This is the same screen you receive when you first start the editor
      with more than one user defined.


      GUTILITIES: ALIAS ADDRESSESH

      For systems who have defined multiple ALIAS ADDRESSES on the BASIC
      CONFIGURATION menu, this function allows you to enter messages
      addressed from one of your aliases.


      GSEARCH: HEADERS or TEXTH

      The SEARCH HEADERS or TEXT options allow you to search through your
      messages for specific keywords. Simply enter the word to search for
      and D'Bridge will find and highlight all occurrences.


      GQUIT: EXITH

      Terminates DBEDIT and returns to D'Bridge.


      GQUIT: DROP/PUSH TO DOSH

      PUSH TO DOS allows you to enter DOS commands and run other programs
      while DBEDIT is still in memory. Type "EXIT" to return to DBEDIT.














-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
6.00  UNDERSTANDING THE QUEUE
                                                                             157
--------------------------------------------------------------------------------G






6.00  UNDERSTANDING THE QUEUE

Everything D'Bridge does is based on the entries in the outbound queue
window. Once you understand what the "queue" is and how it is organized,
you will have a good overview of the program's structure.

The "GQUEUEH"

The outbound queue is a database containing entries for each of the
systems that currently have "outbound" mail. When D'Bridge first starts,
the outbound queue is created by scanning the NETmail area (either in
Fido or QuickBBS format), then scanning the disk-based queue for polls,
file-requests, etc. This database is then sorted by address and finally
displayed in the bottom-left window.

The queue can best be understood by disabling the SCHEDULE window so
the entire QUEUE window will be displayed. (Press ALT-S to toggle the
schedule window on and off).


/-QUEUE----------------------------------------------------------------------\
| Destination    Try/Con/Bad/Online   Priorities/Pkt types  Status           |
|*110/68.1        0   0   0  00:00     C N            X M   Hold/Unlisted    |
| 105/3           0   0   0  00:00         H          X     Hold             |
| 108/0           0   0   0  00:00       N        F     M   Decision at 17:00|
| 135/3          30   0   0  00:00     C              X     Try limit        |
| 135/142         1   1   0  00:32                          Sent successfully|
| 143/18          1   0   0  00:00         H          X     Hold             |
| 167/999         0   0   0  00:00     C                M   Hold/Unlisted    |
| 2:243/40        0   0   0  00:00         H          X     Hold             |
|*8:77/7          0   0   0  00:00       N      T       M   Hold/Unlisted    |
\----------------------------------------------------------------------------/


      To understand the queue, you simply need to have a good understanding of
      the individual fields:


      GDESTINATIONH

      The destination is simply the Fidonet or FAX address of the system to
      contact. The destination is not always the "ultimate" destination due
      to possible routing, but is the system to be called.






-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
6.00  UNDERSTANDING THE QUEUE
                                                                             158
--------------------------------------------------------------------------------G




      GTRYH

      The try field simply shows how many times D'Bridge has tried to call
      the destination system during the current event. If there is a plus
      sign ( + ) behind the number, it has been manually reset this event
      by the operator.


      GCONH

      This field shows the number of actual connections (carrier detects)
      made as the result of outbound calls to the specified system.
      Inbound connections do not count in the CON field. Again, if
      there is a plus sign ( + ) after the number, it has been manually
      reset this event.


      GBADH

      This field shows the number of failures encountered during outbound
      sessions this event. In general, a failure means it was a wasted
      phone call for one reason or another (generally, the reason or error
      is listed in the log file). Again, the plus sign after the number is
      an indication that it has been manually reset (using the ALT-V com-
      mand).


      GONLINEH

      The online field keeps track of total connect time as a summation of
      all outbound connects. This field is not reset until the end of the
      current event.


      GPRIORITIESH

      The priorities field shows which priorities of mail are contained
      within the queue entry. This field may contain any or all of the
      following:

                       GIH   Immediate      (Highest priority mail)
                       GCH   Crash          (High priority mail)
                       GNH   Normal         (Normal, budget priority mail)
                       GHH   Hold           (Mail held for pickup)







-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
6.00  UNDERSTANDING THE QUEUE
                                                                             159
--------------------------------------------------------------------------------G


  

      GPACKET TYPESH

      The packet type field contains what types of mail packets are contained
      within the queue entry. The field may contain any or all of the follow-
      ing:

                       GRH   Outbound AREAFIX request  (ALT-R)
                       GTH   Transmit file(s)          (ALT-T)
                       GFH   File-request(s)           (ALT-F)
                       GPH   Poll                      (ALT-P)
                       GXH   XMAIL                     (Editor/BBS/ECHOmail)
                       GMH   NETmail                   (Editor/BBS)


      GSTATUSH

      The STATUS field is most-likely the most important one to understand.
      If you are having trouble understanding why a mail packet is not being
      sent, the STATUS indication should be able to tell you exactly what is
      wrong. Please read and understand what the following status indications
      mean:


         GHoldH

         The mail can't be sent because "HOLD" is the only priority specified
         for the mail. (You told it to do this when you entered a message or
         set-up an ECHOmail area).


         GHold/UnlistedH

         This indication means it is impossible to call this system
         because it is either not in your nodelist or it is listed as
         "unpublished". The destination system must call in for its mail
         or you need to get a nodelist containing its phone number.


         GMax cost holdH

         The cost of the message you want to send (as indicated in the editor)
         exceeds the maximum allowed during the current event.


         GTemporary holdH

         This means the operator has used the VIEW/MODIFY QUEUE mode to
         set the entry's status to "hold". To send the message, select
         ALT-V again and specify "SEND".


-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
6.00  UNDERSTANDING THE QUEUE
                                                                             160
--------------------------------------------------------------------------------G




         GForced holdH

         This means the operator has specified a forced priority of hold
         at some time in the past. This may be changed by using the ALT-V
         command to remove the "forced" status.


         GPriority holdH

         This means the given mail event does not allow the specified
         priority of mail to be transmitted. (This is related to the
         PRIORITIES field in the advanced routing of the schedule).


         GNot a CM systemH

         In this event, you have specified that only those systems with a "CM"
         (continuous mail) flag may be called. (Again, this is a function of
         the advanced routing screen of the scheduler).


         GCM not allowedH

         In this event you have told D'Bridge not to call any "CM" systems.


         GDecision at 17:00H

         This means that because of the cost-control data, no outbound call
         may be placed to this address until at least 17:00. At 17:00, a
         decision will be made as to whether it may be called or not. This is
         the mechanism which allows D'Bridge to call-out only at the most
         economical times for normal priority mail. If you want the mail to
         be sent now, you should use a higher priority or change the cost-
         control data in the ACCOUNTING/TRANSLATION screen.


         GTry limitH

         This means D'Bridge has exceeded the maximum number of times
         allowed to try calling the remote system. Typically, you are not
         charged for non-connects, but you might want a limit on how many
         tries (gotta give up sometime... ).


         GSession limitH

         You have reached the maximum number of sessions allowed within the
         given event. In the case of long-distance systems, this has most-
         likely saved you a wasted phone call, making too many ECHOmail calls
         in the same event...

-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
6.00  UNDERSTANDING THE QUEUE
                                                                             161
--------------------------------------------------------------------------------G





         GFailure limitH

         This means you have reached the maximum failures (bad sessions)
         allowed for the event. Maybe something is wrong with the remote
         system?


         GPicked upH

         This means all mail has been successfully picked up by the remote
         system. This saves D'Bridge the trouble and expense of making the
         call itself.


         GSent successfullyH

         This means you called the other system, sent the mail and all went
         well. All mail is confirmed as delivered to the "destination" sys-
         tem; remember that routed mail is now in the hands of another
         operator and is not 100% guaranteed to arrive.


         G----------H

         The dashes (-----) mean that the packet is ready to be sent, now.


























-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
6.01  CREATING A PRIVATE NODELIST
                                                                             162
--------------------------------------------------------------------------------G






6.01  CREATING A PRIVATE NODELIST

Without a nodelist, D'Bridge can not make outbound EMAIL calls. Your
nodelist tells D'Bridge which systems it can communicate with and contains
information such as name, phone number and baud rate. Nodelists are text
files that can be created by any standard text editor. It lists ZONES,
NETS and NODES, one per line, using the "St. Louis format", the same style
used by Fidonet, Alternet and many other public EMAIL networks. You may
specify any number of St. Louis or private nodelists in D'Bridge.
Here's a sample NODELIST for a bogus private network:


   ,HOST,1720,Main_System,Cincinnati_OH,Rancy_Neagan,1-513-777-0007,9600,CM
    ,1,New_York_Office,Bronx_NY,Quan_Dale,1-202-555-9343,2400,CM
    ,4,Western_Division,Los_Angeles,Clinn_Billton,1-714-555-5286,2400,CM
    ,6,XYZ_Canada,Quebec,Lawrence_DeLaMouche,1-418-555-2811,2400,CM
    ,15,European_Office,The_Hague_NL,Luud_Rubbers,31-70-452121,9600,CM
    ,20,Moscow_Bureau,Moscow_USSR,Joris_Beltsin,!Unlisted,2400,CM


This example defined a HOST system and 5 nodes in NET 1720. Unless
a ZONE directive is specified, NET 1720 will be in whatever zone you
are in. Notice the format of the text file; no spaces are allowed.
All underscore characters "_" will be translated to spaces when the
information is displayed. Each field is separated by commas. The
following format is used for the "St. Louis format" nodelist:


      GKEYWORDH,GNUMBERH,GNAMEH,GCITYH,GOPERATORH,GPHONEH,GBAUDH,GFLAGSH


      GKEYWORDH     The KEYWORD directive may be blank or contain any of the
                  following values:


                    GZONEH    The ZONE keyword marks the start of a new ZONE
                            and NET (both with the same number).  It also
                            defines the NODE that is the ZONE coordinator.

                    GPOINTH   Specifies that this entry is a POINT of the
                            previously specified NODE.

                    GHOSTH    The HOST keyword defines the start of a new NET
                            number and defines its HOST (a HOST has a NODE
                            number of zero).




-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
6.01  CREATING A PRIVATE NODELIST
                                                                             163
--------------------------------------------------------------------------------G



                    GREGIONH  The REGION keyword is identical to HOST with the
                            exception that no mail will be automatically
                            routed through the "HOST" node. This is mainly
                            used when the NET covers more than one geographic
                            area.

                    GHUBH     The HUB keyword defines the start of a routing
                            group. A HUB acts as the HOST to receive in-
                            coming mail for all nodes listed after it.

                    GPVTH     Defines that the listed node is private and does
                            not have a listed phone number. If a system's
                            phone number is not listed, this keyword MUST
                            be used.

                    GDOWNH    Defines that the listed node is down and should
                            not be added to the database.


      GNUMBERH      This specifies the NODE number of the listed node UNLESS
                  the KEYWORD is ZONE, HOST or REGION; in these cases, the
                  NUMBER defines the ZONE and/or NET, depending.


      GNAMEH        Defines the name of the system. D'Bridge truncates NAMES
                  to 25 characters. Underscores "_" will be translated to
                  spaces for display.


      GCITYH        Specifies the city where the system is located. Again,
                  underscores "_" translate to spaces.


      GOPERATORH    Defines the name of the primary system operator. Under-
                  scores "_" translate to spaces.


      GPHONEH       List the ENTIRE phone number including the COUNTRY CODE,
                  AREA CODE and PHONE NUMBER separated with dashes. "-"
                  For example: 1-305-232-9365 or 38-52-592831


      GBAUDH        Specify the MAXIMUM BAUD RATE for the system. May be
                  either 300, 1200, 2400, 4800, 9600 or 19200.


      GFLAGSH       A free-form field that may contain additional information
                  about the system. Include the characters "CM" if you wish
                  to designate a system as CONTINUOUS MAIL (24-hours)




-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
6.02  DUTIES OF A NETWORK ADMINISTRATOR
                                                                             164
--------------------------------------------------------------------------------G






6.02  DUTIES OF A NETWORK ADMINISTRATOR

Every network must have an "administrator" or anarchy would certainly
prevail!  This chapter briefly outlines which duties the administrator
of any private network should perform. Remember, these are just guidelines.


      G1H) The NETWORK ADMINISTRATOR is generally responsible for daily
         operation of the network. This means any problems are reported
         directly to the administrator. Obviously, a very large network
         would sub-divide the support into several regional administrators
         who would try to field all problems if they could.


      G2H) The NETWORK ADMINISTRATOR is responsible for the maintenance of the
         nodelist. Any systems added, changed or deleted must have these
         changes reflected in the nodelist and the new nodelist updates
         must be sent to all systems in the network.


      G3H) The general structure and routing used in the network must be either
         designed or approved by the NETWORK ADMINISTRATOR. He must be kept
         informed of all aspects of the network so that he can "keep a handle
         on it..."


      G4H) The NETWORK ADMINISTRATOR will assign NET and NODE numbers unless
         that responsibility is divided into different regions and handled
         by the regional administrators.





















-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
6.03  PUBLIC EMAIL NETWORKS
                                                                             165
--------------------------------------------------------------------------------G






6.03  PUBLIC EMAIL NETWORKS

There are a number of public amateur networks anyone may join.
This section lists a few of them and who to contact to participate
in the network and ECHOmail conferencing. Each network distributes
its own nodelist in the "St. Louis" format. After you join a new
network, use the NODELIST CONFIGURATION screen to add the nodelist
definition and recompile the nodelist. Here are a few networks open
to new membership:


      Network               Contact
      ------------------------------------------------------------------

      GFIDONETH               International FidoNet Association
                            P.O. Box 41143
                            St. Louis, Missouri 63141
                            U.S.A.

      GALTERNETH              InterGalactic Sysop Alliance (ISA)
                            P.O. Box 956
                            Springfield, New Jersey 07081
                            U.S.A.

      GEGGNETH                Ken Shackelford
                            U.S.A.
                            EMAIL 99:99/0
                            1-404-928-1876 data






















-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
7.00  DBUTIL / UTILITY PROGRAM
                                                                             166
--------------------------------------------------------------------------------G






7.00  DBUTIL / UTILITY PROGRAM

D'Bridge comes with a utility program called DBUTIL; it allows you to
automate routine file-transfers and maintenance. Typing DBUTIL from
the DOS prompt will display the following "help" information:


    C> GDBUTILH

    D'Bridge Utilities 1.50 single-line; Copyright 1987-1992 by Chris Irwin

    Valid commands:

    [priority] SEND <Address> <file> ... <file>    Transmit file(s)
    [priority] ROUTE <Address> <file> ... <file>   Transmit file(s)
    [priority] REQUEST <Address> <file> ... <file> File-request
    [priority] POLL <Address>                      Poll
    PURGE [areaname] [areaname] ... [areaname]     Purge/Archive messages
    SORT AREAS                                     Sort message areas/group
    ERASE QUICKBASE CONFIRM                        Completely erase Quickbase


DBUTIL may be run from any directory providing you have included the D'Bridge
root directory (C:\DB) in your PATH setting in AUTOEXEC.BAT.

          ie.

          PATH C:\DOS;C:\DB


      GSENDH

      The DBUTIL SEND command adds TRANSMIT-FILE entries to the disk-based
      queue. Files will be sent directly to the destination system with no
      routing. The syntax for the SEND command is:

      C> DBUTIL [priority] SEND <Address> <file> ... <file>

      ie.

      C> DBUTIL CRASH SEND 18/68.5 HOMEWORK.TXT
      C> DBUTIL HOLD SEND 18/20 DB-140*.ZIP DBNET.Z56
      C> DBUTIL SEND MYBOSS READTHIS.TXT






-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
7.00  DBUTIL / UTILITY PROGRAM
                                                                             167
--------------------------------------------------------------------------------G


  
      GROUTEH

      The DBUTIL ROUTE command does the same thing as the SEND command except
      that it generates a FILE-ATTACH message in the NETMAIL area. Creating
      a message allows the file to be routed if you have specified any file-
      routing in your schedule. If you are not routing files, it is faster
      and better to use the SEND option as it puts entries directly in the
      disk-based queue. The syntax for ROUTE is the same as SEND:

      C> DBUTIL [priority] ROUTE <Address> <file> ... <file>

      ie.

      C> DBUTIL CRASH ROUTE 18/68.5 HOMEWORK.TXT
      C> DBUTIL HOLD ROUTE 18/20 DB-140*.ZIP DBNET.Z56
      C> DBUTIL ROUTE MYBOSS READTHIS.TXT



     GREQUESTH

      The DBUTIL REQUEST command adds FILE-REQUEST entries to the disk-based
      queue. The file-request will be sent immediately or during the next
      applicable mail event, depending on the priority you specify. Following
      is the syntax for REQUEST:

      C> DBUTIL [priority] REQUEST <Address> <file> ... <file>

      ie.

      C> DBUTIL CRASH REQUEST 2:280/280 FILES ABOUT
      C> DBUTIL REQUEST 135/14 GOODGAME.ZIP MONOPOLY.ZIP
      C> DBUTIL IMMEDIATE REQUEST MYBOSS UPDATE.ZIP



      GPOLLH

      The DBUTIL POLL commands adds a POLL entry to the disk-based queue.
      Depending on the priority, the system will be called either immediately
      or during the next applicable mail event. When you POLL a system,
      D'Bridge will call to see if you have any mail waiting. The syntax for
      POLL is:

      C> DBUTIL [priority] POLL <Address>

      ie.

      C> DBUTIL POLL MYBOSS
      C> DBUTIL IMMEDIATE POLL 1:105/3


-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
7.00  DBUTIL / UTILITY PROGRAM
                                                                             168
--------------------------------------------------------------------------------G


  
  
      GPURGEH

      The DBUTIL PURGE command will purge the specified message areas or all
      of them if you don't list any AREA NAMES. The purge will scan each
      message area and purge (and archive) the messages based on the criteria
      specified in the LOCAL/ECHOMAIL AREAS screen; see SECTION 3.2 for more
      information. The syntax for the PURGE command is:

      C> DBUTIL PURGE [areaname] [areaname] ... [areaname]

      ie.

      C> DBUTIL PURGE
      C> DBUTIL PURGE POLITICS SCIENCE ART


      GSORT AREASH

      If you wish to reorganize the areas in your LOCAL/ECHOMAIL AREAS screen,
      you may use the SORT AREAS command. This will sort and renumber your
      areas by SORT GROUP and TAG. Before using this command, make sure you
      specify SORT GROUPS for all the areas and group them together in a
      logical manner. The syntax is:

      C> DBUTIL SORT AREAS


      GERASE QUICKBASEH

      If you want to completely destroy and recreate your QuickBBS message
      base, you may do it with this command. You really had better be SURE
      you want to do this or you could lose thousands of EMAIL messages
      with this single command. The syntax is:

      C> DBUTIL ERASE QUICKBASE CONFIRM

















-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
7.01  FIDO AND QUICKBBS STORAGE
                                                                             169
--------------------------------------------------------------------------------G






7.01  FIDO AND QUICKBBS STORAGE

D'Bridge currently supports two methods for storing EMAIL messages on
disk. These particular methods were chosen for compatibility with
some popular bulletin board systems:


      GFIDOH         Using the FIDO storage method, each message is stored in
                   a separate ".MSG" file in a certain directory. Each fido-
                   style local or ECHOmail area will have a unique sub-
                   directory. This method is compatible with Fido and Opus,
                   as well as many message handling utilities. FIDO storage
                   usually takes the most disk space and is the slowest
                   method available.

      GQuickBBSH     The QUICKBBS storage method stores all messages in five
                   data files: MSGHDR.BBS, MSGTXT.BBS, MSGIDX.BBS, MSGTOIDX.BBS
                   and MSGINFO.BBS, all stored in the specified QuickBBS
                   directory. Using this method, up to 200 message areas may be
                   defined. This method is fast and doesn't use too much disk
                   space; it is provided for compatibility with the QuickBBS
                   bulletin board system.




























-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
7.02  USING THE SCRIPTING LANGUAGE
                                                                             170
--------------------------------------------------------------------------------G






7.02  USING THE SCRIPTING LANGUAGE

D'Bridge includes a powerful scripting language allowing it to use
alternate carriers such as packet-switched networks rather than normal
telephone connections. This can be used with any carrier such as Tele-
net's PC-Pursuit or your private Satellite uplink service. Any data
carrier capable of 8-bit, no parity, full duplex communication may be
used with D'Bridge. The reason for using an alternate carrier is usu-
ally to save money on your phone bill.

The scripting language connects two D'Bridge systems through any form
of data link that is compatible. In the U.S.A., the most common example
for using scripts is PC-Pursuit, so I'll use that as an example. Script
files are text-files created by any standard text editor and contain
keywords telling D'Bridge exactly what to do. It is important to have
a good understanding of the carrier you intend to use before designing
your script file; this is necessary for a good understanding of all the
terms used here - it's not that simple.

To use a script file, you will need to have a PHONE NUMBER TRANSLATION
or OVERRIDE for each area code or system you intend to use. With PC-
Pursuit, this currently requires 40 translation strings, one for each
city served. I intend to use an indexed database in a future release
to eliminate this necessity, but that's later. For now, use a trans-
lation in the following format:

Gcc-aaa- "script.fil"xxxxx-H

Where "cc" is the COUNTRY CODE, "aaa" is the AREA CODE, and "xxxxx" is
the translated AREA CODE (or in the case of PC-Pursuit, the city des-
ignator). As an example, use the following PHONE NUMBER TRANSLATION to
reach the Miami, Florida area:

G1-305- "PCP.SCR"FLMIA-H

This will translate ALL 305 area codes to use the script file. Needless
to say, not all of area code 305 is PC-Pursuitable, so if you need to
contact other cities in our area code, you will need to specify previous
translation or override strings (the upcoming index file will eliminate
the need for these translations altogether).

Assuming you now have 305 translated to use the PCP.SCR script file,
you now must create this file and put it in your defined SCRIPT PATH
(SCRIPT PATH is defined on the DIRECTORY PATHS setup screen).  With
D'Bridge, it is possible to use one script file for ALL the "pursuitable"
cities, though you will need one for each baud rate desired. Following
is a detailed description of the scripting language keywords and their
meaning (see the next chapter for a specific example and explanation
using PC-Pursuit):

-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
7.02  USING THE SCRIPTING LANGUAGE
                                                                             171
--------------------------------------------------------------------------------G





      Syntax: GABORTH <Gstart_timeH> <Gend_timeH>

      Example: GABORT 6:00 18:00H

      The ABORT keyword causes the script to abort immediately if the time is
      between the <start_time> and <end_time> specified. This is handy for
      making sure no script calls are made outside predefined hours.



      Syntax: GAREACODEH

      The AREACODE keyword causes D'Bridge to transmit the AREA CODE field of
      the phone number. This is separated from the PHONE NUMBER by a dash "-"
      and is sent with no carriage return or other characters. For PC-Pursuit,
      this is usually substituted with the city code (such as FLMIA).



      Syntax: GBAUDH <Gbaud_rateH>

      Example: GBAUD 1200H

      The BAUD keyword changes the current baud rate to the specified value.
      By default, it will be the baud rate of the destination system.



      Syntax: GCARRIERH

      When the CARRIER keyword is encountered, the script file is aborted
      unless a carrier is detected at this point. This is handy for ensuring
      you have a carrier when you think you should.



      Syntax: GCOMMH <Gconfig_charactersH>

      Example: GCOMM 7E1H

      The COMM keyword configures the communication port for the setting
      specified. In this example, it is set for 7 data bits, even parity
      and 1 stop bit. The following <config_characters> are supported:


          G1H - 1 stop bit       GNH - No parity
          G2H - 2 stop bits      GEH - Even parity
          G7H - 7 data bits      GOH - Odd parity
          G8H - 8 data bits

-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
7.02  USING THE SCRIPTING LANGUAGE
                                                                             172
--------------------------------------------------------------------------------G





      Syntax: GCONNECTH

      The CONNECT keyword sets the CONNECT count for the given packet is
      increased by one. This is used in conjunction with the maximum
      connects limit defined for the current mail event.



      Syntax: GDIALH <Gphone_numberH>

      Example: GDIAL 555-2939H

      The DIAL keyword causes D'Bridge to dial the <phone_number> specified
      and wait for a CONNECT, BUSY or NO CARRIER field just like when dialing
      normally. If a non-connect message is received, the script is aborted.



      Syntax: GDIRECTH <Gstart_timeH> <Gend_timeH>

      Example: GDIRECT 6:00 18:00H

      The DIRECT keyword will cause D'Bridge to abort the script file and dial
      direct (using your phone company) between the times specified. This is
      useful for switching between script and telephone company use depending
      on the time of day.



      Syntax: GDOSH <GDOS_commandH>

      Example: GDOS ibm_uucp 2400H

      The DOS keyword is seldom used, but it enables you to execute any DOS
      command from within a script file. In this example, the program
      "IBM_UUCP" is executed with a parameter of 2400.



      Syntax: GGOTOH <GlabelH>

      Example: GGOTO LOOP-1H

      The GOTO keyword transfers control to another point within the script
      file. The <label> must exist and start with a colon ":" just like in
      DOS batch files. Caution should be used in not creating "endless
      loops" without a TIMER statement preceding them.



-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
7.02  USING THE SCRIPTING LANGUAGE
                                                                             173
--------------------------------------------------------------------------------G






      Syntax: GIFH <Gpattern_numberH> <GlabelH>

      Example: GIF 2 GOTO SUCCESSH

      The IF keyword transfers control to another point in the script file
      if a previously defined pattern has been detected. This is used in
      conjunction with the PATTERN keyword and uses the same label structure
      as the GOTO keyword. It is also possible for IF to cause "endless loops"
      if your script is not designed correctly, so use of the TIMER keyword
      is highly desirable.



      Syntax: GINITH

      The INIT keyword causes D'Bridge to send it's standard initialization
      string to the modem. This is normally done at the beginning of every
      script, but may not be necessary.



      Syntax: GPATTERNH <Gpattern_numberH> <GstringH>

      Example: GPATTERN 0 BUSYH

      The PATTERN keyword defines a pattern to look for from the remote system
      or modem. It is used in conjunction with the WAIT and IF keywords to
      act based on the response received. The <pattern_number> must be from
      0 to 9 and the <string> may be up to 20 characters. If "PATTERN 0" is
      specified with no characters after it, pattern 0 is disabled.



      Syntax: GPHONEH

      The PHONE keyword causes D'Bridge to transmit the PHONE NUMBER field.
      This is sent with no additional characters such as carriage return, so
      if you want to send one, use the XMIT keyword after the PHONE keyword.



      Syntax: GSESSIONH

      The SESSION keyword is used to begin the mail session. When it is
      encountered, the script file terminates and D'Bridge starts trying
      to sync with the destination system. If there is no carrier detected
      at this point, the session will be aborted. Make sure this is only
      used once a "CONNECT" signal is received from the remote modem.

-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
7.02  USING THE SCRIPTING LANGUAGE
                                                                             174
--------------------------------------------------------------------------------G






      Syntax: GTIMERH <GsecondsH>

      Example: GTIMER 300H

      The TIMER keyword sets an overriding timeout on the execution of the
      script file. This is especially handy when you have created "endless
      loops" for re-dialing within your script file. If no TIMER  value is
      specified, D'Bridge will keep dialing "forever" until it gets through.
      Every time the TIMER keyword is encountered, the timer is cleared. For
      this reason, care should be taken to ensure it is not within an "end-
      less loop".



      Syntax: GWAITH <GsecondsH>

      Example: GWAIT 20H

      The WAIT keyword causes the script to wait for the specified number of
      seconds for one of the patterns (previously defined) to be received.
      If none of the patterns are received within <seconds> seconds, the
      script is aborted. The PATTERN keyword defines the pattern(s) to wait
      for.



      Syntax: GXMITH <GstringH>

      Example: GXMIT HELLO|~~~52937,334|H

      The XMIT keyword causes D'Bridge to transmit characters to the remote
      system (or your modem if not currently connected to anything). This
      command is executed literally and there must be only one space between
      XMIT and <string> or the spaces will also be sent. There are two
      special characters used in the XMIT keyword:

          "G|H" causes a carriage return (CR) to be sent
          "G~H" causes a one-second delay in execution

The script file is executed much like a program, sequentially. The
only exception is when control is transferred to another part by using
an IF or GOTO keyword. Any errors in the script file will only be
found when the keyword is executed. Use the script debugging windows
while testing scripts; these will display the communications plus what
keywords are being executed. Activate these windows by answering YES
to the DIAGNOSTICS? question on the BASIC CONFIGURATION screen.




-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
7.03  EXAMPLE SCRIPT FILE
                                                                             175
--------------------------------------------------------------------------------G






7.03  EXAMPLE SCRIPT FILE

The following example script file is the one Tony Wagner wrote for use
with the PC-Pursuit service. It is currently used by a fair number of
people with success. You will need to customize it somewhat to work in
your city and use your own password.


                             INIT
                             TIMER 600
                             BAUD 2400
                             DIAL XXX-XXXX
                             XMIT @~D~|~D1|
                             :RETRY
                             PATTERN 0 @
                             WAIT 30
                             XMIT C D/
                             AREACODE
                             XMIT /24,YOUR ID#|
                             XMIT PASSWORD|
                             PATTERN 0 CONNECT
                             PATTERN 1 ONLINE
                             PATTERN 2 BUSY
                             PATTERN 3 RE-ENTER
                             PATTERN 4 MANUAL
                             PATTERN 5 NOT
                             WAIT 30
                             IF 2 RETRY
                             IF 3 RETRY
                             IF 5 RETRY
                             TIMER 600
                             XMIT ~|~@~|
                             XMIT ~SET 1:0,7:0|
                             XMIT CONT|
                             XMIT |~I~|~ATZ|
                             :CITY_CONNECT
                             XMIT ~ATDT
                             PHONE
                             XMIT |
                             WAIT 45
                             IF 2 CITY_CONNECT
                             IF 4 CITY_CONNECT
                             SESSION


The above script is a rapid-dial script that tries for a maximum of
five minutes to connect with the desired city. Once in the city, it
then re-dials the destination system for a maximum of five minutes.


-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.00  BBS SYSTEMS
                                                                             176
--------------------------------------------------------------------------------G






8.00  BBS SYSTEMS

D'Bridge is designed to act as a FRONT-END for "online" programs such as
BBS (bulletin board systems) and database systems. D'Bridge will answer
the phone and determine whether an incoming call is EMAIL or HUMAN. If it
is an EMAIL call, D'Bridge automatically receives the mail and/or files and
returns to the idle state. If a HUMAN call is detected, control may be
transferred to another program such as a bulletin board system. It will
take about 10 seconds for D'Bridge to decide whether a caller is HUMAN;
this time-period can be increased if desired. If the caller presses the ESC
key twice, D'Bridge will assume the call is HUMAN and transfer control to
the BBS immediately.

Every BBS software package is configured slightly differently, therefore
D'Bridge needs to be flexible in the way it transfers control while the
caller remains online. There are three basic ways of invoking your BBS
program:


    PUSH    Using the PUSH method, you simply specify a series of DOS
            commands to be executed. You may even invoke a batch file
            in this method. Only the memory D'Bridge is not using will
            be available for the BBS. The PUSH method is designated by
            simply typing the commands in the DOS BBS COMMANDS window.

            ie. CD \OPUS
                 OPUS OPUS -B*B -T*T


    DROP    The DROP method is similar to the PUSH method, except that
            all available memory (except 15K) is freed, leaving almost
            all system memory free for the BBS to use. This is handy
            if you have a large D'Bridge configuration or your BBS has
            a lot of "door" programs that it spawns. The DROP method is
            designated by typing a plus sign "+" in front of the commands
            in the DOS BBS COMMANDS window.

            ie. CD \OPUS
                 +OPUS OPUS -B*B -T*T


    EXIT    With the EXIT method, D'Bridge completely terminates, exiting
            with an errorlevel designating the baud rate. If you use this
            method, you must be running the mailer from a batch file set
            up to trap the various errorlevels. To configure the EXIT
            method, specify *X on a line by itself in your DOS BBS COMMANDS
            window.


-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.00  BBS SYSTEMS
                                                                             177
--------------------------------------------------------------------------------G




            ie. *X

            An example of a simple batch file that would work with the
            EXIT method demonstrates the setup for a 2400 baud modem.
            Note that the errorlevel returned by D'Bridge is equal to
            the BAUD RATE / 100.

            :TOP

            DB

            IF ERRORLEVEL 24 GOTO 2400BAUD
            IF ERRORLEVEL 12 GOTO 1200BAUD
            IF ERRORLEVEL 3 GOTO 300BAUD

            GOTO END

            :2400BAUD

            CD\OPUS
            OPUS OPUS -B2400
            GOTO TOP


            :1200BAUD

            CD\OPUS
            OPUS OPUS -B1200
            GOTO TOP


            :300BAUD

            CD\OPUS
            OPUS OPUS -B300
            GOTO TOP



            4If you are not familiar with batch files and you must use5
            4them, see the IBM DOS manual.5


Every time a BBS call is detected, control is transferred to your BBS
software by executing the commands located in the DOS BBS COMMANDS
window. You may specify any number of DOS commands in this window to
be executed in sequence.




-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.00  BBS SYSTEMS
                                                                             178
--------------------------------------------------------------------------------G



Each line must contain a valid DOS command, or a D'Bridge "directive".
If an entry begins with a plus sign (+) the command will be executed
using the DROP method rather than the PUSH method. If you use DROP,
D'Bridge will be entirely swapped out of memory (except 15K) allowing
the called program almost all the free memory in the environment. This
is nice for running BBS programs that have "door" utilities. The DROP
method takes longer to execute than the PUSH method. D'Bridge memory
is swapped to either EMS or DISK.

Following is an example of how I run the QuickBBS bulletin board:

                 CD \QUICKBBS
                 +QUICKBBS -b*b -t*t -e0

Any entries with an asterisk "*" will be treated as D'Bridge directives
or substitutions. When the above DOS BBS COMMANDS are executed, the
following is an example of the actual DOS commands issued:

                 CD \QUICKBBS
                 QUICKBBS -b2400 -t126 -e0


Following is a description of the D'Bridge directives available:

    G*BH       Substituted with the actual BAUD RATE of the connection.

    G*CH       Substituted with the actual connect string returned from
             the modem. This may be translated to any string you wish
             by using the "CONNECT" COMMANDS field of the COMMUNICATION/
             MODEM SETUP screen.

    G*HH       If specified, leaves the FOSSIL "HOT" or initialized.


    G*PH       Returns the COMM PORT D'Bridge is currently using. This
             may be from 1 to 7.

    G*RH       Causes a NETMAIL rescan to occur after each BBS call.

    G*SH       Causes an ECHOmail scan to occur after each BBS call.

    G*TH       Substituted by the number of minutes until the next event.

    G*XH       Exit D'Bridge with an errorlevel of the baud rate divided
             by 100 (3,12,24,48 or 96). If you use this method (which is
             not suggested), you will need to write a batch file like
             the one described on the preceding page.





-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.00  BBS SYSTEMS
                                                                             179
--------------------------------------------------------------------------------G




    *Xnnn    Exit D'Bridge with the specified errorlevel. If you use
             this method, you must be using some alternate method to
             pass the baud rate to the system.


Any DOS command with the exception of EXIT, PROMPT and SET will work
in the DOS BBS COMMANDS window. Changing directories is allowed;
D'Bridge will automatically switch back to the DB root directory
when the commands are finished. You do not have to specifically
change directories after the BBS call.










































-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.01  GENESIS DELUXE BBS
                                                                             180
--------------------------------------------------------------------------------G






8.01  GENESIS DELUXE BBS

  
Genesis Deluxe Bulletin board system is available from PRISM Software.
In order to configure Genesis and D'Bridge together, follow these
steps:


1) Configure Genesis Deluxe as follows. This uses the US Robotics
   HST Dual Standard as an example. If you use a different modem, the
   parameters may vary. You may leave all the initialization fields
   as they are, Genesis will ignore them when using a front end mailer.


2) Genesis does not accept 4800 or 14400 as valid command line baud
   rates.
   Configure the "CONNECT" COMMANDS field on the COMMUNICATION MODEM
   SETUP screen:


   /-------------------------------------------------------------------\
   | "CONNECT" commands: 9600 CONNECT 4800|9600                        |
   |                     19200 CONNECT 14400|19200                     |
   \-------------------------------------------------------------------/


3) There are 2 ways to  setup Genesis under D'Bridge.

       OPTION "A"  -  Spawn a batch file using the DROP method

       With the DROP method, D'Bridge swaps almost all its used RAM to
       EMS or disk, then "spawns" a batch file which invokes Genesis.
       This is the fastest method if you have EMS.

          a) Enter the following in the DOS BBS COMMANDS window on the
             BBS CONFIGURATION screen:

             /--------------------------------------------------------\
             | DOS commands for BBS: +MGEN.BAT *P *B *T               |
             |                                                        |
             \--------------------------------------------------------/








-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.01  GENESIS DELUXE BBS
                                                                             181
--------------------------------------------------------------------------------G



          b) Create a batch file called MGEN.BAT in the D'Bridge root
             directory. Use the following as an example:

          @ECHO OFF
          :START
          D:
          cd\gendlx
          GENESIS %1 SINGLE %2 %2 %3
          IF ERRORLEVEL 9 GOTO DROP
          IF ERRORLEVEL 8 GOTO DOOR
          GOTO END

          :DROP
          CTTY COM%1
          ECHO Type Exit to return to the BBS
          C:\COMMAND.COM
          CTTY CON
          goto DOORBACK

          :DOOR
          CALL DOOR.BAT

          :DOORBACK
          D:
          CD\GENDLX
          GENESIS %1 SINGLE
          IF ERRORLEVEL 9 GOTO DROP
          IF ERRORLEVEL 8 GOTO DOOR

          :END
          H:
          CD\DBRIDGE


       OPTION "B"  -  Run D'Bridge from a batch file and EXIT

       With the EXIT method, D'Bridge is completely removed from memory
       when Genesis takes control. This method requires D'Bridge to be
       fired up from a batch file. Following is a description of how to
       configure the software for this method:

          a) Enter the following in the DOS BBS COMMANDS window on the
             BBS CONFIGURATION screen:

             /--------------------------------------------------------\
             | DOS commands for BBS: *X                               |
             |                                                        |
             \--------------------------------------------------------/




-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.01  GENESIS DELUXE BBS
                                                                             182
--------------------------------------------------------------------------------G





          b) Create a batch file called RUN-DB.BAT using the following
             model as an example. Start D'Bridge by using this batch
             file, most-likely by calling it directly from AUTOEXEC.BAT:



             @ECHO OFF
             H:
             CD\DBRIDGE

             :LOAD_DB
             DB
             IF ERRORLEVEL 192 GOTO 19200
             IF ERRORLEVEL 96 GOTO 9600
             IF ERRORLEVEL 50 GOTO RENUM
             IF ERRORLEVEL 48 GOTO 4800
             IF ERRORLEVEL 24 GOTO 2400
             IF ERRORLEVEL 12 GOTO 1200
             IF ERRORLEVEL 10 GOTO LOCALBBS
             IF ERRORLEVEL 3 GOTO 300
             IF ERRORLEVEL 0 GOTO END

             GOTO LOAD_DB

             :LOCALBBS
             D:
             CD\GENDLX
             GENESIS 1 SINGLE
             IF ERRORLEVEL 9 GOTO DROP
             IF ERRORLEVEL 8 GOTO DOOR
             H:
             CD\DBRIDGE
             GOTO LOAD_DB

             :RENUM
             H:
             CD\DBRIDGE
             DBLOG 2 DBRIDGE.LOG
             MREN -R -P -L -DB
             MREN -R -P -L -DB H:\DBRIDGE\MESSAGES
             CD\NETMAIL
             SMLINDEX
             CD\DBRIDGE
             GOTO LOAD_DB






-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.01  GENESIS DELUXE BBS
                                                                             183
--------------------------------------------------------------------------------G



             :300
             D:
             CD\GENDLX
             GENESIS 1 SINGLE 0 300
             IF ERRORLEVEL 9 GOTO DROP
             IF ERRORLEVEL 8 GOTO DOOR
             H:
             CD\DBRIDGE
             GOTO LOAD_DB

             :1200
             D:
             CD\GENDLX
             GENESIS 1 SINGLE 0 1200
             IF ERRORLEVEL 9 GOTO DROP
             IF ERRORLEVEL 8 GOTO DOOR
             H:
             CD\DBRIDGE
             GOTO LOAD_DB

             :2400
             D:
             CD\GENDLX
             GENESIS 1 SINGLE 0 2400
             IF ERRORLEVEL 9 GOTO DROP
             IF ERRORLEVEL 8 GOTO DOOR
             H:
             CD\DBRIDGE
             GOTO LOAD_DB

             :4800
             D:
             CD\GENDLX
             GENESIS 1 SINGLE 0 4800
             IF ERRORLEVEL 9 GOTO DROP
             IF ERRORLEVEL 8 GOTO DOOR
             H:
             CD\DBRIDGE
             GOTO LOAD_DB

             :9600
             D:
             CD\GENDLX
             GENESIS 1 SINGLE 0 9600
             IF ERRORLEVEL 9 GOTO DROP
             IF ERRORLEVEL 8 GOTO DOOR
             H:
             CD\DBRIDGE
             GOTO LOAD_DB



-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.01  GENESIS DELUXE BBS
                                                                             184
--------------------------------------------------------------------------------G




             :19200
             D:
             CD\GENDLX
             GENESIS 1 SINGLE 0 19200
             IF ERRORLEVEL 9 GOTO DROP
             IF ERRORLEVEL 8 GOTO DOOR
             H:
             CD\DBRIDGE
             GOTO LOAD_DB

             :DROP
             CTTY COM1
             C:\COMMAND.COM
             CTTY CON
             goto DOORBACK

             :DOOR
             D:
             CD\GENDLX
             CALL DOOR.BAT
             GOTO DOORBACK

             :DOORBACK
             D:
             CD\GENDLX
             GENESIS 1 SINGLE
             IF ERRORLEVEL 9 GOTO DROP
             IF ERRORLEVEL 8 GOTO DOOR
             H:
             CD\DBRIDGE
             GOTO LOAD_DB

             :END



















-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.02  MAXIMUM BBS
                                                                             185
--------------------------------------------------------------------------------G






8.02  MAXIMUM BBS

  
D'Bridge is completely compatible with the Maximus CBCS.
In order to configure D'Bridge with Maximus, follow these simple steps:


1) Your MAX.CTL file includes the following line:

   After Call Exit 5

   This is absolutely correct - please do not change it to any other value.


2) There are three methods for running Maximus from D'Bridge:


     a) Using the PUSH method, D'Bridge "spawns" the Maximus program; this
        is the fastest way, but requires the most memory. To configure
        this, specify the following in the DOS BBS COMMANDS window:


        /---------------------------------------------------------\
        | DOS commands for BBS: CD \MAX                           |
        |                       MAX -B*B -T*T                     |
        |                                                         |
        \---------------------------------------------------------/


     b) Using the DROP method is almost identical. This way, D'Bridge
        swaps its memory to EMS or disk, then runs Maximus. Simply put a
        plus sign "+" in front of the Maximus command like this:


        /---------------------------------------------------------\
        | DOS commands for BBS: CD \MAX                           |
        |                        +MAX -B*B -T*T                   |
        |                                                         |
        \---------------------------------------------------------/


   c) Using the EXIT method, D'Bridge must be run from a batch file.
      This requires some understanding of DOS, since your system will
      be setup slightly different than our example.





-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.02  MAXIMUM BBS
                                                                             186
--------------------------------------------------------------------------------G



      Here is an example to put in the DOS BBS commands field:

      /----------------------------------------------------------------\
      | DOS commands for BBS: ECHO CD \MAX >BBS.BAT                    |
      |                       ECHO MAX -B*B -T*T >>BBS.BAT             |
      |                       ECHO :DOERLVL >>BBS.BAT                  |
      |                       ECHO IF ERRORLEVEL 17 GOTO DOOR >>BBS.BAT|
      |                       ECHO IF ERRORLEVEL 1 GOTO END >>BBS.BAT  |
      |                       ECHO GOTO END >>BBS.BAT                  |
      |                       ECHO :DOOR >>BBS.BAT                     |
      |                       ECHO CALL C:\MAX\SYSOP.BAT >>BBS.BAT     |
      |                       ECHO MAX -R >>BBS.BAT                    |
      |                       ECHO GOTO DOERLVL >>BBS.BAT              |
      |                       ECHO :END >>BBS.BAT                      |
      |                       ECHO CD \DB >>BBS.BAT                    |
      |                       ECHO RUN-DB.BAT >>BBS.BAT                |
      |                       *X20                                     |
      \----------------------------------------------------------------/

   Special definitions in this batch:

   ERRORLEVEL 17 - example for a doorway call from within MAXIMUS
   SYSOP.BAT     - a batch, that calls doorway, like this one:
            CD C:\DB\DOOR
            DOORWAY COM2 /I:MENU.TXT /S:* /G:ON /V:D /M:100 /B:MSZ /C:DOS
   DOERLVL       - tells MAXIMUS to use errorlevels
   ERRORLEVEL 1  - No idea, what is was for - once there was an error without
                   this line, so it had been included
                   Maybe it works without it...
   MAX -R        - Returns to MAXIMUS
   RUN-DB.BAT    - the batch to start D'Bridge
   *X20          - The errorlevel in the D'Bridge batch, which calls BBS.BAT

   With this method the batch, which calls MAXIMUS is always written "live"
   by DB and the baud rate and rest time (until next event) will be passed
   to MAXIMUS.

Create a batch file called RUN-DB.BAT containing at least the following:

     ECHO OFF
     :START
     C:
     CD \DB
     DB
     IF ERRORLEVEL 20 GOTO LOADBBS
     GOTO END

     :LOADBBS
     BBS.BAT



-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.02  MAXIMUM BBS
                                                                             187
--------------------------------------------------------------------------------G



     :END
     EXIT

To start D'Bridge, simply type RUN-DB from the D'Bridge root
directory.

- please remember to use a fossil with MAXIMUS -














































-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.03  OPUS CBBS
                                                                             188
--------------------------------------------------------------------------------G






8.03  OPUS CBBS

  
D'Bridge is completely compatible with the Opus CBBS (Conversational
bulletin board system.)  In order to configure D'Bridge with Opus, follow
this simple steps:


1) Edit your OPUS.CTL file to include the following line:

   Exit 15

   This tells Opus to exit after each call with an errorlevel of 15;
   when this happens, control is returned to D'Bridge.


2) Recompile your OPUS.PRM file by using the OPUSCTL command. See the
   Opus DOCs for more information.


3) There are three methods for running Opus from D'Bridge:


     a) Using the PUSH method, D'Bridge "spawns" the Opus program; this
        is the fastest way, but requires the most memory. To configure
        this, specify the following in the DOS BBS COMMANDS window:


        /---------------------------------------------------------\
        | DOS commands for BBS: CD \OPUS                          |
        |                       OPUS OPUS -B*B -T*T               |
        |                                                         |
        \---------------------------------------------------------/


     b) Using the DROP method is almost identical. This way, D'Bridge
        swaps its memory to EMS or disk, then runs Opus. Simply put a
        plus sign "+" in front of the opus command like this:


        /---------------------------------------------------------\
        | DOS commands for BBS: CD \OPUS                          |
        |                       +OPUS OPUS -B*B -T*T              |
        |                                                         |
        \---------------------------------------------------------/




-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.03  OPUS CBBS
                                                                             189
--------------------------------------------------------------------------------G




     c) Using the EXIT method, D'Bridge must be run from a batch file.
        This requires some understanding of DOS, since your system will
        be setup slightly different than our example. Put the following
        in the DOS BBS commands field:


        /---------------------------------------------------------\
        | DOS commands for BBS: ECHO CD \OPUS >BBS.BAT            |
        |                       ECHO OPUS OPUS -B*B -T*T >>BBS.BAT|
        |                       ECHO CD \DB >>BBS.BAT             |
        |                       ECHO RUN-DB.BAT >>BBS.BAT         |
        |                       *X20                              |
        \---------------------------------------------------------/



        Create a batch file called RUN-DB.BAT containing at least
        the following:


             ECHO OFF
             :START
             C:
             CD \DB
             DB
             IF ERRORLEVEL 20 GOTO LOADBBS
             GOTO END

             :LOADBBS
             BBS.BAT

             :END
             EXIT


        To start D'Bridge, simply type RUN-DB from the D'Bridge root
        directory.















-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.04  PC-BOARD
                                                                             190
--------------------------------------------------------------------------------G






8.04  PC-BOARD

  
PCBoard is available from Clark Development Company. It is another
excellent BBS package with particularly strong support for DOORs, and
it runs very well with D'Bridge. In order to configure PCBoard with
D'Bridge, follow these steps:


Note that since this method uses DOS 3.3's CALL command, it will not
work with earlier versions of DOS. It should work with DOS 4.x.



1)  Configure PCBoard's MODEM INFORMATION screen as shown below. The
    example shown is for a US Robotics HST 9600 bps modem, with the comm
    port locked at 19200. If you are using a different modem, you will
    need to make some adjustments to the parameters. PCBoard will
    receive the caller online after D'Bridge answers the call.


/-----------------------------------------------------------------------\
|                               Modem Information                       |
|                                                                       |
| Seconds to wait for carrier   : 60                                    |
| Comm Port (COM1,COM2,NONE)    : COM2                                  |
| Opening Baud Rate (300-38400) : 19200                                 |
| Lock in Opening Baud Rate     : Y                                     |
| Modem Initialization String   : ATE0M1H0                              |
| Modem Off-Hook String         : ATE0M0H1                              |
| Disable CTS/RTS checking      : N                                     |
| Using a Hayes V-Series 9600   : N                                     |
| Using a FastComm 9600         : N                                     |
| Reset Modem During Recycle    : N                                     |
| Modem Off-Hook During Recycle : N                                     |
| Packet-Switch Network         : N                                     |
| Answer on True Ring Detect    : N                                     |
| Allow Callers at 7,E,1        : N                                     |
| Allow 300 Baud Callers        : N                                     |
| Allow 300 Baud Start Time     : 00:01                                 |
| Allow 300 Baud Stop  Time     : 24:00                                 |
|                                                                       |
\-----------------------------------------------------------------------/






-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.04  PC-BOARD
                                                                             191
--------------------------------------------------------------------------------G



2)  In PCBoard's OPTIONS #1 screen, set PCBoard to drop to DOS after
    each call:


/-----------------------------------------------------------------------\
|                            Options #1                                 |
|                                                                       |
| Exit to DOS After Each Call   : Y                                     |
\-----------------------------------------------------------------------/


3)  In D'Bridge's COMM PORT / MODEM SETUP screen, set it up as shown
    below (again, this is for a USR 9600 HST). Modify to suit your
    modem. The "CONNECT" commands are very important. You must use
    the appropriate translations so that PCBoard will understand the
    connect codes later in the batch files.


/-------------------------------------------------------------------\
|           Modem port: COM2  (COM1-COM7 or NONE)                   |
|            Baud rate: 19200                                       |
|               Locked? Yes                                         |
|          Use RTS-CTS? Yes                                         |
|           Initialize: ATE0F1M1X6Q0V1&K0&B1H0S0=0                  |
|              Offline: ATE0M0H1                                    |
|             Drop DTR? Yes                                         |
|               Answer: ATA                                         |
|             Dial 300: ATDT                                        |
|             "   1200: ATDT                                        |
|             "   2400: ATDT                                        |
|             "   4800: ATDT                                        |
|             "   9600: ATDT                                        |
|             "  19200: ATDT                                        |
|        Specific dial:                                             |
|      "RING" commands: RING                                        |
|   "CONNECT" commands: 300 CONNECT|/C:0                            |
|                      1200 CONNECT 1200|/C:2                       |
|                      2400 CONNECT 2400|/C:3                       |
|                      2400 CONNECT 2400/ARQ|/C:3 /ERR              |
|                      9600 CONNECT 9600/ARQ|/C:5 /ERR              |
|     "ABORT" commands: VOICE                                       |
|           Char delay: 15  (milliseconds)                          |
|        Modem timeout: 45  (seconds)                               |
|  Carrier detect mask: 128 (almost always 128)                     |
|      Auto-init modem? Yes                                         |
\-------------------------------------------------------------------/






-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.04  PC-BOARD
                                                                             192
--------------------------------------------------------------------------------G




4)  In D'Bridge's BBS CONFIGURATION screen, set the "DOS commands for
    BBS:" as shown below:


/-----------------------------------------------------------\
| DOS commands for BBS: ECHO PCBOARD *C > C:\PCB\PCBBAT.BAT |
|                       *X20                                |
\-----------------------------------------------------------/

5)  If you run in a DESQview environment, create a batch file called
    "PrepDb.bat". I keep mine in my C:\Batch directory, which is in
    my DOS path. In your DESQview "Add a program" screen, you will run
    this batch file to run D'Bridge. It sets up the stuff for the DB
    window that only needs to be done once, instead of doing it every
    time the board recycles.

    @Echo Off
    REM PrepDb.bat file to start D'Bridge from DESQview
    Dnansi
    RunDB


6)  If you are not running in DESQview, make sure you have ANSI.SYS
    loaded in your config.sys file. In either case, make sure X00.SYS
    is loaded in CONFIG.SYS.


7)  The main batch file running D'Bridge is RunDb.bat... If you are
    running in DESQview, PrepDb.bat will run RunDb.bat as the last item,
    if not, you will run it directly from DOS using the RunDB.bat file.

    REM Rem Main Batch file to run D'Bridge
    @Echo Off
    C:\CAPTURE
    E:
    CD \DB
    DB
    If ErrorLevel 90 Goto Maint
    If ErrorLevel 20 Board
    Goto END
   :MAINT
    Call Maint

   :END
    Exit






-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.04  PC-BOARD
                                                                             193
--------------------------------------------------------------------------------G




8)  Modify your PCBoard BOARD.BAT file so it looks like the example
    below.

    @Echo off
    C:
    Cd\Pcb
    If Exist Remote.bat Rename Remote.bat Remote.sys
    If Exist Event.bat Rename Event.bat Event.sys
    If Exist Door.bat Del Door.bat
    If Exist Endpcb del Endpcb

    Call PCBBAT

    If Exist Remote.bat Remote
    If Exist Door.bat Door
    If Exist Event.bat Event
    Cls
    RunDB


9)  Now, when a BBS caller calls, D'Bridge will copy the translated
    connect code to a batch file it creates called "PCBBAT.BAT," exit
    with errorlevel 20, and run PCBoard's Board.bat file. When Board.bat
    gets to the "Call PCBBAT" line, it will run PCBBAT, which, if a 2400
    bps MNP caller is online will contain the following command:

    PCBOARD /C:3 /ERR

    ...which tells pcboard the caller is connected at 2400 bps, and is
    using an error-corrected (MNP) modem. This will allow the caller to
    use protocols such as YModem-G. After the caller exits from PCBoard,
    PCBBAT will return to BOARD.BAT.

    Well, that's it!  Really fairly simple, and it works very reliably.


















-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.05  PHOENIX BBS
                                                                             194
--------------------------------------------------------------------------------G






8.05  PHOENIX BBS

D'Bridge is completely compatible with the Phoenix BBS system, through
version 1.36rt. In order to configure D'Bridge to work with Phoenix,
follow the steps below:

1) In the Phoenix configuration, set the "Use PRENM (or equivalent front-end
   mailer) setting to 'Y'. This will let phoenix know you are running D'Bridge
   and cause Phoenix to exit with a errorlevel 200 when a user logs off.

/-----------------------------------------------------------------------------\
|          PHOENIX Remote Communications System Configuration Program         |
\-----------------------------Press F1 for Help-------------------------------/
                                                                               
                             Operational Defaults                              
|                                                                             |
| Display System Status Report after every caller?... N                       |
| Use modem when using ALT-R or HOME?................ N                       |
|    If so, Y = Busy modem, N = Disable answering.... N                       |
| Busy modem when using ALT-D?....................... Y                       |
| Use Full Screen mode on startup?................... Y                       |
| Use PRENM (or equivalent front-end mailer)?........ Y  <--- Set this to 'Y' |
| Use direct (fast) screen writes?................... Y                       |
| Allow more than one copy of PHOENIX to run?........ N                       |
| Busy modem when quitting PHOENIX (F10 key)?........ Y                       |
| Message must be private until proofed by sysop?.... N                       |
| All messages must be public?....................... N                       |
| User level sensitive bulletins?.................... N                       |
|    If so, what menu to use......................... 1                       |
|                                                                             |
                          Press PgDn for the next page                         
                                                                               
                                                                               
                    Copyright (C) 1989 by The GeneSys Project                  
                                                                               

2) There are 3 methods for running Phoenix with D'Bridge, however the first
   method, using the PUSH routine, is not recommended since Phoenix takes up
   quite a bit of memory. Using the PUSH method may limit your ability to
   run external doors within Phoenix especially if running under Desqview.

a) Using the DROP method will swap most of D'Bridge to EMS or DISK, then
   load and run Phoenix. Make sure you put the '+' in front of the command
   to start Phoenix, this tells D'Bridge to swap itself to memory. The *B will
   pass the correct baud rate to Phoenix. Here is a example:




-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.05  PHOENIX BBS
                                                                             195
--------------------------------------------------------------------------------G



/----------------------------------------------------------------------------\
| DOS commands for BBS: cd\phoenix                                           |
|                       +phoenix -b*B                                        |
|                                                                            |
\----------------------------------------------------------------------------/

b) When using the EXIT method, D'Bridge must be run from a batch file. See the
example, RUNDB.BAT below. This method is the best way to conserve memory and
is easy to setup, especially if you already use a batch file to run D'Bridge.
Put the following in the DOS BBS command area:

/----------------------------------------------------------------------------\
| DOS commands for BBS: Echo PHNX -b*b > c:\phoenix\dobbs.bat                |
|                       *X150                                                |
|                                                                            |
\----------------------------------------------------------------------------/

The example above writes a file called DOBBS.BAT containing the commands to
run Phoenix, via a batch file called PHNX.BAT (see the example below). The *b
is replaced with the callers baud rate. After the batch file is created,
D'Bridge will exit with a errorlevel 150, which will call the label named BBS.
The listing below is an example of the batch file which will load D'Bridge and
start the BBS when a call is received.

RUNDB.BAT EXAMPLE
-----------------

@echo off
cls
set dbridge=c:\db
set phoenix=c:\phoenix
:START
c:
cd\db
XU CAPTURE:OFF FIFO:OFF LOCK:0:OFF PORT:0:OFF
db
if errorlevel 150 goto bbs
if errorlevel   0 goto end
goto end

:BBS
cd\phoenix
dobbs.bat  <--- This is the batch file created above by D'Bridge. It will
goto end        contain something like 'Phnx -b2400', if the caller called
                at 2400 baud.
:END

When DOBBS.BAT is ran, it will run the batch file PHNX.BAT and pass along the
baud rate as -b2400 in the %1 variable. Phoenix will interpret the variable
when loading.


-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.05  PHOENIX BBS
                                                                             196
--------------------------------------------------------------------------------G




PHNX.BAT EXAMPLE
----------------

@echo off
cls
:START
cd\phoenix
XU CAPTURE:ON FIFO:15 LOCK:0:19200 PORT:0:ON

Phoenix %1                     <- The %1 will be -b2400
if errorlevel 200 goto loaddb  <- When the user logs off, Phoenix will exit
if errorlevel 0 goto exit         with a errorlevel 200.
goto end

:LOADDB
cd\db
rundb                          <- This is were you re-load D'Bridge for the
goto end                          next call.

:END

IMPORTANT NOTES:

Phoenix versions 1.07 through 1.36rt will only support locked baud rates up
to 19200 baud, so make sure you do not lock your fossil any higher. If you
have an error correcting modem, you may pass along the /ARQ connect to
Phoenix. If your modem returns something other then /ARQ, Phoenix will not
operate, but you can use the "CONNECT" commands section in the Comm/Modem
setup in D'Bridge to translate these strings. Here is an example:

"CONNECT" commands: 2400 CONNECT 2400/MNP|CONNECT 2400/ARQ
                    9600 CONNECT 9600/MNP|CONNECT 9600/ARQ

That's all there is to it. Of course you may want to add other errorlevels in
both the RUNDB.BAT and the PHNX.BAT file to handle errors, mail, and various
doors.
















-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.06  QUICKBBS
                                                                             197
--------------------------------------------------------------------------------G






8.06  QUICKBBS

D'Bridge has specific support for QuickBBS that allows both NETmail and
ECHOmail operation smoothly and efficiently. Follow these simple steps
to configure QuickBBS and D'Bridge together:


  1) If you wish to the QuickBBS format for your NETmail area, specify
     the QuickBBS message area number to use on the DIRECTORY PATHS
     screen.


  2) Define a QuickBBS path in the DIRECTORY PATHS screen. This path
     should be set to the directory QuickBBS uses for its message base
     files.


  3) Define all your local and ECHOmail areas using the LOCAL/ECHOMAIL
     AREAS screen. Make sure you define ALL areas, or D'Bridge could
     auto-assign a new ECHO using an already existing message area
     number.


  4) There are three methods for running QuickBBS under D'Bridge:


     a) Using the PUSH method, D'Bridge "spawns" the QuickBBS program;
        this is the fastest way, but requires the most memory. To
        configure this, specify the following in the DOS BBS COMMANDS
        window:

        /---------------------------------------------------------\
        | DOS commands for BBS: CD \QUICKBBS                      |
        |                       QUICKBBS -B*B -T*T -E0            |
        |                                                         |
        \---------------------------------------------------------/


     b) Using the DROP method is almost identical. This way, D'Bridge
        swaps its memory to EMS or disk, then runs QuickBBS. Simply put
        a plus sign "+" in front of the QuickBBS command like this:

        /---------------------------------------------------------\
        | DOS commands for BBS: CD \QUICKBBS                      |
        |                       +QUICKBBS -B*B -T*T -E0           |
        |                                                         |
        \---------------------------------------------------------/


-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.06  QUICKBBS
                                                                             198
--------------------------------------------------------------------------------G




     c) Using the EXIT method, D'Bridge must be run from a batch file.
        This requires some understanding of DOS, since your system will
        be setup slightly different than our example. Put the following
        in the DOS BBS commands field:


        /------------------------------------------------------------\
        | DOS commands for BBS: ECHO CD \QUICKBBS >BBS.BAT           |
        |                       ECHO QUICKBBS -B*B -T*T -E0 >>BBS.BAT|
        |                       ECHO CD \DB >>BBS.BAT                |
        |                       ECHO RUN-DB.BAT >>BBS.BAT            |
        |                       *X20                                 |
        \------------------------------------------------------------/



        Create a batch file called RUN-DB.BAT containing at least
        the following:


             ECHO OFF
             :START
             C:
             CD \DB
             DB
             IF ERRORLEVEL 20 GOTO LOADBBS
             GOTO END

             :LOADBBS
             BBS.BAT

             :END
             EXIT


        To start D'Bridge, simply type RUN-DB from the D'Bridge root
        directory.















-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.07  REMOTEACCESS
                                                                             199
--------------------------------------------------------------------------------G






8.07  REMOTEACCESS

  
D'Bridge is completely compatible with RA (all versions). In order
to configure RA with DB follow these simple steps.
First off, define all the errorlevels in the RemoteAccess Configuration
for the baudrates passed back to RA from D'Bridge via the *X command.
Only Local, 300, 1200, 2400, 4800 and 9600 need to be defined.
The others are shown for the sake of completeness.



                File        System        Options        Modem
                                                              
                                         | Messages     |     
           Errorlevels                   | Files        |     
        |              |                 | Restrictions |     
        | Local  99    |                 | Errorlevels  |     
        | 300    3     |                 | Display      |     
        | 1200   12    |                 | Colours      |     
        | 2400   24    |                 | Paging       |     
        | 4800   48    |                 | New users    |     
        | 7200   72    |                 | System       |     
        | 9600   96    |          RemoteA| Prompts      |10   
        | 12000  120   |                 | Printer      |     
        | 14400  144   |ght (C) 1991 Andr                ntine
        | 19200  192   |                                      
        | 38400  38    |             All Rights Reserved      
        |              |                                      
                                                              
                                                              
                                                              



In the BBS CONFIGURATION, set up the various files and the DOS commands
for the BBS. In this configuration, the *X will pass the baudrate/100
back to RA as an errorlevel. The first lines in the DOS Commands will
create a DOBBS.BAT file in the RA System Directory which RA will read
on the swap back from D'Bridge to RA. This one line file, created on
the fly will contain the Serial Port number, baud rate, time in minutes
to next mail event and the 'RAW' connect string from the modem.







-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.07  REMOTEACCESS
                                                                             200
--------------------------------------------------------------------------------G






/BBS CONFIGURATION--------------------------------------------------------
|   BBS software installed? Yes
|  "EMAIL calls only" text: Please hang up... Accepting EMAIL calls only.
| "Press ESC for BBS" text: Press the ESC key twice to access the BBS.
|       "Loading BBS" text: BBS now loading - Please wait...
|       "Loading BBS" file: C:\TEXT\LOADING.ASC
|   "Human" caller timeout: 20
|         BBS online hours: 24 hours
|       "After hours" file: C:\TEXT\HOURS.ASC
|        Minimum baud rate: 1200
|          "Too slow" file: C:\TEXT\TOO_SLOW.ASC
| Scan ECHOmail after call? No
|     DOS commands for BBS: echo EXEBBS *P *B *T *C >c:\ra\dobbs.bat
|                           rem XU Capture:On Dv:On Fifo:15 Port:0:On
|                           Bnu_170 /I=0+ /Z0 /C
|                           *X


The Dos Commands above show how either of the X00 or BNU fossils would
be initialized prior to RemoteAccess using them on the swap back to RA
from D'Bridge. Full information on the use of X00 or BNU will be found
in the respective distribution archives of the Fossils.


These raw connect strings could be...

   "CONNECT 2400", "CONNECT 9600/ARQ/HST/HST/V42BIS", "CONNECT 2400/REL"

...or any of the many forms the connect strings could be. RA will search
this raw connect string in the DOBBS.BAT file for the /ARQ or /REL or
whatever you define in the RA configuration to indicate a MNP or error
correcting session is in operation. This is shown on the following page
by a screen shot from the configuration program of RA:
















-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.07  REMOTEACCESS
                                                                             201
--------------------------------------------------------------------------------G




            File        System        Options        Modem        Manager
                                                                          
                                                    | Options   |         
                                                    | Commands  |         
                                                    Modem responses       
                 |                                                  |     
                 | Init   OK                                        |     
                 | Busy   OK                                        |     
                 | Ring   RING                                      |     
                 | Secure /ARQ                                      |     
                 | 300    CONNECT|                                  |     
                 | 1200   CONNECT 1200                              |     
                 | 2400   CONNECT 2400                              |     
              Cop| 4800   CONNECT 4800                              |re   
                 | 7200   CONNECT 7200                              |     
                 | 9600   CONNECT 9600                              |     
                 | 12000  CONNECT 12000                             |     
                 | 14400  CONNECT 14400                             |     
                 | 19200  CONNECT FAST                              |     
                 | 38400  CONNECT FASTER                            |     
                 |                                                  |     
                                                                          
                                                                          
   -----------------------------------------------------------------------
   Modem's response to indicate an error-free connection, eg. /ARQ

For a local logon to RA via D'Bridge, define a function key that will create
an errorlevel equal to the errorlevel defined in the RA configuration shown
above. In this case, errorlevel 99 is used and function key 10 ( F10 ).
It will be noticed that a new DOBBS.BAT file is created as this will override
the previous inbound human caller one that remain. It can be seen that the
180 ( mins to mail event ) is hard coded, but this can be replaced by the
*T parameter if you so wish... Do you really want your own BBS to throw you
off of it ?.....

















-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.07  REMOTEACCESS
                                                                             202
--------------------------------------------------------------------------------G




/FUNCTION KEYS----------------------------------------------------------------
| On this screen, you may define what DOS commands the function keys will run.
|
|     F2: List e:\fd\logs\dbridge.log
|     F3: List c:\logs\inbound.log
|     F4: List c:\logs\echomail.log
|     F5: List c:\text\last50.asc
|     F6: List c:\text\usa_rprt.asc
|     F7: Cd\qbbs
|     F8: +x
/F10:-------------------------------------------------------------------------
| Echo EXEbbs *P *B 180 *C > C:\ra\dobbs.bat
| *X99
\--------------------------------------------------------------------- 34327--
| ALT-F3: *x103
| ALT-F4: cd\qbbs
| ALT-F5: *X105


Finally, the Modem/Comms set up... this can be a very simple .MCF file and
set up as no translation is required of the raw connect string from the
modem to be passed to RemoteAccess. The * ONLY * items that need to be in
here for most modems - this includes simple 2400 Hayes<tm> types as well as
the more complicated US Robotics<tm> types - is shown below:

    300 CONNECT
    1200 CONNECT 1200
    2400 CONNECT 2400
    4800 CONNECT 4800
    9600 CONNECT 9600

A typical MCF file for a USR Courier HST Dual Standard when employed in
this mode is:

    MCF MCDS2384 Miracom DS HST/V32/V42Bis, 38400 baud
    SWITCH 1 0UUDUDUUDUU
    BAUD 38400
    LOCKED
    PREINIT ATZ
    INIT ~ATZ
    OFFHOOK ATM0H1
    ANSWER ATA
    DELAY 50
    TIMEOUT 45
    DIAL 300 ATD
    DIAL 1200 ATD
    DIAL 2400 ATD
    DIAL 4800 ATD
    DIAL 9600 ATD
    DIAL 19200 ATD

-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.07  REMOTEACCESS
                                                                             203
--------------------------------------------------------------------------------G




/COMMUNICATION PARAMETERS--------------------------------------------------
|
|         Port  Base/IRQ  Status   Ident  MCF name  Description
| DATA/1  COM1  03F8  4     OK     1442   MCDS3384  Miracom DS HST/V32/V42B
| DATA/2
| DATA/3
|
|    Answering method: Hardware (RI signal, pin 22)
|     Line assignment: N/A
|    CostGuard limits: 80   (minutes)   5.00     (cost)
| Collision detection: Hardware
|   DimeSaver enabled? Yes
| Auto-Initialization: 5   (minutes)
|   Busy when offline? Yes
|  Touch-tone dialing? Yes
|       Maximum rings: 5
|         "Flag" dial: HST ATB1D
|       Specific dial: 2:281/507 ATB0D
|      Printer device: C:\Dbridge\Dbridge.Out
|            PCF name: EPSONFX   Epson FX series
|


There is no need for anything else.... D'Bridge does not need to know
you have MNP, SYNC or any other error correcting protocol. D'Bridge only
needs to know the baud rate.. the connect strings like in the examples
below are not required :

    9600 CONNECT 9600/ARQ/HST/HST/V42BIS
    9600 CONNECT 9600/ARQ/V32/LAPM/V42BIS

The raw connect string from the modem will be passed to RA as is with
no translation.

Finally, the batch file that runs the whole lot.... this need not be
complicated or a difficult task to perform.

   This batch file is based on the following assumptions.

   1. RemoteAccess's "Shell to Mailer" function is employed. This is
      fully detailed in the RemoteAccess Documentation, but briefly
      D'Bridge is loaded as an external task within RA whilst RA is
      in itself swapped out to disk with a small kernel remaining
      in memory. This method has the advantage that when an inbound
      human call is detected, D'Bridge exits back to RA and only has
      to swap itself back into memory without performing an initiali-
      zation etc.




-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.07  REMOTEACCESS
                                                                             204
--------------------------------------------------------------------------------G



   2. All netmail is tossed to a Fido *.Msg type message area and not a
      QBBS type area.

   3. Users of the BBS have their own Netmail Area of which utilities
      like MailToss/Mailscan or Mbutil will transfer any necessary
      messages to/from the Fido type *.Msg Netmail area and the main
      message base.


:START
            Set PATH=c:\;c:\dos;c:\ra;c:\db;.........
            Set DB=C:\Db
            Set RA=C:\Ra
        Rem -----------------------------------------------------------------
        Echo   De-Init The Fossils Prior To Loading DB via RA.
        Rem -----------------------------------------------------------------
            BNU_170 /I=0-
            Rem XU Port:0:Off
        Rem -----------------------------------------------------------------
        Echo   Use Ra's Shell To Mailer Option
        Rem -----------------------------------------------------------------
            CD\RA
            Ra -m\Dbridge\Db.Exe*M
        Rem
        Rem    Note the '*M' has NO space between the DB.EXE and the *M
        Rem    ie, 'DB.EXE *M' will not cause a RA swap out properly
        Rem -----------------------------------------------------------------
        Echo   Errorlevels For Events Issued By D'Bridge
        Rem -----------------------------------------------------------------
            If Errorlevel 126 Goto MIDNITE2
            If Errorlevel 125 Goto MIDNITE1
            If Errorlevel 124 Goto MAIL_IN
            If Errorlevel 122 Goto MAINT
        Rem -----------------------------------------------------------------
        Echo   Function Key Issued Error Levels From D'Bridge
        Rem -----------------------------------------------------------------
            If Errorlevel 102 Goto FILESUPD
        Rem -----------------------------------------------------------------
        Rem  This is Errorlevel 0 issued by D'Bridge via the ALT-X
        Rem  with 10 added by RA
        Rem -----------------------------------------------------------------
            If Errorlevel 10 Goto EXIT
        Rem -----------------------------------------------------------------
        Rem    These Errorlevel are issued By RA and
        Rem    are fully explained in the RA documentation
        Rem -----------------------------------------------------------------
            If Errorlevel 5 Goto NET_Echo
            If Errorlevel 4 Goto ECHO_ONLY
            If Errorlevel 3 Goto NET_ONLY
            If Errorlevel 2 Goto EXIT
            Goto AFTER_2

-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.07  REMOTEACCESS
                                                                             205
--------------------------------------------------------------------------------G




        :MAIL_IN
        Rem   < you may want to run MsgTrack or TrackM in here on inbound >
              < received Netmail if you use a *.Msg type Netmail Area >

            If Exist C:\Db\Dbridge.Nmw Mbutil Import -Users
            Goto START

:MIDNITE2
        Rem    < various user stats programs run here >
            Goto START

:MIDNITE1
        Rem    < Generate my All Files listing maybe >
            Goto START
:MAINT
        Rem     < Daily maintenance routines >
            Goto START
:FILESUPD
        Rem     < run my file forwarding facilities >
            Goto START
:NET_ECHO
        Rem -----------------------------------------------------------------
        Rem     Force A D'Bridge NetMail Rescan For Forwarding/Packing
        Rem -----------------------------------------------------------------
            Cd\Ra
            ECHO > C:\DB\DBRIDGE.RSN
            MBUTIL Export -All
:ECHO_ONLY
        Rem -----------------------------------------------------------------
        Rem    Force A D'Bridge EchoMail Rescan For Forwarding/Packing
        Rem -----------------------------------------------------------------
            ECHO > C:\DB\DBRIDGE.RSE
            Goto AFTER_2
:NET_ONLY
        Rem -----------------------------------------------------------------
        Rem     Force A D'Bridge NetMail Rescan For Forwarding/Packing
        Rem -----------------------------------------------------------------
            CD\Ra
            ECHO > C:\DB\DBRIDGE.RSN
            MBUTIL Export -All
:AFTER_2
        Rem   < After human call user stats programs etc >
            Goto START

:EXIT
        Rem
            CD\




-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.07  REMOTEACCESS
                                                                             206
--------------------------------------------------------------------------------G




Extensive use of some D'Bridge flag/semaphore files has been made in the
above batch file example. Briefly, they are:

  If a DBRIDGE.NMW exists, there has been a New Netmail arrival that
  has not been read by you with the D'Bridge Editor.

  If you create a DBRIDGE.RSN, this will cause D'Bridge to repack the
  Outgoing Netmail according to the event in operation at the time and
  rebuild the queue.

  If you create a DBRIDGE.RSE, this will cause D'Bridge to scan the
  echomail areas and export/pack any outgoing Echomail messages. This
  will also cause a queue rebuild to occur.

Although use of a program called MBUTIL (by Gerard van der Land) is shown
above, this in no way endorses the use of this program.




































-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.08  SUPERBBS
                                                                             207
--------------------------------------------------------------------------------G






8.08  SUPERBBS

D'Bridge has specific support for QuickBBS allowing both NETmail and
ECHOmail operation smoothly and efficiently. Because SuperBBS is fully
compatible to the QuickBBS message base format you can follow these simple
steps to configure SuperBBS and D'Bridge together. Every time you read
QuickBBS area number or Quick directory path in D'Bridge just think it's
the same meaning in SuperBBS :


  1) If you wish to the SuperBBS format for your NETmail area, specify
     the SuperBBS message area number to use on the DIRECTORY PATHS
     screen.

        /----------------------------------------------------------\
        | QuickBBS area number : 1                                 |
        \----------------------------------------------------------/

  2) Define a SuperBBS path in the DIRECTORY PATHS screen. This path
     should be set to the directory SuperBBS uses for its message
     base files.


        /----------------------------------------------------------\
        | ...                                                      |
        | Quick directory path : C:\SUPERBBS\                      |
        | ...                                                      |
        \----------------------------------------------------------/


  3) Define all your local and ECHOmail areas using the LOCAL/ECHOMAIL
     AREAS screen. Make sure you define ALL areas, or D'Bridge could
     auto-assign a new ECHO using an already existing message area
     number.

        /----------------------------------------------------------\
        | ...                                                      |
        |         Storage: QuickBBS  (Fido/QuickBBS/None)          |
        | QuickBBS area #: 2                                       |
        | ...                                                      |
        \----------------------------------------------------------/








-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.08  SUPERBBS
                                                                             208
--------------------------------------------------------------------------------G




  4) There are three methods for running SuperBBS under D'Bridge:

     a) Using the PUSH method, D'Bridge "spawns" the SuperBBS program;
        this is the fastest way, but requires the most memory. To
        configure this, specify the following in the DOS BBS COMMANDS
        window:

        /----------------------------------------------------------\
        | DOS commands for BBS: CD \SUPERBBS                       |
        |                       BBS -N1 -B*B -E0 -P1 -O80000 -T*T  |
        |                                                          |
        \----------------------------------------------------------/

        -Nx       specify the line number of your multiline BBS*
        -Px       specify the com port you use for this line*
        -Ox       specify the overlay buffer*

        * for more details have a look at the SuperBBS manual

     b) Using the DROP method is almost identical. This way, D'Bridge
        swaps its memory to EMS or disk, then runs SuperBBS. Simply put
        a plus sign "+" in front of the SuperBBS command like this:

        /----------------------------------------------------------\
        | DOS commands for BBS: CD \SUPERBBS                       |
        |                       +BBS -N1 -B*B -E0 -P1 -O80000 -T*T |
        |                                                          |
        \----------------------------------------------------------/

     c) Using the EXIT method, D'Bridge must be run from a batch file.
        This requires some understanding of DOS, since your system will
        be setup slightly different than our example. Put the following
        in the DOS BBS commands field:

     /-----------------------------------------------------------------------\
     | DOS commands for BBS: ECHO CD \SUPERBBS >BBS.BAT                      |
     |                       ECHO BBS -N1 -B*B -E0 -P1 -O8000 -T*T >>BBS.BAT |
     |                       ECHO CD \DB >>BBS.BAT                           |
     |                       ECHO RUN-DB.BAT >>BBS.BAT                       |
     |                       *X20                                            |
     \-----------------------------------------------------------------------/










-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.08  SUPERBBS
                                                                             209
--------------------------------------------------------------------------------G




        Create a batch file called RUN-DB.BAT containing at least
        the following:

             ECHO OFF
             :START
             C:
             CD \DB
             DB
             IF ERRORLEVEL 20 GOTO LOADBBS
             GOTO END
             :LOADBBS
             BBS.BAT

             :END
             EXIT

        To start D'Bridge, simply type RUN-DB from the D'Bridge root
        directory.


































-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.09  SEARCHLIGHT BBS
                                                                             210
--------------------------------------------------------------------------------G






8.09  SEARCHLIGHT BBS

Searchlight Bulletin Board System is available from Searchlight
Software and written by Frank LaRosa. It is noted for it's
excellent ability to run under DESQView and requires little
memory to function properly. Searchlight is also an extremely
good BBS system with D'Bridge as it doesn't require the use of a
fossil driver except for certain doors. Follow the following
steps:

1) Configuring Searchlight.

   First, call up Searchlight's CONFIG.EXE program and go to
   General Setup Menu #2 and configure as follows.

     Searchlight BBS General Setup Menu #2

      1. Screen write Method ........... Direct
      2. Idle Time Limit ...............      5
      3. Quotes File ................... On
      4. Return to DOS on Logoff ....... Yes
      5. Hangup Phone on Logoff ........ No
            .
            .

   Number 4 is the important one here. Be sure to have this set
   to Yes so that the BBS will exit back to D'Bridge. Now, hit
   escape and go down to the Communications Setup.

   Searchlight BBS Communications Setup

      1. Comm Port .....................      1
      2. Support 300 Baud .............. No
      3. Support 1200 Baud ............. Yes
      4. Support 2400 Baud ............. Yes
      5. Support 4800 Baud ............. Yes
      6. Support 9600 Baud ............. Yes
      7. Support 19200 Baud ............ Yes
      8. Remote Init String ............ ATH0M0H1!
      9. Local Init String ............. ATH1!
     10. Baud Detect Method ............ Modem Msg
     11. Locked Baud Rate .............. 19200
     12. Hardware Flow Control ......... On
     13. Output Buffering Factor .......      0
     14. Buffer Door Programs? ......... No
     15. Com Port Setup [...]



-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.09  SEARCHLIGHT BBS
                                                                             211
--------------------------------------------------------------------------------G



   This is a setup for a 9600 V.32 modem. Set the support for
   your modem type as indicated. The Remote init is set to put
   the modem on-hook and then take it off-hook again. This will
   allow for any additional processing (such as EchoMail export)
   after the caller is offline and still not allow another caller
   to try and call during processing.

2) Configuring D'Bridge

   There are three ways you can run Searchlight under D'Bridge.

   OPTION A - The PUSH Method

      With the PUSH method, D'Bridge stays in memory and uses any
      additional memory for the BBS, spawning it from a batch
      file or directly. This is a good method for a board
      without large Door Programs, as it quickly loads the BBS.

      a) Enter the following in the DOS BBS COMMANDS window on
         the BBS CONFIGURATION Screen:

        /-------------------------------------------------------\
        I  DOS commands for BBS: SL.BAT *B                      I
        I                                                       I
        I                                                       I
        I                                                       I
        \-------------------------------------------------------/

      b) Create a batch file called SL.BAT in the D'Bridge root
          directory or in the path. You can use the following
          example:

         @Echo off
         cd\bbs
         slbbs %1
         exit

   OPTION B - The DROP Method.

      This option is similar to "A" except that D'Bridge swap
      almost all of it's RAM to EMS or disk, depending on
      configuration. This is a good method for BBS's with large
      Doors and EMS or a fast hard drive. The only difference is
      in the DOS BBS COMMANDS window:

        /-------------------------------------------------------\
        I  DOS commands for BBS: +SL.BAT *B                     I
        I                                                       I
        I                                                       I
        I                                                       I
        \-------------------------------------------------------/

-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.09  SEARCHLIGHT BBS
                                                                             212
--------------------------------------------------------------------------------G



   OPTION C - The EXIT Method.

      With this option, D'Bridge completely removes itself from
      memory before the BBS loads. To run this method properly,
      D'Bridge must be run from a continuous batch file. Follow
      the configuration shown.

      a) Enter the following commands in the DOS BBS COMMANDS
          window on the BBS CONFIGURATION screen:

        /-------------------------------------------------------\
        I  DOS commands for BBS: ECHO CD\BBS >BBS.BAT           I
        I                        ECHO SLBBS *B >>BBS.BAT        I
        I                        ECHO EXIT >>BBS.BAT            I
        I                         *X20                          I
        \-------------------------------------------------------/

      b) Create a batch file to run D'Bridge using the following
         example. Start D'Bridge from now on with this batch
         file, usually by calling it from your AUTOEXEC.BAT file:

            @ECHO OFF
            :BEGIN
            CD\DB
            DB.EXE
            IF ERRORLEVEL 20 GOTO BBS
            GOTO END

            :BBS
            CALL BBS.BAT
            CALL EXPORT.BAT
            GOTO BEGIN

            :END
            EXIT


















-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.10  TBBS
                                                                             213
--------------------------------------------------------------------------------G






8.10  TBBS

TBBS is a very popular commercial bulletin board system available from
eSoft.

Current versions of TBBS are designed to work with the SEAdog electronic
mail system by System Enhancement Associates. For TBBS users to enter
NETmail, a SEAdog-style nodelist is required; D'Bridge does not create
a compatible nodelist format. You must either use SEAdog's utilities or
a third-party nodelist processor to create this list. It is not our
intention of supporting multiple nodelist formats.

There are two versions of TBBS: Single- and multi-line. Both versions
use the same file formats, but only the Single-line version is capable
of using D'Bridge as a front-end mailer. If you wish to use the multi-
line version of TBBS, you will have to run D'Bridge for nightly mail
events and transfer mail only during designated times. The configuration
of D'Bridge is different for bother versions of TBBS.

     If you are using the TBBS MULTI-LINE version perform the following
     steps:


         a) Using a standard text editor such as EDLIN, create a
            batch file similar to the following:

            :TOP
            CD \TBBS
            MLTBBS /U
            IF ERRORLEVEL 25 GOTO MAILER
            GOTO END

            :MAILER
            CD \DB
            DB
            GOTO TOP

            :END
            EXIT


         b) Using the CEDIT program, set an external event at the time
            you want to run D'Bridge, by exiting with errorlevel 25.
            For more details about CEDIT, see Chapter 5 of your
            TBBS manual.




-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.10  TBBS
                                                                             214
--------------------------------------------------------------------------------G




         c) Using the D'Bridge SCHEDULE MAINTENANCE screen, create the
            desired MAIL events plus an EXIT event directly following
            with an errorlevel of 10. In the above batch file, error-
            level 10 means to re-load TBBS.


         d) To run the system, just start the batch file. TBBS will
            execute and run D'Bridge at the designated time.




     If you are using the TBBS SINGLE-LINE version perform the following
     steps:


         a) Rename DBMAILER.EXE to MAILER.EXE using the DOS "REN" command:

            C> REN DBMAILER.EXE MAILER.EXE

            If you are upgrading from a previous version, you might have
            to delete MAILER.EXE before doing this. Make sure you always
            rename this file when you upgrade to a new D'Bridge version.
            The DB.EXE shell program will run MAILER.EXE if the
            DBMAILER.EXE program is not found in the current path.



         b) With a standard text editor, create a batch file similar to
            the following:


            :TOP
            C:
            CD \TBBS
            TBBSDVR
            TBBS /M
            IF ERRORLEVEL 30 GOTO ECHOSCAN
            GOTO END


            :ECHOSCAN
            DB UNPACK
            (Put your ECHOmail processing commands here)
            .
            .
            .
            GOTO TOP

            :END
            EXIT

-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.10  TBBS
                                                                             215
--------------------------------------------------------------------------------G




         c) When D'Bridge is loaded in this manner, odds are there's not
            enough memory free to process ECHOmail, so unpacking should
            be done from on a batch basis.a batch basis; disable the
            internal unpacker by answering "NO" to the UNPACK MAIL field
            on the PACKET/MAIL CONTROL screen.


         d) For D'Bridge to unpack mail, you must specify DOS COMMANDS
            on the ADVANCED ROUTING screen of the SCHEDULE MAINTENANCE
            system. In each mail event that you want mail unpacked plus
            the UNEVENT, specify the following for DOS COMMANDS:

            *X30

            After mail is received, D'Bridge will exit with an errorlevel
            of 30; with the above batch file, this will cause TBBS to be
            unloaded and the DB UNPACK option to be run. If you only
            want to unpack mail on a periodic basis, you may accomplish
            this by using "EXIT" events with errorlevel 30 when you want
            the unpacker to be run.



         e) Finally, for D'Bridge to exit to TBBS when a bulletin board
            call is received, specify the following in the DOS BBS
            COMMANDS field on the BBS CONFIGURATION screen:

             /--------------------------------------------------------\
             | DOS commands for BBS: *X                               |
             |                                                        |
             |                                                        |
             \--------------------------------------------------------/




















-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.11  TELEGARD
                                                                             216
--------------------------------------------------------------------------------G






8.11  TELEGARD

Setting up D'Bridge and Telegard is a snap. First let's look at the
Telegard aspect of it. From the "P", System Configuration screen, go to
Modem Configuration:

Modem configuration

1. Maximum baud rate   : 38400             (If you are using 9600 or above)
2. COM port number     : 2
3. Modem init string   : "ATZ"
4. Modem answer string : "ATA"
5. Modem hangup string : "~~~+++~ATH1"
6. Modem offhook string: "ATM0H1"
7. No-call init time   : 30
8. COM port locked?    : Yes               (If you are using 9600 or above)
9. Locked COM port baud: 38400             (If you are using 9600 or above)
R. Modem result codes  :

Those are the only real things you need to be worried about in the Modem
Section. Next goto the FidoNet Configuration:

FidoNet configuration

A. Network address : 1:376/72.0      (Simply your Net/Node/Point)
B. Origin line     : ""              (Default that you would like to use as
                                      an Origin Line)
C. Strip IFNA kludge lines : Yes     1. Color of standard text : 1
D. Strip SEEN-BY lines     : Yes     2. Color of quoted text   : 3
E. Strip origin line       : No      3. Color of tear line     : 4
F. Strip centering codes   : Yes     4. Color of origin line   : 3
G. Strip box codes         : Yes
H. Center box/center lines : Yes
I. Add tear/origin lines   : No
J. Default EchoMail path   : "D:\MSG\"

It is not necessary to strip the Seen-By or IFNA kludge lines, but it
does look better. In 99% of the cases, you will want the centering, and
box codes all set to YES.

Adding a tear and origin line is all up to you. I choose not too simply
because I prefer seeing "D'Bridge" at the bottom of the messages that I
enter in!






-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.11  TELEGARD
                                                                             217
--------------------------------------------------------------------------------G




Setting up the Message bases themselves:

1. Name        : D'Bridge Support
2. Filename    : DBRIDGE
3. Base type   : EchoMail
   Message path: D:\MSG\DBRIDGE\
[...]
7. Anonymous   : No
8. Password    : ""
9. Address     : Default
C. Colors      : Text=1, Quote=3, Tear=4, Origin=3
M. Mail flags  : KS-/CBM-
O. Origin line : "Windows of the World (WOTW)"
   Flags       : R-A
   P-Index     : 38
Q. Quit

Edit menu (?=help) : ?

Toggles:
(R)eal names     (A)Filter ANSI/8-bit ASCII

Edit menu (?=help) :

    1)  Simply the description you would like your users to see.
    2)  The filename that you would like Telegard to use to store the
        messages.
    3)  If it is an area that you want to interface with D'Bridge, make
        sure it is set to ECHOmail and the path is the same as that you have
        defined in D'Bridge for the echo.
  4-6)  Removed, it's irrelevant to D'Bridge and Telegard and is all up to
        you.
    7)  Do NOT allow anon. posts. It's against Fido policy!
    8)  Password is up to you if you want on the message base
    9)  If you want an address that is different from your default added to
        the Origin line, enter it in here. (Be sure you also have DB set up
        to use a different address for the individual echo also or it will
        be of little good.
    C)  Colors are only relevant to what is seen on the BBS itself
    M)  The correspond to the flags you set up in the FidoNet Config above.
        You can set them all individually for each ECHOmail message area.

                 (K)ludge line strip     (B)ox code strip
                 (S)EEN-BY line strip    (M)ake lines centered
                 (O)rigin line strip     (T)ear/origin line add
                 (C)entering code strip





-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.11  TELEGARD
                                                                             218
--------------------------------------------------------------------------------G



    O)  Like most other areas, you can set the origin line to read whatever
        you want.

            FLAGS:      (R)eal Names  --  Always turn this on if it is a
                                          FidoNet conference
                        (A)NSI filter --  ""

That's it from the Telegard half. The D'Bridge side is simple!


/BBS CONFIGURATION----------------------------------------------------------\
|   BBS software installed? Yes                                             |
|  "EMAIL calls only" text: Accepting EMAIL calls only. Please hang up...   |
| "Press ESC for BBS" text: Press the ESC key twice to access the BBS...    |
|       "Loading BBS" text:                                                 |
|       "Loading BBS" file: D:\DB\LOADING.TXT                               |
|   "Human" caller timeout: 20                                              |
|         BBS online hours: 05:00 until 03:00                               |
|       "After hours" file: F:\DB\FILES\TOOLATE.TXT                         |
|        Minimum baud rate:                                                 |
|          "Too slow" file:                                                 |
| Scan ECHOmail after call? No                                              |
|     DOS commands for BBS: d:                                              |
|                           cd\bbs                                          |
|                           bnu /I=1+                                       |
|                           +bbs -b*b -q                                    |
|                           bnu /I=1-                                       |
\---------------------------------------------------------------------------/

    The only important aspect here is the "DOS commands for BBS"

        Make sure D'Bridge changes to the Telegard directory before it
        tries to load it otherwise it won't load!

        The BNU line(s) are only relevant if you are going to be using TG
        with a fossil driver. If you are using a 9600 modem or above, I
        STRONGLY recommend you do. The BNU /I=1+ command simply enables the
        driver before the bbs loads and the BNU /I=1- disables it before
        D'Bridge loads back up -- it does not remove it from memory, but
        simply disables it and lets D'Bridge handle the comm port.
        To use these commands, you must have first loaded BNU with all of
        the options you want it to operate with. I do this just before I
        load DB.

        the +BBS -B*B -Q line is what loads up Telegard. The -B*B loads TG
        with the connect rate listed after the | in DB's modem setup.
        Since Telegard does nothing different for MNP or ARQ callers, make
        them all 300, 1200, 2400 or 19200, anything else will simply cause
        problems.



-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.11  TELEGARD
                                                                             219
--------------------------------------------------------------------------------G



For the "Drop to DOS method", remove all of the commands in the "DOS
commands for BBS" section and place "*X" in there place. Below is a
sample of the batch file I use to run TG from D'bridge:

RUNDB.BAT

REM This is where I load BNU once and only once, the first time DB gets
REM loaded for the day.
C:\UTIL\bnu /P=1 /T=10 /R=10 /F+ /L1=38400 /Z0 /M-
:TOP
BNU /I=1-
DB                                   ;   Load D'Bridge!
IF ERRORLEVEL 192 goto 9600BAUD      ;   BBS caller connected at 19,200 bps
IF ERRORLEVEL 96 GOTO 9600BAUD       ;   9600 Connect
IF ERRORLEVEL 48 GOTO 4800BAUD       ;   4800 Connect
IF ERRORLEVEL 24 GOTO 2400BAUD       ;   2400 Connect
IF ERRORLEVEL 12 GOTO 1200BAUD       ;   1200 Connect
IF ERRORLEVEL  3 GOTO 300BAUD        ;    300 Connect
IF ERRORLEVEL  0 GOTO END            ;   You Exited D'Bridge

:300BAUD
d:
BNU /I=1+
CD\BBS
BBS -b300 -q        ; Parameters for Telegard to load at 300 baud and exit
                    ; when user logs off
TELEMAIL SCAN       : Telegard Utility to check for new FIDO-NET messages
                    ; to be exported, not necessary here
GOTO TOP            ; Return to beginning of batch file and load D'Bridge
                    ; again

:1200BAUD
d:
BNU /I=1+
CD\BBS
BBS -b1200 -q       ; Parameters for Telegard to load at 1200 baud and exit
                    ; when user logs off
TELEMAIL SCAN       ; Telegard Utility to check for new FIDO-NET messages to
                    ; be exported, not necessary here
GOTO TOP            ; Return to beginning of batch file and load D'Bridge
                    ; again











-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.11  TELEGARD
                                                                             220
--------------------------------------------------------------------------------G




:2400BAUD
d:
BNU /I=1+
CD\BBS
BBS -b2400 -q       ; Parameters for Telegard to load at 2400 baud and exit
                    ; when user logs off
TELEMAIL SCAN       ; Telegard Utility to check for new FIDO-NET messages to
                    ; be exported, not necessary here
GOTO TOP            ; Return to beginning of batch file and load D'Bridge
                    ; again

:4800BAUD
d:
BNU /I=1+
CD\BBS
BBS -b4800 -q       ; Parameters for Telegard to load at 4800 baud and exit
                    ; when user logs off
TELEMAIL SCAN       ; Telegard Utility to check for new FIDO-NET messages to
                    ; be exported, not necessary here
GOTO TOP            ; Return to beginning of batch file and load D'Bridge
                    ; again

:9600BAUD
d:
CD\BBS
BBS -b19200 -q     ; Parameters for Telegard to load at 19200 baud and exit
                   ; when user logs off
TELEMAIL SCAN      ; Telegard Utility to check for new FIDO-NET messages to
                   ; be exported, not necessary here
GOTO TOP           ; Return to beginning of batch file and load D'Bridge
                   ; again


The TELEMAIL utilities will need to be found on a Telegard support system,
or most major bbses. (1:376/72 has them!)

The only other thing you might need is to add a command to get any received
echomail into Telegard. You would want to do that either as an event or as
a "DOS command after mail received" in all of your events. In either case,
the commands would be:

        D:              'Change to the drive where the BBS is located
        CD \BBS         'Change to the BBS directory
        TELEMAIL TOSS   'Toss any new echomail into Telegard








-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.12  WILDCAT
                                                                             221
--------------------------------------------------------------------------------G






8.12  WILDCAT

Wildcat bulletin board system is available from Mustang Software; it is
an excellent menu-driven BBS that runs well with D'Bridge. In order to
configure Wildcat and D'Bridge together, follow these steps:



1) Configure Wildcat's MODEM INFORMATION screen as follows. This uses
   the US Robotics HST as an example. If you use a different modem,
   the parameters may vary. Leave all the initialization fields blank
   or Wildcat will send the strings to the modem. Wildcat receives the
   caller already online after D'Bridge answers the call.



/-----------------------------------------------------------------------------\
|                              MODEM INFORMATION - Part 1           Frame 3   |
|                                                                             |
|   1.  Which Communications Port do you want to use [ 1 .. 4 ]  ? 1          |
|   2.  Maximum # of seconds to wait for carrier [ S7 Register ] ? 1          |
|   3.  Enter the string to reset your modem:                                 |
|   4.  Enter Modem Startup String #1:                                        |
|                                                                             |
|   5.  Enter Modem Startup String #2:                                        |
|                                                                             |
|   6.  Enter Modem Startup String #3:                                        |
|                                                                             |
|   7.  Enter the string to reinitialize your modem after every call:         |
|                                                                             |
|   8.  Modem Delays in Milliseconds:                                         |
|          #1: 1         #2: 1        #3: 1                                   |
|   9.  Initialize your modem port at which baud rate [ 300..19200 ] ? 19200  |
|  10.  Lock the DTE setting at the initialized baud rate [Y/N] ? Y           |
|                                                                             |
\-----------------------------------------------------------------------------/


2) Wildcat has certain protocols that may only be used if there is an
   error-correcting connection. If you have a modem with MNP, it should
   return a different response string such as MNP, ARQ or RELIABLE.
   D'Bridge needs to translate this code into a string Wildcat will
   understand. Again, this example uses the HST modem; if you do not
   have an error-correcting modem, this setup is acceptable.
   Configure the "CONNECT" COMMANDS field on the COMMUNICATION MODEM
   SETUP screen:



-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.12  WILDCAT
                                                                             222
--------------------------------------------------------------------------------G




   /-------------------------------------------------------------------\
   | "CONNECT" commands: 9600 CONNECT 9600|9600                        |
   |                     2400 CONNECT 2400|2400                        |
   |                     1200 CONNECT 1200|1200                        |
   |                      300 CONNECT|300                              |
   |                     9600 CONNECT 9600/ARQ|9600MNP                 |
   |                     2400 CONNECT 2400/ARQ|2400MNP                 |
   |                     1200 CONNECT 1200/ARQ|1200MNP                 |
   \-------------------------------------------------------------------/

3) There are two ways to setup Wildcat under D'Bridge:


       OPTION "A"  -  Spawn a batch file using the DROP method

       With the DROP method, D'Bridge swaps almost all its used RAM to
       EMS or disk, then "spawns" a batch file that invokes Wildcat.
       If you have available EMS or a fast disk, this is a good method
       to use:


          a) Enter the following in the DOS BBS COMMANDS window on the
             BBS CONFIGURATION screen:

             /--------------------------------------------------------\
             | DOS commands for BBS: +CAT.BAT *C                      |
             |                                                        |
             |                                                        |
             \--------------------------------------------------------/


          b) Create a batch file called CAT.BAT in the D'Bridge root
             directory. Use the following as an example:

             IF 1==%live% GOTO RETURNCAT

             :WILDCAT
             SET LIVE=
             C:
             CD \WC


             REM If you want to pass the time to the next event to
             REM Wildcat add a %2  after the %1
             Wildcat /B %1
             IF ERRORLEVEL 60 GOTO END
             IF ERRORLEVEL 35 goto QBBSMAIL
             GOTO END



-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.12  WILDCAT
                                                                             223
--------------------------------------------------------------------------------G



             :RETURNCAT
             C:
             CD \WC
             SET live=
             Wildcat
             IF ERRORLEVEL 60 GOTO END
             IF ERRORLEVEL 35 goto QBBSMAIL
             GOTO END

             :QBBSMAIL
             C:
             CD \QUICKBBS
             WC2QBBS C:\WC\CALLINFO.BBS
             QUICKBBS -R -e0
             GOTO RETURNCAT

             END:
             EXIT




       OPTION "B"  -  Run D'Bridge from a batch file and EXIT

       With the EXIT method, D'Bridge is completely removed from memory
       when Wildcat takes control. This method requires D'Bridge to be
       run from a batch file. Following is a description of how to
       configure the software for this method:



          a) Enter the following in the DOS BBS COMMANDS window on the
             BBS CONFIGURATION screen:

             /--------------------------------------------------------\
             | DOS commands for BBS: ECHO SET baud=*C >BBS.BAT        |
             |                       ECHO SET live=2 >>BBS.BAT        |
             |                       ECHO RUN-DB.BAT >>BBS.BAT        |
             |                       *X96                             |
             \--------------------------------------------------------/


          b) Create a batch file called RUN-DB.BAT using the following
             model as an example. Start D'Bridge by using this batch
             file, most-likely by calling it directly from AUTOEXEC.BAT:


             ECHO OFF
             :START
             CLS


-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
8.12  WILDCAT
                                                                             224
--------------------------------------------------------------------------------G



             IF 1==%live% GOTO RETURNCAT
             IF 2==%live% GOTO WILDCAT
             SET LIVE=
             SET BAUD=
             C:
             CD \DB
             DB
             IF ERRORLEVEL 96 GOTO LOADBBS
             GOTO END

             :WILDCAT
             SET live=
             C:
             CD \WC
             Wildcat /B %baud%
             IF ERRORLEVEL 35 GOTO QBBSMAIL
             GOTO START

             :LOADBBS
             BBS.BAT

             :RETURNCAT
             C:
             CD \WC
             SET live=
             Wildcat
             IF ERRORLEVEL 35 GOTO QBBSMAIL
             GOTO START

             :QBBSMAIL
             C:
             CD \QUICKBBS
             WC2QBBS C:\WC\CALLINFO.BBS
             QUICKBBS -R -e0
             GOTO RETURNCAT

             END:
             EXIT















-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
9.00  GLOSSARY OF TERMS
                                                                             225
--------------------------------------------------------------------------------G






9.00  GLOSSARY OF TERMS





ADDRESS

An GADDRESSH normally specifies where you want to send EMAIL or files.
D'Bridge uses the Fidonet addressing structure; this consists of four
numbers: ZONE, NET, NODE and POINT. For example, my ADDRESS is 1:110/68.
This means ZONE 1, NET 110, NODE 68 and POINT 0. The format for a Fidonet
ADDRESS is: GZONEH:GNETH/GNODEH.GPOINTH.




ALIAS

An GALIASH is simply another ADDRESS or USER NAME you are using at any given
time. Your system will have a primary ADDRESS and OPERATOR, but you may also
specify a list of AKA (Also Known As) ADDRESSES and USER NAMES which may be
selected while using the internal message editor. ALIAS ADDRESSES are used
when your system belongs to more than one network.




AREAFIX

GAREAFIXH is a subsystem with D'Bridge allowing remote systems to add and
delete ECHOmail conferences from your forwarding list. This eliminates the
need for routine maintenance by the operator of an ECHOmail hub.

















-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
9.00  GLOSSARY OF TERMS
                                                                             226
--------------------------------------------------------------------------------G






ATOMIC CLOCK

The GATOMIC CLOCKH is a type of clock that uses certain resonance frequencies
of atoms to keep time with extreme accuracy. The electronic components of 
ATOMIC CLOCKS are regulated by the frequency of the microwave electromagnetic 
radiation emitted or absorbed by the quantum transition (energy change) of an 
atom or molecule. In an ATOMIC CLOCK these quantum transitions produce 
extremely regular waves of electromagnetic radiation; like the recurrent 
events in other types of clocks, these waves are then counted.
Th cesium-beam ATOMIC CLOCK is the most accurate standard of ATOMIC TIME
and frequency. In 1967 the 13th General Conference on Weights and Measures
redefined the SI unit of time, the second, in terms of the cesium standard
so as to equal the second of EPHEMERIS TIME. The Conference defined the
second as 'the duration of 9,192,631,770 periods of the radiation corres-
ponding to the transition between the two hyperfine levels of the ground
state of the cesium-133 atom'.




ATOMIC TIME

GATOMIC TIMEH is a time scale generated by ATOMIC CLOCKS, which furnish time
more accurately than was possible with previous astronomical means (measure-
ments of the rotation of the Earth and its revolution about the Sun). INTER-
NATIONAL ATOMIC TIME (abbreviated TAI, from the name in French) is based on a
system consisting of about six primary, laboratory-constructed, cesium-beam
ATOMIC CLOCKS along with a larger number of secondary, commercially made
cesium clocks. Signals from these ATOMIC CLOCKS are transmitted to the In-
ternational Time Bureau at Paris, which uses them to form TAI. It is estima-
ted that the second of TAI reproduces the SI second to within about 1 part
in 100,000,000,000,000. Two clocks that differ in rate by this amount would
drift apart by only three milliseconds in 1,000 years.




BAUD RATE

The GBAUD RATEH represents the speed of a serial communication line.
GBAUDH actually means BITS PER SECOND and dictates how fast data can be
transferred. Since normal data communications takes 10 bits per character,
a 1200 baud modem can transmit and receive data at a maximum of 120 bytes
(characters) per second.






-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
9.00  GLOSSARY OF TERMS
                                                                             227
--------------------------------------------------------------------------------G






BBS

GBBSH - An abbreviation for Bulletin Board System.




BOSS

A GBOSSH node refers to the administrator of a "point" network. For example,
if your address is 1:110/50.6, then your "BOSS" address is 1:110/50 (or point
zero). Since points are not in the nodelist, the BOSS will normally receive
and forward all mail addressed to a point.




BULLETIN BOARD SYSTEM

Usually called a BBS, a GBULLETIN BOARD SYSTEMH is a program which allows
"human" callers to connect using a terminal program and directly access
messages, files and other online services. Many BULLETIN BOARDS are public-
access systems which allow people to use them for free providing they follow
the "rules". Many manufacturers and software companies have set up a BBS
to handle support and distribute product information. D'Bridge is capable of
acting as a "front-end" to most BULLETIN BOARD SYSTEMS, determining if a call
is an EMAIL session or if a "human" is on the line.




CARRIER

GCARRIERH, short for CARRIER WAVE, refers to the connection of two modems.
When you dial a modem (with your telephone) you will hear a high-pitched tone;
this is called the CARRIER DETECT SIGNAL. When a modem calls another system, 
the calling modem detects this tone and they automatically "synchronize" and 
determine the baud rate of the connection. Once this is accomplished, you are 
said to have a CARRIER. If the connection is terminated, or the CARRIER signal
is lost, the modems are no longer communicating and will hang up.
The CARRIER WAVE in itself is the unmodulated single-frequency electromagnetic
wave that carries the desired information (data) - i.e., is modulated by the
information.







-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
9.00  GLOSSARY OF TERMS
                                                                             228
--------------------------------------------------------------------------------G






CD

An abbreviation for Carrier Detect. GCDH refers to the circuits within the
modem monitoring the connection and detecting when a carrier is lost. Most
external modems have a CD light telling the operator the status of the
connection. Once a carrier is detected, D'Bridge can initiate an EMAIL ses-
sion.
GCDH also refers to the signal the modem sends to the computer telling it
that another modem is connected. This signal is required by D'Bridge.




COMM PORT

GCOMM PORTH refers to the serial I/O card used by D'Bridge to communicate with
the modem. Internal modems have a built-in serial PORT but are used the same
way. Your modem PORT is most likely called either COM1 or COM2.




COMPILE

In D'Bridge, GCOMPILEH means to translate the raw nodelist or FileBase data
into its internal database. This must be done every time a new nodelist is
installed or when the FileBase is updated. When D'Bridge is run, it checks
the data and time associated with each nodelist file you are using with the
last known values. If they differ, D'Bridge automatically RECOMPILES the
nodelist database (the FileBase must be manually COMPILED using the command-
line option).




CONNECT

GCONNECTH refers to D'Bridge receiving a carrier detect signal from the modem
along with a "CONNECT" message generated by HAYES-compatible modems. When
D'Bridge is CONNECTED to another system, it can send and receive EMAIL and
files. When placing a long-distance call, your phone company will bill you
for the actual CONNECT TIME, usually rounded up to the next minute.








-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
9.00  GLOSSARY OF TERMS
                                                                             229
--------------------------------------------------------------------------------G






COORDINATED UNIVERSAL TIME (UTC)

GCOORDINATED UNIVERSAL TIMEH is the international basis of civil and 
scientific time. UTC is widely broadcast by precisely coordinated radio 
signals; the radio time signals ultimately furnish the basis for the 
setting of all public and private clocks. UTC is obtained from ATOMIC 
CLOCKS, and the unit of UTC is the atomic (SI) second.
UTC serves to coordinate the timekeeping differences that arise between
ATOMIC TIME (which is derived from ATOMIC CLOCKS) and SOLAR TIME (which is
derived from astronomical measurements of the Earth's rotation on its axis
relative to the Sun). UTC is thus kept within an exact number of seconds
of INTERNATIONAL ATOMIC TIME and is also kept within 0.9 second of the
SOLAR TIME denoted UT1. Due to the irregular slowing of the Earth's rate
of rotation by tidal friction and other forces, there is now about one more
(atomic-clock derived) SI second in a solar year than there are UT1 seconds.
To remedy this discrepancy, UTC is kept within 0,9 s of UT1 by adding a leap
second to UTC as needed; the last minute of December or June is made to 
contain 61 seconds. The slowing of the Earth's rotation varies irregularly,
and so the number of leap seconds by which UTC must be retarded to keep it
in epoch with UT1 cannot be predicted years in advance. Impending leap
seconds for UTC are announced at least eight weeks in advance by the Paris
Observatory, however.




CM

An abbreviation for GContinuous MailH. All D'Bridge systems are capable of this.
Continuous mail means that a Fidonet-based EMAIL system is capable of
receiving mail 24 hours a day and not just during a scheduled event. Some
EMAIL systems are still not capable of this, so the nodelist has a "CM" flag
which can be used to only send to CM systems (this is configurable on the
ADVANCED ROUTING screen of SCHEDULE MAINTENANCE).




CRC

GCRCH is an abbreviation for Cyclic Redundancy Check. This is how D'Bridge
(and all other EMAIL systems) ensure that data is received the same way it
is transmitted. It is much like a "checksum" attached to a block of data;
A mathematical formula (a polynomial) is used to compare each data block with
its CRC value. If there is a difference, the data is not valid and must be
retransmitted. You, as the user, do not need to concern yourself with this
as it happens automatically.



-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
9.00  GLOSSARY OF TERMS
                                                                             230
--------------------------------------------------------------------------------G






CRASH

In D'Bridge (and most other Fidonet-based systems), GCRASHH refers to a high-
priority message. It is an "attribute" that may be associated with a message
to tell D'Bridge to send the mail immediately, to override any routing and to
call the destination system directly. Using the internal message editor, you
can specify any message to have CRASH priority.




CTS

An abbreviation for Clear To Send. GCTSH is a signal generated by the receiving
system or modem telling D'Bridge that it may transmit data. This is normally
used only when a modem is using a higher baud rate than it is capable of
sending (or receiving). The CTS signal is used in conjunction with the RTS
(Request To Send) signal and is sent from the modem to the computer.




DATA

GDATAH simply means any form of information that can be stored in a computer
in the form of a file. DATA could be a message, spreadsheet file, graphics
image or anything else in your computer. Any form of DATA may be sent by
D'Bridge.




DATA BITS

When D'Bridge is communicating with another EMAIL system, it uses 8 GDATA BITSH
in the transmission. IBM computers are only capable of using 7 or 8 DATA BITS
in their communications. The D'Bridge "terminal mode" allows you to select
either 7 or 8 DATA bits when communicating with online services such as BBS's.












-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
9.00  GLOSSARY OF TERMS
                                                                             231
--------------------------------------------------------------------------------G






DAYLIGHT SAVING TIME

GDAYLIGHT SAVING TIMEH, also called summer time, is a system for uniformly
advancing clocks, especially in summer, so as to extend daylight hours
during conventional waking time. In the Northern Hemisphere, clocks are
usually set ahead one hour in late March or in April and are set back one
hour in late September or in October.
The practice was first suggested in a whimsical essay by Benjamin Franklin
in 1784. In 1907 an Englishman, William Willett, campaigned for setting the
clock ahead by 80 minutes in four moves of 20 minutes each during the spring
and summer months. In 1908 the House of Commons rejected a bill to advance
the clock by one hour in the spring and return to GREENWICH MEAN (standard)
TIME in the autumn.
Several countries, including Australia, Great Britain, Germany, and the
United States, adopted summer DAYLIGHT SAVING TIME during World War I to
conserve fuel by reducing the need for artificial light. During World War II,
clocks were kept continuously advanced by an hour in some nations - e.g.,
in the United States from Feb. 9, 1942, to Sept. 30, 1945; and England used
'double summer time' during part of the year, advancing clocks two hours
from the standard time during the summer and one hour during the winter
months.
In the United States, DAYLIGHT SAVING TIME formerly began on the last Sunday
in April and ended on the last Sunday in October. In 1986 the U.S. Congress
passed a law moving up the start of DAYLIGHT SAVING TIME to the first Sunday
in April, while keeping its end date the same. In most of the countries of
western Europe, DAYLIGHT SAVING TIME starts on the last Sunday in March and
ends on the last Sunday in September. In Britain and many other countries
worldwide, it lasts from March 30 to October 26.




DEFAULT

A GDEFAULTH refers to a predefined or normal value for something. When you
first install D'Bridge, you will notice that many of the configuration screens
already have answers to questions even though you didn't enter them. This is
because these values or answers will be used by most systems, so they are the
DEFAULTS.











-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
9.00  GLOSSARY OF TERMS
                                                                             232
--------------------------------------------------------------------------------G






DOMESTIC

GDOMESTICH refers to any communications within a given country. In the case
of the U.S., D'Bridge considers any system that has a phone number beginning
with "1" to be a DOMESTIC call (this includes Canada, the Bahamas and possibly some other
neighboring countries sharing "1" as their country-code).




DOS

GDOSH, an acronym for Disk Operating System, is the program (written by
MicroSoft) controlling your computer's basic functions. D'Bridge requires
DOS to operate and odds are (99.99% of the time) you already have this
program. Other operating systems are available such as PC-MOS and XENIX,
but D'Bridge will not function while using these.




DOS EVENT

A GDOS EVENTH is a scheduled event (defined by SCHEDULE MAINTENANCE) that will
execute any number of DOS commands or programs, providing that you have enough
memory to "spawn" these tasks. DOS EVENTS can be used for any function you
wish to have automatically performed on a scheduled basis. DOS EVENTS must
only run programs that require no human intervention (keyboard I/O).




DOWNLOAD

GDOWNLOADH means to receive a file from a remote computer. The D'Bridge
"terminal mode" supports downloads with XMODEM, SEAlink and ZMODEM protocols.
When you DOWNLOAD a file, you are basically copying it over the telephone
from the remote computer to yours. Because these protocols all use CRC error-
checking, the files should arrive on your computer exactly like they are on
the remote system.










-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
9.00  GLOSSARY OF TERMS
                                                                             233
--------------------------------------------------------------------------------G






DROP

In D'Bridge, GDROPH means to execute another program (or access DOS) by swapping
all memory to EMS or disk, then executing another program. This method (com-
pared to PUSH) frees all available memory so that the executed program has
the maximum memory available for its use.




DUPLEX

GDUPLEXH is used only in the D'Bridge "terminal mode" and refers to an
operating characteristic of the remote computer you are calling. These
days, almost all computers and online services operate in FULL DUPLEX
mode; this means every time you type a character, the remote computer
"echos" it back to you and it is displayed on your screen. Some systems,
however, do not "echo" the characters you type; that is called HALF
DUPLEX operation. If you set D'Bridge to HALF DUPLEX, every character
you type will be displayed on your screen. If you experience a double
echo (two characters for every one you type), you should change to FULL
DUPLEX.




DTR

An abbreviation for Data Terminal Ready. GDTRH is the signal your computer
sends to your modem stating it should accept commands from the computer or,
if enabled, answer the phone. D'Bridge requires this signal to function
properly in order to be able to hang up the phone. When your computer "lowers"
DTR, your modem should hang up the phone if connected to a remote system, or
not answer the phone (if so enabled). Most external modems have a DTR light
telling you the status of this signal.















-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
9.00  GLOSSARY OF TERMS
                                                                             234
--------------------------------------------------------------------------------G






DYNAMICAL TIME

GDYNAMICAL TIMEH is the time scale of dynamical astronomy (celestial 
mechanics). The orbital motions of celestial bodies subject only to Newton's 
laws of motion and law of gravitation, as modified by relativity, proceed as
a function of DYNAMICAL TIME. In 1952 the International Astronomical Union
(IAU) defined a dynamical time scale named EPHEMERIS TIME (ET), which is
based on the Earth's orbital motion as given by the American astronomer
Simon Newcomb in his nonrelativistic tables of the Sun (1898). In practice,
however, ET was determined more accurately by observing the Moon's motions
and then using a lunar ephemeris. For this operation an empirical, non-
gravitational term was used to correct for the disturbing effect exerted
by the Earth-Moon tidal couple, as given in the nonrelativistic Improved
Lunar Ephemeris of 1954.
Highly accurate observations made since about 1967 by means of radar,
lasers, radioastronomy, spacecraft, and ATOMIC CLOCKS have since made 
improved, relativistic ephemerides necessary. In 1984 ET was replaced in
national almanacs by Barycentric Dynamical Time (TDB), whose equations of
motion refer to the barycentre, or centre of mass, of the solar system and
include relativistic terms. Different theories of relativity are used in
the various forms of TDB, and the IAU also defined an auxiliary scale,
Terrestrial Dynamical Time (TDT), for use in apparent geocentric ephemerides
(i.e., those using equations of motion referring to the centre of the Earth).
By definition, TDT = TAI + 32.184 seconds, with TAI denoting INTERNATIONAL
ATOMIC TIME.




ECHOMAIL

GECHOmailH is a method of conferencing or sharing a message base between two
or more systems. D'Bridge features internal ECHOmail processing, eliminating
the need for external utilities.




EDITOR

An GEDITORH is any program which allows you to read, enter, respond to EMAIL
messages. There is an internal message editor provided with D'Bridge. It
may be run by selecting the EDIT/READ EMAIL option from the EDITOR menu or
by typing "DB EDIT" from the DOS prompt.






-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
9.00  GLOSSARY OF TERMS
                                                                             235
--------------------------------------------------------------------------------G






EMAIL

As an abbreviation for "Electronic Mail", GEMAILH generally describes any form
of electronic communication. This could include D'Bridge mail, FAX or TELEX
communication.




EPHEMERIS TIME (ET)

GEPHEMERIS TIMEH was the first dynamical time scale in history; it was defined
by the International Astronomical Union in the 1950s and was superseded by
Barycentric Dynamical Time in 1984.
EPHEMERIS TIME could be obtained by observing the orbital position of any
planet or satellite and then using an ephemeris, which lists calculated
orbital positions as a function of time. The orbital position of the Earth
about the Sun, as developed mathematically in the American astronomer Simon
Newcomb's tables of the Sun (1898), were selected as the standard to define
the numerical measure of EPHEMERIS TIME. (The Earth and Sun are 180 degrees
apart; that is, opposite each other in the plane of the ecliptic, so that an
observation of the Sun with repects to the stars gives the orbital position
of the Earth.) Newcomb's tables were used to form a solar ephemeris, or a
table that gives the Sun's coordinates for successive values of EPHEMERIS
TIME.
Values of EPHEMERIS TIME were also obtained from observations of the Moon by
using the lunar ephemeris for the calculated position. The lunar ephemeris,
however, contains an empirical, nongravitational term, which was needed to
correct for the effects of tides raised in the Earth by the Moon. The Moon
was generally used to determine EPHEMERIS TIME because of its rapid orbital
motion. Very accurate positions of the Moon were obtained visually by 
observations of occultations of stars by the Moon. By the time EPHEMERIS TIME
was superseded in 1984, it had served two important purposes: 
1. The definition of a second of EPHEMERIS TIME served as the basis for the
redefinition in 1967 of the SI second on the ATOMIC TIME scale, and
2. ET was the reference scale used for comparison with rotational time to
determine variations in the Earth's rotational speed from about 700 BC to
AD 1955.












-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
9.00  GLOSSARY OF TERMS
                                                                             236
--------------------------------------------------------------------------------G






ERROR LEVEL

An GERROR LEVELH is an "exit code" sent by D'Bridge to DOS describing an "exit
condition". D'Bridge uses ERROR LEVELS in EXIT events so that a DOS batch file
can detect what to do. Unless you already understand ERROR LEVELS, you most
likely won't need to use them. For further information, consult your DOS
manual in the section describing BATCH FILES.




EVENT

An GEVENTH is simply something which happens. In D'Bridge, EVENTS are
scheduled by using the SCHEDULE MAINTENANCE screen. Four types of EVENTS
are supported by D'Bridge: GMAILH, GDOSH, GEXITH and GCLOCKSYNCH.




EXIT EVENT

An GEXIT EVENTH is defined by using the SCHEDULE MAINTENANCE screen. When
an EXIT EVENT occurs, D'Bridge will actually terminate completely providing
DOS with a pre-specified ERROR LEVEL. This is almost always used within a
batch file or shell program.




EXPORT

In D'Bridge, GEXPORTH means to save your current configuration in a text file
for inspection or later use by the IMPORT command. All of the parameters in
the setup screens may be written to a standard text file. This is handy for
configuring a remote system and required when upgrading between revisions
of the D'Bridge software.













-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
9.00  GLOSSARY OF TERMS
                                                                             237
--------------------------------------------------------------------------------G






EXTERNAL GATEWAY

In D'Bridge, an GEXTERNAL GATEWAYH is a program which can be run automatically
to receive incoming mail from other, non-compatible EMAIL systems. For
example, there is a UUCP EMAIL receiver available for the IBM PC which will
allow you to receive mail from UNIX and XENIX systems. A unique feature of
D'Bridge allows it to recognize when non-compatible EMAIL systems are calling
and transfer control to an external EMAIL receiver.




FIDONET

GFIDONETH means two things really: First, it defines the protocol D'Bridge
uses when communicating with other Fidonet-based systems. This protocol is
described in detail in certain documents written and maintained by the FTSC
(Fidonet Technical Standards Committee). Second, it is the name of the largest
Fidonet-based EMAIL network. Both the network and the protocol were created
by Tom Jennings of Fido Software. His initiative and early efforts are what
made the Fidonet network possible.




FILE

A GFILEH is an organized collection of information, usually similar in nature.
When you type "DIR" in DOS, you receive a listing of all the files in the
current directory. (Almost) any of these FILES may be transmitted via EMAIL
to another D'Bridge or Fidonet system.




FILE-ATTACH

GFILE-ATTACHH means to send a file or list of files with an EMAIL message.
This is normally done with the internal message editor. FILE-ATTACH is an
"attribute" associated with a given message. If a message has the FILE-ATTACH
attribute, all files listed in the SUBJECT line will be transmitted with the
message.








-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
9.00  GLOSSARY OF TERMS
                                                                             238
--------------------------------------------------------------------------------G






FILE-REQUEST

GFILE-REQUESTH is similar to FILE-ATTACH, except it works in reverse. Files
are "requested" from the specified system; when the call is placed, if those
files exist and you have specified the right password, if any, they will be
sent to you immediately. FILE-REQUEST is both a message "attribute" and a
menu option in D'Bridge.




FLAGS

The GFLAGSH are the last part of a nodelist line - free-form text which may
contain additional information about the system. Include the characters "CM"
if you wish to designate a system as CONTINUOUS MAIL (being able to receive
EMAIL 24 hours/day).

                          ie.

                          GCM,XX,HST,V32H

                          GCMH   Continuous mail
                          GXXH   WaZOO-style file and update requests
                          GHSTH  US Robotics Courier HST modem
                          GV32H  V.32 compatible




FORWARD

GFORWARDINGH means to send an EMAIL message which neither originated from nor is
destined for your system. FORWARDING is used in conjunction with ROUTING to
send mail through HOST systems, usually to save phone calls and costs. For
example, if you wish to send a message to a system outside your NET, the
message is normally routed to that city's HOST and will then be FORWARDED
automatically to the destination. This way, if you have several messages to
go to different destinations in one city, only a single phone call needs to
be made.










-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
9.00  GLOSSARY OF TERMS
                                                                             239
--------------------------------------------------------------------------------G






FOSSIL

An acronym for "GFHido/GOHpus/GSHEAdog GSHtandard GIHnterface GLHayer," GFOSSILH
refers to a communications interface common to many BBS systems.
D'Bridge does not require a FOSSIL driver, nor will it use one if installed.




FRONT-END

GFRONT-ENDH is a generic term for programs like D'Bridge, FrontDoor and Binkley-
Term when they are used to run a combination BBS/EMAIL system. This simply
means D'Bridge acts as a FRONT-END, answering the phone and transferring con-
trol to a BBS or external EMAIL receiver.




FUNCTION-REQUEST

ZMODEM-based EMAIL systems like D'Bridge, FrontDoor and BinkleyTerm have the
ability to process GFUNCTION-REQUESTSH, allowing the calling system to have
access to predefined DOS functions or programs. This is a rather advanced
feature and can only be used in conjunction with external programs not inclu-
ded with D'Bridge.




GREENWICH MEAN TIME (GMT)

GGREENWICH MEAN TIME (GMT)H is the former name for mean SOLAR TIME of the 
longitude (0 degrees) of the former Royal Observatory at Greenwich, Eng. 
This longitude is called the GREENWICH MERIDIAN. GREENWICH MEAN TIME was 
used for clearly designating epoch by avoiding confusing references to local
time systems (zones). In accord with tradition, the epoch 0000 GMT (denoting
the start of a solar day) occured at noon. In 1925 the numbering system for 
GMT was changed so that the day began at midnight, as did the civil day. 
Some confusion in terminology resulted, though, and in 1928 the Interna-
tional Astronomical Union changed the designation of the standard time of 
the zero meridian to UNIVERSAL TIME, which remains in general use. The term 
GMT is still used for some purpose, e.g. navigation, in English-speaking 
countries.






-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
9.00  GLOSSARY OF TERMS
                                                                             240
--------------------------------------------------------------------------------G






GREENWICH MERIDIAN

The GGREENWICH MERIDIANH is an imaginary line used to indicate 0 degrees 
longitude that passes through Greenwich, an outer borough of Greater London, 
on the south bank of the River Thames, and terminates at the North and South
poles. An international conference held in Washington, D.C., in 1884 desig-
nated 'the meridian passing through the centre of the transit instrument at 
the Observatory of Greenwich as the initial meridian for longitude'. The 
observatory (renamed the Royal Greenwich Observatory) was moved to Hailsham,
East Sussex, during the 1950s, but the original site continues to serve as 
the location for 0 degrees longitude.
As the prime meridian, the north-south line at Greenwich is used as the
reference for all other meridians of longitude, which are numbered east or
west of it. The Greenwich meridian also serves as the basis for the world's
standard time zone system. The mean SOLAR TIME at Greenwich is now called
UNIVERSAL TIME and was formerly called GREENWICH MEAN TIME. Theoretically,
standard time becomes succesively one hour earlier at each 15 degrees 
longitude west of the GREENWICH MERIDIAN and one hour later at each 15 
degrees longitude east.




HOLD

HOLD means NOT to send mail, but rather to wait until the destination system
calls and picks it up. Normally, D'Bridge will put all mail without CRASH
priority on HOLD 24 hours a day. This way, a system calling to send you mail
can always get any mail waiting for it, saving you a phone call.




HOST

Every NET has a GHOSTH; a HOST acts as a consolidation point for inbound mail
coming from outside your NET. A host is designated by having a NODE and POINT
number of zero. By default, all mail sent to systems outside your NET will be
routed to a HOST or a HUB. The exception to this is if you have specified
CRASH priority or have attached or requested a file. Usually, the NET host
acts as the administrator for his NET, maintaining the nodelist and distribu-
ting updates to all his NODES.








-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
9.00  GLOSSARY OF TERMS
                                                                             241
--------------------------------------------------------------------------------G






HUB

A GHUBH is functionally identical to a HOST; it is usually only used when a NET
is very large or spans more than one local calling area. In D'Bridge, HUB and
HOST ROUTING are treated the same. Messages addressed to a NODE outside your
network are ROUTED through the HUB if one exists.




IMMEDIATE

In D'Bridge (and most other Fidonet-based systems), GIMMEDIATEH refers to a
high-priority message. It is an "attribute" which may be associated with a
message to tell D'Bridge to send the mail immediately, to override any
routing and call the destination system directly. Using the internal message
editor, you can specify any message to have IMMEDIATE priority.

The difference between CRASH and IMMEDIATE is that D'Bridge will process all
of the IMMEDIATE calls before attempting to dial a CRASH or NORMAL priority
call.




IMPORT

In D'Bridge, the term GIMPORTH is used when upgrading between releases of the
software or anytime you wish to transfer or restore an EXPORTED configuration.




INBOUND

GINBOUNDH simply means mail arriving at your system from a remote site;
opposite of OUTBOUND.




INITIALIZE

In D'Bridge, GINITIALIZEH is used to describe sending commands to your modem
that INITIALIZE it, setting the correct parameters for operation. Normally,
your MODEM INITIALIZATION STRING tells your modem to answer the phone and
report the connection back to D'Bridge. For specific information on this,
read the section on COMM/MODEM SETUP.


-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
9.00  GLOSSARY OF TERMS
                                                                             242
--------------------------------------------------------------------------------G






INTERNATIONAL

GINTERNATIONALH refers to any communications to systems outside your country.
In D'Bridge, this is determined by the first part of a phone number as it
appears in the nodelist. For the U.S., Canada, the Bahamas and several other
neighboring countries sharing a country code of "1", communications is not
considered INTERNATIONAL unless calling Europe or Australia; anytime the
COUNTRY CODE in the nodelist differs from your own, that is an INTERNATIONAL
call and the predefined INTERNATIONAL DIALING PREFIX will be used.




LOCAL

GLOCALH refers to any call where D'Bridge simply strips off the COUNTRY CODE
and AREA CODE. It is still possible there is a charge for the call, but in
most cases there isn't (at least not in the U.S.).




LOG

D'Bridge keeps a detailed GLOGH file of everything happening on the system.
It contains chronological information about system activity, errors, etc.




MACRO

In the internal message editor, KEYBOARD GMACROSH are supported. What this
means is that you can program function keys (ALT F1-F10 and CTL F1-F10) to
substitute preprogrammed text of any length while editing messages. This is
handy for signatures and any other text you find yourself constantly typing.
Words, sentences or even paragraphs can be programmed into the MACRO keys.




MAIL

GMAILH simply refers to messages or files sent or received.






-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
9.00  GLOSSARY OF TERMS
                                                                             243
--------------------------------------------------------------------------------G






MAIL EVENT

A GMAIL EVENTH is a predefined period of time during which D'Bridge is
allowed to send mail. During this time, all messages will be sent unless
otherwise specified in the ADVANCED ROUTING screen. It is important that
all systems in the network use the same time for MAIL EVENTS. Remember
that if a west-coast system starts a mail event at 1:00, systems on the
east-coast must start the same event at 4:00: the same physical time.




MESSAGE

In D'Bridge, a GMESSAGEH is prepared using the internal editor and contains
text to be sent to another location conveying a thought or idea. Messages are
the basis for more EMAIL systems.




MODEM

An acronym for "GMOHdulator/GDEMHodulator". A modem is the device which allows
computers to communicate by converting electrical impulses to audio tones and
back. Obviously, you have a modem or you would not have purchased D'Bridge,
so we'll assume this will suffice.




NET

Defines the second number in a Fidonet address. GNETH typically defines a
geographical region or local calling area. In the case of a private network
with few systems, all systems (regardless of location) could use the same
NET number.




NETWORK

The term "GNETWORKH" refers collectively to all the systems listed in your
nodelist. You should be able to send an EMAIL message to anyone in your
network. Sometimes, NETWORK is used in the same way as NET, the second number
in a Fidonet address, but they really mean two different things.



-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
9.00  GLOSSARY OF TERMS
                                                                             244
--------------------------------------------------------------------------------G






NETWORK ADMINISTRATOR

Every GNETWORKH has an GADMINISTRATORH; without one, anarchy would prevail.
There is a section devoted entirely to the duties and responsibilities resting
with a GNETWORK ADMINISTRATORH. If you are such a person, I would strongly
suggest you to read it. Basically, the network administrator responsible for
the overall operation of the network and for keeping the nodelist up-to-date
and accurate.




NODE

A GNODEH is the third number in a Fidonet address; NODE specifies an individual
system. Much like in a telephone book, each NODE has an entry in the NODELIST
listing information such as name, phone number and baud rate.




NODELIST

Every network has a GNODELISTH; maintained by the administrator, the NODELIST
is a text file listing all the systems, their phone numbers, baud rates,
cities and operator names. This list is identical on each system in the
network and is updated whenever a new system is added or an existing one
leaves or has information to change. In the case of the amateur networks,
the NODELIST is updated and distributed weekly, usually every Friday.




NORMAL

In D'Bridge (and most other Fidonet-based systems), GNORMALH refers to a
low-priority message. It is an "attribute" which may be associated with a
message to tell D'Bridge to send the mail at the lowest possible cost,
usually at 11:00 at night. NORMAL is actually the lack of a HOLD, CRASH or
IMMEDIATE flag on the message(s).










-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
9.00  GLOSSARY OF TERMS
                                                                             245
--------------------------------------------------------------------------------G






NULL MESSAGE

A GNULL MESSAGEH is a message which contains no text. Often, these messages are
used to send or request a file and are meaningless otherwise. D'Bridge gives
you the option to automatically erase these NULL MESSAGES after they arrive.




OFFLINE

In D'Bridge, GOFFLINEH has two meanings: First, it means the phone is not
being answered, most-likely because you are using your computer for something
else. Second, it means what commands you want to give to the modem when the
system is "down" because you are using the editor or exit the program. Some
systems are configured so that the phone is off-hook when D'Bridge is OFFLINE.




ONLINE

The opposite of OFFLINE. ONLINE means D'Bridge is up and ready to accept
commands and/or incoming EMAIL.




OUTBOUND

The term "GOUTBOUNDH" refers to EMAIL or files ready to be sent to a remote
system. Mail that is on "HOLD" is also called OUTBOUND. In fact, everything
in the QUEUE window is OUTBOUND mail.




OUTBOUND GATE

Some NETs have an GOUTBOUND GATEH or GGATEWAYH - A system which sends all mail
destined for systems outside your NET. This is often done to save money by
consolidating all the OUTBOUND traffic into one outgoing system (perhaps the
OGATE (OUTBOUND GATEWAY) has a WATS line and is able to make long-distance
calls much cheaper). In any case, OUTBOUND GATEWAYS forward mail for anyone
within their NET.





-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
9.00  GLOSSARY OF TERMS
                                                                             246
--------------------------------------------------------------------------------G






PACKET

When D'Bridge sends EMAIL, it is put into GPACKETSH consolidating all messages
into one file or PACKET. When D'Bridge connects with a system, it sends one
packet instead of one file for each message. A packet could contain one or
thousands of EMAIL messages.




PARITY

GPARITYH is a term only used in the D'Bridge "terminal mode". It is either
GNONEH, GEVENH or GODDH and refers to a bit following the DATA BITS and
coming before the STOP BIT. D'Bridge allows you to configure the PARITY any
of these three ways to facilitate communication with different systems.
Most BULLETIN BOARD SYSTEMS use PARITY "NONE", but you might need to change
it.




PASSTHRU

A GPASSTHRUH ECHOmail area means that the mail is received and forwarded,
but not stored in a Fido or QuickBBS message base. PASSTHRU areas are most
often used by ECHO hubs who don't care to read an ECHO personally.




PASSWORD

A GPASSWORDH is the basis for the D'Bridge security system. If you wish to have
a secure link between two systems, you choose an 8-letter PASSWORD that is
mutually agreeable to both operators. Once these PASSWORDS are in place, it is
impossible to communicate with the other system (using your address) unless
that PASSWORD is specified. This is primarily designed to discourage "hackers"
from infiltrating your network and stealing EMAIL you may have on hold.




PATH

GPATHH normally refers to the name of a DOS directory in which you wish to store
files. A path consists of the drive name (C:) plus the name of a specific
subdirectory. See your DOS manual for further information on directory PATHS.


-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
9.00  GLOSSARY OF TERMS
                                                                             247
--------------------------------------------------------------------------------G






PICKUP

GPICKUPH means to call another system and receive EMAIL it has on HOLD for you.
Every time D'Bridge connects with another system, it asks it if there is any
mail waiting. If so and you have the proper PASSWORD, if required, you will
receive all your mail immediately after D'Bridge sends the outbound mail.
By default, PICKUP is not a secure way to handle mail; make sure you use a
SESSION PASSWORD if you require security in your network.




POINT

A GPOINTH is the fourth part of a Fidonet address. A POINT system is not
listed in the NODELIST. Normally, POINTS are not public access systems, but
personal EMAIL systems used to communicate with the network through their
BOSS NODE. For complete information on POINTS, see the section about
setting-up a point system.




POINT LIST

The GPOINT LISTH is just like the nodelist but it specifies a list of POINTS
associated with a given BOSS NODE. Again, this is only applicable for a POINT
system and complete information is available in the section on setting-up a
point system.




POLL

GPOLLINGH means to call a system to see if there is mail waiting even though
you have nothing to send. For example, if you don't have a permanent phone
number for your system or run a private node or point, you will need to poll
your HOST or BOSS on a periodic basis in order to receive your mail. The
perfect example of someone who needs to poll is a salesman who uses a portable
PC to communicate with the main office.









-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
9.00  GLOSSARY OF TERMS
                                                                             248
--------------------------------------------------------------------------------G






QUEUE

D'Bridge has a GQUEUEH window which lists all of the outbound packets at any
given time. A QUEUE is simply a list of things to do, or in this case packets
to send.




RAW NODELIST

The GRAW NODELISTH simply refers to the nodelist when it is in the form of a
text file, before it is compiled. D'Bridge only processes RAW NODELISTS and
requires no external pre-processor like many other Fidonet EMAIL systems do.




ROUTING

D'Bridge has a great deal of flexibility in the way that it can GROUTEH
messages. In simple networks, messages can simply be sent directly from the
sender to the receiver. Actually, this can be done in any network, but in
many cases it is more desirable to use ROUTING because it can save money and
cut the number of phone calls. Used in conjunction with FORWARDING, ROUTING
simply means to send a message somewhere other than the final destination.

For example, if I wish to send a message to someone in Miami, it will be
sent during my nightly mail event to the HOST or HUB in Miami. The message
is then automatically FORWARDED to the final destination. Obviously, with
just one message there is no savings and actually the message will take
longer to get there because it has to be FORWARDED to its destination. But
let's say I want to send messages to three different systems in Miami; this
time, there is a savings because D'Bridge only makes one call instead of
three.




RTS

An abbreviation for Request To Send. GRTSH is the companion signal to Clear
To Send, CTS. This is sometimes referred to as "flow control" and allows the
computer to communicate with the modem at a higher baud rate than the modem
can actually send at.





-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
9.00  GLOSSARY OF TERMS
                                                                             249
--------------------------------------------------------------------------------G






SCAN

When D'Bridge says it is GSCANNINGH for outbound mail, it actually looks at
each message to see if it needs to be sent. As it SCANS, it creates packets
that are added the outbound queue.




SCHEDULE

In D'Bridge, the GSCHEDULEH is a list of pre-programmed events that should be
executed at the specified times. It uses a weekly schedule to determine when
to send mail, execute DOS commands, terminate with an errorlevel and when to
perform an atomic "ClockSync". The SCHEDULE MAINTENANCE screen is used to add,
change and remove events from the schedule. The lower-right window of D'Bridge
always displays the schedule for the current day; this is advanced each night
at midnight.




SCRIPT

D'Bridge normally uses your telephone to connect with other EMAIL systems to
transfer EMAIL. Sometimes it is desirable to use other carriers such as
packet-switched networks to communicate. The D'Bridge scripting language
allows you to communicate using other systems such as TELENET'S PC-PURSUIT.
Many system operators in the U.S. subscribe to this low-cost data transmis-
sion service and D'Bridge is able to take full advantage of it by using its
SCRIPTING language.
This is a rather advanced feature, so please read the section about script
files for more information.




SEALINK

GSEAlinkH is one of the four file-transfer protocols D'Bridge uses to commu-
nicate with other Fidonet-based EMAIL systems. SEAlink was developed by Thom
Henderson of System Enhancements Associates. It was derived from the XMODEM
protocol but has the clear advantage of eliminating propagation delays (from
satellites) so common in long-distance communications. D'Bridge will use this
protocol when communicating with some EMAIL systems.





-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
9.00  GLOSSARY OF TERMS
                                                                             250
--------------------------------------------------------------------------------G






SECURITY

D'Bridge has a password-based security system to protect EMAIL sessions. By
default, no security is used and anyone with a compatible EMAIL system could
send you mail and request files. The D'Bridge security system allows you many
different options to improve security. See the section called SECURITY/
MISCELLANEOUS SETUP for more information.




SESSION

A GSESSIONH or MAIL SESSION simply refers to the period of time when two EMAIL
systems are communicating with each other.




SOLAR TIME

GSOLAR TIMEH is the time measured by the Earth's rotation relative to the 
Sun. Apparent SOLAR TIME is that measured by direct observation of the Sun 
or by a sundial. Mean SOLAR TIME, kept by most clocks and watches, is the 
SOLAR TIME that would be measured by observation if the Sun traveled at a 
uniform apparent speed throughout the year, rather than as it actually does,
at a slightly varying apparent speed that depends on the seasons. The diffe-
rence between mean and apparent SOLAR TIME is called the equation of time. 
This is usually expressed as a correction, never exceeding about 16 minutes,
which is added to or subtracted from one kind of SOLAR TIME to determine the
other. The real Sun and the imaginary 'mean Sun', from which mean SOLAR TIME
is measured, may be as much as 16 minutes apart because during the course of
the year the apparent motion of the real Sun against the background of the 
stars alternately slows down and speeds up. There are two reasons for this. 
First, the Earth's orbit is not exactly circular, and the Earth moves in it 
at slightly different speeds at different seasons. Second, because the plane
of the Earth's orbit is tilted relative to the plane of the Earth's Equator,
the apparent daily course of the Sun is shifted by varying amounts during
the year from a straight east-west direction; and the rate of change of the
Sun's celestial longitude, from which SOLAR TIME is derived, varies accord-
ingly.

Since 1972 the time in common use has been based on a combination of SOLAR
and ATOMIC TIMES; it is called COORDINATED UNIVERSAL TIME (UTC). Its second
is the second of ATOMIC TIME, while its epoch is kept by periodic adjustment
within 0.9 second of mean SOLAR TIME.




-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
9.00  GLOSSARY OF TERMS
                                                                             251
--------------------------------------------------------------------------------G






SPAWN

GSPAWNH refers to the method of executing another program while keeping the
calling program in memory. An example of this is DOS EVENTS. All commands
issued in DOS EVENTS are SPAWNED; this means D'Bridge is still in memory and
resumes operation as soon as the SPAWNED task is complete. This method can
only be used if there is enough free memory to load the SPAWNED program after
D'Bridge.




STOP BITS

GSTOP BITSH is a parameter only found in the D'Bridge "terminal mode". On an
IBM computer, it may have a value of either 1 or 2. Most systems use 1 stop
bit without exception, but it is left to your control for maximum flexibility.




TELINK

GTELINKH is one of the four file-transfer protocols used by D'Bridge. It is
a batch protocol consisting of XMODEM file-transfers preceded by MODEM7
filename headers. This is the standard protocol defined by the Fidonet
Technical Standards Committee as a "fallback" protocol for Fidonet. D'Bridge
will use this protocol when communicating with some EMAIL systems.




TERMINAL

D'Bridge has a "GTERMINAL MODEH" which turns D'Bridge into a teletype or video
display terminal (VDT). When using TERMINAL MODE, you can connect with other
online services such as bulletin board systems and commercial systems like
CompuServe<TM>.












-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
9.00  GLOSSARY OF TERMS
                                                                             252
--------------------------------------------------------------------------------G






TIMEOUT

A GTIMEOUTH ERROR is a condition when the remote system fails to respond
within an allotted period of time. The cause of such an error can be hardware
trouble, poor line conditions or a software error. If a TIMEOUT ERROR happens
consistently when calling a certain system, you might want to follow up with
a voice call to the system operator.




TRIES

The number of GTRIESH refers to the number of times D'Bridge dials another
system without getting a connection. During mail events, D'Bridge defaults to
a maximum of 30 TRIES, but you may change this to any number you wish by using
the SCHEDULE MAINTENANCE screen.




UN-EVENT

The GUN-EVENTH refers to the "event" that is running when there is no scheduled
event active. The UN-EVENT configuration (found in SCHEDULE MAINTENANCE)
controls how crashmail is handled and how mail is routed outside other events.
























-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
9.00  GLOSSARY OF TERMS
                                                                             253
--------------------------------------------------------------------------------G






UNITED STATES NAVAL OBSERVATORY (USNO)

GUSNOH in Washington, D.C., is an official source, with the U.S. National
Institute of Standards and Technology (NIST), for standard time in the
United States. The positional measurement of celestial objects for purpose
of timekeeping and navigation has been the main work of the observatory
since its beginning. In 1833 the first small observatory building was
constructed near the Capitol. Time signals for the public were first given
(1844) by the dropping of a ball from a staff on an observatory building.
In 1904 the observatory broadcast the world's first radio time signals.
The observatory has been enlarged and moved several times. A 40-inch (102-
centimetre) reflecting telescope acquired in 1934 was moved in 1955 to
Flagstaff, Ariz., to obtain better atmospheric conditions, and a 61-inch
(155-centimetre) reflector has been in use at Flagstaff since 1964. Other
stations are maintained in Florida and in Argentina.
Statutory responsibility for 'standard time' (i.e., establishment of time
zones in the United States) is currently lodged with the Department of
Transportation. The NAVAL OBSERVATORY is specifically responsible for
standard time, time interval, and radio-frequency standards for use by the
U.S. Department of Defense and its contractors. Both the USNO and the NIST
maintain independent time standards, but since October 1968 they have been
coordinated to maintain synchronization to approximately one microsecond.
USNO broadcasts time and frequency information at intervals (as the NIST
does on a 24-hour basis). Both agencies cooperate with the Bureau 
International de l'Heure in Paris.
D'Bridge will set your system's clock to USNO's computer based time signal, 
when you instruct it to make time adjustments based on the 'ATOMIC CLOCK'.
USNO is modulating time signals on a 1200 bps carrier wave through normal 
voice-grade dial-up telephone lines.
The telephone number to call for this service is +1-202-653-0351.




















-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
9.00  GLOSSARY OF TERMS
                                                                             254
--------------------------------------------------------------------------------G






UNIVERSAL TIME (UT)

GUNIVERSAL TIMEH is the mean SOLAR TIME of the GREENWICH MERIDIAN (0 degrees
longitude). UNIVERSAL TIME replaced the designation GREENWICH MEAN TIME in 
1928; it is now used to denote the SOLAR TIME when an accuracy of about one
second suffices. In 1955 the International Astronomical Union defined several
categories of UNIVERSAL TIME of successively increasing accuracy. UT0 repre-
sents the initial values of UNIVERSAL TIME obtained by optical observations 
of star transits at various astronomical observatories. These values differ 
slightly from each other because of the effects of polar motion. UT1, which 
gives the precise angular coordinate of the Earth about its spin axis, is 
obtained by correcting UT0 for the effects of polar motion.
Finally, an empirical correction to take account of annual changes in the
Earth's speed of rotation is added to UT1 to convert it into UT2. COORDINATED
UNIVERSAL TIME (UTC), the international basis of civil and scientific time,
is obtained from an ATOMIC CLOCK that is adjusted in epoch so as to remain
close to UT1; in this way, the SOLAR TIME that is indicated by UNIVERSAL
TIME is kept in close coordination with ATOMIC TIME. 




UNPACK

When EMAIL arrives from another system, it is in the form of PACKETS. Unless
otherwise specified, D'Bridge will GUNPACKH these packets into messages when
they arrive.




UPLOAD

When using the D'Bridge "terminal mode", there is an GUPLOADH option enabling
you to transmit file(s) to a remote computer. You can use the XMODEM, SEAlink
or ZMODEM protocols for this function.














-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
9.00  GLOSSARY OF TERMS
                                                                             255
--------------------------------------------------------------------------------G






WAZOO

An acronym for "WArp Zillion Opus-to-Opus". GWaZOOH is one of the EMAIL
protocols supported by D'Bridge. WaZOO sessions begin with a YOOHOO packet
exchange, then usually send mail and files with either SEAlink or ZMODEM
protocols, depending on the capabilities of the communicating systems. WaZOO
was designed by Wynn Wagner, III and is the EMAIL protocol used by most of
the Fidonet-compatible mailers currently available: D'Bridge, FrontDoor,
Opus, BinkleyTerm and Intermail.




WINDOW

A GWINDOWH is simply an area on the screen D'Bridge uses to display information
in. When I refer to a window, I simply mean a section of the screen.




XMAIL

GXMAILH is simply a term that means "compressed mail". An XMAIL packet
contains any number of mail packets and may be created using the ARC, ZIP,
PAK, LHA or ZOO formats.




XMODEM

GXMODEMH is one of the most universal communications protocols available.
Most people credit Ward Christianson with coding and documenting the first
XMODEM communications program, but I can't say for sure. XMODEM is the basis
of Fidonet communications for sending the initial mail packet. D'Bridge will
use this protocol when talking to some EMAIL systems.




YOOHOO

GYOOHOOH is the name of the handshaking protocol D'Bridge uses when talking
to other WaZOO-based systems. The YOOHOO/2U2 handshake passes such information
as your address, system and operator name as well as session passwords.
YOOHOO and YOOHOO/2U2 were designed by Wynn Wagner, III.



-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
9.00  GLOSSARY OF TERMS
                                                                             256
--------------------------------------------------------------------------------G






ZMODEM

GZMODEMH is the protocol D'Bridge uses when communicating with other "HiTek"
systems. Most WaZOO-based EMAIL systems are capable of ZMODEM file-transfers,
but not all. D'Bridge will automatically select this protocol if the other
system is compatible with it. The advantage ZMODEM has over the other proto-
cols is the ability to dynamically adjust the block size for the line condi-
tions. D'Bridge can send and accept any block size between 64 and 8192 pro-
viding a fairly wide tolerance for poor line conditions. D'Bridge's ZMODEM
also features 32-bit CRCs for high data integrity and the ability to continue
an aborted transfer from the exact point where it left off. Chuck Forsberg is
generally credited for documenting ZMODEM and promoting its popularity.




ZONE

A GZONEH is the first number in a Fidonet address and generally specifies the
continent where the system is located. Some other networks have started using
a different ZONE to separate them from the Fidonet amateur network.




ZONEGATE

When communicating with other ZONES, it is possible to cut your communication
costs by sending your EMAIL through the GZONEGATEH. For example, if I wish to
send a message to my friend in Europe, I can tell D'Bridge to route the
message through the ZONEGATE and I can send the message with just an in-
expensive domestic call to the European ZONEGATE. From there, he pays the
bill to  forward the message to the American ZONEGATE in Europe who in turn
forwards it on to its destination. The only drawback to this approach is
that it is fairly slow getting to its final destination and your message
can be read by every system operator along the way. Personally, I am willing
to pay the direct connection charges to ensure that the message arrives
quickly and privately.












-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
A.00  ACKNOWLEDGEMENTS
                                                                             257
--------------------------------------------------------------------------------G






A.00  ACKNOWLEDGEMENTS

D'Bridge would not be what it is today without the ideas and inventions
of others. I feel they all deserve credit for their work, so I am inclu-
ding this section. I have built on the ideas of many other software de-
velopers and I want to thank them all for their efforts.


GTOM JENNINGSH

Tom is the creator and "mastermind" of the entire Fidonet concept. In
1984, he created a bulletin board system called Fido which had the unique
ability to communicate with other Fidos overnight, sending electronic
mail and files. Starting very simple, Fido grew and the software became
more advanced, adding features such as forwarding and routing. Fido is
still widely used today by many individuals and corporations that have
a need to communicate via EMAIL. Thank you, Tom, for creating a system
and a standard that have spawned the largest public amateur EMAIL network
in the world today. Where would we be without you?


GJOAQUIM HOMRIGHAUSENH

JoHo and I always traded ideas around and quickly they became a standard
part of both D'Bridge and FrontDoor.  EMSI was the greatest example.  We
worked together and co-designed the GElectronic Mail Standard IdentificationH
protocol for WaZoo-based sessions.  Thanks, Joaquim.


GTHOM HENDERSONH

Thom has been a major factor in the advancement of the Fidonet standard.
His company, System Enhancements Associates is responsible for developing
the ARC standard, the SEAlink file-transfer protocol and SEAdog, another
commercial EMAIL package. About 5 years ago, I purchased a copy of SEA-
dog 4.0 and used it until I wrote D'Bridge. SEAdog took the Fidonet
standards and extended them, supporting such features as file-request
and crashmail. I wish to thank Thom for all the things he has done to
help Fidonet and the EMAIL community. His SEAlink protocol has saved
many people a LOT of money on their phone bill.









-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
A.00  ACKNOWLEDGEMENTS
                                                                             258
--------------------------------------------------------------------------------G




GRAY GWINNH

We wish to greatly thank Ray Gwinn for allowing us to include his
serial I/O library as a part of D'Bridge. Building the SIO library,
Ray worked many years to bring the X00 driver through many hardware
and specification changes.


GWYNN WAGNER IIIH

Wynn is the creator of Opus, "a computer-based conversation system".
He took all the good ideas in Fidonet and created another EMAIL standard
called WaZOO. D'Bridge uses the WaZOO standard when communicating with
other "HiTek", but non-EMSI systems. I wish to thank Wynn for making
these standards available for all to use and creating documentation clear
enough to make implementation easy.


GCHUCK FORSBERGH

Chuck, with his company, Omen Technology is credited with the develop-
ment of the ZMODEM protocol and making it as popular as it is today.
I used a document he wrote in August, 1986 describing very clearly how
to implement the ZMODEM protocol. Without testing with his program, DSZ,
it would have been very hard (if not impossible) to ensure that our
32-bit CRC logic was working correctly.


GJEFF RUSHH

Jeff was responsible for bringing ECHOmail to the Fidonet community. He
didn't really invent ECHOmail, but set a clear definition in his original
ECHOmail program (designed for use with Fido and SEAdog) which has re-
mained virtually unchanged to date. I think we should all appreciate the
initiative he took in the early days of Fidonet to bring conferencing
ability to our network.


GGREG DAWSONH

Greg designed and wrote a system called AREAFIX which he graciously
allowed us to incorporate into D'Bridge. His AREAFIX system allows
ECHOmail distributors to automate the routine maintenance that was
required when conferences were added and deleted.







-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             
A.00  ACKNOWLEDGEMENTS
                                                                             259
--------------------------------------------------------------------------------G





GADAM HUDSONH and GSTEVE GABRILOWITZH

Adam originally wrote the QuickBBS software which is in widespread use
today. He has been cooperative in helping D'Bridge be compatible with
his fine BBS program. We thank him for allowing us to use his message
base format within D'Bridge.  Steve took over the project a few years
back and has been most helpful in getting the QuickBBS message-base
locking code in place.


GARTHUR GREENBERGH

Arthur has been a constant source of ideas and inspiration.  I wish to thank
him for all his testing and coordination effort.  He is listed in both the
Fidonet and DBNET nodelists as 4D'Bridge HELP/USA5.  Thanks again, Arthur!


GBETA-TEST GROUPH

D'Bridge just wouldn't be possible without our Beta-test group which
put the software "through a ringer" before you ever saw it. I wish to
thank them all for their effort and dedication during the development
process...


GCOPYRIGHT / TRADEMARK ACKNOWLEDGMENTSH


  - GAirMailH is a trademark of Joaquim Homrighausen
  - GARCH is a trademark of System Enhancement Associates
  - GAREAFIXH is a trademark of Greg Dawson
  - GBinkleyTermH was written by Bob Hartman and Vince Perriello
  - GDutchieH was written by Henk Wevers
  - GECHOmailH was originally designed by Jeff Rush
  - GFidoH and GFidonetH are trademarks of Tom Jennings (Fido Software)
  - GFrontDoorH is a trademark of Joaquim Homrighausen
  - GInterMailH is a trademark of InterZone Software
  - GLHAH was created by Haruyasu Yoshizaki
  - GOpusH, GWaZOOH and GYOOHOOH are trademarks of Wynn Wagner III
  - GPAKH was created by NoGate Consulting
  - GPC-PursuitH is a servicemark of Telenet
  - GQuickBBSH is a trademark of Steve Gabrilowitz (Pegasus Software)
  - GSEAdogH is a trademark of System Enhancements Associates
  - GWildcatH is a trademark of Mustang Software
  - GXMODEMH was originally made popular by Ward Christianson
  - GZIPH was created by Phil Katz of PKware
  - GZMODEMH was documented by Chuck Forsberg
  - GZOOH was developed by Rahul Dhesi



-------------------------------------------------------------------------------
             D'Bridge 1.51/000001 - Copyright 1987-92, Chris Irwin             