Category : Communication (modem) tools and utilities
Archive   : ZMSCRIP.ZIP
Filename : CALLBACK.T

 
Output of file : CALLBACK.T contained in archive : ZMSCRIP.ZIP
echo "CallBack"
:: Demonstration callback script. This replaces CHALLENG.T to perform
:: seurity controlled callback access control. More comments at end.
pat; set remote CHALLENG.T
x300: ena -S; echo "Callback Demonstration"; purgek
on !c set remote LOGFAIL; fail
goto foo
foop: echo "Please no special characters"
foo: accept remote "Name (first AND last) Please: "
if "%remote<3" echo "Name is too short"; goto foo
if Cremote goto foop
if "Jremote,01234567890][}{\\|=+-_)(*&^%$#@!~`;:'<>/?" goto foop
mput "Is '%remote' Correct (y/n) ?"
if !y goto foo
open %lib/callback
loop: set s3 ""
grab s0
grab s1
grab s2
obey "if is0,%remote set s3 OK"
lput "s0=%s0 s1=%s1 s2=%s2 s3=%s3\r\n"
if t&&!%s3 goto loop
if !t set s1 "\r"
closetx
demand %s1
if !c fail
on
echo "Please set Auto Answer mode on your Modem"
del /tmp/AAAA.xx
kill; purgek; pv0
>/tmp/AAAA.xx
echof " del /tmp/AAAA.xx"
echof " call %s2"
>
bye
echo "Should be disconnected now"
fail
:: This expects to read a file "callback" consisting of triplets of lines.
:: The first of each triplet is match to the name the caller gives when
:: calling. The second is the password that person must give. The third
:: if the directory entry name to be executed after the caller has given
:: the correct name and passowrd. Note the script is written so the caller
:: does not get an obvious indication whether he has hit upon a valid
:: user name.


  3 Responses to “Category : Communication (modem) tools and utilities
Archive   : ZMSCRIP.ZIP
Filename : CALLBACK.T

  1. Very nice! Thank you for this wonderful archive. I wonder why I found it only now. Long live the BBS file archives!

  2. This is so awesome! 😀 I’d be cool if you could download an entire archive of this at once, though.

  3. But one thing that puzzles me is the “mtswslnkmcjklsdlsbdmMICROSOFT” string. There is an article about it here. It is definitely worth a read: http://www.os2museum.com/wp/mtswslnk/