!À0L07tForem_48( V14E0Error: No DOS(0 )0 / 0/(0/)00ֹ/ / Ȅ`l0j0À0  1 1%7x0 1 1 18H 1(哅h k1 y0L0l00DEH B VL0@  À  Y0`0.` a000. 08&.` 0mm 8 L1ƕƔ 1擥`A?pUVZZ  (MAIN (!PERM( 0Z/( 4GDATABASE Z1$( KOTEXTV ^Z1,( bhGAME01m uZ1;(yzA Z2MESSAGE DAAZ: ONLINE1 DAT Y+ gVALIDATEDAT Y+ EMAIL DATZ:*UMTEMP DAT Y+  PERM Z/ FUNCTNHIASCZ$FUNCTNHIATAZ;(FUNCTNHIANS U0/FUNCTNHIV52Z3FUNCTNLOATA Y5FUNCTNLOANS Y7FUNCTNLOASC Y9FUNCTNLOV52 YC #DATABASE Z1$;DBFIL1( : U >iDBFIL0? QZ#ADBFIL2V iZ-CDBFIL10m  U& GDBFIL3  UI DBFIL11  U(T DBFIL12  U0`DBFIL13  U%hDDBFIL14 Z  ?TEXT Z1-qpBULLITHI Z -upBULLITLO  Uy-FNETACTV  Y-|!FNETWARN  Y-cONLINE1  Y-sPASAPP  Y-VOTEGRPH  UVOTEISUE  UWELCOME1ATA U+WELCOME2ATA U! EGAME01 !Z1;< GAME( ; Y. ^HISCORE? E Y. A Z2dWELCOME3ATA U2WELCOME4ATA U+SOPFUNC2  Y- SOPFUNC1 ZCHAT1j { U1CHAT2  U1LOGOFF ZTERMTYPE  U4`FILEMENU Z `FILEMENUATAZ `FILEMENUANSZ `C>FILEMENUASCZ `FILEMENUV52Z .WAITMENU  Y%EMAIL ISMZ.iPAS" 4DAT Y+ PAS9 IDX Y+ CONFIG DATZ yFNETPARMDATZ_!FNETPOST ZFNETPREP Z'FNETRECV Z 4F1FNETSEND Zy FNETSET Z6FNETCNTL Z)(BBS Z! BBS BAS U5 BSIGUTIL BXEZ? SIGUTIL DOC Y  SIGINIT BXE Y$-VSIGINIT DOC Y 0(SIGS Z+7&README 1ST Y VMODULE 1 Z MESSAGE ISAZ  MESSAGE DABZ:*MES .BBS Z#BBS% -DAT Z0 SIGS Z,CSAGE ISBZ #"! JFrontier Transporter [A]scii/Ansi/Atascii toggleR x[P]rofile of You! [B]ulletin reprint [Q]wikscan messages [D]ownlink a file [T]ime online [E]mail [U]plink a file [F]ile directory. I[X]current indeX [G]oodbyeN.Nc [Y]o! for SysOps [I]nventory of files [Z]ip to message menu [L]eave SysOp mail [*]Database menu [O]nline games menu  [+]Add a BBS to list 6 I[?]Transporter C %&'% " ( ,LҠҠ kp   ˠ̔ڠ Ftascii/Ascii оrofile of you!¾Read bulletin Ѿwik-scanL nľownlink a file Ծime onliner žmail (private) վplink a file ƾile listing ͼ־oting Booth Ǿoodbye... ؾcurrent index ɾnventory list پo! fwor Sysops ̾eave us mail ھip to messagesϾnline game MenuLibrary Menu þrewmember list Add a BBS|   TRANSPORTER Menu )*+,-." CG \̈́Frontier Transporter͢<A>tascii/Ascii/Ansi toggle<P>rofile of You<B>ulletins<Q>uickscan Message Bases<C>rewmember Listing<T>ime Online<D>ownlink a file<U>plink a File<E>mail<V>ote<F>ile Directories<X>Current Index<G>oodbye<Y>ell for Sysops<I>nventory<Z>ip to Message Bases<L>eave a message to Sysops<+>3mAdd a BBS to the List<O>nline Game menu<*>Data Base Menu<?>Main Transporter Menu.  012 JFrontier Transporter [A]scii/Ansi/Atascii toggleR x[P]rofile of You! [B]ulletin reprint [Q]wikscan messages [D]ownlink a file [T]ime online [E]mail [U]plink a file [F]ile directory. I[X]current indeX [G]oodbyeN.Nc [Y]o! for SysOps [I]nventory of files [Z]ip to message menu [L]eave SysOp mail [*]Database menu [O]nline games menu  [+]Add a BBS to list 6 I[?]Transporter 4 New user menu (A)tari/ascii toggle (B)Read bulliten (G)oodbye... (L)eave Sysop mail (T)ime (U)plink a file (Y)ell for sysop (Z)ip to messages (*)Library (F)ile Menu (P)rofile of you 6C New user menu (A)tari/ascii toggle (B)Read bulliten (G)oodbye... (L)eave Sysop mail (T)ime (U)plink a file (Y)ell for sysop (Z)ip to messages (*)Library (F)ile Menu (P)rofile of you 78 New user menu (A)tari/ascii toggle (B)Read bulliten (G)oodbye... (L)eave Sysop mail (T)ime (U)plink a file (Y)ell for sysop (Z)ip to messages (*)Library (F)ile Menu (P)rofile of you : New user menu (A)tari/ascii toggle (B)Read bulliten (G)oodbye... (L)eave Sysop mail (T)ime (U)plink a file (Y)ell for sysop (Z)ip to messages (*)Library (F)ile Menu (P)rofile of you <=WELCOME TO FoReM XE "Professional"The FoReM sysops have again gottentogether to make the best BBSprogram even better. You will findthat the board is even more userfriendly in the message bases anddatabase and Ymodem/ymodem batchprotocols are available.@?CHFoReM XE Professional System 󠛛Computer : Atari 130XE w/128kV nor 800XL expandedDrivesr : Minimum 2 Double sided floppy drives or Hard driveModem : Hayes CompatibleInterfaces: ATR8000, MIO,@d BTLProgram : FoReM XE Pro ver. 4.8Printer : Not RequiredLanguage : Basic XE CartridgeiiBVTHIS SECTION WILL BE UPDATED SOON.Please make another selection.Gateway City BBS` {314-647-3290Final Frontier 215-624-6347 DEF%L͠Š󠠠XeqWithin the Profile menu you have theability to set page break length. Thebest option is usually 22 or 23. Whenentering the database you'll be askedif you want to use pagebreak. Answeryes. This will stop longer files atone screen full of text for easierreading. If you intend to capturethe database file and read it offlineyou should answer no to pagebreak.Some database files are stacked andthe letter D will follow the number.It is important that you type the #and the letter d to get into the submenu. Hitting return will usually getyou back to the Database select menu.HC%L͠Š󠠠qޛ10 Database Help11 Messages Help Entering12 Messages Help Reading13 Profile Help14 File Area HelpIJKLMNOPQRS%L͠Š󠠠UfqWhen entering a new message you mustbe in a current message base and usethe S to send the message. You willbe asked to enter a topic and to putwho the message is to. A return willresult in a message to ALL.When entering a message only use thereturn at the end of a paragraph. Thesystem will automatically word wrapand will adjust the line length of amessage to what a user can read. Thismeans 40 column users can read themin 40 col and 80 column users in 80and anywhere in between.When entering the body of the messageyou can get help by typing /? or /hat the beginning of a line. FoReMhas many excellent editing commands.You have the ability to insert ordelete lines from a message. You canmove to a line with an error with /gxwhere x is the line number and corectthe error with the /c/ command.example:5 This line has an eror./g5/c/eror/errorin this case, eror will be replacedwith error in this line. Beware! ifyou choose a string within a wordlike (place) replace you may createa new mistake by accident.Anytime editing is done always usethe /b for go to bottom before savingyour message, otherwise the messagewill be truncated at the line youedited and the rest of the messagewill be lost.When you are ready to save youryour message, start a new line andtype /s and hit the return.Replying to a Message:When you read a message you wish toreply to use the R for reply at thecmd prompt. You will be asked if youwant to use the same subject. Hittingreturn will keep the same subject orN for No will allow you to change thesubject. After that you can enteryour message as explained above.If you wish for your repGly to be readonly by the person who entered theoriginal message type E for email.Your reply will be left in email anddelivered to that person the nexttime they log onto the system. Youwill be able to continue reading themessages after entering the Remail.This is useful for private messagesand leaving phone numbers or otherinformation which you do not wanteveryone to read.If you mess up while entering amessage you can hit the /a to abortand get out of the message entry.Remember: If your system crossnet'smessages with other FoReM XEP boardsyour email will never be delivered tothe other person. C-Net messages areindicated with the bbs name withinthe message header in a line underwho the message is from.UVWXYZ[\]^_%L͠Š󠠠TdqOne of the strongest features of theFoReM Bulletin Board is the messagearea. The system has been designed tomake it simple to read and reply tomessages.Within your user profile (P) you havethe ability to mark the message basesyou wish to read. This will tell thesystem to skip the bases which you donot have an interest in.From the READY prompt you may alsochoose a message base to read bytyping Z. You'll be shown a selectionof bases with numbers. Choose the #of the base you want or A for all.When you get to a message base youhave the options to (R)ead,(S)end,(Q)uit or (C)ontinuous Scroll.The read command gives you additonalchoices of + for forward from start,- read reverse,N to read new or rangelike 15-30 to read messages 15 to 30.The FoReM program remembers the lastmessages you read and reading newwill start where you last left off.When in a message base, hitting M atthe cmd: prompt will take you back tothe main section of the bbs.You may also read all new messages byhitting Q at the READY prompt and youwill be taken through all the messagebases. If you have chosen bases forquickscan in the (P)rofile it willGskip the bases you did not select.While reading the messages you aregiven several more options. Theseoptions can be called up by hittingthe ? at the Cmd: prompt. Hitting+ or - at the Cmd: prompt allows youto jump a user selected number ofmessages.[ If you have not called forsome time you may want to jump upto newer messages (+50). If you gotoo far you can jump back (-25).You will notice Ref and Rep numbersin the message header. Ref is themessage being referenced and Rep arethe replies already sent about thecurrent messages. The < will read thereference message and the > will readall replies. When completed you willbe returned to the current message.This command can be used 3 deep toallow you to read a string on thesame topic.If a message has a topic the same asa filename of a file uploaded to thesystem you can use the Q to quickdownload the file from the message.After you have downloaded the fileyou can continue in the message area.Many commands in FoReM can also bestacked. Typing Z/2/R/N at the READYprompt will take you to message base#2 and read new messages. When youhave finished base two you can typeZ/4/r/n to read new messages in base4 and so forth.There are several other options andyou should feel free to try them out.abcdefg13%L͠Š󠠠TeqEvery user has the ability to look attheir profile on the system and theyshould set several things in theirprofile to their liking.You can change your password, phonenumber and several other features ofthe board at any time.Setting clear screen on will clearthe screen for each new message. Offwill scroll the messages off of thescreen.Line length should be set to 38 or 40for 40 coGlumn users and a length of78 is suggested for 80 column users.Setting Page break to 0 turns it off,setting it to 22-24 will stop at eachscreen full of information. Settingthis at a low number like 1 or 2 canhave some disastrous effects.Time displady on will show time on andtime remaining after every message.If turned off, it will only appear inyour last 5 minutes on line.Line numbering on will assist you ifyou will be editing a message thatyou enter.Pause at message base for entry is agood idea. Saying Yes will allow youto enter a new message before goingon to another message base. You maynot remember to come back and enterthe message later.Quickscan select allows you to skipmessage bases that do not interestyou when using (Q)uickscan from theREADY prompt.User Statistics (X) is called up fromthe READY prompt and shows statisticssuch as number of calls, files upload/downloaded and an index. an index of9.999 is the very best and .001 thevery worst. Try to keep a good userindex.ijklmnop14&M͠Š󠠠UcŠrWhen you wish to look through theFile Section you can type F to get alisting of the filesigs up fordownload at your user level.You can pick a filesig or you can usethe S to search for a file name or apartial file name. Searching for 'for'may bring the files FOREM,FORMAT, orFORM.Whether you choose a filesig, all orsearch, you will be given a file listIf the list is longer then a screenyou are also given a prompt line.Once in the filesig, you will be shownfilename, file number, length of file,access level and a short description.If you choose lag in the file area,this means that you are going to useYmodem batch as your doC wnloading protocol. You may choose up to 10filenames for batch downloading. If you select download at any time afterselecting files, the system will ask one more time for a filename and thenit will start the batch download. Just go to your termÑm program and select download - ymodem batch - and sit back and watch the modem lights..You have the following choices indownload protocol: A - Ascii X - Xmodem/Xmodem(CRC) Y - Ymodem B - Ymodem BatchAscii should be used only for asciitext files. This protocol has noerror checking and any other filetypecan be corrupted.Xmodem or Xmodem CRC are normallyavailable on most terminal programsand is the standard protocol.Ymodem is a quicker protocol thenXmodem unless the file is very shortor you have a lot of line noice whichcauses numerous retries.These protocols only work if yourterminal program is capable ofhandling them.If you do not have sufficient timeremaining for the download you willstill be allowed to download hoDweverthe extra time will be deducted fromyour next days access. rst%*'*3 ;BulletinJ M**R gFoReM XE Professionalp r**Welcome,You have logged on to a FoReM XEProfessional Bulletin Board System.Features which this boarÂd inclues are Multiple message bases (up to 20) Message referencing Message Network with other systems Download Protocals Xmodem CRC Ymodem and Ymodem Batch Online GamesAnd much, much more. We hope youenjoy the system and if ypou have anycomments or suggestions please callThFinal Frontier 215-624-6347 or Gateway City 314-645-7750C vwxv%*'*3 ;BulletinJ M**R gFoReM XE Professionalp r**Welcome,You have logged on to a FoReM XEProfessional Bulletin Board System.Features which this boarÂd inclues are Multiple message bases (up to 20) Message referencing Message Network with other systems Download Protocals Xmodem CRC Ymodem and Ymodem Batch Online GamesAnd much, much more. We hope youenjoy the system and if ypou have anycomments or suggestions please callBob's Binary Shop 314-946-7907 or Gateway City 314-645-7750z{Ǜ F-net processing is currently active. This time is reserved for transferring messages between BBS systems. During this time only other BBS systems are allowed to logon. F-net should be complete by 5:00 Central Standard Time. Thanks for calling an-d please call again after F-net completes.}~Ǜ F-net processing is scheduled to start at 4:00 AM Central Time. Your time limit for this session was lowered in order to allow F-net to start at its scheduled time. The remainder of your daily time limit can be used after F-net processiC!ng completes (approx 5:00 AM).  ͭР"#* c1 - Murder by The Emperor ǛA PASSWORD IS REQUIRED TO ACCESS THISSYSTEM. THIS IS DONE SO NO ONE CANLOG-ON WITH YOUR NAME AND READ YOURPRIVATE MESSAGES.TO OBTAIN A PASSWORD PLEASE ANSWERTHE QUESTIONS ٮTO SAVE YOUR PASSWORD FOR FUTURE USEYOU MUST ANSWER 'Y'es TO A PROMPT ATLOG-OFFUNTIL YOUR PASSWORD IS VALIDATED YOUWILL HAVE ONLY RESTRICTED ACCESS ONTHE BOARD. I WILL TRY TO VALIDATEALL NEW USERS WITHIN 48 HOURS OF YOURAPPLICATION.Please use your Ԡ namePlease use your Ԡ phone #Thank you fsor your cooperation.If you do not wish to log on at thistime, please type the word: OFFin place of your name.õIf you would like to help out anddesign an ascii graphics for ouronline poll just leave a messageto the sysop or feel free to uploadyour artwork. Any help isappreciated. Gateway * ShoeC%*'*1 ;Vote IssueJ M**p r**Not really a vote issue but somethinghad to go here for the new system so,The question, do you own aní AtariComputer?Vote [F]or if you own an AtariVote [A]gainst if you own another brand of computer.Let us know what you think of theFoReM XEP bulletin board system. Your Sysop You have reached a::ell was recorded.It is only necessary to ell once. If Bonnie or Clyde is here,one of us will beam in as soon aspossible.% Please show your support to these+ Vother fine local BBS'sStar Fleet Command\ s215-289-5247Sector One 215-673-8384 Other FoReM XE Professional systemsGateWay City 314-647-3290Atarian Domain 407-855-1317 Blank Page -201-805-3967Boss BBS= R713-473-1967Bungalowb {314-351-2837Upstairs BBS 219-262-9633Atari 8-bit ': 125 Atari ST1 U: 12Apple II and II+ : 12IBM pca m: 12Vic 20y : 12TRS-80 : 12If you dont know, then use 155. C0Z19001Bungalow - St. Louis Mo.19002Gateway City - St. Louis Mo.19003Blank Page - S.Bound Brook NJ19005Final Frontier - Philly Pa.19006Atarian Domain - Orlando Fla.19007Subway BBS - New York, NY19008Boss BBS - Houston, TRexas19009Network 23 - Houston, Texas19010Upstairs BBS - Elkhart, IN29001NNMOSLO` b12jXxY29002NNMOSLO 12X29003NNPIJER 12X›29005NNPAPHI 12XY29006NNFLORL 12XN29007NNILCHI 12&x329008NNTXHOUA C12KxX29009NNTXHOUf h12pxy29010NN`abcdefghijklmnopqrstuvwxyz{|}~cdPWCRETSBBXLAZLBAULTIAUPPATHSEDENSITOUTTDTIBATCMODEMANFFBSBFILETRLFSIGPATHTNUNUZSYUSSINSDGLOBSIGPCLOCHOLDFSESUBJNICKUPUPARWKWKNAMETIBANSFLASEARCLLLBYTDLTBPDLTDLTSIZERBAsTCCSIYLOOFOUNTFILETSIZEXTSETBYTFNUHNULEVESUBXTDLDLDOWNCOLBRIGHVT5TDEDITSCRLTERMBPSMz|  "$*,34;<BDKLST[\bdklst z|!"#$%&'()*@+,ܐ-./012 345#$6*,7248;<9BD@:KL;STkl?st@{|ABCDEFGHIĐJKLMNOPQR STU#$V+,W24X;GAME g11ߛߛߛߛߛߛ ߛߛ2#',SYSOP; @SYSOPO Scnetm 10/17/8912:12 AM3This is to make sure Email is working correctly.CP*#\,:RANDY PHILLIPS@ JANNA MASONT aSupreme courtr 07/26/89 7:25 AMbWhat a guy! Always willing to lend a hand.Hmmm, maybe 'hand' is the wrong word.*Anna* :)e other way on any subjecqt you want to discuss!! I think that a murder charge for abortion is not out of the realm of possibilities(i.eu.the heart was outside the chest wall and some other organs were outside the abdominal wall). She could have carried the baby to full term, but it would have died OR the mother was also at risk. This was to be her first child and so she decided on an abortion and to try to get pregnant again. ...My whole point in this is to show that no one knows what they would do in ANY situation unless it affects them. Pro-Choice is the only solution. I believe she was in her 19th week.*Anna* s more productive than waiting until the kid's born deformed and THEN sending mommie to jail and the kid to the hospital for yo many years. >>JOAN<(} Y Yccdio Sysopt v||iiXXXXC223PUBLIC FOREM #CNET CHATTER' d0110000000000000000000000001ݳ}22.0242.0240000001220000105000000000000000000000000010500000000000000000000005050505050505050505050505050505050505050505050501029010200000000000000000000<@8 6,4*(. 1$4=F (}$d%%:MS]n Aag Akr%%v򏠙!@w!6-6-?:A<A,@F:Ad,AU%)@/ AP2=6@ A4@5F:AG,*)@9h4 APXF:AV, A=' Alv56-%@zA!@K A0N=X A"@ I?(Doorway closing in +@&,$@ seconds..I A 6.>:,$,%%)2\-[ RESET_COLOR1 6.Afbk6 Ao"AU($JE;+ @'*@*@$,)+!A(* AU,E AOR1++"@)"A&,)+"A'*(,,*3;(~ ~.H67B:,,.R ATI +"AV)"@$2@,*31-@DB:,;(~ ~? I AY" 0~6.=B:,""$ch (r "B:,$= A%%Ҡ(A5L A0-@@H     øLXCRFILEPCPCODENODENAMENODECALLNODEMSGBMSGIDXFBASEPOSTSIZEHZBPAROPTNREFMSIZMNBBBBNARCODWKWKBBACTIVAREFBRREFMSREPLREFRERLORHIGRPOINMAɀрـ  @ @ @ !@ ')@/189?AHIOQXY`ahipqxy !"#Xw_GVS@@GC0 Version 4.5 as of 18 September 19896-@ 4J 99;A`,;@NU,;@Y`,;@dh<@ lx,77;@#|,;<@0,;<@@,;<@T,99;A8 ,;@)<@,9@R,9@&,999@',9@$,9A,;A <@!,#6-@%T$A$;,(C6.>:AU,$AQ@2Xs9>A8^:AR,C Aw~X%%因b--@@ D:CONFIG.DATl@;$@,v$$@8@,8@ ,?-@$;@(07$@48&@<B<$@FT,? +-Z^@'bi'@m8,+ E-@@(%67Y,.AD@C:7Y,,@E 1-A! A1@8, @ $%% (39@7>9@BF@JLRl D1:CONFIG.DATf*(@pz8@~,8@,8-@b(@7$@&@<$@,f +-@''(@8,+ 7-@@( 3C@"C:7Y,,@&37 +-9HA'(@L_8,+ @c$ %%加*F-@8,<67@Y@<@,.=:,F A04\@5@@7@ Y,A6-D'N A&Y@*<\$>  6-@@F AJT $%%Xmq|\@5@@7@Y,@67,. J A \D@C:,D A6-^:AV,-6.7@<,8@ D6-XX6-8@#8%,&+^:C:7B:,,,&@<G,%F:C:7B:K,d$BU6%^:C:7B:,,,&@h{,,''6-&++8@9%,$A,%8,, @%6-%^:C:,%@,4B:,!@C6.7@,c68@,-8@,&@o6-@7y A %|==A (Pre-packing Base A(@;[Pre-packing Base L*@_c@giou7@yY,867Y,.L6-P:B:,'@,?-@?6-?:Av<@!6-^:C:,%@$&@,,67,. >D@/C:,\#6-?:Av<@3D<@BN,,+6-&ARc~ 67Y,.7@g, A+6-A:7@<@,,+6-&A 67Y,.7@, A+6-A:7@<@,,+6-&A 67Y,.7@,  A467@$,. %67@#(5,. 467@9E,. AIP@TkaF:A,;@os@ wy D1:USRLOG.DAT><^@@P:a=$$ƭؠ66-#-@&268,- 6 . A&6-%@*R!!+ A!.=j A 967@VjY,.D1:CNTI=:%An},.DAT`@@7@Y,j A*-@R&68,-* ' 6.7Y,'6-A:7@<@,, l-@?6-A:7$@%@#)<$@-1%@5H,,h68,-A:7$@LP&@TZ<$@^o,,l 667@s~,.  A!6D@C:,@ D6-^:C:,%@,"67,. DD@C:,%@&@*7 A6-^:C:,,-688,,-88,,%7 A p4" A")@-B" A >D-@FJ@&NW&8,]w)'3 A!6=: D A@{CD-@@&&8,"0 A!P3=D6.>:%@d,Hf#67@Y,. D1:MESSAGE.IS- A1V(@Message posting abortedY'c A"0f=R[#67@4PY,. D1:MESSAGE.DA[67@TXY@\`<@dk,.7@osY@w{<@,\ A f p6-z. A6-%@!!+ A0.=j A!p967@Y,.D1:CNTI=:%A,.DAT`@@%+7@/7Y,j A;D*-JN@RR[&68,-a~* ' 6.7Y,'6-A:7@<@,,l-@?6-A:7$@%@<$@%@,,h68,-A:7$@&@<$@,,l 6 A $p67@,. 6D@!*C:,@.@D6-^:C:,%@DW,"67,. DD@[dC:,%@hn&@r%^:C:,,"8," A$%=%8,"" A"p%=U@5@@7@Y,JC@C:C ,B:,U@68 6,-^:C:,,&6-88<J,,&6.>:%@dNZ,c#67@^xY,. D1:MESSAGE.IS- A|1V(@Message posting aborted` Ac=[#67@Y,. D1:MESSAGE.DA[67@Y@<@,.7@Y@<@ , Q*@@#%+17@5SY,567,. ? A# QD@WgC:, O Akq"c:w,A6, A/=>6-^:AV,O6.7@<, 5@5@@7@Y,$ 11(Posting %A to Message Base . <B:,"%.!68,-4j/67Y,.9 A$<=8 68,-^:C:7B:,,,&@n,B II6-^:C:7B:,,,&@,%F:C:7B:,$BU6%^:C:7B:,,,&@,L @6-P:'BU6,067Y@<@,.>:,@6-&$BU6V @6-P:'AV,067Y@<@"E,.>:,@6-&$AV` 67Y@IM<@Qb,.>:,j C#68@fm,-8@qv,%@z768,-8,%@C>C:,8,t 5#6-?:Av<@:%@dir,.!@&v|8 A@;=J8,"T A0 W= -#67@Y,. D1:MESSAGE.IS- A [#67@Y,. D1:MESSAGE.DA[67@Y@<@ ,.7@Y@"<@&1, Q*@59@=?EK7@OmY,567,. ? A0`QD@qC:, O A"c:,A6, A/=>6-^:AV,O6.7@<, 5@5@@7@Y, ")"(Threading Message Base  &-@-VA "67Y,.&  %6-P:B:,'@Zc,%-@gt& u&67@)xY,.7@$&@,L6-?:Av<@67Y@<@+,.B : -@/<D u&67@)@HY,.7@LR$&@Vi,L6-?:Av<@muC:7@,,/'9 A2    3>C:7@,,3>C:7@,, A)6-?:Av<@C:,%@%@$ Q)6-?:Av<@ (Error c:&, at line c:@*?, in FNETPOSTH A@C_ D:FNETPOST@@@* !"#$%&óLXCRFILEMSGPMSGIDXFBASEHZBPAROPTNREFMSIZMNBBBBNARCODFNODFPOFMASOPOOMASFBASAREWKWKWMASMSGSTARNODECALLPCPCODENODENAMENODEMSGBWKMAĀ̐Ԁ܀@@@ @   #$*,34;<CDKLST[\cdklst{| !"#XP_VS@@_ VerCsion 4.5 Create Outbound Packets as of 12 September 19896-@ G] ..;A`,;@ah,;@lp<@ t,77;@1,;<@0,;<@@,;<@T,..;A8 ,;@)<@,9@&,999@',9@$,9A,C;A <@,#6-@":$A$;,( A>EX%%L\bmb--@qu@y{ D:CONFIG.DATl@;$@,v$$@8@,8@,?-@;@7$@&@ <$@ ,? +-!%@')0'@4H8,+ E-@LP@(Ti%67Y,.AD@mzC:7Y,,@~E 1-A! A1@8, @$ %%*F-@8 ,<67@Y@"<@&@,.=:,F A04\@DK5@OS@WY_e7@iqY,A6-wD'N AY@\$>  6-@ A $$$ͮՠ A Ak AF:A,E@@ "< D1:USRLOG.DATH<h@@D@HJPbP:k=00@fj@npvD1:FNETPARM.DAT0-@,67Y@<@,.N0 $ A @ 6..B8[0123<<,AAAAB A'86.7@+E, A`BB%6-A:7@IM<@QW,,&A[i867Y,.7@m,B A`LB%6-A:7@<@,,&A867Y,.7@,B A`VB%6-A:7@<@,,&A867Y,.7@,B A``  A eN-@$,7Y@(,<@0?,0NG67Y@2CG<@2Ka,.YJ=N j;@el;@pt@xzD1:FNETPARM.DATt(@0~$-@$B:7Y,,!,%(@1=:%A,7Y,(=, $-@$B:7Y,,!@$,%(@(42=:%A8Q,7Y,(=, $-@Ud$B:7Y,,!jt,%(@x3=:%A,7Y,(=, -@#B:7Y,, @ A`#=6-%A(((Building packet for F-net ID ;(@;(@KBuilding packet for F-net ID 6-&AOW6-@[f.8!@jt6-&@x+6-%@.9&&6-P:@#+@&,%?P, &6-8@,&A&6-@.8!@6-&@+6-%@.9&&6-P:@#+@$&,%?P(2,(((688C,-A:7Y@GK<@O\,,2-@`d8j,<2.68,-A:7Y$@&@<$@,,2 F A P Z A0$$l@w!6-C E67@.Y,.D1:CNTO=:,.DATl@26@ :<BH7@L[Y,-6-%@_g !8m,* A"-= 6-8,6.>:%@d,##(Processing message base ++(@Processing message base  C#67@Y,. D1:MES!SAGE.ISC67@2Y,. D1:MESSAGE.DAU A6AH(@EMErrorQ. Message base 8, not foundR A U= ;;67@Y@<@,.7@Y@<@,*Q*@@7@Y,567,. ? A!QD@C:,4A A06-^:A 6,-6.7@4F<,A6-P:B:,'@JU,>5@Y`5@dh@lntz7@~Y,H&-@A "67Y,.& R6-^:C:,,\-@fu&67@)Y,.7@$&@,L6-?:Av<@ :,=6-@:7@ %,,6-W=67@ %<@ %,.>:,A)6-?:Av<@C:,8, A"`L67@59<@=K,.7^:C:,%@OV,&%@ZeY, AipC@tC:, @ A @$ $$Π /@@$@/@@ ;F:A,&(Returning to BBS56-?:A`,8=;(#$$FV\g2#C9(@kxError c:~, at line c:@,C A0 D:FNETPREP@@@@()*+,-./0123456789:;<=>?@ABCDEÍhhnMSIZMLXCRFILETOUTLICONNECFNODFILESIZMODEBSSWKNODECALLPCPCODENODENAMENODEMSGBLOCKOURECYCLACTIVMAMAX C '(.068>@FHOPWX_`ghopwX[GVS@@G Version 4.5 as of 12 September 19896-@  R6-@$A$R;,;A`,;*@ ,;@,;@ <@ $0,77;@14=,;<@0AJ,;<@@NW,;<@T[z,U6.>:AU,$AP6AQ@2K>A8^:AR,U Ad%%ՠn=@F:AG,*)@4 A7<:$==%%07A6-GQ'@U{F:AG,' A@36-%@"#6-AV&$)=3 A (6-A6-()@ 6.>:,$,%%1 6.6 A["AV$=Y."AU A=$6.. A%%cmx A8@6@F:A,R:`@4@A@R:@@R:@8@ @2/R:@@3G3+F:AG,X@KN,"TZ= A^j@=.+@@ns@wyR:.$%%-@A % A @" A%$$$#26-@'4(} A8F2AP@JaaF:A,;@ei@ mou D1:USRLOG.DAT><^@@P:a=d(Transmit F-net IDd.Ġұ"6-A0$ A(@"6-A:,)APFa)( F-net ID is $$fv}h6-A0 Ah.򽽽ĠӱB:," A##6-[< Ready to send<$3,%( A7Y=6.7,%(6-A:7@]s,, T 6.=:,-67@wY,.D1:CNTI.DATT@@7@Y,lAP@+(Ready to receivel..*ĠҲ h6-A.4 A8;hn.ĠӲ*EAP66-[<modem Protocol<,;(E A4)6-@)(Recv=> 7&@,>9AfC !6-@-6-"*96-@g.7H@w;=CNRH-@RV@Za$*@eH(Info=> Getting block /\I56-?:AT<@<A:F:C:,%&@;Q,,-6-&A(7 A#U[A A_kR6.7%@o,^6-A(h A! z0 (/"@'&6-@0 A! E#"@*"@*"@!/6-E(Switching to chk M%*"@ *"@*"@! &16-,SM(Switching to Xmodem-chk0"@Wj*>:,4&6-%@n0 A!@#"@*"@# A# z@)"@!@6-?:AT<<@`<A,l6-@!%@F$+*"@* @&,p z A"@'++@*0)@4:)"@>PA#B*@TX@\b Af|<67,.>:F:C:,%&@,,B6-W6-@:7,, A(--&A'%9@:7,,"= M6-&A(%W A"' A# A#0 _ AP6-?:C:'hhh" GhEhDhIhH B Vԩ`,<@K[ Packet received. 88(@YInbound messages received -  bytes3 7 6.=:,-67@]Y,.D1:CNTO.DAT7 A#e8 n@5@@7@Y,d@9@@7@Y,n A#p= T A@ ?@ @ #7@'0Y,J@4GT A#UB B AKB6-F:Ab,$BU6%F:Aa,$AV%F:A`,L eAP@;(Send=> Ready to send  bytese.ĠҳV AP $$3 ""6-?:AT<@7;<AT?K, ,@gOV"*@Z^@$b, A3@ @ A1 A#!@6*@@$@ A3@ 6-6-@ I@wI6-A(%A$+"@* B:,&A$%+(,, ;-@#@'`;(Info=> Sending block / WC6-?:AT<@dh<ATl~:,L  6-@$ $ (Transfers Complete Y A6- A@4@"A((5R:U-@9=AANY  C+@4RW@[eAkxR:?-@|AC  [ A A+-@A/ C(@ATH1 W-@A[  0 A@H# A2&=0 A G7@".Y, 88(@2KOutbound messages sentO e-  bytes A@is #(@w Aborted# A$$ͯ: A-@667Y@<@,.N: ;@;@@ 9D1:FNETPARM.DAT AA0@=V 6.B8[0123<<\y,A@PA@`A@AA}B A@06.7@, A@0+6-A:7@<@,,+6-&A 67Y,.7@, A@0+6-A:7@<@ ,,+6-&A* 67Y,.7@.H, A@0+6-A:7@LP<@T`,,+6-&Adu 67Y,.7@y, A@0467@,. %67@#,. 467@,." A@,,6-&A,67Y@2<@2,.N-#(F:A, AAP=.6-)1-@5D/+7Y@HL<@Po,0O( AAE+=0-7Y@2sw<@2{,4Y*6-@-=1 600@@D1:FNETPARM.DAT@(@0J$-@$B:7Y,,!@T,%(@ 1=:%A5,7Y,(=, ^$-@9J$B:7Y,,!@NXh,%(@\h2=:%Al,7Y,(=, r$-@$B:7Y,,!@|,%(@3=:%A,7Y,(=, @$$/E#D@ @$@ '/@+((If Not Peek(1590):Goto 5020:Endif88If Lockout:? ;"Returning to BBS":X=Usr(1560):Endif% D1:FNETPOST(#$$򠭠2#$@@$@<#GG(@Error c:, at line c:@P, in FNETRECVF#(Returning to BBSP#@T6-?:A`, D:FNETRECV@@@hGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxLXCRFILEIDXHZBPAROPTNPCPCODENODENAMENODECALLNODEMSGBMSIZMWKTDELATOUTLIBAUALCONNECNBBBBNARCODRECYCLACTIVTRYCNABENFILESIZMODEMODEMSBSLOCKOUWKMAMAXԀ܀@@@   "$ +, 24 ;<CDKLST[\cdklst{|̀ !"#$%&' ()*#5X\o^VS@9=@A^ Version 4.5 Active Packet Transfer as of 26 September 19896-@  mm;A`,;@,;@,;@<@ ,;@)<@,9@',9@$,9A,77;@1,;<@0(,;<@@,5,;<@T9E,6-@Ix$A$;,(C6.>:AU,$AQ@2|9>A8^:AR,C AZ-@ $d%%נn=@F:AG,*)@4 A7<:$==%%!29C!@wGIOU!6-[e'@iF:AG,' A@:6-%@!#6-AU- AP0=: A (6-6-@0()@"@6-AUC 6.>:,$,%%(2>16-A@BR6.6# AV"AU# A0@ 6. AJB:,!T-@B:,^67<,.>:@:7,,XA',h  =6.$%%M W A /@6@ $*5R:W@49>@BLA@RaR:G#@ei@mouR:G@8@%R:O@3+F:AG,X@,"?6-I A L=O=.+@@@ "R:.$%%*5?K-@OSAWo % A @sy" A}%$X%%夠b--@@ D:CONFIG.DATl@;$@,v$$@8@ ,8@ ,?-@$-;@197$@=A&@EK<$@O],? +-cg@'kr'@v8,+ E-@@(%67Y,.AD@C:7Y,,@E 1-A! A1@8, @$%%)1<9@@G9@KO@SU[u D1:CONFIG.DATf*(@y8@,8@,8-@b(@7$@&@<$@,f +-@''(@8,+ 7-@ @(3C@+C:7Y,,@/<7 +-BQA'(@Uh8,+ @l$ %%哠*F-@8,<67@Y@<@,.=:,F A04\@5@@ 7@ Y,A6-$D'N A(/Y@3E\$>  6-@IO AS] $%%crzW6- AA@4@A(R:M6-AW @A+@4@AR:76-A A @ J6-8@$+,4@6/4@8<BOR:@6-ASYJ @]fU Ajp At|#6-A- @?(@+++K6-AU @*(@ATH *Hang up (on hook)S A&7@<@,000 A 3=?6-A0!I @%+S A/<$$$BOXbO Afn6-@2rx%6-~3AQ%EAPO A : A-@667Y@<@,.N: ;@;@@C 1D1:FNETPARM.DAT A @5N 6.B8[0123<<T,A@APApAB A 6.7@, A +6-A:7@<@,,+6-&A$ 67Y,.7@, A .+6-A:7@<@V ,,+6-&A"8 67Y,.7@&@, A B+6-A:7@DH<@LX,,+6-&A\mL 67Y,.7@q, A V467@,. %67@#,. 467@,.` A@jaF:A,;@@  D1:USRLOG. DAT><^@@!2P:a=D6-8I7F:A, @M\)F:A,!@`fA A jxD=-@|+7Y@<@,0R( A`+=-7Y@2<@2,4Y*6-@-= 6-'A@ ($ A '={@%.@)-@139DZ:V@3HM@QSY[amZ:c)@qzp)@~{@ 6$&8@,"@* @ 6A@''(F-net waiting for inbound nodes*(Returning to BBS'6-?:A`,*=$$15C$6-%@GS!! APWg$=+7Y@ko<@s,0O( A +=+7Y@2<@2,0Y( A +=76-6-76-A:7Y@"<@#,,a6-@"@$ '6-@*=6"@#B6-)2E=O A6BaAPHf ""( Calling node %Ajw+7Y@{<@,0Y( A#P+= (Dialing Telenet Access*i"@9(@ATDT7@<@, <<f(@ATDT7@ <@(, i=4.-@,0@4:! A>Y.(A >/[<3<_i,'" A ms, A w/=HC%[<1<,)[<5<,('2 A!05=9 C A RO6-A @)(@ 56-A? @O(@ \.-@@#)! A-K.(B f@[<TERM<Ql,'% A!`(=, 6 A pv@ A zp(@D1 z.-@@! A.(C =[<@<,'" A!%=) 3 A = A &&(Dialing 7Y@<@*,__(@.=C D/7Y@AE<@IV,/7Y@"Z^<@#bm,,7@qu<@$y, .-@@! A.(D D[<PASSWORD<,') A"0,=0 : A D A &&(@C7@% <@0", .-@&*@.4! A8[.(E E[< CONNECTED<a|, '* A"`-=1 ; A E A ,6-A @,(@ATZ .-@@! A.(F >[<OK<,'# _A"&=* 4 A > A "=@( Dialing BBS@(@APATDT7Y@TX<@!\m, .-@qu@y! A.(G  @[<BUSY<,&(.Busy)'3 A = A @= D[<NO CAR<,*( No Carrier-'7 A  A A (D= C[<CONNECT<.I,'( A#@+=/ 9 A MSC A Wc$ ( A$gp. 5 At{(@AT +6-A5 @8 b-@@! A:7@<@,40='G A#pJ=N X A b A B 9 A #(@)ATS6=5 /6-A-39 @7BL b-@FJ@NT! AX`:7@dh<@l,40='G A#J=N X A b A V 9 A9(@ATDT,7Y@<@!, ` .-@@! A.(H j /[<3<,'" A "(, A ,B/=o 4[<NO CAR<HR,'' A V\1 A `v4=t *[<return<|,'' A$@*=y +[<assword<,'( A$p+=~ D[<Auto Log<,') A$@,=0 : A D A   A (@ .-@#'@+1! A5U.(I  *[<return<[,'' A$@*= C[<assword<,'( A$p+=/ 9 A C A  ##(@7Y@$<@', .-@@! A.(J  A[<phone<",'& A%&3)=- 7 A 7=A A AK ##(@OW7Y@([_<@1co, h-@sw@{! Ah.ώĠұ D[<Transmit<,') A%0,=0 : A  D A  %(@$8@(1,%6-@5\ ++(Connected with F-net ID %A`j 55(@nConnected with F-net ID %A $$ A0967@Y,.D1:CNTO=:%A,.DAT`@@ 7@Y,@9#(@,0@46<B7@F[Y, A0  T A_f@jq?@uy@ }7@Y,J@T A0 L AB6-F:Ab,$BU6%F:Aa,$AV%F:A`,L A g-@C@ )AP@bH(Ready to send  bytesg...Ġӱ d AfrAPx,(K d.ѽĠҲ N[<receive<,'( A0`+=/ :@D A hN A  )6-@06.Y)AP@4Q a(-modem Protocola|.ĠӲ 4AP46-?:AT<@<AT, ,@g"*@@$, A20 6 A2@ !@,*@@$!46 A20& 6-:B6-@FO0 ?@wSU[?6-A(%A$+ B:,&A$%+(,,: 4-@@4(Sending block /D WC6-?:AT<@<AT:,L  6-@;A AEN AR] f-@ae@io! Asvf.ƽĠҳ bB:,!@' A3@"=& 0 A X(@Aborted waiting for packetb A $ 88(@(AOutbound messages sentE `-  bytes (7@du, 6-A:7@"y,,$$󞠪V/67@Y,.D1:CNTI=:%A,.DATV@@7@Y,'6-@ 6-'6-@g+Af17 A;D@wHJP[A-@_c@gn$*@rA(Getting block /I56-?:AT<@<A:F:C:,%&@Aa,,-6-&A(7 AB@A AeqR6.7%@u,^6-A(h A@`0 (/"@'&6-@0 A@`,0"@*>:,4&6-%@0 A@6#"@*"@q# AB`@z@$)"@!(8@6-?:AT<>B<@`FJ<ANW,l6-@![_%@Fcl$+*"@pv* @z,p z AAJ'T++@)@)"@ABP^B*@@ A<67,.>:F:C:,%&@,,B6-hWÀ6-@:7,, A(--&A'%9@:7,,"= M6-&A(%W AB r'| AB@ ABp_ AP6-?:C:'hhh hEhDhIhH B Vԩ`,<@@BDJfD1:FNETPARM.DAT(@j{0($-@$B:7Y,,!@2,%(@1=:%A,7Y,(=, <$-@$B:7Y,,!@F,%(@2=:%A,7Y,(=, P$-@0$B:7Y,,!@4>Z,%(@BN3=:%ARj,7Y,(=, d@nn8+F:A,")F:A,"@5 ARP8=x((Returning to BBS(6-?:A`,(Exiting to FNETPOST% D1:FNETPOST(#$$  32#R>(Error c:9L, at line c:@Pe, in FNETSENDH A ioR A s D:FNETSEND@@@C z{|}~zü  LXCRFILEMMSGIDXFBASEFPOFMASTOUTLIFNODAWKWKWMASMODEBSSFILESIZNBBBBNAHZBPAROPTNBBMMSIZOPOOMASSAVESIZHOLDSIZRCODMBASMDRIVMSTARFNODEŀ̀Ր݀@   $% ,-45<=DELMTU\]delmtu|}@@@ !"#$%&'() *@+XXJ V Cross-net Message Setup 99;A`,;@\c,;@gn,;@rv<@ z,..;AP,;@)<@,9@2,&&9@',9@$,9A,#6-@$A$;,(6.>:AU, A X%%'-8b--@<@@DFLe D:CONFIG.DATl@iu;$@y,v$$@8@,8@,?-@;@7$@&@<$@,? +-@''@8,+ E-@@(4%67Y,.AD@8EC:7Y,,@IVE 1-\uA! A1@y8, @$%%庠9@9@@ D1:CONFIG.DATf*(@ 8@,8@&,8-@*3b(@7?7$@CG&@KQ<$@Uc,f +-im@'qx'(@|8,+ 7-@@(3C@C:7Y,,@7 %-A!(@8,% @$ %%"*F-@&*809,<67@=AY@EI<@Mg,.=:,F A04\@kr5@vz@~7@Y,A6-D'N AY@\$>  6-@ A $%%P@ ;@@!'@D1:FNETNAME.DATF@DYP A @*-@]a@2en&68,-t* (@6-A:,(68,-@$$$ A6 A6(#} Cross-net CMessage Setup,( Setup What Base #,6-A:,2%( Number Messages to Send )26-A:,( Message Base >#( Setup for  messages:( Correct (Y/N) >@37@<@,0Y*7@<@,0y= A  @=$$%)U( Processing base 6.>:%@dYe,C#67@iY,. D1:MESSAGE.ISC67@Y,. D1:MESSAGE.DA I A<(Error.Message base  not foundF AI=;;67@Y@<@ ,.7@Y@<@ +, [*@/3@79?E7@IhY,567,. [6-?:Ai<@lp<@t-@H&&67@)Y,.7@ $&@),M<)6-?:Av<@-5C:,%@%8@)B,(=z<)6-?:Av<@FN:A%,36.>:AU,B6.>:A&,n##@@K:$$AR@(,,( FoReM-XE Professional))( 8F-net Control Setup!!(I YFrom--(d Bobs Binary Shop$++(# Insert Data Disk...Press Return.")@"AR$$E A)@E@@"=D1:FNETPARM.DAT A0AH@Le 6.B8[0123<<kx,A @A!|A"A#B A -6.7@,#67@1,. - A 4+6-A:7@<@,,+6-&A> 67Y,.7@, A +6-A:7@!%<@)5,,+6-&A9J 67Y,.7@Nh, A +6-A:7@lp<@t,,+6-&A 67Y,.7@, A T 467@,. %67@1,. 467@,. $$ ( **( 7FoReM-XE Professional ++(A F-net Control Setup ((( 1 - PCP Control Information !!( 2 - F-net Node Names and %%( Message Base Control &&( 3 - Save Updates and Exit ( Select ==>  )@!6-&@H%0 )A@48AP<@ADJ) A0N$$Р(((( FoReM-XE Professional..(" F-net PCP Dialing InformationLL( Phone # (3/12) . 7@<@ ,-7@<@3,LL( Phone # (24) :.A 7@EI<@MX,-7@\`<@d,55( Customer ID # . 7@<@$,77( Password . 7@%<@0,##( 1 - Local Phone # (3/12)!!( j 2 - Local Phone # (24)( 3 - Access Code( 4 - Password( 5 - Main Menu(q Select ==> %)@6-&@H%("9/AA@AAuAAABAB@9 A@,C#( PCP Local Number (3/12) C ( XXX-X =0> 6#B:, @4L AA@#=@267@PW,.7@[d,267@hl<@p|,.J A@O@ ( PCP Local Number (24)@( XXX-X => P#B:, @ AAu#=Q267@,.7@,2C67@ <@,.R A@"ST( PCP Access Code => ^:B:, @Wl AA#=:67@pt<@$x,.h A@r( PCP Password => |:B:, @ AB#=:67@%<@0,. A@ A0$$ƭ*6-@.=((((F eFoReM-XE Professional**(m F-net Node Information,-&%%@ ,( %A 6B:7Y,," (Open* AP`-=6(7Y,   ( (( 1n - Add or Update Node( 2 - Delete Node( 3 - Exit to Main Menu( 4 - See more Nodes(s Select ==> )@6-&@H1'A`ARA0AQ01 AP 06-%@#6-@&=0 APP06$( Delete F-net ID ===>(66-&A4?Z( @CK)!&@OU% APY(=d67Y,.n67Y,.x67Y,. APp$$z9'( What is the F-net ID =>+96-&A( @)!&@ '% A`(=(00(/ IAdd/Update F-net ID %AMj.6.Open!B:7Y,,!p+6.7Y,.=++(# ( 1 - ++(# K6. No Direct Aa 87Y@ <@:,4OH6. OriginateK=/7Y@>B<@F,4R,6.Receive/=""( 2 - Calling Status ... T 6.No Aa 17Y@<@,4YQ6.Yes-7Y@<@,T=""( 3 - PCP . . 6.  Aa@.6.7Y@<@!!9,""( 4 - Phone Num A.e . 6.  Aa`.6.7Y@"im<@#q,""( 5 - Baud . . 6.  Aa.6.7Y@$<@',$""( 6 - Verify Pass . .. 6.  Ab.6.7Y@( <@1,,8""( 7 - Verify Phone 1.< B++(#A U_L!!( 8 - Message Base MappingV++(! Format is ... Local / Remote[*-@@&&68,-* `B:7Y,,"j&( None def ined# Ap"&=t6-A:7Y@&*<@.;,,y-@?T~++6-A:7Y$@X\&@`f<$@j,,6668,-A:7Y$@%@<$@%@,, 6-( -@@& 8, 6-%@((C-U&&(/$(U&&8,((7"@176-=D((I +<4( 7= =  (X$$bM(2(& Select or when complete ==> ?)@M6-&@HlQGAp0AqAq0AqpAr$Ar0ArPArpQ AP(Vv##( Enter name and location,,(# =>t_<=5-@@2(" .6-@56.1)@6.>:,($4. Ap1=: 4!6. +6-&@;4(_7=:=N67<,.A&(6-%@?J+=7!@0NA ApD=N Ap` 67Y,. A`0!!( Calling Status of Node:##( riginate - I call him$$( eceive - He calls me!!( o direct connection8( )Select ==> ')@-M86.>:XA',67Y@QU<@Yy,.N/4O)4o,67Y@}<@,.O/=94R)4r,67Y@<@,.R/=9 A`03&( Using PCP Access (Y/N) ==> 3)@E 6 .N!"@/)"A!)6.Y,=E67Y@37<@;r,.E 4Y%( PCP Area Code ==> )8B:,@vB Aq0E=)67Y@<@,.=) A`0( Phone # ==>  8B:, @6. 9&67Y@<@!,>.& A`0 F+(" Baud..[1] 3 [2] 12 [3] 24 ==> 8)@BNF6-&@HR]*& @ag)!@kq# Aru&=4_ 6. 3"@!6.12$=0"@96.24<=U67Y@"<@#,._ A`0>?( Password Verify ==> #2B:,@ #< Ar0?=H&67Y@$'+<@'/i,.& A`0R>( Phone # Verify ==> "1B:,@m; ArP>=\&67Y@(<@1,.& A`0fH-($ [1] Add/Update [2] Delete => :)@H6-&@Hp!AtAu! A`03&( GYour Message Base # => *36-A:,& @KQ)!@&Uj# Arp&=2%(o Remote Msg Base # ===> )26-A:,& @)!@&# Arp&= 68,-67Y,.6--@@&$ 8,  6-%@3)?6.0=:,?67Y$@7;&@?E<$@IQ,.g<@Uu,.J6.0=:8,,J67Y$@y}%@<$@%@,.g<@,8 = ='"67Y,.$ A`0'=B36.0=:,367Y@<@,.g<@C,K A`0L3&( OYour Message Base # => *36-A:,V& @SY)!@&]v# Arp&=`68,-| AtE(#$$ͩ2#;@;@@D1:FNETPARM.DAT<#%%(@07@<@0 ,F#-@+P#B:7Y,,!1;Z#(%(@?K1=:%AOk,7Y,(=d# #-@o#B:7Y,,!#(%(@2=:%A,7Y,(=# $-@$B:7Y,,!"$(%(@3=:%A,7Y,(=,$ '@6( D:FNETCNTL.1ØGH NAMEPHONEBAUDSTATESOFTWAREHOURSSIZEINFOILCOMPUTERXCRKEY  (<  (Px2  AU d A ( 7VS@@b*@-V7 B  (}x*(" ?*mQ(" *BBS List v 1.5 By Network23 *x(" *(%%( %%( [1]- Quick BBS List %%( [2]- Detailed BBs Lis t%%( /[3]- Add to BBS List %%(4 F[0]- Exit to MainK T %%(Y Yq|2.(( ')@.(>:,4 6.>:,<H6-[1230<<,>AAAAH @d9/@@ (D1:BBS>BBS.DAT9 A@,=eY (} (-(I iӠ0(Y($ y~兠h A  APi0 6. 06.f<@,l(  n A//@@ .D1:BBS>BBS.DAT, (} (,(6 RӠ! A V\ A`! A0 A(@(( A0( @,((Add to BBS list...6>("Ӡڠ >4)B:,"@@W(C(;,-1C W4)B:,"I_A BB:, @cA J>(" >4)B:,"A0L>("Ӡ堨󩠠 >4)B:,"A2OX(" X4)B:,"&)B:,!@*3)B:, @7oA5R>("Ӡ󠠠 >4)B:,"uA8T>("򛠭 >4)B:,"A@^>("٠ >4)B:,"APhQ(E$"#(Enter 1-line DescriptionM(%|E-[|Qj,,4)B:,"aj)B:,!@9nA`r7 A(! ˠ 74Y)4yAt @//@@ D1:BBS>BBS.DAT11(@$:@(F(&(Added to list...0 A0JP: @ThX((Ӡl Z(堣 \(堠 ](堨 ^(Р `( b( d( f( (h$*(Returning to bbs...*6-?:A`,ĠӠ[ A@'@4@A@N@[@*@@*@ 6$ .((+)@:m.$ H('(堼4)@q{H"@HA A?(!(?Ϡ $4A337@<@ ,07@ <@6,A A0u}s;@ :A,;@ EL,;@ PW,;@ [b,;@ fm,;@ qx,;@ |,;@P,;@,9@,} B:uH;@,6.>:AU,>@@KH @ D1:BBS.BAS Final Frontier215-624-6347240060Pa24Atari 130XEFoReM XEPGood Networking boardGraphics Array215-425-07139600220 megsPa24IbmPc boardGreat BBS - Pay BBSGateway314-647-3290240020Mo24AtariFoReM XEPOne of the oldest Atari BBS! <1983>AtGarian Domain407-855-1317240010Fl24AtariFoReM XEPFriendly Sysop - Network BBSBlank Page201-805-3967240040NJ24AtariFoReM XEPFriendly Sysop - Network BBSAMOK BBS215-487-386412003 1541 DrivesPa11pm to 6am fri,sat,C64C-netGeneral BBsTehe Bungalow 314-351-2837240096Mo24Atari XLFoReM XEPSupports PC's and Atari'sHIP BBS215-464-i?960060 MEGPA24 HRMACINTOSH SERED WRITER HOSTCOOL BBS! WILL BE UP BY APRIL OF 1990The Upstairs BBS219-262-9633240020IN24 non-stopAtari 800XLFoReM XE ProINFO-MAT Computer New online!PEGASUS BBS215-493-456624008PA24ALLALLBBS for R/C fliers or just regular BBSMed Com BBS800-445-42272400?oh24IBM?BYTE magazines support BBS (8N1)THE HIP BBS215-464-2348240060 MEGPA24MACIÁNTOSH SERR HOST 2.0GREAT BBS. OWN RED BARON IS SYSOPSNAKEPIT215-779-7859240030PA24ATARIEXPRESS PROIT'S A GOOD BBS.:)@@FCHAWKPA1ACCESABUSIGUSUBTEMPFNUMNDETCHNPROP1OP1GMGFGDLETMKNMATFMATGMATCRPATHFSIGNSDSUBUPSIGNAMEUPPATHSIGPATHBUMFWBWKWKSICFILEFLFNUVACCESSSIG1ANSUNFILEFROMTOFFSELFILNSULTMPDLF1 '(.068>@FHNP VX ^` gh op wxЀ؀ @!" #&($.0%68&?@'FH(OP)WX*_`+gh,op-wx./0123456789:;<=>?@AB C&(D.0E78F>@GGHHOuX}VW6-@y!@3S@@bE@AWB7tA&&;@,;@,;@@,6-@5;@C@ ,;@,AA;@% ',;@+:<A ,;@>B<@FM,;@Q\,226.(f tNo Description 6-B'g6- 6-A6-A'6-A36-A?6-AK6-AW6-A c6-APo6-AP{6-:6-A, 6.## ,6.R!\6.`#6.>:AU,2S (} ((((O(Where is your control file ?[Default D6:SIGS> ]S < 46.D6:SIGS>F 6.d=6. SIGCNTL.DAT! @P% / B =( Thanx$..n~)@2<C;@!@D<@%HO,9@!SZ,;@!^m<A ,R68s~,-i-@8,z@7Y,~ x4-@8,')@068,-4 /-@8,+@7Y,/ 5@@ )*@-65@:K 0G(*There is an ambiguity in your control file continue K +7@<@,0Y"=(6.+=c 6.&67B:,&@<):,16.7%@>T(}A(Y(p 1. Edit Sigs$$( 2. Upload Maintenance( 3. Add a Sig( 4. Rename a sig""( 5. Manual File Copy( !6. End(@ %@%@ AP"6-A:,@ @DJ)!@N_APA BckAAosA wB@BEA`Ap &@ B@A1B7tAG@6-?:A`,+@+@@"@#$,+@'.+@26@:<BT6$^P@X_+@cg@kms{P@9@h''6-^:A`,%+F:Ab,$BU6,r@$|S A@5@@A6-@E P@"3S$! @7=6-CP!$+@T[+@_c@gio$   $6-?:As<:&@2Yz,   = $9 (}"-@~8,*(U5(U7Y,9  (( Sig to edit  L A (B:, A "=+6-A:,L @)!8 ,A   6-b B$#6.FILESIG.=:,' ,(U($File is empty ..Creating false entry_ B`b=B (} (('( 0. Sequential EditB( 1. Search by Filename$( 2. Search by Extender.( 3. Search by Date 8( 4. mSearch by NumberL%%( 5. Add a subdirectory to sigQ##( 6. Return to main menuVU A %@q!(B:,+ A.=76-A:,U )!@A["@ A`I BI%@A@APAPAP APAU+j A@6-1i6. CPYFILE.DAT >6. UPDATE.DAT!@mt>@x|@D6. FILESIG.99 A%(=(Creating upload sigA D=`  (7(&Maintenance not required at this time.K-@A #O Y A'9\=` -@=HP:B:,'@L[, 6#6-+&@_d,$@hl%@p~66.7<%@y,r (} ((((06.7@<@,: A?(r(&File does not actually exist in uploadare@/(DEL.ETING file entryto continue3 = A#2@= 8( (4(%

rocess file elete continue 8 *- (B:,#C@C:,@- A#4 4D A#7$ 0P( what...$ A p9r@+@@A(?-@ @L@-P g6.7@15<@(9A,r@E; 6.>=9(Move this file to which sig?  ist sigs = H^ 4L(}(-@8,0(U;(U7Y,? T(7@<@,^ A!RS6.FILESIG.F A%(I(Filesig selected does not existS A!\t@JQ+@UY@]_emP@9qv@z|t6-^:A,%+F:A,$BU6,^$@$6-'@%@aD67@<@,. (6.=:,D6C7@&B:,<@U,.c 6-A:,f?(Enter access level  5(B:,)B:,!@Y? A!PiB A!P6-A:, & @36. =:,6<?6.=:,B=kd(7@A<@,(8(Change this description < D4YH W8B:, @@a6. d9m46.7@<@@"+,167@A/3<@7J,.4=pU6.7@NR<@Va, 7@ei<@m~,  7@<@, l6.7@<@@,6.7@A<@,6.zN@+@@ CC@C:,@ N@> A%#0!6-[<.<6E,:6-A:7%@If  6.U6-lt -@x8,26-[7Y,<><,K67Y,.7Y%@<,Q6-U 5 (} (( -@8,((U1(7Y,5 F0(Move  to whi)ch subdirin 7Y,4 <(B:,F A#-6 A%:W6-A:, L6-[<:<]n,16.7%@r<,L.6.7%@ to contine@D N A#$. $@29@=D$@Hf >6. CPYFILE.DAT4@jn@rtz> A'  hc:,"A6(0(Copies completed3$6=Kc:,"Abh(cannot be copied to  dit continue uit e  4E Bv 4Q' AP??67&+&@,<&+&@,%@y,.7@<@,= ^( B(No matches found in tFhis blockplease wait...E<X(End of File...[=^= C@JgC:,B:,8  %@k! AP%$=(2 B 5=8$|U6- -@8,26-[7Y,<><,K67Y,.7Y%@<,Q6-U &&(This sig contain these subdirs9( (-@"8,"(U/( 7Y,3 96-6'(Enter PATH of new subdir  + 3(B:,6$ 6.-(( Is this correct? " *0Y-$3!@0(Subdirectory limit exceeded!3$)6-[<><,(& AU0)=g6.7@3<, AUu)@7J56.*.*R@NR@VX^g]@kg AUL"(Subdirectory doesn't exist& :(to continue> I@L$,6.7Y,67Y,."68,-, B&&(This sig contain these subdirsU6-"* -@.W8,26-[7Y,<><,K67Y,.7Y%@[y<,Q6-U 9( (-@}8,"(U/( 7Y,3 96-!((to continue !$pu6 (Directory listing(y/n) $ ,0Y6 A`v! A`(Path- '@%,D@04@8NA(H \-@RV@Zai@esm -@wA'wu@6-'@'"P:,*(:( =MORE >A=e7@<@,4 FREE SECTORSh'r A`u=x (  z4@ / (From -" *(B:,4 A3Y 6.6. A(6(File does not existK( to continueO Y Ar@+@@A(?-@@L@P g6.7@<@(,r@06 (To which sig # =list $ ,(B:,6 A4MI 4L(}(-@QU8[,0(U;(U7Y,? I A`0a6.FILESIG. A%(I(Filesig selected does not exist]( to continea  A=t@+C@ @P@9#(@,.46<lt6-^:A,%+F:A,$BU6,$@pz$6-'@~%@D67@<@,. (6.=:,D67@&B:,<@,. 6-A:,?(Enter access level  5(B:,)B:,!@ 7? A`B A`6-A:, & @;g36. =:,6<?6.=:,B=e6-[<:<m~,16.7%@<,Lb6.7%@ AeGT!6-[<.<Zi,:6-A:7%@m  6.U6- -@8,26-[7Y,<><,K67Y,.7Y%@<,Q6-U 5 (} (( -@8,((U1z(7Y,5 E/(Move to which subdirin 7Y,3 ;(B:,E Aap$ Aap6-A:, .L6-[<:<,16.7%@<,L8.6.7%@ to continue< 9#(Does you want DELETED?' /(B:,9 AdP0YAdP G2 AdN(( ERROR OCCURED -Cor0rupt File Name<( to contine@D N A4''; (} ((FILE:( (;( 1. Change Description$'( 2. Change access level.'( 3. Change Date8'( 4. Change Name='( 5. Delete THIS file!!B'( RETURN to continue L' %@:(B:,$=V'C B`6-A:,, @>D)!@H[6 B`9=C B_`'//BBBBBj' Bt'(B:,$~'8B:, @@6. 9'++67@A<@,.7@<@@,'$'C5V(New access level-  '(B:,*$-=<B:,!@9CS6.7@GK<@Od,V<'!6. 7@hl<@p,!='''67<%@,.7@<@,'$<(9(New Date (xx/xx/xx)- ! 6(B:,)B:,@9$F(J37@<@,0/)7@<@/,0/G(IMPROPER FORMATJ$P(.+67@&37<@3;B,.7@FJ<@N,.$($ (Enter new filename.ext- $ (G6.g<@,,7@<@,0.G(IMPROPER FORMAT:return(8B:, @6. 9(.+67@<@,.7@<@u,.$)I(Delete Sig Entry- &0Y)$,=E(Delete Actual File-I ) 0Y B)m6.7@y}<@,%@86. DELETE.DATU@@ b(@m@)CC67@<@@,.(*  *# )6-@'6")$*;6-<C@GN%@Rd/ B ;6-@hz* *v @~4( There must me at least one Entryv(=You may delete this entry after moving at least one file here*n( Initializing1@@ BR6. 1 This is an empty sig.a8B:, @F]k6. n9*)C@ajC:,@nu&@y)=*N @@16.TEMP.DATN@@*67@,. *..(&} Updating Sig file.Please wait...*"6-P:'@(,"-@,?*(*D@CLC:,@P[*''7@_c<@gk,4o*B @*aA:7@<@,,&6.=:,B67@<@,. ^67@&B:,<@,.a=*)C@C:,@)6-%@* *@@!A*G*##6. hTE.DAT& B* /(AAA6K B+U6-DL -@Py8,26-[7Y,<><,K67Y,.7Y%@}<,Q6-U  +@@+ A(B+ @@ + B@*+-C@8,4+ B6.7Y,>+2 A!( deleting %G('2 B\+ f+/%(File not actually in this sig/ B+bc:,"A6N(file deletions are complete to continueR V \6._$b=+O-(%urrecoverarble error of unknown originB( to continueF L6.O$$, B@66a (}1(you already got 8x, sigsK(you need another(y/n)O W0Ya A6P8,!@B(%sorry none available to continueF P AM6P:(2Is there an empty subdirectory somewhere for this?> F0YP AQ6""(here we go--remember this?6#(Enter subdirectory path# 6&6-[<><,(& A66.7@<,6P BB6.*.*$@A@@ E P@ )6e#68/4,-8:?,%@CK26-8Qo,H6.FILESIG.=:,e@sw@{}7C'6. 1 This is an empty filesig68B:, @@6. C9 7&C@C:,@&@7 67Y,.68,-@ 87B&(What is the name of this sig?2 %@ <_B(B:,BA(7 67Y,. Acx755(-Subdirectory does not exist:trap etr:g. 140258 A88 (}82#(Which SIG to rename ist ' /(B:,2$8I 4L(}(-@8 M,0(U;(U7Y,? I BE8- BE6-A:,-!8S,BE8 (7Y,8>( Enter new name , %@0&@4(B:,> BI8)B:,!@%)6.7@<@%,8 6.67Y,.: A>h@+@ @IL6. 1 This is an empty sig.[8B:, @Mde6. h9>0C@hqC:,@u|&@0 A N*N?6. SIGCNTL.DAT"@?@@4NE*@8,0-@8,A(@ 7Y,E 9N.-@#'8-5,**@9O8,. @>N/-@SW8]e,+(@i}7Y,/ HN*(@(@*(@RN@N$S'(c:, at line c:@,I to return to main menuS A  D:SIGUTIL.MOD@@C   * Documentation SIGUTIL (Beta version)/ After you have run SIGINIT.BXE,and set up all of your sigs, you will never need it again. Use SIGUTIL.BXE to do everything else you need to do with the filesigs. This program will allow you toadd deÕscriptions, change descriptions of files, as well as change accesslevels etc... Let's take a look atthe main menu and it's primary func-tions. 1. Edit Sigs This will give you a listing ofall the available filesigs for you to edit. This is the most used part of the program at first. You will want to add file descriptions as you go along. But take your time, the program will automatically add 'No descrip-tion' to each filename. 0. Sequential edit 1. Search by filename  2. Search by extender .3. Search by Date3 G4. Search by numberL i5. Add a subdirectory to sign 6. Return to main menu 2. Upload MaintenanceHere you will have three choices to make for each file. You can.웛

rocess the file. (move the file description AND the file to it'sfilesig)If you choose to process the file,you will be prompted for the filesigto put the file in. After you havechosen the filesig, and gone throughthe entire upload directory, you will be promptDed to delete each fileafter it has been copied into it'sfilesig.I elete this file. (Remove thefile description AND name from theupload sig and your drive.) *Warning* you will NOT be asked to verify! do later (Process this filelater )(Not available for download)% `3. Add a Sig (add another file-sig to your control file)e Make absolutely sure you have asubdirectory already created. It can be an empty subdirectory. The pro-gram will automatically put an entryinto the fi lesig. .4. Rename a filesig(max 25 char)227 5. Manual file copy (Manuallycopy a file from anothe source to anexisting filesig) Use this option when you want to add files from a floppy to your hard drive and enter it into a filesig.YouC% will be prompted for filesig etc.* Well, that's about all I canthink of for right now. If you haveany questions, please feel free tocontact us via the CNET bases or dir-ectly through our BBS. Bonnie & Clyde Final Front ier BBS #(215)624-63472 ;3/12/2400??D  !"#$%&'()*+,üeekWKFMATPATHDRPCRCAPMGXMSIGSUBACCESSATSUBNSDFNUMVA1NFDTYPEFDNNFCHKWCHACENSA2XACCESFNUFILEMESZRWKWKCOROTEMPUPSIGUPPATHFL  (2(@@Z P ( AP AP AE '/1x;;(; AM<<<<PA#=-A1DD(E(@@ @́!)E("#$@%&'() *+,$%-+-.45/<=0DE1LM2SU3[]4ce5lm6tX] ԛ;@,B 6.##@0@ABB7tA6.D6:SIGS>(S6-6- '6-36-@&S;@ *.<@29,;@=H,2##@LP@TV\K:<Y6.>:AU,6-APM6-AP%A$@'P:A'@0,Y6-AEFw;A ,w;B,;@ <@%,;@ <A ,;@,;@@,;@!<@%,,9@ 0<,K;@@G,;@KW,P&&;@[b,9Afm,9@'q},Z*-@@'&68,-* d A Pn\ AP A! A+ A5 A!G@AYB7tAG\[ A P8(&} This program requires a directory[(to write the control files to.!!(May use any sub or root Q( directory8("you choose or create a new one andQ(enter the name here.f(/($If you are using a subdirectory makCeV("ABSOLUTELY sure you include the'>'f( (ex. D1:A>)&&(The default directory is: H-(#Enter path or RETURN to use default1 84>6.H A--g<@,0>*g<@,0:Al A6.6.*.*/( checking. ..:@ W@@ "(1b@5;l A?[/( Invalid Path(-@_cAgw, /%U B{!6. SIGCNTL.DAT,@I@@U6-^^(*}Which logical drives will contain files'for fiJle transfer (a SINGLE digit 1 -8)(['0' when finished ]%6-%@N}%40A APA:, @)A:,!@*( 6-&' A *=67Y,.D7<,: 6- A U B;(} You hav(e selected  drives numberedI-@,RQ(7Y,U " Ap( AV,=6@++(#} How many sigs will you be usingJ A  BO>>($} There is a limit of 25 characters  per sig name.T-@^S(hName of SIG# &(B:,0 AP3=<( F ApS(APh 67Y,.r |*@l&-@"(@7Y,&  6.-@-@..(} # of subdirs on 7Y, for 7Y,H(ENTE"R '0' IF NONE $ A0(2 B&,>"2GH A-@K33(Which subs on 7Y, will contain 7Y,  (B:,A`X A0( Checking...06.7Y,>*.*M@@X@ 6-%à6.7Y,> 6.  g (B:,B(Every SIG must containat least 1 subdirectoryV(to continueZd Ag=F*@6-26.7@:@:7<,,&@2'J,I=M $# A P6-@NT# AXk A P6-q 6-?6. SIGCNTL.DAT"@?@@)@&-@"@7Y,& $-@E% 6-$)@9h6.FILESIG.=:,$@=H(E@LP@TV\hH<e@lp@tv|h="-@"@7Y, ++( Building SIG-7Y,Path-7Y,67Y,.7Y,*.* $$@@A(7Y,*(-@"@&-$@1B( 4-@FXA2>A@\f47@jn<@r,4 FREE SECTORS7'A A`H A0R-6.7<@,-67@ <@ ,..\6.7@<@,f<6-[< <,/67,.7%@2,9 Ap<=p86.7@6:<@>J,+8B:, @Nv56. 89z6-@:7@z,,&@e+ @6. =:,<(6.=:,+= 6-%D67@<@,. (6.=:,D67@&B:,<@,. ff6.7@<@", 7@&*<@.9, 7@=A<@(EP, 7@TX<@\`,d o567@(sw<@({,./567@1<@1,./(7<@9,C@C:,@@626.( No Description 6(C@ C:,@@&67@*7,. $6-@;L. AFD@PYC:,@]jZ6-[<.<p{,67%@<%@,.7@<@,X6-@ A 1C@C:,@U(7<@9,7@A<@,X= $"@ 6-%&@." .8@28 A@<z B PrnL$V A P`?6. SIGCNTL.DAT"@~?@@j3)@-@/@7Y,3 t-@)@~"-@"@=7Y,%67Y,.7Y,%67Y,.7Y,*.*/@AH/@LP@TmA(7Y,(-@qu@y$@( $-@A2$@4'7@<@,4 FREE SECTORS*'4 A`F7@<@,4 <68 ,-8,%@9F AP;;7@=A<@EP,3Z)7@TX<@\x,2AAPOO68@:7@|<@,,&@d,-8@:7@<@,,&@d,%@ @J@%( }In the sig 7Y,J( SubdirectoryC 7Y, contains:-@#'@&+8S(>:%@d<X,-"(U8,7( filesa lE6-'@pN"P:,S( @ -@@@(8, files with NO extender*-@'&68,-* /-@@/(%'9(' when finished\ A-.2@ 6}E(!Input letter designator to changeIM \4A(49A 2#New extender(EX. ARC)# <F-@ (МPCC6.7Y,*.7@<@,?? *.7@ <@3,Z A@KdZ%6-@:7@7;<@?E,,&@dIS36-'@Wh<"P:,H6-@1lwK<W6-@{Z=nQ6-'@"P:,06-'@%@3<N6-&P:'@,%@Q=x -(7@<@, A  @'$ A P B+4 A 8u(Rebuilding Control File?6. SIGCNTL.DAT"@y?@@Q)@68,-6-@8,C@M67Y,.Q )-@8,%67Y,.) f-@#8)1,')@5H068,-A-@LX8,N@\^67Y,.7Y,b f m@+@@A*@8,X-@8,i @7Y,m -@8,**@8,. E-@!8'/,V(@3E7Y,Z u678KP,%@T_Y,.(@cpb678v{,%@Y,.+(@8(@C@_(Your FINALLY Finished!!bHc:,"Ap(>(File extender does 3not exist!!H AHH(UnEXPECTED error# c:9K,AT LINE c:@O, --- -Rerun1(Name of upload SIG->! 1(B:,A  6.O;(Full PATH to upload SIG(ex. D4:UPLOADS>) ->? O(B:,A  6.$'@ @$@='$ )( No Way Jose'@AU) A`t @Y]@aciqE@9uz@~i6-^:A,%+F:A,$BU6,t@l @,@@N( Creating dummy 9file entry l6. 1 This sig is empty.8B:, @=T6. 9,C@XaC:,@el&@p)=,$ D:SIGINIT.BXE@@@C./0123456.% Siginit Utility - Beta Version* 1. Create a subdirectory for all sig- related control and data files. The default is D6:SIGS> 2. Decide on the number of sigs and in which subdirectoriesthe files each sig are located. Note thôe subdirectories can have any name you choose and there is no longer arequirement to have the same numberon each logical drive. *Note* limitof 10 subdirectories per filesig. 3. Run SIGINIT.BXE ***NOTE***Run this program only once. and make s'ure you are ready before you run it.. Ja) This first step asks youQ othe number of download drivesv then asks for thier number. (0 when complete) b) Now it will ask you for the number of sigs and thier names (limit 25 characters) 9c) Now it will ask how many@ ]subs on each drive and theird names.(D2:A> or D2:Games>) AGAIN! Be prepared before doing this. d) OK >>> All the tough parts are over. The program will  #read through the drives pickin* Fup file info and the accessM glevel from the extender.n e) Each subdirectory of every sig (one by one) will be dis- played showing you how many files in this subdir have a file identifier of the extend-$ Cer. For instance, if you haveJ gA - 32 , this means you haven 32 files with an A as the 1st extender (Filelang), you might be using this for ARC, so just rename all the files to ARC &  !ARC should be displayed next( Eto the A - 32. Then move onL ato the next letter.h f) Now let's go and pick up all those new extenders and write a new control file. g) If everything went OK. GREAT!! ERASE this program 4and never run it again. It; Xwill destroy all the control_ ~information. The SIGUTIL pro- gram had got all the features you (should) need to keep the filesigs in line. Bonnie & ClydeC Final Frontier BBs, :(215)624-6347I R3/12/2400VV7 89:; Just a few things to help youget through the change-over a littlefaster.The default subdirectory for the filesigs is D6:SIGS>. To change this, you must change line 32061 in the mainForem program before running Forem.Also,the SIGINIT and SIGUTIL programs use the note and points setup inFOREMSUB, so it must be loaded before running these programs. You can add it to your START program. Make sure the sysop window is not present.This version of the SIGUTIL cannot be run online. The next version willbe capable of that.It would be wise to print out the doc files before attempting to run theprograms.If you have any serious problems,feel free to call our voice number below.ʛ Bonnie & Clyde (215)624-4683 (voice) !(215)624-6347 (BBS)&&F=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]|no!!RSWSLOCWLOCJKNOTDUNONAMTURPLOYASNVRSWDD1D2HHINAMHINAMEXYCHINFOCLSXZą@@ &'./57>?EGNOVW^_fgnouw} !"#$%&'()*;@,;@!,;@ ,C;@ ,;@%,;@ )0,;@ 4Y, 6.D1:GAME01>HISCORE @`]g @ko@su{(@@2@ @p<&6-A6.noone&@F67@!,. P6-?:Af(H$R-@[_@cu\((68,-P:H:@y~,$@,%@f((68,-P:H:@,$@,%@p z6-%%6-P:H:@,$@,%@G(, you are in theG(7+&@,$@"&%@*0<$@4O, A 6-%@S} A E(*( It took you %@ turnsE(to solve this mystery.$(Score to beat: $( - %@  A0((Play again? (Y/N)f: A e0Y*0yA (} AP6-?:A`,(-@jn@r|::( - 7+&@,$@%@<$@, ( Which room? AU$.((P:,) )!@A 3:"F ( Exit? (Y/N)$:0Y*0yA`5"LA8"AB 6-L A 0V?(You're already there.1-@A5 ? A `&(&(These suspects are present:j-@@t88,A~AI( The *BODY* of I(< E7+&@IN,$@ RV%@Z`<$@ d, A33( 7+&@,$@ %@<$@ , %(%(These weapons are present:-@@8,A@33( 7+&@,$@  %@$*<$@ ., [((Enter+(1 - to guess this roomI(2 - to guess a suspect in[( this roomp (3 - to guess a weapon in2( this roomP(4 - to make an accusationp(5 - to move to another roo m Ae!! @$*)!@.AAp //AEYAAA]A "AP`( ( ((((5(NO, it was not done in the`(7+&@,$@%@<$@,(2 A< A 0F]( (C3 ((((2(YES, it was done in the](7+&@7<,$@@D%@HN<$@Rb,PZ Afd A 0n(x-@@8,A0@4( 7+&@,$@ %@<$@ ,@6-@ + @!( R None present.+ AP6-&l'('(Enter number of the suspect: AE!! @pv)!@z~A8,A"Ap A0 _.(7+&@,$@ %@<$@ ,G(is not in this roo m.[-@AY_  A0R( ( ((((R(NO, it wasn't 7+&@]b,$@ fj%@nt<$@ x, A A 0"P( ( ((((P( YES, it was 7+&@,$@ %@<$@ ,, 18306 A@ A 0J(6- +T-@/3@7_^8,APh@4( 7+&@ch,$@ lp%@tz<$@ ~,@6-@r w+ @!( None present.+ Apx6-|;6-(.(Enter the number of the;(w#eapon: Ap!! @'-)!@1A 8,A0"AP A e5(The 7+&@,$@ %@<$@ ,M(is not in this rooma-@Ae  A _( ( ((((4(Y#ES, it was done with the_(7+&@',,$@ 04%@8><$@ BR, AV A 0V( ( ((((V(NO, it wasn't the 7+&@,$@ %@<$@ , A A 0lS($(Are you sure you know the?(kvictim,room,murderer &S(weapon? (Y/N):q Av0Y*0yAP(-@os@w::( - 7+&@,$@ %@<$@ , 1((Who was the victim?1((Enter number) A(-@@%::(* 5- 7+&@9>,$@BF%@JP<$@T, )(( Which room?)((Enter number) A E (-@@ ::( - 7+&@,$@ %@<$@ ,* 43( Q(Who was the murderer?3((Enter number)9 A!>H(R-@UY@]g\::(l w- 7+&@{,$@ %@<$@ ,f p+(( Which weapon?+((Enter number)u A!ez("*"*"*"A"`CS;(%(I'm sorry, but that is not;(entirely correct!?(?(7+&@W\,$@ `d%@hn<$@ r, was killed?(in the 7+&@,$@%@<$@, by (7+&@,$@ %@<$@ , with the 7+&@[ ,$@ %@<$@ ,A"@ ( (SUICIDE! How tragic!0(0(%Well, I guess I fooled you this time! A `A" ( (SUICIDE! How tragic!?((YES, that is right!?(You're such a clever sleuth!+ A P 6-B:, -%@/3@7m 67<,.    $ 6-B:, -%@qu@ y 67<,.    $( 6-B:,2 -%@@ < 67<,. F  P $ 26-%@,6.  26. +@+@#'@+-3? (@CL(@Pt D&(You have broken the recordx!D(The new score to beat is: @ ( -  $D2:GAME01>GAME_10PAT HOSSENLOPP  +E:B>A`^:A7,L A/B   $W AFL/@6PU@Y]cnR:W@4rw@{A@R:U#@@R:1AQ%U@8@%R:3@/+F:AG,X@ ,"!3 .+@@%*@.068>MR:.$%%Wbj  $A A0@-F:Ad,AU7 A0:=> A$X%%ڠbJG6-P:+F:@,$BU6%F:@,$AV%F:@ ,,'+@` ,,,J$%%2\󠠠^ 3-@`B:,/6-@:7,,XA'E!@* A#[67<,.>:&@2,^=   = $%%+6. +6.7@<@C ,.)  6-)@$\A( M A"6-P:A:,$,& ?7@`d<@hw,41M6-&@2{$%%> 386-?:A$$$d堠S@(@!%@)6Z:D@5:?@CeZ:S6.00/00/006)@is667@w~%+ @,<@,.=:,0)@067%+ @,<@,.=:,6)@667@%+ @,<@,.=:, e@3 @ ,Z:.6. 0:00 AM;)@0FGAS!@JRe67@Vg,.PM!@ku6-&@y<#67%+ @,<@,.=:,((<67<@,.12D)@667@%+ @,<@,.=:,A@D$$$.) 6-6-@2B AP) A3F67,.>:F:C:,%&,,=6-[<<,!6-[< <%,&(,6-/<:(7<&,==* "(End of transfer' A"*=# A"6-A:7%<&,,#  P6.7<&,37B:,&@  67Y,. A4 5B 6-6- A9G+AP@Km36-&8(B A80-@quA0y  (Process  filesE6. FILESIG.992@E@99'6-^:A`,%+F:Ab,$$BU6,,9(A80, Ae(26-'@6h,P:,A806-&#(@l# A";@'67$@,. ;DC:,$@ -&67@@,. &DC:,@@t%[COLORU@3@@ 3?(Please decribe ->a[COLORU@57;@?C@GVj(7Y,t AZh8B:, @@l6. 9CC:,@@    A80  ' ' ''  16-6-'6-1 A0  N @P/ [COLORU@2@@ )N(. GC - Choose Sig ;;(L bL - List Filesigsg B - Browse Files FF( S - Search U - Upload X - Return to BBS %%[COLORU@3@@ H()+"8,*"@,C'6-@ q06-8,E( (All Sigs) H< 6((7Y,) =& ApP6(B:,A0  $$B:,!@u{*"@%A *6-[CLBSU?X<<,*(A0  "@A0 ("@$(Returning to BBS(  //APmA AAA1( A0,? 6.! ; @`CI6-O];[COLORU@4ae@im@q& l(Select protocol:l( X - Xmodem Xmodem CRC Y - Ymodem / 1K Xmodem B - Ymodem batch( ( @ - Abort Upload0 ?%[ COLORU@3 @@35( Select -> ? A7U: D (B:,(abort? " AYg*0Y4 A1k7<A A0D=D '6-[XYB@<<,'(A1 F "@A0N - @6-@<*6-@-=O X"@( A `!<K(%Y- batch through normal channels onlyU A0X=S  A2 X %%[COLORU@3dh@lp@tb ( Filename->  Al  (B:, A10v  B6-[<.<,(8(Valid Filename = filename.extB A1p 6. 7/-( File size (S)ectors or (B)ytes 7 A3F 8)6-[SB<7@JN<@RU,<[v,.(8 A2  K"@z$(How many bytes '<>(How many Sectors A=K A 3 A2@6-A:, & @0 A2 3= :"@6-&:6-P:'A(,)<76-$A(:= AP ?@>x.(No room notify sysyop56.? A10 Ae|  @@ D%[COLORU@3@@D(Connect Timer disabled   6- H0(&7<APH6-@;V U  6-6-6-@2Zf%6-/ Aj~56-;6-U6-@!%@F$+!,  6- ;Af(}!-@'6-1 A3`; A4 [ "6.X-modem STD !<'"f<6.X-modem CRC ?<CX6.Y-modem Batch [<* 76.Y-modem STD ==!=-6-A07 A jy4 H g@w}-@**@/(E( Getting Header H<d(Getting Block/g=R I56-?:AT<@<A:F:C:,%&,,'6-&A(1 A5; AF6.7%,R6-A(\ A4p * (/"' 6-@*C A4z ^"*"*"@!b6-3(Switching to chk H6.X-modem STD T6-A0^ A fw m*"*"@{*"@!%6-B(switching to X-modem-chkW6.X-modem STD c6-A0m A  )"@*>:,46-%) A4 v "*"@' A6' t@+1)"@!5I:6-?:AT<<@`MQ<AU^,f6-@!bf%@Fjs$+* @w}* @,j t A5 ' ++@)@) @A5 K*@@ A667,.>:F:C:,%&,,<6-Ax(K A5P W6-@:7,, A(--&A'%9@:7,,"= M6-&A(%W A5P ' J ! A|&*@@$@(Disk Full try laterJ A6  A5 A6  S AJ6-?:C:'hhh hEhDhIhH- B Vԩ`,<H6-$@LY =.JE(@]UP   SECTORS AT  <= J8 6-")(@Xmodem,<2"K(@ Xmodem(CRC)N<Rg(@Y-batch j<~(@@Ymodem=: = =B! 6-&>A4! ADYL 6-6- A]V=6-[<><,!6.7%:@:7@F',,%,16-76-E68,-8,%D6-P:8,'BU6,*6-8,&$BU6D67A<A,.>:,X6-P:'AV,$6-&$AV>67A <A ,.>:,X67A!<A!,.>:,A80 6.P"6%.D8:INVENTRY>FILES7<,9@ )+1@K(7<@D,P6. A74*( Please enter a short description4 A08B:, @@6. 906.7<@@,,6. FILESIG.99,@ ](6.7<@, By 7<@%,78B:, @@)BA6. D9U6.7<@@F`,]6. CC:,@dk @o:6-%!AP-6-@7 A30:=P@6-6-$ A6AP@P(Connect C:Timer is on 6-&% >(Return to bbs? " A>L*0Y4 A0Pc7<; >= A0gnd$$s䊠it"?PD6.  [6.7@<@0,g6-Apq A t=na46. =:,3 =K6.7@AE<@0I\,W6-Apa A `$$Ơ堠) Ae6-)@$ Af@67,. $DC:,16-^:AV, $67%,.'=1 AA& c:,"A66-& Af0?c:,"AD.(@En ERROR 144 - 8 Af0;=? ,$$w~ڤ@)AI6-(&AI)$$$ĠͤנAAI6-!!@'( *</(2=>AIA$$$%5Ҡ S AV$@J/ @P/[COLORU@5@@T2-@8~,&(U## .(7Y,2 Y AP^$r|U(Sig # for ALL ( A0(B:,?6-8,K6-@U AO A`6-P:A:,, 6 @)!8,@ A`C=I6-O6-3$+( AP=!6-9?+ ACt  !( AP=!6-@x Y%[COLORU@6@@?(Search String-> I AY(B:,A &  6-B:,6.0 Al Рq 6.v N7@#<@'6,4U+6.7@:C,76-@GWA A1K A0[iN= R7@mq<@u,4D+6.7@,;67@Y,.G6-@R@ ( Checking ... A0 *@@. S@9@E @ g6-F:Ab,$BU6%F:Aa,$AV%F:A`,6- 6-' -@ks!67@wY,.=:,-6-  BRP= A0(## -@#L6.FILESIG.=:,%6-?P/ AeL@@ #a%[COLORU@6$(@,0@4)(-@( Searching... C<V( Switching to Y=a(7Y,#T%[COLORU@1@@T(&蠠̠堠#S 6. AP 6-@167A@,. ID@ C:,A@ $S A`#g c:*9,"A6(6-?d6(^:AV,@ A0C=]6.7@h<^:AV,,`<d g=#-@P:B:,'@,#\&6.7$@&@y<$@,*W6-[7@<@%&@,<<,\(# A ==#%!A:7@5!%<@6)9,,A[COLORU@3=A@EI@MUW(7@Y]<@@aq,y[COLORU@2uy@}@(7@A<@,<# A =#I6-%@?+"@*"@,)+ @*"@,I B$ $+ *6-@ B"+6-(L$A@"$/ +),*6-@PV# BZ`/6-f,$11(!No more matches found in this sig6$)6-@ B)6-;$- "-(Ԡ=$(6-@ B %6-B(=@$ T$h$ A0 '> B%6-HY(>[COLORU@5]a@ei@m'<,(#ľ䠼ƾ砼;Ҿ 6 A<6.$'!6-[DFM<<,(!$.'"@ A08'"@6-@B.'` *([=Download] "=D[COLORU@126@:>@BZV( 堣 ` A^L'% 4 BI=% BV' B(B`'*67%@Y,.*67%@Y,.=:,j')6-%@ B) Bt'6-@2 BP*Š̠*+K6-8>6-DJ'6-PV36-\b?6-hnK6-t + B6-P:A:,, *+(B4+6.FILESIG.=:,>++@+@@H+%6-$@&@%C7!BU6R+66-P:'BU6,$6-&$BU6'<36-=s6=\+P<6-?:C: hhh%BhhNhMhL VՄ`,<@dw<<,P@Bf+,67@,. ,D@C:,@p+E6.7@<@,(6-[< <,,E6.7@<&@,z+M B'6-A:7@5"<@6&],,+ 1 C( Access DeniedM B+86-A:7@ae<@$i,,86-P:+%A$,'A%,++-@8,+6-[7Y,<><,+6.7Y%@<,+^ B6. @=@@H@$K'O [6-@(W^$+ 6- $,(File not found.,6-]$,٠, W,-@-36-[7Y,<><,36-P:A:7Y,,'A,-0%[COLORU@7@@0(  -**(7Y%@a<,[(7Y%@;W:(Transfer will be  bytesApproximately I(U###.##W( minutes.; BU;p%[COLORU@3@@p(Select Download Protocol A - Asciir X - Xmodem/Xmodem CRC;KK( Y - Ymodem/1k Xmodem B - Ymodem Batch @ - Abort Download;T%[COLORU@6vz@~@:( D AT(B:,BSP<= 4A&(Hit any key to Begin0 A: Ap==<IV,(6.7%@Z,86.7Y,G8B:, A(Q6.T9< B`FT<8"6-?:AT<@<A6,.@g8 BX<;6-@6-% Bb1!@0; BX= B`=N( Bb!@4N( BX+=2B:,>6-TnH BV K=N==d*@rv@z56-?:AT<@<A6,A"@$K BXN=Z@d BV@=<&6-?:AT<@<A6,2@g< BX"=1167@G<@G&,.>:@:7@G*0,,%@4W,,= 6-%A26=4468@[b,-8@f,%P:A:7%+(,Y,,'A%,@=P6-P:8@,'BU6,66-8@,&$BU6P67A"<A",.>:,J=X6-P:'AV,$6-&$AV>67A#2<A#,.>:,X67A$<A$,.>:,T=CC(@6yDL  Complete...7%+(,Y, bytes Using ^=\"(@} Y-modem Batch%<Y(@>:@:X,%+@$"@,, - Modem\=h= Ar=( BW|=55: St=Usr(1554,1,3600():If St<>67 Then Goto 15800=!6-%@,E! BUE=V6-KQ6-W_,67@c,.=67A',.L67@,.V B`==6-6-6-% A7AP@:(=$=A*@@$5(@ DL  Abo rtedA6-!=@AP@%76-!6-+ A;Y=( ABORTED...@$>I@w]_eI6-A(%A$+"@* B:,&A$%+(,,>4-@@4(Sending block />WC6-?:AT<@<AT-'6-%@8e6-%- B:,B`>$>9'6-'+@i%AU$+!AU,,/(/9 A>QA*@$@6-?:AT<<@`<A,D G'Q BX>' ' BXH?+@ +@ @>R?* Bb067,. *D@BVC:,\? 6-\b Aff?a 6-^:AV,!@367%@,.Hc:,A6W6-c:,a Ap?L6-&A($P:'A(,"<-%@%A(C&H67,.>:,L z?6-@"( A,3a$$7KOfa3 "&67B:,&@j|:AU,Iu %A(>Nu;AV,;@$BN,;,9@RY,;@]d,;@0ho,;@ s,;A',;@,;A,9@,;@,ul6-F:A$,!6-F:A%,06-F:A&,?6-F:A',N6-F:A(,]6-F:"A),l6-F:A0,uQQ;@ &*<@$.5,;@ 9=<@$AH,;@ LP<@T[,;@ _c<@g,uQ6-F:A1,!6-F:A2,06-F:A3,6!B6-@@Q6-^:A4,uE67@,. +LA@C:,@E6-A:7@<@,,um@ 7@@!'Z D8:USER.DATDF:A6,U67A',. mD@^C:,A'u=<67A$,. /D@C:,A$2==@ucc: Open #I,4,0,"D8:WINDOW.DAT":SCR$(200)=" " :Bget #I,Adr(Scr$),200:Close #Iu,6.7@ <@$$1,,6-@:7@I5d,,uC6.D6:SIGS>&6. SIGCNTL.DATC@hl@prxvs6-)@8;%@<@%,9,G68,-^-@8,o@7Y,s  v}-@8,')@3068,-4 P6-?:As<@7E6.D6:SIGS>4vd@HS>@W[@ _agD1:USERLOG.DATA<a@@P:d=>v.@.@@K:Hv666.,Atari 8-BitAscii / TTYANSI-BBS VT52 C Kv666.7%@%+$@ ',<%@+2%+$@6A,,Mv0"Gs6.300 &6-AP0 BRvC"@w6.1200&6-Af)<46.2400@6-B2C=\vCC6. 7@<@$,   fvC-6.  =:@:7@I#,,,96-@'-C A 1_pv<&6. 7A<A,26-@ci< A mzv)6. 6-A!) A v)6. 6-Aa) A vDD68,-@:7A,,$BU6%@:7A ,,$AV%@:7A!,,vJJ68@s,-@:7A",,$BU6%@:7A#,,$AV%@:7A$,,v6-Bd;,$w 6. A0w} }UPDATE AND CLOSE FILES}>6. =:,'6.g<@,>LC:,A@@}m@1@Cl D8:USER.DAT>F:A6,PCC:,A'S<eCC:,A$h=mx}6-?:A`,}g(c:ry,c:@},](=Initialization Error. Returning to BBS!!g B!  D:MODULE.1@@EE