<pre>
<div id="preamble">

                            D'Bridge EMAIL System                 
                     Copyright (c) by Nick J. Andre, Ltd.
                      www.nickandre.com      1:229/426

              Programmed using Microsoft Macro Assembler 6.0,
            Turbo Pascal 5.5 and Microsoft Visual BASIC for DOS.

</div>
<h1>User's Manual</h1>
<a name="toc"/><h2>TABLE OF CONTENTS</h2>
<ol>
<li><a href="#0.00">0.00 NOTE FROM THE AUTHOR</a><!-- START SUBSECTION 0.00 -->

<ol>
<li><a href="#0.01">0.01 HARDWARE / SOFTWARE REQUIREMENTS</a></li>
</ol></li>
<li><a href="#1.00">1.00 GENERAL OVERVIEW</a><!-- START SUBSECTION 1.00 -->

<ol>
</ol></li>
<li><a href="#2.00">2.00 SOFTWARE INSTALLATION</a><!-- START SUBSECTION 2.00 -->

<ol>
<li><a href="#2.01">2.01 BASIC EMAIL SETUP</a></li>
<li><a href="#2.02">2.02 BASIC ECHOMAIL SETUP</a></li>
</ol></li>
<li><a href="#3.00">3.00 SYSTEM CONFIGURATION AND MAINTENANCE</a><!-- START SUBSECTION 3.00 -->

<ol>
<li><a href="#3.01">3.01 BASIC CONFIGURATION</a></li>
<li><a href="#3.02">3.02 DIRECTORY PATHS</a></li>
<li><a href="#3.03">3.03 COMM / MODEM SETUP</a></li>
<li><a href="#3.04">3.04 SCHEDULE MAINTENANCE</a></li>
<li><a href="#3.05">3.05 NODELIST CONFIGURATION</a></li>
<li><a href="#3.06">3.06 PACKET MAIL CONTROL</a></li>
<li><a href="#3.07">3.07 XMAIL CONTROL</a></li>
<li><a href="#3.08">3.08 TIME CONTROL SYSTEM</a></li>
<li><a href="#3.09">3.09 FUNCTION KEYS</a></li>
<li><a href="#3.10">3.10 BBS CONFIGURATION</a></li>
<li><a href="#3.11">3.11 SECURITY MISCELLANEOUS</a></li>
<li><a href="#3.12">3.12 DISK SPACE MINIMUMS</a></li>
<li><a href="#3.13">3.13 ACCOUNTING TRANSLATION</a></li>
<li><a href="#3.14">3.14 ZMODEM PARAMETERS</a></li>
<li><a href="#3.15">3.15 SETUP EDITOR OPTIONS</a></li>
<li><a href="#3.16">3.16 ECHOMAIL AREAS</a></li>
<li><a href="#3.17">3.17 WINDOW COLORS</a></li>
<li><a href="#3.18">3.18 KEYBOARD MACROS</a></li>
<li><a href="#3.19">3.19 TRANSLATION TABLE</a></li>
</ol></li>
<li><a href="#4.00">4.00 SYSTEM IDLE COMMANDS</a><!-- START SUBSECTION 4.00 -->

<ol>
</ol></li>
<li><a href="#5.00">5.00 EMAIL MESSAGE EDITOR</a><!-- START SUBSECTION 5.00 -->

<ol>
<li><a href="#5.01">5.01 USING EDIT MODE</a></li>
<li><a href="#5.02">5.02 USING READ MODE</a></li>
<li><a href="#5.03">5.03 ADVANCED FEATURES</a></li>
</ol></li>
<li><a href="#6.00">6.00 UNDERSTANDING THE QUEUE</a><!-- START SUBSECTION 6.00 -->

<ol>
<li><a href="#6.01">6.01 CREATING A PRIVATE NODELIST</a></li>
<li><a href="#6.02">6.02 DUTIES OF A NETWORK ADMINISTRATOR</a></li>
</ol></li>
<li><a href="#7.00">7.00 DBUTIL / UTILITY PROGRAM</a><!-- START SUBSECTION 7.00 -->

<ol>
<li><a href="#7.01">7.01 FIDO AND QUICKBBS STORAGE</a></li>
<li><a href="#7.02">7.02 USING THE SCRIPTING LANGUAGE</a></li>
<li><a href="#7.03">7.03 EXAMPLE SCRIPT FILE</a></li>
</ol></li>
<li><a href="#8.00">8.00 BBS SYSTEMS</a><!-- START SUBSECTION 8.00 -->

<ol>
</ol></li>
<li><a href="#9.00">9.00 GLOSSARY OF TERMS</a><!-- START SUBSECTION 9.00 -->

<ol>
</ol></li>
<li><a href="#A.00">A.00 ACKNOWLEDGEMENTS</a><!-- START SUBSECTION A.00 -->

<ol>
</ol></li>
</ol>
<a name="0.00"/><h2><a href="#toc">0.00  NOTE FROM THE AUTHOR</a></h2>

Hello, my name is Nick Andre, and I am the current developer of the
legacy D'Bridge EMAIL System by Chris Irwin. Much of what you will see
in this online help system is exactly how Chris wrote it some years ago,
and is preserved for historic reasons. I have updated the help system to
include step-by-step walkthroughs and troubleshooting, as well as help
for newer features such as Internet connectivity. If you have any
questions or concerns, please do not hesitate to contact me by the
methods indicated in the appropriate README file for this release.
Thanks!

Nick Andre
<h3><a href="#toc">ANDRE CONSULTING</a></h3>

...

Thank you for selecting D'Bridge, a state-of-the-art electronic mail
system for the IBM PC. The ability to send and receive data electro-
nically has now become almost as common as the telephone for business.
More and more companies are realizing that the most efficient and
cost-effective way to move data is digital. FAX is fine for printed
documents and voice is the most direct way to convey a thought; but
data is the best way for businesses to communicate when the informa-
tion sent and received becomes routine or needs to be fed directly
into one or more remote computers for instant processing.

It is rapidly becoming commonplace for companies to have a "data" num-
ber, just like they had "voice" and "FAX" numbers. In fact, it is al-
ready possible to replace the "FAX" number with a combined "Data/FAX"
number, since reasonably inexpensive modems supporting protocols for
both are already being offered on a fast growing scale.

What can D'Bridge do?  Simple - it can move data, programs, documents,
spreadsheets, pictures, drawings and sounds between continents in just
seconds or minutes, depending on the size. Anything that can be stored
in your computer may be automatically transmitted to other computers
using compatible EMAIL systems anywhere in the world.

D'Bridge isn't alone; there are many other programs out there that can
communicate with it. We chose to implement the most widely used point-
to-point EMAIL system in the world, Fidonet. This means you may commu-
nicate with anyone using the programs: FrontDoor, BinkleyTerm, Intermail,
Fido, Opus, SEAmail, TIMS, SEAmail, TrapDoor and many others.

D'Bridge is just a beginning; look for our release of many innovative
products using our EMAIL system as a "hub". The possibilities of how
D'Bridge can be used are virtually limitless. Worry-free, automated
communications is the key to many new applications: Shared databases,
unattended data collection and automatic order processing to name a few.
I would be happy to discuss your custom application; after all, I am
still a consultant too...

                                     Sincerely,

                                     Chris Irwin
                                     201:201/0@dbnet
                                     1:110/68@fidonet.org


<a name="1.00"/><h2><a href="#toc">1.00  GENERAL OVERVIEW</a></h2>

D'Bridge is one of the most flexible EMAIL systems on the market today
and its menu-driven operation makes it one of the easiest to use. The
communications between D'Bridge systems use the powerful ZMODEM proto-
col, ensuring that your data arrives as quickly and accurately as
possible.

In its simplest form, D'Bridge acts like a messenger between two or more
points; at its best and most complex, it can be a multi-tired network
connecting hundreds (or thousands) of cities using a "hub and spoke"
topology (much like our major airlines and parcel services.)

       MESSAGES

D'Bridge can send messages (text) from one location to another automatically.
Messages may be prepared by using the built-in D'Bridge Message Editor or a
third-party product.  Messages are a simple and cost-effective way for offices
to communicate with each other. It is usually more cost-effective to send
EMAIL messages between offices than to use FAX or TELEX.  With a high-speed
modem, D'Bridge acan transfer hundreds of messages in just a minute or two.

       FILES

Along with messaging, D'Bridge can send files.  Word processor files, spread-
sheets, database files and graphic images are just a few of the types of files
D'Bridge can transfer. Any file which can be put on a standard DOS storage
medium may be sent anywhere in the world within minutes using D'Bridge.

       FUNCTION-REQUESTS

D'Bridge also has the ability to spawn FUNCTION-REQUEST server tasks.  These
programs are designed to process received data then generate output to send
back to the calling sytstem.  Examples of function requests are the programs
that issue "DEMO keys" and collect registration data.


<h3><a href="#toc">DESIGN PHILOSOPHY / BASIC CONCEPTS</a></h3>

D'Bridge is a complex program that allows a user complete control over
its operation. Four integrated programs are involved in the routine
operation of the EMAIL system:

DB.EXE         This is the "shell" program that runs the mailer and editor.

DB01.151       This is the MAILER portion. It controls your modem
               both answering and originating calls; it can control
               your FAX card or the FAX options inside your modem at
               the same time. Think of the MAILER as a fancy timer/
               clock allowing you to program different "events" to
               happen using a weekly schedule. EMAIL is transmitted
               only when the schedule permits; mail schedules can be
               set up to send all mail at the least-expensive over-
               night rates.

DB04.151       This is the EDITOR portion. It is very much like a
               word-processor in operation, but instead of documents,
               there are EMAIL messages. The editor allows you to
               enter, read and reply to messages.

DBUTIL.EXE     This is the utility program. It allows for additional
               functions such as SEND FILE or POLL to be executed from
               a batch file so that nightly data transmissions can be
               automated. With the PURGE option, DBUTIL will purge the
               message base.

There are some basic terms that are important to understand when dealing with
D'Bridge. There is also a complete glossary of terms located in appendix A, but
here are the ones you will need in order to get started:

EMAIL          Electronic mail, or in D'Bridge terms, messages that
               are sent directly between systems or routed through
               a host. EMAIL messages may be public or private and
               may be sent in normal or compressed (XMAIL) form.

NETmail        NETmail or network mail is the name of the EMAIL message
               area for messages sent directly between systems. Each
               NETmail message has an ORIGIN and a specific DESTINATION
               where it is to be sent.


  ECHOmail       ECHOmail is a form of conferencing. When an ECHOmail
                 message is entered on your system, it is automatically
                 "echoed" to all other systems participating in the given
                 conference. ECHOmail messages are generally not private
                 since they can be read by the system operator of each
                 node receiving it.
  
                 ECHOmail conferences are generally topic-specific. For
                 example, there may be an ECHOmail conference about SKIING
                 and one about SCUBA_DIVING. This provides a means of
                 linking lots of people throughout the world in a common
                 forum for discussion.
  
  XMAIL          In D'Bridge terms, XMAIL simply means compressed mail.
                 Compression is achieved through the use of common com-
                 pression/archival programs that store a series of files
                 inside a single archive. By default, ARC by System En-
                 hancement Associates is used to store and compress the
                 mail so that telephone costs may be cut. ZIP, LHA, ARJ,
                 PAK and ZOO are also supported as standard compression
                 methods.
  
                 If you wish to use the XMAIL features of D'Bridge, you
                 will need to get one of these supported archive programs:
  
                 ZIP      PKWARE, Inc.
                          7545 N. Port Washington Rd.
                          Glendale, WI 53217
  
                 LHA      Copyright by Haruyasu Toshizaki
                          Japan
                          Distributed via electronic means
  
                 ARJ      Robert K. Jung
                          2606 Village Road West
                          Norwood, MA 02062
  
                 PAK      NoGate Consulting
                          P.O. Box 88115
                          Grand Rapids, MI 49518-0115
  
                 ARC      System Enhancement Associates
                          21 New Street
                          Wayne, NJ 07470
  
                 ZOO      Copyright by Rahul Dhesi
                          Free noncommercial use permitted


  NETWORK        A NETWORK is a group of computer systems with the
                 ability to send EMAIL on a scheduled or continuous basis.
                 In D'Bridge, NETWORKS are defined by a NODELIST file.
  
  NODELIST       A NODELIST is a text file containing a list of EMAIL
                 systems in a given NETWORK. The list is in a structured
                 form, known as the "St. Louis" format. D'Bridge needs to
                 compile the raw list(s) into its database before a new
                 nodelist file may be used. If you are joining a public
                 NETWORK, you will need to obtain a copy of their NODELIST
                 from a "network administrator". If you are setting up a
                 private NETWORK, you will need to create your own
                 NODELIST file.
  
  MESSAGE        A MESSAGE is the basis of EMAIL communications. A user
                 enters a MESSAGE in the editor and ADDRESSES it to any
                 other system in the NODELIST.
  
  ADDRESS        Each EMAIL MESSAGE has two addresses: the ORIGIN and
                 DESTINATION ADDRESS. The ORIGIN is simply the ADDRESS of
                 the system on which the message was written and the DESTI-
                 NATION is the ADDRESS of the system where the message is
                 being sent. In D'Bridge, addresses are broken up into
                 four segments: ZONE, NET, NODE and POINT. Each of these
                 segments is a number between 0 and 32767. The normal for-
                 mat for an EMAIL ADDRESS is ZONE:NET/NODE.POINT.
  
  ZONE           The ZONE ADDRESS is a number between 1 and 32767 desig-
                 nating a NETWORK or geographic region. In the case of pu-
                 blic NETWORKS, different ZONES have been used to designate
                 completely separate NODELISTS.
  
  NET            The NET ADDRESS is a number between 1 and 32767 designa-
                 ting LOCAL NETWORKS. A LOCAL NETWORK consists of a HOST
                 NODE, BOSS NODES and POINTS.
  
  NODE           The NODE ADDRESS is a number between 0 and 32767 desig-
                 nating the ADDRESS of an individual system. If the NODE
                 number is 0, the system is a HOST NODE.
  
  POINT          The POINT ADDRESS is a number between 0 and 32767 desig-
                 nating the ADDRESS of an individual system acting as a
                 POINT. If the POINT number is 0, the system is a BOSS
                 NODE; otherwise, the system uses its BOSS NODE to receive mail.
  
  BOSS NODE      A BOSS NODE is any system operating with a point address
                 of zero. The difference between a BOSS NODE and a POINT
                 is that BOSS NODES are listed in the NODELIST of a
                 NETWORK, while POINTS are not. A BOSS NODE will HOLD and
                 FORWARD EMAIL and files to its POINTS.


  HOST NODE      A HOST NODE acts as a collecting point for EMAIL and
                 HOST-ROUTED files. When a message and/or file is ROUTED,
                 it is automatically FORWARDED for the appropriate NODES.
  
  EVENT          An EVENT comprises of a number of scheduled parameter
                 changes in order to control EMAIL routing or to execute
                 a series of DOS commands at preprogrammed intervals.
                 The SCHEDULE may hold a maximum of 64 EVENTS that tell
                 D'Bridge what to do.
  
D'Bridge features four basic modes of operation:

MAILER         The normal mode of operation, the MAILER mode of D'Bridge
               is normally running 24-hours/day unless you are running
               D'Bridge only at certain times. While in the MAILER mode,
               D'Bridge sends and receives EMAIL and files based on a
               preprogrammed schedule. The MAILER mode offers a completely
               unattended method for scheduled transfers of data between
               personal computer systems.

               The user has the ability to control the queue of outbound
               file-transmissions and file-requests as well as XMAIL and
               standard EMAIL. No mail will be sent if the system is
               not left in MAILER mode when not in use by the operator.

EDITOR         The EDITOR mode allows you to enter and read EMAIL
               messages sent and received by D'Bridge. The EDITOR is
               a specialized word-processor designed to offer powerful
               functions through a clear and simple user interface.
               The editor can be configured to read hundreds of local and
               ECHOmail areas as well as standard EMAIL.

TERMINAL       The TERMINAL mode allows D'Bridge to act as a ANSI
               terminal allowing the user to call other systems such
               as Bulletin Board Systems (BBS) or commercial systems
               such as CompuServe&lt;TM>. This mode provides upload and
               download capability plus the ability to set up a
               custom dialing directory of systems frequently called.

CONFIGURATION  The CONFIGURATION mode of D'Bridge consists of a series
               of parameter screens providing complete control over
               the operation of the software. There are hundreds of
               user-definable parameters controlling the scheduling,
               communications and routing of the EMAIL. For added
               security, a password may be required to enter the various
               CONFIGURATION screens.


<a name="2.00"/><h2><a href="#toc">2.00  SOFTWARE INSTALLATION</a></h2>

Installing D'Bridge from the release ZIP file is quick and easy.

First, make sure that you mave a copy of both PKZIP.EXE and PKUNZIP.EXE in
the DOS PATH.   PKZIP is a compression/decompression system available from:

                           PKWARE, Inc.
                           7545 N. Port Washington Rd.
                           Glendale, WI 53217

This program is available as a SHAREWARE product and is available for file-
request from most of our dealers in the DBNET nodelist.  It is REQUIRED for
D'Bridge operation.

Next, unZIP the release file, DB-153.ZIP into a subdirectory of your choice.
Assuming that the ZIP file is on a floppy in drive B: type the following DOS
commands:

                ie.

                C>MD \DB
                C>CD \DB
                C>PKUNZIP B:DB-153

At this point, you should have three files in the \DB directory that came
from the release ZIP file:

                DB-153.EXE
                DB-153.DOC
                READ.ME

To install or upgrade D'Bridge, simply type the command DB-153 in the \DB
directory:

                C>DB-153

The installation program will walk you through the installation process.
Once the installation is complete, the file DB-153.EXE will be erased.

Proceed to the next chapter for basic EMAIL configuration.


<a name="2.01"/><h2><a href="#toc">2.01  BASIC EMAIL SETUP</a></h2>

In order to gain a complete understanding of D'Bridge, we suggest that
you use the following guideline to initially configure the software.
Using this section, follow along step-by-step as we install an operati-
onal system.

1.   When D'Bridge is first loaded, it will perform a series of tests on
     its environment, files and peripherals. There are several warning
     messages you may see in the LOG window. Here's a summary of these
     warnings and what they mean:

         WARNING: Unable to initialize modem

         This warning means that there is a modem defined but D'Bridge
         is unable to communicate with it. The software expects an "OK"
         response when the initialization string is sent to the modem.
         A number of things could cause this problem, the most likely
         being that a cable is loose, the modem is off or something is
         set wrong in the COMM/MODEM setup screen; see SECTION 3.03 for
         more information.

         WARNING: 64K free RAM needed for ECHOmail

         If there is not at least 64K of memory free when you run
         D'Bridge, ECHOmail processing is not possible. Increase the
         environment size, remove unnecessary TSR programs, try to
         load DOS into High RAM, if your systems is equipped with that
         feature or, if possible, install additional RAM chips in your
         computer.

         WARNING: Unable to open log file

         The LOG FILE that is defined on the BASIC CONFIG screen has
         an invalid name or can't be created for some reason.
         Check the drive and path; see SECTION 3.01 for more information.


         NOTE: "Demo" key has 27 days left!

         Your demonstration license key will expire in 27 days. This
         warning will only appear if you are running a demo copy of
         D'Bridge. This is here for two reasons: to remind you that
         the software is not free and to make sure that you order a
         permanent license before your demo key expires.

         ERROR: Insufficient disk space on C:

         There is not enough disk space for D'Bridge to operate. This
         is based on the values established on the DISK MINIMUMS screen.
         The solution to this problem is either to free some disk space
         on the "offending" drive or use DB SETUP to change the DISK
         MINIMUMS. (Typing "DB SETUP" from the DOS command line will
         allow you to use the configuration menus without D'Bridge
         coming online).

2.   When the top-left corner of the screen says "IDLE," you may press
     the ESC key to display the main menu. Pressing the ESC key a second
     time will return the system to IDLE mode. Select menu items by
     using the ARROW keys to move to the desired option, then press ENTER.
     Pressing the first letter of any option will select that option im-
     mediately without any other keystrokes.

3.   On the EDITOR menu, select the SETUP EDITOR OPTIONS option.
     (Pressing ESC-E-S is a quick way of getting to this menu from the
     IDLE state.)  Choose answers for all the fields on this screen.
     If you're not sure about a field, leave it blank or accept the pre-
     programmed "default"; refer to SECTION 3.15 for more information.

4.   On the CONFIG menu, select each of the following options and
     fill-in all the fields with the appropriate information. Again,
     if you don't understand something, just accept the "default"
     value or leave it blank.

        Screen                   Section

        BASIC CONFIGURATION        3.01
        DIRECTORY PATHS            3.02
        COMM/MODEM SETUP           3.03
        NODELIST CONFIGURATION     3.05


  5.   If you run a bulletin board system (BBS,) setup the information on
       the ADVANCED MENU, BBS CONFIGURATION screen; refer to SECTION 3.10
       for more information on this screen.
  
  6.   Next, if there are certain mail schedules required for your
       NETWORK, you can set them up in the SCHEDULE MAINTENANCE option
       of the CONFIG menu. Typically, a NETWORK will have at least one
       MAIL EVENT each night. During these events, EMAIL and files are
       allowed to be sent; this allows EMAIL entered during the day to
       be transmitted at night, yielding the highest savings in tele-
       communication costs. See SECTION 3.04 for more information.
  
  7.   At this point, your system should be configured for basic EMAIL
       operation. Assuming that you defined a NODELIST on the NODELIST
       CONFIGURATION screen, it must be compiled before D'Bridge can use
       it. The NODELIST always gets compiled when the system is brought
       up and a new NODELIST exists. If you haven't left the program,
       you can force a nodelist compile by using the BUILD NODELIST
       DATABASE on the UTILITIES menu. This process takes a few minutes,
       so be patient.
  
  8.   Now EMAIL is fully configured and you may continue by reading
       SECTION 2.02, BASIC ECHOMAIL SETUP.


<a name="2.02"/><h2><a href="#toc">2.02  BASIC ECHOMAIL SETUP</a></h2>

It is assumed you've completed the previous section and set up most
of the parameters on all the menus listed. If you haven't done this,
please go back and read the previous section as you configure D'Bridge.

Before you configure the ECHOmail subsystem, it is a good idea to have
a general understanding of what it is and how it works. Once properly
configured, the D'Bridge ECHOmail processor is completely automatic in
operation.

  - What is ECHOmail?

    ECHOmail is a facility allowing for EMAIL-based conferencing in
    any number of message areas at the same time. An ECHOmail message
    differs from a NETmail message only in that there is no DESTINATI-
    ON ADDRESS for an ECHOmail message; it gets sent to ALL systems
    participating in a given conference.

    With ECHOmail, you have the capability of sharing ideas with other
    people in SPECIAL INTEREST GROUPS or SIGS. A conference is created
    for each topic of discussion and you may participate in as few or
    as many as you wish. When you enter a message, it is automatically
    forwarded to all the other nodes you are linking to the conference.
    In turn, all the other nodes forward the message to all the nodes
    they link to; the process continues until your message has been seen
    by every system participating in the conference. Your message can
    be sent to THOUSANDS of systems if a conference is interesting
    enough to attract a large and widespread "audience"!

    ECHOmail is a unique form of communications. People living thousands
    of miles apart can carry on a public discussion on any topic or in-
    terest they have in common. During the Gulf War the CNN television
    network featured a report about D'Bridge being used for fast commu-
    nications between American soldiers and their families at home.
    In fact, within several days a special purpose all-D'Bridge SaudiNet
    had been set up for this particular purpose. While it took regular
    mail several weeks to get to its destination, D'Bridge carried Mega-
    bytes of messages back and forth between the Gulf Region and the
    States within minutes!


      An example of some public ECHOmail conferences anyone may partici-
      pate in are:
  
    DBRIDGE       D'Bridge users conference
    HUMOR         Sick jokes and humor
    POLITICS      International political discussion
    SYSOP         International Sysop ECHO
    ZMODEM        Discussion about the ZMODEM protocol

    For more information about how to receive public ECHOmail, contact
    any of our support nodes and we'll be glad to help you.

  - How does ECHOmail work?

    Each ECHOmail conference is actually an entire network within
    itself. An ECHOmail network is defined by its TOPOLOGY or the
    way in which the network interconnects. The following chart
    describes the topology of an ECHOmail conference from my system's
    point-of-view. (This is just an example...)

                         --------------------
                         1:110/68 (my system)
                         ---------+----------
                                  |
                                  |
                                  |
   /-----------+------------+-----+-----+-------------+-------------\
   |           |            |           |             |             |
---+---    ----+----    ----+----    ---+-----    ----+-----    ----+-----
1:105/3    1:107/150    1:150/613    1:3601/14    2:512/1006    1:110/68.1
---+---    ---------    ---------    ---+-----    ----+-----    ----------
   |                                    |             |
   +-----------+------------\           |             +-------\
   |           |            |           |             |       |
---+----    ---+----    ----+----    ---+-----     ---+-----  |
1:105/10    1:105/50    1:105/300    1:3601/14.1   2:280/280  |
--------    --------    ----+----    ---------     ---------  |
                            |                                 |
                            +----------------\                |
                            |                |                |
                       -----+------     -----+------     -----+------
                       1:105/300.14     1:105/300.68     2:512/1006.1
                       ------------     ------------     ------------


    To understand what topology is and how messages get to all the
    systems in the conference, let's take an example of a message
    entered on 1:105/300.68 replying to a message from 2:512/1006.1...

    The message would pass through the following systems to make it
    to its final destination:

    1:105/300.68, 1:105/300, 1:105/3, 1:110/68, 2:512/1006, 2:512/1006.1

    This could take anywhere from a few hours to a few days depending
    on the events running on the different systems; the message must
    be forwarded through four different systems before making it to
    2:512/1006.1!

    You will notice the topology (interconnection) is in the form of a
    tree starting with my address at the top. ECHOmail topology is
    different from every system's point-of-view. In the above network,
    there may be links I am not aware of. For example, I have no way
    of knowing to which points 1:105/300 is sending the ECHOmail.
    The tree looks completely different from his point-of-view.

    The main thing to remember is never to have more than once "source"
    of an ECHO. It is fine to forward an echo to several other systems,
    but make sure all topology follows this tree structure and never
    causes any loops.

    Most networks have an ECHOmail coordinator whose job it is to ensure
    the validity of the local network topology. If you are a member of
    a public network, you should always contact the ECHOmail coordinator
    before setting up any ECHOmail links.

           IMPROPER TOPOLOGY             ACCEPTABLE TOPOLOGY

             /-----------\                 /-----------\
             |           |                 |           |
          ---+---     ---+---           ---+---     ---+---
          1:134/2     1:134/5           1:134/2     1:134/5
          ---+---     ---+---           ---+---     ---+---
             |           |                 |           |
          ---+---    ----+----          ---+---    ----+----
          1:134/3    1:134/150          1:134/3    1:134/150
          ---+---    ----+----          -------    ---------
             |           |
             \-----------/


                                                OPTIMUM TOPOLOGY
System     FORWARD TO                               a
------     ----------                                 -------
1:134/2    1:134/3 1:134/5 1:134/150                  1:134/2
1:134/3    1:134/2                                    ---+---
1:134/5    1:135/2                                       |
1:134/150  1:135/2                           /-----------+-----------\
                                        b    |      c    |     d     |
                                          ---+---     ---+---    ----+----
                                          1:134/3     1:134/5    1:134/150
                                          -------     -------    ---------

    While configuring basic ECHOmail capabilities, read the follo-
    wing sequence of instructions to gain a greater understanding of
    D'Bridge.

    1.   From the CONFIG menu, select the PACKET/MAIL CONTROL screen.
         Using this screen, set the ECHOmail-related parameters like
         this:

            Inbound mail handling? Automatic
                   Kill null msgs? Yes
             Kill In-transit msgs? Yes
                In-transit rescan? Yes
            Secured ECHOmail only? No
            Save ECHOmail SEENBYs? No
          Save duplicate messages? No
          Auto-add ECHOmail areas? No   (for now)
          Accept AREAFIX requests? Yes
           Remove empty PASSTHRUs? Yes

    2.   Next, select the XMAIL CONTROL screen. Here, you should
         already have defaults displayed for each of the compression
         commands. If you are using different archive programs than
         the ones specified, change them as appropriate, but remember
         the formats of the ARC, ZIP, LHA, ARJ, PAK or ZOO files must
         be the same.

         Specify "30" for "XMAIL processing interval"
         Specify "200" for XMAIL packet size limit"

         XMAIL uses the ARC program by default, but you may specify
         which compression methods to use for which systems on this
         screen.


      3.   On the ADVANCED menu, select the DISK SPACE MINIMUMS screen.
           D'Bridge comes preprogrammed with suggested minimum disk
           space criteria. If you plan to use more than one hard-drive
           to store the message bases or queue directory, make sure you
           specify minimums for them on this screen.
  
      4.   On the EDITOR menu, select the ECHOMAIL AREAS screen.
           Following the directions listed in SECTION 3.16, create all
           the ECHOmail areas you will be using. In the FORWARD TO
           fields, list the addresses of the systems you want to set
           up ECHOmail links for.
  
      5.   That's all there is to it. For ECHOmail to work, you must
           verify the following things:
  
           a. D'Bridge reports at least enough free memory as it takes to
              run the compression and decompression programs specified on
              the XMAIL CONTROL screen. When D'Bridge first comes online,
              it says how many bytes of memory are available. Typically,
              this must be around 100K, depending on the compression
              programs you are using.
  
           b. The compression programs specified must exist in the current
              default path.
  
           c. There is enough free disk space; there will be a warning
              at the bottom of the screen if disk space is too low to
              unpack or forward ECHOmail.
  

<a name="3.00"/><h2><a href="#toc">3.00  SYSTEM CONFIGURATION AND MAINTENANCE</a></h2>

D'Bridge is configured by using a series of configuration options on the
EDITOR, CONFIG and ADVANCED menus.  These options give you complete
control over all features and settings and, if improperly set, result in bad
performance or malfunction.  It is therefore advised that only the system
operator have access to the maintenance functions.  Configuration screens may
have a password assigned, using the Config password parameter on the BASIC
CONFIGURATION screen.

The following menu options comprise the configuration/maintenance sub-system
of D'Bridge:

           Setup editor options
           ECHOmail areas
           Keyboard macros
           Translation table
           Basic configuration
           Directory paths
           Comm/modem setup
           Schedule maintenance
           Nodelist configuration
           Packet/Mail control
           XMail control
           Time adjustment data
           Function keys
           BBS configuration
           Security/Miscellaneous
           Disk space minimums
           Accounting/Translation
           ZMODEM parameters
           Xport configuration
           Window colors

All these options are described in detail in the following sections.


<a name="3.01"/><h2><a href="#toc">3.01  BASIC CONFIGURATION</a></h2>

The BASIC CONFIGURATION screen allows control over the "basic" functions
of D'Bridge such as:

   - System log
   - Primary and Alias EMAIL addresses
   - System name
   - Operator name
   - Location or City
   - Data phone number
   - Flags
   - Alarms
   - Configuration password

<h3><a href="#toc">SYSTEM LOG LEVEL</a></h3>

System log level: Verbose (None/Terse/Verbose/Debug)

This controls the level of detail being written to the system log
file. D'Bridge allows three levels of activity logging; it is high-
ly recommended you select VERBOSE until you are familiar with the
complete operation of D'Bridge Email System.

  /---------+----------------------------------------------------------------\
  | NONE    |   Creates NO log whatsoever.  Using this option, problems will |
  |         |   be difficult to resolve, once detected.                      |
  |         |                                                                |
  | TERSE   |   Writes only the important data, such as connections, events, |
  |         |   and file-transfer information.                               |
  |         |                                                                |
  | VERBOSE |   Writes ALL information displayed in the log window.          |
  |         |                                                                |
  | DEBUG   |   Same as VERBOSE, except the times are recorded in the log    |
  |         |   using fractional seconds. (HH:MM:SS.hh)                      |
  \---------+----------------------------------------------------------------/


<h3><a href="#toc">PURGE LOG AFTER</a></h3>

Purge log after: 7   (days)

This specifies the number of days to retain the information in the system
log file. Every day, all log entries older than the specified number of
days will be erased from the current log file. This purge occurs during
the AutoUpdate event at midnight.

 * <span style="color: red">NOTE</span> *   This feature is not yet implemented.

<h3><a href="#toc">LOG FILENAME</a></h3>

Log filename: C:\DB\DBRIDGE.LOG                          

D'Bridge normally keeps a "log" of all activity so that you may review
its performance. Here, you specify the name of the file (including the
directory if you wish) to which D'Bridge will write its log. This file
contains the information displayed in the upper-left window including
such data as incoming and outgoing calls, file-transfer statistics and
event activation.

<h3><a href="#toc">CPS DISPLAY UNIT</a></h3>

CPS display unit: bps (bps/cps/kpm/%)

This setting determines the method to use when reporting the effective speed
of a data transfer. These measurements are displayed in the ACTIVITY window
during an online mail session. The value of this parameter has absolutely
no effect on the actual speed of a transfer.

    /-----+----------------------------------------------------------------\
    | bps |  Bits per second @ 10 bits per byte.             ie. 17100 bps |
    |     |                                                                |
    | cps |  Characters or bytes per second.                 "   228 cps   |
    |     |                                                                |
    | kpm |  Kilobytes per minute.  (cps x 1024)             "   94.2 kpm  |
    |     |                                                                |
    | %   |  Percentage of reported baud rate.               "   113.2%    |
    \-----+----------------------------------------------------------------/


<h3><a href="#toc">PRIMARY ADDRESS</a></h3>

Primary address: 1:110/68.1                        

This specifies your primary system address. This (like all addresses)
must be in the format: &lt;ZONE:NET/NODE.POINT>

If you are a member of an already-existing network, contact your network
coordinator for an address assignment. If you're not sure, make up
an arbitrary address for now.

       /--------+------------------------------------------------------------\
       | ZONE   |  Continent or nodelist designator 1=US, 2=Europe, etc.     |
       |        |                                                            |
       | NET    |  Usually represents a local calling area (1..32767.)       |
       |        |                                                            |
       | NODE   |  Specific system address within a ZONE and NET.            |
       |        |                                                            |
       | POINT  |  Zero unless running as a "point" of another system.       |
       \--------+------------------------------------------------------------/


<h3><a href="#toc">ALIAS ADDRESSES</a></h3>

Alias addresses: 201:201/0 FOR 201:ALL                  

This specifies your secondary (alias) addresses. The field must be in the
format:  &lt;address> [FOR &lt;filter>]

If you are a member of multiple networks, specify your main address in the
"Primary address" field and all other origin addresses here.  The filter
controls the automatic alias function.  In the above example, any mail,
AREAFIX requests or transactions with any zone 201 address will be sent
using 201:201/0 as the origin address.  The primary address is used in
all cases where there is no match with an alias address filter.

Please note that if you plan to use D'Bridge to forward mail to other systems
by means of the AREAFIX system; you will need to specify the individual
alias addresses to be recognised; otherwise any Areafix requests that get
received that don't match your aliases will be treated as IN-TRANSIT mail.

If you are using the Internet EMAIL and USENET features, please do NOT
specify the address of the Gateway Processor in your alias-addresses.

(See PRIMARY ADDRESS for information about EMAIL address formats.)

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">SYSTEM NAME</a></h3>

System name: Factory Second Parachutes, Inc.               

When D'Bridge communicates with a remote site, the SYSTEM NAME is
displayed on the other system's screen along with OPERATOR NAME, CITY
and your primary and alias addresses.

This field should match the SYSTEM NAME field of your nodelist entry.

The SYSTEM NAME is also used as the default "Origin" line on messages
written using the internal message editor; unless you specify another Origin
line to use in the ECHOMAIL SETUP screen.


<h3><a href="#toc">SYSTEM CITY</a></h3>

System city: Middletown, OH        

When D'Bridge communicates with a remote site, the SYSTEM CITY is
displayed on the other system. Make sure it is not duplicated in
the SYSTEM NAME field (it would be redundant...).

This field should match the CITY field of your nodelist entry.

<h3><a href="#toc">OPERATOR NAME</a></h3>

Operator name: Chris Irwin           

When D'Bridge communicates with a remote site, the OPERATOR NAME is
displayed on the other system and placed in its system log file.
This name will also be used in the "FROM" field in the editor, when
entering a NETmail or ECHOmail message.

This field should match the OPERATOR field of your nodelist entry.

The OPERATOR NAME is used by default in the internal message editor for
composing new messages. If you wish to use a handle or "alias", specify those
in the EDITOR SETUP screen.


<h3><a href="#toc">DATA PHONE</a></h3>

Data phone: 1-513-821-1387       

When D'Bridge communicates with a remote site, the DATA PHONE field
is transmitted to the other system for automatic addition to their
nodelist database. If you fail to specify this number correctly,
it will not be possible for the remote site to return an answer to
your mail directly.

If you are using a voice line or do not wish to disclose this number
to the public, DO NOT LIST IT HERE. Use "-Unpublished-" to designate
the number as private. This data is exchanged during the initial
EMSI handshake on dialup mail sessions. It is not sent anywhere else
during a mail transfer.

* <span style="color: red">NOTE</span> *  For proper translation, phone number MUST be in the format:

          &lt;COUNTRY CODE>-&lt;CITY CODE>-&lt;NUMBER>

<h3><a href="#toc">CAPABILITY FLAGS</a></h3>

Capability flags: XX,CM,V32                       

This specifies your system's capabilities. Each capability flag is
separated by commas. These flags are transmitted to the remote site
during the initial EMSI handshake for dialup mail sessions. With this
information stored in a system's nodelist, it is possible to determine
modem type, hours of operation and file-request capability.

If you do not use a dialup modem, specify CM as your capability flag.

Following is a partial list of standard capability flags:

          /-----+----------------------------------------------------------\
          | CM  |  Continuous mail system.  (On 24-hours every day)        |
          |     |                                                          |
          | XX  |  WaZOO file-requests and update-requests are accepted.   |
          |     |                                                          |
          | V32 |  Modem conforms to the V.32 standard.                    |
          |     |                                                          |
          | HST |  Modem conforms to the US Robotics HST standard.         |
          |     |                                                          |
          | PEP |  Modem conforms to the Telebit Trailblazer standard.     |
          \-----+----------------------------------------------------------/


<h3><a href="#toc">AUDIO ALARMS</a></h3>

Audio alarms? Yes  (Yes/No)

This parameter controls the PC's speaker, enabling or disabling the
audio alarms. These alarms will alert the operator of incoming calls
and new mail received. You will also be notified by a series of beeps
if you received mail addressed to you personally. If you specify No,
all automatic alarms will be disabled.

<h3><a href="#toc">ALARM HOURS</a></h3>

Alarm hours: 24 hours
   -or-
Alarm hours: 08:00 until 23:00

This parameter controls the time of day during which the audio alarms
may be heard. This has no effect if the Audio alarms are disabled.

Either specify nothing (for 24 hours) or enter both starting and ending
times. Use 24-hour format to describe times after 12 noon. If the
starting time is before the ending time, the period includes midnight.

<h3><a href="#toc">RING SIGNAL</a></h3>

Ring signal? Yes  (Yes/No)

This parameter enables or disables the PC's speaker when the phone is
ringing because of an incoming call. This has no effect unless the
Answering method is configured for Hardware or RingMaster on the
COMM/MODEM SETUP screen.

This signal is only heard during the allowed time period.


<h3><a href="#toc">CALL ALARM</a></h3>

Call alarm: T120L8CGL4E                          

This parameter would normally be blank, indicating that the standard
alarm tones should be used. However, some people get tired of hearing
the same alarm every day, so this field gives you the opportunity to
write your own musical alarm. Either specify the music codes or the
name of a text file containing the notes.

Standard ANSI music codes are used, in fact, they are the same as the
"PLAY" statement in MicroSoft's BASICA. Following is a chart of legal
music commands:

           /--------+--------------------------------------------------------\
           | A .. G |  The musical notes A thru G.  A note may be followed   |
           |        |  by an accidental ('#' or '+' for sharp and '-' for    |
           |        |  flat.)  Additionally, a note (With optional sharp or  |
           |        |  flat) may also be followed by a number denoting the   |
           |        |  note length (1 for a whole note thru 64 for a 64th)   |
           |        |  The note, with optional accidental and length, may    |
           |        |  also be followed by one or more dots ("."), each of   |
           |        |  which extends the note by one half of its existing    |
           |        |  value.  For example, two dots produce a length 9/4ths |
           |        |  the original value, and three dots 27/8ths the value. |
           |        |                                                        |
           | Ln     |  Specifies the default length of the notes following   |
           |        |  ("n" must be 1 for a whole note thru 64 for a 64th    |
           |        |   note.)  The default value is 4 (quarter note.)       |
           |        |                                                        |
           | Mz     |  Specifies the fraction of the note length that the    |
           |        |  note is actually sounding.  "z" is either "S," "N"    |
           |        |  or "L", which have these meanings:                    |
           |        |                                                        |
           |        |       MS   Music staccato   (3/4 of note length)       |
           |        |       MN   Music normal     (7/8 of note length)       |
           |        |       ML   Music legato     (all of note length)       |
           |        |                                                        |
           | On     |  Specifies the octave in which the notes following     |
           |        |  are to be played (0 thru 7).  The initial default     |
           |        |  octave is 3, which is the octave beginning at         |
           |        |  middle C.                                             |
           |        |                                                        |


             | Pn     |  Specifies that no sound is to be made for an          |
             |        |  interval.  "n" (optional) is the note length (1       |
             |        |  for a whole note thru 64 for a 64th note.)  If "n"    |
             |        |  is omitted, the current default note length is used.  |
             |        |  One or more dots may follow, each of which extends    |
             |        |  the rest by one half of its existing value.           |
             |        |                                                        |
             | Tn     |  Specifies the tempo in beats per minute (32 thru      |
             |        |  255.)  The initial default value is 120.              |
             \--------+--------------------------------------------------------/

<h3><a href="#toc">SPECIAL ALARMS</a></h3>

Special alarms: 135/ALL T180L8O4GGGAAACD.            

If you would like to be notified when certain systems call, specify
the address followed by the music codes you wish to hear. The format
for the music is specified in the preceding section. The alarm will
be heard after the call is complete, but only if new messages or files
have been received.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">CONFIG PASSWORD</a></h3>

Config password: SECRET  

In a corporate environment where there may be several people using the
EMAIL system, it may be desirable to put a "lock" on the configuration
menu to prevent accidental changes of the D'Bridge configuration. If
a password is specified here, then it must be entered when any of the
SETUP menu options are selected. It only needs to be entered once for
each time D'Bridge is run.


<h3><a href="#toc">HISTORY DAYS</a></h3>

Keep history for: 7    (days)

D'Bridge automatically maintains history files for INBOUND and OUTBOUND
EMAIL calls as well as ECHOmail and AREAFIX requests. These files are
automatically purged every night at midnight. This field defines how
many days of history to keep before purging it. The default value for
this option is 7, providing one week's history.

<h3><a href="#toc">DISPLAY TIMEOUT</a></h3>

Display timeout: 5    (Minutes)

D'Bridge features a built-in "screen-saver" which will blank your video
screen after a specified period of inactivity. The DISPLAY TIMEOUT
parameter specifies the number of MINUTES of inactivity before the
screen goes blank. If a call comes in, a scheduled event starts, or you
press any key, the screen will re-display and the timer starts over.
When the screen is blank, D'Bridge is still fully-functional - just
waiting for something to happen!  If you do not want the screen to ever
go blank, enter a zero ("0") and the display timeout will be disabled.

<h3><a href="#toc">BLANKOUT GRAPHICS</a></h3>

Blankout graphics? Yes  (Yes/No)

When the D'Bridge screen is blanked due to inactivity, you have the
option to display "blankout graphics."  If you answer YES to this
question, there will be a bouncing pattern of dots that will tell you
at a glance D'Bridge is still running and you haven't had a system
crash or something terrible like that. Most computers hate to be bored
and do nothing all day; blankout graphics make your system happy by
giving it something to do when nothing else is going on.


<a name="3.02"/><h2><a href="#toc">3.02  DIRECTORY PATHS</a></h2>

The DIRECTORY PATHS screen allows you to set which drives and subdirectories
D'Bridge will use.  Parameters include:

   - Network mail storage
   - Inbound files path
   - Temporary queue path
   - Outbound queue path
   - Script file path
   - Bad ECHOmail path
   - New ECHO area path
   - "ABOUT" and "FILES" filenames
   - Request paths
   - Specific requests
   - Inbound, outbound, ECHOmail and AREAFIX history

<h3><a href="#toc">NETWORK MAIL STORAGE</a></h3>

Network mail storage: Fido     (Fido/QuickBBS)

There are several choices for the storage method for NETmail:

    FIDO       With FIDO format, each message is stored in a separate
               file in the specified directory. This is the most
               common storage format among Fidonet-based systems, but
               has the disadvantage of being slower than the other
               formats.

    QUICKBBS   With the QUICKBBS format, messages are stored directly
               in a QuickBBS message base. This base may exist stand-
               alone or in conjunction with a QuickBBS system.

<h3><a href="#toc">NETWORK MAIL PATH</a></h3>

Network mail info: C:\DB\MESSAGES                  

If you are using the FIDO/*.MSG method to store NETmail messages, specify
the directory path to use for Fido-style NETmail messages.


<h3><a href="#toc">QUICKBBS AREA NUMBER</a></h3>

QuickBBS area number: 17 

Specify the area number you would like to use for NETmail messages
using the QuickBBS message base. (1-200)

<h3><a href="#toc">INBOUND FILES PATH</a></h3>

Inbound files path: C:\DB\FILES                           

This designates the drive and path for the directory where inbound
files will be stored. Make sure there is always enough disk space
available to store any files which may be received. This may be
changed at any time without adversely affecting the system, as long
as the specified directory path actually exists.

<h3><a href="#toc">TEMPORARY QUEUE PATH</a></h3>

Temporary queue path: C:\DB\PACKETS                       

This designates the drive and path for the temporary directory where
the outbound NETmail queue will be created.

* <span style="color: red">NOTE</span> *  All files in this directory will be automatically erased
          each time the queue is rebuilt.

<h3><a href="#toc">OUTBOUND QUEUE PATH</a></h3>

Outbound queue path: C:\DB\QUEUE                          

This designates the drive and path for the outbound queue directory.
XMAIL archives and poll, transmit, and request queue entries are
stored in this directory.

This is the directory that you would also specify to any 3rd-party mail
programs that need to manipulate the D'Bridge mail queue.


<h3><a href="#toc">SCRIPT FILE PATH</a></h3>

Script file path: C:\DB\DATA                              

This designates the drive and path where the dialing script files
are located, for dialup modems. Script files provide an alternate method
of dialing when using carriers other than standard long-distance telephone
lines.

<h3><a href="#toc">BAD ECHO PATH</a></h3>

Bad echo path: C:\DB\BADECHO                              

This designates the drive and path where invalid or unknown ECHOmail
messages should be stored. The BADECHO messages are stored in Fido
format and may be accessed using area 32767 in the editor.

<h3><a href="#toc">NEW ECHO PATH</a></h3>

New echo path: C:\DB\NEWECHO                              

This designates the drive and path where Fido-style ECHOmail message
bases will be created if Auto-add areas is configured for "Fido.".

<h3><a href="#toc">DATABASE PATH</a></h3>

   Message databases: C:\QUICKBBS                         

<h3><a href="#toc">ADDITIONAL DATABASES</a></h3>

Additional databases: C:\BBS                              

This feature is not supported at this time.


<h3><a href="#toc">DFB PATH</a></h3>

DFB path: C:\DB\DATA                                

This designates the drive and path where the DFB files are located. This is
for the D'Bridge FileBase indexing system. Under most circumstances this
should not be changed from the default Data directory.

<h3><a href="#toc">ABOUT FILENAME</a></h3>

"ABOUT" filename: C:\DB\110-68.TXT                     

The "ABOUT" file is used mainly with the "Public Amateur Network"
to contain general information about your system. The "ABOUT" file name
should specify the name of a text file to be transmitted when a file-
request for "ABOUT" is received. (For more information, see the section
about file-requests.)

<h3><a href="#toc">FILES FILENAME</a></h3>

"FILES" filename: C:\DB\110-68.LST                     

The "FILES" file is used primarily with the "Public Amateur Network"
to provide a list of all requestable files on your system. The FILES
filename should point to this text file or archive.


<h3><a href="#toc">REQUEST PATHS</a></h3>

Request paths: C:\PRIVATE\ SECRET                       

D'Bridge has a feature allowing other systems to call in and request
files from your system. If you wish to enable this option, you must
specify which directories will be available for request. You may also
specify a password that must accompany a request. If you use no pass-
word, any system will have access to the specified directory.
The format for the request paths is:

    &lt;DIRECTORY PATH> &lt;OPTIONAL PASSWORD>

Where password is an optional parameter. Any number of directories may
be specified in the REQUEST PATHS window. Make sure to use passwords
on any directory containing sensitive or confidential information.

       - or -

     @&lt;FILENAME>

Where filename is a text file containing a list of requestable directories
in the same format defined above.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<h3><a href="#toc">SPECIFIC REQUESTS</a></h3>

Specific requests: DBRIDGE C:\FREQ\DB*.ZIP               

This window allows you to specify any number of "magic filenames" that
may be requested from your system. An example of this might be where
you distribute a newsletter and the filename changes every month. You
might have a line like:

    NEWS \NEWSLTR\PC-NEWS.021

The above line means that when a file-request arrives for "NEWS" - the
file \newsltr\pc-news.021 will be transmitted instead of searching the
directories specified in REQUEST PATHS. The format for this window is:

    &lt;MAGIC NAME> &lt;FILE PATH> &lt;OPTIONAL PASSWORD>

Once again, password is optional, but should be specified if any of this
information is not public.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">OUTBOUND HISTORY FILENAME</a></h3>

Outbound history file: C:\DB\OUTBOUND.LOG                  

The OUTBOUND HISTORY FILENAME parameter specifies a text file to write
an outbound EMAIL history log. Every outbound connection is logged to
a the specified text file listing the date/time, address, data sent and
received, elapsed time and total cost. If you do not want such a log,
leave this field blank.

<h3><a href="#toc">INBOUND HISTORY FILENAME</a></h3>

Inbound history file: C:\DB\INBOUND.LOG                    

The INBOUND HISTORY FILENAME parameter specifies a text file to write
an inbound EMAIL history log. Every outbound connection is logged to
the specified text file listing the date/time, address, data sent and
received and elapsed time. If you do not want such a log, leave this
field blank.


<h3><a href="#toc">ECHOMAIL HISTORY FILENAME</a></h3>

ECHOmail history file: C:\DB\ECHOMAIL.LOG                      

The ECHOMAIL HISTORY FILENAME specifies what text file to use for the
inbound ECHOmail history. This log lists date/time, address, area name,
messages and duplicates received.

<h3><a href="#toc">AREAFIX HISTORY FILENAME</a></h3>

AREAFIX history file: C:\DB\AREAFIX.LOG                        

The AREAFIX HISTORY FILENAME specifies what text file to use for an
AREAFIX history log. This includes information about conferences added
and removed either by remote AREAFIX request or New ECHOmail link, ALT-N.

<h3><a href="#toc">DOWNLOAD PATH</a></h3>

Download path: C:\DB\DOWNLOAD                        

The DOWNLOAD PATH specifies the directory to receive downloaded files when
using terminal mode.


<a name="3.03"/><h2><a href="#toc">3.03  COMM / MODEM SETUP</a></h2>

The COMM/MODEM SETUP screen allows you to define your serial port(s) and
modem(s) for Dialup connections to your system. You may also configure:

   - Answering method
   - Line assignment
   - CostGuard limits
   - DimeSaver
   - Auto-initialization time
   - Dialing overrides
   - Printer setup
   - Inbound, outbound, ECHOmail and AREAFIX history

This screen allows the definition of modem and printer types: MCF and PCF
files (Modem Control and Printer Control Files.)

<h3><a href="#toc">PORT</a></h3>

     Port  Base/IRQ  Status   Ident  MCF name  Description
     COM3                                                          

The PORT identifies the name of the serial I/O channel connected to your
modem. It also refers to the port that is used by the FOSSIL driver.
Standard values are COM1-COM7, but any other name is allowed
also.

If you do not have a modem or don't wish to use one, leave this blank.

WARNING: Incorrect port, address or IRQ assignment WILL cause problems with
         your operating system, including unstable operation or malfunction.


<h3><a href="#toc">BASE ADDRESS</a></h3>

     Port  Base/IRQ  Status   Ident  MCF name  Description
           03E8                                                    

The BASE ADDRESS determines the CPU's I/O port address to use. If you do
not understand what this means, you should use a standard port, like COM1
or COM2. Standard values are listed below.

If you are using a "non-standard" COM port (any COM port that is not defined
or recognized by your operating system or computer BIOS), then it is crucial
that the base address and IRQ setting in the next screen are defined. You
must also enter this information regardless if you are using a plug-and-play
(PNP) modem.

            IBM PC/XT/AT                        IBM PS/2
          /------+--------\         /------+--------+------+--------\
          | COM1 |  03F8  |         | COM1 |  03F8  | COM5 |  4220  |
          | COM2 |  02F8  |         | COM2 |  02F8  | COM6 |  4228  |
          | COM3 |  03E8  |         | COM3 |  3220  | COM7 |  5220  |
          | COM4 |  02E8  |         | COM4 |  3228  | COM8 |  5228  |
          \------+--------/         \------+--------+------+--------/

WARNING: Incorrect port, address or IRQ assignment WILL cause problems with
         your operating system, including unstable operation or malfunction.


<h3><a href="#toc">IRQ</a></h3>

     Port  Base/IRQ  Status   Ident  MCF name  Description
                 4                                                 

The IRQ (Interrupt ReQuest) level determines the hardware-specific interrupt
vector that will be used. (3 and 4 are most common)  This field must con-
tain a 4-bit decimal value from 0 to 15. Standard values are listed below.

Even if you are using a "plug and play" (PNP) modem, you must still enter
in the proper IRQ it is associated with.

            IBM PC/XT/AT                        IBM PS/2
          /------+-----\         /------+-----+------+-----\
          | COM1 |  4  |         | COM1 |  4  | COM5 |  3  |
          | COM2 |  3  |         | COM2 |  3  | COM6 |  3  |
          | COM3 |  4  |         | COM3 |  3  | COM7 |  3  |
          | COM4 |  3  |         | COM4 |  3  | COM8 |  3  |
          \------+-----/         \------+-----+------+-----/

WARNING: Incorrect port, address or IRQ assignment WILL cause problems with
         your operating system, including unstable operation or malfunction.


<h3><a href="#toc">MCF NAME</a></h3>

     Port  Base/IRQ  Status   Ident  MCF name  Description
                                     USRC1438  US Robotics HST 14400  

The MCF NAME specifies the name of a D'Bridge "Modem Control File."
Included, you will find an ZIP file which contains our standard
MCF collection. If you press F10, you will receive a list of all
modems currently supported. Simply select the Modem Control File
to use for the specified serial port. When you select a different
MCF or specify one for the first time, D'Bridge will unZIP the file
if needed from MCFILES.ZIP. A list of files, modems and ident (ATI)
codes are displayed from the list in MCFILES.LST.

MCF files are simple control files that may be changed using any standard
text editor. The following control language is used. Keywords are not
case-sensitive, but must start in column 1 or they will be ignored. Invalid
syntax is ignored without error to allow backward / forward compatibility.

MCF &lt;NAME> &lt;DESCRIPTION>

ie. MCF USRC1419 US Robotics HST 14400

&lt;NAME> must match the DOS filename (without the extension.)
&lt;DESCRIPTION> is the displayed modem type.
MCF This must always be the first line of a Modem Control File.

BAUD &lt;BAUD RATE>

ie. BAUD 19200

&lt;BAUD RATE> is 300, 1200, 2400, 4800, 9600, 19200 or 38400.

<h3><a href="#toc">LOCKED</a></h3>

ie. LOCKED  (no parameters)

This causes D'Bridge to always use the specified baud rate, regardless
of the "CONNECT" results reported by the modem. If you are using this
mode, the modem must also be configured to use a fixed DTE rate. &amp;B1 is
used on HST's, for example.


  DELAY &lt;MILLISECONDS>
  
  ie. DELAY 50
  
  This specifies the inter-character delay in milliseconds when sending
  commands to the modem. The default is 20, but some modems may require
  values as high as 50 or 60.
  
  TIMEOUT &lt;SECONDS>
  
  ie. TIMEOUT 75
  
  This specifies the failsafe timeout when dialing or answering the phone.
  This defaults to 60, but might need to be increased if overseas calls
  take longer than one minute to complete.
  
  DIAL &lt;BAUD RATE> &lt;MODEM STRING>
  
  ie. DIAL 19200 ATDT
  
  &lt;BAUD RATE> is 300, 1200, 2400, 4800, 9600, 19200 or 38400.
  &lt;MODEM STRING> is the command sent to the modem before the phone number.
  
  ANSWER &lt;MODEM STRING>
  
  ie. ANSWER ATA
  
  &lt;MODEM STRING> is the command sent to the modem to answer the phone.
  
  INIT &lt;MODEM STRING>
  
  ie. INIT ATZ
  
  &lt;MODEM STRING> is a command to configure the modem as desired.


  TRANSLATE &lt;BAUD RATE> &lt;RESPONSE>|&lt;*C STRING>
  
  ie. TRANSLATE 2400 CONNECT 2400/ARQ|2400MNP
  
  &lt;BAUD RATE> is 300, 1200, 2400, 4800, 9600, 14400, 19200 or 38400.
  &lt;RESPONSE> is the connection result string from the modem.
  &lt;*C STRING> is the translated response code for the BBS "*C" code.
  
  PREINIT &lt;MODEM STRING>
  
  ie. PREINIT AT&amp;C1&amp;D2&amp;W
  
  &lt;MODEM STRING> is a command to pre-configure the modem as desired.
  
  OFFHOOK &lt;MODEM STRING>
  
  ie. OFFHOOK ATH1M0S0=0
  
  &lt;MODEM STRING> is a command to take the modem offhook.
  
  IGNORE &lt;MODEM RESPONSE>
  
  ie. IGNORE DATA
  
  &lt;MODEM RESPONSE> is a unimportant code returned from the modem to be ignored
  completely.


<h3><a href="#toc">ANSWERING METHOD</a></h3>

Answering method: Hardware  (Hardware/Software/Modem/Ringmaster/Disable)

This specifies the method D'Bridge will use to answer incoming calls.

/------------+---------------------------------------------------------------\
| HARDWARE   |  Answers using hardware ring detection.  (RS-232 pin 22)      |
|            |                                                               |
| SOFTWARE   |  Answers using software ring detection.  (RING from modem     |
|            |                                                               |
| MODEM      |  Assumes that modem will auto-answer.  (S0=1 assumed)         |
|            |                                                               |
| RINGMASTER |  Hardware ring detection with multi-pattern ring detection.   |
|            |  3 different ring patterns are detected, see LINE ASSIGNMENT. |
|            |                                                               |
| DISABLE    |  Answering completely disabled.                               |
\------------+---------------------------------------------------------------/

<h3><a href="#toc">LINE ASSIGNMENT</a></h3>

Line assignment: V11 (1/2/3/Voice)

When using the RingMaster answering method, it is necessary to assign
the three possible ring patterns to the desired DATA lines. 1, 2 and 3
correspond to the DATA/1, 2 and 3. Voice designates a ring pattern
to be ignored by D'Bridge and logged as a voice call.

* <span style="color: red">NOTE</span> *  It is recommended to use the first ring pattern as voice.

<h3><a href="#toc">COSTGUARD TIME</a></h3>

CostGuard limits: 240 (minutes)           (cost)

The COSTGUARD TIME specifies the absolute maximum amount of time an
EMAIL session may last. When the elapsed time for any inbound or
outbound call reaches the number of minutes specified, DTR is lowered
and the call is aborted by D'Bridge.


<h3><a href="#toc">COSTGUARD COST</a></h3>

CostGuard limits:     (minutes)   100.00  (cost)

The COSTGUARD COST specifies the absolute maximum cost of an outbound
EMAIL session. When the accumulated cost for any outbound call reaches
the amount specified, DTR is lowered and the call is aborted by D'Bridge.

<h3><a href="#toc">COLLISION DETECTION</a></h3>

Collision detection? Yes

This specifies whether or not D'Bridge will detect collision of outbound
dialing attempts with inbound calls.  This is usually desirable, but it
is possible that it will not work well with every kind of modem, so you
should disable it if it incorrectly detects collisions.

<h3><a href="#toc">DIMESAVER ENABLED</a></h3>

DimeSaver enabled? Yes  (Yes/No)

This specifies whether or not the DimeSaver feature should be used.
DimeSaver causes D'Bridge to answer a potential inbound call if the
modem reports NO DIAL TONE when placing an outbound call. If there
was no incoming call, subsequent DimeSaver activations will not occur.

<h3><a href="#toc">AUTO INITIALIZATION</a></h3>

Auto-Initialization: 5   (minutes)

This parameter specifies the number of minutes idle before automatically
re-initializing the modem. Sometimes, modems go "out-to-lunch" because
of brown-outs, cats and so forth. Re-programming the modem every few
minutes certainly can't hurt and sometimes solves problems of unattended
operation.

If you specify zero, this feature will be disabled and the modem will
only be initialized after each call and upon startup.


<h3><a href="#toc">BUSY WHEN OFFLINE</a></h3>

Busy when offline? No  (Yes/No)

D'Bridge does many things. During the time calls may not be answered,
the phone can either be busy or just keep ringing. If you answer Yes
to this question, the phone will be taken off hook whenever D'Bridge is
not ready to accept a call.

  - If you are using a dedicated data line, Yes is preferred.

  - If you are using a voice/data line, in most cases, use No.

<h3><a href="#toc">TOUCH TONE DIALING</a></h3>

Touch-Tone dialing? Yes (Yes/No)

If you have a Touch-Tone&lt;tm> telephone line, answer Yes to this question.
Pulse (rotary) dialing will be used if you specify No.

<h3><a href="#toc">MAXIMUM RINGS</a></h3>

Maximum rings: 4 

Some modems will report RINGING when placing an outbound call. This
allows D'Bridge to count the number of times the remote phone rings.
If this count exceeds the maximum specified by this parameter, dialing
will be aborted.

If the maximum ring count is exceeded on two consecutive attempts at
calling the same system, the call will be placed on Ten minute hold.
Unless overridden by VIEW/MODIFY QUEUE, no further attempts will be
made for at least ten minutes.


<h3><a href="#toc">FLAG DIAL</a></h3>

"Flag" dial: HST ATB1DT                         

This field is only used to define the exceptions to the normal dialing
commands. The flag specifies a substring to match in the nodelist
flags field. When D'Bridge places an outbound call, it searches the
nodelist flags fields for a match in the "Flag" dial list. The first
match found will determine the &lt;DIAL STRING> to use. The format is:

    &lt;NODELIST FLAG> &lt;DIAL STRING>

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">SPECIFIC DIAL</a></h3>

Specific dial: 2:280/280 ATX0M1DT               

This field lists exceptions to the normal and "Flag" dialing commands.
After D'Bridge searches the "Flag" dial list, it looks for the first
match in Specific dial. If you are using an address such as 2:ALL,
make sure any specific systems are listed before the wildcard entry.
The format is:

    &lt;ADDRESS MASK> &lt;DIAL STRING>

    ie. 2:280/280 should come before 2:280/ALL, etc.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">PRINTER PORT</a></h3>

Printer port: PRN                                     

Define the printer device here. If you wish to route output to a file for
later printing, you may specify the filename here.


<h3><a href="#toc">PCF NAME</a></h3>

PCF name: OKIOL400  OKIDATA OL400 LED page printer

The PCF NAME specifies the name of a D'Bridge "Printer Control File."
Included, you will find an ZIP file which contains our standard
PCF collection. If you press F10, you will receive a list of all
printers currently supported. Simply select the Printer Control File
to use for the printer port. When you select a different PCF or specify
one for the first time, D'Bridge will unZIP the file if needed from
PCFILES.ZIP. A list of printers supported is displayed from the list
in PCFILES.LST.

PCF files are simple control files that may be changed using any standard
text editor. The following control language is used. Keywords are not
case-sensitive, but must start in column 1 or they will be ignored. Invalid
syntax is ignored without error to allow backward / forward compatibility.

            PCF &lt;NAME> &lt;DESCRIPTION>

            ie. PCF OKIOL400 OKIDATA OL400 LED page printer

            &lt;NAME> must match the DOS filename (without the extension.)

            FIXED FONT &lt;PRINTER CODES>
            PROPORTIONAL FONT &lt;PRINTER CODES>
            TITLE FONT &lt;PRINTER CODES>
            START BOLD &lt;PRINTER CODES>
            END_BOLD &lt;PRINTER CODES>
            START_ITALIC &lt;PRINTER CODES>
            END_ITALIC &lt;PRINTER CODES>
            GRAPHICS &lt;ON or OFF>

            ie. FIXED FONT &lt;ESC>&amp;l0O&lt;ESC>(10U&lt;ESC>(s0p10h12v0s0b3T
                PROPORTIONAL FONT &lt;ESC>&amp;l0O&lt;ESC>(0U&lt;ESC>(s1p10v0s0b5T
                TITLE FONT &lt;ESC>&amp;l0O&lt;ESC>(0U&lt;ESC>(s1p14.4v0s3b4T
                START BOLD &lt;ESC>(s7B
                END BOLD &lt;ESC>(s0B
                START ITALIC &lt;ESC>(s1S
                END ITALIC &lt;ESC>(s0S
                GRAPHICS ON


<h3><a href="#toc">MULTILINE SUPPORT</a></h3>

  When this feature is enabled, you can run more than one "copy" of D'Bridge
  on your computer (using Windows, OS/2, Desqview or some other multi-tasker)
  and serve more than one Dialup/modem connection at once. This is handy for
  those of you running multi-line BBS's and you need a "front end" to handle
  the callers. It does NOT however, act as a Telnet server for Internet calls.
  
  When you answer YES to this question, you will need to start D'Bridge with
  the appropriate line number, ie. DB /1 for line 1, DB /2 for line 2, DB /8
  for line 8, etc etc. D'Bridge will then load the appropriate modem/event
  information for that line and use it. Do not start two of the same lines
  otherwise a file-sharing error will happen in your operating system.
  
  It is NOT necessary to enable multi-line support for Internet features
  since that is controlled by the MAXIMUM CONCURRENT SESSIONS screen in
  the INTERNET CONNECTIVITY menu.
  
  WARNING: It is absolutely CRUCIAL that no two lines share the same "port"
           unless you are running virtual-modem/Internet software that
           specifically tells you its okay to do so.


<a name="3.04"/><h2><a href="#toc">3.04  SCHEDULE MAINTENANCE</a></h2>

The SCHEDULE MAINTENANCE screen allows you to program the weekly event
schedule as well as set up routing, and access rules.  Parameters include:

   - Schedule day/time
   - Time between caalls
   - Maximum tries, sessions and failures
   - Priorities allowed
   - Polling
   - Routing
   - Forwarding
   - Many more...


<h3><a href="#toc">AUTOPOLL</a></h3>

  This screen allows you to define a list of systems that D'Bridge should
  poll automatically. This is a "master override" to any event-specific
  polling that may be defined in the SCHEDULER screens.
  
  Auto-Polling works for both Dialup and BinkD. Be sure that the proper
  credentials are specified in BINKD SESSION INFO when you're polling BinkD
  systems (ie, Internet address, session password, etc etc).
  
  The format of this screen is:
                              
  &lt;Fido address> &lt;Priority> &lt;Time> &lt;Hours or Minutes> &lt;Poll on startup?>
  
  FIDO ADDRESS: The Fidonet address of the system to poll, obviously.
  
  PRIORITY: The priority of the poll. Answer Normal, Crash or Immediate.
  
  TIME: Any value.
  
  HOURS OR MINUTES (H/M): Answer H for hours or M for minutes.
  
  POLL ON STARTUP? Answer YES if you wish to poll this system for mail when
                   D'Bridge starts up; otherwise answer NO or just leave
                   this question blank.
  
  Examples: 1:123/500  NORMAL 15 MINUTES YES
            1:226/426  NORMAL 1 HOUR
            1:229/3000 CRASH  3 HOURS
  
  * <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">EVENT TAG</a></h3>

Event "tag": NMH     

The "TAG" is an arbitrary 8-letter name by which you identify the event.
In the above example, I've used "NMH" to stand for "National Mail Hour."
This "TAG" must be unique; it is used on the screen and in the log to
identify events.


<h3><a href="#toc">EVENT ENABLED</a></h3>

Enabled? Yes

This Yes/No question simply specifies whether this event should be
currently enabled or not. Normally, you would answer YES but if you
ever want to temporarily disable the event, you may change it to NO.
This option is provided so you may disable events without actually
removing them.

<h3><a href="#toc">EVENT TYPE</a></h3>

Type: Mail      (Mail/DOS/Exit/ClockSync/EmailNNTP)

There are five types of events; each functions differently:

     Mail

     A "mail" event defines a period of time when certain mail
     may be sent. The default is to send ALL mail, unless you
     specify ADVANCED ROUTING.

     DOS

     A "DOS" event defines a list of DOS commands, programs and
     batch files to execute at a pre-defined time. These tasks
     are all "spawned" while D'Bridge remains in memory. This
     will only work if you have enough memory.

     Exit

     An "exit" event specifies that you want D'Bridge to terminate
     at the specified time. This would normally be used in a
     batch file to transfer control to another program - instead
     of "spawning" it as above. With EXIT, you specify which DOS
     errorlevel you want to use.

     ClockSync

     A ClockSync event will set the system clock using the atomic
     clock or another D'Bridge system. The accuracy should be within
     a tenth of a second (plus the propagation delay) of the Timebase
     system.


<h3><a href="#toc">EVENT DAYS</a></h3>

Weekday(s): [ ]All  [X]Sun  [ ]Mon  [ ]Tue  [X]Wed  [ ]Thu  [ ]Fri  [X]Sat

With the EVENT DAYS field, you put an "X" next to all days that you wish
to run this event. If you specify ALL, then all the days of the week
are marked. To access individual days, erase the "X" next to ALL by
pressing the SPACE BAR.

<h3><a href="#toc">EVENT START</a></h3>

Start time: 14:30

Specify the time you wish to activate the event. This time should be
specified in 24-hour format and must not conflict with any other
scheduled event. To specify a START TIME, just enter a time using 3 or
4 digits. For example:

300 is 3:00 AM;  2250 is 10:50 PM

<h3><a href="#toc">EVENT END</a></h3>

End time: 15:20

Specify the time you wish a mail event to end. This time should be
specified in 24-hour format and must not conflict with any other
scheduled event. To specify an END TIME, just enter a time using 3 or
4 digits. For example:

300 is 3:00 AM;  2250 is 10:50 PM

<h3><a href="#toc">EVENT ERRORLEVEL</a></h3>

Errorlevel: 200

For EXIT EVENTS, you simply specify the DOS ERRORLEVEL to return when
terminating. This number would normally be used by an "IF ERRORLEVEL"
directive in a batch file.


<h3><a href="#toc">EVENT DOS COMMANDS</a></h3>

DOS commands: MAILCHEK -S                            

For DOS events, you may specify any number of DOS commands, programs
or batch files to execute. It is even possible to use DOS primitives
like CD (change directory) and COPY. It is up to you to make sure none
of the commands specified require human interaction. For example, if
you specify the command to start your word processor, odds are the word
processor will continue running until someone comes along...

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">BETWEEN CALLS</a></h3>

Between calls: 15  to 45  (seconds)

Here, you specify the period of time to wait between outbound calls.
This is entered as a "range."  If you say "30 to 60," then D'Bridge
will wait a random amount of time between 30 and 60 seconds before
placing a subsequent call. This period of time is used to receive
incoming mail; if this event is supposed to send mail only, you may
specify a very short time period.

<h3><a href="#toc">EVENT CRITICAL</a></h3>

Critical? Yes (Yes/No)

For DOS and EXIT EVENTS, you should specify "YES" if you want the event
to execute even if D'Bridge is not running at the time of the event. A
CRITICAL event is one that D'Bridge will execute even after the START
TIME specified; it is only executed once. Specify "NO" if you want the
event to occur ONLY if D'Bridge is running at that time.


<h3><a href="#toc">MAX DIALING TRIES</a></h3>

Max tries: 30 

The MAX TRIES parameter indicates the maximum number of times D'Bridge
should attempt to dial a specific system during the current MAIL EVENT.

<h3><a href="#toc">MAX SESSIONS</a></h3>

Max sessions: 3  

The MAX SESSIONS parameter specifies the maximum number of actual
connects allowed during the given mail event. This is handy for
limiting ECHOmail turnaround to long-distance systems.

<h3><a href="#toc">MAX SESSION FAILURES</a></h3>

Max failures: 2  

The MAX FAILURES parameter specifies the maximum number of aborted or
bad sessions allowed with each system during the specified mail event.
This parameter may help control costs when the answering system has
crashed or is not functioning properly.

<h3><a href="#toc">EVENT CLOCKSYNC TIMEBASE</a></h3>

TimeBase: 1:3601/14        

For ClockSync events, this field designates the TimeBase to use for
setting the system clock. Either specify the EMAIL address of another
D'Bridge system, or leave the field blank to use the Atomic Clock.

* Note *  If the clock is wrong on the D'Bridge system specified,
your clock will also be set to an incorrect time. Make sure you use
a trust-worthy system.


<h3><a href="#toc">ACCEPT EMAIL CALLS</a></h3>

Accept EMAIL calls? Yes (Yes/No)

This specifies whether or not D'Bridge should answer the phone to accept
EMAIL/BBS calls during this event. If you answer No, the phone will
not be answered and will remain on-hook for the duration of the event.

<h3><a href="#toc">PRIORITIES ALLOWED</a></h3>

Priorities allowed? NCI (N/C/I)

This field specifies what mail priorities (if any) may be sent during
this event. For most events, specify NCI (Normal, Crash and Immediate),
as allowable priorities. Keep in mind that outbound calls are still con-
trolled by the cost-accounting system.

This field simply serves as a master override to cost-accounting.

<h3><a href="#toc">HOST ROUTE PRIVATES</a></h3>

Host-route privates? No  (Yes/No)

If you want NETmail messages destined for private or unlisted systems
to be host-routed, answer Yes to this question. If you answer No,
the mail will be held, waiting for the remote system to poll to pick
it up.

* Note *  Host-routed mail may not be picked-up by the destination.

<h3><a href="#toc">CM SYSTEMS ONLY</a></h3>

CM/Non-CM systems only? Both   (CM/Non-CM/Both)

"CM" stands for Continuous Mail, a system designated as being able
to receive EMAIL calls anytime. Certain events might be designated
to send mail only to CM systems just as other scheduled events might
be reserved for sending mail only to NON-CM systems. Specify Both
if you want to send all mail regardless of the CM nodelist flag.


<h3><a href="#toc">EVENT SCAN ECHOMAIL</a></h3>

Scan ECHOmail areas? Yes (Yes/No)

If you want D'Bridge to scan all ECHOmail areas for new outbound
traffic each time this event begins, answer Yes here. Only when
the event starts for the first time each day will the ECHOmail scan
be performed.

<h3><a href="#toc">EVENT DYNAMIC</a></h3>

Dynamic event? No  (Yes/No)

If you answer Yes to this question, a mail event will terminate when
there are no more outbound calls to make. When a dynamic event ends
early, the UN-EVENT is resumed and the queue is rebuilt.

<h3><a href="#toc">ALLOW REQUESTS</a></h3>

Process requests? Yes (Yes/No)

If you want to allow file-requests during this event, answer Yes to
this question. Otherwise, file-requests (FREQs) will be rejected.

<h3><a href="#toc">ACCEPT HUMAN CALLS</a></h3>

Accept human calls? Yes (Yes/No)

If you want to allow human (BBS) calls during this event, answer Yes to
this question. If you answer No, human calls will be rejected for the
duration of the event and callers will be notified that the system is cur-
rently accepting EMAIL calls only.


<h3><a href="#toc">EVENT ALLOW XMAIL</a></h3>

Allow XMAIL? Yes (Yes/No)

If you want to allow XMAIL (compressed mail) traffic to be sent
during this event, answer Yes to this question. If you answer
No, all XMAIL will be held, disallowing pickup by remote systems.

Specify No only for dedicated NETmail events. In most cases, Yes
is the appropriate answer.

<h3><a href="#toc">EVENT ALLOW ECHOFILE</a></h3>

Allow Echofile processing? Yes (Yes/No)

If you wish to allow Echofile processing and forwarding during this
event, answer Yes to this question. If you answer No, then all Echofile
processing will be disabled, and Echofile traffic will "pile up"
in the INBOUND directory until another event allows such processing.

When upgrading to this D'Bridge release from version 2.68 or prior, Echofile
processing is automatically DISABLED for each mail event. This is done for
security reasons and to allow you the chance to properly configure Echofile
processing before enabling the feature.

<h3><a href="#toc">EVENT ALLOW DOS</a></h3>

Execute DOS commands: Dialup (Dialup/Always)

If you specified any DOS commands to run upon receiving mail, you can
choose to run them either when mail comes in via. Dialup sessions with
a modem, or to run the commands regardless of how the mail was received.

The default setting for this question is Dialup, which is the same
setting used since the early releases of D'Bridge.


<h3><a href="#toc">PACKETS FOR</a></h3>

Packets for: ALL                                            

Here's where we get into the filters and addresses!  In PACKETS FOR,
specify a filter as defined previously in this section. This will
determine for which systems you want to create packets.

* Note * This does not necessarily mean D'Bridge will call the
system, since the packet might be on "HOLD" or "ROUTED" to a diffe-
rent system.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">HOLD FOR</a></h3>

Hold for: NONE                                            

If you wish to hold all outbound traffic for certain systems, specify
them here with a filter. With a system on "hold", no calls will be
made to it during this event, regardless of priority.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">EVENT POLL</a></h3>

Poll: 1:110/68                                            

If you wish to poll certain systems each time this event is started, list
the EMAIL addresses here. Polling means: to call a system in order to
pick up any mail that is "on hold."

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<h3><a href="#toc">PICKUP FROM</a></h3>

Pickup from: ALL                                          

Normally, D'Bridge will pick up mail from ALL systems it calls.
However, if you wish, you may specify a filter to control from which
systems you would like to receive "hold" mail from when you call to
deliver outbound traffic.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">ALLOW PICKUP FROM</a></h3>

Allow pickup from: ALL                                     

Normally, D'Bridge will allow ALL systems to pick up their "hold" mail
when they poll or call to deliver mail. If you want to run a completely
secure system, you might not want to allow pickup for certain systems.
Since D'Bridge has password-security, it would be rare to use anything
other than ALL here.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<h3><a href="#toc">ROUTE TO</a></h3>

Route to: NONE                                     

Normally, D'Bridge sends mail directly to the receiving system when you
write EMAIL messages. "Routing" is a way to cut costs by sending mail
through other EMAIL systems or networks to be delivered to its final
destination.

"Route to" may control specific routing and/or host-routing. This field
may contain multiple lines, so the last line should contain HOSTS or
host/hub-routing or NONE for direct delivery.

Specific routing may be done by specifying:

Route to: &lt;ADDRESS> FOR &lt;FILTER>

ie.
Route to: 110/68 for 110/ALL 2:ALL 3:ALL

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">ROUTE FILES FOR</a></h3>

Route files for: NONE                                     

D'Bridge has the capability of routing attached data files along with
EMAIL messages. This should be used only by special arrangement between
the system operators involved.

Specify the filter describing the systems willing to route in-transit
files from your system. This is only applicable if you are using a rou-
ting other than NONE.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<h3><a href="#toc">FORWARD FOR</a></h3>

Forward for: ALL                                      

D'Bridge will forward in-transit mail for the systems specified in this
filter. In most cases, ALL should be specified.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">FORWARD TO</a></h3>

Forward to: OURNET                                    

D'Bridge will forward in-transit mail to the systems specified in this
filter. Using OURNET means D'Bridge will only forward in-transit mail
destined for systems with the same NET number as your own. (It is assumed
there is no cost associated with calls within your NET.)

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">FORWARD FILES FOR</a></h3>

Forward files for: ALL                                   

D'Bridge will forward in-transit files for the systems specified in this
filter. In most cases, ALL should be specified.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">FORWARD FILES TO</a></h3>

Forward files to: OURNET                                    

D'Bridge will forward in-transit files to the systems specified in this
filter. Using OURNET means D'Bridge will only forward in-transit mail
destined for systems with the same NET number as your own.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<h3><a href="#toc">MAIL RECEIVED DOS COMMANDS</a></h3>

DOS commands:                                       

During certain events, you may wish to have D'Bridge terminate or
execute DOS commands every time mail is received from a remote system.
The DOS COMMANDS field allows you to specify any number of DOS commands
or programs to be executed when mail arrives. Any DOS command or
program may be used, but you must make sure they don't require any human
interaction or D'Bridge will be "stuck" until you give the program the
input it wants.

As well as DOS commands, the following functions are available from
the DOS COMMANDS field:
/----------------+-----------------------------------------------------------\
| +(command)     |  Causes D'Bridge to swap to disk, leaving more memory     |
|                |  available to the application program.                    |
|                |                                                           |
| -(command)     |  Causes the command to be executed inside the queue       |
|                |  window.  Only use this for programs that do standard     |
|                |  DOS I/O.                                                 |
|                |                                                           |
| *R             |  This will force a rescan of the queue.  Same as ALT-Q    |
|                |                                                           |
| *L             |  This will be replaced with the current line number       |
|                |                                                           |
| *S             |  This will force a complete ECHOmail rescan.              |
|                |                                                           |
| *X&lt;errorlevel> |  This causes an exit with the specified DOS errorlevel.   |
\----------------+-----------------------------------------------------------/

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<a name="3.05"/><h2><a href="#toc">3.05  NODELIST CONFIGURATION</a></h2>

The NODELIST CONFIGURATION screen allows you to setup the nodelist database
that D'Bridge uses to make outbound calls.  Parameters include:

   - St. Louis nodelists
   - Private nodelists
   - Pointlist
   - Zonegate data
   - Exclude/Translate NETs
   - Prefixes
   - Baud, Flag and Phone overrides

<h3><a href="#toc">ST LOUIS NODELISTS</a></h3>

"St. Louis" nodelists? C:\DB\FILES\ DBNET DBDIFF                 

"St. Louis" refers to a standard format for NODELIST text files. This
includes a "nodelist" and a "nodediff". You may have any number of
St. Louis-style nodelists at one time by listing each separately in
the window. Each line in the window describes one nodelist and should
contain:

&lt;DIRECTORY PATH> &lt;NODELIST BASE> &lt;NODEDIFF BASE>

     For example:

     C:\DB\FILES\ NODELIST NODEDIFF 7567 153
     C:\DB\FILES\ ANETLIST ANETDIFF 38791 153

The two numbers on the right are the CRC of the nodelist name and the
currently installed nodelist. These numbers are maintained by D'Bridge
and the user need not concern himself with them.

D'Bridge automatically determines which nodelist is the most-recent based
on the extension of the "list" or "diff" file. The St. Louis format is
based on weekly update files called "diff" files; these files contain
the differences between last week's and this week's nodelists and are
generally smaller than the nodelist itself. If a diff file exists for
a nodelist, it will be automatically decompressed and installed when
it arrives (if applicable).

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<h3><a href="#toc">PRIVATE NODELISTS</a></h3>

Private nodelist(s): MYLIST.PVT                      

You may also use any number of private nodelists. In this field you
may specify any number of text files to be included in your compiled
nodelist. You may notice D'Bridge adds two numbers after the filename
once the nodelist is compiled; these numbers are the date and time of
the private nodelist file. If these numbers are changed or the node-
list is replaced or edited, D'Bridge will automatically recompile the
nodelist when it is started next.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">POINTLIST</a></h3>

Pointlist: POINTS.LST                          

If you are part of a point system, you will want to specify the name of
your POINTLIST file.
This is a list of POINTS under the same ZONE:NET/NODE as your system.
Just like the PRIVATE NODELISTS, the numbers after the filename indicate
the date and time of the POINTLIST when the nodelist was last compiled.
If these are changed, D'Bridge will automatically recompile the nodelist.

<h3><a href="#toc">FAKE POINTNET</a></h3>

Fake pointnet: 32001

To maintain compatibility with older EMAIL systems, a "FAKE POINTNET"
has been established to allow Fidonet-based mailers to act as points
of a D'Bridge BOSS. Since there is no definition of a "point" address
in Fidonet, a fake NET number is used. Specify the fake net to use
here. When a system calls in using that NET number, the node number
used will be translated to a point address.

If you do not wish to use a Fake Pointnet for legacy systems, then just
leave this question blank.


<h3><a href="#toc">FAKE POINTS</a></h3>

Fake points: 1 2 4 22                              

This field specifies which systems require the FAKE POINT addressing.
Specify the point numbers of the systems for which FAKE POINT addressing
is required. This affects the way in which ECHOmail packets are created.
This is never required with points running D'Bridge EMAIL System; it is
provided for compatibility with older Fidonet-based systems.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">USERNAME INDEX</a></h3>

Create username index? Yes

D'Bridge will optionally create a USERNAME index when it compiles the
nodelist. If you answer "YES" to this field, the index will be created
and D'Bridge (and the editor) will be able to cross-reference operator
name to address. This feature is quite handy, but makes the nodelist
compile much slower. If you don't want the index created, answer "NO."

<h3><a href="#toc">USERLIST FILE</a></h3>

Additional user file: USER.LST                        

You may specify the name of a text file containing an additional user-
list to merge with the nodelists. Typically, this file will contain a
list of people who use certain EMAIL systems but are not listed as
the primary operator. The format for this file is:

&lt;ADDRESS> &lt;USER NAME>

ie.  1:135/68.2  George Meyers
     .20         John Smith
     107/27.5    Oliver South


<h3><a href="#toc">OUTBOUND GATEWAY</a></h3>

Outbound gateway: 1:110/68       

Most networks do not use an outbound gateway, but if your NET has a
system designated to send all outbound mail, then put its address here.
You would use this in conjunction with the ROUTE TO field in the schedule
maintenance subsystem. (ROUTE TO: OGATE FOR OTHERS)

<h3><a href="#toc">USE ZONEGATES</a></h3>

Use zonegates? No 

Fidonet (as well as other international networks) maintain so called
ZONEGATES that allow mail to be sent from one ZONE to another without
placing an overseas call. If you are part of Fidonet, and you are sen-
ding mail from the U.S. to Europe, you have the option of sending the
mail through the ZONE 1 gateway (1/2) or going direct to your destination.
Specify "YES" if you wish all interzone traffic (without attached files)
to be routed through the ZONEGATE; specify "NO" if you always want to use
direct routing.

<h3><a href="#toc">EXCLUDE NETS</a></h3>

Exclude ZONE:NET(s): 2:ALL 3:ALL                       

Some systems (that use a large NODELIST like Fidonet) may want to
completely eliminate certain ZONES and/or NETS from their nodelist.
If there is no reason to communicate with people in other countries,
you can greatly reduce the NODELIST size and compile-time by excluding
those addresses you don't use. For example, if you live in the U.S.
and don't plan to do any mail to Europe or Australia, you may exclude
these continents completely by using the statement from the example
above.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<h3><a href="#toc">TRANSLATE NETS</a></h3>

Translate NET(s):                             

This field gives you the option to actually translate one NET to
another. This will let you move a NET from one zone to another or
simply change the NET number to something else. This will not be
used for most systems, but is a feature found in other EMAIL systems
and I am including it for compatibility. The syntax is:

&lt;original ZONE:NET> &lt;new ZONE:NET>

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">COUNTRY CODE</a></h3>

Country code: 1     

Here, you MUST specify your country code. This is the prefix found
before the "area code" in the nodelist. For the U.S. and Canada,
specify "1" - other countries, specify your country code (in the same
way you do with DOS)

<h3><a href="#toc">LOCAL PREFIX</a></h3>

Local prefix:               

If there is a prefix you must dial before NO-COST (local) calls, speci-
fy it here. In the U.S. and Canada, this field will be left blank in
most cases. (Some PBX systems might require you to dial "9" to get a
local outside line.)


<h3><a href="#toc">DOMESTIC PREFIX</a></h3>

Domestic prefix:                      

If there is a prefix in your country that you must dial before all
domestic calls, specify it here. For the U.S. and Canada, this field
should be left blank; we need no PREFIX. (Some PBX systems might
require you to dial an "8" to get a long-distance line.)

<h3><a href="#toc">INTERNATIONAL PREFIX</a></h3>

International prefix: 011      

Specify the prefix to dial before any international calls are made.
In the U.S., use "011" - other countries, check with your phone company.
An international call is defined as one where the COUNTRY PREFIX of the
system being called differs from your own.

<h3><a href="#toc">PHONE NUMBER OVERRIDES</a></h3>

Phone number overrides: 110/68 1-513-424-5167            

If you wish to override the phone number for an existing address, or
define the phone number for an unlisted NODE or POINT, the PHONE NUMBER
OVERRIDES field is the place to do this.

If you are using a SCRIPT with this particular address and phone
number, enter the filename of the script file in quotation marks.

&lt;ADDRESS> &lt;PHONE NUMBER> &lt;ACCOUNTING/CONTROL PREFIX>

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<h3><a href="#toc">BAUD RATE OVERRIDES</a></h3>

Baud rate overrides: 110/68 9600                   

This is where you may specify temporary overrides to the baud rate for
specified addresses.

&lt;ADDRESS> &lt;BAUD RATE>

* <span style="color: red">NOTE</span> *  This does not affect modems with a locked baud rate.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">FLAG OVERRIDES</a></h3>

Flag overrides: 110/68 CM,XX,HST              

This is where you may specify temporary overrides to the nodelist flags
for specified addresses.

&lt;ADDRESS> &lt;FLAGS>

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">SYNONYMS</a></h3>

Synonyms: ARTHUR   1:3601/14             

This field defines a list of synonyms that will substitute a KEYWORD
for an EMAIL ADDRESS. These mnemonic keywords allow for quick and easy
entry of commonly used systems.

&lt;KEYWORD> &lt;ADDRESS>

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<h3><a href="#toc">AUTO COMPILE NODELIST</a></h3>

Auto-compile nodelists:          (Startup/Midnight/Never)

Before a nodelist can be used, it must be compiled and indexed in the
nodelist database files. This process can take anywhere from 5 seconds
to 45 minutes, depending on the speed of your computer. Three options
are available to specify when to test the nodelist for currency:

  /----------+---------------------------------------------------------------\
  | STARTUP  |  Tests and/or rebuilds the database every time D'Bridge is    |
  |          |  fired up.  (This includes the nightly auto-restart.)         |
  |          |                                                               |
  | MIDNIGHT |  Tests and/or rebuilds the database after the auto-restart    |
  |          |  routine.                                                     |
  |          |                                                               |
  | NEVER    |  Only rebuilds the database upon request or if it is missing. |
  \----------+---------------------------------------------------------------/

Note that if you create a "dummy" (semaphore) file called DBRIDGE.RNC in
your D'Bridge directory, D'Bridge will "restart" itself after the compiling
is completed.


<a name="3.06"/><h2><a href="#toc">3.06  PACKET MAIL CONTROL</a></h2>

The PACKET/MAIL CONTROL screen allows you to set up general mailer controls.
Parameters include:

   - Outbound/Inbound mail archives
   - NETmail purge criteria
   - Renaming of duplicate files
   - Pre-unpack command
   - QWK networking
   - Queue aliasing
   - ECHOmail controls
   - AREAFIX controls

<h3><a href="#toc">OUTBOUND MAIL ARCHIVE</a></h3>

Outbound mail archive: C:\DB\OLDMAIL\OUTBOUND.TXT              

This specifies the name of the text file (if any) to write messages
flagged ARCHIVE/SENT to before they are erased. This is quite useful
as a history of NETmail; it includes the full message text and the
date and time it was sent.

<h3><a href="#toc">INBOUND MAIL ARCHIVE</a></h3>

Inbound mail archive: C:\DB\OLDMAIL\INBOUND.TXT              

The INBOUND MAIL ARCHIVE parameter specifies the text file (if any) into
which the DBUTIL PURGE option will archive NETmail messages before era-
sing them. If you do not wish to save old NETmail messages, leave this
field blank.


<h3><a href="#toc">NETMAIL PURGE CRITERIA</a></h3>

Purge NETmail after: 30  days

-or-

Purge NETmail except: 100  messages

In the DBUTIL PURGE program, there are two options for deciding which
messages to erase from the system. When the cursor is on this field,
you may press the F10 key to switch between the methods: PURGE EXCEPT
and PURGE AFTER. With PURGE EXCEPT, DBUTIL will erase all but "x"
messages; specify "x" in this field as how many messages to save after
purging. With the PURGE AFTER option, DBUTIL will purge messages based
on their age. PURGE AFTER 30 DAYS means to erase all messages over 30
days old when DBUTIL PURGE is run.

<h3><a href="#toc">RENAME DUPLICATE FILES</a></h3>

Rename duplicate files? Yes

There will be occasions when you receive different files with the same
name. If you answer YES to this question, any files received having a
duplicate name in the INBOUND FILES DIRECTORY will be renamed by "se-
quencing" the last character of the extension.
A duplicate README.TXT would become README.TX1 if it existed; if "1"
was already there as well, "2" would be used, etc. If you answer NO,
the existing file will simply be replaced by the one just received.


<h3><a href="#toc">MAIL PROCESSING</a></h3>

Inbound mail handling? Automatic  (Automatic/Manual/External/Disabled)

This parameter controls the method used for receiving and processing
inbound mail traffic. For most cases, Automatic would be the best
choice because mail is unpacked and possibly forwarded continuously
allowing immediate access to all ECHOmail and forwarded NETmail for
the nodes served by your system. The options available are:

  /-----------+--------------------------------------------------------------\
  | AUTOMATIC |  Automatically processes mail after each call. Exceptions    |
  |           |  are low disk-space, event override or QuickDial active.     |
  |           |                                                              |
  | MANUAL    |  Processes mail only when activated by the operator.         |
  |           |                                                              |
  | EXTERNAL  | Completely disables internal processing and causes inbound   |
  |           | XMAIL and EMAIL packets to be received as normal data files. |
  |           |                                                              |
  | DISABLED  | Completely disables processing of inbound mail.              |
  \-----------+--------------------------------------------------------------/

<h3><a href="#toc">PACKET PREPROCESSOR</a></h3>

Pre-unpack command:                                      

If you wish to run an external program before processing inbound .PKT
files, you can specify a DOS command. The use for this varies from running
archival/statistical analyzers to executing a "Message Police" program
of some type. WARNING: Modifying packets might upset some people.

 Standard scanning? Yes  (No/Yes)

This should be always be set to YES, unless you have a large Echomail
configuration with thousands of areas. When set to NO, a slightly different
method is used to improve the speed of scanning and reduce disk access.

Unpacked semaphore: BBS-MAIL.TMP

Some BBS software, such as Synchronet, looks for a file to "trigger" certain
mail functions. If your BBS software needs a dummy/semaphore file created
after D'Bridge unpacks and processes mail, specify that file here.


<h3><a href="#toc">KILL NULL MESSAGES</a></h3>

Kill null messages? Yes  (Yes/No)

Usually, you would answer YES to KILL NULL MESSAGES. A null message
means a message that has a TO, FROM and SUBJECT, but no text. These
are usually just messages associated with a file-attach and should
be ignored anyway. If you answer YES to this question, all messages
that are unpacked and have no text will be ignored.

<h3><a href="#toc">KILL IN TRANSIT MESSAGES</a></h3>

Kill in-transit messages? Yes  (Yes/No)

An IN-TRANSIT message is a message which was neither originated from
nor destined for your system. This message exists on your system just
to be forwarded elsewhere. If you answer YES to this question, IN-
TRANSIT messages will be flagged KILL/SENT when they arrive. If you
answer NO here, forwarded mail will "pile-up" until it is purged or
manually killed.


<h3><a href="#toc">LASTREAD FILENAME</a></h3>

  In this question, enter a filename to use to store the last message read
  in the area by the Echomail scanner, XMAIL and internal message editor,
  for any areas that use Fido *.MSG storage. This is simply known as
  a "lastread pointer". If you are NOT using Fido *.MSG storage then it is
  not necessary to answer this question or change its setting.
  
  The default answer for this question is 1.MSG and should NOT be changed
  unless you are running BBS software that uses 3rd-party software to "import"
  the mail into your board. For example, Searchlight by Frank LaRosa /
  Telegraphix uses SLMAIL to import Fido mail into the BBS, Renegade uses
  either Renemail or CDRMAIL to import messages. When you are using such
  software, sometimes those programs may get "confused" and think that 1.MSG
  is actually a message, when in fact its just there to keep track of the
  last message in the area. The result would be that the message gets
  imported into your BBS software anyway. So, only change the filename if
  this is the case and you're having problems.
  
  WARNING: When you change the name of the last-read pointer, you will need
           to rescan your Echomail areas so the changes can take effect. From
           the mailer select UTILITIES and select PROCESS MAIL MANUALLY.

<h3><a href="#toc">IN TRANSIT RESCAN</a></h3>

In-transit rescan? Yes  (Yes/No)

If your system acts as a hub or boss-node, you might want to provide
immediate turnaround when "routed" mail is received. If you answer
YES to IN-TRANSIT RESCAN, the NETmail area will be rescanned after each
in-transit message is received. This will cause the message to be made
available to the destination system immediately rather than at the be-
ginning of the next event.

Please note that if you enable the Areafix feature, any Areafix requests that
arrive that are NOT destined for your system will be treated as IN-TRANSIT
and forwarded to the appropriate system as determined by the ROUTING of the
current event. You may view these messages in the NETmail area.


<h3><a href="#toc">LIMIT NO COST CALLS</a></h3>

Limit no-cost calls? No   (Yes/No)

D'Bridge has a limit for the number of connections with a given system
in each mail event. This limit exists to make sure ECHOmail traffic
only turns-around a few times each mail event. Since local calls are
usually free, you can circumvent this limit for no-cost calls. Answering
Yes here will make unlimited local calls for ECHOmail turnaround.

<h3><a href="#toc">SECURED ECHOMAIL ONLY</a></h3>

Secured mail only? No  (Yes/No/Detailed)

Some hubs may wish to run a more secure system by only allowing
mail from passworded systems, either SESSION or PACKET passwords.
It makes sense that routine mail links should be secured for the benefit
of the whole network. If you answer Yes to this question, all ECHOmail
received from systems who use an incorrect password will be tossed
into the BADECHO area for inspection.

If you answer Detailed, D'Bridge will report the password of all
packets received. This should be used for diagnostics or troubleshooting
incorrect passwords between systems.

If you wish to allow packets to be processed from systems who do not use
any packet passwords at all, answer YES to the PROCESS NON-PASSWORDED
PACKETS question.

<h3><a href="#toc">LEAVE SEENBYS</a></h3>

Save ECHOmail SEENBYs? Yes (Yes/No)

If you wish to save the text containing the SEEN-BY lines in your
message base, answer YES. It really doesn't matter how you respond
to this question; the system will perform the same way.

* <span style="color: red">NOTE</span> *  This field only affects the Quick storage method.


<h3><a href="#toc">AUTOPURGE</a></h3>

  When you answer YES to this question, D'Bridge will automatically purge
  your message forums of old messages (based on the criteria you define)
  when new mail arrives. If you answer NO, you will need to use DBUTIL PURGE
  to do this. The default setting is NO.

<h3><a href="#toc">SAVE DUPLICATE MESSAGES</a></h3>

Save duplicate messages? No  (Yes/No)

Personally, I would answer NO to this question, but if you would like
to see what messages are received more than once, answer YES here. If
you save the duplicate messages, they will be tossed into the BADECHO
area for your inspection.


<h3><a href="#toc">QWK ON OR OFF</a></h3>

  QWK is an "Offline message reader" format, invented to save on-line users
  their precious online "time" on BBS's reading and replying to messages. On
  a BBS with QWK support, a user can login, download their unread mail, and
  use a 3rd-party program to read and reply offline. Then they simply call back
  in to that BBS, upload their replies, and the BBS software processes them
  as if they were written on-line. Needless to say QWK was extremely popular.
  
  Answer YES if you want the QWK system turned on, or NO if not.
  
  There are a few things to understand before you set up QWK in D'Bridge:
  
  - D'Bridge does NOT upload or download the QWK or reply packets automatically
    so you will need to this yourself or using an automated program of some
    sort. If there is a simple solution that can be coded, I'll add this, but
    unfortunately the moving of QWK mail must be done yourself somehow.
  
  - D'Bridge does NOT function as a QWK "Host" - it just handles incoming QWK
    mail with a ".QWK" extension, and forwards out mail with a ".REP"
    extension. In other words, D'Bridge does NOT generate a ".QWK" packet.
  
  - Gating QWK to Fido is very easy (just configure the QWK "index" setting)
    but use due diligence - Please ask the permission of the moderator(s) of
    whatever Fido/FTN conference if its okay to gate their echo.
  
  - The message conferences must first be added in the ECHOMAIL AREAS screen,
    just as if you were adding Fidonet areas, but in this case, do NOT specify
    any "Forward-To" information.
  
  Note that D'Bridge will process QWK packets after Fido/FTN unpacking has
  completed; this is normal behavior.


<h3><a href="#toc">QWK PROCESSING</a></h3>

     QWK information : MALKBBS  NANDRE  XPRESIT_CHIT_CHAT    1000
                       MALKBBS  NANDRE  XPRESIT_SYSOPS_ONLY  1001
                       MALKBBS  NANDRE  XPRESIT_ON_FIDONET   1002 Gated
  
  In this screen, you specify the information to use the QWK networking system
  in D'Bridge. The format of the screen is
  
                    &lt;QWK NAME> &lt;REP PACKET NAME> &lt;ECHOMAIL AREA>
  
  The QWK NAME is the filename of the QWK packet that you want to unpack and
  process. You don't need to add the .QWK extension to it. The REP PACKET
  NAME is the filename of the "reply" packet to generate for uploading to
  whatever host system you want - no extension is needed here either. And
  the ECHOMAIL AREA refers to the AREA TAG you've defined in the Echomail Area
  for the particular forum.
  
  The QWK Index Number should've already been specified in the ECHOMAIL AREAS
  screen beforehand. If you didn't do that, go back and do that first.
  Be sure to correctly match up the "QWK Index numbers" - when you join a QWK
  network, all of this information is usually provided for you by your "Host".
  
  When you are ready to send out the .REP packet, run DBUTIL REP and it will
  generate the outgoing .REP packets for everyone in the QWK OUTBOUND list.

<h3><a href="#toc">QUEUE ALIASES</a></h3>

          Queue aliases: 1:229/426   Nick

If you wish to personalise your Queue window, you can specify names for
the addresses you deal with. Up to 10 characters are allowed. The names
will be shown in the Queue instead of the addresses.

Note: "EMAIL/USENET" is a reserved name by the Internet features. You cannot
      use this name as an alias.


<h3><a href="#toc">FORCED PRIORITIES</a></h3>

Forced priorities: 1:110/68         CRASH     

This window allows you to absolutely override the priority for any
system on a semi-permanent basis. The overrides are listed one per
line and the format is:

&lt;ADDRESS> &lt;IMMEDIATE/CRASH/HOLD>

This field is also maintained in the VIEW/MODIFY QUEUE, ALT-V screen.

<h3><a href="#toc">PACKET PASSWORDS</a></h3>

Packet passwords: 1:110/68   Secret     

This window allows you to specify any packet passwords that may be required
by systems you exchange mail with. Passwords are case sensitive.

<h3><a href="#toc">AUTO ADD ECHOMAIL AREAS</a></h3>

Auto-add ECHO areas? Fido     (No/Fido/QuickBBS/Squish/JAM)

D'Bridge has the capability of automatically adding ECHOmail areas that
don't exist when undefined CONFERENCE TAGS are detected. This can save
lots of work in setting up areas; all you need to do once they are added
is to enter the area security and description using LOCAL/ECHOMAIL AREAS.

Specify which ECHOmail storage format to use for new areas:

  /-----------+--------------------------------------------------------------\
  | NO        |  Unknown ECHOmail messages will be tossed to BADECHO.        |
  |           |                                                              |
  | FIDO      |  A new subdirectory will be created and messages will be     |
  |           |  tossed there. The area will be created with Fido storage.   |
  |           |                                                              |
  | QUICKBBS  | Scans for the highest-used QuickBBS message base number.     |
  |           | The mail will be tossed and a Quick-type area is created.    |
  \-----------+--------------------------------------------------------------/


<h3><a href="#toc">PROCESS AREAFIX REQUESTS</a></h3>

AREAFIX enabled/limit: 100

D'Bridge has a very robust security system for Areafix and the next two
questions deal specifically with how you want to have transactions handled.

If D'Bridge should accept and process AREAFIX requests, enter the maximum
amount of requests to be processed per NETmail message. This is to prevent
possible abuse of your system. The default setting is 100 requests
per NETmail. Normally you shouldn't have to change this setting.

If you answer zero, then AREAFIX is DISABLED. The requests received will
just appear in your NETMAIL area and never be processed. D'Bridge only
processes requests as they are unpacked, not from them already existing in
the NETMAIL area. Sometimes, it may be necessary to shut off Areafix, such as
manually adding new networks to your system or changing other settings, and
then turn it back on when you're ready to go "live" again.

Please note that if you enable the Areafix feature, any Areafix requests that
arrive that are NOT destined for your system will be treated as IN-TRANSIT
and forwarded to the appropriate system as determined by the ROUTING of the
current event. You may view these messages in the NETmail area.

MAX REQUESTS PER DAY:

In this question, you may specify the maximum number of Areafix requests
to process from a system in a given day. This is to prevent abuse of your
system by Sysops who have an addiction to Areafix pinging. Areafix pinging
is a habit of some impatient Sysops who want to take their software out for
a "test run", or out of boredom, but in any case such pinging can gradually
tie up your system especially if you're a busy Hub.

So when a node sends too many Areafix requests in a single day, D'Bridge
can send that system a NETmail message explaining why their request cannot
be honoured (the limit is not mentioned). The default value is 10 requests
per day and normally shouldn't be changed unless you don't care about it.

Answering zero shuts off the daily limit enforcement. It should be shut
off if you deal with other Hub systems on the Fidonet network, since this
may effectively stop "genuine" Areafix requests from being processed (ie.
requests from other Hub's Areafix systems in relation to Passthru areas)


<h3><a href="#toc">AREAFIX INFORMATION</a></h3>

Areafix information: 1:110/68 PASSWORD ABC,501 Normal Yes Yes AREAS68.BBS

This window controls the AREAFIX subsystem, allowing automated area
list and ECHOmail distribution management. For each system, specify:

&lt;ADDRESS> &lt;PASSWORD> &lt;GROUPS,LEVEL> &lt;PRIORITY> &lt;RESCAN?> &lt;FWD REQ?> &lt;AREAS.BBS>

Where:

&lt;ADDRESS> is the address of the system in the form ZONE:NET/NODE.POINT

&lt;PASSWORD> is a codeword agreed upon by both systems (you and the system
specified.)  The password may be from 1 to 32 characters.

&lt;GROUPS,LEVEL> contains the groups allowed and security level assigned to
the system. ie. ABC,501 allows groups A, B and C and areas with a security
level equal to or less than 501.

&lt;PRIORITY> is the EMAIL priority associated with the link. In most cases,
you would use CRASH for systems in your local calling area and NORMAL or
HOLD for long-distance links. Valid priorities are: Immediate, Crash,
Normal and Hold.

&lt;RESCAN OK?> asks whether the specified system should be allowed to
request a complete rescan of a conference as it is added. Normally,
this is acceptable, but if your system is particularly busy, you may
want to disallow this by answering NO.

&lt;FWD REQ?> determines whether requests for unavailable ECHOmail areas
will be forwarded to your ECHO hub(s). If you answer Yes, all unknown
requests will be passed along to the first applicable ECHOmail hub.

&lt;AREAS.BBS> specifies the filename of the system's AREAS.BBS file to
use when forwarding requests. This should only be specified for the
systems which are your ECHOmail hubs or feeds. Any conference listed
in this file may be requested by other allowed systems. Make sure these
lines are listed in the desired search order.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<h3><a href="#toc">REMOVE EMPTY PASSTHRUS</a></h3>

Remove empty passthrus? Yes (Yes/No)

ECHOmail hubs which carry many passthru areas may wish to remove
unused conferences automatically. D'Bridge will erase these unused
areas a few days after the last ECHOmail feed is cut. AREAFIX
TIMEOUT DAYS controls the number of inactive days to wait
before killing the last feed and sending an AREAFIX request to
your feed, removing the conference.

<h3><a href="#toc">AREAFIX TIMEOUT DAYS</a></h3>

Areafix forwarding days? 3 

This parameter controls the number of days to wait for a new conference
to arrive after forwarding a request. After this many days, if a new
conference requested has not been received, a message is generated to
the original requesting system, explaining why their request was not
honored.

This also controls the number of days before removing a passthru area
with no links left.

<h3><a href="#toc">UNKNOWN AREA FORWARDING</a></h3>

Unknown area forwarding:                              

Here, you may specify the address of an ECHOmail hub to use "blindly",
forwarding AREAFIX requests for unknown areas. If the area is not found
in any listed AREAS.BBS file, it will be sent to the specified system.


<a name="3.07"/><h2><a href="#toc">3.07  XMAIL CONTROL</a></h2>

The XMAIL CONTROL screen allows you to configure the various compression
and decompression software that is used to bundle XMAIL packets.  Parameters
include:

   - XMAIL processing interval
   - Size limits
   - Default format
   - Specific formats
   - ZIP, LHA, ARJ, PAK, ARC and ZOO Compress and Decompress commands

<h3><a href="#toc">XMAIL PROCESSING INTERVAL</a></h3>

XMAIL processing interval: 30  (minutes)

This parameter specifies the minimum time interval between XMAIL processing
cycles. In the above example, there will be a 30 minute delay between the
end of one cycle and the start of the next. Any XMAIL received during this
delay period will not be processed immediately. At the end of the period,
processing will resume automatically.

<h3><a href="#toc">XMAIL PACKET SIZE LIMIT</a></h3>

XMAIL packet size limit: 200   (kilobytes)

This parameter controls the maximum size of outbound ECHOmail .PKT files.
When ECHOmail is scanned or forwarded, a new packet is started when the
origin address changes, or the packet size limit is exceeded. Making
this field smaller than 50k is not a good idea; neither is exceeding 250k
in a network using mailers other than D'Bridge.

When this parameter is set to zero (0), D'Bridge will create a packet
of unlimited size. This may improve efficiency on high-traffic systems, but
this setting should not be changed for normal usage. Keep in mind that
not everyone runs software capable of processing PKT files of unlimited
size. Unlimited PKT file sizes are features found in other "tosser"
programs and I am including here as well.


<h3><a href="#toc">DEBUG XMAIL</a></h3>

  This option serves as a "master override" for the processing of XMA/XMAIL-
  flagged NETmail messages. You may choose Process XMAIL, Process+Debug
  or Disable XMAIL.
  
  When Process XMAIL is selected, XMAIL will be processed normally.
  
  When Process+Debug is selected, any Netmail messages with the XMA/XMAIL
  flag that are processed by your D'Bridge system, will now display the current
  message number, from/to/subject as well as the archive name in the system
  log. Note that this WILL cause the system log to grow quite a bit in size,
  if you are processing large amounts of NETmail on your system.
  
  When Disable XMAIL is selected, XMAIL PROCESSING IS SHUT OFF. Any NETmail
  that arrives with the XMA/XMAIL flag will be treated as IN-TRANSIT and
  archived out to the next available system as defined in the SCHEDULE. The
  NETmail will be treated as if it doesn't have the XMA/XMAIL flag, and will
  NOT be packed out as XMAIL; it will be treated as a normal "Queue" entry on
  your system. Note that this also applies to any messages created by the
  internal message editor and from 3rd-party utilities.
  
  The default setting is Process XMAIL, and should not be changed unless
  you need to diagnose any problems. If you change this setting, you will need
  to rescan the outbound queue for the changes to take effect. Any NETmail
  messages that have already been packed out cannot be reverted back to Queue
  entries; therefore, please use this setting only to diagnose messages
  currently in your NETmail area.
  
  WARNING: Only experienced D'Bridge administrators should use this option.

<h3><a href="#toc">COMPRESSED MAIL FORMAT</a></h3>

Compressed mail format: ZIP [Press SPACE to change]

This specifies the default compression format for outbound XMAIL files.
Choose either ZIP, LHA, ARJ, PAK, ARC, ZOO or RAR.

D'Bridge is capable of unpacking any of these archives, providing the
decompression program is correctly specified.


<h3><a href="#toc">ALTERNATE COMPRESSION FORMATS</a></h3>

System-specific formats: ARJ 1:110/68                    

This field allows you to define specific compression formats for certain
systems. The format is as follows:

&lt;ZIP/LHA/ARJ/PAK/ARC/ZOO/RAR> &lt;filter>

ie.

ARC ALL EXCEPT 1:110/68 .10 .20

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">ZIP COMPRESS COMMAND</a></h3>

ZIP compress command: +PKZIP -MEX                          

This specifies the command to move files to a ZIP archive. For PKZIP,
the -M (move files) option must be specified.

EX is an optional parameter that tells PKZIP to use maximum compression
when creating the archive. If you (and whoever is receiving the archive)
don't care about the archive size, you can speed up processing by
changing EX to E0 (no compression). See the PKZIP documentation, or run
PKZIP by itself, for more information and help on these parameters.

* <span style="color: red">NOTE</span> *   A plus sign (+) is required before running the PKZIP program.

<h3><a href="#toc">ZIP DECOMPRESS COMMAND</a></h3>

ZIP decompress command: +PKUNZIP -O                          

This specifies the command to extract files from a ZIP archive. PKUNZIP
requires the -O option to overwrite existing files.

* <span style="color: red">NOTE</span> *   A plus sign (+) is required before running the PKUNZIP program.


<h3><a href="#toc">LHA COMPRESS COMMAND</a></h3>

LHA compress command: LHA M -M                            

This specifies the command to move files to a LHA archive. LHA
requires the M command and the -M option.

<h3><a href="#toc">LHA DECOMPRESS COMMAND</a></h3>

LHA decompress command: LHA E -CM                             

This specifies the command to extract files from a LHA archive. LHA
requires the E command and the -CM option to overwrite existing files.

<h3><a href="#toc">ARJ COMPRESS COMMAND</a></h3>

ARJ compress command: ARJ M                               

This specifies the command to move files to an ARJ archive.
ARJ requires the M command.

* <span style="color: red">NOTE</span> *   A plus sign (+) is required before running the ARJ program.

<h3><a href="#toc">ARJ DECOMPRESS COMMAND</a></h3>

ARJ decompress command: ARJ E -y                               

This specifies the command to extract files from an ARJ archive.
ARJ requires the E command to decompress and the -y switch
to automatically answer "yes" when it asks if you wish
to update (overwrite) files.

* <span style="color: red">NOTE</span> *   A plus sign (+) is required before running the ARJ program.


<h3><a href="#toc">PAK COMPRESS COMMAND</a></h3>

PAK compress command: PAK M                                 

This specifies the command to move files to a PAK archive.
PAK requires the M command.

<h3><a href="#toc">PAK DECOMPRESS COMMAND</a></h3>

PAK decompress command: PAK E /WA                             

This specifies the command to extract files from a PAK archive.
PAK requires the E command to decompress and the /WA option
to overwrite existing files.

<h3><a href="#toc">ARC COMPRESS COMMAND</a></h3>

ARC compress command: ARC M                                  

This specifies the command to move files to an ARC archive.
ARCA requires the M option to move the files to the archive.

<h3><a href="#toc">ARC DECOMPRESS COMMAND</a></h3>

ARC decompress command: ARC EO                                

This specifies the command to extract files from an ARC archive.
ARCE requires the E option to actually extract the files, and
the O option to overwrite any existing files.

<h3><a href="#toc">ZOO COMPRESS COMMAND</a></h3>

ZOO compress command: ZOO -M                                

This specifies the command to move files to a ZOO archive.
ZOO requires the -M command.


<h3><a href="#toc">ZOO DECOMPRESS COMMAND</a></h3>

ZOO decompress command: ZOO -E                             

This specifies the command to extract files from a ZOO archive.
ZOO requires the -E command.

<h3><a href="#toc">RAR COMPRESS COMMAND</a></h3>

RAR compress command: +RAR32 M                           

Specify the command to compress a RAR archive. RAR requires the M
parameter to move files into the archive. A plus sign (+) is required
before calling the RAR program.

RAR requires at least a 386 processor. It may not run on a Tandy 1000
or early IBM PS/2 computers but should run on the Tandy 2500 series.

If you are running D'Bridge under OS/2 Warp, you may first have to set
the "DPMI Enabled" setting to YES under the DOS Session Properties screen.

<h3><a href="#toc">RAR DECOMPRESS COMMAND</a></h3>

RAR decompress command: +RAR32 E -O+                       

This specifies the command to extract files from a RAR archive.

Note that the RAR command requires the E parameter to extract files
and the -O+ parameter to overwrite existing files. A plus sign (+)
is required before calling the RAR program.


<a name="3.08"/><h2><a href="#toc">3.08  TIME CONTROL SYSTEM</a></h2>

The TIME CONTROL SYSTEM screen allows you to set time-related parameters
and display historical data.  Functions and parameters include:

   - UTC offset
   - Daylight savings time status
   - Timezone names
   - Default ClockSync systems
   - Remote clock history
   - Adjustment history

<h3><a href="#toc">OBSERVE DAYLIGHT SAVINGS TIME</a></h3>

Observe DAYLIGHT SAVINGS TIME at this site? Yes

In most locations, the time changes twice a year for daylight
savings time. If your country/state observes this, answer Yes.

<h3><a href="#toc">ADJUST MAIL EVENTS</a></h3>

* <span style="color: red">NOTE</span> *  This feature is not currently supported.

<h3><a href="#toc">ADJUST CLOCKSYNC EVENTS</a></h3>

* <span style="color: red">NOTE</span> *  This feature is not currently supported.

<h3><a href="#toc">ADJUST DOS EVENTS</a></h3>

* <span style="color: red">NOTE</span> *  This feature is not currently supported.


<h3><a href="#toc">DAYLIGHT TIME STARTS</a></h3>

Daylight time starts: 04/23/92

Specify the date on which daylight savings time starts. If daylight
time is currently in effect, use the date last spring when it started.
If it is late fall or winter and daylight savings time is not in
effect, use the date on which it will start next spring.

<h3><a href="#toc">DAYLIGHT TIME ENDS</a></h3>

Daylight time ends: 10/21/92

Specify the date on which daylight savings time ends. Always make sure
the ending date is greater than the starting date, next spring.

<h3><a href="#toc">DAYLIGHT TIME CHANGES</a></h3>

Time of automatic change: 02:01

Specify the exact time at which daylight savings time changes. In the USA
it is always 2:01 on a Sunday morning in the spring and fall. For times
in the afternoon, make sure to use 24-hour format (ie. 13:00 is 1:00pm).

<h3><a href="#toc">LOCAL STANDARD TIME</a></h3>

Name of local STANDARD time: Eastern Standard Time    

Specify the name of your timezone during standard time.

<h3><a href="#toc">LOCAL STANDARD TIME ABBREVIATION</a></h3>

Abbreviation for local STANDARD time: EST   

Specify the commonly accepted abbreviation for your local standard time.


<h3><a href="#toc">LOCAL DAYLIGHT TIME</a></h3>

Name of local DAYLIGHT time: Eastern Daylight Time    

Specify the name of your timezone during daylight savings time.

<h3><a href="#toc">LOCAL DAYLIGHT TIME ABBREVIATION</a></h3>

Abbreviation for local DAYLIGHT time: EDT   

Specify the commonly accepted abbreviation for your local daylight time.

<h3><a href="#toc">DISPLAY TIME DATA</a></h3>

Display comparative time data? No 

On inbound as well as outbound calls D'Bridge will compare its time
with that on other systems it connects to.   If you want this data to
be displayed in the LOG window, answer Yes here.

<h3><a href="#toc">TIME WARNING THRESHOLD</a></h3>

Display average time-difference if: 5   minute(s) or more

On inbound as well as outbound calls D'Bridge will compare its time
with that on other systems it connects to. A history is kept and
average differences are computed. If you wish to see a warning when
the average time difference exceeds a certain threshold, specify the
number of minutes here.
In this example, a warning will be displayed when the average time
difference exceeds 5 minutes.

To reset this warning display, you will need to Zero the clock history
screen.


<h3><a href="#toc">CLOCK HISTORY FOR</a></h3>

Store data from the clocks on: ALL                            

Specify a filter controlling which systems will be included in
your time/clock history screen. If there are some systems you
wish to exclude, use: ALL EXCEPT nnn/nnn nnn/nnn ... etc.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">CLOCKSYNC SYSTEM</a></h3>

Always synchronize clock with: 1:3601/14     

You have the option of setting your clock using a certain system both on
demand and every time you connect with it. In this example, my system
will always synchronize its clock to 1:3601/14, a "D'Bridge Universal
TimeBase."

In most cases, leave this blank.

<h3><a href="#toc">AUTOMATIC CLOCKSYNC SYSTEM</a></h3>

Default ClockSync timebase: Atomic clock    

If you start D'Bridge with the clock obviously wrong, it will set its
clock using the specified system. Leaving it blank will make it call
the atomic clock at the U.S. Naval Observatory near Washington D.C.

The only time this happens automatically is when the date is set to
before this release of D'Bridge occurred -- the clock is wrong without
a doubt. (This occurs when there is no battery-backed clock on an
XT most frequently.)


<h3><a href="#toc">CLOCK SET COMMAND</a></h3>

DOS command after clock adjustment:                        

Some computers, usually XTs, require a command to be issued to set
the battery-backed clock which is not on the motherboard. If you own
such a clock, you probably know what this means. If you don't, leave
this field blank.


<a name="3.09"/><h2><a href="#toc">3.09  FUNCTION KEYS</a></h2>

The FUNCTION KEYS screen allows you to define programmable function keys
for use within D'Bridge.

<h3><a href="#toc">USER FUNCTION</a></h3>

There are 19 programmable function keys that may be made available from
the main menu or D'Bridge idle state. F2 through F10 and ALT-F1 through
ALT-F10 may be programmed to execute any number of DOS commands or spe-
cial functions.

As well as DOS commands, the following functions are available here:

/----------------+-----------------------------------------------------------\
| +(command)     |  Causes D'Bridge to swap to disk, leaving more memory     |
|                |  available to the application.                            |
|                |                                                           |
| -(command)     |  Causes the command to be executed inside the queue       |
|                |  window. Only use this for programs that do standard      |
|                |  DOS I/O.                                                 |
|                |                                                           |
| *R             |  This will force a rescan of the queue. Same as ALT-Q     |
|                |                                                           |
| *L             |  This will be replaced with the current line number       |
|                |                                                           |
| *S             |  This will force a complete ECHOmail rescan.              |
|                |                                                           |
| *X&lt;errorlevel> |  This causes an exit with the specified DOS errorlevel.   |
\----------------+-----------------------------------------------------------/

* <span style="color: red">NOTE</span> *  You must NEVER load a TSR using this method. It will cause
a system crash when D'Bridge resumes.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<a name="3.10"/><h2><a href="#toc">3.10  BBS CONFIGURATION</a></h2>

The BBS CONFIGURATION screen allows you to set up an interface between your
BBS system and D'Bridge.  Parameters include:

   - EMAIL calls only text
   - Press ESC for BBS text
   - Loading BBS text and filename
   - Human caller timeout
   - BBS online hours
   - After hours file
   - Minimum baud rate
   - Too slow file
   - ECHOmail scan
   - DOS commands for BBS

<h3><a href="#toc">BBS SOFTWARE INSTALLED</a></h3>

BBS software installed? Yes

If you are using D'Bridge as the "front-end" for a bulletin board system
(BBS), answer "YES" to this question. If you do not want D'Bridge to run
another program (such as a BBS) when "humans" call, specify "NO."

<h3><a href="#toc">EMAIL CALLS ONLY TEXT</a></h3>

"EMAIL calls only" text: Please hang up... accepting EMAIL calls only.  

If a human caller dials in when D'Bridge is not accepting human callers
during the current mail event, this line of text will be displayed on
the caller's terminal. This is also displayed if you have answered No
to "BBS software installed."


<h3><a href="#toc">PRESS ESC FOR BBS TEXT</a></h3>

"Press ESC for BBS" text: Press the ESC key twice to access the BBS.   

When someone first dials into D'Bridge, it displays its copyright notice
and this text. You may specify any message you wish to replace the stan-
dard message, but remember you should inform the caller to 'press the
ESC key twice for faster access' in this line.

<h3><a href="#toc">LOADING BBS TEXT</a></h3>

"Loading BBS" text: BBS now loading - Please wait...             

This text will be displayed when a human caller presses the ESC key
twice or the "human caller timeout" has expired. This is to inform
the caller that the BBS is currently loading and that he should wait.

<h3><a href="#toc">LOADING BBS FILE</a></h3>

"Loading BBS" file: C:\DB\LOADBBS.TXT                     

If you wish to display some sort of "banner" file when the BBS is
loading, specify the name of a text file here. You may use ANSI codes
and IBM graphics if you wish, but keep in mind that not all callers
have computers compatible with IBM ANSI. You're best off keeping it
printable ASCII (32-126 decimal).

<h3><a href="#toc">HUMAN CALLER TIMEOUT</a></h3>

"Human" caller timeout: 20

Specify the number of seconds D'Bridge should wait before determining
that a call is "human" and not an EMAIL call. The minimum value for
this field is 10 (seconds), but you may want to make this time longer
if you have "noisy" phone lines or trouble with inbound connections.


<h3><a href="#toc">BBS ONLINE HOURS</a></h3>

BBS online hours: 06:00 until 23:00

This field allows you to specify the hours of operation for your BBS.
If a human caller is detected outside of these hours, the "After hours"
file will be transmitted and D'Bridge will hang-up. This is another
way besides the use of mail events to restrict BBS access times.

<h3><a href="#toc">AFTER HOURS FILE</a></h3>

"After hours" file: C:\DB\BBSHOURS.TXT                

If you restrict the hours of operation of your BBS, you need to prepare
a text file in which you explain your policy to human callers. Specify
the name of a text file here; it will be transmitted to all human callers
dialing in outside the specified time frame.

<h3><a href="#toc">MINIMUM BAUD RATE</a></h3>

Minimum baud rate: 1200 

If you wish to restrict BBS access to those callers that have a faster
modem, specify the minimum allowable baud rate here. In this example,
300 baud callers will be rejected and the "Too slow" file will be sent.

If you don't care about the baudrate, just leave this question blank.

<h3><a href="#toc">TOO SLOW FILE</a></h3>

"Too slow" file: C:\DB\TOOSLOW.TXT                 

If you have specified a minimum baud rate for BBS access, this file
will be transmitted to callers with slower modems. If you're going
to reject callers based on baud rate, the least you can do is explain
your policy...


<h3><a href="#toc">SCAN ECHOMAIL AFTER CALL</a></h3>

Scan ECHOmail after call? Yes

If you wish to rescan all ECHOmail areas after each BBS call, answer
Yes here. This allows for immediate turnaround on ECHOmail entered
through the BBS software.


<h3><a href="#toc">DOS COMMANDS FOR BBS</a></h3>

DOS commands for BBS:                              

Here, you specify the DOS commands that will be used to invoke the BBS,
telling it you already have a caller on. There are two methods for
doing this: SPAWNING and EXITING. The most popular method is to SPAWN
the BBS - leaving D'Bridge in memory. EXITING is used only when there
is not enough memory to SPAWN the entire BBS system. In this field,
you simply list the DOS commands you want D'Bridge to run to invoke
the BBS. There are several "special" commands that substitute values
or cause an EXIT:

/----------------+-----------------------------------------------------------\
| +(command)     |  Causes D'Bridge to swap to disk, leaving more memory     |
|                |  available to the application program.                    |
|                |                                                           |
| -(command)     |  Causes the command to be executed inside the queue       |
|                |  window. Only use this for programs that do standard      |
|                |  DOS I/O.                                                 |
|                |                                                           |
| *B             |  This is replaced by the baud rate of the connection.     |
|                |                                                           |
| *C             |  This is replaced by the actual or translated connect     |
|                |  string from the modem.                                   |
|                |                                                           |
| *P             |  This is replaced by the comm port number (1-8)           |
|                |                                                           |
| *L             |  This is replaced by the number of the current line       |
|                |                                                           |
| *R             |  This will force a rescan of the queue. Same as ALT-Q     |
|                |                                                           |
| *S             |  This will force a complete ECHOmail rescan.              |
|                |                                                           |
| *T             |  This is replaced by number of minutes until the next     |
|                |  event defined in "schedule maintenance."                 |
|                |                                                           |
| *X             |  This causes an exit with the errorlevel corresponding    |
|                |  to the baud rate divided by 100.  ie. 1200 baud = 12     |
|                |                                                           |
| *X&lt;errorlevel> |  This causes an exit with the specified DOS errorlevel.   |
\----------------+-----------------------------------------------------------/


As an example, here's what my DOS BBS COMMANDS field looks like to run
Opus, then execute the MYMAIL program (An Opus MAIL-CHECK program by
Steve Sullivan):

    cd \opus
    opus opus -t*t -p*p -b*b
    mymail -u

When a caller dials in at 2400 baud with 120 minutes until the next
event, D'Bridge runs the following DOS commands:

    cd \opus
    opus opus -t120 -p1 -b2400
    mymail -u

After all these commands are complete, D'Bridge initializes the modem
and returns to its previous status (Mail event, IDLE, etc.).

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<a name="3.11"/><h2><a href="#toc">3.11  SECURITY MISCELLANEOUS</a></h2>

The SECURITY/MISCELLANEOUS screen allows you to setup various parameter
which affect security or are somehow "miscellanneous."  Parameters include:

   - Hang-up on security violation
   - Ignore unauthorized mail packets
   - Rename unauthorized/unknown files
   - Allow unlisted nodes to send mail
   - File request controls
   - Session passwords
   - Automatic password request control
   - Function requests
   - Gateways
   - External receivers
   - Fidonet and WaZOO protocol overrides

<h3><a href="#toc">HANG UP ON SECURITY VIOLATION</a></h3>

Hang-up on security violation? No 

If you are using SESSION PASSWORDS to protect any or all of your
links, you may choose to hang-up and not accept any mail from any
system with a missing or invalid password.  This option has no effect
on systems that have no password specfied.  Used in conjunction with
Secured ECHOmail only, this provides a fairly good security method
for ECHOmail traffic.

<h3><a href="#toc">IGNORE UNAUTHORIZED MAIL PACKETS</a></h3>

Ignore unauthorized mail packets? No 

If you are using SESSION PASSWORDS to protect any or all of your
links, you may choose to completely ignore incoming mail from a link
using the wrong (or no) password. If you indeed wish to ignore this
mail, specify Yes to this field. If you want to receive the mail
normally, answer No.

Unauthorized mail that comes in will be renamed to BAD-MAIL.001,
BAD-MAIL.002, etc.


<h3><a href="#toc">RENAME UNAUTHORIZED INBOUND FILES</a></h3>

Rename unauthorized inbound files? Yes

You may choose to rename file-attachments that come in from unknown/unlisted
systems or from systems that connect with an incorrect password. D'Bridge
will rename the files to BAD-ATCH.001, BAD-ATCH.002, etc.

The reason for doing this is to prevent unauthorized ECHOMAIL and FUNCTION
REQUESTS from being executed. Specify Yes if you want to automatically
rename incoming files or No if you want to receive them normally.

<h3><a href="#toc">ALLOW UNLISTED NODES TO SEND MAIL</a></h3>

Allow unlisted nodes to send mail? Yes

In a private network, possibly the BEST way to discourage hackers from
the outside is to hang-up on them immediately. If you specify Yes to
this question, D'Bridge will immediately reject any incoming call from
a system not listed in your nodelist. This should only be used in a
private network - public networks often have communications from new
addresses or private addresses that are not in the nodelist (yet).

<h3><a href="#toc">FILE REQUESTS FOR UNLISTED NODES</a></h3>

File-requests for unlisted nodes? Yes

If you support file-requests, you must decide whether or not you wish
to allow systems that are NOT in your nodelist to request files. Some
people (kids, usually) will abuse your system's file-request privilege
by calling back many times, using many fake node numbers to file-request.
If you say Yes to this question, any system, listed or not will be able
to issue file-requests. If you say No then only requests from systems
found in your nodelist will be honored.


<h3><a href="#toc">TIME LIMIT FOR FILE REQUESTS</a></h3>

Time limit for file-requests: 30  (minutes)

When you are running a public system, you may find you have trouble with
people abusing the file-request privilege by constantly requesting too
many files and keeping your system busy for hours. D'Bridge allows you
to limit the time allowed for file-requests. Here you may limit the num-
ber of minutes allowed before refusing to honor a request.

<h3><a href="#toc">FILE REQUEST LIMIT</a></h3>

File-request limit: 500  (kilobytes)

You may limit the total number of kilobytes allowed for file-request
by specifying it here. It is suggested you make this larger than the
biggest file you have available for request.

<h3><a href="#toc">MAXIMUM FILES FOR FILE REQUEST</a></h3>

Maximum files for file-request: 10 

You may limit the total number of files allowed for request. This
is really not as meaningful as the other limits because time is the
main factor requiring a limitation.

<h3><a href="#toc">CHECK LIMITS BEFORE OR AFTER</a></h3>

Check limits BEFORE or AFTER? After 

This specifies whether the file-request limits are tested BEFORE or
AFTER each file is transferred. Personally, I prefer testing AFTER
because I like to allow people to request any file on my system; some
files on my system are larger than the FILE-REQUEST LIMIT (K.)
If the limits are checked BEFORE each transfer, it would be impossible
to file-request any file larger than the size limit.


ENFORCE LIMITS FOR 24 HOURS

Enforce limits for 24-hours? No 

If you wish to accumulate these file-request limits for a 24-hour
period, answer Yes here. If you want the limits enforced on a
per-call basis, answer No. If the limits are enforced for 24-hours,
a file is created containing the address, timestamp and limit data.
The limit will be reset exactly 24-hours from the START of the first
file-request. If you must manually reset these limits, delete the
file "DBRIDGE.FRS."

<h3><a href="#toc">MINIMUM BAUD RATE FOR REQUESTS</a></h3>

Minimum baud rate for request? 1200 

This specifies the minimum link rate (baud) allowed for file-requests.
(300/1200/2400/4800/9600... Etc.)


<h3><a href="#toc">SESSION PASSWORDS</a></h3>

Session passwords: 1:3601/14 SECRET       

In a corporate environment, or a public network where security is
becoming a problem, you may specify a SESSION PASSWORD for each system
you plan to communicate with directly. This password must be specified
by BOTH systems and must be agreed upon in advance. Once in place, it
becomes impossible to communicate with the other system if you don't
use the same password.

A password will prevent an unauthorized system from picking up mail.
With HiTek comes Hi-Tech hackers. It is not hard to change your address
to something else, then poll your host to see what mail you can "steal".
Any "link" protected with a password is not vulnerable to this simple
form of "mail-stealing". For a password with 135/20, type:

135/20 WALLY     (Where "WALLY" is the desired SESSION PASSWORD)

Any number of session passwords may be defined. Remember, in the above
example, it is important 135/20 also sets up a SESSION PASSWORD for my
address, 110/68, or it won't work. Both ends must use the same password!
(Passwords must be eight letters or less).

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">AUTOMATIC PASSWORD REQUEST FOR</a></h3>

Automatic password request for: 201:ALL 1:110/ALL                 

D'Bridge has the capability to automatically establish session passwords
with new links.  This field specifies a filter that controls which EMAIL
addresses that you wish to request an automatic session password be added.
If you wish to disable this feature, specify NONE as the filter.

* <span style="color: red">NOTE</span> *  This field only affects outbound calls.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<h3><a href="#toc">ALLOW PASSWORD REQUESTS FROM</a></h3>

Allow password requests from: ALL                               

The D'Bridge Automatic Password Request System allows a remote system to
request that a session password be established automatically.  If a calling
system makes this request, the answering system creates a random 8-character
password and transmits it back using the EMSI handshake.

This field specifies a filter that controls which EMAIL addresses that you
wish to allow password requests from.  If you wish to disable this feature,
specify NONE as the filter.

* <span style="color: red">NOTE</span> *  This field only affects inbound calls.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<h3><a href="#toc">FUNCTION REQUESTS</a></h3>

Function requests:                                       

A FUNCTION REQUEST is an online service provided to calling systems
while they are still "on the line". FUNCTION REQUESTS only work with
other WaZOO-based EMAIL systems such as D'Bridge, FrontDoor, Opus and
BinkleyTerm. This is a VERY advanced feature and will not be used by
most systems, so don't feel bad if you don't understand this...

A function request can be defined in four steps:

    1) The caller sends the REQUEST FILE.

    2) D'Bridge recognizes the filename as being a FUNCTION REQUEST
       and spawns the REQUEST SERVER task. (user-provided)

    3) The REQUEST SERVER (a program provided by the user) takes its
       input data from the REQUEST FILE and the CALLER.FIL file cre-
       ated by D'Bridge. It prepares output file(s) to send back to
       the caller plus an OUTPUT FILE LIST telling D'Bridge which
       files to send.

    4) When the REQUEST SERVER has terminated, D'Bridge then transmits
       all the files listed in the OUTPUT FILE LIST, deletes them, and
       continues to send the rest of the "pickup" mail.

To use this feature, you must either write your own REQUEST SERVER or
use one of the existing systems such as ML-INQ.

The format for the FUNCTION REQUESTS field is:

    &lt;REQUEST FILE> &lt;OUTPUT FILE LIST> &lt;DOS COMMAND>

For an example, I'll explain how I run the ML-INQ program on my system.
ML-INQ stands for Megalist Inquiry. The Megalist is another program I
wrote that creates a "master file listing" for all participating Fido
and Opus systems. The list got so huge, I decided to add an on in-
quiry service. To access the MegaList Inquiry feature, the calling sys-
tem simply creates a text file containing a list of filenames to search
for; this file is called MEGALIST.INQ. Anytime D'Bridge receives a file
called MEGALIST.INQ, the REQUEST SERVER "ML-INQ" is executed.
Here's what I have in my FUNCTION REQUEST field:

    MEGALIST.INQ MEGALIST.LST ML-INQ


The ML-INQ program first opens the file "CALLER.INF" to get general
information about the system and the caller. CALLER.INF is a text
file created automatically by D'Bridge just before spawning the REQUEST
SERVER task. Here's what my CALLER.INF contains at the moment:

    1:101/200          (The Fidonet address)
    TC-Trader          (The system name)
    Cheryl Buzzell     (The operator name)
    C:\DB\FILES\       (My INBOUND FILES DIRECTORY path)

ML-INQ then opens the file "C:\DB\FILES\MEGALIST.INQ" to get the actual
request from the caller. Then, it prepares the file "MEGALIST.OUT" con-
taining the results of the search. Finally, ML-INQ creates the OUTPUT
FILE LIST, this time called MEGALIST.LST (in the current directory);
this file contains the list of files to send back to the caller, then
erase. In this case, the OUTPUT FILE LIST only contains MEGALIST.OUT.

Finally, ML-INQ returns control to D'Bridge and the file gets sent and
deleted as specified. The request file, MEGALIST.INQ, is also erased.

A request server may transmit files without erasing them (if they are
available for file-request) simply by creating a WaZOO-style request
file (with the extension .REQ) in the INBOUND FILES DIRECTORY. D'Bridge
will treat these files like inbound file requests.

IMPORTANT:  It is essential that any REQUEST SERVER takes no more than
            30 seconds to execute. Taking more time than this can cause
            the calling system to timeout and hang-up.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">EXTERNAL RECEIVERS</a></h3>

External receivers: CONNECT FAX|*X50                           

This feature is designed for use with combination modems that also
handle FAX and/or VoiceMail. The above example causes D'Bridge to
exit with errorlevel 50 when a "CONNECT FAX" response is received
from the modem.

The syntax for this field is:  &lt;MODEM RESPONSE>|&lt;DOS command>

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<h3><a href="#toc">EXTERNAL GATEWAYS</a></h3>

External gateways:                                        

Again, this is a VERY advanced feature and will not be used by 99% of
the D'Bridge systems out there; this is for the other 1%:

An EXTERNAL GATEWAY allows D'Bridge to act as a "front-end" for up to
20 other EMAIL receivers at the same time. The way this works, is by
defining a specific "SYNC" sequence; D'Bridge can look for that sequence
and spawn another EMAIL system while the calling system is still on.
This way, D'Bridge can be compatible with as many systems as possible.
As of this time, I know there are gateway programs for UUCP and USENET.
I'm sure there are others I just don't know about.

As an example, let's say I want to install a UUCP mail receiver "on
top" of D'Bridge. I have a program written for the IBM PC which will
receive mail when a call is received. Assuming this program features
an option to respond to a call already in progress and terminate after
finishing the session, it is compatible. The first thing you need to do
is figure out what the SYNC sequence is.

A SYNC sequence is the sequence of bytes the calling system sends to
the receiving system (multiple times) until the receiver responds with
an acknowledgment that it is ready to begin a mail session.
D'Bridge can be programmed to recognize up to 20 separate sequences of
up to 16 bytes each and spawn a different task depending on which one
is received. For example, let's say your UUCP transmitter continuously
sends the sequence: 9F, A9, 9F, A9... (hex) until the receiving system
acknowledges. For this sequence, simply specify your EXTERNAL GATEWAYS
field as:

    9F/A9 UUCP_RCV -b*b -p*p

As soon as an incoming call is detected sending the sequence 9F, A9,
D'Bridge will spawn the UUCP mail receiver with the following command
line:

    UUCP_RCV -b2400 -p1

Just like described in DOS BBS COMMANDS, the BAUD RATE and PORT NUMBER
can be substituted by using a *B and *P respectively.
It is up to the spawned task (UUCP_RCV in this case) to handle the mail
session from this point on; it should terminate as soon as the mail is
received and make sure it doesn't answer any calls itself.


Because of the normal operation of D'Bridge, we've restricted three
characters: 1B (Escape), AE (Fidonet TSYNC), and F1 (WaZOO YOOHOO
character). These three bytes may not be a part of your SYNC string.
It is also suggested you use bytes with high parity (greater than 7F
(hex)) to prevent "human" users from easily activating your alternate
mailer.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">FIDONET PROTOCOL FOR</a></h3>

Fidonet protocol for: NONE                           

If you want to override the default EMSI/WAZOO protocol D'Bridge uses
and revert to XMODEM/TELINK protocols, specify the NET/NODE filter here.
This field should contain "NONE" in all but the strangest setups.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">WAZOO PROTOCOL FOR</a></h3>

WaZOO protocol for: NONE                             

If you want to override the default EMSI protocol D'Bridge uses and
revert to the YOOHOO-YOOHOO/2U2 handshake, specify the NET/NODE filter
here. This field should contain "NONE" in all but the strangest setups.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<a name="3.12"/><h2><a href="#toc">3.12  DISK SPACE MINIMUMS</a></h2>

The DISK SPACE MINIMUM screen allows you to set minimum criteria for system
operation:

   - System operation minimum
   - BBS operation minimum
   - Unpack/forward minimum

<h3><a href="#toc">SYSTEM OPERATION</a></h3>

The system operation line specifies the minimum disk space allowed (in Kb)
before D'Bridge will completely shut down. Once shut down, D'Bridge will
not reactivate without human interaction. Either disk space must be
freed, or DB SETUP must be used to change the minimum.

<h3><a href="#toc">BBS OPERATION</a></h3>

The BBS operation line specifies minimum disk space criteria for BBS
operation. If disk space is below specified criteria, human callers
will be told the BBS is offline due to disk space shortage.

<h3><a href="#toc">UNPACK FORWARD</a></h3>

The unpack/forward line specifies the minimum disk space required before
a mail packet may be decompressed or unpacked. Once this limit is
reached, all ECHOmail and NETMAIL unpacking will be halted.


<a name="3.13"/><h2><a href="#toc">3.13  ACCOUNTING TRANSLATION</a></h2>

The ACCOUNTING/TRANSLATION screen allows you to set up costing data and
controls which determine where D'Bridge calls and when.  This system allows
for minimum telecommunications cost when NORMAL priority is used.  A default
table of USA-EAST.COS (an exported file) is included by default.  Contact your
nearest D'Bridge dealer for a local, more recent cost file.

<h3><a href="#toc">PREFIX</a></h3>

Prefix: 1-513-                              

This is the "key" to the database record. You cannot change it. If
you must, you need to remove and add the record again. The PREFIX field
is the first part of a phone number (which will be replaced with the
TRANSLATE TO field when a number is dialed).

<h3><a href="#toc">TRANSLATE TO</a></h3>

Translate to: 1-                           

When phone number are translated, this field will be used to replace the
PREFIX for dialing. The field is actually broken down into two subfields:
PREFIX and SUFFIX. If you need to dial something after the number,
such as a credit card or billing account number, you may specify a SUFFIX
by using a vertical pipe ( | ) to separate the PREFIX from the SUFFIX.
An example would be: 1-305-370|,,3188. ",,3188" would be sent to the modem
after dialing. The two commas represent a modem command meaning "pause a
few seconds before dialing the following digits".

<h3><a href="#toc">LOCATION</a></h3>

Location: Southwestern Ohio                   

This is just a description field for your information.


<h3><a href="#toc">COST DATA SOURCE</a></h3>

Cost data source: Table

Here, you either specify Table or Xref for the data source. If you
use Xref, you will be prompted for another prefix to cross-reference.
Otherwise, you will use the table listed below...

The box at the bottom of the screen contains the cost information.
In order to keep communications costs low, D'Bridge has adopted a
system of "cost-based control". This means the system can be programmed
to place all calls during the most economical periods based on this
cost screen entirely. The cost-information for calling a given country
or city can be acquired by calling your long-distance company.
Typically, there are different rates on different days and at different
times. This table allows you to specify up to 5 cost-periods for
accounting and control purposes.

When D'Bridge looks at these cost-tables, it searches from the top of
the list to the bottom, stopping on the first match. For this reason,
"catch-all" entries, like the one shown at the bottom of our example
should be listed last. For flexibility and simplicity, you are allowed
to define overlapping periods, but nevertheless D'Bridge will always
select the first applicable period for accounting and control.
Please note that any time-ranges left undefined are assumed "free" and
D'Bridge will actually try to dial out during these times. Therefor:
DON'T LEAVE ANY TIME-RANGE UNSPECIFIED.

<h3><a href="#toc">REFERENCE PREFIX</a></h3>

Reference prefix: 1-                      

When using a cross-referenced table, you must specify the prefix whose
table you wish to use for costing and control purposes. The translation
will still be based on the data listed above, but now it will be applied
to the referenced table.


<h3><a href="#toc">TABLE WEEKDAYS</a></h3>

All  S M T W T F S H

In these fields, specify for which day(s) the costing-line is applicable.
Any non-blank character will designate a weekday. H stands for holiday.

<h3><a href="#toc">TABLE START TIME</a></h3>

Here, you specify the starting time for the cost period. Make sure you
use 24-hour time format (e.g. 23:00 is 11:00 pm).

<h3><a href="#toc">TABLE END TIME</a></h3>

In this field, you specify the ending time for the cost period.

<h3><a href="#toc">TABLE NCI</a></h3>

Here's the CRITICAL part to understand. During a given cost-period, you
may choose which priorities of mail you would like to be sent. In the
NCI field, you may specify any or all of the letters N, C and I, desig-
nating the priorities NORMAL, CRASH and IMMEDIATE. If you list all three
"NCI," then all priorities of mail are allowed to be sent during this
cost-period. If you enter "CI," then just CRASH and IMMEDIATE mail
will be sent. This allows you to send NORMAL priority mail during the
low-cost periods and higher priority mail anytime (that's what this
example shows).

<h3><a href="#toc">TABLE FIRST PERIOD COST</a></h3>

In this field, enter the cost associated with the first billing period.
This is a decimal number with three digits after the decimal point.


<h3><a href="#toc">TABLE FIRST PERIOD SECONDS</a></h3>

Specify the number of seconds on which the FIRST PERIOD COST field
is based. In the United States, this is normally "60", but other
countries and/or long-distance carriers may have a different billing
increment.

<h3><a href="#toc">TABLE SUBSEQUENT PERIOD COST</a></h3>

In this field, enter the cost associated with the subsequent billing
periods. This is a number with three digits after the decimal point.

<h3><a href="#toc">TABLE SUBSEQUENT PERIOD SECONDS</a></h3>

Specify the number of seconds on which the SUBSEQUENT PERIOD COST field
is based. In the United States, this is normally "60", but other
countries and/or long-distance carriers may have a different billing
increment.


<a name="3.14"/><h2><a href="#toc">3.14  ZMODEM PARAMETERS</a></h2>

The ZMODEM PARAMETERS screen allows you to set the behavior of the ZMODEM
protocol which D'Bridge uses to send EMAIL.  Parameters include:

   - Starting block size
   - Maximum block size
   - Recover block size
   - Block step rate
   - Direct ZMODEM

<h3><a href="#toc">STARTING BLOCK SIZE</a></h3>

This is the block size to be used at the start of a ZMODEM file-transfer.
This must be a power of two between 32 and 8192 (32, 64, 128, 256, 512,
1024, 2048, 4096 or 8192).

<h3><a href="#toc">MAXIMUM BLOCK SIZE</a></h3>

This is the largest block size D'Bridge will use in ZMODEM. The value
will increase from the STARTING BLOCK SIZE to MAXIMUM BLOCK SIZE using
the BLOCK STEP RATE specified here.

<h3><a href="#toc">RECOVERY BLOCK SIZE</a></h3>

This is the block size to be used after an error has been reported by
the receiver. Normally, this value should be less than the starting
block size because where there is one error (phone noise) there may im-
mediately be another. Making the recovery block size small reduces the
amount of time it takes the system to recover from bad line noise.


<h3><a href="#toc">BLOCK STEP RATE</a></h3>

When the ZMODEM sender is not receiving error reports from the receiver,
it will increase the block size by doubling it after "x" successful
blocks until it reaches the MAXIMUM BLOCK SIZE specified. The BLOCK
STEP RATE is "x". In other words, it tells the system after how many con-
secutive good blocks it may increase the block size. By default, D'Bridge
uses a factor of 4.

<h3><a href="#toc">DIRECT ZMODEM</a></h3>

When D'Bridge communicates with other EMAIL systems capable of the DZA or
IZE protocols, you have the option of increasing throughput an average of
<a name="1.6%"/><h2><a href="#toc">1.6% by selecting direct ZMODEM. By answering Yes to this parameter, the</a></h2>
protocol will transmit the XON and XOFF characters transparently rather than
"escaping" them as the ZMODEM specification calls for. If you are having
ZMODEM trouble, try setting this to No to see if it makes a difference.


<a name="3.15"/><h2><a href="#toc">3.15  SETUP EDITOR OPTIONS</a></h2>

The SETUP EDITOR OPTIONS screen allows you to control the behavior of the
internal editor or configure an external editor such as GoldED.

This version of D'Bridge has a built-in TWIT FILTER system designed to
remove unwanted messages from your system, either before or after they
arrive. It is also integrated with the internal message editor so when
you are reading messages and decide you do not wish to receive mail from
that person, you add them to the TWIT list, and mail from them no longer
will appear on your system.

Depending on the option selected, you may also prevent mail from a "twit"
from being forwarded to other systems - though this practice is not
recommended. Therefore, the TWIT FILTER is an advanced option that most of
you will not use, except if you are receiving SPAM or *really* wish not to
see any mail from somebody.

The TWIT FILTER system is a feature found in most other EMAIL software and
I am including it here as a convenience.

<h3><a href="#toc">EMAIL EDITOR</a></h3>

EMAIL editor: Internal  (Internal/GoldED/Other)

This selects the EMAIL editor to be used when ALT-E is pressed or the menu
option "READ/EDIT EMAIL" is selected. The default is Internal, but GoldED
and many other Fidonet-compatible editors may just as well be used.

You should only use message editors that specifically state that they will
work with D'Bridge. The use of message editors designed for other Fidonet
products may not work as desired.

<h3><a href="#toc">EDITOR REBUILD QUEUE</a></h3>

Rebuild queue? Yes

This parameter gives you the option to automatically rescan the NETmail
area after EMAIL has been entered or deleted. This scan will happen im-
mediately after exiting the editor. If you want the mail scanned automa-
tically, specify Yes here. It will not scan automatically if you spe-
cify No.


<h3><a href="#toc">EDITOR SCAN ECHOMAIL</a></h3>

Scan ECHOmail? Yes

If you want to send ECHOmail messages immediately after leaving the
editor, specify YES here. The D'Bridge ECHOmail scanner knows what
areas need to be scanned if any. If you don't say YES here, then
ECHOmail will not be sent until an ECHOscan is run either in an event
or manually using the menu option: UTILITIES/Process ECHOmail.

<h3><a href="#toc">EDITOR SOUND EFFECTS</a></h3>

Sound effects? Yes

This specifies whether the "warning beeps" will be active in the internal
editor. Answer Yes, and change it to No later if the noise bothers you.


<h3><a href="#toc">EDITOR DEFAULT PRIORITY</a></h3>

DEFAULT: Priority? Normal    (Immediate/Crash/Normal/Hold)

This specifies the default priority for EMAIL messages. The priority de-
termines when (if at all) the message will be transmitted from the system.
Four priorities are available, listed here from highest to lowest:

    IMMEDIATE     When a message is flagged as IMMEDIATE, it has the
                  ultimate priority on the system. All IMMEDIATE
                  messages must be transmitted before any other out-
                  bound calls are possible. Using this priority is
                  quite effective in getting the mail out fast, but
                  has the disadvantage of slowing down outbound mail
                  traffic if the IMMEDIATE systems are busy or not
                  answering.

    CRASH         Messages flagged as CRASH are allowed to be sent
                  anytime, 24-hours a day. Unless a "hold" override
                  is placed on a system, an EMAIL message with CRASH
                  priority will be sent during the UNEVENT or any
                  scheduled event. If entered during the day, CRASH-
                  priority messages will most-likely be sent at the
                  highest phone rates.

    NORMAL        When a message is flagged as NORMAL, it will not
                  be transmitted until a scheduled mail event occurs.
                  Using this priority (usually overnight delivery) is
                  the most cost-effective way to use D'Bridge for EMAIL.

    HOLD          When a message is flagged as HOLD, it will not be
                  sent until the destination system polls or another
                  non-HOLD message is entered. Use HOLD priority if
                  you intend for most systems to call to pickup their
                  mail.


<h3><a href="#toc">EDITOR FORCED ROUTING</a></h3>

Forced Routing: None    (Direct/Hub/None)

Choose the desired routing method for NETmail messages entered using the
internal editor:

    DIRECT     This designates all messages (by default) to go directly
               to the destination systems, bypassing any event-specific
               routing controls.

    HUB        This defaults all messages to be HUB- or HOST-routed.

    NONE       This defaults to standard routing as defined in each
               mail event.

<h3><a href="#toc">EDITOR DEFAULT PRIVATE</a></h3>

Default private? Yes

This specifies whether the editor will default all new messages to
private status or not. "Private" usually means the EMAIL is only
intended for the receiver. However, you should note that mail can
be read on all systems it passes through (unless the messages are
encrypted somehow). The "Private" status does not work in Echomail.

<h3><a href="#toc">EDITOR DEFAULT KILL SENT</a></h3>

Default Kill/Sent? No 

This specifies the default for the "Kill when sent" flag in the editor.
If you have no use for a copy of outbound mail, you might want to
specify Yes here. Mail flagged KILL/SENT is erased after being sent
to the next destination.


<h3><a href="#toc">EDITOR DEFAULT ARCHIVE SENT</a></h3>

Default Archive/Sent? Yes

This specifies the default for the "Archive when sent" flag in the
editor. If you want to save a copy of the outbound mail in a text
file "archive", answer Yes here. When a message is sent, it will
be added to the text file, showing the date and time of transmis-
sion; the original message will subsequently be erased.

<h3><a href="#toc">EDITOR DEFAULT XMAIL</a></h3>

Default XMAIL? No 

This specifies the default setting for the "XMAIL" flag. If set to Yes, all
NETmail entered using the internal editor will, by default, be sent as com-
pressed mail utilizing the compression method defined in the XMAIL CONTROL
screen. When NETmail is marked as XMAIL, it will be marked as sent, deleted
and/or archived when the queue is built, making it impossible to re-edit the
message later. Unless this is really what you want, it is suggested you spe-
cify No here.

Note that the maximum number of Netmails able to be packed into Xmail when
the queue is built is 1024. If you run a system which processes large
amounts of Netmail on a regular basis, it may be necessary to add some DOS
events that "force" the Queue to be rescanned, ie. ECHO > DBRIDGE.RSN so
that the NETmail is always "packed out".

<h3><a href="#toc">EDITOR DEFAULT INSERT</a></h3>

Default insert? No 

This specifies the default state of the "insert mode" in the editor.
Some people prefer to work in insert mode; others don't. If you want
"insert" to be on in the editor by default, answer Yes here.


<h3><a href="#toc">EDITOR DEFAULT INTL ADDRESSING</a></h3>

MSGID/INTL addressing? Yes

In the multi-zone world of EMAIL today, it is almost mandatory for all
NETmail to contain international (zone-aware) addressing. Answer Yes to
this question unless there's a REALLY GOOD reason not to do so!

This option also controls the addition of MSGID/REPLY kludge lines to
your NETmail and Echomail messages. Some systems that you exchange mail
with, may require the use of these kludge lines. See "MSGID KLUDGE" for
more information.

<h3><a href="#toc">EDITOR QUOTE SEENBYS</a></h3>

Quote SEEN-BYs? No 

When entering a quoted reply with the internal editor, this field gives you
the option of including ECHOmail SEEN-BY information in the reply text. If
you want this, answer Yes, otherwise specify No.

<h3><a href="#toc">EDITOR CUSTOM TEAR LINE</a></h3>

This option allows you to specify your own "tear" line that gets added
to outgoing Echomail messages generated from the internal message editor.
This is a feature found in other message editors and I am including it here
as a convenience. Your custom tear line must NOT begin with "---" and
must be less than 20 characters.

If you don't want your own custom tear line, leave it blank, and D'Bridge
will generate one that contains it's version/release information.

Note that this feature only works if you are using the internal editor
to write mail. It will not work if you're using an external message editor
such as GoldEd or you're running BBS software that modifies the tear line.


<h3><a href="#toc">PERSONAL MAIL WAITING</a></h3>

When D'Bridge unpacks mail, you have some choices of how you wish to be
notified of new mail waiting. Answer the following:

        EMAIL - D'Bridge will send you an Internet EMAIL message notifying
                you of personal mail waiting as well as indicate personal
                mail in the LOG and ACTIVITY screens. An audio alarm will
                also go off during the times specified in the BASIC
                CONFIGURATION screen. The Internet EMAIL address for
                notifications is specified in the EMAIL/USENET GATING
                screen.

          YES - Same as above but without Internet EMAIL notification.

           NO - No alerts are shown when personal mail arrives. This may
                be desirable for those of you running BBS software or
                a 3rd-party message editor.


<h3><a href="#toc">ACKNOWLEDGE RRQS</a></h3>

  A Return Receipt Request (RRQ) kludge is a flag on a NETmail message to
  trigger D'Bridge to send the sender of the message a "receipt"
  acknowledging that the message has been read by the receiver.
  
  When a RRQ kludge is encountered, D'Bridge will write a "receipt" NETmail
  to the sending system indicating that the original message has been read
  for the first time by the receiver. The receipt that gets sent back is a
  simple NETmail message indicating the time and date that the message was
  read, along with a copy of the original message. The receipt is sent back
  to the receiver during the next QueueScan, and is subject to the routing
  defined in the SCHEDULER.
  
  Note that the RRQ kludge feature only works for the built-in internal
  message editor. It will NOT work with GoldED or any external editors.
  
  The RRQ kludge feature has three options:
  
    YES - The editor will acknowledge RRQ's automatically without your consent.
  
    ASK (Default) - The editor will display a pop-up window when it encounters
    a message with the RRQ kludge and ask you if you wish to acknowledge
    receipt.
  
    NO - The editor will not acknowledge RRQ's.
  
  The internal editor's "Add Return Receipt" option will only show up in
  the menu when you are writing a NETmail message only. It will not be shown
  when writing Echomail messages or if the RRQ kludge feature is turned off


<h3><a href="#toc">EDITOR USERS</a></h3>

Valid users: Chris Irwin,SECRET          

Here, you specify a list of valid users and their "passwords". The
correct format for a user line with a password is:

&lt;USERNAME>[,&lt;OPTIONAL PASSWORD>]

If more than one line is entered here, every time the editor is run,
you must specify which user you are. This is for the "FROM" field in
the message editor. If you only specify one line, you won't have to
confirm anything (except your password, if specified).

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">TAGLINE SUPPORT</a></h3>

  D'Bridge has the ability to add a TAGLINE to outgoing messages. Taglines
  are nothing more than cute "words of wisdom", and are placed just before
  the tear line in the message. For example:
  
  ... Work fascinates me.  I can sit and watch it for hours.
  ... The Big Bang is only the universe rebooting.
  ... NO MESSAGES FOUND. [H]it modem. [S]cream at fido gods. [Y]ell profanity
  ... Death before dishonor, neither before breakfast.
  
  You get the idea. So, answer this question as follows:
  
              YES - Append a tagline to all messages.
    ECHOMAIL ONLY - Append a tagline to Echomail messages only.
     NETMAIL ONLY - Append a tagline to NETmail messages only.
              ASK - Ask each time if its okay to add a tagline.
         DISABLED - Shuts off the tagline support.
  
  The default setting is ECHOMAIL ONLY - Taglines will be added only to
  messages in Echomail areas.
  
  The taglines are saved in a text file called DBTAGS.TXT that is read and
  indexed by D'Bridge upon starting the internal message editor. Feel free
  to modify this file to whatever you like. It is not necessary to add the
  three dots (...) before the tagline.


<h3><a href="#toc">EDITOR KLUDGE LINES</a></h3>

  Kludges are "hidden" lines of text in Fidonet messages that contain details
  such as the path of the message and MSGID information. Kludge lines are
  used by almost all software out there that allows you to participate in
  Fidonet or related networks.
  
  Answer YES if you wish to view the kludges when reading messages in the
  internal editor, or NO if you don't care to read all that extra stuff. The
  default is NO.

<h3><a href="#toc">EDITOR QUOTE STYLE</a></h3>

  When replying to a message and quoting the original, you can have the
  initials of the original poster before the > symbol. Answer YES if you
  want this, or NO if not. This option is set to NO if you are upgrading
  from version 2.68 or lower.

<h3><a href="#toc">GOLDED PATH</a></h3>

GoldED path: C:\GOLDED                 

If you have chosen GoldED as your EMAIL reader/editor, specify the directory
path where this program is located.

<h3><a href="#toc">EDITOR DOS COMMANDS</a></h3>

DOS commands: C:\MYEDIT\MYEDITOR /C /U                     

If you have chosen Other as your EMAIL reader/editor, specify the DOS
commands to invoke your editor here.


<a name="3.16"/><h2><a href="#toc">3.16  ECHOMAIL AREAS</a></h2>

The ECHOMAIL AREAS screen allows you to define the local and ECHOmail areas
that you wish to use with D'Bridge.

<h3><a href="#toc">ECHOMAIL CODEWORD</a></h3>

Codeword: DBRIDGE        

The CODEWORD is a word from 1 to 16 characters which you designate as a
mnemonic reference to an area. It could be a word like POL for politics
or PROG for programming conference. CODEWORDs must be unique - "NETMAIL"
and "BADECHO" are predefined by the system and may not be used here.

<h3><a href="#toc">ECHOMAIL ALERT FLAG</a></h3>

Alert flag: D

If you wish to be notified (on the status line) about new mail in this
area, specify a one character "flag" here. When mail is received, the
mailer will show it by listing the defined "flag" character on the right
side of the bottom status line.

<h3><a href="#toc">ECHOMAIL SECURITY LEVEL</a></h3>

Security level: 500 

The SECURITY LEVEL is used by the AREAFIX subsystem to allow other
systems to automatically add or delete themselves from ECHO links.
Security levels range from 0 to 9999; if a system has a security
level of 50, it has access to all areas with a SECURITY LEVEL of 50
or less. If you don't want anyone to have access to an area, define
its level to be 9999.


<h3><a href="#toc">ECHOMAIL GROUP SORT</a></h3>

Group/Sort: A1

GROUP/SORT is a two-byte field; the first character is the AREAFIX access
group; the second is the sort code for use with DBUTIL SORT AREAS.
In AREAFIX, each area is assigned a GROUP code. Each system with an AREAFIX
password also has one or more group codes associated with it. Only those
systems with matching GROUP codes have access to a given area.

<h3><a href="#toc">ECHOMAIL DESCRIPTION</a></h3>

Description: D'Bridge Support Conference          

This description field will be used throughout the system to describe the
conference.

<h3><a href="#toc">ECHOMAIL STORAGE</a></h3>

Storage method: Fido     (Fido/QuickBBS/None)

There are several choices for the storage method of a message base:

    FIDO       With FIDO format, each message is stored in a separate
               file in the specified directory. This is the most
               common storage format among Fidonet-based systems, but
               has the disadvantage of being slower than the other
               formats.

    QUICKBBS   With the QUICKBBS format, messages are stored directly
               in a QuickBBS message base. This base may exist stand-
               alone or in conjunction with a QuickBBS system.

    NONE       If NONE is specified, the area is regarded as an area
               "passing through" your system. The messages are not ac-
               tually stored on this system, just forwarded to the spe-
               cified systems.


<h3><a href="#toc">ECHOMAIL DATABASE INFORMATION</a></h3>

  This question is where you specify either the DIRECTORY PATH for Fido
  *.MSG storage or the number of the message base if using QuickBBS.
  
  Directory path: C:\MESSAGES\CHATECHO
  
  For Fido *.MSG storage, enter a valid path to where Echomail will be stored.
  
      QuickBBS #: 1  
  
  If QuickBBS is being used to store messages, then each QuickBBS area must
  have a unique area number in a range from 1 to 200. If you
  accidentally assign the same number to different areas, you will locally
  "crosslink" the conferences. Specify a UNIQUE number here or match your
  existing BBS setup.

<h3><a href="#toc">ECHOMAIL DEFAULT PRIVATE</a></h3>

Default private? No 

If you want the editor to flag messages as PRIVATE by default, answer Yes.
This only affects the internal message editor when entering or replying to
messages. Most ECHOmail conferences are by nature "public" - Private ECHOmail
can be read by all receiving system operators.

<h3><a href="#toc">ECHOMAIL ARCHIVE FILE</a></h3>

Area archive: C:\ECHO\DBRIDGE.TXT                  

If you want D'Bridge to save a copy of each message purged when DBUTIL
PURGE is run, specify a text file to "archive" them in. Each area may
write messages to a different file, or you may combine several areas into
a single text file. If you don't want to save a copy of the messages, just
leave this field blank.


<h3><a href="#toc">ECHOMAIL PURGE CRITERIA</a></h3>

Purge except: 100  messages

Purge after: 30  days

In the DBUTIL PURGE program, there are two options for deciding which
messages to erase from the system. When the cursor is on this field,
you may press the F10 key to switch between the methods: PURGE EXCEPT
and PURGE AFTER.

With PURGE EXCEPT, DBUTIL will erase all but "x" messages; specify "x"
in this field as "how many messages to save after purging". With the
PURGE AFTER option, DBUTIL will purge messages based on their age.
PURGE AFTER 30 DAYS means to erase all messages over 30 days old when
the utility is run.

<h3><a href="#toc">ECHOMAIL PRESERVE MESSAGES</a></h3>

Preserve: 200  messages

In DBUTIL PURGE, you may specify a certain number of messages to ignore
while purging. These will be the lowest-numbered messages in the area
and contain information you don't want erased such as conference rules,
etc.

<h3><a href="#toc">ECHOMAIL AREA TYPE</a></h3>

Area type: ECHOmail (ECHOmail/Local)

User-defined areas are either Local or ECHOmail. The default is ECHOmail
and should be left this way under most circumstances.

D'Bridge ignores LOCAL areas except while in the editor; when an ECHOscan is
executed, all ECHOmail areas are scanned for outbound mail.


<h3><a href="#toc">ECHOMAIL CONFERENCE NAME</a></h3>

Conference name: DBRIDGE                               

Each ECHOmail area must have a unique CONFERENCE NAME. This may be the
same as or different from the CODEWORD specified above, but must reflect
the actual ECHOmail name or conference tag used for the specified area.
The CONFERENCE NAME may be up to 54 characters and must not contain any
spaces; when creating a new ECHOmail conference, it is suggested your
CONFERENCE TAG should not exceed 16 characters if at all possible to
maintain compatibility with other systems.

<h3><a href="#toc">ECHOMAIL ORIGIN LINE</a></h3>

Origin line: Nancy's BBS - Middletown, Ohio            

The ORIGIN LINE defaults from your SYSTEM NAME (specified on the BASIC
CONFIGURATION screen) and will be added to the bottom of all ECHOmail
messages originating from your system. Typically, sysops use the name
of their system and the city where it is located.

<h3><a href="#toc">ECHOMAIL ALIAS ADDRESS</a></h3>

Alias address:                      

If you are a member of more than one network, it might be necessary to
use an "alias" address on an ECHOmail area. This means that the address
put on the ORIGIN-LINE of the messages will be different than your pri-
mary address.
Most systems would leave this blank.


<h3><a href="#toc">ECHOMAIL TINY SEENBYS</a></h3>

Tiny SEEN-BYs? No 

If you say YES to TINY SEEN-BYs, then only the systems you are forwar-
ding a conference to will appear on the SEEN-BY lines. This is fine if
you are a "leaf node" or a local ECHO hub; PLEASE NOTE THAT USING THIS
<h3><a href="#toc">OPTION IS NOT ALLOWED IN SOME NETWORKS - CONTACT YOUR LOCAL ECHOMAIL</a></h3>
COORDINATOR FOR MORE INFORMATION.

<h3><a href="#toc">ECHOMAIL DEFAULT PRIORITY</a></h3>

Default priority: Normal      (Immediate/Crash/Normal/Hold)

For each conference, you specify a DEFAULT PRIORITY for forwarding of
ECHOmail. Choose either IMMEDIATE, CRASH, NORMAL or HOLD; This
default may be overridden for any specific system.

<h3><a href="#toc">ECHOMAIL FORWARD TO</a></h3>

Forward to: 1:110/68 22 .20                                  

The FORWARD TO fields allow you to specify a list of systems to whom you
wish to forward this ECHOmail conference. You may specify as many systems
as will fit on the 5 lines available; the systems should be separated by
spaces and be in the format:

ZONE:NET/NODE[,PRIORITY] or .POINT[,PRIORITY]

Here's an example:

1:18/0 1:105/3 1:110/22,C .20,H

In this example, 1:110/22 has CRASH priority as an override and .20 has
HOLD priority specified. Please note that you may only forward ECHOmail to
points or your own node. You may not send NETmail or ECHOmail directly to a
point of another system.

With this example, if I enter an ECHOmail message in this area, it will
automatically be forwarded to these four systems, who will in turn send my
message on to all the other systems participating in the conference.


<h3><a href="#toc">ECHOMAIL WEB ACCESS</a></h3>

On Web Server: YES

If you are using the DBUTIL PROCESSWEB command to make your message areas
available on the World Wide Web, answer YES. You can also answer DETAILED
to show information normally excluded such as kludge lines and SEEN-BY's.
Or, answer NO if you do not wish to allow this area to be accessed on
your Web server. Certain areas on Fidonet may have policies forbidding the
posting of contents to the Web. Please use due diligence.

If you wish to filter out high-ASCII characters, answer YES to the Web
ASCII question. Answer NO only if you are using an HTML font that supports
displaying of ASCII or have otherwise wrote your own code for your Web site
to deal with that issue.

Please refer to the DBUTIL documentation/help for more information and
instructions on configuring Web Server support in D'Bridge.

RESCAN LIMIT:

The Areafix system in D'Bridge has the ability to process "rescan" requests
from downlinks. A rescan-request is an Areafix message from a system to
gather up all the messages in a given Echomail area and send them off
to the system.

This option allows you to place a cap on the amount of messages returned
in a rescan. By default, all messages will be sent out - Specify 0 to allow
all messages to be sent. Placing a limit on the messages returned in a
rescan may be useful for those of you running large Hub systems or you store
a large amount of mail. The maximum this can be set to is 9999.

<h3><a href="#toc">QWK INDEXING</a></h3>

  QWK networking support requires that you specify an "index number" to use
  for any message forums you wish to allow access to. The number must be
  between 1 and 255 and should match the remote setup whenever possible. If
  you specify zero here, QWK support is disabled for this area, and any
  replies tossed via QWK will be immediately rejected. QWK support is also
  disabled if this is a "Passthru" area.
  
  When a number is specified, it should never be changed unless theres a
  really good reason to do so...


<a name="3.17"/><h2><a href="#toc">3.17  WINDOW COLORS</a></h2>

The WINDOW COLORS screen allows you to set the screen colors that D'Bridge
will use.


<a name="3.18"/><h2><a href="#toc">3.18  KEYBOARD MACROS</a></h2>

The KEYBOARD MACROS option allows the operator to define "macros" that
cause keys, ALT F1-F10 and CONTROL F1-F10, to substitute preprogrammed
text while editing. This might be handy for "canned" introductions,
signatures or whatever you can think of. Twenty keys may be defined and
each key can have any amount of text desired. Note: This limit is RAM-
based, so check your memory status if in question.

The cursor will appear on the top line. Fields may be changed by typing
over the current values or by using the field edit keys: INSERT, DELETE,
LEFT and RIGHT arrows. Pressing ENTER or the DOWN arrow advances to the
next line and pressing the UP arrow moves the cursor to the previous
line. You must press the ESC key to exit this window and save the setup.
The above example shows the definition for the CONTROL-F1 key as being
my mailing address. Each key is defined in its own window. All vertical
pipe characters "|" are translated to hard-returns in the editor.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<a name="3.19"/><h2><a href="#toc">3.19  TRANSLATION TABLE</a></h2>

The TRANSLATION TABLE screen allows you to redefine how certain characters
will be displayed. This may be used to allow line-drawing or foreign
character sets to be used in the internal message editor. The ALT-keys
(a-z) may be defined as displaying any character and transmitting it as a
normal printable character in the range of 33-126.

This is an advanced option and is not normally needed, so if you have no
need for foreign character sets, skip this screen.

It allows you to redefine part of the printable character set as translating
to non-standard characters. Pressing the LEFT and RIGHT arrow keys scans
through the characters, helping you to locate the proper ASCII code.


<a name="3.20"/><h2><a href="#toc">3.20  SOUP GATING</a></h2>

D'Bridge ships with support for Internet EMAIL and USENET "out of the box"
and can operate as a gateway. Setting things up in this screen is very
straightforward, but requires a little bit of planning on your part as to
how you want these to work. However, if you are using 3rd-party software
to gate mail to the Internet, you do not need to configure any settings
in this screen. You also don't need to setup anything if you're already
using another Fido system thats doing the job of being an Internet gateway.

Internet EMAIL is gated using SMTP (Simple Mail Transfer Protocol)
and POP3 (Post Office Protocol 3) - technical terms for the methods that
are used to exchange mail. Outbound mail is sent using SMTP and inbound
mail is received using POP3. You will need your Internet provider's SMTP
and POP3 settings to correctly configure support. You also need to be
able to "control the domain" if you plan to route Internet EMAIL for other
users or Fido systems that connect to your D'Bridge system. Please contact
technical support or the DBRIDGE echo for more assistance on setting up
your Internet EMAIL domain to be used in D'Bridge.

Note that D'Bridge won't "talk" directly to Microsoft Exchange Server
or BlackBerry Enterprise Server. If you use one of those products then you
will need to manually enable serving of SMTP and POP3 for D'Bridge "on the
back end" for things to work properly.

Internet USENET groups are exchanged using the NNTP protocol. Most Internet
providers are starting to "shy away" from offering Usenet groups; so I've
found that you need to have a paid subscription to a third-party provider.
As of this writing I highly recommend usenetmonster.com. When USENET
is configured in this screen, D'Bridge will properly gate Usenet groups
to-and-from your system - And you can offer Usenet groups to any Fido
systems that exchange mail with you.

The questions in this screen must be answered correctly. Please pay
close attention to any login ID's and passwords required. If a specific
port must be used, be sure that any routers or firewalls are also
configured properly. Again if in doubt, please contact technical support or
the DBRIDGE echo on Fidonet for assistance.


TEST POP3 NOW

If you answer YES and you enabled the VSOUP utility support, D'Bridge will
test to see if your SMTP and POP3 settings are working. This functions
sortof like the "Test Accounts" feature in Microsoft Outlook. In fact, if
you use Outlook or Outlook Express, it may be desirable to also enter your
EMAIL settings into one of those programs to aide in diagnostics
incase D'Bridge itself is not exchanging mail properly.

<h3><a href="#toc">TEST USENET NOW</a></h3>

If you answer YES to this question and the VSOUP utility is enabled earlier
in this screen, D'Bridge will connect to your Usenet provider and "synch up"
all groups... provided that your login settings are correct. Note that
a "sync-up" operation is done for self-diagnostics - and that if you decide
to change Usenet providers in the future, a sync-up is required to update
the "count" of messages from the other provider.

<h3><a href="#toc">SOUPGATE ADDRESS</a></h3>

The gating features of D'Bridge work by having you define a Fido address
to use as the gateway point. All corrospondance that is addressed to that
address will be processed out to the Internet. Likewise, any Internet EMAIL
and USENET postings received will originate from that address. Any Fido
systems that exchange mail with you will be allowed to route mail to this
gateway address. Groups can easily be restricted by using the proper
settings in the PACKET/MAIL CONTROL screen.

This question is where you specify the Fido address to use. This should NOT
be an alias or "AKA" address. If you leave this question blank, all Internet
EMAIL and USENET gating features will be disabled. If you have upgraded
from 2.94 or earlier, the gateway address would have been DELETED entirely
as before it was okay to have it as an AKA address - Now its not.

It is not necessary for you to use the gating features of D'Bridge if you
are using 3rd-party software to do gating (such as Internet Rex by Charles
Cruden), or you exchange mail with another Fido system thats already acting
as an Internet gateway. If you deal with another Fido system for Internet
matters, then DO NOT use the features in this screen.


<h3><a href="#toc">VSOUP SUPPORT</a></h3>

Please select the type of operating system you wish to use the Internet
VSOUP program, or answer NO if you plan to use something else. Note
that the VSOUP utility will NOT function for "plain" DOS systems (ie. MS-DOS,
Tandy DOS, PC-DOS or DR-DOS). You MUST be running a multi-tasking operating
system, and depending on what you answer, some service packs or updates may
be required before you can use the Internet features:

   Windows - Answer "W" for Microsoft Windows 95 or higher. Be sure that
             all the appropriate security patches/service packs are applied.
             If you are running Windows XP with Service Pack 2, be sure
             that the "Windows Firewall" settings are configured to allow
             the VSOUP utility program to run, and that the port setting you
             define in this screen is also configured accordingly. If you
             are running Windows 95, you must install the Winsock 2
             Extensions Update, available from Microsoft's website. The
             update is not necessary for Windows 98, ME, NT, 2000 or XP
             systems. That update applies to Windows 95 specifically.

      OS/2 - Answer "O" for IBM's OS/2 WARP operating system. Your OS/2
             environment MUST match one of the following criteria:

                - Warp 3 RedSpine/BlueSpine w/TCPIP and EMX 0.9d.
                - Warp 3 BlueSpine Connect w/TCPIP, MPTS and EMX 0.9d.
                - Warp 4 (client or LAN server) w/TCPIP, MPTS and EMX 0.9d.

             "Spine" refers to the actual color of the floppy/CD-ROM box.
             For example, RedSpine refers to the red box with the standard
             white IBM logo. BlueSpine refers to the blue box with the IBM
             logo and in most cases the "Warp" logo being a colorful swirl.

<h3><a href="#toc">VSOUP LOGGING</a></h3>

If you wish to receive logs and receipts from VSOUP specify the file here.
This question should be set to "blank" (nothing) when everything is working
properly, otherwise the size of the logs can grow out of hand...


<h3><a href="#toc">SOUP SMTP ADDRESS</a></h3>

Outbound Internet EMAIL is sent using the SMTP protocol. D'Bridge will
create the necessary files and pack up all Internet EMAIL accordingly to be
sent out to the SMTP server of your choice. SMTP support only works when
the VSOUP setting is configured for Windows or OS/2.

Answer this question with your relevant SMTP information. Consult your
provider for help if necessary. Be warned that the VSOUP program that ships
with D'Bridge does NOT support SSL encryption. If this is a problem, visit
my Web site and download the "X-Ray Mail Assistant" from the SOFTWARE
DOWNLOADS section. Then, consult technical support or the DBRIDGE echo
on Fidonet for help. X-Ray Mail Assistant cannot be shipped with D'Bridge.
That program "emulates" the connection to VSOUP and actually takes over
the duty of connecting to the SMTP server - and supports SSL authentication.

If X-Ray Mail Assistant is installed, answer "localhost" (no quotes) to
this question instead. DO NOT specify the address of the SMTP gateway.

The format is username:password@smtpaddress[:port], for example, if
my usenet provider's login is "Nick" and the password is "MyPassword"
and I need to connect on port 20000, you would answer:
Nick:MyPassword@usenetprovider.com:20000

It is not necessary to specify the "smtp://" prefix in this question.


SOUP POP3 ADDRESS

If you are using the VSOUP program shipped with D'Bridge, then this question
is where you tell it which POP3 address to check for Internet EMAIL. This
setting only works when VSOUP is configured for Windows or OS/2.

Any mail waiting in this POP3 account will be downloaded and processed as if
it was destined for your system - There is no "filtering", so be sure that
this is a DEDICATED account that will be used specifically for D'Bridge
EMAIL only.

Later in this screen is a question that lets you specify the time in
minutes for when D'Bridge should check for incoming Internet EMAIL.

The VSOUP program that ships with D'Bridge does not support SSL encryption,
and if this is a problem, you will need to use a 3rd-party utility to
"fool" VSOUP's connection (such as X-Ray Mail Assistant described earlier).

If X-Ray Mail Assistant is installed, answer "localhost" (no quotes) to
this question instead. DO NOT specify the address of the POP3 gateway.

The format is username:password@pop3address[:port], for example, if
my usenet provider's login is "Nick" and the password is "MyPassword"
and I need to connect on port 20000, you would answer:
Nick:MyPassword@usenetprovider.com:20000

It is not necessary to specify the "pop3://" prefix in this question.

<h3><a href="#toc">SOUP YOUR EMAIL DOMAIN</a></h3>

Answer this question with the domain of the Internet EMAIL address that
all corrospondance routed via D'Bridge and VSOUP should be sent and
received on. You must be able to download all mail for the domain. For more
assistance please consult the DBRIDGE echo on Fidonet or contact technical
support for assistance with this question. It is beyond the scope of this
help file to provide help for domain-related issues.


<h3><a href="#toc">SOUP YOUR EMAIL ADDRESS</a></h3>

Answer this question with your Internet EMAIL address. Your Internet EMAIL
address is used for the following situations:

- Where unroutable or undeliverable Internet EMAIL will be sent back to.

- The internal message editor will use as the from-address for composing
  Internet EMAIL messages destined for the gateway.

- The "You've Got Mail" feature will use this address to write messages
  from, as per the Notification Address setting in the next question.

<h3><a href="#toc">SOUP NOTIFICATION ADDRESS</a></h3>

If you wish to be notified by Internet EMAIL when D'Bridge has unpacked
any mail addressed to you, specify that address here. This is optional and
only works if the "You've Got Mail" setting is configured in EDITOR OPTIONS.

When you specify an address such as a Hotmail or Yahoo type, you should
remember that you can also elect to have "Mobile notifications" using those
services - effectively letting D'Bridge notify you via cell phone text-
messaging when it has mail for you!

If you are using a BlackBerry, it is not necessary to create a Hotmail
or Yahoo account for the previous "Notification EMAIL" question; you should
specify your BlackBerry EMAIL address (provided by your cell phone carrier).
Only proceed with creating a Hotmail or Yahoo account if you don't have one.


<h3><a href="#toc">SOUP ALLOW ECHOMAIL VIA EMAIL</a></h3>

  This setting lets you participate in Fidonet using Internet EMAIL provided
  all other settings are configured properly (Gate address, VSOUP, SMTP and
  POP3). Note that only yourself may use this feature - this setting does
  not allow any downlinks, BBS users or other users of your D'Bridge system
  to access Echomail via Internet EMAIL.
  
  When this feature is enabled, a unique "serial number" is assigned to any
  Echomail destined for Internet EMAIL so its possible to reply properly to
  the messages. The serial number is not stored in the Echomail message
  itself; but in a small database maintained by D'Bridge itself.
  
  You can participate in Fidonet using your cell phone text-messaging if you
  have the "You've Got Mail" question in EDITOR OPTIONS set to EMAIL and you
  configured a notification address in the previous question. D'Bridge is
  smart enough to configure the size of the messages to be "cell phone
  friendly" and automatically quotes the previous reply if its missing since
  text-messaging itself does not have a "quote" feature. Be sure that your
  cell phone is somehow able to receive Internet EMAIL.
  
  This question has three answers:
  
  Answer NO to disable Echomail/NETmail via Internet EMAIL.
  
  Answer YES to enable the feature.
  
  Answer SMART to this question if you use a "regular" cell phone and you like
  to "speak IM" (in other words = IOW, i c u = I see you, r u there = Are you
  there, etc etc). D'Bridge will translate "IM-speak" into "English speak".
  If its not working properly, change your answer from SMART back to YES.
  You should answer YES if you are using a BlackBerry, Apple iPhone, Palm Trio
  or any cell phone for that matter that has "SmartText" technology. D'Bridge
  will not attempt to translate any "IM speak" from text-message replies since
  those phones usually have a "Qwerty" keyboard to begin with, or at least
  translate certain "IM speak" automatically.
  
  If you are using a BlackBerry, it is not necessary to create a Hotmail
  or Yahoo account for the previous "Notification EMAIL" question; you should
  specify your BlackBerry EMAIL address (provided by your cell phone carrier).
  Only proceed with creating a Hotmail or Yahoo account if you don't have one.


<h3><a href="#toc">SOUP NNTP ADDRESS</a></h3>

This question is where you specify the address settings for exchanging
Usenet groups in D'Bridge. This should match your Usenet provider's
settings exactly. If no address is specified, USENET support is disabled.

There is a question in this screen that lets you specify the time, in
hours, for when D'Bridge should check for new Usenet mail. When this
is configured; its not necessary to run events to check manually.

The format is username:password@usenetaddress[:port], for example, if
my usenet provider's login is "Nick" and the password is "MyPassword"
and I need to connect on port 20000, you would answer:
Nick:MyPassword@usenetprovider.com:20000

It is not necessary to specify the "nntp://" prefix in this question.

<h3><a href="#toc">ALLOW POSTINGS AND REPLIES</a></h3>

USENET replies can be completely disabled, effectively making the groups
"read only". This may be desirable under some circumstances. Answer NO to
make all USENET groups read-only (no postings allowed), or YES otherwise.
The default setting is actually NO because a lot of Usenet providers
restrict replies anyway until you have manually validated your account.

<h3><a href="#toc">MAXIMUM MESSAGES TO DOWNLOAD</a></h3>

This sets a cap on the maximum amount of messages that should be downloaded
per group whenever a connection is made on Usenet. The default setting is
500 messages and that should be good enough for most installations.

If you answer zero (0) to this question, no cap is put in place. THIS IS NOT
RECOMMENDED for those of you who download large volumes of mail, because all
it takes is a large posting in some group to effectively "tie up" your
connection. A cap should always be put in place as a fail-safe.


<h3><a href="#toc">MAXIMUM TO DOWNLOAD ON NEW GROUPS</a></h3>

Most Usenet providers keep a fairly large "retention" rate - That is, they
tend to keep a lot of messages per group. So it makes sense that when you
connect to a Usenet group for the first time, you would end up downloading
all of the messages in that group to "catch up". This can easily tie-up your
Internet connection for hours on end. So in this question, you can specify
a limit as to how many messages to download when D'Bridge/VSOUP connects to
a Usenet group for the first time.

The default is 100 messages, and should not be changed for normal usage.
Reduce this to 50 or even down to 25 when "hubbing" a lot of Usenet groups.
Increase this number if you carry less than a dozen or so groups in total.

If you answer zero (0) to this question, no cap is put in place. THIS IS NOT
RECOMMENDED unless you're an experienced D'Bridge administrator and theres
some strange or bizarre reason not to place a cap on new messages...

<h3><a href="#toc">ALLOW GATING FOR OTHERS</a></h3>

If you wish to allow other systems to gate their Internet EMAIL through
you, answer YES, otherwise answer NO to this question.

The default setting is NO and you should NOT enable this setting unless you
have a fundimental and thorough understanding of how Internet EMAIL is
processed by D'Bridge, and you are a diligent network administrator.

<h3><a href="#toc">SPECIFIC EMAIL MAPPING</a></h3>

If you wish to specify any additional Internet EMAIL routing or mappings,
you may do so in this question. This is an advanced feature and should only
be used under instruction from technical support or the DBRIDGE echo
on Fidonet. Please do not specify any settings unless absolutely necessary.


<h3><a href="#toc">ADDITIONAL OPTIONS</a></h3>

If you need to specify any additional options for the SOUPGATE processor,
please enter them here. Again this is an advanced feature and should not
be used unless absolutely necessary.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<a name="3.21"/><h2><a href="#toc">3.21  MODEM RESULT CODES</a></h2>

  This screen allows you to specify your own custom result codes for your
  modem device. If you do not have a modem, obviously this screen is of no
  use to you.
  
  This screen is here mostly to satisfy the requirements of those of you who
  may be running D'Bridge in a "virtual-modem" environment, such as Ray
  Gwinn's VMODEM product for the OS/2 WARP operating system.
  
  WARNING: Incorrectly setting these options WILL result in system malfunction.


<a name="3.22"/><h2><a href="#toc">3.22  BINKD</a></h2>

  D'Bridge 2.95 and later ship with a redesigned BINKD system that integrates
  with the "mailer", allowing you to serve both Internet and Dialup users.
  This is accomplished using the open-source BINKD thats available publically.
  
  The questions in this screen is where you configure the systems that will be
  connecting for their mail over the Internet. D'Bridge treats mail for
  Internet systems the same way it does for Dialup - Queue entries are built
  and "calls" placed are subject to the limits specified for the current mail
  event defined in the SCHEDULER. Of course, this can all be overridden.
  
  If you need to have people connect to you for mail over the Internet, then
  you need to run the BINKD system as a "server" process. Please refer to the
  help screens for the features for a detailed explanation.


<h3><a href="#toc">BINKD SUPPORT</a></h3>

This screen allows you to configure the BINKD support in D'Bridge. Note
that the BINKD system will NOT function for "plain" DOS systems (ie. MS-DOS,
Tandy DOS, PC-DOS or DR-DOS). You MUST be running a multi-tasking operating
system, and depending on what you answer, some service packs or updates may
be required before you can use the Internet features:

   Windows - Answer "W" for Microsoft Windows 95 or higher. Be sure that
             all the appropriate security patches/service packs are applied.
             If you are running Windows XP with Service Pack 2, be sure
             that the "Windows Firewall" settings are configured to allow
             the BINKD utility program to run, and that the port setting you
             define in this screen is also configured accordingly. If you
             are running Windows 95, you must install the Winsock 2
             Extensions Update, available from Microsoft's website. The
             update is not necessary for Windows 98, ME, NT, 2000 or XP
             systems. That update applies to Windows 95 specifically.

      OS/2 - Answer "O" for IBM's OS/2 WARP operating system. Your OS/2
             environment MUST match one of the following criteria:

                - Warp 3 RedSpine/BlueSpine w/TCPIP and EMX 0.9d.
                - Warp 3 BlueSpine Connect w/TCPIP, MPTS and EMX 0.9d.
                - Warp 4 (client or LAN server) w/TCPIP, MPTS and EMX 0.9d.

             "Spine" refers to the actual color of the floppy/CD-ROM box.
             For example, RedSpine refers to the red box with the standard
             white IBM logo. BlueSpine refers to the blue box with the IBM
             logo and in most cases the "Warp" logo being a colorful swirl.

If your BINKD setup is running under Linux or some other environment, or you
need to have the functionality of this screen but without all the "calls"
to the BINKD modules, answer LINUX.


<h3><a href="#toc">BINKD PORTS</a></h3>

  This question is where you specify the Internet "ports" that BINKD shall
  be using. Remember that when BINKD is being ran as a server, you need to
  be sure that any router or firewall configuration is programmed to allow
  activity on the specified port. The default setting is 24554 and should NOT
  be changed in most cases.
  
  On outgoing connections, this sets the default port, again this should be
  left alone at 24554. The outgoing port can be overridden for each system
  in the BINKD SESSIONS screen later on.
  
  On Windows XP and Windows Server 2003, a warning-screen may appear when
  BinkD is ran for the first time. Answer "ALLOW EXECUTION" when prompted.

<h3><a href="#toc">MAXIMUM CONNECTIONS</a></h3>

  The maximum incoming and outgoing sessions allows you to define a limit to
  how many simultaneous connections the BINKD system should handle at once.
  Those of you who are running really busy systems may elect to place a "cap"
  on the number of simultaneous sessions that can be served at once.
  
  This really only affects BINKD when its ran as a "server", because when its
  not, D'Bridge treats outbound BINKD sessions as it does with Dialup - the
  limits are controlled by the D'Bridge Queue and NOT the BINKD system.

<h3><a href="#toc">SECONDS BETWEEN OUTGOING CALLS</a></h3>

  When running D'Bridge BINKD support as a "server", you may choose to specify
  the time-between-calls, just like you would for Dialup sessions. The
  default is 60 seconds between "calls". When BinkD is not ran as a server,
  then D'Bridge treats outgoing BinkD calls subject to the times and
  priorities defined in the SCHEDULER screen.


<h3><a href="#toc">BINKD SESSIONS</a></h3>

  The next few questions control who you exchange mail with using BinkD. When
  properly configured, D'Bridge will automatically manage all of the mail
  transactions and take care of the mail-moving "behind the scenes". Lets take
  a look at how this all works.
  
  The BINKD SESSION INFORMATION window is where you specify the systems to
  exchange mail with using the included BinkD program. The format of
  the screen is as follows:
  
  &lt;ADDRESS> &lt;DOMAIN> &lt;ID> &lt;IP OR PICKUPONLY> &lt;PASSWORD OR NONE> [PORT and/or U]
  
      ie.   1:123/500 fidonet RCASSELL the-estar.com MYPASS U
            1:129/305 fidonet 129305 ttb.slyip.com TJ1234 U
            1:229/426 fidonet NANDRE nickandre.com ABC123
  
  ADDRESS - Defines the Fido address of the remote BINKD system. If you are
            using a Dialup modem with D'Bridge, then the whole entry line
            overrides any Dialup-specific settings for this system.
  
   DOMAIN - Previously a seperate question in 2.94 and prior releases, this
            is where you specify the BINKD domain. You MUST specify a
            domain; the default domain question is for systems that connect
            that do not specify a domain during a BINKD session. The domain
            name is NOT an Internet domain, but rather, the domain that you
            agree to use with the Sysop of the system. fidonet and metronet
            are examples of domains. They can be up to 8 characters long.
  
            NOTE: If that system, for some bizarre reason, is in fact using
                  an Internet domain, ie. fidonet.org, its not going to work
                  because of the dots in the name. So, you must specify a
                  translation for this in the Binkd Additional Options screen,
                  ie. domain fidonet.org alias-for fidonet.
  
       ID - A unique ID to assign for the mailbox of this node. You must use
            letters or numbers, up to 8 characters. The mailbox is used
            to store the actual pending mail for this system; not the D'Bridge
            Queue itself. D'Bridge automatically manages the conversion of
            mail between the Queue and the BinkD mailbox directories, and you
            should not manipulate the contents of those yourself manually.
  
       IP
  ADDRESS - The Internet address of the remote system. If the system does not
            have one, you don't know, or just "calls" here to pickup their
            waiting mail, answer PICKUPONLY.
  
  PASSWORD- The password to connect to the remote system. If no password is
            being used, answer NONE.
  
     PORT - Connects with the remote BINKD system on a specified port. This
            should be left blank in most cases.
  
        U - Makes uncompressed mail for this system instead of the usual XMAIL
            thats built. Packets are made in the "mailbox directory" (or ID)
            defined earlier. When "U" is not specified, normal XMAIL and Queue
            entries are built for the system.
  
            Now if the U option is specified, the Queue system is effectively
            not used except for generating outbound "Poll" requests, because
            D'Bridge will create the packet files directly in the ID/mailbox
            directory that you define. However, any pending transactions are
            moved into the node's mailbox via. automatic calls to DBUTIL MOVE.
  
  Additional BINKD options may be specified in the next question, BINKD
  OPTIONS. It is not recommended to add additional BinkD configuration
  parameters unless you're an experienced administrator.
  
  * <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<h3><a href="#toc">FIDO PLUG AND PLAY</a></h3>

  The following questions control the administration of Fido Plug and Play.
  Just as the system is easy for newcomers to join Fidonet, the system is
  also easy to administer on your end for serving those users.
  
  FIDO PLUG AND PLAY?
  
  Answer YES to turn the FPNP support on, or NO if not. Turning the system
  on affects the POINT LIST, ROUTING, AREAFIX, SECURITY and BINKD SESSIONS
  screens - whenever a system joins, D'Bridge will automatically add all
  their info to all of those screens. Again, you are NETmail'd whenever
  a new system joins. The YOUVE GOT MAIL setting should be turned on.
  
  UPDATES WITH NickAndre.Com?
  
  When the newcomer installs D'Bridge, a list of available BBS's and Fido
  networks are shown that are offering mail. The user is recommended to pick
  a system that is closest to them. The list of available systems is
  maintained by the D'Bridge server running at nickandre.com; and is updated
  nightly. When you answer YES to this question, you become a part of this
  list - your system will "sync up" with nickandre.com at midnight during
  the AutoUpdate routine via BINKD on port 24554. If your system does not
  sync up, it does not show up in the list on that day. If you answer NO to
  this question, you will need to include a file called DBRIDGE.PNP as part
  of the release ZIP file for whatever promotional site you set up to allow
  users to connect to your network. A sample file called SAMPLE.PNP is
  included for you in this release.
  
  SUPPORT DIALUP MODEMS?
  
  Answer YES to this question if you wish to support Fido Plug and Play for
  Dialup modem sessions. If you do not wish to do so, or don't have a dialup
  modem installed, answer NO.
  
  SCOPE:
  
  This screen is where you define the "scope" of available addresses that
  the Fido Plug and Play system will generate. The format is:
  
                                                    &lt;GROUPS,
  &lt;ADDRESS> &lt;DOMAIN> &lt;N/P> &lt;SCOPE> &lt;MAKENL> &lt;EXPIRY> ACCESS> [BLURB FILE]
  
  ADDRESS - Defines the address that D'Bridge shall respond to for RFA packets
            and this address MUST NOT be an AKA or your primary address. The
            address is also used for assignment of the address itself. If
            you defined an address of 1:229/0 and answered the next question
            as NODE and set the SCOPE to 7000-8000, then D'Bridge will auto-
            assign addresses from 1:229/7000 through 1:229/8000 when requests
            are received at 1:229/0.
  
  DOMAIN  - This is where you specify the BINKD domain that new systems will
            be configured to connect with in the future, for BINKD usage.
            A list of domains are shown to the remote user if you are running
            Fido Plug and Play for multiple networks - So the user can choose
            which networks they wish to be a part of. When used in conjunction
            with the BLURB FILE parameter explained later, newcomers can join
            Fidonet with simple "point and click" operation.
  
  NODE or
  POINT   - When you specify NODE, address assignment happens on the NODE
  (N/P)     level - ie. 1:229/0 to 1:229/9999. When you specify POINT, address
            assignment is on the point-level, ie 1:229/426.0 to 1:229/426.9999.
  
    SCOPE - Sets the scope of available addresses to assign. A scope MUST be
            set and must not conflict with existing node assignments (although
            D'Bridge is smart enough not to assign a node number when an entry
            already exists).
  
   MAKENL - Generates a MAKENL-compliant segment when addresses are assigned
            or removed if you answered NODE previously. The MAKENL segment is
            only generated for NODE-based address assignments. D'Bridge still
            keeps its own internal database of connected systems regardless
            of what you answer to this question.
  
   EXPIRY - Specifies the number of days before the system is automatically
            removed from your configuration entirely and mail is erased if
            a system does not poll for their mail within a specified number
            of days. Setting this to zero (0) disables this "cleanup" feature.
  
   GROUPS
   and
   ACCESS - Sets the groups and access level of the new systems, for example
            A,50 would assign new systems group access A with security level
            of 50. You would use this setting in conjunction with the PACKET/
            MAIL CONTROL SCREEN so Areafix is available to the new systems
            automatically. The password for Areafix for new systems is
            asked by Fido Plug and Play when the user installs D'Bridge for
            the first time.
    BLURB
     FILE - D'Bridge will send the contents of whatever "blurb file" you
            define here to the new system. This is just a text file containing
            your system's rules, policy on postings, etc etc. Its optional.
  
  To summarise, heres an example entry:
  
  1:229/426.0 fidonet POINT 500-900 No 30 AB,50 WELCOME.TXT
  
  - Means that Fido Plug and Play will work on 1:229/426 and assign addresses
    from 1:229/426.500 through 1:229/426.900. Newcomers will be auto-
    configured to route mail to 1:229/426. Not generating a MAKENL segment
    because I'm assigning point addresses. Systems that don't pick up their
    mail in 30 days get entirely removed from D'Bridge on my end. Systems will
    access groups A and B with a security level of 50. Systems are sent the
    contents of WELCOME.TXT which is just a "Hello new user!" message.
  
  * <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.
  
  DOS COMMANDS TO RUN AFTERWARDS:
  
  If you need to run any DOS utilities after a new system joins using Fido
  Plug and Play, specify the commands here. I can't really imagine what that
  might be, other than maybe statistical/BBS update programs and the like.
  
  AUTO ADD ECHOMAIL AREAS?
  
  In the ECHOMAIL AREAS screen, you'll find a new question, "FPNP forced?".
  When you answer YES to that (and then YES to this question), D'Bridge will
  immediately connect and do a Rescan of messages in that Echomail area
  when a system joins using Fido Plug and Play. Answering NO to this question
  shuts off this feature.


<a name="3.23"/><h2><a href="#toc">3.23  ECHOFILE CONFIGURATION</a></h2>

This release of D'Bridge now supports Echofile/TIC processing. An Echofile
area is the same concept as an Echomail area, except you're dealing with
files, not messages. Files that arrive on your system will come with a
corrosponding text file called a TIC file (named after its extension).
The TIC file is a tiny text file that contains information about which
Echofile area the file belongs to, along with a list of systems that
should receive it.

This menu option allows you to configure the Echofile/TIC processing
abilities of D'Bridge.


<a name="4.00"/><h2><a href="#toc">4.00  SYSTEM IDLE COMMANDS</a></h2>

When D'Bridge is idle, you have full control over its functions. The
following single-key commands are available when the word "IDLE" appears
in the upper-left corner of the screen.

If this is your first time using the Help system, you might want to bring
up the Index and start reading the introduction sections for a better
understanding of how D'Bridge works.

     Call         Makes the next outbound call immediately, if any
     Retry        Retries the last outbound call, if any
     Next         Advances the pointer to the next outbound call
     Prev         Returns the pointer to the previous outbound call
     Hold         Places the queue entry selected on hold status
     QuickDial    Activates QuickDial mode; no pause between calls
     ESC          Displays the main menu
     F1           Activates the Help system
     ALT-C        Call a system from the nodelist in terminal mode
     ALT-D        Call a system from your directory in terminal mode
     ALT-E        Read/Edit EMAIL messages
     ALT-F        Request file(s)
     ALT-H        History display
     ALT-I        Information display
     ALT-K        KatGuard (electronic keyboard cover)
     ALT-L        View system log file
     ALT-N        New ECHOmail link
     ALT-P        Poll a node
     ALT-Q        Rebuild outbound queue
     ALT-R        Request ECHOmail link
     ALT-S        Toggle display of the schedule window
     ALT-T        Transmit file(s)
     ALT-V        View/Modify queue
     ALT-X        Exit D'Bridge (Quit)
     ALT-Y        Push to DOS shell (small)
     ALT-Z        Drop to DOS shell (large)

<h3><a href="#toc">HOLD ALL MAIL</a></h3>

Selecting the HOLD ALL MAIL menu option will immediately place all outbound
mail on HOLD. The hold will come off at midnight, when a new event starts or
by using the VIEW/MODIFY QUEUE command, ALT-V.

This command only holds mail until midnight at the latest.


<h3><a href="#toc">VIEW MODIFY QUEUE</a></h3>

Selecting the VIEW MODIFY QUEUE option (or pressing ALT-V from IDLE mode)
allows you direct access to the outbound mail queue allowing you to view,
erase or change priorities of queue entries.

The top line of the queue should be highlighted. To view or change a queue
item, first move the highlight bar to the desired entry using the UP and
DOWN arrows. Next select one of the following commands by pressing the
first letter of the option (I for Immediate, etc.)

QUEUE: Next, Previous, Immediate, Send, Hold, Reset, Force, View, Kill

      NEXT       The NEXT option advances to the next outbound call.

      PREVIOUS   The PREVIOUS option returns to the previous outbound call.

      IMMEDIATE  The IMMEDIATE option will change the priority of an
                 entire queue entry to immediate until the next NETmail
                 scan. If the queue entry is FORCED or is a unlisted
                 system, this option is not valid and the computer will
                 sound the "foghorn".

      SEND       The SEND option will change the priority of an entire
                 queue entry to crash priority. This change only lasts
                 until the next NETmail scan. If the queue entry is
                 FORCED or unlisted, the computer will sound the "foghorn".

      HOLD       The HOLD option causes an entire queue entry to be held
                 and not transmitted unless the receiving system poll for
                 it. This option is not valid if there is a FORCED
                 PRIORITY for the system.

      RESET      When you RESET LIMITS for a queue entry, both the number
                 of TRIES and CONNECTS is reset to zero, allowing the
                 queue entry to be transmitted during this event even if
                 the retries limit has been exceeded.


        FORCE      When you FORCE a priority for a certain system, that
                   system will be forced to that priority "until further
                   notice". The only way to override the FORCE is to remove
                   it by specifying "NONE" here. When you press "F" for
                   FORCE, a menu is displayed:
  
                   FORCED MODE: Immediate, Crash, Hold or None
  
                   Choose which priority to force this system to; if you don't
                   want to do this, just press ESC and no change will be
                   made. Select the priority or "N" to remove the "force".
                   When a node is forced, it is designated by an exclamation
                   point "!" next to the address.
  
        VIEW       Viewing a queue entry lets you "look inside" a queue entry
                   and see which messages and files are queued to send. Some
                   general information about a system is displayed on the
                   left; on the right is a detail window which may be scrolled
                   up and down by using the UP, DOWN, PGUP and PGDN keys. Press
                   ESC to exit view mode.
  
        KILL       KILL is a very dangerous option because it allows you to
                   erase any or all outbound mail and requests with one extra
                   keystroke. Pressing "K" will display a window asking what
                   you would like to KILL. If you don't want to KILL any
                   part of the entry, press ESC to cancel. Otherwise, choose
                   from the menu which lets you erase everything or just one
                   "part" of the queued entry. You'll have to try it to really
                   understand - just be careful.
  
When you are finished VIEWING and MODIFYING the queue, just press ESC
to exit this screen.


<h3><a href="#toc">REBUILD QUEUE</a></h3>

The REBUILD QUEUE option causes D'Bridge to erase all the packets
currently in the QUEUE window and re-scan for outbound mail.
This is the same thing that happens when D'Bridge begins a mail event.
This is handy for recreating packets if you had previously aborted the
scan when D'Bridge first came up or you entered some messages in the
editor (although there IS an option to automatically re-scan NETmail after
leaving the editor).

REBUILD QUEUE will normally create packets for all outbound mail
regardless of whether it is CRASH priority or not; typically, all crash-
mail will be sent, and all other mail will be on hold. This can easily
be changed by using the VIEW/MODIFY QUEUE command, ALT-V.

<h3><a href="#toc">POLL A NODE</a></h3>

The POLL A NODE option causes D'Bridge to call the specified system to
pick up mail which may be on "hold" there. D'Bridge will simply ask you
"Poll whom?" and you enter either the address of the system to call or the
operator's name. If you enter a name, it will display a list of all systems
with the Operator name you specify (if you enter "JOE," it will display all
the "JOEs" in your nodelist and allow you to select the one you wish.

If you don't know the address, five function keys (F1-F5) will aid you in
your search. Once you have determined the system to call and pressed ENTER,
D'Bridge will add a POLL entry to the queue with the specified priority.
If you use IMMEDIATE or CRASH priority, the POLL will happen right away.


<h3><a href="#toc">TRANSMIT FILES</a></h3>

The TRANSMIT FILE(S) option gives you a simple and quick way to send
files to another system. Any file which can be copied using the DOS
"COPY" command can be sent with D'Bridge. Similar to the POLL A NODE
command, the TRANSMIT FILE(S) option asks you for the destination
address. Here, you may enter the address of the system or part of the
operator's name. Once you've entered the address, D'Bridge will ask
you for a list of files to transmit. You may enter as many files as
you wish, one per line. Make sure you've included the DOS subdirectory
if they aren't in the current directory. If D'Bridge can't find a file,
the cursor will simply be stuck on the line until you press ESC (to
cancel the entire request), press the UP arrow or enter a valid (exis-
ting) DOS filename. When you're satisfied you've entered the list cor-
rectly, press ENTER. You may also use the DOS "wildcard" characters "*"
and "?" to specify a group of files to send.

To use a priority other than the default, enter &lt;FILENAME> &lt;PRIORITY>
in the window:

  C:\AUTOEXEC.BAT             Immediate
  C:\DATA\BIGFILE.ZIP         Hold


<h3><a href="#toc">FILE REQUEST</a></h3>

The FILE REQUEST option allows you to request that a remote system sends
you file(s). With a network of all D'Bridge systems, all file requests
are really update requests. This means that if you already have a file
and you re-request it, it will only be sent if the file size or date/time
are different.
To use the FILE-REQUEST option, simply enter the address of the system you
wish to call (just like MANUAL POLL and TRANSMIT FILE(S)) and enter a list
of files you wish to receive.

If you're not sure of the exact filenames, you may use the DOS "wild-
card" characters "*" and "?."  After you have entered the entire list of
files to request, press ENTER and D'Bridge will add the request to the
outbound mail queue.

To use a priority other than the default or file-request passwords, use:

&lt;FILENAME>[,&lt;PASSWORD>] &lt;PRIORITY>

                 FILE1,SECRET          Immediate
                 FILE2                 Crash

Note that HOLD is not a valid priority for file-requests. Requests only
work when you call the remote system.

<h3><a href="#toc">INFORMATION DISPLAY</a></h3>

The INFORMATION DISPLAY screens provide summary information about D'Bridge.
Execution times and traffic-volume information are collected and available for
display in three different forms:

SUMMARY          This provides traffic and data volumes for the year, month,
                 week, yesterday and today.

TIME USAGE       History of execution times is displayed on this screen.

ACTIVITY GRAPH   This shows a graphical representation of the operation
                 of D'Bridge.


<h3><a href="#toc">READ / EDIT EMAIL</a></h3>

The READ/EDIT EMAIL option causes D'Bridge to load the selected EMAIL
editor. The screen will clear and the editor will be loaded, ready for you
to read and respond to EMAIL messages.

DB EDIT may also be run directly from the dos prompt; it is used to enter
and read the EMAIL messages D'Bridge sends and receives. D'Bridge utilizes
the Fidonet standard message format used by so many other EMAIL systems,
bulletin boards and utilities. This will allow you to use a great variety
of external programs such as "robot" mailers, form-letter generators and
editors.


<h3><a href="#toc">HISTORY DISPLAY</a></h3>

When you select the HISTORY DISPLAY option, ALT-H, you will receive
a menu of available history screens. There are four screens on the menu:

<h3><a href="#toc">OUTBOUND HISTORY</a></h3>

The outbound history screen simply displays a log of all outbound mail
calls within the last "n" days (specified on the BASIC CONFIGURATION
screen). This display always starts at the end by showing you the most
recent call. The UP, DOWN, PGUP and PGDN keys scroll the screen, ESC
exits. This display lists the date, time, destination, bytes sent/received,
elapsed time and actual cost of the connection.

<h3><a href="#toc">INBOUND HISTORY</a></h3>

The inbound history screen simply displays a log of all incoming mail
calls within the last "n" days. This display lists the date, time,
origin, bytes sent/received, elapsed time. Since this is inbound mail,
there is no cost involved.

<h3><a href="#toc">RECEIVED ECHOMAIL HISTORY</a></h3>

The received ECHOmail history screen displays a log of all ECHOmail
messages received within the last "n" days. This display lists the
date, time, destination, bytes sent/received, elapsed time and actual
cost of the connection.

<h3><a href="#toc">AREAFIX LOG</a></h3>

The AREAFIX log screen displays a log of all automatic additions to
your "forward-to" list in the area manager. These may be in the form
of AREAFIX requests or may be entered manually by using the NEW
ECHOMAIL LINK, ALT-N option.


<h3><a href="#toc">VIEW SYSTEM LOG</a></h3>

The VIEW SYSTEM LOG command allows you to scroll through the system log file
and search it for keywords. Besides the standard cursor control keys, the
following keys are active here:

          +/-              The PLUS and MINUS keys change the date of
                             the display  (pressing the minus key three
                             times displays the log from 3 days ago.)

          Morning        Displays log entries starting at midnight.

          Afternoon      Displays log entries starting at noon.

          Evening        Displays log entries starting at 6:00 PM.

          Search         Enters "search mode"

          Highlight      Allows entry of highlight keywords and colors.

<h3><a href="#toc">USING SEARCH MODE</a></h3>

Search mode has two ways to look for log entries:

          KEYWORD SEARCH    Searches for any match in a list of keywords.

          TEXT SEARCH       Searches for the first occurrence of a substring.

The Next and Previous commands actually invoke the search.


<h3><a href="#toc">REQUEST ECHOMAIL LINK</a></h3>

AREAFIX is a subsystem within D'Bridge enabling you to remotely
request new ECHOmail links from a HOST or FEED system. This system,
designed by Greg Dawson, eliminates the need for manual intervention
on the part of the HOST system operator. Now that handling hundreds
of ECHOmail conferences on a single system is a daily reality, this
automated system of forwarding maintenance is required.

The REQUEST ECHOMAIL LINK, ALT-R command allows you to request a
remote system, either STARTs or STOPs forwarding of ECHOmail conferences.
To use this feature, you must pre-arrange a PASSWORD with the operator
of your ECHOmail feed.

First, enter the address of the system to request ECHOmail from. If you
have not established an AREAFIX password for the specified system,
D'Bridge will ask you to assign one at this time. AREAFIX will not
function without a security password (for good reason!). AREAFIX pass-
words may also be entered on the PACKET/MAIL CONTROL screen.

Next, enter a list of CONFERENCE TAGS desired, one per line; press
ENTER on a blank line when finished. If you wish to remove a conference
rather than adding it, simply put a minus sign "-" before the tag.

If you wish to receive a list of available ECHOmail from your ECHO link,
answer YES to "Area listing?". If you want the host system to rescan the
message base, sending you all the old messages, answer YES to "Get old
messages?".

Finally, choose the EMAIL priority you wish to use for transmitting the
request. This priority has no connection to the one with which you will
receive the ECHOmail - that's up to the other system's operator.

When the request is received by the remote system, it will add or remove
your system from its "forward-to" list as you have specified; it will
send you a confirmation message which will explain the changes made and
errors or violations you have made. This message may be sent automatical-
ly, or you may have to poll later to receive it; this depends on how your
ECHOmail link has his system configured.


<h3><a href="#toc">NEW ECHOMAIL LINK</a></h3>

The NEW ECHOMAIL LINK, ALT-N command allows you to add systems to the
FORWARD-TO list in your area manager. This command queues up the same
type of entry as an inbound AREAFIX request with the exception of the
security check. When a system is added or removed from an area, an
audit trail is created in the AREAFIX LOG and a confirmation message
is created and sent to the receiving system.

First, enter the address of the system to send the ECHOmail conference(s)
to. You do not have to have an AREAFIX password just to enter a manual
request.

Next, enter a list of CONFERENCES to add or remove, one per line; press
ENTER on a blank line when finished. If you wish to remove a conference
rather than adding one, simply put a minus sign "-" before the tag.

If you wish to have D'Bridge rescan the entire ECHOmail area and send all
the mail currently stored, answer YES to "Rescan?". If you wish to send a
list of areas available, answer YES to "Send area list?".

Choose the EMAIL priority you wish to use to transmit the request.
This priority has no connection to the one with which you will receive
the ECHOmail - that's up to the other system's operator.

Finally, if you want the request to be processed immediately, answer
YES to "Process now?". If the request is not processed immediately,
you may enter several requests and subsequently run the PROCESS ECHOMAIL
option on the UTILITIES menu.


<h3><a href="#toc">TERMINAL EMULATOR</a></h3>

The D'Bridge terminal mode is designed to let you communicate with
online services such as a bulletin board system (BBS), CompuServe&lt;TM>
and other such electronic information systems. Terminal mode acts
like a glass Teletype, having an 24x80 display plus a status line
giving information such as current baud rate, parity, etc. It is not
the intention of D'Bridge to provide many terminal features such as you
might find in other communication programs; D'Bridge is an EMAIL system
and only provides this terminal mode as a simple means for you to tie-
in with other systems through a direct connection.

Terminal mode transmits all printable and control characters without
translation to your modem. The ALT keys are used to control the various
functions in terminal mode. Pressing ALT-X exits the terminal and
returns to mailer mode.

Once in the terminal mode, you will notice that pressing ALT-H displays
a help screen. These are the commands currently supported:

                 /-TERMINAL MODE COMMANDS----------------\
                 |                                       |
                 | ALT-C   Dial system(s) from nodelist  |
                 | ALT-D   Dial system(s) from directory |
                 | ALT-P   Set terminal parameters       |
                 | ALT-L   Capture log ON/OFF            |
                 | ALT-T   Terminate connection          |
                 | ALT-W   Wipe (clear) screen           |
                 | ALT-X   Exit terminal mode            |
                 | ALT-Y   PUSH to DOS                   |
                 | ALT-Z   DROP to DOS                   |
                 | PgUp    Upload file(s)                |
                 | Pgdn    Download file(s)              |
                 |                                       |
                 \---------------------------------------/


ALT-C / Call system from nodelist

D'Bridge can dial any systems in your nodelist that are not "unlisted
nodes". Pressing ALT-C will display the following window:

/-CALL SYSTEM(S) FROM NODELIST--------------------------------------------\
|                                                                         |
|                                           F1-List nodes in NET 1:110    |
|                                           F2-Change ZONE:NET            |
|                                           F3-List all NETS              |
|                                           F4-List NETS in ZONE 1        |
|  Dial which node(s)?                      F5-Scan user names            |
|                                                                         |
|  _____________________________________________________________________  |
|                                                                         |
\-------------------------------------------------------------------------/

Simply enter a list of addresses you wish to call, separated by spaces.
D'Bridge will auto-dial the entire list until a connection is made. The
function keys F3-F7 are available to assist you in locating the proper
addresses. When a connection has been made, D'Bridge will "beep" and
return to terminal mode with the remote system online at the proper
baud rate.

   F3      Scans the entire nodelist by username (first names).

   F4      Pressing the F3 key displays all the NODES and POINTS in the
           currently selected NET. Pressing ENTER while using this display
           selects a system; pressing ESC cancels.

   F5      Gives a listing of all NETs in the entire nodelist and allows
           you to select a new NET.

   F6      Lists all ZONEs in the nodelist

   F7      Allows you to change the currently selected NET by entering the
           ZONE:NET desired. After you change NETs, you can use the F1 key
           to list the systems in the new NET.

   ENTER   Starts the cycle-dialing window; D'Bridge will continue dialing
           until connected or interrupted by the operator.

   ESC     Cancels dialing mode


ALT-D / Dialing directory

D'Bridge terminal mode has a built-in dialing directory enabling you
to program the phone numbers for up to 100 systems you call frequently.
Pressing ALT-D will display the following window:

/-DIALING DIRECTORY---------------------------------------------------------\
|  Entry  Name                      Phone number                 Baud/Parms |
|  -----  ----                      ------------                 ---------- |
|    1    D'Bridge Support/Cincinn  1-513-821-1387                 9600 8N1 |
|    2    D'Bridge Support/West     1-503-292-7233                 9600 8N1 |
|    3    D'Bridge Support/West     1-503-292-7237                 9600 8N1 |
|    4    D'Bridge Support/East     1-215-879-3310                 9600 8N1 |
|    5    D'Bridge Support/Canada   1-416-823-4521                 9600 8N1 |
|    6    D'Bridge Support/Europe   31-85-459034                   2400 8N1 |
|    7    D'Bridge Support/Italy    39-766-540-899                 2400 8N1 |
|    8    D'Bridge Support/Austral  61-3-848-3331                  9600 8N1 |
|    9    D'Bridge Support/Austral  61-3-563-2496                  9600 8N1 |
|   10                                                                      |
|   11                                                                      |
|   12                                                                      |
|                                                                           |
| Edit entry, Delete entry, UP, DOWN, PGUP, PGDN, #, ENTER-Dial, ESC-Cancel |
|                                                                           |
| Command?                                                                  |
\---------------------------------------------------------------------------/

You may easily enter or change numbers in this list by using the EDIT
ENTRY command. Move the highlight bar to the entry you wish to add or
edit then press "E". It will display the following window:

             /-EDIT DIRECTORY ENTRY---------------------\
             |                                          |
             | Entry number: 1                          |
             |         Name: D'Bridge Support/Cincinn   |
             | Phone number: 1-513-821-1387             |
             |    Baud rate: 9600                       |
             |       Parity: NONE                       |
             |    Data bits: 8                          |
             |    Stop bits: 1                          |
             |   Save entry?                            |
             |                                          |
             \------------------------------------------/


Enter the NAME, PHONE NUMBER, BAUD RATE, PARITY, DATA BITS and STOP BITS
desired, then answer YES for "Save entry?". Pressing ESC will abort the
change. After you have answered YES, the window will disappear and the
entry will be permanently added to your personal dialing directory.

To dial a number, simply type the ENTRY NUMBERS desired, separated by
spaces, then press ENTER. You can also move the highlight bar to the
desired line and press ENTER. Either will do the same thing.

If you wish to use the D'Bridge scripting language, simply enter the
phone number with the following format:

    "SCRIPT.FIL"aaa-nnn-nnnn

Where SCRIPT.FIL is the name of your script file, aaa is the AREA CODE
you are calling and nnn-nnnn is the PHONE NUMBER.

ALT-H / Terminate connection

Pressing ALT-H will terminate the current call immediately by dropping
the DTR signal to the modem for 1.2 seconds.

ALT-P / Set terminal parameters

The ALT-P command will allow you to set the default settings for
terminal mode. Pressing ALT-P displays the following window:

            /-SET TERMINAL PARAMETERS--\
            |                          |
            |    Comm port: COM1       |
            |    Baud rate: 2400       |
            |       Parity: NONE       |
            |    Data bits: 8          |
            |    Stop bits: 1          |
            |       Duplex: FULL       |
            |    Emulation: ANSI       |
            | Capture ANSI: YES        |
            | AutoDownload: YES        |
            |                          |
            \--SPACE-Change, ESC-Exit--/


By using the UP and DOWN arrow keys to select an option and pressing
the SPACE bar to change, you can configure the terminal to any setting
you wish. This setting will be recalled when terminal mode is entered,
but the communications settings can also be changed by ALT-C and ALT-D.

<h3><a href="#toc">COMM PORT</a></h3>

The COMM PORT specifies which serial interface channel you wish to
use. This could allow you to select between modems or even direct
links to other PC's. COM1 through COM7 are allowable values.

<h3><a href="#toc">BAUD RATE</a></h3>

This allows you to select the speed or BAUD RATE of the serial link with
your modem. Allowable values are 300, 1200, 2400, 4800, 9600, 19200 and
38400, but may not exceed the value specified in the COMMUNICATIONS/MODEM
SETUP screen. If you have LOCKED your modem at its top speed, this baud
rate setting has no effect.

<h3><a href="#toc">PARITY</a></h3>

The PARITY setting allows you to communicate with systems that require
parity-error checking. Valid settings are NONE, EVEN, ODD, MARK and SPACE,
but most newer networks are using "NONE."

<h3><a href="#toc">DATA BITS</a></h3>

This setting is included for compatibility with old-style 7-bit systems.
Allowable values are 7 and 8, but be warned file-transfers will not
function properly with a 7-bit link.

<h3><a href="#toc">STOP BITS</a></h3>

Almost all baud rates use 1 stop bit, but "weird" configurations might
require a value of 2 (highly unlikely!).


<h3><a href="#toc">DUPLEX</a></h3>

Some older systems require your own system to provide the "echo" of
the characters typed. This is called HALF DUPLEX. Newer systems all
echo back the characters you type, eliminating the need for a HALF
DUPLEX setting. Use FULL DUPLEX for systems such as CompuServe, The
Source and BBS networks.

<h3><a href="#toc">EMULATION</a></h3>

D'Bridge terminal program has only one emulation, ANSI. You may either
select ANSI or NONE. The ANSI emulation does not require the use of
an ANSI.SYS driver; it includes full color support plus ANSI-MUSIC!

<h3><a href="#toc">CAPTURE ANSI</a></h3>

If you have the capture log enabled, D'Bridge has the option to either
save or strip the ANSI codes from the file. If you want to SAVE the
ANSI codes in the capture file, answer YES here.

<h3><a href="#toc">AUTODOWNLOAD</a></h3>

D'Bridge terminal mode has the capability to detect when the remote
system has initiated a ZMODEM send request. If you answer YES to this
question, when such a request is detected, D'Bridge automatically starts
a ZMODEM receive session saving you the trouble.

ALT-L / Capture log ON/OFF

The ALT-L key "toggles" the capture log ON or OFF. If you wish every-
thing displayed on the screen to be captured to a text file, press
ALT-L to turn on the capture log. It will ask you for a DOS filename
to store the information in; it defaults to CAPTURE.LOG, but you may
change it to any directory or filename you wish. Pressing ALT-L a
second time or exiting terminal mode will close the text file. If a
capture file already exists, D'Bridge will add on to the end of it,
preserving its previous contents.


ALT-W / Wipe (clear) screen

Pressing ALT-W simply clears the current screen, moving the cursor to
the upper-right corner.

ALT-X / Exit terminal mode

Pressing ALT-X will take you out of the terminal mode and back to
D'Bridge. Your modem will be re-initialized and should be ready
to receive incoming mail almost immediately.

ALT-Y / PUSH to DOS

Pressing ALT-Y will allow you access to DOS commands while you are
still connected to a remote system. To get back into D'Bridge, type
EXIT. This is handy for doing directory listings, etc. while you're
connected to an online service.

ALT-Z / DROP to DOS

Pressing ALT-Z will also allow you access to DOS commands. The only
difference is that with ALT-Z, D'Bridge is totally swapped out of memory
to EMS or disk so you have as much free memory as possible.

PgUp / Upload

The PgUp key allows you to transmit a list of files to the host
computer. The way to do this is typically to tell the remote computer
you are ready to send some files, then press the PgUp button, select
the desired protocol, XMODEM, Telink or ZMODEM, then enter a list of
files to send. Note: With XMODEM, you can only send one file at a
time - XMODEM is not a "batch" protocol.

PgDn / Download

The PgDn key allows you to receive files from the host computer. This
is normally done by first telling the remote system which files to send
then pressing the PgDn key. You then tell D'Bridge which protocol you
want to use, XMODEM, Telink or ZMODEM and specify which directory to
put the files in. With XMODEM you must specify the actual filename
because it is not a batch protocol.


<h3><a href="#toc">BUILD NODELIST DATABASE</a></h3>

This forces D'Bridge to recompile the nodelist database index. This is
normally an automatic process happening at midnight, but you can force
it to happen by selecting this option.

Note that if you create a "dummy" file called DBRIDGE.RNC in
your D'Bridge directory, D'Bridge will "restart" itself after compiling.

<h3><a href="#toc">PROCESS MAIL</a></h3>

This enables you to manually start inbound mail processing and scanning
for outbound ECHOmail and AREAFIX requests. This shouldn't be necessary
unless you have mail processing set to "Manual" in the PACKET/MAIL CONTROL
screen.

<h3><a href="#toc">FILEBASE SEARCH</a></h3>

This option (CTL-F) allows you to search through the D'Bridge FileBase
for a partial match on a specified filespec.

The FileBase is a combined listing of files available for request on other
systems. This enables you to easily locate files and request them with the
ease of point-and-shoot operation.

After you specify a search key to start (like "DB" for filenames starting
with DB), a list of partial matches will be displayed. You can highlight the
file you want to request by using the arrow keys; request it by pressing "R",
then the priority: Immediate, Crash, or Normal.

If you need to make a passworded request, set the current password with the
"P" option. Since the FileBase is not zone-aware, you may select another
zone with the "Z" option.


<h3><a href="#toc">LICENSE REGISTRATION</a></h3>

D'Bridge requires a registered license key be used in accordance with our
software license policy.  This registraion process will allow you to be added
to our mailing list and at the same time request that a new license key file,
customized with YOUR name or handle will be created for you within ten days.

Complete the registration form, send it in, then look for "NEWKEY.ZIP" to
arrive about ten days after your registration was sent.

If you have more than one license key to register, put them all in a directory
and specify it in the registration screen.

<h3><a href="#toc">EXPORT CONFIGURATION</a></h3>

With this option, D'Bridge will produce an "exported configuration" file.
Normally called DBRIDGE.CFG, the output is a standard text file designed
to transfer the entire D'Bridge parameter configuration to another system or
for upgrading to a newer version.

Every night at midnight, D'Bridge automatically exports its configuration to
a file called DBRIDGE.AUT and puts it in an archive called DBCONFIG.ZIP.

<h3><a href="#toc">LEAVE DBRIDGE</a></h3>

This option, CTL-C or ALT-X will exit to DOS and completely unload the
D'Bridge software.

<h3><a href="#toc">DROP TO DOS</a></h3>

This option or ALT-Z will "drop" to DOS, creating the largest possible
DOS shell using the secondary command processor specified by the environment
variable "COMSPEC" (usually COMMAND.COM).

D'Bridge swaps its memory either to EMS or disk, depending on free memory
available.


<h3><a href="#toc">PUSH TO DOS</a></h3>

This option or ALT-Y will "push" to DOS, creating a DOS shell using the
secondary command processor specified by the environment variable "COMSPEC".


<a name="5.00"/><h2><a href="#toc">5.00  EMAIL MESSAGE EDITOR</a></h2>

The EMAIL message editor is activated by selecting the READ/ENTER EMAIL
option from the main menu or by pressing ALT-E. The editor may also be
accessed directly from the DOS prompt by typing:

C> DB EDIT

Assuming the DB EDIT command was found, you quickly get a display
similar to the following:

F1-Enter, F2-Reply, F3-Edit, F4-List, F5-Kill, F6-Areas, ESC-Menu      D'Bridge
                                                                    1.30/001002
/-READ/EDIT EMAIL-------------------------------------------------------------\
|Msg # 250                                                                    |
|Date: 11 Jun 92 18:10:34                                                     |
|From: Chris Irwin                                                            |
|  To: Tom Ordelman on 201:200/0  D'Bridge Support/Europe                     |
|Subj: Greetings from freezing Cincinnati!                                    |
|-----------------------------------------------------------------------------|
|Hello Tom,                                                                   |
|                                                                             |
|I was just writing to let you know that I've been sitting out in the snow    |
|finishing the D'Bridge documentation. I think that you will find that it     |
|is well-written and quite clear. It's Thursday, so I'll be out playing poker |
|this evening... Give me a call when you get a chance tomorrow!               |
|                                                                             |
|Regards,                                                                     |
|Chris, 201:201/0                                                             |
|                                                                             |
|                                                                             |
|                                                                             |
|                                                                             |
\-----------------------------------------------------------------------------/
Area: D'Bridge network mail         Msgs: 273   Highest: 298   Last read: 276

This is the "READ" mode of D'Bridge. Using this screen, you can enter,
read and reply to messages along with a variety of utility functions.
Each function will be described in detail in the next few sections.
Remember that a quick way to get out of the editor is to press CONTROL-C.
This is a perfectly acceptable way to get out, it's just like using
the QUIT menu option.


      RIGHT and LEFT arrows - NEXT and PREVIOUS MESSAGE

      Pressing the RIGHT arrow key will display the next message in the
      current area; pressing the LEFT arrow will display the previous one.

      F1 or E - ENTER A MESSAGE

      As soon as you press the F1 key or the letter "E" D'Bridge will go into
      "EDIT" mode, clearing the screen and starting with a blank message.

      F2, R, Q or > - REPLY TO A MESSAGE

      Replying to a message is the same as entering a new one; the difference
      is that the "TO" name and address is taken automatically from the
      message currently on the screen. The editor will move the "FROM" infor-
      mation to the "TO" field. This is handy to keep from making a mistake
      typing the name or network address. There are four keys that create a
      reply message:

          F2   Asks for QUOTED or NORMAL reply.
          R    Creates a NORMAL reply.
          Q    Creates a QUOTED reply.
          >    Same as Q.

      If you select a NORMAL reply, the screen will clear and just the "TO"
      and "FROM" information will be displayed. If you specify a QUOTED re-
      ply, the entire message you are replying to will be QUOTED, so that
      you may remind who you are communicating with and exactly what it is
      you are replying to. QUOTED text has each line starting with a ">"
      character indicating that the text came from the other person.
      For example, if a message reads:

          What time can I call you about the pricing information?

      Your QUOTED reply might look like:

          CI> What time can I call you about the pricing information?

          Give me a call around 4:00, if I'm not in, please leave the
          information with my secretary.


      QUOTED replies are quite valuable for reminding the receiver exactly
      what you're talking about. In fact, if the receiver of the above message
      wanted to reply to you, the reply might look like:

          CI> What time can I call you about the pricing information?

          TO> Give me a call around 4:00, if I'm not in, please leave the
          TO> information with my secretary.

          I can't - I'm flying to Paris today. I'll call you when I
          get back.

      F3 or O - EDIT AN OLD MESSAGE

      Sometimes, you will enter a message, then realize you wish to make a
      change before sending it. The F3 or "O" option does just that. It
      allows you to edit the currently displayed message. If the message
      displayed is not from you, you will be asked "You didn't enter this
      message, edit anyway?". Generally, it's not "nice" to edit other
      people's mail, but D'Bridge allows you to do this anyway.

      F4 or L - LIST MESSAGES

      Pressing F4 or "L" will put the editor into "LIST" mode. While in
      "LIST" mode, the display changes to show you all the message headers.
      This is handy when you want to scan for a particular message quickly.
      Until you press the ESC key, the editor will remain in LIST mode and
      the function keys have a different meaning. While in this mode, you
      may view message headers and select a group of messages to KILL or
      PRINT.

LIST: Include, Exclude, All, None, Page, Display, Group, ESC-Exit      D'Bridge
                                                                    1.50/001002
/-READ/EDIT EMAIL-------------------------------------------------------------\
|/-LIST MESSAGES--------------------------------------------------------------\
||Msg #  Date   From                   To                      Subject        |
|| 292   20 Apr Chris Irwin            Tom Ordelman  201:200/0 D'Bridge Suppor|
|| 293   20 Apr Chris Irwin            Joaquim Homri 135/20    Re: ZMODEM     |
|| 294   20 Apr ARCmail                Sysop         107/246   FF239209.MO1   |
|| 295   20 Apr ARCmail                Sysop         108/871   F98429E1.MO1   |
|| 296   20 Apr ML-UPD 1.5   11/109    Megalist Admi           000B0071.MLA   |


      The first line will be highlighted with a light bar. Using the UP, DOWN,
      PGUP and PGDN keys, you can move the light bar to the desired message.
      When you press the ESC key, the specified message will be displayed and
      DBEDIT will return to READ mode.

      While the LIST window is on the screen, the following commands are
      enabled:

          I - INCLUDE

          When you press the I key, a star ( * ) will appear next to the
          message number on the highlighted line. This means this message
          is "included" for processing by group commands.

          E - EXCLUDE

          Pressing the E key will remove a star "*" from the highlighted
          line. This is used to un-include (de-select) the current message
          from processing by the group commands.

          A - ALL

          If you press A, all of the messages will be included for processing
          by group commands and they will all have a star "*" next to them.
          This is handy to use in conjunction with "E" (EXCLUDE) when you
          want to process most of the messages with group commands.

          N - NONE

          Pressing N will remove all the stars "*" from the LIST MESSAGES
          window. None of the messages will be selected for group commands.

          P - PAGE

          Pressing P will select all messages on the currently displayed page.

          D - DISPLAY

          Pressing D will toggle the LIST display between showing the TO, FROM
          and SUBJECT and showing the entire SUBJECT line.


          G - GROUP

          Pressing G will display another list of options called GROUP COM-
          MANDS. With these commands, you can PRINT or KILL all of the
          selected messages automatically. This can be a very "dangerous"
          command, so make sure you know exactly what you're doing if you
          use it. The following GROUP COMMANDS are allowed:

              P - PRINT  (group command)

              The P group command will PRINT all messages that have stars "*"
              next to them and were previously included while in the "LIST"
              mode. Obviously this option will work only if you have a printer
              connected; press the ESC key to cancel the PRINT operation.

              K - KILL  (group command)

              The Kill group command will KILL all messages that were included
              and have a star "*" next to them. Make sure you have double-
              checked which messages were included because once they are
              KILLED, they are permanently gone. (Perhaps Professor Norton
              could get them back... ).

      F5 or K - KILL A MESSAGE

      Pressing F5 or "K" allows you to permanently KILL (erase) a message from
      your disk. It will ask you "ARE YOU SURE?" just in case you pressed it
      accidentally; use this option with caution!

      F6 or A - CHANGE MESSAGE AREAS

      The editor allows you to have any number of local and ECHOmail areas.
      Pressing F6 or "A" will display a list of all the areas you have de-
      fined in your configuration. Select the desired area by moving the
      light bar up and down, then pressing ENTER when the desired area is
      highlighted. You may also enter the AREA NUMBER and press ENTER. Both
      ways accomplish the same thing. If you are running a basic EMAIL
      system, you probably will not have any use for this option.


      ESC - EDITOR MENU

      All of the other editor features are accessible by using the EDITOR
      MENU. Pressing ESC will display the menu and allow you to select any
      of the following options:

        - Area information
        - Display statistics
        - Forward message
        - Copy/move message
        - Print message
        - Write message to file
        - Username AKAs/Alias addresses
        - Search headers/text
        - PUSH/DROP to DOS


<a name="5.01"/><h2><a href="#toc">5.01  USING EDIT MODE</a></h2>

After you have selected either the ENTER, REPLY or EDIT command, the
editor will be in "EDIT" mode. When you are using this mode, all of the
keys have different meanings than they do in READ mode. The top line of
the screen lists all the valid commands.

      The cursor will first appear on the "TO" field. Here, you enter the
      name of the person to whom the message is addressed. If you have
      selected the USERNAME INDEX option (in the nodelist configuration),
      the editor scans for a username simply by entering part of the name.
      For example, if you enter "CHRIS", DBEDIT will display all of the
      users who have a first name of Chris, Christine, Christy or Christo-
      pher and allow you to select the desired person. This search is based
      on FIRST NAME, so entering a last name won't work.

      If you wish to send the same message/files to different destinations,
      press the F8 key while on the "TO" field. This will display a window
      which allows you to enter any number of destinations, one per line in
      the following form:

      &lt;ADDRESS>[,&lt;PRIORITY>] &lt;USER NAME>

      ie.

      1:110/68 Chris Irwin

                        Valid priorities are: H - Hold
                                              N - Normal
                                              C - Crash
                                              I - Immediate

      If you routinely send information to the same list of systems, you
      will want to take advantage of the "distribution list" feature.
      Instead of an address and a username, you can specify the names of
      any number of distribution lists to include. A distribution list is
      simply a text file containing the same information as above: address
      and username.

      After you have entered or selected the name of the person you are
      writing the message to, the editor will say "on" and expect you to
      enter the address of the user. If you selected the username from the
      D'Bridge database, the address should already be there and you simply
      press ENTER. If you are entering this message to someone not in the
      database or have specified NO in the CREATE USERNAME INDEX field in
      the nodelist setup, you will need to enter the address.


      The editor provides 5 function keys to help you to find an address:

        F3 - List nodes

        Pressing F3 will display a list of all the systems in the currently
        selected ZONE:NET. Moving the light bar, highlight the desired system
        and press ENTER. If you can't find the address in this NET, press the
        ESC key.

        F4 - Change net

        The F4 key allows you to change the currently selected ZONE and NET
        numbers. Enter the ZONE and NET numbers desired separated by a colon
        ( : ) character. If you specify just one number, it is assumed to be
        the NET; the ZONE remains the same. After changing the ZONE and NET
        you may use the F3 key again to scan for individual systems.

        F5 - List nets

        Pressing F5 will give you a list of all ZONE and NET numbers in your
        nodelist and allow you to choose one as the currently selected NET.
        Similar to the F6 function, move the light bar to the desired line
        and press the ENTER key.

        F6 - List zones

        This function is identical to F5 above except it lists the ZONES that
        are compiled into the nodelist.

        F7 - Set ZONE:NET

        Allows you to directly set the ZONE and NET defaults.

     After you have selected the destination address, the cursor will move to
     the SUBJECT line. If you want to send a file along with this message or
     if you wish to request one, you must enter the filename(s) as the sub-
     ject. If you are SENDING files, you must specify the actual filename
     including drive and directory. If you are requesting a file, just specify
     the filenames you wish to receive. Obviously, if you are neither SENDING
     nor REQUESTING files, the SUBJECT line is simply a field which briefly
     states the purpose of the message.


     While the cursor is on the SUBJECT field, the following function keys are
     in effect:

       F3 - Send file

       Pressing F3 sets the FILE-ATTACH attribute for the message. This means
       all the files listed in the SUBJECT line (labeled ENCL) will be sent
       with the message.

       F4 - File request

       Pressing the F4 key sets the FILE-REQUEST attribute for the message.
       This means that when the message is sent, D'Bridge will request that
       the remote system sends you all the listed files.

       F5 - Update request

       The F5 key sets the UPDATE-REQUEST attribute for the message. UPDATE-
       REQUESTS are the same as FILE-REQUESTS in D'Bridge.

       F6 - Cancel

       Pressing F6 cancels a FILE-ATTACH, FILE-REQUEST or UPDATE-REQUEST and
       makes the SUBJECT line be just informational.

When the cursor is BELOW the line separating the heading from the message
text, the editor acts just like most word-processing systems.
You may simply type in your message, using the BACKSPACE and ARROW keys
to edit. You may notice that when you press the ENTER key, a "HARD RETURN
SYMBOL" is generated. Normally, you should not press the ENTER key unless
you wish to start a new paragraph or are entering a list of some kind
which should not be "rejustified" on the receiving system. Because D'Bridge
can communicate with other EMAIL systems and bulletin boards, the messages
might not look exactly the same on the receiving system as they look on
your screen when you enter them. For example, some EMAIL editors only
allow the display of 66-column text. If you were to use HARD RETURNS (by
pressing ENTER on each line), your message would be very hard to read on
the other EMAIL system. Get in the habit of only pressing the ENTER key
when you want to start a new paragraph.

While in the "EDIT" mode, the following function keys are in effect:

       F1 or ESC-Q-A - ABORT

       If you have accidentally gone into "EDIT" mode or wish to cancel your
       edit session and completely "throw away" the message you are entering,
       use the ABORT option. The editor will ask "ARE YOU SURE?", just to
       make sure you didn't press F1 accidentally. ABORTING your editor will
       return you to "READ" mode.


       F2 or ESC-Q-S - SAVE MESSAGE

       Pressing F2 will immediately save the current message to disk. Unless
       otherwise specified, it will be sent during the next scheduled mail
       event. If you press F2 by accident, you can always use the EDIT OLD
       option to continue or change it. SAVING your message will return you
       to "READ" mode.

       F3 or CONTROL-N - INSERT LINE

       The INSERT LINE option will add a blank line BEFORE the line where the
       cursor is located.

       F4 or CONTROL-Y - DELETE LINE

       The DELETE LINE option does just that; it erases the line that the
       cursor is on.

       F5/F6 - MARK

       This is an "advanced" feature; The F5 key marks the beginning of a
       block of text; the F6 key marks the end. "Marked" text is designated
       by reverse video for the selected block. This is used in conjunction
       with the BLOCK commands described later; they allow you to COPY, MOVE,
       DELETE or WRITE the selected block of text to a file.

       F10  - FLAGS

       D'Bridge allows you to set up to 15 different "FLAGS" on an EMAIL
       message. Pressing F10 displays a menu of all the flags; only the
       ones that are "bright" are allowed. Depending on certain criteria,
       such as FAX addressing, etc, certain options are not always available.
       The currently defined flags are as follows:

          Private         This message is intended for the addressee only.
                          If the receiving system is a BBS, only the Sysop
                          should be able to read the message.

          Hold            HOLD priority should be used for this message.
                          Please note that unless you specify XMAIL for this
                          message, the message will be sent if there is any
                          other outbound traffic for the destination system;
                          if you enter a CRASH message to the same system,
                          both messages will be sent unless you XMAIL it.


          Crash           CRASH priority means the message should be sent
                          right-away, even during the UNEVENT. Only messages
                          with CRASH or IMMEDIATE priority will be sent during
                          the UNEVENT. CRASH messages might cost more due to
                          making a long-distance phone call during the day
                          rather than during a late-night scheduled event.
                          CRASH priority messages never get routed, but go
                          directly to their destination.

          Immediate       An IMMEDIATE priority message means the message will
                          be sent right away and have priority over other out-
                          bound traffic that has no IMMEDIATE priority.
                          This is handy for getting an important message out
                          when there's a lot of other outbound traffic in the
                          queue.

          XMail           If you specify an EMAIL message to be XMAIL, this
                          means the D'Bridge mail scanner will pack the
                          message in an outbound XMAIL archive using the
                          specified archive program: ZIP, LHA, ARJ, PAK, ARC
                          or ZOO. If you use this method, all priorities:
                          IMMEDIATE, CRASH, NORMAL and HOLD are treated
                          separately; HOLD mail will never be sent unless the
                          other system calls to pick it up or the operator
                          specifically overrides it in the VIEW/MODIFY QUEUE,
                          ALT-V mode.

          Kill/Sent       If a message has the KILL/SENT flag, it will be
                          erased from your NETmail area as soon as it has been
                          successfully transmitted. This is good for messages
                          that have been sent to multiple destinations.

          Archive/Sent    The ARCHIVE/SENT flag causes a message to be written
                          to the specified OUTBOUND MAIL ARCHIVE specified on
                          the PACKET/MAIL CONTROL screen. After the message
                          text has been stored in this file, the message is
                          erased from the system.

          Direct          If a message is flagged as DIRECT, the normal
                          routing specified in the ADVANCED ROUTING screen of
                          the event setup is ignored; the message is sent
                          directly to its final destination.

          Use Zonegate    If you wish an inter-zone message to be routed
                          through the official "zonegate", use this flag.

          Route/HUB       If you want a message to be HOST- or HUB-ROUTED,
                          specify this flag.


       You can change the flags either by moving the highlight bar with the
       UP and DOWN arrows and pressing ENTER, or by pressing the first letter
       of the desired flag. Press ESC when you are finished setting message
       flags.

       ESC - MENU

       The rest of the "EDIT" mode commands are activated from the menu.
       Pressing the ESC key will display the menu.

       BLOCK: READ

       The BLOCK READ option allows you to read in text from a standard text
       file. It will ask for the name of a text file and whether you want to
       use HARD of SOFT returns. If the text is in the form of paragraphs, use
       the SOFT option; if you are reading in columns of numbers or some sort
       of text you don't want to be reformatted, specify HARD.

       BLOCK: WRITE

       Assuming you have already used the F5 and F6 keys to highlight a
       block of text, the BLOCK WRITE option allows you to write it to a
       standard text file.

       BLOCK: COPY

       The BLOCK COPY option will move the text highlighted with the F5 and
       F6 keys to the position where the cursor is currently located. This
       option will not work if the cursor is within the highlighted region.

       BLOCK: MOVE

       The BLOCK MOVE option is the same as the BLOCK COPY command except
       the text is actually moved rather than copied to the current cursor
       position.

       BLOCK: DELETE

       The BLOCK DELETE command will erase all text you highlighted with
       the F5 and F6 keys.

       QUIT: SAVE

       The SAVE option is the same as the F2 key. It saves the current message
       and returns to "READ" mode.

       QUIT: ABORT

       The ABORT option allows you to "throw away" the current edit session.
       This is the same as the F1 key.


       QUIT: DROP TO DOS

       The DROP TO DOS command allows you access to DOS while you are editing
       a message. This method frees all available memory by swapping the
       editor to EMS or disk. When you are finished using DOS commands or
       programs, type "EXIT" to return to your edit.

       QUIT: PUSH TO DOS

       The PUSH TO DOS command allows you access to DOS while you are editing
       a message. When you are finished using DOS commands or programs, simply
       type "EXIT" to return to the editor.

       To summarize, we have included the following table of keys and their
       effect in various "edit" modes:

      Mode/field   Key(s)      Effect
      -------------------------------------------------------------------
      "TO"         F3          List users starting with the one entered
                   F8          Multiple destinations/Distribution list(s)

      "ADDRESS"    F3          List all NODEs in the currently selected NET
                   F4          Select a new ZONE and NET
                   F5          List all NETs in the nodelist
                   F6          List all NETs in the selected ZONE
                   F7          List FAX entries

      "SUBJECT"    F3          Send file(s)
                   F4          File-request
                   F5          Update-request
                   F6          Cancel send/request

      EDITOR       UP          Moves the cursor up one line
                   DOWN        Moves the cursor down one line
                   LEFT        Moves the cursor left one character
                   RIGHT       Moves the cursor right one character
                   DELETE      Deletes the character under the cursor
                   INSERT      Toggles "insert mode" ON/OFF
                   HOME        Moves cursor to the start of line/page/message
                   END         Moves cursor to the end of line/page/message
                   TAB         Moves cursor to the next tab position
                   BACKSPACE   Moves cursor left one character and erases
                               previous character if at the end of a line or
                               "insert mode" is ON.
                   F1          Aborts the current edit, returns to READ mode
                   F2          Saves the message, returns to READ mode


<a name="5.02"/><h2><a href="#toc">5.02  USING READ MODE</a></h2>

"Read" mode allows the user to read EMAIL messages in any of the defined
message areas. There are several keys that are used to control "read" mode
with a single keystroke:

      UP and DOWN arrows

      The UP and DOWN arrow keys move the currently displayed message UP and
      DOWN on your screen allowing you to read more text than will fit on the
      screen.

      PGUP and PGDN

      The PGUP and PGDN keys work like the UP and DOWN arrows except they
      advance the text one page at a time.

      HOME and END

      The HOME key displays the first page of a message; the END key displays
      the last page.

      LEFT and RIGHT arrows

      The RIGHT arrow displays the NEXT message; the LEFT arrow displays the
      previous message.

      + and - keys

      The PLUS and MINUS keys allow you to read by "thread". If a message
      says "Reply to #nnn", you can read the original message (the one replied
      to) by pressing the MINUS (-) key. Pressing PLUS (+) displays the next
      message in the "thread". This is most useful for "local" areas and does
      not usually work in your Network mail area.

      Number keys (0-9)

      You can advance to the desired message simply by entering the message
      number and pressing ENTER.


D'Bridge allows for virtually any number of message areas to be defined
in the area manager. While in READ mode, you may select between the
different message areas by using the F6 or "A" command. This command
displays the following screen which allows you to select a new message
area:

F1-Enter, F2-Reply, F3-Edit, F4-List, F5-Kill, F6-Areas, ESC-Menu      D'Bridge
                                                                    1.50/001002
/-READ/EDIT EMAIL-------------------------------------------------------------\
|Msg # 251                                                                    |
|Date: 07/-AREA CHANGE-----------------------------------------------------\  |
|From: Ch|  0    NETMAIL             Network mail area                     |  |
|  To: To|  2    COMPLAIN            Complaint Department                  |  |
|Subj: Gr|  4    DB_ALPHA            D'Bridge ALPHA conference             |  |
|--------|  6    FTSC                Technical standards committee         |--|
|Hello To|  7    NETDEV              Network developer's conference        |  |
|        |  10   SYSOP18             Region 18 Sysop conference            |  |
|I was ju|  11   ZMODEM              ZMODEM conference                     |  |
|finishin|  12   ECHOECHO            ECHOmail working group                |  |
|is well-|  19   SYSOP110            NET 110 Sysop conference              |  |
|I won't |  21   DBRIDGE             D'Bridge ECHO                         |  |
|        |  22   QUICKBBS            QuickBBS ECHO                         |  |
|Regards,|  24   TBBS                TBBS ECHO                             |  |
|Chris, 2|  9999 BADECHO             Bad ECHOmail area                     |  |
|        |                                                                 |  |
|        |                                                                 |  |
|        \-----------------------------------------------------------------/  |
|                                                                             |
|                                                                             |
\-----------------------------------------------------------------------------/

Change areas either by highlighting the desired area using the UP and
DOWN arrows and pressing ENTER or by entering the TAG or NUMBER of the
message area you desire. Pressing ESC will leave you in the same area
you were in before.

Once DBEDIT is displaying another message area, it should be displaying
the same message as was there the last time you exited from that area.
This is a feature of the so-called LAST READ POINTER, which is maintained
for each user in the editor separately. D'Bridge stores the LAST READ
POINTERS on your disk so that they are the same the next time you read
your mail.


      To summarize, we have included the following table of keys and their
      effect in various "read" modes:

      Mode         Key(s)       Effect
      --------------------------------------------------------------------
      READ         F1, E        Enter a new message
                   F2           Enter a reply to a message (see REPLY mode)
                   R            Enter a normal reply
                   Q, >         Enter a quoted reply
                   F3, O        Edit an old message
                   F4, L        Change to LIST mode
                   F5, K        Kill (erase) the current message
                   F6, A        Change message areas
                   ESC          Displays the main menu (advanced functions)
                   LEFT arrow   Displays the previous message
                   RIGHT arrow  Displays the next message
                   0..9         Selects message number
                   ENTER        Selects message or advances to the next one
                   UP arrow     Scrolls the message up one line
                   DOWN arrow   Scrolls the message down one line
                   PgUp         Scrolls the message up one screen
                   PgDn         Scrolls the message down one screen
                   HOME         Displays the beginning of the message
                   END          Moves to the end of the message
                   CTL-C        Leave editor

      REPLY        F1           Enter a quoted reply
                   F2           Enter a normal reply
                   ESC          Cancel reply

      LIST         UP arrow     Moves the highlight bar up one line
                   DOWN arrow   Moves the highlight bar down one line
                   PgUp         Scrolls the screen back one page
                   PgDn         Scrolls the screen forward one page
                   ENTER        Select current message, return to READ mode
                   I            Includes the highlighted message
                   E            Excludes the highlighted message
                   A            Includes all messages
                   N            Includes no messages (excludes all)
                   P            Includes all messages on the current page
                   G            Enters GROUP mode
                   ESC          Exits LIST mode, displaying the same message

      GROUP        P            Print all included messages
                   K            Kills (erases) all included messages
                   ESC          Exits GROUP mode, returns to LIST mode


<a name="5.03"/><h2><a href="#toc">5.03  ADVANCED FEATURES</a></h2>

There are several other features available from DBEDIT; they include
forwarding, copying, moving or printing messages, searching text and
selecting alternate addresses or "AKA" usernames. To activate the
EDITOR MENU, press ESC while in "READ" mode; the following menu will
be displayed:

Editor menu:  UTILITIES    SEARCH    QUIT                              D'Bridge
              /--------------------\                                1.50/001002
/-READ/EDIT EM| Area information   |------------------------------------------\
|Msg # 252 Wri| Forward message    |                                          |
|Date: 11 Jun | Copy message       |                                          |
|From: Chris I| Move message       |                                          |
|  To: Tom Ord| Print message      |Bridge Support/Europe                     |
|Subj: Greetin| Write msg to file  |                                          |
|-------------| New username       |------------------------------------------|
|Hello Tom,   | Use alias address  |                                          |
|             \--------------------/                                          |
|I was just writing to let you know that I've been sitting out in the snow    |
|finishing the D'Bridge documentation.  I think that you will find that it    |
|is well-written and quite clear.  It's Thursday, so I'll be playing poker    |
|tonight... Give me a call when you get a chance tomorrow!                    |
|                                                                             |
|Regards,                                                                     |
|Chris, 1:110/68                                                              |
|                                                                             |
\-----------------------------------------------------------------------------/

      Following are descriptions of all the options available from the main
      editor menu:

      UTILITIES: AREA INFORMATION

      The AREA INFORMATION screen functions identically to the AREA CHANGE
      function described in the previous section. The difference is that
      AREA INFORMATION displays the number of messages, last read, low and
      high message numbers in each area. D'Bridge displays the areas that
      have new, unread mail in the selected BRIGHT color. Areas which have
      new mail have the HIGHEST message different than the LAST READ.


The information screen looks like this:

/-AREA INFORMATION------------------------------------------------------------\
|#     Name                Description                   Low  High    LR  Msgs|
|0     NETMAIL             Network mail area              16  1477  1471   190|
|2     COMPLAIN            Complaint Department            1  1458  1458    17|
|4     DB_ALPHA            D'Bridge ALPHA conference     279  1479  1479   268|
|6     FTSC                Technical standards committee   1   295   261   295|
|7     NETDEV              Network developer's conferenc   1   107   107    95|
|10    SYSOP18             Region 18 Sysop conference      1   479   479   402|
|11    ZMODEM              ZMODEM conference               1    29    29    29|
|12    ECHOECHO            ECHOmail working group          1     3     3     3|
|19    SYSOP135            NET 135 Sysop conference        1   178   175    15|
|21    DBRIDGE             D'Bridge ECHO                   4  1332  1332   125|
|22    QUICKBBS            QuickBBS ECHO                 130  1450  1450   199|
|24    TBBS                TBBS ECHO                     621  1182  1080   102|
|9999  BADECHO             Bad ECHOmail area               1     1     1     1|
|                                                                             |
|                                                                             |
|                                                                             |
\-----------------------------------------------------------------------------/

      UTILITIES: FORWARD MESSAGE

      The FORWARD MESSAGE option allows you to re-route or send a copy of the
      current message to another system. You simply enter the TO, ADDRESS and
      specify the priority and whether to keep a the original copy of the
      message.

      UTILITIES: COPY/MOVE MESSAGE

      The COPY and MOVE MESSAGE commands can only be used when you have
      specified alternate message areas. It will copy or move the current
      message from one area to another.

      UTILITIES: PRINT MESSAGE

      Assuming you have a printer connected to your "PRN" port, DBEDIT will
      print the current message.


      UTILITIES: WRITE MSG TO FILE

      The WRITE MSG TO FILE option allows you to export a message to a
      standard text file. This might be used to transfer data from D'Bridge
      to a word processor or spreadsheet.

      UTILITIES: NEW USERNAME

      If you have defined more than one USER NAME in the SETUP EDITOR PARAM-
      ETERS menu, you can select from any of these to be the current user.
      This is the same screen you receive when you first start the editor
      with more than one user defined.

      UTILITIES: ALIAS ADDRESSES

      For systems who have defined multiple ALIAS ADDRESSES on the BASIC
      CONFIGURATION menu, this function allows you to enter messages
      addressed from one of your aliases.

      SEARCH: HEADERS or TEXT

      The SEARCH HEADERS or TEXT options allow you to search through your
      messages for specific keywords. Simply enter the word to search for
      and D'Bridge will find and highlight all occurrences.

      QUIT: EXIT

      Terminates DBEDIT and returns to D'Bridge.

      QUIT: DROP/PUSH TO DOS

      PUSH TO DOS allows you to enter DOS commands and run other programs
      while DBEDIT is still in memory. Type "EXIT" to return to DBEDIT.


<a name="6.00"/><h2><a href="#toc">6.00  UNDERSTANDING THE QUEUE</a></h2>

Everything D'Bridge does is based on the entries in the outbound queue
window. Once you understand what the "queue" is and how it is organized,
you will have a good overview of the program's structure.

The "QUEUE"

The outbound queue is a database containing entries for each of the
systems that currently have "outbound" mail. When D'Bridge first starts,
the outbound queue is created by scanning the NETmail area (either in
Fido or QuickBBS format), then scanning the disk-based queue for polls,
file-requests, etc. This database is then sorted by address and finally
displayed in the bottom-left window.

The queue can best be understood by disabling the SCHEDULE window so
the entire QUEUE window will be displayed. (Press ALT-S to toggle the
schedule window on and off).

/-QUEUE----------------------------------------------------------------------\
| Destination    Try/Con/Bad/Online   Priorities/Pkt types  Status           |
|*110/68.1        0   0   0  00:00     C N            X M   Hold/Unlisted    |
| 105/3           0   0   0  00:00         H          X     Hold             |
| 108/0           0   0   0  00:00       N        F     M   Decision at 17:00|
| 135/3          30   0   0  00:00     C              X     Try limit        |
| 135/142         1   1   0  00:32                          Sent successfully|
| 143/18          1   0   0  00:00         H          X     Hold             |
| 167/999         0   0   0  00:00     C                M   Hold/Unlisted    |
| 2:243/40        0   0   0  00:00         H          X     Hold             |
|*8:77/7          0   0   0  00:00       N      T       M   Hold/Unlisted    |
\----------------------------------------------------------------------------/

      To understand the queue, you simply need to have a good understanding of
      the individual fields:

      DESTINATION

      The destination is simply the Fidonet or FAX address of the system to
      contact. The destination is not always the "ultimate" destination due
      to possible routing, but is the system to be called.


      TRY

      The try field simply shows how many times D'Bridge has tried to call
      the destination system during the current event. If there is a plus
      sign ( + ) behind the number, it has been manually reset this event
      by the operator.

      CON

      This field shows the number of actual connections (carrier detects)
      made as the result of outbound calls to the specified system.
      Inbound connections do not count in the CON field. Again, if
      there is a plus sign ( + ) after the number, it has been manually
      reset this event.

      BAD

      This field shows the number of failures encountered during outbound
      sessions this event. In general, a failure means it was a wasted
      phone call for one reason or another (generally, the reason or error
      is listed in the log file). Again, the plus sign after the number is
      an indication that it has been manually reset (using the ALT-V com-
      mand).

      ONLINE

      The online field keeps track of total connect time as a summation of
      all outbound connects. This field is not reset until the end of the
      current event.

      PRIORITIES

      The priorities field shows which priorities of mail are contained
      within the queue entry. This field may contain any or all of the
      following:

                       I   Immediate      (Highest priority mail)
                       C   Crash          (High priority mail)
                       N   Normal         (Normal, budget priority mail)
                       H   Hold           (Mail held for pickup)


      PACKET TYPES

      The packet type field contains what types of mail packets are contained
      within the queue entry. The field may contain any or all of the follow-
      ing:

                       R   Outbound AREAFIX request  (ALT-R)
                       T   Transmit file(s)          (ALT-T)
                       F   File-request(s)           (ALT-F)
                       P   Poll                      (ALT-P)
                       X   XMAIL                     (Editor/BBS/ECHOmail)
                       M   NETmail                   (Editor/BBS)

      STATUS

      The STATUS field is most-likely the most important one to understand.
      If you are having trouble understanding why a mail packet is not being
      sent, the STATUS indication should be able to tell you exactly what is
      wrong. Please read and understand what the following status indications
      mean:

         Hold

         The mail can't be sent because "HOLD" is the only priority specified
         for the mail. (You told it to do this when you entered a message or
         set-up an ECHOmail area).

         Hold/Unlisted

         This indication means it is impossible to call this system
         because it is either not in your nodelist or it is listed as
         "unpublished". The destination system must call in for its mail
         or you need to get a nodelist containing its phone number.

         Max cost hold

         The cost of the message you want to send (as indicated in the editor)
         exceeds the maximum allowed during the current event.

         Temporary hold

         This means the operator has used the VIEW/MODIFY QUEUE mode to
         set the entry's status to "hold". To send the message, select
         ALT-V again and specify "SEND".


         Forced hold

         This means the operator has specified a forced priority of hold
         at some time in the past. This may be changed by using the ALT-V
         command to remove the "forced" status.

         Priority hold

         This means the given mail event does not allow the specified
         priority of mail to be transmitted. (This is related to the
         PRIORITIES field in the advanced routing of the schedule).

         Not a CM system

         In this event, you have specified that only those systems with a "CM"
         (continuous mail) flag may be called. (Again, this is a function of
         the advanced routing screen of the scheduler).

         CM not allowed

         In this event you have told D'Bridge not to call any "CM" systems.

         Decision at 17:00

         This means that because of the cost-control data, no outbound call
         may be placed to this address until at least 17:00. At 17:00, a
         decision will be made as to whether it may be called or not. This is
         the mechanism which allows D'Bridge to call-out only at the most
         economical times for normal priority mail. If you want the mail to
         be sent now, you should use a higher priority or change the cost-
         control data in the ACCOUNTING/TRANSLATION screen.

         Try limit

         This means D'Bridge has exceeded the maximum number of times
         allowed to try calling the remote system. Typically, you are not
         charged for non-connects, but you might want a limit on how many
         tries (gotta give up sometime... ).

         Session limit

         You have reached the maximum number of sessions allowed within the
         given event. In the case of long-distance systems, this has most-
         likely saved you a wasted phone call, making too many ECHOmail calls
         in the same event...


         Failure limit

         This means you have reached the maximum failures (bad sessions)
         allowed for the event. Maybe something is wrong with the remote
         system?

         Picked up

         This means all mail has been successfully picked up by the remote
         system. This saves D'Bridge the trouble and expense of making the
         call itself.

         Sent successfully

         This means you called the other system, sent the mail and all went
         well. All mail is confirmed as delivered to the "destination" sys-
         tem; remember that routed mail is now in the hands of another
         operator and is not 100% guaranteed to arrive.

         ----------

         The dashes (-----) mean that the packet is ready to be sent, now.


<a name="6.01"/><h2><a href="#toc">6.01  CREATING A PRIVATE NODELIST</a></h2>

Without a nodelist, D'Bridge can not make outbound EMAIL calls. Your
nodelist tells D'Bridge which systems it can communicate with and contains
information such as name, phone number and baud rate. Nodelists are text
files that can be created by any standard text editor. It lists ZONES,
NETS and NODES, one per line, using the "St. Louis format", the same style
used by Fidonet, Alternet and many other public EMAIL networks. You may
specify any number of St. Louis or private nodelists in D'Bridge.
Here's a sample NODELIST for a bogus private network:

   ,HOST,1720,Main_System,Cincinnati_OH,Rancy_Neagan,1-513-777-0007,9600,CM
    ,1,New_York_Office,Bronx_NY,Quan_Dale,1-202-555-9343,2400,CM
    ,4,Western_Division,Los_Angeles,Clinn_Billton,1-714-555-5286,2400,CM
    ,6,XYZ_Canada,Quebec,Lawrence_DeLaMouche,1-418-555-2811,2400,CM
    ,15,European_Office,The_Hague_NL,Luud_Rubbers,31-70-452121,9600,CM
    ,20,Moscow_Bureau,Moscow_USSR,Joris_Beltsin,!Unlisted,2400,CM

This example defined a HOST system and 5 nodes in NET 1720. Unless
a ZONE directive is specified, NET 1720 will be in whatever zone you
are in. Notice the format of the text file; no spaces are allowed.
All underscore characters "_" will be translated to spaces when the
information is displayed. Each field is separated by commas. The
following format is used for the "St. Louis format" nodelist:

      KEYWORD,NUMBER,NAME,CITY,OPERATOR,PHONE,BAUD,FLAGS

      KEYWORD     The KEYWORD directive may be blank or contain any of the
                  following values:

                    ZONE    The ZONE keyword marks the start of a new ZONE
                            and NET (both with the same number).  It also
                            defines the NODE that is the ZONE coordinator.

                    POINT   Specifies that this entry is a POINT of the
                            previously specified NODE.

                    HOST    The HOST keyword defines the start of a new NET
                            number and defines its HOST (a HOST has a NODE
                            number of zero).


                    REGION  The REGION keyword is identical to HOST with the
                            exception that no mail will be automatically
                            routed through the "HOST" node. This is mainly
                            used when the NET covers more than one geographic
                            area.

                    HUB     The HUB keyword defines the start of a routing
                            group. A HUB acts as the HOST to receive in-
                            coming mail for all nodes listed after it.

                    PVT     Defines that the listed node is private and does
                            not have a listed phone number. If a system's
                            phone number is not listed, this keyword MUST
                            be used.

                    DOWN    Defines that the listed node is down and should
                            not be added to the database.

      NUMBER      This specifies the NODE number of the listed node UNLESS
                  the KEYWORD is ZONE, HOST or REGION; in these cases, the
                  NUMBER defines the ZONE and/or NET, depending.

      NAME        Defines the name of the system. D'Bridge truncates NAMES
                  to 25 characters. Underscores "_" will be translated to
                  spaces for display.

      CITY        Specifies the city where the system is located. Again,
                  underscores "_" translate to spaces.

      OPERATOR    Defines the name of the primary system operator. Under-
                  scores "_" translate to spaces.

      PHONE       List the ENTIRE phone number including the COUNTRY CODE,
                  AREA CODE and PHONE NUMBER separated with dashes. "-"
                  For example: 1-305-232-9365 or 38-52-592831

      BAUD        Specify the MAXIMUM BAUD RATE for the system. May be
                  either 300, 1200, 2400, 4800, 9600 or 19200.

      FLAGS       A free-form field that may contain additional information
                  about the system. Include the characters "CM" if you wish
                  to designate a system as CONTINUOUS MAIL (24-hours)


<a name="6.02"/><h2><a href="#toc">6.02  DUTIES OF A NETWORK ADMINISTRATOR</a></h2>

Every network must have an "administrator" or anarchy would certainly
prevail!  This chapter briefly outlines which duties the administrator
of any private network should perform. Remember, these are just guidelines.

      1) The NETWORK ADMINISTRATOR is generally responsible for daily
         operation of the network. This means any problems are reported
         directly to the administrator. Obviously, a very large network
         would sub-divide the support into several regional administrators
         who would try to field all problems if they could.

      2) The NETWORK ADMINISTRATOR is responsible for the maintenance of the
         nodelist. Any systems added, changed or deleted must have these
         changes reflected in the nodelist and the new nodelist updates
         must be sent to all systems in the network.

      3) The general structure and routing used in the network must be either
         designed or approved by the NETWORK ADMINISTRATOR. He must be kept
         informed of all aspects of the network so that he can "keep a handle
         on it..."

      4) The NETWORK ADMINISTRATOR will assign NET and NODE numbers unless
         that responsibility is divided into different regions and handled
         by the regional administrators.


<a name="7.00"/><h2><a href="#toc">7.00  DBUTIL / UTILITY PROGRAM</a></h2>

D'Bridge comes with a utility program called DBUTIL; it allows you to
automate routine file-transfers and maintenance. DBUTIL is located in
your D'Bridge directory. When DBUTIL is ran all by itself, you will
have an interactive "menu system" which you can use to help you maintain
your areas. If you wish to run DBUTIL from lets say, a DOS event or
batch file, typing DBUTIL /? from the DOS prompt will display a list of
frequently used commands for automated "runs".

Whenever DBUTIL is used to do something, it creates and maintains a log
file for your inspection, called DBUTIL.LOG. This is a text file that can
be viewed by any DOS editor. This log file should be inspected every so
often if you use DBUTIL for nightly maintainence or weekly duties. If you
suspect any problems, you may share your log file with technical support.
Logging can be disabled by creating a dummy text file called DBUTIL.NLG. If
DBUTIL detects this file, it will not generate a log.

      SEND

      The DBUTIL SEND command adds TRANSMIT-FILE entries to the disk-based
      queue. Files will be sent directly to the destination system with no
      routing. The syntax for the SEND command is:

      C:\DB> DBUTIL [priority] SEND &lt;Address> &lt;file> ... &lt;file>

      ie.

      C:\DB> DBUTIL CRASH SEND 18/68.5 HOMEWORK.TXT
      C:\DB> DBUTIL HOLD SEND 18/20 DB-140*.ZIP DBNET.Z56

      REQUEST

      The DBUTIL REQUEST command adds FILE-REQUEST entries to the disk-based
      queue. The file-request will be sent immediately or during the next
      applicable mail event, depending on the priority you specify. Following
      is the syntax for REQUEST:

      C:\DB> DBUTIL [priority] REQUEST &lt;Address> &lt;file> ... &lt;file>

      ie.

      C:\DB> DBUTIL CRASH REQUEST 2:280/280 FILES ABOUT
      C:\DB> DBUTIL REQUEST 135/14 GOODGAME.ZIP MONOPOLY.ZIP

      POLL

      The DBUTIL POLL commands adds a POLL entry to the disk-based queue.
      Depending on the priority, the system will be called either immediately
      or during the next applicable mail event. When you POLL a system,
      D'Bridge will call to see if you have any mail waiting. The syntax for
      POLL is:

      C:\DB> DBUTIL [priority] POLL &lt;Address>

      ie.

      C:\DB> DBUTIL IMMEDIATE POLL 1:105/3

      PURGE

      The DBUTIL PURGE command will purge the specified message areas or all
      of them if you don't list any AREA NAMES. The purge will scan each
      message area and purge (and archive) the messages based on the criteria
      specified in the LOCAL/ECHOMAIL AREAS screen; see SECTION 3.2 for more
      information. The syntax for the PURGE command is:

      C:\DB> DBUTIL PURGE [areaname] [areaname] ... [areaname]

      ie.

      C:\DB> DBUTIL PURGE
      Purges all of the Echomail areas.

      C:\DB> DBUTIL PURGE POLITICS SCIENCE ART
      Purges only the POLITICS, SCIENCE and ART areas.

      You may also specify NETMAIL to purge/archive the messages in
      your NETmail area. If you specified purging criteria in the PACKET/
      MAIL CONTROL screen for Netmail, it will be applied as well.

      Note that if a message area DOES NOT have any purging criteria, it
      will NOT be purged.

      SORT AREAS

      If you wish to reorganize the areas in your LOCAL/ECHOMAIL AREAS screen,
      you may use the SORT AREAS command. This will sort and renumber your
      areas by SORT GROUP and TAG. Before using this command, make sure you
      specify SORT GROUPS for all the areas and group them together in a
      logical manner. The syntax is:

      C:\DB> DBUTIL SORT AREAS

      Be warned that if you have a large number of Echomail areas, it may
      take anywhere from a few seconds to several minutes, depending on
      the speed of your computer.

      AUTOASSIGN
            
      The AUTOASSIGN keyword, will automatically change/update your
      Echomail database whenever a new area is added by D'Bridge that
      has an uplink address (the A- parameter), or that has a matching
      area name (the T- paramter). Multiple entries are okay, seperated
      by commas. The following options are available:

      AUTOASSIGN [option] [value] A-[matching address] OR T-[matching area]

      Options:

             ALERTFLAG [value] - The "Alert" status flag. 0-9, A-Z.
           GROUPACCESS [value] - The group access character. 0-9, A-Z
             GROUPSORT [value] - The group sort character, usually 0-9.
         GROUPSECURITY [value] - The security level. 0 to 5000.
                 PURGE [value] - Purge except OR purge after days. If you
                                 are purging in days, specify a negative
                                 value, ie. 7 days should be "-7"
              PRESERVE [value] - Messages to preserve.

      ie:

      C:\DB> DBUTIL AUTOASSIGN ALERTFLAG A A-1:229/2000
      Assigns alert-flag "A" to new areas from my 1:229/2000 uplink.

      C:\DB> DBUTIL AUTOASSIGN GROUPACCESS B A-2:2/0,2:282/153,4:500/13
      Assigns group access "B" from the specified addresses.

      C:\DB> DBUTIL AUTOASSIGN PURGE -14 T-ALT.*,REC.*
      New areas from the "ALT" and "REC" Usenet groups will be purged
      after 14 days.

      C:\DB> DBUTIL AUTOASSIGN GROUPACCESS A-1:229/2000
      C:\DB> DBUTIL AUTOASSIGN GROUPSECURITY 5000 A-1:229/2000
      C:\DB> DBUTIL AUTOASSIGN PRESERVE 200 A-1:229/2000
      Assigns group A, security level 5000 and a preserve of 200 messages
      to everything auto-added from my 1:229/2000 uplink.

      CHANGE
      
      The CHANGE command tells DBUTIL to make mass-changes to your
      Echomail setup, based on the option you select:

      CHANGE [option] [newvalue]

      Options:

            ALERTFLAG [value] - The "Alert" status flag. 0-9, A-Z.
          GROUPACCESS [value] - The group access character. 0-9, A-Z.
            GROUPSORT [value] - The group sort character, usually 0-9.
        GROUPSECURITY [value] - The security level. 0 to 5000.
                PURGE [value] - Purge except OR purge after days. If you
                                are purging in days, specify a negative
                                value, ie. 7 days should be "-7"
             PRESERVE [value] - Messages to preserve.
                  AKA [value] - Network address.
                    WEB [Y/N] - Web-enabled, yes or not.

      Examples:

      C:\DB> DBUTIL CHANGE ALERTFLAG A ALERTFLAG B
      Changes all areas with alert flag "A" to alert flag "B"

      C:\DB> DBUTIL CHANGE GROUPACCESS A GROUPACCESS Z
      Changes all areas in group "A" to group "Z"

      C:\DB> DBUTIL CHANGE PURGE -14 PRESERVE 50
      Changes all areas with a 14 day purge value to also have a preserve
      value of 50.

      DELETE

      Deletes areas from your Echomail database based on your criteria. Use
      with caution. If you make a mistake, use the UNDELETE command
      mentioned later.

      DELETE [option]

      Options:

             ALERTFLAG [value] - The "Alert" status flag. 0-9, A-Z.
           GROUPACCESS [value] - The group access character. 0-9, A-Z.
             GROUPSORT [value] - The group sort character, usually 0-9.
         GROUPSECURITY [value] - The security level. 0 to 5000.
                 PURGE [value] - Purge except OR purge after days. If you
                                 are purging in days, specify a negative
                                 value, ie. 7 days should be "-7"
              PRESERVE [value] - Messages to preserve.
                   AKA [value] - Network address.
                     WEB [Y/N] - Web-enabled, yes or not.

      Examples:

      C:\DB> DELETE ALERTFLAG A
      Deletes all Echomail areas that have alert flag "A"

      C:\DB> DELETE GROUPSECURITY 5000
      Deletes all Echomail areas that have a group security of 5000.

      DESCFILE

      The DESCFILE command tells DBUTIL to change all the descriptions of
      the Echomail database to match those found in a text file. The text
      file should be in ".NA" format, meaning the area tag, at least one
      space, and then the description.

      ie.

      C:\DB> DBUTIL DESCFILE C:\DBRIDGE\FIDONET.NA

      DELETEDOS

      If the DELETEDOS command is executed, then whenever
      a DBUTIL PURGE is ran and DBUTIL encounteres a "deleted" area (usually
      from deleting it in the ECHOMAIL AREA EDITOR), if the area is
      a Fido *.MSG area, the directory is also deleted. So if you
      deleted FN_SYSOP, and DBUTIL PURGE is ran again, whatever you
      specified as your FN_SYSOP message directory will be erased. Note
      that if you plan to use the UNDELETE feature mentioned below, you
      should not use the DELETEDOS command.

      Note that due to an inherant design flaw in the ECHOMAIL AREA EDITOR,
      you should NOT delete the very last area from the database. If the
      last area must be deleted, you should first create a "dummy" area
      after that record so the first one can be deleted properly.

      DBUTIL DELETEDOS should only be used if you want to run a
      "system-wide" cleanup of your message directories. It should NOT be
      ran as part of any regular maintainence.

      ie.

      C:\DB> DBUTIL DELETEDOS

      MOVE

      MOVE will take any address you specify, and "move" it to a directory
      of your choice. It replaces Khile Klock's entire DBQ2FTP utility,
      and requires no external configuration at all. MOVE should obviously
      be used after any queue-manipulating commands such as POLL
      and SEND. It also works on point systems, something DBQ2FTP wasn't
      able to do properly.

      In your QUEUE directory, you will find a subdirectory called AFIXCTRL.
      This directory is used by D'Bridge to control the Areafix subsystem,
      but it also serves as a control directory for moved mail. FTSC
      requires that archived mail contain the current day-of-the-week
      in the extension of the filename. DBUTIL stores such information
      in the AFIXCTRL directory and uses this to compute the filenames in
      the format that FTSC calls for. The contents of this directory should
      not be deleted or modified in any way - DBUTIL looks after all of
      those files by itself automatically.

      DBUTIL MOVE also properly handles any NETmail queue entries and
      converts them to PKT files, including XMA-marked messages. Note
      that DBUTIL is not actually reading any messages, its just converting
      the queue files to something a little more useful for 3rd-party stuff.
      The MOVE command also properly moves file-attaches and honours any
      TRUNCATE or KILLSENT priorities on the corrosponding NETmail message.

      Note that MOVE is not present in the "interface" portion of DBUTIL.
      It is strictly a "command-line" function only.

      MOVE [address] [directory]

      ie.

      C:\DB> DBUTIL MOVE 1:229/426.1 F:\LAN\SOMEONE
      C:\DB> DBUTIL MOVE 1:229/2000 C:\IREX\ROBERT
      C:\DB> DBUTIL MOVE 2:2/0 C:\IREX\WARD

      UNDELETE

      If UNDELETE is ran, any previous DELETE operations will
      be "rolled back". Any deleted records in your Echomail database
      will be restored... provided you didn't do a SORT AREAS first!

      ie.

      C:\DB> DBUTIL UNDELETE


<a name="7.01"/><h2><a href="#toc">7.01  MESSAGE STORAGE</a></h2>

D'Bridge currently supports several methods for storing EMAIL messages on
disk. These particular methods were chosen for compatibility with some of
the most popular bulletin board systems, and to allow greater flexibility
when working with 3rd-party utility programs to manipulate messages.

      FIDO         Using the FIDO storage method, each message is stored in
                   a separate ".MSG" file in a certain directory. Each fido-
                   style local or ECHOmail area will have a unique sub-
                   directory. This method is compatible with Fido and Opus,
                   as well as many message handling utilities. FIDO storage
                   usually takes the most disk space and is the slowest
                   method available.

      QuickBBS     The QUICKBBS storage method stores all messages in five
                   data files: MSGHDR.BBS, MSGTXT.BBS, MSGIDX.BBS, MSGTOIDX.BBS
                   and MSGINFO.BBS, all stored in the specified QuickBBS
                   directory. Using this method, up to 200 message areas may be
                   defined. This method is fast and doesn't use too much disk
                   space; it is provided for compatibility with the QuickBBS
                   bulletin board system.


<a name="7.02"/><h2><a href="#toc">7.02  USING THE SCRIPTING LANGUAGE</a></h2>

D'Bridge includes a powerful scripting language allowing it to use
alternate carriers such as packet-switched networks rather than normal
telephone connections. This can be used with any carrier such as Tele-
net's PC-Pursuit or your private Satellite uplink service. Any data
carrier capable of 8-bit, no parity, full duplex communication may be
used with D'Bridge. The reason for using an alternate carrier is usu-
ally to save money on your phone bill.

The scripting language connects two D'Bridge systems through any form
of data link that is compatible. In the U.S.A., the most common example
for using scripts is PC-Pursuit, so I'll use that as an example. Script
files are text-files created by any standard text editor and contain
keywords telling D'Bridge exactly what to do. It is important to have
a good understanding of the carrier you intend to use before designing
your script file; this is necessary for a good understanding of all the
terms used here - it's not that simple.

To use a script file, you will need to have a PHONE NUMBER TRANSLATION
or OVERRIDE for each area code or system you intend to use. With PC-
Pursuit, this currently requires 40 translation strings, one for each
city served. I intend to use an indexed database in a future release
to eliminate this necessity, but that's later. For now, use a trans-
lation in the following format:

cc-aaa- "script.fil"xxxxx-

Where "cc" is the COUNTRY CODE, "aaa" is the AREA CODE, and "xxxxx" is
the translated AREA CODE (or in the case of PC-Pursuit, the city des-
ignator). As an example, use the following PHONE NUMBER TRANSLATION to
reach the Miami, Florida area:

1-305- "PCP.SCR"FLMIA-

This will translate ALL 305 area codes to use the script file. Needless
to say, not all of area code 305 is PC-Pursuitable, so if you need to
contact other cities in our area code, you will need to specify previous
translation or override strings (the upcoming index file will eliminate
the need for these translations altogether).

Assuming you now have 305 translated to use the PCP.SCR script file,
you now must create this file and put it in your defined SCRIPT PATH
(SCRIPT PATH is defined on the DIRECTORY PATHS setup screen).  With
D'Bridge, it is possible to use one script file for ALL the "pursuitable"
cities, though you will need one for each baud rate desired. Following
is a detailed description of the scripting language keywords and their
meaning (see the next chapter for a specific example and explanation
using PC-Pursuit):


      Syntax: ABORT &lt;start_time> &lt;end_time>

      Example: ABORT 6:00 18:00

      The ABORT keyword causes the script to abort immediately if the time is
      between the &lt;start_time> and &lt;end_time> specified. This is handy for
      making sure no script calls are made outside predefined hours.

      Syntax: AREACODE

      The AREACODE keyword causes D'Bridge to transmit the AREA CODE field of
      the phone number. This is separated from the PHONE NUMBER by a dash "-"
      and is sent with no carriage return or other characters. For PC-Pursuit,
      this is usually substituted with the city code (such as FLMIA).

      Syntax: BAUD &lt;baud_rate>

      Example: BAUD 1200

      The BAUD keyword changes the current baud rate to the specified value.
      By default, it will be the baud rate of the destination system.

      Syntax: CARRIER

      When the CARRIER keyword is encountered, the script file is aborted
      unless a carrier is detected at this point. This is handy for ensuring
      you have a carrier when you think you should.

      Syntax: COMM &lt;config_characters>

      Example: COMM 7E1

      The COMM keyword configures the communication port for the setting
      specified. In this example, it is set for 7 data bits, even parity
      and 1 stop bit. The following &lt;config_characters> are supported:

          1 - 1 stop bit       N - No parity
          2 - 2 stop bits      E - Even parity
          7 - 7 data bits      O - Odd parity
          8 - 8 data bits


      Syntax: CONNECT

      The CONNECT keyword sets the CONNECT count for the given packet is
      increased by one. This is used in conjunction with the maximum
      connects limit defined for the current mail event.

      Syntax: DIAL &lt;phone_number>

      Example: DIAL 555-2939

      The DIAL keyword causes D'Bridge to dial the &lt;phone_number> specified
      and wait for a CONNECT, BUSY or NO CARRIER field just like when dialing
      normally. If a non-connect message is received, the script is aborted.

      Syntax: DIRECT &lt;start_time> &lt;end_time>

      Example: DIRECT 6:00 18:00

      The DIRECT keyword will cause D'Bridge to abort the script file and dial
      direct (using your phone company) between the times specified. This is
      useful for switching between script and telephone company use depending
      on the time of day.

      Syntax: DOS &lt;DOS_command>

      Example: DOS ibm_uucp 2400

      The DOS keyword is seldom used, but it enables you to execute any DOS
      command from within a script file. In this example, the program
      "IBM_UUCP" is executed with a parameter of 2400.

      Syntax: GOTO &lt;label>

      Example: GOTO LOOP-1

      The GOTO keyword transfers control to another point within the script
      file. The &lt;label> must exist and start with a colon ":" just like in
      DOS batch files. Caution should be used in not creating "endless
      loops" without a TIMER statement preceding them.


      Syntax: IF &lt;pattern_number> &lt;label>

      Example: IF 2 GOTO SUCCESS

      The IF keyword transfers control to another point in the script file
      if a previously defined pattern has been detected. This is used in
      conjunction with the PATTERN keyword and uses the same label structure
      as the GOTO keyword. It is also possible for IF to cause "endless loops"
      if your script is not designed correctly, so use of the TIMER keyword
      is highly desirable.

      Syntax: INIT

      The INIT keyword causes D'Bridge to send it's standard initialization
      string to the modem. This is normally done at the beginning of every
      script, but may not be necessary.

      Syntax: PATTERN &lt;pattern_number> &lt;string>

      Example: PATTERN 0 BUSY

      The PATTERN keyword defines a pattern to look for from the remote system
      or modem. It is used in conjunction with the WAIT and IF keywords to
      act based on the response received. The &lt;pattern_number> must be from
      0 to 9 and the &lt;string> may be up to 20 characters. If "PATTERN 0" is
      specified with no characters after it, pattern 0 is disabled.

      Syntax: PHONE

      The PHONE keyword causes D'Bridge to transmit the PHONE NUMBER field.
      This is sent with no additional characters such as carriage return, so
      if you want to send one, use the XMIT keyword after the PHONE keyword.

      Syntax: SESSION

      The SESSION keyword is used to begin the mail session. When it is
      encountered, the script file terminates and D'Bridge starts trying
      to sync with the destination system. If there is no carrier detected
      at this point, the session will be aborted. Make sure this is only
      used once a "CONNECT" signal is received from the remote modem.


      Syntax: TIMER &lt;seconds>

      Example: TIMER 300

      The TIMER keyword sets an overriding timeout on the execution of the
      script file. This is especially handy when you have created "endless
      loops" for re-dialing within your script file. If no TIMER  value is
      specified, D'Bridge will keep dialing "forever" until it gets through.
      Every time the TIMER keyword is encountered, the timer is cleared. For
      this reason, care should be taken to ensure it is not within an "end-
      less loop".

      Syntax: WAIT &lt;seconds>

      Example: WAIT 20

      The WAIT keyword causes the script to wait for the specified number of
      seconds for one of the patterns (previously defined) to be received.
      If none of the patterns are received within &lt;seconds> seconds, the
      script is aborted. The PATTERN keyword defines the pattern(s) to wait
      for.

      Syntax: XMIT &lt;string>

      Example: XMIT HELLO|~~~52937,334|

      The XMIT keyword causes D'Bridge to transmit characters to the remote
      system (or your modem if not currently connected to anything). This
      command is executed literally and there must be only one space between
      XMIT and &lt;string> or the spaces will also be sent. There are two
      special characters used in the XMIT keyword:

          "|" causes a carriage return (CR) to be sent
          "~" causes a one-second delay in execution

The script file is executed much like a program, sequentially. The
only exception is when control is transferred to another part by using
an IF or GOTO keyword. Any errors in the script file will only be
found when the keyword is executed. Use the script debugging windows
while testing scripts; these will display the communications plus what
keywords are being executed. Activate these windows by answering YES
to the DIAGNOSTICS? question on the BASIC CONFIGURATION screen.


<a name="7.03"/><h2><a href="#toc">7.03  EXAMPLE SCRIPT FILE</a></h2>

The following example script file is the one Tony Wagner wrote for use
with the PC-Pursuit service. It is currently used by a fair number of
people with success. You will need to customize it somewhat to work in
your city and use your own password.

                             INIT
                             TIMER 600
                             BAUD 2400
                             DIAL XXX-XXXX
                             XMIT @~D~|~D1|
                             :RETRY
                             PATTERN 0 @
                             WAIT 30
                             XMIT C D/
                             AREACODE
                             XMIT /24,YOUR ID#|
                             XMIT PASSWORD|
                             PATTERN 0 CONNECT
                             PATTERN 1 ONLINE
                             PATTERN 2 BUSY
                             PATTERN 3 RE-ENTER
                             PATTERN 4 MANUAL
                             PATTERN 5 NOT
                             WAIT 30
                             IF 2 RETRY
                             IF 3 RETRY
                             IF 5 RETRY
                             TIMER 600
                             XMIT ~|~@~|
                             XMIT ~SET 1:0,7:0|
                             XMIT CONT|
                             XMIT |~I~|~ATZ|
                             :CITY_CONNECT
                             XMIT ~ATDT
                             PHONE
                             XMIT |
                             WAIT 45
                             IF 2 CITY_CONNECT
                             IF 4 CITY_CONNECT
                             SESSION

The above script is a rapid-dial script that tries for a maximum of
five minutes to connect with the desired city. Once in the city, it
then re-dials the destination system for a maximum of five minutes.


<a name="8.00"/><h2><a href="#toc">8.00  BBS SYSTEMS</a></h2>

D'Bridge is designed to act as a FRONT-END for "online" programs such as
BBS (bulletin board systems) and database systems. D'Bridge will answer
the phone and determine whether an incoming call is EMAIL or HUMAN. If it
is an EMAIL call, D'Bridge automatically receives the mail and/or files and
returns to the idle state. If a HUMAN call is detected, control may be
transferred to another program such as a bulletin board system. It will
take about 10 seconds for D'Bridge to decide whether a caller is HUMAN;
this time-period can be increased if desired. If the caller presses the ESC
key twice, D'Bridge will assume the call is HUMAN and transfer control to
the BBS immediately.

Every BBS software package is configured slightly differently, therefore
D'Bridge needs to be flexible in the way it transfers control while the
caller remains online. There are three basic ways of invoking your BBS
program:

    PUSH    Using the PUSH method, you simply specify a series of DOS
            commands to be executed. You may even invoke a batch file
            in this method. Only the memory D'Bridge is not using will
            be available for the BBS. The PUSH method is designated by
            simply typing the commands in the DOS BBS COMMANDS window.

            ie. CD \OPUS
                 OPUS OPUS -B*B -T*T

    DROP    The DROP method is similar to the PUSH method, except that
            all available memory (except 15K) is freed, leaving almost
            all system memory free for the BBS to use. This is handy
            if you have a large D'Bridge configuration or your BBS has
            a lot of "door" programs that it spawns. The DROP method is
            designated by typing a plus sign "+" in front of the commands
            in the DOS BBS COMMANDS window.

            ie. CD \OPUS
                 +OPUS OPUS -B*B -T*T

    EXIT    With the EXIT method, D'Bridge completely terminates, exiting
            with an errorlevel designating the baud rate. If you use this
            method, you must be running the mailer from a batch file set
            up to trap the various errorlevels. To configure the EXIT
            method, specify *X on a line by itself in your DOS BBS COMMANDS
            window.


            ie. *X

            An example of a simple batch file that would work with the
            EXIT method demonstrates the setup for a 2400 baud modem.
            Note that the errorlevel returned by D'Bridge is equal to
            the BAUD RATE / 100.

            :TOP

            DB

            IF ERRORLEVEL 24 GOTO 2400BAUD
            IF ERRORLEVEL 12 GOTO 1200BAUD
            IF ERRORLEVEL 3 GOTO 300BAUD

            GOTO END

            :2400BAUD

            CD\OPUS
            OPUS OPUS -B2400
            GOTO TOP

            :1200BAUD

            CD\OPUS
            OPUS OPUS -B1200
            GOTO TOP

            :300BAUD

            CD\OPUS
            OPUS OPUS -B300
            GOTO TOP

            If you are not familiar with batch files and you must use
            them, see the IBM DOS manual.

Every time a BBS call is detected, control is transferred to your BBS
software by executing the commands located in the DOS BBS COMMANDS
window. You may specify any number of DOS commands in this window to
be executed in sequence.


Each line must contain a valid DOS command, or a D'Bridge "directive".
If an entry begins with a plus sign (+) the command will be executed
using the DROP method rather than the PUSH method. If you use DROP,
D'Bridge will be entirely swapped out of memory (except 15K) allowing
the called program almost all the free memory in the environment. This
is nice for running BBS programs that have "door" utilities. The DROP
method takes longer to execute than the PUSH method. D'Bridge memory
is swapped to either EMS or DISK.

Following is an example of how I run the QuickBBS bulletin board:

                 CD \QUICKBBS
                 +QUICKBBS -b*b -t*t -e0

Any entries with an asterisk "*" will be treated as D'Bridge directives
or substitutions. When the above DOS BBS COMMANDS are executed, the
following is an example of the actual DOS commands issued:

                 CD \QUICKBBS
                 QUICKBBS -b2400 -t126 -e0

Following is a description of the D'Bridge directives available:

    *B       Substituted with the actual BAUD RATE of the connection.

    *C       Substituted with the actual connect string returned from
             the modem. This may be translated to any string you wish
             by using the "CONNECT" COMMANDS field of the COMMUNICATION/
             MODEM SETUP screen.

    *H       If specified, leaves the FOSSIL "HOT" or initialized.

    *P       Returns the COMM PORT D'Bridge is currently using. This
             may be from 1 to 7.

    *R       Causes a NETMAIL rescan to occur after each BBS call.

    *S       Causes an ECHOmail scan to occur after each BBS call.

    *T       Substituted by the number of minutes until the next event.

    *X       Exit D'Bridge with an errorlevel of the baud rate divided
             by 100 (3,12,24,48 or 96). If you use this method (which is
             not suggested), you will need to write a batch file like
             the one described on the preceding page.


    *Xnnn    Exit D'Bridge with the specified errorlevel. If you use
             this method, you must be using some alternate method to
             pass the baud rate to the system.

Any DOS command with the exception of EXIT, PROMPT and SET will work
in the DOS BBS COMMANDS window. Changing directories is allowed;
D'Bridge will automatically switch back to the DB root directory
when the commands are finished. You do not have to specifically
change directories after the BBS call.


<a name="9.00"/><h2><a href="#toc">9.00  GLOSSARY OF TERMS</a></h2>

<h3><a href="#toc">ADDRESS</a></h3>

An ADDRESS normally specifies where you want to send EMAIL or files.
D'Bridge uses the Fidonet addressing structure; this consists of four
numbers: ZONE, NET, NODE and POINT. For example, my ADDRESS is 1:110/68.
This means ZONE 1, NET 110, NODE 68 and POINT 0. The format for a Fidonet
ADDRESS is: ZONE:NET/NODE.POINT.

<h3><a href="#toc">ALIAS</a></h3>

An ALIAS is simply another ADDRESS or USER NAME you are using at any given
time. Your system will have a primary ADDRESS and OPERATOR, but you may also
specify a list of AKA (Also Known As) ADDRESSES and USER NAMES which may be
selected while using the internal message editor. ALIAS ADDRESSES are used
when your system belongs to more than one network.

<h3><a href="#toc">AREAFIX</a></h3>

AREAFIX is a subsystem with D'Bridge allowing remote systems to add and
delete ECHOmail conferences from your forwarding list. This eliminates the
need for routine maintenance by the operator of an ECHOmail hub.

<h3><a href="#toc">BAUD RATE</a></h3>

The BAUD RATE represents the speed of a serial communication line.
BAUD actually means BITS PER SECOND and dictates how fast data can be
transferred. Since normal data communications takes 10 bits per character,
a 1200 baud modem can transmit and receive data at a maximum of 120 bytes
(characters) per second.


<h3><a href="#toc">BBS</a></h3>

BBS - An abbreviation for Bulletin Board System.

<h3><a href="#toc">BOSS</a></h3>

A BOSS node refers to the administrator of a "point" network. For example,
if your address is 1:110/50.6, then your "BOSS" address is 1:110/50 (or point
zero). Since points are not in the nodelist, the BOSS will normally receive
and forward all mail addressed to a point.

<h3><a href="#toc">BULLETIN BOARD SYSTEM</a></h3>

Usually called a BBS, a BULLETIN BOARD SYSTEM is a program which allows
"human" callers to connect using a terminal program and directly access
messages, files and other online services. Many BULLETIN BOARDS are public-
access systems which allow people to use them for free providing they follow
the "rules". Many manufacturers and software companies have set up a BBS
to handle support and distribute product information. D'Bridge is capable of
acting as a "front-end" to most BULLETIN BOARD SYSTEMS, determining if a call
is an EMAIL session or if a "human" is on the line.

<h3><a href="#toc">CARRIER</a></h3>

CARRIER, short for CARRIER WAVE, refers to the connection of two modems.
When you dial a modem (with your telephone) you will hear a high-pitched tone;
this is called the CARRIER DETECT SIGNAL. When a modem calls another system, 
the calling modem detects this tone and they automatically "synchronize" and 
determine the baud rate of the connection. Once this is accomplished, you are 
said to have a CARRIER. If the connection is terminated, or the CARRIER signal
is lost, the modems are no longer communicating and will hang up.
The CARRIER WAVE in itself is the unmodulated single-frequency electromagnetic
wave that carries the desired information (data) - i.e., is modulated by the
information.


<h3><a href="#toc">CD</a></h3>

An abbreviation for Carrier Detect. CD refers to the circuits within the
modem monitoring the connection and detecting when a carrier is lost. Most
external modems have a CD light telling the operator the status of the
connection. Once a carrier is detected, D'Bridge can initiate an EMAIL ses-
sion.
CD also refers to the signal the modem sends to the computer telling it
that another modem is connected. This signal is required by D'Bridge.

<h3><a href="#toc">COMM PORT</a></h3>

COMM PORT refers to the serial I/O card used by D'Bridge to communicate with
the modem. Internal modems have a built-in serial PORT but are used the same
way. Your modem PORT is most likely called either COM1 or COM2.

<h3><a href="#toc">COMPILE</a></h3>

In D'Bridge, COMPILE means to translate the raw nodelist or FileBase data
into its internal database. This must be done every time a new nodelist is
installed or when the FileBase is updated. When D'Bridge is run, it checks
the data and time associated with each nodelist file you are using with the
last known values. If they differ, D'Bridge automatically RECOMPILES the
nodelist database (the FileBase must be manually COMPILED using the command-
line option).

<h3><a href="#toc">CONNECT</a></h3>

CONNECT refers to D'Bridge receiving a carrier detect signal from the modem
along with a "CONNECT" message generated by HAYES-compatible modems. When
D'Bridge is CONNECTED to another system, it can send and receive EMAIL and
files. When placing a long-distance call, your phone company will bill you
for the actual CONNECT TIME, usually rounded up to the next minute.


<h3><a href="#toc">CM</a></h3>

An abbreviation for Continuous Mail. All D'Bridge systems are capable of this.
Continuous mail means that a Fidonet-based EMAIL system is capable of
receiving mail 24 hours a day and not just during a scheduled event. Some
EMAIL systems are still not capable of this, so the nodelist has a "CM" flag
which can be used to only send to CM systems (this is configurable on the
ADVANCED ROUTING screen of SCHEDULE MAINTENANCE).

<h3><a href="#toc">CRC</a></h3>

CRC is an abbreviation for Cyclic Redundancy Check. This is how D'Bridge
(and all other EMAIL systems) ensure that data is received the same way it
is transmitted. It is much like a "checksum" attached to a block of data;
A mathematical formula (a polynomial) is used to compare each data block with
its CRC value. If there is a difference, the data is not valid and must be
retransmitted. You, as the user, do not need to concern yourself with this
as it happens automatically.

<h3><a href="#toc">CRASH</a></h3>

In D'Bridge (and most other Fidonet-based systems), CRASH refers to a high-
priority message. It is an "attribute" that may be associated with a message
to tell D'Bridge to send the mail immediately, to override any routing and to
call the destination system directly. Using the internal message editor, you
can specify any message to have CRASH priority.

<h3><a href="#toc">CTS</a></h3>

An abbreviation for Clear To Send. CTS is a signal generated by the receiving
system or modem telling D'Bridge that it may transmit data. This is normally
used only when a modem is using a higher baud rate than it is capable of
sending (or receiving). The CTS signal is used in conjunction with the RTS
(Request To Send) signal and is sent from the modem to the computer.


<h3><a href="#toc">DATA</a></h3>

DATA simply means any form of information that can be stored in a computer
in the form of a file. DATA could be a message, spreadsheet file, graphics
image or anything else in your computer. Any form of DATA may be sent by
D'Bridge.

<h3><a href="#toc">DATA BITS</a></h3>

When D'Bridge is communicating with another EMAIL system, it uses 8 DATA BITS
in the transmission. IBM computers are only capable of using 7 or 8 DATA BITS
in their communications. The D'Bridge "terminal mode" allows you to select
either 7 or 8 DATA bits when communicating with online services such as BBS's.

<h3><a href="#toc">DEFAULT</a></h3>

A DEFAULT refers to a predefined or normal value for something. When you
first install D'Bridge, you will notice that many of the configuration screens
already have answers to questions even though you didn't enter them. This is
because these values or answers will be used by most systems, so they are the
DEFAULTS.

<h3><a href="#toc">DOMESTIC</a></h3>

DOMESTIC refers to any communications within a given country. In the case
of the U.S., D'Bridge considers any system that has a phone number beginning
with "1" to be a DOMESTIC call (this includes Canada, the Bahamas and possibly some other
neighboring countries sharing "1" as their country-code).

<h3><a href="#toc">DOS</a></h3>

DOS, an acronym for Disk Operating System, is the program (written by
MicroSoft) controlling your computer's basic functions. D'Bridge requires
DOS to operate and odds are (99.99% of the time) you already have this
program. Other operating systems are available such as PC-MOS and XENIX,
but D'Bridge will not function while using these.


<h3><a href="#toc">DOS EVENT</a></h3>

A DOS EVENT is a scheduled event (defined by SCHEDULE MAINTENANCE) that will
execute any number of DOS commands or programs, providing that you have enough
memory to "spawn" these tasks. DOS EVENTS can be used for any function you
wish to have automatically performed on a scheduled basis. DOS EVENTS must
only run programs that require no human intervention (keyboard I/O).

<h3><a href="#toc">DOWNLOAD</a></h3>

DOWNLOAD means to receive a file from a remote computer. The D'Bridge
"terminal mode" supports downloads with XMODEM, SEAlink and ZMODEM protocols.
When you DOWNLOAD a file, you are basically copying it over the telephone
from the remote computer to yours. Because these protocols all use CRC error-
checking, the files should arrive on your computer exactly like they are on
the remote system.

<h3><a href="#toc">DROP</a></h3>

In D'Bridge, DROP means to execute another program (or access DOS) by swapping
all memory to EMS or disk, then executing another program. This method (com-
pared to PUSH) frees all available memory so that the executed program has
the maximum memory available for its use.

<h3><a href="#toc">DUPLEX</a></h3>

DUPLEX is used only in the D'Bridge "terminal mode" and refers to an
operating characteristic of the remote computer you are calling. These
days, almost all computers and online services operate in FULL DUPLEX
mode; this means every time you type a character, the remote computer
"echos" it back to you and it is displayed on your screen. Some systems,
however, do not "echo" the characters you type; that is called HALF
DUPLEX operation. If you set D'Bridge to HALF DUPLEX, every character
you type will be displayed on your screen. If you experience a double
echo (two characters for every one you type), you should change to FULL
DUPLEX.


<h3><a href="#toc">DTR</a></h3>

An abbreviation for Data Terminal Ready. DTR is the signal your computer
sends to your modem stating it should accept commands from the computer or,
if enabled, answer the phone. D'Bridge requires this signal to function
properly in order to be able to hang up the phone. When your computer "lowers"
DTR, your modem should hang up the phone if connected to a remote system, or
not answer the phone (if so enabled). Most external modems have a DTR light
telling you the status of this signal.

<h3><a href="#toc">ECHOMAIL</a></h3>

ECHOmail is a method of conferencing or sharing a message base between two
or more systems. D'Bridge features internal ECHOmail processing, eliminating
the need for external utilities.

<h3><a href="#toc">EDITOR</a></h3>

An EDITOR is any program which allows you to read, enter, respond to EMAIL
messages. There is an internal message editor provided with D'Bridge. It
may be run by selecting the EDIT/READ EMAIL option from the EDITOR menu or
by typing "DB EDIT" from the DOS prompt.

<h3><a href="#toc">EMAIL</a></h3>

As an abbreviation for "Electronic Mail", EMAIL generally describes any form
of electronic communication. This could include D'Bridge mail, FAX or TELEX
communication.

<h3><a href="#toc">ERROR LEVEL</a></h3>

An ERROR LEVEL is an "exit code" sent by D'Bridge to DOS describing an "exit
condition". D'Bridge uses ERROR LEVELS in EXIT events so that a DOS batch file
can detect what to do. Unless you already understand ERROR LEVELS, you most
likely won't need to use them. For further information, consult your DOS
manual in the section describing BATCH FILES.


<h3><a href="#toc">EVENT</a></h3>

An EVENT is simply something which happens. In D'Bridge, EVENTS are
scheduled by using the SCHEDULE MAINTENANCE screen. Four types of EVENTS
are supported by D'Bridge: MAIL, DOS, EXIT and CLOCKSYNC.

<h3><a href="#toc">EXIT EVENT</a></h3>

An EXIT EVENT is defined by using the SCHEDULE MAINTENANCE screen. When
an EXIT EVENT occurs, D'Bridge will actually terminate completely providing
DOS with a pre-specified ERROR LEVEL. This is almost always used within a
batch file or shell program.

<h3><a href="#toc">EXPORT</a></h3>

In D'Bridge, EXPORT means to save your current configuration in a text file
for inspection or later use by the IMPORT command. All of the parameters in
the setup screens may be written to a standard text file. This is handy for
configuring a remote system and required when upgrading between revisions
of the D'Bridge software.

<h3><a href="#toc">EXTERNAL GATEWAY</a></h3>

In D'Bridge, an EXTERNAL GATEWAY is a program which can be run automatically
to receive incoming mail from other, non-compatible EMAIL systems. For
example, there is a UUCP EMAIL receiver available for the IBM PC which will
allow you to receive mail from UNIX and XENIX systems. A unique feature of
D'Bridge allows it to recognize when non-compatible EMAIL systems are calling
and transfer control to an external EMAIL receiver.


<h3><a href="#toc">FIDONET</a></h3>

FIDONET means two things really: First, it defines the protocol D'Bridge
uses when communicating with other Fidonet-based systems. This protocol is
described in detail in certain documents written and maintained by the FTSC
(Fidonet Technical Standards Committee). Second, it is the name of the largest
Fidonet-based EMAIL network. Both the network and the protocol were created
by Tom Jennings of Fido Software. His initiative and early efforts are what
made the Fidonet network possible.

<h3><a href="#toc">FILE</a></h3>

A FILE is an organized collection of information, usually similar in nature.
When you type "DIR" in DOS, you receive a listing of all the files in the
current directory. (Almost) any of these FILES may be transmitted via EMAIL
to another D'Bridge or Fidonet system.

<h3><a href="#toc">FILE-ATTACH</a></h3>

FILE-ATTACH means to send a file or list of files with an EMAIL message.
This is normally done with the internal message editor. FILE-ATTACH is an
"attribute" associated with a given message. If a message has the FILE-ATTACH
attribute, all files listed in the SUBJECT line will be transmitted with the
message.

<h3><a href="#toc">FILE-REQUEST</a></h3>

FILE-REQUEST is similar to FILE-ATTACH, except it works in reverse. Files
are "requested" from the specified system; when the call is placed, if those
files exist and you have specified the right password, if any, they will be
sent to you immediately. FILE-REQUEST is both a message "attribute" and a
menu option in D'Bridge.


<h3><a href="#toc">FLAGS</a></h3>

The FLAGS are the last part of a nodelist line - free-form text which may
contain additional information about the system. Include the characters "CM"
if you wish to designate a system as CONTINUOUS MAIL (being able to receive
EMAIL 24 hours/day).

                          ie.

                          CM,XX,HST,V32

                          CM   Continuous mail
                          XX   WaZOO-style file and update requests
                          HST  US Robotics Courier HST modem
                          V32  V.32 compatible

<h3><a href="#toc">FORWARD</a></h3>

FORWARDING means to send an EMAIL message which neither originated from nor is
destined for your system. FORWARDING is used in conjunction with ROUTING to
send mail through HOST systems, usually to save phone calls and costs. For
example, if you wish to send a message to a system outside your NET, the
message is normally routed to that city's HOST and will then be FORWARDED
automatically to the destination. This way, if you have several messages to
go to different destinations in one city, only a single phone call needs to
be made.

<h3><a href="#toc">FOSSIL</a></h3>

An acronym for "Fido/Opus/SEAdog Standard Interface Layer," FOSSIL
refers to a communications interface common to many BBS systems.
D'Bridge does not require a FOSSIL driver, nor will it use one if installed.

<h3><a href="#toc">FRONT-END</a></h3>

FRONT-END is a generic term for programs like D'Bridge, FrontDoor and Binkley-
Term when they are used to run a combination BBS/EMAIL system. This simply
means D'Bridge acts as a FRONT-END, answering the phone and transferring con-
trol to a BBS or external EMAIL receiver.


<h3><a href="#toc">FTSC</a></h3>

FTSC stands for Fidonet Technical Standards Committee, a group of
individuals, mostly computer programmers, who maintain the technical
specifications and procedures used to design and maintain network software
for Fidonet.

<h3><a href="#toc">FUNCTION-REQUEST</a></h3>

ZMODEM-based EMAIL systems like D'Bridge, FrontDoor and BinkleyTerm have the
ability to process FUNCTION-REQUESTS, allowing the calling system to have
access to predefined DOS functions or programs. This is a rather advanced
feature and can only be used in conjunction with external programs not inclu-
ded with D'Bridge.

<h3><a href="#toc">HOLD</a></h3>

HOLD means NOT to send mail, but rather to wait until the destination system
calls and picks it up. Normally, D'Bridge will put all mail without CRASH
priority on HOLD 24 hours a day. This way, a system calling to send you mail
can always get any mail waiting for it, saving you a phone call.

<h3><a href="#toc">HOST</a></h3>

Every NET has a HOST; a HOST acts as a consolidation point for inbound mail
coming from outside your NET. A host is designated by having a NODE and POINT
number of zero. By default, all mail sent to systems outside your NET will be
routed to a HOST or a HUB. The exception to this is if you have specified
CRASH priority or have attached or requested a file. Usually, the NET host
acts as the administrator for his NET, maintaining the nodelist and distribu-
ting updates to all his NODES.


<h3><a href="#toc">HUB</a></h3>

A HUB is functionally identical to a HOST; it is usually only used when a NET
is very large or spans more than one local calling area. In D'Bridge, HUB and
HOST ROUTING are treated the same. Messages addressed to a NODE outside your
network are ROUTED through the HUB if one exists.

<h3><a href="#toc">IMMEDIATE</a></h3>

In D'Bridge (and most other Fidonet-based systems), IMMEDIATE refers to a
high-priority message. It is an "attribute" which may be associated with a
message to tell D'Bridge to send the mail immediately, to override any
routing and call the destination system directly. Using the internal message
editor, you can specify any message to have IMMEDIATE priority.

The difference between CRASH and IMMEDIATE is that D'Bridge will process all
of the IMMEDIATE calls before attempting to dial a CRASH or NORMAL priority
call.

<h3><a href="#toc">IMPORT</a></h3>

In D'Bridge, the term IMPORT is used when upgrading between releases of the
software or anytime you wish to transfer or restore an EXPORTED configuration.

<h3><a href="#toc">INBOUND</a></h3>

INBOUND simply means mail arriving at your system from a remote site;
opposite of OUTBOUND.

<h3><a href="#toc">INITIALIZE</a></h3>

In D'Bridge, INITIALIZE is used to describe sending commands to your modem
that INITIALIZE it, setting the correct parameters for operation. Normally,
your MODEM INITIALIZATION STRING tells your modem to answer the phone and
report the connection back to D'Bridge. For specific information on this,
read the section on COMM/MODEM SETUP.


<h3><a href="#toc">INTERNATIONAL</a></h3>

INTERNATIONAL refers to any communications to systems outside your country.
In D'Bridge, this is determined by the first part of a phone number as it
appears in the nodelist. For the U.S., Canada, the Bahamas and several other
neighboring countries sharing a country code of "1", communications is not
considered INTERNATIONAL unless calling Europe or Australia; anytime the
COUNTRY CODE in the nodelist differs from your own, that is an INTERNATIONAL
call and the predefined INTERNATIONAL DIALING PREFIX will be used.

<h3><a href="#toc">KLUDGE</a></h3>

A "kludge" line is a hidden line of text in a NETmail or Echomail message.
Usually starting with ASCII 01 (a "smiley face" character), these kludge
lines usually contain information such as the originating address, routing
details, serial numbers, etc. An example is the MSGID/REPLY kludge, that
allows 3rd-party software to maintain "reply chains" in network messages.

Kludge lines are defined by the Fidonet Technical Standards Committee
or FTSC for short, a group of individuals (mostly computer programmers)
who outline and design the ways that Fidonet software operates. D'Bridge is
comprised of many designs and specifications set forth in the FTSC reference
manuals and proposals.

<h3><a href="#toc">LOCAL</a></h3>

LOCAL refers to any call where D'Bridge simply strips off the COUNTRY CODE
and AREA CODE. It is still possible there is a charge for the call, but in
most cases there isn't (at least not in the U.S.).

<h3><a href="#toc">LOG</a></h3>

D'Bridge keeps a detailed LOG file of everything happening on the system.
It contains chronological information about system activity, errors, etc.


<h3><a href="#toc">MACRO</a></h3>

In the internal message editor, KEYBOARD MACROS are supported. What this
means is that you can program function keys (ALT F1-F10 and CTL F1-F10) to
substitute preprogrammed text of any length while editing messages. This is
handy for signatures and any other text you find yourself constantly typing.
Words, sentences or even paragraphs can be programmed into the MACRO keys.

<h3><a href="#toc">MAIL</a></h3>

MAIL simply refers to messages or files sent or received.

<h3><a href="#toc">MAIL EVENT</a></h3>

A MAIL EVENT is a predefined period of time during which D'Bridge is
allowed to send mail. During this time, all messages will be sent unless
otherwise specified in the ADVANCED ROUTING screen. It is important that
all systems in the network use the same time for MAIL EVENTS. Remember
that if a west-coast system starts a mail event at 1:00, systems on the
east-coast must start the same event at 4:00: the same physical time.

<h3><a href="#toc">MESSAGE</a></h3>

In D'Bridge, a MESSAGE is prepared using the internal editor and contains
text to be sent to another location conveying a thought or idea. Messages are
the basis for more EMAIL systems.

<h3><a href="#toc">MODEM</a></h3>

An acronym for "MOdulator/DEModulator". A modem is the device which allows
computers to communicate by converting electrical impulses to audio tones and
back. Obviously, you have a modem or you would not have purchased D'Bridge,
so we'll assume this will suffice.


<h3><a href="#toc">MSGID KLUDGE</a></h3>

The MSGID/REPLY kludge lines are tiny lines of hidden "text" that get added
to all messages that originate from your system. The MSGID kludge contains
the address of your system as well as a unique serial number. When you use
the internal editor to reply to a message that contains a MSGID kludge,
the REPLY kludge is added, containing the address and serial number
of the original message. Although I never really understood the importance
of kludge lines; I added it as a convenience feature as of version 1.87.

The serial number generated by D'Bridge for the MSGID/REPLY kludge system
is stored in DBRIDGE.MSG, should it need to be examined. It should never
be deleted or modified unless theres a really good reason to do so...

<h3><a href="#toc">NET</a></h3>

Defines the second number in a Fidonet address. NET typically defines a
geographical region or local calling area. In the case of a private network
with few systems, all systems (regardless of location) could use the same
NET number.

<h3><a href="#toc">NETWORK</a></h3>

The term "NETWORK" refers collectively to all the systems listed in your
nodelist. You should be able to send an EMAIL message to anyone in your
network. Sometimes, NETWORK is used in the same way as NET, the second number
in a Fidonet address, but they really mean two different things.

<h3><a href="#toc">NETWORK ADMINISTRATOR</a></h3>

Every NETWORK has an ADMINISTRATOR; without one, anarchy would prevail.
There is a section devoted entirely to the duties and responsibilities resting
with a NETWORK ADMINISTRATOR. If you are such a person, I would strongly
suggest you to read it. Basically, the network administrator responsible for
the overall operation of the network and for keeping the nodelist up-to-date
and accurate.


<h3><a href="#toc">NODE</a></h3>

A NODE is the third number in a Fidonet address; NODE specifies an individual
system. Much like in a telephone book, each NODE has an entry in the NODELIST
listing information such as name, phone number and baud rate.

<h3><a href="#toc">NODELIST</a></h3>

Every network has a NODELIST; maintained by the administrator, the NODELIST
is a text file listing all the systems, their phone numbers, baud rates,
cities and operator names. This list is identical on each system in the
network and is updated whenever a new system is added or an existing one
leaves or has information to change. In the case of the amateur networks,
the NODELIST is updated and distributed weekly, usually every Friday.

<h3><a href="#toc">NORMAL</a></h3>

In D'Bridge (and most other Fidonet-based systems), NORMAL refers to a
low-priority message. It is an "attribute" which may be associated with a
message to tell D'Bridge to send the mail at the lowest possible cost,
usually at 11:00 at night. NORMAL is actually the lack of a HOLD, CRASH or
IMMEDIATE flag on the message(s).

<h3><a href="#toc">NULL MESSAGE</a></h3>

A NULL MESSAGE is a message which contains no text. Often, these messages are
used to send or request a file and are meaningless otherwise. D'Bridge gives
you the option to automatically erase these NULL MESSAGES after they arrive.

<h3><a href="#toc">OFFLINE</a></h3>

In D'Bridge, OFFLINE has two meanings: First, it means the phone is not
being answered, most-likely because you are using your computer for something
else. Second, it means what commands you want to give to the modem when the
system is "down" because you are using the editor or exit the program. Some
systems are configured so that the phone is off-hook when D'Bridge is OFFLINE.


<h3><a href="#toc">ONLINE</a></h3>

The opposite of OFFLINE. ONLINE means D'Bridge is up and ready to accept
commands and/or incoming EMAIL.

OS2

OS/2 Warp is an operating system by IBM.

<h3><a href="#toc">OUTBOUND</a></h3>

The term "OUTBOUND" refers to EMAIL or files ready to be sent to a remote
system. Mail that is on "HOLD" is also called OUTBOUND. In fact, everything
in the QUEUE window is OUTBOUND mail.

<h3><a href="#toc">OUTBOUND GATE</a></h3>

Some NETs have an OUTBOUND GATE or GATEWAY - A system which sends all mail
destined for systems outside your NET. This is often done to save money by
consolidating all the OUTBOUND traffic into one outgoing system (perhaps the
OGATE (OUTBOUND GATEWAY) has a WATS line and is able to make long-distance
calls much cheaper). In any case, OUTBOUND GATEWAYS forward mail for anyone
within their NET.

<h3><a href="#toc">PACKET</a></h3>

When D'Bridge sends EMAIL, it is put into PACKETS consolidating all messages
into one file or PACKET. When D'Bridge connects with a system, it sends one
packet instead of one file for each message. A packet could contain one or
thousands of EMAIL messages.


<h3><a href="#toc">PARITY</a></h3>

PARITY is a term only used in the D'Bridge "terminal mode". It is either
NONE, EVEN or ODD and refers to a bit following the DATA BITS and
coming before the STOP BIT. D'Bridge allows you to configure the PARITY any
of these three ways to facilitate communication with different systems.
Most BULLETIN BOARD SYSTEMS use PARITY "NONE", but you might need to change
it.

<h3><a href="#toc">PASSTHRU</a></h3>

A PASSTHRU ECHOmail area means that the mail is received and forwarded,
but not stored in a Fido or QuickBBS message base. PASSTHRU areas are most
often used by ECHO hubs who don't care to read an ECHO personally.

<h3><a href="#toc">PASSWORD</a></h3>

A PASSWORD is the basis for the D'Bridge security system. If you wish to have
a secure link between two systems, you choose an 8-letter PASSWORD that is
mutually agreeable to both operators. Once these PASSWORDS are in place, it is
impossible to communicate with the other system (using your address) unless
that PASSWORD is specified. This is primarily designed to discourage "hackers"
from infiltrating your network and stealing EMAIL you may have on hold.

<h3><a href="#toc">PATH</a></h3>

PATH normally refers to the name of a DOS directory in which you wish to store
files. A path consists of the drive name (C:) plus the name of a specific
subdirectory. See your DOS manual for further information on directory PATHS.


<h3><a href="#toc">PICKUP</a></h3>

PICKUP means to call another system and receive EMAIL it has on HOLD for you.
Every time D'Bridge connects with another system, it asks it if there is any
mail waiting. If so and you have the proper PASSWORD, if required, you will
receive all your mail immediately after D'Bridge sends the outbound mail.
By default, PICKUP is not a secure way to handle mail; make sure you use a
SESSION PASSWORD if you require security in your network.

<h3><a href="#toc">POINT</a></h3>

A POINT is the fourth part of a Fidonet address. A POINT system is not
listed in the NODELIST. Normally, POINTS are not public access systems, but
personal EMAIL systems used to communicate with the network through their
BOSS NODE. For complete information on POINTS, see the section about
setting-up a point system.

<h3><a href="#toc">POINT LIST</a></h3>

The POINT LIST is just like the nodelist but it specifies a list of POINTS
associated with a given BOSS NODE. Again, this is only applicable for a POINT
system and complete information is available in the section on setting-up a
point system.

<h3><a href="#toc">POLL</a></h3>

POLLING means to call a system to see if there is mail waiting even though
you have nothing to send. For example, if you don't have a permanent phone
number for your system or run a private node or point, you will need to poll
your HOST or BOSS on a periodic basis in order to receive your mail. The
perfect example of someone who needs to poll is a salesman who uses a portable
PC to communicate with the main office.


<h3><a href="#toc">QUEUE</a></h3>

D'Bridge has a QUEUE window which lists all of the outbound packets at any
given time. A QUEUE is simply a list of things to do, or in this case packets
to send.

<h3><a href="#toc">RAW NODELIST</a></h3>

The RAW NODELIST simply refers to the nodelist when it is in the form of a
text file, before it is compiled. D'Bridge only processes RAW NODELISTS and
requires no external pre-processor like many other Fidonet EMAIL systems do.

<h3><a href="#toc">ROUTING</a></h3>

D'Bridge has a great deal of flexibility in the way that it can ROUTE
messages. In simple networks, messages can simply be sent directly from the
sender to the receiver. Actually, this can be done in any network, but in
many cases it is more desirable to use ROUTING because it can save money and
cut the number of phone calls. Used in conjunction with FORWARDING, ROUTING
simply means to send a message somewhere other than the final destination.

For example, if I wish to send a message to someone in Miami, it will be
sent during my nightly mail event to the HOST or HUB in Miami. The message
is then automatically FORWARDED to the final destination. Obviously, with
just one message there is no savings and actually the message will take
longer to get there because it has to be FORWARDED to its destination. But
let's say I want to send messages to three different systems in Miami; this
time, there is a savings because D'Bridge only makes one call instead of
three.

<h3><a href="#toc">RTS</a></h3>

An abbreviation for Request To Send. RTS is the companion signal to Clear
To Send, CTS. This is sometimes referred to as "flow control" and allows the
computer to communicate with the modem at a higher baud rate than the modem
can actually send at.


<h3><a href="#toc">SCAN</a></h3>

When D'Bridge says it is SCANNING for outbound mail, it actually looks at
each message to see if it needs to be sent. As it SCANS, it creates packets
that are added the outbound queue.

<h3><a href="#toc">SCHEDULE</a></h3>

In D'Bridge, the SCHEDULE is a list of pre-programmed events that should be
executed at the specified times. It uses a weekly schedule to determine when
to send mail, execute DOS commands, terminate with an errorlevel and when to
perform an atomic "ClockSync". The SCHEDULE MAINTENANCE screen is used to add,
change and remove events from the schedule. The lower-right window of D'Bridge
always displays the schedule for the current day; this is advanced each night
at midnight.

<h3><a href="#toc">SCRIPT</a></h3>

D'Bridge normally uses your telephone to connect with other EMAIL systems to
transfer EMAIL. Sometimes it is desirable to use other carriers such as
packet-switched networks to communicate. The D'Bridge scripting language
allows you to communicate using other systems such as TELENET'S PC-PURSUIT.
Many system operators in the U.S. subscribe to this low-cost data transmis-
sion service and D'Bridge is able to take full advantage of it by using its
SCRIPTING language.
This is a rather advanced feature, so please read the section about script
files for more information.

<h3><a href="#toc">SEALINK</a></h3>

SEAlink is one of the four file-transfer protocols D'Bridge uses to commu-
nicate with other Fidonet-based EMAIL systems. SEAlink was developed by Thom
Henderson of System Enhancements Associates. It was derived from the XMODEM
protocol but has the clear advantage of eliminating propagation delays (from
satellites) so common in long-distance communications. D'Bridge will use this
protocol when communicating with some EMAIL systems.


<h3><a href="#toc">SECURITY</a></h3>

D'Bridge has a password-based security system to protect EMAIL sessions. By
default, no security is used and anyone with a compatible EMAIL system could
send you mail and request files. The D'Bridge security system allows you many
different options to improve security. See the section called SECURITY/
MISCELLANEOUS SETUP for more information.

<h3><a href="#toc">SESSION</a></h3>

A SESSION or MAIL SESSION simply refers to the period of time when two EMAIL
systems are communicating with each other.

<h3><a href="#toc">SPAWN</a></h3>

SPAWN refers to the method of executing another program while keeping the
calling program in memory. An example of this is DOS EVENTS. All commands
issued in DOS EVENTS are SPAWNED; this means D'Bridge is still in memory and
resumes operation as soon as the SPAWNED task is complete. This method can
only be used if there is enough free memory to load the SPAWNED program after
D'Bridge.

<h3><a href="#toc">STOP BITS</a></h3>

STOP BITS is a parameter only found in the D'Bridge "terminal mode". On an
IBM computer, it may have a value of either 1 or 2. Most systems use 1 stop
bit without exception, but it is left to your control for maximum flexibility.

<h3><a href="#toc">TELINK</a></h3>

TELINK is one of the four file-transfer protocols used by D'Bridge. It is
a batch protocol consisting of XMODEM file-transfers preceded by MODEM7
filename headers. This is the standard protocol defined by the Fidonet
Technical Standards Committee as a "fallback" protocol for Fidonet. D'Bridge
will use this protocol when communicating with some EMAIL systems.


<h3><a href="#toc">TERMINAL</a></h3>

D'Bridge has a "TERMINAL MODE" which turns D'Bridge into a teletype or video
display terminal (VDT). When using TERMINAL MODE, you can connect with other
online services such as bulletin board systems and commercial systems like
CompuServe&lt;TM>.

<h3><a href="#toc">TIMEOUT</a></h3>

A TIMEOUT ERROR is a condition when the remote system fails to respond
within an allotted period of time. The cause of such an error can be hardware
trouble, poor line conditions or a software error. If a TIMEOUT ERROR happens
consistently when calling a certain system, you might want to follow up with
a voice call to the system operator.

<h3><a href="#toc">TRIES</a></h3>

The number of TRIES refers to the number of times D'Bridge dials another
system without getting a connection. During mail events, D'Bridge defaults to
a maximum of 30 TRIES, but you may change this to any number you wish by using
the SCHEDULE MAINTENANCE screen.

<h3><a href="#toc">UN-EVENT</a></h3>

The UN-EVENT refers to the "event" that is running when there is no scheduled
event active. The UN-EVENT configuration (found in SCHEDULE MAINTENANCE)
controls how crashmail is handled and how mail is routed outside other events.

<h3><a href="#toc">UNPACK</a></h3>

When EMAIL arrives from another system, it is in the form of PACKETS. Unless
otherwise specified, D'Bridge will UNPACK these packets into messages when
they arrive.


<h3><a href="#toc">UPLOAD</a></h3>

When using the D'Bridge "terminal mode", there is an UPLOAD option enabling
you to transmit file(s) to a remote computer. You can use the XMODEM, SEAlink
or ZMODEM protocols for this function.

<h3><a href="#toc">WAZOO</a></h3>

An acronym for "WArp Zillion Opus-to-Opus". WaZOO is one of the EMAIL
protocols supported by D'Bridge. WaZOO sessions begin with a YOOHOO packet
exchange, then usually send mail and files with either SEAlink or ZMODEM
protocols, depending on the capabilities of the communicating systems. WaZOO
was designed by Wynn Wagner, III and is the EMAIL protocol used by most of
the Fidonet-compatible mailers currently available: D'Bridge, FrontDoor,
Opus, BinkleyTerm and Intermail.

<h3><a href="#toc">WINDOW</a></h3>

A WINDOW is simply an area on the screen D'Bridge uses to display information
in. When I refer to a window, I simply mean a section of the screen.

<h3><a href="#toc">WINDOWS</a></h3>

MICROSOFT WINDOWS(tm) is an operating system written by Microsoft. Most
new computers today ship with Microsoft Windows already pre-installed.

<h3><a href="#toc">XMAIL</a></h3>

XMAIL is simply a term that means "compressed mail". An XMAIL packet
contains any number of mail packets and may be created using the ARC, ZIP,
PAK, LHA or ZOO formats.


<h3><a href="#toc">XMODEM</a></h3>

XMODEM is one of the most universal communications protocols available.
Most people credit Ward Christianson with coding and documenting the first
XMODEM communications program, but I can't say for sure. XMODEM is the basis
of Fidonet communications for sending the initial mail packet. D'Bridge will
use this protocol when talking to some EMAIL systems.

<h3><a href="#toc">YOOHOO</a></h3>

YOOHOO is the name of the handshaking protocol D'Bridge uses when talking
to other WaZOO-based systems. The YOOHOO/2U2 handshake passes such information
as your address, system and operator name as well as session passwords.
YOOHOO and YOOHOO/2U2 were designed by Wynn Wagner, III.

<h3><a href="#toc">ZMODEM</a></h3>

ZMODEM is the protocol D'Bridge uses when communicating with other "HiTek"
systems. Most WaZOO-based EMAIL systems are capable of ZMODEM file-transfers,
but not all. D'Bridge will automatically select this protocol if the other
system is compatible with it. The advantage ZMODEM has over the other proto-
cols is the ability to dynamically adjust the block size for the line condi-
tions. D'Bridge can send and accept any block size between 64 and 8192 pro-
viding a fairly wide tolerance for poor line conditions. D'Bridge's ZMODEM
also features 32-bit CRCs for high data integrity and the ability to continue
an aborted transfer from the exact point where it left off. Chuck Forsberg is
generally credited for documenting ZMODEM and promoting its popularity.

<h3><a href="#toc">ZONE</a></h3>

A ZONE is the first number in a Fidonet address and generally specifies the
continent where the system is located. Some other networks have started using
a different ZONE to separate them from the Fidonet amateur network.


<h3><a href="#toc">ZONEGATE</a></h3>

When communicating with other ZONES, it is possible to cut your communication
costs by sending your EMAIL through the ZONEGATE. For example, if I wish to
send a message to my friend in Europe, I can tell D'Bridge to route the
message through the ZONEGATE and I can send the message with just an in-
expensive domestic call to the European ZONEGATE. From there, he pays the
bill to  forward the message to the American ZONEGATE in Europe who in turn
forwards it on to its destination. The only drawback to this approach is
that it is fairly slow getting to its final destination and your message
can be read by every system operator along the way. Personally, I am willing
to pay the direct connection charges to ensure that the message arrives
quickly and privately.


<a name="A.00"/><h2><a href="#toc">A.00  ACKNOWLEDGEMENTS</a></h2>

D'Bridge would not be what it is today without the ideas and inventions
of others. I feel they all deserve credit for their work, so I am inclu-
ding this section. I have built on the ideas of many other software de-
velopers and I want to thank them all for their efforts.

<h3><a href="#toc">TOM JENNINGS</a></h3>

Tom is the creator and "mastermind" of the entire Fidonet concept. In
1984, he created a bulletin board system called Fido which had the unique
ability to communicate with other Fidos overnight, sending electronic
mail and files. Starting very simple, Fido grew and the software became
more advanced, adding features such as forwarding and routing. Fido is
still widely used today by many individuals and corporations that have
a need to communicate via EMAIL. Thank you, Tom, for creating a system
and a standard that have spawned the largest public amateur EMAIL network
in the world today. Where would we be without you?

<h3><a href="#toc">JOAQUIM HOMRIGHAUSEN</a></h3>

JoHo and I always traded ideas around and quickly they became a standard
part of both D'Bridge and FrontDoor.  EMSI was the greatest example.  We
worked together and co-designed the Electronic Mail Standard Identification
protocol for WaZoo-based sessions.  Thanks, Joaquim.

<h3><a href="#toc">THOM HENDERSON</a></h3>

Thom has been a major factor in the advancement of the Fidonet standard.
His company, System Enhancements Associates is responsible for developing
the ARC standard, the SEAlink file-transfer protocol and SEAdog, another
commercial EMAIL package. About 5 years ago, I purchased a copy of SEA-
dog 4.0 and used it until I wrote D'Bridge. SEAdog took the Fidonet
standards and extended them, supporting such features as file-request
and crashmail. I wish to thank Thom for all the things he has done to
help Fidonet and the EMAIL community. His SEAlink protocol has saved
many people a LOT of money on their phone bill.


<h3><a href="#toc">RAY GWINN</a></h3>

We wish to greatly thank Ray Gwinn for allowing us to include his
serial I/O library as a part of D'Bridge. Building the SIO library,
Ray worked many years to bring the X00 driver through many hardware
and specification changes.

<h3><a href="#toc">WYNN WAGNER III</a></h3>

Wynn is the creator of Opus, "a computer-based conversation system".
He took all the good ideas in Fidonet and created another EMAIL standard
called WaZOO. D'Bridge uses the WaZOO standard when communicating with
other "HiTek", but non-EMSI systems. I wish to thank Wynn for making
these standards available for all to use and creating documentation clear
enough to make implementation easy.

<h3><a href="#toc">CHUCK FORSBERG</a></h3>

Chuck, with his company, Omen Technology is credited with the develop-
ment of the ZMODEM protocol and making it as popular as it is today.
I used a document he wrote in August, 1986 describing very clearly how
to implement the ZMODEM protocol. Without testing with his program, DSZ,
it would have been very hard (if not impossible) to ensure that our
32-bit CRC logic was working correctly.

<h3><a href="#toc">JEFF RUSH</a></h3>

Jeff was responsible for bringing ECHOmail to the Fidonet community. He
didn't really invent ECHOmail, but set a clear definition in his original
ECHOmail program (designed for use with Fido and SEAdog) which has re-
mained virtually unchanged to date. I think we should all appreciate the
initiative he took in the early days of Fidonet to bring conferencing
ability to our network.

<h3><a href="#toc">GREG DAWSON</a></h3>

Greg designed and wrote a system called AREAFIX which he graciously
allowed us to incorporate into D'Bridge. His AREAFIX system allows
ECHOmail distributors to automate the routine maintenance that was
required when conferences were added and deleted.


ADAM HUDSON and STEVE GABRILOWITZ

Adam originally wrote the QuickBBS software which is in widespread use
today. He has been cooperative in helping D'Bridge be compatible with
his fine BBS program. We thank him for allowing us to use his message
base format within D'Bridge.  Steve took over the project a few years
back and has been most helpful in getting the QuickBBS message-base
locking code in place.

<h3><a href="#toc">ARTHUR GREENBERG</a></h3>

Arthur has been a constant source of ideas and inspiration.  I wish to thank
him for all his testing and coordination effort.  He is listed in both the
Fidonet and DBNET nodelists as D'Bridge HELP/USA.  Thanks again, Arthur!

<h3><a href="#toc">BETA-TEST GROUP</a></h3>

D'Bridge just wouldn't be possible without our Beta-test group which
put the software "through a ringer" before you ever saw it. I wish to
thank them all for their effort and dedication during the development
process...

<h3><a href="#toc">COPYRIGHT / TRADEMARK ACKNOWLEDGMENTS</a></h3>

  - AirMail is a trademark of Joaquim Homrighausen
  - ARC is a trademark of System Enhancement Associates
  - AREAFIX is a trademark of Greg Dawson
  - BinkleyTerm was written by Bob Hartman and Vince Perriello
  - Dutchie was written by Henk Wevers
  - ECHOmail was originally designed by Jeff Rush
  - Fido and Fidonet are trademarks of Tom Jennings (Fido Software)
  - FrontDoor is a trademark of Joaquim Homrighausen
  - InterMail is a trademark of InterZone Software
  - LHA was created by Haruyasu Yoshizaki
  - Opus, WaZOO and YOOHOO are trademarks of Wynn Wagner III
  - PAK was created by NoGate Consulting
  - PC-Pursuit is a servicemark of Telenet
  - QuickBBS is a trademark of Steve Gabrilowitz (Pegasus Software)
  - SEAdog is a trademark of System Enhancements Associates
  - Wildcat is a trademark of Mustang Software
  - XMODEM was originally made popular by Ward Christianson
  - ZIP was created by Phil Katz of PKware
  - ZMODEM was documented by Chuck Forsberg
  - ZOO was developed by Rahul Dhesi

<hr/>
                D'Bridge 2.97/ - Copyright 1987-92, Chris Irwin                

                            D'Bridge EMAIL System                 
                     Copyright (c) by Nick J. Andre, Ltd.
                      www.nickandre.com      1:229/426

              Programmed using Microsoft Macro Assembler 6.0,
            Turbo Pascal 5.5 and Microsoft Visual BASIC for DOS.

</div>
<h1>User's Manual</h1>
<a name="toc"/><h2>TABLE OF CONTENTS</h2>
<ol>
</ol></li>
<li><a href="#0.00">0.00 NOTE FROM THE AUTHOR</a><!-- START SUBSECTION 0.00 -->

<ol>
<li><a href="#0.01">0.01 HARDWARE / SOFTWARE REQUIREMENTS</a></li>
</ol></li>
<li><a href="#1.00">1.00 GENERAL OVERVIEW</a><!-- START SUBSECTION 1.00 -->

<ol>
</ol></li>
<li><a href="#2.00">2.00 SOFTWARE INSTALLATION</a><!-- START SUBSECTION 2.00 -->

<ol>
<li><a href="#2.01">2.01 BASIC EMAIL SETUP</a></li>
<li><a href="#2.02">2.02 BASIC ECHOMAIL SETUP</a></li>
</ol></li>
<li><a href="#3.00">3.00 SYSTEM CONFIGURATION AND MAINTENANCE</a><!-- START SUBSECTION 3.00 -->

<ol>
<li><a href="#3.01">3.01 BASIC CONFIGURATION</a></li>
<li><a href="#3.02">3.02 DIRECTORY PATHS</a></li>
<li><a href="#3.03">3.03 COMM / MODEM SETUP</a></li>
<li><a href="#3.04">3.04 SCHEDULE MAINTENANCE</a></li>
<li><a href="#3.05">3.05 NODELIST CONFIGURATION</a></li>
<li><a href="#3.06">3.06 PACKET MAIL CONTROL</a></li>
<li><a href="#3.07">3.07 XMAIL CONTROL</a></li>
<li><a href="#3.08">3.08 TIME CONTROL SYSTEM</a></li>
<li><a href="#3.09">3.09 FUNCTION KEYS</a></li>
<li><a href="#3.10">3.10 BBS CONFIGURATION</a></li>
<li><a href="#3.11">3.11 SECURITY MISCELLANEOUS</a></li>
<li><a href="#3.12">3.12 DISK SPACE MINIMUMS</a></li>
<li><a href="#3.13">3.13 ACCOUNTING TRANSLATION</a></li>
<li><a href="#3.14">3.14 ZMODEM PARAMETERS</a></li>
<li><a href="#3.15">3.15 SETUP EDITOR OPTIONS</a></li>
<li><a href="#3.16">3.16 ECHOMAIL AREAS</a></li>
<li><a href="#3.17">3.17 WINDOW COLORS</a></li>
<li><a href="#3.18">3.18 KEYBOARD MACROS</a></li>
<li><a href="#3.19">3.19 TRANSLATION TABLE</a></li>
</ol></li>
<li><a href="#4.00">4.00 SYSTEM IDLE COMMANDS</a><!-- START SUBSECTION 4.00 -->

<ol>
</ol></li>
<li><a href="#5.00">5.00 EMAIL MESSAGE EDITOR</a><!-- START SUBSECTION 5.00 -->

<ol>
<li><a href="#5.01">5.01 USING EDIT MODE</a></li>
<li><a href="#5.02">5.02 USING READ MODE</a></li>
<li><a href="#5.03">5.03 ADVANCED FEATURES</a></li>
</ol></li>
<li><a href="#6.00">6.00 UNDERSTANDING THE QUEUE</a><!-- START SUBSECTION 6.00 -->

<ol>
<li><a href="#6.01">6.01 CREATING A PRIVATE NODELIST</a></li>
<li><a href="#6.02">6.02 DUTIES OF A NETWORK ADMINISTRATOR</a></li>
</ol></li>
<li><a href="#7.00">7.00 DBUTIL / UTILITY PROGRAM</a><!-- START SUBSECTION 7.00 -->

<ol>
<li><a href="#7.01">7.01 FIDO AND QUICKBBS STORAGE</a></li>
<li><a href="#7.02">7.02 USING THE SCRIPTING LANGUAGE</a></li>
<li><a href="#7.03">7.03 EXAMPLE SCRIPT FILE</a></li>
</ol></li>
<li><a href="#8.00">8.00 BBS SYSTEMS</a><!-- START SUBSECTION 8.00 -->

<ol>
</ol></li>
<li><a href="#9.00">9.00 GLOSSARY OF TERMS</a><!-- START SUBSECTION 9.00 -->

<ol>
</ol></li>
<li><a href="#A.00">A.00 ACKNOWLEDGEMENTS</a><!-- START SUBSECTION A.00 -->

<ol>
</ol></li>
</ol>
<a name="0.00"/><h2><a href="#toc">0.00  NOTE FROM THE AUTHOR</a></h2>

Hello, my name is Nick Andre, and I am the current developer of the
legacy D'Bridge EMAIL System by Chris Irwin. Much of what you will see
in this online help system is exactly how Chris wrote it some years ago,
and is preserved for historic reasons. I have updated the help system to
include step-by-step walkthroughs and troubleshooting, as well as help
for newer features such as Internet connectivity. If you have any
questions or concerns, please do not hesitate to contact me by the
methods indicated in the appropriate README file for this release.
Thanks!

Nick Andre
<h3><a href="#toc">ANDRE CONSULTING</a></h3>

...

Thank you for selecting D'Bridge, a state-of-the-art electronic mail
system for the IBM PC. The ability to send and receive data electro-
nically has now become almost as common as the telephone for business.
More and more companies are realizing that the most efficient and
cost-effective way to move data is digital. FAX is fine for printed
documents and voice is the most direct way to convey a thought; but
data is the best way for businesses to communicate when the informa-
tion sent and received becomes routine or needs to be fed directly
into one or more remote computers for instant processing.

It is rapidly becoming commonplace for companies to have a "data" num-
ber, just like they had "voice" and "FAX" numbers. In fact, it is al-
ready possible to replace the "FAX" number with a combined "Data/FAX"
number, since reasonably inexpensive modems supporting protocols for
both are already being offered on a fast growing scale.

What can D'Bridge do?  Simple - it can move data, programs, documents,
spreadsheets, pictures, drawings and sounds between continents in just
seconds or minutes, depending on the size. Anything that can be stored
in your computer may be automatically transmitted to other computers
using compatible EMAIL systems anywhere in the world.

D'Bridge isn't alone; there are many other programs out there that can
communicate with it. We chose to implement the most widely used point-
to-point EMAIL system in the world, Fidonet. This means you may commu-
nicate with anyone using the programs: FrontDoor, BinkleyTerm, Intermail,
Fido, Opus, SEAmail, TIMS, SEAmail, TrapDoor and many others.

D'Bridge is just a beginning; look for our release of many innovative
products using our EMAIL system as a "hub". The possibilities of how
D'Bridge can be used are virtually limitless. Worry-free, automated
communications is the key to many new applications: Shared databases,
unattended data collection and automatic order processing to name a few.
I would be happy to discuss your custom application; after all, I am
still a consultant too...

                                     Sincerely,

                                     Chris Irwin
                                     201:201/0@dbnet
                                     1:110/68@fidonet.org


<a name="1.00"/><h2><a href="#toc">1.00  GENERAL OVERVIEW</a></h2>

D'Bridge is one of the most flexible EMAIL systems on the market today
and its menu-driven operation makes it one of the easiest to use. The
communications between D'Bridge systems use the powerful ZMODEM proto-
col, ensuring that your data arrives as quickly and accurately as
possible.

In its simplest form, D'Bridge acts like a messenger between two or more
points; at its best and most complex, it can be a multi-tired network
connecting hundreds (or thousands) of cities using a "hub and spoke"
topology (much like our major airlines and parcel services.)

       MESSAGES

D'Bridge can send messages (text) from one location to another automatically.
Messages may be prepared by using the built-in D'Bridge Message Editor or a
third-party product.  Messages are a simple and cost-effective way for offices
to communicate with each other. It is usually more cost-effective to send
EMAIL messages between offices than to use FAX or TELEX.  With a high-speed
modem, D'Bridge acan transfer hundreds of messages in just a minute or two.

       FILES

Along with messaging, D'Bridge can send files.  Word processor files, spread-
sheets, database files and graphic images are just a few of the types of files
D'Bridge can transfer. Any file which can be put on a standard DOS storage
medium may be sent anywhere in the world within minutes using D'Bridge.

       FUNCTION-REQUESTS

D'Bridge also has the ability to spawn FUNCTION-REQUEST server tasks.  These
programs are designed to process received data then generate output to send
back to the calling sytstem.  Examples of function requests are the programs
that issue "DEMO keys" and collect registration data.


<h3><a href="#toc">DESIGN PHILOSOPHY / BASIC CONCEPTS</a></h3>

D'Bridge is a complex program that allows a user complete control over
its operation. Four integrated programs are involved in the routine
operation of the EMAIL system:

DB.EXE         This is the "shell" program that runs the mailer and editor.

DB01.151       This is the MAILER portion. It controls your modem
               both answering and originating calls; it can control
               your FAX card or the FAX options inside your modem at
               the same time. Think of the MAILER as a fancy timer/
               clock allowing you to program different "events" to
               happen using a weekly schedule. EMAIL is transmitted
               only when the schedule permits; mail schedules can be
               set up to send all mail at the least-expensive over-
               night rates.

DB04.151       This is the EDITOR portion. It is very much like a
               word-processor in operation, but instead of documents,
               there are EMAIL messages. The editor allows you to
               enter, read and reply to messages.

DBUTIL.EXE     This is the utility program. It allows for additional
               functions such as SEND FILE or POLL to be executed from
               a batch file so that nightly data transmissions can be
               automated. With the PURGE option, DBUTIL will purge the
               message base.

There are some basic terms that are important to understand when dealing with
D'Bridge. There is also a complete glossary of terms located in appendix A, but
here are the ones you will need in order to get started:

EMAIL          Electronic mail, or in D'Bridge terms, messages that
               are sent directly between systems or routed through
               a host. EMAIL messages may be public or private and
               may be sent in normal or compressed (XMAIL) form.

NETmail        NETmail or network mail is the name of the EMAIL message
               area for messages sent directly between systems. Each
               NETmail message has an ORIGIN and a specific DESTINATION
               where it is to be sent.


  ECHOmail       ECHOmail is a form of conferencing. When an ECHOmail
                 message is entered on your system, it is automatically
                 "echoed" to all other systems participating in the given
                 conference. ECHOmail messages are generally not private
                 since they can be read by the system operator of each
                 node receiving it.
  
                 ECHOmail conferences are generally topic-specific. For
                 example, there may be an ECHOmail conference about SKIING
                 and one about SCUBA_DIVING. This provides a means of
                 linking lots of people throughout the world in a common
                 forum for discussion.
  
  XMAIL          In D'Bridge terms, XMAIL simply means compressed mail.
                 Compression is achieved through the use of common com-
                 pression/archival programs that store a series of files
                 inside a single archive. By default, ARC by System En-
                 hancement Associates is used to store and compress the
                 mail so that telephone costs may be cut. ZIP, LHA, ARJ,
                 PAK and ZOO are also supported as standard compression
                 methods.
  
                 If you wish to use the XMAIL features of D'Bridge, you
                 will need to get one of these supported archive programs:
  
                 ZIP      PKWARE, Inc.
                          7545 N. Port Washington Rd.
                          Glendale, WI 53217
  
                 LHA      Copyright by Haruyasu Toshizaki
                          Japan
                          Distributed via electronic means
  
                 ARJ      Robert K. Jung
                          2606 Village Road West
                          Norwood, MA 02062
  
                 PAK      NoGate Consulting
                          P.O. Box 88115
                          Grand Rapids, MI 49518-0115
  
                 ARC      System Enhancement Associates
                          21 New Street
                          Wayne, NJ 07470
  
                 ZOO      Copyright by Rahul Dhesi
                          Free noncommercial use permitted


  NETWORK        A NETWORK is a group of computer systems with the
                 ability to send EMAIL on a scheduled or continuous basis.
                 In D'Bridge, NETWORKS are defined by a NODELIST file.
  
  NODELIST       A NODELIST is a text file containing a list of EMAIL
                 systems in a given NETWORK. The list is in a structured
                 form, known as the "St. Louis" format. D'Bridge needs to
                 compile the raw list(s) into its database before a new
                 nodelist file may be used. If you are joining a public
                 NETWORK, you will need to obtain a copy of their NODELIST
                 from a "network administrator". If you are setting up a
                 private NETWORK, you will need to create your own
                 NODELIST file.
  
  MESSAGE        A MESSAGE is the basis of EMAIL communications. A user
                 enters a MESSAGE in the editor and ADDRESSES it to any
                 other system in the NODELIST.
  
  ADDRESS        Each EMAIL MESSAGE has two addresses: the ORIGIN and
                 DESTINATION ADDRESS. The ORIGIN is simply the ADDRESS of
                 the system on which the message was written and the DESTI-
                 NATION is the ADDRESS of the system where the message is
                 being sent. In D'Bridge, addresses are broken up into
                 four segments: ZONE, NET, NODE and POINT. Each of these
                 segments is a number between 0 and 32767. The normal for-
                 mat for an EMAIL ADDRESS is ZONE:NET/NODE.POINT.
  
  ZONE           The ZONE ADDRESS is a number between 1 and 32767 desig-
                 nating a NETWORK or geographic region. In the case of pu-
                 blic NETWORKS, different ZONES have been used to designate
                 completely separate NODELISTS.
  
  NET            The NET ADDRESS is a number between 1 and 32767 designa-
                 ting LOCAL NETWORKS. A LOCAL NETWORK consists of a HOST
                 NODE, BOSS NODES and POINTS.
  
  NODE           The NODE ADDRESS is a number between 0 and 32767 desig-
                 nating the ADDRESS of an individual system. If the NODE
                 number is 0, the system is a HOST NODE.
  
  POINT          The POINT ADDRESS is a number between 0 and 32767 desig-
                 nating the ADDRESS of an individual system acting as a
                 POINT. If the POINT number is 0, the system is a BOSS
                 NODE; otherwise, the system uses its BOSS NODE to receive mail.
  
  BOSS NODE      A BOSS NODE is any system operating with a point address
                 of zero. The difference between a BOSS NODE and a POINT
                 is that BOSS NODES are listed in the NODELIST of a
                 NETWORK, while POINTS are not. A BOSS NODE will HOLD and
                 FORWARD EMAIL and files to its POINTS.


  HOST NODE      A HOST NODE acts as a collecting point for EMAIL and
                 HOST-ROUTED files. When a message and/or file is ROUTED,
                 it is automatically FORWARDED for the appropriate NODES.
  
  EVENT          An EVENT comprises of a number of scheduled parameter
                 changes in order to control EMAIL routing or to execute
                 a series of DOS commands at preprogrammed intervals.
                 The SCHEDULE may hold a maximum of 64 EVENTS that tell
                 D'Bridge what to do.
  
D'Bridge features four basic modes of operation:

MAILER         The normal mode of operation, the MAILER mode of D'Bridge
               is normally running 24-hours/day unless you are running
               D'Bridge only at certain times. While in the MAILER mode,
               D'Bridge sends and receives EMAIL and files based on a
               preprogrammed schedule. The MAILER mode offers a completely
               unattended method for scheduled transfers of data between
               personal computer systems.

               The user has the ability to control the queue of outbound
               file-transmissions and file-requests as well as XMAIL and
               standard EMAIL. No mail will be sent if the system is
               not left in MAILER mode when not in use by the operator.

EDITOR         The EDITOR mode allows you to enter and read EMAIL
               messages sent and received by D'Bridge. The EDITOR is
               a specialized word-processor designed to offer powerful
               functions through a clear and simple user interface.
               The editor can be configured to read hundreds of local and
               ECHOmail areas as well as standard EMAIL.

TERMINAL       The TERMINAL mode allows D'Bridge to act as a ANSI
               terminal allowing the user to call other systems such
               as Bulletin Board Systems (BBS) or commercial systems
               such as CompuServe&lt;TM>. This mode provides upload and
               download capability plus the ability to set up a
               custom dialing directory of systems frequently called.

CONFIGURATION  The CONFIGURATION mode of D'Bridge consists of a series
               of parameter screens providing complete control over
               the operation of the software. There are hundreds of
               user-definable parameters controlling the scheduling,
               communications and routing of the EMAIL. For added
               security, a password may be required to enter the various
               CONFIGURATION screens.


<a name="2.00"/><h2><a href="#toc">2.00  SOFTWARE INSTALLATION</a></h2>

Installing D'Bridge from the release ZIP file is quick and easy.

First, make sure that you mave a copy of both PKZIP.EXE and PKUNZIP.EXE in
the DOS PATH.   PKZIP is a compression/decompression system available from:

                           PKWARE, Inc.
                           7545 N. Port Washington Rd.
                           Glendale, WI 53217

This program is available as a SHAREWARE product and is available for file-
request from most of our dealers in the DBNET nodelist.  It is REQUIRED for
D'Bridge operation.

Next, unZIP the release file, DB-153.ZIP into a subdirectory of your choice.
Assuming that the ZIP file is on a floppy in drive B: type the following DOS
commands:

                ie.

                C>MD \DB
                C>CD \DB
                C>PKUNZIP B:DB-153

At this point, you should have three files in the \DB directory that came
from the release ZIP file:

                DB-153.EXE
                DB-153.DOC
                READ.ME

To install or upgrade D'Bridge, simply type the command DB-153 in the \DB
directory:

                C>DB-153

The installation program will walk you through the installation process.
Once the installation is complete, the file DB-153.EXE will be erased.

Proceed to the next chapter for basic EMAIL configuration.


<a name="2.01"/><h2><a href="#toc">2.01  BASIC EMAIL SETUP</a></h2>

In order to gain a complete understanding of D'Bridge, we suggest that
you use the following guideline to initially configure the software.
Using this section, follow along step-by-step as we install an operati-
onal system.

1.   When D'Bridge is first loaded, it will perform a series of tests on
     its environment, files and peripherals. There are several warning
     messages you may see in the LOG window. Here's a summary of these
     warnings and what they mean:

         WARNING: Unable to initialize modem

         This warning means that there is a modem defined but D'Bridge
         is unable to communicate with it. The software expects an "OK"
         response when the initialization string is sent to the modem.
         A number of things could cause this problem, the most likely
         being that a cable is loose, the modem is off or something is
         set wrong in the COMM/MODEM setup screen; see SECTION 3.03 for
         more information.

         WARNING: 64K free RAM needed for ECHOmail

         If there is not at least 64K of memory free when you run
         D'Bridge, ECHOmail processing is not possible. Increase the
         environment size, remove unnecessary TSR programs, try to
         load DOS into High RAM, if your systems is equipped with that
         feature or, if possible, install additional RAM chips in your
         computer.

         WARNING: Unable to open log file

         The LOG FILE that is defined on the BASIC CONFIG screen has
         an invalid name or can't be created for some reason.
         Check the drive and path; see SECTION 3.01 for more information.


         NOTE: "Demo" key has 27 days left!

         Your demonstration license key will expire in 27 days. This
         warning will only appear if you are running a demo copy of
         D'Bridge. This is here for two reasons: to remind you that
         the software is not free and to make sure that you order a
         permanent license before your demo key expires.

         ERROR: Insufficient disk space on C:

         There is not enough disk space for D'Bridge to operate. This
         is based on the values established on the DISK MINIMUMS screen.
         The solution to this problem is either to free some disk space
         on the "offending" drive or use DB SETUP to change the DISK
         MINIMUMS. (Typing "DB SETUP" from the DOS command line will
         allow you to use the configuration menus without D'Bridge
         coming online).

2.   When the top-left corner of the screen says "IDLE," you may press
     the ESC key to display the main menu. Pressing the ESC key a second
     time will return the system to IDLE mode. Select menu items by
     using the ARROW keys to move to the desired option, then press ENTER.
     Pressing the first letter of any option will select that option im-
     mediately without any other keystrokes.

3.   On the EDITOR menu, select the SETUP EDITOR OPTIONS option.
     (Pressing ESC-E-S is a quick way of getting to this menu from the
     IDLE state.)  Choose answers for all the fields on this screen.
     If you're not sure about a field, leave it blank or accept the pre-
     programmed "default"; refer to SECTION 3.15 for more information.

4.   On the CONFIG menu, select each of the following options and
     fill-in all the fields with the appropriate information. Again,
     if you don't understand something, just accept the "default"
     value or leave it blank.

        Screen                   Section

        BASIC CONFIGURATION        3.01
        DIRECTORY PATHS            3.02
        COMM/MODEM SETUP           3.03
        NODELIST CONFIGURATION     3.05


  5.   If you run a bulletin board system (BBS,) setup the information on
       the ADVANCED MENU, BBS CONFIGURATION screen; refer to SECTION 3.10
       for more information on this screen.
  
  6.   Next, if there are certain mail schedules required for your
       NETWORK, you can set them up in the SCHEDULE MAINTENANCE option
       of the CONFIG menu. Typically, a NETWORK will have at least one
       MAIL EVENT each night. During these events, EMAIL and files are
       allowed to be sent; this allows EMAIL entered during the day to
       be transmitted at night, yielding the highest savings in tele-
       communication costs. See SECTION 3.04 for more information.
  
  7.   At this point, your system should be configured for basic EMAIL
       operation. Assuming that you defined a NODELIST on the NODELIST
       CONFIGURATION screen, it must be compiled before D'Bridge can use
       it. The NODELIST always gets compiled when the system is brought
       up and a new NODELIST exists. If you haven't left the program,
       you can force a nodelist compile by using the BUILD NODELIST
       DATABASE on the UTILITIES menu. This process takes a few minutes,
       so be patient.
  
  8.   Now EMAIL is fully configured and you may continue by reading
       SECTION 2.02, BASIC ECHOMAIL SETUP.


<a name="2.02"/><h2><a href="#toc">2.02  BASIC ECHOMAIL SETUP</a></h2>

It is assumed you've completed the previous section and set up most
of the parameters on all the menus listed. If you haven't done this,
please go back and read the previous section as you configure D'Bridge.

Before you configure the ECHOmail subsystem, it is a good idea to have
a general understanding of what it is and how it works. Once properly
configured, the D'Bridge ECHOmail processor is completely automatic in
operation.

  - What is ECHOmail?

    ECHOmail is a facility allowing for EMAIL-based conferencing in
    any number of message areas at the same time. An ECHOmail message
    differs from a NETmail message only in that there is no DESTINATI-
    ON ADDRESS for an ECHOmail message; it gets sent to ALL systems
    participating in a given conference.

    With ECHOmail, you have the capability of sharing ideas with other
    people in SPECIAL INTEREST GROUPS or SIGS. A conference is created
    for each topic of discussion and you may participate in as few or
    as many as you wish. When you enter a message, it is automatically
    forwarded to all the other nodes you are linking to the conference.
    In turn, all the other nodes forward the message to all the nodes
    they link to; the process continues until your message has been seen
    by every system participating in the conference. Your message can
    be sent to THOUSANDS of systems if a conference is interesting
    enough to attract a large and widespread "audience"!

    ECHOmail is a unique form of communications. People living thousands
    of miles apart can carry on a public discussion on any topic or in-
    terest they have in common. During the Gulf War the CNN television
    network featured a report about D'Bridge being used for fast commu-
    nications between American soldiers and their families at home.
    In fact, within several days a special purpose all-D'Bridge SaudiNet
    had been set up for this particular purpose. While it took regular
    mail several weeks to get to its destination, D'Bridge carried Mega-
    bytes of messages back and forth between the Gulf Region and the
    States within minutes!


      An example of some public ECHOmail conferences anyone may partici-
      pate in are:
  
    DBRIDGE       D'Bridge users conference
    HUMOR         Sick jokes and humor
    POLITICS      International political discussion
    SYSOP         International Sysop ECHO
    ZMODEM        Discussion about the ZMODEM protocol

    For more information about how to receive public ECHOmail, contact
    any of our support nodes and we'll be glad to help you.

  - How does ECHOmail work?

    Each ECHOmail conference is actually an entire network within
    itself. An ECHOmail network is defined by its TOPOLOGY or the
    way in which the network interconnects. The following chart
    describes the topology of an ECHOmail conference from my system's
    point-of-view. (This is just an example...)

                         --------------------
                         1:110/68 (my system)
                         ---------+----------
                                  |
                                  |
                                  |
   /-----------+------------+-----+-----+-------------+-------------\
   |           |            |           |             |             |
---+---    ----+----    ----+----    ---+-----    ----+-----    ----+-----
1:105/3    1:107/150    1:150/613    1:3601/14    2:512/1006    1:110/68.1
---+---    ---------    ---------    ---+-----    ----+-----    ----------
   |                                    |             |
   +-----------+------------\           |             +-------\
   |           |            |           |             |       |
---+----    ---+----    ----+----    ---+-----     ---+-----  |
1:105/10    1:105/50    1:105/300    1:3601/14.1   2:280/280  |
--------    --------    ----+----    ---------     ---------  |
                            |                                 |
                            +----------------\                |
                            |                |                |
                       -----+------     -----+------     -----+------
                       1:105/300.14     1:105/300.68     2:512/1006.1
                       ------------     ------------     ------------


    To understand what topology is and how messages get to all the
    systems in the conference, let's take an example of a message
    entered on 1:105/300.68 replying to a message from 2:512/1006.1...

    The message would pass through the following systems to make it
    to its final destination:

    1:105/300.68, 1:105/300, 1:105/3, 1:110/68, 2:512/1006, 2:512/1006.1

    This could take anywhere from a few hours to a few days depending
    on the events running on the different systems; the message must
    be forwarded through four different systems before making it to
    2:512/1006.1!

    You will notice the topology (interconnection) is in the form of a
    tree starting with my address at the top. ECHOmail topology is
    different from every system's point-of-view. In the above network,
    there may be links I am not aware of. For example, I have no way
    of knowing to which points 1:105/300 is sending the ECHOmail.
    The tree looks completely different from his point-of-view.

    The main thing to remember is never to have more than once "source"
    of an ECHO. It is fine to forward an echo to several other systems,
    but make sure all topology follows this tree structure and never
    causes any loops.

    Most networks have an ECHOmail coordinator whose job it is to ensure
    the validity of the local network topology. If you are a member of
    a public network, you should always contact the ECHOmail coordinator
    before setting up any ECHOmail links.

           IMPROPER TOPOLOGY             ACCEPTABLE TOPOLOGY

             /-----------\                 /-----------\
             |           |                 |           |
          ---+---     ---+---           ---+---     ---+---
          1:134/2     1:134/5           1:134/2     1:134/5
          ---+---     ---+---           ---+---     ---+---
             |           |                 |           |
          ---+---    ----+----          ---+---    ----+----
          1:134/3    1:134/150          1:134/3    1:134/150
          ---+---    ----+----          -------    ---------
             |           |
             \-----------/


                                                OPTIMUM TOPOLOGY
System     FORWARD TO                               a
------     ----------                                 -------
1:134/2    1:134/3 1:134/5 1:134/150                  1:134/2
1:134/3    1:134/2                                    ---+---
1:134/5    1:135/2                                       |
1:134/150  1:135/2                           /-----------+-----------\
                                        b    |      c    |     d     |
                                          ---+---     ---+---    ----+----
                                          1:134/3     1:134/5    1:134/150
                                          -------     -------    ---------

    While configuring basic ECHOmail capabilities, read the follo-
    wing sequence of instructions to gain a greater understanding of
    D'Bridge.

    1.   From the CONFIG menu, select the PACKET/MAIL CONTROL screen.
         Using this screen, set the ECHOmail-related parameters like
         this:

            Inbound mail handling? Automatic
                   Kill null msgs? Yes
             Kill In-transit msgs? Yes
                In-transit rescan? Yes
            Secured ECHOmail only? No
            Save ECHOmail SEENBYs? No
          Save duplicate messages? No
          Auto-add ECHOmail areas? No   (for now)
          Accept AREAFIX requests? Yes
           Remove empty PASSTHRUs? Yes

    2.   Next, select the XMAIL CONTROL screen. Here, you should
         already have defaults displayed for each of the compression
         commands. If you are using different archive programs than
         the ones specified, change them as appropriate, but remember
         the formats of the ARC, ZIP, LHA, ARJ, PAK or ZOO files must
         be the same.

         Specify "30" for "XMAIL processing interval"
         Specify "200" for XMAIL packet size limit"

         XMAIL uses the ARC program by default, but you may specify
         which compression methods to use for which systems on this
         screen.


      3.   On the ADVANCED menu, select the DISK SPACE MINIMUMS screen.
           D'Bridge comes preprogrammed with suggested minimum disk
           space criteria. If you plan to use more than one hard-drive
           to store the message bases or queue directory, make sure you
           specify minimums for them on this screen.
  
      4.   On the EDITOR menu, select the ECHOMAIL AREAS screen.
           Following the directions listed in SECTION 3.16, create all
           the ECHOmail areas you will be using. In the FORWARD TO
           fields, list the addresses of the systems you want to set
           up ECHOmail links for.
  
      5.   That's all there is to it. For ECHOmail to work, you must
           verify the following things:
  
           a. D'Bridge reports at least enough free memory as it takes to
              run the compression and decompression programs specified on
              the XMAIL CONTROL screen. When D'Bridge first comes online,
              it says how many bytes of memory are available. Typically,
              this must be around 100K, depending on the compression
              programs you are using.
  
           b. The compression programs specified must exist in the current
              default path.
  
           c. There is enough free disk space; there will be a warning
              at the bottom of the screen if disk space is too low to
              unpack or forward ECHOmail.
  

<a name="3.00"/><h2><a href="#toc">3.00  SYSTEM CONFIGURATION AND MAINTENANCE</a></h2>

D'Bridge is configured by using a series of configuration options on the
EDITOR, CONFIG and ADVANCED menus.  These options give you complete
control over all features and settings and, if improperly set, result in bad
performance or malfunction.  It is therefore advised that only the system
operator have access to the maintenance functions.  Configuration screens may
have a password assigned, using the Config password parameter on the BASIC
CONFIGURATION screen.

The following menu options comprise the configuration/maintenance sub-system
of D'Bridge:

           Setup editor options
           ECHOmail areas
           Keyboard macros
           Translation table
           Basic configuration
           Directory paths
           Comm/modem setup
           Schedule maintenance
           Nodelist configuration
           Packet/Mail control
           XMail control
           Time adjustment data
           Function keys
           BBS configuration
           Security/Miscellaneous
           Disk space minimums
           Accounting/Translation
           ZMODEM parameters
           Xport configuration
           Window colors

All these options are described in detail in the following sections.


<a name="3.01"/><h2><a href="#toc">3.01  BASIC CONFIGURATION</a></h2>

The BASIC CONFIGURATION screen allows control over the "basic" functions
of D'Bridge such as:

   - System log
   - Primary and Alias EMAIL addresses
   - System name
   - Operator name
   - Location or City
   - Data phone number
   - Flags
   - Alarms
   - Configuration password

<h3><a href="#toc">SYSTEM LOG LEVEL</a></h3>

System log level: Verbose (None/Terse/Verbose/Debug)

This controls the level of detail being written to the system log
file. D'Bridge allows three levels of activity logging; it is high-
ly recommended you select VERBOSE until you are familiar with the
complete operation of D'Bridge Email System.

  /---------+----------------------------------------------------------------\
  | NONE    |   Creates NO log whatsoever.  Using this option, problems will |
  |         |   be difficult to resolve, once detected.                      |
  |         |                                                                |
  | TERSE   |   Writes only the important data, such as connections, events, |
  |         |   and file-transfer information.                               |
  |         |                                                                |
  | VERBOSE |   Writes ALL information displayed in the log window.          |
  |         |                                                                |
  | DEBUG   |   Same as VERBOSE, except the times are recorded in the log    |
  |         |   using fractional seconds. (HH:MM:SS.hh)                      |
  \---------+----------------------------------------------------------------/


<h3><a href="#toc">PURGE LOG AFTER</a></h3>

Purge log after: 7   (days)

This specifies the number of days to retain the information in the system
log file. Every day, all log entries older than the specified number of
days will be erased from the current log file. This purge occurs during
the AutoUpdate event at midnight.

 * <span style="color: red">NOTE</span> *   This feature is not yet implemented.

<h3><a href="#toc">LOG FILENAME</a></h3>

Log filename: C:\DB\DBRIDGE.LOG                          

D'Bridge normally keeps a "log" of all activity so that you may review
its performance. Here, you specify the name of the file (including the
directory if you wish) to which D'Bridge will write its log. This file
contains the information displayed in the upper-left window including
such data as incoming and outgoing calls, file-transfer statistics and
event activation.

<h3><a href="#toc">CPS DISPLAY UNIT</a></h3>

CPS display unit: bps (bps/cps/kpm/%)

This setting determines the method to use when reporting the effective speed
of a data transfer. These measurements are displayed in the ACTIVITY window
during an online mail session. The value of this parameter has absolutely
no effect on the actual speed of a transfer.

    /-----+----------------------------------------------------------------\
    | bps |  Bits per second @ 10 bits per byte.             ie. 17100 bps |
    |     |                                                                |
    | cps |  Characters or bytes per second.                 "   228 cps   |
    |     |                                                                |
    | kpm |  Kilobytes per minute.  (cps x 1024)             "   94.2 kpm  |
    |     |                                                                |
    | %   |  Percentage of reported baud rate.               "   113.2%    |
    \-----+----------------------------------------------------------------/


<h3><a href="#toc">PRIMARY ADDRESS</a></h3>

Primary address: 1:110/68.1                        

This specifies your primary system address. This (like all addresses)
must be in the format: &lt;ZONE:NET/NODE.POINT>

If you are a member of an already-existing network, contact your network
coordinator for an address assignment. If you're not sure, make up
an arbitrary address for now.

       /--------+------------------------------------------------------------\
       | ZONE   |  Continent or nodelist designator 1=US, 2=Europe, etc.     |
       |        |                                                            |
       | NET    |  Usually represents a local calling area (1..32767.)       |
       |        |                                                            |
       | NODE   |  Specific system address within a ZONE and NET.            |
       |        |                                                            |
       | POINT  |  Zero unless running as a "point" of another system.       |
       \--------+------------------------------------------------------------/


<h3><a href="#toc">ALIAS ADDRESSES</a></h3>

Alias addresses: 201:201/0 FOR 201:ALL                  

This specifies your secondary (alias) addresses. The field must be in the
format:  &lt;address> [FOR &lt;filter>]

If you are a member of multiple networks, specify your main address in the
"Primary address" field and all other origin addresses here.  The filter
controls the automatic alias function.  In the above example, any mail,
AREAFIX requests or transactions with any zone 201 address will be sent
using 201:201/0 as the origin address.  The primary address is used in
all cases where there is no match with an alias address filter.

Please note that if you plan to use D'Bridge to forward mail to other systems
by means of the AREAFIX system; you will need to specify the individual
alias addresses to be recognised; otherwise any Areafix requests that get
received that don't match your aliases will be treated as IN-TRANSIT mail.

If you are using the Internet EMAIL and USENET features, please do NOT
specify the address of the Gateway Processor in your alias-addresses.

(See PRIMARY ADDRESS for information about EMAIL address formats.)

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">SYSTEM NAME</a></h3>

System name: Factory Second Parachutes, Inc.               

When D'Bridge communicates with a remote site, the SYSTEM NAME is
displayed on the other system's screen along with OPERATOR NAME, CITY
and your primary and alias addresses.

This field should match the SYSTEM NAME field of your nodelist entry.

The SYSTEM NAME is also used as the default "Origin" line on messages
written using the internal message editor; unless you specify another Origin
line to use in the ECHOMAIL SETUP screen.


<h3><a href="#toc">SYSTEM CITY</a></h3>

System city: Middletown, OH        

When D'Bridge communicates with a remote site, the SYSTEM CITY is
displayed on the other system. Make sure it is not duplicated in
the SYSTEM NAME field (it would be redundant...).

This field should match the CITY field of your nodelist entry.

<h3><a href="#toc">OPERATOR NAME</a></h3>

Operator name: Chris Irwin           

When D'Bridge communicates with a remote site, the OPERATOR NAME is
displayed on the other system and placed in its system log file.
This name will also be used in the "FROM" field in the editor, when
entering a NETmail or ECHOmail message.

This field should match the OPERATOR field of your nodelist entry.

The OPERATOR NAME is used by default in the internal message editor for
composing new messages. If you wish to use a handle or "alias", specify those
in the EDITOR SETUP screen.


<h3><a href="#toc">DATA PHONE</a></h3>

Data phone: 1-513-821-1387       

When D'Bridge communicates with a remote site, the DATA PHONE field
is transmitted to the other system for automatic addition to their
nodelist database. If you fail to specify this number correctly,
it will not be possible for the remote site to return an answer to
your mail directly.

If you are using a voice line or do not wish to disclose this number
to the public, DO NOT LIST IT HERE. Use "-Unpublished-" to designate
the number as private. This data is exchanged during the initial
EMSI handshake on dialup mail sessions. It is not sent anywhere else
during a mail transfer.

* <span style="color: red">NOTE</span> *  For proper translation, phone number MUST be in the format:

          &lt;COUNTRY CODE>-&lt;CITY CODE>-&lt;NUMBER>

<h3><a href="#toc">CAPABILITY FLAGS</a></h3>

Capability flags: XX,CM,V32                       

This specifies your system's capabilities. Each capability flag is
separated by commas. These flags are transmitted to the remote site
during the initial EMSI handshake for dialup mail sessions. With this
information stored in a system's nodelist, it is possible to determine
modem type, hours of operation and file-request capability.

If you do not use a dialup modem, specify CM as your capability flag.

Following is a partial list of standard capability flags:

          /-----+----------------------------------------------------------\
          | CM  |  Continuous mail system.  (On 24-hours every day)        |
          |     |                                                          |
          | XX  |  WaZOO file-requests and update-requests are accepted.   |
          |     |                                                          |
          | V32 |  Modem conforms to the V.32 standard.                    |
          |     |                                                          |
          | HST |  Modem conforms to the US Robotics HST standard.         |
          |     |                                                          |
          | PEP |  Modem conforms to the Telebit Trailblazer standard.     |
          \-----+----------------------------------------------------------/


<h3><a href="#toc">AUDIO ALARMS</a></h3>

Audio alarms? Yes  (Yes/No)

This parameter controls the PC's speaker, enabling or disabling the
audio alarms. These alarms will alert the operator of incoming calls
and new mail received. You will also be notified by a series of beeps
if you received mail addressed to you personally. If you specify No,
all automatic alarms will be disabled.

<h3><a href="#toc">ALARM HOURS</a></h3>

Alarm hours: 24 hours
   -or-
Alarm hours: 08:00 until 23:00

This parameter controls the time of day during which the audio alarms
may be heard. This has no effect if the Audio alarms are disabled.

Either specify nothing (for 24 hours) or enter both starting and ending
times. Use 24-hour format to describe times after 12 noon. If the
starting time is before the ending time, the period includes midnight.

<h3><a href="#toc">RING SIGNAL</a></h3>

Ring signal? Yes  (Yes/No)

This parameter enables or disables the PC's speaker when the phone is
ringing because of an incoming call. This has no effect unless the
Answering method is configured for Hardware or RingMaster on the
COMM/MODEM SETUP screen.

This signal is only heard during the allowed time period.


<h3><a href="#toc">CALL ALARM</a></h3>

Call alarm: T120L8CGL4E                          

This parameter would normally be blank, indicating that the standard
alarm tones should be used. However, some people get tired of hearing
the same alarm every day, so this field gives you the opportunity to
write your own musical alarm. Either specify the music codes or the
name of a text file containing the notes.

Standard ANSI music codes are used, in fact, they are the same as the
"PLAY" statement in MicroSoft's BASICA. Following is a chart of legal
music commands:

           /--------+--------------------------------------------------------\
           | A .. G |  The musical notes A thru G.  A note may be followed   |
           |        |  by an accidental ('#' or '+' for sharp and '-' for    |
           |        |  flat.)  Additionally, a note (With optional sharp or  |
           |        |  flat) may also be followed by a number denoting the   |
           |        |  note length (1 for a whole note thru 64 for a 64th)   |
           |        |  The note, with optional accidental and length, may    |
           |        |  also be followed by one or more dots ("."), each of   |
           |        |  which extends the note by one half of its existing    |
           |        |  value.  For example, two dots produce a length 9/4ths |
           |        |  the original value, and three dots 27/8ths the value. |
           |        |                                                        |
           | Ln     |  Specifies the default length of the notes following   |
           |        |  ("n" must be 1 for a whole note thru 64 for a 64th    |
           |        |   note.)  The default value is 4 (quarter note.)       |
           |        |                                                        |
           | Mz     |  Specifies the fraction of the note length that the    |
           |        |  note is actually sounding.  "z" is either "S," "N"    |
           |        |  or "L", which have these meanings:                    |
           |        |                                                        |
           |        |       MS   Music staccato   (3/4 of note length)       |
           |        |       MN   Music normal     (7/8 of note length)       |
           |        |       ML   Music legato     (all of note length)       |
           |        |                                                        |
           | On     |  Specifies the octave in which the notes following     |
           |        |  are to be played (0 thru 7).  The initial default     |
           |        |  octave is 3, which is the octave beginning at         |
           |        |  middle C.                                             |
           |        |                                                        |


             | Pn     |  Specifies that no sound is to be made for an          |
             |        |  interval.  "n" (optional) is the note length (1       |
             |        |  for a whole note thru 64 for a 64th note.)  If "n"    |
             |        |  is omitted, the current default note length is used.  |
             |        |  One or more dots may follow, each of which extends    |
             |        |  the rest by one half of its existing value.           |
             |        |                                                        |
             | Tn     |  Specifies the tempo in beats per minute (32 thru      |
             |        |  255.)  The initial default value is 120.              |
             \--------+--------------------------------------------------------/

<h3><a href="#toc">SPECIAL ALARMS</a></h3>

Special alarms: 135/ALL T180L8O4GGGAAACD.            

If you would like to be notified when certain systems call, specify
the address followed by the music codes you wish to hear. The format
for the music is specified in the preceding section. The alarm will
be heard after the call is complete, but only if new messages or files
have been received.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">CONFIG PASSWORD</a></h3>

Config password: SECRET  

In a corporate environment where there may be several people using the
EMAIL system, it may be desirable to put a "lock" on the configuration
menu to prevent accidental changes of the D'Bridge configuration. If
a password is specified here, then it must be entered when any of the
SETUP menu options are selected. It only needs to be entered once for
each time D'Bridge is run.


<h3><a href="#toc">HISTORY DAYS</a></h3>

Keep history for: 7    (days)

D'Bridge automatically maintains history files for INBOUND and OUTBOUND
EMAIL calls as well as ECHOmail and AREAFIX requests. These files are
automatically purged every night at midnight. This field defines how
many days of history to keep before purging it. The default value for
this option is 7, providing one week's history.

<h3><a href="#toc">DISPLAY TIMEOUT</a></h3>

Display timeout: 5    (Minutes)

D'Bridge features a built-in "screen-saver" which will blank your video
screen after a specified period of inactivity. The DISPLAY TIMEOUT
parameter specifies the number of MINUTES of inactivity before the
screen goes blank. If a call comes in, a scheduled event starts, or you
press any key, the screen will re-display and the timer starts over.
When the screen is blank, D'Bridge is still fully-functional - just
waiting for something to happen!  If you do not want the screen to ever
go blank, enter a zero ("0") and the display timeout will be disabled.

<h3><a href="#toc">BLANKOUT GRAPHICS</a></h3>

Blankout graphics? Yes  (Yes/No)

When the D'Bridge screen is blanked due to inactivity, you have the
option to display "blankout graphics."  If you answer YES to this
question, there will be a bouncing pattern of dots that will tell you
at a glance D'Bridge is still running and you haven't had a system
crash or something terrible like that. Most computers hate to be bored
and do nothing all day; blankout graphics make your system happy by
giving it something to do when nothing else is going on.


<a name="3.02"/><h2><a href="#toc">3.02  DIRECTORY PATHS</a></h2>

The DIRECTORY PATHS screen allows you to set which drives and subdirectories
D'Bridge will use.  Parameters include:

   - Network mail storage
   - Inbound files path
   - Temporary queue path
   - Outbound queue path
   - Script file path
   - Bad ECHOmail path
   - New ECHO area path
   - "ABOUT" and "FILES" filenames
   - Request paths
   - Specific requests
   - Inbound, outbound, ECHOmail and AREAFIX history

<h3><a href="#toc">NETWORK MAIL STORAGE</a></h3>

Network mail storage: Fido     (Fido/QuickBBS)

There are several choices for the storage method for NETmail:

    FIDO       With FIDO format, each message is stored in a separate
               file in the specified directory. This is the most
               common storage format among Fidonet-based systems, but
               has the disadvantage of being slower than the other
               formats.

    QUICKBBS   With the QUICKBBS format, messages are stored directly
               in a QuickBBS message base. This base may exist stand-
               alone or in conjunction with a QuickBBS system.

<h3><a href="#toc">NETWORK MAIL PATH</a></h3>

Network mail info: C:\DB\MESSAGES                  

If you are using the FIDO/*.MSG method to store NETmail messages, specify
the directory path to use for Fido-style NETmail messages.


<h3><a href="#toc">QUICKBBS AREA NUMBER</a></h3>

QuickBBS area number: 17 

Specify the area number you would like to use for NETmail messages
using the QuickBBS message base. (1-200)

<h3><a href="#toc">INBOUND FILES PATH</a></h3>

Inbound files path: C:\DB\FILES                           

This designates the drive and path for the directory where inbound
files will be stored. Make sure there is always enough disk space
available to store any files which may be received. This may be
changed at any time without adversely affecting the system, as long
as the specified directory path actually exists.

<h3><a href="#toc">TEMPORARY QUEUE PATH</a></h3>

Temporary queue path: C:\DB\PACKETS                       

This designates the drive and path for the temporary directory where
the outbound NETmail queue will be created.

* <span style="color: red">NOTE</span> *  All files in this directory will be automatically erased
          each time the queue is rebuilt.

<h3><a href="#toc">OUTBOUND QUEUE PATH</a></h3>

Outbound queue path: C:\DB\QUEUE                          

This designates the drive and path for the outbound queue directory.
XMAIL archives and poll, transmit, and request queue entries are
stored in this directory.

This is the directory that you would also specify to any 3rd-party mail
programs that need to manipulate the D'Bridge mail queue.


<h3><a href="#toc">SCRIPT FILE PATH</a></h3>

Script file path: C:\DB\DATA                              

This designates the drive and path where the dialing script files
are located, for dialup modems. Script files provide an alternate method
of dialing when using carriers other than standard long-distance telephone
lines.

<h3><a href="#toc">BAD ECHO PATH</a></h3>

Bad echo path: C:\DB\BADECHO                              

This designates the drive and path where invalid or unknown ECHOmail
messages should be stored. The BADECHO messages are stored in Fido
format and may be accessed using area 32767 in the editor.

<h3><a href="#toc">NEW ECHO PATH</a></h3>

New echo path: C:\DB\NEWECHO                              

This designates the drive and path where Fido-style ECHOmail message
bases will be created if Auto-add areas is configured for "Fido.".

<h3><a href="#toc">DATABASE PATH</a></h3>

   Message databases: C:\QUICKBBS                         

<h3><a href="#toc">ADDITIONAL DATABASES</a></h3>

Additional databases: C:\BBS                              

This feature is not supported at this time.


<h3><a href="#toc">DFB PATH</a></h3>

DFB path: C:\DB\DATA                                

This designates the drive and path where the DFB files are located. This is
for the D'Bridge FileBase indexing system. Under most circumstances this
should not be changed from the default Data directory.

<h3><a href="#toc">ABOUT FILENAME</a></h3>

"ABOUT" filename: C:\DB\110-68.TXT                     

The "ABOUT" file is used mainly with the "Public Amateur Network"
to contain general information about your system. The "ABOUT" file name
should specify the name of a text file to be transmitted when a file-
request for "ABOUT" is received. (For more information, see the section
about file-requests.)

<h3><a href="#toc">FILES FILENAME</a></h3>

"FILES" filename: C:\DB\110-68.LST                     

The "FILES" file is used primarily with the "Public Amateur Network"
to provide a list of all requestable files on your system. The FILES
filename should point to this text file or archive.


<h3><a href="#toc">REQUEST PATHS</a></h3>

Request paths: C:\PRIVATE\ SECRET                       

D'Bridge has a feature allowing other systems to call in and request
files from your system. If you wish to enable this option, you must
specify which directories will be available for request. You may also
specify a password that must accompany a request. If you use no pass-
word, any system will have access to the specified directory.
The format for the request paths is:

    &lt;DIRECTORY PATH> &lt;OPTIONAL PASSWORD>

Where password is an optional parameter. Any number of directories may
be specified in the REQUEST PATHS window. Make sure to use passwords
on any directory containing sensitive or confidential information.

       - or -

     @&lt;FILENAME>

Where filename is a text file containing a list of requestable directories
in the same format defined above.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<h3><a href="#toc">SPECIFIC REQUESTS</a></h3>

Specific requests: DBRIDGE C:\FREQ\DB*.ZIP               

This window allows you to specify any number of "magic filenames" that
may be requested from your system. An example of this might be where
you distribute a newsletter and the filename changes every month. You
might have a line like:

    NEWS \NEWSLTR\PC-NEWS.021

The above line means that when a file-request arrives for "NEWS" - the
file \newsltr\pc-news.021 will be transmitted instead of searching the
directories specified in REQUEST PATHS. The format for this window is:

    &lt;MAGIC NAME> &lt;FILE PATH> &lt;OPTIONAL PASSWORD>

Once again, password is optional, but should be specified if any of this
information is not public.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">OUTBOUND HISTORY FILENAME</a></h3>

Outbound history file: C:\DB\OUTBOUND.LOG                  

The OUTBOUND HISTORY FILENAME parameter specifies a text file to write
an outbound EMAIL history log. Every outbound connection is logged to
a the specified text file listing the date/time, address, data sent and
received, elapsed time and total cost. If you do not want such a log,
leave this field blank.

<h3><a href="#toc">INBOUND HISTORY FILENAME</a></h3>

Inbound history file: C:\DB\INBOUND.LOG                    

The INBOUND HISTORY FILENAME parameter specifies a text file to write
an inbound EMAIL history log. Every outbound connection is logged to
the specified text file listing the date/time, address, data sent and
received and elapsed time. If you do not want such a log, leave this
field blank.


<h3><a href="#toc">ECHOMAIL HISTORY FILENAME</a></h3>

ECHOmail history file: C:\DB\ECHOMAIL.LOG                      

The ECHOMAIL HISTORY FILENAME specifies what text file to use for the
inbound ECHOmail history. This log lists date/time, address, area name,
messages and duplicates received.

<h3><a href="#toc">AREAFIX HISTORY FILENAME</a></h3>

AREAFIX history file: C:\DB\AREAFIX.LOG                        

The AREAFIX HISTORY FILENAME specifies what text file to use for an
AREAFIX history log. This includes information about conferences added
and removed either by remote AREAFIX request or New ECHOmail link, ALT-N.

<h3><a href="#toc">DOWNLOAD PATH</a></h3>

Download path: C:\DB\DOWNLOAD                        

The DOWNLOAD PATH specifies the directory to receive downloaded files when
using terminal mode.


<a name="3.03"/><h2><a href="#toc">3.03  COMM / MODEM SETUP</a></h2>

The COMM/MODEM SETUP screen allows you to define your serial port(s) and
modem(s) for Dialup connections to your system. You may also configure:

   - Answering method
   - Line assignment
   - CostGuard limits
   - DimeSaver
   - Auto-initialization time
   - Dialing overrides
   - Printer setup
   - Inbound, outbound, ECHOmail and AREAFIX history

This screen allows the definition of modem and printer types: MCF and PCF
files (Modem Control and Printer Control Files.)

<h3><a href="#toc">PORT</a></h3>

     Port  Base/IRQ  Status   Ident  MCF name  Description
     COM3                                                          

The PORT identifies the name of the serial I/O channel connected to your
modem. It also refers to the port that is used by the FOSSIL driver.
Standard values are COM1-COM7, but any other name is allowed
also.

If you do not have a modem or don't wish to use one, leave this blank.

WARNING: Incorrect port, address or IRQ assignment WILL cause problems with
         your operating system, including unstable operation or malfunction.


<h3><a href="#toc">BASE ADDRESS</a></h3>

     Port  Base/IRQ  Status   Ident  MCF name  Description
           03E8                                                    

The BASE ADDRESS determines the CPU's I/O port address to use. If you do
not understand what this means, you should use a standard port, like COM1
or COM2. Standard values are listed below.

If you are using a "non-standard" COM port (any COM port that is not defined
or recognized by your operating system or computer BIOS), then it is crucial
that the base address and IRQ setting in the next screen are defined. You
must also enter this information regardless if you are using a plug-and-play
(PNP) modem.

            IBM PC/XT/AT                        IBM PS/2
          /------+--------\         /------+--------+------+--------\
          | COM1 |  03F8  |         | COM1 |  03F8  | COM5 |  4220  |
          | COM2 |  02F8  |         | COM2 |  02F8  | COM6 |  4228  |
          | COM3 |  03E8  |         | COM3 |  3220  | COM7 |  5220  |
          | COM4 |  02E8  |         | COM4 |  3228  | COM8 |  5228  |
          \------+--------/         \------+--------+------+--------/

WARNING: Incorrect port, address or IRQ assignment WILL cause problems with
         your operating system, including unstable operation or malfunction.


<h3><a href="#toc">IRQ</a></h3>

     Port  Base/IRQ  Status   Ident  MCF name  Description
                 4                                                 

The IRQ (Interrupt ReQuest) level determines the hardware-specific interrupt
vector that will be used. (3 and 4 are most common)  This field must con-
tain a 4-bit decimal value from 0 to 15. Standard values are listed below.

Even if you are using a "plug and play" (PNP) modem, you must still enter
in the proper IRQ it is associated with.

            IBM PC/XT/AT                        IBM PS/2
          /------+-----\         /------+-----+------+-----\
          | COM1 |  4  |         | COM1 |  4  | COM5 |  3  |
          | COM2 |  3  |         | COM2 |  3  | COM6 |  3  |
          | COM3 |  4  |         | COM3 |  3  | COM7 |  3  |
          | COM4 |  3  |         | COM4 |  3  | COM8 |  3  |
          \------+-----/         \------+-----+------+-----/

WARNING: Incorrect port, address or IRQ assignment WILL cause problems with
         your operating system, including unstable operation or malfunction.


<h3><a href="#toc">MCF NAME</a></h3>

     Port  Base/IRQ  Status   Ident  MCF name  Description
                                     USRC1438  US Robotics HST 14400  

The MCF NAME specifies the name of a D'Bridge "Modem Control File."
Included, you will find an ZIP file which contains our standard
MCF collection. If you press F10, you will receive a list of all
modems currently supported. Simply select the Modem Control File
to use for the specified serial port. When you select a different
MCF or specify one for the first time, D'Bridge will unZIP the file
if needed from MCFILES.ZIP. A list of files, modems and ident (ATI)
codes are displayed from the list in MCFILES.LST.

MCF files are simple control files that may be changed using any standard
text editor. The following control language is used. Keywords are not
case-sensitive, but must start in column 1 or they will be ignored. Invalid
syntax is ignored without error to allow backward / forward compatibility.

MCF &lt;NAME> &lt;DESCRIPTION>

ie. MCF USRC1419 US Robotics HST 14400

&lt;NAME> must match the DOS filename (without the extension.)
&lt;DESCRIPTION> is the displayed modem type.
MCF This must always be the first line of a Modem Control File.

BAUD &lt;BAUD RATE>

ie. BAUD 19200

&lt;BAUD RATE> is 300, 1200, 2400, 4800, 9600, 19200 or 38400.

<h3><a href="#toc">LOCKED</a></h3>

ie. LOCKED  (no parameters)

This causes D'Bridge to always use the specified baud rate, regardless
of the "CONNECT" results reported by the modem. If you are using this
mode, the modem must also be configured to use a fixed DTE rate. &amp;B1 is
used on HST's, for example.


  DELAY &lt;MILLISECONDS>
  
  ie. DELAY 50
  
  This specifies the inter-character delay in milliseconds when sending
  commands to the modem. The default is 20, but some modems may require
  values as high as 50 or 60.
  
  TIMEOUT &lt;SECONDS>
  
  ie. TIMEOUT 75
  
  This specifies the failsafe timeout when dialing or answering the phone.
  This defaults to 60, but might need to be increased if overseas calls
  take longer than one minute to complete.
  
  DIAL &lt;BAUD RATE> &lt;MODEM STRING>
  
  ie. DIAL 19200 ATDT
  
  &lt;BAUD RATE> is 300, 1200, 2400, 4800, 9600, 19200 or 38400.
  &lt;MODEM STRING> is the command sent to the modem before the phone number.
  
  ANSWER &lt;MODEM STRING>
  
  ie. ANSWER ATA
  
  &lt;MODEM STRING> is the command sent to the modem to answer the phone.
  
  INIT &lt;MODEM STRING>
  
  ie. INIT ATZ
  
  &lt;MODEM STRING> is a command to configure the modem as desired.


  TRANSLATE &lt;BAUD RATE> &lt;RESPONSE>|&lt;*C STRING>
  
  ie. TRANSLATE 2400 CONNECT 2400/ARQ|2400MNP
  
  &lt;BAUD RATE> is 300, 1200, 2400, 4800, 9600, 14400, 19200 or 38400.
  &lt;RESPONSE> is the connection result string from the modem.
  &lt;*C STRING> is the translated response code for the BBS "*C" code.
  
  PREINIT &lt;MODEM STRING>
  
  ie. PREINIT AT&amp;C1&amp;D2&amp;W
  
  &lt;MODEM STRING> is a command to pre-configure the modem as desired.
  
  OFFHOOK &lt;MODEM STRING>
  
  ie. OFFHOOK ATH1M0S0=0
  
  &lt;MODEM STRING> is a command to take the modem offhook.
  
  IGNORE &lt;MODEM RESPONSE>
  
  ie. IGNORE DATA
  
  &lt;MODEM RESPONSE> is a unimportant code returned from the modem to be ignored
  completely.


<h3><a href="#toc">ANSWERING METHOD</a></h3>

Answering method: Hardware  (Hardware/Software/Modem/Ringmaster/Disable)

This specifies the method D'Bridge will use to answer incoming calls.

/------------+---------------------------------------------------------------\
| HARDWARE   |  Answers using hardware ring detection.  (RS-232 pin 22)      |
|            |                                                               |
| SOFTWARE   |  Answers using software ring detection.  (RING from modem     |
|            |                                                               |
| MODEM      |  Assumes that modem will auto-answer.  (S0=1 assumed)         |
|            |                                                               |
| RINGMASTER |  Hardware ring detection with multi-pattern ring detection.   |
|            |  3 different ring patterns are detected, see LINE ASSIGNMENT. |
|            |                                                               |
| DISABLE    |  Answering completely disabled.                               |
\------------+---------------------------------------------------------------/

<h3><a href="#toc">LINE ASSIGNMENT</a></h3>

Line assignment: V11 (1/2/3/Voice)

When using the RingMaster answering method, it is necessary to assign
the three possible ring patterns to the desired DATA lines. 1, 2 and 3
correspond to the DATA/1, 2 and 3. Voice designates a ring pattern
to be ignored by D'Bridge and logged as a voice call.

* <span style="color: red">NOTE</span> *  It is recommended to use the first ring pattern as voice.

<h3><a href="#toc">COSTGUARD TIME</a></h3>

CostGuard limits: 240 (minutes)           (cost)

The COSTGUARD TIME specifies the absolute maximum amount of time an
EMAIL session may last. When the elapsed time for any inbound or
outbound call reaches the number of minutes specified, DTR is lowered
and the call is aborted by D'Bridge.


<h3><a href="#toc">COSTGUARD COST</a></h3>

CostGuard limits:     (minutes)   100.00  (cost)

The COSTGUARD COST specifies the absolute maximum cost of an outbound
EMAIL session. When the accumulated cost for any outbound call reaches
the amount specified, DTR is lowered and the call is aborted by D'Bridge.

<h3><a href="#toc">COLLISION DETECTION</a></h3>

Collision detection? Yes

This specifies whether or not D'Bridge will detect collision of outbound
dialing attempts with inbound calls.  This is usually desirable, but it
is possible that it will not work well with every kind of modem, so you
should disable it if it incorrectly detects collisions.

<h3><a href="#toc">DIMESAVER ENABLED</a></h3>

DimeSaver enabled? Yes  (Yes/No)

This specifies whether or not the DimeSaver feature should be used.
DimeSaver causes D'Bridge to answer a potential inbound call if the
modem reports NO DIAL TONE when placing an outbound call. If there
was no incoming call, subsequent DimeSaver activations will not occur.

<h3><a href="#toc">AUTO INITIALIZATION</a></h3>

Auto-Initialization: 5   (minutes)

This parameter specifies the number of minutes idle before automatically
re-initializing the modem. Sometimes, modems go "out-to-lunch" because
of brown-outs, cats and so forth. Re-programming the modem every few
minutes certainly can't hurt and sometimes solves problems of unattended
operation.

If you specify zero, this feature will be disabled and the modem will
only be initialized after each call and upon startup.


<h3><a href="#toc">BUSY WHEN OFFLINE</a></h3>

Busy when offline? No  (Yes/No)

D'Bridge does many things. During the time calls may not be answered,
the phone can either be busy or just keep ringing. If you answer Yes
to this question, the phone will be taken off hook whenever D'Bridge is
not ready to accept a call.

  - If you are using a dedicated data line, Yes is preferred.

  - If you are using a voice/data line, in most cases, use No.

<h3><a href="#toc">TOUCH TONE DIALING</a></h3>

Touch-Tone dialing? Yes (Yes/No)

If you have a Touch-Tone&lt;tm> telephone line, answer Yes to this question.
Pulse (rotary) dialing will be used if you specify No.

<h3><a href="#toc">MAXIMUM RINGS</a></h3>

Maximum rings: 4 

Some modems will report RINGING when placing an outbound call. This
allows D'Bridge to count the number of times the remote phone rings.
If this count exceeds the maximum specified by this parameter, dialing
will be aborted.

If the maximum ring count is exceeded on two consecutive attempts at
calling the same system, the call will be placed on Ten minute hold.
Unless overridden by VIEW/MODIFY QUEUE, no further attempts will be
made for at least ten minutes.


<h3><a href="#toc">FLAG DIAL</a></h3>

"Flag" dial: HST ATB1DT                         

This field is only used to define the exceptions to the normal dialing
commands. The flag specifies a substring to match in the nodelist
flags field. When D'Bridge places an outbound call, it searches the
nodelist flags fields for a match in the "Flag" dial list. The first
match found will determine the &lt;DIAL STRING> to use. The format is:

    &lt;NODELIST FLAG> &lt;DIAL STRING>

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">SPECIFIC DIAL</a></h3>

Specific dial: 2:280/280 ATX0M1DT               

This field lists exceptions to the normal and "Flag" dialing commands.
After D'Bridge searches the "Flag" dial list, it looks for the first
match in Specific dial. If you are using an address such as 2:ALL,
make sure any specific systems are listed before the wildcard entry.
The format is:

    &lt;ADDRESS MASK> &lt;DIAL STRING>

    ie. 2:280/280 should come before 2:280/ALL, etc.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">PRINTER PORT</a></h3>

Printer port: PRN                                     

Define the printer device here. If you wish to route output to a file for
later printing, you may specify the filename here.


<h3><a href="#toc">PCF NAME</a></h3>

PCF name: OKIOL400  OKIDATA OL400 LED page printer

The PCF NAME specifies the name of a D'Bridge "Printer Control File."
Included, you will find an ZIP file which contains our standard
PCF collection. If you press F10, you will receive a list of all
printers currently supported. Simply select the Printer Control File
to use for the printer port. When you select a different PCF or specify
one for the first time, D'Bridge will unZIP the file if needed from
PCFILES.ZIP. A list of printers supported is displayed from the list
in PCFILES.LST.

PCF files are simple control files that may be changed using any standard
text editor. The following control language is used. Keywords are not
case-sensitive, but must start in column 1 or they will be ignored. Invalid
syntax is ignored without error to allow backward / forward compatibility.

            PCF &lt;NAME> &lt;DESCRIPTION>

            ie. PCF OKIOL400 OKIDATA OL400 LED page printer

            &lt;NAME> must match the DOS filename (without the extension.)

            FIXED FONT &lt;PRINTER CODES>
            PROPORTIONAL FONT &lt;PRINTER CODES>
            TITLE FONT &lt;PRINTER CODES>
            START BOLD &lt;PRINTER CODES>
            END_BOLD &lt;PRINTER CODES>
            START_ITALIC &lt;PRINTER CODES>
            END_ITALIC &lt;PRINTER CODES>
            GRAPHICS &lt;ON or OFF>

            ie. FIXED FONT &lt;ESC>&amp;l0O&lt;ESC>(10U&lt;ESC>(s0p10h12v0s0b3T
                PROPORTIONAL FONT &lt;ESC>&amp;l0O&lt;ESC>(0U&lt;ESC>(s1p10v0s0b5T
                TITLE FONT &lt;ESC>&amp;l0O&lt;ESC>(0U&lt;ESC>(s1p14.4v0s3b4T
                START BOLD &lt;ESC>(s7B
                END BOLD &lt;ESC>(s0B
                START ITALIC &lt;ESC>(s1S
                END ITALIC &lt;ESC>(s0S
                GRAPHICS ON


<h3><a href="#toc">MULTILINE SUPPORT</a></h3>

  When this feature is enabled, you can run more than one "copy" of D'Bridge
  on your computer (using Windows, OS/2, Desqview or some other multi-tasker)
  and serve more than one Dialup/modem connection at once. This is handy for
  those of you running multi-line BBS's and you need a "front end" to handle
  the callers. It does NOT however, act as a Telnet server for Internet calls.
  
  When you answer YES to this question, you will need to start D'Bridge with
  the appropriate line number, ie. DB /1 for line 1, DB /2 for line 2, DB /8
  for line 8, etc etc. D'Bridge will then load the appropriate modem/event
  information for that line and use it. Do not start two of the same lines
  otherwise a file-sharing error will happen in your operating system.
  
  It is NOT necessary to enable multi-line support for Internet features
  since that is controlled by the MAXIMUM CONCURRENT SESSIONS screen in
  the INTERNET CONNECTIVITY menu.
  
  WARNING: It is absolutely CRUCIAL that no two lines share the same "port"
           unless you are running virtual-modem/Internet software that
           specifically tells you its okay to do so.


<a name="3.04"/><h2><a href="#toc">3.04  SCHEDULE MAINTENANCE</a></h2>

The SCHEDULE MAINTENANCE screen allows you to program the weekly event
schedule as well as set up routing, and access rules.  Parameters include:

   - Schedule day/time
   - Time between caalls
   - Maximum tries, sessions and failures
   - Priorities allowed
   - Polling
   - Routing
   - Forwarding
   - Many more...


<h3><a href="#toc">AUTOPOLL</a></h3>

  This screen allows you to define a list of systems that D'Bridge should
  poll automatically. This is a "master override" to any event-specific
  polling that may be defined in the SCHEDULER screens.
  
  Auto-Polling works for both Dialup and BinkD. Be sure that the proper
  credentials are specified in BINKD SESSION INFO when you're polling BinkD
  systems (ie, Internet address, session password, etc etc).
  
  The format of this screen is:
                              
  &lt;Fido address> &lt;Priority> &lt;Time> &lt;Hours or Minutes> &lt;Poll on startup?>
  
  FIDO ADDRESS: The Fidonet address of the system to poll, obviously.
  
  PRIORITY: The priority of the poll. Answer Normal, Crash or Immediate.
  
  TIME: Any value.
  
  HOURS OR MINUTES (H/M): Answer H for hours or M for minutes.
  
  POLL ON STARTUP? Answer YES if you wish to poll this system for mail when
                   D'Bridge starts up; otherwise answer NO or just leave
                   this question blank.
  
  Examples: 1:123/500  NORMAL 15 MINUTES YES
            1:226/426  NORMAL 1 HOUR
            1:229/3000 CRASH  3 HOURS
  
  * <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">EVENT TAG</a></h3>

Event "tag": NMH     

The "TAG" is an arbitrary 8-letter name by which you identify the event.
In the above example, I've used "NMH" to stand for "National Mail Hour."
This "TAG" must be unique; it is used on the screen and in the log to
identify events.


<h3><a href="#toc">EVENT ENABLED</a></h3>

Enabled? Yes

This Yes/No question simply specifies whether this event should be
currently enabled or not. Normally, you would answer YES but if you
ever want to temporarily disable the event, you may change it to NO.
This option is provided so you may disable events without actually
removing them.

<h3><a href="#toc">EVENT TYPE</a></h3>

Type: Mail      (Mail/DOS/Exit/ClockSync/EmailNNTP)

There are five types of events; each functions differently:

     Mail

     A "mail" event defines a period of time when certain mail
     may be sent. The default is to send ALL mail, unless you
     specify ADVANCED ROUTING.

     DOS

     A "DOS" event defines a list of DOS commands, programs and
     batch files to execute at a pre-defined time. These tasks
     are all "spawned" while D'Bridge remains in memory. This
     will only work if you have enough memory.

     Exit

     An "exit" event specifies that you want D'Bridge to terminate
     at the specified time. This would normally be used in a
     batch file to transfer control to another program - instead
     of "spawning" it as above. With EXIT, you specify which DOS
     errorlevel you want to use.

     ClockSync

     A ClockSync event will set the system clock using the atomic
     clock or another D'Bridge system. The accuracy should be within
     a tenth of a second (plus the propagation delay) of the Timebase
     system.


<h3><a href="#toc">EVENT DAYS</a></h3>

Weekday(s): [ ]All  [X]Sun  [ ]Mon  [ ]Tue  [X]Wed  [ ]Thu  [ ]Fri  [X]Sat

With the EVENT DAYS field, you put an "X" next to all days that you wish
to run this event. If you specify ALL, then all the days of the week
are marked. To access individual days, erase the "X" next to ALL by
pressing the SPACE BAR.

<h3><a href="#toc">EVENT START</a></h3>

Start time: 14:30

Specify the time you wish to activate the event. This time should be
specified in 24-hour format and must not conflict with any other
scheduled event. To specify a START TIME, just enter a time using 3 or
4 digits. For example:

300 is 3:00 AM;  2250 is 10:50 PM

<h3><a href="#toc">EVENT END</a></h3>

End time: 15:20

Specify the time you wish a mail event to end. This time should be
specified in 24-hour format and must not conflict with any other
scheduled event. To specify an END TIME, just enter a time using 3 or
4 digits. For example:

300 is 3:00 AM;  2250 is 10:50 PM

<h3><a href="#toc">EVENT ERRORLEVEL</a></h3>

Errorlevel: 200

For EXIT EVENTS, you simply specify the DOS ERRORLEVEL to return when
terminating. This number would normally be used by an "IF ERRORLEVEL"
directive in a batch file.


<h3><a href="#toc">EVENT DOS COMMANDS</a></h3>

DOS commands: MAILCHEK -S                            

For DOS events, you may specify any number of DOS commands, programs
or batch files to execute. It is even possible to use DOS primitives
like CD (change directory) and COPY. It is up to you to make sure none
of the commands specified require human interaction. For example, if
you specify the command to start your word processor, odds are the word
processor will continue running until someone comes along...

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">BETWEEN CALLS</a></h3>

Between calls: 15  to 45  (seconds)

Here, you specify the period of time to wait between outbound calls.
This is entered as a "range."  If you say "30 to 60," then D'Bridge
will wait a random amount of time between 30 and 60 seconds before
placing a subsequent call. This period of time is used to receive
incoming mail; if this event is supposed to send mail only, you may
specify a very short time period.

<h3><a href="#toc">EVENT CRITICAL</a></h3>

Critical? Yes (Yes/No)

For DOS and EXIT EVENTS, you should specify "YES" if you want the event
to execute even if D'Bridge is not running at the time of the event. A
CRITICAL event is one that D'Bridge will execute even after the START
TIME specified; it is only executed once. Specify "NO" if you want the
event to occur ONLY if D'Bridge is running at that time.


<h3><a href="#toc">MAX DIALING TRIES</a></h3>

Max tries: 30 

The MAX TRIES parameter indicates the maximum number of times D'Bridge
should attempt to dial a specific system during the current MAIL EVENT.

<h3><a href="#toc">MAX SESSIONS</a></h3>

Max sessions: 3  

The MAX SESSIONS parameter specifies the maximum number of actual
connects allowed during the given mail event. This is handy for
limiting ECHOmail turnaround to long-distance systems.

<h3><a href="#toc">MAX SESSION FAILURES</a></h3>

Max failures: 2  

The MAX FAILURES parameter specifies the maximum number of aborted or
bad sessions allowed with each system during the specified mail event.
This parameter may help control costs when the answering system has
crashed or is not functioning properly.

<h3><a href="#toc">EVENT CLOCKSYNC TIMEBASE</a></h3>

TimeBase: 1:3601/14        

For ClockSync events, this field designates the TimeBase to use for
setting the system clock. Either specify the EMAIL address of another
D'Bridge system, or leave the field blank to use the Atomic Clock.

* Note *  If the clock is wrong on the D'Bridge system specified,
your clock will also be set to an incorrect time. Make sure you use
a trust-worthy system.


<h3><a href="#toc">ACCEPT EMAIL CALLS</a></h3>

Accept EMAIL calls? Yes (Yes/No)

This specifies whether or not D'Bridge should answer the phone to accept
EMAIL/BBS calls during this event. If you answer No, the phone will
not be answered and will remain on-hook for the duration of the event.

<h3><a href="#toc">PRIORITIES ALLOWED</a></h3>

Priorities allowed? NCI (N/C/I)

This field specifies what mail priorities (if any) may be sent during
this event. For most events, specify NCI (Normal, Crash and Immediate),
as allowable priorities. Keep in mind that outbound calls are still con-
trolled by the cost-accounting system.

This field simply serves as a master override to cost-accounting.

<h3><a href="#toc">HOST ROUTE PRIVATES</a></h3>

Host-route privates? No  (Yes/No)

If you want NETmail messages destined for private or unlisted systems
to be host-routed, answer Yes to this question. If you answer No,
the mail will be held, waiting for the remote system to poll to pick
it up.

* Note *  Host-routed mail may not be picked-up by the destination.

<h3><a href="#toc">CM SYSTEMS ONLY</a></h3>

CM/Non-CM systems only? Both   (CM/Non-CM/Both)

"CM" stands for Continuous Mail, a system designated as being able
to receive EMAIL calls anytime. Certain events might be designated
to send mail only to CM systems just as other scheduled events might
be reserved for sending mail only to NON-CM systems. Specify Both
if you want to send all mail regardless of the CM nodelist flag.


<h3><a href="#toc">EVENT SCAN ECHOMAIL</a></h3>

Scan ECHOmail areas? Yes (Yes/No)

If you want D'Bridge to scan all ECHOmail areas for new outbound
traffic each time this event begins, answer Yes here. Only when
the event starts for the first time each day will the ECHOmail scan
be performed.

<h3><a href="#toc">EVENT DYNAMIC</a></h3>

Dynamic event? No  (Yes/No)

If you answer Yes to this question, a mail event will terminate when
there are no more outbound calls to make. When a dynamic event ends
early, the UN-EVENT is resumed and the queue is rebuilt.

<h3><a href="#toc">ALLOW REQUESTS</a></h3>

Process requests? Yes (Yes/No)

If you want to allow file-requests during this event, answer Yes to
this question. Otherwise, file-requests (FREQs) will be rejected.

<h3><a href="#toc">ACCEPT HUMAN CALLS</a></h3>

Accept human calls? Yes (Yes/No)

If you want to allow human (BBS) calls during this event, answer Yes to
this question. If you answer No, human calls will be rejected for the
duration of the event and callers will be notified that the system is cur-
rently accepting EMAIL calls only.


<h3><a href="#toc">EVENT ALLOW XMAIL</a></h3>

Allow XMAIL? Yes (Yes/No)

If you want to allow XMAIL (compressed mail) traffic to be sent
during this event, answer Yes to this question. If you answer
No, all XMAIL will be held, disallowing pickup by remote systems.

Specify No only for dedicated NETmail events. In most cases, Yes
is the appropriate answer.

<h3><a href="#toc">EVENT ALLOW ECHOFILE</a></h3>

Allow Echofile processing? Yes (Yes/No)

If you wish to allow Echofile processing and forwarding during this
event, answer Yes to this question. If you answer No, then all Echofile
processing will be disabled, and Echofile traffic will "pile up"
in the INBOUND directory until another event allows such processing.

When upgrading to this D'Bridge release from version 2.68 or prior, Echofile
processing is automatically DISABLED for each mail event. This is done for
security reasons and to allow you the chance to properly configure Echofile
processing before enabling the feature.

<h3><a href="#toc">EVENT ALLOW DOS</a></h3>

Execute DOS commands: Dialup (Dialup/Always)

If you specified any DOS commands to run upon receiving mail, you can
choose to run them either when mail comes in via. Dialup sessions with
a modem, or to run the commands regardless of how the mail was received.

The default setting for this question is Dialup, which is the same
setting used since the early releases of D'Bridge.


<h3><a href="#toc">PACKETS FOR</a></h3>

Packets for: ALL                                            

Here's where we get into the filters and addresses!  In PACKETS FOR,
specify a filter as defined previously in this section. This will
determine for which systems you want to create packets.

* Note * This does not necessarily mean D'Bridge will call the
system, since the packet might be on "HOLD" or "ROUTED" to a diffe-
rent system.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">HOLD FOR</a></h3>

Hold for: NONE                                            

If you wish to hold all outbound traffic for certain systems, specify
them here with a filter. With a system on "hold", no calls will be
made to it during this event, regardless of priority.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">EVENT POLL</a></h3>

Poll: 1:110/68                                            

If you wish to poll certain systems each time this event is started, list
the EMAIL addresses here. Polling means: to call a system in order to
pick up any mail that is "on hold."

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<h3><a href="#toc">PICKUP FROM</a></h3>

Pickup from: ALL                                          

Normally, D'Bridge will pick up mail from ALL systems it calls.
However, if you wish, you may specify a filter to control from which
systems you would like to receive "hold" mail from when you call to
deliver outbound traffic.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">ALLOW PICKUP FROM</a></h3>

Allow pickup from: ALL                                     

Normally, D'Bridge will allow ALL systems to pick up their "hold" mail
when they poll or call to deliver mail. If you want to run a completely
secure system, you might not want to allow pickup for certain systems.
Since D'Bridge has password-security, it would be rare to use anything
other than ALL here.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<h3><a href="#toc">ROUTE TO</a></h3>

Route to: NONE                                     

Normally, D'Bridge sends mail directly to the receiving system when you
write EMAIL messages. "Routing" is a way to cut costs by sending mail
through other EMAIL systems or networks to be delivered to its final
destination.

"Route to" may control specific routing and/or host-routing. This field
may contain multiple lines, so the last line should contain HOSTS or
host/hub-routing or NONE for direct delivery.

Specific routing may be done by specifying:

Route to: &lt;ADDRESS> FOR &lt;FILTER>

ie.
Route to: 110/68 for 110/ALL 2:ALL 3:ALL

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">ROUTE FILES FOR</a></h3>

Route files for: NONE                                     

D'Bridge has the capability of routing attached data files along with
EMAIL messages. This should be used only by special arrangement between
the system operators involved.

Specify the filter describing the systems willing to route in-transit
files from your system. This is only applicable if you are using a rou-
ting other than NONE.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<h3><a href="#toc">FORWARD FOR</a></h3>

Forward for: ALL                                      

D'Bridge will forward in-transit mail for the systems specified in this
filter. In most cases, ALL should be specified.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">FORWARD TO</a></h3>

Forward to: OURNET                                    

D'Bridge will forward in-transit mail to the systems specified in this
filter. Using OURNET means D'Bridge will only forward in-transit mail
destined for systems with the same NET number as your own. (It is assumed
there is no cost associated with calls within your NET.)

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">FORWARD FILES FOR</a></h3>

Forward files for: ALL                                   

D'Bridge will forward in-transit files for the systems specified in this
filter. In most cases, ALL should be specified.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">FORWARD FILES TO</a></h3>

Forward files to: OURNET                                    

D'Bridge will forward in-transit files to the systems specified in this
filter. Using OURNET means D'Bridge will only forward in-transit mail
destined for systems with the same NET number as your own.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<h3><a href="#toc">MAIL RECEIVED DOS COMMANDS</a></h3>

DOS commands:                                       

During certain events, you may wish to have D'Bridge terminate or
execute DOS commands every time mail is received from a remote system.
The DOS COMMANDS field allows you to specify any number of DOS commands
or programs to be executed when mail arrives. Any DOS command or
program may be used, but you must make sure they don't require any human
interaction or D'Bridge will be "stuck" until you give the program the
input it wants.

As well as DOS commands, the following functions are available from
the DOS COMMANDS field:
/----------------+-----------------------------------------------------------\
| +(command)     |  Causes D'Bridge to swap to disk, leaving more memory     |
|                |  available to the application program.                    |
|                |                                                           |
| -(command)     |  Causes the command to be executed inside the queue       |
|                |  window.  Only use this for programs that do standard     |
|                |  DOS I/O.                                                 |
|                |                                                           |
| *R             |  This will force a rescan of the queue.  Same as ALT-Q    |
|                |                                                           |
| *L             |  This will be replaced with the current line number       |
|                |                                                           |
| *S             |  This will force a complete ECHOmail rescan.              |
|                |                                                           |
| *X&lt;errorlevel> |  This causes an exit with the specified DOS errorlevel.   |
\----------------+-----------------------------------------------------------/

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<a name="3.05"/><h2><a href="#toc">3.05  NODELIST CONFIGURATION</a></h2>

The NODELIST CONFIGURATION screen allows you to setup the nodelist database
that D'Bridge uses to make outbound calls.  Parameters include:

   - St. Louis nodelists
   - Private nodelists
   - Pointlist
   - Zonegate data
   - Exclude/Translate NETs
   - Prefixes
   - Baud, Flag and Phone overrides

<h3><a href="#toc">ST LOUIS NODELISTS</a></h3>

"St. Louis" nodelists? C:\DB\FILES\ DBNET DBDIFF                 

"St. Louis" refers to a standard format for NODELIST text files. This
includes a "nodelist" and a "nodediff". You may have any number of
St. Louis-style nodelists at one time by listing each separately in
the window. Each line in the window describes one nodelist and should
contain:

&lt;DIRECTORY PATH> &lt;NODELIST BASE> &lt;NODEDIFF BASE>

     For example:

     C:\DB\FILES\ NODELIST NODEDIFF 7567 153
     C:\DB\FILES\ ANETLIST ANETDIFF 38791 153

The two numbers on the right are the CRC of the nodelist name and the
currently installed nodelist. These numbers are maintained by D'Bridge
and the user need not concern himself with them.

D'Bridge automatically determines which nodelist is the most-recent based
on the extension of the "list" or "diff" file. The St. Louis format is
based on weekly update files called "diff" files; these files contain
the differences between last week's and this week's nodelists and are
generally smaller than the nodelist itself. If a diff file exists for
a nodelist, it will be automatically decompressed and installed when
it arrives (if applicable).

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<h3><a href="#toc">PRIVATE NODELISTS</a></h3>

Private nodelist(s): MYLIST.PVT                      

You may also use any number of private nodelists. In this field you
may specify any number of text files to be included in your compiled
nodelist. You may notice D'Bridge adds two numbers after the filename
once the nodelist is compiled; these numbers are the date and time of
the private nodelist file. If these numbers are changed or the node-
list is replaced or edited, D'Bridge will automatically recompile the
nodelist when it is started next.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">POINTLIST</a></h3>

Pointlist: POINTS.LST                          

If you are part of a point system, you will want to specify the name of
your POINTLIST file.
This is a list of POINTS under the same ZONE:NET/NODE as your system.
Just like the PRIVATE NODELISTS, the numbers after the filename indicate
the date and time of the POINTLIST when the nodelist was last compiled.
If these are changed, D'Bridge will automatically recompile the nodelist.

<h3><a href="#toc">FAKE POINTNET</a></h3>

Fake pointnet: 32001

To maintain compatibility with older EMAIL systems, a "FAKE POINTNET"
has been established to allow Fidonet-based mailers to act as points
of a D'Bridge BOSS. Since there is no definition of a "point" address
in Fidonet, a fake NET number is used. Specify the fake net to use
here. When a system calls in using that NET number, the node number
used will be translated to a point address.

If you do not wish to use a Fake Pointnet for legacy systems, then just
leave this question blank.


<h3><a href="#toc">FAKE POINTS</a></h3>

Fake points: 1 2 4 22                              

This field specifies which systems require the FAKE POINT addressing.
Specify the point numbers of the systems for which FAKE POINT addressing
is required. This affects the way in which ECHOmail packets are created.
This is never required with points running D'Bridge EMAIL System; it is
provided for compatibility with older Fidonet-based systems.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">USERNAME INDEX</a></h3>

Create username index? Yes

D'Bridge will optionally create a USERNAME index when it compiles the
nodelist. If you answer "YES" to this field, the index will be created
and D'Bridge (and the editor) will be able to cross-reference operator
name to address. This feature is quite handy, but makes the nodelist
compile much slower. If you don't want the index created, answer "NO."

<h3><a href="#toc">USERLIST FILE</a></h3>

Additional user file: USER.LST                        

You may specify the name of a text file containing an additional user-
list to merge with the nodelists. Typically, this file will contain a
list of people who use certain EMAIL systems but are not listed as
the primary operator. The format for this file is:

&lt;ADDRESS> &lt;USER NAME>

ie.  1:135/68.2  George Meyers
     .20         John Smith
     107/27.5    Oliver South


<h3><a href="#toc">OUTBOUND GATEWAY</a></h3>

Outbound gateway: 1:110/68       

Most networks do not use an outbound gateway, but if your NET has a
system designated to send all outbound mail, then put its address here.
You would use this in conjunction with the ROUTE TO field in the schedule
maintenance subsystem. (ROUTE TO: OGATE FOR OTHERS)

<h3><a href="#toc">USE ZONEGATES</a></h3>

Use zonegates? No 

Fidonet (as well as other international networks) maintain so called
ZONEGATES that allow mail to be sent from one ZONE to another without
placing an overseas call. If you are part of Fidonet, and you are sen-
ding mail from the U.S. to Europe, you have the option of sending the
mail through the ZONE 1 gateway (1/2) or going direct to your destination.
Specify "YES" if you wish all interzone traffic (without attached files)
to be routed through the ZONEGATE; specify "NO" if you always want to use
direct routing.

<h3><a href="#toc">EXCLUDE NETS</a></h3>

Exclude ZONE:NET(s): 2:ALL 3:ALL                       

Some systems (that use a large NODELIST like Fidonet) may want to
completely eliminate certain ZONES and/or NETS from their nodelist.
If there is no reason to communicate with people in other countries,
you can greatly reduce the NODELIST size and compile-time by excluding
those addresses you don't use. For example, if you live in the U.S.
and don't plan to do any mail to Europe or Australia, you may exclude
these continents completely by using the statement from the example
above.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<h3><a href="#toc">TRANSLATE NETS</a></h3>

Translate NET(s):                             

This field gives you the option to actually translate one NET to
another. This will let you move a NET from one zone to another or
simply change the NET number to something else. This will not be
used for most systems, but is a feature found in other EMAIL systems
and I am including it for compatibility. The syntax is:

&lt;original ZONE:NET> &lt;new ZONE:NET>

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">COUNTRY CODE</a></h3>

Country code: 1     

Here, you MUST specify your country code. This is the prefix found
before the "area code" in the nodelist. For the U.S. and Canada,
specify "1" - other countries, specify your country code (in the same
way you do with DOS)

<h3><a href="#toc">LOCAL PREFIX</a></h3>

Local prefix:               

If there is a prefix you must dial before NO-COST (local) calls, speci-
fy it here. In the U.S. and Canada, this field will be left blank in
most cases. (Some PBX systems might require you to dial "9" to get a
local outside line.)


<h3><a href="#toc">DOMESTIC PREFIX</a></h3>

Domestic prefix:                      

If there is a prefix in your country that you must dial before all
domestic calls, specify it here. For the U.S. and Canada, this field
should be left blank; we need no PREFIX. (Some PBX systems might
require you to dial an "8" to get a long-distance line.)

<h3><a href="#toc">INTERNATIONAL PREFIX</a></h3>

International prefix: 011      

Specify the prefix to dial before any international calls are made.
In the U.S., use "011" - other countries, check with your phone company.
An international call is defined as one where the COUNTRY PREFIX of the
system being called differs from your own.

<h3><a href="#toc">PHONE NUMBER OVERRIDES</a></h3>

Phone number overrides: 110/68 1-513-424-5167            

If you wish to override the phone number for an existing address, or
define the phone number for an unlisted NODE or POINT, the PHONE NUMBER
OVERRIDES field is the place to do this.

If you are using a SCRIPT with this particular address and phone
number, enter the filename of the script file in quotation marks.

&lt;ADDRESS> &lt;PHONE NUMBER> &lt;ACCOUNTING/CONTROL PREFIX>

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<h3><a href="#toc">BAUD RATE OVERRIDES</a></h3>

Baud rate overrides: 110/68 9600                   

This is where you may specify temporary overrides to the baud rate for
specified addresses.

&lt;ADDRESS> &lt;BAUD RATE>

* <span style="color: red">NOTE</span> *  This does not affect modems with a locked baud rate.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">FLAG OVERRIDES</a></h3>

Flag overrides: 110/68 CM,XX,HST              

This is where you may specify temporary overrides to the nodelist flags
for specified addresses.

&lt;ADDRESS> &lt;FLAGS>

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">SYNONYMS</a></h3>

Synonyms: ARTHUR   1:3601/14             

This field defines a list of synonyms that will substitute a KEYWORD
for an EMAIL ADDRESS. These mnemonic keywords allow for quick and easy
entry of commonly used systems.

&lt;KEYWORD> &lt;ADDRESS>

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<h3><a href="#toc">AUTO COMPILE NODELIST</a></h3>

Auto-compile nodelists:          (Startup/Midnight/Never)

Before a nodelist can be used, it must be compiled and indexed in the
nodelist database files. This process can take anywhere from 5 seconds
to 45 minutes, depending on the speed of your computer. Three options
are available to specify when to test the nodelist for currency:

  /----------+---------------------------------------------------------------\
  | STARTUP  |  Tests and/or rebuilds the database every time D'Bridge is    |
  |          |  fired up.  (This includes the nightly auto-restart.)         |
  |          |                                                               |
  | MIDNIGHT |  Tests and/or rebuilds the database after the auto-restart    |
  |          |  routine.                                                     |
  |          |                                                               |
  | NEVER    |  Only rebuilds the database upon request or if it is missing. |
  \----------+---------------------------------------------------------------/

Note that if you create a "dummy" (semaphore) file called DBRIDGE.RNC in
your D'Bridge directory, D'Bridge will "restart" itself after the compiling
is completed.


<a name="3.06"/><h2><a href="#toc">3.06  PACKET MAIL CONTROL</a></h2>

The PACKET/MAIL CONTROL screen allows you to set up general mailer controls.
Parameters include:

   - Outbound/Inbound mail archives
   - NETmail purge criteria
   - Renaming of duplicate files
   - Pre-unpack command
   - QWK networking
   - Queue aliasing
   - ECHOmail controls
   - AREAFIX controls

<h3><a href="#toc">OUTBOUND MAIL ARCHIVE</a></h3>

Outbound mail archive: C:\DB\OLDMAIL\OUTBOUND.TXT              

This specifies the name of the text file (if any) to write messages
flagged ARCHIVE/SENT to before they are erased. This is quite useful
as a history of NETmail; it includes the full message text and the
date and time it was sent.

<h3><a href="#toc">INBOUND MAIL ARCHIVE</a></h3>

Inbound mail archive: C:\DB\OLDMAIL\INBOUND.TXT              

The INBOUND MAIL ARCHIVE parameter specifies the text file (if any) into
which the DBUTIL PURGE option will archive NETmail messages before era-
sing them. If you do not wish to save old NETmail messages, leave this
field blank.


<h3><a href="#toc">NETMAIL PURGE CRITERIA</a></h3>

Purge NETmail after: 30  days

-or-

Purge NETmail except: 100  messages

In the DBUTIL PURGE program, there are two options for deciding which
messages to erase from the system. When the cursor is on this field,
you may press the F10 key to switch between the methods: PURGE EXCEPT
and PURGE AFTER. With PURGE EXCEPT, DBUTIL will erase all but "x"
messages; specify "x" in this field as how many messages to save after
purging. With the PURGE AFTER option, DBUTIL will purge messages based
on their age. PURGE AFTER 30 DAYS means to erase all messages over 30
days old when DBUTIL PURGE is run.

<h3><a href="#toc">RENAME DUPLICATE FILES</a></h3>

Rename duplicate files? Yes

There will be occasions when you receive different files with the same
name. If you answer YES to this question, any files received having a
duplicate name in the INBOUND FILES DIRECTORY will be renamed by "se-
quencing" the last character of the extension.
A duplicate README.TXT would become README.TX1 if it existed; if "1"
was already there as well, "2" would be used, etc. If you answer NO,
the existing file will simply be replaced by the one just received.


<h3><a href="#toc">MAIL PROCESSING</a></h3>

Inbound mail handling? Automatic  (Automatic/Manual/External/Disabled)

This parameter controls the method used for receiving and processing
inbound mail traffic. For most cases, Automatic would be the best
choice because mail is unpacked and possibly forwarded continuously
allowing immediate access to all ECHOmail and forwarded NETmail for
the nodes served by your system. The options available are:

  /-----------+--------------------------------------------------------------\
  | AUTOMATIC |  Automatically processes mail after each call. Exceptions    |
  |           |  are low disk-space, event override or QuickDial active.     |
  |           |                                                              |
  | MANUAL    |  Processes mail only when activated by the operator.         |
  |           |                                                              |
  | EXTERNAL  | Completely disables internal processing and causes inbound   |
  |           | XMAIL and EMAIL packets to be received as normal data files. |
  |           |                                                              |
  | DISABLED  | Completely disables processing of inbound mail.              |
  \-----------+--------------------------------------------------------------/

<h3><a href="#toc">PACKET PREPROCESSOR</a></h3>

Pre-unpack command:                                      

If you wish to run an external program before processing inbound .PKT
files, you can specify a DOS command. The use for this varies from running
archival/statistical analyzers to executing a "Message Police" program
of some type. WARNING: Modifying packets might upset some people.

 Standard scanning? Yes  (No/Yes)

This should be always be set to YES, unless you have a large Echomail
configuration with thousands of areas. When set to NO, a slightly different
method is used to improve the speed of scanning and reduce disk access.

Unpacked semaphore: BBS-MAIL.TMP

Some BBS software, such as Synchronet, looks for a file to "trigger" certain
mail functions. If your BBS software needs a dummy/semaphore file created
after D'Bridge unpacks and processes mail, specify that file here.


<h3><a href="#toc">KILL NULL MESSAGES</a></h3>

Kill null messages? Yes  (Yes/No)

Usually, you would answer YES to KILL NULL MESSAGES. A null message
means a message that has a TO, FROM and SUBJECT, but no text. These
are usually just messages associated with a file-attach and should
be ignored anyway. If you answer YES to this question, all messages
that are unpacked and have no text will be ignored.

<h3><a href="#toc">KILL IN TRANSIT MESSAGES</a></h3>

Kill in-transit messages? Yes  (Yes/No)

An IN-TRANSIT message is a message which was neither originated from
nor destined for your system. This message exists on your system just
to be forwarded elsewhere. If you answer YES to this question, IN-
TRANSIT messages will be flagged KILL/SENT when they arrive. If you
answer NO here, forwarded mail will "pile-up" until it is purged or
manually killed.


<h3><a href="#toc">LASTREAD FILENAME</a></h3>

  In this question, enter a filename to use to store the last message read
  in the area by the Echomail scanner, XMAIL and internal message editor,
  for any areas that use Fido *.MSG storage. This is simply known as
  a "lastread pointer". If you are NOT using Fido *.MSG storage then it is
  not necessary to answer this question or change its setting.
  
  The default answer for this question is 1.MSG and should NOT be changed
  unless you are running BBS software that uses 3rd-party software to "import"
  the mail into your board. For example, Searchlight by Frank LaRosa /
  Telegraphix uses SLMAIL to import Fido mail into the BBS, Renegade uses
  either Renemail or CDRMAIL to import messages. When you are using such
  software, sometimes those programs may get "confused" and think that 1.MSG
  is actually a message, when in fact its just there to keep track of the
  last message in the area. The result would be that the message gets
  imported into your BBS software anyway. So, only change the filename if
  this is the case and you're having problems.
  
  WARNING: When you change the name of the last-read pointer, you will need
           to rescan your Echomail areas so the changes can take effect. From
           the mailer select UTILITIES and select PROCESS MAIL MANUALLY.

<h3><a href="#toc">IN TRANSIT RESCAN</a></h3>

In-transit rescan? Yes  (Yes/No)

If your system acts as a hub or boss-node, you might want to provide
immediate turnaround when "routed" mail is received. If you answer
YES to IN-TRANSIT RESCAN, the NETmail area will be rescanned after each
in-transit message is received. This will cause the message to be made
available to the destination system immediately rather than at the be-
ginning of the next event.

Please note that if you enable the Areafix feature, any Areafix requests that
arrive that are NOT destined for your system will be treated as IN-TRANSIT
and forwarded to the appropriate system as determined by the ROUTING of the
current event. You may view these messages in the NETmail area.


<h3><a href="#toc">LIMIT NO COST CALLS</a></h3>

Limit no-cost calls? No   (Yes/No)

D'Bridge has a limit for the number of connections with a given system
in each mail event. This limit exists to make sure ECHOmail traffic
only turns-around a few times each mail event. Since local calls are
usually free, you can circumvent this limit for no-cost calls. Answering
Yes here will make unlimited local calls for ECHOmail turnaround.

<h3><a href="#toc">SECURED ECHOMAIL ONLY</a></h3>

Secured mail only? No  (Yes/No/Detailed)

Some hubs may wish to run a more secure system by only allowing
mail from passworded systems, either SESSION or PACKET passwords.
It makes sense that routine mail links should be secured for the benefit
of the whole network. If you answer Yes to this question, all ECHOmail
received from systems who use an incorrect password will be tossed
into the BADECHO area for inspection.

If you answer Detailed, D'Bridge will report the password of all
packets received. This should be used for diagnostics or troubleshooting
incorrect passwords between systems.

If you wish to allow packets to be processed from systems who do not use
any packet passwords at all, answer YES to the PROCESS NON-PASSWORDED
PACKETS question.

<h3><a href="#toc">LEAVE SEENBYS</a></h3>

Save ECHOmail SEENBYs? Yes (Yes/No)

If you wish to save the text containing the SEEN-BY lines in your
message base, answer YES. It really doesn't matter how you respond
to this question; the system will perform the same way.

* <span style="color: red">NOTE</span> *  This field only affects the Quick storage method.


<h3><a href="#toc">AUTOPURGE</a></h3>

  When you answer YES to this question, D'Bridge will automatically purge
  your message forums of old messages (based on the criteria you define)
  when new mail arrives. If you answer NO, you will need to use DBUTIL PURGE
  to do this. The default setting is NO.

<h3><a href="#toc">SAVE DUPLICATE MESSAGES</a></h3>

Save duplicate messages? No  (Yes/No)

Personally, I would answer NO to this question, but if you would like
to see what messages are received more than once, answer YES here. If
you save the duplicate messages, they will be tossed into the BADECHO
area for your inspection.


<h3><a href="#toc">QWK ON OR OFF</a></h3>

  QWK is an "Offline message reader" format, invented to save on-line users
  their precious online "time" on BBS's reading and replying to messages. On
  a BBS with QWK support, a user can login, download their unread mail, and
  use a 3rd-party program to read and reply offline. Then they simply call back
  in to that BBS, upload their replies, and the BBS software processes them
  as if they were written on-line. Needless to say QWK was extremely popular.
  
  Answer YES if you want the QWK system turned on, or NO if not.
  
  There are a few things to understand before you set up QWK in D'Bridge:
  
  - D'Bridge does NOT upload or download the QWK or reply packets automatically
    so you will need to this yourself or using an automated program of some
    sort. If there is a simple solution that can be coded, I'll add this, but
    unfortunately the moving of QWK mail must be done yourself somehow.
  
  - D'Bridge does NOT function as a QWK "Host" - it just handles incoming QWK
    mail with a ".QWK" extension, and forwards out mail with a ".REP"
    extension. In other words, D'Bridge does NOT generate a ".QWK" packet.
  
  - Gating QWK to Fido is very easy (just configure the QWK "index" setting)
    but use due diligence - Please ask the permission of the moderator(s) of
    whatever Fido/FTN conference if its okay to gate their echo.
  
  - The message conferences must first be added in the ECHOMAIL AREAS screen,
    just as if you were adding Fidonet areas, but in this case, do NOT specify
    any "Forward-To" information.
  
  Note that D'Bridge will process QWK packets after Fido/FTN unpacking has
  completed; this is normal behavior.


<h3><a href="#toc">QWK PROCESSING</a></h3>

     QWK information : MALKBBS  NANDRE  XPRESIT_CHIT_CHAT    1000
                       MALKBBS  NANDRE  XPRESIT_SYSOPS_ONLY  1001
                       MALKBBS  NANDRE  XPRESIT_ON_FIDONET   1002 Gated
  
  In this screen, you specify the information to use the QWK networking system
  in D'Bridge. The format of the screen is
  
                    &lt;QWK NAME> &lt;REP PACKET NAME> &lt;ECHOMAIL AREA>
  
  The QWK NAME is the filename of the QWK packet that you want to unpack and
  process. You don't need to add the .QWK extension to it. The REP PACKET
  NAME is the filename of the "reply" packet to generate for uploading to
  whatever host system you want - no extension is needed here either. And
  the ECHOMAIL AREA refers to the AREA TAG you've defined in the Echomail Area
  for the particular forum.
  
  The QWK Index Number should've already been specified in the ECHOMAIL AREAS
  screen beforehand. If you didn't do that, go back and do that first.
  Be sure to correctly match up the "QWK Index numbers" - when you join a QWK
  network, all of this information is usually provided for you by your "Host".
  
  When you are ready to send out the .REP packet, run DBUTIL REP and it will
  generate the outgoing .REP packets for everyone in the QWK OUTBOUND list.

<h3><a href="#toc">QUEUE ALIASES</a></h3>

          Queue aliases: 1:229/426   Nick

If you wish to personalise your Queue window, you can specify names for
the addresses you deal with. Up to 10 characters are allowed. The names
will be shown in the Queue instead of the addresses.

Note: "EMAIL/USENET" is a reserved name by the Internet features. You cannot
      use this name as an alias.


<h3><a href="#toc">FORCED PRIORITIES</a></h3>

Forced priorities: 1:110/68         CRASH     

This window allows you to absolutely override the priority for any
system on a semi-permanent basis. The overrides are listed one per
line and the format is:

&lt;ADDRESS> &lt;IMMEDIATE/CRASH/HOLD>

This field is also maintained in the VIEW/MODIFY QUEUE, ALT-V screen.

<h3><a href="#toc">PACKET PASSWORDS</a></h3>

Packet passwords: 1:110/68   Secret     

This window allows you to specify any packet passwords that may be required
by systems you exchange mail with. Passwords are case sensitive.

<h3><a href="#toc">AUTO ADD ECHOMAIL AREAS</a></h3>

Auto-add ECHO areas? Fido     (No/Fido/QuickBBS/Squish/JAM)

D'Bridge has the capability of automatically adding ECHOmail areas that
don't exist when undefined CONFERENCE TAGS are detected. This can save
lots of work in setting up areas; all you need to do once they are added
is to enter the area security and description using LOCAL/ECHOMAIL AREAS.

Specify which ECHOmail storage format to use for new areas:

  /-----------+--------------------------------------------------------------\
  | NO        |  Unknown ECHOmail messages will be tossed to BADECHO.        |
  |           |                                                              |
  | FIDO      |  A new subdirectory will be created and messages will be     |
  |           |  tossed there. The area will be created with Fido storage.   |
  |           |                                                              |
  | QUICKBBS  | Scans for the highest-used QuickBBS message base number.     |
  |           | The mail will be tossed and a Quick-type area is created.    |
  \-----------+--------------------------------------------------------------/


<h3><a href="#toc">PROCESS AREAFIX REQUESTS</a></h3>

AREAFIX enabled/limit: 100

D'Bridge has a very robust security system for Areafix and the next two
questions deal specifically with how you want to have transactions handled.

If D'Bridge should accept and process AREAFIX requests, enter the maximum
amount of requests to be processed per NETmail message. This is to prevent
possible abuse of your system. The default setting is 100 requests
per NETmail. Normally you shouldn't have to change this setting.

If you answer zero, then AREAFIX is DISABLED. The requests received will
just appear in your NETMAIL area and never be processed. D'Bridge only
processes requests as they are unpacked, not from them already existing in
the NETMAIL area. Sometimes, it may be necessary to shut off Areafix, such as
manually adding new networks to your system or changing other settings, and
then turn it back on when you're ready to go "live" again.

Please note that if you enable the Areafix feature, any Areafix requests that
arrive that are NOT destined for your system will be treated as IN-TRANSIT
and forwarded to the appropriate system as determined by the ROUTING of the
current event. You may view these messages in the NETmail area.

MAX REQUESTS PER DAY:

In this question, you may specify the maximum number of Areafix requests
to process from a system in a given day. This is to prevent abuse of your
system by Sysops who have an addiction to Areafix pinging. Areafix pinging
is a habit of some impatient Sysops who want to take their software out for
a "test run", or out of boredom, but in any case such pinging can gradually
tie up your system especially if you're a busy Hub.

So when a node sends too many Areafix requests in a single day, D'Bridge
can send that system a NETmail message explaining why their request cannot
be honoured (the limit is not mentioned). The default value is 10 requests
per day and normally shouldn't be changed unless you don't care about it.

Answering zero shuts off the daily limit enforcement. It should be shut
off if you deal with other Hub systems on the Fidonet network, since this
may effectively stop "genuine" Areafix requests from being processed (ie.
requests from other Hub's Areafix systems in relation to Passthru areas)


<h3><a href="#toc">AREAFIX INFORMATION</a></h3>

Areafix information: 1:110/68 PASSWORD ABC,501 Normal Yes Yes AREAS68.BBS

This window controls the AREAFIX subsystem, allowing automated area
list and ECHOmail distribution management. For each system, specify:

&lt;ADDRESS> &lt;PASSWORD> &lt;GROUPS,LEVEL> &lt;PRIORITY> &lt;RESCAN?> &lt;FWD REQ?> &lt;AREAS.BBS>

Where:

&lt;ADDRESS> is the address of the system in the form ZONE:NET/NODE.POINT

&lt;PASSWORD> is a codeword agreed upon by both systems (you and the system
specified.)  The password may be from 1 to 32 characters.

&lt;GROUPS,LEVEL> contains the groups allowed and security level assigned to
the system. ie. ABC,501 allows groups A, B and C and areas with a security
level equal to or less than 501.

&lt;PRIORITY> is the EMAIL priority associated with the link. In most cases,
you would use CRASH for systems in your local calling area and NORMAL or
HOLD for long-distance links. Valid priorities are: Immediate, Crash,
Normal and Hold.

&lt;RESCAN OK?> asks whether the specified system should be allowed to
request a complete rescan of a conference as it is added. Normally,
this is acceptable, but if your system is particularly busy, you may
want to disallow this by answering NO.

&lt;FWD REQ?> determines whether requests for unavailable ECHOmail areas
will be forwarded to your ECHO hub(s). If you answer Yes, all unknown
requests will be passed along to the first applicable ECHOmail hub.

&lt;AREAS.BBS> specifies the filename of the system's AREAS.BBS file to
use when forwarding requests. This should only be specified for the
systems which are your ECHOmail hubs or feeds. Any conference listed
in this file may be requested by other allowed systems. Make sure these
lines are listed in the desired search order.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<h3><a href="#toc">REMOVE EMPTY PASSTHRUS</a></h3>

Remove empty passthrus? Yes (Yes/No)

ECHOmail hubs which carry many passthru areas may wish to remove
unused conferences automatically. D'Bridge will erase these unused
areas a few days after the last ECHOmail feed is cut. AREAFIX
TIMEOUT DAYS controls the number of inactive days to wait
before killing the last feed and sending an AREAFIX request to
your feed, removing the conference.

<h3><a href="#toc">AREAFIX TIMEOUT DAYS</a></h3>

Areafix forwarding days? 3 

This parameter controls the number of days to wait for a new conference
to arrive after forwarding a request. After this many days, if a new
conference requested has not been received, a message is generated to
the original requesting system, explaining why their request was not
honored.

This also controls the number of days before removing a passthru area
with no links left.

<h3><a href="#toc">UNKNOWN AREA FORWARDING</a></h3>

Unknown area forwarding:                              

Here, you may specify the address of an ECHOmail hub to use "blindly",
forwarding AREAFIX requests for unknown areas. If the area is not found
in any listed AREAS.BBS file, it will be sent to the specified system.


<a name="3.07"/><h2><a href="#toc">3.07  XMAIL CONTROL</a></h2>

The XMAIL CONTROL screen allows you to configure the various compression
and decompression software that is used to bundle XMAIL packets.  Parameters
include:

   - XMAIL processing interval
   - Size limits
   - Default format
   - Specific formats
   - ZIP, LHA, ARJ, PAK, ARC and ZOO Compress and Decompress commands

<h3><a href="#toc">XMAIL PROCESSING INTERVAL</a></h3>

XMAIL processing interval: 30  (minutes)

This parameter specifies the minimum time interval between XMAIL processing
cycles. In the above example, there will be a 30 minute delay between the
end of one cycle and the start of the next. Any XMAIL received during this
delay period will not be processed immediately. At the end of the period,
processing will resume automatically.

<h3><a href="#toc">XMAIL PACKET SIZE LIMIT</a></h3>

XMAIL packet size limit: 200   (kilobytes)

This parameter controls the maximum size of outbound ECHOmail .PKT files.
When ECHOmail is scanned or forwarded, a new packet is started when the
origin address changes, or the packet size limit is exceeded. Making
this field smaller than 50k is not a good idea; neither is exceeding 250k
in a network using mailers other than D'Bridge.

When this parameter is set to zero (0), D'Bridge will create a packet
of unlimited size. This may improve efficiency on high-traffic systems, but
this setting should not be changed for normal usage. Keep in mind that
not everyone runs software capable of processing PKT files of unlimited
size. Unlimited PKT file sizes are features found in other "tosser"
programs and I am including here as well.


<h3><a href="#toc">DEBUG XMAIL</a></h3>

  This option serves as a "master override" for the processing of XMA/XMAIL-
  flagged NETmail messages. You may choose Process XMAIL, Process+Debug
  or Disable XMAIL.
  
  When Process XMAIL is selected, XMAIL will be processed normally.
  
  When Process+Debug is selected, any Netmail messages with the XMA/XMAIL
  flag that are processed by your D'Bridge system, will now display the current
  message number, from/to/subject as well as the archive name in the system
  log. Note that this WILL cause the system log to grow quite a bit in size,
  if you are processing large amounts of NETmail on your system.
  
  When Disable XMAIL is selected, XMAIL PROCESSING IS SHUT OFF. Any NETmail
  that arrives with the XMA/XMAIL flag will be treated as IN-TRANSIT and
  archived out to the next available system as defined in the SCHEDULE. The
  NETmail will be treated as if it doesn't have the XMA/XMAIL flag, and will
  NOT be packed out as XMAIL; it will be treated as a normal "Queue" entry on
  your system. Note that this also applies to any messages created by the
  internal message editor and from 3rd-party utilities.
  
  The default setting is Process XMAIL, and should not be changed unless
  you need to diagnose any problems. If you change this setting, you will need
  to rescan the outbound queue for the changes to take effect. Any NETmail
  messages that have already been packed out cannot be reverted back to Queue
  entries; therefore, please use this setting only to diagnose messages
  currently in your NETmail area.
  
  WARNING: Only experienced D'Bridge administrators should use this option.

<h3><a href="#toc">COMPRESSED MAIL FORMAT</a></h3>

Compressed mail format: ZIP [Press SPACE to change]

This specifies the default compression format for outbound XMAIL files.
Choose either ZIP, LHA, ARJ, PAK, ARC, ZOO or RAR.

D'Bridge is capable of unpacking any of these archives, providing the
decompression program is correctly specified.


<h3><a href="#toc">ALTERNATE COMPRESSION FORMATS</a></h3>

System-specific formats: ARJ 1:110/68                    

This field allows you to define specific compression formats for certain
systems. The format is as follows:

&lt;ZIP/LHA/ARJ/PAK/ARC/ZOO/RAR> &lt;filter>

ie.

ARC ALL EXCEPT 1:110/68 .10 .20

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">ZIP COMPRESS COMMAND</a></h3>

ZIP compress command: +PKZIP -MEX                          

This specifies the command to move files to a ZIP archive. For PKZIP,
the -M (move files) option must be specified.

EX is an optional parameter that tells PKZIP to use maximum compression
when creating the archive. If you (and whoever is receiving the archive)
don't care about the archive size, you can speed up processing by
changing EX to E0 (no compression). See the PKZIP documentation, or run
PKZIP by itself, for more information and help on these parameters.

* <span style="color: red">NOTE</span> *   A plus sign (+) is required before running the PKZIP program.

<h3><a href="#toc">ZIP DECOMPRESS COMMAND</a></h3>

ZIP decompress command: +PKUNZIP -O                          

This specifies the command to extract files from a ZIP archive. PKUNZIP
requires the -O option to overwrite existing files.

* <span style="color: red">NOTE</span> *   A plus sign (+) is required before running the PKUNZIP program.


<h3><a href="#toc">LHA COMPRESS COMMAND</a></h3>

LHA compress command: LHA M -M                            

This specifies the command to move files to a LHA archive. LHA
requires the M command and the -M option.

<h3><a href="#toc">LHA DECOMPRESS COMMAND</a></h3>

LHA decompress command: LHA E -CM                             

This specifies the command to extract files from a LHA archive. LHA
requires the E command and the -CM option to overwrite existing files.

<h3><a href="#toc">ARJ COMPRESS COMMAND</a></h3>

ARJ compress command: ARJ M                               

This specifies the command to move files to an ARJ archive.
ARJ requires the M command.

* <span style="color: red">NOTE</span> *   A plus sign (+) is required before running the ARJ program.

<h3><a href="#toc">ARJ DECOMPRESS COMMAND</a></h3>

ARJ decompress command: ARJ E -y                               

This specifies the command to extract files from an ARJ archive.
ARJ requires the E command to decompress and the -y switch
to automatically answer "yes" when it asks if you wish
to update (overwrite) files.

* <span style="color: red">NOTE</span> *   A plus sign (+) is required before running the ARJ program.


<h3><a href="#toc">PAK COMPRESS COMMAND</a></h3>

PAK compress command: PAK M                                 

This specifies the command to move files to a PAK archive.
PAK requires the M command.

<h3><a href="#toc">PAK DECOMPRESS COMMAND</a></h3>

PAK decompress command: PAK E /WA                             

This specifies the command to extract files from a PAK archive.
PAK requires the E command to decompress and the /WA option
to overwrite existing files.

<h3><a href="#toc">ARC COMPRESS COMMAND</a></h3>

ARC compress command: ARC M                                  

This specifies the command to move files to an ARC archive.
ARCA requires the M option to move the files to the archive.

<h3><a href="#toc">ARC DECOMPRESS COMMAND</a></h3>

ARC decompress command: ARC EO                                

This specifies the command to extract files from an ARC archive.
ARCE requires the E option to actually extract the files, and
the O option to overwrite any existing files.

<h3><a href="#toc">ZOO COMPRESS COMMAND</a></h3>

ZOO compress command: ZOO -M                                

This specifies the command to move files to a ZOO archive.
ZOO requires the -M command.


<h3><a href="#toc">ZOO DECOMPRESS COMMAND</a></h3>

ZOO decompress command: ZOO -E                             

This specifies the command to extract files from a ZOO archive.
ZOO requires the -E command.

<h3><a href="#toc">RAR COMPRESS COMMAND</a></h3>

RAR compress command: +RAR32 M                           

Specify the command to compress a RAR archive. RAR requires the M
parameter to move files into the archive. A plus sign (+) is required
before calling the RAR program.

RAR requires at least a 386 processor. It may not run on a Tandy 1000
or early IBM PS/2 computers but should run on the Tandy 2500 series.

If you are running D'Bridge under OS/2 Warp, you may first have to set
the "DPMI Enabled" setting to YES under the DOS Session Properties screen.

<h3><a href="#toc">RAR DECOMPRESS COMMAND</a></h3>

RAR decompress command: +RAR32 E -O+                       

This specifies the command to extract files from a RAR archive.

Note that the RAR command requires the E parameter to extract files
and the -O+ parameter to overwrite existing files. A plus sign (+)
is required before calling the RAR program.


<a name="3.08"/><h2><a href="#toc">3.08  TIME CONTROL SYSTEM</a></h2>

The TIME CONTROL SYSTEM screen allows you to set time-related parameters
and display historical data.  Functions and parameters include:

   - UTC offset
   - Daylight savings time status
   - Timezone names
   - Default ClockSync systems
   - Remote clock history
   - Adjustment history

<h3><a href="#toc">OBSERVE DAYLIGHT SAVINGS TIME</a></h3>

Observe DAYLIGHT SAVINGS TIME at this site? Yes

In most locations, the time changes twice a year for daylight
savings time. If your country/state observes this, answer Yes.

<h3><a href="#toc">ADJUST MAIL EVENTS</a></h3>

* <span style="color: red">NOTE</span> *  This feature is not currently supported.

<h3><a href="#toc">ADJUST CLOCKSYNC EVENTS</a></h3>

* <span style="color: red">NOTE</span> *  This feature is not currently supported.

<h3><a href="#toc">ADJUST DOS EVENTS</a></h3>

* <span style="color: red">NOTE</span> *  This feature is not currently supported.


<h3><a href="#toc">DAYLIGHT TIME STARTS</a></h3>

Daylight time starts: 04/23/92

Specify the date on which daylight savings time starts. If daylight
time is currently in effect, use the date last spring when it started.
If it is late fall or winter and daylight savings time is not in
effect, use the date on which it will start next spring.

<h3><a href="#toc">DAYLIGHT TIME ENDS</a></h3>

Daylight time ends: 10/21/92

Specify the date on which daylight savings time ends. Always make sure
the ending date is greater than the starting date, next spring.

<h3><a href="#toc">DAYLIGHT TIME CHANGES</a></h3>

Time of automatic change: 02:01

Specify the exact time at which daylight savings time changes. In the USA
it is always 2:01 on a Sunday morning in the spring and fall. For times
in the afternoon, make sure to use 24-hour format (ie. 13:00 is 1:00pm).

<h3><a href="#toc">LOCAL STANDARD TIME</a></h3>

Name of local STANDARD time: Eastern Standard Time    

Specify the name of your timezone during standard time.

<h3><a href="#toc">LOCAL STANDARD TIME ABBREVIATION</a></h3>

Abbreviation for local STANDARD time: EST   

Specify the commonly accepted abbreviation for your local standard time.


<h3><a href="#toc">LOCAL DAYLIGHT TIME</a></h3>

Name of local DAYLIGHT time: Eastern Daylight Time    

Specify the name of your timezone during daylight savings time.

<h3><a href="#toc">LOCAL DAYLIGHT TIME ABBREVIATION</a></h3>

Abbreviation for local DAYLIGHT time: EDT   

Specify the commonly accepted abbreviation for your local daylight time.

<h3><a href="#toc">DISPLAY TIME DATA</a></h3>

Display comparative time data? No 

On inbound as well as outbound calls D'Bridge will compare its time
with that on other systems it connects to.   If you want this data to
be displayed in the LOG window, answer Yes here.

<h3><a href="#toc">TIME WARNING THRESHOLD</a></h3>

Display average time-difference if: 5   minute(s) or more

On inbound as well as outbound calls D'Bridge will compare its time
with that on other systems it connects to. A history is kept and
average differences are computed. If you wish to see a warning when
the average time difference exceeds a certain threshold, specify the
number of minutes here.
In this example, a warning will be displayed when the average time
difference exceeds 5 minutes.

To reset this warning display, you will need to Zero the clock history
screen.


<h3><a href="#toc">CLOCK HISTORY FOR</a></h3>

Store data from the clocks on: ALL                            

Specify a filter controlling which systems will be included in
your time/clock history screen. If there are some systems you
wish to exclude, use: ALL EXCEPT nnn/nnn nnn/nnn ... etc.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">CLOCKSYNC SYSTEM</a></h3>

Always synchronize clock with: 1:3601/14     

You have the option of setting your clock using a certain system both on
demand and every time you connect with it. In this example, my system
will always synchronize its clock to 1:3601/14, a "D'Bridge Universal
TimeBase."

In most cases, leave this blank.

<h3><a href="#toc">AUTOMATIC CLOCKSYNC SYSTEM</a></h3>

Default ClockSync timebase: Atomic clock    

If you start D'Bridge with the clock obviously wrong, it will set its
clock using the specified system. Leaving it blank will make it call
the atomic clock at the U.S. Naval Observatory near Washington D.C.

The only time this happens automatically is when the date is set to
before this release of D'Bridge occurred -- the clock is wrong without
a doubt. (This occurs when there is no battery-backed clock on an
XT most frequently.)


<h3><a href="#toc">CLOCK SET COMMAND</a></h3>

DOS command after clock adjustment:                        

Some computers, usually XTs, require a command to be issued to set
the battery-backed clock which is not on the motherboard. If you own
such a clock, you probably know what this means. If you don't, leave
this field blank.


<a name="3.09"/><h2><a href="#toc">3.09  FUNCTION KEYS</a></h2>

The FUNCTION KEYS screen allows you to define programmable function keys
for use within D'Bridge.

<h3><a href="#toc">USER FUNCTION</a></h3>

There are 19 programmable function keys that may be made available from
the main menu or D'Bridge idle state. F2 through F10 and ALT-F1 through
ALT-F10 may be programmed to execute any number of DOS commands or spe-
cial functions.

As well as DOS commands, the following functions are available here:

/----------------+-----------------------------------------------------------\
| +(command)     |  Causes D'Bridge to swap to disk, leaving more memory     |
|                |  available to the application.                            |
|                |                                                           |
| -(command)     |  Causes the command to be executed inside the queue       |
|                |  window. Only use this for programs that do standard      |
|                |  DOS I/O.                                                 |
|                |                                                           |
| *R             |  This will force a rescan of the queue. Same as ALT-Q     |
|                |                                                           |
| *L             |  This will be replaced with the current line number       |
|                |                                                           |
| *S             |  This will force a complete ECHOmail rescan.              |
|                |                                                           |
| *X&lt;errorlevel> |  This causes an exit with the specified DOS errorlevel.   |
\----------------+-----------------------------------------------------------/

* <span style="color: red">NOTE</span> *  You must NEVER load a TSR using this method. It will cause
a system crash when D'Bridge resumes.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<a name="3.10"/><h2><a href="#toc">3.10  BBS CONFIGURATION</a></h2>

The BBS CONFIGURATION screen allows you to set up an interface between your
BBS system and D'Bridge.  Parameters include:

   - EMAIL calls only text
   - Press ESC for BBS text
   - Loading BBS text and filename
   - Human caller timeout
   - BBS online hours
   - After hours file
   - Minimum baud rate
   - Too slow file
   - ECHOmail scan
   - DOS commands for BBS

<h3><a href="#toc">BBS SOFTWARE INSTALLED</a></h3>

BBS software installed? Yes

If you are using D'Bridge as the "front-end" for a bulletin board system
(BBS), answer "YES" to this question. If you do not want D'Bridge to run
another program (such as a BBS) when "humans" call, specify "NO."

<h3><a href="#toc">EMAIL CALLS ONLY TEXT</a></h3>

"EMAIL calls only" text: Please hang up... accepting EMAIL calls only.  

If a human caller dials in when D'Bridge is not accepting human callers
during the current mail event, this line of text will be displayed on
the caller's terminal. This is also displayed if you have answered No
to "BBS software installed."


<h3><a href="#toc">PRESS ESC FOR BBS TEXT</a></h3>

"Press ESC for BBS" text: Press the ESC key twice to access the BBS.   

When someone first dials into D'Bridge, it displays its copyright notice
and this text. You may specify any message you wish to replace the stan-
dard message, but remember you should inform the caller to 'press the
ESC key twice for faster access' in this line.

<h3><a href="#toc">LOADING BBS TEXT</a></h3>

"Loading BBS" text: BBS now loading - Please wait...             

This text will be displayed when a human caller presses the ESC key
twice or the "human caller timeout" has expired. This is to inform
the caller that the BBS is currently loading and that he should wait.

<h3><a href="#toc">LOADING BBS FILE</a></h3>

"Loading BBS" file: C:\DB\LOADBBS.TXT                     

If you wish to display some sort of "banner" file when the BBS is
loading, specify the name of a text file here. You may use ANSI codes
and IBM graphics if you wish, but keep in mind that not all callers
have computers compatible with IBM ANSI. You're best off keeping it
printable ASCII (32-126 decimal).

<h3><a href="#toc">HUMAN CALLER TIMEOUT</a></h3>

"Human" caller timeout: 20

Specify the number of seconds D'Bridge should wait before determining
that a call is "human" and not an EMAIL call. The minimum value for
this field is 10 (seconds), but you may want to make this time longer
if you have "noisy" phone lines or trouble with inbound connections.


<h3><a href="#toc">BBS ONLINE HOURS</a></h3>

BBS online hours: 06:00 until 23:00

This field allows you to specify the hours of operation for your BBS.
If a human caller is detected outside of these hours, the "After hours"
file will be transmitted and D'Bridge will hang-up. This is another
way besides the use of mail events to restrict BBS access times.

<h3><a href="#toc">AFTER HOURS FILE</a></h3>

"After hours" file: C:\DB\BBSHOURS.TXT                

If you restrict the hours of operation of your BBS, you need to prepare
a text file in which you explain your policy to human callers. Specify
the name of a text file here; it will be transmitted to all human callers
dialing in outside the specified time frame.

<h3><a href="#toc">MINIMUM BAUD RATE</a></h3>

Minimum baud rate: 1200 

If you wish to restrict BBS access to those callers that have a faster
modem, specify the minimum allowable baud rate here. In this example,
300 baud callers will be rejected and the "Too slow" file will be sent.

If you don't care about the baudrate, just leave this question blank.

<h3><a href="#toc">TOO SLOW FILE</a></h3>

"Too slow" file: C:\DB\TOOSLOW.TXT                 

If you have specified a minimum baud rate for BBS access, this file
will be transmitted to callers with slower modems. If you're going
to reject callers based on baud rate, the least you can do is explain
your policy...


<h3><a href="#toc">SCAN ECHOMAIL AFTER CALL</a></h3>

Scan ECHOmail after call? Yes

If you wish to rescan all ECHOmail areas after each BBS call, answer
Yes here. This allows for immediate turnaround on ECHOmail entered
through the BBS software.


<h3><a href="#toc">DOS COMMANDS FOR BBS</a></h3>

DOS commands for BBS:                              

Here, you specify the DOS commands that will be used to invoke the BBS,
telling it you already have a caller on. There are two methods for
doing this: SPAWNING and EXITING. The most popular method is to SPAWN
the BBS - leaving D'Bridge in memory. EXITING is used only when there
is not enough memory to SPAWN the entire BBS system. In this field,
you simply list the DOS commands you want D'Bridge to run to invoke
the BBS. There are several "special" commands that substitute values
or cause an EXIT:

/----------------+-----------------------------------------------------------\
| +(command)     |  Causes D'Bridge to swap to disk, leaving more memory     |
|                |  available to the application program.                    |
|                |                                                           |
| -(command)     |  Causes the command to be executed inside the queue       |
|                |  window. Only use this for programs that do standard      |
|                |  DOS I/O.                                                 |
|                |                                                           |
| *B             |  This is replaced by the baud rate of the connection.     |
|                |                                                           |
| *C             |  This is replaced by the actual or translated connect     |
|                |  string from the modem.                                   |
|                |                                                           |
| *P             |  This is replaced by the comm port number (1-8)           |
|                |                                                           |
| *L             |  This is replaced by the number of the current line       |
|                |                                                           |
| *R             |  This will force a rescan of the queue. Same as ALT-Q     |
|                |                                                           |
| *S             |  This will force a complete ECHOmail rescan.              |
|                |                                                           |
| *T             |  This is replaced by number of minutes until the next     |
|                |  event defined in "schedule maintenance."                 |
|                |                                                           |
| *X             |  This causes an exit with the errorlevel corresponding    |
|                |  to the baud rate divided by 100.  ie. 1200 baud = 12     |
|                |                                                           |
| *X&lt;errorlevel> |  This causes an exit with the specified DOS errorlevel.   |
\----------------+-----------------------------------------------------------/


As an example, here's what my DOS BBS COMMANDS field looks like to run
Opus, then execute the MYMAIL program (An Opus MAIL-CHECK program by
Steve Sullivan):

    cd \opus
    opus opus -t*t -p*p -b*b
    mymail -u

When a caller dials in at 2400 baud with 120 minutes until the next
event, D'Bridge runs the following DOS commands:

    cd \opus
    opus opus -t120 -p1 -b2400
    mymail -u

After all these commands are complete, D'Bridge initializes the modem
and returns to its previous status (Mail event, IDLE, etc.).

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<a name="3.11"/><h2><a href="#toc">3.11  SECURITY MISCELLANEOUS</a></h2>

The SECURITY/MISCELLANEOUS screen allows you to setup various parameter
which affect security or are somehow "miscellanneous."  Parameters include:

   - Hang-up on security violation
   - Ignore unauthorized mail packets
   - Rename unauthorized/unknown files
   - Allow unlisted nodes to send mail
   - File request controls
   - Session passwords
   - Automatic password request control
   - Function requests
   - Gateways
   - External receivers
   - Fidonet and WaZOO protocol overrides

<h3><a href="#toc">HANG UP ON SECURITY VIOLATION</a></h3>

Hang-up on security violation? No 

If you are using SESSION PASSWORDS to protect any or all of your
links, you may choose to hang-up and not accept any mail from any
system with a missing or invalid password.  This option has no effect
on systems that have no password specfied.  Used in conjunction with
Secured ECHOmail only, this provides a fairly good security method
for ECHOmail traffic.

<h3><a href="#toc">IGNORE UNAUTHORIZED MAIL PACKETS</a></h3>

Ignore unauthorized mail packets? No 

If you are using SESSION PASSWORDS to protect any or all of your
links, you may choose to completely ignore incoming mail from a link
using the wrong (or no) password. If you indeed wish to ignore this
mail, specify Yes to this field. If you want to receive the mail
normally, answer No.

Unauthorized mail that comes in will be renamed to BAD-MAIL.001,
BAD-MAIL.002, etc.


<h3><a href="#toc">RENAME UNAUTHORIZED INBOUND FILES</a></h3>

Rename unauthorized inbound files? Yes

You may choose to rename file-attachments that come in from unknown/unlisted
systems or from systems that connect with an incorrect password. D'Bridge
will rename the files to BAD-ATCH.001, BAD-ATCH.002, etc.

The reason for doing this is to prevent unauthorized ECHOMAIL and FUNCTION
REQUESTS from being executed. Specify Yes if you want to automatically
rename incoming files or No if you want to receive them normally.

<h3><a href="#toc">ALLOW UNLISTED NODES TO SEND MAIL</a></h3>

Allow unlisted nodes to send mail? Yes

In a private network, possibly the BEST way to discourage hackers from
the outside is to hang-up on them immediately. If you specify Yes to
this question, D'Bridge will immediately reject any incoming call from
a system not listed in your nodelist. This should only be used in a
private network - public networks often have communications from new
addresses or private addresses that are not in the nodelist (yet).

<h3><a href="#toc">FILE REQUESTS FOR UNLISTED NODES</a></h3>

File-requests for unlisted nodes? Yes

If you support file-requests, you must decide whether or not you wish
to allow systems that are NOT in your nodelist to request files. Some
people (kids, usually) will abuse your system's file-request privilege
by calling back many times, using many fake node numbers to file-request.
If you say Yes to this question, any system, listed or not will be able
to issue file-requests. If you say No then only requests from systems
found in your nodelist will be honored.


<h3><a href="#toc">TIME LIMIT FOR FILE REQUESTS</a></h3>

Time limit for file-requests: 30  (minutes)

When you are running a public system, you may find you have trouble with
people abusing the file-request privilege by constantly requesting too
many files and keeping your system busy for hours. D'Bridge allows you
to limit the time allowed for file-requests. Here you may limit the num-
ber of minutes allowed before refusing to honor a request.

<h3><a href="#toc">FILE REQUEST LIMIT</a></h3>

File-request limit: 500  (kilobytes)

You may limit the total number of kilobytes allowed for file-request
by specifying it here. It is suggested you make this larger than the
biggest file you have available for request.

<h3><a href="#toc">MAXIMUM FILES FOR FILE REQUEST</a></h3>

Maximum files for file-request: 10 

You may limit the total number of files allowed for request. This
is really not as meaningful as the other limits because time is the
main factor requiring a limitation.

<h3><a href="#toc">CHECK LIMITS BEFORE OR AFTER</a></h3>

Check limits BEFORE or AFTER? After 

This specifies whether the file-request limits are tested BEFORE or
AFTER each file is transferred. Personally, I prefer testing AFTER
because I like to allow people to request any file on my system; some
files on my system are larger than the FILE-REQUEST LIMIT (K.)
If the limits are checked BEFORE each transfer, it would be impossible
to file-request any file larger than the size limit.


ENFORCE LIMITS FOR 24 HOURS

Enforce limits for 24-hours? No 

If you wish to accumulate these file-request limits for a 24-hour
period, answer Yes here. If you want the limits enforced on a
per-call basis, answer No. If the limits are enforced for 24-hours,
a file is created containing the address, timestamp and limit data.
The limit will be reset exactly 24-hours from the START of the first
file-request. If you must manually reset these limits, delete the
file "DBRIDGE.FRS."

<h3><a href="#toc">MINIMUM BAUD RATE FOR REQUESTS</a></h3>

Minimum baud rate for request? 1200 

This specifies the minimum link rate (baud) allowed for file-requests.
(300/1200/2400/4800/9600... Etc.)


<h3><a href="#toc">SESSION PASSWORDS</a></h3>

Session passwords: 1:3601/14 SECRET       

In a corporate environment, or a public network where security is
becoming a problem, you may specify a SESSION PASSWORD for each system
you plan to communicate with directly. This password must be specified
by BOTH systems and must be agreed upon in advance. Once in place, it
becomes impossible to communicate with the other system if you don't
use the same password.

A password will prevent an unauthorized system from picking up mail.
With HiTek comes Hi-Tech hackers. It is not hard to change your address
to something else, then poll your host to see what mail you can "steal".
Any "link" protected with a password is not vulnerable to this simple
form of "mail-stealing". For a password with 135/20, type:

135/20 WALLY     (Where "WALLY" is the desired SESSION PASSWORD)

Any number of session passwords may be defined. Remember, in the above
example, it is important 135/20 also sets up a SESSION PASSWORD for my
address, 110/68, or it won't work. Both ends must use the same password!
(Passwords must be eight letters or less).

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">AUTOMATIC PASSWORD REQUEST FOR</a></h3>

Automatic password request for: 201:ALL 1:110/ALL                 

D'Bridge has the capability to automatically establish session passwords
with new links.  This field specifies a filter that controls which EMAIL
addresses that you wish to request an automatic session password be added.
If you wish to disable this feature, specify NONE as the filter.

* <span style="color: red">NOTE</span> *  This field only affects outbound calls.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<h3><a href="#toc">ALLOW PASSWORD REQUESTS FROM</a></h3>

Allow password requests from: ALL                               

The D'Bridge Automatic Password Request System allows a remote system to
request that a session password be established automatically.  If a calling
system makes this request, the answering system creates a random 8-character
password and transmits it back using the EMSI handshake.

This field specifies a filter that controls which EMAIL addresses that you
wish to allow password requests from.  If you wish to disable this feature,
specify NONE as the filter.

* <span style="color: red">NOTE</span> *  This field only affects inbound calls.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<h3><a href="#toc">FUNCTION REQUESTS</a></h3>

Function requests:                                       

A FUNCTION REQUEST is an online service provided to calling systems
while they are still "on the line". FUNCTION REQUESTS only work with
other WaZOO-based EMAIL systems such as D'Bridge, FrontDoor, Opus and
BinkleyTerm. This is a VERY advanced feature and will not be used by
most systems, so don't feel bad if you don't understand this...

A function request can be defined in four steps:

    1) The caller sends the REQUEST FILE.

    2) D'Bridge recognizes the filename as being a FUNCTION REQUEST
       and spawns the REQUEST SERVER task. (user-provided)

    3) The REQUEST SERVER (a program provided by the user) takes its
       input data from the REQUEST FILE and the CALLER.FIL file cre-
       ated by D'Bridge. It prepares output file(s) to send back to
       the caller plus an OUTPUT FILE LIST telling D'Bridge which
       files to send.

    4) When the REQUEST SERVER has terminated, D'Bridge then transmits
       all the files listed in the OUTPUT FILE LIST, deletes them, and
       continues to send the rest of the "pickup" mail.

To use this feature, you must either write your own REQUEST SERVER or
use one of the existing systems such as ML-INQ.

The format for the FUNCTION REQUESTS field is:

    &lt;REQUEST FILE> &lt;OUTPUT FILE LIST> &lt;DOS COMMAND>

For an example, I'll explain how I run the ML-INQ program on my system.
ML-INQ stands for Megalist Inquiry. The Megalist is another program I
wrote that creates a "master file listing" for all participating Fido
and Opus systems. The list got so huge, I decided to add an on in-
quiry service. To access the MegaList Inquiry feature, the calling sys-
tem simply creates a text file containing a list of filenames to search
for; this file is called MEGALIST.INQ. Anytime D'Bridge receives a file
called MEGALIST.INQ, the REQUEST SERVER "ML-INQ" is executed.
Here's what I have in my FUNCTION REQUEST field:

    MEGALIST.INQ MEGALIST.LST ML-INQ


The ML-INQ program first opens the file "CALLER.INF" to get general
information about the system and the caller. CALLER.INF is a text
file created automatically by D'Bridge just before spawning the REQUEST
SERVER task. Here's what my CALLER.INF contains at the moment:

    1:101/200          (The Fidonet address)
    TC-Trader          (The system name)
    Cheryl Buzzell     (The operator name)
    C:\DB\FILES\       (My INBOUND FILES DIRECTORY path)

ML-INQ then opens the file "C:\DB\FILES\MEGALIST.INQ" to get the actual
request from the caller. Then, it prepares the file "MEGALIST.OUT" con-
taining the results of the search. Finally, ML-INQ creates the OUTPUT
FILE LIST, this time called MEGALIST.LST (in the current directory);
this file contains the list of files to send back to the caller, then
erase. In this case, the OUTPUT FILE LIST only contains MEGALIST.OUT.

Finally, ML-INQ returns control to D'Bridge and the file gets sent and
deleted as specified. The request file, MEGALIST.INQ, is also erased.

A request server may transmit files without erasing them (if they are
available for file-request) simply by creating a WaZOO-style request
file (with the extension .REQ) in the INBOUND FILES DIRECTORY. D'Bridge
will treat these files like inbound file requests.

IMPORTANT:  It is essential that any REQUEST SERVER takes no more than
            30 seconds to execute. Taking more time than this can cause
            the calling system to timeout and hang-up.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">EXTERNAL RECEIVERS</a></h3>

External receivers: CONNECT FAX|*X50                           

This feature is designed for use with combination modems that also
handle FAX and/or VoiceMail. The above example causes D'Bridge to
exit with errorlevel 50 when a "CONNECT FAX" response is received
from the modem.

The syntax for this field is:  &lt;MODEM RESPONSE>|&lt;DOS command>

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<h3><a href="#toc">EXTERNAL GATEWAYS</a></h3>

External gateways:                                        

Again, this is a VERY advanced feature and will not be used by 99% of
the D'Bridge systems out there; this is for the other 1%:

An EXTERNAL GATEWAY allows D'Bridge to act as a "front-end" for up to
20 other EMAIL receivers at the same time. The way this works, is by
defining a specific "SYNC" sequence; D'Bridge can look for that sequence
and spawn another EMAIL system while the calling system is still on.
This way, D'Bridge can be compatible with as many systems as possible.
As of this time, I know there are gateway programs for UUCP and USENET.
I'm sure there are others I just don't know about.

As an example, let's say I want to install a UUCP mail receiver "on
top" of D'Bridge. I have a program written for the IBM PC which will
receive mail when a call is received. Assuming this program features
an option to respond to a call already in progress and terminate after
finishing the session, it is compatible. The first thing you need to do
is figure out what the SYNC sequence is.

A SYNC sequence is the sequence of bytes the calling system sends to
the receiving system (multiple times) until the receiver responds with
an acknowledgment that it is ready to begin a mail session.
D'Bridge can be programmed to recognize up to 20 separate sequences of
up to 16 bytes each and spawn a different task depending on which one
is received. For example, let's say your UUCP transmitter continuously
sends the sequence: 9F, A9, 9F, A9... (hex) until the receiving system
acknowledges. For this sequence, simply specify your EXTERNAL GATEWAYS
field as:

    9F/A9 UUCP_RCV -b*b -p*p

As soon as an incoming call is detected sending the sequence 9F, A9,
D'Bridge will spawn the UUCP mail receiver with the following command
line:

    UUCP_RCV -b2400 -p1

Just like described in DOS BBS COMMANDS, the BAUD RATE and PORT NUMBER
can be substituted by using a *B and *P respectively.
It is up to the spawned task (UUCP_RCV in this case) to handle the mail
session from this point on; it should terminate as soon as the mail is
received and make sure it doesn't answer any calls itself.


Because of the normal operation of D'Bridge, we've restricted three
characters: 1B (Escape), AE (Fidonet TSYNC), and F1 (WaZOO YOOHOO
character). These three bytes may not be a part of your SYNC string.
It is also suggested you use bytes with high parity (greater than 7F
(hex)) to prevent "human" users from easily activating your alternate
mailer.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">FIDONET PROTOCOL FOR</a></h3>

Fidonet protocol for: NONE                           

If you want to override the default EMSI/WAZOO protocol D'Bridge uses
and revert to XMODEM/TELINK protocols, specify the NET/NODE filter here.
This field should contain "NONE" in all but the strangest setups.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">WAZOO PROTOCOL FOR</a></h3>

WaZOO protocol for: NONE                             

If you want to override the default EMSI protocol D'Bridge uses and
revert to the YOOHOO-YOOHOO/2U2 handshake, specify the NET/NODE filter
here. This field should contain "NONE" in all but the strangest setups.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<a name="3.12"/><h2><a href="#toc">3.12  DISK SPACE MINIMUMS</a></h2>

The DISK SPACE MINIMUM screen allows you to set minimum criteria for system
operation:

   - System operation minimum
   - BBS operation minimum
   - Unpack/forward minimum

<h3><a href="#toc">SYSTEM OPERATION</a></h3>

The system operation line specifies the minimum disk space allowed (in Kb)
before D'Bridge will completely shut down. Once shut down, D'Bridge will
not reactivate without human interaction. Either disk space must be
freed, or DB SETUP must be used to change the minimum.

<h3><a href="#toc">BBS OPERATION</a></h3>

The BBS operation line specifies minimum disk space criteria for BBS
operation. If disk space is below specified criteria, human callers
will be told the BBS is offline due to disk space shortage.

<h3><a href="#toc">UNPACK FORWARD</a></h3>

The unpack/forward line specifies the minimum disk space required before
a mail packet may be decompressed or unpacked. Once this limit is
reached, all ECHOmail and NETMAIL unpacking will be halted.


<a name="3.13"/><h2><a href="#toc">3.13  ACCOUNTING TRANSLATION</a></h2>

The ACCOUNTING/TRANSLATION screen allows you to set up costing data and
controls which determine where D'Bridge calls and when.  This system allows
for minimum telecommunications cost when NORMAL priority is used.  A default
table of USA-EAST.COS (an exported file) is included by default.  Contact your
nearest D'Bridge dealer for a local, more recent cost file.

<h3><a href="#toc">PREFIX</a></h3>

Prefix: 1-513-                              

This is the "key" to the database record. You cannot change it. If
you must, you need to remove and add the record again. The PREFIX field
is the first part of a phone number (which will be replaced with the
TRANSLATE TO field when a number is dialed).

<h3><a href="#toc">TRANSLATE TO</a></h3>

Translate to: 1-                           

When phone number are translated, this field will be used to replace the
PREFIX for dialing. The field is actually broken down into two subfields:
PREFIX and SUFFIX. If you need to dial something after the number,
such as a credit card or billing account number, you may specify a SUFFIX
by using a vertical pipe ( | ) to separate the PREFIX from the SUFFIX.
An example would be: 1-305-370|,,3188. ",,3188" would be sent to the modem
after dialing. The two commas represent a modem command meaning "pause a
few seconds before dialing the following digits".

<h3><a href="#toc">LOCATION</a></h3>

Location: Southwestern Ohio                   

This is just a description field for your information.


<h3><a href="#toc">COST DATA SOURCE</a></h3>

Cost data source: Table

Here, you either specify Table or Xref for the data source. If you
use Xref, you will be prompted for another prefix to cross-reference.
Otherwise, you will use the table listed below...

The box at the bottom of the screen contains the cost information.
In order to keep communications costs low, D'Bridge has adopted a
system of "cost-based control". This means the system can be programmed
to place all calls during the most economical periods based on this
cost screen entirely. The cost-information for calling a given country
or city can be acquired by calling your long-distance company.
Typically, there are different rates on different days and at different
times. This table allows you to specify up to 5 cost-periods for
accounting and control purposes.

When D'Bridge looks at these cost-tables, it searches from the top of
the list to the bottom, stopping on the first match. For this reason,
"catch-all" entries, like the one shown at the bottom of our example
should be listed last. For flexibility and simplicity, you are allowed
to define overlapping periods, but nevertheless D'Bridge will always
select the first applicable period for accounting and control.
Please note that any time-ranges left undefined are assumed "free" and
D'Bridge will actually try to dial out during these times. Therefor:
DON'T LEAVE ANY TIME-RANGE UNSPECIFIED.

<h3><a href="#toc">REFERENCE PREFIX</a></h3>

Reference prefix: 1-                      

When using a cross-referenced table, you must specify the prefix whose
table you wish to use for costing and control purposes. The translation
will still be based on the data listed above, but now it will be applied
to the referenced table.


<h3><a href="#toc">TABLE WEEKDAYS</a></h3>

All  S M T W T F S H

In these fields, specify for which day(s) the costing-line is applicable.
Any non-blank character will designate a weekday. H stands for holiday.

<h3><a href="#toc">TABLE START TIME</a></h3>

Here, you specify the starting time for the cost period. Make sure you
use 24-hour time format (e.g. 23:00 is 11:00 pm).

<h3><a href="#toc">TABLE END TIME</a></h3>

In this field, you specify the ending time for the cost period.

<h3><a href="#toc">TABLE NCI</a></h3>

Here's the CRITICAL part to understand. During a given cost-period, you
may choose which priorities of mail you would like to be sent. In the
NCI field, you may specify any or all of the letters N, C and I, desig-
nating the priorities NORMAL, CRASH and IMMEDIATE. If you list all three
"NCI," then all priorities of mail are allowed to be sent during this
cost-period. If you enter "CI," then just CRASH and IMMEDIATE mail
will be sent. This allows you to send NORMAL priority mail during the
low-cost periods and higher priority mail anytime (that's what this
example shows).

<h3><a href="#toc">TABLE FIRST PERIOD COST</a></h3>

In this field, enter the cost associated with the first billing period.
This is a decimal number with three digits after the decimal point.


<h3><a href="#toc">TABLE FIRST PERIOD SECONDS</a></h3>

Specify the number of seconds on which the FIRST PERIOD COST field
is based. In the United States, this is normally "60", but other
countries and/or long-distance carriers may have a different billing
increment.

<h3><a href="#toc">TABLE SUBSEQUENT PERIOD COST</a></h3>

In this field, enter the cost associated with the subsequent billing
periods. This is a number with three digits after the decimal point.

<h3><a href="#toc">TABLE SUBSEQUENT PERIOD SECONDS</a></h3>

Specify the number of seconds on which the SUBSEQUENT PERIOD COST field
is based. In the United States, this is normally "60", but other
countries and/or long-distance carriers may have a different billing
increment.


<a name="3.14"/><h2><a href="#toc">3.14  ZMODEM PARAMETERS</a></h2>

The ZMODEM PARAMETERS screen allows you to set the behavior of the ZMODEM
protocol which D'Bridge uses to send EMAIL.  Parameters include:

   - Starting block size
   - Maximum block size
   - Recover block size
   - Block step rate
   - Direct ZMODEM

<h3><a href="#toc">STARTING BLOCK SIZE</a></h3>

This is the block size to be used at the start of a ZMODEM file-transfer.
This must be a power of two between 32 and 8192 (32, 64, 128, 256, 512,
1024, 2048, 4096 or 8192).

<h3><a href="#toc">MAXIMUM BLOCK SIZE</a></h3>

This is the largest block size D'Bridge will use in ZMODEM. The value
will increase from the STARTING BLOCK SIZE to MAXIMUM BLOCK SIZE using
the BLOCK STEP RATE specified here.

<h3><a href="#toc">RECOVERY BLOCK SIZE</a></h3>

This is the block size to be used after an error has been reported by
the receiver. Normally, this value should be less than the starting
block size because where there is one error (phone noise) there may im-
mediately be another. Making the recovery block size small reduces the
amount of time it takes the system to recover from bad line noise.


<h3><a href="#toc">BLOCK STEP RATE</a></h3>

When the ZMODEM sender is not receiving error reports from the receiver,
it will increase the block size by doubling it after "x" successful
blocks until it reaches the MAXIMUM BLOCK SIZE specified. The BLOCK
STEP RATE is "x". In other words, it tells the system after how many con-
secutive good blocks it may increase the block size. By default, D'Bridge
uses a factor of 4.

<h3><a href="#toc">DIRECT ZMODEM</a></h3>

When D'Bridge communicates with other EMAIL systems capable of the DZA or
IZE protocols, you have the option of increasing throughput an average of
<a name="1.6%"/><h2><a href="#toc">1.6% by selecting direct ZMODEM. By answering Yes to this parameter, the</a></h2>
protocol will transmit the XON and XOFF characters transparently rather than
"escaping" them as the ZMODEM specification calls for. If you are having
ZMODEM trouble, try setting this to No to see if it makes a difference.


<a name="3.15"/><h2><a href="#toc">3.15  SETUP EDITOR OPTIONS</a></h2>

The SETUP EDITOR OPTIONS screen allows you to control the behavior of the
internal editor or configure an external editor such as GoldED.

This version of D'Bridge has a built-in TWIT FILTER system designed to
remove unwanted messages from your system, either before or after they
arrive. It is also integrated with the internal message editor so when
you are reading messages and decide you do not wish to receive mail from
that person, you add them to the TWIT list, and mail from them no longer
will appear on your system.

Depending on the option selected, you may also prevent mail from a "twit"
from being forwarded to other systems - though this practice is not
recommended. Therefore, the TWIT FILTER is an advanced option that most of
you will not use, except if you are receiving SPAM or *really* wish not to
see any mail from somebody.

The TWIT FILTER system is a feature found in most other EMAIL software and
I am including it here as a convenience.

<h3><a href="#toc">EMAIL EDITOR</a></h3>

EMAIL editor: Internal  (Internal/GoldED/Other)

This selects the EMAIL editor to be used when ALT-E is pressed or the menu
option "READ/EDIT EMAIL" is selected. The default is Internal, but GoldED
and many other Fidonet-compatible editors may just as well be used.

You should only use message editors that specifically state that they will
work with D'Bridge. The use of message editors designed for other Fidonet
products may not work as desired.

<h3><a href="#toc">EDITOR REBUILD QUEUE</a></h3>

Rebuild queue? Yes

This parameter gives you the option to automatically rescan the NETmail
area after EMAIL has been entered or deleted. This scan will happen im-
mediately after exiting the editor. If you want the mail scanned automa-
tically, specify Yes here. It will not scan automatically if you spe-
cify No.


<h3><a href="#toc">EDITOR SCAN ECHOMAIL</a></h3>

Scan ECHOmail? Yes

If you want to send ECHOmail messages immediately after leaving the
editor, specify YES here. The D'Bridge ECHOmail scanner knows what
areas need to be scanned if any. If you don't say YES here, then
ECHOmail will not be sent until an ECHOscan is run either in an event
or manually using the menu option: UTILITIES/Process ECHOmail.

<h3><a href="#toc">EDITOR SOUND EFFECTS</a></h3>

Sound effects? Yes

This specifies whether the "warning beeps" will be active in the internal
editor. Answer Yes, and change it to No later if the noise bothers you.


<h3><a href="#toc">EDITOR DEFAULT PRIORITY</a></h3>

DEFAULT: Priority? Normal    (Immediate/Crash/Normal/Hold)

This specifies the default priority for EMAIL messages. The priority de-
termines when (if at all) the message will be transmitted from the system.
Four priorities are available, listed here from highest to lowest:

    IMMEDIATE     When a message is flagged as IMMEDIATE, it has the
                  ultimate priority on the system. All IMMEDIATE
                  messages must be transmitted before any other out-
                  bound calls are possible. Using this priority is
                  quite effective in getting the mail out fast, but
                  has the disadvantage of slowing down outbound mail
                  traffic if the IMMEDIATE systems are busy or not
                  answering.

    CRASH         Messages flagged as CRASH are allowed to be sent
                  anytime, 24-hours a day. Unless a "hold" override
                  is placed on a system, an EMAIL message with CRASH
                  priority will be sent during the UNEVENT or any
                  scheduled event. If entered during the day, CRASH-
                  priority messages will most-likely be sent at the
                  highest phone rates.

    NORMAL        When a message is flagged as NORMAL, it will not
                  be transmitted until a scheduled mail event occurs.
                  Using this priority (usually overnight delivery) is
                  the most cost-effective way to use D'Bridge for EMAIL.

    HOLD          When a message is flagged as HOLD, it will not be
                  sent until the destination system polls or another
                  non-HOLD message is entered. Use HOLD priority if
                  you intend for most systems to call to pickup their
                  mail.


<h3><a href="#toc">EDITOR FORCED ROUTING</a></h3>

Forced Routing: None    (Direct/Hub/None)

Choose the desired routing method for NETmail messages entered using the
internal editor:

    DIRECT     This designates all messages (by default) to go directly
               to the destination systems, bypassing any event-specific
               routing controls.

    HUB        This defaults all messages to be HUB- or HOST-routed.

    NONE       This defaults to standard routing as defined in each
               mail event.

<h3><a href="#toc">EDITOR DEFAULT PRIVATE</a></h3>

Default private? Yes

This specifies whether the editor will default all new messages to
private status or not. "Private" usually means the EMAIL is only
intended for the receiver. However, you should note that mail can
be read on all systems it passes through (unless the messages are
encrypted somehow). The "Private" status does not work in Echomail.

<h3><a href="#toc">EDITOR DEFAULT KILL SENT</a></h3>

Default Kill/Sent? No 

This specifies the default for the "Kill when sent" flag in the editor.
If you have no use for a copy of outbound mail, you might want to
specify Yes here. Mail flagged KILL/SENT is erased after being sent
to the next destination.


<h3><a href="#toc">EDITOR DEFAULT ARCHIVE SENT</a></h3>

Default Archive/Sent? Yes

This specifies the default for the "Archive when sent" flag in the
editor. If you want to save a copy of the outbound mail in a text
file "archive", answer Yes here. When a message is sent, it will
be added to the text file, showing the date and time of transmis-
sion; the original message will subsequently be erased.

<h3><a href="#toc">EDITOR DEFAULT XMAIL</a></h3>

Default XMAIL? No 

This specifies the default setting for the "XMAIL" flag. If set to Yes, all
NETmail entered using the internal editor will, by default, be sent as com-
pressed mail utilizing the compression method defined in the XMAIL CONTROL
screen. When NETmail is marked as XMAIL, it will be marked as sent, deleted
and/or archived when the queue is built, making it impossible to re-edit the
message later. Unless this is really what you want, it is suggested you spe-
cify No here.

Note that the maximum number of Netmails able to be packed into Xmail when
the queue is built is 1024. If you run a system which processes large
amounts of Netmail on a regular basis, it may be necessary to add some DOS
events that "force" the Queue to be rescanned, ie. ECHO > DBRIDGE.RSN so
that the NETmail is always "packed out".

<h3><a href="#toc">EDITOR DEFAULT INSERT</a></h3>

Default insert? No 

This specifies the default state of the "insert mode" in the editor.
Some people prefer to work in insert mode; others don't. If you want
"insert" to be on in the editor by default, answer Yes here.


<h3><a href="#toc">EDITOR DEFAULT INTL ADDRESSING</a></h3>

MSGID/INTL addressing? Yes

In the multi-zone world of EMAIL today, it is almost mandatory for all
NETmail to contain international (zone-aware) addressing. Answer Yes to
this question unless there's a REALLY GOOD reason not to do so!

This option also controls the addition of MSGID/REPLY kludge lines to
your NETmail and Echomail messages. Some systems that you exchange mail
with, may require the use of these kludge lines. See "MSGID KLUDGE" for
more information.

<h3><a href="#toc">EDITOR QUOTE SEENBYS</a></h3>

Quote SEEN-BYs? No 

When entering a quoted reply with the internal editor, this field gives you
the option of including ECHOmail SEEN-BY information in the reply text. If
you want this, answer Yes, otherwise specify No.

<h3><a href="#toc">EDITOR CUSTOM TEAR LINE</a></h3>

This option allows you to specify your own "tear" line that gets added
to outgoing Echomail messages generated from the internal message editor.
This is a feature found in other message editors and I am including it here
as a convenience. Your custom tear line must NOT begin with "---" and
must be less than 20 characters.

If you don't want your own custom tear line, leave it blank, and D'Bridge
will generate one that contains it's version/release information.

Note that this feature only works if you are using the internal editor
to write mail. It will not work if you're using an external message editor
such as GoldEd or you're running BBS software that modifies the tear line.


<h3><a href="#toc">PERSONAL MAIL WAITING</a></h3>

When D'Bridge unpacks mail, you have some choices of how you wish to be
notified of new mail waiting. Answer the following:

        EMAIL - D'Bridge will send you an Internet EMAIL message notifying
                you of personal mail waiting as well as indicate personal
                mail in the LOG and ACTIVITY screens. An audio alarm will
                also go off during the times specified in the BASIC
                CONFIGURATION screen. The Internet EMAIL address for
                notifications is specified in the EMAIL/USENET GATING
                screen.

          YES - Same as above but without Internet EMAIL notification.

           NO - No alerts are shown when personal mail arrives. This may
                be desirable for those of you running BBS software or
                a 3rd-party message editor.


<h3><a href="#toc">ACKNOWLEDGE RRQS</a></h3>

  A Return Receipt Request (RRQ) kludge is a flag on a NETmail message to
  trigger D'Bridge to send the sender of the message a "receipt"
  acknowledging that the message has been read by the receiver.
  
  When a RRQ kludge is encountered, D'Bridge will write a "receipt" NETmail
  to the sending system indicating that the original message has been read
  for the first time by the receiver. The receipt that gets sent back is a
  simple NETmail message indicating the time and date that the message was
  read, along with a copy of the original message. The receipt is sent back
  to the receiver during the next QueueScan, and is subject to the routing
  defined in the SCHEDULER.
  
  Note that the RRQ kludge feature only works for the built-in internal
  message editor. It will NOT work with GoldED or any external editors.
  
  The RRQ kludge feature has three options:
  
    YES - The editor will acknowledge RRQ's automatically without your consent.
  
    ASK (Default) - The editor will display a pop-up window when it encounters
    a message with the RRQ kludge and ask you if you wish to acknowledge
    receipt.
  
    NO - The editor will not acknowledge RRQ's.
  
  The internal editor's "Add Return Receipt" option will only show up in
  the menu when you are writing a NETmail message only. It will not be shown
  when writing Echomail messages or if the RRQ kludge feature is turned off


<h3><a href="#toc">EDITOR USERS</a></h3>

Valid users: Chris Irwin,SECRET          

Here, you specify a list of valid users and their "passwords". The
correct format for a user line with a password is:

&lt;USERNAME>[,&lt;OPTIONAL PASSWORD>]

If more than one line is entered here, every time the editor is run,
you must specify which user you are. This is for the "FROM" field in
the message editor. If you only specify one line, you won't have to
confirm anything (except your password, if specified).

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.

<h3><a href="#toc">TAGLINE SUPPORT</a></h3>

  D'Bridge has the ability to add a TAGLINE to outgoing messages. Taglines
  are nothing more than cute "words of wisdom", and are placed just before
  the tear line in the message. For example:
  
  ... Work fascinates me.  I can sit and watch it for hours.
  ... The Big Bang is only the universe rebooting.
  ... NO MESSAGES FOUND. [H]it modem. [S]cream at fido gods. [Y]ell profanity
  ... Death before dishonor, neither before breakfast.
  
  You get the idea. So, answer this question as follows:
  
              YES - Append a tagline to all messages.
    ECHOMAIL ONLY - Append a tagline to Echomail messages only.
     NETMAIL ONLY - Append a tagline to NETmail messages only.
              ASK - Ask each time if its okay to add a tagline.
         DISABLED - Shuts off the tagline support.
  
  The default setting is ECHOMAIL ONLY - Taglines will be added only to
  messages in Echomail areas.
  
  The taglines are saved in a text file called DBTAGS.TXT that is read and
  indexed by D'Bridge upon starting the internal message editor. Feel free
  to modify this file to whatever you like. It is not necessary to add the
  three dots (...) before the tagline.


<h3><a href="#toc">EDITOR KLUDGE LINES</a></h3>

  Kludges are "hidden" lines of text in Fidonet messages that contain details
  such as the path of the message and MSGID information. Kludge lines are
  used by almost all software out there that allows you to participate in
  Fidonet or related networks.
  
  Answer YES if you wish to view the kludges when reading messages in the
  internal editor, or NO if you don't care to read all that extra stuff. The
  default is NO.

<h3><a href="#toc">EDITOR QUOTE STYLE</a></h3>

  When replying to a message and quoting the original, you can have the
  initials of the original poster before the > symbol. Answer YES if you
  want this, or NO if not. This option is set to NO if you are upgrading
  from version 2.68 or lower.

<h3><a href="#toc">GOLDED PATH</a></h3>

GoldED path: C:\GOLDED                 

If you have chosen GoldED as your EMAIL reader/editor, specify the directory
path where this program is located.

<h3><a href="#toc">EDITOR DOS COMMANDS</a></h3>

DOS commands: C:\MYEDIT\MYEDITOR /C /U                     

If you have chosen Other as your EMAIL reader/editor, specify the DOS
commands to invoke your editor here.


<a name="3.16"/><h2><a href="#toc">3.16  ECHOMAIL AREAS</a></h2>

The ECHOMAIL AREAS screen allows you to define the local and ECHOmail areas
that you wish to use with D'Bridge.

<h3><a href="#toc">ECHOMAIL CODEWORD</a></h3>

Codeword: DBRIDGE        

The CODEWORD is a word from 1 to 16 characters which you designate as a
mnemonic reference to an area. It could be a word like POL for politics
or PROG for programming conference. CODEWORDs must be unique - "NETMAIL"
and "BADECHO" are predefined by the system and may not be used here.

<h3><a href="#toc">ECHOMAIL ALERT FLAG</a></h3>

Alert flag: D

If you wish to be notified (on the status line) about new mail in this
area, specify a one character "flag" here. When mail is received, the
mailer will show it by listing the defined "flag" character on the right
side of the bottom status line.

<h3><a href="#toc">ECHOMAIL SECURITY LEVEL</a></h3>

Security level: 500 

The SECURITY LEVEL is used by the AREAFIX subsystem to allow other
systems to automatically add or delete themselves from ECHO links.
Security levels range from 0 to 9999; if a system has a security
level of 50, it has access to all areas with a SECURITY LEVEL of 50
or less. If you don't want anyone to have access to an area, define
its level to be 9999.


<h3><a href="#toc">ECHOMAIL GROUP SORT</a></h3>

Group/Sort: A1

GROUP/SORT is a two-byte field; the first character is the AREAFIX access
group; the second is the sort code for use with DBUTIL SORT AREAS.
In AREAFIX, each area is assigned a GROUP code. Each system with an AREAFIX
password also has one or more group codes associated with it. Only those
systems with matching GROUP codes have access to a given area.

<h3><a href="#toc">ECHOMAIL DESCRIPTION</a></h3>

Description: D'Bridge Support Conference          

This description field will be used throughout the system to describe the
conference.

<h3><a href="#toc">ECHOMAIL STORAGE</a></h3>

Storage method: Fido     (Fido/QuickBBS/None)

There are several choices for the storage method of a message base:

    FIDO       With FIDO format, each message is stored in a separate
               file in the specified directory. This is the most
               common storage format among Fidonet-based systems, but
               has the disadvantage of being slower than the other
               formats.

    QUICKBBS   With the QUICKBBS format, messages are stored directly
               in a QuickBBS message base. This base may exist stand-
               alone or in conjunction with a QuickBBS system.

    NONE       If NONE is specified, the area is regarded as an area
               "passing through" your system. The messages are not ac-
               tually stored on this system, just forwarded to the spe-
               cified systems.


<h3><a href="#toc">ECHOMAIL DATABASE INFORMATION</a></h3>

  This question is where you specify either the DIRECTORY PATH for Fido
  *.MSG storage or the number of the message base if using QuickBBS.
  
  Directory path: C:\MESSAGES\CHATECHO
  
  For Fido *.MSG storage, enter a valid path to where Echomail will be stored.
  
      QuickBBS #: 1  
  
  If QuickBBS is being used to store messages, then each QuickBBS area must
  have a unique area number in a range from 1 to 200. If you
  accidentally assign the same number to different areas, you will locally
  "crosslink" the conferences. Specify a UNIQUE number here or match your
  existing BBS setup.

<h3><a href="#toc">ECHOMAIL DEFAULT PRIVATE</a></h3>

Default private? No 

If you want the editor to flag messages as PRIVATE by default, answer Yes.
This only affects the internal message editor when entering or replying to
messages. Most ECHOmail conferences are by nature "public" - Private ECHOmail
can be read by all receiving system operators.

<h3><a href="#toc">ECHOMAIL ARCHIVE FILE</a></h3>

Area archive: C:\ECHO\DBRIDGE.TXT                  

If you want D'Bridge to save a copy of each message purged when DBUTIL
PURGE is run, specify a text file to "archive" them in. Each area may
write messages to a different file, or you may combine several areas into
a single text file. If you don't want to save a copy of the messages, just
leave this field blank.


<h3><a href="#toc">ECHOMAIL PURGE CRITERIA</a></h3>

Purge except: 100  messages

Purge after: 30  days

In the DBUTIL PURGE program, there are two options for deciding which
messages to erase from the system. When the cursor is on this field,
you may press the F10 key to switch between the methods: PURGE EXCEPT
and PURGE AFTER.

With PURGE EXCEPT, DBUTIL will erase all but "x" messages; specify "x"
in this field as "how many messages to save after purging". With the
PURGE AFTER option, DBUTIL will purge messages based on their age.
PURGE AFTER 30 DAYS means to erase all messages over 30 days old when
the utility is run.

<h3><a href="#toc">ECHOMAIL PRESERVE MESSAGES</a></h3>

Preserve: 200  messages

In DBUTIL PURGE, you may specify a certain number of messages to ignore
while purging. These will be the lowest-numbered messages in the area
and contain information you don't want erased such as conference rules,
etc.

<h3><a href="#toc">ECHOMAIL AREA TYPE</a></h3>

Area type: ECHOmail (ECHOmail/Local)

User-defined areas are either Local or ECHOmail. The default is ECHOmail
and should be left this way under most circumstances.

D'Bridge ignores LOCAL areas except while in the editor; when an ECHOscan is
executed, all ECHOmail areas are scanned for outbound mail.


<h3><a href="#toc">ECHOMAIL CONFERENCE NAME</a></h3>

Conference name: DBRIDGE                               

Each ECHOmail area must have a unique CONFERENCE NAME. This may be the
same as or different from the CODEWORD specified above, but must reflect
the actual ECHOmail name or conference tag used for the specified area.
The CONFERENCE NAME may be up to 54 characters and must not contain any
spaces; when creating a new ECHOmail conference, it is suggested your
CONFERENCE TAG should not exceed 16 characters if at all possible to
maintain compatibility with other systems.

<h3><a href="#toc">ECHOMAIL ORIGIN LINE</a></h3>

Origin line: Nancy's BBS - Middletown, Ohio            

The ORIGIN LINE defaults from your SYSTEM NAME (specified on the BASIC
CONFIGURATION screen) and will be added to the bottom of all ECHOmail
messages originating from your system. Typically, sysops use the name
of their system and the city where it is located.

<h3><a href="#toc">ECHOMAIL ALIAS ADDRESS</a></h3>

Alias address:                      

If you are a member of more than one network, it might be necessary to
use an "alias" address on an ECHOmail area. This means that the address
put on the ORIGIN-LINE of the messages will be different than your pri-
mary address.
Most systems would leave this blank.


<h3><a href="#toc">ECHOMAIL TINY SEENBYS</a></h3>

Tiny SEEN-BYs? No 

If you say YES to TINY SEEN-BYs, then only the systems you are forwar-
ding a conference to will appear on the SEEN-BY lines. This is fine if
you are a "leaf node" or a local ECHO hub; PLEASE NOTE THAT USING THIS
<h3><a href="#toc">OPTION IS NOT ALLOWED IN SOME NETWORKS - CONTACT YOUR LOCAL ECHOMAIL</a></h3>
COORDINATOR FOR MORE INFORMATION.

<h3><a href="#toc">ECHOMAIL DEFAULT PRIORITY</a></h3>

Default priority: Normal      (Immediate/Crash/Normal/Hold)

For each conference, you specify a DEFAULT PRIORITY for forwarding of
ECHOmail. Choose either IMMEDIATE, CRASH, NORMAL or HOLD; This
default may be overridden for any specific system.

<h3><a href="#toc">ECHOMAIL FORWARD TO</a></h3>

Forward to: 1:110/68 22 .20                                  

The FORWARD TO fields allow you to specify a list of systems to whom you
wish to forward this ECHOmail conference. You may specify as many systems
as will fit on the 5 lines available; the systems should be separated by
spaces and be in the format:

ZONE:NET/NODE[,PRIORITY] or .POINT[,PRIORITY]

Here's an example:

1:18/0 1:105/3 1:110/22,C .20,H

In this example, 1:110/22 has CRASH priority as an override and .20 has
HOLD priority specified. Please note that you may only forward ECHOmail to
points or your own node. You may not send NETmail or ECHOmail directly to a
point of another system.

With this example, if I enter an ECHOmail message in this area, it will
automatically be forwarded to these four systems, who will in turn send my
message on to all the other systems participating in the conference.


<h3><a href="#toc">ECHOMAIL WEB ACCESS</a></h3>

On Web Server: YES

If you are using the DBUTIL PROCESSWEB command to make your message areas
available on the World Wide Web, answer YES. You can also answer DETAILED
to show information normally excluded such as kludge lines and SEEN-BY's.
Or, answer NO if you do not wish to allow this area to be accessed on
your Web server. Certain areas on Fidonet may have policies forbidding the
posting of contents to the Web. Please use due diligence.

If you wish to filter out high-ASCII characters, answer YES to the Web
ASCII question. Answer NO only if you are using an HTML font that supports
displaying of ASCII or have otherwise wrote your own code for your Web site
to deal with that issue.

Please refer to the DBUTIL documentation/help for more information and
instructions on configuring Web Server support in D'Bridge.

RESCAN LIMIT:

The Areafix system in D'Bridge has the ability to process "rescan" requests
from downlinks. A rescan-request is an Areafix message from a system to
gather up all the messages in a given Echomail area and send them off
to the system.

This option allows you to place a cap on the amount of messages returned
in a rescan. By default, all messages will be sent out - Specify 0 to allow
all messages to be sent. Placing a limit on the messages returned in a
rescan may be useful for those of you running large Hub systems or you store
a large amount of mail. The maximum this can be set to is 9999.

<h3><a href="#toc">QWK INDEXING</a></h3>

  QWK networking support requires that you specify an "index number" to use
  for any message forums you wish to allow access to. The number must be
  between 1 and 255 and should match the remote setup whenever possible. If
  you specify zero here, QWK support is disabled for this area, and any
  replies tossed via QWK will be immediately rejected. QWK support is also
  disabled if this is a "Passthru" area.
  
  When a number is specified, it should never be changed unless theres a
  really good reason to do so...


<a name="3.17"/><h2><a href="#toc">3.17  WINDOW COLORS</a></h2>

The WINDOW COLORS screen allows you to set the screen colors that D'Bridge
will use.


<a name="3.18"/><h2><a href="#toc">3.18  KEYBOARD MACROS</a></h2>

The KEYBOARD MACROS option allows the operator to define "macros" that
cause keys, ALT F1-F10 and CONTROL F1-F10, to substitute preprogrammed
text while editing. This might be handy for "canned" introductions,
signatures or whatever you can think of. Twenty keys may be defined and
each key can have any amount of text desired. Note: This limit is RAM-
based, so check your memory status if in question.

The cursor will appear on the top line. Fields may be changed by typing
over the current values or by using the field edit keys: INSERT, DELETE,
LEFT and RIGHT arrows. Pressing ENTER or the DOWN arrow advances to the
next line and pressing the UP arrow moves the cursor to the previous
line. You must press the ESC key to exit this window and save the setup.
The above example shows the definition for the CONTROL-F1 key as being
my mailing address. Each key is defined in its own window. All vertical
pipe characters "|" are translated to hard-returns in the editor.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<a name="3.19"/><h2><a href="#toc">3.19  TRANSLATION TABLE</a></h2>

The TRANSLATION TABLE screen allows you to redefine how certain characters
will be displayed. This may be used to allow line-drawing or foreign
character sets to be used in the internal message editor. The ALT-keys
(a-z) may be defined as displaying any character and transmitting it as a
normal printable character in the range of 33-126.

This is an advanced option and is not normally needed, so if you have no
need for foreign character sets, skip this screen.

It allows you to redefine part of the printable character set as translating
to non-standard characters. Pressing the LEFT and RIGHT arrow keys scans
through the characters, helping you to locate the proper ASCII code.


<a name="3.20"/><h2><a href="#toc">3.20  SOUP GATING</a></h2>

D'Bridge ships with support for Internet EMAIL and USENET "out of the box"
and can operate as a gateway. Setting things up in this screen is very
straightforward, but requires a little bit of planning on your part as to
how you want these to work. However, if you are using 3rd-party software
to gate mail to the Internet, you do not need to configure any settings
in this screen. You also don't need to setup anything if you're already
using another Fido system thats doing the job of being an Internet gateway.

Internet EMAIL is gated using SMTP (Simple Mail Transfer Protocol)
and POP3 (Post Office Protocol 3) - technical terms for the methods that
are used to exchange mail. Outbound mail is sent using SMTP and inbound
mail is received using POP3. You will need your Internet provider's SMTP
and POP3 settings to correctly configure support. You also need to be
able to "control the domain" if you plan to route Internet EMAIL for other
users or Fido systems that connect to your D'Bridge system. Please contact
technical support or the DBRIDGE echo for more assistance on setting up
your Internet EMAIL domain to be used in D'Bridge.

Note that D'Bridge won't "talk" directly to Microsoft Exchange Server
or BlackBerry Enterprise Server. If you use one of those products then you
will need to manually enable serving of SMTP and POP3 for D'Bridge "on the
back end" for things to work properly.

Internet USENET groups are exchanged using the NNTP protocol. Most Internet
providers are starting to "shy away" from offering Usenet groups; so I've
found that you need to have a paid subscription to a third-party provider.
As of this writing I highly recommend usenetmonster.com. When USENET
is configured in this screen, D'Bridge will properly gate Usenet groups
to-and-from your system - And you can offer Usenet groups to any Fido
systems that exchange mail with you.

The questions in this screen must be answered correctly. Please pay
close attention to any login ID's and passwords required. If a specific
port must be used, be sure that any routers or firewalls are also
configured properly. Again if in doubt, please contact technical support or
the DBRIDGE echo on Fidonet for assistance.


TEST POP3 NOW

If you answer YES and you enabled the VSOUP utility support, D'Bridge will
test to see if your SMTP and POP3 settings are working. This functions
sortof like the "Test Accounts" feature in Microsoft Outlook. In fact, if
you use Outlook or Outlook Express, it may be desirable to also enter your
EMAIL settings into one of those programs to aide in diagnostics
incase D'Bridge itself is not exchanging mail properly.

<h3><a href="#toc">TEST USENET NOW</a></h3>

If you answer YES to this question and the VSOUP utility is enabled earlier
in this screen, D'Bridge will connect to your Usenet provider and "synch up"
all groups... provided that your login settings are correct. Note that
a "sync-up" operation is done for self-diagnostics - and that if you decide
to change Usenet providers in the future, a sync-up is required to update
the "count" of messages from the other provider.

<h3><a href="#toc">SOUPGATE ADDRESS</a></h3>

The gating features of D'Bridge work by having you define a Fido address
to use as the gateway point. All corrospondance that is addressed to that
address will be processed out to the Internet. Likewise, any Internet EMAIL
and USENET postings received will originate from that address. Any Fido
systems that exchange mail with you will be allowed to route mail to this
gateway address. Groups can easily be restricted by using the proper
settings in the PACKET/MAIL CONTROL screen.

This question is where you specify the Fido address to use. This should NOT
be an alias or "AKA" address. If you leave this question blank, all Internet
EMAIL and USENET gating features will be disabled. If you have upgraded
from 2.94 or earlier, the gateway address would have been DELETED entirely
as before it was okay to have it as an AKA address - Now its not.

It is not necessary for you to use the gating features of D'Bridge if you
are using 3rd-party software to do gating (such as Internet Rex by Charles
Cruden), or you exchange mail with another Fido system thats already acting
as an Internet gateway. If you deal with another Fido system for Internet
matters, then DO NOT use the features in this screen.


<h3><a href="#toc">VSOUP SUPPORT</a></h3>

Please select the type of operating system you wish to use the Internet
VSOUP program, or answer NO if you plan to use something else. Note
that the VSOUP utility will NOT function for "plain" DOS systems (ie. MS-DOS,
Tandy DOS, PC-DOS or DR-DOS). You MUST be running a multi-tasking operating
system, and depending on what you answer, some service packs or updates may
be required before you can use the Internet features:

   Windows - Answer "W" for Microsoft Windows 95 or higher. Be sure that
             all the appropriate security patches/service packs are applied.
             If you are running Windows XP with Service Pack 2, be sure
             that the "Windows Firewall" settings are configured to allow
             the VSOUP utility program to run, and that the port setting you
             define in this screen is also configured accordingly. If you
             are running Windows 95, you must install the Winsock 2
             Extensions Update, available from Microsoft's website. The
             update is not necessary for Windows 98, ME, NT, 2000 or XP
             systems. That update applies to Windows 95 specifically.

      OS/2 - Answer "O" for IBM's OS/2 WARP operating system. Your OS/2
             environment MUST match one of the following criteria:

                - Warp 3 RedSpine/BlueSpine w/TCPIP and EMX 0.9d.
                - Warp 3 BlueSpine Connect w/TCPIP, MPTS and EMX 0.9d.
                - Warp 4 (client or LAN server) w/TCPIP, MPTS and EMX 0.9d.

             "Spine" refers to the actual color of the floppy/CD-ROM box.
             For example, RedSpine refers to the red box with the standard
             white IBM logo. BlueSpine refers to the blue box with the IBM
             logo and in most cases the "Warp" logo being a colorful swirl.

<h3><a href="#toc">VSOUP LOGGING</a></h3>

If you wish to receive logs and receipts from VSOUP specify the file here.
This question should be set to "blank" (nothing) when everything is working
properly, otherwise the size of the logs can grow out of hand...


<h3><a href="#toc">SOUP SMTP ADDRESS</a></h3>

Outbound Internet EMAIL is sent using the SMTP protocol. D'Bridge will
create the necessary files and pack up all Internet EMAIL accordingly to be
sent out to the SMTP server of your choice. SMTP support only works when
the VSOUP setting is configured for Windows or OS/2.

Answer this question with your relevant SMTP information. Consult your
provider for help if necessary. Be warned that the VSOUP program that ships
with D'Bridge does NOT support SSL encryption. If this is a problem, visit
my Web site and download the "X-Ray Mail Assistant" from the SOFTWARE
DOWNLOADS section. Then, consult technical support or the DBRIDGE echo
on Fidonet for help. X-Ray Mail Assistant cannot be shipped with D'Bridge.
That program "emulates" the connection to VSOUP and actually takes over
the duty of connecting to the SMTP server - and supports SSL authentication.

If X-Ray Mail Assistant is installed, answer "localhost" (no quotes) to
this question instead. DO NOT specify the address of the SMTP gateway.

The format is username:password@smtpaddress[:port], for example, if
my usenet provider's login is "Nick" and the password is "MyPassword"
and I need to connect on port 20000, you would answer:
Nick:MyPassword@usenetprovider.com:20000

It is not necessary to specify the "smtp://" prefix in this question.


SOUP POP3 ADDRESS

If you are using the VSOUP program shipped with D'Bridge, then this question
is where you tell it which POP3 address to check for Internet EMAIL. This
setting only works when VSOUP is configured for Windows or OS/2.

Any mail waiting in this POP3 account will be downloaded and processed as if
it was destined for your system - There is no "filtering", so be sure that
this is a DEDICATED account that will be used specifically for D'Bridge
EMAIL only.

Later in this screen is a question that lets you specify the time in
minutes for when D'Bridge should check for incoming Internet EMAIL.

The VSOUP program that ships with D'Bridge does not support SSL encryption,
and if this is a problem, you will need to use a 3rd-party utility to
"fool" VSOUP's connection (such as X-Ray Mail Assistant described earlier).

If X-Ray Mail Assistant is installed, answer "localhost" (no quotes) to
this question instead. DO NOT specify the address of the POP3 gateway.

The format is username:password@pop3address[:port], for example, if
my usenet provider's login is "Nick" and the password is "MyPassword"
and I need to connect on port 20000, you would answer:
Nick:MyPassword@usenetprovider.com:20000

It is not necessary to specify the "pop3://" prefix in this question.

<h3><a href="#toc">SOUP YOUR EMAIL DOMAIN</a></h3>

Answer this question with the domain of the Internet EMAIL address that
all corrospondance routed via D'Bridge and VSOUP should be sent and
received on. You must be able to download all mail for the domain. For more
assistance please consult the DBRIDGE echo on Fidonet or contact technical
support for assistance with this question. It is beyond the scope of this
help file to provide help for domain-related issues.


<h3><a href="#toc">SOUP YOUR EMAIL ADDRESS</a></h3>

Answer this question with your Internet EMAIL address. Your Internet EMAIL
address is used for the following situations:

- Where unroutable or undeliverable Internet EMAIL will be sent back to.

- The internal message editor will use as the from-address for composing
  Internet EMAIL messages destined for the gateway.

- The "You've Got Mail" feature will use this address to write messages
  from, as per the Notification Address setting in the next question.

<h3><a href="#toc">SOUP NOTIFICATION ADDRESS</a></h3>

If you wish to be notified by Internet EMAIL when D'Bridge has unpacked
any mail addressed to you, specify that address here. This is optional and
only works if the "You've Got Mail" setting is configured in EDITOR OPTIONS.

When you specify an address such as a Hotmail or Yahoo type, you should
remember that you can also elect to have "Mobile notifications" using those
services - effectively letting D'Bridge notify you via cell phone text-
messaging when it has mail for you!

If you are using a BlackBerry, it is not necessary to create a Hotmail
or Yahoo account for the previous "Notification EMAIL" question; you should
specify your BlackBerry EMAIL address (provided by your cell phone carrier).
Only proceed with creating a Hotmail or Yahoo account if you don't have one.


<h3><a href="#toc">SOUP ALLOW ECHOMAIL VIA EMAIL</a></h3>

  This setting lets you participate in Fidonet using Internet EMAIL provided
  all other settings are configured properly (Gate address, VSOUP, SMTP and
  POP3). Note that only yourself may use this feature - this setting does
  not allow any downlinks, BBS users or other users of your D'Bridge system
  to access Echomail via Internet EMAIL.
  
  When this feature is enabled, a unique "serial number" is assigned to any
  Echomail destined for Internet EMAIL so its possible to reply properly to
  the messages. The serial number is not stored in the Echomail message
  itself; but in a small database maintained by D'Bridge itself.
  
  You can participate in Fidonet using your cell phone text-messaging if you
  have the "You've Got Mail" question in EDITOR OPTIONS set to EMAIL and you
  configured a notification address in the previous question. D'Bridge is
  smart enough to configure the size of the messages to be "cell phone
  friendly" and automatically quotes the previous reply if its missing since
  text-messaging itself does not have a "quote" feature. Be sure that your
  cell phone is somehow able to receive Internet EMAIL.
  
  This question has three answers:
  
  Answer NO to disable Echomail/NETmail via Internet EMAIL.
  
  Answer YES to enable the feature.
  
  Answer SMART to this question if you use a "regular" cell phone and you like
  to "speak IM" (in other words = IOW, i c u = I see you, r u there = Are you
  there, etc etc). D'Bridge will translate "IM-speak" into "English speak".
  If its not working properly, change your answer from SMART back to YES.
  You should answer YES if you are using a BlackBerry, Apple iPhone, Palm Trio
  or any cell phone for that matter that has "SmartText" technology. D'Bridge
  will not attempt to translate any "IM speak" from text-message replies since
  those phones usually have a "Qwerty" keyboard to begin with, or at least
  translate certain "IM speak" automatically.
  
  If you are using a BlackBerry, it is not necessary to create a Hotmail
  or Yahoo account for the previous "Notification EMAIL" question; you should
  specify your BlackBerry EMAIL address (provided by your cell phone carrier).
  Only proceed with creating a Hotmail or Yahoo account if you don't have one.


<h3><a href="#toc">SOUP NNTP ADDRESS</a></h3>

This question is where you specify the address settings for exchanging
Usenet groups in D'Bridge. This should match your Usenet provider's
settings exactly. If no address is specified, USENET support is disabled.

There is a question in this screen that lets you specify the time, in
hours, for when D'Bridge should check for new Usenet mail. When this
is configured; its not necessary to run events to check manually.

The format is username:password@usenetaddress[:port], for example, if
my usenet provider's login is "Nick" and the password is "MyPassword"
and I need to connect on port 20000, you would answer:
Nick:MyPassword@usenetprovider.com:20000

It is not necessary to specify the "nntp://" prefix in this question.

<h3><a href="#toc">ALLOW POSTINGS AND REPLIES</a></h3>

USENET replies can be completely disabled, effectively making the groups
"read only". This may be desirable under some circumstances. Answer NO to
make all USENET groups read-only (no postings allowed), or YES otherwise.
The default setting is actually NO because a lot of Usenet providers
restrict replies anyway until you have manually validated your account.

<h3><a href="#toc">MAXIMUM MESSAGES TO DOWNLOAD</a></h3>

This sets a cap on the maximum amount of messages that should be downloaded
per group whenever a connection is made on Usenet. The default setting is
500 messages and that should be good enough for most installations.

If you answer zero (0) to this question, no cap is put in place. THIS IS NOT
RECOMMENDED for those of you who download large volumes of mail, because all
it takes is a large posting in some group to effectively "tie up" your
connection. A cap should always be put in place as a fail-safe.


<h3><a href="#toc">MAXIMUM TO DOWNLOAD ON NEW GROUPS</a></h3>

Most Usenet providers keep a fairly large "retention" rate - That is, they
tend to keep a lot of messages per group. So it makes sense that when you
connect to a Usenet group for the first time, you would end up downloading
all of the messages in that group to "catch up". This can easily tie-up your
Internet connection for hours on end. So in this question, you can specify
a limit as to how many messages to download when D'Bridge/VSOUP connects to
a Usenet group for the first time.

The default is 100 messages, and should not be changed for normal usage.
Reduce this to 50 or even down to 25 when "hubbing" a lot of Usenet groups.
Increase this number if you carry less than a dozen or so groups in total.

If you answer zero (0) to this question, no cap is put in place. THIS IS NOT
RECOMMENDED unless you're an experienced D'Bridge administrator and theres
some strange or bizarre reason not to place a cap on new messages...

<h3><a href="#toc">ALLOW GATING FOR OTHERS</a></h3>

If you wish to allow other systems to gate their Internet EMAIL through
you, answer YES, otherwise answer NO to this question.

The default setting is NO and you should NOT enable this setting unless you
have a fundimental and thorough understanding of how Internet EMAIL is
processed by D'Bridge, and you are a diligent network administrator.

<h3><a href="#toc">SPECIFIC EMAIL MAPPING</a></h3>

If you wish to specify any additional Internet EMAIL routing or mappings,
you may do so in this question. This is an advanced feature and should only
be used under instruction from technical support or the DBRIDGE echo
on Fidonet. Please do not specify any settings unless absolutely necessary.


<h3><a href="#toc">ADDITIONAL OPTIONS</a></h3>

If you need to specify any additional options for the SOUPGATE processor,
please enter them here. Again this is an advanced feature and should not
be used unless absolutely necessary.

* <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<a name="3.21"/><h2><a href="#toc">3.21  MODEM RESULT CODES</a></h2>

  This screen allows you to specify your own custom result codes for your
  modem device. If you do not have a modem, obviously this screen is of no
  use to you.
  
  This screen is here mostly to satisfy the requirements of those of you who
  may be running D'Bridge in a "virtual-modem" environment, such as Ray
  Gwinn's VMODEM product for the OS/2 WARP operating system.
  
  WARNING: Incorrectly setting these options WILL result in system malfunction.


<a name="3.22"/><h2><a href="#toc">3.22  BINKD</a></h2>

  D'Bridge 2.95 and later ship with a redesigned BINKD system that integrates
  with the "mailer", allowing you to serve both Internet and Dialup users.
  This is accomplished using the open-source BINKD thats available publically.
  
  The questions in this screen is where you configure the systems that will be
  connecting for their mail over the Internet. D'Bridge treats mail for
  Internet systems the same way it does for Dialup - Queue entries are built
  and "calls" placed are subject to the limits specified for the current mail
  event defined in the SCHEDULER. Of course, this can all be overridden.
  
  If you need to have people connect to you for mail over the Internet, then
  you need to run the BINKD system as a "server" process. Please refer to the
  help screens for the features for a detailed explanation.


<h3><a href="#toc">BINKD SUPPORT</a></h3>

This screen allows you to configure the BINKD support in D'Bridge. Note
that the BINKD system will NOT function for "plain" DOS systems (ie. MS-DOS,
Tandy DOS, PC-DOS or DR-DOS). You MUST be running a multi-tasking operating
system, and depending on what you answer, some service packs or updates may
be required before you can use the Internet features:

   Windows - Answer "W" for Microsoft Windows 95 or higher. Be sure that
             all the appropriate security patches/service packs are applied.
             If you are running Windows XP with Service Pack 2, be sure
             that the "Windows Firewall" settings are configured to allow
             the BINKD utility program to run, and that the port setting you
             define in this screen is also configured accordingly. If you
             are running Windows 95, you must install the Winsock 2
             Extensions Update, available from Microsoft's website. The
             update is not necessary for Windows 98, ME, NT, 2000 or XP
             systems. That update applies to Windows 95 specifically.

      OS/2 - Answer "O" for IBM's OS/2 WARP operating system. Your OS/2
             environment MUST match one of the following criteria:

                - Warp 3 RedSpine/BlueSpine w/TCPIP and EMX 0.9d.
                - Warp 3 BlueSpine Connect w/TCPIP, MPTS and EMX 0.9d.
                - Warp 4 (client or LAN server) w/TCPIP, MPTS and EMX 0.9d.

             "Spine" refers to the actual color of the floppy/CD-ROM box.
             For example, RedSpine refers to the red box with the standard
             white IBM logo. BlueSpine refers to the blue box with the IBM
             logo and in most cases the "Warp" logo being a colorful swirl.

If your BINKD setup is running under Linux or some other environment, or you
need to have the functionality of this screen but without all the "calls"
to the BINKD modules, answer LINUX.


<h3><a href="#toc">BINKD PORTS</a></h3>

  This question is where you specify the Internet "ports" that BINKD shall
  be using. Remember that when BINKD is being ran as a server, you need to
  be sure that any router or firewall configuration is programmed to allow
  activity on the specified port. The default setting is 24554 and should NOT
  be changed in most cases.
  
  On outgoing connections, this sets the default port, again this should be
  left alone at 24554. The outgoing port can be overridden for each system
  in the BINKD SESSIONS screen later on.
  
  On Windows XP and Windows Server 2003, a warning-screen may appear when
  BinkD is ran for the first time. Answer "ALLOW EXECUTION" when prompted.

<h3><a href="#toc">MAXIMUM CONNECTIONS</a></h3>

  The maximum incoming and outgoing sessions allows you to define a limit to
  how many simultaneous connections the BINKD system should handle at once.
  Those of you who are running really busy systems may elect to place a "cap"
  on the number of simultaneous sessions that can be served at once.
  
  This really only affects BINKD when its ran as a "server", because when its
  not, D'Bridge treats outbound BINKD sessions as it does with Dialup - the
  limits are controlled by the D'Bridge Queue and NOT the BINKD system.

<h3><a href="#toc">SECONDS BETWEEN OUTGOING CALLS</a></h3>

  When running D'Bridge BINKD support as a "server", you may choose to specify
  the time-between-calls, just like you would for Dialup sessions. The
  default is 60 seconds between "calls". When BinkD is not ran as a server,
  then D'Bridge treats outgoing BinkD calls subject to the times and
  priorities defined in the SCHEDULER screen.


<h3><a href="#toc">BINKD SESSIONS</a></h3>

  The next few questions control who you exchange mail with using BinkD. When
  properly configured, D'Bridge will automatically manage all of the mail
  transactions and take care of the mail-moving "behind the scenes". Lets take
  a look at how this all works.
  
  The BINKD SESSION INFORMATION window is where you specify the systems to
  exchange mail with using the included BinkD program. The format of
  the screen is as follows:
  
  &lt;ADDRESS> &lt;DOMAIN> &lt;ID> &lt;IP OR PICKUPONLY> &lt;PASSWORD OR NONE> [PORT and/or U]
  
      ie.   1:123/500 fidonet RCASSELL the-estar.com MYPASS U
            1:129/305 fidonet 129305 ttb.slyip.com TJ1234 U
            1:229/426 fidonet NANDRE nickandre.com ABC123
  
  ADDRESS - Defines the Fido address of the remote BINKD system. If you are
            using a Dialup modem with D'Bridge, then the whole entry line
            overrides any Dialup-specific settings for this system.
  
   DOMAIN - Previously a seperate question in 2.94 and prior releases, this
            is where you specify the BINKD domain. You MUST specify a
            domain; the default domain question is for systems that connect
            that do not specify a domain during a BINKD session. The domain
            name is NOT an Internet domain, but rather, the domain that you
            agree to use with the Sysop of the system. fidonet and metronet
            are examples of domains. They can be up to 8 characters long. They
            must contain only letters and numbers.
  
            NOTE: If that system, for some bizarre reason, is in fact using
                  an Internet domain, ie. fidonet.org, its not going to work
                  because of the dots in the name. So, you must specify a
                  translation for this in the Binkd Additional Options screen,
                  ie. domain fidonet.org alias-for fidonet.
  
       ID - A unique ID to assign for the mailbox of this node. You must use
            only letters or numbers, up to 8 characters. The mailbox is used
            to store the actual pending mail for this system; not the D'Bridge
            Queue itself. D'Bridge automatically manages the conversion of
            mail between the Queue and the BinkD mailbox directories, and you
            should not manipulate the contents of those yourself manually.
  
       IP
  ADDRESS - The Internet address of the remote system. If the system does not
            have one, you don't know, or just "calls" here to pickup their
            waiting mail, answer PICKUPONLY.
  
  PASSWORD- The password to connect to the remote system. If no password is
            being used, answer NONE.
  
     PORT - Connects with the remote BINKD system on a specified port. This
            should be left blank in most cases.
  
        U - Makes uncompressed mail for this system instead of the usual XMAIL
            thats built. Packets are made in the "mailbox directory" (or ID)
            defined earlier. When "U" is not specified, normal XMAIL and Queue
            entries are built for the system.
  
            Now if the U option is specified, the Queue system is effectively
            not used except for generating outbound "Poll" requests, because
            D'Bridge will create the packet files directly in the ID/mailbox
            directory that you define. However, any pending transactions are
            moved into the node's mailbox via. automatic calls to DBUTIL MOVE.
  
  Additional BINKD options may be specified in the next question, BINKD
  OPTIONS. It is not recommended to add additional BinkD configuration
  parameters unless you're an experienced administrator.
  
  * <span style="color: red">REMEMBER</span> *  CTL-N inserts lines, CTL-Y deletes lines in a window.


<h3><a href="#toc">BINKD OPTIONS</a></h3>

  The additional questions in this screen allow advanced customising of
  how D'Bridge works with BinkD. In most cases it is not necessary to answer
  these questions. For additional help please consult the DBRIDGE echo on
  Fidonet or EMAIL Nick Andre directly.


<a name="3.23"/><h2><a href="#toc">3.23  ECHOFILE CONFIGURATION</a></h2>

This release of D'Bridge now supports Echofile/TIC processing. An Echofile
area is the same concept as an Echomail area, except you're dealing with
files, not messages. Files that arrive on your system will come with a
corrosponding text file called a TIC file (named after its extension).
The TIC file is a tiny text file that contains information about which
Echofile area the file belongs to, along with a list of systems that
should receive it.

This menu option allows you to configure the Echofile/TIC processing
abilities of D'Bridge.


<a name="4.00"/><h2><a href="#toc">4.00  SYSTEM IDLE COMMANDS</a></h2>

When D'Bridge is idle, you have full control over its functions. The
following single-key commands are available when the word "IDLE" appears
in the upper-left corner of the screen.

If this is your first time using the Help system, you might want to bring
up the Index and start reading the introduction sections for a better
understanding of how D'Bridge works.

     Call         Makes the next outbound call immediately, if any
     Retry        Retries the last outbound call, if any
     Next         Advances the pointer to the next outbound call
     Prev         Returns the pointer to the previous outbound call
     Hold         Places the queue entry selected on hold status
     QuickDial    Activates QuickDial mode; no pause between calls
     ESC          Displays the main menu
     F1           Activates the Help system
     ALT-C        Call a system from the nodelist in terminal mode
     ALT-D        Call a system from your directory in terminal mode
     ALT-E        Read/Edit EMAIL messages
     ALT-F        Request file(s)
     ALT-H        History display
     ALT-I        Information display
     ALT-K        KatGuard (electronic keyboard cover)
     ALT-L        View system log file
     ALT-N        New ECHOmail link
     ALT-P        Poll a node
     ALT-Q        Rebuild outbound queue
     ALT-R        Request ECHOmail link
     ALT-S        Toggle display of the schedule window
     ALT-T        Transmit file(s)
     ALT-V        View/Modify queue
     ALT-X        Exit D'Bridge (Quit)
     ALT-Y        Push to DOS shell (small)
     ALT-Z        Drop to DOS shell (large)

<h3><a href="#toc">HOLD ALL MAIL</a></h3>

Selecting the HOLD ALL MAIL menu option will immediately place all outbound
mail on HOLD. The hold will come off at midnight, when a new event starts or
by using the VIEW/MODIFY QUEUE command, ALT-V.

This command only holds mail until midnight at the latest.


<h3><a href="#toc">VIEW MODIFY QUEUE</a></h3>

Selecting the VIEW MODIFY QUEUE option (or pressing ALT-V from IDLE mode)
allows you direct access to the outbound mail queue allowing you to view,
erase or change priorities of queue entries.

The top line of the queue should be highlighted. To view or change a queue
item, first move the highlight bar to the desired entry using the UP and
DOWN arrows. Next select one of the following commands by pressing the
first letter of the option (I for Immediate, etc.)

QUEUE: Next, Previous, Immediate, Send, Hold, Reset, Force, View, Kill

      NEXT       The NEXT option advances to the next outbound call.

      PREVIOUS   The PREVIOUS option returns to the previous outbound call.

      IMMEDIATE  The IMMEDIATE option will change the priority of an
                 entire queue entry to immediate until the next NETmail
                 scan. If the queue entry is FORCED or is a unlisted
                 system, this option is not valid and the computer will
                 sound the "foghorn".

      SEND       The SEND option will change the priority of an entire
                 queue entry to crash priority. This change only lasts
                 until the next NETmail scan. If the queue entry is
                 FORCED or unlisted, the computer will sound the "foghorn".

      HOLD       The HOLD option causes an entire queue entry to be held
                 and not transmitted unless the receiving system poll for
                 it. This option is not valid if there is a FORCED
                 PRIORITY for the system.

      RESET      When you RESET LIMITS for a queue entry, both the number
                 of TRIES and CONNECTS is reset to zero, allowing the
                 queue entry to be transmitted during this event even if
                 the retries limit has been exceeded.


        FORCE      When you FORCE a priority for a certain system, that
                   system will be forced to that priority "until further
                   notice". The only way to override the FORCE is to remove
                   it by specifying "NONE" here. When you press "F" for
                   FORCE, a menu is displayed:
  
                   FORCED MODE: Immediate, Crash, Hold or None
  
                   Choose which priority to force this system to; if you don't
                   want to do this, just press ESC and no change will be
                   made. Select the priority or "N" to remove the "force".
                   When a node is forced, it is designated by an exclamation
                   point "!" next to the address.
  
        VIEW       Viewing a queue entry lets you "look inside" a queue entry
                   and see which messages and files are queued to send. Some
                   general information about a system is displayed on the
                   left; on the right is a detail window which may be scrolled
                   up and down by using the UP, DOWN, PGUP and PGDN keys. Press
                   ESC to exit view mode.
  
        KILL       KILL is a very dangerous option because it allows you to
                   erase any or all outbound mail and requests with one extra
                   keystroke. Pressing "K" will display a window asking what
                   you would like to KILL. If you don't want to KILL any
                   part of the entry, press ESC to cancel. Otherwise, choose
                   from the menu which lets you erase everything or just one
                   "part" of the queued entry. You'll have to try it to really
                   understand - just be careful.
  
When you are finished VIEWING and MODIFYING the queue, just press ESC
to exit this screen.


<h3><a href="#toc">REBUILD QUEUE</a></h3>

The REBUILD QUEUE option causes D'Bridge to erase all the packets
currently in the QUEUE window and re-scan for outbound mail.
This is the same thing that happens when D'Bridge begins a mail event.
This is handy for recreating packets if you had previously aborted the
scan when D'Bridge first came up or you entered some messages in the
editor (although there IS an option to automatically re-scan NETmail after
leaving the editor).

REBUILD QUEUE will normally create packets for all outbound mail
regardless of whether it is CRASH priority or not; typically, all crash-
mail will be sent, and all other mail will be on hold. This can easily
be changed by using the VIEW/MODIFY QUEUE command, ALT-V.

<h3><a href="#toc">POLL A NODE</a></h3>

The POLL A NODE option causes D'Bridge to call the specified system to
pick up mail which may be on "hold" there. D'Bridge will simply ask you
"Poll whom?" and you enter either the address of the system to call or the
operator's name. If you enter a name, it will display a list of all systems
with the Operator name you specify (if you enter "JOE," it will display all
the "JOEs" in your nodelist and allow you to select the one you wish.

If you don't know the address, five function keys (F1-F5) will aid you in
your search. Once you have determined the system to call and pressed ENTER,
D'Bridge will add a POLL entry to the queue with the specified priority.
If you use IMMEDIATE or CRASH priority, the POLL will happen right away.


<h3><a href="#toc">TRANSMIT FILES</a></h3>

The TRANSMIT FILE(S) option gives you a simple and quick way to send
files to another system. Any file which can be copied using the DOS
"COPY" command can be sent with D'Bridge. Similar to the POLL A NODE
command, the TRANSMIT FILE(S) option asks you for the destination
address. Here, you may enter the address of the system or part of the
operator's name. Once you've entered the address, D'Bridge will ask
you for a list of files to transmit. You may enter as many files as
you wish, one per line. Make sure you've included the DOS subdirectory
if they aren't in the current directory. If D'Bridge can't find a file,
the cursor will simply be stuck on the line until you press ESC (to
cancel the entire request), press the UP arrow or enter a valid (exis-
ting) DOS filename. When you're satisfied you've entered the list cor-
rectly, press ENTER. You may also use the DOS "wildcard" characters "*"
and "?" to specify a group of files to send.

To use a priority other than the default, enter &lt;FILENAME> &lt;PRIORITY>
in the window:

  C:\AUTOEXEC.BAT             Immediate
  C:\DATA\BIGFILE.ZIP         Hold


<h3><a href="#toc">FILE REQUEST</a></h3>

The FILE REQUEST option allows you to request that a remote system sends
you file(s). With a network of all D'Bridge systems, all file requests
are really update requests. This means that if you already have a file
and you re-request it, it will only be sent if the file size or date/time
are different.
To use the FILE-REQUEST option, simply enter the address of the system you
wish to call (just like MANUAL POLL and TRANSMIT FILE(S)) and enter a list
of files you wish to receive.

If you're not sure of the exact filenames, you may use the DOS "wild-
card" characters "*" and "?."  After you have entered the entire list of
files to request, press ENTER and D'Bridge will add the request to the
outbound mail queue.

To use a priority other than the default or file-request passwords, use:

&lt;FILENAME>[,&lt;PASSWORD>] &lt;PRIORITY>

                 FILE1,SECRET          Immediate
                 FILE2                 Crash

Note that HOLD is not a valid priority for file-requests. Requests only
work when you call the remote system.

<h3><a href="#toc">INFORMATION DISPLAY</a></h3>

The INFORMATION DISPLAY screens provide summary information about D'Bridge.
Execution times and traffic-volume information are collected and available for
display in three different forms:

SUMMARY          This provides traffic and data volumes for the year, month,
                 week, yesterday and today.

TIME USAGE       History of execution times is displayed on this screen.

ACTIVITY GRAPH   This shows a graphical representation of the operation
                 of D'Bridge.


<h3><a href="#toc">READ / EDIT EMAIL</a></h3>

The READ/EDIT EMAIL option causes D'Bridge to load the selected EMAIL
editor. The screen will clear and the editor will be loaded, ready for you
to read and respond to EMAIL messages.

DB EDIT may also be run directly from the dos prompt; it is used to enter
and read the EMAIL messages D'Bridge sends and receives. D'Bridge utilizes
the Fidonet standard message format used by so many other EMAIL systems,
bulletin boards and utilities. This will allow you to use a great variety
of external programs such as "robot" mailers, form-letter generators and
editors.


<h3><a href="#toc">HISTORY DISPLAY</a></h3>

When you select the HISTORY DISPLAY option, ALT-H, you will receive
a menu of available history screens. There are four screens on the menu:

<h3><a href="#toc">OUTBOUND HISTORY</a></h3>

The outbound history screen simply displays a log of all outbound mail
calls within the last "n" days (specified on the BASIC CONFIGURATION
screen). This display always starts at the end by showing you the most
recent call. The UP, DOWN, PGUP and PGDN keys scroll the screen, ESC
exits. This display lists the date, time, destination, bytes sent/received,
elapsed time and actual cost of the connection.

<h3><a href="#toc">INBOUND HISTORY</a></h3>

The inbound history screen simply displays a log of all incoming mail
calls within the last "n" days. This display lists the date, time,
origin, bytes sent/received, elapsed time. Since this is inbound mail,
there is no cost involved.

<h3><a href="#toc">RECEIVED ECHOMAIL HISTORY</a></h3>

The received ECHOmail history screen displays a log of all ECHOmail
messages received within the last "n" days. This display lists the
date, time, destination, bytes sent/received, elapsed time and actual
cost of the connection.

<h3><a href="#toc">AREAFIX LOG</a></h3>

The AREAFIX log screen displays a log of all automatic additions to
your "forward-to" list in the area manager. These may be in the form
of AREAFIX requests or may be entered manually by using the NEW
ECHOMAIL LINK, ALT-N option.


<h3><a href="#toc">VIEW SYSTEM LOG</a></h3>

The VIEW SYSTEM LOG command allows you to scroll through the system log file
and search it for keywords. Besides the standard cursor control keys, the
following keys are active here:

          +/-              The PLUS and MINUS keys change the date of
                             the display  (pressing the minus key three
                             times displays the log from 3 days ago.)

          Morning        Displays log entries starting at midnight.

          Afternoon      Displays log entries starting at noon.

          Evening        Displays log entries starting at 6:00 PM.

          Search         Enters "search mode"

          Highlight      Allows entry of highlight keywords and colors.

<h3><a href="#toc">USING SEARCH MODE</a></h3>

Search mode has two ways to look for log entries:

          KEYWORD SEARCH    Searches for any match in a list of keywords.

          TEXT SEARCH       Searches for the first occurrence of a substring.

The Next and Previous commands actually invoke the search.


<h3><a href="#toc">REQUEST ECHOMAIL LINK</a></h3>

AREAFIX is a subsystem within D'Bridge enabling you to remotely
request new ECHOmail links from a HOST or FEED system. This system,
designed by Greg Dawson, eliminates the need for manual intervention
on the part of the HOST system operator. Now that handling hundreds
of ECHOmail conferences on a single system is a daily reality, this
automated system of forwarding maintenance is required.

The REQUEST ECHOMAIL LINK, ALT-R command allows you to request a
remote system, either STARTs or STOPs forwarding of ECHOmail conferences.
To use this feature, you must pre-arrange a PASSWORD with the operator
of your ECHOmail feed.

First, enter the address of the system to request ECHOmail from. If you
have not established an AREAFIX password for the specified system,
D'Bridge will ask you to assign one at this time. AREAFIX will not
function without a security password (for good reason!). AREAFIX pass-
words may also be entered on the PACKET/MAIL CONTROL screen.

Next, enter a list of CONFERENCE TAGS desired, one per line; press
ENTER on a blank line when finished. If you wish to remove a conference
rather than adding it, simply put a minus sign "-" before the tag.

If you wish to receive a list of available ECHOmail from your ECHO link,
answer YES to "Area listing?". If you want the host system to rescan the
message base, sending you all the old messages, answer YES to "Get old
messages?".

Finally, choose the EMAIL priority you wish to use for transmitting the
request. This priority has no connection to the one with which you will
receive the ECHOmail - that's up to the other system's operator.

When the request is received by the remote system, it will add or remove
your system from its "forward-to" list as you have specified; it will
send you a confirmation message which will explain the changes made and
errors or violations you have made. This message may be sent automatical-
ly, or you may have to poll later to receive it; this depends on how your
ECHOmail link has his system configured.


<h3><a href="#toc">NEW ECHOMAIL LINK</a></h3>

The NEW ECHOMAIL LINK, ALT-N command allows you to add systems to the
FORWARD-TO list in your area manager. This command queues up the same
type of entry as an inbound AREAFIX request with the exception of the
security check. When a system is added or removed from an area, an
audit trail is created in the AREAFIX LOG and a confirmation message
is created and sent to the receiving system.

First, enter the address of the system to send the ECHOmail conference(s)
to. You do not have to have an AREAFIX password just to enter a manual
request.

Next, enter a list of CONFERENCES to add or remove, one per line; press
ENTER on a blank line when finished. If you wish to remove a conference
rather than adding one, simply put a minus sign "-" before the tag.

If you wish to have D'Bridge rescan the entire ECHOmail area and send all
the mail currently stored, answer YES to "Rescan?". If you wish to send a
list of areas available, answer YES to "Send area list?".

Choose the EMAIL priority you wish to use to transmit the request.
This priority has no connection to the one with which you will receive
the ECHOmail - that's up to the other system's operator.

Finally, if you want the request to be processed immediately, answer
YES to "Process now?". If the request is not processed immediately,
you may enter several requests and subsequently run the PROCESS ECHOMAIL
option on the UTILITIES menu.


<h3><a href="#toc">TERMINAL EMULATOR</a></h3>

The D'Bridge terminal mode is designed to let you communicate with
online services such as a bulletin board system (BBS), CompuServe&lt;TM>
and other such electronic information systems. Terminal mode acts
like a glass Teletype, having an 24x80 display plus a status line
giving information such as current baud rate, parity, etc. It is not
the intention of D'Bridge to provide many terminal features such as you
might find in other communication programs; D'Bridge is an EMAIL system
and only provides this terminal mode as a simple means for you to tie-
in with other systems through a direct connection.

Terminal mode transmits all printable and control characters without
translation to your modem. The ALT keys are used to control the various
functions in terminal mode. Pressing ALT-X exits the terminal and
returns to mailer mode.

Once in the terminal mode, you will notice that pressing ALT-H displays
a help screen. These are the commands currently supported:

                 /-TERMINAL MODE COMMANDS----------------\
                 |                                       |
                 | ALT-C   Dial system(s) from nodelist  |
                 | ALT-D   Dial system(s) from directory |
                 | ALT-P   Set terminal parameters       |
                 | ALT-L   Capture log ON/OFF            |
                 | ALT-T   Terminate connection          |
                 | ALT-W   Wipe (clear) screen           |
                 | ALT-X   Exit terminal mode            |
                 | ALT-Y   PUSH to DOS                   |
                 | ALT-Z   DROP to DOS                   |
                 | PgUp    Upload file(s)                |
                 | Pgdn    Download file(s)              |
                 |                                       |
                 \---------------------------------------/


ALT-C / Call system from nodelist

D'Bridge can dial any systems in your nodelist that are not "unlisted
nodes". Pressing ALT-C will display the following window:

/-CALL SYSTEM(S) FROM NODELIST--------------------------------------------\
|                                                                         |
|                                           F1-List nodes in NET 1:110    |
|                                           F2-Change ZONE:NET            |
|                                           F3-List all NETS              |
|                                           F4-List NETS in ZONE 1        |
|  Dial which node(s)?                      F5-Scan user names            |
|                                                                         |
|  _____________________________________________________________________  |
|                                                                         |
\-------------------------------------------------------------------------/

Simply enter a list of addresses you wish to call, separated by spaces.
D'Bridge will auto-dial the entire list until a connection is made. The
function keys F3-F7 are available to assist you in locating the proper
addresses. When a connection has been made, D'Bridge will "beep" and
return to terminal mode with the remote system online at the proper
baud rate.

   F3      Scans the entire nodelist by username (first names).

   F4      Pressing the F3 key displays all the NODES and POINTS in the
           currently selected NET. Pressing ENTER while using this display
           selects a system; pressing ESC cancels.

   F5      Gives a listing of all NETs in the entire nodelist and allows
           you to select a new NET.

   F6      Lists all ZONEs in the nodelist

   F7      Allows you to change the currently selected NET by entering the
           ZONE:NET desired. After you change NETs, you can use the F1 key
           to list the systems in the new NET.

   ENTER   Starts the cycle-dialing window; D'Bridge will continue dialing
           until connected or interrupted by the operator.

   ESC     Cancels dialing mode


ALT-D / Dialing directory

D'Bridge terminal mode has a built-in dialing directory enabling you
to program the phone numbers for up to 100 systems you call frequently.
Pressing ALT-D will display the following window:

/-DIALING DIRECTORY---------------------------------------------------------\
|  Entry  Name                      Phone number                 Baud/Parms |
|  -----  ----                      ------------                 ---------- |
|    1    D'Bridge Support/Cincinn  1-513-821-1387                 9600 8N1 |
|    2    D'Bridge Support/West     1-503-292-7233                 9600 8N1 |
|    3    D'Bridge Support/West     1-503-292-7237                 9600 8N1 |
|    4    D'Bridge Support/East     1-215-879-3310                 9600 8N1 |
|    5    D'Bridge Support/Canada   1-416-823-4521                 9600 8N1 |
|    6    D'Bridge Support/Europe   31-85-459034                   2400 8N1 |
|    7    D'Bridge Support/Italy    39-766-540-899                 2400 8N1 |
|    8    D'Bridge Support/Austral  61-3-848-3331                  9600 8N1 |
|    9    D'Bridge Support/Austral  61-3-563-2496                  9600 8N1 |
|   10                                                                      |
|   11                                                                      |
|   12                                                                      |
|                                                                           |
| Edit entry, Delete entry, UP, DOWN, PGUP, PGDN, #, ENTER-Dial, ESC-Cancel |
|                                                                           |
| Command?                                                                  |
\---------------------------------------------------------------------------/

You may easily enter or change numbers in this list by using the EDIT
ENTRY command. Move the highlight bar to the entry you wish to add or
edit then press "E". It will display the following window:

             /-EDIT DIRECTORY ENTRY---------------------\
             |                                          |
             | Entry number: 1                          |
             |         Name: D'Bridge Support/Cincinn   |
             | Phone number: 1-513-821-1387             |
             |    Baud rate: 9600                       |
             |       Parity: NONE                       |
             |    Data bits: 8                          |
             |    Stop bits: 1                          |
             |   Save entry?                            |
             |                                          |
             \------------------------------------------/


Enter the NAME, PHONE NUMBER, BAUD RATE, PARITY, DATA BITS and STOP BITS
desired, then answer YES for "Save entry?". Pressing ESC will abort the
change. After you have answered YES, the window will disappear and the
entry will be permanently added to your personal dialing directory.

To dial a number, simply type the ENTRY NUMBERS desired, separated by
spaces, then press ENTER. You can also move the highlight bar to the
desired line and press ENTER. Either will do the same thing.

If you wish to use the D'Bridge scripting language, simply enter the
phone number with the following format:

    "SCRIPT.FIL"aaa-nnn-nnnn

Where SCRIPT.FIL is the name of your script file, aaa is the AREA CODE
you are calling and nnn-nnnn is the PHONE NUMBER.

ALT-H / Terminate connection

Pressing ALT-H will terminate the current call immediately by dropping
the DTR signal to the modem for 1.2 seconds.

ALT-P / Set terminal parameters

The ALT-P command will allow you to set the default settings for
terminal mode. Pressing ALT-P displays the following window:

            /-SET TERMINAL PARAMETERS--\
            |                          |
            |    Comm port: COM1       |
            |    Baud rate: 2400       |
            |       Parity: NONE       |
            |    Data bits: 8          |
            |    Stop bits: 1          |
            |       Duplex: FULL       |
            |    Emulation: ANSI       |
            | Capture ANSI: YES        |
            | AutoDownload: YES        |
            |                          |
            \--SPACE-Change, ESC-Exit--/


By using the UP and DOWN arrow keys to select an option and pressing
the SPACE bar to change, you can configure the terminal to any setting
you wish. This setting will be recalled when terminal mode is entered,
but the communications settings can also be changed by ALT-C and ALT-D.

<h3><a href="#toc">COMM PORT</a></h3>

The COMM PORT specifies which serial interface channel you wish to
use. This could allow you to select between modems or even direct
links to other PC's. COM1 through COM7 are allowable values.

<h3><a href="#toc">BAUD RATE</a></h3>

This allows you to select the speed or BAUD RATE of the serial link with
your modem. Allowable values are 300, 1200, 2400, 4800, 9600, 19200 and
38400, but may not exceed the value specified in the COMMUNICATIONS/MODEM
SETUP screen. If you have LOCKED your modem at its top speed, this baud
rate setting has no effect.

<h3><a href="#toc">PARITY</a></h3>

The PARITY setting allows you to communicate with systems that require
parity-error checking. Valid settings are NONE, EVEN, ODD, MARK and SPACE,
but most newer networks are using "NONE."

<h3><a href="#toc">DATA BITS</a></h3>

This setting is included for compatibility with old-style 7-bit systems.
Allowable values are 7 and 8, but be warned file-transfers will not
function properly with a 7-bit link.

<h3><a href="#toc">STOP BITS</a></h3>

Almost all baud rates use 1 stop bit, but "weird" configurations might
require a value of 2 (highly unlikely!).


<h3><a href="#toc">DUPLEX</a></h3>

Some older systems require your own system to provide the "echo" of
the characters typed. This is called HALF DUPLEX. Newer systems all
echo back the characters you type, eliminating the need for a HALF
DUPLEX setting. Use FULL DUPLEX for systems such as CompuServe, The
Source and BBS networks.

<h3><a href="#toc">EMULATION</a></h3>

D'Bridge terminal program has only one emulation, ANSI. You may either
select ANSI or NONE. The ANSI emulation does not require the use of
an ANSI.SYS driver; it includes full color support plus ANSI-MUSIC!

<h3><a href="#toc">CAPTURE ANSI</a></h3>

If you have the capture log enabled, D'Bridge has the option to either
save or strip the ANSI codes from the file. If you want to SAVE the
ANSI codes in the capture file, answer YES here.

<h3><a href="#toc">AUTODOWNLOAD</a></h3>

D'Bridge terminal mode has the capability to detect when the remote
system has initiated a ZMODEM send request. If you answer YES to this
question, when such a request is detected, D'Bridge automatically starts
a ZMODEM receive session saving you the trouble.

ALT-L / Capture log ON/OFF

The ALT-L key "toggles" the capture log ON or OFF. If you wish every-
thing displayed on the screen to be captured to a text file, press
ALT-L to turn on the capture log. It will ask you for a DOS filename
to store the information in; it defaults to CAPTURE.LOG, but you may
change it to any directory or filename you wish. Pressing ALT-L a
second time or exiting terminal mode will close the text file. If a
capture file already exists, D'Bridge will add on to the end of it,
preserving its previous contents.


ALT-W / Wipe (clear) screen

Pressing ALT-W simply clears the current screen, moving the cursor to
the upper-right corner.

ALT-X / Exit terminal mode

Pressing ALT-X will take you out of the terminal mode and back to
D'Bridge. Your modem will be re-initialized and should be ready
to receive incoming mail almost immediately.

ALT-Y / PUSH to DOS

Pressing ALT-Y will allow you access to DOS commands while you are
still connected to a remote system. To get back into D'Bridge, type
EXIT. This is handy for doing directory listings, etc. while you're
connected to an online service.

ALT-Z / DROP to DOS

Pressing ALT-Z will also allow you access to DOS commands. The only
difference is that with ALT-Z, D'Bridge is totally swapped out of memory
to EMS or disk so you have as much free memory as possible.

PgUp / Upload

The PgUp key allows you to transmit a list of files to the host
computer. The way to do this is typically to tell the remote computer
you are ready to send some files, then press the PgUp button, select
the desired protocol, XMODEM, Telink or ZMODEM, then enter a list of
files to send. Note: With XMODEM, you can only send one file at a
time - XMODEM is not a "batch" protocol.

PgDn / Download

The PgDn key allows you to receive files from the host computer. This
is normally done by first telling the remote system which files to send
then pressing the PgDn key. You then tell D'Bridge which protocol you
want to use, XMODEM, Telink or ZMODEM and specify which directory to
put the files in. With XMODEM you must specify the actual filename
because it is not a batch protocol.


<h3><a href="#toc">BUILD NODELIST DATABASE</a></h3>

This forces D'Bridge to recompile the nodelist database index. This is
normally an automatic process happening at midnight, but you can force
it to happen by selecting this option.

Note that if you create a "dummy" file called DBRIDGE.RNC in
your D'Bridge directory, D'Bridge will "restart" itself after compiling.

<h3><a href="#toc">PROCESS MAIL</a></h3>

This enables you to manually start inbound mail processing and scanning
for outbound ECHOmail and AREAFIX requests. This shouldn't be necessary
unless you have mail processing set to "Manual" in the PACKET/MAIL CONTROL
screen.

<h3><a href="#toc">FILEBASE SEARCH</a></h3>

This option (CTL-F) allows you to search through the D'Bridge FileBase
for a partial match on a specified filespec.

The FileBase is a combined listing of files available for request on other
systems. This enables you to easily locate files and request them with the
ease of point-and-shoot operation.

After you specify a search key to start (like "DB" for filenames starting
with DB), a list of partial matches will be displayed. You can highlight the
file you want to request by using the arrow keys; request it by pressing "R",
then the priority: Immediate, Crash, or Normal.

If you need to make a passworded request, set the current password with the
"P" option. Since the FileBase is not zone-aware, you may select another
zone with the "Z" option.


<h3><a href="#toc">LICENSE REGISTRATION</a></h3>

D'Bridge requires a registered license key be used in accordance with our
software license policy.  This registraion process will allow you to be added
to our mailing list and at the same time request that a new license key file,
customized with YOUR name or handle will be created for you within ten days.

Complete the registration form, send it in, then look for "NEWKEY.ZIP" to
arrive about ten days after your registration was sent.

If you have more than one license key to register, put them all in a directory
and specify it in the registration screen.

<h3><a href="#toc">EXPORT CONFIGURATION</a></h3>

With this option, D'Bridge will produce an "exported configuration" file.
Normally called DBRIDGE.CFG, the output is a standard text file designed
to transfer the entire D'Bridge parameter configuration to another system or
for upgrading to a newer version.

Every night at midnight, D'Bridge automatically exports its configuration to
a file called DBRIDGE.AUT and puts it in an archive called DBCONFIG.ZIP.

<h3><a href="#toc">LEAVE DBRIDGE</a></h3>

This option, CTL-C or ALT-X will exit to DOS and completely unload the
D'Bridge software.

<h3><a href="#toc">DROP TO DOS</a></h3>

This option or ALT-Z will "drop" to DOS, creating the largest possible
DOS shell using the secondary command processor specified by the environment
variable "COMSPEC" (usually COMMAND.COM).

D'Bridge swaps its memory either to EMS or disk, depending on free memory
available.


<h3><a href="#toc">PUSH TO DOS</a></h3>

This option or ALT-Y will "push" to DOS, creating a DOS shell using the
secondary command processor specified by the environment variable "COMSPEC".


<a name="5.00"/><h2><a href="#toc">5.00  EMAIL MESSAGE EDITOR</a></h2>

The EMAIL message editor is activated by selecting the READ/ENTER EMAIL
option from the main menu or by pressing ALT-E. The editor may also be
accessed directly from the DOS prompt by typing:

C> DB EDIT

Assuming the DB EDIT command was found, you quickly get a display
similar to the following:

F1-Enter, F2-Reply, F3-Edit, F4-List, F5-Kill, F6-Areas, ESC-Menu      D'Bridge
                                                                    1.30/001002
/-READ/EDIT EMAIL-------------------------------------------------------------\
|Msg # 250                                                                    |
|Date: 11 Jun 92 18:10:34                                                     |
|From: Chris Irwin                                                            |
|  To: Tom Ordelman on 201:200/0  D'Bridge Support/Europe                     |
|Subj: Greetings from freezing Cincinnati!                                    |
|-----------------------------------------------------------------------------|
|Hello Tom,                                                                   |
|                                                                             |
|I was just writing to let you know that I've been sitting out in the snow    |
|finishing the D'Bridge documentation. I think that you will find that it     |
|is well-written and quite clear. It's Thursday, so I'll be out playing poker |
|this evening... Give me a call when you get a chance tomorrow!               |
|                                                                             |
|Regards,                                                                     |
|Chris, 201:201/0                                                             |
|                                                                             |
|                                                                             |
|                                                                             |
|                                                                             |
\-----------------------------------------------------------------------------/
Area: D'Bridge network mail         Msgs: 273   Highest: 298   Last read: 276

This is the "READ" mode of D'Bridge. Using this screen, you can enter,
read and reply to messages along with a variety of utility functions.
Each function will be described in detail in the next few sections.
Remember that a quick way to get out of the editor is to press CONTROL-C.
This is a perfectly acceptable way to get out, it's just like using
the QUIT menu option.


      RIGHT and LEFT arrows - NEXT and PREVIOUS MESSAGE

      Pressing the RIGHT arrow key will display the next message in the
      current area; pressing the LEFT arrow will display the previous one.

      F1 or E - ENTER A MESSAGE

      As soon as you press the F1 key or the letter "E" D'Bridge will go into
      "EDIT" mode, clearing the screen and starting with a blank message.

      F2, R, Q or > - REPLY TO A MESSAGE

      Replying to a message is the same as entering a new one; the difference
      is that the "TO" name and address is taken automatically from the
      message currently on the screen. The editor will move the "FROM" infor-
      mation to the "TO" field. This is handy to keep from making a mistake
      typing the name or network address. There are four keys that create a
      reply message:

          F2   Asks for QUOTED or NORMAL reply.
          R    Creates a NORMAL reply.
          Q    Creates a QUOTED reply.
          >    Same as Q.

      If you select a NORMAL reply, the screen will clear and just the "TO"
      and "FROM" information will be displayed. If you specify a QUOTED re-
      ply, the entire message you are replying to will be QUOTED, so that
      you may remind who you are communicating with and exactly what it is
      you are replying to. QUOTED text has each line starting with a ">"
      character indicating that the text came from the other person.
      For example, if a message reads:

          What time can I call you about the pricing information?

      Your QUOTED reply might look like:

          CI> What time can I call you about the pricing information?

          Give me a call around 4:00, if I'm not in, please leave the
          information with my secretary.


      QUOTED replies are quite valuable for reminding the receiver exactly
      what you're talking about. In fact, if the receiver of the above message
      wanted to reply to you, the reply might look like:

          CI> What time can I call you about the pricing information?

          TO> Give me a call around 4:00, if I'm not in, please leave the
          TO> information with my secretary.

          I can't - I'm flying to Paris today. I'll call you when I
          get back.

      F3 or O - EDIT AN OLD MESSAGE

      Sometimes, you will enter a message, then realize you wish to make a
      change before sending it. The F3 or "O" option does just that. It
      allows you to edit the currently displayed message. If the message
      displayed is not from you, you will be asked "You didn't enter this
      message, edit anyway?". Generally, it's not "nice" to edit other
      people's mail, but D'Bridge allows you to do this anyway.

      F4 or L - LIST MESSAGES

      Pressing F4 or "L" will put the editor into "LIST" mode. While in
      "LIST" mode, the display changes to show you all the message headers.
      This is handy when you want to scan for a particular message quickly.
      Until you press the ESC key, the editor will remain in LIST mode and
      the function keys have a different meaning. While in this mode, you
      may view message headers and select a group of messages to KILL or
      PRINT.

LIST: Include, Exclude, All, None, Page, Display, Group, ESC-Exit      D'Bridge
                                                                    1.50/001002
/-READ/EDIT EMAIL-------------------------------------------------------------\
|/-LIST MESSAGES--------------------------------------------------------------\
||Msg #  Date   From                   To                      Subject        |
|| 292   20 Apr Chris Irwin            Tom Ordelman  201:200/0 D'Bridge Suppor|
|| 293   20 Apr Chris Irwin            Joaquim Homri 135/20    Re: ZMODEM     |
|| 294   20 Apr ARCmail                Sysop         107/246   FF239209.MO1   |
|| 295   20 Apr ARCmail                Sysop         108/871   F98429E1.MO1   |
|| 296   20 Apr ML-UPD 1.5   11/109    Megalist Admi           000B0071.MLA   |


      The first line will be highlighted with a light bar. Using the UP, DOWN,
      PGUP and PGDN keys, you can move the light bar to the desired message.
      When you press the ESC key, the specified message will be displayed and
      DBEDIT will return to READ mode.

      While the LIST window is on the screen, the following commands are
      enabled:

          I - INCLUDE

          When you press the I key, a star ( * ) will appear next to the
          message number on the highlighted line. This means this message
          is "included" for processing by group commands.

          E - EXCLUDE

          Pressing the E key will remove a star "*" from the highlighted
          line. This is used to un-include (de-select) the current message
          from processing by the group commands.

          A - ALL

          If you press A, all of the messages will be included for processing
          by group commands and they will all have a star "*" next to them.
          This is handy to use in conjunction with "E" (EXCLUDE) when you
          want to process most of the messages with group commands.

          N - NONE

          Pressing N will remove all the stars "*" from the LIST MESSAGES
          window. None of the messages will be selected for group commands.

          P - PAGE

          Pressing P will select all messages on the currently displayed page.

          D - DISPLAY

          Pressing D will toggle the LIST display between showing the TO, FROM
          and SUBJECT and showing the entire SUBJECT line.


          G - GROUP

          Pressing G will display another list of options called GROUP COM-
          MANDS. With these commands, you can PRINT or KILL all of the
          selected messages automatically. This can be a very "dangerous"
          command, so make sure you know exactly what you're doing if you
          use it. The following GROUP COMMANDS are allowed:

              P - PRINT  (group command)

              The P group command will PRINT all messages that have stars "*"
              next to them and were previously included while in the "LIST"
              mode. Obviously this option will work only if you have a printer
              connected; press the ESC key to cancel the PRINT operation.

              K - KILL  (group command)

              The Kill group command will KILL all messages that were included
              and have a star "*" next to them. Make sure you have double-
              checked which messages were included because once they are
              KILLED, they are permanently gone. (Perhaps Professor Norton
              could get them back... ).

      F5 or K - KILL A MESSAGE

      Pressing F5 or "K" allows you to permanently KILL (erase) a message from
      your disk. It will ask you "ARE YOU SURE?" just in case you pressed it
      accidentally; use this option with caution!

      F6 or A - CHANGE MESSAGE AREAS

      The editor allows you to have any number of local and ECHOmail areas.
      Pressing F6 or "A" will display a list of all the areas you have de-
      fined in your configuration. Select the desired area by moving the
      light bar up and down, then pressing ENTER when the desired area is
      highlighted. You may also enter the AREA NUMBER and press ENTER. Both
      ways accomplish the same thing. If you are running a basic EMAIL
      system, you probably will not have any use for this option.


      ESC - EDITOR MENU

      All of the other editor features are accessible by using the EDITOR
      MENU. Pressing ESC will display the menu and allow you to select any
      of the following options:

        - Area information
        - Display statistics
        - Forward message
        - Copy/move message
        - Print message
        - Write message to file
        - Username AKAs/Alias addresses
        - Search headers/text
        - PUSH/DROP to DOS


<a name="5.01"/><h2><a href="#toc">5.01  USING EDIT MODE</a></h2>

After you have selected either the ENTER, REPLY or EDIT command, the
editor will be in "EDIT" mode. When you are using this mode, all of the
keys have different meanings than they do in READ mode. The top line of
the screen lists all the valid commands.

      The cursor will first appear on the "TO" field. Here, you enter the
      name of the person to whom the message is addressed. If you have
      selected the USERNAME INDEX option (in the nodelist configuration),
      the editor scans for a username simply by entering part of the name.
      For example, if you enter "CHRIS", DBEDIT will display all of the
      users who have a first name of Chris, Christine, Christy or Christo-
      pher and allow you to select the desired person. This search is based
      on FIRST NAME, so entering a last name won't work.

      If you wish to send the same message/files to different destinations,
      press the F8 key while on the "TO" field. This will display a window
      which allows you to enter any number of destinations, one per line in
      the following form:

      &lt;ADDRESS>[,&lt;PRIORITY>] &lt;USER NAME>

      ie.

      1:110/68 Chris Irwin

                        Valid priorities are: H - Hold
                                              N - Normal
                                              C - Crash
                                              I - Immediate

      If you routinely send information to the same list of systems, you
      will want to take advantage of the "distribution list" feature.
      Instead of an address and a username, you can specify the names of
      any number of distribution lists to include. A distribution list is
      simply a text file containing the same information as above: address
      and username.

      After you have entered or selected the name of the person you are
      writing the message to, the editor will say "on" and expect you to
      enter the address of the user. If you selected the username from the
      D'Bridge database, the address should already be there and you simply
      press ENTER. If you are entering this message to someone not in the
      database or have specified NO in the CREATE USERNAME INDEX field in
      the nodelist setup, you will need to enter the address.


      The editor provides 5 function keys to help you to find an address:

        F3 - List nodes

        Pressing F3 will display a list of all the systems in the currently
        selected ZONE:NET. Moving the light bar, highlight the desired system
        and press ENTER. If you can't find the address in this NET, press the
        ESC key.

        F4 - Change net

        The F4 key allows you to change the currently selected ZONE and NET
        numbers. Enter the ZONE and NET numbers desired separated by a colon
        ( : ) character. If you specify just one number, it is assumed to be
        the NET; the ZONE remains the same. After changing the ZONE and NET
        you may use the F3 key again to scan for individual systems.

        F5 - List nets

        Pressing F5 will give you a list of all ZONE and NET numbers in your
        nodelist and allow you to choose one as the currently selected NET.
        Similar to the F6 function, move the light bar to the desired line
        and press the ENTER key.

        F6 - List zones

        This function is identical to F5 above except it lists the ZONES that
        are compiled into the nodelist.

        F7 - Set ZONE:NET

        Allows you to directly set the ZONE and NET defaults.

     After you have selected the destination address, the cursor will move to
     the SUBJECT line. If you want to send a file along with this message or
     if you wish to request one, you must enter the filename(s) as the sub-
     ject. If you are SENDING files, you must specify the actual filename
     including drive and directory. If you are requesting a file, just specify
     the filenames you wish to receive. Obviously, if you are neither SENDING
     nor REQUESTING files, the SUBJECT line is simply a field which briefly
     states the purpose of the message.


     While the cursor is on the SUBJECT field, the following function keys are
     in effect:

       F3 - Send file

       Pressing F3 sets the FILE-ATTACH attribute for the message. This means
       all the files listed in the SUBJECT line (labeled ENCL) will be sent
       with the message.

       F4 - File request

       Pressing the F4 key sets the FILE-REQUEST attribute for the message.
       This means that when the message is sent, D'Bridge will request that
       the remote system sends you all the listed files.

       F5 - Update request

       The F5 key sets the UPDATE-REQUEST attribute for the message. UPDATE-
       REQUESTS are the same as FILE-REQUESTS in D'Bridge.

       F6 - Cancel

       Pressing F6 cancels a FILE-ATTACH, FILE-REQUEST or UPDATE-REQUEST and
       makes the SUBJECT line be just informational.

When the cursor is BELOW the line separating the heading from the message
text, the editor acts just like most word-processing systems.
You may simply type in your message, using the BACKSPACE and ARROW keys
to edit. You may notice that when you press the ENTER key, a "HARD RETURN
SYMBOL" is generated. Normally, you should not press the ENTER key unless
you wish to start a new paragraph or are entering a list of some kind
which should not be "rejustified" on the receiving system. Because D'Bridge
can communicate with other EMAIL systems and bulletin boards, the messages
might not look exactly the same on the receiving system as they look on
your screen when you enter them. For example, some EMAIL editors only
allow the display of 66-column text. If you were to use HARD RETURNS (by
pressing ENTER on each line), your message would be very hard to read on
the other EMAIL system. Get in the habit of only pressing the ENTER key
when you want to start a new paragraph.

While in the "EDIT" mode, the following function keys are in effect:

       F1 or ESC-Q-A - ABORT

       If you have accidentally gone into "EDIT" mode or wish to cancel your
       edit session and completely "throw away" the message you are entering,
       use the ABORT option. The editor will ask "ARE YOU SURE?", just to
       make sure you didn't press F1 accidentally. ABORTING your editor will
       return you to "READ" mode.


       F2 or ESC-Q-S - SAVE MESSAGE

       Pressing F2 will immediately save the current message to disk. Unless
       otherwise specified, it will be sent during the next scheduled mail
       event. If you press F2 by accident, you can always use the EDIT OLD
       option to continue or change it. SAVING your message will return you
       to "READ" mode.

       F3 or CONTROL-N - INSERT LINE

       The INSERT LINE option will add a blank line BEFORE the line where the
       cursor is located.

       F4 or CONTROL-Y - DELETE LINE

       The DELETE LINE option does just that; it erases the line that the
       cursor is on.

       F5/F6 - MARK

       This is an "advanced" feature; The F5 key marks the beginning of a
       block of text; the F6 key marks the end. "Marked" text is designated
       by reverse video for the selected block. This is used in conjunction
       with the BLOCK commands described later; they allow you to COPY, MOVE,
       DELETE or WRITE the selected block of text to a file.

       F10  - FLAGS

       D'Bridge allows you to set up to 15 different "FLAGS" on an EMAIL
       message. Pressing F10 displays a menu of all the flags; only the
       ones that are "bright" are allowed. Depending on certain criteria,
       such as FAX addressing, etc, certain options are not always available.
       The currently defined flags are as follows:

          Private         This message is intended for the addressee only.
                          If the receiving system is a BBS, only the Sysop
                          should be able to read the message.

          Hold            HOLD priority should be used for this message.
                          Please note that unless you specify XMAIL for this
                          message, the message will be sent if there is any
                          other outbound traffic for the destination system;
                          if you enter a CRASH message to the same system,
                          both messages will be sent unless you XMAIL it.


          Crash           CRASH priority means the message should be sent
                          right-away, even during the UNEVENT. Only messages
                          with CRASH or IMMEDIATE priority will be sent during
                          the UNEVENT. CRASH messages might cost more due to
                          making a long-distance phone call during the day
                          rather than during a late-night scheduled event.
                          CRASH priority messages never get routed, but go
                          directly to their destination.

          Immediate       An IMMEDIATE priority message means the message will
                          be sent right away and have priority over other out-
                          bound traffic that has no IMMEDIATE priority.
                          This is handy for getting an important message out
                          when there's a lot of other outbound traffic in the
                          queue.

          XMail           If you specify an EMAIL message to be XMAIL, this
                          means the D'Bridge mail scanner will pack the
                          message in an outbound XMAIL archive using the
                          specified archive program: ZIP, LHA, ARJ, PAK, ARC
                          or ZOO. If you use this method, all priorities:
                          IMMEDIATE, CRASH, NORMAL and HOLD are treated
                          separately; HOLD mail will never be sent unless the
                          other system calls to pick it up or the operator
                          specifically overrides it in the VIEW/MODIFY QUEUE,
                          ALT-V mode.

          Kill/Sent       If a message has the KILL/SENT flag, it will be
                          erased from your NETmail area as soon as it has been
                          successfully transmitted. This is good for messages
                          that have been sent to multiple destinations.

          Archive/Sent    The ARCHIVE/SENT flag causes a message to be written
                          to the specified OUTBOUND MAIL ARCHIVE specified on
                          the PACKET/MAIL CONTROL screen. After the message
                          text has been stored in this file, the message is
                          erased from the system.

          Direct          If a message is flagged as DIRECT, the normal
                          routing specified in the ADVANCED ROUTING screen of
                          the event setup is ignored; the message is sent
                          directly to its final destination.

          Use Zonegate    If you wish an inter-zone message to be routed
                          through the official "zonegate", use this flag.

          Route/HUB       If you want a message to be HOST- or HUB-ROUTED,
                          specify this flag.


       You can change the flags either by moving the highlight bar with the
       UP and DOWN arrows and pressing ENTER, or by pressing the first letter
       of the desired flag. Press ESC when you are finished setting message
       flags.

       ESC - MENU

       The rest of the "EDIT" mode commands are activated from the menu.
       Pressing the ESC key will display the menu.

       BLOCK: READ

       The BLOCK READ option allows you to read in text from a standard text
       file. It will ask for the name of a text file and whether you want to
       use HARD of SOFT returns. If the text is in the form of paragraphs, use
       the SOFT option; if you are reading in columns of numbers or some sort
       of text you don't want to be reformatted, specify HARD.

       BLOCK: WRITE

       Assuming you have already used the F5 and F6 keys to highlight a
       block of text, the BLOCK WRITE option allows you to write it to a
       standard text file.

       BLOCK: COPY

       The BLOCK COPY option will move the text highlighted with the F5 and
       F6 keys to the position where the cursor is currently located. This
       option will not work if the cursor is within the highlighted region.

       BLOCK: MOVE

       The BLOCK MOVE option is the same as the BLOCK COPY command except
       the text is actually moved rather than copied to the current cursor
       position.

       BLOCK: DELETE

       The BLOCK DELETE command will erase all text you highlighted with
       the F5 and F6 keys.

       QUIT: SAVE

       The SAVE option is the same as the F2 key. It saves the current message
       and returns to "READ" mode.

       QUIT: ABORT

       The ABORT option allows you to "throw away" the current edit session.
       This is the same as the F1 key.


       QUIT: DROP TO DOS

       The DROP TO DOS command allows you access to DOS while you are editing
       a message. This method frees all available memory by swapping the
       editor to EMS or disk. When you are finished using DOS commands or
       programs, type "EXIT" to return to your edit.

       QUIT: PUSH TO DOS

       The PUSH TO DOS command allows you access to DOS while you are editing
       a message. When you are finished using DOS commands or programs, simply
       type "EXIT" to return to the editor.

       To summarize, we have included the following table of keys and their
       effect in various "edit" modes:

      Mode/field   Key(s)      Effect
      -------------------------------------------------------------------
      "TO"         F3          List users starting with the one entered
                   F8          Multiple destinations/Distribution list(s)

      "ADDRESS"    F3          List all NODEs in the currently selected NET
                   F4          Select a new ZONE and NET
                   F5          List all NETs in the nodelist
                   F6          List all NETs in the selected ZONE
                   F7          List FAX entries

      "SUBJECT"    F3          Send file(s)
                   F4          File-request
                   F5          Update-request
                   F6          Cancel send/request

      EDITOR       UP          Moves the cursor up one line
                   DOWN        Moves the cursor down one line
                   LEFT        Moves the cursor left one character
                   RIGHT       Moves the cursor right one character
                   DELETE      Deletes the character under the cursor
                   INSERT      Toggles "insert mode" ON/OFF
                   HOME        Moves cursor to the start of line/page/message
                   END         Moves cursor to the end of line/page/message
                   TAB         Moves cursor to the next tab position
                   BACKSPACE   Moves cursor left one character and erases
                               previous character if at the end of a line or
                               "insert mode" is ON.
                   F1          Aborts the current edit, returns to READ mode
                   F2          Saves the message, returns to READ mode


<a name="5.02"/><h2><a href="#toc">5.02  USING READ MODE</a></h2>

"Read" mode allows the user to read EMAIL messages in any of the defined
message areas. There are several keys that are used to control "read" mode
with a single keystroke:

      UP and DOWN arrows

      The UP and DOWN arrow keys move the currently displayed message UP and
      DOWN on your screen allowing you to read more text than will fit on the
      screen.

      PGUP and PGDN

      The PGUP and PGDN keys work like the UP and DOWN arrows except they
      advance the text one page at a time.

      HOME and END

      The HOME key displays the first page of a message; the END key displays
      the last page.

      LEFT and RIGHT arrows

      The RIGHT arrow displays the NEXT message; the LEFT arrow displays the
      previous message.

      + and - keys

      The PLUS and MINUS keys allow you to read by "thread". If a message
      says "Reply to #nnn", you can read the original message (the one replied
      to) by pressing the MINUS (-) key. Pressing PLUS (+) displays the next
      message in the "thread". This is most useful for "local" areas and does
      not usually work in your Network mail area.

      Number keys (0-9)

      You can advance to the desired message simply by entering the message
      number and pressing ENTER.


D'Bridge allows for virtually any number of message areas to be defined
in the area manager. While in READ mode, you may select between the
different message areas by using the F6 or "A" command. This command
displays the following screen which allows you to select a new message
area:

F1-Enter, F2-Reply, F3-Edit, F4-List, F5-Kill, F6-Areas, ESC-Menu      D'Bridge
                                                                    1.50/001002
/-READ/EDIT EMAIL-------------------------------------------------------------\
|Msg # 251                                                                    |
|Date: 07/-AREA CHANGE-----------------------------------------------------\  |
|From: Ch|  0    NETMAIL             Network mail area                     |  |
|  To: To|  2    COMPLAIN            Complaint Department                  |  |
|Subj: Gr|  4    DB_ALPHA            D'Bridge ALPHA conference             |  |
|--------|  6    FTSC                Technical standards committee         |--|
|Hello To|  7    NETDEV              Network developer's conference        |  |
|        |  10   SYSOP18             Region 18 Sysop conference            |  |
|I was ju|  11   ZMODEM              ZMODEM conference                     |  |
|finishin|  12   ECHOECHO            ECHOmail working group                |  |
|is well-|  19   SYSOP110            NET 110 Sysop conference              |  |
|I won't |  21   DBRIDGE             D'Bridge ECHO                         |  |
|        |  22   QUICKBBS            QuickBBS ECHO                         |  |
|Regards,|  24   TBBS                TBBS ECHO                             |  |
|Chris, 2|  9999 BADECHO             Bad ECHOmail area                     |  |
|        |                                                                 |  |
|        |                                                                 |  |
|        \-----------------------------------------------------------------/  |
|                                                                             |
|                                                                             |
\-----------------------------------------------------------------------------/

Change areas either by highlighting the desired area using the UP and
DOWN arrows and pressing ENTER or by entering the TAG or NUMBER of the
message area you desire. Pressing ESC will leave you in the same area
you were in before.

Once DBEDIT is displaying another message area, it should be displaying
the same message as was there the last time you exited from that area.
This is a feature of the so-called LAST READ POINTER, which is maintained
for each user in the editor separately. D'Bridge stores the LAST READ
POINTERS on your disk so that they are the same the next time you read
your mail.


      To summarize, we have included the following table of keys and their
      effect in various "read" modes:

      Mode         Key(s)       Effect
      --------------------------------------------------------------------
      READ         F1, E        Enter a new message
                   F2           Enter a reply to a message (see REPLY mode)
                   R            Enter a normal reply
                   Q, >         Enter a quoted reply
                   F3, O        Edit an old message
                   F4, L        Change to LIST mode
                   F5, K        Kill (erase) the current message
                   F6, A        Change message areas
                   ESC          Displays the main menu (advanced functions)
                   LEFT arrow   Displays the previous message
                   RIGHT arrow  Displays the next message
                   0..9         Selects message number
                   ENTER        Selects message or advances to the next one
                   UP arrow     Scrolls the message up one line
                   DOWN arrow   Scrolls the message down one line
                   PgUp         Scrolls the message up one screen
                   PgDn         Scrolls the message down one screen
                   HOME         Displays the beginning of the message
                   END          Moves to the end of the message
                   CTL-C        Leave editor

      REPLY        F1           Enter a quoted reply
                   F2           Enter a normal reply
                   ESC          Cancel reply

      LIST         UP arrow     Moves the highlight bar up one line
                   DOWN arrow   Moves the highlight bar down one line
                   PgUp         Scrolls the screen back one page
                   PgDn         Scrolls the screen forward one page
                   ENTER        Select current message, return to READ mode
                   I            Includes the highlighted message
                   E            Excludes the highlighted message
                   A            Includes all messages
                   N            Includes no messages (excludes all)
                   P            Includes all messages on the current page
                   G            Enters GROUP mode
                   ESC          Exits LIST mode, displaying the same message

      GROUP        P            Print all included messages
                   K            Kills (erases) all included messages
                   ESC          Exits GROUP mode, returns to LIST mode


<a name="5.03"/><h2><a href="#toc">5.03  ADVANCED FEATURES</a></h2>

There are several other features available from DBEDIT; they include
forwarding, copying, moving or printing messages, searching text and
selecting alternate addresses or "AKA" usernames. To activate the
EDITOR MENU, press ESC while in "READ" mode; the following menu will
be displayed:

Editor menu:  UTILITIES    SEARCH    QUIT                              D'Bridge
              /--------------------\                                1.50/001002
/-READ/EDIT EM| Area information   |------------------------------------------\
|Msg # 252 Wri| Forward message    |                                          |
|Date: 11 Jun | Copy message       |                                          |
|From: Chris I| Move message       |                                          |
|  To: Tom Ord| Print message      |Bridge Support/Europe                     |
|Subj: Greetin| Write msg to file  |                                          |
|-------------| New username       |------------------------------------------|
|Hello Tom,   | Use alias address  |                                          |
|             \--------------------/                                          |
|I was just writing to let you know that I've been sitting out in the snow    |
|finishing the D'Bridge documentation.  I think that you will find that it    |
|is well-written and quite clear.  It's Thursday, so I'll be playing poker    |
|tonight... Give me a call when you get a chance tomorrow!                    |
|                                                                             |
|Regards,                                                                     |
|Chris, 1:110/68                                                              |
|                                                                             |
\-----------------------------------------------------------------------------/

      Following are descriptions of all the options available from the main
      editor menu:

      UTILITIES: AREA INFORMATION

      The AREA INFORMATION screen functions identically to the AREA CHANGE
      function described in the previous section. The difference is that
      AREA INFORMATION displays the number of messages, last read, low and
      high message numbers in each area. D'Bridge displays the areas that
      have new, unread mail in the selected BRIGHT color. Areas which have
      new mail have the HIGHEST message different than the LAST READ.


The information screen looks like this:

/-AREA INFORMATION------------------------------------------------------------\
|#     Name                Description                   Low  High    LR  Msgs|
|0     NETMAIL             Network mail area              16  1477  1471   190|
|2     COMPLAIN            Complaint Department            1  1458  1458    17|
|4     DB_ALPHA            D'Bridge ALPHA conference     279  1479  1479   268|
|6     FTSC                Technical standards committee   1   295   261   295|
|7     NETDEV              Network developer's conferenc   1   107   107    95|
|10    SYSOP18             Region 18 Sysop conference      1   479   479   402|
|11    ZMODEM              ZMODEM conference               1    29    29    29|
|12    ECHOECHO            ECHOmail working group          1     3     3     3|
|19    SYSOP135            NET 135 Sysop conference        1   178   175    15|
|21    DBRIDGE             D'Bridge ECHO                   4  1332  1332   125|
|22    QUICKBBS            QuickBBS ECHO                 130  1450  1450   199|
|24    TBBS                TBBS ECHO                     621  1182  1080   102|
|9999  BADECHO             Bad ECHOmail area               1     1     1     1|
|                                                                             |
|                                                                             |
|                                                                             |
\-----------------------------------------------------------------------------/

      UTILITIES: FORWARD MESSAGE

      The FORWARD MESSAGE option allows you to re-route or send a copy of the
      current message to another system. You simply enter the TO, ADDRESS and
      specify the priority and whether to keep a the original copy of the
      message.

      UTILITIES: COPY/MOVE MESSAGE

      The COPY and MOVE MESSAGE commands can only be used when you have
      specified alternate message areas. It will copy or move the current
      message from one area to another.

      UTILITIES: PRINT MESSAGE

      Assuming you have a printer connected to your "PRN" port, DBEDIT will
      print the current message.


      UTILITIES: WRITE MSG TO FILE

      The WRITE MSG TO FILE option allows you to export a message to a
      standard text file. This might be used to transfer data from D'Bridge
      to a word processor or spreadsheet.

      UTILITIES: NEW USERNAME

      If you have defined more than one USER NAME in the SETUP EDITOR PARAM-
      ETERS menu, you can select from any of these to be the current user.
      This is the same screen you receive when you first start the editor
      with more than one user defined.

      UTILITIES: ALIAS ADDRESSES

      For systems who have defined multiple ALIAS ADDRESSES on the BASIC
      CONFIGURATION menu, this function allows you to enter messages
      addressed from one of your aliases.

      SEARCH: HEADERS or TEXT

      The SEARCH HEADERS or TEXT options allow you to search through your
      messages for specific keywords. Simply enter the word to search for
      and D'Bridge will find and highlight all occurrences.

      QUIT: EXIT

      Terminates DBEDIT and returns to D'Bridge.

      QUIT: DROP/PUSH TO DOS

      PUSH TO DOS allows you to enter DOS commands and run other programs
      while DBEDIT is still in memory. Type "EXIT" to return to DBEDIT.


<a name="6.00"/><h2><a href="#toc">6.00  UNDERSTANDING THE QUEUE</a></h2>

Everything D'Bridge does is based on the entries in the outbound queue
window. Once you understand what the "queue" is and how it is organized,
you will have a good overview of the program's structure.

The "QUEUE"

The outbound queue is a database containing entries for each of the
systems that currently have "outbound" mail. When D'Bridge first starts,
the outbound queue is created by scanning the NETmail area (either in
Fido or QuickBBS format), then scanning the disk-based queue for polls,
file-requests, etc. This database is then sorted by address and finally
displayed in the bottom-left window.

The queue can best be understood by disabling the SCHEDULE window so
the entire QUEUE window will be displayed. (Press ALT-S to toggle the
schedule window on and off).

/-QUEUE----------------------------------------------------------------------\
| Destination    Try/Con/Bad/Online   Priorities/Pkt types  Status           |
|*110/68.1        0   0   0  00:00     C N            X M   Hold/Unlisted    |
| 105/3           0   0   0  00:00         H          X     Hold             |
| 108/0           0   0   0  00:00       N        F     M   Decision at 17:00|
| 135/3          30   0   0  00:00     C              X     Try limit        |
| 135/142         1   1   0  00:32                          Sent successfully|
| 143/18          1   0   0  00:00         H          X     Hold             |
| 167/999         0   0   0  00:00     C                M   Hold/Unlisted    |
| 2:243/40        0   0   0  00:00         H          X     Hold             |
|*8:77/7          0   0   0  00:00       N      T       M   Hold/Unlisted    |
\----------------------------------------------------------------------------/

      To understand the queue, you simply need to have a good understanding of
      the individual fields:

      DESTINATION

      The destination is simply the Fidonet or FAX address of the system to
      contact. The destination is not always the "ultimate" destination due
      to possible routing, but is the system to be called.


      TRY

      The try field simply shows how many times D'Bridge has tried to call
      the destination system during the current event. If there is a plus
      sign ( + ) behind the number, it has been manually reset this event
      by the operator.

      CON

      This field shows the number of actual connections (carrier detects)
      made as the result of outbound calls to the specified system.
      Inbound connections do not count in the CON field. Again, if
      there is a plus sign ( + ) after the number, it has been manually
      reset this event.

      BAD

      This field shows the number of failures encountered during outbound
      sessions this event. In general, a failure means it was a wasted
      phone call for one reason or another (generally, the reason or error
      is listed in the log file). Again, the plus sign after the number is
      an indication that it has been manually reset (using the ALT-V com-
      mand).

      ONLINE

      The online field keeps track of total connect time as a summation of
      all outbound connects. This field is not reset until the end of the
      current event.

      PRIORITIES

      The priorities field shows which priorities of mail are contained
      within the queue entry. This field may contain any or all of the
      following:

                       I   Immediate      (Highest priority mail)
                       C   Crash          (High priority mail)
                       N   Normal         (Normal, budget priority mail)
                       H   Hold           (Mail held for pickup)


      PACKET TYPES

      The packet type field contains what types of mail packets are contained
      within the queue entry. The field may contain any or all of the follow-
      ing:

                       R   Outbound AREAFIX request  (ALT-R)
                       T   Transmit file(s)          (ALT-T)
                       F   File-request(s)           (ALT-F)
                       P   Poll                      (ALT-P)
                       X   XMAIL                     (Editor/BBS/ECHOmail)
                       M   NETmail                   (Editor/BBS)

      STATUS

      The STATUS field is most-likely the most important one to understand.
      If you are having trouble understanding why a mail packet is not being
      sent, the STATUS indication should be able to tell you exactly what is
      wrong. Please read and understand what the following status indications
      mean:

         Hold

         The mail can't be sent because "HOLD" is the only priority specified
         for the mail. (You told it to do this when you entered a message or
         set-up an ECHOmail area).

         Hold/Unlisted

         This indication means it is impossible to call this system
         because it is either not in your nodelist or it is listed as
         "unpublished". The destination system must call in for its mail
         or you need to get a nodelist containing its phone number.

         Max cost hold

         The cost of the message you want to send (as indicated in the editor)
         exceeds the maximum allowed during the current event.

         Temporary hold

         This means the operator has used the VIEW/MODIFY QUEUE mode to
         set the entry's status to "hold". To send the message, select
         ALT-V again and specify "SEND".


         Forced hold

         This means the operator has specified a forced priority of hold
         at some time in the past. This may be changed by using the ALT-V
         command to remove the "forced" status.

         Priority hold

         This means the given mail event does not allow the specified
         priority of mail to be transmitted. (This is related to the
         PRIORITIES field in the advanced routing of the schedule).

         Not a CM system

         In this event, you have specified that only those systems with a "CM"
         (continuous mail) flag may be called. (Again, this is a function of
         the advanced routing screen of the scheduler).

         CM not allowed

         In this event you have told D'Bridge not to call any "CM" systems.

         Decision at 17:00

         This means that because of the cost-control data, no outbound call
         may be placed to this address until at least 17:00. At 17:00, a
         decision will be made as to whether it may be called or not. This is
         the mechanism which allows D'Bridge to call-out only at the most
         economical times for normal priority mail. If you want the mail to
         be sent now, you should use a higher priority or change the cost-
         control data in the ACCOUNTING/TRANSLATION screen.

         Try limit

         This means D'Bridge has exceeded the maximum number of times
         allowed to try calling the remote system. Typically, you are not
         charged for non-connects, but you might want a limit on how many
         tries (gotta give up sometime... ).

         Session limit

         You have reached the maximum number of sessions allowed within the
         given event. In the case of long-distance systems, this has most-
         likely saved you a wasted phone call, making too many ECHOmail calls
         in the same event...


         Failure limit

         This means you have reached the maximum failures (bad sessions)
         allowed for the event. Maybe something is wrong with the remote
         system?

         Picked up

         This means all mail has been successfully picked up by the remote
         system. This saves D'Bridge the trouble and expense of making the
         call itself.

         Sent successfully

         This means you called the other system, sent the mail and all went
         well. All mail is confirmed as delivered to the "destination" sys-
         tem; remember that routed mail is now in the hands of another
         operator and is not 100% guaranteed to arrive.

         ----------

         The dashes (-----) mean that the packet is ready to be sent, now.


<a name="6.01"/><h2><a href="#toc">6.01  CREATING A PRIVATE NODELIST</a></h2>

Without a nodelist, D'Bridge can not make outbound EMAIL calls. Your
nodelist tells D'Bridge which systems it can communicate with and contains
information such as name, phone number and baud rate. Nodelists are text
files that can be created by any standard text editor. It lists ZONES,
NETS and NODES, one per line, using the "St. Louis format", the same style
used by Fidonet, Alternet and many other public EMAIL networks. You may
specify any number of St. Louis or private nodelists in D'Bridge.
Here's a sample NODELIST for a bogus private network:

   ,HOST,1720,Main_System,Cincinnati_OH,Rancy_Neagan,1-513-777-0007,9600,CM
    ,1,New_York_Office,Bronx_NY,Quan_Dale,1-202-555-9343,2400,CM
    ,4,Western_Division,Los_Angeles,Clinn_Billton,1-714-555-5286,2400,CM
    ,6,XYZ_Canada,Quebec,Lawrence_DeLaMouche,1-418-555-2811,2400,CM
    ,15,European_Office,The_Hague_NL,Luud_Rubbers,31-70-452121,9600,CM
    ,20,Moscow_Bureau,Moscow_USSR,Joris_Beltsin,!Unlisted,2400,CM

This example defined a HOST system and 5 nodes in NET 1720. Unless
a ZONE directive is specified, NET 1720 will be in whatever zone you
are in. Notice the format of the text file; no spaces are allowed.
All underscore characters "_" will be translated to spaces when the
information is displayed. Each field is separated by commas. The
following format is used for the "St. Louis format" nodelist:

      KEYWORD,NUMBER,NAME,CITY,OPERATOR,PHONE,BAUD,FLAGS

      KEYWORD     The KEYWORD directive may be blank or contain any of the
                  following values:

                    ZONE    The ZONE keyword marks the start of a new ZONE
                            and NET (both with the same number).  It also
                            defines the NODE that is the ZONE coordinator.

                    POINT   Specifies that this entry is a POINT of the
                            previously specified NODE.

                    HOST    The HOST keyword defines the start of a new NET
                            number and defines its HOST (a HOST has a NODE
                            number of zero).


                    REGION  The REGION keyword is identical to HOST with the
                            exception that no mail will be automatically
                            routed through the "HOST" node. This is mainly
                            used when the NET covers more than one geographic
                            area.

                    HUB     The HUB keyword defines the start of a routing
                            group. A HUB acts as the HOST to receive in-
                            coming mail for all nodes listed after it.

                    PVT     Defines that the listed node is private and does
                            not have a listed phone number. If a system's
                            phone number is not listed, this keyword MUST
                            be used.

                    DOWN    Defines that the listed node is down and should
                            not be added to the database.

      NUMBER      This specifies the NODE number of the listed node UNLESS
                  the KEYWORD is ZONE, HOST or REGION; in these cases, the
                  NUMBER defines the ZONE and/or NET, depending.

      NAME        Defines the name of the system. D'Bridge truncates NAMES
                  to 25 characters. Underscores "_" will be translated to
                  spaces for display.

      CITY        Specifies the city where the system is located. Again,
                  underscores "_" translate to spaces.

      OPERATOR    Defines the name of the primary system operator. Under-
                  scores "_" translate to spaces.

      PHONE       List the ENTIRE phone number including the COUNTRY CODE,
                  AREA CODE and PHONE NUMBER separated with dashes. "-"
                  For example: 1-305-232-9365 or 38-52-592831

      BAUD        Specify the MAXIMUM BAUD RATE for the system. May be
                  either 300, 1200, 2400, 4800, 9600 or 19200.

      FLAGS       A free-form field that may contain additional information
                  about the system. Include the characters "CM" if you wish
                  to designate a system as CONTINUOUS MAIL (24-hours)


<a name="6.02"/><h2><a href="#toc">6.02  DUTIES OF A NETWORK ADMINISTRATOR</a></h2>

Every network must have an "administrator" or anarchy would certainly
prevail!  This chapter briefly outlines which duties the administrator
of any private network should perform. Remember, these are just guidelines.

      1) The NETWORK ADMINISTRATOR is generally responsible for daily
         operation of the network. This means any problems are reported
         directly to the administrator. Obviously, a very large network
         would sub-divide the support into several regional administrators
         who would try to field all problems if they could.

      2) The NETWORK ADMINISTRATOR is responsible for the maintenance of the
         nodelist. Any systems added, changed or deleted must have these
         changes reflected in the nodelist and the new nodelist updates
         must be sent to all systems in the network.

      3) The general structure and routing used in the network must be either
         designed or approved by the NETWORK ADMINISTRATOR. He must be kept
         informed of all aspects of the network so that he can "keep a handle
         on it..."

      4) The NETWORK ADMINISTRATOR will assign NET and NODE numbers unless
         that responsibility is divided into different regions and handled
         by the regional administrators.


<a name="7.00"/><h2><a href="#toc">7.00  DBUTIL / UTILITY PROGRAM</a></h2>

D'Bridge comes with a utility program called DBUTIL; it allows you to
automate routine file-transfers and maintenance. DBUTIL is located in
your D'Bridge directory. When DBUTIL is ran all by itself, you will
have an interactive "menu system" which you can use to help you maintain
your areas. If you wish to run DBUTIL from lets say, a DOS event or
batch file, typing DBUTIL /? from the DOS prompt will display a list of
frequently used commands for automated "runs".

Whenever DBUTIL is used to do something, it creates and maintains a log
file for your inspection, called DBUTIL.LOG. This is a text file that can
be viewed by any DOS editor. This log file should be inspected every so
often if you use DBUTIL for nightly maintainence or weekly duties. If you
suspect any problems, you may share your log file with technical support.
Logging can be disabled by creating a dummy text file called DBUTIL.NLG. If
DBUTIL detects this file, it will not generate a log.

      SEND

      The DBUTIL SEND command adds TRANSMIT-FILE entries to the disk-based
      queue. Files will be sent directly to the destination system with no
      routing. The syntax for the SEND command is:

      C:\DB> DBUTIL [priority] SEND &lt;Address> &lt;file> ... &lt;file>

      ie.

      C:\DB> DBUTIL CRASH SEND 18/68.5 HOMEWORK.TXT
      C:\DB> DBUTIL HOLD SEND 18/20 DB-140*.ZIP DBNET.Z56

      REQUEST

      The DBUTIL REQUEST command adds FILE-REQUEST entries to the disk-based
      queue. The file-request will be sent immediately or during the next
      applicable mail event, depending on the priority you specify. Following
      is the syntax for REQUEST:

      C:\DB> DBUTIL [priority] REQUEST &lt;Address> &lt;file> ... &lt;file>

      ie.

      C:\DB> DBUTIL CRASH REQUEST 2:280/280 FILES ABOUT
      C:\DB> DBUTIL REQUEST 135/14 GOODGAME.ZIP MONOPOLY.ZIP

      POLL

      The DBUTIL POLL commands adds a POLL entry to the disk-based queue.
      Depending on the priority, the system will be called either immediately
      or during the next applicable mail event. When you POLL a system,
      D'Bridge will call to see if you have any mail waiting. The syntax for
      POLL is:

      C:\DB> DBUTIL [priority] POLL &lt;Address>

      ie.

      C:\DB> DBUTIL IMMEDIATE POLL 1:105/3

      PURGE

      The DBUTIL PURGE command will purge the specified message areas or all
      of them if you don't list any AREA NAMES. The purge will scan each
      message area and purge (and archive) the messages based on the criteria
      specified in the LOCAL/ECHOMAIL AREAS screen; see SECTION 3.2 for more
      information. The syntax for the PURGE command is:

      C:\DB> DBUTIL PURGE [areaname] [areaname] ... [areaname]

      ie.

      C:\DB> DBUTIL PURGE
      Purges all of the Echomail areas.

      C:\DB> DBUTIL PURGE POLITICS SCIENCE ART
      Purges only the POLITICS, SCIENCE and ART areas.

      You may also specify NETMAIL to purge/archive the messages in
      your NETmail area. If you specified purging criteria in the PACKET/
      MAIL CONTROL screen for Netmail, it will be applied as well.

      Note that if a message area DOES NOT have any purging criteria, it
      will NOT be purged.

      SORT AREAS

      If you wish to reorganize the areas in your LOCAL/ECHOMAIL AREAS screen,
      you may use the SORT AREAS command. This will sort and renumber your
      areas by SORT GROUP and TAG. Before using this command, make sure you
      specify SORT GROUPS for all the areas and group them together in a
      logical manner. The syntax is:

      C:\DB> DBUTIL SORT AREAS

      Be warned that if you have a large number of Echomail areas, it may
      take anywhere from a few seconds to several minutes, depending on
      the speed of your computer.

      AUTOASSIGN
            
      The AUTOASSIGN keyword, will automatically change/update your
      Echomail database whenever a new area is added by D'Bridge that
      has an uplink address (the A- parameter), or that has a matching
      area name (the T- paramter). Multiple entries are okay, seperated
      by commas. The following options are available:

      AUTOASSIGN [option] [value] A-[matching address] OR T-[matching area]

      Options:

             ALERTFLAG [value] - The "Alert" status flag. 0-9, A-Z.
           GROUPACCESS [value] - The group access character. 0-9, A-Z
             GROUPSORT [value] - The group sort character, usually 0-9.
         GROUPSECURITY [value] - The security level. 0 to 5000.
                 PURGE [value] - Purge except OR purge after days. If you
                                 are purging in days, specify a negative
                                 value, ie. 7 days should be "-7"
              PRESERVE [value] - Messages to preserve.

      ie:

      C:\DB> DBUTIL AUTOASSIGN ALERTFLAG A A-1:229/2000
      Assigns alert-flag "A" to new areas from my 1:229/2000 uplink.

      C:\DB> DBUTIL AUTOASSIGN GROUPACCESS B A-2:2/0,2:282/153,4:500/13
      Assigns group access "B" from the specified addresses.

      C:\DB> DBUTIL AUTOASSIGN PURGE -14 T-ALT.*,REC.*
      New areas from the "ALT" and "REC" Usenet groups will be purged
      after 14 days.

      C:\DB> DBUTIL AUTOASSIGN GROUPACCESS A-1:229/2000
      C:\DB> DBUTIL AUTOASSIGN GROUPSECURITY 5000 A-1:229/2000
      C:\DB> DBUTIL AUTOASSIGN PRESERVE 200 A-1:229/2000
      Assigns group A, security level 5000 and a preserve of 200 messages
      to everything auto-added from my 1:229/2000 uplink.

      CHANGE
      
      The CHANGE command tells DBUTIL to make mass-changes to your
      Echomail setup, based on the option you select:

      CHANGE [option] [newvalue]

      Options:

            ALERTFLAG [value] - The "Alert" status flag. 0-9, A-Z.
          GROUPACCESS [value] - The group access character. 0-9, A-Z.
            GROUPSORT [value] - The group sort character, usually 0-9.
        GROUPSECURITY [value] - The security level. 0 to 5000.
                PURGE [value] - Purge except OR purge after days. If you
                                are purging in days, specify a negative
                                value, ie. 7 days should be "-7"
             PRESERVE [value] - Messages to preserve.
                  AKA [value] - Network address.
                    WEB [Y/N] - Web-enabled, yes or not.

      Examples:

      C:\DB> DBUTIL CHANGE ALERTFLAG A ALERTFLAG B
      Changes all areas with alert flag "A" to alert flag "B"

      C:\DB> DBUTIL CHANGE GROUPACCESS A GROUPACCESS Z
      Changes all areas in group "A" to group "Z"

      C:\DB> DBUTIL CHANGE PURGE -14 PRESERVE 50
      Changes all areas with a 14 day purge value to also have a preserve
      value of 50.

      DELETE

      Deletes areas from your Echomail database based on your criteria. Use
      with caution. If you make a mistake, use the UNDELETE command
      mentioned later.

      DELETE [option]

      Options:

             ALERTFLAG [value] - The "Alert" status flag. 0-9, A-Z.
           GROUPACCESS [value] - The group access character. 0-9, A-Z.
             GROUPSORT [value] - The group sort character, usually 0-9.
         GROUPSECURITY [value] - The security level. 0 to 5000.
                 PURGE [value] - Purge except OR purge after days. If you
                                 are purging in days, specify a negative
                                 value, ie. 7 days should be "-7"
              PRESERVE [value] - Messages to preserve.
                   AKA [value] - Network address.
                     WEB [Y/N] - Web-enabled, yes or not.

      Examples:

      C:\DB> DELETE ALERTFLAG A
      Deletes all Echomail areas that have alert flag "A"

      C:\DB> DELETE GROUPSECURITY 5000
      Deletes all Echomail areas that have a group security of 5000.

      DESCFILE

      The DESCFILE command tells DBUTIL to change all the descriptions of
      the Echomail database to match those found in a text file. The text
      file should be in ".NA" format, meaning the area tag, at least one
      space, and then the description.

      ie.

      C:\DB> DBUTIL DESCFILE C:\DBRIDGE\FIDONET.NA

      DELETEDOS

      If the DELETEDOS command is executed, then whenever
      a DBUTIL PURGE is ran and DBUTIL encounteres a "deleted" area (usually
      from deleting it in the ECHOMAIL AREA EDITOR), if the area is
      a Fido *.MSG area, the directory is also deleted. So if you
      deleted FN_SYSOP, and DBUTIL PURGE is ran again, whatever you
      specified as your FN_SYSOP message directory will be erased. Note
      that if you plan to use the UNDELETE feature mentioned below, you
      should not use the DELETEDOS command.

      Note that due to an inherant design flaw in the ECHOMAIL AREA EDITOR,
      you should NOT delete the very last area from the database. If the
      last area must be deleted, you should first create a "dummy" area
      after that record so the first one can be deleted properly.

      DBUTIL DELETEDOS should only be used if you want to run a
      "system-wide" cleanup of your message directories. It should NOT be
      ran as part of any regular maintainence.

      ie.

      C:\DB> DBUTIL DELETEDOS

      MOVE

      MOVE will take any address you specify, and "move" it to a directory
      of your choice. It replaces Khile Klock's entire DBQ2FTP utility,
      and requires no external configuration at all. MOVE should obviously
      be used after any queue-manipulating commands such as POLL
      and SEND. It also works on point systems, something DBQ2FTP wasn't
      able to do properly.

      In your QUEUE directory, you will find a subdirectory called AFIXCTRL.
      This directory is used by D'Bridge to control the Areafix subsystem,
      but it also serves as a control directory for moved mail. FTSC
      requires that archived mail contain the current day-of-the-week
      in the extension of the filename. DBUTIL stores such information
      in the AFIXCTRL directory and uses this to compute the filenames in
      the format that FTSC calls for. The contents of this directory should
      not be deleted or modified in any way - DBUTIL looks after all of
      those files by itself automatically.

      DBUTIL MOVE also properly handles any NETmail queue entries and
      converts them to PKT files, including XMA-marked messages. Note
      that DBUTIL is not actually reading any messages, its just converting
      the queue files to something a little more useful for 3rd-party stuff.
      The MOVE command also properly moves file-attaches and honours any
      TRUNCATE or KILLSENT priorities on the corrosponding NETmail message.

      Note that MOVE is not present in the "interface" portion of DBUTIL.
      It is strictly a "command-line" function only.

      MOVE [address] [directory]

      ie.

      C:\DB> DBUTIL MOVE 1:229/426.1 F:\LAN\SOMEONE
      C:\DB> DBUTIL MOVE 1:229/2000 C:\IREX\ROBERT
      C:\DB> DBUTIL MOVE 2:2/0 C:\IREX\WARD

      UNDELETE

      If UNDELETE is ran, any previous DELETE operations will
      be "rolled back". Any deleted records in your Echomail database
      will be restored... provided you didn't do a SORT AREAS first!

      ie.

      C:\DB> DBUTIL UNDELETE


<a name="7.01"/><h2><a href="#toc">7.01  MESSAGE STORAGE</a></h2>

D'Bridge currently supports several methods for storing EMAIL messages on
disk. These particular methods were chosen for compatibility with some of
the most popular bulletin board systems, and to allow greater flexibility
when working with 3rd-party utility programs to manipulate messages.

      FIDO         Using the FIDO storage method, each message is stored in
                   a separate ".MSG" file in a certain directory. Each fido-
                   style local or ECHOmail area will have a unique sub-
                   directory. This method is compatible with Fido and Opus,
                   as well as many message handling utilities. FIDO storage
                   usually takes the most disk space and is the slowest
                   method available.

      QuickBBS     The QUICKBBS storage method stores all messages in five
                   data files: MSGHDR.BBS, MSGTXT.BBS, MSGIDX.BBS, MSGTOIDX.BBS
                   and MSGINFO.BBS, all stored in the specified QuickBBS
                   directory. Using this method, up to 200 message areas may be
                   defined. This method is fast and doesn't use too much disk
                   space; it is provided for compatibility with the QuickBBS
                   bulletin board system.


<a name="7.02"/><h2><a href="#toc">7.02  USING THE SCRIPTING LANGUAGE</a></h2>

D'Bridge includes a powerful scripting language allowing it to use
alternate carriers such as packet-switched networks rather than normal
telephone connections. This can be used with any carrier such as Tele-
net's PC-Pursuit or your private Satellite uplink service. Any data
carrier capable of 8-bit, no parity, full duplex communication may be
used with D'Bridge. The reason for using an alternate carrier is usu-
ally to save money on your phone bill.

The scripting language connects two D'Bridge systems through any form
of data link that is compatible. In the U.S.A., the most common example
for using scripts is PC-Pursuit, so I'll use that as an example. Script
files are text-files created by any standard text editor and contain
keywords telling D'Bridge exactly what to do. It is important to have
a good understanding of the carrier you intend to use before designing
your script file; this is necessary for a good understanding of all the
terms used here - it's not that simple.

To use a script file, you will need to have a PHONE NUMBER TRANSLATION
or OVERRIDE for each area code or system you intend to use. With PC-
Pursuit, this currently requires 40 translation strings, one for each
city served. I intend to use an indexed database in a future release
to eliminate this necessity, but that's later. For now, use a trans-
lation in the following format:

cc-aaa- "script.fil"xxxxx-

Where "cc" is the COUNTRY CODE, "aaa" is the AREA CODE, and "xxxxx" is
the translated AREA CODE (or in the case of PC-Pursuit, the city des-
ignator). As an example, use the following PHONE NUMBER TRANSLATION to
reach the Miami, Florida area:

1-305- "PCP.SCR"FLMIA-

This will translate ALL 305 area codes to use the script file. Needless
to say, not all of area code 305 is PC-Pursuitable, so if you need to
contact other cities in our area code, you will need to specify previous
translation or override strings (the upcoming index file will eliminate
the need for these translations altogether).

Assuming you now have 305 translated to use the PCP.SCR script file,
you now must create this file and put it in your defined SCRIPT PATH
(SCRIPT PATH is defined on the DIRECTORY PATHS setup screen).  With
D'Bridge, it is possible to use one script file for ALL the "pursuitable"
cities, though you will need one for each baud rate desired. Following
is a detailed description of the scripting language keywords and their
meaning (see the next chapter for a specific example and explanation
using PC-Pursuit):


      Syntax: ABORT &lt;start_time> &lt;end_time>

      Example: ABORT 6:00 18:00

      The ABORT keyword causes the script to abort immediately if the time is
      between the &lt;start_time> and &lt;end_time> specified. This is handy for
      making sure no script calls are made outside predefined hours.

      Syntax: AREACODE

      The AREACODE keyword causes D'Bridge to transmit the AREA CODE field of
      the phone number. This is separated from the PHONE NUMBER by a dash "-"
      and is sent with no carriage return or other characters. For PC-Pursuit,
      this is usually substituted with the city code (such as FLMIA).

      Syntax: BAUD &lt;baud_rate>

      Example: BAUD 1200

      The BAUD keyword changes the current baud rate to the specified value.
      By default, it will be the baud rate of the destination system.

      Syntax: CARRIER

      When the CARRIER keyword is encountered, the script file is aborted
      unless a carrier is detected at this point. This is handy for ensuring
      you have a carrier when you think you should.

      Syntax: COMM &lt;config_characters>

      Example: COMM 7E1

      The COMM keyword configures the communication port for the setting
      specified. In this example, it is set for 7 data bits, even parity
      and 1 stop bit. The following &lt;config_characters> are supported:

          1 - 1 stop bit       N - No parity
          2 - 2 stop bits      E - Even parity
          7 - 7 data bits      O - Odd parity
          8 - 8 data bits


      Syntax: CONNECT

      The CONNECT keyword sets the CONNECT count for the given packet is
      increased by one. This is used in conjunction with the maximum
      connects limit defined for the current mail event.

      Syntax: DIAL &lt;phone_number>

      Example: DIAL 555-2939

      The DIAL keyword causes D'Bridge to dial the &lt;phone_number> specified
      and wait for a CONNECT, BUSY or NO CARRIER field just like when dialing
      normally. If a non-connect message is received, the script is aborted.

      Syntax: DIRECT &lt;start_time> &lt;end_time>

      Example: DIRECT 6:00 18:00

      The DIRECT keyword will cause D'Bridge to abort the script file and dial
      direct (using your phone company) between the times specified. This is
      useful for switching between script and telephone company use depending
      on the time of day.

      Syntax: DOS &lt;DOS_command>

      Example: DOS ibm_uucp 2400

      The DOS keyword is seldom used, but it enables you to execute any DOS
      command from within a script file. In this example, the program
      "IBM_UUCP" is executed with a parameter of 2400.

      Syntax: GOTO &lt;label>

      Example: GOTO LOOP-1

      The GOTO keyword transfers control to another point within the script
      file. The &lt;label> must exist and start with a colon ":" just like in
      DOS batch files. Caution should be used in not creating "endless
      loops" without a TIMER statement preceding them.


      Syntax: IF &lt;pattern_number> &lt;label>

      Example: IF 2 GOTO SUCCESS

      The IF keyword transfers control to another point in the script file
      if a previously defined pattern has been detected. This is used in
      conjunction with the PATTERN keyword and uses the same label structure
      as the GOTO keyword. It is also possible for IF to cause "endless loops"
      if your script is not designed correctly, so use of the TIMER keyword
      is highly desirable.

      Syntax: INIT

      The INIT keyword causes D'Bridge to send it's standard initialization
      string to the modem. This is normally done at the beginning of every
      script, but may not be necessary.

      Syntax: PATTERN &lt;pattern_number> &lt;string>

      Example: PATTERN 0 BUSY

      The PATTERN keyword defines a pattern to look for from the remote system
      or modem. It is used in conjunction with the WAIT and IF keywords to
      act based on the response received. The &lt;pattern_number> must be from
      0 to 9 and the &lt;string> may be up to 20 characters. If "PATTERN 0" is
      specified with no characters after it, pattern 0 is disabled.

      Syntax: PHONE

      The PHONE keyword causes D'Bridge to transmit the PHONE NUMBER field.
      This is sent with no additional characters such as carriage return, so
      if you want to send one, use the XMIT keyword after the PHONE keyword.

      Syntax: SESSION

      The SESSION keyword is used to begin the mail session. When it is
      encountered, the script file terminates and D'Bridge starts trying
      to sync with the destination system. If there is no carrier detected
      at this point, the session will be aborted. Make sure this is only
      used once a "CONNECT" signal is received from the remote modem.


      Syntax: TIMER &lt;seconds>

      Example: TIMER 300

      The TIMER keyword sets an overriding timeout on the execution of the
      script file. This is especially handy when you have created "endless
      loops" for re-dialing within your script file. If no TIMER  value is
      specified, D'Bridge will keep dialing "forever" until it gets through.
      Every time the TIMER keyword is encountered, the timer is cleared. For
      this reason, care should be taken to ensure it is not within an "end-
      less loop".

      Syntax: WAIT &lt;seconds>

      Example: WAIT 20

      The WAIT keyword causes the script to wait for the specified number of
      seconds for one of the patterns (previously defined) to be received.
      If none of the patterns are received within &lt;seconds> seconds, the
      script is aborted. The PATTERN keyword defines the pattern(s) to wait
      for.

      Syntax: XMIT &lt;string>

      Example: XMIT HELLO|~~~52937,334|

      The XMIT keyword causes D'Bridge to transmit characters to the remote
      system (or your modem if not currently connected to anything). This
      command is executed literally and there must be only one space between
      XMIT and &lt;string> or the spaces will also be sent. There are two
      special characters used in the XMIT keyword:

          "|" causes a carriage return (CR) to be sent
          "~" causes a one-second delay in execution

The script file is executed much like a program, sequentially. The
only exception is when control is transferred to another part by using
an IF or GOTO keyword. Any errors in the script file will only be
found when the keyword is executed. Use the script debugging windows
while testing scripts; these will display the communications plus what
keywords are being executed. Activate these windows by answering YES
to the DIAGNOSTICS? question on the BASIC CONFIGURATION screen.


<a name="7.03"/><h2><a href="#toc">7.03  EXAMPLE SCRIPT FILE</a></h2>

The following example script file is the one Tony Wagner wrote for use
with the PC-Pursuit service. It is currently used by a fair number of
people with success. You will need to customize it somewhat to work in
your city and use your own password.

                             INIT
                             TIMER 600
                             BAUD 2400
                             DIAL XXX-XXXX
                             XMIT @~D~|~D1|
                             :RETRY
                             PATTERN 0 @
                             WAIT 30
                             XMIT C D/
                             AREACODE
                             XMIT /24,YOUR ID#|
                             XMIT PASSWORD|
                             PATTERN 0 CONNECT
                             PATTERN 1 ONLINE
                             PATTERN 2 BUSY
                             PATTERN 3 RE-ENTER
                             PATTERN 4 MANUAL
                             PATTERN 5 NOT
                             WAIT 30
                             IF 2 RETRY
                             IF 3 RETRY
                             IF 5 RETRY
                             TIMER 600
                             XMIT ~|~@~|
                             XMIT ~SET 1:0,7:0|
                             XMIT CONT|
                             XMIT |~I~|~ATZ|
                             :CITY_CONNECT
                             XMIT ~ATDT
                             PHONE
                             XMIT |
                             WAIT 45
                             IF 2 CITY_CONNECT
                             IF 4 CITY_CONNECT
                             SESSION

The above script is a rapid-dial script that tries for a maximum of
five minutes to connect with the desired city. Once in the city, it
then re-dials the destination system for a maximum of five minutes.


<a name="8.00"/><h2><a href="#toc">8.00  BBS SYSTEMS</a></h2>

D'Bridge is designed to act as a FRONT-END for "online" programs such as
BBS (bulletin board systems) and database systems. D'Bridge will answer
the phone and determine whether an incoming call is EMAIL or HUMAN. If it
is an EMAIL call, D'Bridge automatically receives the mail and/or files and
returns to the idle state. If a HUMAN call is detected, control may be
transferred to another program such as a bulletin board system. It will
take about 10 seconds for D'Bridge to decide whether a caller is HUMAN;
this time-period can be increased if desired. If the caller presses the ESC
key twice, D'Bridge will assume the call is HUMAN and transfer control to
the BBS immediately.

Every BBS software package is configured slightly differently, therefore
D'Bridge needs to be flexible in the way it transfers control while the
caller remains online. There are three basic ways of invoking your BBS
program:

    PUSH    Using the PUSH method, you simply specify a series of DOS
            commands to be executed. You may even invoke a batch file
            in this method. Only the memory D'Bridge is not using will
            be available for the BBS. The PUSH method is designated by
            simply typing the commands in the DOS BBS COMMANDS window.

            ie. CD \OPUS
                 OPUS OPUS -B*B -T*T

    DROP    The DROP method is similar to the PUSH method, except that
            all available memory (except 15K) is freed, leaving almost
            all system memory free for the BBS to use. This is handy
            if you have a large D'Bridge configuration or your BBS has
            a lot of "door" programs that it spawns. The DROP method is
            designated by typing a plus sign "+" in front of the commands
            in the DOS BBS COMMANDS window.

            ie. CD \OPUS
                 +OPUS OPUS -B*B -T*T

    EXIT    With the EXIT method, D'Bridge completely terminates, exiting
            with an errorlevel designating the baud rate. If you use this
            method, you must be running the mailer from a batch file set
            up to trap the various errorlevels. To configure the EXIT
            method, specify *X on a line by itself in your DOS BBS COMMANDS
            window.


            ie. *X

            An example of a simple batch file that would work with the
            EXIT method demonstrates the setup for a 2400 baud modem.
            Note that the errorlevel returned by D'Bridge is equal to
            the BAUD RATE / 100.

            :TOP

            DB

            IF ERRORLEVEL 24 GOTO 2400BAUD
            IF ERRORLEVEL 12 GOTO 1200BAUD
            IF ERRORLEVEL 3 GOTO 300BAUD

            GOTO END

            :2400BAUD

            CD\OPUS
            OPUS OPUS -B2400
            GOTO TOP

            :1200BAUD

            CD\OPUS
            OPUS OPUS -B1200
            GOTO TOP

            :300BAUD

            CD\OPUS
            OPUS OPUS -B300
            GOTO TOP

            If you are not familiar with batch files and you must use
            them, see the IBM DOS manual.

Every time a BBS call is detected, control is transferred to your BBS
software by executing the commands located in the DOS BBS COMMANDS
window. You may specify any number of DOS commands in this window to
be executed in sequence.


Each line must contain a valid DOS command, or a D'Bridge "directive".
If an entry begins with a plus sign (+) the command will be executed
using the DROP method rather than the PUSH method. If you use DROP,
D'Bridge will be entirely swapped out of memory (except 15K) allowing
the called program almost all the free memory in the environment. This
is nice for running BBS programs that have "door" utilities. The DROP
method takes longer to execute than the PUSH method. D'Bridge memory
is swapped to either EMS or DISK.

Following is an example of how I run the QuickBBS bulletin board:

                 CD \QUICKBBS
                 +QUICKBBS -b*b -t*t -e0

Any entries with an asterisk "*" will be treated as D'Bridge directives
or substitutions. When the above DOS BBS COMMANDS are executed, the
following is an example of the actual DOS commands issued:

                 CD \QUICKBBS
                 QUICKBBS -b2400 -t126 -e0

Following is a description of the D'Bridge directives available:

    *B       Substituted with the actual BAUD RATE of the connection.

    *C       Substituted with the actual connect string returned from
             the modem. This may be translated to any string you wish
             by using the "CONNECT" COMMANDS field of the COMMUNICATION/
             MODEM SETUP screen.

    *H       If specified, leaves the FOSSIL "HOT" or initialized.

    *P       Returns the COMM PORT D'Bridge is currently using. This
             may be from 1 to 7.

    *R       Causes a NETMAIL rescan to occur after each BBS call.

    *S       Causes an ECHOmail scan to occur after each BBS call.

    *T       Substituted by the number of minutes until the next event.

    *X       Exit D'Bridge with an errorlevel of the baud rate divided
             by 100 (3,12,24,48 or 96). If you use this method (which is
             not suggested), you will need to write a batch file like
             the one described on the preceding page.


    *Xnnn    Exit D'Bridge with the specified errorlevel. If you use
             this method, you must be using some alternate method to
             pass the baud rate to the system.

Any DOS command with the exception of EXIT, PROMPT and SET will work
in the DOS BBS COMMANDS window. Changing directories is allowed;
D'Bridge will automatically switch back to the DB root directory
when the commands are finished. You do not have to specifically
change directories after the BBS call.


<a name="9.00"/><h2><a href="#toc">9.00  GLOSSARY OF TERMS</a></h2>

<h3><a href="#toc">ADDRESS</a></h3>

An ADDRESS normally specifies where you want to send EMAIL or files.
D'Bridge uses the Fidonet addressing structure; this consists of four
numbers: ZONE, NET, NODE and POINT. For example, my ADDRESS is 1:110/68.
This means ZONE 1, NET 110, NODE 68 and POINT 0. The format for a Fidonet
ADDRESS is: ZONE:NET/NODE.POINT.

<h3><a href="#toc">ALIAS</a></h3>

An ALIAS is simply another ADDRESS or USER NAME you are using at any given
time. Your system will have a primary ADDRESS and OPERATOR, but you may also
specify a list of AKA (Also Known As) ADDRESSES and USER NAMES which may be
selected while using the internal message editor. ALIAS ADDRESSES are used
when your system belongs to more than one network.

<h3><a href="#toc">AREAFIX</a></h3>

AREAFIX is a subsystem with D'Bridge allowing remote systems to add and
delete ECHOmail conferences from your forwarding list. This eliminates the
need for routine maintenance by the operator of an ECHOmail hub.

<h3><a href="#toc">BAUD RATE</a></h3>

The BAUD RATE represents the speed of a serial communication line.
BAUD actually means BITS PER SECOND and dictates how fast data can be
transferred. Since normal data communications takes 10 bits per character,
a 1200 baud modem can transmit and receive data at a maximum of 120 bytes
(characters) per second.


<h3><a href="#toc">BBS</a></h3>

BBS - An abbreviation for Bulletin Board System.

<h3><a href="#toc">BOSS</a></h3>

A BOSS node refers to the administrator of a "point" network. For example,
if your address is 1:110/50.6, then your "BOSS" address is 1:110/50 (or point
zero). Since points are not in the nodelist, the BOSS will normally receive
and forward all mail addressed to a point.

<h3><a href="#toc">BULLETIN BOARD SYSTEM</a></h3>

Usually called a BBS, a BULLETIN BOARD SYSTEM is a program which allows
"human" callers to connect using a terminal program and directly access
messages, files and other online services. Many BULLETIN BOARDS are public-
access systems which allow people to use them for free providing they follow
the "rules". Many manufacturers and software companies have set up a BBS
to handle support and distribute product information. D'Bridge is capable of
acting as a "front-end" to most BULLETIN BOARD SYSTEMS, determining if a call
is an EMAIL session or if a "human" is on the line.

<h3><a href="#toc">CARRIER</a></h3>

CARRIER, short for CARRIER WAVE, refers to the connection of two modems.
When you dial a modem (with your telephone) you will hear a high-pitched tone;
this is called the CARRIER DETECT SIGNAL. When a modem calls another system, 
the calling modem detects this tone and they automatically "synchronize" and 
determine the baud rate of the connection. Once this is accomplished, you are 
said to have a CARRIER. If the connection is terminated, or the CARRIER signal
is lost, the modems are no longer communicating and will hang up.
The CARRIER WAVE in itself is the unmodulated single-frequency electromagnetic
wave that carries the desired information (data) - i.e., is modulated by the
information.


<h3><a href="#toc">CD</a></h3>

An abbreviation for Carrier Detect. CD refers to the circuits within the
modem monitoring the connection and detecting when a carrier is lost. Most
external modems have a CD light telling the operator the status of the
connection. Once a carrier is detected, D'Bridge can initiate an EMAIL ses-
sion.
CD also refers to the signal the modem sends to the computer telling it
that another modem is connected. This signal is required by D'Bridge.

<h3><a href="#toc">COMM PORT</a></h3>

COMM PORT refers to the serial I/O card used by D'Bridge to communicate with
the modem. Internal modems have a built-in serial PORT but are used the same
way. Your modem PORT is most likely called either COM1 or COM2.

<h3><a href="#toc">COMPILE</a></h3>

In D'Bridge, COMPILE means to translate the raw nodelist or FileBase data
into its internal database. This must be done every time a new nodelist is
installed or when the FileBase is updated. When D'Bridge is run, it checks
the data and time associated with each nodelist file you are using with the
last known values. If they differ, D'Bridge automatically RECOMPILES the
nodelist database (the FileBase must be manually COMPILED using the command-
line option).

<h3><a href="#toc">CONNECT</a></h3>

CONNECT refers to D'Bridge receiving a carrier detect signal from the modem
along with a "CONNECT" message generated by HAYES-compatible modems. When
D'Bridge is CONNECTED to another system, it can send and receive EMAIL and
files. When placing a long-distance call, your phone company will bill you
for the actual CONNECT TIME, usually rounded up to the next minute.


<h3><a href="#toc">CM</a></h3>

An abbreviation for Continuous Mail. All D'Bridge systems are capable of this.
Continuous mail means that a Fidonet-based EMAIL system is capable of
receiving mail 24 hours a day and not just during a scheduled event. Some
EMAIL systems are still not capable of this, so the nodelist has a "CM" flag
which can be used to only send to CM systems (this is configurable on the
ADVANCED ROUTING screen of SCHEDULE MAINTENANCE).

<h3><a href="#toc">CRC</a></h3>

CRC is an abbreviation for Cyclic Redundancy Check. This is how D'Bridge
(and all other EMAIL systems) ensure that data is received the same way it
is transmitted. It is much like a "checksum" attached to a block of data;
A mathematical formula (a polynomial) is used to compare each data block with
its CRC value. If there is a difference, the data is not valid and must be
retransmitted. You, as the user, do not need to concern yourself with this
as it happens automatically.

<h3><a href="#toc">CRASH</a></h3>

In D'Bridge (and most other Fidonet-based systems), CRASH refers to a high-
priority message. It is an "attribute" that may be associated with a message
to tell D'Bridge to send the mail immediately, to override any routing and to
call the destination system directly. Using the internal message editor, you
can specify any message to have CRASH priority.

<h3><a href="#toc">CTS</a></h3>

An abbreviation for Clear To Send. CTS is a signal generated by the receiving
system or modem telling D'Bridge that it may transmit data. This is normally
used only when a modem is using a higher baud rate than it is capable of
sending (or receiving). The CTS signal is used in conjunction with the RTS
(Request To Send) signal and is sent from the modem to the computer.


<h3><a href="#toc">DATA</a></h3>

DATA simply means any form of information that can be stored in a computer
in the form of a file. DATA could be a message, spreadsheet file, graphics
image or anything else in your computer. Any form of DATA may be sent by
D'Bridge.

<h3><a href="#toc">DATA BITS</a></h3>

When D'Bridge is communicating with another EMAIL system, it uses 8 DATA BITS
in the transmission. IBM computers are only capable of using 7 or 8 DATA BITS
in their communications. The D'Bridge "terminal mode" allows you to select
either 7 or 8 DATA bits when communicating with online services such as BBS's.

<h3><a href="#toc">DEFAULT</a></h3>

A DEFAULT refers to a predefined or normal value for something. When you
first install D'Bridge, you will notice that many of the configuration screens
already have answers to questions even though you didn't enter them. This is
because these values or answers will be used by most systems, so they are the
DEFAULTS.

<h3><a href="#toc">DOMESTIC</a></h3>

DOMESTIC refers to any communications within a given country. In the case
of the U.S., D'Bridge considers any system that has a phone number beginning
with "1" to be a DOMESTIC call (this includes Canada, the Bahamas and possibly some other
neighboring countries sharing "1" as their country-code).

<h3><a href="#toc">DOS</a></h3>

DOS, an acronym for Disk Operating System, is the program (written by
MicroSoft) controlling your computer's basic functions. D'Bridge requires
DOS to operate and odds are (99.99% of the time) you already have this
program. Other operating systems are available such as PC-MOS and XENIX,
but D'Bridge will not function while using these.


<h3><a href="#toc">DOS EVENT</a></h3>

A DOS EVENT is a scheduled event (defined by SCHEDULE MAINTENANCE) that will
execute any number of DOS commands or programs, providing that you have enough
memory to "spawn" these tasks. DOS EVENTS can be used for any function you
wish to have automatically performed on a scheduled basis. DOS EVENTS must
only run programs that require no human intervention (keyboard I/O).

<h3><a href="#toc">DOWNLOAD</a></h3>

DOWNLOAD means to receive a file from a remote computer. The D'Bridge
"terminal mode" supports downloads with XMODEM, SEAlink and ZMODEM protocols.
When you DOWNLOAD a file, you are basically copying it over the telephone
from the remote computer to yours. Because these protocols all use CRC error-
checking, the files should arrive on your computer exactly like they are on
the remote system.

<h3><a href="#toc">DROP</a></h3>

In D'Bridge, DROP means to execute another program (or access DOS) by swapping
all memory to EMS or disk, then executing another program. This method (com-
pared to PUSH) frees all available memory so that the executed program has
the maximum memory available for its use.

<h3><a href="#toc">DUPLEX</a></h3>

DUPLEX is used only in the D'Bridge "terminal mode" and refers to an
operating characteristic of the remote computer you are calling. These
days, almost all computers and online services operate in FULL DUPLEX
mode; this means every time you type a character, the remote computer
"echos" it back to you and it is displayed on your screen. Some systems,
however, do not "echo" the characters you type; that is called HALF
DUPLEX operation. If you set D'Bridge to HALF DUPLEX, every character
you type will be displayed on your screen. If you experience a double
echo (two characters for every one you type), you should change to FULL
DUPLEX.


<h3><a href="#toc">DTR</a></h3>

An abbreviation for Data Terminal Ready. DTR is the signal your computer
sends to your modem stating it should accept commands from the computer or,
if enabled, answer the phone. D'Bridge requires this signal to function
properly in order to be able to hang up the phone. When your computer "lowers"
DTR, your modem should hang up the phone if connected to a remote system, or
not answer the phone (if so enabled). Most external modems have a DTR light
telling you the status of this signal.

<h3><a href="#toc">ECHOMAIL</a></h3>

ECHOmail is a method of conferencing or sharing a message base between two
or more systems. D'Bridge features internal ECHOmail processing, eliminating
the need for external utilities.

<h3><a href="#toc">EDITOR</a></h3>

An EDITOR is any program which allows you to read, enter, respond to EMAIL
messages. There is an internal message editor provided with D'Bridge. It
may be run by selecting the EDIT/READ EMAIL option from the EDITOR menu or
by typing "DB EDIT" from the DOS prompt.

<h3><a href="#toc">EMAIL</a></h3>

As an abbreviation for "Electronic Mail", EMAIL generally describes any form
of electronic communication. This could include D'Bridge mail, FAX or TELEX
communication.

<h3><a href="#toc">ERROR LEVEL</a></h3>

An ERROR LEVEL is an "exit code" sent by D'Bridge to DOS describing an "exit
condition". D'Bridge uses ERROR LEVELS in EXIT events so that a DOS batch file
can detect what to do. Unless you already understand ERROR LEVELS, you most
likely won't need to use them. For further information, consult your DOS
manual in the section describing BATCH FILES.


<h3><a href="#toc">EVENT</a></h3>

An EVENT is simply something which happens. In D'Bridge, EVENTS are
scheduled by using the SCHEDULE MAINTENANCE screen. Four types of EVENTS
are supported by D'Bridge: MAIL, DOS, EXIT and CLOCKSYNC.

<h3><a href="#toc">EXIT EVENT</a></h3>

An EXIT EVENT is defined by using the SCHEDULE MAINTENANCE screen. When
an EXIT EVENT occurs, D'Bridge will actually terminate completely providing
DOS with a pre-specified ERROR LEVEL. This is almost always used within a
batch file or shell program.

<h3><a href="#toc">EXPORT</a></h3>

In D'Bridge, EXPORT means to save your current configuration in a text file
for inspection or later use by the IMPORT command. All of the parameters in
the setup screens may be written to a standard text file. This is handy for
configuring a remote system and required when upgrading between revisions
of the D'Bridge software.

<h3><a href="#toc">EXTERNAL GATEWAY</a></h3>

In D'Bridge, an EXTERNAL GATEWAY is a program which can be run automatically
to receive incoming mail from other, non-compatible EMAIL systems. For
example, there is a UUCP EMAIL receiver available for the IBM PC which will
allow you to receive mail from UNIX and XENIX systems. A unique feature of
D'Bridge allows it to recognize when non-compatible EMAIL systems are calling
and transfer control to an external EMAIL receiver.


<h3><a href="#toc">FIDONET</a></h3>

FIDONET means two things really: First, it defines the protocol D'Bridge
uses when communicating with other Fidonet-based systems. This protocol is
described in detail in certain documents written and maintained by the FTSC
(Fidonet Technical Standards Committee). Second, it is the name of the largest
Fidonet-based EMAIL network. Both the network and the protocol were created
by Tom Jennings of Fido Software. His initiative and early efforts are what
made the Fidonet network possible.

<h3><a href="#toc">FILE</a></h3>

A FILE is an organized collection of information, usually similar in nature.
When you type "DIR" in DOS, you receive a listing of all the files in the
current directory. (Almost) any of these FILES may be transmitted via EMAIL
to another D'Bridge or Fidonet system.

<h3><a href="#toc">FILE-ATTACH</a></h3>

FILE-ATTACH means to send a file or list of files with an EMAIL message.
This is normally done with the internal message editor. FILE-ATTACH is an
"attribute" associated with a given message. If a message has the FILE-ATTACH
attribute, all files listed in the SUBJECT line will be transmitted with the
message.

<h3><a href="#toc">FILE-REQUEST</a></h3>

FILE-REQUEST is similar to FILE-ATTACH, except it works in reverse. Files
are "requested" from the specified system; when the call is placed, if those
files exist and you have specified the right password, if any, they will be
sent to you immediately. FILE-REQUEST is both a message "attribute" and a
menu option in D'Bridge.


<h3><a href="#toc">FLAGS</a></h3>

The FLAGS are the last part of a nodelist line - free-form text which may
contain additional information about the system. Include the characters "CM"
if you wish to designate a system as CONTINUOUS MAIL (being able to receive
EMAIL 24 hours/day).

                          ie.

                          CM,XX,HST,V32

                          CM   Continuous mail
                          XX   WaZOO-style file and update requests
                          HST  US Robotics Courier HST modem
                          V32  V.32 compatible

<h3><a href="#toc">FORWARD</a></h3>

FORWARDING means to send an EMAIL message which neither originated from nor is
destined for your system. FORWARDING is used in conjunction with ROUTING to
send mail through HOST systems, usually to save phone calls and costs. For
example, if you wish to send a message to a system outside your NET, the
message is normally routed to that city's HOST and will then be FORWARDED
automatically to the destination. This way, if you have several messages to
go to different destinations in one city, only a single phone call needs to
be made.

<h3><a href="#toc">FOSSIL</a></h3>

An acronym for "Fido/Opus/SEAdog Standard Interface Layer," FOSSIL
refers to a communications interface common to many BBS systems.
D'Bridge does not require a FOSSIL driver, nor will it use one if installed.

<h3><a href="#toc">FRONT-END</a></h3>

FRONT-END is a generic term for programs like D'Bridge, FrontDoor and Binkley-
Term when they are used to run a combination BBS/EMAIL system. This simply
means D'Bridge acts as a FRONT-END, answering the phone and transferring con-
trol to a BBS or external EMAIL receiver.


<h3><a href="#toc">FTSC</a></h3>

FTSC stands for Fidonet Technical Standards Committee, a group of
individuals, mostly computer programmers, who maintain the technical
specifications and procedures used to design and maintain network software
for Fidonet.

<h3><a href="#toc">FUNCTION-REQUEST</a></h3>

ZMODEM-based EMAIL systems like D'Bridge, FrontDoor and BinkleyTerm have the
ability to process FUNCTION-REQUESTS, allowing the calling system to have
access to predefined DOS functions or programs. This is a rather advanced
feature and can only be used in conjunction with external programs not inclu-
ded with D'Bridge.

<h3><a href="#toc">HOLD</a></h3>

HOLD means NOT to send mail, but rather to wait until the destination system
calls and picks it up. Normally, D'Bridge will put all mail without CRASH
priority on HOLD 24 hours a day. This way, a system calling to send you mail
can always get any mail waiting for it, saving you a phone call.

<h3><a href="#toc">HOST</a></h3>

Every NET has a HOST; a HOST acts as a consolidation point for inbound mail
coming from outside your NET. A host is designated by having a NODE and POINT
number of zero. By default, all mail sent to systems outside your NET will be
routed to a HOST or a HUB. The exception to this is if you have specified
CRASH priority or have attached or requested a file. Usually, the NET host
acts as the administrator for his NET, maintaining the nodelist and distribu-
ting updates to all his NODES.


<h3><a href="#toc">HUB</a></h3>

A HUB is functionally identical to a HOST; it is usually only used when a NET
is very large or spans more than one local calling area. In D'Bridge, HUB and
HOST ROUTING are treated the same. Messages addressed to a NODE outside your
network are ROUTED through the HUB if one exists.

<h3><a href="#toc">IMMEDIATE</a></h3>

In D'Bridge (and most other Fidonet-based systems), IMMEDIATE refers to a
high-priority message. It is an "attribute" which may be associated with a
message to tell D'Bridge to send the mail immediately, to override any
routing and call the destination system directly. Using the internal message
editor, you can specify any message to have IMMEDIATE priority.

The difference between CRASH and IMMEDIATE is that D'Bridge will process all
of the IMMEDIATE calls before attempting to dial a CRASH or NORMAL priority
call.

<h3><a href="#toc">IMPORT</a></h3>

In D'Bridge, the term IMPORT is used when upgrading between releases of the
software or anytime you wish to transfer or restore an EXPORTED configuration.

<h3><a href="#toc">INBOUND</a></h3>

INBOUND simply means mail arriving at your system from a remote site;
opposite of OUTBOUND.

<h3><a href="#toc">INITIALIZE</a></h3>

In D'Bridge, INITIALIZE is used to describe sending commands to your modem
that INITIALIZE it, setting the correct parameters for operation. Normally,
your MODEM INITIALIZATION STRING tells your modem to answer the phone and
report the connection back to D'Bridge. For specific information on this,
read the section on COMM/MODEM SETUP.


<h3><a href="#toc">INTERNATIONAL</a></h3>

INTERNATIONAL refers to any communications to systems outside your country.
In D'Bridge, this is determined by the first part of a phone number as it
appears in the nodelist. For the U.S., Canada, the Bahamas and several other
neighboring countries sharing a country code of "1", communications is not
considered INTERNATIONAL unless calling Europe or Australia; anytime the
COUNTRY CODE in the nodelist differs from your own, that is an INTERNATIONAL
call and the predefined INTERNATIONAL DIALING PREFIX will be used.

<h3><a href="#toc">KLUDGE</a></h3>

A "kludge" line is a hidden line of text in a NETmail or Echomail message.
Usually starting with ASCII 01 (a "smiley face" character), these kludge
lines usually contain information such as the originating address, routing
details, serial numbers, etc. An example is the MSGID/REPLY kludge, that
allows 3rd-party software to maintain "reply chains" in network messages.

Kludge lines are defined by the Fidonet Technical Standards Committee
or FTSC for short, a group of individuals (mostly computer programmers)
who outline and design the ways that Fidonet software operates. D'Bridge is
comprised of many designs and specifications set forth in the FTSC reference
manuals and proposals.

<h3><a href="#toc">LOCAL</a></h3>

LOCAL refers to any call where D'Bridge simply strips off the COUNTRY CODE
and AREA CODE. It is still possible there is a charge for the call, but in
most cases there isn't (at least not in the U.S.).

<h3><a href="#toc">LOG</a></h3>

D'Bridge keeps a detailed LOG file of everything happening on the system.
It contains chronological information about system activity, errors, etc.


<h3><a href="#toc">MACRO</a></h3>

In the internal message editor, KEYBOARD MACROS are supported. What this
means is that you can program function keys (ALT F1-F10 and CTL F1-F10) to
substitute preprogrammed text of any length while editing messages. This is
handy for signatures and any other text you find yourself constantly typing.
Words, sentences or even paragraphs can be programmed into the MACRO keys.

<h3><a href="#toc">MAIL</a></h3>

MAIL simply refers to messages or files sent or received.

<h3><a href="#toc">MAIL EVENT</a></h3>

A MAIL EVENT is a predefined period of time during which D'Bridge is
allowed to send mail. During this time, all messages will be sent unless
otherwise specified in the ADVANCED ROUTING screen. It is important that
all systems in the network use the same time for MAIL EVENTS. Remember
that if a west-coast system starts a mail event at 1:00, systems on the
east-coast must start the same event at 4:00: the same physical time.

<h3><a href="#toc">MESSAGE</a></h3>

In D'Bridge, a MESSAGE is prepared using the internal editor and contains
text to be sent to another location conveying a thought or idea. Messages are
the basis for more EMAIL systems.

<h3><a href="#toc">MODEM</a></h3>

An acronym for "MOdulator/DEModulator". A modem is the device which allows
computers to communicate by converting electrical impulses to audio tones and
back. Obviously, you have a modem or you would not have purchased D'Bridge,
so we'll assume this will suffice.


<h3><a href="#toc">MSGID KLUDGE</a></h3>

The MSGID/REPLY kludge lines are tiny lines of hidden "text" that get added
to all messages that originate from your system. The MSGID kludge contains
the address of your system as well as a unique serial number. When you use
the internal editor to reply to a message that contains a MSGID kludge,
the REPLY kludge is added, containing the address and serial number
of the original message. Although I never really understood the importance
of kludge lines; I added it as a convenience feature as of version 1.87.

The serial number generated by D'Bridge for the MSGID/REPLY kludge system
is stored in DBRIDGE.MSG, should it need to be examined. It should never
be deleted or modified unless theres a really good reason to do so...

<h3><a href="#toc">NET</a></h3>

Defines the second number in a Fidonet address. NET typically defines a
geographical region or local calling area. In the case of a private network
with few systems, all systems (regardless of location) could use the same
NET number.

<h3><a href="#toc">NETWORK</a></h3>

The term "NETWORK" refers collectively to all the systems listed in your
nodelist. You should be able to send an EMAIL message to anyone in your
network. Sometimes, NETWORK is used in the same way as NET, the second number
in a Fidonet address, but they really mean two different things.

<h3><a href="#toc">NETWORK ADMINISTRATOR</a></h3>

Every NETWORK has an ADMINISTRATOR; without one, anarchy would prevail.
There is a section devoted entirely to the duties and responsibilities resting
with a NETWORK ADMINISTRATOR. If you are such a person, I would strongly
suggest you to read it. Basically, the network administrator responsible for
the overall operation of the network and for keeping the nodelist up-to-date
and accurate.


<h3><a href="#toc">NODE</a></h3>

A NODE is the third number in a Fidonet address; NODE specifies an individual
system. Much like in a telephone book, each NODE has an entry in the NODELIST
listing information such as name, phone number and baud rate.

<h3><a href="#toc">NODELIST</a></h3>

Every network has a NODELIST; maintained by the administrator, the NODELIST
is a text file listing all the systems, their phone numbers, baud rates,
cities and operator names. This list is identical on each system in the
network and is updated whenever a new system is added or an existing one
leaves or has information to change. In the case of the amateur networks,
the NODELIST is updated and distributed weekly, usually every Friday.

<h3><a href="#toc">NORMAL</a></h3>

In D'Bridge (and most other Fidonet-based systems), NORMAL refers to a
low-priority message. It is an "attribute" which may be associated with a
message to tell D'Bridge to send the mail at the lowest possible cost,
usually at 11:00 at night. NORMAL is actually the lack of a HOLD, CRASH or
IMMEDIATE flag on the message(s).

<h3><a href="#toc">NULL MESSAGE</a></h3>

A NULL MESSAGE is a message which contains no text. Often, these messages are
used to send or request a file and are meaningless otherwise. D'Bridge gives
you the option to automatically erase these NULL MESSAGES after they arrive.

<h3><a href="#toc">OFFLINE</a></h3>

In D'Bridge, OFFLINE has two meanings: First, it means the phone is not
being answered, most-likely because you are using your computer for something
else. Second, it means what commands you want to give to the modem when the
system is "down" because you are using the editor or exit the program. Some
systems are configured so that the phone is off-hook when D'Bridge is OFFLINE.


<h3><a href="#toc">ONLINE</a></h3>

The opposite of OFFLINE. ONLINE means D'Bridge is up and ready to accept
commands and/or incoming EMAIL.

OS2

OS/2 Warp is an operating system by IBM.

<h3><a href="#toc">OUTBOUND</a></h3>

The term "OUTBOUND" refers to EMAIL or files ready to be sent to a remote
system. Mail that is on "HOLD" is also called OUTBOUND. In fact, everything
in the QUEUE window is OUTBOUND mail.

<h3><a href="#toc">OUTBOUND GATE</a></h3>

Some NETs have an OUTBOUND GATE or GATEWAY - A system which sends all mail
destined for systems outside your NET. This is often done to save money by
consolidating all the OUTBOUND traffic into one outgoing system (perhaps the
OGATE (OUTBOUND GATEWAY) has a WATS line and is able to make long-distance
calls much cheaper). In any case, OUTBOUND GATEWAYS forward mail for anyone
within their NET.

<h3><a href="#toc">PACKET</a></h3>

When D'Bridge sends EMAIL, it is put into PACKETS consolidating all messages
into one file or PACKET. When D'Bridge connects with a system, it sends one
packet instead of one file for each message. A packet could contain one or
thousands of EMAIL messages.


<h3><a href="#toc">PARITY</a></h3>

PARITY is a term only used in the D'Bridge "terminal mode". It is either
NONE, EVEN or ODD and refers to a bit following the DATA BITS and
coming before the STOP BIT. D'Bridge allows you to configure the PARITY any
of these three ways to facilitate communication with different systems.
Most BULLETIN BOARD SYSTEMS use PARITY "NONE", but you might need to change
it.

<h3><a href="#toc">PASSTHRU</a></h3>

A PASSTHRU ECHOmail area means that the mail is received and forwarded,
but not stored in a Fido or QuickBBS message base. PASSTHRU areas are most
often used by ECHO hubs who don't care to read an ECHO personally.

<h3><a href="#toc">PASSWORD</a></h3>

A PASSWORD is the basis for the D'Bridge security system. If you wish to have
a secure link between two systems, you choose an 8-letter PASSWORD that is
mutually agreeable to both operators. Once these PASSWORDS are in place, it is
impossible to communicate with the other system (using your address) unless
that PASSWORD is specified. This is primarily designed to discourage "hackers"
from infiltrating your network and stealing EMAIL you may have on hold.

<h3><a href="#toc">PATH</a></h3>

PATH normally refers to the name of a DOS directory in which you wish to store
files. A path consists of the drive name (C:) plus the name of a specific
subdirectory. See your DOS manual for further information on directory PATHS.


<h3><a href="#toc">PICKUP</a></h3>

PICKUP means to call another system and receive EMAIL it has on HOLD for you.
Every time D'Bridge connects with another system, it asks it if there is any
mail waiting. If so and you have the proper PASSWORD, if required, you will
receive all your mail immediately after D'Bridge sends the outbound mail.
By default, PICKUP is not a secure way to handle mail; make sure you use a
SESSION PASSWORD if you require security in your network.

<h3><a href="#toc">POINT</a></h3>

A POINT is the fourth part of a Fidonet address. A POINT system is not
listed in the NODELIST. Normally, POINTS are not public access systems, but
personal EMAIL systems used to communicate with the network through their
BOSS NODE. For complete information on POINTS, see the section about
setting-up a point system.

<h3><a href="#toc">POINT LIST</a></h3>

The POINT LIST is just like the nodelist but it specifies a list of POINTS
associated with a given BOSS NODE. Again, this is only applicable for a POINT
system and complete information is available in the section on setting-up a
point system.

<h3><a href="#toc">POLL</a></h3>

POLLING means to call a system to see if there is mail waiting even though
you have nothing to send. For example, if you don't have a permanent phone
number for your system or run a private node or point, you will need to poll
your HOST or BOSS on a periodic basis in order to receive your mail. The
perfect example of someone who needs to poll is a salesman who uses a portable
PC to communicate with the main office.


<h3><a href="#toc">QUEUE</a></h3>

D'Bridge has a QUEUE window which lists all of the outbound packets at any
given time. A QUEUE is simply a list of things to do, or in this case packets
to send.

<h3><a href="#toc">RAW NODELIST</a></h3>

The RAW NODELIST simply refers to the nodelist when it is in the form of a
text file, before it is compiled. D'Bridge only processes RAW NODELISTS and
requires no external pre-processor like many other Fidonet EMAIL systems do.

<h3><a href="#toc">ROUTING</a></h3>

D'Bridge has a great deal of flexibility in the way that it can ROUTE
messages. In simple networks, messages can simply be sent directly from the
sender to the receiver. Actually, this can be done in any network, but in
many cases it is more desirable to use ROUTING because it can save money and
cut the number of phone calls. Used in conjunction with FORWARDING, ROUTING
simply means to send a message somewhere other than the final destination.

For example, if I wish to send a message to someone in Miami, it will be
sent during my nightly mail event to the HOST or HUB in Miami. The message
is then automatically FORWARDED to the final destination. Obviously, with
just one message there is no savings and actually the message will take
longer to get there because it has to be FORWARDED to its destination. But
let's say I want to send messages to three different systems in Miami; this
time, there is a savings because D'Bridge only makes one call instead of
three.

<h3><a href="#toc">RTS</a></h3>

An abbreviation for Request To Send. RTS is the companion signal to Clear
To Send, CTS. This is sometimes referred to as "flow control" and allows the
computer to communicate with the modem at a higher baud rate than the modem
can actually send at.


<h3><a href="#toc">SCAN</a></h3>

When D'Bridge says it is SCANNING for outbound mail, it actually looks at
each message to see if it needs to be sent. As it SCANS, it creates packets
that are added the outbound queue.

<h3><a href="#toc">SCHEDULE</a></h3>

In D'Bridge, the SCHEDULE is a list of pre-programmed events that should be
executed at the specified times. It uses a weekly schedule to determine when
to send mail, execute DOS commands, terminate with an errorlevel and when to
perform an atomic "ClockSync". The SCHEDULE MAINTENANCE screen is used to add,
change and remove events from the schedule. The lower-right window of D'Bridge
always displays the schedule for the current day; this is advanced each night
at midnight.

<h3><a href="#toc">SCRIPT</a></h3>

D'Bridge normally uses your telephone to connect with other EMAIL systems to
transfer EMAIL. Sometimes it is desirable to use other carriers such as
packet-switched networks to communicate. The D'Bridge scripting language
allows you to communicate using other systems such as TELENET'S PC-PURSUIT.
Many system operators in the U.S. subscribe to this low-cost data transmis-
sion service and D'Bridge is able to take full advantage of it by using its
SCRIPTING language.
This is a rather advanced feature, so please read the section about script
files for more information.

<h3><a href="#toc">SEALINK</a></h3>

SEAlink is one of the four file-transfer protocols D'Bridge uses to commu-
nicate with other Fidonet-based EMAIL systems. SEAlink was developed by Thom
Henderson of System Enhancements Associates. It was derived from the XMODEM
protocol but has the clear advantage of eliminating propagation delays (from
satellites) so common in long-distance communications. D'Bridge will use this
protocol when communicating with some EMAIL systems.


<h3><a href="#toc">SECURITY</a></h3>

D'Bridge has a password-based security system to protect EMAIL sessions. By
default, no security is used and anyone with a compatible EMAIL system could
send you mail and request files. The D'Bridge security system allows you many
different options to improve security. See the section called SECURITY/
MISCELLANEOUS SETUP for more information.

<h3><a href="#toc">SESSION</a></h3>

A SESSION or MAIL SESSION simply refers to the period of time when two EMAIL
systems are communicating with each other.

<h3><a href="#toc">SPAWN</a></h3>

SPAWN refers to the method of executing another program while keeping the
calling program in memory. An example of this is DOS EVENTS. All commands
issued in DOS EVENTS are SPAWNED; this means D'Bridge is still in memory and
resumes operation as soon as the SPAWNED task is complete. This method can
only be used if there is enough free memory to load the SPAWNED program after
D'Bridge.

<h3><a href="#toc">STOP BITS</a></h3>

STOP BITS is a parameter only found in the D'Bridge "terminal mode". On an
IBM computer, it may have a value of either 1 or 2. Most systems use 1 stop
bit without exception, but it is left to your control for maximum flexibility.

<h3><a href="#toc">TELINK</a></h3>

TELINK is one of the four file-transfer protocols used by D'Bridge. It is
a batch protocol consisting of XMODEM file-transfers preceded by MODEM7
filename headers. This is the standard protocol defined by the Fidonet
Technical Standards Committee as a "fallback" protocol for Fidonet. D'Bridge
will use this protocol when communicating with some EMAIL systems.


<h3><a href="#toc">TERMINAL</a></h3>

D'Bridge has a "TERMINAL MODE" which turns D'Bridge into a teletype or video
display terminal (VDT). When using TERMINAL MODE, you can connect with other
online services such as bulletin board systems and commercial systems like
CompuServe&lt;TM>.

<h3><a href="#toc">TIMEOUT</a></h3>

A TIMEOUT ERROR is a condition when the remote system fails to respond
within an allotted period of time. The cause of such an error can be hardware
trouble, poor line conditions or a software error. If a TIMEOUT ERROR happens
consistently when calling a certain system, you might want to follow up with
a voice call to the system operator.

<h3><a href="#toc">TRIES</a></h3>

The number of TRIES refers to the number of times D'Bridge dials another
system without getting a connection. During mail events, D'Bridge defaults to
a maximum of 30 TRIES, but you may change this to any number you wish by using
the SCHEDULE MAINTENANCE screen.

<h3><a href="#toc">UN-EVENT</a></h3>

The UN-EVENT refers to the "event" that is running when there is no scheduled
event active. The UN-EVENT configuration (found in SCHEDULE MAINTENANCE)
controls how crashmail is handled and how mail is routed outside other events.

<h3><a href="#toc">UNPACK</a></h3>

When EMAIL arrives from another system, it is in the form of PACKETS. Unless
otherwise specified, D'Bridge will UNPACK these packets into messages when
they arrive.


<h3><a href="#toc">UPLOAD</a></h3>

When using the D'Bridge "terminal mode", there is an UPLOAD option enabling
you to transmit file(s) to a remote computer. You can use the XMODEM, SEAlink
or ZMODEM protocols for this function.

<h3><a href="#toc">WAZOO</a></h3>

An acronym for "WArp Zillion Opus-to-Opus". WaZOO is one of the EMAIL
protocols supported by D'Bridge. WaZOO sessions begin with a YOOHOO packet
exchange, then usually send mail and files with either SEAlink or ZMODEM
protocols, depending on the capabilities of the communicating systems. WaZOO
was designed by Wynn Wagner, III and is the EMAIL protocol used by most of
the Fidonet-compatible mailers currently available: D'Bridge, FrontDoor,
Opus, BinkleyTerm and Intermail.

<h3><a href="#toc">WINDOW</a></h3>

A WINDOW is simply an area on the screen D'Bridge uses to display information
in. When I refer to a window, I simply mean a section of the screen.

<h3><a href="#toc">WINDOWS</a></h3>

MICROSOFT WINDOWS(tm) is an operating system written by Microsoft. Most
new computers today ship with Microsoft Windows already pre-installed.

<h3><a href="#toc">XMAIL</a></h3>

XMAIL is simply a term that means "compressed mail". An XMAIL packet
contains any number of mail packets and may be created using the ARC, ZIP,
PAK, LHA or ZOO formats.


<h3><a href="#toc">XMODEM</a></h3>

XMODEM is one of the most universal communications protocols available.
Most people credit Ward Christianson with coding and documenting the first
XMODEM communications program, but I can't say for sure. XMODEM is the basis
of Fidonet communications for sending the initial mail packet. D'Bridge will
use this protocol when talking to some EMAIL systems.

<h3><a href="#toc">YOOHOO</a></h3>

YOOHOO is the name of the handshaking protocol D'Bridge uses when talking
to other WaZOO-based systems. The YOOHOO/2U2 handshake passes such information
as your address, system and operator name as well as session passwords.
YOOHOO and YOOHOO/2U2 were designed by Wynn Wagner, III.

<h3><a href="#toc">ZMODEM</a></h3>

ZMODEM is the protocol D'Bridge uses when communicating with other "HiTek"
systems. Most WaZOO-based EMAIL systems are capable of ZMODEM file-transfers,
but not all. D'Bridge will automatically select this protocol if the other
system is compatible with it. The advantage ZMODEM has over the other proto-
cols is the ability to dynamically adjust the block size for the line condi-
tions. D'Bridge can send and accept any block size between 64 and 8192 pro-
viding a fairly wide tolerance for poor line conditions. D'Bridge's ZMODEM
also features 32-bit CRCs for high data integrity and the ability to continue
an aborted transfer from the exact point where it left off. Chuck Forsberg is
generally credited for documenting ZMODEM and promoting its popularity.

<h3><a href="#toc">ZONE</a></h3>

A ZONE is the first number in a Fidonet address and generally specifies the
continent where the system is located. Some other networks have started using
a different ZONE to separate them from the Fidonet amateur network.


<h3><a href="#toc">ZONEGATE</a></h3>

When communicating with other ZONES, it is possible to cut your communication
costs by sending your EMAIL through the ZONEGATE. For example, if I wish to
send a message to my friend in Europe, I can tell D'Bridge to route the
message through the ZONEGATE and I can send the message with just an in-
expensive domestic call to the European ZONEGATE. From there, he pays the
bill to  forward the message to the American ZONEGATE in Europe who in turn
forwards it on to its destination. The only drawback to this approach is
that it is fairly slow getting to its final destination and your message
can be read by every system operator along the way. Personally, I am willing
to pay the direct connection charges to ensure that the message arrives
quickly and privately.


<a name="A.00"/><h2><a href="#toc">A.00  ACKNOWLEDGEMENTS</a></h2>

D'Bridge would not be what it is today without the ideas and inventions
of others. I feel they all deserve credit for their work, so I am inclu-
ding this section. I have built on the ideas of many other software de-
velopers and I want to thank them all for their efforts.

<h3><a href="#toc">TOM JENNINGS</a></h3>

Tom is the creator and "mastermind" of the entire Fidonet concept. In
1984, he created a bulletin board system called Fido which had the unique
ability to communicate with other Fidos overnight, sending electronic
mail and files. Starting very simple, Fido grew and the software became
more advanced, adding features such as forwarding and routing. Fido is
still widely used today by many individuals and corporations that have
a need to communicate via EMAIL. Thank you, Tom, for creating a system
and a standard that have spawned the largest public amateur EMAIL network
in the world today. Where would we be without you?

<h3><a href="#toc">JOAQUIM HOMRIGHAUSEN</a></h3>

JoHo and I always traded ideas around and quickly they became a standard
part of both D'Bridge and FrontDoor.  EMSI was the greatest example.  We
worked together and co-designed the Electronic Mail Standard Identification
protocol for WaZoo-based sessions.  Thanks, Joaquim.

<h3><a href="#toc">THOM HENDERSON</a></h3>

Thom has been a major factor in the advancement of the Fidonet standard.
His company, System Enhancements Associates is responsible for developing
the ARC standard, the SEAlink file-transfer protocol and SEAdog, another
commercial EMAIL package. About 5 years ago, I purchased a copy of SEA-
dog 4.0 and used it until I wrote D'Bridge. SEAdog took the Fidonet
standards and extended them, supporting such features as file-request
and crashmail. I wish to thank Thom for all the things he has done to
help Fidonet and the EMAIL community. His SEAlink protocol has saved
many people a LOT of money on their phone bill.


<h3><a href="#toc">RAY GWINN</a></h3>

We wish to greatly thank Ray Gwinn for allowing us to include his
serial I/O library as a part of D'Bridge. Building the SIO library,
Ray worked many years to bring the X00 driver through many hardware
and specification changes.

<h3><a href="#toc">WYNN WAGNER III</a></h3>

Wynn is the creator of Opus, "a computer-based conversation system".
He took all the good ideas in Fidonet and created another EMAIL standard
called WaZOO. D'Bridge uses the WaZOO standard when communicating with
other "HiTek", but non-EMSI systems. I wish to thank Wynn for making
these standards available for all to use and creating documentation clear
enough to make implementation easy.

<h3><a href="#toc">CHUCK FORSBERG</a></h3>

Chuck, with his company, Omen Technology is credited with the develop-
ment of the ZMODEM protocol and making it as popular as it is today.
I used a document he wrote in August, 1986 describing very clearly how
to implement the ZMODEM protocol. Without testing with his program, DSZ,
it would have been very hard (if not impossible) to ensure that our
32-bit CRC logic was working correctly.

<h3><a href="#toc">JEFF RUSH</a></h3>

Jeff was responsible for bringing ECHOmail to the Fidonet community. He
didn't really invent ECHOmail, but set a clear definition in his original
ECHOmail program (designed for use with Fido and SEAdog) which has re-
mained virtually unchanged to date. I think we should all appreciate the
initiative he took in the early days of Fidonet to bring conferencing
ability to our network.

<h3><a href="#toc">GREG DAWSON</a></h3>

Greg designed and wrote a system called AREAFIX which he graciously
allowed us to incorporate into D'Bridge. His AREAFIX system allows
ECHOmail distributors to automate the routine maintenance that was
required when conferences were added and deleted.


ADAM HUDSON and STEVE GABRILOWITZ

Adam originally wrote the QuickBBS software which is in widespread use
today. He has been cooperative in helping D'Bridge be compatible with
his fine BBS program. We thank him for allowing us to use his message
base format within D'Bridge.  Steve took over the project a few years
back and has been most helpful in getting the QuickBBS message-base
locking code in place.

<h3><a href="#toc">ARTHUR GREENBERG</a></h3>

Arthur has been a constant source of ideas and inspiration.  I wish to thank
him for all his testing and coordination effort.  He is listed in both the
Fidonet and DBNET nodelists as D'Bridge HELP/USA.  Thanks again, Arthur!

<h3><a href="#toc">BETA-TEST GROUP</a></h3>

D'Bridge just wouldn't be possible without our Beta-test group which
put the software "through a ringer" before you ever saw it. I wish to
thank them all for their effort and dedication during the development
process...

<h3><a href="#toc">COPYRIGHT / TRADEMARK ACKNOWLEDGMENTS</a></h3>

  - AirMail is a trademark of Joaquim Homrighausen
  - ARC is a trademark of System Enhancement Associates
  - AREAFIX is a trademark of Greg Dawson
  - BinkleyTerm was written by Bob Hartman and Vince Perriello
  - Dutchie was written by Henk Wevers
  - ECHOmail was originally designed by Jeff Rush
  - Fido and Fidonet are trademarks of Tom Jennings (Fido Software)
  - FrontDoor is a trademark of Joaquim Homrighausen
  - InterMail is a trademark of InterZone Software
  - LHA was created by Haruyasu Yoshizaki
  - Opus, WaZOO and YOOHOO are trademarks of Wynn Wagner III
  - PAK was created by NoGate Consulting
  - PC-Pursuit is a servicemark of Telenet
  - QuickBBS is a trademark of Steve Gabrilowitz (Pegasus Software)
  - SEAdog is a trademark of System Enhancements Associates
  - Wildcat is a trademark of Mustang Software
  - XMODEM was originally made popular by Ward Christianson
  - ZIP was created by Phil Katz of PKware
  - ZMODEM was documented by Chuck Forsberg
  - ZOO was developed by Rahul Dhesi

</pre>
