F I D O N E W S --       Volume 14, Number 14          7 April 1997
     +----------------------------+-----------------------------------------+
     |  The newsletter of the     |   ISSN 1198-4589 Published by:          |
     |    FidoNet community       |   "FidoNews"                            |
     |          _                 |        1-904-409-7040    [1:1/23]       |
     |         /  \               |                                         |
     |        /|oo \              |                                         |
     |       (_|  /_)             |                                         |
     |        _`@/_ \    _        |                                         |
     |       |     | \   \\       |   Editor:                               |
     |       | (*) |  \   ))      |        Christopher Baker  1:18/14       |
     |       |__U__| /  \//       |                                         |
     |        _//|| _\   /        |                                         |
     |       (_/(_|(____/         |                                         |
     |             (jm)           |     Newspapers should have no friends.  |
     |                            |                    -- JOSEPH PULITZER   |
     +----------------------------+-----------------------------------------+
     |               Submission address: FidoNews Editor 1:1/23             |
     +----------------------------------------------------------------------+
     |  MORE addresses:                                                     |
     |                                                                      |
     |    submissions=> cbaker84@digital.net                                |
     +----------------------------------------------------------------------+
     |    For  information,   copyrights,   article   submissions,          |
     |    obtaining copies of FidoNews or the internet gateway FAQ          |
     |    please refer to the end of this file.                             |
     +----------------------------------------------------------------------+


                 POLICY 5 - WILL IT EVER EXIST?


                        Table of Contents
     1. EDITORIAL  ................................................  1
        Censorship story a misunderstanding  ......................  1
     2. LETTERS TO THE EDITOR  ....................................  2
        Fido commercials?  ........................................  2
     3. COLUMNS  ..................................................  3
        Lock and Load: Guerilla Marketing for BBSes  ..............  3
     4. GETTING TECHNICAL  ........................................  6
        FSC-0055 - Security Passwords in Nodelist updates  ........  6
        FSC-0056 - EMSI/IEMSI Protocol Definitions  ...............  7
     5. COORDINATORS CORNER  ...................................... 29
        Nodelist-statistics as seen from Zone-2 for day 094  ...... 29
     6. WE GET EMAIL  ............................................. 30
        Echomail problems in Region 35  ........................... 30
     7. NET HUMOR  ................................................ 31
        Signs your Webmaster is in a cult  ........................ 31
     8. NOTICES  .................................................. 34
        Future History  ........................................... 34
     9. FIDONET SOFTWARE LISTING  ................................. 35
        Latest Greatest Software Versions  ........................ 35
     10. FIDONEWS PUBLIC-KEY  ..................................... 40
        FidoNews PGP public-key listing  .......................... 40
     11. FIDONET BY INTERNET  ..................................... 41
     12. FIDONEWS INFORMATION  .................................... 43
     FIDONEWS 14-14               Page 1                    7 Apr 1997


     =================================================================
                                 EDITORIAL
     =================================================================


     A report last week that FidoNews had been censored by an unnamed ZC
     turned out to be a difference of opinion on what constitutes a case
     of censorship.

     When I first started editing FidoNews, I added a FidoNews public-key
     section to the newsletter for those who wanted to send things to the
     FidoNews privately or clear-signed. ZC1, to whom I feed FidoNews for
     worldwide distribution, suggested such an addition be removed due to
     the possibility that such an addition might compromise laws in other
     countries. I removed the key segment itself and replaced it with the
     note about the removal pending a decision by the ZCC on its inclusion.
     This was a voluntary act on my part in response to the request by ZC1.

     After polling the ZCs, personally, via direct Netmail and receiving a
     majority having no problem with the key segment being included in the
     FidoNews, I returned the segment to each Issue without fanfare or
     complaint.

     While the segment was missing from the FidoNews it was available on
     FidoNews webpage. I never considered it censorship of any kind. I may
     have thought it overly sensitive but I understood the intent and
     complied voluntarily. So, no blood, no foul. Case closed.

     Speaking of the dreaded Internet, there are several additions to the
     Regional listings in today's Issue. The R19 page has changed from the
     inactive listing to the working one and R41 [Greece] has been added as
     well our first listing in Zone 4 at Net 904 in Argentina. Normally,
     Net level listings appear only on the FidoNews webpage but since Zone
     4 has no listings at all, Net 904 is there to see if it can stimulate
     some action in that area of FidoNet. [grin]

     The only Regions missing in Zone 1 are Region 12 and Region 13. Does
     anyone out there know if they have webpages? Please point them in
     this direction. Thanks.

     For those who hate the technical history section, you're really going
     to dislike this one. It contains the EMSI standard proposal in toto.
     History is good. There are less than 40 to go and all of them are a
     lot smaller.

     These things that repeat are here in each Issue because any one Issue
     may be the only one a newbie sees that might bring them into the fold.

     C.B.

     -----------------------------------------------------------------

     FIDONEWS 14-14               Page 2                    7 Apr 1997


     =================================================================
                           LETTERS TO THE EDITOR
     =================================================================


     From Pete Snidal, 1:354/910 - Grand Forks, BC Canada

        Excellent ideas expressed in the last FNEWS over redundancy in
     technobabble which most of us never read, and also in this great new
     letters-to-ed idea.

        I write in query to whether anyone else has noticed a disturbing
     trend I've been watching going down on CBC (Canadian Broadcasting
     System) TV from Montreal.  (I get it on my sat dish, and consequently
     get to watch CBC Montreal and Toronto as well as Vancouver, even
     though I live out West.)

        Since I live out west, all I've seen of this trend is a few
     commercials on Montreal TV, but it looks like it could be sticky.
     What I'm referring to is what appears to be a CelTel provider calling
     itself, of all things, FIDO!

        That's right!  FIDO!  The ads started late last summer, just little
     shorties, saying nothing but stuff like:  "FIDO IS COMING!" Now,
     though, they're right into it, announcing how they provide a multitude
     of _Communications_ services, of all things!  CelTel, voicemail, ISP
     perhaps, what's next - AOL-style bulletin board?  Hey, that'd be nice!
     A little confusing, perhaps, what with their coverage area - whatever
     it is (Montreal?  Quebec?  Canada?  North America?) - sure to have a
     whole mess of existing FIDO bulletin boards already.  (In fact, I
     think I saw the word NET in there somewhere in the last FIDO ad or
     two.)

        So what's happening here?  I thought there was a
     copyright/trademark/whatever on the FIDO name.  Apparently not; they
     seem to have gotten past whomever you apply to for corporate monikers.
     Do they even know about Fidonet?  I don't imagine so.  What are they
     going to have to say when they discover this upstart network of
     computer hobbyists using "their" name?  They've obviously spent
     too much money already and are too committed to the name to change
     themselves.

        How did this happen?  Where's it going to lead?  Has anyone else
     noticed this?  What the (*&(% is going on?

        Sincerely,

        Confused.

     -----------------------------------------------------------------

     FIDONEWS 14-14               Page 3                    7 Apr 1997


     =================================================================
                                  COLUMNS
     =================================================================


     Lock and Load: Guerilla Marketing for BBSes
     Robert Parson 1:3822/1

     After mulling over the idea for several weeks, I have decided, for the
     second time in my career, to write a column.  I really should have
     learned my lesson the first time.

     At one time, Fidonet stood on the brink of being THE Network for
     international computer based communications.  Let's face it, that
     opportunity has been lost because of the dynamic growth of the
     Internet.

     So what.

     In my previous column, I wrote something along the lines of "BBSs will
     become the convenience stores of electronic information.  They'll be
     useful for getting some quick information, but you'll have to go to
     one of the commercial services if you need if you need to get
     serious."

     That comment was made about two years before the breakout of the
     Internet, but I generally still hold to it, except you probably should
     change "commercial services" to "the Internet."  Be that as it may,
     and I'm sure you agree with me, BBSs still provide a useful and vital
     communications link.

     There's no reason why BBSs should continue to do their work in
     obscurity and be considered the shadowy side of electronic
     information.  To that end, I'm offering to help through this column.
     With "Lock and Load," I hope to give you the ammunition you need to
     raise public awareness of your BBS.

     You cannot compete with AOL or even your local Internet Service
     Provider.  You don't have the money or the manpower.  I'm going to
     look at helping you market your BBS in your community using just a few
     hours and less than 20 dollars a month (with a target of Zero dollars
     a month!)

     What makes me audacious enough to think I should write this column?
     That's a fair enough question.  First of all, I am a broadcast
     journalist with nearly 20 years experience.  Secondly, I wrote The
     "BBS Guide to Public Relations" some years ago (by the way, it's still
     available for download at Jackalope Junction BBS (1:3822/1), but is no
     longer being actively supported.  Among other things, I need to
     completely overhaul the file.  Perhaps I'll get to it one day).
     Thirdly, I want to be of help.

     Now the groundrules.  I am going to deal only with Public Relations
     and Public Image issues in this column.  If you contact me in E-mail
     or somehow track down my home phone, I will be happy to discuss
     particular issues or problems at no cost.  If you send me snail mail,
     FIDONEWS 14-14               Page 4                    7 Apr 1997


     please include a self addressed stamped envelope if you expect a
     response (Hint: I love getting BBS newsletters.).  I'll print my
     mailing address in this column occasionally. Any discussions or
     correspondence could become fodder for this column.  Unless
     specifically requested, your name, BBS name, and node number could be
     included in the article.  I will NOT be writing this column weekly.
     but it will be in every other issue of Fidonews.  At least until I run
     out of things to say.  These groundrules are subject to change.  But I
     will let you know in advance.

     Okay, now with all that out of the way, let's roll up our sleeves and
     get to work.

     Order some business cards.  Nothing fancy.  Just the name of your BBS,
     your name and title (I suggest System Operator since the average Joe
     on the street is not going to know what a Sysop is.), the number of
     the BBS and your voice phone.

                   Sample Business Card:
                   _______________________________________

                                  Newsbob BBS

                                 Robert Parson
                                System Operator

                   XXX XXX XXXX Data    Voice XXX XXX XXXX

                   ________________________________________



     You can probably get these pretty cheap at the printshop or you can
     make your own using a desktop publisher.  If you decide to make your
     own, you can get blank card stock at just about any office supply
     store.

     While you're at it, get some letterhead.  Order it at the same time
     you order your business cards.  Again, though, if you decide to make
     your own letterhead, you can usually turn it into a template in your
     desktop publisher or wordprocessor.

     Your BBS may be "Just a hobby."  But at the same time it's bit of a
     profession.  You should present a professional image in any dealings
     with the "outside world," even if your BBS is primarily a gaming BBS.
     Keep in mind "professional" doesn't mean "not fun."

     Now I want you to get out your phone book and get the phone numbers of
     the newsrooms for all the newspapers and television and radio
     stations.  Over the next couple weeks I want you to collect from
     newspapers: the names of the Business Editor (if they have one) and
     the Editor, the fax number to their newsroom, e-mail address and their
     mailing address.  From radio and tv stations: the names of the News
     Director, Assignment Editor, and Public Service Director (if they have
     them), the fax number, e-mail address and their mailing address.

     FIDONEWS 14-14               Page 5                    7 Apr 1997


     In most cases, they will be happy to provide you with the information,
     although they may want to know who you are and why you want it.  Be
     honest.  Tell them your name and you would like to send them some
     information soon.

     In two weeks, we'll discuss what sort of information to send them.


     Robert Parson
     2501 Phoenix
     Fort Smith, AR 72901

     Fidonet: 1:3822/1


     Net-Tamer V 1.09 Beta - Test Drive

     -----------------------------------------------------------------

     FIDONEWS 14-14               Page 6                    7 Apr 1997


     =================================================================
                             GETTING TECHNICAL
     =================================================================


     [These FTSC docs are published as part of the FidoNet History series.
      They have been reformatted to 70 columns where required. Any tables
      included may be askew. Node numbers phone numbers listed may no
      longer be accurate.] Ed.

     Document: FSC-0055
     Version:  001
     Revision: 31-Mar-1991

                  Security Passwords in Nodelist Update Files

                                  Luke Kolin,
                    1:250/714@fidonet.org, 89:480/210@imex

                               March 31st, 1991

         Status of this document:

              This FSC suggests a proposed protocol for the FidoNet(r)
              community,  and requests discussion and suggestions for
              improvements.  Distribution of this document is subject
              to the restrictions listed below.

              Fido and FidoNet are registered marks of Tom Jennings
              and Fido Software.

              The author grants the FTSC unlimited  distribution and
              reproduction rights  in order to facilitate discussion
              of the proposals in this document.

              MakeNL is a program by Ben Baker.

              SysNL is a program by Luke Kolin.

       PURPOSE

             This document is intended to explain the format and purpose of
       security passwords within nodelist update files, and to inform the
       authors of nodelist software about its proper usage.

       THE NEED FOR PASSWORDS

             Until now, the nodelist update files that *Cs create with
       software packages such as MakeNL or SysNL have had no security
       passwords inside of them. The only security between the NC and an RC
       has been the name of the update file itself. For example, the name
       of the Net 250 update file was "Metronet.250". It was quite
       conceivable for a sysop, upon discovering this name, to make a
       fraudulent update file, also called "MetroNet.250", and send this to
       1:12/0. The nodelist processor which created the regional update
       file at that end would not know that the file was not genuine, and
     FIDONEWS 14-14               Page 7                    7 Apr 1997


       this would be added to the weekly update for the region.

       PASSWORD FORMAT

             It seems emminently logical that some sort of security
       password should be added to nodelist update files, to prevent the
       aforementioned problems from occurring. Therefore, I propose that
       nodelist update files have an optional password in the first
       (header) line, right after the ";A" general interest flag. The first
       character of this case-sensitive password shall be an "at" sign @
       (ASCII decimal 64 hex 40). If this character is present, then all
       characters after it, until (but not including) the next space (ASCII
       decimal 32 hex 20) will be considered part of the password. As well,
       no password may be 8 characters or more in length. This is a sample
       header line, with a password of ConSoft present:

       ;A @ConSoft Net 250 nodelist file for Friday, February 22nd : 10344

             Please note the password starts right after the first space
       (ASCII 32) with the ASCII 64 decimal character, and is case-
       sensitive. The following is a sample header, without a password
       present:

       ;A Net 250 nodelist file for Friday, March 1st : 13501

       NOTES

             It is extremely important that the password be on the first
       line of the nodelist update file. It must commence immediately after
       the first space (ASCII 32) character, with an ASCII 64 "at" sign.
       Remember, it is case-sensitive.

             I believe that it is up to the authors of individual nodelist
       utilities to deal with the presence of passworded update files as
       they believe fit. However, it is my belief that utilities, when
       faced with a file with a bad password, retain a copy of a previous
       (good) update file, which should be used instead of the bad one, to
       prevent the equally nasty problem of a bad update file preventing an
       entire network/region from being included.

             Please note that I do not participate in either the FTSC or
       NET_DEV conferences. I can be reached at 1:250/714@fidonet.org, or
       in Imex at 89:480/210@imex.

      -30-

     -----------------------------------------------------------------


     Document: FSC-0056
     Version:  001
     Date:     03-May-1991

                           EMSI/IEMSI Protocol Definitions
                               Joaquim H. Homrighausen
                                    May 3, 1991
     FIDONEWS 14-14               Page 8                    7 Apr 1997


         Status of this document:

          This FSC suggests a proposed protocol for the FidoNet(r)
          community, and requests discussion and suggestions for
          improvements.  Distribution of this document is subject to the
          restrictions specified on the next page.

          Fido and FidoNet are registered marks of Tom Jennings and Fido
          Software.

           (Also known as EMSC-001; Electronic Mail Standards Document
            #001)
         ------------------------------------------------------------------
          Copyright 1989-1991 Joaquim H. Homrighausen. All rights reserved.
         ------------------------------------------------------------------

         Notice
         ==================================================================
         This document obsoletes EMSI_003 and any previous document
         describing the EMSI, UZAP, and/or IEMSI handshake protocol. I
         apologize for the lack of proper state charts. I am currently
         under a fairly heavy work-load and thought it would be better to
         release something half-decent than not to release anything at all.

         Restrictions
         ==================================================================
         EMSI/IEMSI may be used by any developer as long as these
         specifications are followed exactly. The IEMSI and EMSI
         specifications may be implemented independently of each other.

         EMSI/IEMSI may be used free-of-charge by any developer for any
         purpose, commercially or otherwise. In creating EMSI/IEMSI, we are
         taking the first step towards developing a clear protocol
         definition for state-of-the-art E-Mail systems to follow.

         This document and its NOTES file (EMSI.NOT) may be freely copied
         and distributed, but must NEVER be distributed in a modified form.
         If you have an enhancement request, please contact the author of
         this document; do not change it yourself.

         Permission is hereby granted to the FTSC (Fidonet Technical
         Standards Committee) and other technical organisations to
         republish this document in its entirety. Librarians may change the
         title page and page headers to match their library format as long
         as all copyrights and body text remain unaltered. The original
         document name and source (EMSC) must be mentioned in any
         republished versions of this document.

         No organization, company, person, or other being may impose any
         fees for any reason for providing this document. This document may
         not be sold or otherwise transferred for personal or company gain
         under any circumstances.

         Layout
         ==================================================================
         This document consists of four major parts; A short introduction
     FIDONEWS 14-14               Page 9                    7 Apr 1997


         and explanation of the EMSI/IEMSI handshake protocol, the EMSI
         definitions, the IEMSI definitions, and finally various notes and
         credits.

         PART I

         Introduction
         ==================================================================
         The EMSI/IEMSI handshake protocol allows for maximum flexibility
         in E-Mail session start-up and control. The YooHoo (FTS-6)
         standard, designed by Wynn Wagner III, was a good idea, but did
         not allow sufficient room for growth and cannot be used in 7-bit
         environments.  EMSI/IEMSI should provide for virtually unlimited
         growth and expansion of its own scope. By providing variable-
         length packets, EMSI/IEMSI is capable of being as simple or as
         complex as necessary and entirely backwards compatible when new
         features and/or protocols are added.

         All EMSI/IEMSI packets and sequences consists of 7-bit printable
         ASCII characters. This format allows us to establish a universal
         handshake between "PCs" and "mainframes" alike. The more
         complicated the computer system, the more restrictions affect its
         I/O; there are many I/O channels that cannot transmit control
         characters such as XON and XOFF; for this, we have created a
         universal handshake protocol that uses all printable characters.

         EMSI/IEMSI does allow control and 8-bit ASCII characters to be
         transmitted. This is, however, accomplished by escaping the data
         and converting it to 7-bit printable ASCII characters.

         Data layer
         ==================================================================
         EMSI/IEMSI is a protocol based on multi-character sequences rather
         than single character flow control. There are several advantages
         of using several characters rather than just one, but there is
         also a drawback. On very poor-quality telephone lines, EMSI will
         most likely require several retransmissions of packets since line
         noise usually come in bursts. That aside, there is little
         advantage in using a protocol based on single characters.

         All EMSI/IEMSI sequences are terminated by a single <CR> unless
         otherwise specified. This is necessary to force some data
         collection equipment to flush their buffers. Appending <CR> to
         EMSI/IEMSI sequences in a FidoNet environment is a delicate matter
         and it is important that you follow the notes regarding this.

         Note regarding file requests
         ------------------------------------------------------------------
         The file request concept mentioned in the EMSI document refers to
         WaZOO style file requests as specified in FTS-6. No other file
         request mechanism is supported in the EMSI specifications.

         Separator usage
         ------------------------------------------------------------------
         To designate the fields within the EMSI/IEMSI packets and retain
         complete transparency, both start and stop characters are used.
     FIDONEWS 14-14               Page 10                   7 Apr 1997


         The ASCII1 type is used for all fields within the packet. This
         uses the brace characters to delimit the fields. The '{' (ASCII
         123) character is the start byte and '}' (ASCII 125) is the stop
         byte.  If a stop byte is used as literal data within a field, it
         must be transmitted twice. The end of a field is designated by a
         stop byte that is not followed by another identical stop byte.

         The ASCII2 fields are delimited in exactly the same way, but use
         the square brackets as delimiters. The '[' (ASCII 91) is the start
         byte and ']' (ASCII 93) is the stop byte. ASCII2 is used to
         delimit data within the ASCII1 extra_field information.

         7-bit data restriction
         ------------------------------------------------------------------
         It is the developer's responsibility to ensure that the software
         generates EMSI/IEMSI packets and sequences containing only 7-bit
         (00H through 7eH) printable ASCII characters.

         It is recommended that all EMSI/IEMSI implementations strip the
         high-order bit of all received characters prior to processing the
         packet/sequence and prior to calculating CRC values.

         CRC values
         ------------------------------------------------------------------
         The polynomial used to calculate a 16-bit CRC is the same
         polynomial used in the Xmodem file transfer protocol. The
         polynomial used to calculate a 32-bit CRC is the same polynomial
         used in the Zmodem file transfer protocol.

         Binary values
         ------------------------------------------------------------------
         Since the EMSI environment specifies only 7-bit printable ASCII
         characters to be used, binary values, such as CRC and length
         descriptors are expressed as a four character hexadecimal string.
         The only exception to this is a 32-bit CRC value which is
         expressed as an eight character hexadecimal string.

         The application must treat them case insensitive, eg. ffaa should
         be treated identical to FFAA.

         Handling 8-bit data
         ------------------------------------------------------------------
         Although EMSI only uses 7-bit printable ASCII characters, there is
         an escape mechanism that allows systems to transmit control and 8-
         bit ASCII characters without the requirement of an 8-bit data
         link.  The escape character is a backslash character ('\') and is
         followed by two characters in hexadecimal notation. Eg. "\80" is
         the ASCII character 128. To insert an actual backslash character,
         two backslashes are used ("\\"), or a backslash followed by the
         hexadecimal code for a backslash, eg. "\5c".

         The hexadecimal code following a backslash MUST always be two
         characters, ie. to insert ASCII 15 (hexadecimail 'f'), the result
         would be "0f". All hexadecimal sequences must be treated case
         insensitively.

     FIDONEWS 14-14               Page 11                   7 Apr 1997


         PART II - Electronic Mail Standard Idenfitication

         Connecting two EMSI capable systems
         ==================================================================
         This assumes that the two systems are connected and that no data
         has been transmitted by the Caller.

         It should be mentioned that sending/monitoring for the "YooHoo",
         "TSYNC", and other protocol start characters is optional and not
         required for a strict EMSI implementation.

         STEP 1, EMSI INIT

             Calling system                   Answering system +-+---------
         ----------------------+----------------------------------+
         :1: Send <CR> until ANY character : Send EMSI_REQ and possible
         :
         : : is received.                  : banner, etc.
         : +-+-------------------------------+-----------------------------
         -----+
         :2: Receive banner, etc. Monitor  : Monitor line for the EMSI_INQ
         :
         : : line for the EMSI_REQ         : sequence and if received,
         :
         : : sequence and if received,     : attempt to handshake
         immediately.:
         : : transmit EMSI_INQ and attempt :
         :
         : : to handshake immediately.     :
         : +-+-------------------------------+-----------------------------
         -----+
         :3: No EMSI_REQ sequence received,: Monitor line for EMSI_INQ and
         :
         : : send EMSI_INQ twice followed  : possible other protocol start
         :
         : : by possible other protocol    : characters and if received,
         :
         : : start characters.             : attempt to handshake
         immediately.:
         : :                               :
         :
         : : Transmit <CR>                 : Go to step 3.
         : +-+-------------------------------+-----------------------------
         -----+
         :4: If EMSI_REQ sequence received,:
         : : send EMSI_INQ and attempt to  :
         : : handshake immediately,        :
         : : otherwise repeat step 3.      :
         +-+-------------------------------+

         In steps 1 and 2, both the Calling and Answering system terminate
         all sequences with <CR>. In step 3, the Calling system does not
         terminate sequences with <CR> as it is explicitly transmitted
         after possible protocol start characters. In step 4, the Calling
         system once again terminate all sequences with a <CR>.

     FIDONEWS 14-14               Page 12                   7 Apr 1997


         STEP 2A, RECEIVE EMSI HANDSHAKE

         At this point, all sequences are terminated with a <CR>.

         +-+---------------------------------------------------------------
     ---+
         :1: Tries=0, T1=20 seconds, T2=60 seconds
         : +-+-------------------------------------------------------------
         -----+
         :2: Increment Tries
         :
         : :
         :
         : : Tries>6?                      Terminate, and report failure.
         :
         : +---------------------------------------------------------------
         ---+
         : : Are we answering system?      Transmit EMSI_REQ, go to step 3.
         :
         : +---------------------------------------------------------------
         ---+
         : : Tries>1?                      Transmit EMSI_NAK, go to step 3.
         :
         : +---------------------------------------------------------------
         ---+
         : : Go to step 4.
         : +-+-------------------------------------------------------------
         -----+
         :3: T1=20 seconds
         : +-+-------------------------------------------------------------
         -----+
         :4: Wait for EMSI sequence until EMSI_HBT or EMSI_DAT or any of
         the  :
         : : timers have expired.
         :
         : :
         :
         : : If T2 has expired, terminate call and report failure.
         :
         : +---------------------------------------------------------------
         ---+
         : : If T1 has expired, go to step 2.
         :
         : +---------------------------------------------------------------
         ---+
         : : If EMSI_HBT received, go to step 3.
         :
         : +---------------------------------------------------------------
         ---+
         : : If EMSI_DAT received, go to step 5.
         :
         : +---------------------------------------------------------------
         ---+
         : : Go to step 4.
         : +-+-------------------------------------------------------------
         -----+
     FIDONEWS 14-14               Page 13                   7 Apr 1997


         :5: Receive EMSI_DAT packet
         :
         : +---------------------------------------------------------------
         ---+
         : : Packet received OK?                Transmit EMSI_ACK twice,
         and  :
         : :                                    go to step 6.
         :
         : +---------------------------------------------------------------
         ---+
         : : Go to step 2.
         : +-+-------------------------------------------------------------
         -----+
         :6: Received EMSI_DAT packet OK, exit.
         : +-+-------------------------------------------------------------
         -----+

         All processing of the information in the EMSI_DAT packet must be
         done after transmitting EMSI_ACK twice to the remote system. It is
         recommended that an EMSI_HBT sequence is issued once every seven
         seconds while such processing is taking place to avoid unnecessary
         handshake collissions. Emitting EMSI_HBT should only be done when
         it is obvious that the remote system is waiting for the second
         phase of the EMSI handshake to take place.

         STEP 2B, TRANSMIT EMSI HANDSHAKE

         At this point, all sequences are terminated with a <CR>.

         +-+---------------------------------------------------------------
     ---+
         :1: Tries=0, T1=60 seconds
         : +-+-------------------------------------------------------------
         -----+
         :2: Transmit EMSI_DAT packet and increment Tries
         :
         : :
         :
         : +---------------------------------------------------------------
         ---+
         : : Tries>6?                        Terminate, and report failure.
         :
         : +---------------------------------------------------------------
         ---+
         : : Go to step 3.
         : +-+-------------------------------------------------------------
         -----+
         :3: T2=20 seconds
         : +-+-------------------------------------------------------------
         -----+
         :4: Wait for EMSI sequence until T1 has expired
         :
         : :
         :
         : : If T1 has expired, terminate call and report failure.
         :
     FIDONEWS 14-14               Page 14                   7 Apr 1997


         : +---------------------------------------------------------------
         ---+
         : : If T2 has expired, go to step 2.
         :
         : +---------------------------------------------------------------
         ---+
         : : If EMSI_REQ received, go to step 4.
         :
         : +---------------------------------------------------------------
         ---+
         : : If EMSI_ACK received, go to step 5.
         :
         : +---------------------------------------------------------------
         ---+
         : : If any other sequence received, go to step 2.
         :             : +-+-----------------------------------------------
         -------------------+
         :5: Received EMSI_ACK, exit.
         : +-+-------------------------------------------------------------
         -----+


         EMSI packet and sequence definitions
         ==================================================================

     =====================================================================
         EMSI Inquiry
         **EMSI_INQ<crc16><CR>
         ------------------------------------------------------------------
         EMSI Inquiry is transmitted by the calling system to identify it
         as EMSI capable. If an EMSI_REQ sequence is received in response,
         it is safe to assume the answering system to be EMSI capable.

     =====================================================================
         EMSI Request
         **EMSI_REQ<crc16><CR>
         ------------------------------------------------------------------
         EMSI Request is transmitted by the answering system in response to
         an EMSI Inquiry sequence. It should also be transmitted prior to
         or immediately following the answering system has identified
         itself by transmitting its program name and/or banner. If the
         calling system receives an EMSI Request sequence, it can safely
         assume that the answering system is EMSI capable.

     =====================================================================
         EMSI Client
         **EMSI_CLI<crc16><CR>
         ------------------------------------------------------------------
         EMSI Client is used by terminal emulation software to force a
         mailer front-end to bypass any unnecessary mail session
         negotiation and treat the call as an incoming human caller. The
         EMSI_CLI sequence may not be issued by any software attempting to
         establish a mail session between two systems and must only be
         acted upon by an answering system.

     =====================================================================
     FIDONEWS 14-14               Page 15                   7 Apr 1997


         EMSI Heartbeat
         **EMSI_HBT<crc16><CR>
         ------------------------------------------------------------------
         EMSI Heartbeat is used to prevent unnecessary timeouts from
         occurring while attempting to handshake. It is most commonly used
         when the answering system turns around to transmit its EMSI_DAT
         packet. It is quite normal that any of the timers of the calling
         system (which at this stage is waiting for an EMSI_DAT packet)
         expires while the answering system is processing the recently
         received EMSI_DAT packet.

     =====================================================================
         EMSI Data
         **EMSI_DAT<len16><data_pkt><crc16><CR>
         ------------------------------------------------------------------
         EMSI Data is transmitted by both the calling and answering system
         at the appropriate time to exchange system information. Following
         the header is a four byte number representing the length of
         <data_pkt> excluding the CRC and terminating <CR>.

         The EMSI_DAT packet is a variable length packet. Since this is a
         synchronous protocol, the inbound data buffer should be purged
         between transmission of the <data_pkt> and <crc16> fields to
         prevent accidental EMSI_NAK sequences, etc.

     =====================================================================
         EMSI ACK
         **EMSI_ACK<crc16><CR>
         ------------------------------------------------------------------
         EMSI ACK is transmitted by either system as a positive
         acknowledgement of the valid receipt of a EMSI_DAT packet. This
         should only be used as a response to EMSI_DAT and not any other
         packet.  Redundant EMSI_ACK sequences should be ignored.

     =====================================================================
         EMSI NAK
         **EMSI_NAK<crc16><CR>
         ------------------------------------------------------------------
         EMSI NAK is transmitted by either system as a negative
         acknowledgement of the valid receipt of a EMSI_DAT packet. This
         should only be used as a response to EMSI_DAT and not any other
         packet. Redundant EMSI_NAK packets should be ignored.

         The EMSI_DAT packet
         ==================================================================
         The EMSI_DAT packet is the core of an EMSI negotiated session. It
         contains information vital to the mail session. The following
         pseudo structure shows the layout of the EMSI_DAT packet.

         EMSI_DAT
             fingerprint,            "EMSI"
             system_address_list,
             password,
             link_codes,
             compatibility_codes,
             mailer_product_code,
     FIDONEWS 14-14               Page 16                   7 Apr 1997


             mailer_name,
             mailer_version,
             mailer_serial_number:    ASCII1;
             extra_field_1,
                 ..
                 ..
             extra_field_n:            EMSI_addon; (optional fields)
         end;

         The EMSI_addon structure is defined as follows:

         EMSI_addon
             product_ID,
             specific_data:            ASCII1;
         end;

         Following is an example of the actual data transmitted as an
         EMSI_DAT packet:

         {EMSI}{2:270/17}{}{8N1,PUA}{ZAP,ZMO,ARC,XMA}{44}{AirMail}{0.10}
         {Beta-2}{IDENT}{[Advanced Engineering S.A.R.L.][Luxembourg]
         [Joaquim Homrighausen][-Unpublished-][9600][MO,XA,HST,V32B,V42B]}

         EMSI_DAT field definitions
         ------------------------------------------------------------------

     =====================================================================
         Fingerprint
         EMSI
         ------------------------------------------------------------------
         The constant "EMSI". There is no need for a revision level since
         this basic format cannot change and remain backward compatible.

     =====================================================================
         System address list
         ------------------------------------------------------------------
         The system address list is a list of system-specific identifiers
         for the E-Mail system separated by spaces.

         For FidoNet-technology based networks, it is required that
         Zone:Net/Node be presented, and .Point be omitted if zero. Zone
         and Net must not be zero.

         In other networks, an address such as "jhom@csource.oz.au" should
         be considered valid.

     =====================================================================
         Password
         ------------------------------------------------------------------
         For systems using a session level password, it would be passed in
         this field. Note that the same password is used for all presented
         addresses and that it must be treated case insensitive.

     =====================================================================
         Link codes
         ------------------------------------------------------------------
     FIDONEWS 14-14               Page 17                   7 Apr 1997


         Link codes is a string of flags that specify desired connect
         conditions. These codes are separated by commas. New codes may be
         added with prior approval from the author of this document.

         Calling system/answering system options:

             8N1,
             7E1,
             7O2,
             etc.       Communication parameters.

         Calling system options:

             PUA        Pickup mail for all presented addresses.
             PUP        Pickup mail for primary address only.
             NPU        No mail pickup desired.


         Answering system options:

             HAT        Hold ALL traffic.
             HXT        Hold compressed mail traffic.
             HRQ        Hold file requests (not processed at this time).


     =====================================================================
         Compatibility codes
         ------------------------------------------------------------------
         Compatibility codes is a string of flags that specifies the
         capabilities and enabled features of the mailer. These codes are
         separated by commas. New codes may be added with prior approval
         from the author of this document.

         The calling system must list supported protocols first and
         descending order of preference (the most desirable protocol should
         be listed first). The answering system should only present one
         protocol and it should be the first item in the
         compatibility_codes field.

             Protocols
             --------------------------------------------------------------
             DZA*    DirectZAP (Zmodem variant).
             ZAP     ZedZap (Zmodem variant).
             ZMO**   Zmodem w/1,024 byte data packets.
             JAN     Janus.
             KER     Kermit.

             Other codes
             --------------------------------------------------------------
             NCP     No compatible protocols (failure).
             NRQ     No file requests accepted by this system.
             ARC     ARCmail 0.60-capable, as defined by the FTSC.
             XMA     Supports other forms of compressed mail.
             FNC     Filename conversion. This indicates that any
                     transmitted files must follow the MS-DOS restrictions
                     of an eight character file name followed by a three
     FIDONEWS 14-14               Page 18                   7 Apr 1997


                     character extension; eg. FILENAME.EXT

         (*) DirectZAP is a variant of ZedZap. The difference is that the
         transmitter only escapes CAN (18H). It is not recommended to use
         the DirectZAP protocol when two systems are connected via a packet
         switching network, or via another layer sensitive to control
         characters such as XON and XOFF.

         (**) The minimum protocol requirement for an EMSI implementation
         is to support plain Zmodem (16- or 32-bit CRC, 1,024 byte packets)
         which is represented by the ZMO flag in EMSI.

     =====================================================================
         Mailer product code
         ------------------------------------------------------------------
         The hexadecimal representation of the EMSC product code assigned
         to the mailer. Currently, the EMSC codes are the same as the FTSC
         assigned codes.

     =====================================================================
         Mailer name
         ------------------------------------------------------------------
         Specifies the name of the E-Mail system sending the EMSI packet.

     =====================================================================
         Mailer version
         ------------------------------------------------------------------
         The version number of the mailer software, ie. "1.10", "2.00".

     =====================================================================
         Mailer serial number
         ------------------------------------------------------------------
         The serial number, distribution source, version information, etc.
         This field is usually displayed like:

             Name<sp>Version/Serial_number

         eg.

             AirMail 0.10/Beta-2

     =====================================================================
         Extra fields
         ------------------------------------------------------------------
         The extra fields make the EMSI handshake protocol extremely
         flexible.  Any program or mailer may add fields to the end of the
         pre-defined structure so that program-specific data may be passed
         without the concern of interferring with other systems.

         There may be any number of extra fields added to the end of this
         structure. Each EXTRA_FIELD contains two ASCII1 strings:

         PRODUCT_IDENTIFIER      A unique "tag" that defines a specific
                                 program (such as a mailer or a utility).

         SPECIFIC_DATA           ASCII text that is specific data to the
     FIDONEWS 14-14               Page 19                   7 Apr 1997


                                 program defined in PRODUCT_IDENTIFIER.
                                 With this structure, any program can add
                                 its own data to the EMSI packet without
                                 affecting other applications.

         It is recommended that you contact the author of this document
         should you have any EXTRA_FIELDS that you may think worthwhile for
         other developers to implement and support.

         Predefined extra fields
         ------------------------------------------------------------------
         The following extra fields have been defined to date.

         PRODUCT_IDENTIFIER   :  IDENT

         Purpose              :  General identification of system that
                                 includes all information to generate a St.
                                 Louis-format nodelist entry.

         SPECIFIC_DATA        :  system_name,
                                 city,
                                 operator_name,
                                 phone_number,
                                 baud_rate,
                                 flags:            ASCII2;


             SYSTEM_NAME         The name of the system given by the user.
                                 This would normally be a company name, BBS
                                 name or other identifying text.

             CITY                The geographical location of the system.

             OPERATOR_NAME       The name of the person primarily
                                 responsible for the system.

             PHONE_NUMBER        The telephone number of the system, or
                                 "-Unpublished-" if the telephone number is
                                 unpublished. This MUST be in the standard
                                 format COUNTRY-CITY-NUMBER. Leading zeros
                                 should be stripped from the city code,
                                 ie. Stockholm (Sweden) has a city code of
                                 08, included in an EMSI packet, it would
                                 read 46-8-<number>.

             BAUD_RATE           The maximum baud rate supported by the
                                 system. This is NOT necessarily the same
                                 as the highest DTE rate.

             FLAGS               The St. Louis (FTSC) nodelist flags
                                 associated with the system.

         PART III - Interactive Electronic Mail Standard Idenfitication

         Connecting two IEMSI capable systems
         ==================================================================
     FIDONEWS 14-14               Page 20                   7 Apr 1997


         Two specific labels are used when discussing the IEMSI
         definitions.  The Client, which in this case is the Terminal
         software, and the Server, which in this case is the interactive
         on-line software, such as a BBS package or database system. It is
         assumed that the Client and the Server have established a data
         link and that no data has been transmitted by the Server.

         STEP 1, IEMSI INIT

         There is no specific sequence of events in the IEMSI definition.
         The Client must monitor incoming data and if the EMSI_IRQ sequence
         is detected, it attempts to negotiate an IEMSI session with the
         Server.  Under no circumstances is the Client allowed to transmit
         an EMSI_ICI packet prior to receiving the EMSI_IRQ sequence from
         the Server.  All IEMSI sequences and EMSI sequences used during an
         IEMSI session are terminated by a single <CR>. There are no
         exceptions to this.

         STEP 2A, Server

         +-+---------------------------------------------------------------
     ---+
         :1: Tries=0, T2=60 seconds
         : +-+-------------------------------------------------------------
         -----+
         :2: Transmit EMSI_IRQ sequence
         : +-+-------------------------------------------------------------
         -----+
         :3: T1=20 seconds, increment Tries
         :
         : :
         :
         : : Tries>3?                        Discontinue IEMSI negotiation.
         : +-+-------------------------------------------------------------
         -----+
         :4: Wait for EMSI_ICI packet until any of the timers have expired.
         :
         : :
         :
         : : If T2 has expired, discontinue IEMSI negotiation.
         :
         : +---------------------------------------------------------------
         ---+
         : : If T1 has expired, go to step 2.
         :
         : +---------------------------------------------------------------
         ---+
         : : If EMSI_ICI seen, go to step 5.
         :
         : +---------------------------------------------------------------
         ---+
         : : Go to step 4.
         : +-+-------------------------------------------------------------
         -----+
         :5: Receive EMSI_ICI packet
         :
     FIDONEWS 14-14               Page 21                   7 Apr 1997


         : +---------------------------------------------------------------
         ---+
         : : Packet received OK?             Transmit EMSI_ISI packet, and
         :
         : :                                 go to step 6.
         :
         : +---------------------------------------------------------------
         ---+
         : : Packet not received OK?         Transmit EMSI_NAK and go to
         step :
         : :                                 3.
         : +-+-------------------------------------------------------------
         -----+
         :6: Tries=0
         : +-+-------------------------------------------------------------
         -----+
         :7: T1=20 seconds, increment Tries
         :
         : :
         :
         : : Tries>3?                        Discontinue IEMSI negotiation.
         : +-+-------------------------------------------------------------
         -----+
         :8: Wait for EMSI_ACK/EMSI_NAK until any of the timers have
         expired. :
         : :
         :
         : : If T2 has expired, discontinue IEMSI negotiation.
         :
         : +---------------------------------------------------------------
         ---+
         : : If T1 has expired or EMSI_NAK received, transmit EMSI_ISI
         packet :
         : : again and go to step 7.
         :
         : +---------------------------------------------------------------
         ---+
         : : If EMSI_ACK received, go to step 9.
         :
         : +---------------------------------------------------------------
         ---+
         : : Go to step 8.
         : +-+-------------------------------------------------------------
         -----+
         :9: IEMSI session successfully established, exit.
         : +-+-------------------------------------------------------------
         -----+

         The Server must monitor its incoming data channel for 'normal'
         data, ie. data not transmitted as IEMSI sequences, to detect if
         the user is attempting to log-in without the use of IEMSI. The
         only basic restriction this imposes on the Server is that user
         names and/or IDs may not start with the character '*' since all
         EMSI/IEMSI sequences start with this character.

         All processing of the information in the EMSI_ICI packet must be
     FIDONEWS 14-14               Page 22                   7 Apr 1997


         done after transmitting the EMSI_ISI packet and receiving two
         EMSI_ACK sequences in return.

         STEP 2B, Client

         Note that this assumes that the Client has seen the EMSI_IRQ
         sequence transmitted by the Server and that the negotiation is
         ready to take place.

         +-+---------------------------------------------------------------
     ---+
         :1: Tries=0, T2=60 seconds
         : +-+-------------------------------------------------------------
         -----+
         :2: Transmit EMSI_ICI packet
         : +-+-------------------------------------------------------------
         -----+
         :3: T1=20 seconds, increment Tries
         : +-+-------------------------------------------------------------
         -----+
         :5: Tries>3 or T2 expired?            Discontinue IEMSI
         negotiation. :
         : +---------------------------------------------------------------
         ---+
         : : If T1 has expired, go to step 2.
         :
         : +---------------------------------------------------------------
         ---+
         : : If EMSI_ISI seen, go to step 6.
         :
         : +---------------------------------------------------------------
         ---+
         : : Go to step 5.
         : +-+-------------------------------------------------------------
         -----+
         :6: Receive EMSI_ISI packet
         :
         : +---------------------------------------------------------------
         ---+
         : : Packet received OK?              Transmit EMSI_ACK packet
         twice, :
         : :                                  and go to step 7.
         :
         : +---------------------------------------------------------------
         ---+
         : : Packet not received OK?          Transmit EMSI_NAK and go to
         step:
         : :                                  3.
         : +-+-------------------------------------------------------------
         -----+
         :7: IEMSI session successfully established, exit.
         : +-+-------------------------------------------------------------
         -----+

         All processing of the information in the EMSI_ISI packet must be
         done after transmitting two EMSI_ACK sequences in return.
     FIDONEWS 14-14               Page 23                   7 Apr 1997


         If either of the ICI or ISI packets are NAK'd three consecutive
         times, the session negotiation attempt is terminated and the
         Client proceeds as it would have done should the Server not have
         supported IEMSI.

         IEMSI packet and sequence definitions
         ==================================================================

     =====================================================================
         EMSI ACK
         **EMSI_ACK<crc16><CR>
         ------------------------------------------------------------------
         EMSI ACK is transmitted by either Client or Server as a positive
         acknowledgement of the valid receipt of an IEMSI packet such as
         EMSI_ISI and EMSI_ICI. During an IEMSI session, this sequence can,
         however, be used as a positive acknowledgement for other IEMSI
         packets. Redundant EMSI_ACK sequences should be ignored.

     =====================================================================
         EMSI NAK
         **EMSI_NAK<crc16><CR>
         ------------------------------------------------------------------
         EMSI NAK is transmitted by either Client or Server as a negative
         acknowledgement of the valid receipt of an IEMSI packet such as
         EMSI_ISI and EMSI_ICI. During an IEMSI session, this sequence can,
         however, be used as a negative acknowledgement for other IEMSI
         packets. Redundant EMSI_NAK sequences should be ignored.

     =====================================================================
         EMSI IRQ
         **EMSI_IRQ<crc16><CR>
         ------------------------------------------------------------------
         Similar to EMSI_REQ which is used by mailer software to negotiate
         a mail session. IRQ identifies the Server as being capable of
         negotiating an IEMSI session. When the Client detects an IRQ
         sequence in its inbound data stream, it attempts to negotiate an
         IEMSI session.

     =====================================================================
         EMSI IIR
         **EMSI_IIR<crc16><CR>
         ------------------------------------------------------------------
         The IIR (Interactive Interrupt Request) sequence is used by either
         Client or Server to abort the current negotiation. This could be
         during the initial IEMSI handshake or during other interactions
         between the Client and the Server.

     =====================================================================
         EMSI ICI
         **EMSI_ICI<len><data><crc32><CR>
         ------------------------------------------------------------------
         The ICI packet is used by the Client to transmit its configuration
         and Server-related information to the Server. It contains Server
         parameters, Client options, and Client capabilities.

     =====================================================================
     FIDONEWS 14-14               Page 24                   7 Apr 1997


         EMSI ISI
         **EMSI_ISI<len><data><crc32><CR>
         ------------------------------------------------------------------
         The ISI packet is used by the Server to transmit its configuration
         and Client-related information to the Client. It contains Server
         data and capabilities.

     =====================================================================
         EMSI ISM
         **EMSI_ISM<len><data><crc32><CR>
         ------------------------------------------------------------------
         The ISM packet is used to transfer ASCII images from the Server to
         the Client. These images can then be recalled by the Client when
         the Server needs to display a previously displayed image. This
         will be further described in future revisions of this document.

     =====================================================================
         EMSI CHT
         **EMSI_CHT<crc16><CR>
         ------------------------------------------------------------------
         The CHT sequence is used by the Server to instruct the Client
         software to enter its full-screen conversation mode function
         (CHAT).  Whether or not the Client software supports this is
         indicated in the ICI packet.

         If the Server transmits this sequence to the Client, it must wait
         for an EMSI_ACK prior to engaging its conversation mode. If no
         EMSI_ACK sequence is received with ten seconds, it is safe to
         assume that the Client does not support EMSI_CHT. If, however, an
         EMSI_NAK sequence is received from the Client, the Server must re-
         transmit the EMSI_CHT sequence. Once the on-line conversation
         function has been sucessfully activated, the Server must not echo
         any received characters back to the Client.

     =====================================================================
         EMSI TCH
         **EMSI_TCH<crc16><CR>
         ------------------------------------------------------------------
         The TCH sequence is used by the Server to instruct the Client
         software to terminate its full-screen conversation mode function
         (CHAT).

         If the Server transmits this sequence to the Client, it must wait
         for an EMSI_ACK prior to leaving its conversation mode. If no
         EMSI_ACK sequence is received with ten seconds, a second EMSI_TCH
         sequence should be issued before the Server resumes operation. If,
         however, an EMSI_NAK sequence is received from the Client, the
         Server must re-transmit the EMSI_TCH sequence.

         The EMSI_ICI packet
         ==================================================================
         The following pseudo structure shows the layout of the EMSI_ICI
         packet. Note that the information in the EMSI_ICI packet may not
         exceed 2,048 bytes.

         EMSI_ICI
     FIDONEWS 14-14               Page 25                   7 Apr 1997


             name,
             alias,
             location,
             data#,
             voice#,
             password,
             birthdate,
             crtdef,
             protocols,
             capabilities,
             requests,
             software,
             xlattabl:                ASCII1;
         end;

         EMSI_ICI field definitions
         ------------------------------------------------------------------

     =====================================================================
         Name and Alias (or Handle)
         ------------------------------------------------------------------
         The name and possible alias (AKA) of the user (Client). This must
         be treated case insensitively by the Server.

     =====================================================================
         Location
         ------------------------------------------------------------------
         The geographical location of the user, ie. Stockholm, Sweden.

     =====================================================================
         data# and voice#
         ------------------------------------------------------------------
         Unformatted data and voice telephone numbers of the user.
         Unformatted is defined as the full telephone number, including
         country and local area code. Eg. 46-8-90510 is a telephone number
         in Stockholm, Sweden.

     =====================================================================
         Password
         ------------------------------------------------------------------
         The password for the user. This must be treated case insensitively
         by the Server.

     =====================================================================
         Birthdate
         ------------------------------------------------------------------
         Hexadecimal string representing a long integer containing the
         birthdate of the user in UNIX notation (number of seconds since
         midnight, Jan 1 1970). This must be treated case insensitively by
         the Server.

     =====================================================================
         CrtDef
         ------------------------------------------------------------------
         Consisting of four sub-fields separated by commas, this field
         contains from left to right: The requested terminal emulation
     FIDONEWS 14-14               Page 26                   7 Apr 1997


         protocol, the number of rows of the user's CRT, the number of
         columns of the user's CRT, and the number of ASCII NUL (00H)
         characters the user's software requires to be transmitted between
         each line of text.

         The following terminal emulation protocols are defined:

             AVT0    AVATAR/0+. Used in conjunction with ANSI. If AVT0 is
                     specified by the Client, support for ANSI X3.64
                     emulation should be assumed to be present.
             ANSI    ANSI X3.64
             VT52    DEC VT52
             VT100   DEC VT100
             TTY     No terminal emulation, also referred to as RAW mode.

     =====================================================================
         Protocols
         ------------------------------------------------------------------
         The file transfer protocol option specifies the preferred method
         of transferring files between the Client and the Server in either
         direction. The Client presents all transfer protocols it is
         capable of supporting and the Server chooses the most appropriate
         protocol.

             DZA*    DirectZAP (Zmodem variant)
             ZAP     ZedZap (Zmodem variant)
             ZMO     Zmodem w/1,024 byte data packets
             SLK     SEAlink
             KER     Kermit

         (*) DirectZAP is a variant of ZedZap. The difference is that the
         transmitter only escapes CAN (18H). It is not recommended to use
         the DirectZAP protocol when the Client and the Server are
         connected via a packet switching network, or via another layer
         sensitive to control characters such as XON and XOFF.

     =====================================================================
         Capabilities
         ------------------------------------------------------------------
         The capabilities of the user's software. If more than one
         capability is listed, each capability is separated by a comma.

         The following capability codes are defined:

             CHT     Can do full-screen on-line conversation (CHAT).
             MNU     Can do ASCII image download (see ISM packet).
             TAB     Can handle TAB (ASCII 09H) characters.
             ASCII8  Can handle 8-bit IBM PC ASCII characters.

     =====================================================================
         Requests
         ------------------------------------------------------------------
         The requests field specifies what the user wishes to do once the
         initial IEMSI negotiation has been successfully completed. If more
         than one capability is listed, each capability is separated by a
         comma.
     FIDONEWS 14-14               Page 27                   7 Apr 1997


         The following request codes are defined:

             NEWS    Show bulletins, announcements, etc.
             MAIL    Check for new mail.
             FILE    Check for new files.
             HOT     Hot-Keys.
             CLR     Screen clearing.
             HUSH    Do not disturb.
             MORE    Page pausing, often referred to as "More".
             FSED*   Full-screen editor.
             XPRS    <reserved>.

         (*) Note that this allows the Client to request use of a full-
         screen editor without requiring that it also supports a full-
         screen terminal emulation protocol.

     =====================================================================
         Software
         ------------------------------------------------------------------
         The name, version number, and optionally the serial number of the
         user's software. Eg. {FrontDoor,2.00,AE000001}.

     =====================================================================
         XlatTabl
         ------------------------------------------------------------------
         Used for character translation between the Server and the Client.
         This field has not been completely defined yet and should always
         be transmitted as {} (empty).

         The EMSI_ISI packet
         ==================================================================
         The following pseudo structure shows the layout of the EMSI_ISI
         packet. Note that the information in the EMSI_ISI packet may not
         exceed 2,048 bytes.

         EMSI_ISI
             id,
             name,
             location,
             operator,
             localtime,
             notice,
             wait,
             capabilities:            ASCII1;
         end;

         EMSI_ISI field definitions
         ------------------------------------------------------------------

     =====================================================================
         ID
         ------------------------------------------------------------------
         The name, version number, and optionally the serial number of the
         Server software. Eg. {RemoteAccess,1.10/b5,CS000001}.

     =====================================================================
     FIDONEWS 14-14               Page 28                   7 Apr 1997


         Name
         ------------------------------------------------------------------
         The name of the Server system. Eg. {Advanced Engineering
         S.A.R.L.}.

     =====================================================================
         Location
         ------------------------------------------------------------------
         The geographical location of the user, ie. Stockholm, Sweden.

     =====================================================================
         Operator
         ------------------------------------------------------------------
         The name of the primary operator of the Server software. Eg.
         {Joaquim H. Homrighausen}.

     =====================================================================
         Localtime
         ------------------------------------------------------------------
         Hexadecimal string representing a long integer containing the
         current time of the Server in UNIX notation (number of seconds
         since midnight, Jan 1 1970). This must be treated case
         insensitively by the Client.

     =====================================================================
         Notice
         ------------------------------------------------------------------
         May contain copyright notices, system information, etc. This field
         may optionally be displayed by the Client.

     =====================================================================
         Wait
         ------------------------------------------------------------------
         A single character used by the Server to indicate that the user
         has to press the <Enter> key to resume operation. This is used in
         conjunction with ASCII Image Downloads (see ISM packet).

     =====================================================================
         Capabilities
         ------------------------------------------------------------------
         The capabilities of the Server software. No Server software
         capabilities have currently been defined.

         Credits and other notes
         ==================================================================
         The original EMSI specifications were designed by Chris Irwin and
         Joaquim H. Homrighausen. The original IEMSI specifications were
         designed by Joaquim H. Homrighausen and Andrew Milner.

         --- end of "emsi.doc" ---

      -30-

     -----------------------------------------------------------------

     FIDONEWS 14-14               Page 29                   7 Apr 1997


     =================================================================
                            COORDINATORS CORNER
     =================================================================


     Nodelist-statistics as seen from Zone-2 for day 094
     By Ward Dossche, 2:292/854
        ZC/2

      +----+------+------------+------------+------------+------------+--+
      |Zone|Nl-066|Nodelist-073|Nodelist-080|Nodelist-087|Nodelist-094|%%|
      +----+------+------------+------------+------------+------------+--+
      |  1 |  9405| 9107  -298 | 9088   -19 | 9088     0 | 8900  -188 |33|
      |  2 | 16083|15996   -87 |15956   -40 |15923   -33 |15922    -1 |58|
      |  3 |   800|  800     0 |  800     0 |  800     0 |  800     0 | 3|
      |  4 |   545|  547     2 |  548     1 |  548     0 |  549     1 | 2|
      |  5 |    87|   87     0 |   87     0 |   87     0 |   87     0 | 0|
      |  6 |  1088| 1088     0 | 1088     0 | 1090     2 | 1090     0 | 4|
      +----+------+------------+------------+------------+------------+--+
           | 28008|27625  -383 |27567   -58 |27536   -31 |27348  -188 |
           +------+------------+------------+------------+------------+

     -----------------------------------------------------------------

     FIDONEWS 14-14               Page 30                   7 Apr 1997


     =================================================================
                               WE GET EMAIL
     =================================================================


     Hi,
             We have a problem at Region 35 and I hope you'll be so kind to
     mention something about it, and whether anyone can help.

             The problem is that we lost the connection to the
     international echo areas due to some problems facing the one who was
     taking the responsibility of routing these echomail areas. Now we have
     a node routing netmail and 1 of the echos, but we still have a problem
     with all other ones. Kiril Yugoslavov (2:356/200) is ready to get
     these echos by FTP, but we're searching for FTP-echo feeds.

             We'll be grateful if you can help (either directly or by
     posting the above in the coming issues of FIDONEWS). You can send
     information, either to me at zombie@inet.bg or directly to Kiril
     Yugoslavov at 2:350/200 (I don't know his e-mail, but I will ask if
     needed).

     Thanks for your attention and time.

     Best wishes
        Moh

     -----------------------------------------------------------------

     FIDONEWS 14-14               Page 31                   7 Apr 1997


     =================================================================
                                 NET HUMOR
     =================================================================


     To: cbaker84@digital.net
     From: top5@lists.zdnet.com
     Subject: Top5 - 3/31/97 - Signs Your Webmaster is in a Cult
     Errors-To: top5-errors@lists.zdnet.com
     Date: Mon, 31 Mar 1997 20:18:18 MST

     ================================================================
            T  H  E     T  O  P     F  I  V  E     L  I  S  T
     ================================================================
                       Sponsored by Windows Sources

               Windows Sources Expert Answers for MS Office:
                Your MS Office 95 and 97 questions answered
                     instantaneously by M. David Stone.
                         http://www.winsources.com
     ================================================================
            To forward or repost, please include the following:

     [ This list copyright 1997 by Chris White and Ziff Davis, Inc. ]
     [ The Top Five List   top5@walrus.com   http://www.topfive.com ]

                  The Top Five List for March 31, 1997


               The Top 15 Signs Your Webmaster is in a Cult


     15> Every link seems to take you to www.amway.com.

     14> Repetition of same banner ads: Stoli, Mott's...
         Stoli, Mott's...

     13> He brings twenty-three wives to the office Holiday Party.

     12> Instead of counting up visitors, your site counts down days
         to the apocalypse.

     11> Suddenly your travel agency's site is featuring inter-planetary
         excursions for comet watching and one-way tickets to Guyana.

     10> His home page says "Best viewed from the Mothership."

      9> Your website's "Hall of Fame" inductees required to do
         stint handing out flowers at airport.

      8> Your website is honored as the David Koresh Fan Club's
         "Site of the Day."

      7> She has 38 roommates, yet is oddly stress-free.

      6> Insists that Sabbath actually begins when "X-files" ends.
     FIDONEWS 14-14               Page 32                   7 Apr 1997


      5> Frequently mutters about the "Prophet Steve Jobs" returning
         to rescue the true believers.

      4> Not only does he understand Unix, he *IS* one.

      3> Big "N" on your browser replaced by spinning head of
         Charles Manson.

      2> He only answers to the name, "Doe-bert."


         and the Number 1 Sign Your Webmaster is in a Cult...


      1> Ugly clothes; insufficient diet; lack of sleep; goofy haircut;
         lives in a mansion; has many followe...  Hey, wait a minute!
         That's Bill Gates!!


     Selected from 93 submissions from 33 contributors.
     Today's Top Five List authors are:
     ----------------------------------------------------------------
     Marc Cukier, Toronto, Canada       --  1  (1st #1!)
     Bruce Ansley, Baltimore, MD        --  2  (Hall of Famer)
     David Bryant, Columbia, MD         --  3
     Lloyd Jacobson, Washington, DC     --  4
     Duncan Carling, San Francisco, CA  --  5, 13
     Natasha Filipovic, New York, NY    --  6
     Paul Schindler, Orinda, CA         --  7
     Tony Hill, Minneapolis, MN         --  8, 9  (Hall of Famer)
     Bob Mader, Knoxville TN            --  9
     Bill Muse, Seattle, WA             -- 10
     Steve Hurd, San Ramon, CA          -- 11
     Marianne Tatom, Austin, TX         -- 12
     Natasha Filipovic, New York, NY    -- 14
     Dave Wesley, Pleasant Hill, CA     -- 14
     Barbara Rush, Tulsa, OK            -- 15
     Eric Huret, Atlanta, GA            -- 15
     Chris White, New York, NY          -- List owner/editor
     ----------------------------------------------------------------
             Today's Runners Up list, "Scientologists",
        can be found at our website: http://www.topfive.com
     ================================================================
            T  H  E     T  O  P     F  I  V  E     L  I  S  T
     To subscribe:    Send mail to top5-on@lists.zdnet.com
     To unsubscribe:  Send mail to top5-off@lists.zdnet.com
     For more information: Send mail to top5@walrus.com
         with "INFO" in the *subject* line of the message.
     To report a sighting of a Top Five List in other media:
         Send mail to top5@walrus.com with "BINGO!" in the *subject*.
     ================================================================

                        Ruminations & Ponderances

              I was jogging in the park when this COMPLETELY
            naked man ran right past me.  I thought to myself,
     FIDONEWS 14-14               Page 33                   7 Apr 1997


                "I wonder if I'd run faster barefoot, too?"

                      (Thanks to Anna Chin-Williams)

     ================================================================
     Sponsored by Windows Sources           http://www.winsources.com
     This delivery powered by Mercury Mail, Inc.  http://www.merc.com
     ================================================================






     -----------------------------------------------------------------

     FIDONEWS 14-14               Page 34                   7 Apr 1997


     =================================================================
                                  NOTICES
     =================================================================

                                Future History

     17 May 1997
        Independence Day, Norway.

      6 Jun 1997
        National Commemoration Day, Sweden.

     11 Jun 1997
        Independence Day, Russia.

      1 Jul 1997
        Canada Day - Happy Birthday Canada.

      9 Jul 1997
        Independence Day, Argentina.

     13 Oct 1997
        Thanksgiving Day, Canada.

      1 Dec 1997
        World AIDS Day.

     10 Dec 1997
        Nobel Day, Sweden.

     12 Jan 1998
        HAL 9000 is one year old today.

     22 May 1998
        Expo '98 World Exposition in Lisbon (Portugal) opens.

      1 Dec 1998
        Fifteenth Anniversary of release of Fido version 1 by
        Tom Jennings.

     31 Dec 1999
        Hogmanay, Scotland. The New Year that can't be missed.

      1 Jan 2000
        The 20th Century, C.E., is still taking place thru 31 Dec.

     15 Sep 2000
        Sydney (Australia) Summer Olympiad opens.

      1 Jan 2001
        This is the actual start of the new millennium, C.E.

     -- If YOU have something which you would like to see in this
        Future History, please send a note to the FidoNews Editor.

     -----------------------------------------------------------------
     FIDONEWS 14-14               Page 35                   7 Apr 1997


     =================================================================
                         FIDONET SOFTWARE LISTING
     =================================================================


     Latest Greatest Software Versions
     by Peter E. Popovich, 1:363/264

     Well, I'm catching back up. Still waiting to hear about Gecho, though.

     Note: At the end of April, I'll be phasing out the old Macintosh
     section. As always, I'll be happy to process any information I get,
     either before or after it is phased out.

     -=- Snip -=-

     Submission form for the Latest Greatest Software Versions column

     OS Platform                             :
     Software package name                   :
     Version                                 :
     Function(s) - BBS, Mailer, Tosser, etc. :
     Freeware / Shareware / Commercial?      :
     Author / Support staff contact name     :
     Author / Support staff contact node     :
     Magic name (at the above-listed node)   :

     Please include a sentence describing what the package does.

     Please send updates and suggestions to: Peter Popovich, 1:363/264

     -=- Snip -=-

     MS-DOS:
     Program Name   Version  F C Contact Name      Node        Magic Name
     ----------------------------------------------------------------------
     Act-Up         4.6      G D Chris Gunn        1:15/55     ACT-UP
     ALLFIX         4.40     T S Harald Harms      2:281/415   ALLFIX
     Announcer      1.11     O S Peter Karlsson    2:206/221   ANNOUNCE
     BGFAX          1.60     O S B.J. Guillot      1:106/400   BGFAX
     Binkley Docs   2.60     M F Bob Juge          1:1/102     BDOC_260.ZIP
     BinkleyTerm    2.60     M F Bob Juge          1:1/102     BDOS_260.ZIP
     BinkleyTerm-XE XR4      M F Thomas Waldmann   2:2474/400  BTXE_DOS
     CFRoute        0.92     O G C. Fernandez Sanz 2:341/70    CFR
     CheckPnt       1.0a     O G Michiel vd Vlist  2:500/9     CHECKPNT
     FastEcho       1.45a    T S Tobias Burchhardt 2:2448/400  FASTECHO
     FastEcho/16    1.45a    T S Tobias Burchhardt 2:2448/400  FE16
     FidoBBS (tm)   12u      B S Ray Brown         1:1/117     FILES
     FrontDoor      2.12     M S JoHo              2:201/330   FD
     FrontDoor      2.20c    M C JoHo              2:201/330   FDINFO
     GIGO           07-14-96 G S Jason Fesler      1:1/141     INFO
     GoldED         2.50     O S Len Morgan        1:203/730   GED
     GoldED Docs    2.50     O S Len Morgan        1:203/730   GEM
     GoldNODE       2.50     O S Len Morgan        1:203/730   GEN
     Imail          1.75     T S Michael McCabe    1:1/121     IMAIL
     ImCrypt        1.04     O G Michiel vd Vlist  2:500/9     IMCRYPT
     FIDONEWS 14-14               Page 36                   7 Apr 1997


     InfoMail       1.11     O F Damian Walker     2:2502/666  INFOMAIL
     InfoMail/386   1.20     O F Damian Walker     2:2502/666  INFO386
     InterEcho      1.19     T C Peter Stewart     1:369/35    IEDEMO
     InterMail      2.29k    M C Peter Stewart     1:369/35    IMDEMO
     InterPCB       1.52     O S Peter Stewart     1:369/35    INTERPCB
     IPNet          1.11     O S Michele Stewart   1:369/21    IPNET
     JD's CBV       1.4      O S John Dailey       1:363/277   CBV
     Jelly-Bean     1.01     T S Rowan Crowe       3:635/727   JELLY
     Jelly-Bean/386 1.01     T S Rowan Crowe       3:635/727   JELLY386
     JMail-Hudson   2.81     T S Jason Steck       1:285/424   JMAIL-H
     JMail-Goldbase 2.81     T S Jason Steck       1:285/424   JMAIL-G
     MakePl         1.9      N G Michiel vd Vlist  2:500/9     MAKEPL
     Marena         1.1 beta O G Michiel vd Vlist  2:500/9     MARENA
     Maximus        3.01     B P Tech              1:249/106   MAX
     McMail         1.0      M S Michael McCabe    1:1/148     MCMAIL
     MDNDP          1.18     N S Bill Doyle        1:388/7     MDNDP
     Msged          4.10     O G Andrew Clarke     3:635/728   MSGED41D.ZIP
     Msged/386      4.10     O G Andrew Clarke     3:635/728   MSGED41X.ZIP
     Opus CBCS      1.73a    B P Christopher Baker 1:374/14    OPUS
     O/T-Track      2.63a    O S Peter Hampf       2:241/1090  OT
     PcMerge        2.8      N G Michiel vd Vlist  2:500/9     PCMERGE
     PlatinumXpress 1.3      M C Gary Petersen     1:290/111   PX13TD.ZIP
     QuickBBS       2.81     B S Ben Schollnick    1:2613/477  QUICKBBS
     RAR            2.00     C S Ron Dwight        2:220/22    RAR
     RemoteAccess   2.50     B S Mark Lewis        1:3634/12   RA
     Silver Xpress
       Door         5.4      O S Gary Petersen     1:290/111   FILES
       Reader       4.4      O S Gary Petersen     1:290/111   SXR44.ZIP
     Spitfire       3.51     B S Mike Weaver       1:3670/3    SPITFIRE
     Squish         1.11     T P Tech              1:249/106   SQUISH
     StealTag UK    1.c...   O F Fred Schenk       2:284/412   STEAL_UK
     StealTag NL    1.c...   O F Fred Schenk       2:284/412   STEAL_NL
     T-Mail         2.599I   M S Ron Dwight        2:220/22    TMAIL
     Terminate      4.00     O S Bo Bendtsen       2:254/261   TERMINATE
     Tobruk         0.33     T G Paul Edwards      3:711/934   TOBRUK
     TriBBS         11.0     B S Gary Price        1:3607/26   TRIBBS
     TriDog         11.0     T F Gary Price        1:3607/26   TRIDOG
     TriToss        11.0     T S Gary Price        1:3607/26   TRITOSS
     WaterGate      0.92     G S Robert Szarka     1:320/42    WTRGATE
     WWIV           4.24a    B S Craig Dooley      1:376/126   WWIV
     WWIVTOSS       1.36     T S Craig Dooley      1:376/126   WWIVTOSS
     xMail          2.00     T S Thorsten Franke   2:2448/53   XMAIL
     XRobot         3.01     O S JoHo              2:201/330   XRDOS

     OS/2:
     Program Name   Version  F C Contact Name      Node        Magic Name
     ----------------------------------------------------------------------
     ALLFIX/2       1.10     T S Harald Harms      2:281/415   AFIXOS2
     BGFAX          1.60     O S B.J. Guillot      1:106/400   BGFAX
     Binkley Docs   2.60     M F Bob Juge          1:1/102     BDOC_260.ZIP
     BinkleyTerm    2.60     M F Bob Juge          1:1/102     BOS2_260.ZIP
     BinkleyTerm-XE XR4      M F Thomas Waldmann   2:2474/400  BTXE_OS2
     CFRoute        0.92     O G C. Fernandez Sanz 2:341/70    CFR
     FastEcho       1.45a    T S Tobias Burchhardt 2:2448/400  FE2
     FleetStreet    1.19     O S Michael Hohner    2:2490/2520 FLEET
     GIGO           07-14-96 G S Jason Fesler      1:1/141     INFO
     FIDONEWS 14-14               Page 37                   7 Apr 1997


     GoldED         2.50     O S Len Morgan        1:203/730   GEO
     GoldED Docs    2.50     O S Len Morgan        1:203/730   GEM
     GoldNODE       2.50     O S Len Morgan        1:203/730   GEN
     ImCrypt        1.04     O G Michiel vd Vlist  2:500/9     IMCRYPT
     Maximus        3.01     B P Tech              1:249/106   MAXP
     Msged/2        4.10     O G Andrew Clarke     3:635/728   MSGED41O.ZIP
     PcMerge        2.3      N G Michiel vd Vlist  2:500/9     PCMERGE
     RAR            2.00     C S Ron Dwight        2:220/22    RAR2
     Squish         1.11     T P Tech              1:249/106   SQUISHP
     T-Mail         2.599I   M S Ron Dwight        2:220/22    TMAIL2
     Tobruk         0.33     T G Paul Edwards      3:711/934   TOBRUK
     XRobot         3.01     O S JoHo              2:201/330   XROS2

     Windows (16-bit apps):
     Program Name   Version  F C Contact Name      Node        Magic Name
     ----------------------------------------------------------------------
     BeeMail        1.0      M C Andrius Cepaitis  2:470/1     BEEMAIL
     FrontDoor APX  1.10     P S Mats Wallin       2:201/329   FDAPXW

     Windows (32-bit apps):
     Program Name   Version  F C Contact Name      Node        Magic Name
     ----------------------------------------------------------------------
     BeeMail        1.0      M C Andrius Cepaitis  2:470/1     BEEMAIL
     Binkley Docs   2.60     M F Bob Juge          1:1/102     BDOC_260.ZIP
     BinkleyTerm    2.60     M F Bob Juge          1:1/102     BW32_260.ZIP
     CFRoute        0.92     O G C. Fernandez Sanz 2:341/70    CFR
     GoldED         2.50     O S Len Morgan        1:203/730   GEO
     GoldED Docs    2.50     O S Len Morgan        1:203/730   GEM
     Maximus        3.01     B P Tech              1:249/106   MAXN
     Msged/NT       4.10     O G Andrew Clarke     3:635/728   MSGED41W.ZIP
     PlatinumXpress 2.00     M C Gary Petersen     1:290/111   PXW-INFO
     T-Mail         2.599I   M S Ron Dwight        2:220/22    TMAILNT
     WinFOSSIL/95   1.12 r4  F S Bryan Woodruff    1:343/294   WNFOSSIL.ZIP
     WinFOSSIL/NT   1.0 beta F S Bryan Woodruff    1:343/294   NTFOSSIL.ZIP

     Unix:
     Program Name   Version  F C Contact Name      Node        Magic Name
     ----------------------------------------------------------------------
     ifmail         2.9      M G Eugene Crosser    2:293/2219  IFMAIL
     ifmail-tx      ...tx8.1 M G Pablo Saratxaga   2:293/2219  IFMAILTX
     ifmail-tx.rpm  ...tx8.1 M G Pablo Saratxaga   2:293/2219  IFMAILTX.RPM
     Msged          4.00     O G Paul Edwards      3:711/934   MSGED
     Tobruk         0.33     T G Paul Edwards      3:711/934   TOBRUK

     Amiga:
     Program Name   Version  F C Contact Name      Node        Magic Name
     ----------------------------------------------------------------------
     CrashMail      1.23     T X Fredrik Bennison  2:205/324   CRASHMAIL
     CrashTick      1.1      O F Fredrik Bennison  2:205/324   CRASHTICK
     DLG Pro BBOS   1.15     B C Holly Sullivan    1:202/720   DLGDEMO
     GMS            1.1.85   M S Mirko Viviani     2:331/213   GMS
     Msged          4.00     O G Paul Edwards      3:711/934   MSGED
     Tobruk         0.33     T G Paul Edwards      3:711/934   TOBRUK

     TrapDoor       1.86.b2  M S Maximilian Hantsch
                                                   2:310/6     TRAPDOOR
     FIDONEWS 14-14               Page 38                   7 Apr 1997


     TrapDoor       1.86.b2  M S Maximilian Hantsch
                                                   2:310/6     TRAPBETA
     TrapToss       1.50     T S Rene Hexel        2:310/6     TRAPTOSS


     Atari:
     Program Name   Version  F C Contact Name      Node        Magic Name
     ----------------------------------------------------------------------
     BinkleyTerm/ST 3.18pl1  M F Bill Scull        1:363/112   BINKLEY
     Semper         0.80beta M S Jan Kriesten      2:2490/1624 SMP-BETA

     Function: B-BBS, P-Point, M-Mailer, N-Nodelist, G-Gateway, T-Tosser,
               C-Compression, F-Fossil, O-Other. Note: Multifunction will
               be listed by the first match.

     Cost: P-Free for personal use, F-Freeware, S-Shareware, C-Commercial,
           X-Crippleware, D-Demoware, G-Free w/ Source

     Old info from: 01/27/92
     ---------------------------------------------------------------------

       MS-DOS Systems        Other Utilities         Other Utilities
       --------------        Name         Version    Name         Version
                             --------------------    --------------------
     Network Mailers         2DAPoint        1.50*   Netsex         2.00b
     Name         Version    4Dog/4DMatrix   1.18    OFFLINE         1.35
     --------------------    ARCAsim         2.31    Oliver          1.0a
     D'Bridge        1.30    ARCmail         3.00*   OSIRIS CBIS     3.02
     Dreamer         1.06    Areafix         1.20    PKInsert        7.10
     Dutchie        2.90c    ConfMail        4.00    PolyXarc        2.1a
     Milqtoast       1.00    Crossnet         1.5    QM             1.00a
     PreNM           1.48    DOMAIN          1.42    QSort           4.04
     SEAdog          4.60    DEMM            1.06    RAD Plus        2.11
     SEAmail         1.01    DGMM            1.06    Raid            1.00
     TIMS       1.0(mod8)    DOMAIN          1.42    RBBSMail        18.0
                             EEngine         0.32    ScanToss        1.28
     Compression             EMM             2.11*   ScMail          1.00
     Utilities               EZPoint          2.1    ScEdit          1.12
     Name         Version    FGroup          1.00    Sirius          1.0x
     --------------------    FidoPCB         1.0s@   SLMail         2.15C
     ARC             7.12    FNPGate         2.70    StarLink        1.01
     ARJ             2.20    GateWorks      3.06e    TagMail         2.41
     LHA             2.13    GMail           2.05    TCOMMail         2.2
     PAK             2.51    GMD             3.10    Telemail         1.5*
     PKPak           3.61    GMM             1.21    TGroup          1.13
     PKZip           1.10    GROUP           2.23    TIRES           3.11
                             GUS             1.40    TMail           1.21
     NodeList Utilities      Harvey's Robot  4.10    TosScan         1.00
     Name         Version    HeadEdit        1.18    UFGATE          1.03
     --------------------    HLIST           1.09    VPurge         4.09e
     EditNL          4.00    ISIS            5.12@   WEdit            2.0@
     FDND            1.10    Lola           1.01d    WildMail        2.00
     MakeNL          2.31    Mosaic         1.00b    WMail            2.2
     Parselst        1.33    MailBase       4.11a@   WNode            2.1
     Prune           1.40    MSG              4.5*   XRS             4.99
     SysNL           3.14    MsgLnk          1.0c    XST             2.3e
     FIDONEWS 14-14               Page 39                   7 Apr 1997


     XlatList        2.90    MsgMstr        2.03a    YUPPIE!         2.00
     XlaxNode/Diff   2.53    MsgNum         4.16d    ZmailH          1.25
                             MSGTOSS          1.3    ZSX             2.40

         - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

     BBS Software            Macintosh               Other Software
     Name         Version    ---------               Name         Version
     --------------------                            --------------------
     FBBS            0.91    Network Mailers         MacArd          0.04
     Hermes         1.6.1    Name         Version    Mantissa        3.21
     Mansion         7.15    --------------------    Mehitable        2.0
     Precision Sys. 0.95b    Copernicus       1.0    OriginatorII     2.0
     Red Ryder Host   2.1    Tabby            2.2    PreStamp         3.2
     Telefinder Host                                 StuffIt Classic  1.6
                  2.12T10    Other Software          SunDial          3.2
                             Name         Version    TExport         1.92
                             --------------------    TimeStamp        1.6
     Point System            ArcMac           1.3    TImport         1.92
     Software                AreaFix          1.6    Tset             1.3
     Name         Version    Compact Pro     1.30    TSort            1.0
     --------------------    EventMeister     1.0    UNZIP          1.02c
     Copernicus      1.00    Export          3.21    Zenith           1.5
     CounterPoint    1.09    Import           3.2    Zip Extract     0.10
     MacWoof          1.1    LHARC           0.41

     --  --  --  --  --  --  --  --  --  --  --  --  --  --  --  --  --
     Key to old info:
           + - Netmail Capable (Doesn't Require Additional Mailer Software)
           * - Recently Updated Version
           @ - New Addition
     --  --  --  --  --  --  --  --  --  --  --  --  --  --  --  --  --

     Please send updates and suggestions to: Peter Popovich, 1:363/264

     -----------------------------------------------------------------

     FIDONEWS 14-14               Page 40                   7 Apr 1997


     =================================================================
                            FIDONEWS PUBLIC-KEY
     =================================================================


     [this must be copied out to a file starting at column 1 or
      it won't process under PGP as a valid public-key]


     -----BEGIN PGP PUBLIC KEY BLOCK-----
     Version: 2.6.2
     Comment: Clear-signing is Electronic Digital Authenticity!

     mQCNAzINVLcAAAEEAM5dZN6t6j5Yc0kl7qegVFfiBeVoteuhDg4ay8h43u38Q4kO
     eJ9Mm7J89wXFb9vgouBVb4biIN6bTWCwcXTbGhBe5OIceLvluuxuEKsaIs/UwXNe
     Ogx5azIPhRfC7MJDe41Z8tMEBuHY/NE88cuxQ8yXWO126IRttavu6L/U5BwRAAUR
     tCRGaWRvTmV3cyBFZGl0b3IgPDE6MS8yM0BmaWRvbmV0Lm9yZz6JAJUDBRAyGwFS
     JZMgw7eCKz0BAZl0A/9xrfhpsEOqGiPfjy2qd9dv6tvSVPPVFu+Wy1lGTHYtuTtg
     FIN3fQ47AM3XzqHxWRWvp/xZYgR6sRICL7UFx94ShYBQc7CyqBBZKA0IvIWqXP/g
     c4Br+gQJR6CLiQK7TUyjUbqNbs6QAxuNUi4xFQM+O2Gene5/iTjHFmmSDj2C9YkB
     FQMFEDIOmHDTQ6/52IG1SQEBQ78H/Rz/mleIrtZwFIOhzy3JH4Z6FUTfZuM9nPcs
     1ZLjZCPptHvY7wEYJWGr03lPPJ6tj1VBXwTrWJTf/hOLsoi00GKV8t1thjqGDo23
     O91/bSQ+Vn0vBQ2vOEJys8ftxdoLJAyI5YLzHVT+RsMTQLIXVuPyrNcKs1vC2ql+
     UDHpU1R+9cG9JUEHpGI6z0DPnQ74SKbQH3fiVBpHhYx4BmvcBC4gWQzKMkDWFiq3
     8AssIZ7b9lWl3OBgQ4UM1OIDKoJyjRewIdKyl7zboKSt6Qu8LrcsXO3kb81YshOW
     ZpSS3QDIqfZC4+EElnB15l4RcVwnPHBaQY0FxUr4Vl4UWM36jbuJAJUDBRAyDpgY
     q+7ov9TkHBEBAQGoA/sFfN07IFQcir456tJfBfB9R5Z6e6UKmexaFhWOsLHqbCq6
     3FGXDLeivNn6NTz81QeqLIHglTuM3NP1mu8sw215klAG8G3M1NA2xLw7Eqhspze2
     raGvNeEwxl8e+PY9aZwBj4UWU+CmIm6QNiP0MtvR7QYDIKn5mZCDc3CLmr942IkB
     FQMFEDIOh0O8AhTPqRipPQEB4EYH/1gkDmdHL6lbEkFuQLrylF+weBl0XQ+kv7ER
     vWXYrvIrkppxtc4VAge6CXXEbOGJnvkFHgyNZzO9Q9O64QsmZvjip+4lhDLeNrdH
     X9DizS4YKXxkSKr9Yltmn2/AlBCx6jwcDIfkqy/P1tNWcikxZZMd6KryK0Wsres9
     Ik12OmVmJjQSxb5bS6Q8aYUbV3qwosGXTqy+BzYh/UYAX/XJIWa5kxFVSPKFSZ+5
     toiSzANd9SpHPEogGvQDHJlJ23lmsMx/6uHsR1LTsQ8su8zIk92XyqePJTjlMx2j
     D7KJWNR7Zzu4QHCXBkga5W8l2FfPk7D3+o7bXTLRuR1yTYGdNoiJAJUCBRAyDhwt
     SlKLwP4OFW0BAdaMA/9rcWQlSq44K9JuJ7fZUgt9fwxGreTud9fC8DvlbUW79+CA
     AHLTLLagcEF1OKsWzVBWcA2JEAp+TUTqktRN0oD8vnaw3uNJd1G5KK59hw0WR8x1
     v4ivypbSjiq95Y3gBunb7WjpyiFRWDlm0PrKrWHtbWzjnpPIpetln1UuqsSfbokB
     FQIFEDIOG9C3N61ZQ4Dr/QEBIzMH/1VxxztmBPBszbjZLDO8Svcax9Ng8IcWpcDy
     WqHCAA2Hoe5VtMD0v6w31ZgVqTPIvCark2Y/aTR1GofiuN9NUqbVV534AgAYLzYk
     DMT1swsPvqDTpOYgQl6PCGh6A5JGAbWJfKkX9XCUHJAAmiTsEVRNnjOgL+p6qjoh
     EfIG8CGehghWSRKl5eGeDAtbXupZKNjFI1t2XV+ks0RFQ/RPuTH7pF7pk7WO6Cyg
     +Dk2ZMgua0HRL1fXvHKb5Xzr3MVgsbAl5gP8ooIiD9MI/x5Irh3oo58VyoEZNBs/
     Kz+drGFDPljcS6fdiVCFtYIzMrshY6YsfLi0aB8fwOvFtxgBqli0J0NocmlzdG9w
     aGVyIEJha2VyIDwxOjE4LzE0QGZpZG9uZXQub3JnPrQoQ2hyaXN0b3BoZXIgQmFr
     ZXIgPGNiYWtlcjg0QGRpZ2l0YWwubmV0Pg==
     =61OQ
     -----END PGP PUBLIC KEY BLOCK-----


     File-request FNEWSKEY from 1:1/23 [1:18/14] or download it from the
     Rights On! BBS at 1-904-409-7040 anytime except 0100-0130 ET and Zone
     1 ZMH at 1200-9600+ HST/V32B. The FidoNews key is also available on
     the FidoNews homepage listed in the Masthead information.

     -----------------------------------------------------------------
     FIDONEWS 14-14               Page 41                   7 Apr 1997


     =================================================================
                            FIDONET BY INTERNET
     =================================================================

     This is a list of all FidoNet-related sites reported to the Editor as
     of this appearance.

     ============

     FidoNet:

       Homepage     http://www.fidonet.org
       FidoNews     http://ddi.digital.net/~cbaker84/fidonews.html
       HTML FNews   http://www.geocities.com/Athens/6894/
       WWW sources  http://www.scms.rgu.ac.uk/students/cs_yr94/lk/fido.html
       FTSC page    http://www2.blaze.net.au/ftsc.html
       Echomail     http://www.portal.ca/~awalker/index.html
       WebRing      http://ddi.digital.net/~cbaker84/fnetring.html

     ============

     Zone 1:       http://www.z1.fidonet.org

       Region 10:  http://www.psnw.com/~net205/region10.html

       Region 11:  http://oeonline.com/~garyg/region11/

       Region 14:  http://www.netins.net/showcase/fidonet/

       Region 15:  http://www.smrtsys.com/region15/

       Region 16:  http://www.tiac.net/users/satins/region16.htm

       Region 17:  http://www.portal.ca/~awalker/region17.htm

       Region 18:  http://www.citicom.com/fido.html

       Region 19:  http://home1.gte.net/bhamilt/index.htm

     ============

     Zone 2:       http://www.z2.fidonet.org

     ZEC2:         http://fidoftp.paralex.co.uk/zec.htm
     Zone 2 Elist: http://www.fidonet.ch/z2_elist/z2_elist.htm

       Region 20:  http://www.fidonet.pp.se (in Swedish)

       Region 24:  http://www.swb.de/personal/flop/gatebau.html (in German)

       Region 25:
                   http://members.aol.com/Net254/

       Region 27:  http://telematique.org/ft/r27.htm

       Region 29:  http://www.rtfm.be/fidonet/  (in French)
     FIDONEWS 14-14               Page 42                   7 Apr 1997


       Region 30:  http://www.fidonet.ch  (in Swiss)

       Region 34:  http://www.pobox.com/cnb/r34.htm  (in Spanish)
           REC34:  http://pobox.com/~chr

       Region 36:  http://www.geocities.com/SiliconValley/7207/

       Region 41:  http://www.fidonet.gr (in Greek and English)

       Region 48:  http://www.fidonet.org.pl

     ============

     Zone 3:       http://www.z3.fidonet.org

     ============

     Zone 4:       (not yet listed)

       Region 90:
         Net 904:  http://members.tripod.com/~net904 (in Spanish)

     ============

     Zone 5:       (not yet listed)

     ============

     Zone 6:       http://www.z6.fidonet.org

     ============

     -----------------------------------------------------------------

     FIDONEWS 14-14               Page 43                   7 Apr 1997


     =================================================================
                           FIDONEWS INFORMATION
     =================================================================

     ------- FIDONEWS MASTHEAD AND CONTACT INFORMATION -------

     Editor: Christopher Baker

     Editors Emeritii: Tom Jennings, Thom Henderson, Dale Lovell,
                       Vince Perriello, Tim Pozar, Sylvia Maxwell,
                       Donald Tees

     "FidoNews Editor"
         FidoNet  1:1/23
         BBS  1-904-409-7040,  300/1200/2400/14400/V.32bis/HST(ds)

      more addresses:
         Christopher Baker -- 1:18/14, cbaker84@digital.net
                                       cbaker84@aol.com
                                       cbaker84@msn.com

     (Postal Service mailing address)
         FidoNews Editor
         P.O. Box 471
         Edgewater, FL 32132-0471
         U.S.A.


     voice:  1-904-409-3040 [1400-2100 ET only, please]
                            [1800-0100 UTC/GMT]

     ------------------------------------------------------

     FidoNews is published weekly by and for the members of the FIDONET
     INTERNATIONAL AMATEUR ELECTRONIC MAIL system.  It is a compilation
     of individual articles contributed by their authors or their
     authorized agents.  The contribution of articles to this compilation
     does not diminish the rights of the authors.  OPINIONS EXPRESSED in
     these articles ARE THOSE OF THE AUTHORS and not necessarily those of
     FidoNews.

     Authors retain copyright on individual works; otherwise FidoNews is
     Copyright 1997 Christopher Baker.  All rights reserved.  Duplication
     and/or distribution permitted for noncommercial purposes only.  For
     use in other circumstances, please contact the original authors, or
     the Editor.

                            =*=*=*=*=*=*=*=*=

     OBTAINING COPIES: The most recent issue of FidoNews in electronic
     form may be obtained from the FidoNews Editor via manual download or
     file-request, or from various sites in the FidoNet and Internet.
     PRINTED COPIES may be obtained by sending SASE to the above postal
     address.  File-request FIDONEWS for the current Issue.  File-request
     FNEWS for the current month in one archive.  Or file-request specific
     back Issue filenames in distribution format [FNEWSEnn.ZIP] for a
     FIDONEWS 14-14               Page 44                   7 Apr 1997


     particular Issue.  Monthly Volumes are available as FNWSmmmy.ZIP
     where mmm = three letter month [JAN - DEC] and y = last digit of the
     current year [7], i.e., FNWSFEB7.ZIP for all the Issues from Feb 97.

     Annual volumes are available as FNEWSn.ZIP where n = the Volume number
     1 - 14 for 1984 - 1997, respectively. Annual Volume archives range in
     size from 48K to 1.4M.


     INTERNET USERS: FidoNews is available via:

                          http://www.fidonet.org/fidonews.htm
                          ftp://ftp.fidonet.org/pub/fidonet/fidonews/
                          ftp://ftp.aminet.org/pub/aminet/comm/fido/

                                      *=*=*

     You may obtain an email subscription to FidoNews by sending email to:

                          jbarchuk@worldnet.att.net

     with a Subject line of: subscribe fnews-edist

     and no message in the message body. To remove your name from the email
     distribution use a Subject line of: unsubscribe fnews-edist with no
     message to the same address above.

                                      *=*=*

     You can read the current FidoNews Issue in HTML format at:

                          http://www.geocities.com/Athens/6894/

     STAR SOURCE for ALL Past Issues via FTP and file-request -
     Available for FReq from 1:396/1 or by anonymous FTP from:

                          ftp://ftp.sstar.com/fidonet/fnews/

     Each yearly archive also contains a listing of the Table-of-Contents
     for that year's issues.  The total set is currently about 11 Megs.

                                 =*=*=*=

     The current week's FidoNews and the FidoNews public-key are now also
     available almost immediately after publication on the Editor's new
     homepage on the World Wide Web at:

                  http://ddi.digital.net/~cbaker84/fidonews.html

     There are also links there to jim barchuk's HTML FidoNews source and
     to John Souvestre's FTP site for the archives. There is also an email
     link for sending in an article as message text. Drop on over.

                            =*=*=*=*=*=*=*=*=

     A PGP generated public-key is available for the FidoNews Editor from
     FIDONEWS 14-14               Page 45                   7 Apr 1997


     1:1/23 [1:18/14] by file-request for FNEWSKEY or by download from
     Rights On! BBS at 1-904-409-7040 as FIDONEWS.ASC in File Area 18.  It
     is also posted twice a month into the PKEY_DROP Echo available on the
     Zone 1 Echomail Backbone.

                                *=*=*=*=*

     SUBMISSIONS: You are encouraged to submit articles for publication in
     FidoNews. Article submission requirements are contained in the file
     ARTSPEC.DOC, available from the FidoNews Editor, or file-requestable
     from 1:1/23 [1:18/14] as file "ARTSPEC.DOC".  ALL Zone Coordinators
     also have copies of ARTSPEC.DOC. Please read it.

     "Fido", "FidoNet" and the dog-with-diskette are U.S. registered
     trademarks of Tom Jennings, P.O. Box 410923, San Francisco, CA 94141,
     and are used with permission.

             "Disagreement is actually necessary,
              or we'd all have to get in fights
              or something to amuse ourselves
              and create the requisite chaos."
                                -Tom Jennings

      -30-

     -----------------------------------------------------------------