F I D O N E W S --       Volume 14, Number 23          9 June 1997
     +----------------------------+-----------------------------------------+
     |  The newsletter of the     |   ISSN 1198-4589 Published by:          |
     |    FidoNet community       |   "FidoNews"                            |
     |          _                 |        1-904-409-7040    [1:1/23]       |
     |         /  \               |                                         |
     |        /|oo \              |                                         |
     |       (_|  /_)             |                                         |
     |        _`@/_ \    _        |                                         |
     |       |     | \   \\       |   Editor:                               |
     |       | (*) |  \   ))      |        Christopher Baker  1:18/14       |
     |       |__U__| /  \//       |                                         |
     |        _//|| _\   /        |                                         |
     |       (_/(_|(____/         |                                         |
     |             (jm)           |     Newspapers should have no friends.  |
     |                            |                    -- JOSEPH PULITZER   |
     +----------------------------+-----------------------------------------+
     |               Submission address: FidoNews Editor 1:1/23             |
     +----------------------------------------------------------------------+
     |  MORE addresses:                                                     |
     |                                                                      |
     |    submissions=> cbaker84@digital.net                                |
     +----------------------------------------------------------------------+
     |    For  information,   copyrights,   article   submissions,          |
     |    obtaining copies of FidoNews or the internet gateway FAQ          |
     |    please refer to the end of this file.                             |
     +----------------------------------------------------------------------+


                    IT'S ONLY LAME WITH AN F


                        Table of Contents
     1. EDITORIAL  ................................................  1
        What would it take to get YOU to submit something?  .......  1
     2. LETTERS TO THE EDITOR  ....................................  2
        To Compress Mail or Not to Compress Mail?  ................  2
     3. ARTICLES  .................................................  4
        FidoNet Via Internet Hubs  ................................  4
        Some thoughts on a possible future direction for Fidone  ..  4
        SILLYSEASON Echo forming  .................................  6
        Why I bother  .............................................  7
     4. COLUMNS  ..................................................  9
        Lock and Load: Guerilla Marketing for BBSes  ..............  9
     5. GETTING TECHNICAL  ........................................ 11
        FSC-0080 - Describing FidoNet with layered model  ......... 11
        FSC-0081 - A TYPE-3 Packet proposal  ...................... 13
     6. COORDINATORS CORNER  ...................................... 28
        Nodelist-statistics as seen from Zone-2 for day 157  ...... 28
     7. NET HUMOR  ................................................ 29
        Nevermore?  ............................................... 29
     8. NOTICES  .................................................. 31
        Future History  ........................................... 31
     9. FIDONET SOFTWARE LISTING  ................................. 32
        Latest Greatest Software Versions  ........................ 32
     10. FIDONEWS PUBLIC-KEY  ..................................... 36
        FidoNews PGP public-key listing  .......................... 36
     And more!
     FIDONEWS 14-23               Page 1                    9 Jun 1997


     =================================================================
                                 EDITORIAL
     =================================================================


     What? No urge to write something for FidoNews? You don't have to do a
     formal article or column. You can just send in something via Netmail.
     You can pick something new or forward something of yours from an Echo
     or some other forum.

     It's your newsletter.

     C.B.



     -----------------------------------------------------------------

     FIDONEWS 14-23               Page 2                    9 Jun 1997


     =================================================================
                           LETTERS TO THE EDITOR
     =================================================================


     [This wasn't a Letter to the Editor, but it should have been. Folks
      should not be sending compressed mail to strangers. It adds an extra
      step when receiving mail from unsecured sources among other
      concerns. Unless you're sending a ton of mail, why bother?] Ed.

     --- Following message extracted from FTSC_PUBLIC @ 1:18/14 ---
         By Christopher Baker on Thu Jun 05 15:17:35 1997

     From: Lisa Gronke
     To: All
     Date: 03 Jun 97  06:45:02
     Subj: ARC

     * Original Area: PDX.SYSOP
     * Original To  : Phil McCloud (1:105/61)

     The gospel says you should use either use ARC or no compression when
     sending to strangers.

     The reality is that you're more likely to run into someone who can't
     unARC than someone who can't unZIP.

     There is a networking precept that says, "Be liberal in what you
     accept; be conservative in what you send."

     As long as a sysop understands the landscape, there shouldn't be much
     of a problem either way.

     The biggest problem is passing around configuration files with ZIP
     configured as the default. That breeds new sysops who can't unARC and
     don't even know that they should be able to.

     I recommend ARC as the default, but encourage everyone to explicitly
     address the archiver issue at the time an echomail link is
     established. Alternatively, if you have ZIP as your default, the first
     interchange with a stranger should ask if it is OK.

     And for gawds sake, don't get into a policy pissing contest over the
     issue.

     > I believe some form of .ZIP can be compiled for any platform,
     > however none has ever changed the 'standard'.

     ZIP is very difficult to implement on 8-bit, 64K RAM systems. The
     lookup tables are too big to be kept in RAM. But 8-bit FidoNet systems
     are becoming as rare as ivory billed woodpeckers.

     No one has ever changed the 'standard' (which, btw, is durned
     difficult to find in the FTSC documents), but almost everyone has
     managed to minimize the effect. Other than the nodediff, ftsc and
     policy documents, nothing of any size is sent ARCed. The amount of
     FIDONEWS 14-23               Page 3                    9 Jun 1997


     bandwidth actually lost in ARC transfers is probably less than the
     bandwidth that will be used in arguing about what the replacement
     should be <g>.

     A more cogent argument for the future is that zip/unzip are widely
     available in the unix world, whereas arc is not. I have three unix
     shell accounts. All have zip/unzip. None of them has arc. One has
     lharc. Oh, I'm sure that I can find unix arc source somewhere and
     compile it, but that's a lot of trouble if all I want to do is read
     policy4.arc from ftp.paonline.com.

     Incidentally, the "ARC" issue is a FidoNet (the network) issue, not a
     FidoNet (technology) issue. FTN OtherNets could have a different
     archiver policy.

      Origin: EastSide Data Services (1:105/61)

     -----------------------------------------------------------------

     FIDONEWS 14-23               Page 4                    9 Jun 1997


     =================================================================
                                 ARTICLES
     =================================================================


     Fidonet Via Internet Hubs

     Speed|Node#      |Operator          | Facilities        | Basic Rate
     -----+-----------+------------------+-------------------+-----------
     T1   |1:270/101  |George Peace      | FTP               | $30mo.
     T1   |1:396/1    |John Souvestre    | FTP               | $25mo.
     T1   |1:12/12    |Ken Wilson        | FTP               | $24mo.
     T1   |1:140/12   |Bob Seaborn       | FTP, Transx       | $5/$20
     64k  |1:124/7008 |Ben Hamilton      | FTP, VFOS, Transx | $20mo.
     56k  |1:13/25    |Jim Balcom        | FTP               | $20mo.
     33.6 |1:2604/104 |Jim Mclaughlin    | FTP, VFOS, UUEMAIL| $1mo.
     33.6 |1:2624/306 |D. Calafrancesco  | VFOS              | $15yr.
     33.6 |1:281/169  |Brian Greenstreet | FTP               | $2mo.
     28.8 |1:330/204  |Patrick Rosenheim | Transx            | $25yr.

     --
     compiled by Cindy Ingersoll, 1:2623/71, (609)814-1978,
     fbn@cyberEnet.net Posted on the 1st of every month in FN_SYSOP,
     R13SYSOP and Fidonews.
     ---


     -----------------------------------------------------------------


     Some thoughts on a possible future direction for FidoNet:
     by Ron Dwight
     2:220/22


         I have been giving consideration lately to a future direction in
     which Fidonet could go and the following is offered for your
     consideration:

     ..  Fidonet is a vastly different medium than the internet and should
     not be swallowed by it.  Fidonet should retain it's current character,
     freedom and flexibility.

     ..  FidoNet nodes need the speed and reduced cost of internet access,
     to communicate, this is why such things as Vmodem are being written.

     ..  The FidoNet nodelist appears to be the largest single obstacle
     standing in the way of major changes to Fidonet methodology and either
     the nodelist can be changed to accommodate the new methods or
     alternative methods can be devised which make use of the current
     nodelist.

               What I am going to propose here, is a method of using the
     current nodelist, with almost no changes and yet allow those nodes
     which require access to internet transport, to obtain it quickly and
     easily.
     FIDONEWS 14-23               Page 5                    9 Jun 1997


               The basic concept revolves around the actual method of
     operation of the internet itself to satisfy the needs of Fidonet
     nodes.  Whenever a connection is made, using a web browser, the
     address which you are seeking, http://.... is sent to a Network Access
     Point computer which translates that name into a TCP/IP address.  This
     is sent back to your browser which then uses it to reach the
     destination computer on the internet.

               What I propose for Fidonet, is something very similar which
     will allow us to maintain the current nodelist format and content and
     yet obtain full access to internet capable systems willing to
     accept callers running Vmodem, Binkd or something similar..

     1)  A computer, or computers, serve as Fidonet Internet Access Points.
         This would best be provided by a reliable system owned and
         operated by a large corporation.  To that end we would perhaps
         need to obtain a sponsor, IBM would do nicely, so would US
         Robotics, to provide access to an internet server to act as the
         Fidonet Name Information Center.  The load on this machine would
         not be great, but a little software would need to be written for
         it.

     2)  We then write a series of specifications for software which would
         use this service to access other Fidonet nodes via the internet.
         Part of this software specification would be something like:

         ..  All internet capable nodes would be flagged in the nodelist
     with a single flag to indicate internet capability.  The flag could
     be, for example: INET or something similar and the flag would indicate
     ONLY that the system was connected to the internet and was capable of
     accepting FidoNet callers.  No other information would be carried in
     the nodelist and the nodelist entry could be used to indicate a normal
     PSTN node as well as an internet capable one.

         ..  Mailers wishing to access an internet capable node must send a
     message, containing ONLY the FidoNet node number
     (Zone:Net/Node.point), over the internet to the FidoNet Name
     Information Center.  The reply from that server would be a message
     containing the capabilities of that node which could then be used to
     establish (or refuse) a session.  The time overhead for such a service
     would be a matter of milliseconds under normal conditions and would
     not add significantly to the length of a session.

         ..  Mailer software, in order to reduce the number of transactions
     to the Name Information Center, would check if the information is
     locally available for the called number and use that if it was, say,
     less than 7 days old.  In other words if the system had been called
     within the last 7 days, it is expected that the same session
     parameters can be used without requesting them again from the Name
     Information Center.

     3)  The information contained, and updated, on the Name Information
         Center would be such things as:

         ..  Transport capability
         ..  Open hours
     FIDONEWS 14-23               Page 6                    9 Jun 1997


         ..  Protocol availability

               In other words, all the stuff that folks are trying to cram
     into the nodelist now.  It could be in IEMSI format or similar.

               A Fidonet node, ZC?/IC? or designated SysOp, would be
     responsible for ensuring that the Name Information Center was properly
     updated and functional.

               This is only the basic outline of a concept which could be
     used to enhance Fidonet capability.  I believe the sponsorship would
     be easy to obtain as the load on the Name Information Center machine
     would be very light as long as the mailers obeyed reasonable rules as
     to access.  More important would be laying down the rules and
     mechanisms for the software to take advantage of the capabilities
     offered.  Obviously a lot of technical detail needs to be worked out,
     but I believe this could be used as a basis to move FidoNet into a
     closer cooperation with the internet to our mutual advantage.

               Someone is going to object that using a single Name
     Information Center gives the entire system a central weakness.  In
     answer to that I would reply that:

     ..  Most of the entire WORLDWIDE internet services rely on only a few
     such centers.

     ..  There is no reason why more than one machine could not be used and
     that these could be indicated in the nodelist, perhaps as comment
     lines, which mailer software can locate.  Of course the more Name
     Information Centers which are created, the more difficult it becomes
     to keep them updated.

               This mini-article is intended as a START.  Andy, Jo, Arjen
     and other developers, it's up to people like you to carry it further
     and make it become a reality.

     -----------------------------------------------------------------


     SILLYSEASON Echo forming
     Fredric L. Rice (frice@linkline.com)
     The Skeptic Tank - 1:102/890.0
     (818) 335-9601 24hrs N81

     A new FidoNet echo -- tag named "SILLYSEASON" -- is forming and I'm
     soliciting participation.  The forum will discuss the "Millennium"
     television series yet will also cover the broad spectrum of phenomena
     from which the series draws upon for its subject matter.

     The so-called "Millennium lunacy" phenomena has been commented upon
     and researched in growing frequency this last decade -- and for
     obvious reasons:  The year 2,000 is only three years away.  The
     phenomena labels the cyclic rise and fall of destructive behavior and
     beliefs plotted against the year number; yet it has nothing to do with
     numerology.  It's a matter of the human psychology behind how humans
     contrive notions of significance when there are none.  The phenomena
     FIDONEWS 14-23               Page 7                    9 Jun 1997


     is also called the "silly season" and has been the subject of several
     books and magazine articles.

     Even though the contemporary calendar is a hodge podge of badly formed
     months, weeks, and days, societies ever since the contemporary
     calendar was widely adopted have placed great significance to the year
     number whenever a new decade, century, or millennium comes along.
     Though the year numbers aren't predicated upon any meaningful event or
     indicate any meaningful demarcation, when a year number ends with a
     zero, a large portion of the so-called "Westernized societies" feel
     inclined to believe any damn silly thing and to "prophecy" much
     disaster.  Sadly, many such believers work hard to bring about their
     images of doom and destruction in self-fulfilling prophecy.  We
     observe the results of such beliefs in our newspapers and on
     television news reports.

     For a link to the forum, contact me and I'll set it up.  I suspect
     that this will be a fairly low-volume forum except for times
     immediately following some Millennium lunacy --such as repeats of the
     "Heaven's Gate" mass suicides which are expected and the violent
     activities of self-proclaimed "militias."

     -----------------------------------------------------------------


     Why I bother
     by Troy H. Cheek (1:362/708.4)

     Some say Fidonet is dead.  Obviously, since I'm writing this, and
     you're reading it, and it went through Fidonet, then Fidonet isn't
     dead.  As long as Fidonet isn't dead, it will require people to run
     BBS's, maintain nodelists, move messages, and moderate echoes.  People
     who catch a lot of flak and get very little praise, but people who are
     required nonetheless.

     I've moderated a few Fidonet echomail conferences over the years for
     various reasons.  The ones I moderate right now, however, have exactly
     one thing in common:  They were abandoned without notice by their
     previous moderators.

     I took over echoes which were "dead" or "dying".  You want to hear
     something funny?  All of them are still active and still on the
     backbone.  Had I not taken over, it's possible some of these echoes
     would no longer exist.  But they would not have died because of lack
     of interest of the end users; they would have died because nobody with
     the proper knowledge bothered to update an echolist entry.

     In my mind, there's no doubt that the eventual demise of Fidonet will
     _not_ be because there are no longer any end users (lured away by the
     promise of the Internet and other factors), but because the people who
     do the vital jobs of Fidonet will give them up under the mistaken
     impression that they are no longer needed.

     Back in the early Fidonet days, the stand-alone BBS was declared dead.
     After all, what single BBS could possibly compete with a nation-wide
     network?  And, hearing this solemn announcement that they were dead,
     FIDONEWS 14-23               Page 8                    9 Jun 1997


     BBS's closed shop or joined Fidonet.  A funny thing happened on the
     way to the funeral, though.  Some of the BBS's didn't listen and
     continued to operate for as long as they still had callers.  Some
     operated for years.  A few are _still_ operating to this day. And I've
     been known to call a few every now and then.

     Fidonet has been declared dead, killed by the Internet.  In spite of
     being dead, there are still a lot of people using it daily.  So,
     should we close up shop, forcing all these users to find other means
     of communication?  Or maybe, just maybe, should we keep the doors open
     until the message packets actually stop coming in?

     By all means hook into the Internet!  Learn about the World Wide Web
     and news services and electronic mail!  Make new friends!  Discover
     new sources of knowledge!  But since you can do all these things
     without giving up Fidonet, why do so many people demand we do exactly
     that?  Are they afraid that if we don't take their word that Fidonet
     is dead, instead of waiting for the mail packets to actually quit
     coming in, that it just might take years or even decades before
     Fidonet really ceases to exist?

     As long as I still have access to Fidonet, and as long as there are
     still echoes that interest me, I'll keep posting messages.  And as
     long some of these echoes need somebody to send in echolist entry
     updates and perform the various administrivia functions, I'll still be
     a moderator.

     Troy H. Cheek, VID_GAME Echo Moderator (among others)
     --
     |Fidonet:  Troy H. Cheek 1:362/708.4
     |Internet: 362-708-4!Troy.H..Cheek@river.chattanooga.net
     |
     | Standard disclaimer: The views of this user are strictly his own.
     | River Canyon Rd. BBS <=> Chattanooga OnLine!  Gateway to the World.

     -----------------------------------------------------------------

     FIDONEWS 14-23               Page 9                    9 Jun 1997


     =================================================================
                                  COLUMNS
     =================================================================


     Lock and Load: Guerilla Marketing for BBSes
     (A Parenthetical Column) (Robert Parson) (1:3822/1)

     Every month, a major owner shuts down operations.  More operations are
     rumored to be on the brink of going under.  Everyone moans about the
     state of the industry.  "The end is near!"

     Sounds familiar, doesn't it?  Sure sounds like BBSes.  But it isn't.
     This is newspaper.

     True, the total number of newspapers is down, as is total circulation.
     But revenues are at an all time high.  That's because they maximize
     their audience.  That's consultantspeak for targeting the readership.
     Do you really think they created "Food" sections solely because it
     would be a nice thing for the reader?  No.  They were created as a
     showcase for grocery ads.

     (Printed newspapers will never die, as some people have predicted, but
     that's another column for another time)

     BBSes can learn an important lesson here.  This doesn't mean everyone
     should go out and create big "Food" areas on their BBSes (although
     we'll get to that shortly).  However, you can focus some of your
     marketing on specific areas of your BBS.

     Many of you have already experienced success with Genealogy areas or
     possibly even dedicating your BBS to Genealogical research.  Some of
     you look at gaming or chatting to draw in callers.  But there are
     plenty of other topics that are ripe for the pickin'.

     Let's get back that "Food" section (this is going to be in a rather
     circular fashion, so hang with me.)

     Most BBSes have their messages bases numbered in some way or another.
     In many cases they are also alphabetized.  But for the most part, they
     are not organized in any particular way.

     Pull together a text file or a bulletin of some sort that puts the
     message bases into topic order.  Your callers can download this file
     or bulletin, do a search for "FOOD" and there will be a list of the
     message areas that are food-related.  You could also include a few
     lines that will point them to files available on your BBS that are
     food-related (such as "Search the file section for 'meal' and/or
     'recipe'!")

     While this doesn't create quite the same atmosphere as a "Food"
     section in the newspaper, it gives your callers a fairly easy to
     use index of what to look for when they are setting up their mail
     readers. (Sure, they can do a word search using the echo list you have
     available now, but this way they'll just have to do one search instead
     of a bunch.)
     FIDONEWS 14-23               Page 10                   9 Jun 1997


     This will also give you a more specific idea of where everything is at
     when you do any sort of outside promotions.  For instance, you can
     declare "Food Month" on your BBS.  You can highlight the food message
     bases and files in bulletins, local message areas, printed materials,
     in a speech to the local culinary society, on a table at the county
     fair, maybe even enter the local chili cookoff (using a recipe found
     on your BBS, of course).

     You can easily create and promote other "virtual sections" as well.
     But as I keep saying, you have to do more than leave a message on
     other BBSes saying "Come look at my Food Section.  Think "out of the
     box."  That's Bobspeak for get "out of the house."  At the very least,
     you'll get a tan.

                   But wait!  There's more!

     Steve Prado, the Sysop of my Friendly Neighborhood BBS, Jackalope
     Junction (1:3822/1) this past week was a guest on KWHN-AM Fort Smith,
     AR talking about BBSes and International BBS Week.

     The tone of the interview was positive.  Steve was able to pass along
     some good information, not just about his BBS but others in town and
     even a bit about Fidonet.  (By the way, he adapted the sample news
     release I wrote a few weeks back and sent it to the radio station.
     For full disclosure:  I happen to work there and did help set up the
     interview.  But he did the hard work)

     Good job, Steve!


     Robert Parson

     -----------------------------------------------------------------

     FIDONEWS 14-23               Page 11                   9 Jun 1997


     =================================================================
                             GETTING TECHNICAL
     =================================================================


     [This is part of the continuing FidoNet History series publishing the
      FTSC Standards and Proposal documents. FSC-0079 {RTF} is skipped due
      to its length {60K}. These docs have been reformatted to 70 columns
      where required and any tables may be askew as a result. High ASCII
      characters have been removed or replaced. Node numbers and telephone
      numbers may be out of date.] Ed.


       | Document: FSC-0080
       | Version:  001
       | Date:     01 Mar 1995
       |
       | Mikael Stoldal, 2:201/337

                       Describing FidoNet with a layered model
                          Mikael Stoldal, 2:201/337@FidoNet

     Introduction
     ============
     FTS-1 tries to describe FidoNet with the OSI model, but I don't think
     that description is any good.

     I have tried to make a better description of FidoNet with the OSI
     model, but without success. I don't think that's possible.

     Instead I made my own layered model, inspired from OSI. I use seven
     layers with the same name as in OSI, but with Session and Transport
     swapped.

     Why this model?
     ===============
     The main goal with this model is to make FidoNet more flexible make it
     easier to change into newer and better protocols and data structures.

     It should be possible to change one layer without affecting the
     others.

     Description of the layers
     =========================

     Physical layer
     --------------
     The telephone network (PSTN).

     Link layer
     ----------
     Modem with protocols like V.22 and V.32. This layer also include real-
     time error correction (V.42, MNP4) and data compression (V.42bis,
     MNP5).

     Serial communication hardware (UART).
     FIDONEWS 14-23               Page 12                   9 Jun 1997


     Network layer
     -------------
     Serial communications drivers (FOSSIL) and file transfer protocols
     (Zmodem etc). Note that this layer can be divided into two sub-layers,
     the file transfer protocol on top on the serial communication driver;
     but upper layers can interact with the serial communication driver
     directly.

     Session layer
     -------------
     Session handshake protocols (YooHoo, EMSI) implemented in mailers.
     This layer can reliably send files directly between two systems. It
     doesn't perform any routing. It doesn't know about NetMail, EchoMail
     etc.

     The upper layers uses logical addresses (node numbers), this layer
     performs address resolution (often by using a nodelist) to obtain the
     physical address (telephone number) necessary to establish a
     connection.

     The upper layers can tell if a file should be sent immediately, when
     appropriate or be placed on hold.

     When files are received, this layer tells the upper layers.

     Transport layer
     ---------------
     This layer handles routing and transport of NetMail, EchoMail and file
     attaches. The format of mailpackets is defined in this layer, except
     the internal structure of a packed message.

     A mail processor takes received NetMail and EchoMail and places it in
     the local message base. It also looks there for messages to send.

     Presentation layer
     ------------------
     Here are the internal structure of a packed message defined.

     In TYPE-2, this layer is totally mixed up with the Transport layer. In
     new packet formats, they will hopefully be separated.

     Application layer
     -----------------
     Here are the local message base (stored messages) defined.

     Interaction between layers
     ==========================

     Interaction between Session layer and Transport layer
     -----------------------------------------------------
     The Session and Transport layers does only interact between sessions,
     not during them. The reason is that is should be possible to keep them
     in different programs and implement it in single tasking operating
     systems like MS-DOS. This doesn't prevent the Session and Transport
     layers from running simultaneously in a multitasking system.

     FIDONEWS 14-23               Page 13                   9 Jun 1997


     Comments
     ========
     There is one problem with this model, how to describe the File Request
     server function. Sending File Requests are no problems, that's just a
     File Attach with a *.REQ file. The File Request server function have
     to be implemented directly in the Session layer.

     -----------------------------------------------------------------


       | Document: FSC-0081 Part A
       | Version:  001
       | Date:     01 Mar 1995
       |
       | Mikael Stoldal, 2:201/337

                              A TYPE-3 Packet proposal
                         Mikael Stoldal, 2:201/337@FidoNet

     Status of this document
     =======================
     Copyright (C) 1992-1994 by Mikael Stoldal.

     This document may be freely distributed and copied. The standard
     described may be implemented by anybody. You may not distribute
     modified versions of this document without written permission from the
     author.

     Fido and FidoNet are registered trademarks of Tom Jennings and Fido
     Software.

     Introduction
     ============
     This is a proposal on a new packet format for use in FidoNet and other
     FTNs (FTN = FidoNet Technology Network). This format can be used for
     both NetMail (private point-to-point mail) and EchoMail (electronic
     conferences).

     This document defines the transport layer. It also includes a
     presentation layer definition, but that can be changed without
     affecting the transport layer. It also includes a application layer
     (stored messages) definition,
     but it's not mandatory.

     This packet format conforms with FSC-39, rev 4. It has the PktType
     field in the header at the same position as TYPE-2 and it contains a
     capability word at the same position as TYPE-2+ (but no CW validation
     copy). The packet header has also the same size as in TYPE-2. This
     should make it easy to implement mail-processors supporting both TYPE-
     2 and TYPE-3.

     This packet format separates the header from the message data and the
     header is extensible. A mail processor (the transport layer) doesn't
     have to look at the message data.

     This format eliminates most kludges currently used in TYPE-2.
     FIDONEWS 14-23               Page 14                   9 Jun 1997


     This packet format allows multiple AreaTags in EchoMail.

     This packet format is much more extensible than TYPE-2 and is probably
     easier to implement.

     This packet format allows up to 4 GigaBytes large messages and allows
     binary data in messages, this makes it possible to implement
     multimedia capabilities in the future.

     Definitions
     ===========

     Characters
     ----------
     In this document, literal characters are written as two uppercase
     hexadecimal (base 16, 0..9A..F) digits following by lowercase h, e.g.
     "1Fh". The following abbreviations are used: "NUL" means 00h, "CR"
     means 0Dh and "space" means 20h (the quotation marks are not
     included).

     Basic data types
     ----------------
     Name      Length  Description
     ----------------------------------------------------------------------
     ShortInt    1     8-bit unsigned integer.
     Integer     2     16-bit unsigned integer, Intel 8086 byte order.
     LongInt     4     32-bit unsigned integer, Intel 8086 byte order.
     Byte        1     Field of 8 bits.
     Word        2     Field of 16 bits, Intel 8086 byte order.
     String[n]   n     Fixed length string of n bytes, NUL-padded.
     String{n} max n   Variable length string of max n bytes, NUL-
                       terminated.
                       n includes the terminating NUL.
     String            Variable length string, not terminated.

     Address
     -------
     Field      Type            Description
     Range
     ----------------------------------------------------------------------
     Zone       Integer         Zone address.
     1..65535
     Net        Integer         Net address.
     1..65535
     Node       Integer         Node address.
     0..65535
     Point      Integer         Point address or zero if boss.
     0..65535

     FTN address in text format
     --------------------------
     An FTN address in text format must, unless otherwise stated, be in the
     Zone:Net/Node[.Point] format, where .Point must be excluded if point
     is zero, included otherwise.

     TimeStamp
     FIDONEWS 14-23               Page 15                   9 Jun 1997


     ---------
     A LongInt which contains the number of seconds since 00:00:00 1st
     January 1970 UTC.

     Organization
     ------------
     An organization is a network such as FidoNet, VirNet, SigNet or
     InterNet.  It's sometimes called "domain", but I use the term
     organization to avoid confusion with InterNet domains.

     Reserved
     --------
     All fields marked "reserved for future extension" must be zeroed when
     creating/writing and ignored when reading. They might be defined by
     future revisions of this document.

     Filenames
     =========
     It's recommended to use the naming scheme in FTS-LIST, for both
     NetMail and EchoMail. There should be no problem with using the same
     name space for TYPE-2 and TYPE-3 packets because the packet headers
     are enough compatible.

     Packet format
     =============
     Packet header
     Zero or any number of data records.
     00h 00h

     The first two bytes of a data record is used to check for the end of a
     packet. If both are zero, the end is reached (and the rest, if any,
     should be ignored).

     Packet header
     =============
     Field      Type            Description
     ----------------------------------------------------------------------
     PktOrig    Address         The node who created this packet.
     PktDest    Address         The node who should receive this packet.
     SubType    Integer         Packet contents (see below).
     PktType    Integer         Always 3.
     PktDate    TimeStamp       When the packet was created.
     ProdCode   Integer         FTSC Product Code.
                                Programs without Product Code must use
                                65535.
     MajorVer   ShortInt        Major product version.
     MinorVer   ShortInt        Minor product version.
     Org        String[16]      Organization (see below).
     CapWord    Word            Capability Word (see FSC-39).
     Password   String[8]       Packet password.
     ExtraInfo  String[4]       Reserved for future extension.

     SubType
     -------
     Defines what the packet contains.

     FIDONEWS 14-23               Page 16                   9 Jun 1997


     If this field is zero, data record is defined by the "Packed message"
     part of this document. If this field is non-zero, data record is not
     defined by this document.

     This field can be used for two things. The first is to define new
     packet types without having to use a new packet header. The second is
     to allow distribution of other things than Email.

     Organization
     ------------
     This field contains the name of the organization the packet travels
     in. This field applies to both PktOrig and PktDest since packets are
     intra-organization.

     Packed message
     ==============
     The messages should be in chronological order in a packet.

     Field      Type              Description
     ----------------------------------------------------------------------
     HeadSize   Integer           Size of the message header (see below).
     MsgFlags   Word              Message flags (see below).
     MsgDate    TimeStamp         When the message was created.
     MsgID      LongInt           Unique message identifier (see below).
     ReplyID    LongInt           Reply linkage information (see below).
     MsgLength  LongInt           Size of MsgData.
     MsgOrig    Address           The node who created this message.
     MsgDest    Address           The node who should receive this message.
     CharSet    ShortInt          Character set (see below).
     MsgType    ShortInt          Type of MsgData (see below).
     Area       String{255}       AreaTag(s) (see below).
     OrigAddr   String{255}       Origin address in text format (see
                                  below).
     ReplyAddr  String{255}       Reply linkage information (see below).
     FromUser   String{255}       Who wrote this message?
     ToUser     String{255}       To whom?
     Subject    String{255}       Subject or one filename
                                  (for file attaches and requests).
     Path       String{65535}     Path (see below).
     HeadExt    String            Header extension fields (see below).
     MsgData    String            Message data (see below).

     HeadSize
     --------
     The total size of the message header (all fields except MsgData).
     Since this is an Integer, the header can't be bigger than 65535 bytes
     and Path can never reach it's maximum length (how big it can be
     depends on how big the rest of the header is).

     Message flags
     -------------
     Bit  Flag          Meaning
     ----------------------------------------------------------------------
      0   Pvt           Private message.
      1   File          File attach message.
      2   FileReq       File request message.
     FIDONEWS 14-23               Page 17                   9 Jun 1997


      3   UpdReq        File update request message.
      4   Direct        Do not route this message.
      5   Crash         High priority mail.
      6   Hold          Hold for pickup.
      7   IMM           Immediate mail (highest priority).
      8   RRQ           Return receipt request (see below).
      9   CRQ           Confirm receipt request (see below).
     10   IRR           Is return receipt (see below).
     11   Machine       Message to a program (see below).
     12   NoForCC       CC in NetMail, NoForward in EchoMail (see below).
     13   Permanent     Message must not be purged by age (see below).
     14   Foreign       Message is from another organization.
     15   reserved      Reserved for future extension.

     RRQ, CRQ and IRR
     ----------------
     The RRQ and CRQ flags without IRR is used to ask the software at the
     final destination to generate a receipt message to the sender. The
     receipt to an RRQ flagged message must be generated when the message
     is received, and this receipt must have the IRR and RRQ flags set. The
     receipt to a CRQ flagged message must be generated when it has been
     read by its addressee, and this receipt must have the IRR and CRQ
     flags set.

     A receipt must have the ReplyAddr and ReplyID fields set as if it was
     a reply to the original message.

     It's up to each network's policy to decide if all systems must support
     this, no system are allowed to support this or all systems are allowed
     but not forced to support this.

     Machine
     -------
     The Machine flag indicates that this message is addressed to a program
     and not a human. A mail processor should store such messages as
     defined in the "Stored message" section later in this document so the
     program doesn't have to support 4711 different message base formats.
     The name of the program must be in the ToUser field.

     Carbon Copy
     -----------
     The CC flag is used for sending a NetMail message to several nodes.
     Which nodes is determined by the MsgDest field.

     If the message is addressed to a Zone Coordinator, the message is
     destined for all nodes in that zone. If the message is addressed to a
     Region Coordinator, the message is destined for all nodes in that
     region. If the message is addressed to a Net Coordinator, the message
     is destined for all nodes in that net. If the message is addressed to
     a HUB, the message is destined for all nodes under that HUB.

     If the receiver of a CC message have other coordinators (or HUBs)
     below, it must send the message to them as CC's too.

     If the ToUser field is empty the message is considered to be addressed
     to the SysOp and the name is taken from the nodelist (or set to
     FIDONEWS 14-23               Page 18                   9 Jun 1997


     "SysOp").  This must be done by the system immediate before the
     destination (usually the destination's HUB).

     Permanent
     ---------
     This flag indicates that the message must not be removed when old
     messages is cleaned out.

     A new message with this flag automatically erase an old message with
     the same data in the Subject field. If you want to erase a permanent
     message without replacing it with a new, then post an empty message
     with the Permanent flag and the appropriate data in the Subject field.

     This flag can only be used in EchoMail.

     OrigAddr
     --------
     This field must contain the true origin address of the message in text
     format followed by an "@" (40h) and the name of the originating
     organization.

     Message ID
     ----------
     The origin address and MsgID fields are used as a unique message
     identifier.  How the MsgID field is generated is left to the
     implementor, but it must be unique for each message generated on a
     given node in at least three years.  MsgID must normally not be zero,
     zero is used to indicate lack of Message-ID.  With this system these
     two fields together is unique for every message, and can be used for
     duplicate detection and other things.

     Reply linkage information
     -------------------------
     In a reply the ReplyAddr and ReplyID fields must be identical to the
     origin address, and MsgID fields in the replied message. A message
     which is not a reply must have these fields empty. Use the ReplyAddr
     field to check this.

     Area
     ----
     A list of one or more AreaTags in EchoMail, just a NUL in NetMail. If
     the list contains more than one tag, they are separated by space. 00h
     through 1Fh are not allowed in this field (except NUL as the
     terminator).

     Path
     ----
     This field contains a series of addresses separated by space. The
     first system must place its address in this field and every system
     that routes the message must add its address to this field,

     Note that the first address in this field and the address in the
     MsgOrig field doesn't have to be the same.

     The first address must be the origin address in this format:
     zone:net/node.point@organization
     FIDONEWS 14-23               Page 19                   9 Jun 1997


     In the other addresses organization, zone, net and node must be
     omitted if same as the previous address.

     The other addresses must be in one of these formats:
     zone:net/node.point@organization
     zone:net/node.point
     net/node.point
     node.point
     .point

     .point must be excluded if point is zero, except when .0 stands alone.

     Example:
     1:123/324@FidoNet sends a routed NetMail message to 2:224/546.5;
     1:123/300, 1:123/0, 1:12/0, 1:1/2, 2:22/888, 2:22/0, 2:224/0,
     2:224/546 and 2:224/546.3 routes the message (in that order). The path
     field must in this case be "1:123/324@FidoNet 300 0 12/0 1/2 2:22/888
     0 224/0 546 .3" when
     2:224/546.5 receives the message. Note that the message is routed via
     a point, that might not be so common but it's technically possible.

     In EchoMail, the Path field can also contain addresses suffixed by an
     exclamation mark ("!", 21h). This means that that node hasn't routed
     the message, but the message has been sent to him. Similar to SEEN-
     BY's in FTS-4. However, this should only be used when necessary.

     Never send an EchoMail message to a node listed in the Path field;
     regardless if the address is suffixed by an exclamation mark or not.

     If the message originates in a non-FTN organization, the name of the
     origin organization prefixed by an "@" (40h) must be placed before the
     address of the gateway. In such cases there may also be some other FTN
     addresses before the non-FTN organization name if the message have
     travelled from an FTN, via a non-FTN and to a FTN again.

     Example:
     someone@one.two.three in InterNet sends a routed NetMail message to
     1:222/345 in FidoNet via the gateway 1:222/111 and 1:222/300. The path
     field must in this case be "@InterNet 1:222/111@FidoNet 300" when
     2:222/345 receives the message.

     If there's not enough room to update the Path field (add what you
     should and have at least two bytes left), put a single "$" (24h) in it
     instead (and a space between it and the last address).

     This field has the same format as the PTH line specified in FSC-44
     (except the "$"). Read FSC-44 for more information.

     HeadExt
     -------
     This field contains zero or more NUL-terminated strings. The end of
     this field can be determined by the HeadSize field, but there must be
     a NUL after the last string anyway. If there are no strings here,
     there must not be any NUL either.

     Each string here is a header extension field. A header extension field
     FIDONEWS 14-23               Page 20                   9 Jun 1997


     contains a keyword followed by a space and some data. A header
     extension field can contain only a keyword with no data, in such case
     a space must not be used either.

     Inter-organization messages
     ---------------------------
     To send a message to an other organization place the final address in
     text format followed by an "@" (40h) and the name of the destination
     organization in a header extension field with the keyword "DEST" and
     address the message to a gateway.

     If the message must travel over more than one organization-border, the
     addresses to each gateway can be pointed out by header extension
     fields with the keyword "ROUTE". ROUTE fields contains addresses in
     the same format as DEST lines. The order of the ROUTE fields is
     important and the DEST field must be after the ROUTE field(s). When
     the gateway pointed by a ROUTE field processes the message it must
     change "ROUTE" to "ROUTD".

     Note: The gateway from your organization are pointed out by the
     MsgDest field so there must not be a ROUTE field for that gateway.

     Example:
     You are 34:65/12@StrangeNet and want to send a message to
     someone@one.two.three in InterNet. StrangeNet hasn't got any gateway
     to InterNet, but FidoNet has gateways to both StrangeNet and InterNet.
     In that case the message may have the following header extension
     fields:
     ROUTE 1:1/20@FidoNet
     DEST someone@one.two.three@InterNet

     Messages from other organizations (NetMail or EchoMail doesn't matter)
     must have their origin addresses (including @organization as mentioned
     before) stored in the OrigAddr field and the Foreign flag set.  The
     MsgOrig field in the header must contain the address of a
     bidirectional gateway.

     The MsgID field must be generated using the message-ID in the
     originating organization, if that is possible.  If the originating
     network doesn't have any message-ID that can be used to create the
     MsgID field, the MsgID field must be set to zero. If two identical
     messages (with identical message-ID) enters an FTN organization at two
     different gateways, they should get the same MsgID. The same counts
     for ReplyID. ReplyAddr must also be transferred if present in the
     original message.

     If the other organization uses a message-ID format that can't be
     transparently mapped to MsgID, a ORIGID header extension field is
     created with a direct copy of the original message-ID (both address
     and serial number). The same is done with reply-linkage information in
     a ORIGREF header extension field. This information is used if the
     message should be gated back to the original network.
     Example with message from InterNet:
     ORIGID <abcd43kxz@somewhere.org>
     ORIGREF <bcdef43gkrt@elsewhere.org>

     FIDONEWS 14-23               Page 21                   9 Jun 1997


     Message routing
     ---------------
     The transport layer (including intermediate systems (systems handling
     in-transit messages)) are not allowed to change anything in the
     MsgDate, MsgID, ReplyID, MsgLength, CharSet, MsgType, OrigAddr,
     ReplyAddr, FromUser, ToUser, Subject and MsgData fields. No flags may
     be changed by the transport layer except the Foreign flag at gateways.
     The only exception is if the message have to be converted to another
     packet type.

     An intermediate system must update the Path field, both in NetMail and
     EchoMail.

     In EchoMail, the Area field may be changed.

     An intermediate system are allowed to add or change header extension
     fields.

     An intermediate system can add a header extension field with the
     keyword "Via". The Via field contains information about the system and
     when it processed the message. It's up to each network's policy to
     decide if this is allowed in NetMail, EchoMail or both.

     If the header is changed, the HeadSize field must be updated.

     EchoMail
     --------
     This section lists the changes to FTS-4 needed to implement EchoMail
     with this packet format.

     SEEN-BY lines are not to be used. The Path field is used instead of
     PATH lines. The Area field is used instead of the AREA line. The
     MsgOrig and OrigAddr fields must contain the origin addresses of the
     message. A unaddressed EchoMail message must have the ToUser field
     empty, unless there is a good reason to put something there.

     The MsgDest field must be used as in NetMail. If you receive a
     EchoMail message not addressed to any of you addresses, you must
     handle it as in-transit NetMail. This makes it possible to route
     EchoMail through nodes not connected to the area. This can be
     performed inter-organization as well.

     Since the lack of complete SEEN-BY's, an EchoMail processor must use
     the single-pass technique. That means that it must export a message to
     all its downlinks at the same time as it tosses the message, before it
     goes into the local message base (it doesn't even have to get there if
     the area is pass-through). With this technique the tosser can do what
     ever it wants with the message before it stores it in the local
     message base since the message will never get out of it again (except
     when a rescan function is invoked, but the requesting system will have
     to stand that).

     A system which receives an EchoMail message with the NoForward flag
     set must not export that message. This flag is indented for EchoMail
     processors with a rescan function, all rescanned messages must have
     the NoForward flag set.
     FIDONEWS 14-23               Page 22                   9 Jun 1997


     The tear and origin lines have no technical meaning (the origin
     address is stored elsewhere) so no program is forced to create them.
     Additionally, a program must not require them.

     To distinguish EchoMail from NetMail, check the Area field. NetMail
     messages have empty Area fields.

     Cross-posting a message in several areas is preformed by storing
     multiple AreaTags in the Area field. If some of your downlinks don't
     have all the areas listed in the Area field then you must remove the
     AreaTags for the areas they don't have. All copies must still have the
     same MsgID. If you receive several messages with the same MsgID but
     different Area then you must join them into a single message and put
     all different AreaTags in the Area field (but not the same twice).
     Compare all fields in the header up to and including Subject (except
     Area) and not only MsgID.

     When preforming dupchecking with MsgID, compare all fields in the
     header up to and including Subject and not only MsgID.

     CharSet
     -------

     Value    Character set
     ----------------------------------------------------------------------
     1..99    ISO 8859 (8 bit)
     100      ISO 10646 16 bit (Unicode)
     101..149 Reserved for other 16 bit character sets
     150      ISO 10646 32 bit
     151      PC8-437 (The Original)
     152      PC8-850 (Multilingual)
     153      PC8-852 (Slavic)
     154      PC8-860 (Portuguese)
     155      PC8-863 (Canadian-French)
     156      PC8-865 (Nordic)
     157..199 Reserved for other 8 bit character sets
     200..255 reserved

     PC8 means IBM's codepage (8 bit).

     CharSet=1 means ISO 8859-1 (Latin-1), CharSet=2 means ISO 8859-2 and
     so on.

     CharSet concerns FromUser, ToUser and Subject. It may also concern
     MsgData.

     Combined characters are built by 02h followed by a modifier and the
     base character. If you can't display the combined character, just
     ignore the modifier and display the base character unmodified. A
     combined character contains three bytes and are counted as three
     bytes. See FSC-51 for more information on this. There are a few things
     in FSC-51 that doesn't apply to this format: this method is allowed on
     all 8 bit character sets, not only Latin-1, and the byte values 80h
     through 9Fh are allowed. This can only be used for 8 bit character
     sets. Combined character can be used in FromUser, ToUser and Subject,
     it may also be allowed in MsgData.
     FIDONEWS 14-23               Page 23                   9 Jun 1997


     MsgLength, MsgType and MsgData
     ------------------------------
     If the MsgData field contains nothing (MsgLength is zero), it's an
     empty message. An empty message must be forwarded and routed as any
     other message.  An empty message must not be stored in the local
     message base (but read about the Permanent flag).

     If MsgType is zero, MsgData is defined by the "Message text" part of
     this document.

     If MsgType is non-zero, the MsgData field is not defined by this
     document.

     Message text
     ============
     This part defines the presentation layer.

     The CharSet field in the header concerns the message text except
     binary extension fields. Combined characters can be used in the
     message text except in binary extension fields.

     If a 16 or 32 bit character set is used all characters are two or four
     bytes so all control codes must be prefixed by 00h or 00h 00h 00h. The
     bytes alone can be in printable character. The length of binary
     extension fields is still counted in bytes.

     All 256 byte values (including NUL) are accepted in the message text.
     00h through 1Fh are control codes and must not be used to represent
     printable characters.

     A paragraph (also called "physical line") is ended with CR.

     8Dh (sometimes called "Soft CR") must not be used as a line separator
     since it represents a printable character in some character sets.

     01h first at a physical line (i.e. the first character of the message
     text or the character immediately after a CR) means that this line is
     a extension line. See below for more information.

     00h first at a physical line (except in another binary extension
     field) indicates the start of an long binary extension field. 00h is
     followed by a LongInt and up to almost 4 GigaBytes of binary data. A
     binary extension field is not terminated in any way, it's length is
     stored in the LongInt (the 00h and the LongInt itself is not included
     in the length).

     15h first at a physical line (except in another binary extension
     field) indicates the start of an short binary extension field. 15h is
     followed by a ShortInt and up to 255 bytes of binary data. A binary
     extension field is not terminated in any way, it's length is stored in
     the ShortInt (the 15h and the Integer itself is not included in the
     length).

     Attributes:
     03h = Turn off all attributes
     04h = Bold
     FIDONEWS 14-23               Page 24                   9 Jun 1997


     05h = Italic
     06h = Underline
     17h = All caps (lower case letters as small caps)
     19h = Subscript
     1Ah = Superscript
     1Ch = Blinking
     1Dh = Inverted
     1Eh = Concealed
     Subscript automatically turns off superscript and vice versa. All
     other attributes can be used together. If an attribute already is on,
     it's turned off by the same code again. If your system doesn't support
     an attribute, just ignore it. CR turns off all attributes.

     To quote a message begin a physical line with 1Fh followed by the
     initials of the person you are quoting and another 1Fh. Use just two
     1Fh if you don't want any initials. Successive quoting is marked with
     more 1Fh:s immediate after the two first ones. A quote is ended with
     CR. It's up to each implementor to decide how to display quoted text,
     but it must be possible to distinguish it from normal text. It's
     recommended to display it in another color if possible. You must
     translate the quote to the same character set used in the rest of the
     message.

     The last paragraph of the message text must be terminated by a CR
     (i.e. the last character of the message text must be a CR unless a
     binary extension field is last).

     Extension lines
     ---------------
     An extension line contains a keyword followed by a space and some
     data. A extension line can contain only a keyword with no data, in
     such case a space must not be used either. An extension line is ended
     like a paragraph.

     Extension lines may not contain 00h through 1Fh. If you want binary
     data, use a binary extension field instead.

     Extension lines are control information any should not be displayed to
     the user. If you want "hidden lines", then use the Concealed attribute
     rather than an extension line.

     Information that is relevant for the transport layer must be placed in
     a header extension field rather than in an extension line.

     Extension lines can be useful for describing a binary extension field.

     Currently defined extension lines
     ---------------------------------
     A extension line with the keyword FILE is used for sending files
     embedded in the message text. The keyword is followed by a eight digit
     uppercase hexadecimal number containing a TimeStamp for the file, a
     space and the filename. The filename can contain all chars valid for
     extension lines (including space) and must be at least 1 char and at
     most 255 chars. The file is stored in a binary extension field
     immediate after the FILE line.  Examples:
     FILE AB34F657 FILE.EXT
     FIDONEWS 14-23               Page 25                   9 Jun 1997


     FILE 1234ABCD This is a filename

     Stored message
     ==============
     This is a description of the application layer, the local message
     base.

     It is recommended to use this format to store NetMail messages
     locally. It can also be used for EchoMail, but that's not necessary.

     Each message is stored as a single file which must have a hexadecimal
     number from 00000001 to FFFFFFFF as the base name and the extension
     MS3 (to distinguish from TYPE-2 stored messages).

     Messages can be stored in two ways. Either the same way as TYPE-2 with
     one directory for each area (including NetMail), in that case the Area
     field must be empty in all messages. Or all messages in the same
     directory with the area field used to indicate what/which area the
     message belongs to (or empty to indicate NetMail). The second format
     is useful if you normally store EchoMail in an other format and only
     use this format for messages with the Machine flag.

     Field      Type              Description
     ----------------------------------------------------------------------
     SRdate     TimeStamp         When the message was sent or received
                                  (see below).
     ReplyTo    LongInt           Message which this replies (see below).
     Reply1st   LongInt           First reply to this message (see below).
     ReplyNext  LongInt           Next reply to this message (see below).
     LocalFlags Word              Local flags (see below).
     Cost       Integer           Cost of sending in the lowest currency
     unit.
     HeadSize   Integer           Size of the message header (see below).
     MsgFlags   Word              Same as packed message.
     MsgDate    TimeStamp         Same as packed message.
     MsgID      LongInt           Same as packed message.
     ReplyID    LongInt           Same as packed message.
     MsgLength  LongInt           Same as packed message.
     MsgOrig    Address           Same as packed message.
     MsgDest    Address           Same as packed message.
     CharSet    ShortInt          Same as packed message.
     MsgType    ShortInt          Same as packed message.
     Area       String{255}       AreaTag(s) (see above).
     OrigAddr   String{255}       Same as packed message.
     ReplyAddr  String{255}       Same as packed message.
     FromUser   String{255}       Same as packed message.
     ToUser     String{255}       Same as packed message.
     Subject    String{255}       Same as packed message.
     Path       String{65535}     Path (see below).
     HeadExt    String            Same as packed message.
     MsgData    String            Same as packed message.

     HeadSize
     --------
     The total size of the message header (all fields except MsgData).
     Since this is an Integer, the header can't be bigger than 65535 bytes
     FIDONEWS 14-23               Page 26                   9 Jun 1997


     and Path can never reach it's maximum length (how big it can be
     depends on how big the rest of the header is).

     Please note that this won't contain the same value when the same
     message is placed in a packet because SRdate, LocalFlags, ReplyTo,
     Areply and Cost isn't included then and Area might not have the same
     length.

     Local flags
     -----------
     Bit  Flag          Meaning
     ----------------------------------------------------------------------
     0    Local         Message is created locally.
     1    InTransit     Message is not destined for this system.
     2    Orphan        Unknown destination.
     3    KillSent      Remove message after it has been sent.
     4    DelSent       Delete attached file(s) after they have been sent.
     5    TruncSent     Truncate attached file(s) after they have been
                        sent.
     6    Sent          Message has been sent.
     7    Read          Message has been read by the SysOp.
     8    Rcvd          Message has been read by its addressee.
     9    Lock          Lock the message for further access.
     10   DontSend      Do not send the actual message but send attached
                        files, make file requests and poll the destination
                        if necessary.
     11   unused        Reserved for future extension.
     12   unused        Reserved for future extension.
     13   unused        Reserved for future extension.
     14   unused        Reserved for future extension.
     15   unused        Reserved for future extension.

     Note that "sent" also can mean "picked up".

     SRdate
     ------
     The meaning of this field is determined by the Local and Sent flags.
     Local but not Sent: Meaningless, must be zero.
     Local and Sent: When the message was sent or picked up.
     Not Local: When the message arrived to this system.

     Reply linking
     -------------
     The ReplyTo field points at the message which the current message
     replies.  The Reply1st field points at the first reply to the current
     message (the reply with lowest number); a messages with no replies
     must have this field set to zero. The ReplyNext field points at the
     next reply the same message as the current message; this field must be
     zero if there are no more replies to the message the current message.
     A message which is no reply must have the ReplyTo and ReplyNext fields
     set to zero.

     With this system there is possible to keep track of an unlimited
     number of replies to any message.

     Path
     FIDONEWS 14-23               Page 27                   9 Jun 1997


     ----
     If the local flag is set, this field must be empty. It's the mail
     processors responsibility to insert the address here when placing the
     message in a packet.

     When the mail processor tosses an incoming message, it must copy the
     Path field from the packet.

     Control file
     ------------
     In each message directory (both EchoMail and NetMail) there must be a
     file named LASTREAD. When an area is renumbered, this file must be
     updated.

     Field      Type            Description
     ----------------------------------------------------------------------
     LastRead   LongInt         The last message read.
     HighRead   LongInt         The highest message read.
     HighWater  LongInt         High-water mark (only used with EchoMail).
                                This field is used by the EchoMail
                                processor to store the number of the last
                                scanned message.

     Notes
     =====
     If you are implementing this and something confuses you, ask someone
     who knows. Please don't guess how it should be.

     Credits
     =======
     Thanks to Krister Hansson-Renuad, Johan Olofsson, Nils Hammar, Jonas
     Hogstrom, Mats Gefvert and others who have helped me developing this.

     -----------------------------------------------------------------

     FIDONEWS 14-23               Page 28                   9 Jun 1997


     =================================================================
                            COORDINATORS CORNER
     =================================================================


     Nodelist-statistics as seen from Zone-2 for day 157
     By Ward Dossche, 2:292/854
        ZC/2

      +----+------+------------+------------+------------+------------+--+
      |Zone|Nl-129|Nodelist-136|Nodelist-143|Nodelist-150|Nodelist-157|%%|
      +----+------+------------+------------+------------+------------+--+
      |  1 |  8430| 8367   -63 | 8277   -90 | 8277     0 | 8182   -95 |31|
      |  2 | 15904|15879   -25 |15855   -24 |15835   -20 |15774   -61 |60|
      |  3 |   800|  800     0 |  761   -39 |  765     4 |  758    -7 | 3|
      |  4 |   543|  543     0 |  543     0 |  543     0 |  519   -24 | 2|
      |  5 |    87|   87     0 |   87     0 |   87     0 |   87     0 | 0|
      |  6 |  1083| 1083     0 | 1077    -6 | 1078     1 | 1078     0 | 4|
      +----+------+------------+------------+------------+------------+--+
           | 26847|26759   -88 |26600  -159 |26585   -15 |26398  -187 |
           +------+------------+------------+------------+------------+

     -----------------------------------------------------------------

     FIDONEWS 14-23               Page 29                   9 Jun 1997


     =================================================================
                                 NET HUMOR
     =================================================================


     Date: Sun, 25 May 1997 22:08:50 -0700
     From: Shari <bluedawg@concentric.net>
     Organization: OREGON - USA
     To: webheads@softdisk.com
     CC: Jayodee@aol.com
     Subject: NEVERMORE
     Sender: owner-webheads@softdisk.com
     Reply-To: webheads@softdisk.com

     Once upon a midnight dreary, fingers cramped and vision bleary,
                System manuals piled high and wasted paper on the floor,
                       Longing for the warmth of bedsheets,
                       Still I sat there, doing spreadsheets:
                         Having reached the bottom line,
                         I took a floppy from the drawer.
              Typing with a steady hand, I then invoked the SAVE command
              But got instead a reprimand: it read "Abort, Retry, Ignore."

                Was this some occult illusion? Some maniacal intrusion?
              These were choices Solomon himself had never faced before.
                         Carefully, I weighed my options.
                      These three seemed to be the top ones.
                         Clearly, I must now adopt one:
                          Choose Abort, Retry, Ignore.

                       With my fingers pale and trembling,
                       Slowly toward the keyboard bending,
                Longing for a happy ending, hoping all would be restored,
                          Praying for some guarantee
                           Finally I pressed a key --
                        But on the screen what did I see?
                          Again: "Abort, Retry, Ignore."

                       I tried to catch the chips off-guard --
                        I pressed again, but twice as hard.
                         Luck was just not in the cards.
                          I saw what I had seen before.
                          Now I typed in desperation
                          Trying random combinations
                         Still there came the incantation:
                         Choose: Abort, Retry, Ignore.

              There I sat, distraught, exhausted, by my own machine
                accosted Getting up I turned away and paced across the
                office floor.  And then I saw an awful sight:
                        A bold and blinding flash of light --
           A lightning bolt had cut the night and shook me to my very core.
                        I saw the screen collapse and die
                         "Oh no -- my database", I cried
                         I thought I heard a voice reply,
                        "You'll see your data Nevermore."
     FIDONEWS 14-23               Page 30                   9 Jun 1997


                           To this day I do not know
                        The place to which lost data goes
                 I bet it goes to heaven where the angels have it stored.
                          But as for productivity, well
                         I fear that it goes straight to hell
                         And that's the tale I have to tell
                        Your choice: Abort, Retry, Ignore.

      -30-

     -----------------------------------------------------------------

     FIDONEWS 14-23               Page 31                   9 Jun 1997


     =================================================================
                                  NOTICES
     =================================================================

                                Future History

     12 Jun 1997
        Independence Day, Russia.

      1 Jul 1997
        Canada Day - Happy Birthday Canada.

      9 Jul 1997
        Independence Day, Argentina.

      1 Aug 1997
        International FidoNet PENPAL [Echo] meeting in Dijon, France

     13 Oct 1997
        Thanksgiving Day, Canada.

      1 Dec 1997
        World AIDS Day.

     10 Dec 1997
        Nobel Day, Sweden.

     12 Jan 1998
        HAL 9000 is one year old today.

     22 May 1998
        Expo '98 World Exposition in Lisbon (Portugal) opens.

      1 Dec 1998
        Fifteenth Anniversary of release of Fido version 1 by
        Tom Jennings.

     31 Dec 1999
        Hogmanay, Scotland. The New Year that can't be missed.

      1 Jan 2000
        The 20th Century, C.E., is still taking place thru 31 Dec.

     15 Sep 2000
        Sydney (Australia) Summer Olympiad opens.

      1 Jan 2001
        This is the actual start of the new millennium, C.E.

     -- If YOU have something which you would like to see in this
        Future History, please send a note to the FidoNews Editor.

     -----------------------------------------------------------------

     FIDONEWS 14-23               Page 32                   9 Jun 1997


     =================================================================
                         FIDONET SOFTWARE LISTING
     =================================================================


     [The SOF Keeper is out of town this week. Here's last week's
      edition.] Ed.

     Latest Greatest Software Versions
     by Peter E. Popovich, 1:363/264

     A fairly quiet week around here. Things seems to be settling down into
     some sense of order...

     -=- Snip -=-

     Submission form for the Latest Greatest Software Versions column

     OS Platform                             :
     Software package name                   :
     Version                                 :
     Function(s) - BBS, Mailer, Tosser, etc. :
     Freeware / Shareware / Commercial?      :
     Author / Support staff contact name     :
     Author / Support staff contact node     :
     Magic name (at the above-listed node)   :

     Please include a sentence describing what the package does.

     Please send updates and suggestions to: Peter Popovich, 1:363/264

     -=- Snip -=-

     MS-DOS:
     Program Name   Version  F C Contact Name      Node        Magic Name
     ----------------------------------------------------------------------
     Act-Up         4.6      G D Chris Gunn        1:15/55     ACT-UP
     ALLFIX         4.40     T S Harald Harms      2:281/415   ALLFIX
     Announcer      1.11     O S Peter Karlsson    2:206/221   ANNOUNCE
     BGFAX          1.60     O S B.J. Guillot      1:106/400   BGFAX
     Binkley Docs   2.60     M F Bob Juge          1:1/102     BDOC_260.ZIP
     BinkleyTerm    2.60     M F Bob Juge          1:1/102     BDOS_260.ZIP
     BinkleyTerm-XE XR4      M F Thomas Waldmann   2:2474/400  BTXE_DOS
     CFRoute        0.92     O G C. Fernandez Sanz 2:341/70    CFR
     CheckPnt       1.0a     O G Michiel vd Vlist  2:500/9     CHECKPNT
     FastEcho       1.45a    T S Tobias Burchhardt 2:2448/400  FASTECHO
     FastEcho/16    1.45a    T S Tobias Burchhardt 2:2448/400  FE16
     FidoBBS (tm)   12u      B S Ray Brown         1:1/117     FILES
     FrontDoor      2.12     M S JoHo              2:201/330   FD
     FrontDoor      2.20c    M C JoHo              2:201/330   FDINFO
     GEcho          1.00     T S Bob Seaborn       1:140/12    GECHO
     GEcho/Plus     1.11     T C Bob Seaborn       1:140/12    GECHO
     GEcho/Pro      1.20     T C Bob Seaborn       1:140/12    GECHO
     GIGO           07-14-96 G S Jason Fesler      1:1/141     INFO
     GoldED         2.50     O S Len Morgan        1:203/730   GED
     GoldED/386     2.50     O S Len Morgan        1:203/730   GEX
     FIDONEWS 14-23               Page 33                   9 Jun 1997


     GoldED Docs    2.50     O S Len Morgan        1:203/730   GEM
     GoldNODE       2.50     O S Len Morgan        1:203/730   GEN
     Imail          1.75     T S Michael McCabe    1:1/121     IMAIL
     ImCrypt        1.04     O G Michiel vd Vlist  2:500/9     IMCRYPT
     InfoMail/86    1.21     O F Damian Walker     2:2502/666  INFOMAIL
     InfoMail/386   1.21     O F Damian Walker     2:2502/666  INFO386
     InterEcho      1.19     T C Peter Stewart     1:369/35    IEDEMO
     InterMail      2.29k    M C Peter Stewart     1:369/35    IMDEMO
     InterPCB       1.52     O S Peter Stewart     1:369/35    INTERPCB
     IPNet          1.11     O S Michele Stewart   1:369/21    IPNET
     JD's CBV       1.4      O S John Dailey       1:363/277   CBV
     Jelly-Bean     1.01     T S Rowan Crowe       3:635/727   JELLY
     Jelly-Bean/386 1.01     T S Rowan Crowe       3:635/727   JELLY386
     JMail-Hudson   2.81     T S Jason Steck       1:285/424   JMAIL-H
     JMail-Goldbase 2.81     T S Jason Steck       1:285/424   JMAIL-G
     MakePl         1.9      N G Michiel vd Vlist  2:500/9     MAKEPL
     Marena         1.1 beta O G Michiel vd Vlist  2:500/9     MARENA
     Maximus        3.01     B P Tech              1:249/106   MAX
     McMail         1.0      M S Michael McCabe    1:1/148     MCMAIL
     MDNDP          1.18     N S Bill Doyle        1:388/7     MDNDP
     Msged          4.10     O G Andrew Clarke     3:635/728   MSGED41D.ZIP
     Msged/386      4.10     O G Andrew Clarke     3:635/728   MSGED41X.ZIP
     Opus CBCS      1.79     B P Christopher Baker 1:374/14    OPUS
     O/T-Track      2.66     O S Peter Hampf       2:241/1090  OT
     PcMerge        2.8      N G Michiel vd Vlist  2:500/9     PCMERGE
     PlatinumXpress 1.3      M C Gary Petersen     1:290/111   PX13TD.ZIP
     QuickBBS       2.81     B S Ben Schollnick    1:2613/477  QUICKBBS
     RAR            2.00     C S Ron Dwight        2:220/22    RAR
     RemoteAccess   2.50     B S Mark Lewis        1:3634/12   RA
     Silver Xpress
       Door         5.4      O S Gary Petersen     1:290/111   FILES
       Reader       4.4      O S Gary Petersen     1:290/111   SXR44.ZIP
     Spitfire       3.51     B S Mike Weaver       1:3670/3    SPITFIRE
     Squish         1.11     T P Tech              1:249/106   SQUISH
     StealTag UK    1.c...   O F Fred Schenk       2:284/412   STEAL_UK
     StealTag NL    1.c...   O F Fred Schenk       2:284/412   STEAL_NL
     T-Mail         2.599I   M S Ron Dwight        2:220/22    TMAIL
     Telegard       3.02     B F Tim Strike        1:259/423   TELEGARD
     Terminate      4.00     O S Bo Bendtsen       2:254/261   TERMINATE
     Tobruk         0.33     T G Paul Edwards      3:711/934   TOBRUK
     TosScan        1.01     T C JoHo              2:201/330   TSINFO
     TransNet       1.00     G S Marc S. Ressl     4:904/72    TN100ALL.ZIP
     TriBBS         11.0     B S Gary Price        1:3607/26   TRIBBS
     TriDog         11.0     T F Gary Price        1:3607/26   TRIDOG
     TriToss        11.0     T S Gary Price        1:3607/26   TRITOSS
     WaterGate      0.92     G S Robert Szarka     1:320/42    WTRGATE
     WWIV           4.24a    B S Craig Dooley      1:376/126   WWIV
     WWIVTOSS       1.36     T S Craig Dooley      1:376/126   WWIVTOSS
     xMail          2.00     T S Thorsten Franke   2:2448/53   XMAIL
     XRobot         3.01     O S JoHo              2:201/330   XRDOS

     OS/2:
     Program Name   Version  F C Contact Name      Node        Magic Name
     ----------------------------------------------------------------------
     ALLFIX/2       1.10     T S Harald Harms      2:281/415   AFIXOS2
     BGFAX          1.60     O S B.J. Guillot      1:106/400   BGFAX
     FIDONEWS 14-23               Page 34                   9 Jun 1997


     Binkley Docs   2.60     M F Bob Juge          1:1/102     BDOC_260.ZIP
     BinkleyTerm    2.60     M F Bob Juge          1:1/102     BOS2_260.ZIP
     BinkleyTerm-XE XR4      M F Thomas Waldmann   2:2474/400  BTXE_OS2
     CFRoute        0.92     O G C. Fernandez Sanz 2:341/70    CFR
     FastEcho       1.45a    T S Tobias Burchhardt 2:2448/400  FE2
     FleetStreet    1.19     O S Michael Hohner    2:2490/2520 FLEET
     GEcho/Pro      1.20     T C Bob Seaborn       1:140/12    GECHO
     GIGO           07-14-96 G S Jason Fesler      1:1/141     INFO
     GoldED         2.50     O S Len Morgan        1:203/730   GEO
     GoldED Docs    2.50     O S Len Morgan        1:203/730   GEM
     GoldNODE       2.50     O S Len Morgan        1:203/730   GEN
     ImCrypt        1.04     O G Michiel vd Vlist  2:500/9     IMCRYPT
     Maximus        3.01     B P Tech              1:249/106   MAXP
     Msged/2        4.10     O G Andrew Clarke     3:635/728   MSGED41O.ZIP
     PcMerge        2.3      N G Michiel vd Vlist  2:500/9     PCMERGE
     RAR            2.00     C S Ron Dwight        2:220/22    RAR2
     Squish         1.11     T P Tech              1:249/106   SQUISHP
     T-Mail         2.599I   M S Ron Dwight        2:220/22    TMAIL2
     Tobruk         0.33     T G Paul Edwards      3:711/934   TOBRUK
     XRobot         3.01     O S JoHo              2:201/330   XROS2

     Windows (16-bit apps):
     Program Name   Version  F C Contact Name      Node        Magic Name
     ----------------------------------------------------------------------
     BeeMail        1.0      M C Andrius Cepaitis  2:470/1     BEEMAIL
     FrontDoor APX  1.12     P S Mats Wallin       2:201/329   FDAPXW

     Windows (32-bit apps):
     Program Name   Version  F C Contact Name      Node        Magic Name
     ----------------------------------------------------------------------
     Argus 95       2.62     M S Max Masyutin      2:469/77    ARGUS95
     Argus NT       2.62     M S Max Masyutin      2:469/77    ARGUSNT
     Argus NT/IP    2.62     M S Max Masyutin      2:469/77    ARGUSIP
     BeeMail        1.0      M C Andrius Cepaitis  2:470/1     BEEMAIL
     Binkley Docs   2.60     M F Bob Juge          1:1/102     BDOC_260.ZIP
     BinkleyTerm    2.60     M F Bob Juge          1:1/102     BW32_260.ZIP
     CFRoute        0.92     O G C. Fernandez Sanz 2:341/70    CFR
     GoldED         2.50     O S Len Morgan        1:203/730   GEO
     GoldED Docs    2.50     O S Len Morgan        1:203/730   GEM
     Maximus        3.01     B P Tech              1:249/106   MAXN
     Msged/NT       4.10     O G Andrew Clarke     3:635/728   MSGED41W.ZIP
     PlatinumXpress 2.00     M C Gary Petersen     1:290/111   PXW-INFO
     T-Mail         2.599I   M S Ron Dwight        2:220/22    TMAILNT
     WinFOSSIL/95   1.12 r4  F S Bryan Woodruff    1:343/294   WNFOSSIL.ZIP
     WinFOSSIL/NT   1.0 beta F S Bryan Woodruff    1:343/294   NTFOSSIL.ZIP

     Unix:
     Program Name   Version  F C Contact Name      Node        Magic Name
     ----------------------------------------------------------------------
     ifmail         2.10     M G Eugene Crosser    2:293/2219  IFMAIL
     ifmail-tx      ...tx8.2 M G Pablo Saratxaga   2:293/2219  IFMAILTX
     ifmail-tx.rpm  ...tx8.2 M G Pablo Saratxaga   2:293/2219  IFMAILTX.RPM
     Msged          4.00     O G Paul Edwards      3:711/934   MSGED
     Tobruk         0.33     T G Paul Edwards      3:711/934   TOBRUK

     Amiga:
     FIDONEWS 14-23               Page 35                   9 Jun 1997


     Program Name   Version  F C Contact Name      Node        Magic Name
     ----------------------------------------------------------------------
     CrashMail      1.23     T X Fredrik Bennison  2:205/324   CRASHMAIL
     CrashTick      1.1      O F Fredrik Bennison  2:205/324   CRASHTICK
     DLG Pro BBOS   1.15     B C Holly Sullivan    1:202/720   DLGDEMO
     GMS            1.1.85   M S Mirko Viviani     2:331/213   GMS
     Msged          4.00     O G Paul Edwards      3:711/934   MSGED
     Tobruk         0.33     T G Paul Edwards      3:711/934   TOBRUK

     TrapDoor       1.86.b2  M S Maximilian Hantsch
                                                   2:310/6     TRAPDOOR
     TrapDoor       1.86.b2  M S Maximilian Hantsch
                                                   2:310/6     TRAPBETA
     TrapToss       1.50     T S Rene Hexel        2:310/6     TRAPTOSS

     Atari:
     Program Name   Version  F C Contact Name      Node        Magic Name
     ----------------------------------------------------------------------
     ApplyList      1.00     N F Daniel Roesen     2:2432/1101 APLST100.LZH
     BinkleyTerm/ST 3.18pl2  M F Bill Scull        1:363/112   BINKLEY
     BTNC           2.00     N G Daniel Roesen     2:2432/1101 BTNC
     JetMail        0.99beta T S Joerg Spilker     2:2432/1101 JETMAIL
     Semper         0.80beta M S Jan Kriesten      2:2490/1624 SMP-BETA

     Function: B-BBS, P-Point, M-Mailer, N-Nodelist, G-Gateway, T-Tosser,
               C-Compression, F-Fossil, O-Other. Note: Multifunction will
               be listed by the first match.

     Cost: P-Free for personal use, F-Freeware, S-Shareware, C-Commercial,
           X-Crippleware, D-Demoware, G-Free w/ Source

     Please send updates and suggestions to: Peter Popovich, 1:363/264

     -----------------------------------------------------------------

     FIDONEWS 14-23               Page 36                   9 Jun 1997


     =================================================================
                            FIDONEWS PUBLIC-KEY
     =================================================================


     [this must be copied out to a file starting at column 1 or
      it won't process under PGP as a valid public-key]


     -----BEGIN PGP PUBLIC KEY BLOCK-----
     Version: 2.6.2
     Comment: Clear-signing is Electronic Digital Authenticity!

     mQCNAzINVLcAAAEEAM5dZN6t6j5Yc0kl7qegVFfiBeVoteuhDg4ay8h43u38Q4kO
     eJ9Mm7J89wXFb9vgouBVb4biIN6bTWCwcXTbGhBe5OIceLvluuxuEKsaIs/UwXNe
     Ogx5azIPhRfC7MJDe41Z8tMEBuHY/NE88cuxQ8yXWO126IRttavu6L/U5BwRAAUR
     tCRGaWRvTmV3cyBFZGl0b3IgPDE6MS8yM0BmaWRvbmV0Lm9yZz6JAJUDBRAyGwFS
     JZMgw7eCKz0BAZl0A/9xrfhpsEOqGiPfjy2qd9dv6tvSVPPVFu+Wy1lGTHYtuTtg
     FIN3fQ47AM3XzqHxWRWvp/xZYgR6sRICL7UFx94ShYBQc7CyqBBZKA0IvIWqXP/g
     c4Br+gQJR6CLiQK7TUyjUbqNbs6QAxuNUi4xFQM+O2Gene5/iTjHFmmSDj2C9YkB
     FQMFEDIOmHDTQ6/52IG1SQEBQ78H/Rz/mleIrtZwFIOhzy3JH4Z6FUTfZuM9nPcs
     1ZLjZCPptHvY7wEYJWGr03lPPJ6tj1VBXwTrWJTf/hOLsoi00GKV8t1thjqGDo23
     O91/bSQ+Vn0vBQ2vOEJys8ftxdoLJAyI5YLzHVT+RsMTQLIXVuPyrNcKs1vC2ql+
     UDHpU1R+9cG9JUEHpGI6z0DPnQ74SKbQH3fiVBpHhYx4BmvcBC4gWQzKMkDWFiq3
     8AssIZ7b9lWl3OBgQ4UM1OIDKoJyjRewIdKyl7zboKSt6Qu8LrcsXO3kb81YshOW
     ZpSS3QDIqfZC4+EElnB15l4RcVwnPHBaQY0FxUr4Vl4UWM36jbuJAJUDBRAyDpgY
     q+7ov9TkHBEBAQGoA/sFfN07IFQcir456tJfBfB9R5Z6e6UKmexaFhWOsLHqbCq6
     3FGXDLeivNn6NTz81QeqLIHglTuM3NP1mu8sw215klAG8G3M1NA2xLw7Eqhspze2
     raGvNeEwxl8e+PY9aZwBj4UWU+CmIm6QNiP0MtvR7QYDIKn5mZCDc3CLmr942IkB
     FQMFEDIOh0O8AhTPqRipPQEB4EYH/1gkDmdHL6lbEkFuQLrylF+weBl0XQ+kv7ER
     vWXYrvIrkppxtc4VAge6CXXEbOGJnvkFHgyNZzO9Q9O64QsmZvjip+4lhDLeNrdH
     X9DizS4YKXxkSKr9Yltmn2/AlBCx6jwcDIfkqy/P1tNWcikxZZMd6KryK0Wsres9
     Ik12OmVmJjQSxb5bS6Q8aYUbV3qwosGXTqy+BzYh/UYAX/XJIWa5kxFVSPKFSZ+5
     toiSzANd9SpHPEogGvQDHJlJ23lmsMx/6uHsR1LTsQ8su8zIk92XyqePJTjlMx2j
     D7KJWNR7Zzu4QHCXBkga5W8l2FfPk7D3+o7bXTLRuR1yTYGdNoiJAJUCBRAyDhwt
     SlKLwP4OFW0BAdaMA/9rcWQlSq44K9JuJ7fZUgt9fwxGreTud9fC8DvlbUW79+CA
     AHLTLLagcEF1OKsWzVBWcA2JEAp+TUTqktRN0oD8vnaw3uNJd1G5KK59hw0WR8x1
     v4ivypbSjiq95Y3gBunb7WjpyiFRWDlm0PrKrWHtbWzjnpPIpetln1UuqsSfbokB
     FQIFEDIOG9C3N61ZQ4Dr/QEBIzMH/1VxxztmBPBszbjZLDO8Svcax9Ng8IcWpcDy
     WqHCAA2Hoe5VtMD0v6w31ZgVqTPIvCark2Y/aTR1GofiuN9NUqbVV534AgAYLzYk
     DMT1swsPvqDTpOYgQl6PCGh6A5JGAbWJfKkX9XCUHJAAmiTsEVRNnjOgL+p6qjoh
     EfIG8CGehghWSRKl5eGeDAtbXupZKNjFI1t2XV+ks0RFQ/RPuTH7pF7pk7WO6Cyg
     +Dk2ZMgua0HRL1fXvHKb5Xzr3MVgsbAl5gP8ooIiD9MI/x5Irh3oo58VyoEZNBs/
     Kz+drGFDPljcS6fdiVCFtYIzMrshY6YsfLi0aB8fwOvFtxgBqli0J0NocmlzdG9w
     aGVyIEJha2VyIDwxOjE4LzE0QGZpZG9uZXQub3JnPrQoQ2hyaXN0b3BoZXIgQmFr
     ZXIgPGNiYWtlcjg0QGRpZ2l0YWwubmV0Pg==
     =61OQ
     -----END PGP PUBLIC KEY BLOCK-----


     File-request FNEWSKEY from 1:1/23 [1:18/14] or download it from the
     Rights On! BBS at 1-904-409-7040 anytime except 0100-0130 ET and Zone
     1 ZMH at 1200-9600+ HST/V32B. The FidoNews key is also available on
     the FidoNews homepage listed in the Masthead information.

     -----------------------------------------------------------------
     FIDONEWS 14-23               Page 37                   9 Jun 1997


     =================================================================
                            FIDONET BY INTERNET
     =================================================================

     This is a list of all FidoNet-related sites reported to the Editor as
     of this appearance.

     ============

     FidoNet:

       Homepage     http://www.fidonet.org
       FidoNews     http://ddi.digital.net/~cbaker84/fidonews.html
       HTML FNews   http://www.geocities.com/Athens/6894/
       WWW sources  http://www.scms.rgu.ac.uk/students/cs_yr94/lk/fido.html
       FTSC page    http://www2.blaze.net.au/ftsc.html
       Echomail     http://www.portal.ca/~awalker/index.html
       WebRing      http://ddi.digital.net/~cbaker84/fnetring.html

     ============

     Zone 1:       http://www.z1.fidonet.org

       Region 10:  http://www.psnw.com/~net205/region10.html

       Region 11:  http://oeonline.com/~garyg/region11/

       Region 13:  http://www.smalltalkband.com/st01000.htm

       Region 14:  http://www.netins.net/showcase/fidonet/

       Region 15:  http://www.smrtsys.com/region15/ [disappeared?]

       Region 16:  http://www.tiac.net/users/satins/region16.htm

       Region 17:  http://www.portal.ca/~awalker/region17.htm
           REC17:  http://www.westsound.com/ptmudge/

       Region 18:  http://www.citicom.com/fido.html

       Region 19:  http://www.compconn.net

     ============

     Zone 2:       http://www.z2.fidonet.org

     ZEC2:         http://fidoftp.paralex.co.uk/zec.htm [shut down?]
     Zone 2 Elist: http://www.fidonet.ch/z2_elist/z2_elist.htm

       Region 20:  http://www.fidonet.pp.se (in Swedish)

       Region 24:  http://www.swb.de/personal/flop/gatebau.html (in German)

       Region 25:
                   http://members.aol.com/Net254/

     FIDONEWS 14-23               Page 38                   9 Jun 1997


       Region 27:  http://telematique.org/ft/r27.htm

       Region 29:  http://www.rtfm.be/fidonet/  (in French)

       Region 30:  http://www.fidonet.ch  (in Swiss)

       Region 34:  http://www.pobox.com/cnb/r34.htm  (in Spanish)
           REC34:  http://pobox.com/~chr

       Region 36:  http://www.geocities.com/SiliconValley/7207/

       Region 41:  http://www.fidonet.gr (in Greek and English)

       Region 48:  http://www.fidonet.org.pl

     ============

     Zone 3:       http://www.z3.fidonet.org

     ============

     Zone 4:       (not yet listed)

       Region 90:
         Net 904:  http://members.tripod.com/~net904 (in Spanish)

     ============

     Zone 5:       (not yet listed)

     ============

     Zone 6:       http://www.z6.fidonet.org

     ============

     -----------------------------------------------------------------

     FIDONEWS 14-23               Page 39                   9 Jun 1997


     =================================================================
                           FIDONEWS INFORMATION
     =================================================================

     ------- FIDONEWS MASTHEAD AND CONTACT INFORMATION -------

     Editor: Christopher Baker

     Editors Emeritii: Tom Jennings, Thom Henderson, Dale Lovell,
                       Vince Perriello, Tim Pozar, Sylvia Maxwell,
                       Donald Tees

     "FidoNews Editor"
         FidoNet  1:1/23
         BBS  1-904-409-7040,  300/1200/2400/14400/V.32bis/HST(ds)

      more addresses:
         Christopher Baker -- 1:18/14, cbaker84@digital.net
                                       cbaker84@aol.com
                                       cbaker84@msn.com

     (Postal Service mailing address)
         FidoNews Editor
         P.O. Box 471
         Edgewater, FL 32132-0471
         U.S.A.


     voice:  1-904-409-3040 [1400-2100 ET only, please]
                            [1800-0100 UTC/GMT]

     ------------------------------------------------------

     FidoNews is published weekly by and for the members of the FIDONET
     INTERNATIONAL AMATEUR ELECTRONIC MAIL system.  It is a compilation
     of individual articles contributed by their authors or their
     authorized agents.  The contribution of articles to this compilation
     does not diminish the rights of the authors.  OPINIONS EXPRESSED in
     these articles ARE THOSE OF THE AUTHORS and not necessarily those of
     FidoNews.

     Authors retain copyright on individual works; otherwise FidoNews is
     Copyright 1997 Christopher Baker.  All rights reserved.  Duplication
     and/or distribution permitted for noncommercial purposes only.  For
     use in other circumstances, please contact the original authors, or
     the Editor.

                            =*=*=*=*=*=*=*=*=

     OBTAINING COPIES: The most recent issue of FidoNews in electronic
     form may be obtained from the FidoNews Editor via manual download or
     file-request, or from various sites in the FidoNet and Internet.
     PRINTED COPIES may be obtained by sending SASE to the above postal
     address.  File-request FIDONEWS for the current Issue.  File-request
     FNEWS for the current month in one archive.  Or file-request specific
     back Issue filenames in distribution format [FNEWSEnn.ZIP] for a
     FIDONEWS 14-23               Page 40                   9 Jun 1997


     particular Issue.  Monthly Volumes are available as FNWSmmmy.ZIP
     where mmm = three letter month [JAN - DEC] and y = last digit of the
     current year [7], i.e., FNWSFEB7.ZIP for all the Issues from Feb 97.

     Annual volumes are available as FNEWSn.ZIP where n = the Volume number
     1 - 14 for 1984 - 1997, respectively. Annual Volume archives range in
     size from 48K to 1.4M.


     INTERNET USERS: FidoNews is available via:

                          http://www.fidonet.org/fidonews.htm
                          ftp://ftp.fidonet.org/pub/fidonet/fidonews/
                          ftp://ftp.aminet.org/pub/aminet/comm/fido/

                                      *=*=*

     You may obtain an email subscription to FidoNews by sending email to:

                          jbarchuk@worldnet.att.net

     with a Subject line of: subscribe fnews-edist

     and no message in the message body. To remove your name from the email
     distribution use a Subject line of: unsubscribe fnews-edist with no
     message to the same address above.

                                      *=*=*

     You can read the current FidoNews Issue in HTML format at:

                          http://www.geocities.com/Athens/6894/

     STAR SOURCE for ALL Past Issues via FTP and file-request -
     Available for FReq from 1:396/1 or by anonymous FTP from:

                          ftp://ftp.sstar.com/fidonet/fnews/

     Each yearly archive also contains a listing of the Table-of-Contents
     for that year's issues.  The total set is currently about 11 Megs.

                                 =*=*=*=

     The current week's FidoNews and the FidoNews public-key are now also
     available almost immediately after publication on the Editor's new
     homepage on the World Wide Web at:

                  http://ddi.digital.net/~cbaker84/fidonews.html

     There are also links there to jim barchuk's HTML FidoNews source and
     to John Souvestre's FTP site for the archives. There is also an email
     link for sending in an article as message text. Drop on over.

                            =*=*=*=*=*=*=*=*=

     A PGP generated public-key is available for the FidoNews Editor from
     FIDONEWS 14-23               Page 41                   9 Jun 1997


     1:1/23 [1:18/14] by file-request for FNEWSKEY or by download from
     Rights On! BBS at 1-904-409-7040 as FIDONEWS.ASC in File Area 18.  It
     is also posted twice a month into the PKEY_DROP Echo available on the
     Zone 1 Echomail Backbone.

                                *=*=*=*=*

     SUBMISSIONS: You are encouraged to submit articles for publication in
     FidoNews. Article submission requirements are contained in the file
     ARTSPEC.DOC, available from the FidoNews Editor, or file-requestable
     from 1:1/23 [1:18/14] as file "ARTSPEC.DOC".  ALL Zone Coordinators
     also have copies of ARTSPEC.DOC. Please read it.

     "Fido", "FidoNet" and the dog-with-diskette are U.S. registered
     trademarks of Tom Jennings, P.O. Box 410923, San Francisco, CA 94141,
     and are used with permission.

             "Disagreement is actually necessary,
              or we'd all have to get in fights
              or something to amuse ourselves
              and create the requisite chaos."
                                -Tom Jennings

      -30-

     -----------------------------------------------------------------