Volume 8, Number 2 14 January 1991 +---------------------------------------------------------------+ | _ | | / \ | | /|oo \ | | - FidoNews - (_| /_) | | _`@/_ \ _ | | FidoNet (r) | | \ \\ | | International BBS Network | (*) | \ )) | | Newsletter ______ |__U__| / \// | | / FIDO \ _//|| _\ / | | (________) (_/(_|(____/ | | (jm) | +---------------------------------------------------------------+ Editor in Chief: Vince Perriello Editors Emeritii: Thom Henderson, Dale Lovell Chief Procrastinator Emeritus: Tom Jennings Copyright 1991, Fido Software. All rights reserved. Duplication and/or distribution permitted for noncommercial purposes only. For use in other circumstances, please contact Fido Software. FidoNews is published weekly by and for the Members of the FidoNet (r) International Amateur Electronic Mail System. It is a compilation of individual articles contributed by their authors or authorized agents of the authors. The contribution of articles to this compilation does not diminish the rights of the authors. You are encouraged to submit articles for publication in FidoNews. Article submission standards are contained in the file ARTSPEC.DOC, available from node 1:1/1. 1:1/1 is a Continuous Mail system, available for network mail 24 hours a day. Fido and FidoNet are registered trademarks of Tom Jennings of Fido Software, Box 77731, San Francisco CA 94107, USA and are used with permission. Opinions expressed in FidoNews articles are those of the authors and are not necessarily those of the Editor or of Fido Software. Most articles are unsolicited. Our policy is to publish every responsible submission received. Table of Contents 1. EDITORIAL ................................................ 1 As we rush towards war ................................... 1 2. ARTICLES ................................................. 4 THE FIRST CONFERENCE ON COMPUTERS, FREEDOM & PRIVACY ..... 4 Is there interest in a FORTRAN Echo? ..................... 15 3. LATEST VERSIONS .......................................... 16 Latest Software Versions ................................. 16 4. NOTICES .................................................. 21 SEEKING HEALTHCARE BBS/ECHO INFORMATION .................. 21 The Interrupt Stack ...................................... 21 FidoNews 8-02 Page 1 14 Jan 1991 ================================================================= EDITORIAL ================================================================= Vince Perriello 1:132/491@fidonet or Vince_Perriello@f491.n132.z1.fidonet.org [After I wrote this, I called a close friend and read it to him. He suggested to me that printing this would most likely cause a flood of articles that have nothing to do with FidoNet to appear on my doorstep. Perhaps. But frankly, my dear, I don't give a Saddam. I feel that something needs to be said. NOW.] I was just barely young enough to avoid Vietnam. In fact, I was part of the last crop of young men to even face a draft lottery in the United States. My number was 361. Fairly lucky, by the standards of the day. Today, I am just barely too old to even enlist in the American armed services. Not that I am in such a hurry to do so. I am overweight, lazy and overpaid -- and in no mood for a 180 degree change in my lifestyle. Yup, I'm your prototypical worthless, self-centered American. Many non-Americans seem to think that all Americans are just like me. And that our excessive zeal to protect every individual from harm and to go the extra mile to avoid bloodshed is proof that Americans are too soft and weak to face tough decisions. The problem with these characterizations is, as usual, a matter of lack of understanding. You see, I am a product of a culture that encourages people to do whatever they do best because at the end of the day, everything will get done --- and done better --- that way. This system has made the United States a great power in this world, more so than nations with greater landmass and/or population. So there. The fact that I don't want to be a soldier, and that this is considered an acceptable attitude, isn't a weakness in our system, it represents its greatest strength. Perhaps Americans are too careful to avoid bloodshed. But why should anyone be careless with the lives of others? The cavalier attitude of many people towards their own compatriots is not a sign of strength, it is one of stupidity. Just as our attitude is not a sign of weakness. There are more than sufficient cases in the history of the United States, both recent and past, to suggest otherwise. All of that having been said -- I don't understand a few things. FidoNews 8-02 Page 2 14 Jan 1991 I don't understand why the leadership of Israel is unable to walk a mile in the shoes of Palestinians, recognize the parallels to their own experience, and find a way to address their legitimate security concerns while also finally putting that issue to rest. I don't understand why the entire international community was so willing to look the other way for so long while Saddam Hussein was running his number against Iranians and Kurds. Why they sold him everything he needed to build these awful weapons they now decry. Why the United States ambassador in effect told him it was OK with us if he violated the Kuwaiti borders. Why it suddenly became a new Holocaust once Kuwait was conquered and the Iraqis behaved in the same cruel and inhuman manner that had characterized their handling of their internal Kurd rebellion and the Iran-Iraq war. I don't understand why Saddam Hussein wants to rule the entire Arab world. Besides controlling the price of over half the proven oil reserves worldwide, I can't think of a reason why. Unless he likes big sandboxes and has an affinity for camels. (I DO think I understand why he invaded Kuwait. What a neat way to cancel your debts!) I don't understand why the United States is committing so many resources to stopping this man while many nations with much better cash flow situations, and arguably a higher stake in seeing him stopped, are sitting it out. Japan bought MCA with the amount of money the United States is spending every six weeks just protecting THEIR oil supply. But the amount of money they have promised in support of the embargo is a very small percentage of that figure, and almost none of THAT money has yet to leave the coffers of our great ally. Germany has been real forthcoming too. I think that "Fahrvergnugen" must mean something like "let the other guy get knocked on the head, I'm outta here." Will the U.S. ultimately sell Paramount to Japan in order to be able to afford to protect Japanese interests? Will we sell AT&T to Germany so we have the wherewithal to ensure sufficient gasoline for their no-speed-limit Autobahns? Are we out of our ever-loving MINDS? I don't understand why President Bush decided to make war so close to inevitable. I think his November 8 move to increase the American presence in Saudi Arabia was exactly the wrong move. That a policy of increasing the percentage of non American personnel, particularly Arabs, while keeping the total strength at a level sufficient to deter aggression against Saudi Arabia, could have ultimately led to some kind of solution. There are lots of little Arabs who have access to Saddam and could have made themselves slightly bigger Arabs by leading us to a solution. Now it's probably too late. I wish the American soldiers all the best. I hope that they are able to accomplish whatever mission they are finally given without too many losses on either side. FidoNews 8-02 Page 3 14 Jan 1991 I don't understand why Gorbachev is recreating Hungary '56 and Czechoslovakia '68 in Lithuania. Is this the guy whose government has been saying such bad things about Stalin and Brezhnev? The winner of the Nobel Peace Prize? I shudder to think who might have come in second (nahhh! Not Saddam!) I don't understand Communist China. Period. I don't understand why so many people must die to end war. Is it possible that all people must die to end war? I sure hope not. That way lies madness. ----------------------------------------------------------------- FidoNews 8-02 Page 4 14 Jan 1991 ================================================================= ARTICLES ================================================================= (submitted by Tom Jennings, fidonet 1:125/111 uucp ...hoptoad!kumr!anomaly!tom.jennings) Pursuing Policies for the Information Age in the Bicentennial Year of the Bill of Rights Tutorials & Invitational Conference, Limited to 600 Participants Monday-Thursday, March 25-28, 1991 Airport SFO Marriott Hotel, Burlingame, California (San Francisco Peninsula) Co-sponsors & cooperating organizations include Institute of Electrical and Electronics Engineers-USA Association for Computing Machinery Electronic Networking Association Electronic Frontier Foundation Videotex Industry Association Cato Institute American Civil Liberties Union ACM Special Interest Group on Software IEEE-USA Intellectual Property Committee ACM Special Interest Group on Computers and Society ACM Committee on Scientific Freedom and Human Rights IEEE-USA Committee on Communications and Information Policy Autodesk, Inc. The WELL Portal Communications Sponsored by the Computer Professionals for Social Responsibility A nonprofit educational corporation (415)322-3778, e-mail: cfp@well.sf.ca.us. fax: (415)851-2814 ABOUT COMPUTERS, FREEDOM & PRIVACY ---------------------------------- We are at a crossroads as individuals, organizations and governments depend more and more on computers and computer networks. Within ten years, most global information will be collected and utilized electronically. The 1990's are the pivotal decade in which statutes, policies and judicial precedents will be developed for controlling access, use -- and abuse -- of computerized information and electronic mail. FidoNews 8-02 Page 5 14 Jan 1991 Current government and private-sector policies are an uncoordinated jumble, created as each group evolves ways to collect, manipulate, extract, share and protect computerized and networked information and services. Data on individuals and groups is being computerized by numerous agencies, organizations and special interests, often without the knowledge or approval of those it concerns, and with varying degrees of accuracy. Computers can greatly assist individuals, organizations and government in making sound decisions based on efficient access to adequate information -- for personal benefit, business improvement and national well-being. Or, inappropriate use and regulation can seriously threaten fundamental freedoms, personal privacy, and the democratic processes that are at the very foundation of this nation and of any free society. ABOUT THE CONFERENCE SESSIONS (Tuesday-Thursday, March 26th-28th) ----------------------------------------------------------------- PLENARY SPEAKERS: * Laurence H. Tribe, Professor of Constitutional Law, Harvard Law School, offering major policy proposals in the opening Conference session, "The Constitution in Cyberspace: Law & Liberty Beyond the Electronic Frontier". * Eli M. Noam, Director of the Center for Telecommunications and Information Studies, Columbia University, and a recognized leader in telecommunications regulation, international communications policies and economics, will discuss, "Network Environments of the Future: Reconciling Free Speech and Freedom of Association." * William A. Bayse, Assistant Director, FBI Technical Services Division, Washington DC, providing perspectives on "Balancing Computer Security Capabilities with Privacy and Integrity" at the Wednesday evening banquet. THE CONFERENCE SESSIONS offer diverse speakers & panel discussions: Trends in Computers & Networks. Overview and prognosis of computing capabilities and networking as they impact personal privacy, confidentiality, security, one-to-one & many-to-one communications, and access to information about government, business and society. FidoNews 8-02 Page 6 14 Jan 1991 International Perspectives & Impacts. Other nationsU models for protecting personal information and communications, and granting access to government information; existing and developing laws; requirements for trans-national dataflow and their implications; impacts on personal expression; accountability. Personal Information & Privacy. Government and private collection, sharing, marketing, verification, use, protection of, access to and responsibility for personal data, including buying patterns, viewing habits, lifestyle, work, health, school, census, voter, tax, financial and consumer information. Law Enforcement Practices & Problems. Issues relating to investigation, prosecution, due process and deterring computer crimes, now and in the future; use of computers to aid law enforcement. Law Enforcement & Civil Liberties. Interaction of computer crime, law enforcement and civil liberties; issues of search, seizure and sanctions, especially as applied to shared or networked information, software and equipment. Legislation & Regulation. Legislative and regulatory roles in protecting privacy and insuring access; legal problems posed by computing and computer networks; approaches to improving related government processes. Computer-based Surveillance of Individuals. Monitoring electronic-mail, public & private teleconferences, electronic bulletin boards, publications and subscribers; monitoring individuals, work performance, buying habits and lifestyles. Electronic Speech, Press & Assembly. Freedoms and responsibilities regarding electronic speech, public and private electronic assembly, electronic publishing, prior restraint and chilling effects of monitoring. Access to Government Information. Implementing individual and corporate access to federal, state & local information about communities, corporations, legislation, administration, the courts and public figures; allowing access while protecting confidentiality. Ethics & Education. Ethical principles for individuals, system administrators, organizations, corporations and government; copying of data, copying of software, distributing confidential information; relations to computer education and computer law. FidoNews 8-02 Page 7 14 Jan 1991 Where Do We Go From Here? [closing session] Perspectives, recommendations and commitments of participants from the major interest groups, proposed next steps to protect personal privacy, protect fundamental freedoms and encourage responsible policies and action. Also: Tuesday and Wednesday will include structured opportunities for attendees to identify groups with whom they want to establish contact and, if they wish, announce topics they would like to discuss, one on one. ABOUT THIS PREMIER EVENT ------------------------ This is an intensive, multi-disciplinary survey Conference for those concerned with computing, teleconferencing, electronic mail, computerized personal information, direct marketing information, government data, etc. -- and those concerned with computer-related legislation, regulation, computer security, law enforcement and national and international policies that impact civil liberties, responsible exercise of freedom and equitable protection of privacy in this global Information Age. For the first time, this four-day invitational event will bring together representatives from all of these groups and more, all in one place, all at one time. Many of the recognized leaders and strongest advocates representing the various groups having an interest in the issues of the conference will discuss their concerns and proposals. A maximum of 600 applicants will be invited to attend. Balanced representation from the diverse groups interested in these issues is being encouraged. Please see the enclosed Invitation Application for details. To inform participants about topics beyond their specialties, half-day seminars are scheduled for the first day (Monday, March 25th). These parallel tutorials will explore relevant issues in computing, networking, civil liberties, regulation, the law and law enforcement. Each tutorial is designed for those who are experienced in one area, but are less knowledgeable in the subject of that tutorial. To explore the interactions and ramifications of the issues, conference talks and panel discussions are scheduled for the remaining three days (Tuesday-Thursday, March 26th-28th). These will emphasize balanced representation of all major views, especially including probing questions and discussion. FidoNews 8-02 Page 8 14 Jan 1991 Explicit Conference events to foster communication across disciplines are planned. Working luncheons, major breaks and two evening banquets will further encourage individual and small group discussions. ABOUT JUST *SOME* OF THE SPEAKERS IN THE 3-DAY CONFERENCE --------------------------------------------------------- Ken Allen, Senior Vice President for Governmental Relations, Information Industries Association (IIA). Sharon Beckman, civil rights and criminal defense attorney and Electronic Frontier Foundation litigation counsel, Silverglate & Good. Jerry Berman, Director of the ACLU's Project on Information Technology and Communications Policy Fellow, Benton Foundation. Paul Bernstein, columnist, Trial magazine; Electronic Bar Assn. Legal Info. Network administrator; LawMUG BBS sysop; edits on line lawyers' newsletter. Sally Bowman, promotes responsible computing practices through school teaching units; Director, Computer Learning Foundation. David Burnham, author, *Rise of the Computer State*; former *New York Times* investigative reporter; specialist in IRS & Freedom of Information Act. Mary Culnan, co-authored major credit reporting policies presented to Congress; School of Business Administration, Georgetown University. Peter Denning, Editor, 1990 *Computers Under Attack*; past Pres., ACM; founding Director, RIACS; editor, *Communications of the ACM*. Dorothy Denning, received Aerospace's 1990 Distinguished Lecturer in Computer Security award; author, *Cryptography & Data Security*. Dave Farber, co-founder, CSNET; member, National Research Council's Computer Science & Telecommunications Board; University of Pennsylvania. Cliff Figallo, Chief Executive Officer and Director of the WELL (the Whole Earth 'Lectronic Link). David Flaherty, Canadian surveillance expert, Professor of History & Law at the University of Western Ontario. FidoNews 8-02 Page 9 14 Jan 1991 John Ford, Public Relations Director for Equifax, one of the nation's largest maintainers of information on individuals. Bob Gellman, Chief Counsel, U.S. House of Representatives Governmental Information Subcommittee. Janlori Goldman, Director, ACLU Project on Privacy & Technology, Washington, DC. Harry Hammit, Editor, *Access Reports*, focusing on access to information. Martin Hellman, identified potential hazards in federal DES national encryption standard; co-invented public-key encryption; Stanford University. Evan Hendricks, Editor & Publisher of *Privacy Times* newsletter. Lance Hoffman, public policy researcher and Professor of Electrical Engineering & Computer Science at George Washington University. Don Ingraham, wrote the first-ever search warrant for magnetic media, computer crime prosecutor; Asst. District Attorney, Alameda County. Bob Jacobson, former Principal Consultant, Calif. State Assembly Utilities and Commerce Committee; drafted landmark comp. communications legislation. Mitch Kapor, co-founder, Electronic Frontier Foundation; founder, Lotus Corp.; received DPMA's 1990 Distinguished Information Science Award. Tom Mandel, Director of the Leading Edge Values & Lifestyles Program at SRI International. John McMullen, well-known on-line journalist; co-authors "Newsbytes" column on GEnie and Online America. Peter Neumann, member, National Research Council's 1990 *Computers at Risk* committee; Chair, ACM Comm.on Computers & Public Policy; hosts RISKS Forum. Donn Parker, perhaps the best-known international consultant and author on information security and computer crime, SRI International. Ron Plesser, former majority party congressional committee counsel; privacy expert; attorney, Piper & Marbury. FidoNews 8-02 Page 10 14 Jan 1991 John Quarterman, author, Digital Press' definitive *The Matrix: Computer Networks and Conferencing Systems Worldwide*; networking consultant. Jack Rickard, Editor of *Boardwatch* magazine, perhaps the best news source about computer bulletin boards; Online Information Service. Tom Riley, Canadian specialist in international computing and privacy issues; Riley & Associates. Lance Rose, co-author of *Syslaw*, about the law applied to on-line situations; attorney, Wallace & Rose. Marc Rotenberg, expert in federal computer and privacy law; Computer Professionals for Social Responsibility, Washington office Director. Noel Shipman, attorney for plaintiffs in electronic-mail privacy landmark 1990 litigation against Epson America. Harvey Silverglate, Electronic Frontier Foundation litigation counsel, specialist in criminal defense and civil rights, Silverglate & Good. Gail Thackeray, computer crime prosecutor; involved in Secret Service's 1990 "Operation Sun Devil", Arizona Asst. State Attorney General. Robert Veeder, Acting Chief, Information Policy Branch, Office of Information Regulatory Affairs, OMB (Office of Management & Budget). Willis Ware, computer security expert; Fellow, RAND Corporation. Sheldon Zenner, former federal prosecutor in Chicago; defended *Phrack* electronic publisher, Craig Neidorf; Katten, Muchin & Zavis. ABOUT THE LOW-COST TUTORIALS (Monday, March 25th) ------------------------------------------------- Seminars on the first day offer introductions to the different disciplines that intersect in this conference. These are surveys for individuals not already expert in the topics presented. These half-day tutorials are scheduled in four parallel tracks: Global Communications & the Worldwide Computer Matrix. [morning*] Survey of electronic-mail & teleconferencing services, global information access, remote services and the matrix of networks. FidoNews 8-02 Page 11 14 Jan 1991 Low-Cost Computer Networking & Computer Bulletin Board Systems. [afternoon*] Reviews e-mail, bulletin board and teleconferencing alternatives on personal computers; outlines low-cost PC-based networks and their gateways to the global matrix. -- Mark Graham*, co-founder of Institute for Global Communications, PeaceNet and EcoNet; Pandora Systems Current & Proposed International Policies. [morning*] Law and regulation that will or may impact trans-border data-flow and computer communications, impacting U.S. information practices and international business. Federal Legislation Impacting Computer Use. [afternoon*] Detailed review of landmark federal statutes impacting access to information, privacy of information, computer security and computer crime. -- Marc Rotenberg*, former congressional counsel and expert on federal legislation, CPSR, Washington DC. How Computer Crackers Crack! [morning*] Suggested by a deputy district attorney specializing in high-tech crime, this is for law enforcement officials, prosecutors, systems administrators and Bulletin Board System (BBS) sysops. -- Russell Brand*, computer security specialist; programmer with Reasoning Systems, Palo Alto CA. How Computer Crime is Investigated. [afternoon*] This reviews investigation, search, seizure and evidence requirements for pursuing computer crime. It is for computer users, computer owners, BBS sysops and investigators unfamiliar with computer crime practices. Information Security. [afternoon*] Survey for systems managers of internal and external threats, security measures, alternatives and other computer and data security issues. -- Donn Parker*, a leading consultant in information security and computer crime, SRI International. * - Lecturers, descriptions and times were confirmed as of 1/8/91, but may be subject to change. CONFERENCE CHAIR Jim Warren, Autodesk, Inc. & *MicroTimes* 415-851-7075, jwarren@well.sf.ca.us / e-mail PROGRAM COMMITTEE Dorothy Denning, Digital Equipment Corporation Peter Denning, Research Institute for Advanced Computer Science Les Earnest, SF Peninsula ACLU & Stanford University, ret. Elliot Fabric, Attorney at Law Mark Graham, Pandora Systems Don Ingraham, Alameda County District AttorneyUs Office Bruce Koball, Motion West Marc Rotenberg, Computer Professionals for Social Responsibility Glenn Tenney, Fantasia Systems & Hacker's Conference FidoNews 8-02 Page 12 14 Jan 1991 ADVISORS Ron Anderson, ACM SIGCAS & University of Minnesota John Perry Barlow, Electronic Frontier Foundation Jerry Berman, ACLU & Benton Foundation Dave Caulkins, USSR GlasNet Vint Cerf, Corporation for National Research Initiatives Margaret Chambers, Electronic Networking Association Steve Cisler, Apple Computer, Inc. Whit Diffie, Northern Telecom Mary Eisenhart, *MicroTimes* Dave Farber, University of Pennsylvania Cliff Figallo, The WELL John Gilmore, Cygnus Support Adele Goldberg, ParcPlace Systems Terry Gross, Rabinowitz, Boudin, Standard, et al Keith Henson, consultant & Alcor Lance Hoffman, George Washington University Dave Hughes, Chariot Communications Bob Jacobson, Human Interface Technology Laboratory Mitch Kapor, Electronic Frontier Foundation Roger Karraker, Santa Rosa College Tom Mandel, SRI International John McMullen, NewsBytes Peter Neumann, SRI International Dave Redell, Digital Equipment Corporation Ken Rosenblattt, Santa Clara County District Attorney's Office Paul Saffo, Institute for the Future Gail Thackeray, Arizona Attorney GeneralUs Office Jay Thorwaldson, Palo Alto Medical Foundation Terry Winograd, CPSR & Stanford University Sheldon Zenner, Katten, Muchin, & Zavis Affiliations listed only for identification ============================ = Request for Invitation = ============================ First Conference on Computers, Freedom & Privacy March 25-28, 1991 Monday: Tutorials, Tuesday-Thursday: Conference Sessions SFO Marriott Hotel, 1800 Old Bayshore Hwy., Burlingame CA 94010 For hotel reservations at Conference rates, call: (800)228-9290 #3 ** Invitational Conference, limted to 600 participants. ** To facilitate useful dialogue and balanced participation by representatives from all of the diverse groups interested in these issues, attendance is limited. (The capacity of the Conference facility is similarly limited). All interested individuals are encouraged to request an invitation. Invitations will be primarily issued on a first-come, first-served basis within each major interest group. FidoNews 8-02 Page 13 14 Jan 1991 Fees if payment is received by: Jan.31 -Mar.15 after Mar.15 Tutorials (full day) $ 95 $ 145 $ 195 Conference (3 days) $ 295 $ 350 $ 400 Conference Registration fee includes three luncheons, two banquet meetings and selected handouts. Please make checks payable to "Computers, Freedom & Privacy/CPSR". Please don't send cash. Invitations will be promptly issued, or the uncashed check will be voided and promptly returned. Please type or print. Thank ye, kindly. name: title: organization: mailing address: city, state ZIP: phone(s): fax: e-mail: Comments to assist in evaluating this request: To aid in balancing participation among groups, please check all significantly applicable items. [ ] user of computers or computer networking [ ] user of electronic-mail services [ ] user of teleconferencing services [ ] user of direct marketing services [ ] user of computerized personal information [ ] user of government information [ ] computer professional [ ] BBS sysop (bulletin board system operator) [ ] systems administrator / infosystems manager [ ] network administrator [ ] computer / communications security specialist [ ] provider of data communications services [ ] provider of electronic-mail services [ ] provider of teleconferencing services [ ] provider of direct marketing services [ ] provider of computerized personal information [ ] provider of government information [ ] legislative official [ ] federal [ ] state [ ] regulatory official or staff [ ] federal [ ] state [ ] law enforcement offi [ ] federal [ ] state [ ] local [ ] prosecutor [ ] federal [ ] state [ ] local [ ] judicial representat [ ] federal [ ] state [ ] local [ ] criminal defense attorney [ ] corporate or litigation attorney [ ] civil liberties specialist [ ] journalist [ ] newspaper [ ] television [ ] radio [ ] other [ ] other: [ ] other: <<1/7/91>> FidoNews 8-02 Page 14 14 Jan 1991 Please mail form and payment to: CFP Conference, 345 Swett Road, Woodside CA 94062 Privacy Notice: This information will not be sold, rented, loaned, exchanged or used for any purpose other than official CPSR activity. CPSR may elect to send information about other activities, but such mailings will always originate with CPSR. Sponsor: Computer Professionals for Social Responsibility, (415)322-3778 A nonprofit, educational corporation [ Internal Revenue Code 501(c)(3) ] e-mail: cfp@well.sf.ca.us; fax: (415)851-2814 Chair: Jim Warren, (415)851-7075 Please copy, post & circulate! ----------------------------------------------------------------- FidoNews 8-02 Page 15 14 Jan 1991 Fred Niemczenia FidoNet 1:371/7 Is There Interest in a FORTRAN Echo? For the past year I've browsing through the various Programming Echos to learn the gimmicks of the various languages we use. I've found echos for C, PASCAL, and BASIC, just to name a few. What appears to be missing is the grandaddy of them all; I haven't found a single echo for FORTRAN. Consider this a sort of lonely hearts' club search. What I'm asking you to do, is ask YOUR users if there is an interest in starting a national FORTRAN echo. Please don't think that I'm trying to sell you the Fortran language. What I am pushing for is a echo for programmers to communicate. In the late 1940's and early 1950's, a need arose for a high level language which would allow scientists and engineers to code mathematical procedures. Prior to this point, one had to learn assembly to access that new-fangled contraption (the electronic digital computer). What caught on was Fortran. Current estimates indicate that some 60 percent of scientific software is still in Fortran. I'm talking major mainframes. The software has to maintained, and periodically ported over to new machines. There are four major companies that produce compilers for the PC family of computers right now. I think there is a need for a meeting place. Please ask your users if they're interested. I'd sure prefer visiting my favorite BBS for a Fortran question, than paying $$$ to visit the Microsoft Forum on CompuServe. Please address all replies to Fred Niemczenia at 1:371/7 via Netmail, or EMAIL at CompuServe 76606,2060. ----------------------------------------------------------------- FidoNews 8-02 Page 16 14 Jan 1991 ================================================================= LATEST VERSIONS ================================================================= Latest Software Versions MS-DOS Systems -------------- Bulletin Board Software Name Version Name Version Name Version DMG 2.93 Phoenix 1.3 TAG 2.5g Fido 12s+ QuickBBS 2.66 TBBS 2.1 GSBBS 3.01 RBBS 17.3A TComm/TCommNet 3.4 Lynx 1.30 RBBSmail 17.3B Telegard 2.5 Kitten 2.16 RemoteAccess 0.04a TPBoard 6.1 Maximus 1.02 SLBBS 1.77A Wildcat! 2.55 Opus 1.14+ Socrates 1.10 WWIV 4.12 PCBoard 14.5 XBBS 1.15 Network Node List Other Mailers Version Utilities Version Utilities Version BinkleyTerm 2.40 EditNL 4.00 ARC 7.0 D'Bridge 1.30 MakeNL 2.31 ARCAsim 2.30 Dutchie 2.90C ParseList 1.30 ARCmail 2.07 FrontDoor 1.99c Prune 1.40 ConfMail 4.00 PRENM 1.47 SysNL 3.14 Crossnet v1.5 SEAdog 4.51b XlatList 2.90 DOMAIN 1.42 TIMS 1.0(Mod8) XlaxDiff 2.35 EMM 2.02 XlaxNode 2.35 4Dog/4DMatrix 1.18 Gmail 2.05 GROUP 2.16 GUS 1.30 HeadEdit 1.15 InterPCB 1.31 LHARC 1.13 MSG 4.1 MSGED 2.06 MSGTOSS 1.3 Oliver 1.0a PK[UN]ZIP 1.10 QM 1.0 QSORT 4.03 Sirius 1.0x SLMAIL 1.36 StarLink 1.01 TagMail 2.41 TCOMMail 2.2 Telemail 1.27 FidoNews 8-02 Page 17 14 Jan 1991 TMail 1.15 TPBNetEd 3.2 TosScan 1.00 UFGATE 1.03 XRS 4.00* XST 2.2 ZmailH 1.14 OS/2 Systems ------------ Bulletin Board Software Network Mailers Other Utilities Name Version Name Version Name Version Maximus-CBCS 1.02 BinkleyTerm 2.40 Parselst 1.32 ConfMail 4.00 EchoStat 6.0 oMMM 1.52 Omail 3.1 MsgEd 2.06 MsgLink 1.0C MsgNum 4.14 LH2 0.50 PK[UN]ZIP 1.02 ARC2 6.00 PolyXARC 2.00 Qsort 2.1 Raid 1.0 Remapper 1.2 Tick 2.0 VPurge 2.07 Xenix/Unix ---------- BBS Software Mailers Other Utilities Name Version Name Version Name Version BinkleyTerm 2.30b Unzip 3.10 ARC 5.21 ParseLst 1.30b ConfMail 3.31b Ommm 1.40b Msged 1.99b Zoo 2.01 C-Lharc 1.00 Omail 1.00b FidoNews 8-02 Page 18 14 Jan 1991 Apple CP/M ---------- Bulletin Board Software Network Mailers Other Utilities Name Version Name Version Name Version Daisy v2j Daisy Mailer 0.38 Nodecomp 0.37 MsgUtil 2.5 PackUser v4 Filer v2-D UNARC.COM 1.20 Macintosh --------- Bulletin Board Software Network Mailers Other Utilities Name Version Name Version Name Version Red Ryder Host 2.1 Tabby 2.2 MacArc 0.04 Mansion 7.15 Copernicus 1.0 ArcMac 1.3 WWIV (Mac) 3.0 LHArc 0.33 Hermes 1.01 StuffIt Classic 1.6 FBBS 0.91 Compactor 1.21 TImport 1.92 TExport 1.92 Timestamp 1.6 Tset 1.3 Import 3.2 Export 3.21 Sundial 3.2 PreStamp 3.2 OriginatorII 2.0 AreaFix 1.6 Mantissa 3.21 Zenith 1.5 Eventmeister 1.0 TSort 1.0 Mehitable 2.0 UNZIP 1.02c Amiga ----- Bulletin Board Software Network Mailers Other Utilities Name Version Name Version Name Version Paragon 2.082+ BinkleyTerm 1.00 AmigArc 0.23 TransAmiga 1.05 TrapDoor 1.50 AReceipt 1.5 FidoNews 8-02 Page 19 14 Jan 1991 WelMat 0.42 booz 1.01 ConfMail 1.10 ChameleonEdit 0.10 ElectricHerald1.66 Lharc 1.30 MessageFilter 1.52 oMMM 1.49b ParseLst 1.30 PkAX 1.00 PK[UN]ZIP 1.01 PolyxAmy 2.02 RMB 1.30 RoboWriter 1.02 Skyparse 2.30 TrapList 1.12 Yuck! 1.61 Zippy (Unzip) 1.25 Zoo 2.01 Atari ST -------- Bulletin Board Network Node List Software Version Mailer Version Utilities Version FIDOdoor/ST 2.10* BinkleyTerm 2.40jt* ParseList 1.30 QuickBBS/ST 1.02 The BOX 1.20 Xlist 1.12 Pandora BBS 2.41c EchoFix 1.20 GS Point 0.61 LED ST 1.00 MSGED 1.96S Archiver Msg Format Other Utilities Version Converters Version Utilities Version LHARC 0.60 TB2BINK 1.00 ConfMail 4.02 ARC 6.02 BINK2TB 1.00 ComScan 1.02 PKUNZIP 1.10 FiFo 2.01b Import 1.14 OMMM 1.40 Pack 1.00 FastPack 1.20 FDsysgen 2.15* FDrenum 2.10* Trenum 0.10 Archimedes ---------- FidoNews 8-02 Page 20 14 Jan 1991 BBS Software Mailers Utilities Name Version Name Version Name Version ARCbbs 1.44 BinkleyTerm 2.03 Unzip 2.1TH ARC 1.03 !Spark 2.00d ParseLst 1.30 BatchPacker 1.00 + Netmail capable (does not require additional mailer software) * Recently changed Utility authors: Please help keep this list up to date by reporting new versions to 1:1/1. It is not our intent to list all utilities here, only those which verge on necessity. ----------------------------------------------------------------- FidoNews 8-02 Page 21 14 Jan 1991 ================================================================= NOTICES ================================================================= asuvax.eas.asu.edu!CompuServe.COM!73230.3514 (Jerry McCarthy) SEEKING HEALTHCARE BBS/ECHO INFORMATION The PC Physician Medical Computing Resource Guide, a disk-based electronic publication, is seeking information about healthcare- oriented BBS, echos, news groups, discussion groups, and other electronic publications for its second edition, scheduled for release in March of this year. For more information, contact: Jerry McCarthy Editor PC Physician MCRG 3300 Mitchell Lane Suite 390 Boulder, CO 80303 303-443-8085 (voice) 303-443-7653 (FAX) CIS: 73230,3514 BITNET: MCCARTHY_J@UCOLMCC The MCRG is inexpensive commercial software ($15 postpaid) which is not copy protected, but which is produced under a license to a software company which does not currently allow distribution as a BBS file. The information MCRG compiles about BBS/echos/news groups/discussions/publications will, however, be distributed as a text file as well as part of the MCRG second edition. Interested individuals should contact Jerry McCarthy for a complementary copy of MCRG. ----------------------------------------------------------------- The Interrupt Stack 15 Jan 1991 Deadline for George Bush and Saddam Hussein to find some less bloody way to assert their manhood. Please pray that Kuwait may be liberated (and, for that matter, the Palestinian homeland issue settled at last) without any additional loss of life. 16 Feb 1991 Fifth anniversary of the introduction of Echomail, by Jeff Rush. 30 Mar 1991 FidoNews 8-02 Page 22 14 Jan 1991 Jim Grubs (W8GRT) was issued his first ham radio license forty years ago today. His first station was made from an ARC-5 "Command Set" removed from a B-17 bomber. 12 May 1991 Fourth anniversary of FidoNet operations in Latin America and second anniversary of the creation of Zone-4. 8 Sep 1991 25th anniversary of first airing of Star Trek on NBC! 7 Oct 1991 Area code 415 fragments. Alameda and Contra Costa Counties will begin using area code 510. This includes Oakland, Concord, Berkeley and Hayward. San Francisco, San Mateo, Marin, parts of Santa Clara County, and the San Francisco Bay Islands will retain area code 415. 1 Feb 1992 Area code 213 fragments. Western, coastal, southern and eastern portions of Los Angeles County will begin using area code 310. This includes Los Angeles International Airport, West Los Angeles, San Pedro and Whittier. Downtown Los Angeles and surrounding communities (such as Hollywood and Montebello) will retain area code 213. 1 Dec 1993 Tenth anniversary of Fido Version 1 release. 5 Jun 1997 David Dodell's 40th Birthday If you have something which you would like to see on this calendar, please send a message to FidoNet node 1:1/1. -----------------------------------------------------------------