@L}5 _$% l0$)$$Hȱ$ UhL" `e$$%`$%`  R@P!( L(1   Y I`  d  Ld M * @  $ % CC$$)%1 Udߥ$9%: !0 S$% DD˙`  }J)Lr d M * @  $ % CC$$)%1 Udߥ$9%: !0 S$%} DD˙`  }J)Lr J  ((  p L ()   J}L= ( L 0q A    IB JC;? D W } LL  ` W )LA!  ߰")-݆ p" } $G@LL 08`Q")<2Q0 -G$Ș݆ UL# ; p8(()(0ʥ)NQ` }$GȘ݆LU )L ݆ L GȘ ݆LL )W>Z   HH)H }p h  hyhy D L> L JJ    ! LA*` BF }7'8  M HN H` 8 Z  \LdJJ!"! GFE@F (!L }EE !E^ ^ E E7EȩEdE/EȩE  D } .L }  ;F d  ;?F7F? ( .   Z D LL d } . D  L    p  E` , d)  D L) 0BM݊L݉} ML  N݆ L NLML [ TEqEHȱEqEh 0Gȹ G} HLL GɛL  LFREE SECTORS G) *Gȩ GȽG GȌ*jj >G} C8jJ3j2CD( C202C ԠBX` N 1? l LlD:RAMDISK}.COMLu L1 L ;LHL  T`  `8  ɐ     `TU  } L ? .  t`GBJ ~DEHI B V0dV!}QDEHI VF9 ,0 ,0 s0hhL  L` H hDHEh"}DEL8HI4 0 HI,0 0  9 .G VLO#},0 L4*IJ`llD1:AUTORUN.SYSNEED MEM.SAV TO LOAD THIS FILE.D8:MEM.SAV J y08 B|DEHI$} V0 0`B;DEL`?<0LV`@ʆ v s? F0Ξ05: [ BDEHI%} VY8 B V  @  /DE `E:D8:DUP.SYSERROR-SAVING USER MEMORY ON DISKTYPE Y TO &}STILL RUN DOS B;DE J  (` 9 V⪍ ઍ  -'}LLu ÝDEHILV 9 .l 9 .l  `` s$B BH(}I|DE V BLV nB,DE JLV B V BLVDEIʩ BꭝLu } 3E:}DISK OPERATING SYSTEM II VERSION COPYRIGHT 1984 ATARI CORP.A. DISK DIRECTORY I. FORMAT DISKB. RUN CARTRIDG*}E J. DUPLICATE DISKC. COPY FILE K. BINARY SAVED. DELETE FILE(S) L. BINARY LOADE. RENAME FILE M. RUN AT ADDRES+}SF. LOCK FILE N. CREATE MEM.SAVG. UNLOCK FILE O. DUPLICATE FILEH. WRITE DOS FILES P. FORMAT SINGLEL !N',}#"&))9(&*)/h)''-&؆莟R'S  vL/ˢ L }Insert DOS 2.0s, type Y Λx -}DEfHI 1莏#q! @ y0ɛ8A0,' ȅ 1 1ild! 1L!NO SUCH ITEMSELECT.} ITEM OR FOR MENU! 0 .z:*{}.|{ 1 0 0JB 18L%|DL/}%DIRECTORY--SEARCH SPEC,LIST FILE?[# 0 0 &|D3" 1L!NOT A DISK FILEN !B 1L!E# 1 !BD0}ED:}:1BJ|DE 1DEBHI 1 h0ߢ 0.1}  0?詛 1 y0YЛ 1 ;#L" ;#L! BL1TYPE "Y" TO DELETE...DELETE FILE SPEC2}COPY--FROM, TO?OPTION NOT ALLOWED697 FREE SECTORS COPYING---D8:COPY32.COMl# 0|D .L/%#3}##JB|DE 1BHID#E 1#0: B 1L!#͑### B 1#c$0SY4}S1}:## # # .#Ƚ# # 𩛙## 1,#PD#ELJ- <.BJD#E 5}1 1HH 0hh|DL%1}:̳# L% #D#EL% 1 0 . .0O% 1L!WILD CARDS NOT A6}LLOWED IN DESTINATION 0 <.|K}N 2 FORMAT. t* 5) 1L!`) 0NΞ 0 L1) 1 L!BAD LOAD FILELOAD FROM WHAT FILE?) 0 ?}0#B 1L!WHAT FILE TO LOCK?) 0 0$B 1L!WHAT FILE TO UNLOCK?DUP DISK-SOURCE,DEST DRIVES?TYPE "Y" IF OK TO US@}E PROGRAM AREACAUTION: A "Y" INVALIDATES MEM.SAV.FE! +L1   `*  70 2 2A} 0.* 1 y0 0)INSERT BOTH DISKS, TYPE RETURN^, 1 y038逍 N, 1L! ,B}C, t*  Lx+, 0 ^, 1 y0 , ,0,0 ,L+ ,I0 ,Vǭ0C}Ξ, 0 }, 1 y0C,ШC, 0K'!" H H 'h h Lx+!EF 5L1L!D,I,HhD}` NOT ENOUGH ROOMINSERT SOURCE DISK,TYPE RETURNINSERT DESTINATION DISK,TYPE RETURNE}`  `8 rL1`-* 1P* 1 y0Y`hhL!NAME OF FILE TO MOVE?- 0 0|DL% <.F},^ 1 70 0 .@L# .BJ 1  DEHIB V L1 ,} 1 70,L.  G}JB|,#P#DE 1 HI BDEHHII 1 B 1 ,^ 1 70,0La- B V,#PH},^ 1 70 0L#L!-* 1P* 1 y0Yj383}mm ݭI}}`8}``|* ? ɛ,`|:-)| / 1L!`DESTINATION CANT BE DOJ}S.SYS0 0H{ 24Δ 28/L!/) 2 Π 2 0 ξK}hAΞB,0 J 1 BDEHI,HÝDE 1HIHIDELSAVE-GIVE L}FILE,START,END(,INIT,RUN)O S0 1`BDEPHI V` S0H 1 L!M}0 0 1L~0`PLEASE TYPE 1 LETTER,0`hhL! 70 1L0L<1 ,;ɛ7,"ɛ:ݦ1ݥN}A"D|ݤD|ȩ:|ȩ|ɛ,,(/+.ީ1 1,ɛ`轤{NAMEO} TOO LONG B VL!` L1I H1EΝDL1|mDiE` V0`8d/8 i:222 1 LP}!ERROR- 164ɛ+,' 20*.. өr2 1``2TOO MANY DIGITSINVALID HEXAQ}DECIMAL PARAMETER800 0 8 00`,0'D800 H,ɛh`2L1NEED D1 THRU D8uR} ECIMAL PARAMETER800 0 8 00`,0'D800 H,ɛh`2L1NEED D1 THRU D8u05  15 2 2151^116115ύ011$r2ԭ5 3)5)5ԭx GT}@@L00)+& 2 L0=ɛ -L!1LV1L1 /3 3ȹ441L-4 v3 25 2H 2h͔5U}L3L3 2 k3U hh`DOC`QL3P1Lk0S1H /3h0B k3@ VL0LU!#$53 1181118V}1111Ε5 1Lk0552 1Ȍ1i111i11115Lk0pppB4f5&&&&&&&&^6f^6&&&&&W}&&A1@BJ D2ELVK@BHILV^Щ6 2BD2EJ VBD5EHI0 V0%5X}5 2iХiL[2 25 25`D:*.*` i@`8 ``@i `8@`0 BLV525<4Y}5`HH i ԍΗ552 ԍhh@ Lح1Э1Ѣ 24.4 24Z}4`D4E` 2BJ k3LVRH` 2BD4EhK)I JLV333>>^}>>>>>>>>>>>>>>>>>>>>>>>>>;=ENTER"7 8 9 @+   `H LwhL0;=>>>p THE CAPTAIN'S BBS ================= This program will become a BBS system for an Atari with at least 4 `}8K, an interface and an optional printer and a modem -- AutoAnswer is prefered, but it can be run with a manual one. The a} following files will be needed on the disk to run the BBS: ACTS = Account #s. PASS = A Password file. BULL = B b}ulletins. NEWU = Messages to new users. ACCESS = A file for access #'s. HACK = Anything to tell the high c}er access level. BBSLIST = A listing of other BBS #'s in the area. FLASH = Your BBS's Title Screen. NEWS = d} Any news you want to tell the callers. The files above should be created by a word processor such as AtariWri e}ter or Text Wizard, but Scriptor can not be used. Be sure to name the files exactly as indicated above. After these file f}s are created, then run INIT.BBS to get you started. After the initialization is completed, then turn on your interface a g}nd turn the computer off, then on, and the BBS program should run. To give the board a test, press SELECT until it says h}"ATARI USERS GO TO ATASCII (PRESS RETURN)", then do as the program says. If you are using a manual modem, then press STAR i}T before going to answer mode on the modem, when the board is up for utilitarian purposes and for public use. For the u j}se of the download section, use PROGRAM.PV#. The # means acess level 1-9. Enter the number by the security it deserves. }ggMODEZERCLOCAGETCHTOUWOOPLXBSAMODDELCRIBELXMODCTRLBUFFERCLLMODSCIOFILERFILGLINNAMEl}ADDRESCALLNFILCDFCSECCBYTTODAYTIMEMAIPROMPTFUNCLMTHTEMPQRMIFMSGMSGNOPARSDISEARCFROTMDFBYTSECSUBJm}PASDATEFROMFRMSGHMSMSECMBYTWAITRINAALSOTSERCOMAXHSYSOXPASLITERASECURITXCHAATARIMODXSYSOPSNAMESECUn}RITYSECURXRETURXCALLEMISREPLXREAPRIVATXENTEPREVIEPVHYMSXMSECBFLASEDRIVEBLOCNSENUMSECSLEVERINGXCMODOPMCo}MDNPASSRPASSCGLIMSGOVADIRVEPAACTFUN@@@@@ @A p}x )  (  @2 ' % @@& @"$(@@ (@@Aq} A@p((@0 @!r "@#@$%&* ': (Ar}) 9*+, -J x./V 0@1% 2A34Ap567d 8s}9:) !; (<2 = (> (?h4@AB@C@D@"EBF Gt}HIJKAbLB2yM@%NOPQR@ST@UB VJW" u}XYZ@[\]^_@`ab@cAdA6ef@gv}hi@jk@l@mBno 2pqrstu@v w}w xy;@,;@,-@ B&P B%P B F:AIx},!  +F:Ad,"AU((F:AG,)+$  @$ * '"@)"@$)"AR*$ @y}%F:B2y,"@'% B0 F:B2y,"@B&)@$) F:AG,)z}&(>:,)$:F:Ad, AU%)@-(>:,7 B":$( 6-%!A 2 F 6.P 6- {}6.>:,ZJ%++4,)+4>:A',*",,*03( @67B:,,.J @dB4*0-@B:,-(|} 1 86.B @n 4($x2 (67B:,%,.2B:, &@@ B:,"($ (}} @( ((SEND 6-B:,($ 6-6-! 6-%(7<,!$U(7<,6-~}% >+"@$)"AR,*"R(Break...U$ A$' A$F:Ad,"AU)'$&! }!F:AI,!A( 6-#$6@w $;@R:@;@6@R:;}@4A@R:E@8%R:J 6-O6-A2%+@$,T9%@@@%%@}9%@@Y9%@A %%@ 9%@@^6-?:C:,<@$,cF:@$}%A5,"$h t0(  "!@06-&@2v#"@6- (Yes#$x""@x6-}(No"$z Ar' "(#-@A' g1(%Atari users go - HIT 5 A6-}M6-T6.[6.g6-'6-@6-'6-*"AU( 6-@* A}!!@*AAA:6.>:@,6.>:,*6.>:@$,06-: A4*(>:@,Are you an} Atari?4 Ar(6-@d A(The Star Trek BBSS6-@@+(Name or account #/ }S@:,!@H*@:, @XBD 46.6-( 6.X] ,6-@86-@ @6.9D 4A}% B 6-@%6-@6- B 6."(From City,State ] " & B0 6}.D,(You are ,( Calling from N(CORRECTX Arb(Al'6.D1:WELC6-@'} A v/"6-@ #6.9/6-@w4"@ 6-@*6.D:ACCESS4 A {I6.D1:FLASH}6-@*6-@4 A @6-I(6 6-%6(Logging caller No.  to disk...   }"A@ " A "( BI @ON  I }@   CALLER NO. - )( Logged on at  on - '6.D1:BULL6-@' A }"@$A "@ %S%(Is this your first time on@(The Star Trek BBSJ ArO(S H}+6.D1:NEWU6-@' A +  AY &4D1:FLASH Ap& AP@ A` AP@}"@6-$#(#(*** END OF FILE ***4 A ('6-@@,(/(4( 6.>:},k_@e*@q*@v*@*@*@*@*@*@k6-6-}6-4**"@Bp"@ B/ 6-7<,1a/67<,.>:@:,&@2,E 6-%}!@A("Invalid command, use 'H' for help.E g7<,47<,gAAAAAA!}A A!A&B w#7<,47%@<%@,wA3A4A5A6A"A9AP}ARATA!O#7<,47%@ <%@ ,OA B@A0APA`$ A@L}6.D1:BULL A #6.D1:FUNC  Ap# 6.D1:HELP A x6.D1:NEWS A 6. D:BB}SLIST A 6.D:INDX A 6.D:ACTS A &"@ 6.D:HACK& A  B 6}-( Bp-(Expert user mode)6.X] - )(Normal user mode% A0) 6.Enter command} or ? =>$/ A +(Time:  Date: / S6-F:@ ,S6-++F:@,$AV%F:@,,$AV%}F:@ ,,'@`!F:@ ,A /6-P:'A6,/6-P:'@`,&$@`16-&$A6&$@`1} @$A!96-&@$967@<@,.>:@:7@,,%, ]7@<@,39567@<@,.}0]67@<@,.>:@:7@,,%,6-A:,$@))7@<@,/7&<,A pTT7@<@},429*A:7@,,'@"P:A:7@,,'@,A pE67@<@,.01E67@<@,.>:@:7@},,%,B7@<@,39567@<@,.0B67<,.17<@,/12A p-67<@,.01}-67<,.>:@:7,,%,//6-+%$A6%$@`,$@`%Ap /6-P:'BU6,/6-P}AV,&$AV*K6-}&$BU6&$AV)@ 5@A@K A 4+6.=:%A,+6.7@<@,HG%67@<}@,.=:%A,G67@<@,.=:%A,\867@<@,.:567@<@,.:8$' 6-6(} Quick Scan' A"0 6-(Retrieve&6-@0 A" 6-( Summary of( Messages}"@A" 6. 6-@( Messages<6-P:B:,'@@,$@@%"8( No Messages< }, 6.6-A:,#6.7&@9,,6-A:,6-P:B:,'@@,))( First Msg#  Last Msg# +B:,!@}!6.7@,+ A"(((RETURN=Exit, Msg# From-To ]   (4 ((% "6%(}@=Private message   " ( A"` " )$@@!B:," A"=6.7$@@&@9,%6-}A:,+"= )!A" "6 )!A"..6.7$@@&@5<$@@&@,%  (. } % A#  @ A#"@$A"` 6-% A" 6-@:7$@@,,} ??6-@:7$@@&@,,$AV%@:7$@@&@,,  "" B# %0*"@}*0 % B$ 6- w6.MSG# 67@,.467@,. DATE:C67@,.Y67@$,. TIME:h}67@0,.w67@8,. Y67@9,.FROM: (67@E,.667B:,%,.K67B:,%,. TO: Y67B:,%,. B67}B:,%,.&67B:,%,.SUBJ: 467B:,%,.B67B:,%,. @"@$67B:,%,.PASS: 267B:,%,.@67B:,%,. }+ !!67B:,%,. =========+ A$$ -. 8 67B:,%,.B 67B:,%,.L  `  6-B:, A}j  6-6-t ( 6-%(7<,( A$p~ (7<,6-%   "@$($ "@}A$p A$  @ (  ( PRINT -)@0(<"@@3 "A$ \'(=}NEXT, =REPLY ==>+ 7"@F(ReplyR6-@\ A&e ( $( 6.- -")(Mess}age base full.- 2 B0(%Enter Message--- (^X, RETURN to exit)B( Subject: F  4 P 6.Z (To}: =All d ( 46.ALL((To: f 6.i J"@6.6.&6.TO: 467B:,%,.J67B:},%,.- (R),#j #"@#67B:,%,.=:A:,,k 3")(Message base full.3 A$n 9/($Enter Password} Required to Kill Msg:3 96.x 4 6-4(#Enter Message, Two s when done +6-A 6-%+!@A'} 4!@4(Only @& Lines left (:   4A' ""67$A!&A ,.>:B:},, 67$A!&A,. A& 6-& U-("[A]dd,[E]dit,[L]ist,[Q]uit,[S]ave,U([P]rivate Save,[V]}iew message ? + (>:,!@+6-&@2 "@eA& "@iA) %"@v6-}% A0 %"@6-@% A0" 0"@&(MESSAGE ABORTED0 A2', "@A11} %"@6-@% A16 A(T "A(^ %%(EDIT WHICH LINE 1- ?h  4A(}r # A)6-P:A:,,# A|  )!A) ""( OLD LINE  READS: MM( 7A!$&A<}A!$&A %@:7$A!&A ,,, 62(CHANGE TO: =NO CHANGE 6  ^ 0;67$A!&A }<$A!&A ,.>:B:,,^67$A!&A<$A!,. A) "A( ( - "}(: GG(7$A!&A<$A!&A %@:7$A!&A ,,,   ( A( "}A(! J 6-%6.0000067@&B:=:,,,.=:,J(SAVING MESSAGE....& /  @&/}0  A 6-6-5 X"@6.TO: )67@,.@67B:,%@,.-@L6-X6-@: &&(}D b-@U(7$A!&A<$A!&A %@:7$A!&A ,,,Y b}N 6.  X D/6.% 56.D67@,.b $6-P:'AV,$6-&$A}Vl 967@8,.>:,'67@9,.>:,967@@,.>:,v )$67P:B:,'@@,$@@%,.) %(}% B >$ @MESSAGE  &. A66-%>6-& &@6- ( SAVED AS} MSG# C"@6-C(SUBJECT LINE CHANGED TO: %"@6-% A$   #(}(Log off?# Ar F:B2y,"@B0 "    A  "( @LOG-OFF " } (Thanks for calling  ))(Please call againΠ  H (6-@d& (( LINE-FEED R }(ON \ (OFF  >6-@2 (( HIT , 8AU>6-   L6.>:AS,}%6.>:AV,46.>:A&,H( ɠL  @6.>:@,!6.>:@$,*6.>:,<( ASCII Mode@ 6"}2(Function currently inactive6 %( Callers6.% A <( Kill MessageF 6. P<6}-P:B:,'@@,$@@%"8( No Messages< Z, 6.6-A:,#6.7&@9,,6-A:,d))( First Msg#  } Last Msg# n+B:,!@!6.7@,+ A9x##(=EXIT, Kill  4  "}A9`   )$@@!B:,A9`%6.7$@@&@9,%6-A:,5  A1(MESSAGE NOT} FOUND5   @ 6- A#"@AA( PASSWORD= ' 0#(}INVALID PASSWORD' :$@@%!B:,067$@@&@9,.: AA0))67$@@&@9,.7$@@%,"}  , ( B6C @ KILLED MSG ( A?(MESSAGE DELETEDC < AQ}6- & AX7@<# A A #A` @DL  + AY} !(FILE: + A`##)"@$)"ARA P0 6. AY  & Ap0 AP@!!"@})"@AQX*(Enter security level <1->. 8(>:,X @I)!%@HAQ6-&@H}E 6.D1:/(RETURN=Exit, File Name ] ;"@E6.D2: 4' "@6. AQe }B:,!67@ ,. 9-B:,7<,3Z967<,.>:@:7<,,&@2,.7<,1A*7<,/Z.67B:,%,.7<},.7<,10*7<,/9.67B:,%,.7<,  ""@AQ`#"@AQ`$067B:,%,..PV&6}7B:,%,.=:,0 AQe(67B:,%,..UDL-#7@<@,2A'# 2B:, *"' <!!(Xmode}m file transfer F Ar$P6"2(Function currently inactive6 U  UZ+@D}1:*.XXX$6.+6.d, ,7@<@,0 FAR n167B:,%,. !(+ AQ16-s67@}<@,.1x>  A 4 @XUP  > AR` @UP  ( AR}@( A. .(FILE ALREADY EXISTS!!! )  A6.)Ae } ++( Upload --- Enter file =Exit  (>6-A   4   ( } AS "@ATX*(Enter security level <1->. 8(>:,X @I)!%@HAQ}%6-&@H%"@AT5  6.D1:*.PV+67B:,%,.=:,5 AT   6.D1:*.UDL"("@}(67@<@,.2'=@6.36.FILE DIRECTORY---= AT@,, ,7@<@,4 }FATp667@<@,. -@67B:,%,.J67B:,%,.T AT ^/!67B:,%,.* = BINARY FILE/67B}:,%,.h  A A`  A ((Can't find that file  )  @})INF. BUFF'A 67AU,. '6. U AY0!-@@:@@H67B:,%,}.L R6-U$*,F:AV,,67B:,%,.73 6-B:,36-++'A(,&P:'A(,,$}A(H4-%@A(067B:,%@,.>:,4 R$pz @XDL   AY AYP}< ((FILE:  Ready to Send<( ^X to cancel 6- @! % 6-6-6-@2!6-}%  6-4-@**.*AU&46-6-$A(%C:,5-A'"6-F:%,)*}16-%5 .6-@:>:,,* ."@!Aa 6-@ 6-%6-%@Ac}26-+%@,$A($6-B:,2A`pAb "6. Aa6.7$A(%@<,$ } AY  AYP.  A``8*@ AcP(( * ABORTED *6-6-6- }d9 6-6-6-@2'6-@d36-@!96-n6 Ag67A1,. '6-C:,+ 6x@ ,(}FILE:  Ready to Receive,@( ^X to Cancel%-@6-%(>:,( F:AG,)( Ae@}1 *6-@)#6-1Af -A0< F:AG,)&%.6-%2 }< Af%6-%@% AAep AfT 6-&6-@:>:,,"B67B:,%@,.7@<A0,}J6-%T Af 9-A  %6-@!/ Ag9 Af06-@# #"*"@* Ae0}D " A (%6-,6.0 : AgD Ae0!!"@*"@Ah,% A(%(} * ABORTED *6   Ah* * (*(* SAVING FILE *) A B:,") Ah6}.7B:,,6-@:,2-B:,&A'%B:,&7<,026-A( "(7:AS,'6.>:AV,66.>:A&,'%6-@26-6-}% A0$'-+ (-( MESSAGES, LAST MESSAGE # .'( @8R:(@8'@4A(R}:B'8 A 8 @=====  =====  =====L'@4AR:V'@6R:`'@}R:j'@@R:~'&&(ATES4=24S2=255S7=15MQHS0='-@P '? BPAR%@}w*?@R1:'P@6R::@4A@R:P@8R:'@}R:' BP B 'G' BP A ,-@@G(TIME:  DATE: '<-@}@%( CHAT MODE +"2(ON< BT' (OFF'/(WRITE PROTECT "%(OFF/ BX' (ON'((}MESSAGES SECTOR='&@6-'WF:B2y,"@6-" .(ATH19@M@E:W A}'UF:B2y,"@ "(6-@@: @(K(ATAU B'(  B'' BP}* Bp*(>:AS,$*(ANSWERING CALL* 6.6.6-+6-A+C F:AG,"}) A3 A9(C A + "@Q *+ B0\+ (}]+( USER PROFILEe+( }NAME------->f+( FROM------->k+41BEp+( PASSWORD--->z+( SECURITY--->+$+(}PASSWORD--->NONE+ B0.%6-%@% @B .3"/(SYSOP IS NOT HERE!!!3 .+'(}SYSOP ALREADY ALERTED!!!+ .r0@@@)";@f@C(\(SYSOP IS NOT HE }REn@fr .<(( FROM (<(PRESS START TO BEGIN, ^X TO END.6-@@(2-@ }@6 . F:B2y,"@B0. /Q&(The bridge is being called.Q(#The Captian will answer if  }possible/ 2Z + (%( IN CHAT MODE((, H(WHAT'S THE BEEF?ZAdAU26-2" }F:B2y,"@" B&2B0@2' 'F:AG,"B0@2) )*"@)6-A& }2((>:,2 F:Ad,"AUB024)@"A&*( 4 B002"@$  3}"@ B%3"@ B!3 * B0066"2(Function currently inactive6 6)})(Private message for Sysop.6 A 6V )@  D:MESSAGES8(FROM:E(AT:}R(ON:V 6?.(#Enter message now, hit RETURN twice?(to end:6 (> 64BA6 (}  B@07  (  hB)(Р̭)6-@rB00(Enter command or ?} ==> |B (>:,B!@6-&@2B"@h BB"@ BB7"@!6.} D1:MESSAGES-6-@7 A B"@i6- B"@g BB7"@c!6. D1:SYSOPHLP-}6-@7 A B"@v BB  BpPF(Disk directory---ZF (Enter filespec now- }dF nF(  B(@xF#  ( # B@F A $8J!!(XIO} commands---=J3&(Enter XIO command number- * 36-A:,BJ?"(Enter filespec now- & ?67@<@,.}DVJ'  $ '$ N!!(Change Parameters---*N##(Enter date (mm/dd/yy)- 4N   6.>}N##(Enter time (hh:mm:ss)- HN   6.RN__6-++A:7@<@,,$@`%A:7@<@,,,$@`%A:7@}<,,,$@`\N/6-P:'BU6,/6-P:'AV,&$AVfNA6-&$BU6&$AV)@ 5@A@}pN&"(Enter chat mode code- & zN6-&@HNZ%(Enter write protect code<(0=WRITE PROTECTV(}1= WRITE PROTECTZ N6-&@H(N$R7"6-@4(̠Š7$R,6-)}(̠Š,$m    D:CONFIGm3.(3m$2n5}@6R:2@R:5$Hq]];A ,;@,;@@,;@@,;@0,;@$,;@@},;@0,Rqss;A!,;@W,;@@,;@@,;@,;@3,;A ,;@@,;AU,;@P},\ql;@,6.hhhLV*6-66-@<6-H6-@T6-@`6-B2yl6-Baq;@ },fq88;,;,;,;,;,;,;,;,;@ ,kq.&;@,;@,;@,."pq""6.312831303130!}313130313031uq<.6.$^=CTRL: ^S=PAUSE, ^Q=RESUME, ^X=QUIT<67B:,%,.zq7(>:A%,7("ŠӠΠĠ"}q+ A0'(Enter date mm/dd/yy +q@(Enter time hh:mm:ss !<(Enter chat mode code @qR!(Enter wr#}ite protect code:6(0=WRITE PROTECTN(1= WRITE PROTECTRq.*(!Insert work disk, and hit RETURN .q{6-A$}6-A'6-A36-@p?-@ K6-AW6-Bc6-Ao6-Ap{6-@q7(6.B?HNX%}QTREYGLACSKDUFOIPZ#!76.>:AU,q*%@ D:MESSAGES*q""@D:CONFIGq&}qQ@7(Callers list since L(at :Qq0@'}#(06-&q6$@ D:CONFIG216qO6-I:,&A+ @BUFF = 2;(},C6-P:'@@,O6-@q__6-++A:7@<@,,$@`%A:7@<@,,,$@`%A:7@<,,,$@`)}q/6-P:'BU6,/6-P:'AV,&$AVqA6-&$BU6&$AV)@ 5@A@r'#@*}@K:' 0u22D1:MESSAGE.ISM,D1:MESSAGE.DAT,D1:CALLERS.DATu 6.u( Password---> uDIM PA+}$(30)u 6.u(u<<(1Verifying password, you now have the following:u(u[[(PA security level of 1, b,}ut I can raise you to a security level I see fit.u$$( And a password and act# u B!u u2@-}2@@ D:PASSuTRAP 30200:INPUT L$u(@v(@ v(@v(@.}1*v@4v''@@ D:ACTS>v(@ Hv? #1;ADDRES$;" ";PASSCKMv 6.Rv/}@\v fv))(YOUR ACCOUNT NUMBER IS ---> v ' yB:, @$yk-@B:,&@k7<%0}@,4SYSOP)7<%@,4sysop)7<%@,4SysopA3P y "y$ {Z1("Standby, searching for passwor1}d...5 Z@@D1:PASS{ Bp{-@A:, {@*{ /{@2} 4{!(Enter password ] ! >{D 4(Online +6-@46-A:,:6-D A0H{'( Incorrect3}(' AR{Q@ A G(#ERROR---ACCOUNT NUMBER NON-EXISTENTQ A}Y0(!Standby, check4}ing for password...4 Y@@D1:PASS} B @ }@}" 4@ " 5}B@} B (}& A@ & Ad}A +@@D:PASS5 B! A6-@n}6}(@6-%@( B!x}b6-&@*6-P:'@,%@5@9 <(U(NEXT ACCOUNT NO.= _ 7}Ab$}@#$}(( from (}$,~!B:,"6-!$1~:-@B:,+7<,4@*8}"76-@:$6~ @~6-$~D1(MESSAGE NUMBER [A:, ] - .5 A6-D$~* 9} *@D1:*.*~ ( B% $& B%T(33&@@:}P:0 B3$*0#@@E:- B0$XF:B2y,@$bU "6-(@;}E::( ̠ŠF6-@ R6-@U$lA 6-  (̠Š&6-2">6-@A$v6-<}$ B&TK'@@D2:*.*36-@>@H BK$'@6-@$ =}B'$D1:MD4'@@D2:*.*36-@>@H BK$'@6-@$ ****************************************** Commands of the ship ***************** Enterprise ****************************?}******************* []-ATASCII/ASCII []-Bulletins[]-Callers List []-Download[]-Enter Message []-File Listi@}ng[]-Goodbye []-Help![]-Index to D/L []-Kill Message[]-Linefeeds []-System pieces[]-Other BBS'S [A}]-Message-SYSOP[]-Quick Scan []-Read Message[]-Scan Messages []-Time and Date[]-Upload []-Expert ModeB}[]-Call the Bridge[]-Account List[]-User Profile Messages []-Time and Date[]-Upload []-Expert Mode>UVCRBFILMSECMBYTMSGHMSCALLNCSECCBYTMESSAGESSECTOMSSBYTERINGSNAMENAME||@D}@3 @3 }(@ E}INIT BBSҠ̠˛ + H<;@,;A$,;@@,;@0,;@#,H6-@F})67A$,.>:,)6.Sysop- (Initialize B.B.S.(6.>:AU,*#(Enter Sysop Password- #,.*G}("Enter number of rings to answer on.<6,($Enter # of sectors for messages file066-><)(!Enter your name (MAX- H}23 CHARS.):-<67@,.F1(@ D:MESSAGE.DAT1P!-@( !Z-(@I} D:MESSAGE.ISM-d'6-6-'6-n$ (Enter number of callers-$##@J}D:CONFIG00(H$@ D:CONFIG2+(2(9K}(@(EH D:INIT.BBSH$@ D:CONFIG2+(2(9' M} TRIG UP RIGHT DOWN LEFT O} P} Q} R} S} T}Compuserve (GY) U}  V}   W}  }  } Sysop Level Commands C-Change R-Read Private parameters messages to D-Directory sysop by file%Z}spec X-XIO Commands E-Exit to 33=Delete user mode 32=Rename L-Literal mode D:OLD,NEW on=full %[}fspec 35=Lock access 36=Unlock off=access only UDL filesL-Literal mode D:OLD,NEW on=full $T8<<  B JKIHiDiELV`L8 8 BLV`Lx)]}8t8l Lu8hihiHHȱȱL8c !#3`Lu8JJJJ`H 8h`H)^}ȩh Q8L8 Z8L8 8L8 8L8 8L8S:@9E:E9H '9 H9I9 8 '9h)0IC)_}9D9L8 L :::: :Lr:::IEL[::i:iIIL[:`:i::i)a}::L:`L{:w:w: C`L:L: D8:MEM.SAV: 8| 9 '9`L:L: D:DUP.SYS:̩ 8)b} x:ɀL: '9`88 |9Y:X: '9L); D8:DUP.SYS; 8::88 9 '98? :`;WL`; 9)c}Ln; ` :Y;Y;L;L;)} Setting Up ATARI 130XE Ram Disk; 9L; ; -9  )d} L;D8:; :9 :Y;LFUNC b CINIT BBSb LMACRO SYSbXMESSAGES bYSYSOPHLP b \RAMDISK COM