ÛÛ» ÛÛ» ÛÛ» ÛÛ» ÛÛ» ÛÛ» ÛÛ» ÛÛº ÛÛº ÛÛº ÛÛº ÛÛº ÛÛº ÛÛº ÛÛº Û» ÛÛº ÛÛº Û» ÛÛº ÛÛº ÛÛº ÛÛº ÛÛºÛÛÛ»ÛÛº ÛÛºÛÛÛ»ÛÛº ÛÛº ÈÛÛ» ÛÛɼ ÈÛÛÛÉÛÛÛɼ ÈÛÛÛÉÛÛÛɼ ÛÛº ÈÛÛÛÛɼ ÈÍͼÈÍͼ ÈÍͼÈÍͼ Èͼ ÈÍÍͼ BBS Documentation v4.30 Public Beta 1 For the Sysop Copyright (c) 1998-1999, WWIV Software Services, LLC Copyright (c) 1991-1995, Wayne Bell Portions, Copyright (c) 1990, Will Daystrom Comments and suggestions should be sent to WWIV Software Services. Your comments and suggestions are welcome. We hope that you find these documents useful as you use WWIV BBS software. Table of Contents Section Title Page ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ 1 End-User License Agreement (EULA) ............. 1-1 2 Introduction .................................. 2-1 2.1 Registration Procedures ................... 2.2 Upgrade Information ....................... 2.3 Registration Transfers .................... 2.4 Documentation ............................. 2.5 Accessories ............................... 2.6 WWIV Software Services .................... 2.7 Historical Developments ................... 3 Quick Start ................................... 3-1 3.1 Quick BBS Setup ........................... 3.1 Quick Multi-Instance Setup ................ 3.2 Updating a Current Installation ........... 4 Full Installation ............................. 4-1 4.1 Initialization using INIT.EXE ............. 4.1.1 System Information ................. 4.1.2 Paths .............................. 4.1.3 Com Port Settings .................. 4.1.4 Auto-Detect Modem .................. 4.1.5 Modem Selection .................... 4.1.6 External Protocols ................. 4.1.7 External Editors ................... 4.1.8 Security Levels .................... 4.1.9 Auto-Validation Settings ........... 4.1.10 Archiver Configuration ............. 4.1.11 Configuring Networks ............... 4.1.12 Changing Max Subs and Directories .. 4.1.13 Languages Configuration ............ 4.1.14 Registration Entry ................. 4.1.15 WWIV.INI ........................... 4.2 Directories and Standard Files ............ 4.3 Menu System Setup ......................... 4.4 Multi-Instance Setup ...................... 5 Operating the BBS ............................. 5-1 5.1 Starting the BBS .......................... 5.1.1 Startup Batch File .................. 5.1.2 Command Line Arguments .............. 5.2 Waiting for Caller (WFC) Screen .......... 5.3 Logging On ............................... 5.4 User Online Keys ......................... 5.5 Top Screen Information ................... 5.6 Message System ........................... 5.7 Email System ............................. 5.8 Transfer System .......................... 5.9 Chains (Door) Setup ...................... 5.10 General Files (GFILES) Setup ............. 5.11 Menu System .............................. 5.12 Events Management ........................ 5.13 Instance Management ...................... 5.14 Chatroom Setup ........................... 6 Modem Information and Setup ................... 6-1 7 For New Sysops ................................ 7-1 8 WWIV on the Internet Telnet and PPP ........... 8-1 ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ Appendicies A References .................................... A-1 B Forms ......................................... B-1 C Technical Support and Resources ............... C-1 D Frequently Asked Questions (FAQ) .............. D-1 E Common Protocol Settings ...................... E-1 F Source Code ................................... F-1 G Credits and Thanks ............................ G-1 H Closing Comments .............................. H-1 I Index ......................................... I-1 J WWIV Software Services Operational Policy...... J-1 ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ ****************************************************** THIS IS A FINAL DOCUMENT AND IS COMPLETE ****************************************************** 1. END-USER LICENSE AGREEMENT FOR WWIV SOFTWARE WWIV v4.30 is distributed as SHAREWARE. Definition of SHAREWARE: Shareware is a software distribution method that allows the end user to install, use and conduct a thorough evaluation of the software for a specified period of time to determine if the software meets the needs of the user and its fitness for continued use. 1.1 GENERAL. READ CAREFULLY: This End-User License Agreement (EULA) is a binding legal agreement between you and WWIV Software Services, LLC (WSS) and applies to WWIV v4.30 which includes all software and documentation contained in the distribution archives as provided by WSS (SOFTWARE). WSS prosecutes violators of this license agreement to the fullest extent of both federal and state civil and criminal laws and statutes. 1.2 SOFTWARE LICENSE. IF YOU DO NOT AGREE TO THE TERMS AND CONDITIONS OF THIS EULA, DO NOT INSTALL OR USE THIS SOFTWARE! YOU ARE BOUND BY, AND INDICATE YOUR EXPLICIT ACCEPTANCE OF, THE TERMS AND CONDITIONS OF THIS AGREEMENT UPON FIRST EXECUTION OF INIT.EXE FILE. THIS SOFTWARE IS PROTECTED BY US COPYRIGHT LAWS AND INTERNATIONAL COPYRIGHT TREATIES, AS WELL AS INTELLECTUAL PROPERTY LAWS AND TREATIES. THIS SOFTWARE IS LICENSED, NOT SOLD. a. General License Grant. WSS grants to you a personal, non exclusive license to install one operational copy of the SOFTWARE. This installation is for the sole purposes of evaluating the capabilities and features of the SOFTWARE for a trial period not to exceed sixty (60) days. b. Termination of License. Your license to use the SOFTWARE terminates on the sixtieth day following the date of first installation of the SOFTWARE unless sooner registered. Upon such termination, you must remove all operational copies of the SOFTWARE you installed and discontinue all use of the SOFTWARE. c. Documentation. This EULA grants you, as an individual, a personal, nonexclusive license to make, use, and make available for electronic download, an unlimited number of copies of the documentation included in the distribution archive provided such copies are not modified in any way and contain the original copyright information. d. Storage and Electronic Transfer of Distribution Archives. You may store and make available for electronic download, in unmodified form, a copy of the WWIV v4.30 archive as distributed by WSS containing the original PKZip(r) Authenticity Verification codes. e. De-compilation and Reverse Engineering. You agree not to make any attempts to de-compile, reverse engineer, or disassemble the executable portions of the SOFTWARE to avoid the requirement to register, modify copyright displays, or the operational aspects of the SOFTWARE. 1-1 1.3 LIMITED WARRANTY. a. WSS warrants that the SOFTWARE will perform as described in the included documentation for a period of sixty (60) days from the date of first installation. Any technical support provided by WSS shall be as described in the included documentation provided to you in the distribution archive. WSS will make reasonable efforts to solve any problem not covered in the included documentation. To the maximum extent allowed by applicable law, implied warranties on the SOFTWARE, if any, are limited to sixty (60) days. b. No other warranties are expressed or implied. To the maximum extent allowed by applicable law, WSS disclaims all other warranties and conditions, either express or implied, including but not limited to, implied warranties, merchantability and/or fitness for a particular purpose, with regard to the SOFTWARE and the provision of or failure to provide support. This limited warranty gives you specific legal rights. You may have other rights, which vary from jurisdiction to jurisdiction. 1.4 CUSTOMER REMEDIES. Your exclusive remedy shall be to notify WSS of a suspected failure to meet the specifications of the LIMITED WARANTY. WSS's entire liability will be replacement of the SOFTWARE with an updated version if available. 1-2 ****************************************************** THIS IS A WORKING DOCUMENT AND IS NOT COMPLETE ****************************************************** 2. Introduction. - Wayne Bell originally wrote WWIV BBS software and developed it until 1997. In 1998, WWIV was purchased by WWIV Software Services, LLC (WSS) and is now supported, developed and distributed by WSS and authorized Source Distribution Sites (SDS). It is the BBS system of choice for thousands of sysops world-wide who appreciate having a rock-solid BBS system to rely upon and who like the fact that it is dynamic and evolving software. WWIV is available in two basic forms. One version is shareware, which permits the user to use a fully functional copy of WWIV for a trial period of 60 days. If the user likes the software, he must register or terminate its use within the 60-day trial. The other version is the registered version which includes access to the source code and license to modify the BBS to suit user needs within the limits of the Source Code EULA (App. ???) This is a feature not found in any other BBS and is what makes WWIV so unique. Beginning with v4.23 it has been possible to "upgrade" the capacity of the BBS to handle more than two "instances." Multi-instance refers to the ability of the software to have several instances in use simultaneously using the same BBS.EXE and accessing the same data files. This multi-instance ability permits systems to be both multi-node and multi-line. The software offers many features commonly found in BBS software selling for many times as much. It also retains the ability to be easy for a sysop to install and operate. Thus the combined features of versatility, power, and ease of use make WWIV one of the most prominent, dynamic, and fastest-growing BBS programs available. 2.1 Registration Procedures - As stated in the EULA, when registering, the user is purchasing a license to use WWIV BBS software and to use the network software indefinitely. WSS retains ownership of the software itself. Also included with registration is the (separately licensed) source code to the BBS and selected support- ing programs. Registration entitles the user to free upgrades to all releases under the major revision registered. For example, if a user registered version 4.10, s/he is entitled to free upgrades to all 4.xx releases. Upgrade fees for major revisions may be charged and if applicable, will be published well in advance of major releases. There are three methods of registration are available: a. Online Registration: $90.00 (US) for the DOS platform of the BBS Software. Pricing for other platforms will be published as they are released. ///////////////////////////////////////////////////////// Online registration WILL BE available at http://wss.wwiv.com/register.htm. ///////////////////////////////////////////////////////// Registration numbers and passcodes are issued at the time of purchase. b. Normal Mail-In Registration: $80.00 (US) for the DOS platform of the BBS Software. Pricing for other platforms will be published as they are released. c. Registration Payment Plan: WSS offers a payment plan for the purchase of DOS platform BBS registrations. The payment plan consists of three payments of $20.00 (US), with a final payment of $30.00 (US). Each payment extends the users trial period by sixty days. ALL PAYMENTS ARE NON REFUNDABLE. If a user fails to make scheduled payments on time or to complete the payment plan within 240 days (8 months), the account will be in default, the payment plan will be terminated and no refund will be issued. The registration number and passcode are not issued nor is the user registered until all payments have been made. WSS will notify network administrators of payments received and extensions of the trial period at the request of the user. 2-1 WSS processes Mail-In registrations and accessory product orders once a week, normally on Saturdays. Disk mailers with the products ordered, registration papers, and letters are normally mailed the following Monday. Thus, if you send in an order, allow a few days for the post office to do its work and then assess the schedule above to determine when you should get a response. If you have not gotten a response by one week after that date, please contact us and ask about the status of your order. When inquiring about the status of an order, please give your real name and address at the time of registration as our files are indexed and verified using this information. 2.2 Upgrade Information - The unregistered shareware version allows the user to run a single instance of the BBS software and registered versions allow two instances. At the time of registration or at a later date, upgrades may be purchased to allow the operation of more instances. The upgrade order form is in App. ??? and a text version is in the distribution archive. Upgrade pricing is as follows: ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÒÄÄÄÄÄÄÂÄÄÄÄÄÄÂÄÄÄÄÄÄÂÄÄÄÄÄÄÂÄÄÄÄÄÄ¿ ³ Upgrade From º 1/2 ³ 4 ³ 8 ³ 16 ³ 32 ³ ÆÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÎÍÍÍÍÍÍØÍÍÍÍÍÍØÍÍÍÍÍÍØÍÍÍÍÍÍØÍÍÍÍÍ͵ ³ Upgrade to 4 º $20 ³ ³ ³ ³ ³ ³ Upgrade to 8 º $45 ³ $25 ³ ³ ³ ³ ³ Upgrade to 16 º $80 ³ $60 ³ $35 ³ ³ ³ ³ Upgrade to 32 º $120 ³ $100 ³ $75 ³ $45 ³ ³ ³ Unlimited º $220 ³ $200 ³ $175 ³ $145 ³ $100 ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÐÄÄÄÄÄÄÁÄÄÄÄÄÄÁÄÄÄÄÄÄÁÄÄÄÄÄÄÁÄÄÄÄÄÄÙ 2.3 Registration Transfers - Some registered users may, at some point, decide to terminate their use of WWIV and desire to transfer their registration to someone else. There is a specific process to be followed to legally transfer the registration number. REGISTRATIONS MAY ONLY BE TRANSFERRED BY WWIV Software Services. Transfer requests must include Old Owner and New Owner Transfer forms; a new registration form completed by the new owner and a check or money order for $25.00 (US). It is up to the parties involved as to who pays the transfer fee. Any sales price beyond the transfer fee are the concern of the parties involved and are not the responsibility or concern of WSS. The necessary forms for transfers are contained in App. ??? Transfers will not be processed until all completed forms and fees are received. All entitlements to source code and SDS Access for the Old Owner are terminated upon the proper execution of the transfer. 2-2 2.4 Documentation - The documentation for WWIV is available in several categories and formats. All are available on ftp.wwiv.com/wwiv/docs and will be included with the CDROM distribution of WWIV when available. It is separated into the following functional areas by format: 430SYSTX.ZIP- v4.30 Sysop Docs in ASCII text 430SYSAR.ZIP- v4.30 Sysop Docs in Adobe Acrobat Reader format 430SYSMS.ZIP- v4.30 Sysop Docs in MS-Word format 430SYSHT.ZIP- v4.30 Sysop Docs in HTML format 430USRTX.ZIP- v4.30 User Docs in ASCII text 430USRAR.ZIP- v4.30 User Docs in Adobe Acrobat Reader format 430USRMS.ZIP- v4.30 User Docs in MS-Word format 430USRHT.ZIP- v4.30 User Docs in HTML format 2.6 Accessories - At present, WSS develops and distributes the following add-on accessories: NET37 (Proprietary Networking Package) COST: Free with WWIV v4.30 registration $25 (US) for stand-alone use DISTRIBUTION: Pre-compiled only. DESCRIPTION: Proprietary networking software for WWIV-based networks. Provides password secured two-way transmission of email, messages, and files. Dean Nash, Lead Programmer NetUp (Network Updater) COST: $100 DISTRIBUTION: Restricted DESCRIPTION: NetUp sends and receives RSA encrypted data file updates to all systems in the network and designated network officials. Operates only on the network for which it is purchased only. Dean Nash, Lead Programmer. NGTrans (Internet Newsgroup Import / Export) COST: $50.00 1YR LEASE: $15.00 DISTRIBUTION: Purchase or Lease, pre-compiled only DESCRIPTION: NGTrans is an Internet newsgroup import / export utility. Written in C, NGTrans was originally developed by Wayne Bell. Chuck Bensinger, Lead Programmer. WWIVedit (Full-Screen Editor for WWIV) COST: $20.00 DISTRIBUTION: Shareware, pre-compiled only DESCRIPTION: WWIVedit is a full-featured full-screen editor for WWIV. It is written in PASCAL and was originally developed by Adam Caldwell. WWIVedit is now owned, developed, and distributed by WSS. Authur Johnston, Lead Programmer. (All previous registrations honored) //////////////// NOT CURRENTLY AVAILABLE//////////////////// // WWIVchat (WWIV ChatRoom) // COST: $25.00 // DISTRIBUTION: Shareware, pre-compiled only // DESCRIPTION: WWIVchat is a full-featured chat room for WWIV. // Fully configurable with CB style chat or windowed // rooms. Specificly designed for multi-node systems. // Original author: Joe Barbara, // Dean Nash, Lead Programmer. 2-3 2.6 WWIV Software Services, LLC - In 1998, WWIV Software Services, LLC was formed as a corporate entity to continue development, support and distribution of WWIV and associated software. We established a set of core beliefs upon which we conduct business: The sole reason for our existence is the registered user. An open, responsive line of communication with users is essential. Registered sysops deserve fast, efficient service. Trial users deserve the highest level of support during their trial period. Development requires end user input; listen to it. Our mission to support registered users never ends. You can reach WWIV Software Services, LLC via the following methods: * Send E-mail to 1@50 on most major WWIV-based networks. * Send E-mail to wss@wwiv.com via the Internet * Point your web browser to http://wss.wwiv.com * Call "The Mountain Empire BBS" Home of WWIV at (423) 477-4015 * Send regular US Mail to: WWIV Software Services, LLC P.O. Box 4468 Johnson City, Tennessee 37602 2.8 Historical Data - WWIV was originally written by Wayne Bell. Wayne began work on WWIV when he was a teenager. It was first written in BASIC on a TRS-80. Wayne soon recognized the limitations of the BASIC language for BBS operations and he re-wrote the program in PASCAL. At that time, the BBS program could be registered by donations of $25. The last PASCAL version was v3.21d. Many modern day PASCAL BBS systems are based wholly or in part upon this early version of WWIV. All v4.xx releases of WWIV have been written in C. With this language, WWIV has developed into a multi-featured BBS system supporting one of the most trouble-free hobbyist networks in the world. WWIVnet, the network founded by Wayne, began as a local based network in Los Angeles, California with 25 charter members. In the early 1990's, the network grew to over 1,500 members located around the world. Because many sysops wanted to run their own networks for various reasons, Wayne added a feature which allowed the BBS system to participate in multiple WWIV-based networks and developed the networking software to support such multiple network usage. At the peak, there were some 100 WWIV- based networks offering a range of topics and supporting a multitude of various interests. In January of 1998, Dean Nash purchased WWIV and WWIV Software Services from Wayne Bell. WSS was reformed as a Tennessee Limited Liability Company with a full corporate posture. Craig Dooley was appointed Support Coordinator and supervises the Support Board System and Source Distribution Sites. The documentation for WWIV has also developed overtime. It began as a short 3-page document written by Wayne. Later, with v4.10, William Daystrom wrote a complete set of documentation for use with WWIV. Beginning with v4.20, Filo added additional comments to some of the documentation files written by Will and completely rewrote others. The documentation was again completely rewritten by Filo for v4.23 and updated for the v4.24a release. With the release of v4.30, the documentation was updated to reflect all code changes and was converted to several different formats for your convenience. 2-4 ****************************************************** THIS IS A WORKING DOCUMENT AND IS NOT COMPLETE ****************************************************** 3. Quick Start: 3.1 Setting up WWIV for the first time is very simple and should take only a matter of minutes. (NOTE: In order for INIT to function properly and install all files, PKUNZIP.EXE must be in the default directory or somewhere in your PATH.) The first thing to do is to create a directory for the BBS. This should be a directory created off of the root directory of any drive. To create such a directory, you can use the DOS MD(make directory) command. Most people name their main bbs directory as either WWIV or BBS. Step 1: Make the BBS Directory cd\ (change directory) slash gets you to the root directory of the drive. md wwiv creates the WWIV directory. Step 2: Unzip the Archive. The next step is to unzip the bbs files into the WWIV directory that you just created. Assuming that your WWIVxxx.ZIP file is on drive "A", the appropriate steps would be cd\WWIV (change directory) to WWIV pkunzip a:\wwiv4xx.zip this will unzip the archive into the current directory (ie the WWIV directory) You must have PkZip (tm) somewhere in your path in order to use the PkZip commands. All files distributed by WSS are compressed using PKzip and contain PKware's Authenticity Verification. If you do not see a -AV by each file as they are decompressed, or the lines: Authenticity Verified: WWIV Software Services ???????? the archive is not authentic or has been modified in some way. DO NOT USE THESE FILES! Obtain a fresh archive from ftp.wwiv.com/wss or an authorized Support Board. Files included: You should check the FILES.LST contained with the archive to determine the complete files list shipped with the current version. If any files are missing, your BBS may not run properly or perhaps not run at all. To view the FILES.LST, you can use the DOS type command: type files.lst Step 3: Run the initialization routine. If all files are present, your next step is to run the INSTALL.BAT file. The batch file will type out a couple of messages and then run the INIT program. The first screen you will see is: [ insert INIT screen shot ] You should answer Y. INIT will then proceed to install the necessary files and directories for WWIV to run. You should note that all directories will be made as sub-directories of the current working directory, so be SURE that your current directory is the one you want to use as your main WWIV directory, when you first run INIT. 3-1 INIT.EXE will automatically create some directories for you on the hard drive and put certain files in some of these directories. Although each version of WWIV may have slightly different files, you should expect to see something like this as the directory tree that is created: X:\WWIV | |-\ATTACH | |-\DATA | |------\REGIONS | |-----\ZIP-CITY | |-\DLOADS | |------\SYSOP | |------\MISC | |-\GFILES | |------\MENUS | |------\WWIV |-\MSGS |-\TEMP |-\TEMP2 A number of files will be placed in DATA when you finish the INIT program, and a number of *.msg files will be created in or moved to the GFILES directory. These files may be edited to suit your preferences. Editing those files is discussed later in the documentation(App. ???). Step 4: Configure the modem. The first time that you run INIT, the program will attempt to detect your modem type and configure it for use with the BBS. If the modem type that is selected does not work well, you can select the SELECT MODEM TYPE from the menu and choose the one that most closely represents your own modem. More details about modem selection and modem use is in the section of the documentation dealing with modems. (App. ???) Step 5: Configure the system. After your modem has been configured there are certain items of information requested by INIT that you will definitely want to fill in immediately; other items may be left at the default values until you are more familiar with WWIV. You will be told that your system password has defaulted to SYSOP. The system password is a password that should only be known by the primary system operator. The system password is required whenever you see the "SY:" prompt. You will need to enter the system password when you run INIT, or run more sensitive sysop functions from the BBS. After you are told what the system password is, you will be given the "SY:" prompt, and you will need to enter the system password, SYSOP. After correctly entering the system password, you will be in the Initialization/Configuration program. You will presented with menu options that are described later in order. If you don't fully understand some of the options, just leave them as they are, and their use will probably become clear after playing with the system a bit, or reading the WWIV sysop manual. For a fast setup, change the following items in Option 1 to fit your system: System PW (Should be changed IMMEDIATELY) System Name (the name you want for your BBS) Sysop Name (what you want to be called on the BBS) The rest of the settings can be altered later after you learn more about how WWIV operates. Step 6: You must now edit create a batch file with which to run the BBS. WWIVBAT.SAM is an example which contains several command lines for FOSSIL Drivers and the proper sequence for loading the BBS. It must be renamed with an extention of .BAT to function. You must install a FOSSIL driver (i.e. X00, ADF, WinFossil) for v4.30 to work properly. More information on FOSSIL Dirvers is contained in App. ???. Step 7: Establishing your user account. You must now load the BBS using the batch file you just created and log on as NEW to establish your user account. Once the Waiting for Caller (WFC) screen comes up, hit the space bar. You will be presenting with the Logon? prompt. Hit Y. Answer the following questions as they are posed to you. When you have finished logging on, you should hit the F1 key to edit your user account while online. Since you want all powers and features, enter 255 as your SL and DSL. For ARS and DARS, enter the letters A through P or just hold the space bar down. If restrictions are shown remove them by pressing the letter of the restriction. For exemptions, enter 31. When you exit the online user edit function, you should see your time increase dramatically. You are now a sysop with an operating BBS. Have a friend call from his computer to test it out. Summary: There is much more to learn, but you are better off learning through experimenting with the BBS reading further. Thoroughly reading the documentation is recommended within the first 60 days of operation to ensure you can make an informed choice as to whether you wish to continue using WWIV as your BBS software. 3.2 Multi-Instance Quick Start: Beginning with v4.23 it is possible to run more than one instance of WWIV. This may be done in situations where you are using multitasking software and/or a LAN. This permits more than one user to be using an "instance" of the BBS at the same time. In order to utilize more than one instance, you must do the following for EACH instance (other than the first). Step 1: Run INIT.EXE for the instance. Run INIT using the following command: INIT ,2 which enables you to create the "second instance". If the second instance is only for local keyboard use (ie no modem attached), there are no changes required in INIT. INIT will automaticlly create the subdirectory TEMP2 off the main BBS directory and set that as the instance temporary and batch direcotry. You may wish to check to ensure the com port for the instance is set to 0 for local instances under option 3. If the second instance is attached to a modem, then it will be necessary to define the COM port for that modem and select a modem type for it. Step 2: Configure instance batch file For a local logon, you need a batchfile that can be used to logon to the second instance. This will be invoked by your multi- tasking software in a multi-tasking environment or may be used over a LAN. The batchfile should look something like this: REM --- BBS Batch file for instance 2 @echo off REM --- Goto BBS drive and directory c: cd\WWIV REM --- Set the instance environment variable SET WWIV_INSTANCE=2 REM --- Run the BBS: REM --- -m = ignore modem REM --- -i2 = designates instance to run on bbs -m -i2 If the second instance is attached to a modem and you wish to use the modem on that instance, you should make a copy of WWIVBAT.SAM and edit the file as described previously for this instance. The -m parameter used above is only for local logons. The i2 is necessary to tell the BBS that it is instance 2 that is being run. You will need to install SHARE.EXE or be using some form of "share" via your network software if you are on a LAN in order to have multi-instance capability. If you are using Windows 95/8 or OS/2 as your multi-tasking software you will NOT need share. Additional information for multi-tasking may be found in App. ???. 3.3 Updating a Current Installation. If you are upgrading from a previous version of WWIV, the process has been greatly simplified for you using an included batch file named UPGRADE.ME. You may be required to edit the file if you have a non-standard setup. It is highly recommended that you make a backup of your current setup since nothing is infallible. We have tested the upgrade process, however, it is possible that individual configurations could fail. The batch file renames WWIV.INI to WWIVINI.OLD and MODEMS.MDM to MDMSMDM.OLD as you may require entries contained in those files. As the final step in the process, INIT is run to upgrade and convert some data files to the current format. You may choose to print the file out and then enter the commands manually. The file is well commented so this should be a rather simple task. ****************************************************** THIS IS A WORKING DOCUMENT AND IS NOT COMPLETE ****************************************************** 4 FULL INSTALLATION 4.1 Initialization using INIT.EXE. Once INIT is run, and after you have correctly entered the system password, you will be presented with a menu listing fifteen options as shown here: [insert INIT screen shot ] This section describes each of above options and how to edit and modify the configuration of your BBS. 4.1.1 System Information 4.1.1a System password. The system password defaults to SYSOP, but you should be sure to change it to something else, hopefully something that other people will have a difficult time guessing. Selecting your own personalized system password prevents other people from gaining unauthorized access to your BBS. When you type the password it will show on screen as XXXXX. Note that with the release of v4.24, an added security measure has been added that allows you to enter a system password on the command line when you start up your bbs. See the setup section for details. 4.1.1b System name. This should be set to the name of your BBS, but if it isn't set correctly, nothing bad will happen. You should give considerable thought to selecting a name for your BBS. To avoid duplication of other names that might be in use on other BBSes, you are encouraged to check the network listings for the various WWIV based systems and perhaps FidoNet systems as well. 4.1.1c System phone. This should be set to the phone number of your BBS. This isn't critical information UNLESS your board is a member of a WWIV network. 4.1.1d Closed System. If your system will not be allowing users to dial up and establish accounts on your system, set this to Yes. If someone does dial up a closed system, they will be presented with a short message telling them it is a closed system and does not accept new users. 4.1.1e Newuser PW. This is the password users will have to enter in order to log on as new users. If there is no newuser password, anyone may log on as a new user. This should only be used if you wish to operate a "private" system where you only allow people you know to log on. 4.1.1f Newuser restrict. This sets the restrictions that all new users are given. This should probably be left as-is until you fully understand what the restrictions are used for. See "Restrictions" for more details. The default restriction of M means that any messages that the user posts, will not be seen by anyone else until you have validated the messages. 4.1.1g Newuser SL. This sets the security level that all new users are given. The default is 10. This should also be left alone until you understand what the different security levels do, and even then, most sysops will probably want to leave this set to 10. 4.1.1h Newuser DSL. This sets the download security level that all new users are given. The default is zero. New users are severely limited in what they can do on the BBS until you have 'validated' them which usually involves an increase in their SL and DSL as well as possibly the assignment of some Access Restrictions (AR's) and Download Access Restrictions (DAR's). 4.1.1i Newuser gold. WWIV keeps track of an amount of "gold" for use in online games, if needed. This sets the default amount new users are given. The regular distribution version of WWIV does not use gold for anything. If you have registered your BBS and obtained the source code, modifications are available which can allow you to use gold, for example, to regulate downloads or game use by requiring that the caller "earn" a certain amount of gold by posting. 4.1.1j Sysop name. At a few points in the BBS, the system will need to print out the name of the system operator. This is where you can set what that name will be. You may use your real name, but many sysops use "handles" or aliases instead. This is totally up to you. 4.1.1k Sysop low time. The sysop low time and sysop high time set the time limits that the sysop is available to be chatted with. If, for example, you don't want people to be able to request a chat between 11pm and 7am, then your chat hours would be 7am to 11pm. The low time (when chat hours begin) would then be 7am, and the high time (when chat hours end) would be 11pm. You enter the time in the standard 24-hour format, where 7am is 07:00 and 11pm is 23:00. Normally, the scroll lock key determines when the sysop is available for chat. If sysop hours are defined, the system ignores the status of scroll lock during the hours the sysop is supposed to be unavailable. In other words, if you followed the above example and chose available hours to be from 7am to 11pm, callers will not be able to request chats with you from 11pm to 7am, regardless of the scroll lock setting. During the sysop hours (7am to 11pm), scroll lock IS monitored, and will determine whether or not the sysop is available for chat. If the scroll lock is on, callers will be told you are available, and if they request a chat, a chat alarm will be sounded (unless you have turned the beep off. (See page ??? for details). 4.1.1l Up/Download ratio. Many sysops want to have up/download ratio requirements. This allows you to set them. A caller's ratio is defined to be the number of kilobytes (k) (1024 bytes) of files uploaded divided by the number of k of files downloaded. So, if you want a caller to be able to download 5k for every 1k uploaded, the required ratio would then be 1/5=0.2, so you would set the ratio required to be 0.200. This way, when a caller has violated the ratio (downloaded over five times what he/she uploaded), the caller would not be allowed to download again until the caller uploaded enough data to clear the ratio. 4.1.1m Post/Call ratio. Similar to the Up/Download ratio, this restricts users from downloading if they do not meet the minimum ratio established. 4.1.1n Max waiting. Each caller may have a number of pieces of mail waiting. This allows you to set the maximum number of pieces of mail a caller can have waiting. NOTE: The sysop (SL=255) can have 5 times this number of mail waiting. So, if, for normal callers, 20 is the maximum, then 100 would be the maximum for the sysop. If the sysop has more than 254 pieces of email waiting, only the first 254 will show up at the mail prompt, but the rest will not be deleted. After the sysop reads some email, the software will make more of the waiting email available, but will still only show the first 254 pieces at the mail prompt. 4.1.1o Max users. The BBS requires you set the maximum number of users that can be on the system. This defaults to 500, but you may increase or decrease it. The absolute maximum is 32,767, but 2,000 is probably about the limit for performance reasons (ie, the system slows down the more users you have). 4.1.1p Caller number. If you have converted to WWIV v4 from another BBS (possibly an earlier version of WWIV), you may set the current caller number with this option. This counter is increased by one each time the system receives a non-network call unless the remote caller is the sysop. 4.1.1q Days Active. Again, if you converted from another BBS, you can set the number of days your BBS has been active here. 2.3.3 Option 3. Paths (messages, gfiles, data, etc) 4.1.2 Paths. If you have more than one hard disk, you may wish to split up the BBS files among your hard disks, in order to better use the space. Using this option, you may change the directories that the BBS looks to for certain things. Please note that changing any of the options here will only change where the BBS looks for the data; IT WILL NOT ACTUALLY MOVE ANY FILES OR DIRECTORIES. The following rules should be observed when assigning or changing directories: 1. Never use the root directory of any drive to store BBS files; the root directory can only hold a fixed number of files, while any sub-directories may hold an unlimited number of files in them. 2. Always have a backslash on the end of the path/directory name. The software will normally add this backslash for you. 3. The directory may be specified relative to the main BBS directory, or as a full pathname. In other words, "msgs\" is recognized as a sub-directory of the main BBS dir. In most instances, however, you won't need to change the default directories. If you choose to have directories located on another drive, remember to include a drive letter in the pathname. 4.1.2a Messages Directory. Information regarding all e-mail and posts is stored here. 4.1.2b GFILES Directory. The Directory where the BBS text files are stored. These files can be read by users while they are on line. If you have any GFILE sections (described later), the BBS will create sub-directories of the GFILES directory, ie "gfiles\section1\". See[????] for information on G-Files. 4.1.2c Data Directory. Data files used by the BBS are stored here. 4.1.2d Dloads Directory. This directory is used to set the default directory for new file sections. 4.1.2e Temp Directory. This area is used to temporarily store files for the BBS. Because this area is "cleared" each time that a user logs off, you should not store anything in this directory. In a multi-instance setup you will need a separate temporary directory for each instance that you have. The INIT program will create a temporary directory for each instance the first time it is run for that instance. The default directory name is TEMP<inst num>. You may change this, but remember to create the directory as INIT will not automatically do this for you. Please note also that any files found in the temporary directory when the BBS is run will be DELETED. If you point the temporary directory to your root directory, or the BBS directory, ALL THE FILES IN THAT DIRECTORY WILL BE ERASED. Therefore, have the temporary directory be one that doesn't contain any files you care about. 4.1.2f Batch Directory. This directory is used to temporarily store files that are batch uploaded (defaults to the defined Temporary directory) Make sure this directory has adequate disk space for files being batch uploaded; at least 5 megs recommended). After batch uploads are completed, the BBS will automatically move the files into the appropriate drive and directory and delete the original files. You may freely change DLOADS, TEMP and BATCH to whatever you want without hurting anything. HOWEVER, the TEMP and BATCH directories MUST exist. You may choose to have the temporary directory exist as a ramdisk. If the TEMP directory is a sub-directory of a ramdisk, MAKE SURE that the directory is created BEFORE the BBS is run. In other words, run the BBS in a batch file that first creates the temp directory. The others (messages, gfiles, data), however, will have files in them that the BBS needs to find in the appropriate directories. If you change the Messages, GFILES, or DATA directories, you must: 1. Go to DOS and create the new directory. 2. Move all files from the old to the new directory. 3. You should then probably erase the old files and old directory, to ensure you aren't confused by multiple copies later on. 4. You will then need to create subdirectories, of the new directories, with THE SAME NAME, and copy all files from the old subdirectories to the new ones. 4.1.3 Com port info (port, IRQ, base address, etc 4.1.3a Com Port. This sets the com port number that your modem is connected to. If this is set to zero, the result is that the BBS will not use a modem at all (same as /m parameter). Initially, the com port is identified and set with the auto-detect features of the INIT program. 4.1.3b Interrupt. This allows you to manually change the interrupt used by the BBS. You will probably not need to modify this. 4.1.3c Base address. This sets the com base address used by the BBS, and is dependent upon the com port number. It is set automatically when you change the com port option, and you will not normally need to change this setting. 4.1.3d Slow UART. The INIT program automatically detects the presence of the 16550 buffered UART chip for the com port listed. "Y" indicates INIT has detected a 'slower' UART chip and the "Unbuffered UART on COMx" message will be displayed. 4.1.4 Auto-Detect Modem. INIT will scan the available com ports and select the proper configuration for some more prevelent modem types on first run. This may or may not work with your modem. If your modem type is not detected, a generic definition may be selected. If you are not satisfied with the auto detect choice, select a definition manually. 4.1.5 Select modem type. This option allows the manual selection of the modem type to be used by the BBS. Modem definitions are listed in alphabetical order. Use the UP/DOWN arrows, and PgUp/PgDn keys to scroll to the modem type that most closely describes your modem; press enter, and a new MODEM.DAT file will be compiled and placed in the DATA directory. It is this file that contains all modem information the BBS needs. MODEM.DAT is a data type file that cannot be altered or changed. The source for the MODEM.DAT file is a configurable text file called MODEMS.MDM. MODEMS.MDM is a compilation of known, working modem setups that is located in the DATA subdirectory following installation. It is very unlikely that you ever need to change the data stored in MODEM.DAT, but if it ever became necessary(changing a result code or such), the place to do so is in MODEMS.MDM, then re-select that modem type and a new MODEM.DAT file will be compiled. For more information on modems and modem setup, consult Chapter 5. 4.1.6 External Protocols. Using this option, you will be able to insert, delete, and modify external protocols for the BBS to use. A full range of protocol settings are contained in Chapter 8. Note that these settings are for up/downloads on the BBS itself, NOT the network software. 4.1.7 External Editors. A full screen editor (FSED) allows you and your callers (with ANSI) to write email and posts using an editor that is not restricted to the line-by-line approach used by WWIV's built in text editor. Some editors allow the use of function and arrow keys to move the cursor about the screen, in much the same manner as a regular word processor. Full screen editors tend to be awkward for callers to use, however, as while the sysop might use the arrow keys to move the cursor, the caller must almost always use control- key combinations to achieve the same thing. Still, there are some great advantages to using a full screen editor, especially from the sysop's point of view, and so provision is made in WWIV for their use. The full screen editor must do all I/O through DOS calls. WWIVedit, another WSS product, is probably the most preferred FSED and is written specifically for use on WWIV BBS systems. WWIVedit is self installing and requires very little intervention during installation. WWIVedit is available on all Support Boards and on the Internet FTP site. The following are Command lines for other full screen editors. You should read the documentation that is distributed with the editor in depth and adjust these commands to your liking: Description : FSED Filename to run remotely fsed +dosansi.cfg +wordstar.cfg -w%2 -h%3 -l%4 %1 Filename to run locally fsed +console.cfg %1 Description : FEdit 1.1 Filename to run remotely FEDIT %1 %2 %3 %4 Filename to run locally FEDIT %1 %2 %3 %4 %5 4.1.8 Security Levels. For each security level (SL) there is a set of data that determine what a caller with this SL may do. These levels are numbered 0 through 255. You may change the default settings to suit your particular situation but most find the default setup satisfactory. If you should desire to change the settings, use {,},[,], to scan through until you find an SL you want to change. Then, hit enter to edit the data. You can then alter: 4.1.8a Security level. Changing this field moves you to the entered security level. The other data on the screen is appropriately changed. Any data changed for the previous SL is saved. 4.1.8b Time per day. This gives the time, in minutes, that a caller with that SL is able to be logged on the system per day, regardless of the number of calls. 4.1.8c Time per logon. This gives the time, in minutes, that a caller with that SL is able to be logged on to the system per call. Normally, the time per day is 2.5 times the time per logon. Normally, the time allowed on is limited by the time per logon, but after the second call that day, the time per day may cut down the total amount of time on. Of course, the time allowed on may be affected by uploads, chat time, and extra time allowed by the sysop. 4.1.8d Messages read. This sets the number of messages that can be read (per call) by a caller with that SL. 4.1.8e Emails per day. This sets the maximum number of pieces of mail that a caller with that SL can send, per day. NOTE: Email excludes feedback. All callers are allowed to send up to five pieces of feedback per day. 4.1.8f Posts per day. This sets the maximum number of posts a caller with that SL can post per day. 4.1.8g Post anony. If set, this means that a caller can post a message anonymously on any message base. 4.1.8h Email anony. If set, this means that a caller can send anonymous e-mail on the system. No network emails may be sent anonymously. 4.1.8i Read anony posts. If set, a caller with this SL can read the names on anonymous posts. 4.1.8j Read anony email. If set, a caller with this SL can read the names on anonymous e-mail. 4.1.8k Limited co-sysop. If set, a caller with this SL can validate and delete messages from any caller. Normally, callers can only delete messages they themselves have written. 4.1.8l Co-sysop. If set, a caller with this SL has access to all co-sysop functions. 4.1.9 Auto-Validation Configuration. The sysop can set the Alt-F keys (Alt-F1 through Alt-F10) to set certain data for a caller. This function allows you to change that data. You may set the SL, Download Security Level (DSL), Access Restriction (AR), Download Access Restriction(DAR), and System Restrictions. Then, when a caller is on-line, you may press any ALT-function key combination to immediately change that caller's access levels and restrictions. This may be useful for validating a user that is online. You can, for example, just hit Alt-F1, and if you have that configured to give the caller standard access, the caller will immediately receive the configured access. It all happens very quickly, and there is no immediate indication on the caller's side that anything has happened, save perhaps a dramatic increase in the time-left display. The Alt-F10 key combination is used if you have configured the optional Simple Auto-Sysop Validation ASV. The first four (Alt+F1-F4) settings are used in the optional Advanced ASV system. See Section 4.1.15 for more information on ASV. CAUTION: If you are logged-on locally, and hit an Alt-key combination, your stats will be altered as well. This would do no permanent damage, but it will cause an annoyance as you have to reset your own access levels again. 4.1.10 Archiver Configuration. You may configure up to 15 supporting archiver formats. ZIP, ARJ, PAK, LHA, and RAR are pre-configured on first installation. The first archiver record is the default archive on the system. The first four are also copied into the pre 4.30 archiver structure for backward compatability with other supporting programs. For most users, you will not need to adjust these settings. The standard DOS replaceable parameters %1 and %2 are used for source and destination filenames. To navigate through the archiver records, use the bracket keys [ and ]. To edit a record, hit enter. CAUTION: It is *HIGHLY* recommended that you edit the command lines of all archivers and specify a complete path and filename to the program to run (i.e. c:\bat\pkzip.exe -a %1 %2). It is possible, though very unlikely, that a mischievious or malicious user could upload a batch file or compiled executable with an archiver name that may do harm to your system if run. 4.1.10a Archiver Name. This is a recognizeable name you can assign to the archive type. 4.1.10b Archive Extension. This is the three letter extension applied to files of this particular type. This setting is how the BBS identifies archives. 4.1.10c Archive List. This command lists the archive to the screen without actually extracting the files. 4.1.10d Archive Extract. This command extracts the archive to the temporary directory for the current instance. 4.1.10e Archive Add. This command adds a file to an archive. 4.1.10f Archive Delete. This command deletes a specified file or list of files from the current archive. 4.1.10g Archive Comment. This command applies a BBS comment to the selected archive. %K substitutes GFILES\COMMENT.TXT for commenting. 4.1.10h Archive Test. This command tests the selected archive for validity and integrity. 4.1.11 Network Configuration. If you have installed the NETxx.ZIP archive in the BBS directory, this option will allow configuration of networks. The prompts are self explanatory. For details on network configuration, see NETxx.DOC in the distribution archive. The only setting that effect the BBS itself is the Network Type. This setting tells the BBS and the network software how to handle the particular network. There are currently three network types: WWIV, Fido, and Internet. 4.1.11a WWIV network types. This type is processed normally and entirely by the NETxx package. 4.1.11b Fido and Internet network types. These types implement internal hooks for pre-processors and tossers such as WWIVtoss and the PPP Project to convert native type messages and email to WWIV format and vice versa. 4.1.12 Change Max Subboards/Directories. This is a system tuning parameter. These items require runtime memory thus the higher they are set, the less memory is available when shelling to DOS or running external programs. You should NOT select more than you think that you will actually need, for more memory is required as the number is increased. This setting may be modified later if you require more subs or directories. 4.1.13 Language Configuration. WWIV has the ability to offer users multiple languages through the use of string files. To configure languages, all that is required is to define the directory where the language string and menu files are located. See Chapter 9 for more information. 4.1.14 Registration Information. When you register WWIV, this is where you will enter your registration number, passcode, name and address information. A registration passcode is required for v4.30 for the BBS to operate beyond the 60 day trial period. Previously registered sysops will be issued a passcode at no charge at http://wss.wwiv.com/passcode.htm. The name field is required. Enter the same name you used to register the software. The address fields are optional and are for your information only. You may be required to provide the address information at the time you registered at some point in the future. 4.2 WWIV.INI. The INI or Initialization file is probably the most enigmatic part of WWIV. It provides quick access to the core of configurable options and allows a quite diverse array of system tuning parameters. The file is well commented and should be fairly easy to adjust to your particular situation. The default file is setup for a generic BBS and should be sufficient for most applications. 4.3 Directories and Standard Files. INIT creates the following directory tree on first run: X:\WWIV |-\DATA | |------\REGIONS | |------\ZIP-CITY | |-\DLOADS | |------\SYSOP | |------\MISC | |-\GFILES | |------\MENUS | |------\WWIV |-\MSGS |-\TEMP1 |-\TEMP2 A general description of each directory and the files contained therein is covered here: 4.3.1 DATA. This directory contains the core data files for the BBS. User records, subboard and transfer directory data, archiver, color, and menu configurations, are all stored here. NOTE: If you don't backup your data regularly, you should start now with this directory. Disk or data errors here will devastate your BBS and you will find yourself starting over from scratch. The subdirectories REGIONS and ZIP_CITY contain area code and zip code information for deriving locational information. Regular updates to these files are on the WSS web site and Support Boards. 4.3.2 DLOADS. This is the base directory for files that you will make available to your users. You may choose to store a majority of your files on other drives or partitions. It is recommended that you *DO NOT* move the SYSOP subdirectory. This is the directory where files that only you have access to are stored. You may also have set options that force all uploaded files into this directory. 4.3.3 GFILES. This is the "General Files" directory. Basic menu and text files are stored here. Subdirectories are created here when GFILE sections are added. You will need to move the text files you want your users to have access to via the GFILES section there. New to v4.30 are configurable menu sets. The subdirectory MENUS contains subdirectories consisting of complete Menu Sets and a single file named DESCRIPT.ION. This should be the only file in MENUS and is NOT editable. The subdirectory MENUS\WWIV contains the default WWIV Menu Set. See Section 4.7 for information on Menu Sets. 4.3.4 MSGS. This is where all messages and email is stored. As with your DATA directory, these files should be backed up regularly. 4.3.5 TEMP<inst>. As described earlier, the TEMP directories are used to store runtime and working files. These directories are purged at logoff. 4.4 Menu System Setup. [???] 4.5 Multi-Instance Setup. Many have wondered why WWIV is called "multi-instance" instead of multi-line or multi-node. The reason is simple; it is both multi-line and multi-node and we wanted a way to convey this. WWIV uses a single USER.LST that can be accessed simultaneously by instances that may be on a Local Area Network, a single machine that is multi-tasking, or from remote locations via modems over multiple phone lines. Because WWIV literature has always referred to BBSes on WWIV-based networks as nodes, we wanted to avoid the confusion that could result from use of that term and we wanted to convey that it was much more than merely multi-line. 4.5.1 Multi-Instance Requirements. WWIV is distributed as a two-instance BBS. The registered sysop is entitled to use these two instances as two remote lines, two local instances (no telephone line) or a combination of the two. The unregistered sysop is expected to use it with no more than one telephone line connected to it although it may be used with a local access and a telephone line. Persons wanting to have more than two lines and who are registered sysops are referred to the Upgrade information contained in Section [???]. The costs of upgrading to more instances is contained there along with information regarding how to make this upgrade. 4.5.1a Registration Requirement. To have more than one phone line connected to your BBS OR have more than two local instances (assuming no remote lines), you are required to register the software. With registration and an upgrade, you can increase the number of instances up to a theoretical maximum of 999 instances. This is referred to as a theoretical maximum because, to our knowledge, no one has tested the software on more than 38 instances. 4.5.1b Hardware Requirements. The hardware required to run multiple instances is largely a function of the type of setup that you have and the type of additional software that you may be using. For example, to run WWIV using OS/2(tm) or Windows (tm) as your multi-tasking or operating system, you will need more memory available than if you were to run the BBS on multiple computers connected on a LAN. After all other software is loaded, you need a minimum of 580k of free lower memory to successfully run most operations. Other sections of this documentation provide advice from sysops who have operated WWIV in various environments. Deskvue (tm) - See Section [???] Windows (tm) - See Section [???] Windows for Workgroups - See Section [???] OS/2 - See Section [???] OS/2 Warp - See Section [???] Novell Netware - See Section [???] Lantastic - See Section [???] 4.5.1c Software Setup. INIT must be run for each instance that you wish to use. You are able to identify which instance you are working with by the following command to INIT: INIT.EXE ,x where x represents the number of the instance you wish. If the instance has a modem attached to it, you should define the comport and select the modem type. If there is no modem attached, you may ignore the comport and other modem options. The path to the TEMP directory is set by default to TEMP<instance> and the directory is created for you. If you want to use another directory or name, you will have to rename the directory both in INIT and in DOS. If batch downloads are permitted for this instance, you must define a batch directory. To avoid confusion, use the same directory defined as your TEMP directory. INIT.EXE will permit you to run it with any number following it; however, it will only create a viable setup for you if you have upgraded your software (See UPGRADE.FRM), to have that number of instances enabled. 4.5.1d Instance Batch files. ****************************************************** THIS IS A WORKING DOCUMENT AND IS NOT COMPLETE ****************************************************** 5 Operating the BBS. This chapter covers basic operation of the BBS and system editors. With v4.30, the BBS uses FOSSIL based communication with the com ports. Prior to starting the BBS, you must install a Revision 5 compliant FOSSIL driver. Known working drivers include X00, ADF and WinFossil. See the driver doumentation for setup. 5.1 Starting the BBS. Once the FOSSIL driver is installed, you are ready to start the BBS. The use of a batch file is recommended since there are various settings and commands that must be issued prior to the BBS actaully running. 5.1.1 Startup Batch File. A normal batch file may look as follows: @ECHO OFF REM ***** Sample batch file for running the BBS on Instance 1: REM ***** First, set the environment variable for the instance: SET WWIV_INSTANCE=1 REM ***** Change drive and directory to the location of the BBS d: cd \bbs REM ***** Looping the BBS to include a reload of the fossil REM ***** driver is recommended after every user. :LOOP REM ***** Load the fossil driver in the begining of the loop. REM ***** X00 or BNU work fine in DOS or a DOS box. REM ***** WinFossil or ADF will work well for Windows. REM ***** X00 commandlines are used for an example. You will REM ***** have to adjust these for your system. REM ***** Setting of TX/RX buffers is NOT recommended for any REM ***** fossil driver. Allow the fossil to set them. REM REM X00.EXE E B,1,115200 REM ³ ³ ³ ³ ³ REM ³ ³ ³ ³ ÀÄÄÄ rate of your com port REM ³ ³ ³ ÀÄÄÄÄÄÄÄ com port -1 COM1=0 COM2=1 ect... REM ³ ³ ÀÄÄÄÄÄÄÄÄÄ baud settings REM ³ ÀÄÄÄÄÄÄÄÄÄÄÄ Eliminates the X00 info splash REM ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ X00. Must be in the BBS dir or path REM REM Next call XU.EXE, the runtime interface for X00. It has REM to be called twice, once to turn the port on, again to REM lock the port. REM REM XU.EXE PORT:<x>:<ON | OFF> REM ³ ³ ³ ³ REM ³ ³ ³ ÀÄÄÄÄÄ turns port ON or OFF REM ³ ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄ com port -1 COM1=0 COM2=1 etc. REM ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ addresses command to the port REM ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ interface while X00 is active REM ³ ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ locks baud rate of port REM ³ ³ ÚÄÄÄÄÄÄÄÄÄÄÄÄ com port-1 COM1=0 COM2=1 etc. REM ³ ³ ³ ÚÄÄÄÄÄÄÄ baud rate to lock port at REM ³ ³ ³ ³ ÚÄ sets parity on port REM ³ ³ ³ ³ ³ REM XU.EXE LOCK:<x>:<baud>:8N1 X00.EXE E B,1,115200 XU.EXE PORT:1:ON XU.EXE LOCK:1:115200:8N1 REM ***** Load the BBS -o = Exit after one user REM ***** -n0 = Error level 0 on normal exit REM ***** -a2 = Error level 2 on abnormal exit REM ***** %x = Allows passing of other parameters REM ***** on the commandline (i.e. WWIV -m) bbs.exe -o -n0 -a3 %1 %2 %3 REM ***** If the BBS exits abnormally goto the specified label. if errorlevel 3 goto ABNORMALEND REM ***** Errorlevel 2 is a normal quit or escape from the BBS if errorlevel 2 goto END REM ***** Otherwise, turn of and unload the fossil driver XU PORT:1:OFF X00.EXE REM ***** And go back to the top of the loop to reload. goto LOOP REM ***** Actions to be performed if the BBS exits abnormally :ABNORMALEND REM ***** Nothing goes below this label :END 5.1.2 Commandline Arguments. The BBS accepts 14 different commandline options: /B - someone already logged on at rate (modem speed) /S - used only with /B, indicates com port speed /N - normal exit level /A - abnormal exit level /R - specify max # minutes until event /O - quit WWIV after one user done /H - don't hang up on user when he logs off /M - don't access modem at all /F - pass full result code (CONNECT 9600/ARQ/HST/HST/V.42BIS) /C - enable CTS/RTS flow control /P - Set System Password to <password> /V - pass usernumber online /E - load for beginday event only; /? - display command line options 5.2 Waiting for Caller (WFC) Screen. New to v4.30 is an optional full screen WFC that provides information to the sysop whenever the BBS is idle. The screen looks as follows: [ insert screen shot ] Also included is a defineable screen saver. See WWIV.INI for enabling and disabling these features. 5.3 Logging on. From the keyboard, local logons are initiated from the WFC using the SpaceBar. You will see the "Logon?" prompt. If this is your first logon, hit Y and follow the prompts to establish your account. If you have already established your account, hit F for a "fast" logon or Y to logon normally. SL255 users numbered 1 through 10 may use a fast logon by hitting the SpaceBar and their user number. Note: This feature only works for SL255 users. Once this logon process is complete, the last few callers and user information screens will be presented and you will be located at the Main Message Base prompt. 5.4 User Online keys. User online keys are used to perform certain actions on the system or the user while he or she is online. 5.4.1 F1 - QuickEdit User Account. Pressing the F1 key while a user is online will produce a pop up box containing the current users access levels, restrictions and other pertinent information. You can tab through the fields an edit this information as needed. Pressing F1 again closes the pop up. A [WAIT] prompt is displayed to the user while editing and all caller input is ignored. This is the first User online key you will use. After logging on and establishing your sysop account, hit this key and give yourself maximum values as displayed below [ insert screen shot ] Shift+F1. Ctrl+F1. 5.4.2 F2 - Toggle Top Screen information. There are three toggles of the Top Screen with F2; System Status, Caller Status, and none. SL255 users locally logged on default to no Top Screen. If you want to turn it on, hit the F2 key. Shift+F2 - Ctrl+F2 - 5.4.3 F3 - 5.4.3a Shift + F3. 5.4.3b Ctrl + F3. 5.4.4 F4 - 5.4.4a Shift + F4. 5.4.4b Ctrl + F4 5.4.5 F5 - 5.4.5a Shift + F5. 5.4.5b Ctrl + F5. 5.4.6 F6 - 5.4.6a Shift + F6. 5.4.6b Ctrl + F6. 5.4.7 F7 - 5.4.7a Shift + F7. 5.4.7b Ctrl + F7. 5.4.8 F8 - 5.4.8a Shift + F8. 5.4.8b Ctrl + F8. 5.4.9 F9 - 5.4.9a Shift + F9. 5.4.9b Ctrl + F9. 5.4.10 F10 - Enter Chat Mode. This key activates the selected chat mode. You may select "split screen" chat by setting the 2WAY_CHAT INI option to Y. 5.4.10a Shift + F10. 5.4.10b Ctrl + F10. 5.4.11 Alt-F Keys. Hitting any Alt-F key combination while a user is online will apply the validation template assigned in INIT to the users account. ***CAUTION An Alt-F key combination while you are online will apply the template to your account. No permanent damage will be done, but you will have to reset all access levels for your self. 5.5 Top Screen Information. The local sysop's screen can show two screens of information, which may be toggled with the F2 key. The first screen is System Status. The second screen is User Status of the current user online. 5.5.1 System Status Top Screen. The system status topscreen information shows the following data about the status of the system. [ insert screen shot ] The first line contains the BBS name and today's date. The second line indicates the total number of users, total calls to date, calls today, and number of posts today. The third line displays the current user's name (alias) and number, time the system has been active today, percent of time today the system has been used, and amount of e-mail sent today. The latter statistic as well as the number of posts today includes both local and network information, if the board happens to be participating in the network. The fourth line shows the current user's security level, download security level, time left, feedback waiting for the sysop, files uploaded today, and feedback sent today. 5.5.2 User Status Top Screen. This top screen shows various information concerning the current user online. [ insert screen shot ] The first line contains the user's name (alias) and number, mail waiting for user, uploaded files and kilobytes, security level, total logons, and posts. The second line contains the user's real name, phone number, callsign, downloaded files and kilobytes, download security level, total time on, and e-mail sent. The third line contains the user's AR and DAR, restrictions, exemption, logons today, and feedback sent. The fourth line shows the user's note, sex, age, computer, time left, and feedback waiting for the sysop. A fifth line may appear after a caller requests a chat. This line would give the reason the caller entered for wanting to chat. The border line at the bottom of the topscreen information may also show the following flags to alert the sysop of the current status of the user and system: 5.5.2a Temp Sysop flag. This flag appears when the sysop has toggled temporary sysop status with F9. 5.5.2b Capture flag. This flag appears when the sysop has toggled the global capture with Shift-F1. 5.5.2c Alert Flag. This flag appears when the sysop has pressed F6 to be informed when the caller hangs up. When Alert has been toggled on, the computer will beep after the current user logs off, and will not return to WFC so that the sysop can log on locally. 5.5.2d Comm Disabled flag. This flag appears when the sysop has pressed F3 to prevent the caller from typing. 5.5.2e Available flag. This flag is displayed when the sysop has toggled the sysop available for chat option with scroll-lock key. 5.5.3 Abbreviations used in the TopScreen Information. W - Mail waiting for caller SL - Security Level R - User restrictions DL - Download Security Level AR - User AR/DAR PO - Total # of posts LO - Total number of logons ES - Total e-mails sent TO - Total minutes on FW - Feedback waiting for sysop FS - Total feedback sent EX - User exemptions UL - Kilobytes uploaded DL - Kilobytes downloaded 5.6 Messaging System. Message bases are sometimes referred to as "subs." These are areas on the bbs where messages related to particular subject areas may be kept. Any topic you can imagine may be used for a sub. Common examples include politics, science fiction, entertainment, sports, trivia, etc. WWIV based networks have subs on every imaginable topic. You may want to join such a network to offer a more diverse array of topics in your message bases. The very first sub on your BBS should be one where you alone can post messages. This is your place to make announcements concerning your system etc. You can force users to read this sub any time there are new messages using the USE_FORCE_SCAN and FORCE_SCAN_SUBNUM INI settings. See WWIV.INI for more information on these settings. Users who have the appropriate SL and ARs can read the message bases and post on them. These messages are not private and may be read by anyone else who has the appropriate SL and ARs. *** NOTE: Because the more message bases and directories that you create, the more memory is required for pointers and so forth, it is advisable to set the number of message bases to the next highest multiple of 32 over the number that you actually intend to use. This will help conserve memory. Message bases are setup by using the BOARDEDIT feature. This feature may be accessed in the following ways: [1] From WFC, enter B and then enter the system password when prompted for it. [2] From the main menu, enter //BOARDEDIT and then enter the system password when prompted for it. [3] From the main menu, enter //BE (short form for BOARDEDIT and the system password when prompted for it. 5.6.1 BoardEdit. Using Boardedit, you can delete, insert, and modify subs. The default installation sets up one sub-board named General. You will see a screen that looks like the following after you have chosen to add or modify your listing. A description of each setting is included below: [ insert screen shot ] A. Name. Each sub-board needs a name, describing what type of messages are expected on that sub-board. If your BBS is a member of a WWIV network, the software will insert either <Net> or [Net] preceeding the sub-board name when the sub listing is obtained. The difference between these two uses of NET is discussed below under the Network Validation Option. B. Filename. Each sub-board also needs a UNIQUE filename. If two subs have the same filename, BOTH SUBS WILL REFER TO THE SAME MESSAGES. The filename can be whatever you want (up to 8 letters in length), but it must not contain an extension. For example, WSSYSOP would be a legal name to enter, but WSSYSOP.SUB would be illegal because it uses an extension. It is recommended that you develop a naming convention for your networked message bases to identify the file that belongs to a particular sub. Using the sub above, if you subscribed via WWIVnet, you may want to name the file WWSSYSOP. The prepended W identifies the file as subtype WSSYSOP on WWIVnet. C. Key. Normally, all sub-boards are assigned a number (in ascending order, starting at one for your first sub-board) which callers can press to immediately access them. If you would prefer that a sub-board be referred to by a key (such as %,&,#, etc) instead of a number, setting the key to that character will do so. This option will not normally be used. D. Read SL. This setting determines the minimum SL required to allow a caller to read messages on the sub-board. If the read SL for a sub is 40, and a caller's SL is 39, that caller will never know that the sub-board exists. E. Post SL. This setting determines the minimum SL required for a caller to post on the sub. The post SL should be greater or equal to the read SL. Having the post SL greater than the read SL would allow callers to read messages on the sub, but not post any. This type of setting is often useful on some network subs where anyone may be permitted to read the sub, but posting may be only by certain persons (perhaps the sysop and/or the co-sysops.) F. Anony. Setting the anony (no, yes, forced, dear abby) determines whether or not messages posted on that sub can be anonymous. No means no anonymous (unless the caller has a security level which permits it); yes means the caller has the option of posting anonymously, regardless of security level; forced means the post is always anonymous; dear abby means that the caller will be presented a choice of "signatures" for his/her post: their name (alias), Abby, or Problemed Person. In effect, the "dear abby" option does the same thing as setting anony to yes, but it gives the caller two options on which name will represent the author of the post. This option is ignored on all networked message bases. G. Min age. This will allow you to specify the minimum age of callers on that sub. If, for example, you set the minimum age to 18 (years), anyone under 18 would not know the sub existed. This setting is normally used for adult-oriented subjects. H. Max msgs. This sets the maximum number of messages that can be on the sub at one time. This is usually set to 50 or 100, but can be up to 999. When the maximum number is reached, the oldest post in the sub is rotated off (deleted) as each new post is entered, unless a post has been given permanent status. A post with permanent status means that it will not be erased. This is useful if you have posted the sub rules or something as the first message on the sub. To give permanent status to a post, you hit N after reading the post. You will see the message, "This post will NOT be auto-purged. I. AR. This allows you to specify the AR for that sub. AR is used to allow specific people to access specific subs when other sub limitations (age, post SL, etc) are not sufficient for your needs. As an example, suppose you have a group of Amiga callers on your BBS. You want to give them their own area to talk about Amigas. Age and SL restrictions would be cumbersome and inefficient. That is where AR comes into play. There are 16 different AR flags that can be used, A through P. To give the Amiga callers their own sub, you would use this setting to assign an AR to the sub. You can use any letter (A-P) you wish, as long as it isn't in conflict with another sub which doesn't concern the Amiga people (you can use the same AR on different subs, but realize that anybody with the same AR flag set would be able to access all subs with the identical AR). For this example, you could set the AR flag to A. Then you would go into UEDIT and activate each Amiga caller's A flag. Now, all Amiga callers would be able to access the Amiga sub (as long as SL and age requirements, if any, were met) and nobody else would know the sub exists. J. Net info. Used with WWIV network software on network subs to properly allocate messages. If the sub you are editing is not a WWIV network sub, leave this blank. If you select this option, you will get a sub-menu asking for information regarding Network, Type, Host, and Flags. As you enter the information, you will receive helpful prompts. The Networks that are recognized are those that you have setup in the INIT program. NOTE: When setting up a networked message base, this is the first setting you should enter. Some of the fields will be filled out for you if you have a current SUBS.LST file for the specified network. TYPE refers to the SubType. Under WWIV v4.21a and NET31 or earlier, these subtypes had to be integer values; under NET32 and WWIV v4.22, you may use 7 letter character names for the subtype. This option is referred to in WWIV literature as "sub-by-name". HOST refers to the network host of the sub; if you host it, the information will display HERE; otherwise, the host's network node number will be shown. SUBS refers to the number of subscribers on the sub and is diplayed only when you are the sub host. FLAGS refers to whether the sub is auto-requestable and whether or not the information about the sub should be reported in the SUBS.LST distributed on each network. For more information on this, refer to the WWIVnet Documentation that accompanies the Network Software. There will also be an appended category on subs you host. If this is chosen, a list of available categories (distributed by the NC for the network) will be given. The purpose of this is to allow the sysop to select the most appropriate category (for that sub information) for listing in the Subs List that is distributed by each network. K. Storage type. There are 2 main ways messages can be stored, either with each message in its own file, or with all messages in that message base in one large file. 0 means each message will be in its own (text) file, 2 means all messages in that sub will be in one large (non-text) file. L. Val Network. This option may be toggled on or off. If toggled on, sub-board that are network subs, will have the network name enclosed in brackets (i.e. [WWIVnet]) in front of the name and the sysop will need to validate the messages received there before the messages will be sent over the network. If the option is toggled off, the sub will have the network name enclosed in v-brackets (i.e. <WWIVnet> in front of the Sub-Board name. Because many network subs have various restrictions (such as no ansi posts, or posts from #1 on the BBS only, etc), network validation is a means of insuring that posts originating from this BBS are in compliance with the sub-host's rules. M. Req. ANSI. The sysop can require that the user have ansi enabled in order to view this sub. This option is particularly useful if the sub is one of ansi pictures drawn with THEDRAW or some other ansi editor. An example of an all ansi sub is the WWIVnet Sub known as The Ansi Art Gallery. N. Disable Tag. This option, if toggled on, will disable taglines in the messages. This may be useful if a network sub host does not permit posts which have taglines added to them. O. Description. This option permits you to supply a description of a sub that you host. This description will be used in the SUBS.LST file maintained by the network. The entry in this field makes it possible for subs you host to be included in the SUBS.LST without your intervention; the only requirement is that the auto-info option in FLAGS be set when the sub is set up. ****************************************************** THIS IS A WORKING DOCUMENT AND IS NOT COMPLETE ****************************************************** 6 Modem Information and Setup ****************************************************** THIS IS A WORKING DOCUMENT AND IS NOT COMPLETE ****************************************************** 7 For New Sysops Operating a BBS can be a very satisfying (and addictive) experience, particularly if you have given some thought to your setup and the needs and desires of your target audience. A BBS with an attentve and participating sysop offers a personal, "homey" atmosphere that the Internet cannot provide. With the "Internet Explosion" still in full swing, you must target a specific group of users and advertise to capture a sizeable user base. Because a BBS can be used for such a wide variety of things, this chapter assumes that you know virtually nothing about a BBS and that you are a first-time WWIV operator. The information that follows is meant to help guide your thoughts and creative processes so that you will obtain the most enjoyment from the experience. You can determine whether your BBS is to be a general purpose BBS or whether it will cater to some particular interest. A general purpose BBS normally will not focus on any particular topic in its message bases or file sections; instead, it will have something for everyone and will probably not try to have everything available on any topic or subject area. A general purpose BBS is often the best approach for a beginner to take unless you have some clearly defined area(s) of interest that you want to pursue. If you are not participating on a network, then you may wish to have message bases that reflect a broad spectrum of interests. If you are on a network, you may wish to subscribe to subs that reflect such broad areas. Your download sections may also reflect a broad area of interest. It is recommended, at a minimum, that you provide file areas that support the needs of a general user. That is, you may want to make the common archive programs, protocols, and terminal programs readily available to your users to make it easier on them to call the BBS. You may wish to provide the User Documentation for download so that your users can learn how to use a WWIV BBS system. Beyond those minimums, you are left to your own imagination and perhaps the suggestions of your users to create the topical download areas that will appeal to those who call your board. A special purpose BBS is generally best when it reflects your own interests. If it reflects your interests, you are more likely to take an active interest in your BBS, to post things, and to keep fresh material in your download areas. Generally, a BBS that reflects that the operator takes an active interest in the BBS is more successful than one where the operator's presence is invisible or totally lacking. Once you have determined the type of BBS that you are going to run, you should give some thought to the types of security levels that you will have on your board and the amounts of time that you will allow each user and/or security level. By looking in INIT, you can determine the predefined or default levels for certain security levels. My advice would be to (a) use no more security levels than you absolutely need and (b) to try to keep things as simple as possible. To give you some idea of this, here is a basic overview of the setup at The Mountain Empire which is primarily a support BBS for WWIV operators. There are seven security levels and three access levels in use: Type User SL DSL AR's DAR's ÄÄÄÄÄÄÄÄÄÄÄÄ ÄÄÄÄ ÄÄÄÄÄ ÄÄÄÄÄÄ ÄÄÄÄÄÄÄ Unvalidated 10 0 Normal 20 20 Other Sysop 30 30 Registered Sysop 40 40 A A w/ Mods Access 60 60 A M A M w/ SDS Access 80 80 AKM AKM Sysop 255 255 All All There are two SL255 Sysops and no Co-Sysops, local or remote. The Advanced ASV and Guest Account features are activated so that users and visiting sysops who call for support will have immediate access to the support areas of the BBS. (sans Mods and SDS) The AR and DAR of A indicate that the user has access to the WWIV support message bases and file sections but does not have access to the modifications and/or the WWIV source code. A registered visiting sysop (i.e. one that is a bonafide registered WWIV sysop) has access to the message bases dealing with modifications of the source code (indicated by AR and DAR of B) and the transfer areas that contain such modifications. This status must be requested. Finally, I have the sysops who are registered and have requested to use my board as their SDS site (source distribution site). Those people must send a letter to Wayne Bell and provide the information necessary to be approved for source access. As you can see, the number of SLS, DSLS, ARS, and DARS used here is very limited, yet it suits the security pur- poses of my BBS. After you have examined your needs and thought out your own security arrangements, then you should use the BOARDEDIT and DIREDIT features to set up your board to reflect the security levels and access restrictions that you will need. You may wish to also have other indicators (i.e. age or sex) for certain areas. The BBS software supports your using all of these factors to allow or deny support from various sections of your board. You should be aware that any user who does not have the appropriate SL and accompanying access rest- rictions will not be aware of the other parts of your BBS. For example, lets say that you have a total of 10 message bases. The first three have SL of 30 and no ARS; the next three have SL of 40 and AR of A. The last four have SL of 50 and AR of B. A user with SL of 30 would see only the first 3. A user with SL of 40 and AR of A would see the first 6 message bases. In other words, if you have the appropriate access restrictions (ARS), you can see those message bases that have lower SLs than your own. A user with SL of 50 are AR of B would see the first 3 message bases and the last 4. If that user had ARs of both A and B, then he could see all of your message bases. After you have developed your security levels and access restrictions, you should probably make yourself some form letters to send to people explaining any particular rules of your BBS and/or any rules associated with their particular access level. These form letters are explained in Chapter 42 of the documentation. You may then wish to have a few friends call so that you can learn the process of validating them while they are on line (see section ). Encourage them to try out various parts of the BBS and to post some messages. ****************************************************** THIS IS A WORKING DOCUMENT AND IS NOT COMPLETE ****************************************************** 8 WWIV on the Internet. Telnet and PPP ****************************************************** THIS IS A WORKING DOCUMENT AND IS NOT COMPLETE ****************************************************** Appendix A (References) ****************************************************** THIS IS A WORKING DOCUMENT AND IS NOT COMPLETE ****************************************************** Appendix B (Forms) Registration Form ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ WWIV Software Services, LLC PO Box 4468 Johnson City, TN 37602-4468 Product Registration/Order Form SEE Section 1 regarding End-User License Agreement SEE Section 2.1 regarding Payment Plan. ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÂÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³Full Name ³ ³ ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´ ³Address Line 1 ³ ³ ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´ ³Address Line 2 ³ ³ ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´ ³City, State, Zip³ ³ ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´ ³Voice Phone ³ ³ ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´ ³BBS Name ³ ³ ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´ ³BBS Phone ³ ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ If you are on a network or network(s) fill in the following: ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÂÄÄÄÄÄÄÄÄÄÄÄÄÄÒÄÄÄÄÄÄÄÄÄÄÄÄÄÄÂÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ Network Name ³ Node Number º Network Name ³ Node Number ³ ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄÄÄÄ×ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄÄÄÄ´ ³ ³ º ³ ³ ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄÄÄÄ×ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄÄÄÄ´ ³ ³ º ³ ³ ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄÄÄÄ×ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄÄÄÄ´ ³ ³ º ³ ³ ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄÄÄÄ×ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄÄÄÄ´ ³ ³ º ³ ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÄÄÄÄÄÄÄÐÄÄÄÄÄÄÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÄÄÄÄÄÄÄÙ Installment Plan (Y/N)________ Payment Number: 1 2 3 4 (Circle One) ================================================================ Complete this section ONLY if you wish to DOWNLOAD the source code from an authorized Source Distribution System (SDS). SDS Node Number: _______ Network: __________________ SDS BBS Name: ________________________________________ User Name/Handle on SDS Site: ________________________ User Number on SDS Site: _______ ================================================================ NOTE: You must read the End-User License Agreement prior to ordering. Your completed registration form and fees indicate that you have read the agreement and agree to its terms and conditions. ÚÄÄÄÄÂÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÂÄÄÄÄÄÄÄÄÂÄÄÄÄÄÄÄÄÄÄ¿ ³Qty ³ Description ³ Cost ³ Extended ³ ÃÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄ´ ³ ³ WWIV v4.xx for DOS Registration ³ ³ ³ ³ ³ (2 Instances) ³ $80.00 ³ ³ ÃÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄ´ ³ ³ WWIV v4.xx for DOS Installment Plan ³ ³ ³ ³ ³ $20 / $20 / $20 / $25 ³ ³ ³ ÃÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄ´ ³ ³ Network Registration ³ ³ ³ ³ ³ (Included w/ BBS Reg. All platforms) ³ ³ ³ ÃÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄ´ ³ ³ WWIVedit Registration ³ $20.00 ³ ³ ÃÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄ´ ³ ³ WWIVchat Registration ³ $25.00 ³ ³ ÃÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄ´ ³ ³ Source Code on 1.44 MB Diskettes ³ N / C ³ ³ ÃÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄ´ ³ ³ Source Code/Mod Collection Zip-Disk ³ $15.00 ³ ³ ÃÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄ´ ³ ³ CD-ROM SuperDisk (Available AUG 99) ³ Future ³ ³ ÃÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄ´ ³ ³ Automatic delivery of next release ³ ³ ³ ³ ³ via US Mail ³ $10.00 ³ ³ ÃÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄ´ ³ ³ Shipping outside North America ³ $10.00 ³ ³ ÃÄÄÄÄÁÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄ´ ³ ³ ³ ³ Subtotal: ³ ³ ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄ´ ³ ³ ³ ³ TN residents add 8.5% Sales Tax: ³ ³ ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄ´ ³ ³ ³ ³ Total Amount Enclosed: ³ ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÄÄÄÄÙ * Remit to WWIV Software Services, LLC at the address above. * Checks and Money orders drawn on US Banks ONLY. * Dishonored checks carry a $30 surcharge per draft. Checks will only be deposited once unless WSS receives written instructions otherwise. Dishonored checks and surcharges may only be paid by money order or cashier's check. Customer Statement: My signature below attests that I have read, understand, agree to, and will abide by the terms and conditions of the End-User License Agreement(s) for the products ordered above. I understand that failure on my part to abide by the terms and conditions set forth therein may result in civil or criminal liability, revocation of my license, forfeiture of any registration fees paid, or any combination thereof. ______________________________ __________ Signature Date Appendix B (Forms) Registration Upgrade Form ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ WWIV Software Services, LLC PO Box 4468 Johnson City, TN 37602-4468 Registration / Instance Upgrade Form This form is for those who wish to have more than two instances, WHICH UTILIZE THE SAME USER.LST. Sysops desiring to access different user list files must purchase an additional full registration for each user list used. ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÂÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³Full Name: ³ ³ ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´ ³Address Line 1: ³ ³ ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´ ³Address Line 2: ³ ³ ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´ ³City, State, Zip:³ ³ ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´ ³Registration ##: ³ ³ ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´ ³Reg. Passcode: ³ ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ Registration address if different from above: Line 1: ________________________________________ Line 2: ________________________________________ City, State Zip: _________________________________________ Circle desired upgrade: ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÂÄÄÄÄÄÄÂÄÄÄÄÄÄÂÄÄÄÄÄÄÂÄÄÄÄÄÂÄÄÄÄÄÄ¿ ³Upgrade From ³ <=2 ³ 4 ³ 8 ³ 16 ³ 32 ³ ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÅÄÄÄÄÄÄÅÄÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÄ´ ³Upgrade to 4 ³ $20 ³ ³ ³ ³ ³ ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÅÄÄÄÄÄÄÅÄÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÄ´ ³Upgrade to 8 ³ $45 ³ $25 ³ ³ ³ ³ ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÅÄÄÄÄÄÄÅÄÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÄ´ ³Upgrade to 16 ³ $80 ³ $60 ³ $35 ³ ³ ³ ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÅÄÄÄÄÄÄÅÄÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÄ´ ³Upgrade to 32 ³ $120 ³ $100 ³ $75 ³ $45 ³ ³ ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÅÄÄÄÄÄÄÅÄÄÄÄÄÄÅÄÄÄÄÄÅÄÄÄÄÄÄ´ ³Unlimited ³ $220 ³ $200 ³ $175 ³$145 ³ $100 ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÁÄÄÄÄÄÄÁÄÄÄÄÄÄÁÄÄÄÄÄÁÄÄÄÄÄÄÙ Amount from Above: ____________ TN Residents add 8.5% Sales Tax: ____________ Total Enclosed: ____________ * Remit to WWIV Software Services, LLC at the address above. * Checks and Money orders drawn on US Banks ONLY. * Dishonored checks carry a $30 surcharge per draft. Checks will only be deposited once unless WSS receives written instructions otherwise. Dishonored checks and surcharges may only be paid by money order. _______________________ ___________ Signature Date Appendix B (Forms) Registration Transfer Forms (Present Owner) ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ WWIV Software Services, LLC PO Box 4468 Johnson City, TN 37602-4468 Present Owner Transfer Request: I, ____________________________________, a registered (Printed full name of present owner) user of WWIV under registration number ______________, (Registration number) hereby request to transfer my registration and all registration privileges to __________________________. (Printed full name of transferee) I agree to immediately destroy all copies of WWIV source code in my possession and to immediately cease using WWIV software. I realize that any SDS access that I may have had in the past will be terminated immediately. I further understand that this transfer will not be effective until the signed statements from the new owner and myself and with a check or money order for $25.00 (US Funds) are received and processed by WWIV Software Services. _______________________________ _______________ Signature Date Current Mailing Address: _____________________________________________________ _____________________________________________________ _____________________________________________________ Address at time of registration (if different): _____________________________________________________ _____________________________________________________ _____________________________________________________ Appendix B (Forms) Registration Transfer Forms (New Owner) ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ WWIV Software Services, LLC PO Box 4468 Johnson City, TN 37602-4468 New Owner Transfer Request: I, ________________________________, hereby request to (Print your full name) have the WWIV BBS software currently registered to _______________________________ under registration number (Printed name of current owner) _____________________ transferred to my name. (Registration number) I have read understand and will comply with the terms and conditions of the license agreement contained in the shareware distribution archive. I have enclosed my completed registration form in addition to this letter. I understand that this transfer will not be effective until the signed statements from both myself and the present owner, my completed registration form and a check or money order for $25.00 (US Funds) are received and processed by WWIV Software Services. My current mailing address is: _____________________________________ _____________________________________ _____________________________________ _____________________________ _________________ Signature Date ****************************************************** THIS IS A WORKING DOCUMENT AND IS NOT COMPLETE ****************************************************** Appendix C (References) Technical Support and Resources ****************************************************** THIS IS A WORKING DOCUMENT AND IS NOT COMPLETE ****************************************************** Appendix D (Frequently Asked Questions) ****************************************************** THIS IS A WORKING DOCUMENT AND IS NOT COMPLETE ****************************************************** Appendix E ( Common Protocol Settings ) ****************************************************** THIS IS A FINAL DOCUMENT AND IS COMPLETE ****************************************************** Appendix F ( Source Code ) For your reference, here is a copy of the Source Code End User License Agreement. 1. END-USER LICENSE AGREEMENT 1.1 GENERAL. READ CAREFULLY: This End-User License Agreement (EULA) is a legal and binding agreement between you and WWIV Software Services, LLC (WSS) and applies to all WSS products distributed with source code. For the purposes of this document, SOFTWARE refers to and includes all software, source code and documentation contained in registered distribution archives as provided by WSS. IF YOU DO NOT AGREE TO THE TERMS AND CONDITIONS OF THIS EULA, DO NOT DECOMPRESS THE DISTRIBUTION OR SOURCE CODE ARCHIVE. WSS prosecutes violators of this license agreement to the fullest extent of both federal and state civil and criminal laws and statutes. 1.2 SOFTWARE LICENSE. YOU ARE BOUND BY, AND INDICATE YOUR EXPLICIT ACCEPTANCE OF, THE TERMS AND CONDITIONS OF THIS AGREEMENT UPON DECOMPRESSION OF THE SOURCE CODE ARCHIVE. U.S. AND INTERNATIONAL COPYRIGHT LAWS AND TREATIES, TO INCLUDE ALL INTELLECTUAL PROPERTY LAWS AND TREATIES PROTECT THIS SOFTWARE. THIS SOFTWARE IS LICENSED, NOT SOLD. YOU HAVE PURCHASED A LICENSE TO POSSESS, VIEW, AND/OR MODIFY THE SOURCE CODE. WSS RETAINS OWNERSHIP, COPYRIGHT, AND INTELLECTUAL PROPERTY RIGHTS TO THE SOFTWARE AND ANY DERIVATIVES PRODUCED THEREOF AND RESERVES THE RIGHT TO UNILATERALLY TERMINATE ALL LICENSES TO SOURCE CODE AT ANY TIME. a. General License Grant. WSS grants to you a personal, exclusive license to: 1. Install one operational copy of the SOFTWARE that may operate on not more than the number of instances you are registered for, each accessing the same USER.LST. Separate instances that access a separate USER.LST require additional licenses be purchased for each USER.LST. 2. Download, view, possess, and modify WWIV source code for versions through v4.99 for your own personal use after completing verification requirements as prescribed by WSS. 3. Have an unregistered individual modify source code for you ON YOUR COMPUTER for your use provided that the source code never leaves your computer in any form and remains under your direct control at all times. 4. Have a registered user modify your source code on his or her system provided you notify and obtain written permission from WSS PRIOR to doing so. 5. Purchase upgrades to allow the operation of the software on more than two and not more than 999 instances. 6. Distribute source code modifications written by you on subboards designed specifically for that purpose or by private mailings provided the modification contains no more than 100 lines of the original copyrighted code. You must obtain written permission from WSS PRIOR to the distribution of modifications containing more than 100 line of copyrighted code. 7. Provide electronic download access to modification to registered users of the SOFTWARE as verified by WSS through the use of a modification provided by WSS. 8. Produce and distribute utilities and add-on programs specifically designed to operate on systems running the SOFTWARE that utilize ONLY the data structures of the SOFTWARE royalty free. (Use of components, functions, or derivative code must be approved and royalty fees paid prior to distribution) b. License Exclusions. Under your license, you: 1. May NOT distribute any modified compilation of the SOFTWARE by electronic download or transfer said compilation to anyone by any means without PRIOR WRITTEN AUTHORIZATION from WSS. 2. May NOT distribute source code or any portion thereof to anyone for any reason without PRIOR WRITTEN AUTHORIZATION from WSS. (Distribution of source code fragments authorized under paragraphs 1.2.a.6 and 1.2.a.7 excluded.) 3. May NOT allow unregistered users, or users, not verified by WSS, but claiming to be registered, access to or electronic download of modifications as described in paragraph 1.2.a.6. 4. May NOT produce and distribute derivative works based upon the SOFTWARE in whole or in part except as authorized under paragraph 1.2.a.8 above. Derivatives are defined as software programs or components of software programs that duplicate the operation, function, and/or appearance of the SOFTWARE. If any code other than that described in paragraph 1.2.a.8 above is used, you must obtain written authorization to do so and may incur liability to pay WSS certain royalties as negotiated. 5. May NOT "port" or rewrite the SOFTWARE to function under another operating system or on another platform with the intent to distribute the work without PRIOR WRITTEN AUTHORIZATION from WSS. You may, however, "port" or rewrite the SOFTWARE as described above for your own individual use. 6. May NOT be entitled to the source code to future versions of the SOFTWARE due to a decision to terminate this distribution method. c. Termination of License. WSS reserves the right to unilaterally terminate all licenses to source code at any time. In addition, WSS will terminate and permanently revoke the license of any registered user found in violation of the terms and conditions set forth in this EULA and will prosecute said violators to the fullest extent of both state and federal, civil and criminal laws. d. Documentation. This EULA grants you, as an individual, a personal, nonexclusive license to make, use, and make available for electronic download, an unlimited number of copies of the documentation included in the distribution archive provided such copies are not modified in any way and contain the original copyright information. e. Storage and Electronic Transfer of Distribution Archives. You may store and make available for electronic download, in unmodified form, a copy of the original WWIV v4.30 shareware archive as distributed by WSS. f. De-compilation and Reverse Engineering. You agree not to make any attempts to de-compile, reverse engineer, or disassemble the executable portions of the SOFTWARE to avoid the requirement to register, modify copyright displays, or the operational aspects of the SOFTWARE. 1.3 LIMITED WARRANTY. WSS warrants that the SOFTWARE will perform as described in the included documentation for a period of sixty days from the date of first installation. Any technical support provided by WSS shall be as described in the included documentation provided to you in the distribution archive. WSS will make reasonable efforts to solve any problem not covered in the included documentation. To the maximum extent allowed by applicable law, implied warranties on the SOFTWARE, if any, are limited to sixty days. No other warranties are expressed or implied. To the maximum extent allowed by applicable law, WSS disclaims all other warranties and conditions, either express or implied, including, but not limited to, implied warranties, merchantability and/or fitness for a particular purpose, with regard to theSOFTWARE and the provision of or failure to provide support. This limited warranty gives you specific legal rights. You may have others, which vary from state to state. This warranty is executed under the laws of the Sate of Tennessee. 1.4 CUSTOMER REMEDIES. Your exclusive remedy shall be to notify WSS of a suspected failure to meet the specifications of the LIMITED WARANTY. The entire liability of WSS shall consist of replacement of the SOFTWARE with an updated version if available. J-1 ****************************************************** THIS IS A WORKING DOCUMENT AND IS NOT COMPLETE ****************************************************** Appendix G ( Credits and Thanks ) There are more folks that belong on this list that can possibly be mentioned. Here they are in no particular order: Wayne Bell - for starting it all, keeping it going for so many years and then seeing the way clear to pass his legacy on. Wig De Moville (Filo) - for providing a support system for Wayne during a time when WWIV might have faded away. Greg Ferrante - for introducing me to WWIV in the first place. Frank Reid - The one man upon whom this entire project was hinged. He fueled the fire and motivated me to buy WWIV in the first place then provided his extensive expertise and effort during the development process. Cannonization pending.... Craig Dooley (Morgul) - for backing me up during the early years and his continuing support and friendship. Rob Clevenger - for his help in every phase of development and documentation. Mike Deweese (Zu Digital) - for providing some of the most inovative code and features in what you see as WWIV v4.30. The WWIV Development Team (WDT) - the group of truly hard-core sysops that contributed their time, talents, and energies to develop a top quality product. The Beta Team - for their tireless testing of of the software and survival through Beta 1 and for finding a great majority of the bugs, some more than once. Last but most certainly not least, the group who deserves the greatest appreciation, the registered users, without whom, none of this would be possible. ****************************************************** THIS IS A WORKING DOCUMENT AND IS NOT COMPLETE ****************************************************** Appendix H ( Closing Comments ) ****************************************************** THIS IS A WORKING DOCUMENT AND IS NOT COMPLETE ****************************************************** Appendix I ( Index ) ****************************************************** THIS IS A FINAL DOCUMENT AND IS COMPLETE ****************************************************** Appendix J ( WWIV Software Services Operational Policy ) This document last revised: 01 July 1999 1. General: WWIV Software Services (WSS) dictates policy for the software under its control only and does not attempt to influence the operation of any network in any manner. Network policies are dictated by the Network Coordinator (NC) or administrative body of the individual networks. WSS does however, reserve the right to interpret our policy for the individual user and/or network administrator(s). Any question as to applicability or interpretation of these policies should be brought to the attention of WSS immediately and before the registered user or network official act. Decisions or interpretations rendered by WSS on any issue are final. WSS reserves the right to revise, rescind, expand or alter the terms and conditions of this or any other existing policy at any time and may do so without notice. Revised policy will be grand fathered in most cases to allow no degradation of eligibility, status, or office of the individuals it affects. 2. Distribution, Software Registration and License: WWIV is distributed under the shareware concept. The user has 60 (sixty) days to evaluate suitability of the software to his or her needs. Not later than the sixtieth day, the user must register the software using one of the methods contained in paragraph 3 below, or discontinue use of the software and remove all operational copies and archives from his or her computer(s). The user may download evaluation versions of the newer revisions or releases to try the software again and the 60-day trial period begins anew. Re-installation of the same version, for any reason, after the initial 60-day trial DOES NOT, constitute a new trial period and is a violation of the shareware license agreement and is illegal. The trial period may be extended at the discretion of WSS on a cases by case basis. Initiation of a payment plan under the provisions of paragraph 3b.3 below extends the trial period for 60 days. Each payment made on time will extend the trial period for an additional 60 days not to exceed a total of 240 days. 3. Registration: a. General. When registering, the user is purchasing a license to use the software in accordance with the End User License Agreement (EULA) associated with the product. Registration does not imply nor entail ownership of the software. WSS retains ownership of the software itself. b. Methods: There are three methods of registration available, 1. Online Registration. Available AUG 99. Prices for online registrations are slightly higher due to increased costs. 2. Normal Registrations. Executed by check or money order via US Mail. 3. Payment Plan. WSS offers a payment plan for the purchase of BBS registrations. See the BBS documentation for more information on the payment plan. c. Revocation: The user's license may be revoked by WSS at any time should he or she violate any provision of this document or the terms and conditions specified in the license agreement contained in the distribution archives. d. Upgrades: The user is entitled to upgrade to all releases of the product line under the major revision purchased. For example, purchase of a v4.xx registration entitles the user to free upgrades to all releases through v4.99 for the platform. The user IS NOT entitled to free cross platform upgrades under this policy. Cross platform upgrade fees may or may not be charged and will be announced well in advance of releases. e. Instance Upgrades: The user is entitled to purchase instance upgrades to a previously purchased BBS registration at the price announced at the time of release. f. Transfers: REGISTRATIONS MAY ONLY BE TRANSFERRED BY WWIV Software Services. Registration transfers are only offered for BBS registrations. No other registrations will be transferred. g. Exemptions: Registration exemptions are authorized to be granted by the Network Coordinators (NC) of : WWIVnet IceNet TerraNet FILEnet GLOBALnet DigiNet WWIVLink SierraLink The NC of these networks may grant an exemption for systems acting in the capacity of network servers. NC's may place additional requirements on the system; however, the following minimum criteria must be met in order to grant the exemption: 1. The requesting sysop must have purchased a valid registration for at least one copy of WWIV and must be running a public BBS on the network in question using that registration number. 2. The primary purpose of the system must be the movement of network traffic and not operate as a public dialup system. User accounts on the server will be limited to number one accounts of connecting systems generated by the server operator. 3. The server operator will provide a dialup telephone number or Internet address (telnet) for the system to allow the NC or WSS to log on to the system. This is to verify that the system is in fact a server system and maintains compliance with both WSS and network policy. 4. The requesting system must operate for the good of the network as a whole in the judgement of the network administration. Network Coordinators desiring authorization to grant exemptions should email WSS with a request. 4. Source Code. a. Availability. Currently, registration of the BBS software entitles the user to the possess, view, and modify the source code to the BBS. If, at any time in the future, it becomes impossible or too difficult to control the distribution of source code, this policy may be rescinded. FOR SECURITY REASONS, THE SOURCE CODE TO INIT.EXE, NETWORK SOFTWARE OR NETUP IS NOT AVAILABLE TO ANYONE. b. Obtaining the Source Code. Current source code may be obtained: 1. On disk by sending a completed registration form and $10.00 (US) to WSS. 2. By download from an authorized Source Distribution System (SDS). SDS systems are authorized by WSS to distribute WWIV source code without charge to registered users after verification of their registration information with WSS. In order to download the source code from a SDS, the registered user must logon to the SDS and establish a user account, then type //SDS at the main menu prompt. Following the prompts will send a request for access directly to WSS. Upon verification of your request and registration information, authorization for access will be sent to the SDS operator who will grant you access to the distribution archives. 3. Via the Internet SDS at http://sds.wwiv.com/. You will be required to send a request similar to the one above from this location. Processing of these applications is normally accomplished within five to seven days. c. Modification Publication: Registered users may publish modifications on sub-boards designed for that purpose on individual networks. It is the responsibility of the host of these subs to ensure that only registered users are permitted to subscribe to subs where modifications are posted. Source code modifications that contain more than 100 lines of original copyrighted code require a release for publication from WSS. Email the mod in its entirety to WSS. In most cases, unless the modification contains code of a sensitive or malicious nature, they will be approved for release. Releases or Denial of Release will be issued within five business days. d. Modification Access Restrictions: Registered sysops will control access to all BBS modifications available for download, viewing, reading or capture on their system. The registration information for ALL individuals desiring access to modifications in any form must be verified with WSS before granting access. Sysops wishing to distribute modifications via download will request an install a modification for this process from WSS. This is the only request that will be accepted. e. License Agreement Violations: Unauthorized distribution of WWIV BBS Source Code or portions thereof is a crime. Registered and/or unregistered Individuals found in violation of the EULA contained in the source code archive will be prosecuted to the fullest extent of both civil and criminal laws. All registered users should review of the Source Code License Agreement to ensure they fully understand and are in compliance with it. Registered users have the responsibility assigned under the EULA to immediately report suspected or known illegal possession, modification, or distribution of source code under any provisions contained therein. Reporting violations protects your future ability to access the source code. 5. WSS Source Distribution Systems (SDS): WSS has several systems specially authorized to distribute source code to registered sysops. The number of systems is limited and only the most qualified systems are selected for this function. Meeting all the qualifications of the criteria listed below is no guarantee of selection. a. You MUST be the sysop (#1) of your system. b. You MUST have been a registered sysop for at least 2 years. c. You MUST have been running your BBS continuously for the last 2 years. d. Your BBS MUST be a full time system, open to anyone who wishes to call. No part-time boards, closed boards, or boards that require a new user password to sign on. e. You MUST be 21 years of age or older and provide a photocopy of an official photo ID to WSS with your application. f. You MUST have been a member of at least one major network for a minimum of one year. (preferably WWIVnet, IceNet, TerraNet or FILEnet) g. You MUST provide a list of at least 20 registered WWIV Sysops who want to be able to download the WWIV Source Code from you, listing their real names and registration numbers. h. You must install the approved SDS Access Request Modification on your system. i. Upon acceptance, you must be willing to sign a distribution agreement with WSS that outlines your legal responsibilities and obligations as a Source Distribution System. 6. WSS Support Board Network: WSS provides a network of highly skilled, knowledgeable sysops to the BBS community. Sysops selected for this status are time tested and have been recognized for the amount and quality of support they offer. Below is a description of the types of support offered and selection criteria for each: a. The Support Coordinator and active Support Boards select new Support Boards (SB). To become an official SB, the sysop, as a minimum, must meet the requirements of 5a through 5d above. In addition, the following conditions must be met: 1. The sysop must maintain a library of all official WSS releases, and a reasonably stocked library of WWIV support files, readily accessible to the public, without restrictions or ratios. 2. The system must offer Auto Sysop Validation (ASV) and/or a Guest Sysop Account (GSA) 3. You MUST have been a member of at least one major network for a minimum of one year. (preferably WWIVnet, IceNet, TerraNet or FILEnet) 4. You must be thoroughly knowledgeable concerning BBS and network operations and will be required to provide prompt, courteous replies to requests for assistance as well as extensive assistance to new sysops who may request help. b. WSS, The Support Coordinator, and the active Core Sysops select Core Support Boards (CSB). To be considered for Core Status, the sysop must have a minimum of 2 years of exemplary service as a Support Board. There is no application process as with the SB system. Core Support Boards are selected solely on tenure and merit of service. c. Any form of Support Board status may be removed at any time if the sysop fails to meet minimum requirements or when individual conduct is contrary to the spirit and intent of the support network.