5 ============================================================================== PCBSetup Command Line Parameters Exiting And Checking Your Configuration The PCBOARD.DAT File Specifying File & Paths SysOp Information File Locations Modem Information Node Configuration Event Setup Subscription Configuration Options Security Levels PCBSetup is a utility designed to configure the operation of PCBoard. With PCBSetup you can define new conferences, add more file directories, and even change configuration options which determines how your system operates. There are three ways to access PCBSetup: From the call waiting screen, select PCBSetup. While logged in locally (not with the /LOCALON switch for PCBoard), you can press ALT-S and select PCBoard Configuration (PCBSETUP). From the DOS prompt you can load PCBSETUP.EXE. If a PCBOARD.DAT file cannot be found in the current directory and you have not used the /FILE command line parameter, you will receive an error message stating that PCBOARD.DAT could not be found. If you need to specify a different location for your PCBOARD.DAT file, use PCBSETUP /FILE:[location of PCBOARD.DAT]. For example, to load PCBSetup and tell it to use the data file located in C:\TEMP\, you would type: PCBSETUP /FILE:C:\TEMP\PCBOARD.DAT Once PCBSetup is running, you will see the Main Menu (shown on the previous page). The various functions of PCBSetup are available from these menu options. To select a particular option you can press the letter at the beginning of the line, or you may move the currently highlighted option using the cursor keys and press R. If you make a mistake, press E to return to the previous menu. To get help with a particular screen or option, press F1 to access the online help. Command Line Parameters PCBSetup has two command line parameters that you can use when executing PCBFiler to determine how it should behave. To use a command line switch you must execute PCBSetup from the DOS command prompt and you need to specify the command line parameter after you enter PCBSETUP at the command prompt as shown in the following example: PCBSETUP /CNAMES If you need to enter more than one command line parameter, separate each parameter with a space. PCBSETUP /FILE:H:\TEMP\PCBOARD.DAT /CNAMES /CNAMES Previous versions of PCBoard wrote conference information to a text file called CNAMES while the current version of PCBoard writes this information to CNAMES.@@@ and CNAMES.ADD. These two files are binary data and consequently are not as easy to edit manually as the older CNAMES file. When this command line switch is used, PCBSetup will reread the CNAMES file instead of using the information stored in CNAMES.@@@ and CNAMES.ADD. There are advantages and disadvantages to using this switch. First, the advantages: Files that are in text file format are easier to edit with a wide range of editors. If you are adding a lot of conferences, you can easily pattern the new conferences after an existing conferences by cutting and pasting text. The following are the disadvantages to using this switch: The CNAMES is not updated by PCBSetup unless you do a full save when exiting. If a quick save is used, the CNAMES file will not be updated. If you are not careful, you could use a CNAMES file that is not up-to-date and consequently alter your system configuration in an undesirable manner. The CNAMES file does not contain all of the information that the combination of CNAMES.@@@ and CNAMES.ADD does. In fact, nearly all of the fields listed in the second conference setup screen are not stored in the CNAMES file. This means that if you have PCBSetup re-read the CNAMES file, the default values will be used for all fields that are not written to the CNAMES file. This command line switch is not designed for use by novice SysOps. If you do not have a good knowledge of text file editing, you can really foul up your system configuration by using this switch. If you use this command line switch, begin by making backups of your CNAMES.@@@ and CNAMES.ADD files. Next, load PCBSetup without the /CNAMES switch and then immediately exit answering Y when asked if you want to save configuration files. This will insure that the CNAMES file is up-to-date. Once you have done these steps, you may proceed to make the changes you need to make to the CNAMES file. /FILE:[filename] Normally, PCBSetup requires that a PCBOARD.DAT file exists in the subdirectory where you load it. If you want to use a PCBOARD.DAT in a location other than the current subdirectory, use this command line switch. To use the /FILE parameter, you need to specify the location of the PCBOARD.DAT after you enter /FILE:. For example, if you want to use a PCBOARD.DAT that is stored in C:\PCB\NODE1\, enter the following to have PCBSetup use that DAT file: PCBSETUP /FILE:C:\PCB\NODE1\PCBOARD.DAT Exiting And Checking Your Configuration To exit PCBSetup you need to press E at the Main Menu. When you do, you will be asked if you wish to save your configuration. The following describes each option available to you: N Do not save any changes you have made to your PCBOARD.DAT file and exit. Any changes you have made to the fields in your conference configuration are automatically saved whenever you exit the conference screen. Q Save all changes to your configuration without checking the validity of the paths and drives in your configuration. This will probably be the selection you will use most, because it is quicker then checking your entire configuration each time you exit PCBSetup. Y Saves all changes to your configuration and checks all paths and drives to make sure they exist. In addition, your CNAMES file will be updated for those utilities that use CNAMES instead of CNAMES.@@@ and CNAMES.ADD for conference information. If you have any conferences that do not have message bases, the message bases will be initialized for you. The following section describes in more detail what will occur when you select either Y (full save) or Q (quick save) when asked if you wish to save your changes. Full Save PCBoard divides the checking of your system into four sections. At any section you can press E to skip over any of the following sections: Checking Directories While Saving Files At this junction, PCBoard is going to check the drives and paths in your configuration to make sure they are all valid. All filenames and paths listed in all setup screens will be checked to make sure they exist (including conference information) If a path does not exist, you will be shown the path that does not exist, and then asked if you wish to create it. If a drive does not exist, you will be shown which invalid drive you had in your configuration. If the invalid path is in one of your conferences, you will be told what conference and what question has the invalid path. With this in mind, you can quickly and easily fix your configuration to point to a proper path if you need to. Checking BLT.LST file(s) When you see this on your screen, PCBSetup is checking the bulletins defined in each conference's BLT.LST file. Only the paths to each bulletin are checked for validity. If the actual bulletin does not exist, nothing is printed to the screen by PCBSetup. To help speed things up, PCBSetup is smart enough to know when it has checked a BLT.LST before and will skip it. This will save you an immense amount of time especially if you have numerous conferences using the same BLT.LST file. Checking DIR.LST file(s) When you see this on your screen, PCBSetup is checking the file directories defined in each conference's DIR.LST file. Only the paths to each DIR (description) file and attached subdirectory are checked for validity. If the DIR file does not exist, nothing is printed to the screen by PCBSetup. To help speed things up, PCBSetup is smart enough to know when it has checked a DIR.LST before and will skip it. This will save you an immense amount of time especially if you have numerous conferences using the same DIR.LST file. Checking SCRIPT.LST file(s) When you see this on your screen, PCBSetup is checking the scripts defined in each conference's SCRIPT.LST file. Only the paths to each script are checked for validity. If the actual script file does not exist, nothing is printed to the screen by PCBSetup. To help speed things up, PCBSetup is smart enough to know when it has checked a SCRIPT.LST before and will skip it. This will save you an immense amount of time especially if you have numerous conferences using the same SCRIPT.LST file. Checking DLPATH.LST file(s) When you see this on your screen, PCBSetup is checking each path listed to insure that they are valid paths on your system. If you have specified an index file in your DLPATH.LST file, it will only check to insure that the path that points to your index file is valid. To help speed things up, PCBSetup is smart enough to know when it has checked a DLPATH.LST before and will skip it. This will save you an immense amount of time especially if you have numerous conferences using the same DLPATH.LST file. Quick Save A quick save is by far the quickest way to save your configuration. When you choose to save your configuration in quick mode, your configuration is not checked to make sure that all paths are valid. Instead, it simply copies the values that were in memory at the time you exited the program and writes them out to memory. The PCBOARD.DAT File The PCBOARD.DAT file is the main configuration file for PCBoard. In fact, all fields in menu options A-H from the Main Menu are stored inside of this file. If you are running multiple nodes, you probably have a PCBOARD.DAT file for each node. If each node has a separate configuration file, you may change the way the node operates dramatically. For example, you could change one node to point to a different PWRD file. This would allow you to limit access to this node without effecting the other nodes on your system. The disadvantage of having separate PCBOARD.DAT files for each node is quite evident when you have a lot of nodes. If you have 20 nodes operating and each has a separate configuration file, you could spend a lot of time updating all 20 nodes to change the location of a file. You are not forced to use a PCBOARD.DAT for each node. With the ability for PCBOARD.EXE and all of the supporting utilities (PCBFiler, PCBSetup, etc.) to utilize the /FILE command line parameter, you can share data files between nodes. If you choose to share data files between nodes, remember that node specific information such as node number, serial port to use, and other items are all stored in the PCBOARD.DAT file. Therefore, you may want to take advantage of the command line and environment parameters of PCBOARD.EXE to over-ride information that is stored in the configuration file. Specifying File & Paths Throughout PCBSetup, you will be specifying where PCBoard should find filenames and what paths should be used to store files. Because of this, you should have a good knowledge of subdirectories and how they are used by DOS. If you do not, you will most likely have a hard time configuring your PCBoard system to operate the way that you want it to operate. There are two ways that you can specify a path or filename -- absolute and relative. The following sections describe the difference between absolute and relative naming. Absolute Naming Conventions You are probably most familiar with this method of specifying a filename. For example, if you tell someone to view C:\AUTOEXEC.BAT, you have given them an absolute filename. In other words, you told them the drive, the subdirectory (in this case the root directory), and the filename. If they view that file they are guaranteed to view one and only one file because you told them exactly where the file is. To relate this to your PCBoard configuration, you would want to specify absolute filenames when configuring the locations of files that should be shared by all nodes (e.g., user file). That way, you can be assured that the proper filename will be accessed by all nodes. Relative Naming Conventions Specifying a filename in a relative fashion is, for some, a more difficult concept to understand. Relative addressing will take into account the current drive and directory rather than having that information provided via absolute addressing. For example, if you know the file is in the current directory then you could simply reference the filename. You would not need to specify the drive, path, and filename as it would be a waste of time. Another example would be if you wanted to see a directory of all files in your C:\PCB\GEN\ subdirectory while you are sitting at the C:\PCB> DOS prompt. You could type DIR C:\PCB\GEN but it would be even faster to type DIR GEN The reason that you can get away with this is because you are already in the C:\PCB\ subdirectory. Why type it in again? Remember that relative addressing takes the current directory into account and adds the relative information to the end of the filename. When you typed DIR GEN you forced DOS to look for a GEN subdirectory underneath the current subdirectory. If you were to change to your DOS subdirectory and then type DIR GEN you would receive an error message that no files were found because you do not have a C:\DOS\GEN subdirectory, but you do have a C:\PCB\GEN subdirectory. At this point, you have to be asking yourself what good will this relative filename information do for my PCBoard configuration? The answer to that question is "quite a bit" if you are running multiple nodes. Most likely all of your nodes will point to the same CNAMES file. Inside of the CNAMES file more filenames are specified that relate to each conference on your system. For example, the location of the NEWS file for each conference is located in the CNAMES file. If you wanted every node to have an individual NEWS file then you could change the location of the file to point to NEWS instead of something like C:\PCB\GEN\NEWS Because no path or drive information is specified, PCBoard is going to look in the default directory for a file called NEWS. If that file is found, it will be displayed. What really makes all of this work is the fact that no two nodes will use the same default subdirectory. Therefore, you can have node specific NEWS files by using relative addressing. SysOp Information This menu option will allow you to define information about the sysop. You can specify if you wish to let users see your real name among other settings. If you are looking to control the security level of SysOp related functions then you should select the Security Levels option from the Main Menu instead. The following describes each field on the Sysop Information screen: Sysop's Name (when NOT using Real Name) In this field, enter the first name of the SysOp. Enter a name in this field only if you do not wish to use your real name as defined in record #1 of the users file. This field is used in some of the following areas: When entering chat mode with a user. The user will receive a message that says "Hello, this is..." When using F5 to shell to DOS the user is informed who has dropped to DOS. When you are logged in, this will be used for your first name or any time the @FIRST@ macro is used. NOTE: This field is not recognized if you have answered Y to the Use Real Name (Yes=Use name found in USERS file) option. Local Password (used at the Call Waiting screen) The local password gives you the ability to password protect the following buttons on the call-waiting screen. Sysop - Busy Sysop - Not Busy PCBSysMgr PCBFiler PCBSetup and optionally (if you have answered Y to Require Local Password to Exit PCBoard) DOS - Busy DOS - Not Busy If you leave the local password field blank, no password will be asked. If you do enter a password, enter the proper password to access the restricted buttons on the call waiting screen. Entering an invalid password will recycle the modem and return you to the call waiting screen. Require Local Password to Exit PCBoard If you want to protect people from dropping to DOS from the call-waiting screen you can enable this option. One thing you need to keep in mind that is that if someone has access to the keyboard they also have access to reboot the computer and optionally abort the AUTOEXEC.BAT to access DOS. Enabling this option is not a fool-proof way to protect others from accessing DOS on the machine, but it will make it more difficult and maybe discourage an unauthorized person from accessing DOS. N Do not ask for the local password when attempting to exit to DOS. Y Ask for the local password when exiting PCBoard. Use Real Name (Yes=Use name found in USERS file) This option gives you the ability to determine how PCBoard refers to the SysOp defined in record number 1 of the user file. The user defined in this count can use their real name or the name SYSOP depending on how this question is asked. Valid options for this field are: N Any messages that you leave will be shown as having been left by SYSOP regardless of the name in record #1 of the user file. In addition, the Sysop Name field on this screen will now become active. Disabling this function has an additional benefit. A user cannot login to the system using the name SYSOP. Hence, the user name in record #1 must be known to access that particular account. If you decide not to use the name located in the user file, your users will not know the name of that account. Not only would a user that is attempting to hack your account have to get your password right, they would also have to guess your name as well. Y The user name that is found in record #1 of the user file will be used for the operation of the bulletin board. When you leave a message, the user name in record #1 will be stored in the FROM: field, etc. Use Graphics When Logged On Locally When you access the bulletin board by using the Sysop - Busy or Sysop - Not Busy buttons on the call-waiting screen then PCBoard will skip the question that asks which type of graphics you wish to use, your name, password, etc. This option will let you choose if you wish to default to color graphics mode when logging in using the previously mentioned buttons on the call-waiting screen. Valid options are: N Do not use graphics mode when logging in as the SysOp. You may want to choose this setting if you are using a monochrome monitor on your system. Y Assume graphics mode when logging in as the SysOp. File Locations When you select this menu option, you will be presented with an additional menu that separates the file locations into categories. Select the category of file locations that you wish to modify. System Files & Directories From this screen, you can edit the file locations of the most commonly accessed files (often referred to as system files). In each of these fields on this screen, enter the file and/or location where a particular configuration file will be found. Each field and how it relates to your system configuration is explained in the following sections: Name/Loc of Conference Data PCBoard stores the conference information (including the Main Board) in what is referred to as the conference data file. Any fields in the conference configuration screens (Main Board Configuration and Conference Configuration is considered to be conference data. The default filename is CNAMES, but a CNAMES.@@@ and CNAMES.ADD file are also created in the same location as the CNAMES file. The CNAMES file is a simple text file that contains most, but not all, of the conference configuration information. This file is used by a lot of third-party programs who wish to access configuration information about a particular conference. The CNAMES file is only updated when you exit PCBSetup and answer Y to the Save configuration files question. CNAMES.@@@ and CNAMES.ADD are the primary files that are used to store conference information. These files are random access to increase the speed that information can be looked up for conference information. These two files are updated automatically by PCBSetup. Location for multiple nodes If you are running all of your nodes from a single machine using a multitasker, then you may store this file in any location, but you should make sure that all nodes point to the same location. On a network, you will want to store the CNAMES file on a server so that all nodes may access it. It is perfectly valid for each node to point to its own CNAMES file, but if you use this type of configuration you will have to update each and every node's CNAMES file whenever you make a change the configuration for a conference. Name/Loc of User File The user file stores the majority of information about each caller on your system. For example, the actual user name, password, and city data is just a small sample of the data that is stored in the user file. Location for multiple nodes If you are running all of your nodes from a single machine using a multitasker, then you may store this file in any location, but you need to make sure that all nodes point to the same location. On a network, you will want to store the user file on a server so that all nodes may access it. Make sure that all nodes access the same user file. Name/Loc of User Info File The user info file contains additional information about each user. This is the file where any TPA or PSA information will be stored about each caller. Basically, you can look at this file as an extension of the user file. Location for multiple nodes Since this file is an extension of the user file, you should treat it in the same manner. This means that it should be stored in a single shared location where all nodes can access it. Name/Loc of Caller Log The caller logs record information about each session on your system. From viewing the caller logs you can determine when a particular user successfully logged in, the major functions that they performed while online (entering messages, transferring files, joining a conference, etc.) If you are running more than one node, the node number will be added to the end of the filename you specify for the caller log. Therefore, if you were running three nodes and you specified C:\PCB\MAIN\CALLER for all nodes then you would find a CALLER1, CALLER2, and CALLER3 file in that subdirectory: If you are running the /100 node version or higher, you should change the name of your caller logs to something like CLR instead of the default (CALLER). The reason you should do this is because CALLER100 would not be a valid DOS filename. The following is a sample log entry (when viewing online): ************************************************************** 09-06-93 (12:47) (3) RAY COOK Off Normally Minutes Used: 15 Back from DOS at 12:47 Opened Door (MAIL) at 12:46 Batch Dnld: 1 Bytes: 76526 Avg. CPS: 1877 (D) SHOWFR11.ZIP Completed using Z (B) T/E=1 CPS=1877 Chatter (6) Conference Joined Support (1) Conference Joined Caller Security: 30 Caller Number: 1,061,432 => CONNECT 14400/ARQ/V32/LAPM/V42BIS 09-06-93 (12:32) (3) RAY COOK (14400E) (G) JACKSON, TN ************************************************************** Location for multiple nodes When running multiple nodes, you should store your caller log files in a common location for all nodes to access. If you are multitasking multiple nodes on a single machine, this means that you specify the same location for all nodes. For a multiple node installation on a network, all caller logs should be stored in one common location on the server with each node pointing to the same location. If all nodes do not write their caller logs to the same location, SysOp command 13 will not function properly because it will not be able to access all files. Name/Loc of Group CHAT File When callers use the CHAT command to communicate with one another, PCBoard uses the Group CHAT file to handle the communications between the various nodes and chat channels. This file will be a fixed size with the actual file size being determined by the total number of nodes your package supports. For example, the group CHAT file for a 250 node version of PCBoard would be larger than the group CHAT file for a 10 node version. Location for multiple nodes Like the user file, your group CHAT file must be stored in the same physical location on disk for group chat to function properly. Location of Group CHAT .CAP files If you have enabled the option in PCBSetup | Configuration Options | Configuration Switches which deals with capturing the group chat session to disk, this field will specify where the capture files will be. The contents of the capture files include date and time stamps, the node number of the caller, the caller's name, and the text of the complete line of information typed. Each channel has its own filename. The filename will be created in the subdirectory that you have specified to store the group chat .CAP files. The actual filename is [node#].CAP. For example, you may have a 1.CAP, 2.CAP, etc. Also, any information such as when a caller joins the channel, leaves the channel, makes it private, etc., will also be captured. Location for multiple nodes It is not required that you specify the same location for the .CAP files on all of your nodes. However, it would be desireable to do so in case you want to use a text search utility or something similar. You could then easily find all of the .CAP files in one single location. Name/Loc of Statistics File This file is used to record the statistics that are shown on the call waiting screen such as the number of calls to the system, the number of uploads and downloads, the number of messages left, and the most recent caller information. Location for multiple nodes Because the call-waiting screen allows you to switch between local and system statistics, you will want to specify the same location for your Statistics file. Otherwise, your system statistics will not be accurate. Name/Loc of USERNET.XXX File You can think of the USERNET.XXX file as the messenger between nodes. If you are running a single node system, then you do not need to worry about this file as it is not accessed. This file is used for some of the following features in PCBoard: Request node chats with other users Send node broadcasts with the BR command from within PCBoard. Protect users from logging in multiple times Display information about who is online and what they are doing. Drop nodes to DOS or logoff users from another node. Location for multiple nodes It is essential that all nodes point to the same physical file for your USERNET.XXX file. If they do not, you will see a situation where a particular node will be isolated from the rest of the nodes (they will not be able to see a list of other users that are online, etc.) Name/Loc of Transfer Summary File This file is created by PCBoard detailing the files that have been downloaded or uploaded on your system. If the callers to your system transfer a lot of information you may find that you have to periodically delete this file to reduce the amount of disk space that it uses. The information about each file transfer is stored on a single line in the transfer summary file. Each item on the line is separated by a comma and contains the following information: Whether the transfer was an upload (U) or a download (D) The name of the user who transferred the file The date that the file was transferred The time that the file was transferred The filename that was transferred File transfer protocol letter that was used The number of transfer errors that occurred Finally, the last item is the transfer rate in characters per seconds (cps) NOTE: You may choose to not keep a record of file transfers that occur by leaving this field blank. Location for multiple nodes This is another one of those files that it is not essential to have all nodes point to the same file, but it is desirable. If you need to keep the file transfers for a particular node seperate from the entire system then go ahead and have that node point to a different location. Name/Loc of Swap File When PCBoard is configured to swap itself out of memory during a shell (PCBSetup | Configuration Options | System Control), it will normally be swapped out to memory (EMS or XMS). If there is insufficient free memory to hold the PCBoard memory image, it will instead be written out to disk. In case the memory image has to be swapped to disk, you need to enter the filename where you want the file to be stored. The default is to store it in a filename called PCBSWAP.$$$ in the current directory. Location for multiple nodes Because the PCBSWAP.$$$ contains a memory image, it is critical that no two nodes share the same PCBSWAP.$$$ file. Location of PCBTEXT Files Virtually all of the text and prompts that PCBoard displays are contained in a PCBTEXT file. Each language on your system will have a different PCBTEXT file that you can customize to suit your own needs with MKPCBTXT.EXE. In this field, enter the drive and subdirectory where your PCBTEXT files will be stored. If you are not using more than one language on your system, you will have only one PCBTEXT file. Location for multiple nodes For the sake of speed you could have each node point to local copies of your PCBTEXT files. You may find, however, that pointing all nodes to one location and pre-loading your PCBTEXT files (PCBSetup | Configuration Options | Configuration Switches) will increase performance. This gives you the speed advantage and also the advantage of editing one set of PCBTEXT files when you need to make a change. Locations of User Index Files The user index files are used to quickly access the name of users on the system and to point to their actual user record number. These files are essential to the operation of your system. In this field, enter the drive and subdirectory where you wish to store your user index files. PCBoard will maintain an index for each letter of the alphabet (PCBNDX.A through PCBNDX.Z). Location for multiple nodes As with the user file, all nodes should point to the same physical location for storing the user index files. If you are running a network, make sure that all nodes point to the same location on the server (since drive letters may vary from workstation to workstation). Location of Temporary Work Files While users are logged into the system, it is quite likely that PCBoard will need to create some temporary files along the way. Each node has a temporary work directory where these files will be placed. This short list shows just a few things that are stored in the temporary directory: QWK mail packets (compressing and uncompressing) Message capture files Temporary storage (upload description until posted, etc.) In this field, enter the drive and subdirectory where you want the temporary files to be stored for this particular node. An ideal location for temporary files is on a RAM drive. Location for multiple nodes Each node in your multinode setup must specify a unique location for their temporary work directory. The directory that you specify must not be the current or default directory. Usually the best solution is to add a TEMP directory underneath the current directory. Therefore, if you are running PCBOARD.EXE from C:\PCB\NODE1 then your temp files may be stored in C:\PCB\NODE1\TEMP. Location of Help Files There are numerous help files for PCBoard. These help files detail information about commands or areas of the system that have need a more thorough explanation. The format for PCBoard to look for a help file is HLP[option] where option is the command or topic that is being discussed. You can also create help files for your doors or other new commands that you add via CMD.LST (PCBSetup | File Locations | Configuration Files). To accomplish this, create a text file in the directory that you specify for help files that has the same name as the command or door. For example, if you have a door called MAIL and you wish to create a help file, you would create a text file called MAIL in the location you specify for your help files. Then when your users ask for help with H command they can type MAIL and have the text file that you created displayed to them. Location for multiple nodes If you do not plan to update your help files frequently it may be a good idea to have local copies for each node if you are running on a network. That way you can reduce un-necessary traffic. If you are running all of your nodes on a single computer it does not matter where you store your help files as long as all nodes point to a valid copy. If you can see that you will be updating your help files frequently then you should store your help files in a single shared location to reduce the amount of maintenance on your system. Location of Login Security Files When a user logs into the system, PCBoard has the capability of displaying security specific files. These files are displayed to the user just after they complete their login but before the conference news file is displayed. The filenames for the login security files are simply the security level of the caller. For example, if you want to create a file that only security level 20 would see, then you create a file named 20 in the location that you specify for the login security files. Because these files are normal display files you can also make them graphics or language specific if you wish. Location for multiple nodes Because these files are only accessed once per login, it might be best to store these in a single location where all of your nodes can access the files. This will help reduce the amount of maintenance you will have to do on your system. Configuration Files Name/Loc of PWRD/Security File The PWRD file defines the security levels that you will use on your system. For each security level you can specify the following information: Daily/session time limit Daily kilobyte limit Batch file limit File and byte ratios Maximum total file and byte limit Initial file and byte credits Time limit for session or entire day Allow alias usage Allow multiple logins To edit your PWRD file, press F2 while you have the Name/Loc of PWRD/Security File field highlighted. When you do, you will see the following screen: There are several keyboard commands that are active when you are editing your PWRD file. These keyboard commands allow you to delete entries, insert entries, etc. The following are valid: ESC Exit the PWRD editor. If you have made any changes to the PWRD file, you will be asked if you wish to save the changes that have been made. Afterwards, you will be returned back to the Configuration Files menu. F1 Access on-line help. On-line help will be displayed that relates to the PWRD file and the various fields that you can edit. F2 Rotate screen views. There are 16 fields that you can edit in the PWRD file. Not all 16 can be placed on one screen. To access the other fields, you need to press F2 to rotate to the next set of fields. ALT-R Repeat currently highlighted line. If you are creating entries for security levels that are very similar in definition, you can use this keyboard command to duplicate the currently highlighted entry. The new entry will be inserted just below the current line. ALT-I Insert a new security level. If you need to add a new security level between two existing security levels then you would using this keyboard command. A new blank entry will be inserted just below the current line that you can edit to suit your needs. ALT-D Delete current security level. This keyboard command will delete the currently highlighted security level. There is no undo function to get the original line back so if you make a mistake, exit without saving and attempt to make the changes again. There are several fields inside this file. These fields allow you to control time limits, byte limits, and more. The following describes each column in the PWRD file in detail: Password In order for a user to be assigned the values for a line not only does their security level have to match, but also their login password must match the one that you enter in the Password field. If this field is blank, then the password of the user is not checked. Do not get confused and assume that if a user enters a password that is in this field that they will be assigned the security level and options that you have defined. This field does not work that way. Sec This field determines the security level that you are defining. When a user logs into the system, PCBoard will lookup the security level of the user in the PWRD file. You need to have one entry for each security level that you have given to a user. In other words, if you have assigned security levels 5, 10, 20, 30, 110, and 120 to actual user records then you must have a corresponding entry in the PWRD file. If you do not, PCBoard will print No security level match in PWRD file and default their time to 10 minutes and 0 bytes when they login. Time The amount of time, in minutes, you wish to give a user per day or per session. If you have answered Y to the Enforce Time Limit field, the time limit you enter will be for each day. If you answered N to that question, the time limit will be renewed each time the user calls. If you enter a time limit of 0, it will cause PCBoard to think that the user has accessed a Closed node or system. A lot of systems have public and private nodes. To make a node private, you would need to create a second PWRD file that had a time limit of 0 for each of the security levels that you wish to lock out. Daily Bytes The number of kilobytes (K) that you want each security level to have available per day. If you enter 0 for the number of bytes available then it effectively disables downloads unless they are defined as FREE or NOTIME downloads by the FSEC file To give a security level unlimited download bytes you can enter 32767. A user who has unlimited download bytes can download files until they run out of time. Base Baud This field allows you to adjust the maximum daily download "K-Byte" limit based on the speed of the caller. For example, you may want to allow 2400 bps callers to download 400k per day. You could set the kilobytes per day to 400k per day. However, to your high speed callers who may have the same security level, 400k may not seem to be enough. By setting the base baud rate to 2400 and the kilobytes per day to 400 you will be giving your 9600 bps callers 1600k. They get four times the amount of bytes because they are calling in at a speed which is four times greater than 2400. As a general rule, you will want to enter the base baud rate as the lowest bps rate that callers will be calling in. In the previous example the base baud rate was set for 400k if a 2400 bps caller and at 1600k if the user was a 9600 bps. This is more desirable than defining it at 1600k for 9600 bps and letting PCBoard size it down. Batch Limit This field defines the number of files that a user can transfer in a batch transfer. For example, if you want a user to download a maximum of 5 files in each batch, enter 5 in this field. You may enter any number from 0 to 99 in this field. If you enter 0, the maximum batch is set to a default of 30 files. You can disable batch transfers for all users on your system with the Disallow BATCH Uploads switch in PCBSetup | Configuration Switches | File Transfers. File Ratio If you want to control the number of files that a user can download based on how many files they have uploaded to the system, you want to enforce a file ratio. In this field, enter the number of downloads that you want the user to be able to download for each file that they upload. For example, if you enter 4.0 in this field, a user must upload 1 file for every 4 files they download. Entering a value of 0.0 will disable the file ratio. Byte Ratio If you want to control the number of bytes that a user can download based on how many files they have uploaded to the system, you want to enforce a byte ratio. In this field, enter the number of bytes you want to allow the user to download before they must upload another byte. In other words, if you want your users to be able to download 20 bytes for every byte they upload, enter a value of 20.0 in this field. Entering a value of 0.0 will disable the file ratio. File Limit If you wish to control the total number of files that a user of the security level you are defining can download, you want to impose a file limit. In this field, enter the maximum number of files that a user can download from your system. Once this limit has been reached, the caller cannot download any more files. This type of limit would be ideal if you are using a "pay-as-you-go" type system where you allow a user to download a certain amount of files for some sort of compensation. When the file limit has been reached, you can reset the total files downloaded field in System Manager (while editing a user record) once more compensation has been received. As with the other limits that you can define in the PWRD file, entering a File Limit of 0 will disable the limit checking. NOTE: Any file that is specified as a FREE or NOTIME download in the FSEC file will not be counted as a file downloaded by a user. KByte Limit If you wish to control the total number of bytes that a user of the security level you are defining can download, you will be enforcing a byte limit. In this field, enter the maximum number of bytes a user can download from your system. Once this limit has been reached, the caller cannot download any more bytes. This type of limit would be ideal if you are using a "pay-as-you-go" type system where you allow a user to download a certain amount of bytes in exchange for some sort of compensation. When the byte limit has been reached, you can reset the total bytes downloaded field in System Manager (while editing a user record) once more compensation has been received. As with the other limits you can define in the PWRD file, entering a kilobyte limit of 0 will disable the limit checking. NOTE: Any file that is specified as a FREE or NOTIME download in the FSEC file will not be counted as bytes downloaded by a user. The rest of the fields that you can define in the PWRD file must be accessed by pressing F2 to rotate the screen view. Once you have pressed F2, you will see the following additional fields: File Credit This field gives you the ability to implement a grace period if you are enforcing a file ratio. The value that you enter in this field will be seen as an upload credit as if the user had really uploaded this many files. Sometimes it takes users a while to become familiar with a ratio system. In a situation such as this, you may want to give your users an initial upload file credit. For instance, if the File Credit is set at 10 then the caller may download 10 files before reaching a 1:1 ratio. A total of 20 files can be downloaded before a 2:1 ratio would prevent the downloading of a 21st file. K-Byte Cred. This field gives you the ability to implement a grace period if you are enforcing a byte ratio. The value that you enter in this field will be seen as an upload credit as if the user had really uploaded this many bytes. Sometimes it takes users a while to become familiar with a ratio system. In a situation such as this, you may want to give your users an initial upload byte credit. For instance, with a byte ratio of 10.0 a brand new caller would be able to download, at most, a single 10-byte file. To make it more fair, you could give the user an initial credit of 20 kilobytes. Then the caller would be able to download as much as 200 kilobytes before they would exceed their ratio. Enforce Time With this setting you can choose if the time limit that you defined is a daily time limit or a session time limit. A setting of Y enforces the time limit to be a per-day limit. A setting of N would enforce a session limit letting the user log back in immediately and get the time limit defined for their security level each time they call in. Allow Alias If you have installed the Alias PSA, you can control which security levels will be able to use Alias names in those conferences that allow aliases. If you want a security level to be able to use an alias, this option must be enabled. Force Read For some security levels, you may want to force callers to read mail that they have been notified is waiting for them. If you do, you should enable this option. As soon as the user of this security level receives a you have mail waiting... message, PCBoard will force the user to read this mail in read-only mode (will not update the last message read). For the user to be notified, their message waiting flags have to be set. NOTE: Not all third-party software will update the message waiting flags, but PCBoard always will. Demo Acct. Setting this answer to Y will allow a user at this security level to log into the system multiple times. In other words, you could have an account on your system that you could use for demonstration purposes. With this setting, you could have several users logging into your system using that account whereas PCBoard normally disallows users of the same name from logging in at the same time. If you use accounts with this security level for demonstrating then you may want to clear out the password field in your demonstration accounts. With a blank password, PCBoard will not prompt the caller to enter a password. NOTE: When set to allow multiple logins, PCBoard protects the W user command and also resets the last message read pointers because they are seen as demonstration accounts. Name/Loc of FSEC File The FSEC file gives you the ability to control the following: Protecting files for download by security level or by password Determining what files are free downloads Whenever a user attempts to download a file, PCBoard will first check your DLPATH.LST for the current conference to see if the file can be found. If the file is found, then PCBoard will check your FSEC file to make sure that the user has sufficient security or knows the correct password to download the file. To edit your FSEC file, press F2 while you have the Name/Loc of FSEC File field highlighted. When you do, you will see the following screen: There are several keyboard commands active when you are editing your FSEC file. These keyboard commands allow you to delete entries, insert entries, etc. The following are valid: ESC Exit the FSEC editor. If you have made any changes to the FSEC file, you will be asked if you wish to save the changes that have been made. After answering, you will be returned back to the Configuration Files menu. F1 Access on-line help. On-line help will be displayed that relates to the FSEC file and the various fields you can edit. ALT-R Repeat currently highlighted line. If you are creating entries that are very similar in definition, you can use this keyboard command to duplicate the currently highlighted entry. The new entry will be inserted just below the current line. ALT-I Insert a new security level. If you need to add a new entry between two existing entries, you would using this keyboard command. A new blank entry will be inserted just below the current line that you can edit to suit your needs. ALT-D Delete current security level. This keyboard command will delete the currently highlighted entry. There is no undo function to get the original line back so if you make a mistake, you should exit without saving and attempt to make the changes again. You will notice there are three fields in this file. These fields allow you to specify the subdirectory and/or filename(s) you wish to control and the security and/or password required to access the file. Drive \ Path In this field, specify the subdirectory you wish to control access to. You can enter any valid DOS path in this field. Make sure that whatever you enter in this field matches one of your entries in your DLPATH.LST file or it will be ignored. For example, if you enter C:\RESTRICT\ in this field but in your DLPATH.LST is the entry \RESTRICT\, a match will not occur. If you wish to control access to an entire drive, enter the drive letter followed by a colon. For example, to control access to all of drive F, enter F: in the field. If you leave this field blank, whatever you enter for the filename will be controlled no matter what download path it is found in. For example, if you have a bunch of files in different subdirectories that begin with FAQ, save yourself several entries in the FSEC file by leaving the Drive \ Path field blank and enter FAQ*.* in the filename field. File Name In this field you should enter the filename you wish to protect. You may enter any valid DOS filename or wildcard in this field. For example, if you wish to simply protect SALE0393.ARJ, you would enter that filename in this field. However, if you wished to protect every file that begins with SALE, you would enter SALE*.* in this field. If you leave this field blank, every filename that is found in the subdirectory that you entered in the Drive \Path field will be protected. In other words, this field defaults to *.* (all files). Sec In this field, enter the security level that is required to download the file(s) defined by the first two fields. If you enter a security level of 0, it is assumed that the file is a FREE file that does not get recorded as a downloaded file in the user's record. Password The password field allows you to enter a password that is required in order to download the files that are defined by the first two fields. There are two exceptions and those are the words FREE and NOTIME. These two passwords have special meaning in PCBoard. The FREE password will make it so that the files or bytes downloaded do not get updated when a user downloads a FREE file. NOTIME is only slightly different in that no time is deducted for downloading a NOTIME file. Once the password has been entered, it will not be asked for again during the session. This means that if the user's login password is the same as the file password, the password will not be asked when attempting to download a file protected with the same password. The order that you list the entries in your FSEC file are very important because PCBoard will act on the first match that it finds. Therefore, you will want to list your most specific entries at the top and your more generic entries towards the bottom of the file. For example: Drive \ Path File Name Sec Password -------------------------------- -------------- ----- -------------- *.* 20 Q:\FREE\ MEMBER*.* 0 FREE This example would not work because every file would match on the first entry and PCBoard would act on it. Instead, you would want to reverse these entries so that PCBoard checks to see if the file is in Q:\FREE\ first. As a general rule, you could order your FSEC in the following manner: * Entry has a subdirectory and a filename specified * Entry has a subdirectory but no filename specified * Entry has only a filename specified * Entry has *.* for a filename and no subdirectory specified. * Perhaps the simplest example would be if you wanted to allow any user to get files from your Y:\FREE\ subdirectory but only users who have a security level of 20 or higher can download any other files. In this case you would make the following entries in your FSEC file: Drive \ Path File Name Sec Password -------------------------------- -------------- ----- -------------- Y:\FREE\ *.* 0 FREE *.* 20 As another example, let's assume you want to protect the files in two subdirectories with a particular password. In this case, you would make the following entries:' Drive \ Path File Name Sec Password -------------------------------- -------------- ----- -------------- Q:\CHARTS\ *.* 20 MAKE_MY_DAY! R:\SALES\ *.* 20 CHERRY-PIE Finally, let's assume that you have a CD-ROM on-line as drive X. You only want to allow those users which have contributed to your system (level 50 or above) to download files from your CD-ROM. You want to protect all of the files in drive X but you certainly do not want to have to enter all of the subdirectories into the FSEC file. In the Drive \ Path field. Instead, enter the drive letter you wish to protect as in the following example: Drive \ Path File Name Sec Password -------------------------------- -------------- ----- -------------- X: *.* 50 Name/Loc of UPSEC File The UPSEC file is very similar to the FSEC file except that it allows you to control the files that get uploaded to your system rather than the files that are downloaded. For instance, you may decide to only accept files that have a .ZIP extension. If this is what you desire, then the UPSEC file is where you will configure your system to do this. Whenever a user attempts to download a file, PCBoard will first check your DLPATH.LST for the current conference to see if the file can be found. If the file is found, PCBoard will check your UPSEC file to make sure that the user has sufficient security or knows the correct password to upload the file. To edit your UPSEC file, press F2 while you have the Name/Loc of UPSEC File field highlighted. When you do, you will see the following screen: There are several keyboard commands that are active when you are editing your UPSEC file. These keyboard commands allow you to delete entries, insert entries, etc. The following are valid: ESC Exit the UPSEC editor. If you have made any changes to the UPSEC file, you will be asked if you wish to save the changes that have been made. Afterwards, you will be returned back to the Configuration Files menu. F1 Access on-line help. On-line help will be displayed that relates to the UPSEC file and the various fields you can edit. ALT-R Repeat currently highlighted line. If you are creating entries that are very similar in definition, you can use this keyboard command to duplicate the currently highlighted entry. The new entry will be inserted just below the current line. ALT-I Insert a new security level. If you need to add a new entry between two existing entries, you would using this keyboard command. A new blank entry will be inserted just below the current line that you can edit to suit your needs. ALT-D Delete current security level. This keyboard command will delete the currently highlighted entry. There is no undo function to get the original line back so if you make a mistake, exit without saving and attempt to make the changes again. You will notice there are three fields in this file. These fields allow you to specify the subdirectory and/or filename(s) you wish to control and the security and/or password required to access the file. Drive \ Path In this field, specify the subdirectory you wish to control access to. You can enter any valid DOS path in this field. If you wish to control access to an entire drive, enter the drive letter followed by a colon. For example, to control access to all of drive F then you would enter F: in the field. If you leave this field blank, it is the same as saying any drive and any subdirectory on the entire system. File Name In this field you should enter the filename you wish to protect. You may enter any valid DOS filename or wildcard in this field. For example, if you wish to prevent users from uploading any filename that ends with a .COM extension, enter *.COM in this field. If you leave this field blank, every filename that is found in the subdirectory that you entered in the Drive \Path field will be protected. In other words, this field defaults to *.* (all files) when left blank. Sec In this field, enter the security level that is required to upload the file(s) that are defined by the first two fields. If you enter a security level of 0, anyone may upload the files specified. Password The password field allows you to enter a password that is required in order to upload the files that are defined by the first two fields. Once the user has entered the password, they will not be asked for it again during that session. This means that if the user's login password is the same as the file password, the password for the file will not be asked for. The order that you list the entries in your UPSEC file are very important because PCBoard will act on the first match that it finds. Therefore, you will want to list your most specific entries at the top and your more generic entries towards the bottom of the file. For example: Drive \ Path File Name Sec Password -------------------------------- -------------- ----- -------------- *.* 20 Q:\CONF1\PRIVUPLD\ *.GIF 0 This example would not work because every file would match on the first entry and PCBoard would act on it. Instead, you would want to reverse these entries so that PCBoard checks to see if the upload would go to Q:\CONF1\PRIVUPLD\ first. As a general rule, you could order your UPSEC in the following manner: * Entry has a subdirectory and a filename specified * Entry has a subdirectory but no filename specified * Entry has only a filename specified * Entry has *.* for a filename and no subdirectory specified. Perhaps the most practical example would be to illustrate how you make it so that users could only upload compressed files and only those compressed files that you wish to allow. You could create the following FSEC file for allowing only *.ZIP files to be uploaded to your system: Drive \ Path File Name Sec Password -------------------------------- -------------- ----- -------------- *.ZIP 0 *.* 100 When a user uploads a file, PCBoard will check the UPSEC file to see if the filename ends with .ZIP. If it does not, it proceeds onto the next entry in the file. Obviously the last entry will match any file that is uploaded. The catch, however, is that if no matches were found on the previous entries in your UPSEC file, they will not be able to upload the file unless their security level is 100 or higher. Another example would be if you wanted to allow .ZIP files to be uploaded anywhere on your system but you only wanted .GIF files to be uploaded in conference #3. In a case such as this, you would make the following UPSEC file: Drive \ Path File Name Sec Password -------------------------------- -------------- ----- -------------- D:\CONF3\PRIVUPLD\ *.GIF 0 *.ZIP 0 *.* 100 PCBoard sends all uploads initially to the private upload directory so make sure if you are trying to protect uploads to a particular conference, enter the location of the private uploads regardless of whether all uploads are public or private. This example assumes the private upload directory for conference #3 is D:\CONF3\PRIVUPLD\. As you can see, a user could only upload a filename that ends with .GIF if the private upload directory for the conference is D:\CONF3\PRIVUPLD. Name/Loc of User Trashcan File The trashcan file gives you the ability to protect users from creating accounts with user names that are listed in your trashcan file. This means that you can protect users from logging into your system with words that you may find offensive. To edit the trashcan file, you highlight the field on the screen which says Name/Loc of User Trashcan File and then press F2. When you do, you will see a screen similar to the following: In the trashcan file editor, the following keyboard commands are available: ESC Exit the trashcan editor. If you have made any changes to the trashcan file, you will be asked if you wish to save the changes that have been made. Afterwards, you will be returned back to the Configuration Files menu. F1 Access on-line help. On-line help will be displayed that relates to the trashcan file. PgDn View the next 15 entries. On each screen of the trashcan editor, 15 entries can be displayed. If you want to view the next 15 entries in the file, use this keyboard command. PgUp View the previous 15 entries. To view the previous 15 entries of the trashcan file, use this keyboard command. ALT-I Insert a new line. If you need to add a new entry between two existing entries, use this keyboard command. A new blank entry will be inserted just below the current line that you can edit to suit your needs. ALT-D Delete current line. This keyboard command will delete the currently highlighted entry. There is no undo function to get the original line back. If you make a mistake, exit without saving and attempt to make the changes again. The trashcan file is accessed whenever a new user logs into a system. If any of the entries in the trashcan file are part of the new user's name, PCBoard will not allow them to continue. For example, if you have the word ENTER in your trashcan file a user could login as THE ENTERPRISE, but not as ENTER THE NIGHT. The key difference is that ENTER is not a separate word in the name. As another example, if you have the word THE in the trashcan file, a user name such as THE WIND, or THE WILD ONE would fail. A name such as JOHN THEOS would not fail because the word THE does not exist as an entire single word. Name/Loc of Protocol Data File The protocol data file is the configuration file that stores information about the file transfer protocols that are available on your system. In order to transfer files from your system to the remote user's system or vice versa, a file transfer protocol must be used. There is no one standard file transfer protocol, therefore, PCBoard gives you the ability to define up to 36 different protocols for your system. To edit your protocol data file, highlight the line which says Name/Loc of Protocol Data File and press F2. When you do, you will see the following screen: The protocol data file consists of seven fields for each protocol entry. The following describes each field in detail: Use Each protocol in PCBoard is referenced by a protocol letter rather than the name of the protocol. The letter that you enter in this field is the letter that will be used while on-line to reference the protocol. You may enter any letter or number (A-Z and 0-9) for a total of 36 possible protocol definitions. Type This field describes the type of protocol that you are defining. The following are the valid options: I Internal. An internal protocol is one that is implemented inside of PCBoard itself. You could call these built-in protocols if you wish. There are seven protocols that are internal to PCBoard: (A) ASCII (X) XModem/Checksum (C) Xmodem/CRC (O) 1K-Xmodem (F) 1K-Xmodem/G (Y) Ymodem BATCH (G) Ymodem/G BATCH If you are defining an internal protocol, you must use the appropriate protocol letter (shown in parentheses in the internal protocol list) for the internal protocol to be used. S Shelled. This type of protocol refers to an external protocol (one that is not built into PCBoard). You should define an external protocol as this type if it is a single file transfer protocol (not capable of batch transfers) or if it does not use the DSZLOG style log for recording transfer activity. If you define a protocol as this type, PCBoard will not let a user transfer more than one file at a time. D DSZLog. This type of protocol refers to an external protocol. Any protocol that is capable of recording transfer information in the DSZLOG style format should use this protocol type. If you are unsure if the protocol you are trying to add supports DSZ style logging, please refer to the protocol documentation or the author of the protocol. PCBoard will allow callers to use any protocol of this type for batch file transfers. B Bi-directional. You should only define a protocol as this type if it is capable of sending and receiving files at the same time. Only a handful of protocols exist that support bi-directional transfers. If you do use a protocol that supports bi-directional transfers, make sure that it also supports DSZLOG style logging. If it does not, PCBoard will not be able to properly determine the files that were transferred. Size Just before PCBoard begins a download it will print the size of the file(s) that will be transferred and approximately how many protocol blocks required to transfer the file. Each protocol uses a packet or block size. Most of the advanced protocols will send 1024 bytes at a time whereas protocol like Xmodem will send 128 bytes at a time. PCBoard uses the value that you enter in this field to determine how many protocol blocks will be transferred. This information really is purely statistical in nature and the protocol will continue to function properly even if you do not enter the right value. MNP Some file transfers protocols will off-load the error correction on the modems in order to get better throughput. If you are installing a protocol which relies on error correcting modems, enter Y in this field. When this field is set to Y, a user may only select this protocol if they have established an error correcting connection (e.g., MNP, v.42, etc.) For this to work properly, both your modem and the remote modem must have established an error-correcting connection. Port Open Normally, PCBoard will shut down the RTS signal and unhook itself from the serial port interrupt prior to executing an external protocol. It is then up to the external protocol to initialize the serial port for proper communications. This is the method that nearly every external protocol expects to function properly. However, some protocols may require that PCBoard leave the port 'as-is' before turning control over to the external protocol. If you run into a protocol that absolutely requires this then set this field to Y. If you are not sure, leave this option set to N or you could see some unpredictable results when you return back to PCBoard from the external protocol. Lock Lines The status lines, which PCBoard moves to the top of the screen during a shelled protocol, may be frozen in place to avoid having them scrolled off the top of the screen. This way you can see who is on-line transferring files when users are using external protocols. This only works for those external protocols which use BIOS to write to the screen or if the protocol does not write to the top two lines of the screen. To lock the lines in position, set this option to Y. Description In this field, enter a short description of the protocol that is being defined. This description is displayed to the caller whenever they are choosing from the list of protocols that have been defined on your system. You may enter up to 37 characters to describe each file transfer protocol. As mentioned previously, internal protocols are built in PCBoard. External protocols are separate programs and are not really related to PCBoard. Batch files are used to execute external protocols. PCBoard expects these batch files to be named in the following manner: PCBR?.BAT where ? is the protocol letter of the external protocol you are defining. This batch file will be executed whenever you receive a file (a user uploads to your system). PCBS?.BAT where ? is the protocol letter of the external protocol you are defining. This batch file will be executed whenever your send a file (a user downloads from your system). An external version of Zmodem is included with your package. If you look in the directory where you installed PCBoard, you will see a PCBRZ.BAT and a PCBSZ.BAT file. These are the two batch files that will get executed when a user requests Zmodem for their transfer protocol. For further information on setting up external protocols please see the Batch Files chapter of this Manual. NOTE: If you have defined a protocol and it is not showing up when a user attempts to set their default protocol, it may be due to one of the following: The protocol that is not being listed is marked as a protocol that requires an error-correcting session (MNP or v.42). The user that is on-line has not established an error-correcting session (the connect speed on the status line does not have an E on the end). The protocol that is not listed is an external protocol and one or both of the external protocol batch files are missing. Name/Loc of Multi-Lang. Data File The multi-language data file is the file that controls what languages (if any) are defined for use on your system. The ability to configure multiple languages on your system gives you the ability to cater to more users who may not speak the same language. To edit the multi-language data file highlight the line on the screen that says Name/Loc of Multi-Lang. Data File and press F2. You will see a screen which resembles the following: The following describes each of the fields in this file: Language The name of the language. This is the text that is displayed to the caller when they are asked to choose a language at login. You should include the number of the language on this line. The first language in the file will be assigned language #1, the second language will get language #2, etc. Extension The filename extension for language specific files. For example, if you are adding the French language, you may want to make the extension .FRE. This means if you had a file called WELCOME.FRE it would be displayed to anyone who selected the French language at login. Country If you also want PCBoard to add date, numerical separator, and capitalization support for the language that you are defining, you need to enter the country number to use as defined by COUNTRY.SYS. For the French language this would be 033. CodePage The code page is also a function of COUNTRY.SYS and defines what characters are available in the language you are defining. This information should be provided in your operating system manual. As an example, the French language would use 850 in this field. Yes Since Yes and No are not the same in all languages, you can define what character will be used to represent a response of Yes. In French, you most likely would like to use the letter O. No As with the Yes field, the language you are defining may use a character other than N to represent a response of No. Simply enter the character that you wish to use to represent a response of No. There are several keyboard commands which give you the ability to add and delete entries, and more. They are as follows: ESC Exit the multilingual editor. If you have made any changes to the multilingual file, you will be asked if you wish to save the changes that have been made. Afterwards, you will be returned back to the Configuration Files menu. F1 Access on-line help. On-line help will be displayed that relates to the PCBML.DAT file. PgDn View the next 15 entries. On each screen of the multilingual editor, 15 entries can be displayed. If you want to view the next 15 entries in the file, use this keyboard command. PgUp View the previous 15 entries. To view the previous 15 entries, use this keyboard command. ALT-I Insert a new line. If you need to add a new entry between two existing entries, use this keyboard command. A new blank entry will be inserted just below the current line that you can edit to suit your needs. ALT-D Delete current line. This keyboard command will delete the currently highlighted entry. There is no undo function to get the original line back. If you make a mistake, exit without saving and attempt to make the changes again. For more information about the country code and code page information please see the discussion about COUNTRY.SYS in the Internationalization section of the Customizing Your BBS chapter of this manual. Name/Loc of Color Definition File PCBFiler has a menu option you can use to customize the colors used in your directory files. PCBoard will read this information from PCBFiler configuration file (PCBFILER.DEF) to colorize your directory files on-the-fly. The configuration file will be created in the same directory as PCBFILER.EXE. In this field, enter the location and name of your PCBFILER.DEF file. If the PCBFILER.DEF file cannot be found in the location that you specify, your file directories will appear in monochrome rather than the colors that you desire. Name/Loc of Default CMD.LST File The CMD.LST file defines commands that you can be used to add, change, or even replace commands available to your callers. You can define commands that stuff the keyboard with certain text, run PPE files, or execute a menu file. In this field, enter the name and location of the default CMD.LST file. This file will be used in any conferences that do not have a conference specific file defined. To edit this file, highlight the line which says Name/Loc of Default CMD.LST File and then press F2. You will see a screen which resembles the one on the following page: While in this editor, these keyboard commands are available: ESC Exit the CMD.LST editor. If you have made any changes to the CMD.LST file, you will be asked if you wish to save the changes that have been made. Afterwards, you will be returned back to the Configuration Files menu. F1 Access on-line help. On-line help will be displayed that relates to the CMD.LST file. PgDn View the next 15 entries. On each screen of the trashcan editor, 15 entries can be displayed. If you want to view the next 15 entries in the file, use this keyboard command. PgUp View the previous 15 entries. To view the previous 15 entries of the CMD.LST file, use this keyboard command. ALT-I Insert a new line. If you need to add a new entry between two existing entries, use this keyboard command. A new blank entry will be inserted just below the current line that you can edit to suit your needs. ALT-D Delete current line. This keyboard command will delete the currently highlighted entry. There is no undo function to get the original line back. If you make a mistake, exit without saving and then attempt to make the changes again. ALT-R Repeat current line. If you are creating entries that are very similar in definition, use this keyboard command to duplicate the currently highlighted entry. The new entry will be inserted just below the current line. There are three fields that are used to define each command in the CMD.LST file. The following describes each field in detail: Command You can enter up to 15 characters to define a command. The text entered in this field will be used whenever the command is executed. For example, if you enter MAIL in this field, a user must type MAIL to access the command you are defining. Security In this field, enter the security level that is required to execute the entry you are defining. If the user does not have a security level equal to or greater than the number that you enter, a Menu Selection is not available message will be displayed to the user. Replacement When a caller executes a command you define, you can have the command run a .PPE file, a .MNU file, or have it simulate the user keystrokes. If you wish to run a .PPE file then specify the full path and filename you wish to run including the .PPE extension. If the filename that you specify cannot be found, no action will occur when the command is executed. To run a .MNU file specify the full path and filename that you wish to run including the .MNU extension. If the filename that you specify cannot be found then no action will occur when the command is executed. If you do not specify a .MNU or a .PPE file then the text that you enter in this field will be stuffed into the keyboard so that it appears that the user actually typed the text that is in this field. This would be useful to combine frequently used commands into one easy to remember command. Any commands that you define in the CMD.LST file will be found before any other internal command or door name is executed. This is the reason that any commands that you define in this file will override internal commands of the same name. If you define a command that is more than one character in length, you do not have to type in the entire command for PCBoard to act on it. PCBoard simply needs is to be able to guarantee that what is typed will make it a unique command. For example, if you have a command named ORDER as the only entry in CMD.LST, you could enter OR to open the command because there are no others beginning with OR either as an internal command or in your CMD.LST file. As another example, you could create a command called NEWFILES that would stuff N;S;A into the keyboard. This would provide an easy way for your users to display the new files in a particular conference without having to remember to type in a more cryptic command such as N;S;A. To define this new command, make the following entry in CMD.LST: Command Security PPE/MNU File -or- Keystroke Replacement -------------- -------- --------------------------------------- NEWFILES 0 N;S;A^M Assuming that you have a .PPE file that you wish to run in place of the E user command you could make the following entry in your CMD.LST file: Command Security PPE/MNU File -or- Keystroke Replacement -------------- -------- --------------------------------------- E 0 C:\PCB\PPE\EMSG.PPE As you can see by this sample entry, any time a user executes the E user command, PCBoard will run EMSG.PPE located in the C:\PCB\PPE\ subdirectory instead. Having a command execute a .MNU file is just as simple as running a .PPE file. All you have to do is to specify the name of the .MNU file that you wish to run as shown in the following entry: Command Security PPE/MNU File -or- Keystroke Replacement -------------- -------- --------------------------------------- ORDER 0 C:\PCB\MNU\ORDER.MNU This entry will execute C:\PCB\MNU\ORDER.MNU whenever a user types in the ORDER command. Name/Loc of All-Files DLPATH.LST If you have files available for download in several conferences, you may want to use this file to protect users from uploading files which do not exist in the current conference but may exist in another conference on the system. Normally, PCBoard will check the DLPATH.LST file of the current conference to see if the files a user wishes to upload duplicates any files already on the system. Since a different DLPATH.LST file can be specified for each conference this means you would not be able to check for duplicates across conferences. If there are entries in the The All-Files DLPATH.LST (ALLFILES.LST) file, PCBoard will use that file to check for duplicates when a user is uploading a file. The ALLFILES.LST file is not used at any time for downloading purposes so you may include every path on your system if you wish. To edit your ALLFILES.LST file, highlight the line on the screen that says Name/Loc of All-Files DLPATH.LST and press F2. You will see a screen which resembles the following: While you are in the editor, the following keyboard commands are available: ESC Exit the ALLFILES.LST editor. If you have made any changes to the ALLFILES.LST file, you will be asked if you wish to save the changes that have been made. Afterwards, you will be returned back to the Configuration Files menu. F1 Access on-line help. On-line help will be displayed that relates to the all-files DLPATH.LST file. PgDn View the next 15 entries. On each screen of the DLPATH.LST editor, 15 entries can be displayed. If you want to view the next 15 entries in the file, you would use this keyboard command. PgUp View the previous 15 entries. To view the previous 15 entries of the DLPATH.LST file, use this keyboard command. ALT-I Insert a new line. If you need to add a new entry between two existing entries, use this keyboard command. A new blank entry will be inserted just below the current line. ALT-D Delete current line. This keyboard command will delete the currently highlighted entry. There is no undo function to get the original line back. If you make a mistake, exit without saving and then attempt to make the changes again. ALT-R Repeat current line. If you are creating entries that are very similar in definition, use this keyboard command to duplicate the currently highlighted entry. The new entry will be inserted just below the current line. Perhaps the easiest way for you to create your ALLFILES.LST would be to use the DOS COPY command to combine the DLPATH.LST files that you use in your various conferences into one single file called ALLFILES.LST. This method would be faster than manually entering each path or index file into the file. NOTE: You should also add the private upload directory path for each conference in your ALLFILES.LST if you want PCBoard to check these directories since they are not normally included in your conference DLPATH.LST files. As a quick example, let's assume that you have defined two conferences on your system. In both conferences you have different files available for download. You decide that the ALLFILES.LST would be the best way to protect from getting unwanted duplicate files. First, you use the COPY command in DOS to combine your DLPATH.LST files for your conferences by typing the following: COPY C:\PCB\CONF1\DLPATH.LST+C:\PCB\CONF2\DLPATH.LST C:\PCB\ALLFILES.LST Next, add the public and private upload directory paths for the two conferences into your ALLFILES.LST so that it resembles the screen on the following page: Name/Loc of Upload File Trashcan This configuration file has one purpose -- to stop users from uploading certain filenames. If a user attempts to upload a file which is in this list then PCBoard will print an error that says Files matching ([filename]) are not allowed on this system. To edit your upload file trashcan you need to highlight the line on the screen which says Name/Loc of Upload File Trashcan and press F2. Inside the upload file trashcan editor, you may specify any valid DOS filename or wildcard. Use the up and down cursor keys to move between fields and type in the filename or wildcard filename you wish to disallow all users to upload. Batch file for viewing compressed files In this field, enter the name of the batch file you wish to execute when a user executes the F;V user command to view a file available for download. PCBoard will execute the batch file specified in this field. In addition, PCBoard will pass the full path and filename being viewed as the first parameter to the batch file. The default PCBVIEW.BAT included with your package makes use of VIEWZIP.EXE and VIEWARCH.COM that are also supplied with your package. These two utilities allow you to list the files contained in .ZIP and .ARC compressed files. Filename EXTENSION for compressed files Usually a bulletin board system will pick a particular compression program to compress all of the files on-line. For example, you may decide that you want all of your files to be in .ZIP format. This field allows you to specify the default extension for compressed files. This extension will be used in the following places: When flagging or requesting a file for download, PCBoard will attempt to find a filename with the compressed filename extension if no extension is supplied by the user. This can save keystrokes because the extension would not have to be entered. When using the F;V command PCBoard will attempt to find a filename with the compressed filename extension if no extension is supplied by the user. This can save keystrokes because the extension would not have to be entered. If a bulletin is requested for download, PCBoard will check to see if a file exists in the same location as the bulletin file that has the same filename and also an extension that matches the compressed filename extension. If such a file exists, the compressed version of the file will be downloaded instead of the ASCII text version. This allows you to have large bulletins on-line but for users to easily (and quickly) download a compressed version of the bulletin. Display Files When you select this menu option, you will be presented with the following screen which lists some of the display files you can change the location of or even edit: PCBoard makes use of several display files. These display files are text files that will be displayed to the caller. Text files allow you to easily customize the information you wish to present to the user. You can make your file large or small, colorized or monochrome. The point is that you have the choice. All of the display files that are listed on this screen can have graphics, security, and language specific versions. See Display Files in the Customizing Your BBS chapter of this manual for additional information.. In each of the fields on this screen, enter the drive, path, and filename that you wish to use for each display file. From within PCBSetup, you can edit the normal display file and the graphics specific version by using F2 and F3 respectively. If you edit a file, PCBSetup is going to call the text and graphics editors that you defined in System Manager | Define Text & Graphics Editors because these are text display files. Name/Loc of WELCOME File This file will be displayed after the Do you want graphics prompt is answered (assuming Q is not used to abort the welcome file). Typically, SysOps will design this screen to display the system name, phone numbers, and any other relative facts. Name/Loc of NEWUSER File When a new user is logging into your system, this display file will be shown to them right after they confirm that they are a new user. In this file you will most likely want to display rules of your system and any steps that the user must complete to become registered on your system. Name/Loc of CLOSED File This file is displayed whenever PCBoard determines that a user cannot login to a system because it is a closed system. There are two ways of creating a closed system: In PCBSetup | Configuration Options | System Control you have enabled the Run System as a Closed Board option. New users will not be allowed to login to the system. The security level of the caller has been defined to have 0 minutes available in the PWRD file. This will display the CLOSED file regardless of the closed board option in PCBSetup. You will want to display a brief explanation of why the user cannot login to your system and provide further instructions as to what the user should do. Name/Loc of WARNING File The WARNING file is displayed only to those callers whose subscription is about to expire. This file will be displayed whenever the user is within the warning period defined in PCBSetup | Subscriptions. You will want to let the user know that their subscription is about to expire. You may want to purposely use color or other eye-catching effects to make this file stand out since some of your users may miss this file. Name/Loc of EXPIRED File When a user's subscription has expired, PCBoard will display the EXPIRED file every time they login. Therefore, you may want to have this file contain the instructions necessary for a user to renew their subscription. Name/Loc of Conference Join Menu When a user executes the J user command with out specifying a conference name or number to join, PCBoard will display the menu of conferences that are available. The display file defined by this file is the one that is used to list the conferences that are available on your system. Because it is a text file, you can customize it to look any way that you desire. You should include the conference number and/or name for each conference so the user may use the name or number of the conference they wish to join. Name/Loc of Group Chat Intro File When a user joins group chat, this file will be displayed to them. In this file you may want to outline general rules of courtesy in regards to node chat. Remember that this file will be displayed every time group chat is joined so you may not want to make this file particularly long. Name/Loc of Group Chat Menu While in group chat, the user can execute several different commands. These commands allow the user to change channels, send private messages to other users, and more. This display file is a menu that is displayed when a user is not in expert mode and presses ESC. Expert users would need to ask for the menu by typing MENU at the Chat Command prompt. Name/Loc of NOANSI Warning Group chat makes heavy use of the ANSI terminal emulation standard. If PCBoard determines that the user is not capable of ANSI at login and the user attempts to join group chat, this file will be displayed. In this file, you may simply want to warn the user that they should instruct their terminal program to use split-screen chat mode (if available) or avoid typing while others are typing. New User/Logon/off Questionnaires Besides normal script questionnaires, you can also use script questionnaires at logon, logoff, and when a new user is logging into the system. As with normal script questionnaires, you can use the text format questionnaires or you can make the questionnaire files actual PPE files if you need more control when asking questions. Name/Loc of New Reg Questionnaire When a new user logs into your system, this questionnaires gives you the ability to ask for additional information that PCBoard does not. For example, you may want to ask questions about where the new user found out about your system or even something like their birth date. If you have defined a new registration questionnaire, it will be used right after PCBoard finishes asking it's normal questions (default protocol, password, etc.) Name/Loc of Answers to New Reg. The filename that you specify in this field is where the answers to the new registration questionnaire will be stored. If you used a standard script questionnaire, the answer file will simply print the question that was asked followed by the answer that the user gave. If you are using a PPE for the new registration questionnaire, the format of the answers could be in any format since the PPE controls the output. Name/Loc of Login Script Quest. The login script questionnaire is executed by everyone right after they enter their password and even before the $$LOGON.BAT file is executed. If you want to ask a questionnaire for every login or more likely to execute a PPE at every login, define the file to use as your questionnaire. NOTE: You can also have this field display an additional logon screen by specifying the filename to display in this field and leaving the answer field blank. When the answer field is blank, no questions will be asked. Name/Loc of Logon Script Answers The filename that you specify in this field is where the answers to the logon questionnaire will be stored. If you used a standard script questionnaire, the answer file will simply print the question that was asked followed by the answer that the user gave. If you are using a PPE for the logon questionnaire, the format of the answers could be in any format since the PPE controls the output. Name/Loc of Logoff Script Quest. The logoff script questionnaire is executed by everyone right after they enter the command to logoff and before the $$LOGOFF.BAT file is executed. If you want to ask a questionnaire at every logoff or more likely to execute a PPE at every login, define the file to use as your questionnaire. NOTE: You can also have this field display a logoff screen by specifying the filename to display in this field and leaving the answer field blank. When the answer field is blank, no questions will be asked. Name/Loc of Logoff Script Answers The filename that you specify in this field is where the answers to the logoff questionnaire will be stored. If you used a standard script questionnaire, the answer file will simply print the question that was asked followed by the answer that the user gave. If you are using a PPE for the logoff questionnaire, the format of the answers could be in any format since the PPE controls the output. Modem Information Selecting this menu option allows you to modify the setup of PCBoard in regards to the serial port you are using. Not only can you define the serial port you will be using, but there are options which control the behavior of PCBoard with your serial port. There are three menu options that you can select. If you want to configure what serial port to use, the initialization string, or other items related to the setup of your modem then you should select the first menu option. Selecting the second menu option will allow you to set numerous options that control how PCBoard interacts with your modem. Finally, the last menu option contains items that allow you to control access to the node you are configuring based on the connect speed of the caller. When you installed PCBoard, the install program configured your modem with a program named PCBMODEM.EXE. This utility will configure numerous modems to operate properly with PCBoard. You should run PCBModem at least once to configure your modem properly. Modem Setup Seconds to wait for carrier As soon as PCBoard detects a ring coming in from the modem, it will countdown from the number that you enter in this field to 0. If PCBoard reaches 0 without being able to determine that a connection has been established, it will recycle and wait for the next call. Normally a good value to set for this field is between 30 and 45 seconds to catch all connections. Comm Driver to use (A/C/F) Standard PCBoard software supplies only one type of comm driver and that is Asynchronous. If you have the standard PCBoard software, you should enter A in this field. If you attempt to enter any other answer, PCBoard will not operate properly. If you have the multiport version of PCBoard (sometimes referred to as the /M version), you can select any of the comm drivers to use. The following describes each comm driver: A Asynchronous (Async). Select this option if you wish to use standard serial ports (sometimes referred to as COM ports). These serial ports all utilize standard UART chips (e.g., 8250, 16450, 16550, etc.). With this driver PCBoard requires that each serial port in the machine access a unique base address and IRQ setting. C COMM-DRV. The multiport version of PCBoard includes a TSR that is called COMM-DRV. This TSR provides a standard interface between numerous serial devices. Not only are intelligent serial boards like those produced by Arnet and Digiboard supported but also some non-intelligent serial boards are supported. To confirm whether or not your card will work with the multiport driver, refer to the Preparing The Multiport Driver section in the Multiple Nodes chapter of this manual, or contact technical support. F FOSSIL. PCBoard can also communicate with serial devices that provide a FOSSIL interface. Usually this requires that you load a device driver or TSR program. Comm Port (0=NONE/Local Only) Enter the number of the comm port to be used by PCBoard. If you enter a comm port of 0, no modem will be used by PCBoard and local logins will be used for all calls. If you have configured PCBoard to use the async comm driver, the numbers 1 and 2 correspond to COM1 and COM2 in your machine. Any number higher than 2 will require that you supply a base address and IRQ value to define the port. If you enter a port higher than 2, your hardware must be configured for whatever values you enter for the base address and IRQ. If they do not, PCBoard will either refuse to load, or will not be able to properly communicate with your comm port. Refer to the Troubleshooting section of the PCBoard chapter for additional details. If you have configured PCBoard to use COMM-DRV, enter the corresponding port number that you defined in DRVSETUP. For example, if you want to use the port 2 defined in this sample DRVSETUP Port Card Sub- Base Card Number Type Port Address IRQ Segment FOSSIL ------ ------ ---- ------- --- ------- ------ 1 ARNET 1 300 3 D000 Y 2 ARNET 2 300 3 D000 Y enter 2 in the comm port field because that is what is defined as the port number in DRVSETUP. If you selected the FOSSIL comm driver instead, enter the port number as it is defined in your external communications driver that provides the FOSSIL interface. Opening Baud Rate (300-115200) In this field, enter the speed you wish for PCBoard to initially open your serial port. Normally you will want to set this to the maximum port rate speed that your modem supports. The valid options are 300, 1200, 2400, 4800, 9600, 19200, 38400, 57600, and 115200. Sometimes, your modem may be able to support a faster port rate speed then your serial and computer hardware may be able to keep up with. If this is the case, you will experience data loss (some bytes will be lost when transferred). To resolve this, you can lower the opening port rate speed or upgrade your computer hardware. NOTE: If you enter an opening port rate speed of 19200 or higher, PCBoard will force the port speed to be locked regardless of how you have set the Lock in Opening Baud Rate. Lock in Opening Baud Rate A locked port speed tells the modem to communicate at the rate you entered for the opening port speed. When the communications port is not locked, PCBoard will always communicate at the same speed as the caller is connected at. A locked port rate will have no effect unless you are using a modem that is capable of error-correction (e.g., V.42, MNP) and an error-correction connection is established. With an error-correcting connection, the actual throughput of all data transferred can be increased by up to 20% because the start and stop bits are stripped out. In addition, most error-correcting modems also support data compression of ASCII text (such as display screens) very well. If you enable this option, you need to be sure that your modem is also configured to expect a locked port rate (sometimes referred as a fixed DTE speed or a fixed DTE link). If both the software and hardware are not configured to communicate at a locked port rate, you will see garbage characters on the remote screen when calling in. Modem Initialization String This field contains the initializing string that PCBoard should send to the modem when it first loads and whenever it recycles to the call-waiting screen. The string that you enter in this field will vary between modems because most modems have different command sets and default values. The best thing to do is to use PCBModem to properly configure your modem for use with PCBoard. Instructions for PCBModem can be found in the Utilities chapter of this manual. If your modem is not listed in PCBModem, contact the technical support staff to get your modem configured properly with PCBoard. There are two special characters that you can use in your initialization string to simulate a carriage return (pressing R) and to incorporate a brief pause in your initialization string. ^M If you enter these two characters in your initialization string, PCBoard will send a carriage return and continue sending the rest of the initialization string. Some modems have a problem with long initialization strings. Use the carriage returns to break up a long initialization string. For example ATM0^MATH0^MATS0=0 would send the following to your modem: ATM0 ENTER ATH0 ENTER ATS0=0 ~ If you enter this character in your initialization string, PCBoard will pause 1/2 of one second every time it encounters this character. This would be useful to manually slow down the speed at which the modem initialization string is sent. If you run communications programs on the same modem that you use for your system, you need to be careful to restore the modem to all of the proper settings because your communications program has an initialization string as well. One initialization string that you could use would be ATZ^MATM0H0. This string will reset the modem, turn off the speaker, and put the phone line back on hook (if it was off hook). Be forewarned, however, that some modems have a problem with sending ATZ in the initialization string and may report a modem reset error. An incorrect initialization string that does not generate an OK from the modem will result in PCBoard issuing a modem reset error. If you experience this error, refer to the Troubleshooting section in the PCBoard chapter of this manual for additional instructions. Modem Off-Hook String Sometimes PCBoard will want to take the phone off-hook to make the phone line busy. PCBoard will send the off-hook string that you enter in this field at the following times: Selecting User - Busy, Sysop - Busy, or DOS-Busy from the call waiting screen. Enabling the Modem Off-Hook During Recycle will force the phone to be off-hook from the time carrier is dropped until the initialization string is sent. Recycling the node using the 15 sysop command. NOTE: Some modems have built in limits as to how long they will stay off-hook. When this time expires, they will go back on hook (allowing your phone to ring). In this type of situation there is nothing that PCBoard can do to keep the phone line busy as this is a built in function of the modem. Configuration Switches Disable CTS/RTS Checking CTS/RTS refers to a type of flow control called hardware flow control which restricts or enables the flow of data. When data cannot be received or sent by one side of the connection it will attempt to restrict the flow of data via the hardware flow control signals provided by the RS-232 serial interface. In other words, flow control is necessary to guarantee that modem and computer buffers are not caused to overflow by incoming or outgoing data. Normally you will want to answer N to this question unless your modem or serial card does not support CTS/RTS flow control. For high speed communications it is essential that you do not disable flow control or you risk losing data over the connection. NOTE: For high speed communications it is essential that you answer N to this question or risk data loss over the modem. Valid options for this field are: N CTS/RTS flow control will be enabled by PCBoard. Similar to locking the port rate, it is required that both the modem and PCBoard be configured to use CTS/RTS flow control. It is also important that your modem not be configured for XON/XOFF or software flow control. Y Hardware (CTS/RTS) flow control will be disabled by PCBoard. Select this setting only if your modem does not support hardware flow control (check your modem manual if you are unsure). Disable RTS-Drop During Write While PCBoard is receiving an upload file (via an internal transfer protocol) it will normally shut down the RTS signal while it writes to disk to avoid data loss. N When writing data being uploaded, PCBoard will shut down RTS to prevent data from being lost. Y Disables this automatic RTS shut down. While faster uploads may be possible, it could result in data loss. You would be most likely to experience data loss if the upload is being written to a slow drive or across the network.. Using a FastComm 9600 If you are using a FastComm 9600 modem, you should answer Y in this field. PCBoard has to assume certain aspects about the connection due to the way the FastComm modem operates. If you are not using a FastComm 9600 modem, leave this field set to N. Reset Modem While Idle PCBoard gives you the opportunity to reinitialize the serial port and modems every five minutes while idling at the call waiting screen. This may be beneficial if you experience unexplained modem reset errors. Valid options are: N When at the call waiting screen, PCBoard makes no attempt to reinitialize the port. Y While at the call waiting screen, the port and modem will be reinitialized after five minutes of inactivity. NOTE: In some modems this can help keep the modem from getting modem reset errors while other modems will instead be more prone to such errors. Experiment with this setting if you are getting modem reset errors during recycles. Reset Modem During Recycle After a caller hangs up you can automatically have PCBoard send the standard ATZ to your modem to initialize the power-on defaults of your modem. This might be useful if your modem experiences unexplained modem reset errors. Valid options for this field are: N After a caller is disconnected, PCBoard will not send the ATZ command to your modem. Y After a caller disconnects from your system, PCBoard will send an ATZ command to restore the power-on defaults of your modem. NOTE: In some modems this can help keep the modem from getting modem reset errors while other modems will instead be more prone to such errors. Experiment with this setting if you are getting modem reset errors during recycles. Modem Off-Hook During Recycle Normally after PCBoard disconnects a caller, it will leave the phone on-hook. Those callers calling in will get a ring. This is usually desirable because PCBoard recycles very quickly under normal circumstances. At most, callers may get two to three rings before the modem answers the phone. If you wish, you can configure PCBoard to make the phone busy until it is ready for the next caller. Valid options are: N PCBoard will leave the phone on-hook (incoming callers will hear rings). Y The phone will be taken off-hook causing incoming callers to get busy signals until after PCBoard has completely recycled and is waiting for the next call. NOTE: In some modems this can help keep the modem from getting modem reset errors while other modems will instead be more prone to such errors. Experiment with this setting if you are getting errors during recycles. Modem Delay During Recycle Some modems can get confused if you attempt to recycle the system too quickly resulting in modem reset errors. Setting a value of 1 or higher can help slow down the recycle process and give your modem more time to be reset without experiencing a modem reset error. In addition, this value can be used to 'tune' the speed with which PCBoard recycles. On buffered modems, a higher setting will insure that all data gets transmitted. If your remote callers are not receiving all of the information before carrier is dropped, try increasing the value entered in this field. Packet-Switch Network If you are running in any kind of environment where PCBoard is directly connected to a cable and not directly connected to a modem (e.g., a PAD, packet-switch network, X.25) you need to inform PCBoard via this field. Valid options are: N PCBoard operates in a normal manner expecting a modem to be directly connected to the serial port you specify. Y PCBoard will assume that the modem is not directly connected to the serial port specified. PCBoard will not send an initialization string when recycling after a call (or at startup). PCBoard will know that a call needs to be attended to when a ENTER is sent over the connection. You should also use this setting if you are using a null-modem cable to connect with another machine. NOTE: It is important that the CTS/RTS, RD/SD and CD/DTR signals be wired properly if you select Y for this field. Verify CD-Loss When the Carrier Detect (CD) signal goes out, it generally indicates that the connection has been broken and that the caller has disconnected. However, some modems will drop the CD signal while auto-bauding (changing baud rates) in search of a more efficient speed. This is generally caused by changing line noise conditions. Valid options for this field are: N When the CD signal goes out, PCBoard will assume the caller has hung-up and will recycle the system. In a PAD or packet-switching environment loss of the carrier detect signal never indicates auto-bauding. In fact, a PAD will often bring the CD signal right back up. To avoid accidentally putting the next caller into the last caller's session, select this option. Y To avoid detecting CD loss when, in fact, the caller is still on-line, you must answer Y. When the CD signal goes out, PCBoard will verify that the modem is not simply compensating for line noise. This will avoid PCBoard automatically thinking that a caller has hung up when the CD signal goes out. Leave DTR Up at Drop to DOS When selecting the DOS - Not Busy button on the call waiting screen, this option controls whether the DTR signal is left on or not. Valid option are: N The DTR signal will be turned off. Y The DTR signal will be left on. Answer on True Ring Detect Normally, PCBoard waits for RING to be sent from the modem and then sends ATA to the modem to answer the phone. This proves to be the most reliable method for answering the phone. If you desire, you can choose to have PCBoard watch the ring detect line as signaled by the serial card. Valid options are: N PCBoard will use the more reliable method of waiting for the RING to come from the modem before attempting to answer the phone. Y PCBoard will answer on a true ring detect as signaled by the serial card. You should only enable this option for those modems which do not return the verbose RING response when the phone is ringing. Number of Rings Required This setting allows you to customize the number of times you want the phone to ring before PCBoard tells the modem to pick it up. For example, you may be in an environment where the phone is normally used for voice calls but at night you want to be able to dial into the system. By setting this value a high number most voice callers will hang up before PCBoard answers the phone. NOTE: For CallerID detection to work, you must set this number to at least 2 since CallerID is passed in between the 1st and 2nd ring. Monitor Missed Connections After an incoming phone call is detected, there are four possible outcomes. They are: The countdown will run to completion without establishing a connection (no handshaking, or handshaking failed to complete) A NO CARRIER message will be issued by the modem before the connection is ever completed (aborted handshaking sequence) A connection will be established but carrier is lost before the caller logs into the system A connection is established and the caller successfully logs into the system Valid options for this field are: N Only those connections which are fully established will be written to the caller log. Y Normally PCBoard only writes successful login information out to the caller log. Selecting this option will instruct PCBoard to write one of three lines corresponding to the first three possible outcomes listed previously. 1. NO CONNECT / FULL COUNTDOWN 2. NO CONNECT / NO CARRIER 3. Carrier Lost Force NON-16550 Usage Some of the early 16550 UART chips are buggy. The bug is most often seen when data output gets behind where it should be and only proceeds when typing more characters. If the command prompt is incomplete, but gradually, one character at a time, becomes more complete as you type a command, then you likely have one of the buggy 16550 UARTs. Valid options for this field are: Setting Force NON-16550A Usage to N will generally make the problem go away, but you lose access to the FIFO buffers. A better solution is to replace the defective UART chip. N PCBoard will not modify the way that it treats the UART it detects. Y Even if PCBoard detects a 16550 UART, it will treat it as if it was a 16450 UART. If you suspect that some of the advanced features of your 16550 UART are defective, you may want to select this option. Force 16550A Usage Some multi-tasking environments, such as OS/2 or Windows, use device drivers to virtualize the comm port. In the process of doing so, they may hide the 16550A UART, making it appear to be a 16450 UART when accessed by a DOS application. Valid options for this field are: N PCBoard will assume the UART it detects is the real UART you have installed. Y This option forces PCBoard to operate as if a 16550A UART was detected. This enables the use of FIFO buffers for both transmit and receive operations. Do not set this option to Y if you do not have a 16550A UART. Share IRQs on MCA Buses PS/2s and other Micro Channel based machines have the ability to share interrupts among different hardware devices. This setting will not work unless the IRQ is being shared with software that is loaded before the multitasker. Valid options are: N PCBoard will operate in normal asynchronous mode where it expects each port to have a unique IRQ for each port. Y PCBoard will try to share the interrupt that is used by the serial port. NOTE: Sharing interrupts slows down processing. Therefore, it is recommended that you only use this option when necessary. Allowed Access Speeds Allow Callers at 7,E,1 The majority of PC communications will communicate at 8,N,1 which refers to 8 data bits, no parity, and 1 stop bit. However, some of your callers may use the less frequently used 7 data bits, even parity and 1 stop bit (7,E,1). N Callers who call in using 7,E,1 will be refused access to your system. Y Callers may connect with your system using 8,N,1 or 7,E,1. Be aware that if a caller connects using 7,E,1 then file transfers will be disabled for that session. This is done because 7,E,1 does not have the capability of properly transferring binary data. Lowest Desired Baud You can set a minimum speed that a caller must have to log into your system. For example, if you want to let only users who have are able to connect at 1200 or higher then you would enter 1200 in this field. The next three fields on this screen determine if you will allow slower speeds and if so, at what time during the day lower connection speeds will be allowed. Allow Lower Speeds Sometimes you may want to allow callers to connect at a slower speed than the one entered in the Lowest Desired Baud field. PCBoard will give you the ability to let users connect at a slower speed but only during a specific time during the day. N Users must connect at a speed equal to or greater than the value that you enter in the Lowest Desired Baud field. If a caller attempts to connect at a slower speed a message notifying the user that the connection speed is not supported on your system will be displayed. Y Users may connect at a slower speed than the value that you enter in the Lowest Desired Baud field. However, the connect must be made during the time range that you define with the Begin Time and End Time field on this screen. Begin Time In this field you can specify the beginning time (hhmm format) when users can call in at a slower speed then what is defined by the Lowest Desired Baud field. All times you enter must be done in 24 hour format. If you answered N to the Allow Lower Speeds, the starting and ending times are ignored. End Time In this field you can specify the ending time (hhmm format) when users can call in at a slower speed then what is defined by the Lowest Desired Baud field. All times you enter must be done in 24 hour format. If you answered N to the Allow Lower Speeds, the starting and ending times are ignored. Security Level Override If you enter any security level other than 0 in this field, users that have an equal or greater than security level will be able to login to the system regardless of the time of the login. The security level override is valid regardless of the Allow Lower setting. Node Configuration Board Name In this field, enter here the name of your bulletin board system. This name is shown to the caller at connect time together with the PCBoard copyright notice. In addition, it is displayed when someone uses the I user command and at the top of the call waiting screen. You can enter up to 63 characters to identify your bulletin board system in this field. Origin This field is reserved primarily for use with netmail networks to identify your system. The format of the information you enter here depends on the netmail software you are using and the netmail system you are connecting to. Contact the netmail software authors and/or your netmail system administrator for details. Parallel Port Num (1-3,0) There are a few places within PCBoard where you can send output to the printer. For example, you can press ALT-P while a user is on-line to start capturing the text on the screen to the printer. Likewise, you can toggle printing of the caller logs from the call waiting screen. All of these functions need to know what LPT port to send the output to. In this field, enter the LPT port you want PCBoard to send printout to. Valid entries are 0-3. If you enter a value of 0, no printer output will be sent. Running a Network / Multitasker System If you are running more than one node on your system, you need to let PCBoard know so that it may use the proper file sharing routines and otherwise take care of other multiple node concerns. N PCBoard will allow a single node to operate. No file sharing will be used and many of the user and sysop commands relating to multiple nodes will be disabled. Y PCBoard will enable file and record sharing so that multiple nodes can access system files at the same time. PCBoard uses the DOS standard for file sharing. If you enable this option, make sure that you have either load SHARE.EXE in your AUTOEXEC.BAT, or that your multitasker/network provide the sharing functions that are completely compatible with SHARE.EXE. If you have told PCBoard that you wish to run more than one node, you will need to assign each node a unique node number. You enter the node number in the Node Number on the Network field. Node Number on the Network In this field, enter the node number you wish to assign for the node you are configuring with PCBSetup. Node numbers must be from 1 to the highest number supported by the software you have purchased. Numbers higher then that will default back to 1 by PCBoard. If you answered N to the Running a Network question, the answer to this question will be ignored. Float Node Number The ability to float node numbers is a feature designed for enabling a large group of local network users to login to a limited amount of PCBoard nodes. What makes this feature even more desirable is that you can mix these local nodes with your dial-in nodes (if you have any). When this option is enabled, PCBoard will start looking for a free node number in your system starting with the node number you defined earlier on this screen. If a node is found, the user will be logged in, using the free node number. If no free nodes can be found, a message is printed to the user stating that no nodes are available and that they should try again in a few minutes. The setup for floating nodes is more complicated than simply enabling a switch in PCBSetup. You will need to modify some of your batch files and other system files to make it work properly. For additional information on setting up float nodes, see the Networking section in the Multiple Nodes chapter of this manual. Valid options for this field are: N Node numbers will not be floated. You will want to use this switch for your dial-in nodes since you most likely want their node numbers to remain fixed. Y Node numbers will be floated. As mentioned previously, this is most useful when you are operating in a local environment where several callers are trying to get into a few single nodes logging in across a network. Network Timeout on Errors (20-99 secs) This is the number of seconds that PCBoard should wait after it has detected a network time-out before failing the operation. You can enter any value between 20 and 99 seconds. In other words, it is common for resources on a network to be in use at the time that another user wants to use the same resource. This is normal and should be allowed. You should set this value depending on the size and speed of your system. The bigger and slower the network is, the longer the network time-out delay might need to be. Node Chat Frequency (once every 5-99 secs) In this field, enter the number of seconds that PCBoard should wait in between each checking of the USERNET.XXX file. This file is used for node chat requests, broadcasts, drop to DOS commands, mail waiting notices, etc. The lower the number the less delay there will be after an action is requested. However, a low number also increases traffic on the network or multinode system and can slow it down. Include City Field in WHO Display When the WHO user command is used in PCBoard, a display of the users that are currently logged onto the system is shown. Depending on how sensitive the city/location information is to your callers you may choose to show the city/location information of each users from the WHO display. N Only the node number and the user currently logged in will be displayed in a WHO display. Y The WHO display will include the city/location field of each of the users currently online. Show ALIAS Names in WHO Display For some systems it may not be desirable to display the alias names in the who display even though aliases are allowed. For example, a public system with an adult section might allow adult oriented aliases in the adult conference, but displaying those names in a public WHO display might not be desirable. Other systems, which are either not adult oriented or are not open to the public, may not experience this situation in which case showing the alias might be preferred. Valid responses for this field are: Remember: You must install the Alias PSA for PCBoard to allow alias names on your system. N Always display the real name of the caller in the WHO display even if their alias is current active. If you have only certain areas that allow aliases it might look funny if you have a user named JIM SMITH on one node and CAPTAIN HOOK on another. Y When the user's alias is active, show their alias in the WHO display. Using Slave Cards (slows file access) Answer Y to this question if you have an Alloy Slave system and are running NTNX prior to version 2.0. NOTE: This option will slow down access to some files. Event Setup An event is simply a batch file that gets executed during a specific time of the day. In this event batch file you could do some of the following things: * Pack your users and/or message bases * If you are part of a mail network, you will most likely transfer mail packets * Some third party products you use on your bulletin board may need to run utilities to update data bases, etc. * Create a list of files on your system using PCBFiler and the /LIST parameter. * Backup your system The previous examples are but only a few of the things you can do in your event. Since events simply execute batch files you are more or less limited by your imagination as far as what you want to run in your event. To define your event information you need to select Event Setup from Main Menu of PCBSetup. When you select this option, you will see the following screen: Is a Timed Event Active Enter a Y in this field if you want to run the events that you have defined in your EVENT.DAT file. If you wish to disable running events, enter an N in this field instead. Name / Location of EVENT.DAT The EVENT.DAT file holds all of the information that defines the timed events on your system. To edit/define the events that you will run on your system, you need to edit your EVENT.DAT file. By pressing F2 while the Name / Location of EVENT.DAT field is highlighted, the editor for your EVENT.DAT will be loaded Your screen should now resemble the following: This is known as the event editor. There are several fields that you can edit which control the batch file that will get run for an event and the times when you event will be run. The number to the left of each line is the event number that is being defined. The rest of the fields on the screen are as follows: Act You may enter either a Y or an N in this field. A Y signifies that the event is active and should be executed as configured. If you enter an N, the event will be considered inactive and will not be run as defined. Mod The mode of the event. You may enter either an E or an S in this field. If you enter an E then the event is an expedited or non-sliding event. If you enter an S as the event type, the event is referred to as a sliding event which will run the next time the node returns to the call waiting screen after the event time. If an event is an expedited or non-sliding event, PCBoard will make its best attempt to execute the event at the time you specify as the beginning time even if it means cutting user's time short. Batch File In this field, you need to specify the batch file you wish to execute for the event being defined. You are given 8 characters for the batch filename. The reason for this is that by default this batch file will be run on all nodes. However, you can make node specific batch files by making the node number the filename extension. For example, if you entered a batch file of DAILY and you wanted node 5 to execute a different batch file then you would create a DAILY.005 file in the same directory where the DAILY file is located. Begin Time This is the earliest time that your event will be run. The time that you enter in this field must be in 24 hour format and there must be a colon between the hour and minutes. End Time The end time is the latest possible time that you wish for the event to run. If the event has not run by the time you enter, the event will be skipped. Days You may also control which days that the event you are defining is run on. In this field all seven days of the week are listed beginning with Sunday and ending with Saturday. Simply enter either a Y or N which signifies whether you want to run the event on the day listed or not. Date This field enables you to specify the dates that PCBoard will run the event. Entering a 00 signifies a wildcard. For example, if you want the event to run on the first day of every month, then you would enter a date of 00-01-00. This event would run on the first day of any month of any year. Another example would be to set the date to 01-01-00. This event would run the first day of every year. Last Date Contains the date that the event was last run on the node number that is specified in PCBSetup | Node Configuration. Not all events run system- wide therefore this field only contains the last date ran for the node you are currently editing. While you are in the event editor, the following keyboard commands are available to you: E Exit the event editor. When you are finished editing your event data file, use this keyboard command to exit the editor. If any changes to the file have been detected, you will be asked if you wish to save the changes. F1 Access on-line help. If you use this keyboard command, on-line help relating to the field that is highlighted is displayed to you. F2 Edit the event batch file(s). When the Batch File field is highlighted, this keyboard command will use the text editor defined in System Manager to edit your event batch file(s). If you have more than one batch file for the event (node specific events), a selection box will pop up enabling you to pick the event batch file that you wish to edit. PgDn View the next 15 entries. On each screen of the event editor, 15 entries can be displayed. If you want to view the next 15 entries in the file, use this keyboard command. PgUp View the previous 15 entries. To view the previous 15 entries of the event data file, use this keyboard command. ALT-I Insert a new line. If you need to add a new entry between two existing entries, use this keyboard command. A new blank entry will be inserted just below the current line. ALT-D Delete current line. This keyboard command will delete the currently highlighted entry. There is no undo function to get the original line back. If you make a mistake, exit without saving and attempt to make the changes again. ALT-R Repeat current line. If you are creating entries that are very similar in definition, you can use this keyboard command to duplicate the currently highlighted entry. The new entry will be inserted just below the current line. The Events section in the SysOp's Guide chapter of this manual contains a more thorough discussion of events and how to define them for your system. Location for multiple nodes Because the event data file stores information about each node, it is required that all nodes access the same data file. If all nodes do not use the same file, your events may not run reliably. Location of EVENT Files This field stores the location where your event batch files will be located. When an event runs, it will look for the event batch file to be located in the subdirectory that you specify. Location for multiple nodes You should insure that all nodes in your system point to the same location for event files. The event system was designed to store the batch files in one physical location. If the nodes on your system all point to different locations, your events will not operate properly. Minutes Prior to Suspend All Activity If an event is defined as an expedited event, you can define the number of minutes prior to the event time that all activity on the system will cease. If your event is defined to run at 2:00am and you configure PCBoard for a 15 minute suspense time, PCBoard will attempt to insure that every user has logged off by 1:45am. The suspense time is used as a safety zone to make sure all users that are in doors or other applications outside of PCBoard's control will return to the system in time for the event. Another reason why you may want to suspend activity prior to the event actually running is to let any file transfers finish. Even though PCBoard will make its best estimate in regards to how long it will take to download files, sometimes line noise or other line conditions will extend the time of the transfer. By suspending activity prior to the event actually running, you can help insure that all of your expedited events will run on time. During the suspense time, the phone is taken off-hook and a message is printed at the top of the screen to let you know that PCBoard is waiting for the event time. During this time, the phone will be busy to all callers that attempt to call. Disallow Uploads Prior to Event This field is used primarily to try to guarantee that the system will be able to run an expedited event at the time you have defined. When downloading files, PCBoard knows how many bytes will be downloaded and approximately how long it will take for the transfer to take place. When a user uploads a file, PCBoard does not know how big the upload will be or even if it will consist of multiple files (batch protocols only). Because of this unknown factor, you may want to restrict uploads before an expedited event runs. Valid options for this field are: N Do not make any special restrictions in regards to uploading files prior to an event. If the user has any time left on the system, they may begin an upload. This could mean that a user could begin an upload just before they are forced off (because they still have time available). Because no restrictions are made on uploads, they could overrun your suspense time and even your normally scheduled event time. Normally when you use this setting you would want to have a substantial suspense time to help compensate for large uploads. Y Disable uploads prior to a schedule event. The value that you enter in the Minutes Prior to Disallow Uploads field will determine when uploads will be disabled if you choose to disable them before an event. Minutes Prior to Disallow Uploads For this field to have any meaning you must have chosen to disallow uploads prior to an event. In this field enter the number of minutes prior to the event running that you wish to disallow uploads. You can enter any value between 0 and 99 in this field. If you enter 0 in this field, uploads will be disabled anytime the user's time limit is adjusted for an upcoming event. Subscription When you have enabled subscription mode, you can control the security level and conference access of each user based expiration date entered in the user record. When a user logs into the system on or after their expiration date, they are considered to be expired. PCBoard will then assign the user the security level entered in the expired security level of their record. This security change will be in effect until the user is no longer expired. In addition, the user will be denied access to any conference that they do not have the X conference registration flag set in. By selecting Subscription from the Main Menu of PCBSetup you can choose to enable subscription mode. If subscription mode is enabled, you can also modify some of the parameters that control how subscription mode will be handled. Enable Subscription Mode Subscription mode will make PCBoard look at the expiration date of each user to determine if their subscription has expired or not. When the user's subscription is current, they are given their normal security level and are able to join any conference they are registered in. When a user is expired, they are assigned their expired security level and may also have their conference access restricted. This setting will determine whether or not subscription mode will be enabled. Valid options for this field are: N Subscription mode is disabled. The user's expiration date is ignored even if the user would normally be expired. Y Subscription mode is enabled meaning that PCBoard will check the expiration date of all users when they logon. The security level and conference access of the user will be set according to the user record (Expired Security Level and X conference flags). Default Subscription Length in Days This field controls what the expiration date of new users will be. The number of days entered in this field will be added to the current date to determine the expiration date of the new user. If you enter a default length of 0, the expiration date of new users will be 00-00-00 which is a date that will never occur and therefore they will never expire. In other words, a setting of 0 disables subscription mode for new users. Default `Expired' Security Level Just as you can set a default expiration date for new users, you can also choose the default expired security level for new users as well. Simply enter the security level that you wish to assign to the new user when they expire. Remember that a security level of 0 locks the user out of the system. Warning Days Prior to Expiration The value that you enter in this field will determine how many days a user will be warned before their subscription expires. PCBoard will display the WARNING file at login specified in PCBSetup | File Locations | Display Files during the warning period. Configuration Options From the Configuration Options menu selection you can control the way PCBoard behaves in various circumstances. There are options in fields that control file transfers, messages, and many other things. Messages Number of Highest Conference Desired In this field enter the highest conference number you want to be able to define on your system. PCBSetup will use the number entered in this field to determine the highest conference number you can define from the Conferences Main Menu Option in PCBSetup. If you enter a value higher than 39 in this field, you may have to update your conference allocations from System Manager | Users Info File Maintenance. Whenever you change the value in this field, you should load System Manager and see if you need to update your conference allocations. If you are running multiple nodes make sure all nodes have the exact same value for this field. If all nodes do not have the same value for this field, then it is quite possible one or more of your nodes will not load because the conference allocations would not be in sync for all nodes. Maximum Lines in the Message Editor This field gives you the ability to limit the total number of lines that a user may enter if they use PCBoard to enter their message. This means that the limit you enter in this field will be enforced when a user uploads a REP packet using the QWK command or even if they upload the message into the message editor. You can enter any value between 17 and 400. The value that you enter in this field can help control the length of messages that are entered by your users. If your users are leaving excessively long messages then you may want to lower the maximum number of lines to help encourage your users to be more brief in their messages. NOTE: Any messages that are posted by software other than PCBoard (such as an off-line mail reading door) may not honor this limit. Anytime that third party software adds a message to a message base it is up to the author of the program to honor the settings you have defined. Message Capture - Maximum Messages This setting allows you to control the maximum number of messages that can be captured into a message capture file or a QWK packet. The reason for setting this value to something other than a maximum number would be to either, limit the length of time it takes the caller to download a set of messages, or to keep a message capture from filling up the disk (especially if a ram disk is specified for the location of temporary files). Message Capture - Max Per Conference This setting allows you to control the maximum number of messages in each conference that can be captured into a message capture file or a QWK packet. The reason for setting this value to something other than a maximum number would be to either, limit the length of time it takes the caller to download a set of messages, or to keep a message capture from filling up the disk (especially if a ram disk is specified for the location of temporary files). Name of Capture File (blank=caller#) The name you enter is this field will be the file that is created for message captures. A user can create a message capture file using the C, D, and Z subcommands of the R user command. If you leave this field blank, the caller number will be used as the filename instead. The capture file PCBoard creates, is stored in the Location of Temporary Work Files specified in PCBSetup | File Locations | System Files. It is quite conceivable that a user could exceed the limits you have set for maximum messages per capture or conference. In a situation where this occurs, they may decide to perform another capture. To prevent this new packet from overwriting the packet they just barely downloaded, PCBoard will rename the capture file using the following conventions: If the filename field was left blank or if the capture filename is 7 characters or less, PCBoard will increment the filename by adding the letter A to the end of the caller number after the first packet is downloaded. If yet another packet is downloaded, PCBoard will add a B to the caller number and so on. If you specified a capture filename that has 8 characters in it, PCBoard cannot add a new character to the filename and still have a valid DOS filename. Therefore, it will increment the last letter in the capture filename until it reaches the letter Z. Name of QWK Packet (blank=capture name) In this field, enter the name that will be used when creating QWK mail packets for users to download. If you leave this field blank, then PCBoard will use the filename that you entered as your capture filename (in the previous field). Be forewarned, however, that if you leave the capture filename blank as well, that your QWK packets will not be created. The reason that no packet will be created is that the QWK mail standard expects to have a consistent base filename to work on. Of course, the caller number varies with each call so that cannot be used as a QWK packet name. Usually, the best thing to do is to summarize your board name in 7 characters or less, use that abbreviation as the capture filename, and then leave your QWK packet filename blank. As with capture files, if a user attempts to download more than one packet during a call, PCBoard is going to increment the filename so that the recently downloaded packet does not get overwritten. QWK files are handled a little differently. PCBoard will give the first QWK packet an extension of QWK. If another packet is downloaded, PCBoard will give it an extension of QW0 and so on. Stop Clock for Capture File Download During the download of a message capture or QWK packet file, you can determine if you want to charge the user time for downloading the file or not. The valid options are: N Any time spent downloading a capture file or QWK packet will be counted against the user's daily/session time limit. If the user had 30 minutes available before the transfer began and it takes them 5 minutes to download, they will have 25 minutes of time left. Y No time will be deducted from the daily/session time limit when the user is downloading a capture file or QWK mail packet. You may choose to set this option to give your users extra incentive to download messages and read them offline. Disable Message Scan Prompt Normally when you login to PCBoard it will ask you if you wish to scan for messages. This option controls whether or not that question is asked. Valid responses are: N With this setting, PCBoard will ask if the message base should be scanned each time a user logs into the system. In addition, any conference that you join and did not scan at login will also ask if you wish to scan the new mail. The difference is that at login, PCBoard will scan all conferences you have selected for new mail. It will show you how many messages are new and if any are addressed to you. If you join a conference which you have not selected for scanning and are prompted to scan for new mail, only the current conference will be scanned. Y The prompt which asks the user if they wish to scan for messages will be disabled. This means that the user will not be asked at login or even when they join conferences. Allow ESC Codes in Messages ESC (escape) codes are generally used to transmit ANSI sequences across the modem. These codes could define color changes, cursor movements, etc. To enter the ESC character into the message editor the ASCII 029 character should be used instead of ASCII 027. This will avoid any conflicts with the full-screen editor and its use of ESC. From the keyboard, the ASCII 029 character can be entered by holding down A while typing 029 on the numeric keypad (a double sided arrow will be printed). This option controls whether or not you want to allow users to enter the ESC character in the message editor. The valid choices are: N Users will not be allowed to enter the ESC character in their messages. In effect this would disable users from entering ANSI color screens in their messages. This in itself is not a bad idea, because not all of your callers would be capable of ANSI color graphics. Colors can still be used in messages using PCBoard's @X color codes. PCBoard can interpret the @X codes to determine if the caller is capable of color and change the color if they are. Y Users may enter ESC characters in their messages. This would allow users to enter ANSI screens inside of message. Remember that not all of your callers will be capable of ANSI so the ESC codes may appear to be garbage if a user is not capable of ANSI. Allow Carbon-Copy Messages When a group of people are targeted for a particular message, one of the most practical methods for getting the message across is to carbon copy the message to several users. This can be done by typing SC while at the message editor command prompt. Instead of simply saving the message, the user will be prompted for additional names the message should be carbon copied to. Each of the users specified in the list will be sent a copy of the message that is saved. The valid options for this field are: N The ability to save carbon copies of a message will not be available to any user on the system. Y Users may save carbon copies of messages to other users on the system. The maximum number of carbon copies can be adjusted for each conference from the conference options screen. Validate TO: Name in Messages To insure mail gets properly addressed to users on the system, you can enable this option to verify names entered in the TO: field of messages. When a name is validated, PCBoard checks to see if the user name entered exists in the user file. If no validation were done, a user could enter a message to a user who does not exist and wonder why a response was never received. The valid options are: N No validation of the name that messages are addressed to will be performed. This means that it is up to the user to properly enter the name of the user. Y PCBoard will make sure that the name to whom the message is being addressed, exists on the system. If the name does not exist, the user is warned that the user name could not be found and given three options. The user can choose to re-enter the name, continue with a name which does not exist, or perform a Soundex search to see if a similar sounding name could be found. NOTE: Regardless of how you answer this question, no name validation will be done in a conference which has been configured as an echo conference. Force COMMENTS-to-the-Sysop into Main When you have several conferences on your system, you might find it very desirable to consolidate all of the messages that are entered using the C user command into the Main Board. This will make it easy to read all of your comments without having to join all of the conferences on your system to see if you have mail waiting. The valid options are: N Leave the comment to the SysOp in the conference that the user was in at the time the message was written. The advantage to selecting this option is that if the user mentions something about the conference configuration but does not reference the number or name you will know what conference they are referring to. The disadvantage is that you may find comments in any conference on your system. Y Any comments to the SysOp (using the C user command) will be moved transparently to the Main Board conference. The advantage to selecting this option is that all of your comments will be in one single location. An additional benefit would come into play if your have netmail conferences and do not want the comments to the SysOp to get transferred to the other systems in the network. Double-Byte Characters (Foreign Systems) PCBoard supports double byte (DB) characters by allowing changing line delimiters in the message base. If you enable this feature you will be able to use DB characters in your messages, however, it is important to realize that the format of messages stored in this format are not compatible with systems or third party software that do not have DB characters enabled. Do not enable DBCS unless you need it. The valid options are: N When you select this menu option, PCBoard stores message in the standard message base format. Y Using this option will cause PCBoard to use a different line delimiter in the message base. This may very well render any third party software for the message bases useless (unless they also recognize DB characters). NOTE: If you change this setting, you will need to delete all of your message bases because they are stored in a different format based on this setting. If you do not delete the message bases, your users may see message headers with no body. Create MSGS File if Missing If the message file is missing when a user joins a conference, PCBoard will normally create the file. In certain situations though, it may be desirable to let PCBSetup create any missing message files for you. In particular, if your system has a lot of nodes (e.g., more than 75), it would be quite possible that some other process could be accessing the message base (such as PCBPack) and for PCBoard to not find the message base. PCBoard would create the message base which could destroy the pre-existing message base. The valid options are: N PCBoard will not create the message base file if it does not exist when a user joins a conference. This will disable all of the message functions if the message base does not exist, but it will still allow the user to join the conference without the risk of interfering with other processes. The only way to create the message base would be to exit and save from within PCBSetup having your entire system checked. If PCBSetup finds a missing message base file it will create it for you. Y For most systems, this will be the desired setting. This way you do not have to worry about creating the message base file. Instead, PCBoard will do all of the work for you. Default to (Q)uick on Personal Mail Scan There are two formats that can be used for scanning for personal mail - the long and quick formats. The quick format uses one line per conference and lists the number of messages scanned and how many were addressed to you. The long format displays more information and consequently takes more than one line for each conference. This option allows you to determine if the quick format will be the default for message scans. Valid options are: N All mail scans will default to the long format. If the short format is desired, the Q subcommand can be used on those commands which involve mail scans. Y When you select this menu option, all mail scans will default to quick mode. If long mode is desired, the L subcommand can be used on those commands that involve mail scans. Default to Scan ALL Conferences at Login When you login and just after PCBoard scans for new bulletins, you are asked if you wish to scan the message base since the last message you have read. This option will decide if only the current conference will be scanned or if all selected conferences will be scanned. Valid options are: N When this option is used, only the current message base will be scanned for new messages. Normally this would refer to the Main Board, but you could define auto-rejoin conferences so that users rejoin the conference they logged off in. Y All conferences that have been selected for scanning will be searched for new mail. Remember that conferences are usually selected for scanning using the SELECT user command. Prompt to Read Mail when Mail Waiting When a new message has been left for a caller, that caller will be informed of the new message with a pop-up message that indicates which conferences have new mail. You can control whether the user is asked to read the mail right now or if only the pop-up message is displayed. Valid options are: N Display the pop-up message only. The user will not be asked if they wish to read the new mail. Y As soon as the pop-up message is displayed, the user will be asked if they wish to read the mail that is waiting for them. NOTE: Not all messages that are left on the system will set the mail waiting flags. For example, some third party software will not update the flags nor will any generic messages you enter in PCBoard (e.g., @USER@, @##@) File Transfers Disallow BATCH Uploads Normally you will want to encourage uploads to your system any way possible, and disabling batch uploads can hinder rather than promote uploads. However, for systems that accept uploads from foreign computing environments, such as a Macintosh, where the file naming conventions do not translate straight across to the DOS environment, it can sometimes be necessary to disallow batch uploads. This avoids the problem that occurs when the batch protocol tries to convert the filenames. Valid options are: N This option will make PCBoard operate normally -- users may do batch uploads. Y Users will not be able to do batch uploads when this option is set. Because a user must enter a valid DOS filename to begin an upload, this setting will force any file uploaded to the filename specified by the user. As mentioned previously, this will prevent a problem when uploading a filename from a foreign system which may try to create an invalid DOS filename. Promote to Batch Transfers PCBoard has two commands for uploading files ( U and UB ). The U command is usually recommended if one file is going to be uploaded and the UB command would be used to upload more than one file (a batch upload). Some of your users may find this method complex or easy to forget and therefore, you are given the ability to automatically promote the U command to the UB command. Valid options are: N The U command will always prompt for file one at a time. Batch transfers could still occur by performing an unannounced upload with a batch protocol. However, the descriptions will not be asked for up front. Y The U command will automatically be promoted to the UB command if the caller has selected a batch protocol (or no protocol at all). Upload Credit for Time The value that you enter in this value will determine how much of the time spent while uploading files will be refunded to the user if their upload passes your integrity checks. The default is 1.0 which means that by default PCBoard will stop the clock during an upload. That is, for every minute a caller spends uploading, 1 minute of credit will be refunded. Effectively, the caller will have the same amount of time left after the upload terminates as when the upload began. Setting this value to something higher, such as 2.5, will refund 2.5 minutes of time for every minute spent uploading. This means that if a user uploads for 2 minutes, they will receive a five minute refund. Remember, that they also spent two minutes downloading so this means that a net credit of 3 minutes would be received.. Once disconnected from the system, any time credits are lost. NOTE: No time credit will be added if the user's time has been adjusted for an upcoming expedited event. This will help prevent your system from missing the expedited event. Upload Credit for Bytes This value defines the number of credits given to the caller for each byte uploaded. The default is 0 giving no credits at all. In other words, the user would have the same amount of daily download bytes available as when they began the upload. You can reward the user for uploading by setting this value to any value above 0. A setting of 1 would give the caller a 1 daily download byte credit for every byte uploaded. The upload byte credit is a credit against the daily download byte limit. Therefore, the credits must be used on the same day in which they are posted or they will be lost. NOTE: If you are testing your uploads via PCBTEST.BAT then the upload must pass or no credit will be given. Include 'Uploaded By' in Desc. When a user uploads a file, this option will control whether or not the user who uploaded the file will be added as the last line in the description. Enabling this option is useful for quickly determining who uploaded a particular file to the system. N The name of the user who uploaded the file is not added to the description by PCBoard. Y An additional line to the end of the description entered by the user will be added to each file uploaded. This additional line will say Uploaded by: followed by the user name who uploaded the file. Verify Files Uploaded After a file is uploaded, you can have PCBoard shell out to a batch file called PCBTEST.BAT to perform tests on the file that is uploaded. The filename being tested is passed to the batch file as the first parameter. You can use any program you want in the PCBTEST.BAT file to test any criteria that you desire. Most SysOps are quite content to verify the integrity of compressed files and to check all files for viri. For more information on PCBTEST.BAT please see the Batch Files chapter of this manual. Valid options are: N No testing will be performed on files that are uploaded. Y PCBoard will test each file (individually) after the upload is complete. Disable Drive Size Check PCBoard normally checks the size of the hard disk and the amount of free space left before allowing an upload to take place. This information is displayed to the caller when they begin their upload (for informational purposes). You can choose whether or not to enable the drive size check. Valid options are: Y PCBoard will not check to make sure sufficient space is available before an upload begins. Likewise, the amount of free space on your upload drive will not be printed to your callers. If your system does not properly support the checking of free space or if you simply do not want the information shown to your callers, select this option. N PCBoard will check to ensure that there is enough free space on the hard drive before beginning an upload. The amount of free space that is checked for is determined by the Stop Uploads when Free Space is less than field on this same configuration screen. Upload Buffer Size (4-64) Enter the size of the upload buffer. This setting can affect the performance of your system during uploads. You should experiment with different values between 4 and 64 for your own system to see what works best. It is recommended that you set this value to a multiple of the cluster size of your hard drive. For instance, if you have a hard drive partition that is greater than 256 megabytes but less than 512 megabytes then your cluster size is 8 kilobytes. A setting of 8 should be the minimum used for the best performance. List of Slow Drive Letters If you have a slow server, a CD-ROM, or even more importantly, a carousel (multi-disk) CD-ROM, it may be beneficial to copy files that are to be transferred off the slow drive down to the temporary directory which could possibly be a faster local hard drive or ram drive. You can indicate for which drives this copying step should be performed by typing a list of drive letters in this field. For example, if you enter IKX in this field, any file that is downloaded from drive I, K, or X will be copied to the temporary directory before the download begins. For those who have a device like a carousel CD-ROM (multiple CD-ROMs but only one is read at a time) you can specify a range of drive letters that make up the device. For example, let's assume that you had a CD-ROM carousel that held 6 discs and used drive letters H, I, J, K, L, and M. To make PCBoard treat all 6 drive letters as one device you would enter H-M in the slow drive field. The dash is used to represent a range of drive letters. By entering H-M you are telling PCBoard to treat drives H, I, J, K, L, and M as one device. When copying files from a drive on your system, PCBoard will lock access to that slow drive so that system performance is not driven into the ground. If the drive is already slow there is no sense to try copying two files at the same time. PCBoard is going to impose a maximum wait period of 90 seconds for a slow drive to finish copying a file. If the slow drive is not free by that time, PCBoard will simply download the file directly from the slow drive. Now you can see why it is important to be able to specify a range of letters to treat as one device. Without this capability, it would be quite possible for a CD-ROM carousel device to spend most of its time swapping disks rather than exchanging meaningful data so that users could get more done is less time. NOTE: If there is insufficient space in your temporary directory to hold all files that are requested for download, PCBoard will not copy the file. Instead, it will continue with the download of the file leaving it on the slow drive for the transfer. Slow Drive Batch File If you have designated some drives as slow drives, you can optionally have PCBoard execute a batch file once the file has been copied. PCBoard will run the batch file that is specified in this field and pass the filename as the first parameter to the batch file. Inside of the batch file, you can run a program to set the comment in a compressed file or whatever your needs dictate. Stop Uploads when Free Space is less than The value that you enter in this field is multiplied by 1024 to determine the number of bytes that should be free on your upload drive before allowing an upload to occur. For example, if you enter 100 here, you will need to have 100 kilobytes of free disk space or PCBoard will not allow the user to upload any files. The fact is, you do not know how big an upload is going to be and you want to make sure that you do not run out of storage space on your drive or it may present a problem for other users. The most detrimental situation would be if you store your users file and your uploads on the same drive.. If you allow that drive to fill-up, your user file could not be increased in size. If the user file cannot grow, new users will not be allowed to log into your system. If you store system files on the same drive as your upload drive, you should set this value to something in excess of 3000 to give yourself some safe breathing room. The best alternative may be to use separate drives for your system files and files that get uploaded to your system. System Control Disable NS Logon Feature If a user adds NS to their response at the Do you want graphics prompt at login, PCBoard will not display the news file. The will enable the user to login to the system faster than they would if they had to view the news file. You may find that some users will use this option without ever manually checking the news. This would not present a good situation if you use the news file to display important information. Valid options are: N Allow users to skip the news file at login. Y Do not allow users to skip the news file at login. Disable Password Check (DOS) If you have your modem configured to automatically answer the phone (instead of PCBoard), you run the risk of a security breach when returning back from a non-shelled door application. What could happen is that the user could drop carrier after they exit door but before PCBoard reloads. If it takes a while for PCBoard to reload, a user could conceivably establish carrier before PCBoard reloads. Of course, if there is carrier when PCBoard resumes, it must assume that the user is still on-line. In a situation like this it might be desirable to verify the password of the user when returning from a door. Valid options are: N When returning from any door application, PCBoard will not ask for any passwords. This is the desired setting for most systems since they will be configured to let PCBoard answer the phone. This eliminates the possibility of having someone connect while PCBoard is reloading. Y The option gives you the ability to verify the password of the user that PCBoard thinks is on-line upon returning from a non-shelled door application. The disadvantage to this is that your callers may become easily annoyed especially if they open several doors. You should only enable this if you must force your modem to answer the phone instead of PCBoard which is not recommended. Multi-Lingual Operation In PCBSetup | File Locations | Configuration Files the filename for the multi-lingual data file is specified. PCBoard uses this file to determine which operational languages can be selected at login. You may want to be able to quickly enable or disable multi-lingual operation. Valid options are: N Multi-lingual operation is disabled. Even if you have defined the languages in your mult-lingual data file, the user will not be prompted to select a language. Y Select this option if you have defined your languages in the multi-lingual data file and if you want to prompt your users to select a language at login. Disable Full Record Updating You may want to protect certain user information that a user is normally allowed to edit with the W user command. This option will determine if the user can edit their city, phone numbers, comment #1 field of their user record using the previously mentioned user command. The valid options are: N All fields that can be edited using the W user command can be modified. Y All fields with the exception of the city, passwords, and comment #1 fields can be edited by the user. Allow Alias Change after Chosen After a caller has selected an alias it may not be desirable to allow the caller to change the alias without SysOp intervention. Preventing the caller from changing his alias avoids problems where one caller tries to leave messages (or do other things) using various names to create confusion. N Once the alias is entered the first time (using the W user command), the user may not change their alias. Instead, they must request that the SysOp change their name. Y The user may change their alias at any time by using the W command. NOTE: For aliases to be active you must install the Alias PSA from within System Manager. Run System as a Closed Board Normally PCBoard will allow new callers to call in and log into the system creating a new user record in your users file as they log into the system. However, you may wish to restrict new users from logging into your system. Valid options are: N New users may login to your system without being restricted. Y New users will not be allowed to login to your system unless a NEWASK questionnaire exists. If the NEWASK questionnaire exists, the user will be allowed to login, and answer the questions. However, no user record will be created for this user. The intention here is that you can use the NEWASK questionnaire to screen your callers and then manually enter a user account for them. Enforce Daily Time Limit Depending on the nature of your system, you may want to restrict your users to an absolute daily time limit, or simply a session limit. With a session limit, your users can call back as many times as desired during the day but they are only allocated a certain amount of time for each call or session. N With either this option set or if the Enforce Time Limit field in the PWRD file is set to N for the security level of the user, the time limit defined in the PWRD file will be considered a session time limit. Y When this option and the Enforce Time Limit field in the PWRD file is set to Y, the time limits defined are daily time limits. Allow One Name Users Normally PCBoard requires that two or more names be used when logging into the system. There are some people that have only one name (believe it or not) and some SysOps like to run alias systems where real names are not used and these sometimes are only a single name. An additional possibility for a one name user would be when you assign all of your users a number or unique ID for their name. Valid options are: N Users will be forced to enter at least two names to login (e.g., first name and last name). If they attempt to login with one name, PCBoard will inform them that they must enter a first and last name to login. Y Users may enter one name to login to the system. If the majority of your users will have one name, you may want to modify the Enter your first name prompt in PCBTEXT to say something like Enter your user name instead. Allow Password Failure Comment When logging into the system, the user is given four attempts to enter the correct password. This field controls what happens if the user does not enter the proper password after four attempts. Valid options are: N The user will be informed that the password is incorrect and that they are being logged off for excessive password failures. Y The user will be asked if they wish to leave a comment to the SysOp. This option would be useful because the caller could give you a voice number or some other type of identification so that they may login to the system again. Otherwise, they would have to create a new user account to get your attention. Warning on Logoff Command If you have users that accidentally log off of your system quite often, you may want to use this option to ask the user if they really wish to log off of your system. Valid options are: N The connection will be terminated without confirmation. Y PCBoard will ask that the user confirm that they really wish to log off. This confirmation can be skipped even when enabled if the BYE user command is used instead of the G user command. Allow Local SHELL to DOS You may want to disable the ability for users who are logged in locally to shell to DOS using the F5 key. Valid options are: N Do not allow local shells to DOS. That means that whenever a user is logged in locally, they cannot press F5 to shell to DOS. This would be useful if you have a lot of users who log in locally and you want to refuse their access to DOS. Y While logged in locally, F5 will shell the user to DOS allowing them to enter DOS commands. Use NEWASK+Standard Questions When a new user calls in PCBoard will normally ask either the built-in new user questions, the ones required to set up a user record in the users file, or it will ask the questions in the NEWASK file and not register the user (if you are running your system as a closed board). Valid options are: N New users will be asked only the standard questions. Y The built-in questions (phone numbers, protocol, etc.) will be asked in addition to the NEWASK questionnaire. This gives you the ability to get more information out of your new users. Read PWRD on Conference Join Normally PCBoard does not re-read the PWRD file after the caller joins a conference. If, however, you have a security level increase (or decrease) in a particular conference you may want to reread the PWRD file to determine new limits for the user. Valid options are: N When the user joins a conference, PCBoard uses the values stored in memory when it initially read the PWRD file. Y Each time a user joins a conference, PCBoard will re-read the PWRD file to update the user's time limit, ratio, etc. Confirm Caller Name / Address If you have a large number of users, it is quite possible that you may have people that attempt to login using common names. For example, you may already have a BOB SMITH on the system (from Tulsa, Oklahoma). A few months later, a new user attempts to login as BOB SMITH and is greeted for a password prompt. Obviously, there is a name conflict, and the new user will have to pick a new name. This field allows you to confirm the city name of the user before asking for the password. Valid options are N Do not confirm the city name after the user name is entered. this setting is recommended if you do not have a large user base (5000+ users) Y This setting is recommended if you have a large user base. After the user name is entered, PCBoard will confirm the city/location information. Auto-Reg in Public Conf When a new user calls in, PCBoard will automatically register the caller in public conferences where the security level required to join is set to 0. It does this by scanning all existing conferences and setting the R, X, and S conference flags in the user's record. This process can take a long time if you have a large number of conferences. Valid options are: N Do not automatically register users in public conferences. Users will not have any conference flags set in the public conferences aforementioned. Y Users will have the R, X, and S conference flags set in public conferences which require a security level of 0 to join. Encrypt Users File For some installations of PCBoard, the ability to encrypt key information in the user file is critical. For example, when PCBoard is used for local access across a network it would not be unlikely for one of your users to copy your USERS file from the network. However, if your file is encrypted, they will not be able to easily obtain the critical information of the user file. The following field in each user file will be encrypted: password city phone numbers (data and voice) the two comment fields If you do plan on encrypting your user file, then you need to run ENCRYPT.EXE on your user file. This is the utility that will actually encrypt the user file. This field, is used only to tell PCBoard if your user file has been encrypted. Valid options for this field are: N Your user file has not been encrypted. This will force PCBoard to access the user file as if it has not been encrypted. This will be the setting for the majority of PCBoard systems. Y If you have already run ENCRYPT.EXE on your user file then this will force PCBoard to work in encryption mode. Your user's file will be encrypted on disk, but PCBoard will properly translate the encrypted data as it reads the data from disk. It is critical that this setting be the same on all nodes. Otherwise, PCBoard encrypted data could be mistaken as unmodified data (or vice versa) and end up corrupting information in the user file. Configuration Switches Disable 3-minute Screen Clear At the call waiting screen, PCBoard will automatically clear the screen after three minutes of inactivity. In essence, PCBoard is enabling a screen-saving feature. Valid options for this field are: N PCBoard will enable the screen-saving feature after three minutes of inactivity. This is especially useful if you leave you monitor(s) on for extended lengths of time. Y Do not clear the screen if the system has been inactive for more than three minutes. Disable Registration Edits Normally, PCBoard attempts to control what the user can enter at certain prompts when a user is logging into your system as a new user. The prompts that are effected by the setting of this switch are: first and last name prompts (high ASCII characters are normally disabled) new user questions (phone numbers, city/location, etc.) For example, when PCBoard asks for the phone number of the user, it is expecting that only numbers and certain punctuation characters be entered in this field. If you use MKPCBTXT to ask a question other than the user's phone number you most likely do not want to restrict entry of that field to numbers. Valid options are: N PCBoard will operate in normal mode. This means that certain fields will have restricted output. Y Any data can be entered in the affected fields. In essence, these fields become free-form edit fields where no checking is performed. Disable High-ASCII Filter With non-error correcting modems line noise could come in the form of any characters including high ASCII characters. Since most users do not enter these characters at the keyboard, this switch is used to control if high ASCII characters can be entered at various prompts and in the message editor. Of course if you want to allow your users to enter high-ASCII characters or if you are using a foreign language which makes use of the high-ASCII then you may want to disable the filter. Valid options are: N PCBoard will continue to filter high ASCII characters. If you are doing this to prevent line noise from being input you may want to reconsider because error-correcting modems are gaining in popularity which will prevent line noise from being mistaken for valid input. Y The high ASCII filter is disabled allowing users to enter these characters at most prompts and also inside of the message editor. This would be the ideal setting if you use languages that make use of these characters or if your users upload a lot of graphics screens. Default to Graphics At Login Throughout the operation of PCBoard, the default choice is usually the safest choice. In certain circumstances, however, you may not want this. For example, if the majority of your users have ANSI capabilities but regularly press ENTER at the Do you want graphics prompt then they will default to no graphics. You can make it so that the default selection at that prompt is to select ANSI graphics based on the answer you enter in this field. Valid options are: N This will provide the safest choice. If a user presses ENTER when asked if they wish to have graphics, PCBoard will default to non-graphics mode. This way a user does not see meaningless ANSI escape sequences if they are not capable of ANSI. Y If the user presses ENTER when asked if they want graphics, PCBoard will default to ANSI graphics mode. If the user is not capable of ANSI graphics, their screen will appear to filled with garbage characters. You may only want to use this if a majority of your callers are capable of ANSI. Use Non-Graphics Mode Only If you do not want to have ANSI graphics mode available to your callers, you may want to enable this option. When this option is enabled, PCBoard will not even ask the user if they want graphics. Instead, it will assume that the user does not want graphics. PCBoard will still send the ANSI detection sequence to see if the user is capable of ANSI so that screen displays can be drawn faster, etc. Users can still change their display mode by using the M user command. Valid options for this field are: N Operate if a normal fashion by letting the user determine if they want graphics or not. This means that the question about wanting graphics will be asked at login. Y The user is not asked if they want to use graphics. Instead, PCBoard is going to default to no graphics. Exclude Local Logins from Stats On the call-waiting screen, PCBoard keeps track of how many calls, messages that have been entered, and files that have been transferred since the last time you reset the stats. This option will control whether or not the actions that take place on local logins (Sysop or user logging in from the call-waiting screen) will affect the stats on the call-waiting screen. Valid options are: N All calls, whether remote or local will affect the call-waiting stats. Y Do not increment the statistics on the call waiting screen when yourself or another user logs into the system locally. Exit to DOS After Each Call Normally PCBoard recycles after each call by closing all files and restarting itself. However, you may need to perform some task between the time PCBoard disconnects the caller and returns to the call waiting screen. An additional possibility is that you may need to load another application which answers the phone instead of PCBoard. If either of these situations fit into your configuration, you will need to exit to DOS after each call. Valid options for this field are: N Recycle using the normal sequence (return directly to the call-waiting screen). Y Exit to DOS after each call. In the structure of the default BOARD.BAT file, PCBoard is going to branch to the :END label. Therefore, you should place any DOS commands that you want executed after each call after the :END label in your BOARD.BAT file. Eliminate Screen Snow in PCB When PCBoard updates the screen, it does so by writing directly to the video buffer which can, on some CGA-based systems, cause snow to appear on the screen while it's being updated. Your callers will not see this but it could be distracting to you. N Operate normally in respect to writing data directly to the screen buffer. If you have a CGA adapter, you may need to select Y instead. Y Disables the screen snow that is possible with certain CGA adapters. Selecting this option will slow down screen updates slightly. Display NEWS Only if Changed This field has one purpose -- to control when the news file will be displayed to the caller. Valid options for this field are: A Display the news file every time a conference is joined. If this is what you desire, you may find that the conference INTRO (defined in the configuration for each conference) may be better suited for this purpose. N Display the news file for each conference once per day. Once the news file has been displayed that day, it will not be shown again. Y Display the news file only if the data of the news file is the same as or more recent than the caller's last logon date. Display User Info at Login This field controls whether or not you wish to display some user statistics at login. Information such as the last call date, the number of calls made to the system, expert mode status, and similar information is displayed. Valid options are: N Do not display user information at login. Nearly all the information PCBoard displays can be accessed using @ macros. Therefore, you can incorporate the user statistics into one of your display screens if you wish. Y The user statistics will be displayed just before the conference command prompt when a user is logging in. In addition, when a user joins a conference, they will be shown the last message they have read, the high message number, and the number of active messages in the conference. This will only be displayed once per conference. Pre-load PCBTEXT File All of the prompts and other messages that PCBoard displays come out of the PCBTEXT file. You can speed up some of PCBoard's displays by having PCBoard load this file into memory. This is called pre-loading. Valid options are: N When needed, read the information required from the PCBTEXT file on disk. This may slow down performance, but it saves the memory that would otherwise be taken by pre-loading the file. Y The PCBTEXT file will be loaded into memory. This will reduce the amount of time that it takes to display information from the PCBTEXT file. In addition, if you store the PCBTEXT file on a network server this option will reduce the network traffic on your system. The disadvantage to selecting this option is that additional memory will be used by pre-loading it into memory. Pre-load CNAMES File Whenever a caller joins a conference or scans for mail in different conferences PCBoard must get the conference information from the CNAMES.@@@ and CNAMES.ADD files. This can put on a lot of wear on your hard disk and it can be relatively slow depending on how fast your hard drive or network connection is. You can choose to pre-load the CNAMES information into memory to speed-up access to that information. However, you do so at the expense of memory. Valid options are: N The CNAMES information will not be pre-loaded. Instead, the information will be obtained directly by accessing the disk as needed. Y The CNAMES information will be loaded into memory. This will allow PCBoard to access the information quicker and also increase the memory requirements of PCBoard. Approximately 650 bytes of memory will be used for each conference in your system. Scan for New Bulletins This question determines if PCBoard should scan for new bulletins during every login. Normally, the scan for new bulletins will occur around the time that NEWS file is displayed (when it displays). You may not want to scan for new bulletins if you have a large number of bulletins on-line. N Do not scan for new bulletins. This setting would reduce the amount of time it takes to login if you have a large number of bulletins on-line. Y Scan for new bulletins. PCBoard is able to scan hundreds of bulletins in a very brief amount of time. If you have a lot of bulletins on-line, you may not want to scan for new bulletins to reduce the login time for your users. Swap Out During Shell Normally the PCBoard executable, and all of the data it is currently working on, remains in memory while it is operating. This information remains in memory even when shelling out to DOS thereby reducing the amount of free memory by the amount that PCBoard, and its data, are occupying. This option will control whether or not PCBoard will swap itself out of memory during various shell to DOS operations (executing PCBTEST.BAT, PCBVIEW.BAT, etc.). Valid options for this field are: N When shelling out, do not swap any data out of memory. You will have less memory available when shelling to DOS (usually under 300 kilobytes). Y PCBoard will swap itself out of memory (leaving about 25K of memory behind to re-load) during a shell to DOS operation. It will swap this information out to whichever storage medium is available (EMS, XMS, and finally disk). This will generally increase the amount of memory by about 200 kilobytes or more. Swap Out During $$LOGON/LOGOFF.BAT Due to the need to speed up the processing of $$LOGON.BAT and $$LOGOFF.BAT, PCBoard normally does not swap itself out when running these batch files - regardless of the previous setting (Swap Out During Shell). If you are running software that requires more memory than is available during a non-swap shell to $$LOGON or $$LOGOFF, you may want to swap out when these batch files are run. Valid options are: N The swap during shell setting will be ignored and a normal DOS shell will be performed to execute the $$LOGON.BAT and $$LOGOFF.BAT files. Y PCBoard will swap memory out leaving approximately 25 kilobytes to reload whenever the logon and logoff batch files are executed. Create USERS.SYS for $$LOGON.BAT In order to keep $$LOGON.BAT processing quick, PCBoard will not normally take the time required to create a USERS.SYS file since most programs that you would run in your $$LOGON.BAT file will not require it. N This is the default setting. No USERS.SYS file will be created when the logon batch file is executed. Y If you have an application that needs USERS.SYS while running in your logon batch file, you should choose this setting. Capture GROUP CHAT Session to Disk Normally PCBoard will not capture information that is typed in by callers during group chat due to the disk intensive nature of group chat. If you would like to keep a record of what users type while in group chat, enable this option. Valid options for this field are: N Do not capture what is said during group chat. This will save you disk space and will not burden group chat with any more disk-intensive operations. Y PCBoard will record the what is written but only after a user presses ENTER. The capture file will contain the date, time, user name, node number, and what was typed. Their will be a capture file for each channel (up to 255) in group chat. The location of the chat capture files are determined by PCBSetup | File Locations | System Files. Allow Handles in GROUP CHAT In group chat, PCBoard will normally allow the user to select a handle to be known as while in chat. For some systems the ability for the user to hide their identity might be very undesirable. Because of this, PCBoard will give you the choice to allow users to use a handle while in chat. Valid options are: N Users may not choose a handle while in group chat. Instead, their first name will be used while in group chat. Y When entering group chat, users will be asked to enter a handle they wish to use to identify themselves while in group chat. If the user wants to change their handle while in group chat, they can type HANDLE at the chat command prompt. Logging Options Log Caller Number to Disk PCBoard stores the vital information about each call in what is termed the caller logs. These provide a call-by-call history of each node on your system. You may want to record the caller number of each user for reference purposes. Valid options are: N PCBoard will not write the caller number to the caller logs. Y The caller number of each caller will be written to the log file. The format will be: Caller Number: 9,999,999 Log Connect String to Disk With all of the various connection types and possibilities of today's modems, it might be useful for you to be able to see what type connect a particular user established for their session. For example, if you get a user that complains about slow transfer rates, it could be that the modem did not connect at full-speed initially due to poor phone lines. By logging this information to disk, this information will be available to you. In addition, any CallerID information will be written to disk as well. N The connect string that the modem gave PCBoard will not be written to the caller logs. Y The connect string and any CallerID information will be written to the caller logs. NOTE: In order for CallerID information to be written to the caller logs, you must set PCBoard to answer after at least 2 rings and have this option enabled. Log Security Level to Disk Sometimes it is useful to know the security level of the user at login written to the caller logs. This option will control whether or not the security level at login will be written to the caller logs. Valid options for this field are: N The security level of the caller will not be written to the caller logs. Y The security level of the caller at login will be written to the caller logs. Remember that the security level of a user can be reduced or increased when joining a conference. Limits Keyboard Timeout (in min, 0=disable) Sometimes users will have to walk away from their system or may forget they were on-line. To prevent the connection from being active until the user's time limit expires or they finally remember, PCBoard allows you to set a keyboard time-out value. If no activity is detected from the caller in the number of minutes that you specify in this field, PCBoard will automatically disconnect the caller for inactivity. This will free up the node for other callers to get in and may also save money for those callers that are calling in long distance. In this field, enter the number of minutes of inactivity a user can have before they will be logged off of the system. As a general rule, a value between 3 and 5 would be good for most callers. If you enter a value of 0, the keyboard time-out will be inactive which will enable the caller to stay on-line until their daily/session time limit expires. No warning is given to the user about keyboard inactivity until the final minute before they are disconnected. During this final minute, PCBoard will send a beep every 10 seconds to alert the caller. After this minute expires, PCBoard will disconnect the caller. Max Number of Upload Description Lines This field controls how many lines the user is given to enter descriptions for their uploads. You may enter any value between 1 and 60. Each description line may contain 45 characters of text to describe the uploaded file. In general a limit of 8 to 10 is sufficient for most systems. Maximum Number of Lines in Scrollback While logged on locally, PCBoard maintains a scrollback buffer which you can use to review information that has already scrolled off the screen. The scrollback buffer can be viewed by pressing the o key. The maximum lines that you can specify is about 400 which will use up approximately 64 kilobytes of memory. Setting a lower number will save some memory and a setting of 0 will totally disable the scrollback buffer. NOTE: A minimum of 30 lines is required unless you disable the scroll back buffer completely. In other words, if you set your scrollback buffer to any value between one and 30 lines, the value of 30 will be forced regardless of your setting. DOS Environment Size When Shelled Out When PCBoard shells out to DOS via COMMAND.COM it is possible to request (of COMMAND.COM) a larger environment size. The value you set here will be passed to COMMAND.COM as a command line parameter such as /E:768 (where 768 would be the value that you have chosen). Increasing the environment size may be required if you have a large number of environment variables. In general, a value of 1024 or higher is not recommended. Number Days Before FORCED Password Change When you have installed the Password Changing PSA, it gives you the ability to force the caller to change their password after a certain amount of days. By forcing your users to regularly change their password, you can be help increase the overall security of your system, because a user's password may not be as easy to hack. This particular field allows you to determine after how many days the user will be forced to change their password. A setting of 0 will disable the automatic renewal of forced password changes and, instead, the only way to force a password change is to manually edit the user record (via PCBSM) and change the expiration date on the password. A setting such as 90 will cause the caller's password to expire every 90 days. This will cause PCBoard to automatically require a new password, for continued access, every 90 days. NOTE: For this field to have any effect, the Password Changing PSA must be installed. Number Days to Warn Prior to FORCED Change If the user's password is set to expire, either from manually setting the expiration date, or from the automatic setting caused by the Number of Days Before FORCED Password Change, PCBoard will give the caller a warning of the upcoming expiration during the login process. In this field, specify the number of days prior to expiration that this warning should be displayed to the caller. NOTE: For this field to have any effect, the Password Changing PSA must be installed. Minimum Password Length When the Password Changing PSA is installed, PCBoard will automatically force a minimum length for a password. The minimum password length is determined by the number that you enter in this field. If you enter a value of 0, there will be no password length restriction enforced. NOTE: For this field to have any effect, the Password Changing PSA must be installed. Allow Sysop Page Start Time When the page bell is toggled on from the call-waiting screen or by pressing F4 while logged in, this field defines the time at which you will begin allowing callers to page the SysOp. If the user attempts to page the SysOp during off-hours, they will be informed the SysOp is not available for chat and asked if they wish to leave a comment instead. For example, you might want to be available for chat between the hours of 8:00am to 5:00 pm. If this is what you desire, enter 08:00 in this field. Allow Sysop Page Stop Time When the page bell is toggled on from the call-waiting screen or by pressing F4 while logged in, this field defines the end time at which callers will no longer be able to page the SysOp. If the user attempts to page the SysOp during off-hours, they will be informed that the SysOp is not available for chat and asked if they wish to leave a comment instead. For example, you might want to be available for chat between the hours of 8:00am to 5:00 pm. If this is what you desire, enter 17:00 in this field. Colors Default Color (@X code format) In certain areas of your system, PCBoard uses a default color for displaying text. The color of the text used in the body of a message is just one example. In this field, enter the @X color you want to use as your default color. For example, if you want your default to be light gray on a black background, enter 07 in this field. For more information on @X codes and the various colors you can select, please see the Display Files section in the Customizing Your BBS chapter of this manual. Color for Message Header DATE Line The color code entered in this field will control the color used for the first line of the message header. This is the line that will display the date, message number, etc. For example, if you want the color to be white text on a cyan background, enter 3F in this field. For more information on @X codes and the various colors you can select, please see the Display Files section in the Customizing Your BBS chapter of this manual. Color for Message Header TO Line The color code entered in this field, will control the color used for the second line of the message header. This is the line that will display the user who the message is addressed to. For example, if you want the color to be white text on a blue background, enter 1F in this field. For more information on @X codes and the various colors you can select, please see the Display Files section in the Customizing Your BBS chapter of this manual. Color for Message Header FROM Line The color code entered in this field will determine the color for the third line of the message header. This is the line that displays who the message is from. For example, if you want the color to be white text on a blue background, enter 1F in this field. For more information on @X codes and the various colors you can select, please see the Display Files section in the Customizing Your BBS chapter of this manual. Color for Message Header SUBJ Line The color code entered in this field will determine the color used for the forth line of the message header. This line in the header displays the subject of the message. For example, if you want the color to be white text on a blue background, enter 1F in this field. For more information on @X codes and the various colors you can select, please see the Display Files section in the Customizing Your BBS chapter of this manual. Color for Message Header READ Line The color code entered in this field will control the color displayed on the fifth line of the message header. This line is only displayed when the long style message header is being used by the caller. On this line PCBoard will display whether or not the message has been read by the recipient and what type of security is in use for the message. For example, if you want the color to be cyan text on a blue background, enter 13 in this field. For more information on @X codes and the various colors you can select, please see the Display Files section in the Customizing Your BBS chapter of this manual. Color for Message Header CONF Line The color code entered in this field will control the color displayed on the sixth line of the message header. This line is only displayed when the long style message header is being used by the caller. On this line PCBoard will display the conference number and the type of read that is currently in use. For example, if you want your default to be cyan on a blue background, enter 13 in this field. For more information on @X codes and the various colors you can select, please see the Display Files section in the Customizing Your BBS chapter of this manual. Function Keys Pre-defined function keys allow you to send text by holding down SHIFT and pressing the function key listed to the left of each field on this screen. For example, if you regularly add a signature to the bottom of your messages, you may want to define a function key to do it for you. In other words, when you execute the function key, your signature will be typed in for you instead of you having to type it in. Sending Text You are given 60 characters to enter text you want sent when you execute a function key. The text that you enter in this field will be sent directly to PCBoard with one exception. If you enter ^M anywhere in a function key field, it will be treated as if you pressed ENTER. Sending The Contents Of A File If you need more than 60 characters to be sent by a function key, you can tell PCBoard to send the contents of an entire file. To do this, begin the line with a % followed by the filename that you want to send to PCBoard. Executing A PPE File Another action you can define is to run a PPE file when a particular function key is executed. To run a PPE from a function key, begin the line with an ! followed by the filename of the PPE (including the .PPE extension) you want to execute. Examples Let's assume that you have entered the following information for your function keys: The following describes each action that would occur for the function keys defined in the previous screen capture are executed: SHIFT-F1 This particular example might be used as a signature when leaving messages on your system. Instead of repetitively typing your name you could press SHIFT-F1 to have PCBoard enter all of this text for you. SHIFT-F2 When PCBoard detects file access errors it will write an entry to the caller logs. This entry will usually contain either the word FAIL or ERROR. This particular example would be quite useful if you wished to regularly scan your caller logs to see if your system may have a configuration error or problems accessing certain files. Instead of typing the command in every day, you could use a function key to do all of the work for you. SHIFT-F3 This example demonstrates how to have PCBoard stuff the contents of a file into the keyboard. When you press SHIFT-3, PCBoard will enter the contents of C:\PCB\GEN\NEW-WELC just as if you had typed it yourself. Remember, when you want to have the contents of a file stuffed, you need to begin the function key definition with a % character. SHIFT-F4 The simple fact that you may run a PPE opens up numerous possibilities. The example shown in the previous screen capture would execute C:\PCB\PPE\TAGLINES.PPE. Remember, to specify that a PPE file should be used for a function key definition, you need to enter an ! as the first character of the definition field. In addition, you must also specify the filename extension of .PPE on your file you wish to execute. Security Levels This section discusses the Security Levels menu option of PCBSetup. From this menu option, you can control the security level that is required to execute commands or certain functions. The following page begins by discussing how to protect SysOp functions. Sysop Functions The fields on this screen give you the ability to control what security level is required to execute the SysOp Commands (1-15). Each of the 15 SysOp commands are represented on this screen. The fact that you can assign different levels to different commands, gives you the ability to have several users who help with SysOp duties. You can then give users access to only those commands that they are required to perform their tasks. The rest of the commands can have higher security levels assigned to them to prevent unauthorized access. Sysop Commands Throughout PCBoard there are certain operational characteristics that were designed for SysOp use. For example, there are subcommands available at the End of Message Command prompt that will enable a user to COPY or MOVE the current message to a new conference. Obviously, you do not want all users to have this capability. The security levels required to use functions/commands like the previous example are controlled on this screen. Sysop Level (for Sysop Menu and F1-Temp-Sysop Upgrade) The value that you enter in this field determines the minimum security level that constitutes a user being seen as a SysOp. For example, if you enter 100 in this field, any user with a security level of 100 or higher will be seen as a SysOp by PCBoard. This means that these users will see the SysOp menu at the conference command prompt instead of the normal user menu. Just because a user is seen as a SysOp does not mean that they have free reign on your system. Remember that you can control the security level required to execute virtually all of the functions and commands. In addition, The security level that you enter in this field will be given to the user under the following circumstances. You temporarily upgrade the access of a user that is online by using the F1 keyboard command. This new security level will only be in effect for the duration of the call. When the user calls in the next time, their old security level will be used. There is a conference flag (C) which can be set in the user record which designates a user as a conference SysOp. If this flag is set in a conference that you user joins, their security level will be upgraded to the SysOp security level. This security level change will be in effect while the caller is in the conference where they are designated as a conference SysOp. When they leave the conference, their access will be returned to normal. Level Needed to Read All Comments In this field, enter the security level that is required for a user to be able to read comments that are left to the SysOp. Comments are seen as any messages that are left by users using the C user command. Because comments are assumed to be of the highest security nature, a user who meets the security level requirements of this field may also read any message on the system. Level Needed to Read All Mail Except Comments The security level that you enter in this field will be used to determine if a user may read private mail that is not from or to the current user. If a user has a security level that is equal to or greater than the level that is entered in this field then they may read any private mail with the exception of comments to the SysOp. The level needed to read comments is determined by the previous field on the screen. Level Needed to Copy or Move Messages Between Areas Sometimes it is extremely useful to be able to move or copy a message to a new conference. However, you do not want everyone to have this capability for obvious reasons. In order for a user to have the capability of moving or copying a message to a new conference, they must have a security level equal to or greater than the value that you enter in this field. Level Needed to Enter @-Variables in Message Base With the exception of @HANGUP@ and @DELAY:nn@, all macros can be entered in a message and displayed when viewing the message. For this reason, you may not want all callers to have this capability. For a user to be able to enter all @ macros such as @USER@ and @MORE@ they must have a security level equal to or greater than the value you enter in this field. NOTE: All users, may enter @X color codes in their messages regardless of the security level you enter for this field. Level Needed to Edit Any Message in the Message Base There are two settings in PCBSetup that will determine if a user will be able to edit a message. This setting controls whether or not a user can edit any message they can read regardless if it was entered by them. There is also a setting in PCBSetup | Security Levels | User Levels which controls the security level required for a user to edit messages they have left. Obviously, you are going to want to set the security level required to edit any message higher than the level required to edit the user's own messages as it follows the rules of common sense. In order for a user to edit any message that they can read, they need to have a security level that is greater than or equal to the value you enter in the field on this screen. The ability to edit any message is a some-what powerful function, because you can make it look like people said something in a message that they really did not. Remember, to edit a message you type EDIT at the End of Message Command prompt. Level Needed to NOT Update Msg Read Status (R O cmd) The R O user command enables you to read messages without having your last message read pointer updated. This is quite useful for skimming through the message base because you can spend more time reading the messages at a later time. All of this is possible because when using this command, your last message read pointers are not updated. This particular field will control whether or not PCBoard should avoid marking the message as having been read when you are reading messages in read only mode. You may not want all callers to be able to have this ability and thus defeat your ability to tell if they have read their messages yet. Setting the security level here outside the reach of your callers will keep them from using this capability. Level Needed to Use the BROADCAST Command The broadcast command is used to send a one line message to a user on another node (or all nodes). In order for the user to be able to use the BR user command they must have a security level that is equal to or greater than the value that you enter in this field. Level Needed to View the Private Upload Directory The value you enter in this field will control whether or not a user can view the private upload directory of the current conference while logged into the system. If the security level of the caller is greater than or equal to the value entered, they will be allowed to view the private upload directory. When logged into the system, you can view file directories using the F user command. To view the private upload directory of the current conference, enter P at the directory prompt number. Level Needed to Enter Generic Messages (@USER@) When addressing a message, you can address it to @USER@, @##@ or @##-##@ (where ## is a security level) to make it appear that the single message is a personal message for each individual user. All of these messages are referred to as generic messages because one single message can appear to be a personal message for every user on your system. The advantage of this is that a personal message will get more attention from the user than a message that is addressed to ALL. The disadvantage to using this method is that it can be obnoxious if used too frequently. You can control what users will be able to enter generic messages by entering the required security level to enter these messages in the field on this screen. Level Needed to Edit Message Headers The security level entered in this field will determine whether or not a user will be able to edit additional information of the message header by entering E at the End of Message Command prompt. The ability to edit the message header information gives you the ability to perform such operations as re-addressing the message, changing the security on the message, changing the FROM field, and more. Level Needed to Protect/Unprotect a Message At the End of Message Command prompt, you can enter U to make a message public or P to make a message private. The value you enter in this field will set the security level that is required for a user to be able to enter these commands. Level Needed to Overwrite Files on Uploads When a file already exists on the system, PCBoard will not allow a user to upload the same file. A user that has a security level equal to or greater than the value entered in this field can choose to: * Remove the existing file * Continue with the upload (leaving both the old and new files online) * Abort the upload. Level Needed to Set the Pack-Out Date on Messages When entering a message, you can set the message security to D if you have sufficient security. This will enable you to set a date when the message you are about to enter will be automatically removed from the message base. This would be useful if whatever message you are entering is date sensitive. For example, if you offering a special subscription rate until July 1, 1994, you may want to set the pack-out date of the message to July 2, 1994 so that people logging in after the first will not see the message. Level Needed to See All Return Receipt Messages Normally a Return Receipt is useful only to the person that requested the return receipt. With this in mind, PCBoard will normally not show the Return Receipt to other users, not even the SysOp. In order to see return receipts that belong to others, you must have a security level equal to or greater than the level specified in this field. User Commands Security Levels Required The top portion of this screen is split into two columns. These two columns list most of the user commands that are available inside of PCBoard. Next to each command description is a field. In each field, enter the minimum security level that is required to execute the command. If the user does not have sufficient security, then the user will receive a notice stating that the command is not available. In each field, you can enter any value between 0 and 255. The rest of the commands (that are not listed) will be controlled by one of those that are listed. For example, the FLAG command can be used if the D command is accessible to the user. This makes sense, because the FLAG command simply marks files for download. If the user is not capable of downloading files, you do not want them flagging files. On this screen you will also see four other fields you can define the security level for. Level Required for BATCH File Transfers In order for a user to transfer more than one file at a time, they must have a security level that meets or exceeds the value you enter in this field. When batch transfers are disabled, a user may only upload or download a single file at a time. Level Required to EDIT Your Own Messages In this field, enter the security level that is required for a user to be able to edit the contents of messages they have left on the system. Messages are edited by typing EDIT at the End of Message Command prompt. Users may find that editing their messages would be useful when carrier is lost while entering their message, or if they discover a spelling/grammatical error after saving the message. If you do not want to let your users edit their own messages, set this value to a high security level. Level Given to Users Who Agree to Register This field will enable you to determine what security level new users who agree to register on your system will be assigned. After the NEWUSER file is displayed, PCBoard asks the new user if they would like to register on the system. If they agree to register, they will be assigned the security level you enter in this field. Level Given to Users Who Refuse to Register If a new user decides not to register on your system, they will be given the security level that you enter in this field. By refusing to register, PCBoard is going to allow the user to look around and will not create a user record because they chose not to register. You can immediately log the user off of the system if they refuse to register by assigning them a security level of 0. The security level of 0 will tell PCBoard to inform the user that they are being logged off because they refused to register.