±±±±±±Ü ±±Ü ±±Ü ±±±±±±Ü ±±±±±±Ü ±±Ü ±±Ü ±±±±±±Ü ±±Ü ±±Ü ±±Ü ±±±±±±Ü ±±Ûßßßß ±±±±Û ±±Ûßßßß ±±Ûßßßß ±±Û ±±Û ß±±Ûßß ±±Û ±±Û ±±Û ±±Ûßßßß ±±±±±Ü ±±Û ±±±±±Ü ±±Û ±±Û ±±Û ±±Û ±±Û ±±Û ±±Û ±±±±±Ü ±±Ûßßß ±±±±Ü ±±Ûßßß ±±Û ±±Û ±±Û ±±Û ±±Û ±±±±Ûß ±±Ûßßß ±±±±±±Ü ±±Ûß±±Ü ±±±±±±Ü ±±±±±±Ü ±±±±±±Û ±±Û ±±Û ±±Ûß ±±±±±±Ü ßßßßßß ßß ßß ßßßßßß ßßßßßß ßßßßßß ßß ßß ßß ßßßßßß ±±Ü ±±Ü ±±±±±±Ü ±±±±±±Ü ±±±±±±Ü ±±Û ±±Û ±±Ûß±±Û ±±Ûßßßß ß±±Ûßß ±±±±±±Û ±±Û ±±Û ±±±±±±Ü ±±Û ±±Ûß±±Û ±±Û ±±Û ßßß±±Û ±±Û ±±Û ±±Û ±±±±±±Û ±±±±±±Û ±±Û ßß ßß ßßßßßß ßßßßßß ßß IN REMEMBRANCE OF JOHN WRIGHT Executive Host - Premium Host/BBS for Telix Version 3.5, released 1 Jan, 1994 Copyright (c) 1992, 1993, 1994 by Steve Wood All Rights Reserved Another fine product from, The WOODSHED Steve Wood...Owner T A B L E O F C O N T E N T S --------------------------------------------------------------------------- Introduction ......................................................... 1 How to Register .................................................. 2 System Requirements .............................................. 3 Installation ......................................................... 3 Main Menu Options .................................................... 6 SysOp Menu ....................................................... 6 Guest Menu ....................................................... 10 Message Menu ....................................................... 10a SysOp's Function Keys ................................................ 11 Security Levels ...................................................... 11 The Host User File ................................................... 12 The Message Base ..................................................... 12 Private Messages ................................................. 13 Public Messages ................................................. 13 The Message Data File ............................................ 13 Adding Files to the Host ............................................. 13 Installing Filelists (with descriptions) ............................. 14 Installing Bulletins ................................................. 15 Installing Doors ..................................................... 15 Installing Conferences ............................................... 16 Additional Security - Trashcan File .................................. 18 New User Questionnaire ............................................... 18 Event ................................................................ 18 Using the Host Utilities ............................................. 19 Using the Host Filer ................................................. 20 File Transfers ....................................................... 22 Important Files to Become Familiar With .............................. 22 Limitations .......................................................... 24 Support .............................................................. 24 T A B L E O F C O N T E N T S --------------------------------------------------------------------------- APPENDIX A - High Speed and Error-Correcting Modem Setup ............. A1 APPENDIX B - Mail Doors, Offline Readers, Mail Networks, and Frontends. B1 APPENDIX C - Installing and using RINGBACK C1 APPENDIX D - Detailed file layouts D1 page 1 --------------------------------------------------------------------------- WHAT IS EXECUTIVE HOST? If you need a fully functional BBS or just a remote access program for your computer, this is the program for you. Executive Host is designed to be entirely flexible and can be set-up in a matter of minutes. A fast and easy to use program that comes with everything you need to be up and running immediately, and yet has the power to allow extensive customization and handle E-mail, multiple message bases, bulletins, file areas, and doors. In addition, Executive Host now completely swaps out of Telix when executing doors and the remote shell. CONFERENCES! PRIVATE FILE AREAS! PRIVATE MESSAGE AREAS! Multiple conferences or forums may now be installed. Up to 999 conferences, each with its own message base, file areas, doors, and bulletins may be installed by the SysOp. This powerful new feature will allow you to assign security levels for each conference, enabling private and semi-private conferences, file areas and message bases. This ability also allows Executive Host to be linked into many of the mail relay systems. Utilities already exist for linking your BBS with the RelayNet (RIMES) international mail network. Support for off-line mail doors and mail readers is also in place, and the host may be executed from a frontend utility such as FrontDoor. Executive Host is written entirely in the SALT language and requires the communications program Telix, version 3.15 or above, to run properly. If you are not currently using Telix as your communications package of choice, Executive Host is one of two reasons why you should switch now. The other reason being that Telix is beyond a doubt, the finest, most powerful, and easy to use communications package available. What is a host and how does it differ from a BBS? There is only one major difference between a host and a self-standing BBS program, and that is that a host is programmed in a special script programming language that allows it to directly interface a communications program and use all of it's powerful features (in this case Telix). This allows the Host Sysop to take advantage of all of the special functions and features built into Telix. For example, the registration and set-up of protocols is not necessary since these come with Telix. Also, in effect you are getting two programs for the drive-space of one. In other words, since Executive Host is using the internal communication routines in Telix, it is a very small program in itself. An alternative remote access program would be much larger and also much more expensive. A host will allow it's operator to access his computer from remote, while away on business or pleasure. Executive Host also has many other features that allow the access of several hundred callers (up to 10,000), each of whom may be assigned a security level for varied levels of access. It's advanced message base and file transfer routines make it a prime choice for someone interested in running a Bulletin Board System, either for personal or business needs. All of this for a low cost of only $35, as compared to from $200-$500 for programs with comparable features. page 2 --------------------------------------------------------------------------- Executive Host is now, without a doubt, the most powerful and full- featured Host program available anywhere. If you demand quality and innovation from your software products, then Executive Host is the right program for you. EXECUTIVE HOST IS SHARE-WARE. The extended use of this program after a 20 day trial period requires it's registration with the author. Some limits have been built in to the unregistered version of Executive Host to encourage individual compliance. The file ORDER.FRM is a registration form that you may print and mail with your check or money order for $35.00 plus $5 shipping (U.S. dollars). Checks and money orders written on foreign banks can no longer be accepted due to extremely high bank processing fees. Send your order to the author at the address below. Steve Wood Suite B220-109 100 North Tryon Street Charlotte, NC 29202 USA What do you get when you register? 1. Full-featured, personalized Host with Zmodem capabilities. 2. External protocol support including DSZ/GSZ, Bimodem, HS/Link, etc. 3. Free upgrades for one full year or at least one major upgrade. (obtained on our support bbs in the ExecHost support conference) 4. The right to download and use Beta versions of new upgrades still undergoing testing. (also available on our support bbs) 5. On-Line support at our BBS, 24 hours a day. 6. Ability to design and use custom menus with Executive Host. 7. Ability to run batch files when callers logon and logoff, enabling utilities such as "Last Caller On" to be used. 8. The finest, most powerful Host/BBS system available. page 3 --------------------------------------------------------------------------- Executive Host was written entirely in SALT, Telix's powerful script language. Special thanks go to Jeff Woods, owner of Telix and the SALT language. Telix is a registered copyright of: Deltacomm Development Cary, NC Register your copy of Telix today! SYSTEM REQUIREMENTS - 1. 512k of memory and an MS-DOS or compatible operating system. 2. Telix version 3.15 or above already installed. 3. A good text editor that accepts file names on the command line is required. Ted.com, a public domain text editor from PC Magazine is included for those who do not currently have their own editor. Obtaining a more cabable text editor, such as Qedit (shareware) is highly recommended. INSTALLATION: To install, Executive Host from a downloaded .ZIP file, unzip all files into a temp directory and type 'XINSTALL'. If you received a registered copy on a floppy diskette, merely insert the diskette and type A:\XINSTALL. If you do not have your text editor configured in Telix, do so now. This is done by running Telix and entering "ALT-O". Then choose "Filenames and Paths" and enter your editor's name under option "h". (If you do not have your own text editor, ted.com will be used automatically, and the Telix editor setup is not necessary.) Hit Escape to exit this screen. If you do not have Telix configured to use a status bar on the BOTTOM of the screen, do so now. This is done from the "Terminal Options" setup screen. Save your new setup and exit Telix. If you are using ZIP files, ensure that a copy of pkzip and PKUNZIP are located in the host directory or somewhere in your system's path. Decide where you want your DOWN and UP and HOLD directories and create them with the "MD" command. The DOWN directory is the primary download directory where callers may download files from. However, downloading from the HOLD (uploads) directory is also permitted. One set-up would be: C:\ -- Telix ---down À----up À----hold You would create them by typing "MD C:\TELIX\DOWN" and "MD C:\TELIX\UP" and "MD C:\TELIX\HOLD page 4 --------------------------------------------------------------------------- Downloading is permitted from any valid path on your system. Paths are listed in an ascii (text) file named DOWNLOAD.LST. See page 13 for further details. Now run the BOARD.BAT file by typing "BOARD" and pressing the Enter key. The set-up program will start automatically. When prompted for the SysOp's name and password, enter your name and password, or the name and password of the person who will be the System Operator. Next a list of system parameters will be displayed: Executive Host Configuration A: Name of BBS or Host System : (left blank) B: Directory Containing MAIN board : C:\telix\ C: Node Number : 1 D: Executive Host Download Directory : C:\Telix\down\ E: Executive Host Uploads Directory : C:\Telix\up\ F: Connection Type : Modem G: Security level for VIP access : 80 H: Date and Time for Event : 01-01-99;00:00:00 I: Host Access (Public or Private) : Private J: SysOp's Page Turned On/Off : on K: Security to suspend UL/DL : 04 L: Type of Monitor (Color/Mono) : Mono M: Baud Rate Locked (High-Speed Modems) : No N: Auto Answer Mode or Ring Detection : Auto O: Number of Rings to Answer On : 1 P: Protect Doors With Password : Yes R: FrontEnd Mail System is Attached : No S: Screen Blanker - Yes or No : Y Q: Quit without saving any changes. X: Exit and save changes to disk. Which option -> Each option should be configured to your individual needs as below, OPTION D: is the full path of where your download files directory will be located. OPTION E: is the full path of where your uploads directory will be temporarily uploaded to. This subdirectory MUST be empty after every upload. Use the UPLOAD.BAT!!!!! OPTION F: should be left as "Modem" unless you are connecting two computers directly with a serial cable, in which it should be set at "Direct". OPTION G: Is security access level where the VIP/VIPG screen will be displayed. OPTION H: Date/time that the Host will execute it's event(EVENT.BAT). See Appendix D3 for file layout of this file. page 5 --------------------------------------------------------------------------- OPTION I: This setting, if set at "private", will not allow caller's who are not registered to access the host. If set at "public", new callers may access the host at the security level set in option H. OPTION J: This option sets whether the SysOp's page will be turned on or off. OPTION K: This option selects the security level that disallows file transfers to the caller. OPTION L: Is the type of monitor and should be set as "Mono" if you have a monochrome monitor or "Color" if you have a color monitor. OPTION M: This option should be left as "No" unless you are using an error correcting modem, which requires the baud rate to be locked. (i.e. HST or Hayes 9600 baud modems) OPTION N: Auto Answer Mode sets the modem in the answer mode using the TELIX answer string. The recommended string is ~~~+++~~~ATS0=1^M. The 1 after the = sign is the ring number to answer on. This method is satisfactory in most cases. Ring Detection mode waits until a ring is detected before sending at ATA to the modem signalling it to answer. OPTION O: This option sets the number of rings the modem will wait before answering the phone. Values between 1 and 99 may be selected. Only used for RING detect. OPTION P: This option allows the sysop to decide whether password protection is desired each time a caller returns from a door. It is recommended that this option be kept at 'Yes' for optimal security. Password protection coming out of the remote shell is mandatory. OPTION R: This option tells the host system if it is being executed from a FrontEnd mail system, such as the FrontDoor mail program. FrontEnd programs are necessary in order to interface with certain mail networks, such as FidoNet. OPTION S: This option allow the sysop to determine if he wants the internal screen blanker to be active. page 6 --------------------------------------------------------------------------- This completes the initial installation of the host, and this is all that is required to run the host as a remote access program, or as a simple BBS. Help on the Host's menus are available while running the Host by typing "H" from the main and message menus or "?" from the protocol menu. More detailed instructions on how to set up multiple doors, bulletins, filelists, etc. come later in this manual. THE MENU OPTIONS: DESCRIPTIONS OF THE SYSOP'S MENU COMMANDS. ÛßßßßßßßßßßßßßßßßßßÛ Û Executive Host Û°° ÛßßßßßßßßßßßßßßÛ ÛÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÛ°° Û SysOp Menu Û°° °°°°°°°°°°°°°°°°°°° ÛÜÜÜÜÜÜÜÜÜÜÜÜÜÜÛ°° °°°°°°°°°°°°°°° ÛßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßÛ Û (D)ownload File Û°° Û (U)pload File ÛßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßÛ Û (F)ile Directories Û (M)essage Menu Û°° Û (V)iew File Û (B)ulletins Û°° Û (T)ext Search Û (O)pen Door Û°° Û (S)hell to Dos Û (EDIT) Guest List Û°° Û (J)oin Conference Û (UTIL)ities Û°° Û (Q)uit Conference Û (I)nfo on Host Û°° Û (X)pert Mode Û (C)olor on/off Û°° ÛÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÛ (P)age SysOp Û°° °°°°°°°°°°°°°°°°°°°°°°°°°°Û (H)elp on Menus Û°° ÛÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÛ°° (G)oodbye °°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°° (D)ownload - Sends a file from Executive Host to you. The SysOp may download from anywhere on the system by using a full path. The SysOp may also use wildcards (i.e. *.*) when downloading with batch protocols. (U)pload - Sets Executive Host up to receive a file from you. The SysOp may also upload files to anywhere on the system by using a full path (i.e. C:\LOTUS\BUSINESS.WKS). If you use Zmodem, you will not be able to upload with a full path since the protocol grabs the filename from the remote site. (F)ile Directories - Gives a list of all files available for download, with file names, sizes, dates, and descriptions. After each screen is filled, the display will pause until is pressed. If filelists have not been set-up by the SysOp, only names, sizes, dates, and transfer times will be displayed to the caller. page 7 --------------------------------------------------------------------------- (V)iew - The (Z) sub-option will view any Zip file in the main or uploads directory of Executive Host. A guest may also view text files that are compressed inside of the zip file. The (T) sub-option will allow a guest to view any text file that the SysOp has made available. A directory of text files available for view can be found with the (F) option from the main menu, and then the (T) sub-option. The (S)ysOp view sub-option allows the SysOp to view any text file, anywhere on the system. (T)ext Search - This option allows the caller to do a text search of the filelists made available by the SysOp. Searches for specific text, file names, portions of file names, or even dates (in the correct format) are allowed. Wildcards (* or ?) will be searched for literally and should not be used. If the SysOp has not set-up filelists, this option may not be performed. (J)oin Conference - This option allows callers to join (or enter) a conference area. Conference areas may have their own level of security (minimum access level), file areas, and message base, depending on how the SysOp chooses to set them up. (Q)uit Conference - This option returns the caller to the Main conference area (the area all callers are in when they first log on). This command is used by callers when they are wish to return to the Main conference after using the (J)oin command. (X)pert Mode - This will make Executive Host stop displaying the main, protocol, and message menus. (M)essage Menu - This option displays the five message options available for all callers. They are as follows: (E)nter a message (R)ead messages (N)ote to SysOp (J)oin Conference (Q)uit Conference All of the menu choices on the message menu may also be executed from the main menu, even though some are not listed. (B)ulletins - Displays a menu of bulletins callers may view. (O)pen Door - Displays a menu of doors that may be entered. (UTIL) Host Utilities - This option allows the use of four SysOp utilities. These utilities are: page 8 --------------------------------------------------------------------------- (S)hell to DOS - This allows the SysOp to shell to dos from remote. This option may be used when in local mode, but the F2 key is probably a better choice in this case. The remote shell may be executed without using the "UTIL" option by just entering "S" from the main menu. The Host will shell to DOS using one of three methods. First, if the DOORWAY.EXE file is detected in the Telix directory, the Host will create a DOOR.SYS file and drop to DOS using this excellent redirection program. Doorway will allow the SysOp to run any program from remote that does not run in graphics mode. This includes most word-processors, databases, and spreadsheets. Doorway is share-ware, and the latest version is available on most good BBS's as DRWY222.ZIP. If you need support for running graphic programs from remote, you will have to buy a commercial program such as PC-Anywhere, Carbon Copy, or Commute. Any of these programs can be executed successfully from the Executive Host remote shell. Consult the documentation of these programs on how to run them in the carrier detect startup mode. If Doorway is not detected, then the Host will search for the file DROP.BAT. The SysOp may modify this file to use the redirection program/method of his choice (i.e. Gateway, PC-Anywhere, Commute). If this file is found, the Host will run it to perform the remote shell. Executive Host swaps completely out of Telix when executing the remote shell. This means that you will have nearly your entire system memory available to run programs from remote. Swapping completely out of Telix requires that the communications port be reset. This is done by running RESET.EXE (an Executive Host utility) in the first line of the DROP.BAT file. In addition, the BOARD.BAT file must be executed in the last line of the DROP.BAT file, in order to reload Executive Host after the remote shell. An example DROP.BAT file is listed below. This example is the default DROP.BAT file that Executive Host creates automatically when DOORWAY.EXE is detected in the Telix directory. RESET.EXE DOORWAY SYS /O:t /L: /G:ON /V:D /B:M /C:Dos C: CD \TELIX BOARD If DOORWAY.EXE and DROP.BAT are both not found, the Host will use the DOS CTTY redirection function to allow the SysOp to shell from remote. The SysOp will not be able to run most programs, but will be able to use DOS programs and commands, pkzip/pkunzip, and other programs that do not write directly to the screen. (R)ead Host Caller's Log - Allows the remote view of the host caller's log, which is a text record of everything that takes place on the host. The caller's log is also where the caller's registration information is stored. page 9 --------------------------------------------------------------------------- (D)OS Command Line - Allows the execution of dos commands without having to drop to DOS. (EDIT) Guest List - The guest list is the file that contains the list of users of the host. This command allows the SysOp to directly modify the security levels of callers, even from remote. The sub-options for this command are: (1)View Guest List - Allows the SysOp to view the current list of callers along with their current status (security), and their password. (2)Add a new guest to list - This option allows the SysOp to add a new caller's name and password to the guest list. (3)Edit User Record - This option will allow the SysOp to change any field in a users record. (4)Edit Sysop Record - This option will allow the Sysop to change any field in his own user record. (5)Edit the NEWUSER defaults - This option allows the SysOp to change any field in the NEWUSER.DAT file which contains the default values for new callers. (T)urn off Host - Shuts down the host from remote. When this option is chosen, the SysOp will be prompted to decide which environment the host should quit to (Telix or DOS). By quitting to DOS, the SysOp may return to a batch file process. (I)nfo on Host - Displays the Executive Host information screen. (C)olor On/Off - This will allow the caller to switch between ascii and color menus. (P)age - If the page is turned on, this will page the SYSOP for 20 seconds. (H)elp - Will display a menu command help file. (G)oodbye - This will log you off, and set Executive Host up for another caller. page 10 --------------------------------------------------------------------------- DESCRIPTIONS OF THE GUEST'S MENU COMMANDS: ÛßßßßßßßßßßßßßßßßßßÛ Û Executive Host Û°° ÛßßßßßßßßßßßßßßÛ ÛÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÛ°° Û Guest Menu Û°° °°°°°°°°°°°°°°°°°°° ÛÜÜÜÜÜÜÜÜÜÜÜÜÜÜÛ°° °°°°°°°°°°°°°°° ÛßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßÛ Û (D)ownload File Û°° Û (U)pload File ÛßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßÛ Û (F)ile Directories Û (M)essage Menu Û°° Û (V)iew File Û (B)ulletins Û°° Û (T)ext Search Û (O)pen Door Û°° Û (J)oin Conference Û (I)nfo on Host Û°° Û (Q)uit Conference Û (C)olor on/off Û°° Û (X)pert Mode Û (N)ote to Sysop Û°° ÛÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÛ (P)age SysOp Û°° °°°°°°°°°°°°°°°°°°°°°°°°°°Û (H)elp on Menus Û°° Û (EDIT)/VIEW User Stats Û°° ÛÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÛ°° (G)oodbye °°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°° The Guest menu is identical to the SysOp menu except for 2 items. (EDIT) replaces of the SysOp (UTIL)ities command. This command allows the caller to change his default transfer protocol and/or his password. He may also view his other statistacs. The (N)ote to SysOp command will allow a caller to leave a message to the sysop, no matter what the caller's security level. If a caller's security level 2 or below, the message is automatically marked as private E-mail. page 10a --------------------------------------------------------------------------- DESCRIPTIONS OF THE MESSAGE MENU COMMANDS: ÛßßßßßßßßßßßßßßßßßßÛ ÛßßßßßßßßßßßßßßßßÛ Û Executive Host Û°° Û Message Menu Û°° ÛÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÛ°° ÛÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÛ°° °°°°°°°°°°°°°°°°°°° °°°°°°°°°°°°°°°°° ÛßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßÛ Û Û°° Û (E)nter a Message Û°° Û (R)ead Messages Û°° Û (N)ote to SysOp Û°° Û (J)oin Conference Û°° Û (Q)uit Conference Û°° Û Û°° ÛÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÛ°° °°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°° (H)elp on Message Menu (E)nter Message - Allows callers with access level 3 or above to leave a private or public message. Public messages may be addressed to a specific person, or to "ALL". Callers with access level 2 or below may only leave private mail addressed to the SysOp. (R)ead Messages - Allows callers to read mail addressed to them, and also read all messages in the conference marked as public mail. The (N)ote to SysOp, (J)oin Conference, and (Q)uit Conference commands are identical to those found on the main guest and sysop menus. page 11 --------------------------------------------------------------------------- SYSOP'S FUNCTION KEYS (ON-LINE COMMANDS): The SysOp has eight commands on the function keys that may be executed while a caller is on-line, or while in the local logon mode. The SysOp may toggle the list of commands on the status line by using the up and down arrow keys. F1 Key - Kill User - This function will hang-up on the current caller immediately with no warning or comment. F2 Key - Dos Functions - This function will bring up the Telix Dos functions window where the SysOp may drop to dos, perform a directory, etc. F3 Key - This key will initiate chat with the current caller. F4 Key - This key will allow the SysOp to edit the user file (EXECHOST.USR) file with a text editor, while the caller waits on-line. F5 Key - This key will raise the caller's access level (temporarily) to the SysOp level (level 99). F6 Key - This key will set the caller's access level (temporarily) to the default new user access level found in the NEWUSER.DAT. F7 Key - This key will increase the caller's on-line time in 5-minute increments. F8 Key - This key will decrease the caller's on-line time in 5-minute decrements. F9 Key - This key toggles the page on/off switch. If this switch is on callers will be able to page the SysOp. If it is turned off, the caller will be instructed to leave a message. F10 Key - This key displays the SysOp's full-screen help. It does not interfere with the caller, and the caller cannot see the help message. page 12 --------------------------------------------------------------------------- HOST SECURITY LEVELS: Level 0 - Caller is "locked-out" of the Host and will have no access. Level 1 - Callers may read mail, view bulletins and info screen, page the SysOp, or leave a private message to the SysOp. Level 2 - Same as 1, but may also view filelists and perform a text search on filelists. Level 3 - Same as 2, but may also enter public messages and upload files. Level 4 - Same as 3, but has access to doors and may view files. Level 5 - Caller has full guest privileges including the ability to download files. Level 6-98 - Same access as 5. These additional security levels permits the sysop to better tailor conference access. Level 99 - SysOp status. Caller has full access to all SysOp functions. Access level 99 may be assigned via the Guest List Editor. Access level 99 will give the caller complete access to your system, and disastrous results could occur either by accident or on purpose. See appendix D for the use of the secondary security!! THE MESSAGE BASE AND HOW IT WORKS: The message base combines public messages and private E-mail into one secure message system. Each message base has its own index file for added speed and ease of use. The message base uses the message data numbers assigned to each user in the EXECHOST.USR file. The data numbers are added sequentially to the file EXECMAIL.DAT, where the user's message information is stored. Two important bits of information are stored here. The first is the number of the user's last message read. This is stored in order to give the caller an idea of where he left off from the last time he read messages. The second bit of information is the number of the last public message addressed to the user. When a caller logs on, the Host looks at the message data file, and compares the last message read with the last message sent to the user. This way the Host is able to quickly determine if the user has new mail, without having to scan the entire message base. page 13 --------------------------------------------------------------------------- This quick scan is performed for each conference in which the caller has access (if conferences have been setup), and the caller is notified of which conferences he has mail waiting. Messages written to or from the caller may be deleted by choosing (k)ill at the bottom of the message. The SysOp may delete any public message. Note: This function does not actually delete the message from the message base, but simply marks it as deleted so callers are unable to read it. PACK.EXE must be run to strip these deleted messages from the message base. It is recommended that SysOps run PACK.EXE at least once a week (or in the daily event) in order to trim down the size of the message base and speed up it's operation. Read the file PACK.DOC for more information on PACK.EXE. Example of the EXECMAIL.DAT file: ©------- Message Data Number | ©--- User's Last Message Read (public message) | | © Number of Last Message Sent to User (public message) | | | | | | (semicolons used as dividers) 0001;000040;000038 0002;000039;000012 0003;000040;000033 0004;000022;000007 0005;000035;000004 ADDING FILES TO YOUR HOST SETUP: If you are running the program as a public access BBS, or just as a semi-private host, you will be sure to want to make available certain programs for download. Of course the SysOp may download from anywhere on the system, but guest callers may download from only the upload and download directories and/or any subdirectory listed in the DOWNLOAD.LST. Therefore, in order to make programs available to all callers, they must be copied into one of these directories. Example of the DOWNLOAD.LST file << Beginning of File >> C:\GAMES\ D:\UTILS\ E:\CDROM1\ E:\CDROM2\ etc, etc.... << End of File >> page 14 --------------------------------------------------------------------------- There is no limit to the number of paths that may be used as download directories for your callers. WARNING!! Do not add your Telix directory to this list, since this would compromise your system security. If you are using filelists with descriptions, initially just copy your new files to a download directory. Then use the Host Filer to add these filenames to your filelists (Option A). After your initial set-up it is a good idea to add new programs to the filelists prior to copying them into the download directories. The easiest and most efficient way to do this is to first separate new files into categories represented by your filelists. For example, copy all of your new utility files into a temporary directory. Then use option A to add the new files to your utility filelist. This will allow you to enter a path such as "C:\TEMP\*.ZIP", instead of adding each file individually. All that is left is to copy the files into a valid download directory, delete the original files in the temp directory, and start your new category. INSTALLING DESCRIPTION FILES - Executive Host works fine using only physical (DOS) file directories, however most SysOps who want to run a serious bbs will want to use a series of filelists that will display the filenames, dates, and descriptions. Executive Host has an advanced filer built in, and filelists can be setup easily as follows. 1. Decide how many different filelists you wish to use, and enter their names and numbers in the directory data file DIR.DAT. 2. If you want to use only one big filelist, the DIR.DAT file is not necessary. Just name the filelist MAIN.DIR, and the host will use it. 3. If you use the DIR.DAT file, you must also use the file called DIRLIST. This file is the menu that will be displayed whenever a caller chooses to view the filelists, and should contain the menu of filelists with their corresponding number. An ansi color directory menu file may also be used and must be called DIRLISTG. Ansi colors are automatically added to DIRLIST if this file is not present. 4. A Recent Uploads filelist should also be created and must be called NEW.DIR. This file is where the descriptions of files uploaded by callers will be added. It is recommended that files be rotated out of the Recent Uploads directory after about a week's time, but that is up to the SysOp. 5. Once the data file has been setup and each filelist has been created, the Host Filer (F6) will recognize your setup and allow you to edit and modify these files when necessary. All files must be in the Telix directory. Example files of the DIR.DAT, DIRLIST and DIRLISTG files are included in the file EXAMPLES.ZIP. 6. Ansi colors are added to the filelists automatically, so a separate ansi file is not necessary. page 15 --------------------------------------------------------------------------- INSTALLING BULLETINS - The set-up for bulletins is similar to the setup for filelists and is done as follows: 1. If you wish to use only one bulletin file, name it BULLETIN, and the Host will display it when a caller selects the view bulletins option. An ansi bulletin may also be displayed for callers who choose color. This file must be called BULLTING. 2. If you wish to set-up multiple bulletins, you must use a data file similar to the filelist data file. Enter each bulletin's name and number in the file BULLETIN.DAT. 3. If you are using multiple bulletins, you must create/modify the file BULLLIST, which is the menu displayed to callers that shows the available bulletins, and their corresponding number The file BULLLIST.G may also be used to display a color bulletin menu. Ansi colors are automatically added if this file is not found. 4. Create each bulletin with your text editor, and put them in the host directory. Ansi is added automatically to the bulletins unless you wish to make separate ansi bulletins. You may do this by adding a "G" to the end of the bulletin file name. For example, the ansi bulletin for the file RULES, should be RULESG. Note that the bulletin name may not be longer than 7 characters long if an ansi version of the bulletin is to be used. 5. Once all of this has been completed, your bulletins, menu, and data file may be modified in the SysOp's Utilities Window (F5) at the waiting for call screen. INSTALLING DOORS - The set-up of doors is also similar to the set-up of bulletins and filelists, and is done as follows: 1. If you wish to have only one door on-line, then create a file called DOOR.BAT that will run the door. DOOR.BAT will be run whenever a caller chooses the (O)pen Door option. 2. If you wish to use multiple doors, create/modify the file DOOR.DAT with the batch file name and corresponding number of each door. 3. Also modify the door menu file DOORLIST, which is displayed to the caller when the (O)pen Door option is chosen. The file DOORLIST.G may be used to create a color door menu to callers. Ansi colors are automatically added if this file is not found. 4. Create the batch file for each door to be run. FISHING.BAT is an example of a batch file for an RBBS door. 5. Once the above has been accomplished, the door batch files, menu, and data file may be modified from the SysOp's Utilities window (F5) at the waiting for call screen. page 16 --------------------------------------------------------------------------- 6. Two files are created when a door is opened, a GAP BBS compatible DOOR.SYS file which is recognized by Gap door programs and Doorway, and the DORINFO1.DEF file, which is recognized by RBBS compatible doors, and some QBBS doors. 7. IMPORTANT!: Executive Host swaps completely out of Telix to execute door programs. For this reason, and in order to reset the computer's communications port, the RESET.EXE program must be run in each door batch file. RESET.EXE should be the first command executed in each door batch file, otherwise the some doors may become confused and. In addition, since Telix is completely swapped out when running doors, in order to reload the host system, THE BOARD.BAT FILE MUST BE RUN as the last line in ALL door batch files. An example door batch file for the Kannons and Katapults door game is listed below. RESET.EXE CD \KNK KNK C:\TELIX\DORINFO1.DEF CD \TELIX BOARD.BAT Notice that RESET.EXE is the first command in the batch file, and that BOARD.BAT is the last command. It is very important that all door batch files are setup similarly. INSTALLING CONFERENCES - The setup of conferences in Executive Host can add much power and flexibility to the host system. Setup of conferences is listed on a step-by-step basis below. There are four main steps. 1. Create the conference subdirectory with the DOS "MD" command. Conference subdirectories are where the conference messages and other data files are stored. For example, to create a subdirectory for the SYSOP conference, you would type "MD C:\TELIX\SYSOP. It is good practice to name your subdirectory the same as the conference name. 2. Add the conference setup information to the file CONF.DAT. This is where the conference name, number, and other important information are stored. The format of this file is shown below: 1;SysOp <-- number and name of conference (1) C:\TELIX\SYSOP\ <-- conference directory (2) C:\TELIX\DOWN\ <-- conference download directory (3) C:\TELIX\UP\ <-- conference upload directory (4) 06 <-- minimum access level for conference (5) Line one contains the conference number and name. Be sure to limit your conference name to less than 16 characters. The conference numbers should be kept in sequence and with NO skipping of numbers. page 17 --------------------------------------------------------------------------- Line two contains the name of the conference directory that you just created using the DOS "MD" command. Use the full path, i.e. "C:\TELIX\SYSOP\". Enter the path in the exact format as shown above. Line three contains the conference download directory. This may be the same or different from the main download directory setup in the Host configuration. Line four contains the conference upload directory. This path may also be the same or different than the main upload directory setup in the Host configuration. Line five contains the minimum access level of callers that will be admitted into the conference. Be sure to end all paths with a "\" backslash, as shown above. More conferences are added to the CONF.DAT file in the same manner, by listing this information below the last conference. 3. Next create or edit the CONFMENU and CONFMENU.G files. These are the conference menu files that will be displayed to callers when they select the (J)oin Conference option from the main menu. These files, along with the CONF.DAT file must be present in the Telix directory in order for the Host to recognize that conferences have been setup properly. 4. Special conference files and menus may now be added to the conference directory. Conference specific setups for bulletins, doors, and filelists may be created for each conference. For example, if the Host found the files DIRLIST/DIRLIST.G and DIR.DAT in a conference directory, it would use this filelist setup when callers are in this conference only. The SysOp can setup bulletins, filelists and doors in each conference, EXACTLY as was done for the Main conference. By limiting the access of callers admitted into conferences, the SysOp can thus create private conferences with their own file areas, doors, bulletins and message bases. In addition, the SysOp may design different menus for each conference, and place them in the conference directory, if so inclined. The following files may be placed in the conference directory as substitutes for the files and menus in the Telix directory: OPEN. * OPENG. * NEWS.x * The x is a number from 0 to 9 allowing the NEWSG.x * display of up to 10 different files DIR.DAT DIRLIST DIRLISTG DOOR.DAT DOORLIST DOORLIST.G BULLETIN.DAT BULLLIST BULLLIST.G page 18 --------------------------------------------------------------------------- Executive Host also supports different menus in each conference. These files, of course, are not necessary, but if you wish to have different menus in each conference, it is now possible. Of course, you must have a registered version of Executive Host to utilize custom menus. Files marked with an asterisk (*) will only be displayed if found in the conference directory. If any of the other files are not found in the conference directory, the identical files in the Telix directory will be used. In other words, the Main conference's filelists, bulletins and doors will always be used as a default if the SysOp has not setup special ones for each conference. No other files of any kind should be copied into the conference directory, as they will not be used and will only waste your hard-drive space. In particular, all filelists (dir files), bulletins, and door batch files should be kept in the Telix directory, and full paths are not necessary in the DIR.DAT, DOOR.DAT, and BULLETIN.DAT files. ADDITIONAL SYSTEM SECURITY - Executive Host now allows the SysOp to create and update a 'trashcan' file. This file should be called TRASHCAN.TXT and is a list of obscene and/or undesirable names that the SysOp wishes to check new callers' names against, when they are first registering. When a caller first logs in as a new user, his name is checked against the names in the trashcan file. If the new caller's name matches with any of the undesirable names listed in the file, the caller is disconnected immediately. This file can be used to weed out obvious undesirable callers with names such as 'Hacker', and can also be used to prevent a particular person from registering who has proved to be a problem in the past. Both single and full names can be added to this file, and should be listed, one on each line, as shown below (case is insignificant): Hacker Jerk Joe Pest BBS Terrorist CALLER REGISTRATION INFORMATION AND SCRIPTS - Executive Host now has an external script questionnaire with a list of questions to be asked of new callers. This script questionnaire file is named REGISTER.ASK, and can be modified by the SysOp to change the default questions, or add additional questions. Answers to the new user questionnaire are no longer saved to the EXECHOST.LOG file. Instead, answers to the REGISTER.ASK file are saved to a file named REGISTER.ANS. THE HOST EVENT - Executive Host will execute the EVENT.BAT file daily, at the date/time specified in the Host Configuration. An EVENT.BAT will be created as part of the installation. This will delete CALLERS.DAT and will run PACK.EXE to keep message bases manageable. The EVENT.BAT must execute BOARD.BAT as the last item. page 19 --------------------------------------------------------------------------- CALLERS.DAT contains information on how much time each caller has used on the BBS for that particular day. If you are not running your host 24 hours, and the event is not run each day, this file will still need to be deleted, otherwise all active callers will eventually run out of time, and will be unable to login to your system. The EVENT.BAT file is a perfect place to run optional utilities and perform automatic backup procedures on your system. USING THE HOST UTILITIES - By Pressing the F5 key at the waiting for caller screen, the SysOp may enter the Host Utilities area. In this area the SysOp may choose from 10 different utility functions (A-J). If conferences have been setup, the conference menu will be displayed, and the SysOp will be asked to select the conference to work out of. ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ» º º º º º Sysop's Host Utilities º º º º º º A> List Caller's Log F> Edit Door List º º º º B> Edit UserFile G> Edit Door Batch Files º º º º C> Edit Bulletin List H> Edit Door Data File º º º º D> Edit Bulletins I> Test-Run Door º º º º E> Edit Bulletin Data File J> DOS Command Line º º º º º º Choose a Utility Option? =quit -> º º º ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ (A) - List Caller's Log. This option will use the LIST.COM file browsing utility to view the Host caller's log. A copy of List.com must be located in the Telix directory. V. Buerg's more advanced list.com may be substituted in the place of the list program distributed with Executive Host. (B) - Edit UserFile. This option will use the text editor defined in Telix to edit the Host's user database. Callers' passwords and security may be manually changed using this option. Be careful to not alter the structure or order of this file, otherwise the host will report an error. (C) - Press C to bring up the bulletin menu file in your text editor. This is the file that shows callers the bulletins available for view. If this file is modified, and you are also using the file BULLLIST.G to display a color menu, you will have to make the necessary changes to it also. page 20 --------------------------------------------------------------------------- (D) - Option D will allow the editing of each bulletin that is set-up in the bulletin data file (BULLETIN.DAT). First you will be displayed the bulletin menu, from which you must select which bulletin to edit. (E) - Option E allows will bring up the bulletin data file in your text editor. This is the file that tells the host, which bulletins to read, and their respective numbers. (F) - Option F will allow the editing of the door menu file DOORLIST. This is the menu of all doors available for callers, and is displayed when a caller enters "O" for open door. (G) - Choosing option G will allow you to edit any of your batch files that execute doors. The Host will display your door menu, in order for you to select the batch file to edit, and will then bring up the batch file you choose in your text editor. (H) - Option H allow you to edit the door data file, which contains the number and name of each door available for callers to use. (I) - This option will test-run any of the doors that you have set-up in the door data file. It will display your door menu, and ask you to select a door to test-run. Once you have done this it will run the door's batch file, and allow you to test your set-up and installation of doors. (J) - DOS Command Line - This option will allow the SysOp to run a specific application without dropping to DOS. A Drop to DOS may be done by pressing the or key from the DOS command Line. USING THE HOST FILER - By pressing the F6 key at the waiting for caller screen, the SysOp may enter the Host Filer area. In this area the SysOp may choose from 10 different Filer options also (A-J). If conferences have been setup, the conference menu will be displayed, and the SysOp will be asked to select the conference to work out of. ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ» º º º Executive Host Filer º º º º A> Add New Files to Filelist F> Verify Filelist º º º º B> Auto-Describe Filelist G> º º º º C> Edit Filelist Menu H> Run Editor º º º º D> Edit Filelist I> Run List.com º º º º E> Edit Filelist Data File J> DOS Command Line º º º º Choose a Filer Option? =quit -> º º º ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ page 21 --------------------------------------------------------------------------- (A) - The "Add New Files to Filelist" option allows the SysOp to add one or more new files that he has acquired to a filelist. The SysOp will be asked for the path of the new programs first. For example "A:*.ZIP" may be entered. Then the SysOp will be asked which filelist to add the new programs to. The file adder will add these programs to the filelist and allow the manual entry of descriptions by the SysOp. Also remember to sort the filelist after the new files have been added (Option G). The new files must of course be copied into the main or uploads directory in order to be available for downloading. (B) - The "Auto-Describe Filelist" option will add descriptions to your filelist from an existing list. In other words, if you have just used option (A) to add new files to an Executive Host filelist, and you do not want to add all of the descriptions manually, you have another alternative. You can download or capture a filelist from another BBS, and use this source file to transfer the descriptions to your Host filelist. This is the purpose of option (B). The source file may be in any popular bbs format i.e. PCB, RBBS, dBBS, etc. The SysOp will be asked for the name of the filelist that needs descriptions added. Next, the name of the source file to be searched must be entered. Both files must be sorted alphabetically prior to using this option. A .bak file of the filelist is created in case something goes wrong. All files must be in the Telix (Host) directory. (C-E) - Allows the editing of filelists, the directory menu file, and the directory data file. (F) - Verify Filelist - This option will verify that all the files in a filelist really exist in either the upload or download directories. Example: 75 files processed. 0 files NOT Found. (G) - Sort Filelist - This option will sort a filelist using the program SORTIT.EXE. This program sorts filelists alphabetically, while ignoring (not sorting) any filelist information header that may be present. Filelists may not be larger than 64k in size. A custom sort program, such as V. Buerg's SORTF.COM may be implemented to sort files larger than 64k. This is done by deleting the file SORTIT.EXE and creating a batch file named SORTIT.BAT to run the program. It is a good idea to always keep filelists sorted in order to give callers an orderly display of files available for download. Also, filelists must be sorted prior to using the "Auto-Describe Filelist" option in the Host Filer. To sort a file from the dos prompt, simply type "SORTIT [name of filelist]". (H) - Run Editor - This option simply runs the editor defined in Telix without a file name. Ted.com is run by default if an editor is not defined in Telix. (I) - Run List - This option will run the LIST.COM file browsing utility if it is present in the Telix directory. (J) - DOS command Line - This option is identical to option "J" in the Host Utilities area. You may enter a DOS command to be executed, or press or to drop to DOS. page 22 --------------------------------------------------------------------------- DOWNLOADING - Downloading may take place from either upload or download directories, and all files in any of these directories are always available for download by all callers with access to the conference. The SysOp may of course enter a full path and download from anywhere on the system. Remember that the file DOWNLOAD.LST may be used to make any path on the system a valid Executive Host download directory. UPLOADING - Files uploaded by all callers will be sent to the uploads directory. In addition the UPLOAD.BAT file MUST be run. This batch file could perform various virus checking functions, and integrity checks on the uploaded file(s). The UPLOAD.BAT must move all files in the upload directory to some other subdirectory. This could be the download directory or some holding directory. The SysOp may include a full path when uploading, and the file can be sent anywhere on the system. IMPORTANT FILES TO BECOME FAMILIAR WITH - The following files are used in the day to day operation of the Host and their structure and format should be studied by the SysOp. If they should ever become corrupted or deleted, your knowledge of their structure will ensure that you will be back on-line quickly. System and Message Base Files: exechost.usr - the Host UserFile containing the name, password, and security levels of all callers. exechost.cnf - the Host configuration data file execmail.dat - the message base data file. message.txt - the message base text. message.dat - the message base pointers data file. message.ndx - the message base index file Executive Host External Menu Files: * guest.men - main menu displayed to all callers except sysop * guestg.men - ansi version of guest.men * sysop.men - main menu displayed to the sysop only * sysopg.men - ansi version of sysop.men * message.men - message system menu * messageg.men - ansi version of message.men * protocol.men - protocol selection menu * protcolg.men - ansi version of protocol.men * util.men - sysop utilities menu * utilg.men - ansi version of util.men * edit.men - sysop's edit guest list menu * editg.men - ansi version of edit.men [*] - these files are not supported in the UNREGISTERED version. page 23 --------------------------------------------------------------------------- OTHER IMPORTANT FILES: exechost.log - host usage log - contains a log of caller activities on your host bbs system. register.ask - the script file questionnaire which contains questions asked of all new callers. register.ans - the answer file containing each new caller's answers to the questions in the register.ask script file. trashcan.txt - text file containing any obscene or undesirable names you wish to check new callers' names against before granting registration. sortit.exe - program that sorts filelists. reset.exe - resets communications port before remote shell & doors. pack.exe - removes deleted mail from each message base and updates the message index file. list.com - text file browse utility. drop.bat - batch file used for remote shell to DOS. upload.bat - batch file executed whenever a caller uploads a file. event.bat - batch file run as an "event" at a certain hour each day. board.bat - runs Executive Host. logon.bat - executed immediately prior to the open/openg files being displayed to a caller (if found). logoff.bat - executed immediately after each caller logs off the host system (if found). dir.dat - data file of filelists. door.dat - data file of door batch files. bulletin.dat - data file of bulletin files available for view. callers.dat - data file recording on-line time used by callers. conf.dat - data file with conference information. bulllist - bulletin menu file displayed to callers. bullist.g - ansi version of bulllist. dirlist - directory file menu displayed to callers. dirlistg - ansi version of dirlist. doorlist - door menu file displayed to callers. doorlist.g - ansi version of doorlist. logon.x - ascii file displayed following the news files. The x is a number from 0 to 9 allowing 10 screens. logong.x - ansi version of logon.x file. open - ascii file displayed when caller first logs on. openg - ansi version of open file. news.x - news file that is displayed immediately following open/openg. newsg.x - ansi version of news file. newuser.dat - Default settings for a new user. security.dat - Additional security for conference access page 24 --------------------------------------------------------------------------- vip - file displayed to callers with VIP access level immediately after the news file. vipg - ansi version of vip file. vip.xx - file displayed to callers with access level equal to the file extension. i.e. VIP.12 for access level 12 vipg.xx - ansi version of vip.xx file. info - file displayed when caller chooses (I)nfo on Host. infog - ansi version of info file. goodbye - file displayed when caller logs off. goodbyeg - ansi version of goodbye. newuser - file displayed after a new caller registers. newuserg - ansi version of newuser file. uptest - file that is displayed immediately after an upload. uptestg - ansi version of uptest file. LIMITS - The following limits are built into all versions of Executive Host. 9,999 Registered Callers. 999 Conferences, each with its own message base. 99 Filelists per conference (9,801 total). 99 Bulletins per conference (9,801 total). 999 Doors per conference 999,999 Messages in each conference message base (98,999,901 total). Of course disk space is a limiting factor in many cases. SUPPORT - Support for Executive Host is available from: The WOODSHED BBS - (704) 847-8177 - Support is available 24 hours a day. All Registered users are given access to a High Speed (v.32bis) line upon registration. Trying Hard BBS - (404) 509-7464 - A showplace BBS showing the versatility and capability of the software. The Executive Host support conference is echoed worldwide via the RIME network. You may receive support from many of the RIME BBS's around the world. If your local RIME sysop does not carry ExecHost please ask him/her to start carrying RIME channel #330. Thank you and enjoy Executive Host. page A1 --------------------------------------------------------------------------- APPENDIX A - HIGH SPEED AND ERROR CORRECTING MODEM SETUP The US Robotics and other high speed or error correcting modems require special settings in order to work properly with Telix and Executive Host. You have two choices that will allow you to connect with all callers. But first, make sure that you have a copy of Executive Host 1.3 or above. Support for these modems was not included with earlier versions. OPTION 1: Set the Executive Host configuration "Lock Baud Rates" to "YES". Then go into Telix configuration and ensure that the two screens below are set as indicated. The most important settings for Executive Host have been marked with the "(*)" sign. These settings MUST be set as shown to have the Host perform correctly. The Baud rate shown below should be set at 4800 or 9600 for 2400cps modems, or 19200 or 38400 for high speed (9600 baud) modems, such as the USRobotics HST dual standard. Õ͵ Terminal options ÆÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸ ³ ³ ³ A - Baud 19200 Parity None Data length 8 Stop bits 1 (*) ³ ³ B - COM2 or COM1 ³ ³ ³ ³ C - Default terminal type ........... ANSI-BBS (*) ³ ³ D - Status line ..................... Bottom (*) ³ ³ E - Local echo ...................... Off ³ ³ F - Add Line Feeds after CRs ........ Off ³ ³ G - Strip high bit (incoming data) .. Off ³ ³ H - Received Backspace destructive .. On ³ ³ I - XON/XOFF software flow control .. On (*) ³ ³ J - CTS/RTS hardware flow control ... On (*) ³ ³ K - DSR/DTR hardware flow control ... Off (*) ³ ³ L - Compuserve Quick B transfers .... On ³ ³ M - Zmodem auto-downloads ........... On ³ ³ N - Answerback string (ENQ) ......... ³ ³ ³ ³ ³ ³ Change which setting? (Return or Esc to exit) ³ ÔÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ; page A2 --------------------------------------------------------------------------- Õ͵ Modem and dialing parameter setup ÆÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸ ³ ³ ³ A - Init string ......... ~~~+++~~~ATH0&C1&D2X4^M (*) ³ ³ B - Dialing prefix 1 .... ~~ATDP (NOTE: Be sure to save the above ³ ³ C - Dialing prefix 2 .... ATDP string into your NVRAM "AT&W"). ³ ³ D - Dialing prefix 3 .... ATDP ³ ³ E - Dialing suffix ...... ^M ³ ³ F - Connect string ...... CONNECT ³ ³ G - No connect strings .. NO CARRIER BUSY ³ ³ VOICE NO DIAL TONE ³ ³ H - Hang-up string ...... ~~~+++~~~ATH0^M ³ ³ I - Auto answer string .. ~~~+++~~~ATS0=1^M ³ ³ J - Dial cancel string .. ^M ³ ³ ³ ³ K - Dial time ........... 50 ³ ³ L - Redial pause ........ 10 ³ ³ M - Auto baud detect .... Off (*) ³ ³ N - Drop DTR to hangup .. On (*) ³ ³ ³ ³ ³ ³ Change which setting? (Return or Esc to exit) ³ ÔÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ; The new Telix modem configuration program (included with v3.15 of Telix), will setup your modem and Telix in a similar manner. For the greatest compatibility you should have both CTS/RTS and Xon/Xoff flow control are enabled. The Executive Host configuration option "Lock Baud Rates?" must be set to "Yes". Additional help for the setup of high speed and error correcting modems under Executive Host is available on our support BBS, 24 hours a day. page B1 --------------------------------------------------------------------------- APPENDIX B - MAIL DOORS, OFFLINE READERS, MAIL NETWORKS, AND FRONTENDS .QWK MAIL DOOR The .QWK mail format is the current standard for all popular offline readers such as MEGAREAD, ROBOMAIL, OLX, etc. Also the .QWK format is also used my many echo mail networks.. There is a .QWK mail door written especially for Executive Host. This program is not available as shareware but is available from the WOODSHED for only $25.00. UNIVERSAL TEXT INTERFACE (UTI) - Executive Host UTI conversion utilities already exist to link the Executive Host message base with many external mail programs and networks. The drivers will always be made available on the bbs systems listed below. THE WOODSHED BBS - (704) 847-8177 sysop, Steve Wood Trying Hard BBS - (404) 509-7464 - sysop, Karl Ulrich The UTI utilities allow the sysop to use the following programs in conjunction with Executive Host. 1. PCrelay Software and Postlink Software - written by Kip Compton. This software allows Executive Host systems to be linked with the Relaynet (RIMES) international mail network, and other mail networks that run under PCrelay or POSTLINK software. PCrelay and Postlink can also be used to link BBS's together (outside of a network), in order to share message bases. 2. MegaDoor Offline Mail Door - written by Kip Compton. This software can be setup as a door under Executive Host, and allows callers to download mail, read and reply offline, and upload new mail into the Executive Host system later. 3. MegaReader Offline Mail Reader - written by Kip Compton. The MegaReader program is used by callers to read and reply offline to messages downloaded from the MegaDoor. 4. Any other MegaMail compatible program or door available now or in the future. 5. In conjunction with TNET, the UTI drivers can be used to create mail packets for use with echo mail systems that use the .QWK format page B2 --------------------------------------------------------------------------- FRONTEND PROGRAMS: Additionally, Executive Host now has sufficient support to be run from a frontend mail program. Frontend Mail programs actually answer incoming calls, and then pass the necessary information on to the bbs software so that the caller can be logged in normally. Many people prefer to run BBS software from a frontend program such as FrontDoor, because of its consistent interface and also because of the many additional features available to the sysop while waiting for incoming calls. Primarily however, frontend programs were designed for linking message base systems with other bbs systems and mail networks. The same is true for linking the Executive Host message base with mail networks that require a frontend, such as the FidoNet international mail network. In order to obtain the current caller information from the frontend program, Executive Host will read a file named FRONTEND.USR. This file must contain three pieces of information, normally passed as command line parameters from frontend programs: baud rate port minutes left before next event This file can be built automatically by the batch file that calls Executive Host. The FrontDoor mail program passes the baud, port, and minutes until next event information as %1, %2, and %3 command line variables. An example of the EXEBBS.BAT file used by FrontDoor is listed below: ECHO %1 > FRONTEND.USR ; copies the baud info to the new file ECHO %2 >> FRONTEND.USR ; appends the port info to the file ECHO %3 >> FRONTEND.USR ; appends the minutes left info BOARD.BAT ; runs Executive Host Please call the Executive Host support BBS The WOODSHED for further information on setting up frontend programs. page C1 --------------------------------------------------------------------------- APPENDIX C - RINGBACK RingBack allows callers to have the host system call them back at their current location, thus essentially reversing the long- distance charges. RingBack is especially useful for a BBS running from work or a remote office, as phone bills will be charged to the office instead of your home number. Similar to CallBack, RingBack is completely configurable. The SysOp can elect to allow all callers access to RingBack (perhaps useful for a private system), set a minimum security level for access, or specify each authorized caller individually in a configuration file. INSTRUCTIONS ON HOW TO SETUP RINGBACK: 1. Press F1 from the Waiting for Call screen to enter local mode. 2. Type 'RINGBACK' from the Main menu prompt. 3. Ringback setup will start automatically since the ringback configuration file does not exist. 4. Select the mode of operation best suited to you. There are three modes of operation: Mode 1 - All callers have access to Ringback. Mode 2 - Only callers listed in configuration have access. Mode 3 - Callers with a minimum security level have access. 5. If Mode 3 is selected, you will be prompted for the minimum security level for access (1-99). 6. Once the mode is selected, the configuration is saved and Ringback is activated. page C2 --------------------------------------------------------------------------- Ringback may be executed in two different ways. The first and most convenient method is to request ringback by using the 'r' command line switch at the 'Do you want ANSI graphics' prompt. Including the new 'r' switch, there are now four valid switches to the 'Do you want ANSI graphics' prompt. They are: 'y/n' - answer to ansi question 'q' - quick access (no open or news file) 'x' - turn on expert mode immediately 'r' - turn on Ringback mode These commands may be entered in any order and case. Ringback can also be executed from the Main menu command line when logged into Executive Host. Ringback will be executed when a caller types "RINGBACK" from the main menu. Caller names can be added to the configuration file from Setup. You will be prompted for the Caller's name and default telephone number (not required). If you are not running Ringback in Mode 2, callers' names and phone numbers are added to the configuration file (RINGBACK.CNF) automatically, as they use use Ringback. Callers are not forced to use the default phone number for each subsequent ringback. The operation of Ringback is very simple, and is best learned by running Ringback in Demo mode. If you have any questions about details not covered here, please ask. page D1 --------------------------------------------------------------------------- APPENDIX D - Executive Host Files CONF.DAT 1;SysOp <-- number and name of conference (1) C:\TELIX\SYSOP\ <-- conference directory (2) C:\TELIX\DOWN\ <-- conference download directory (3) C:\TELIX\UP\ <-- conference upload directory (4) 06 <-- minimum access level for conference (5) MESSAGE.DAT MAIN/000023/000000 C001/000102/000101 | | |_________ Highest numbered private message | |_________________Highest numbered public message |_______________________Conference Number There should be a 1 for 1 match between the MESSAGE.DAT and the CONF.DAT file. It is not advisable to edit existing entries. It may be necessary to edit this file when adding a conference. EXECMAIL.DAT 0001;000040;000038 0002;000039;000012 0003;000040;000033 0004;000022;000007 0005;000035;000004 | | |_________Highest numbered message to user | |________________Highest numbered message that caller | has already read |______________________Caller (user) number When the last column is greater than the middle column, the caller receives the 'Mail Waiting' message at logon and when joining a conference. page D2 --------------------------------------------------------------------------- MESSAGE.TXT |---------------------------------Flag to determine status | P=Private ;=Normal D=Delete | |-------------------------------The double ;; means header | | |---------------------------User # for the addressee | | | |----------------------User # of the sender | | | | |-------------------Message Number ;;;0002;0006;2 To: Woody Wood From: Dave Manlief Subject: test Date: 02-17-93 Time: 4:33pm test message ----------------------------------------------------------- The colon after Subject is an echomail flag. If it is a semicolon then the messsage came in through echomail and will not be resent. MESSAGE.NDX 1;0001;0006;0 2;0002;0006;167 3;0000;0006;331 4;0001;0006;499 5;0001;0005;679 | | | |____The 'index key' into the message.txt file | | | This file is rebuilt by PACK.EXE | | |________The Senders user number | |_____________The receivers user number |________________Message Number from Message.TXT file NEWUSER.DAT This file contains the defaults for a new caller. See the file for the actual record description. EXEHOST.USR This file contains the a record for each of your callers. See the description of the NEWUSER.DAT for a description of each field. This file can give many wierd errors if the format is incorrect. The most common problem is with record length. Every record must have 126 characters, followed by a carriage return and a line feed. Some text editors do not place a carriage return/line feed on the last record. So if you edit this file with your favorite editor BEWARE!!. page D3 --------------------------------------------------------------------------- EVENT.DAT 03-01-93;05:30:00 | |______Time of when the next event will take place |______________Date of when the next event will take place SECURITY.DAT 01 ;003;008;010;011;012;123;153 02 ;001;002;003;004;005;006 03-;152;153 04-;050;051;052;053;054 05+;120;121;122;123;124 06+;150 | | |__________________This is a list of conferences (MAX of 31). | | Each conference must be 3 digits in length | | preceeded by a semicolon (;). | |_____________________This is the 'action' code. If the action | code is a space then the conferences listed | here are the only valid conferences for | this caller. | If the action code is a + the caller has | all of his present access plus he has | access to any conference listed in this | record. This will override his the | security set in the CONF.DAT | If the action code is a - the caller will | not have access to these conferences. This | overrides the CONF.DAT security. |_______________________The secondary security code. This field will match the secondary security code from the user record before this file is in effect. 2 spaces are not valid. Any other 2 character combo is valid. EXECHOST.CNF C:\WOODSHED\TELIX\DOWN\ <== Path for your Download Dir C:\WOODSHED\TELIX\UP\ <== Path for your Upload Dir Modem <== Are you Modem or Direct Connect public <== Is BBS public or private off <== Is sysop 'page' on or off 80 <== Access level for VIP message Color <== Is your monitor color or mono 04 <== Access level to deny UL/DL Y <== Is screen blanker active Yes <== Is your COM port locked The WOODSHED <== BBS Name Ring <== Are you using Ring detect or Auto answer No <== Password protect return from door No <== Are you running a 'front door' 1 <== Number of rings to answer C:\WOODSHED\TELIX\MAIN\ <== Location of your MAIN mesg base 1 <== Node number