💾 Archived View for spam.works › mirrors › textfiles › apple › DOCUMENTATION › gbbs.txt captured on 2023-06-16 at 21:19:04.
View Raw
More Information
-=-=-=-=-=-=-
Page A
TERMS OF SALE/DISCLAIMER !!!
This copy of GBBS ][ is intended for use on ONE AND ONLY ONE computer system.
ONE ORIGINAL COPY PER COMPUTER. Using one copy on more than one computer is
forbidden. Unauthorized copies of this software can and may result in legal
action. Greg Schaefer and GS Software make no warranty, either expressed or
implied towards this software package, the accompanying manual, quality, per-
formance, or usefulness towards an application. This software is in "as-is"
condition. Neither GS Software nor Greg Schaefer may be held responsible for
any damages caused by the direct or indirect use of this product.
Page B
TABLE OF CONTENTS
Chapter 1 SETTING UP YOUR SYSTEM-----------------------------1
Chapter 2 LOGGING IN FOR THE FIRST TIME----------------------5
Chapter 3 GBBS ][ RUNTIME COMMANDS---------------------------7
Chapter 4 RUNNING YOUR SYSTEM-------------------------------14
Chapter 5 BBS MODIFICATIONS---------------------------------18
Chapter 6 USING THE CONVERSION PROGRAMS---------------------26
Appendix A MODEM/RS-232 SELECTION AND HOOKUP-----------------28
Appendix B GBBS ][ MAIN ROUTINES-----------------------------30
Appendix C GBBS ][ VARIABLE LISTING--------------------------34
PAGE 1
CHAPTER 1 -- "SETTING UP YOUR BULLETIN BOARD"
To set up your board there are three basic steps that must be followed. These
steps are: 1) Configure GBBS ][ to your hardware. 2) Make your data diskettes.
3) Copy files, and start your board running. If you follow these instructions,
then you should be up and running in half an hour or less.
I-M-P-O-R-T-A-N-T
Before we get too far, there is something that needs to be done. Using COPYA
from your system master (or another disk copy program), copy your MASTER DIS-
KETTE onto a backup and put away the master. Use your backup when needed. When
the MASTER DISK is referred to, use the backup.
INITIAL SYSTEM GENERATION
Now: RUN GBBS ][ CONFIG from your MASTER DISKETTE. This is the program that
will let you setup your system to work with your hardware. When the program
comes up, you will see a screen of 6 options. To start up your system, choose
option number one: 1) INITIAL SYSTEM CONFIGURATION. Answer "Yes" to the "ARE
YOU SURE ?" question.
First you will have to enter your name. After this, your phone number is
needed. Since you can make this number available to users, you may wish to use
a voice line that you are available at so that they can report any problems.
You must now decide on a name for your system. No commas or colons may be used.
The name is used in a context such as: "WELCOME TO.....". If your system was
the "NATIONAL BBS" then you would have to enter "THE NATIONAL BBS" for your
name. If you were to just enter "NATIONAL BBS" then the context is wrong and
at logon you would get the message "WELCOME TO NATIONAL BBS" instead of "WEL-
COME TO THE NATIONAL BBS". Last of all, enter the date. Verify that thisin-
formation is correct.
PAGE 2
Next a list of supported modems/RS-232's will come up. From the first list
of numbers choose the modem/RS-232 that you will be using with your system. If
your modem/RS-232 is not listed then you may have a problem. Some modems
configure as others. As an example, the SSM ModemCard can be configured as a
DC Hayes Micromodem. Consult your manual for compatibility with other cards.
If you picked of the RS-232 cards, then select the correct modem that you have
with your system. If you do not know which modem to select, consult Appendix
A. Enter the slot that your card is plugged into.
When you get to the next menu, enter "Yes" if your Apple is equipped with
lowercase. If you have uppercase only, enter "NO". This will NOT control what
your users see. They will see lowercase if they have it, or uppercase only.
It will just be shown in uppercase if you need it. The system has a time limit
built into it which controls how long a user can be idle before the system will
hang him up. I recommend around 5 minutes. If you have a printer then tell
the system so and what slot it is in. No special printer type is required.
The last question is whether you want to place the driver in the language card.
If you do not understand this question then you should answer "NO". For those
users that do place it there, you have to supply your own HI-DOS (a DOS that
runs in the language card). I suggest using David-Dos. It has been tested and
works well. Verify this information is correct.
For the next four questions, it is best to answer [RETURN]. These let you
modify the characters that cause the system to take certain actions, such as
skipping a bulletin and exiting from menu's. This is explained in greater
detail in Chapter 4. Verify this information is correct. Enter a [RETURN] in
answer to the next two questions. Verify this information.
Now you must decide how you want the files arranged on your disks. There are
many answers to this question (unless you have only one drive). There are
several types of files which will be saved. They include MAIL FILES, BULLETIN
FILES, and SYSTEM FILES. There are also other types, but they are not used at
this time. MAIL FILES are files that contain private electronic mail. It
requires that for each different person with a piece or pieces of mail waiting
that 1 file is used. If you have a system with 300 useres and 83 users have a
total of 274 pieces of mail waiting then there will be 83 files used. BULLETIN
FILES contain the public posted bulletins. One file per bulletin on the system.
The answer you give for the bulletin drive will just be for your main board.
You will still be able to add more boards on the same or different drives.
SYSTEM FILES are files such as your menu's and your userlog. Two other types
of files DOWNLOAD FILES and GENERAL FILES, will also be on the system disk.
PAGE 3
For 1 drive : All files on that drive.
For 2 drives: SYSTEM FILES on one drive, MAIL & BULLETINS on the other.
For 3 drives (or more): SYSTEM FILES on one drive , MAIL on another, and
BULLETINS on the last.
Tell the program if you are using a hard drive or not. You should answer
"YES" if you have a hard drive or any form of storage that uses the "volume"
parameter with DOS. After this, tell the system what slot & drive each disk
will be in. If you are using a hard disk then you will also have to specify
the volume. When using a hard drive you should use the same slot & drive for
all the disks. The volume is the only parameter that should have to be
changed. Verify the above information.
The last piece of hardware that you may want to tell your system about is
your clock. If you don't have a clock, then just tell the system so. If you
have a clock but it is not listed, then check your manual. It may work con-
figured as a Mountain Hardware clock. Enter the slot of your clock if present.
Last, enter today's date. Make sure it is correct. Some clocks don't know
the current year so they need to get it from the system. The only way the
system knows the current year is from what you tell it. Verify the above
information. If there is a problem in a menu farther back, press [RESET] and
type: RUN. Otherwise, the disk drive will start again and the system will go
to work. After 30-40 seconds, you will get the message:"CONFIGURATION
COMPLETE".
SETTING UP YOUR DRIVES
You will have to decide which drives store what on your system. If you are
using a hard drive, then you will have to decide what volumes will contain
what data. You are responsible for formatting the volumes. Just get all the
volumes or drives set up so that you can copy files onto them. This goes for
any type of storage you are using whether it be floppy or hard drives, 5 or
8 inch.
If you have standard Apple drives, then you can use a provided program to
make special high-storage disks. A normal disk can contain 105 separate files
on it. Unfortunately, some of the time you will have a disk exceeding this
limit. This program will let you have 105, 161, or 217 entries in its catalog.
Also, there is no DOS on these disks which gives you an additional 32 sectors
for data. This program will work only with standard APPLE DISK DRIVES and not
with special 80 track or 8 inch drives. You can use it with a 40 track drive,
but it will only format the first 35 tracks unless you make the necessary
40 track pokes first.
PAGE 4
It is best if your MAIL DISK and BULLETIN DISK have at least 161 entries.
217 may be even more desirable. Your SYSTEM DISK only need have 105. To make
these special disks, RUN DATA DISK MAKER form your MASTER DISK. After it has
come up, tell it how many entries you want to have in your catalog (105,161,
217). Then insert the blank disk that you want initialized. After you are
done with the disk, the program will tell you how many sectors and entries are
available. You should mark how many entries are on each disk so you can keep
track of them. When the program is done, you can type RETURN to make another
data disk or any other key to quit.
You will need to make a disk that is called the BOOT DISK. It will contain
the GBBS ][ program on it. This disk will have DOS and will be the one that
you boot to bring up your system. To make this disk, PR#6 your MASTER DISK.
Then LOAD GBBS LOAD. Insert your blank disk and type INIT HELLO.
Once you have made the disks, copy the files from your master to the
appropriate disks. Here is a list of files and where they go. Use FID from
your DOS 3.3 system master to copy them. If you have some special drive, use
whatever file copy program that was provided with it.
Filename Disk name Filename Disk name
------------------------------------------ ----------------------------------
GBBS II BBS BOOT DISK GBBS LOADED BOOT DISK
GBBS LOADER BOOT DISK
BBS #S SYSTEM DISK D1 SYSTEM DISK
D1/1 SYSTEM DISK D1/2 SYSTEM DISK
D1/3 SYSTEM DISK D1/4 SYSTEM DISK
DATA SYSTEM DISK DRIVER DATA SYSTEM DISK
G1 SYSTEM DISK G1/1 SYSTEM DISK
G1/2 SYSTEM DISK G1/3 SYSTEM DISK
GBBS II DRIVER SYSTEM DISK MENU0 SYSTEM DISK
MENU1 SYSTEM DISK MENU9 SYSTEM DISK
NEW USER INFO SYSTEM DISK SYSTEM HELP SYSTEM DISK
SYSTEM INFO SYSTEM DISK SYSTEM NEWS SYSTEM DISK
USERS SYSTEM DISK USERLIST HELP SYSTEM DISK
The BULLETIN DISK and MAIL disk need no files copied onto them. If you are
using some other type of drive, copy the files from the completed BOOT DISK to
it. To start up your system you will type: RUN HELLO from the slot, drive,
and volume that the BOOT DISK is located on.
Your system is now ready to go. Insert the BOOT DISK into slot 6, drive 1
and type PR#6. If you are not based around normal drives then boot from
whatever drive you are set up for. Your system will now boot up and you will
get the message telling you to insert the correct diskettes and type RUN. When
you insert those disks and type RUN, your system will come up and you willbe
ready to receive your first call.
Page 5
Chapter 2 -- "LOGGING IN FOR THE FIRST TIME"
Once you have your system up and running for the first time, it is important
to log in and set some things up. Type "G" from the keyboard. This will allow
local logon to your system. You will be asked for "Last Name -->". Use the
last name that you gave to the GBBS II CONFIG program. For your password,enter
"X1SYSOP". The system will check your password and come up with the message
"Calling From (City, St) -->". Enter the city and state that the board is
located in. If your input is not accepted, enter it again but use fewer
characters.
Now that you have logged on, there are many commands which may be issued.
You can do anything from reading bulletins to sending electronic mail to
changing passwords. The first thing that you should do is go to the bulletin
system. You will be prompted "LEAVE BULLETIN ?". You will want to answer YES
to this. It will then ask you for the subject of the bulletin. The subject
may be something like "THE NEW SYSTEM" or such. Next, you will be asked who
the bulletin is from. This is only asked if you are the sysop of the system.
You may type in a name of who you want the bulletin to be from. Normally you
would put "SYSOP" or "SYSTEM OPERATOR" or your name.
After this, you will be dropped into the editor where you will be able to
enter the text to your bulletin. You may enter up to 50 lines of text that
are 40 columns wide. When you are done entering your bulletin, type "DONE".
This will tell the editor that you are done entering text. You will then get a
"OPTION (?=HELP):" prompt. There are several options that can be entered here.
The one you need for the moment is "O" for OK. If you enter "O" then your
system will save your bulletin and you will be sent back to the bulletin menu.
Being in the bulletin system you can read your bulletin, leave another, or
exit the bulletin system back to the main command menu. We will now read the
bulletin that you entered. Type a "1" and RETURN and it will show you the
bulletin that you just entered. After this you can type an "A" to abort back
to the command menu. Enter a "T" and terminate from the system.
Page 6
Now log on again as before. You will not be asked where you are calling from
this time. Now that you are on, type a "*". You will be at the prompt "SYSTEM
(?=help):". Enter a "P". You will be asked "Pass#". Answer with the number
"1". Up on the screen will come some information about you. Since all GBBS's
are initially congigured with the same password, it is necessary to change it.
You will see that your password is contained in field "C". Enter a "C". Now,
type in a new password. It MUST contain the number "1" after the first alpha
digit of the pass. It can be up to 7 characters long. Some valid examples of
usable passwords are: A001AAA, A1BCBCB, A1BC, A000001, X1GBBS, X1GBBS2. You
can have another number in the password as long as it does not directly follow
the first number. Once you have selected and entered your password, type a
[RETURN]. Enter "S" to save this change we have made to your password. Once
you get back to the "System" prompt press [RESET] and type: RUN. You have now
successfully completed your initial logon.
Page 7
Chapter 3 -- "GBBS ][ RUNTIME COMMANDS"
Once you have your system up and running there are a few commands that you
will need to know. The first few commands are those that can be issued while
the system is standing idle. (That is, when it is sitting waiting for a call).
These commands are: G) connect to the system locally. A)nswer the phone and
wait for connection. Q)uit the system to BASIC.
The "G" command will allow the sysop to log on the system from his computer.
You may then log on under your password as sysop or as any user that you know
the password for.
The "A" command is for directly connecting with the person that is on the
phone line that the modem is on without re-dialing up your system. This will
give out a carrier and attempt to get a connection.
The "Q" command will let the sysop exit the program from the idle mode into
BASIC. You will be dropped into Applesoft. This command is just like
pressing RESET.
Once you are connected with the system, the next thing you need to know is
how to log onto the system. To log on, just type in your last name and your
password when you are prompted and you will be able to log on. Once on, you
can issue any of the following commands:
? : The question mark will give a list of available commands most anyplace
in the system.
B : The "B" will send you to the main bulletin board. From here you can
type a question mark to see a list of commands.
A: This will return you back to the main menu.
# : Entering a number of a bulletin on the board will display that
bulletin.
N : This retrieves new bulletins that have been left since the last
time you called.
F : You can list all the bulletins starting at a certain one.
Page 8
K : Kills bulletins you have left.
L : Leave a bulletin for all users to see. You will be dropped into
the editor to enter your message.
S : This scans message subjects starting at a certain one. You will
be asked if you wish to "Mark Messages ?" before you start scanning
If you say "Yes" then you can enter "Y" or "N" after each subject
you indicate if you wish to read it later.
M : With this, you can retrieve the bulletins you marked with the
"S" command.
After using either "New", "Forward", or "Marked" retrieval, you will get a
line of options displayed. You can use "R" to Re-Read the bulletin. "Q" will
exit back to the bulletin menu. "N" or a [RETURN] will go to the next bulletin.
If you press "A" you will have to option to send E-Mail to the person who left
the bulletin you are looking at. You will then go back to the line of options.
If you press "K" that bulletin will be killed. If you press "P" then the
system will print the bulletin on your printer. If you enter "#" then the file
name of the bulletin as it is saved on disk. The kill, print, and # commands
are available to Sysop's only.
The following commands are for the editor. Whenever you use a command such
as Send E-Mail or Leave Bulletin then you will have to use the editor to
create the message.
O : This stands for "OK". it says that your message is complete and you
wish to send it.
A : If you decide you don't want to send your message for some reason,
then you can abort from sending it.
N : If you messed up your message and wish to redo it, then use this
command to start again.
C : This will let you append onto your current text.
L : You can list your message in part or in whole. You will be asked
for a starting line. If you press [RETURN] then the entire message
will be listed. If you enter a starting line, then an ending line
will be requested. If you enter [RETURN] then it will list from the
starting line to the end.
E : You can edit a line of your message by entering its line number and
retyping that line. If you enter "L" then you can list the message
using the same form as for the "L" command above, but line numbers
will be shown.
Page 9
I : Using this command you can insert before the line number you specify.
You can use the "L" command the same way you do with Edit.
D : By entering a line number(s) you can delete one or more lines. If
you enter [RETURN] from the starting line, then the attempt will be
aborted. You can also issue the "L" command which works as it does
with Edit.
P : Print contents of editor to printer. Uses same parameters as list.
G : Get a file. With "G" you can enter a file name, and the named file
will be loaded into the editor. It will overwrite the previous
contents of the editor.
The "P" and "G" command are available to Sysop's only. The rest of the
system commands are as follows:
C : Chat with the Sysop. When a user issues this command, there will be some
bells on your end. You can press a key to enter chat mode while the system
is still beeping. If you do not answer the chat, the word "CHAT" will
appear in the upper right hand corner of the screen. If you wish to chat
with a user, press ctrl-A to enter chat mode. This will work no matter
where in the system the user is.
Ctrl-A : Exit chat mode
# : Entering a "#" then a number between 0 and 127 will assign the
current user that security level. This level will be permanent.
D: With this command, you can download public domain programs from this
system. If you have a Micromodem ][ and called using the built in
firmware then you can have the system save the files to your disk for
you. If you are using some other modem, then you need to use a terminal
program with a capture buffer such as "Ascii Express Pro". After you
save it capture it to disk and "EXEC" the file.
E : The system contains a list of stats on you, and general system stats.
These include the last date you called, what caller number you are,
your security level and some of the options active.
F : You can directly send comments to the Sysop using "Feedback". You
will use the editor make create your message. The Sysop will be able
to reply to the message.
G : You can look at the list of files the system has that concern certain
topics. Enter the number you wish to look at or [RETURN] when done.
Page 10
H : General system help.
I : This will list information about the system such as software type:
GBBS ][, hardware configuration, and system sponsor.
N : By changing the nulls value, you change the delay that follows a [RETURN].
O : This will give a list of other bulletin board telephone numbers.
R : If you have mail waiting and wish to read it, use this command. After
each letter you will have the option to "Auto Reply", "Continue", or
"Re-Read" each letter. Auto-Reply" will let you write a letter back
to the person who sent you the letter.
S : You can send E-Mail to a user with this command. Just enter the name
of the user or their user number. The user number is the number that
is displayed next to their name on bulletins they post. It is also
listed next to their in the user list command. If you entered their
number, then their name will be shown and verification asked. If you
entered their name, The message "Verify User ?" will be displayed.
If you answer "YES" then you will have a wait while the system checks
the name against all the users on the system to see if that user is
really on it. Once you are done with the name or number, then you just
use the editor to enter the message and it will be send to them.
T : This command will terminate your connection from the system. Your mail
will be deleted and your stats updated.
U : Using this command, you can get a list of all or some of the system
users. Next to all users will be listed their user number that can
be used for sending mail.
! : There is an uploading section on this section. It is not normally
available. If you have something to upload, then let the Sysop know
via "Feedback" and he will get back with you.
- : SYSTEM. The asterisks puts you into the section that is called SYSTEM.
System is a section that is for the sysop only that allows him to run
his system. There are many commands here. Make sure you pay attention
to these as they are necessary to run your system with.
A : ABORT. This sends you back to the command mode.
C : CATALOG. This allows you to catalog the disk. You may catalog any
slot & drive combination.
Page 10
D : DOS. From here you may issue any DOS command. If you need to specify
a slot, drive, or volume do it via ",S,D,V". Nowhere else should you
use ",S,D,V".
- * IMPORTANT : DON'T USE DOS TO CATALOG. USE THE CATALOG COMMAND INSTEAD. **
- * IF YOU USE DOS, THE PROGRAM WILL RE-RUN **
E : EXIT. This will let you exit GBBS ][ into Applesoft. You will then
be able to program, etc. You can issue a CTRL-Y anytime you are in
Applesoft and do a soft RESET. The equivalent of pressing RESET from
the keyboard. If you do press RESET then the connection between DOS
and you will be severed and you must do a 3DOG from the monitor to
reconnect it.
F : FILE READ. With this, you can read any text file on the disk with the
exception of the user file. The user file is a random access file that
will not work. You need just specify the name and slot/drive of the
file and you will be able to look at it. Exit viewing with a CTRL-X.
Enter a "*" as the first char of the filename to dump to the printer.
G : EDIT A FILE. Just enter the name of the file you want to edit or a
[RETURN] for a new file. If you entered a file name, then you will
be prompted for slot, drive, and volume and the file will be loaded.
You will then be dumped into the editor. You can modify the data in
the file using the editor commands. When you are done, use the Ok
command like normal. You will be asked for a file name, slot, drive, and
volume. The file will then be saved back to disk, overwriting the
original file if you used the same name.
K : KILL USER. With this you may kick a user off the system. You need to
enter their user number. That is the three digits of the password.
Ex: The user number of A001AAAis 1 as 001 is the number and the
preceding zeros are not needed.
L : CALL LOG. This will give you 4 choices.
A : ABORT. Go back to the SYSTEM prompt.
D : DELETE. Delete the userlog. Don't leave userlogs aroundd too long.
They can start to take up a lot of space.
S : SHOW the log to you, the sysop. Output will be to the screen.
P : PRINT. This will send the log contents to the printer.
Page 12
N : NEW USER. You may directly add a new user to the system without them
logging on. This may be desirable in some cases. This command will
not check for duplicate users. It is assumed that you know that the
user is not a duplicate.
R : REQUEST FILE. This will show you one-by-one the comments received
from new users that answered the questions that you put in NEW USER INFO.
After you see what they have to say, you can either verify them or
go on. If you choose to verify them, you will be asked at what level
you want them. If they are a normal user, then the level needed is 1.
P : EDIT PASSWORD. You must enter the user number of the user you want to
edit. You will then be shown their current status and be able to change it
A : USER NAME. Enter new name for user.
B : CALLING FROM. Where the user calls from. Don't make this too long.
The name and where they are calling from should not exceed 25 characters.
C : PASSWORD. With this command you can change the users password.
There is a form that must be used though. Passwords must be 7 or less
characters long with a starting character, a user number which may
NOT be changed and some more characters. EX: A001AAA could be changed
to A1AAA OR A1AAAAA. This must NOT be changed to A2AAA. The value
of the digit MUST be preserved. (*> If you're changing your password
then it is asvised that you logon, change the password, and exit to
basic or hit RESET. Don't do anything else.
D : PHONE NUMBER. The persons phone number can be changed. The presence
or absence of a hyphen between the area code and the number indicates
that the number is either visible or invisible to other users in the
userlist command. EX: 303-693-1064 is INvisible to other users while
303 693-1064 is VIsible to other users.
E : SECURITY LEVEL. You may change a users security level to anything
between 0 and 63. This security system works on a FLAG/BIT system.
There are 127 usable security levels that set different flags. There
are 7 flags. Each one may be set independently. In the normal system,
FLAG 1 is a verified user and FLAG 7 is the sysop. To find the value
to be used with the FLAG combination, look at the following table.
Just find the entry that has the flags set in the combination you want.
Only 64 possible levels are shown due to the fact that sysop level may
not be set in the file, only in the program.
Page 13
FLAG/BIT SECURITY LEVEL TABLE
-----------------------------
FLAG FLAG FLAG FLAG
LVL 654321 LVL 654321 LVL 654321 LVL 654321
000 NNNNNN 016 NYNNNN 032 YNNNNN 048 YYNNNN
001 NNNNNY 017 NYNNNY 033 YNNNNY 049 YYNNNY
002 NNNNYN 018 NYNNYN 034 YNNNYN 050 YYNNYN
003 NNNNYY 019 NYNNYY 035 YNNNYY 051 YYNNYY
004 NNNYNN 020 NYNYNN 036 YNNYNN 052 YYNYNN
005 NNNYNY 021 NYNYNY 037 YNNYNY 053 YYNYNY
006 NNNYYN 022 NYNYYN 038 YNNYYN 054 YYNYYN
007 NNNYYY 023 NYNYYY 039 YNNYYY 055 YYNYYY
008 NNYNNN 024 NYYNNN 040 YNYNNN 056 YYYNNN
009 NNYNNY 025 NYYNNY 041 YNYNNY 057 YYYNNY
010 NNYNYN 026 NYYNYN 042 YNYNYN 058 YYYNYN
011 NNYNYY 027 NYYNYY 043 YNYNYY 059 YYYNYY
012 NNYYNN 028 NYYYNN 044 YNYYNN 060 YYYYNN
013 NNYYNY 029 NYYYNY 045 YNYYNY 061 YYYYNY
014 NNYYYN 030 NYYYYN 046 YNYYYN 062 YYYYYN
015 NNYYYY 031 NYYYYY 047 YNYYYY 063 YYYYYY
The "Y" under the flag means that the flag is set. If the char is an "N"
then the flag in not set. As an example, lets say that we want a user to have
flag 1 set, flag 2 set, and flag 4 set. TAKE NOTE: All users except new
unverified users should have flag 1 set. This means that if you have a
verified user and his security level is of an EVEN number then they are anun-
verified user! Now, back to our example. Well, what we do is look on the
chart until we find the set of numbers that have flag 4 set. The first number
to have flag 4 set is 8. We then look for the next number that also has flag
2 set. We see that it is 10. Finally, we look for the next number with flag 1
set. So the end number is 11.
F : Upload privilege. If this is "Y" then that user has one-time
upload privilege.
RETURN : Lets you make a choice.
A : ABORT. Abort changes and go back to the system menu.
S : SAVE. Save changes and go back to the system menu.
S : SET THE DATE. If you don't have a clock then you can change the date
to the current date with this command. The format used for the date
should be XX/XX/XX. If you do have a clock then don't use this function.
Page 14
Chapter 4 -- "RUNNING YOUR SYSTEM"
Running a GBBS ][ system requires little effort, but there are some things
that must be done to keep the system operating smoothly. New users need to be
verified to keep the system disk from running out of space. The system log
must be cleaned frequently. Once a day is recommended. If it is not possible
to keep up with it, there is a way to take out the log file. It is in chapter
5. You will have to check the bulletin board and kill off old bulletins.
Last of all, as Sysop you will get great quantities of mail. You need to get
on and read it so that your mail is not taking up too much disk space. When
you log on the system there are three messages that you may see. The first is
that there are new users, the second is that there are new bulletins, and the
third that you have mail waiting. The first thing you should do is read your
mail if you have some waiting. Once you are done with your mail, go to the
bulletin board if there were new bulletins and read them. If there get tobe
too many bulletins then kill some of the first ones off. The number of
bulletins you want to keep around is up to you. Just watch your disk space
and make sure that there is always free space.
After all of the above, go to the SYSTEM menu. Start things by going through
the log with the "L" command. Show the log and then delete it. If you got the
message that there are new users then use the "R" command to verify them.
You will be shown the known information on the new user. His name and stats
will be listed along with the comments he left for you. The normal questions
asked by the system before modifications are: 1) What is the users real name.
2) What type of computer they are calling with. You will be given a list of
options after this information is displayed. You will be able to kill off the
user, verify the user, or go on to the next user. The best way to decide if
this is a person that you want on your system is look at the comments they left
and the phone number they used. If they didn't leave their phone number or
left junk comments, then they are probably not someone you want on your system
and are worth killing. If you wish to keep the user, use the "V" command and
give them a security level of 1. After you have finished verifying or killing
the new users, delete the file.
Page 15
After theses steps have been completed, you will be done with the general
system naintenance. You may wish to use the "C" command to catalog the disk
and check on how much space you have free. Trying to decide what to do when
you run out of room can be a problem. Better to keep watch on things and stop
the problem before it happens. Last of all, log off the system.
GBBS ][ SECURITY SYSTEM
-----------------------
It seems that the most difficult part of learning how to run and modify a
GBBS ][ system is how the security system works. Once you understand it, you
will realize that it is quite simple. The system is based around a group of
"switches" that we will call "FLAGS". There are a total of 7 flags used in
this system. The flags are just like a switch, they are OFF or ON. Each flag
is like a BIT if that helps. In GBBS ][, you can set these "FLAGS" in any
combination for a user. Since there are 7 of them, and they are independent of
each other, there are a total of 128 security levels, or 2 to the power of 7.
When you first get the system, only two flags will be used. Flag 7 shows the
user is the Sysop. Flag 1 shows whether the user is verified or not. Flags
2 through 6 can be made to represent anything you wish. As an example, if you
wanted to have 3 boards: general, 6502, and CP/M then with the following group
of codes you could make each of these controlled by a separate flag. Ex:
1315 IF I$="6502" AND USR(2) THEN BB=2:S=6:D=1:V=0:GOTO 5000
1317 IF I$="CP/M" AND USR(3) THEN BB=3:S=6:D=1:V=0:GOTO 5000
The access for the general board is in the program set for level one already.
In GBBS ][, the USR() statement is used to check the security level. In the
above statements, USR(2) and USR(3) were both used. These are the way flags
2 & 3 are tested. In line 1315 we check to see if their input (I$) was "6502".
If so, then they wish to go to the 6502 board. We then check USR(2) to see
if they have flag 2 set. If they do then they will be allowed access to the
board. Likewise in 1317 we use a different command, "CP/M", and use flag 3.
Now either of these flags can be used to allow access to different things.
To allow a user access to the general board and the CP/M board, but not the
6502 board, we would just write down which flags we want set. In this case we
would want 1 - general board and verified user and 3 - the CP/M board. We
would then look this combination up in the "FLAG/BIT TABLE" in chapter 3. In
this case, the level needed would be 9. An understanding of these flags will
be necessary if you wish to make any special mods to the system. Make sure
that all users on the system have at least level 1. Level 0 is an unverified
user. Their ablitities are very mich limited. More info on programming is
in chapter 5 and appendix A.
Page 16
USING: GBBS ][ CONFIG
---------------------
This program is used for changing the configuration of your hardware. If you
get new hardware or change your current hardware, then it will be necessary to
tell the system so. This program will also change a few software functions of
the BBS. When you type: RUN GBBS II CONFIG, you will get a menu of possible
options. If you use option 1, then it will configure your entire system.
This will wipe out your users, mess up your bulletins, and some other nasty
things. For changing parts of the configuration, options 2-5 should be used.
The only option that I will explain here is number five. As far as the rest of
the options go, they are hand-holding. Option five will allow you to change the
CONTROL KEYS used by GBBS ][. Once you have used to system, you become aware
that there are three keys that cause things happen in the system. These keys
are ctrl-S, ctrl-X, and ctrl-N. Because ctrl-S is a known standard there is
no way to change it. Ctrl-X and ctrl-N on the other hand, can be modified to
fit your taste. Once you select option five on the menu, you will asked for the
FILE STOP char. This is the char, initially ctrl-X, that lets you exit from
bulletins, menus, etc. Whatever key you press in response to this question
will be the key that is used from now on. [RETURN] is taken as a ctrl-X.
You will then be able to edit the message displayed before files are shown.
After this, you will be able to change the FILE SKIP char. This is normally
ctrl-N You can then edit the file skip message. After this menu, you will be
asked for the MAIL DIVIDER. Between mail and in some other parts of the
system, there is a line of "-" printed to "divide" the text up. At this point,
you can design a line of your own, the only requirement being that it must be
39 chars long. A [RETURN] is taken as a line of "-". After all of this, if you
like your changes then write the changes to disk.
USING: GBBS ][ USERLIST
-----------------------
This program requires the use of a printer. If you do not have one then you
can not run it. This program assumes your printer is in slot 1. This program
will get a list of your system users and sort them by name, phone, last date on,
password, or security level. The sorted list will then be printed on your
printer. To run the program, insert your MASTER DISK and type:RUN GBBS II
USERLIST. The program will then run up and ask you for the field to sort by.
Enter one of the choices. Then insert your SYSTEM DISK. The program will read
in all the users. This operation will take a few minutes. The program will
sort the users. You can tell if there is a problem by looking up at the upper
right hand corner of the screen. If it appears to be moving then all is well.
Sorting may take a minute or so. After that, the users will be printed.
There is a delay between the time the program gets done sorting and starts
printing.
Page 17
USING: GBBS ][ USERPURGE
------------------------
This program will kill old usersfrom your system. Depending on the popularity
of your system, you will have to kill off users that don't call after a cetain
amount of time. It is possible to do this by using the userlist program, but
very slow and tedious. With this program you will be able to enter a date,
and all users who have not been on since that date will be killed. If the user
had any mail waiting, then it will also be removed. I recommend using this
program at least once a month at the minimum. The length of time you wish to
leave users on for is up to you, but I would suggest 3 months. If a user fails
to call for 3 months then they probably are not worth having as a user. To run
this program insert your MASTER DISK and type:RUN GBBS II USERPURGE. Next
insert your SYSTEM DISK into its normal drive and your MAIL DISK into its
normal drive. If the SYSTEM DISK and the MAIL DISK are one and the came, then
put it into its normal drive. Now tell the program what drive the SYSTEM DISK
is in. You will then be shown the current date and asked for the date to kill
before. If today was 12/03/83 then I would suggest killing before 09/01/83.
After you have given the date, you have a choice of two modes of operation.
If you have the program ask for verification before killing, then when it comes
across a user who has not been on for the appointed amount of time, the program
will ask you if he should be killed. If you answer "YES" then the user will be
removed along with his mail if he had any. If you do NOT make the program ask
for verification, then it will kill all users and their mail if they have not
been on for the allowed amount of time. After the purge is complete, you will
be given some stats about your system. The number of free slots is how many
more new users you can get before your user file gets any bigger. The number
of all allocated slots is the current number of users. The total number of
slots includes both empty and filled slots.
Page 18
Chapter 5 -- "BBS MODIFICATIONS"
The following modifications may be made to your GBBS ][ BBS program and do a
variety of things. Make sure you follow the directions. If you don't under-
stand sonething then be extra careful when you try it. Always make sure you
have a backup of your program before you make one of these mods. After it has
been entered, try it out and see if it is really what you want. DON'T SAVE IT
UNLESS YOU ARE SURE YOU WANT IT!
- * NOTE: When reference is made to GBBS ][ BBS, it is made towards whatever
the applesoft part of your board is named on the disk.
HOW TO ADD ANOTHER BULLETIN BOARD
---------------------------------
1. Load in GBBS ][ BBS.
2. Add a line to your program that will check for the appropriate security
level and access the board. In the example I will be adding this board from
the command menu and it will be in SLOT 6, DRIVE 1, VOLUME 0. The board will
be available to people with security flag 2. The command to access the
board is "B2".
1345 IF I$="B2" AND USR (2) THEN BB=2:S=6:D=1:V=0:GOTO 5000
This line makes the new board accessible from the main command menu. If we
analize the line we see that I$ is first checked to see if it is "B2", the
command we want. If it is then we make sure that their security flag 2 is set.
If they are able to pass your criteria then BB is set to 2. This will tell
the bulletin section that you want to use bulletin board #2. S is the slot,
D is the drive, and V is the volume.
3. Save GBBS ][ BBS back to disk.
CHANGING EXISTING DRIVE ALLOCATION
----------------------------------
1. Load in GBBS ][ BBS.
Page 19
2. Now there are some drive allocations that you may wish to change. Initially,
the general files, downloads, and uploads are assumed to be on the
SYSTEM DISK. You may wish to have a separate drive for these or just
move one to a different drive. Here are the lines that control these
sections and what needs to be set to change the drive parameters. The
appropriate files will have to be copied.
Download: D1,D1/1,D1/2,D1/3,D1/4
1270 IF I$="D" THEN S=slot:D=drive:V=volume:DB=1:GOTO 4500
General files: G1, G1/1,G1/2,G1/3
1290 IF I$="G" THEN S=slot:D=drive:V=volume:GF=1:GOTO 4800
Uploads: No files needed
1380 IF I$="1" AND (UP OR USR(7)) THEN S=slot:D=drive:V=volume:GOTO 4900
3. Save GBBS ][ BBS back to disk.
OKh h
h h
hEhhhhhhhhhhhhhhhhhhhhhheeeeeeeeeeeeeeeeeeeeeeee-----------
1. Use an editor to edit up a file named "Dxx" where xx is the section # you
want to add. We will use "2" for our example.
2. Into this file put the names of the files you have for downloading and how
long they are. I will have 3 files in this section. Ex:
01>023 SUPER-EDIT
02>006 DISK COPY 48K
03>023 BACK SONGS
The "Ox>" prompt is the editor prompt, and should not be entered into your
file. The length is the file size in sectors minus 1.
3. Load in GBBS ][ BBS.
4. Add the line that will access the new board. We will say that our new
section is in SLOT 6, DRIVE 2. We already know that it is section # 2.
We will make "D2" the command to access it. The required security is flag
2. We will add a line that looks like:
1275 IF I$="D2" AND USR(2) THEN DB=2:S=6:D=2:V=0:GOTO 4500
5. Save GBBS ][ BBS back to disk.
Page 20
HOW TO ADD FEEDBACK TO A USER
-----------------------------
1. Load in GBBS ][ BBS.
2. As it happens, we have an online D&D game going on and we would like the
players to have an easy way to leave their comments and questions to the
Dungeon Master. The problem is: You are not the DM, another user is. How do
we add a FEEDBACK section for our DM? Well, our DM's name is "THE DM" (real
original) and we want these comments labeled "<><> COMMENTS TO YOUR HIGH-
NESS <><>". The "<><>" are just on the line to make it look nice. It does
not affect the performance of this mod. Adding this line would enable us
to leave the feedback.
1375 IF I$="DM" AND USR (3) THEN 1500
DM is the name of our command. The Dungeon is only accessible to those
people of security level 3. You must branch to a separate part of the
program as this command requires more than 1 line.
1500 O$=EL$+"A question to the DM"+EL$:GOSUB 7000:GOSUB 7100
1510 IF NOT X THEN O$=EL$+"ABORTED":GOTO 7000
1520 D1$="THE DM"D2$="<><> COMMENTS TO YOUR HIGHNESS <><>"
1530 D3$=".COMMENT SAVED":CR=1:GOTO 6800
Line 1500 just tells the user what he is into. Line 1510 goes to the editor.
If X=0 then they are aborted. Line 1520 will abort them. Otherwise the
appropriate variable are set. D1$="who you are sending to". D2$="heading
for the letter". D3$="response when letter is saved". CR must be set to 1 or
D2$ will not be added. If you don't want D2$ at the top of the letter then
set CR=0. The command does not need to stretch over 4 lines as it did. Here
is how the same command can be written.
1500 O$=EL$+"A QUESTION TO HIS HIGHNESS":GOSUB 7000:GOSUB 7100:IF NOT X THEN
O$=EL$+"ABORTED":GOTO 7000
1510 D1$="THE DM":D2$="<><> COMMENTS TO YOUR HIGHNESS <><>":D3$=".COMMENTS
SAVED":CR=1:GOTO 8600
We just did the same thing as we did in 4 lines in 2 lines.
3. Save GBBS ][ BBS back to disk.
HOW TO ADD SYSOP AUTO-LOGON
---------------------------
1. Load in GBBS ][ BBS.
Page 21
2. Well, well, we have gotten tired of typing in who we are and our password,
and we want to be able to have our board auto log us in. Our name is "JOE
SHMUK"and our password is "U001DZN". We just need add a line and auto-logon
becomes possible.
220 IF NOT PEEK(966) THEN O$=EL$+"AUTO LOGON ?":GOSUB 7000:GOSUB 8300:
IF I$="Y" THEN A2$="SHMUK":A3$="U0001DZN":GOTO 540
We use PEEK(966) to check and g9%
v the local console. We were
then asked if we wanted to auto-logon. If we did then is just assigned our
last name and password and jumped to the "check your password" routine.
3. Save GBBS ][ BBS back to disk.
ADDING OTHER SYSOPS
-------------------
1.Load in GBBS ][ BBS.
2. This is extremely simple. Just a warning that when I say add another sysop,
I mean another person that has power equal to your own. To do this we just
add an extra line to the program that checks their name against that of the
persons logging on. When they log on, sec 7 is set which enables access to
the sysop commands. In our example , "FRED BAXTER" is our second sysop.
1035 IF A1$+" "+A2$="FRED BAXTER" THEN POKE 972,PEEK(972)+64 or
1035 IF A1$+A2$="FREDBAXTER" THEN POKE 972,PEEK(972)+64
Either of the above will set security flag 7.
3. Save GBBS ][ BBS back to disk.
HOW TO LOAD IN A DIFFERENT DEFAULT BULLETIN BOARD
-------------------------------------------------
1. Load in GBBS ][ BBS.
2. Currently line 190 loads the default board. BB is set to the board you
want to load. The routine at 8600 is then called. If you wanted to have
board 2 loaded in when people called then you would change the line to:
190 BB=2:S=B1:D=B2:V=B3:GOSUB 8400: IF CT{body}lt;>DA$ THEN CT=1:CT$=DA$
3. Save GBBS ][ BBS back to disk.
Page 22
HOW TO CHANGE THE NUMBER OF LINES THE EDITOR WILL HOLD
------------------------------------------------------
1. Load in GBBS ][ BBS.
2. Well, you now have your new 5 meg hard disk and you want to let people
leave bulletins and mail all the way up to 100 lines. Unfortunately it seems
that it will only hold 50 right now. To fix this we just need to change one
line. Line 110 holds a variable that controls how many lines are in the
editor. Just change line 120 from:
120 VW=39:ML=50: DIM D$(ML+5),T$(129),N%(129)
to
120 VW=39:ML=100:DIM D$(ML+5),T$(129),N%(129)
Notice that the variable ML is what controls that number of lines available
in the editor.
3. Save GBBS ][ BBS back to disk.
HOW TO ADD ANOTHER COMMAND SECTION
----------------------------------
1.Load in GBBS ][ BBS.
2. Well, it seems that we want to have a D & D section on our board, and we
are not happy with just adding another bulletin board that could be accessed
from the main board. We want a totally new section with new commands. We
want it to be for players only. Adding a second command section is not
complicated at all. To do this, we will just dedicate a group of lines to
our new section. Then we will use Applesoft's GOSUB command to remember
what board we came from. The first thing that you must understand about
sections, is that they are like sub-routines. They use GOSUB's within
themselves. In other words, you use RETURN statements to get back to the
top of the section. To exit from the section to the section it came from,
you do a POP then a RETURN. If you don't understand this then don't be too
alarmed, I still find myself wondering at times. The first two lines of the
board must be in a special format. They are like the following.
1500 O$=EL$+EL$+"D&D COMMAND:":GOSUB 7000:GOSUB 8000
1510 GOSUB 1520:GOTO 1500
Line 1510 is the line we MUST have. Line 1500 can be in any format you like.
I will try to explain how line 1510 works. When you do a GOSUB and a RERURN,
program control returns to the statement after the GOSUB. In this case, we
GOSUB the next line. After a command is finished, it RETURN's to line 1510
but after the GOSUB. You see that the next statement is a GOTO 1500. This
goes back to the beginning of the section.
Page 23
If we were to go to another board, then the stack would not be popped, and
in simpler terms, it would remember where it came from. Just make sure that
you do not use a GOTO command. If you insist on using a GOTO then a POP
must first be used. For the rest of our section we might have something like:
1520 IF I$="?" THEN F$="D & D MENU":S=1:D=J:RT=1:GOTO 9500
1530 IF I$="B" THEN BB=2:S=6:D=1:GOTO 5000
1540 IF I$="T" THEN 4000
1550 O$=EL$+"ILLEGAL COMMAND":GOSUB 7000:RETURN
or
1550 O$=EL$+"ILLEGAL COMMAND":GOTO 7000
The reason that GOTO's are used in the IF/THEN's is that there is a RETURN
at the end of all of the used routines. The second line 1510 uses a GOTO 7000
instead of a GOSUB/RETURN sequence. There is a RETURN at the end of each
sub-routine, so by using a GOTO we just use the RETURN at the end of the 7000
routine. It is more efficient than the GOSUB/ROUTINE method.
3. After your section is finished, write up a menu for it.
4. Save GBBS ][ BBS back to disk.
HOW TO ADD AUTO-LOGOFF ABILITY
------------------------------
1. Load in GBBS ][ BBS.
2. Well, it seems that we have gotten a VERY popular board. So popular in fact
that we have problems getting on ourselves. It seems that there is always
somebody on when we come in to get on. Well, here is the answer. We will
add a mod that will allow us to press BUTTON #0 on our paddles and auto-logoff
the person who is on. This is much better then hitting RESET because all
the current board stats will be saved back to disk rather than being lost.
The way we are going to add this command is to check and see if the paddle
button is being held down. If it is, then we will make the program think
that it has lost carrier causing it to logoff the person who is online.
Line 8010 of the program:
8010 IF PEEK(960)=255 THEN POP:GOTO 4025
Is the line that checks for carrier loss. The only thing that needs doing
is to change the line to say:
8010 IF PEEK(960)=255 OR PEEK(-16287)>127 THEN POP:GOTO 4025
Page 24
If you look up location -16287 you will notice that it is the check for
button #0. If we put this mod in and press the button while somebody is
online then they will be logged off without any knowledge of what is hap-
pening. You must hold down the button during the time that the user press a
[RETURN] or you can press it for them. YOU MUST BE HOLDING DOWN THE BUTTON
WHEN [RETURN] IS PRESSED.
3. Save GBBS ][ BBS back to disk.
HOW TO ADD ANOTHER GENERAL FILES SECTION
----------------------------------------
1. Load in GBBS ][ BBS.
2. All that will really have to be done is edit up a file and add one line
to the program. We may have as many general sections as we want. The
following will add the section.
1355 IF I$="G2" AND USR(1) THEN S=6:D=1:V=0:GF=2:GOTO 4800
The command to access this section is "G2". They must also have flag 1 set.
GF is two because this is the second section. I used slot 6, drive 1,
volume 0.
3. Save GBBS ][ BBS back to disk.
4. Edit up the directory for the available files. The first line of this file
must tell how many files there are available. The file must be on the drive
specified in the program. The file must be named "Gsection#". Since we are
using section two, we would call our file "G2". An example directory might
look like:
4
1> DISK DRIVE TUNE UP.
2> ERROR DIAGNOSIS
3> TIPS ON APPLESOFT
4> GRAPHICS TRICKS
The files must be named in the form "Gsection#/file#". In this case, the
file dealing with ERROR DIAGNOSIS would be named "G2/2". All the files must
be on the drive you specified. You can use any editor to make this file.
The build in editor works fine.
HOW TO ADD A TIME LIMIT
-----------------------
1. Load in GBBS ][ BBS.
Page 25
2. Due to the volume and lenght of calls that the system is receiving, it
seems that we need to add a time limit to keep the system running smoothly.
With this mod, you will be able to select any time limit, and any user on for
that length of time will be logged off. To accomplish this, we will add a
subroutine that we will GOSUB whenever we want to check the time they have
been on. We don't want to log them off if they are in the middle of leaving
a letter or something. We will add our routine at 2000.
2000 IF USR(7) THEN RETURN
2010 GOSUB 8400:T=INT(T/60):IF T<30 THEN RETURN
2020 POP: O$=EL$+"Time limit exceeded":GOSUB 7000:GOTO 4010
This routine will log off users after 30 minutes. To change the length of
the call, alter the IF/THEN statement in line 2010 to check and see: "IF T<
time limit THEN RETURN". To check and see: if the user has been on too long
just add GOSUB 2000 statements in places where you would like them logged off.
I suggest:
1200 GOSUB 2000:RT=2:S=1:D=J:V=K:O$=EL$+"COMMAND (?=HELP):"
5050 GOSUB 2000: O$=EL$+EL$+"OPTION (?=HELP):":GOSUB 7000:GOSUB 8100:
I$=LEFT$(I$,1):IF I$="A" THEN RETURN
5580 GOSUB 2000:IF PEEK(960)=3 THEN POP:GOTO 5050
In these 3 spots, users will be logged off when reading bulletins or issuing
commands. They will not be terminated when leaving a bulletin or mail.
This time limit does affect the Sysop.
4. Save GBBS ][ back to disk.
DATA FILE STRUCTURE
-------------------
There is a file on the SYSTEM DISK called: DATA. This file contains informa-
tion vital to the correct operation of your system. The following is a list
of the structure of that file and what the information means. If by some
chance, your DATA file is destroyed, you may be able to re-create it.
Line 1: Printer slot, Clock slot, Current year (/84), Current date (xx/xx/xx).
Line 2: Caller number, Next bulletin number to be used, Number of users,
Calls today.
line 3: System slot, drive, volume,E-Mail slot, drive, volume,Bulletin board #1
slot, drive, volume.
Line 4: Name of sysop, Name of system.
Line 5: Counter for welcome message, Date for calls today.
Line 6: Mail divider.
Line 7: File stop char, File stop message.
Line 8: Bulletin next char, Bulletin next message.
Page 26
Chapter 6 -- "CONVERSION/UPDATE PROGRAMS"
With every GBBS ][ system is included three conversion programs. Two of
these programs will allow former Net-Works V2.3 Sysops to convert their users
and bulletins over to GBBS ][ format. The other will allow GBBS ][ owners to
update their systems from older pre-version 1.7 GBBS ][ systems to the new
version 1.7.
NET-WORKS --> GBBS ][ USER CONVERT
----------------------------------
For those Sysops that used to run Net-Works systems, they may wish to update
their USERFILE so that their previous users can log onto their GBBS ][ system
using their old passwords. This program will convert the users so that all
of the information including name, password, phone number, and last date
called are preserved. It will make the first user of the old Net-Works system
the Sysop of the new new GBBS ][ system. Validated users from the old system
will be set at level 1 on the new system. All unverified users will be set to
level 0. You must have already configured you GBBS ][ system. Then copy the
file from the old system named: NW.USERS.SYS to the GBBS ][ SYSTEM DISK.
Delete the file named: USERS from the GBBS ][ SYSTEM DISK. Insert the
GBBS ][ MASTER DISK and type: RUN NW->GBBS USERS. When the program comes up
insert the GBBS ][ SYSTEM DISK into the drive. If you do indeed have the file:
NW.USERS.SYS on the system disk, then enter "Yes" to continue. Tell the
program which drive the disk is in. The program will then proceed to convert
all the users. Once finished, the Systop of the old system will also be the
Sysop of the new one.
NET-WORKS --> GBBS ][ BULLETIN CONVERT
--------------------------------------
If you are converting over from an old Net-Works system, then you may wish
to change over your bulletins so that they will work on your GBBS ][ system.
The converted bulletins look a little strange on the new system, but all the
information is still there. Once converted, only the Sysop of the new system
may delete the bulletins. An example of a converted bulletin might look
like this:
Page 27
NUMB ->17
SUB ->MODEM TYPES
MSG LEFT BY: GREG SCHAEFER
DATE POSTED: JUN 08
After this, the actual bulletin would be shown. As you see, all the information
is conveyed, but it is not as nice looking as it could be. If you indeed wish
to convert your bulletins, then you must copy the bulletins and the file:
NW.TITLES to the disk that you will be using for your GGS ][ bulletins. Once
this has been done, insert your MASTER DISK and type: RUN NW->GBBS BULLETINS.
When the program comes up, verify that you have copied the files and that they
are backups. Then insert your SYSTEM DISK. You will first be asked how many
boards your old system had. Actually this is the number of boards you wish
to convert. You may only wish to convert one board even if you had more.
Next tell the system the name of the file that had the titles for that board
in it. Normally this would be: NW.TITLES. Next tell it the prefix for each
bulletins file. This is normally: "NW.". Verify this information is correct.
Insert the disk with the copied bulletin files and tell the program what drive
it is in. The files will then be converted. This operation will be repeated
for the number of boards you told the system you wish to convert. You will
finally put your SYSTEM DISK back in and the program will finish up. Your
initially configured system will only access the first board that you converted.
You must add the code to access the other boards. This is explained in chap-
ter 5. These boards will be numbered as they were converted. The first board
converted is board one, the second is board two, etc.
GBBS ][ VERSION 1.6 UPDATE
--------------------------
This program will allow previous GBBS ][ Sysops to update their users,
bulletins, and mail to version 1.7 format. First copy the file: USERS from
the version 1.6 system to the version 1.7 SYSTEM DISK over the existing user
file. Your MASTER DISK and type: RUN GBBSS II UPDATE. Once the program comes
up, insert you version 1.7 SYSTEM DISK. Next, insert your version 1.6 SYSTEM
DISK. The subject file for the first board will be read in. Then insert the
disk containing the files for board X. This operation will be repeated for
as many boards as your system has. Last of all, insert your version 1.7 SYSTEM
DISK and the program will write out some more info. Depending on how many
users you have, this can take a while. After this, the conversion is complete.
Copy all the bulletin files to the disks they are needed on the new system.
On the new system, the "Sx" files should be on the same disk as the corresponding
"bx/x" files. Your files are now all converted and ready to use on your 1.7
system.
Page 28
Appendix A -- "MODEM/RS-232 SELECTION AND HOOKUP"
APPLE PLUG-IN HARDWARE
----------------------
Some Apple plug-in boards may be compatible with GBBS ][ even if they are
not listed. For example: The Videx PS10 interface card is compatible with the
Apple SSC card. If you had a Videx, then you would tell CONFIG that you have
an Apple SSC in that slot. Another example, the Multi-Tech Modem ][ will work
if it is configured as a DC Hayes Micromodem ][. If your card is not listed,
then check your manual and see if it says that it is compatible with one of
the supported boards. Here is a list of boards and what they can be
configured as:
Actual board Configure as In what slot
------------ ------------ ------------
Apple /// Apple SSC 7
serial port
Videx PS10 Apple SSC Actual slot
Basis 108 Apple SSC 1
serial port
Multi-Tech DC Hayes Actual slot
Modem ][ Micromodem ][
If your modem is not listed above and you can not find it in your manual, then
consult your dealer.
RS-232 MODEM COMPATIBILITY
--------------------------
Certain modems and RS-232 cards need to be connected in certain ways. The
following table shows what pins should be connected to what for 300, 300/1200,
and 1200 baud modems. With 1200 baud only modems, you could try a straight
cable as with the 300 baud modem.
Page 29
Speed RS-232 pins Modem pins Comments
----- ----------- ---------- --------
300 2,3,4,5,7,8,20 2,3,4,5,7,8,20 A straight 25 pin works best
300/ 2,3,4,5,7,8,20 2,3,4,5,7,8,20 24 pins straight with pin 6->12
1200 6 12 is best
1200 2,3,4,5,7,8,20 2,3,4,5,7,8,20 Try a straight 25 pin. Pin 6->20
optional: 6 optional: 20 if problem
Most people will have straight 25 pin cables with their modems. This is fine
for 300 baud operation. If you have a 1200 baud ONLY modem then try a 25 pin
also. It may work depending on your modem. If it does not, jumper RS-232pin
6 to modem pin 20. For 300/1200 baud modems, it is necessary to run pin 12 of
the modem in as pin 6 of the RS-232. This pin is used to determine the speed
that the modem is running at. If you make this mod then you must make sure
that 6 OR THE RS-232 connects to 12 OF THE MODEM. Pin 6 must have no other
connections and neither should pin 12. You can get a cable from your dealer
like this, or make it yourself. If you have an MBE VIP card then you can make
the mod neatly by opening up the cover on the RS-232 plug, unsoldering thewire
going to pin 6 of the connector and re-soldering it to pin 12 of the connector.
Then put the cover back on. You can then use a straight 25 pin cable. If you
are using a Novation Smartcat 1200 baud modem, then this pin 6 jumper will not
be needed. On all other 300/1200 baud modems it will be necessary.
If your dealer can not supply the needed cable then you can get it from Micro
Data Products. Tell them you need a GBBS ][ cable.
Micro Data Products
(303)-364-1123
If the modem you have is not listed as a usable modem, but it supports auto-
answer then you can probably use it. First, you must use a cable as shown
above for the appropriate baud rate. To make your modem work, you must be able
to set switches on it or it must default to the following operating conditions.
1) Auto-answer phone when DTR is high
2) Use DTR. Do not override it.
3) Use TRUE CARRIER DETECT. Do not override.
4) Do not respond to any commands sent to it by the computer. If it is a
smart-type modem and takes commands, then disable its command recognition.
5) Hang up/reset upon loss of DTR.
Once you have set your modem to work with the following conditions, select
either "300 baud modem" or "300/1200 baud modem" in config. Use "300 only"
for 300 only modems. Use "300/1200" for 300/1200 or 1200 modems.
Page 30
Appendix B -- "GBBS ][ MAIN ROUTINES"
All of these routines may be accessed by routines that you write and add to
the board. In almost every case (with the exception of SYSTEM) the routines
should be GOSUBed and will return to where they were sent from. The principle
of GBBS ][ is that the board is kept flexible with subroutines. From the
comand menu all routines should be accessed with a GOTO instead of a GOSUB.
This is because the command routine does a GOSUB. This is because the command
routine does a GOSUB inside of itself (more about that in chapter 5) so that
you need not GOSUB every routine individually. The RETURN inside of the routine
will send it back to the COMMAND prompt. GOOD LUCK WITH ANY MODS YOU MAY MAKE!
GENERAL CHANGES
---------------
General changes can cover a lot of things. I will simply discuss how you
can add text output and input statements. To output a string of text, the
procedure is fairly simple. It is not like BASIC in which you use a PRINT
statement. If you use a PRINT statement then the output will go to your console
only. To output to the modem also, the text must be assigned into O$. After
that, you just need to GOSUB 7000. 7000 is the routine that ouputs the text
in O$. Now, if we wanted to output a line that said: "HELLO OUT THERE" we
could just add the line:
XXXX O$="HELLO THERE":GOSUB 7000
Now, that statement would output "HELLO THERE" to the modem. You may think
this a dumb way to output, but it has some advantages.
1. All output is through 1 routine. To change something about ALL the out-
put just requires changing 7000.
2. You may have fragments sticking out (like with a ";" with BASIC) and still
issue DOS commands.
3. You can ouput a group of lines in 1 statement.
When you normally output, a [RETURN] is NOT added to the end of the line.
You must add the [RETURN] yourself by adding the variable EL$ to O$ where you
want RETURNS. Ex: We want a RETURN after the line so we say:
Page 31
O$="HELLO THERE"+EL$:GOSUB 7000
Note that the EL$ is added to O$ to add the [RETURN]. If we wanted 2 RETURNS
then we would have to add 2 EL