SUBJECT: HOW TO ACT ON A UFO FORMAT BBS FILE: UFO1598
MUFONET-BBS NETWORK - MUTUAL UFO NETWORK ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
THE MUFON MEMBER'S GUIDE TO BBS-ING ! ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Welcome to the exciting world of electronic bulletin boards, also know as BBS's! here you will find literally thousands of text files, program files, graphics, animation, messages from Users like yourself from all over the world, news- wires, games, and the list goes on and on! Before we continue into what you will find on-line, let's take a look at what is required in the way of hardware and software to enable you to access the vast knowledge available in the world of BBS's.
I. COMPUTER REQUIREMENTS
To be able to access a electronic bulletin board, the computer you are using must contain the following hardware and software:
A. HARDWARE - First and foremost, in addition to the basic computer and
keyboard, you must have the following items and their related capabilities; 1. MODEM: Telephone lines are optimized for the transmission of voice signals, which are analog. In order to send computer data, which is digital, over long distances, it is necessary to convert the digital data into analog signals that can be carried over the telephone line. This is the function of the modem.
The modem initially sends out a continuous high-pitched tone at a certain frequency - this is known as the carrier. (This is the screeching noise you hear thru the speaker on your modem.) The transmitting modem then receives information from the computer (low and high voltages), and transmits this information by modulating the carrier (changing the frequency up and down). At the receiving computer, the receiving modem demodulates the signal - it translates the changing frequency back into voltage changes that the computer can understand. (The word "modem" is derived from - MOdulate/DEModulate.)
2. MONITOR: The monitor which you use should be capable of showing a screen with 80 columns (that is, 80 characters or spaces across, from left to right), since most BBS's provide graphics, menus and information in this format.
B. SOFTWARE - For virtually every type of computer, there is a proliferation of
communication programs available. These communication programs can fall into three categories:
1. Commercial software - offered by companies which usually market their programs thru commercial advertising, and sell thru software stores, computer stores, department stores and thru mail order.
2. Shareware - This is software which is distributed on-line thru BBS's, and sometimes in stores. The software is used on a trial basis, at no charge. If you are satisfied with the communications program and continue to use it, you are expected to register and pay for it.
3. Freeware or Public Domain software. This is software which has been released into the public domain, and is distributed free of charge.
Which communications program to use? The choice is usually based on what is compatible with the type of computer you are using, price, ease of use (user friendly), capability and, often, one just recommended by a friend. In the vast region of software, communication programs range from barebone to highly sophisticated. The following paragraph will give you some insight towards choosing a communications program you will be satisfied with.
Do not base your choice of communications program solely on the cost of the software alone; price does not always guarantee a better product, nor does it ensure that the software will best suit your needs. Many of the shareware communication programs rival the commercial ones in performance and features. Your best choice is one that will fit your current and future needs. So, compare features.
TERMINAL EMULATION ~~~~~~~~~~~~~~~~~~~~ There exists many different standards for communications between computers,
whether or not the communication is between a mainframe or a privately run, home computer-based electronic bulletin board (BBS). Terminal emulation usually involves translating the commands that are sent to and from the host computer, to the functions that are defined by the terminal manufacturer.
The communications program which you are using usually contains a number of
terminal emulation files which can be used during computer communications.
Generally, this should be a relatively easy setup, but what makes it
difficult at times in choosing the correct emulation is the proliferation of available communication programs for virtually every computer manufacturer! Coupled with this is the way in which your communication program can be configured for each type of emulation; as some communication programs can change emulations by simply highlighting a emulation on a list, to having to type in a file name and turning on or off other functions.
If the host computer you are connected to uses full screen applications such
as menu system or editor, you may need to use the terminal emulation feature. A few of the mainframe databases such as Compu$erve, GEnie, The Source or Easylink display text line by line. These do not need terminal emulation. However, most BBS's do require the use of terminal emulation by your communication program. The "standard" used by BBS's is "ANSI". Here are a few examples of types of terminal emulations:
ANSI for ANSI color/graphics VT100A for DEC VT100 with ANSI support VT100B for DEC VT100 with ANSI and VT52 support 3101 for IBM 3101 emulation WYSE50 for WYES 50 emulation TVI920 for televideo 920 emulation TVI9XX for televideo 920 and 925 emulation
The list goes on and on. However, for our purposes of communicating with a BBS, our concern is with ANSI terminal emulation. Following is a partial listing of communication programs which support ANSI emulation. [Note: it would be impossible to list all communications programs, since there are virtually hundreds available!]
Bitcom Deluxe 4.08 SideTalk II 1.0 Boyan Communications 4.01 MTEZ 1.0 Qmodem 4.0 PC/InterComm 5.0 Term Communications Software 6.1 MEX/Pack 1.65 TermNet 6.1.1 Professional Sparkle 2.05 BackComm 1.4 Crosstalk for Windows 1.0 SeaDoc 4.51b ProComm Plus 1.1B Quick Link II 2.0 pcAnywhere 3.11A Mirror III 1.01 Smartcom III 1.1 Softerm PC 3.1 HyperAccess 51.0 MicroPhone II for Windows 1.0 APE 1.1 ASCII Pro 4.24 Telix
This is not a recommendation for any of the mentioned communication
programs. Rather, this list is provided as a sampling of what's available. You alone are responsible for determining the suitability of any program with the computer system you operate.
II. TO SUM IT UP?
Rather than to go into considerable detail here of the pros and cons of individual hardware and software, I'm going to present you with a few items and standards that the hardware and software should conform to:
* should be "Hayes" compatible * must be designed for your computer * can be internal or external * baud rate should be a minimum of 300 baud. 1200 baud is acceptable, 2400
baud is an ideal speed
* should have "auto-dial capability (can be dialed from the computer) ("Smart
* auto answer (for receiving calls) * built-in speaker * provision for telephone or voice/data * test mode with self-diagnostics
* compatible with your computer * able to send proper commands to modem * instruct disk operating system to send or receive data * control peripheral devices (printer, etc.) * ability to up-load and down-load files using protocol to detect errors * ability to change communication parameters * provide ANSI terminal emulation * saves configuration settings for the modem
* choice of speeds (baud rate) * dialing directory * ability to re-dial busy numbers * status line to show communications parameters * filtering of unwanted characters * ability to capture text in a buffer for storage * "Host" mode to receive calls * keyboard macros for frequently used commands * variety of terminal emulations (ANSI is a must!) * useful on-line help * saves configuration settings for the modem
WHY DO WE WANT TO COMMUNICATE WITH OTHER COMPUTERS, ANYWAY? ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
* Transfer data files between incompatible computers * Enhance your computer * Business * Personal
- Obtain software
- Get up-to-the-minute news and financial information
- Make travel arrangments
- Get technical advice
- Financial transactions
- Make Friends
- Send and receive mail
- Go shopping
- Personal banking
DATA REPRESENTATION IN A COMPUTER ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ For all their power, computers are very stupid. They only understand two
numbers: 0 and 1, which are represented inside of the computer by low and high electrical voltages. All of the data that the computer deals with (including numbers, letters, and special commands) are represented by 0's and 1's; this is known as binary notation. In order to understand why computer communications works the way it does, it's necessary to take a closer look at how the data is represented internally.
* Each 0 or 1 is known as a bit. Personal computers use combinations of eight
1's or 0's to represent numbers up to 256.
* Each combination of eight 1's and 0's is called a byte. The byte is also
sometimes referred to in communications as a word.
* The string of bits in a byte may look something like: 01000001. The bits in
a byte are numbered from right to left, so the leftmost bit is sometimes referred to as the eighth bit or the high bit.
* Each character (the digits 0-9, alphabetical characters, or special
characters) can be represented by a single byte.
* Many characters (all printable characters) can be represented by only 7 of
the 8 bits in a byte.
* A standardized code for representing characters in binary notation has been
established; this is known as ASCII (American Standard Code for Information Interchange).
AN EXAMPLE OF ASCII REPRESENTATION ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ As an example of the ASCII code, the letter A (Capital A; this is different
from lower case a!!) is represented by the decimal number 65. In binary notation, this translates to:
01000001 So the translation goes something like this:
Character ASCII Decimal Number Binary
A -------------> 65 -------------------> 01000001
Note that the first digit in the ASCII binary representation of A is a zero.
This is true for all "printable" characters (the characters that can be printed on your screen). In a pure text file (similar to a printed page), all of the characters may be represented by ASCII characters that contain 7 bits. This type of file is sometimes called a text file. (Note: Many word processors use the high bit for inserting special codes into documents.) Program files and data files contain data in a special form, so they require all 8 bits. These are sometimes called binary files.
The two different types of files are generally transmitted differently. The
main difference to keep in mind is that any errors (wrong bits) in a binary file will be much more harmful than in a text file.
SERIAL AND PARALLEL TRANSMISSION ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ In order for information to be transmitted from one computer to another, the
series of 8 bits representing each character must be sent. There are 2 ways to do this:
- Parallel Transmission: In parallel transmission, all 8 bits are
transmitted simultaneously (i.e., in parellel). This obviously
requires at least 8 wires from the transmitting unit to the sending unit. This type of transmission is capable of high speeds. Data transmission inside of a computer is in parallel. Parallel transmissin is also often used for connecting printers to PCs.
- Serial Transmission: The 8 bits representing each character are
transmitted one at a time. This slows the data down somewhat;
however, it allows data to be transmitted using only a single wire.
Serial transmission is used for modem communications.
RS232C: THE "NON-STANDARD STANDARD" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The function of the serial adapter is to change the parallel data (inside
the computer) into serial data. The RS232C has been adapted as the "standard" serial interface for microcomputers. However, the standard only specifies the number of wires (25), the size and shape of the connectors, and the functions of certain wires. In practice, there are many different variations in use.
Only 3 wires out of the 25 are absolutely necessary for modem
- Number 2: For data transmission
- Number 3: For data reception
- Number 7: Common ground
(In practice, 9 of the wires are usually used for additional modem functions.)
For the simplest communication connection between two computers, it is only
necessary to run a cable from the RS232C port on one computer to a RS232C port on the second. (The connecting cable is sometime known as a "null modem".) This only works over short distances. For communications over longer distances, it is necessary to use the telephone lines.
SYNCHRONICITY! ~~~~~~~~~~~~~~~~ Sometimes you may hear reference to "asynchronous", "synchronous" or
"bisynchronous" transmission. The differences are as follows:
Synchronous: Depends on precise timing signal from one computer to synchronize the sending and receiving computers. Bisynchronous: Similar to synchronous, but BOTH computers send timing signals.
These methods allow very fast data transmission; however, they are beyond the capabilities of most PCs.
Asynchronous: The simplest and cheapest method- no timing signals are required. Each character is "framed" by start and stop bits to designate the beginning and end of a byte. Asynchronous transmission is usually used for PC modems.
START BITS, STOP BITS, AND PARITY ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Sending a continuous stream of bits from one computer to another would just
be gibberish to the receiving computer- it would be similar to writing sentences without any punctuation marks or spaces between the words:
In asynchronous transmission, it is necessary to separate the individual
bytes of information. This is done with "start bits" and "stop bits". The start bit is an extra bit (usually a "0") that is sent to alert the receiving computer that more data is one the way. At the end of each byte, one or 2 stop bits are sent to designate the end.
Inevitably, some data errors will occur during transmission due to "noisy"
telephone lines or other causes. There are a number of ways to detect any errors- the simplest method is by "parity checking". Parity checking uses the number of "1" digits transmitted in each byte as a method to check the accuracy of the transmission. It requires one additional bit to be transmitted with each byte of data - this is known as the parity bit. Parity may be either Even, Odd, or None. With even parity, the number of 1's in each byte added to the parity bit must be an even number. If the actual data byte contains an odd number, then the parity bit is "1"; if the data byte contains an even number, then the parity bit is "0". At the receiving end, the number of 1's are again summed up…if the number does not agree with the parity setting, the receiving modem asks the sender to retransmit the bad byte.
The type of parity, number of data bits, and number of stop bits are
commonly represented in a "shorthand" language in communications. The 2 most common settings are as follows:
E-7-1 Even parity, 7 data bits, 1 stop bit after each byte N-8-1 No parity, 8 data bits, 1 stop bit after each byte
If these settings are incorrect when communicating, it is still possible to
make a connection…However, your screen will be filled with nonsense characters.
MORE TERMINOLOGY: DIRECTION OF COMMUNICATION ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Different terms are used to refer to the direction of communication.
Simplex: One-way transmission only. (e.g., television)
Half-duplex: Two-way communication over a single channel, but not at the same time.
Full duplex: Simultaneous 2 way communication- uses 2 frequencies on 1 wire (e.g., standard telephone communication)
Echoplex: Same as full duplex, but transmitted character is echoed back to the sender. (This acts as a form of error checking.) Most systems that you will be communicating with will use echoplex; However, a few do not.
THE FUNCTION OF THE MODEM ~~~~~~~~~~~~~~~~~~~~~~~~~~~ The type of modulation used can affect the number of bits that can be
transmitted with each frequency change. In the simplest form, one bit is transmitted with each frequency change. With more advanced techniques, 2 or 4 bits can be transmitted with each frequency change. The speed at which the modem can change the frequency (modulate) also controls the speed at which it can transmit data. Early modems modulated the signal 300 times per second, meaning they transmitted 300 bits of data per second.
To summarize: The sending modem receives the computer-generated data and converts it into
a telephone signal by MODULATING the carrier wave. The receiving modem receives this signal and DEMODULATES it, or translates it back into a signal the computer can understand.
THE EFFECT OF CHANGING SPEEDS ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The term baud rate (or baud) is frequently used to designate the speeds of
modems. Technically speaking, baud rate refers to the speed at which a modem modulates the signal. If only one bit is transmitted with each modulation, then the baud rate is equal to the number of bits per second (bps) that are transmitted. In a 300 baud modem, 300 bits per second are transmitted. However, in higher speed modems, the number of bits per second transmitted is higher than the modulation speed. A 1200 bps modem actually only modulates the signal 600 times per second. However, baud rate is usually used interchangeably with bits per second. Thus, modems are usually referred to as 1200 baud or 1200 bits per second, for example.
300 baud modems are rarely used any more. The most typical transmission
speed is 1200 bps, with 2400 bps becoming more common. (The higher speed modems are almost always compatible with the lower speed ones.) Note: Faster speeds are possible, but they often require complex error-correcting techniques to transmit over standard phone lines.
The effect of varying the transmission speed can be seen by comparing the
length of time it takes to transmit text documents at various speeds. There are about 5.5 characters in the typical word (text word, NOT computer word!), so we can make the following comparison:
Bits Second Characters/second Words/second Words/min.
300 27 5 300 1200 109 20 1200 2400 218 40 2400
Thus, if you have a 50 line document with 10 words per line, it would take
over 1 1/2 minutes to transmit at 300 bps. It would take only about 15 seconds at 2400 bps.
MODEM STANDARDS ~~~~~~~~~~~~~~~~~ A number of standards for designating just how modems send their signals
have evolved over the years. The current standard is the Bell 212A standard, which covers operation at 300 and 1200 bps. The V.22Bis standard is almost universal for 2400 bps operation. For higher speeds (9600 bps) V.32 is being adopted as the standard. However, these standards only specify the form of the data as it's being transmitted, and factors such as what frequencies are used by the modems.
THE HAYES "UNOFFICIAL" STANDARD ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ There is no official standard covering how modems interface with computers.
However, the Hayes standard has become almost universal for microcomputers. Generally, Hayes (or Hayes-compatible) modems have two significant features:
- A set of indicator lights on the front panel (external modems.)
- The modem responds to a standard instruction set and contains
internal memory registers for various parameters.
The indicator lights are labeled, and indicate whether or not the modem is
turned on, the transmission speed, whether the modem is detecting a carrier signal and whether the modem is sending or receiving data.
HAYES MODEM COMMANDS ~~~~~~~~~~~~~~~~~~~~~~ The standard commands control the actual functions of the modem. All
commands are started with "AT". A few of the more common commands are:
AT "Attention"- tells the modem that a command is coming D Tells the modem to dial a number P Selects pulse dial (Rotary telephone lines) T Tone dial (touch-tone phones) A Puts the modem in "answer" mode H0 Hang up
For example, to dial the number 555-1212 on a touch-tone line, the following command would be sent to the modem: ATDT555-1212
The modem can also send response messages back to the computer indicating
when a connection has been made or other conditions. In practice, you usually don't have to worry about issuing the commands directly to the modem; the communications software will do that. However, occasionally it is necessary to modify the commands that the software issues, so it is good to be at least aware of the Hayes command set! The documentation for your modem will contain the commands set.
TYPES OF MODEMS ~~~~~~~~~~~~~~~~~ Acoustic couplers: Use telephone handset Limited to low speeds Rarely used
Direct connect modems: Connect directly into phone lines using RJ-11 jack or other connector. Direct connection eliminates much noise and allows much faster transmission speeds.
Modems may be further broken down into two categories:
Internal modems: Mount internally inside computer, Powered from computer, Contain the equivalent of RS232 interface, Must be designed for specific computer
External modems: "Stand alone" devices, External power supply (AC or battery), Connect to RS232 interface with cable Can be used with any computer
Of course, there are other options available. The proliferation of portable
(or laptop) computers has led to the development of small, battery powered modems for use while travelling. There are even cellular modems that totally free you from having to find a telephone.
CONNECTING YOUR MODEM ~~~~~~~~~~~~~~~~~~~~~~~ Internal 1) Install compatible modem according to instructions. (Modem must be designed for specific computer.) 2) Connect telephone line to modem.
External 1) Need computer with RS232 (serial) port; modem; RS232 cable (if not supplied with modem) 2) Plug one end of cable into RS232 port on computer; other end into modem. 3) Connect telephone line to modem
Both (optional) Connect telephone to modem Note -Turn off power before connecting ANYTHING. -Check all connections (mounting of internal board, or connectors of cable for external) for tightness. -Check phone lines for good connection, no broken wires. -Adapters may be needed for older "4-prong" phone lines. -Use of a modem surge protector is HIGHLY recommended.
If an RJ-11 connector is not available (a frequent problem for travellers
who use their portable computers to go online), there are other options. It is relatively easy to connect to a pay phones or "hardwired" hotel phones by conducting some minor surgery on the phone handset or cable. This is generally harmless, but it should be noted that, strictly speaking, it is also illegal. (Instructions are widely available if you want to know exactly what not to do!)
External only ~~~~~~~~~~~~~~~~~
No lights. Power connection; is switch on?
Power to modem, but no response from Cable -proper type and connections are tight? modem when dialing Software is set for proper comm port?
Modem responds when Busy line(monitor with speaker or phone), poor phone connection (check with phone), dialing, but no Noisy phone line connection.
Connection is made, Change communications parameters (parity and stop bits) but "nonsense" characters appear.
Garbled character "High bit" garbling - file contains control characters - "Strip the high bit appears periodically
Double spacing Both computers are adding CR/LF after each line - change software configuration.
No spacing Neither computer is adding CR/LF after each line - change software configuration.
Connection OK, but Change to half-duplex (Local echo) characters you type do not appear on screen
Connection OK, but Change to full-duplex (No local echo) double characters appear
Occasional garbled Noisy phone line- hang up and try again. character
Sudden disconnection "Call Waiting", phone answering machine. A tip: dialing *70 before the phone number will disable call waiting temporarily.
FILE TRANSFER TERMINOLOGY ~~~~~~~~~~~~~~~~~~~~~~~~~~~ One of the biggest advantages to adding a modem to your personal computer is
the ability to transfer files and programs from your computer to another (and vice versa). A few of the more important terms that you encounter in this area are:
ERROR CHECKING: A method by which files are checked for errors caused by "noise" during transmission.
FILE TRANSFER PROTOCOL: An agreed upon convention for transmitting files between two computers. Usually incorporates some form of error checking.
UPLOADING: Sending a file from your computer "up" to another computer.
DOWNLOADING: Sending a file from a remote computer "down" to your computer.
FILE COMPRESSION: A technique to "squeeze" a file into a smaller package to reduce transmission time.
BLOCK: A piece or unit of a file that the computer transmits.
WHAT KINDS OF FILES CAN I TRANSFER? ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Two computers can transfer digital data to each other. However, the data
sent from one computer may not be usable by the other. Generally speaking, ASCII text files are the "lowest common denominator" and can be understood by all computers. For example, you can send a text file from your IBM to another IBM, an Apple, or a mainframe computer and it will probably be understood.
Binary files are usually understood by only one type of computer. For
instance, you can download an Apple program to your IBM successfully and store it on disk; but the program won't run on your computer. In a few cases, where different computers use the same software, it is possible to send binary files. A good example of this is the files created by word processing software. In addition, programs written in some special languages are "portable"; that is, they can be understood by different computers.
FILE TRANSFERS AND ERROR CHECKING ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ When communicating over telephone lines, some errors are bound to occur as a
result of "noise" in the telephone system. This can lead to characters being altered, or the loss of some characters altogether. During the transmission of ASCII text files, an occasional error like this is generally not catastrophic. Therefore, only simple error checking techniques (such as parity checking) can be used in the transfer of text files.
During the transmission of programs or important data (generally in "binary"
files), occasional errors can be important. The loss or changing of a single bit may result in a program being unable to run, or may ruin vital data. (Think of the result of a single misplaced decimal point in a multi-million dollar financial transaction!)
For this reason, more-sophisticated error-checking techniques have been
developed for transferring files. These file transfer protocols monitor the quality of the data being transferred, and try to re-transmit any data that has had errors introduced. You will often see the terms cyclical redundancy check (CRC check) or checksum. These refer to the type of error checking that is being performed during a file transfer.
FILE TRANSFER PROTOCOLS ~~~~~~~~~~~~~~~~~~~~~~~~~ A file transfer protocol is an agreed-upon method for two computers to be
able to communicate and check the quality of the data being transmitted. The rules governing file transfer protocols establish the amount of data sent per unit (known as a data block), how long each side will wait before giving up on a file transfer, what character will be used to signal receipt of information, and how data will be checked for errors.
For the transmission of a file, the computers will first exchange signals
indicating that each is ready for the start of transmission. The sending computer will then break the file into appropriately sized blocks, and send one block at a time, followed by error checking data and a signal that the block has ended. The receiving computer checks the block for errors that were introduced during transmission. If no errors are detected, it signals the sending computer to send the next block. If errors are found, then a signal is sent telling the sender to repeat the last block. It generally isn't necessary to know the details of how the file transfer protocols work. However, it is important to know what protocols your software supports. In order to tranfer a file, both the sending and receiving computers must use the same protocol.
COMMON FILE TRANSFER PROTOCOLS ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Some common file transfer protocols are:
XMODEM YMODEM (XMODEM- 1K) ZMODEM YMODEM-Batch KERMIT
Probably the most common protocol in use is XMODEM (in several different
forms). Often, you will also see an ASCII protocol available, too. This generally does not employ error checking, and can be only used for the transfer of ASCII files. Any of the other protocols may also be used to transfer an ASCII text file, and will generally do it faster and with fewer errors than ASCII transfer.
FILE COMPRESSION ~~~~~~~~~~~~~~~~~~ Most systems use some form of file compression. This "squeezes" the files
into smaller forms, which minimizes storage requirements and transfer time. However, the files must be returned to their original forms before they can be used.
On IBM compatible systems (MS-DOS), the most common forms of file
compression are ARC and ZIP. Compressed files may be recognized by their file extension of .ARC or .ZIP, respectively. In order to use compressed files, they must be de-archived using a separate program. This is often called ARC, PKARC, PKZIP, or similar names.
Apple computers use similar file compression routines. The most common ones
in use are BLU and ACU. For the Mac, Stuffit is generally used. Specific details on these programs and how to use them can be found in the documentation for each program.
BULLETIN BOARD SYSTEMS (BBS) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ One type of system that you may frequently want to contact is a computer
bulletin board system (abbreviated bbs). Typically, on a bulletin board there is some sort of electronic mail or messaging system, an area for the exchange of files and programs, and other functions such as games. The bbs is run by a system operator, or sysop.
BBSs are run by a wide variety of people. Most are established on home
computers by hobbyists or computer clubs; many people run them just for the fun of it. They range in size from small home systems to sophisticated, mult-line systems. The bulletin boards are generally free, or charge only a nominal fee or request donations. Some specialize in certain types of computers or operating systems, while others welcome all brands.
The message or E-mail area of a BBS is often an excellent place to get help
from knowledgeable users. Also, want ads for equipment as well as messages regarding non-computer subjects can be found. The files area on a BBS is a place for the exchange of shareware and public-domain software, as well as other files. In addition to local messages, some BBS connect to larger networks periodically. In this way, messages are exchanged between local BBS, and in some cases can be distributed nationwide.
SIGNING ONTO A BBS ~~~~~~~~~~~~~~~~~~~~ When you sign onto a BBS for the first time, you will usually be asked for
information such as your name, address and phone number. This information is not given out to the general public; the sysop uses it to verify users and keep users from signing on under multiple names. (It's necessary to keep track of users, as most BBS have daily time limits for each user. Also, it helps to identify destructive users.) You will then be asked to choose a password that you will use for future calls. Some systems then do not allow you access for a day or 2 until your name and address are verified by a voice telephone call.
BBS ETOQUETTE ~~~~~~~~~~~~~~~ When you're on-line to a BBS, it's important to remember that you're a guest
in someone else's computer! Please be sure to follow their rules. In general, remember the following:
1) Use your real and name and address when it is requested...and don't try to use multiple names. 2) Due to their popularity, most BBS have established daily time limits for users. Don't hog too much time! 3) If you download a lot of files, try to upload some occasionally. If you've gotten some interesting software, upload it so others can enjoy it, too. 4) With regards to (3), don't upload any software that you know is hacked or pirated commercial software. Most sysops will delete it anyway. 5) See (4) The same goes for any destructive software (containing bombs, viruses, etc)! 6) When uploading, use file compression whenever possible-it leaves more room on the BBS for more files, and saves you time.
A WORD ABOUT PASSWORDS ~~~~~~~~~~~~~~~~~~~~~~~~ In order to sign on to virtually any online service (including bulletin
boards), it is usually necessary to give both your name (or an identification number) and a password. On free BBS, this is usually only to control the access and ensure that people adhere to the daily time limit.
If someone calls up with your name and password, as far as he computer is
concerned, it's YOU that's online! This is usually not a crisis on a free BBS; however, if someone causes destruction while using your name, you'll have some explaining to do to the sysop. When you start calling services that cost money, though, a dishonest person with your identification can cost you a lot of money. Some services can cost well over $100/hour; you could easily end up being charged several thousand dollars for someone else's fun!
In general, BE PARANOID when it comes to your password! 1) Don't use anything that is TOO obvious for a password (your initials, etc.) 2) Don't write it down anywhere where it might be found easily (documentation books, etc.) 3) Change your passwords frequently (every month or so) 4) Don't leave it on disks that you loan to others (i.e., in an automatic log-on file). 5) Never give it to anyone who asks you for it on-line. NO SYSOP will ever ask for it like this.
NOTE: The same precautions apply when running your computer in "host" mode. You don't want just any casual caller logging on to your computer and getting access to your files!
BOMBS AND VIRUSES ~~~~~~~~~~~~~~~~~~~ One of the more unpleasant aspects of downloading software from sources such
as BBS is the potential presence of bombs, trojans, and viruses. These programs may be relatively benign, or can cause serious destruction. They are generally disguised as, or even incorporated into, innocent looking programs. Sometimes the program may just display an innocent message on the screen; other programs may delete data or format disks.
Bombs or Trojans: Generally cause destruction by deleting files or
formatting disks when the program is run. The program may wait for a certain time period before doing this.
Viruses: Viruses are generally more dangerous than simple bombs. Software
viruses can "multiply" by copying themselves onto floppy discs, and can be spread throughout a collection of discs, or from computer to computer. After it has copied itself a certain number of times, the virus may then cause mayhem by formatting discs, etc.
While the problem of bombs and viruses is not a crisis at this point, you should be aware of them, and take some simple precautions:
1) Most BBS post an updated list of programs known to contain bombs or viruses. Check it occasionally.
2) There are a number of programs available (commercial and public domain) that protect your system against destructive programs.
3) ALWAYS back up your important data in case your disk is formatted. (This is especially important for hard disk users, and should be done routinely anyway!)
Regards, John Komar
Administrator - MUFONET - BBS NETWORK
* *THE U.F.O. BBS http://www.ufobbs.com/ufo * *