💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › ZNET › 0007.txt captured on 2022-06-12 at 15:28:35.
-=-=-=-=-=-=-
________________________^^^________ Zmagazine June 25 1986 HOT Atari Vol 1, No.6 News Plus++ Ron Kovacs-Publisher/Editor Middlesex, New Jersey ___________________________________ Xx In this Issue!!! This is our biggest issue to date, due to the many text files sent in during the past week, I thought I would include everything I had. I was also thinking of writing this weeks edition in 80 column format. But do to the time required to re- format all the uploaded information I received this week, I will try to do it for next week. CONTENTS: Legislation in Congress?? Atari ST news Beginners Column by Steve Godun Part 3 of Assembly Programming Zmag BBS Watch and more!!!!!!!! Xx Editors Notes Next week I will update our Zmag BBS list. We will also have a BBS review of two BBS Systems. ZPRINT2 has been released and I am looking for someone to modify it for various printers. When we go to 80 column format, I would like readers to be able to print out the issue (if they choose), I would like to put the config for their printers in the program. Anyone who can help, I will include their name in Zmag and in the ZPRINT title screen. ----------------------------------- Xx Atari News Part One [Reprinted from InfoWorld] Atari: $99.95 Modem by Karen Sorensen InfoWorld Atari Corp. announaced it is developing a Hayes-compatible 1,200(bps) modem that will retail for $99.95 and will run on a variety of personal computers. The modem will feature an RS-232 serial port, which will allow it to run with the Atari line and other machines, such as the IBM PC, said Neil Harris, Atari's hardware products manager. The device will also have a serial input/output port, which will allow Atari's 8- bit computers to work with it, Harris said. Users will be able to select from either 1,200 or 300-bps rates. The modem will support all standard Hayes commands, except for one that allows users to store phone numbers on nonerasable memory, according to Harris. Atari plans to offer separate accessory kits, as well as software that will allow the computer to emulate specific terminals, Harris said. Atari now hopes to introduce the modem by late summer. Atari is also developing a cart- ridge that will plug into the ST and allow it to operate like a DEC VT100 terminal. Many large corp- orations are interested in using the St solely as a terminal, Harris said. Currently, VT100 emulation is available through a $124 program called PC/Intercomm from Mark of the Unicorn, in Cambridge,Mass. Xx Spelling Aide by Scott Mace InfoWorld Staff Batteries Included released Thunder a 50,000-word real-time spelling checker for the Atari ST that works from within most GEM-based applica- tions. Thunder checks words as the user types and allows users to correct words within 80 characters of mis- spelling them, said Mark Skapinker, director of product development for Batteries Included and the programs designer. Skapinker said Thunder's process of checking spellings and retrieving a list of possible correct spellings is a quicker, one-step process than that used by Turbo Lightning, an IBM PC program from Borland Inter- national of scotts Valey,CA. Like Turbo Lightning, Thunder can reside in memory at all times, Skapinker said. But Turbo Lightning does its initial screening from a 5,000-root-word dictionary, and users may have to branch to a 50,000 word, disk-based synonym directory, he said. -But the Thunder dictionary is always loaded completely into memory,- Thunder does not include a synonym dictionary, said Skapinker, and the program works only with GEM-based (Graphics Environment Manager) applications on the Atari St, such as Homepak, Paperclip Elite, ST Talk, BTS The Spreadsheet, and Timelink from Batteries Included; Habawriter from Haba/Arrays Inc. of Van Nuys, California; Regent Base from Regent Software of Canoga Park, Caifornia; and 1st Word from Atari Corp. of Sunnyvale,CA. On the GEM desktop, Thunder appears as a desk accessory, Skapinker said. Thunder will not work as a desk accessory with non-GEM Atari ST programs, said Skapinker. But the program can be run alone to check spelling on files from virtually any ST application. The program also allows users to predefine two-character abbreviations for longer words. When the users types the abbreviaton followed by a space, Thunder automatically expands it to the full word. Thunder also includes a document analyzer, which reports on each document's word count, character count, percentage of words with more than three syllables, number of sentences, average words per sentence, and readability ratings. Xx Legislation HOUSE PASSES COMPUTER CRIME BILL June 1986 The House of Representatives today made quick work of a new computer crime bill that would establish severe penalties for illegally accessing government computers, while cracking down on illegal computer bulletin board systems. The bill (HR 4718), sponsored by Rep. William Hughes (D-N.J.), passed under an expedited procedure called suspension of the rules which limits debate and prohibits amendments. It now must go to the Senate, where a companion measure has been languishing in committee, before going to the president for his consideration. The fast-track House procedure requires a two- thirds vote, but there was no objection voiced to the bill during debate. The measure was reported out last month by the House Judiciary Committee after hearings before its crime subcommittee. Hughes, who chairs the crime subcommittee, said he expects quick action on the measure on the Senate. He predicted that the bill will become law before the end of the 99th Congress in December. The changes in the law, Hughes said, are needed to eliminate another glaring example of the failure of existing law to keep pace with technological advances. -With computer crimes,- he said, -the trespassing or theft is done electronically, not physically. Although the losses are often just as great or even greater than property crime, our laws are not current enough to keep pace with the changing technology used by the criminals.- Hughes was the author of the nation's first computer crime law in 1984, a measure that established a new federal crime for un- authorized access to classified information in government computers and a misdemeanor for accessing any federal computer or computer containing financial or credit information. Hughes said he hopes the new bill will build on the existing federal statute. The new measure would establish a: -:- New felony for trespassing into federal interest computers, those run by or for the federal government, banks, or states. Offenders would face five-year prison terms. -:- Second felony for -maliciously trespassing- into a federal interest computer and causing more than $1,000 in damage. -:-Category of federal misdemeanors involving the use of illegal BBSes to post private information, such as credit card data, phone account information and passwords. -We need to establish clear guidelines,- Hughes said, -for protecting the information stored in computers and for cracking down on those who knowingly put computers to criminal of malicious use.- The Judiciary Committee, having completed its work on computer crime for the year, next is expected to turn its attention to the issue of privacy protection for databases, electronic mail and other forms of telecommunications. The Judiciary subcommittee on the courts, civil liberties and the administration of justice has reported out a bill, sponsored by its chairman Rep. Robert W. Kastenmeier (D-Wis.) that would extend the same protections as first class mail to tele- communications. That bill, however, has yet to be brought up before the full committee, but staffers for Judiciary Committee Chairman Rep. Peter Rodino (D-N.J.) said the measure will be on the panel's summer agenda. A companion bill is moving through the Senate. --J. S. Orr Electronic Privacy ELECTRONIC PRIVACY ACT HEADED FOR HOUSE FLOOR June 1986 The House is preparing to act on a bill that extends protections under the 1968 federal wiretap act to all kinds of data communications, including electronic mail. The Electronic Communication Privacy Act (HR 4952) was reported out last week by the House Judiciary Committee and could find its way to the floor as early as this week, according to committee sources. The measure is a -clean bill,- replacing HR 3378, also called the Electronic Communication Privacy Act, introduced by Rep. Robert Kastenmeier (D-Wis.) last September. The new bill, also sponsored by Kastenmeier, who chairs the panel's subcommittee on civil liberties, received a unanimous endorsement from the full Judiciary Committee as well as praise from its chairman Rep. Peter Rodino (D-N.J.). -Almost 20 years ago, Congress passed legislation to protect the privacy rights of telephone users,- Rodino said. -Since then, the communication industry has been revolutionized by new technology, including cellular and cordless phones, electronic mail sent by computers, paging devices and other electronic information systems,- The problem of privacy protections for computer data and forms of electronic communications has long worried civil libertarians as well as private and commercial computer users. The 1968 wiretap law makes it a crime to intercept telephone conversations and forces law enforcement authorities to seek permission from the courts to install wiretaps. However, the law refers only to oral communication meaning data transmissions are without protection against wiretaps by government authorities or private individuals. The new bill -gives paramount attention to protecting the basic privacy interests of all Americans, It also meets the needs of law enforcement officials who must resort to court-approved surveillance in order to apprehend suspected criminals, and it ensures fair competition among industry-users of new communication technologies. Specifically, the bill would: -:-extend protection against intercepts to cover all electronic communications -:-eliminate the distinction between common carriers and private carriers -:-create penalties for persons who obtain unauthorized access to electronic communications -:-require government authorities to obtain court orders before obtaining access to third-party computer records. -:-expand the list of crimes for which a wiretap court order may be obtained. -:-require government authorities to obtain a court order based upon -reasonable cause- before it can use a device to record phone numbers dialed from a certain phone. -:-require government authorities to show -probable cause- to obtain a court order authorizing a tracking device. --J. Scott Orr Xx Atari News from Current Notes Excerpts from Current Notes June 1986. By: Joe Waters/Frank Sommers Hard Disk Drives?? Atari has thousands of the long awaited hard disk drives piling up in warehouses. The targeted shipping date was end of May, so these drives should be in your local store soon. We'll see... 1200 Baud Modem?? Expect to see the Atari 1200 baud modem late this month or early July. Sources indicate that the MS-DOS emulator has received FCC approval. The hardware seems to be in fine shape, but the software still needs tuning. Probably wont see this until fall. New Monitor?? The SPI3000 will be the same as the current color monitor with one significant difference--a built in disk drive. Final price has not been set, but should be in the neighborhood of $500.00. The EST, the next generation ST, will feature a very high resolution monitor (1280 x 960??). However, monitors of this kind of resolution are very expensive. Currently priced at $1000.00. Atari is searching the world to see if it can find a supplier who can make a more economical HR monitor. Dont look for the EST before, at best, early in 1987. Personal Prolog?? If you are anxiously awaiting for Personal Prolog from OSS, you'll have to wait awhile longer. The first release of PP will be OSS's first product for the MacIntosh. The ST version won't be ready till the end of the summer. OSS also noted that they have dropped plans to produce Personal Diskit -- there are already too many programs around performing similar functions. Xx BEGINNERS' COLUMN: POKEing AROUND By Steve Godun Written Exclusively for Z-MAG Greetings, all!! This column is for all of the people who wanted to learn BASIC, but always thought it was too hard, or it wasn't worth it, or you didn't have the time, or you were just too lazy to learn it. But before I go on, let me say that learning BASIC is like learning to do anything else: It takes practice but once mastered, you can make it do anything you want. If you're reading this, chances are you've had some experience with BASIC programs, even if just typing in a program from ANTIC. But many beginners, when writing a program mown, at times will overlook (some- times on purpose) the ever-useful POKE command. This -fear of POKEs- (POKEphobia?) tends to arise from statements in BASIC manuals that may read -...The first expression, aexp1, must be an integer or arithmatic expression that evaluates to an integer that represents the memory address of the machine language routine to be performed...- (Taken from ATARI BASIC REFERENCE MANUAL, Page 36). Now, if you were (or are) a beginner BASIC programmer and you saw this, wouldn't you say -Huh?- I know I did! So, in this article, I'll try to explain POKEs with a little more clarity. Note that this article is intended for beginning programmers only, but feel free to read on if you're not a beginner. Basically, a POKE is just changing, or redefining, the value of a memory location in the Atari's Operating System (OS). That's it. Nothing else. Simple, eh? So, now you're about ready to fool around with those POKEs. Boot up DOS, turn on yor monitor, and let's get on with it. In direct mode (NO LINE NUMBER), it works like this: POKE x,y [RETURN] Here, x is the memory location, and y is the value for that location. To put a POKE in a program, just type it like you would any other program. Here's an example: 10 POKE x,y Note that nothing except the line number was changed, added, or taken away. When run, this will act the same way it would if it were entered in direct mode, but the program would continue to execute the rest of the program after performing the POKE. If you were to look through some BASIC programs from, let's say, ANTIC, you might be able to find a few common POKEs there. The most commonly used POKEs are these: POKE 752,1 (CURSOR - Turns cursor off: Replace the 1 with a 0 to turn it back on.) POKE 710,x (BACKGROUND - Changes the background color. The x is any number from 0-255. Each number will change the color of the back- ground. Experiment a little and find a setting that you like! More about colors later on.) POKE 580,1 (COLD START - Type this in direct mode and press RESET on your Atari. The computer will act as if it were turned off and on again. A very useful POKE commonly used to prevent LISTing of a program. Put a 0 where the 1 is to return to normal setting.) POKE 16,64 & POKE 53774,64 (BREAK KEY - Type both in to disable the BREAK key. Usually used in conjunction with the above to keep programs away from -prying eyes-.) POKE 65,0 (I/O FLAG - Type this in and quiet the -beep beep- from disk and cassette reading and writing. Substitute a 1 where the 0 is to return to normal POKE 82,x (MARGINS) in Atari BASIC, enter this POKE and put a number from 0-39 to set the margin. 0 is at the far left, while moving to the right increases the left margin space. The default setting is 2.) POKE 83,x (RIGHT MARGIN - Same as above, but for the right margin. The default is 39.) Of course, there are many, many more POKE locations. These are just a few to start you off. For a near complete list of POKEs, I suggest you buy a copy of -MASTER MEMORY MAP- by EDUCATIONAL SOFTWARE, Inc. Almost all of the Atari POKEs are listed there, along with an explanation of each. So, experiment!! Just be sure that, when you start your experi- ments, your disk is out of the drive, no program is in memory that hasn't been saved (In case you screw up the computer and have to reboot), and that you have a paper and pencil handy for writing down all those important POKEs. - - - - - - - - - - - - - - - - - - Want to see the internal workings of your Atari? Type in this program and RUN it: 10 GRAPHICS 0 15 POKE 88,0 20 PRINT -I LOVE TO POKE!- 25 GOTO 20 The POKE 88,0 opens a -window- to the internals of the Atari. To get out of this, hit RESET. Try other words or phrases in line 20 and see what happens. - - - - - - - - - - - - - - - - - - Well, that's all for now. Have fun POKEing around your Atari, and remember that POKEing is not illegal. See ya soon... -Steve the Kid Sys0p of MJAC BBS (201)469-4474 ----------------------------------- [Ed. In addition to the book that Steve recommended, Look for -Mapping The Atari- By: Ian Chadwick, Published by Compute Publications, Inc, ABC Publishing Company. $16.95] Xx Zmag BBS Watch This is a new column that will be dedicated to messages of interest from Zmag Message bases on systems carrying Zmag and/or a Zmag Base. Following text taken from the NYC BBS. TO->COMPUTER WIZZZ FROM->RATBANE SUBJ->Z-MAG Everyone thanks you for your kind thoughts. How exactly do you read ZMAG in computer class? Does your teacher acquire a file and then let everybody read it? Is it read as part of class time or study time, or after-school club time? Ask your teacher if there is anything we could do to be of help to him in teaching computers and programming. There is a Basic class being taught on Atomic boards by Woden, Sysop of the Valhalla BBS. We have a lot of Public Domain utilites, and firsthand access to many goodies here in the great city of New York. Do let us know what your teacher says. Try to get him/her to log on here, too. RATBANE TO->ALL FROM->COMPUTER WIZZZ SUBJ->Z-MAG WELL HELLO FROM THE GREAT STATE OF VERMONT, COMPUTER WIZZZ HERE RESPONDING TO Z-MAG ARTICLES ABOUT THE ATOMIC NETWORK,N.Y.CITY BBS AND B.A.T. ALSO Z-MAG ITSELF. Z-MAG IS THE BEST THING TO HAPPEN ON BBS'S SINCE MODEMS. I HAVE BEEN LOOKING AROUND AND HAVE COME TO THE CONCLUSION THAT N.Y.CITY BBS AND THE ATOMIC NETWORK ARE IN THE FORE- FRONT OF PUBLIC SERVICE BBS'S. AS FOR ME I READ Z-MAG IN MY COMPUTER CLASS IN SCHOOL, INTERESTING. B-C-IN-YA