Category : Recently Uploaded Files
Archive   : FALKEN1.ZIP
Filename : MANUAL.TXT

Output of file : MANUAL.TXT contained in archive : FALKEN1.ZIP



INFO*SHARE Incorporated provides these programs and licenses
the use of them as outlined in the following agreement. You assume
responsibility for selection of these programs for your purposes,
and for the installation, use, and results from use of these programs. This
software is licensed to you for use as follows:

1. You may use the programs on a single machine.

2. You may copy the programs for the sole purpose of backup
in support of their use on a single machine.

3. All copies made must include the copyright notice.

4. You may transfer the programs and license
to another party if the other party agrees to accept the terms and
conditions of this Agreement.


If you transfer the program you must at the same time
transfer all copies of the program or destroy any copies not transferred.




This license shall be construed,
interpreted, and governed by the laws of the Virginia Commonwealth.

This license is effective until terminated. You
may terminate it by destroying the programs together with all copies
in any form. It will also be terminated if you fail to comply with
any term or condition of this license. You agree
upon such termination to return the programs together with all the
copies to INFO*SHARE Corporation and the purchaser shall be liable
for any and all damages suffered as a result of the violation or default.
You may not sub-license, assign, or transfer the programs or any rights
under this license to any third party except
as permitted under this license. Any attempt
otherwise to sub-license, assign, or transfer the programs or any
rights under the license is void.


These programs are a product of INFO*SHARE Incorporated.

The programs contained in this package are provided "AS IS" without
warranty of any kind, either express or implied, including, but not
limited to, the implied warranties of merchantability and fitness
for a particular purpose. The entire risk related to the quality and
performance of the programs is on you. In the event there is any
defect, you assume the entire cost of all necessary servicing, repair,
or correction. Some states do not allow the exclusion of implied
warranties, so the above exclusions may not apply to you. This warranty
gives you specific legal rights and you may also have other rights
which vary from state to state.

INFO*SHARE does not warrant that the functions contained within the
programs will meet your requirements or that the operation of the
programs will be uninterrupted or error-free. INFO*SHARE warrants
the diskettes on which the programs are furnished to be free from
defects in the materials and workmanship under normal use for a period
of ninety (90) days from the date of delivery to you as evidenced
by a copy of your receipt. The entire liability of INFO*SHARE and
your exclusive remedy shall be replacement of any diskette which does
not meet the Limited Warranty and which is returned to INFO*SHARE.


This agreement constitutes the complete and exclusive statement of
the terms of the agreement between you and INFO*SHARE. It supersedes
and replaces any previous written or oral agreement and communications
relating to this software. No oral or written information of advice
given by INFO*SHARE, its dealers, distributors, agents or employees
will create any warranty or in any way increase the scope of the warranty
provided in this agreement, you may not rely on any such information
or advise.


The software and documentation is provided with restricted rights. The
use, duplication, or disclosure by the Government is subject to restrictions
as set forth in subdivision(b)(3)(ii) of The Rights in Technical Data
and Computer Software clause at 252.227-7013. Contractor/manufacturer
is Herb Rose, P.O. Box 906, Centreville Va, 22020.




IBM PC 386 or 486 or compatible computer with 4MBytes
of memory and a hard disk drive.


One or more Hayes-compatible modems.


One megabyte or more of expanded memory is highly recommended
for multiple users to execute doors (add-in) programs.


MS-DOS version 3.3 or higher is required, due to the
number of open files needed by the BBS system.


If you have expanded
memory in your computer, FALKEN will use it to execute doors
programs. This is done automatically, as long as your expanded memory is enabled and you have installed an Expanded Memory Driver in your CONFIG.SYS file. Your
expanded memory driver must support the LIM 4.x EMS specification.


FALKEN Multi-User BBS is a computer program for the IBM PC and true
compatibles, providing support for asynchronous communications with
Hayes compatible modems. Up to 64 Hayes compatible modems
may be supported in any combination of internal and external units.
All popular BBS functions are provided including: messages, bulletins,
private mail, upload/download sections, multi-user
chat (teleconference), ANSI and RIP graphics
support, and add-in programs (Modules).

FALKEN can support bit rates up to 38400 bps using the
latest 16650A UART I/O chip technology. FALKEN will automatically
sense the presence of the 16650A's and adjust accordingly to maximize
throughput. In order to use multiple lines at high bit
rates (above 2400 bps), we recommend that you run the program on a
very fast 80386 or a 80486-based system.

In addition to the communications lines, FALKEN supports a local login
line, called the "Emulation Channel", which emulates a modem connection. In general, when you
are logged on to the BBS via the emulation channel,
you have access to the same functions, and are subject to the same
restrictions, as you would when you called on one of your modem
lines. The BBS software itself does not make any distinction between
modem lines and the emulation channel when processing
your keystrokes.

When you are not logged on to the system via the emulation
channel, a full-screen display showing current system activity is
visible on the computer monitor. The various parts of the display,
and the available functions are discussed in detail later in this

FALKEN runs in a special DOS environment that allows true multitasking. It
is this multitasking environment that makes it possible for all users
to run Door programs simultaneously.


The teleconference area is an open CB-type
forum. When you enter the teleconference area, you are first put
into the "open" teleconference. This conference is always present,
and always public. You may create your own "sub-conference" if you
wish. You can join other sub-conferences or remain in "open". When
you are in the teleconference area, anything you enter on your computer
will be broadcast to others in your teleconference; however, nothing
is broadcast until J is pressed. This allows you to
make corrections prior to making your inputs public. Once you press
J to send your message you will receive all text entered
by others in your conference while you were busy typing. Remember
that while you are typing you will temporarily be unable to receive
inputs from others until J is pressed.


The message base
is broken into 64 "Folders", each folder being concerned with a different
subject. Each message folder consists of messages and responses.
Each message may have up to 99 responses. If a 100th response is
added, the oldest response is deleted, and the remaining responses
are shifted upward, so that the new response becomes response number
99. All messages in the message base are
public, as are all responses unless specifically saved as a private


When you logon to the system you will be notified of your Email
status. If you have private mail waiting you will see the message:
"Email : nn NEW LETTERS". To read your mail enter "E" from the MAIN MENU then "R" from the Email menu. All
messages written to you will be displayed along with a header indicating
who sent you the message and the date and time it was written.


FALKEN supports software downloads, allowing up to 64 different libraries,
or categories, of files. Information for each of the files is maintained
in a keyed database file for fast access. FALKEN downloads support
keyword searches and various listing options.


FALKEN uses the CSWITCH multitasking library to provide
a true preemptive multitasking environment. This allows module programs
to execute simultaneously for all lines while FALKEN is active. CSWITCH
allows FALKEN to run in a true multi-line mode without the overhead
of external multitaskers.


A module program is a stand-alone program that is executed under FALKEN's
control. Usually it is a very specialized program written specifically
to work with FALKEN, such as a game, questionnaire, or a database. You
must identify each module available on your system by listing them
in your Main Menu or in one of your custom menus available
through BBSCFG. Sample module programs have
been included on your distribution diskette. To add a module to your
system, copy the module program to your FALKEN directory and add its
name to one of your menus using the BBSCFG utility. See the section on BBSCFG Menu Setup for an
example of adding the module program UPGR.EXE.

Modules written specifically for FALKEN will work without
any special actions required. In addition, some other types of programs
may work with FALKEN. Small well-behaved DOS
programs will work as FALKEN modules. FALKEN has the ability
to redirect input and output calls through DOS, and send those I/O
requests to the modems. Programs that perform direct screen
writes and direct keyboard access will not work in this way, but normal
DOS I/O will be redirected.

There are numerous modules written by third party programmers
which take advantage of FALKEN's multi-tasking functions. Some of
these are quite sophisticated and can add a whole new dimension to
your system. For more information on what is available you will need
to access the INFO*SHARE support BBS. See the section
on Sysop Support in this manual for more information.


FALKEN uses EMS memory to execute modules.

You must use an expanded memory
manager, such as QEMM, EMM386, or 386MAX, to provide expanded memory
to Falken. FALKEN will map all available conventional memory between
the end of the program and the end of conventional memory as an EMS
page frame. This page frame can be up to 400K on some systems. A
page frame of 272K is typical on a 32-line system. The size of the
page frame determines the size limit of the external modules you can
execute. If your page frame is 300K, you will not be able to execute
an external module that requires more than 300K to run. Because Falken
can map multiple modules into this page frame, many modules can execute

If you have an EGA or VGA adapter, you can increase the size of the
EMS pageframe by putting the following switch on the QEMM line in



This allows the memory manager
to use the EGA/VGA graphics memory as conventional memory, increasing
the size of the page frame by 96K, thus allowing larger external modules
to be executed. Since FALKEN executes in text mode, there will be
no ill effects while FALKEN is active.

If you have a monochrome adapter, the memory manager should automatically
map the unused graphics memory as conventional memory.

In general, the more conventional memory you can free by loading drivers
into high memory, the larger the page frame you will have available,
and that will allow you to run larger, more sophisticated external
modules. Consult your DOS or QEMM users guide for more information
on loading programs into high memory.

If you are using QEMM v6.02 with FALKEN, beware!! The zmodem file transfer protocol will not work correctly,
and you may experience slow response times unless you REMOVE DOS=UMB
from your CONFIG.SYS file. DO NOT use UMB; it does
not work correctly with Falken and QEMM.

DPMI drivers, such as Quarterdeck's QDPMI.SYS, should not
be loaded while Falken is running. They interfere with Falken's EMS
memory mapping functions.


Using a disk cache program, such as Microsoft's SMARTDRV or PC-Cache,
will generally increase the performance of your Falken system. The
cache program should be loaded into high memory, and should be configured
to use EXTENDED memory when possible. It may be dangerous to configure
the cache program to cache or delay disk writes, since this can cause
database corruption if your system halts without warning, due to power
outage, for example.


Disk compression programs, such as DOUBLEPACE, STACKER or SUPERSTOR,
can be used with Falken. The warning against allowing writes to delay
or cache, mentioned above, is even more crucial when using these disk
compression programs, since a corrupted database on a compressed disk
may lead to corruption of the entire disk.


The installation program will guide you through
the system configuration process allowing you to enter the information
in an organized fashion. All necessary subdirectories and program
files will be created during the installation process. During the
installation you will be asked to provide the name of a subdirectory
into which the FALKEN files will be copied. The INSTALL
program will create this directory for you.



Before you install FALKEN you must edit your CONFIG.SYS
file to include the following parameters:


For more information on CONFIG.SYS and its function
please consult your DOS manual.


FALKEN uses temporary disk files to buffer large blocks of text prior
to transmission. Overall system performance can be increased by allocating
a RAM disk and using that space for these work files. See
the section on BBSCFG for details on specifying the path to work files.



program should only be used to initialize a NEW system setup. Re-running
the INSTALL will destroy existing system configuration
data. To modify your existing configuration you must execute the BBSCFG utility.

Insert FALKEN Disk #1 into drive A: (or B:) and type:


Follow the on-screen directions, pressing the 5 key
to save your entries or 1 to obtain additional information
during each installation step. Some entries will
display a default value. We recommend you use the default values while
you are still unfamiliar with FALKEN. Changes can be made later using
the BBSCFG utility. Enter the
Message Folder and Program Library names. Make
sure you provide the additional Path information for each File Transfer
Area. Press 1 for examples.

Follow INSTALL's prompts when you have completed
answering all questions. The INSTALL program will
begin copying the FALKEN program files into the directory you specify. You
will be asked to insert the necessary disks. When all files have
been copied, INSTALL will initialize the database
files and system message files. Once installation is complete, you
may wish to review your system's configuration or make modifications. This
is accomplished by running the BBS configuration utility


If the installation files have been copied to your
hard drive, the installation procedure is essentially the same as
from floppy, except you must specify the correct subdirectory when
prompted for the path to the source files.


From the DOS prompt enter BBSCFG. The following
menu selection will be displayed:

The BBSCFG utility allows you
to setup your system in many different ways depending on the hardware
you are using to support your BBS and also allows you to restrict
certain areas or functions to specific users. The INSTALL
utility required you to enter all of the required information needed
for the system to run. The system still has many default system switches
and access flags which you need to review and change to suit your
needs. The following sections will explain these parameters in further
detail, menu by menu, so you can decide how you wish your final setup
to perform.


The system provides nearly unlimited levels of access privileges depending
on how you wish to configure it. Based on your setup, first time callers
may be allowed full access to all areas of the system, restricted
to only a few subsystems, or denied access entirely. Within the FALKEN
configuration utility (BBSCFG)
there are numerous access control flags that inhibit access when set
to zero (0), or allow access when set to one (1). These flags are
used to control access to individual file
libraries and message folders as well as
whole subsystems such as the teleconference area or electronic mail. They
are also used to provide special privileges such as system operator

When you first configure the system to accept callers you must pay
special attention to how these flags are set. For your protection
we have provided defaults that restrict all of the system operator
functions and other special features. Once you've become familiar
with what these features allow you to do, you can then selectively
provide these privileges to those individuals you consider appropriate.


Sysop Account ID

There can be many users with sysop level access, but this should be
the SYSOP; the one that gets
Feedback, gets notified of new callers, and gets upload
notification (by default). You can use SYSOP, your personal name, or any system name your users are
familiar with. If you elect not to use SYSOP you should still create the account later to ensure
no one else chooses this system name for use on your system.

Sysop Menu Password

There is a special online menu for users with sysop level access. In order to access that menu, however, a
user must supply the correct password. This gives
you one additional level of security for your system if a user somehow
obtains Sysop privileges.

Allow NEW callers

(yes/no) ?
Do you wish to create an account for every new caller? If so, when
the account is created, you will receive Email
notification of the new account.


The first time you run the system, make sure this is set
to YES, so you can create YOUR account!

Number of visitors allowed online?

A zero in this field prevents visitors from logging on. A valid number
(up to the number of lines in use) enables that number of visitors. Each
visitor is prompted for name, address, etc. and the sysop is notified of each visitor's logon. The access
is the same as "new callers". No account will be created for the

Credit for visitors/new

If you set this field to any number other than zero you will activate
the built-in credit access control
feature of FALKEN. The number you enter here will be allocated to
each new caller and then decremented by a specified amount or cost
assigned to areas of the system (See section on Menus Setup). Once
the credits have been used, the user's
account will be restricted and access to system functions will be
limited. A message is displayed to the caller to inform him of the
state of his account and the need for him to contact the System Operator.

Upload Credit for new accts

If you need to allow a limited number of files to be downloaded by
new callers and have assigned download ratios on your system, this
field will allow you to set a default credit
for them to use. If you give new users 100 upload credits, and your ratio is 1 to 10, then a new user could download
1000K without uploading anything (See Upload to Download Ratio below).

Minimum Age

(See Account Setup Questions below) You may specify a minimum age for system access which will be used to screen out
NEW callers and Visitors that do not meet the minimum
age requirements. The SYSOP will still receive notification
of the call.

Access Time level for New

This setting is used as the time limit
per call setting for all new accounts
and visitors. Any number from 0 to 5 is allowed here. This number
corresponds to the Online Time Limits you
specify for each level.

Online Time Limits per Call

You can set different time limits for each
of the 6 allowable system access levels (0-5). Any number of minutes
from 0 to 9999 is allowed here. A 0 indicates no limit.

Daily Online Time Limits

In addition to time limit per call, you can set
a daily time limit for each access level. This limit should be equal
to or greater than the time limit per call specified above. Any number
of minutes from 0 to 9999 is allowed here. A 0 indicates no limit. For
example: If daily time limit is set for 30 minutes per day for a level
2 user then a caller whose account is at level 2 could call in 3 times
in one day and spend 10 minutes online for each call. Remember,
it does not make sense to have the daily limit set below the per-call

Upload to Download Ratio

If you wish to restrict downloads based on the number of bytes uploaded
to the system you can set a ratio of bytes uploaded/downloaded which
the system will monitor for each account. If for instance you set
the ratio as 1 to 5 by entering a 5, then for every byte uploaded
the user can download 5 times that amount. Set the ratio to '0' for
no upload to download ratio.

Must-Read Bulletins

Specifies which of the 32 bulletins that must be read before system
access beyond the main menu is granted. When a bulletin
is edited for any reason and its "must read" flag is set, the user
will be forced to reread the bulletin.

System Log File Active

(0=No Log / 1=Log Active)
If you specify the log file is Active, all significant
system activity is recorded in a log file. This information
includes logons, logoffs, DOORS activation, and error reports. This
information is duplicated in a screen window while the system is online,
regardless of the setting of this flag. This log is
used for the Sysop only and creates a file called BBSLOG.TXT.

Sysop Available for Chat at Startup

(1=Available / 0=Not Available)
When this feature is set to 1 the Sysop will get a
beep at the console when a caller pages the Sysop. When it is set
to 0 and there is another Sysop on the system; they will get the message
that someone will want to chat, otherwise the caller will receive
a message indicating that the Sysop is unavailable to chat.

Main Menu Cost

For BBS operators that wish to use a credit
system, wherein a user will purchase (or be given) 'credits' to be
deducted while the user is online, this entry provides a way to deduct
a specified number of credits per minute from the user's account once
the menu option is selected. The Main Menu Cost is the cost per minute
for those users sitting idle at the Main Menu selection

Path to FALKEN temp/work files

FALKEN uses several work files when it is running. You can speed
up system response by specifying a RAM disk for these
files. Simply place into this entry the path to the drive and subdirectory
you wish for FALKEN to use as a work area, and it will create the
work files there.

You can also copy the files MSGTEXT.IDX, MSGANSI.IDX, and MSGRIP.IDX
to this work area before starting FALKEN, and FALKEN will read all
menus and text messages from that area, possibly improving system

As an example, if you have a RAM disk designated as drive
G: on your system, place the text 'G:\' in this entry for FALKEN to
use the RAM disk for work files.

Path to files attached to Email

This is the subdirectory that you must create to store files that
are attached to Email.

Example: c:\mailatt\

This subdirectory must be created in DOS before running FALKEN. FALKEN
will not create this subdirectory for you.


General Access Flags

These flags determine what a NEW caller or VISITOR can access on your
system. There are separate flags for READING and POSTING to each message
folder, UPLOADING and DOWNLOADING to each
file library, and for access to various
system functions. In every case, a 0 means the user is not allowed
to do the activity, and a 1 means he is allowed to do the activity. For
example: Placing a 1 in "MESSAGE FOLDER
READ FLAGS" number 1 would allow a new user to read all messages in
folder number 1 in the message base. If
all the other "MESSAGE FOLDER READ FLAGS" were left 0, the user would
not be able to read (or even see) anything in the other folders.


Each account is date-stamped with the creation date and the expiration
date 2 weeks later. When a user logs on AFTER the
account expiration date, all the access flags and
the timer value are set to these defaults, giving the user the same
access that a NEW CALLER would have. You can reset the expiration date on accounts to prevent this from happening, if
you wish. This is particularly useful if you plan to charge for system
access, or wish to give people a few weeks of normal access as a test


Message Base Read Flags

There may be up to 64 message folders on
your system. These flags are used to control which message folders
a new user may read.

Message Base Post Flags

These flags control which message folders
a new user may post messages in. It would not make sense to allow
posting in a message folder where the Read flag was set to 0.

File Library Download Flags

These flags control which file libraries
a new user may download files from.

File Library Upload Flags

These flags control which file libraries
a new user may upload files to. A user can have access to a file library to upload files without permission
to download from the same library.


If a users Upload and Download
flags are both '0' for a library, they are not allowed access to that
library at all. To allow a user to see the files but not download
then set the download flag to 0 and the upload flag to '1'.

General Access Level Flags

These flags control which of the major FALKEN functions a new user
has access to. These flags represent, from left to right:


User Bios: If set to 1, a new user may enter a user


TLCF: If set to 1, a new user may enter the teleconference


Send Email: If set to 1, a
new user may send Email to other users. NOTE:
Users can always receive electronic mail and send feedback
to the SYSOP.


Doors: If set to 1, a new user may run external


Subop: If set to 1, a
new user may execute SUBOP commands.


Sysop: If set to 1, a
new user may execute SYSOP commands.


Network: If set to 1,
a new user can create a system-to-system link using FALKEN's NETWORK function.


Menus 1-5: Access to each of the 5 submenus is controlled independently. Many FALKEN sysops
place their DOOR programs in a separate menu, such as MENU1, instead
of placing them in the Main Menu. These flags control
access to each of these menus.


SEND command allows users to send private messages
to other user on your system using the .SEND [user name] <>..


Stealth: Allows users
to logon to the system privately. The usual system status
displays available on-line will not display the fact that the user
is there. Under stealth a user can not enter
the teleconference system (the feature
wasn't designed to spy on users). The idea behind "stealth" is to allow sysops
to access their systems without public knowledge for reading of messages
and other system maintenance chores they wish to perform without being
disturbed. This privilege can be granted to other users who may need
this added security or privacy while on-line.


It is highly recommended that
you do NOT allow new or visiting callers to access Subop (5), Sysop (6), or
Network (7) functions or have stealth ability. To turn these functions off, your general
access flag string should look like the following: 11110001111110. Notice
that the 5th, 6th, 7th, and 14th positions are set to '0' (off).

base access for new callers

If there are one or more message folders
that you allow new callers to access, these flags allow you to permit
or restrict the specified folders.

Upload/Download access for new callers

These flags allow you to configure your system to permit new callers
to upload and or download from the libraries you specify. Enter a
'1' in the upload or download flags area to allow access to that area.


When a caller logs in for the first time without an established account
on your system they will enter the system as a NEW account or VISITOR. Either way, you can select which
questions to be asked prior to allowing further access. You can also
specify what information the user is allowed to change online. In
every case, a '0' tells the system to not ask the question, a '1'
will allow the question to be asked.

In the message files (MSGTEXT.MSG, etc.) there are 6 messages named
Setup_ques 1-6. These are questions that are asked when the account
is created. The answers to these questions can be displayed by the
.USER and .WHO commands.


Configurable Menus

FALKEN supports 6 menus, identified as Main Menu, Menu
1, Menu 2, Menu 3, Menu 4, and Menu 5. Each of these menus supports
30 options. Using the Menu Setup screens, you control
which system functions are available at each menu, as well as the
command to enter each function. For each of the 30 entries on the
Menu Setup screen, you may specify the command a user
must enter, and the function to be executed when that command is entered.
Commands may be from 1 to 5 characters, with no imbedded spaces.

Normally, one character commands, such as 'E', 'X', etc. are preferred
for ease of use. The function name to be executed when the command
is entered may be one of the internal FALKEN functions, such as Email,
message base, etc., or may be a module program. In
the above example you would type UPGR at the Main
Menu to run the module UPGR.EXE which will prompt you
for a password, in this example the password
is SAMSON. The module, UPGR.EXE, must be in FALKEN's
work directory, or in a directory included in your PATH variable.

All internal FALKEN functions are identified with a '@' in the first
column, e.g. @email. All other entries are assumed to be external
module programs, either .EXE or .COM files. If the word DOS appears
before the module name, FALKEN will redirect standard input and output
files to the modems, allowing many regular DOS
programs to run as module programs, e.g. 'DOS MYUTIL.EXE'.

The CREDITS field
is the cost per minute for selecting that menu function.

Choose which of the menus you wish to configure (page up or down for
sub-menus). Upon login, each user is placed at the Main
Menu. From there, you may allow access to system functions, including
the 5 'sub-menus'.

Pre-defined Menu

Help Screen (@help)

This screen provides some general
guidelines to those users accessing the system for the first time. The
help screen is located in the .MSG files as MC_HELP.

Edit Account Information (acctedit)

Whenever you need to find out
the status of your account or to edit your computer's system parameters,
you may do so by accessing this function.

Electronic Mail (email)

Each subscriber is assigned a
personal mailbox on the system. This function allows you to send
and receive private messages to/from other subscribers.

Bulletins (bulletin)

Here the System Operator can place
information about the system or other pertinent information for users
to reference. These bulletins can be
flagged as "must read" for new user first accessing the system to
inform them of policies and registration information.

Downloads From Program Library (@download)

Public Domain software library
for all major types of computers is available for downloading using
or ZModem batch file transfer protocols.

Multi-user Teleconferencing (@tlcf)

This exciting feature allows all
users to participate in open (or private) multi-user discussions while

Main Menu (@mainmenu)

Returns the user to the Main Menu when selected.

Submenus (@menu1-5)

This is the link between the six
menus on your system. You can group activities together onto a single
menu that is a sub-menu to the main menu.

Public Message Base (@msgbase)

This subsystem will contain general
information posted by other subscribers, computer clubs, or business
accounts. Users may respond to messages publicly or privately, or
post their own.

Who Else Is Logged On (@who)

Provides a list of other users
currently online and indicates where on the system they are currently
active. The information displayed is configurable by the SYSOP.

Chat With SYSOP (@chat)

When selected the host system
will "beep" the System Operator. If available, you will able to talk
to the user privately online.

Feedback To The SYSOP (@feedback)

By using this feature a user sends
an electronic message to the SYSOP. You should encourage your users
to provide you with their comments about the system. Any ideas they
have are usually appreciated and can be considered for implementation. If
users find any errors they can use this function to notify you.

User Questionaire (@question)

One of the most interesting aspects
of a system such as this are the people you find using it. This option
allows you to enter information about yourself that other users can
see when they enter a .USER handle command.

Subscriber's Account Status (@status)

Displays information about your
account including number of times called and time total online.

User List (@userlist)

This function provides a listing
of all system accounts.

Logoff (@logoff)

Before doing so, the user is provided
a confirmation message and prompt.

Logons (@logons)

Gives a listing of the 20 users
who had previously accessed the system.

Sysop Functions (@sysop)

Takes you to the Sysops menu if
the account has its sysop access flag set to "1" AND after the proper
password has been entered.


While the user is logging on, before they get to the Main
Menu, you can specify up to 8 external module programs to be run. These
programs will run sequentially as the user is logging on. For example;
you could have a program that displays "This Day in History" text
followed by a program that checks the user's birthday and displays
a special message if it is his birthday. These programs have been
developed by other FALKEN Sysops and have been made available as either
shareware or for a very small fee. Our FALKEN Support
BBS is a very good source for these types of programs.


Folder Subject

You may specify up to 64 different subjects for message folders (page
down for folders 17-64). If you do not wish to have 64 message folders,
then only supply subjects for the ones you wish to support.


You may specify a "Moderator"
for each folder by entering his account name in the moderator field. This
is a user who has message editing and deletion permission for that
folder only. The user does not need to have SUBOP
or SYSOP access to edit or delete messages in the folder for which he is the moderator.

Allowing anonymous posts

The Anonymous
flag will allow you to select whether anonymous postings are allowed
within each folder. Set to 0 to disallow
or 1 to allow anonymous postings and replies. The user must use RA
(respond anonymous) or PA (post anonymous) to post/respond anonymously.


You may specify up to 64 different file
libraries, according to the theme of your BBS. For each different
library you may specify the Name, the Download Path, the Upload Path,
an optional password to restrict access to
that area, a file librarian, and up to 20 categories
within the library. Librarians are individuals who help you maintain
the file libraries. They have the ability
to save files from upload area to download area, and the ability to
delete files in their respective libraries. If the librarian field
is left blank it will default to the system operator. The librarian
receives file upload notifications whenever a user uploads a file
to the system.

File Area Names

The name of the File Libraries you have
configured are displayed on the menu. To configure a new file library, move the highlight bar to a blank
entry, press J, and when the menu screen appears, enter
the name of the new library in the "Name" field.

Each of the 20 categories may be assigned a separate download path. The
same path may be used by replicating the path on the 'download path'
section for each category. There is only one upload path per library.

Upload and download paths

Uploads and downloads are separated for security reasons. The paths
supplied should specify a subdirectory into which the files will be
placed. The path specification should end in a "backslash" ( \ ).


You may go several levels deep in the path specification, depending
on the categories you choose. DO NOT place uploads and downloads
in the same subdirectory since files are deleted from the UPLOAD directory
when moved to the DOWNLOAD directory. Other than that, you have complete
freedom over where the files are placed. If you specify a password, no user will
be allowed access to that area unless he provides the password, even if his access
flags allow him into that library.


It is imperative
to make your UPLOAD and DOWNLOAD directories different. All files
in the UPLOAD directory that are selected for saving into the DOWNLOAD
directory will be copied from one directory to the other and then
deleted from the UPLOAD directory. If these paths are the same the
file will be deleted, expunged, obliterated, call 1-800-ITS-OVER...
Walk towards the light .... you get the idea.

Specifying CD-ROM directories

When you are using a CD-ROM for file downloads, it may be cumbersome
or impossible to specify all the subdirectories on the CD-ROM in the
file library setup. Falken supports CD-ROM usage by allowing you
to specify the exact path to the file within the file description. The
'UPLOADED BY' field of the file description can be used to specify
the exact path to the file. Simply put an @ in the first character
of the field, followed by the full path to the file, such as '@F:\IBM\UTIL\'. When
Falken sees the '@' in the UPLOADED BY field, it searches in that
directory for the file.


Categories are used to separate the download files and to limit file
searches to only the areas selected.


The password
field allows you to protect a library by telling the system to ask
for a password prior to allowing access to
the library. The password will be required by all account regardless of the subop
or sysop access control flags.


If you wish to allow one of your users to have access to the Librarian
menu (automatic for Sysop level accounts), then place his
account name in the Librarian field. The name provided will have
access to the additional commands for this specific library only.

The sysop may move files from one library
to another, or to a different category within the same file
library. To do this, enter "M filename". FALKEN will prompt you for
the library to move the file to, and the category into which the file
should be placed.

You may also perform a directory list of the download directory ('W'),
or the upload directory ('Y'). You can delete files from the download
library ('D filename') or from the upload directory ('Z filename'). You
can also move a file from one download library/category to another
('M filename').


What is a File Transfer Protocol?

A file transfer protocol is
simply a set of rules that both computers must follow to guarantee
a correct transfer of a file or set of files. In the same way that
2 people must speak a common language for communication to take place,
computers must use a common language for the exchange of files. We
won't discuss individual protocol rules here, but will simply say
that a protocol is just a set
of procedures and instructions that both computers understand and
use to guarantee a good file transfer.

FALKEN implements protocols as external
programs, called Modules. Each protocol
is a separate program, which is called in to execute when necessary. Examples
of these programs are XMSEND.EXE,
ZMRECV.EXE, and others.

The upload protocols are basically doors. They get a time slice to run in, and must
compete with FALKEN and the other doors for a time slice. It is quite
possible for the upload protocol to go
for 1/2 second up to even a full second or more before it gets a time
slice and gets to run (this is an extreme case, but I have seen a
time lag of 2 seconds). FALKEN receive buffers are 1K in size. At
19200, the buffer can fill up in 1/2 second. If the protocol is delayed in reading the buffer, data may get

Adding protocols to

To add a new protocol to your protocol
list, simply use the BBSCFG EXTERNAL PROTOCOLS
screen to add the name of the protocol
program to the list of protocol programs that your copy of FALKEN
already uses.


Door authors
who wish to add protocols to FALKEN
can obtain the source code for the existing protocols from Info*Share.

External Protocol

In BBSCFG there is a screen for you to tell
the system the program names of up to 8 download protocols and 8 upload protocol programs to be
used as external protocols. These
external protocols must be written as DOORS
programs (no drivers for ProComm or RBBS will work). INFO*SHARE provides
external protocols on the Distribution
Diskette. Included are external protocol programs for Ymodem and
Zmodem. The file names are:


Ymodem/Ymodem-g file download protocol


Ymodem/Ymodem-g file upload protocol


Zmodem file download protocol


Zmodem file upload protocol

XMSEND.EXE and XMRECV.EXE provide FALKEN's Xmodem file transfer protocols.

FALKEN assumes these protocols
will be available, so they are not listed on the external protocols
list. The file names must not be changed, since FALKEN uses these
names for Xmodem file transfers.


FALKEN upload protocols do not allow streaming
on uploads from the user, meaning the transmitting side must wait
for the FALKEN protocol to acknowledge each block before it sends
the next one.


FALKEN gives you the ability to perform backups and other
maintenance functions automatically
at specific times during the day. The "Time-related
activities" screen in the BBSCFG
program allows you to specify the time, and an optional weekday for
these activities to occur. FALKEN uses the ERRORLEVEL facility of
DOS to accomplish this. When a program terminates it provides an
"exit status" to the operating system that can be queried from a batch
file. The exit status is stored as ERRORLEVEL. A batch file can
test the ERRORLEVEL value to determine the exit status of the last
program that ran on the system.

Automated maintenance shutdowns and restarts

You can direct FALKEN to terminate at specific times with an ERRORLEVEL
of you can perform a sequence of commands and then have the system
brought back online. This features allows the System Operator to
schedule routine backups at a time
to minimize impacts to the users.

Automated file backups

ERRORLEVEL 0 is the normal termination for FALKEN. ERRORLEVEL 5 and
up are currently undefined. This leaves ERRORLEVELS 1-4 for you to
use. As an example, suppose you wished to backup your important files
every morning at 4:30 AM. You could set the ERRORLEVEL 1 minute=30
and the hour=4 in the BBSCFG
utility. In BBS.BAT, you would then place the necessary
instructions for performing the backup immediately after the label
for the ERRORLEVEL 1 test. The following segment of a batch file
assumes you have set ERRORLEVEL 1 to occur every day at 4:30, and
that a batch file named BACKUP.BAT exists to perform the selective

:start bbs

if errorlevel 5 goto end

if errorlevel 4 goto err4

if errorlevel 3 goto err3

if errorlevel 2 goto err2

if errorlevel 1 goto err1

goto end

:err1 call backup

goto start




goto start


In this example, when FALKEN terminates with an ERRORLEVEL 1, the
batch file will start executing at the label "err1:". The file BACKUP.BAT
will be executed, then the BBS will start running again. Unused timer
functions should have the hour and minute set to 0.

Setting daily or weekly time-related activities. If
the DAY field is left empty on the BBSCFG
screen for Time-related activity, the shutdown
occurs every day. Otherwise, the shutdown occurs only on the day
specified. To execute the activity on a particular day of the week,
enter 1 for Sunday, 2 for Monday, etc.


Addressing the Modems

You must tell FALKEN where each of the modems
is located, and what baud rate to use on each one. Normal addresses
for COM 1-4 are:

COM 1 : 3F8
COM 2 : 2F8
COM 3 : 3E8
COM 4 : 2E8

Multi-port cards are normally configurable for
various starting addresses, and often come preconfigured to start
at address 100. You can use more than one multi-port


IRQ settings for the communications
ports are not used by FALKEN. You may need to refer to the installation
guide for your internal modems or your COM
board to determine the exact address for your modems.

Modem Initialization Strings

You must specify the modem initialization
string to be issued by the FALKEN software. This command string will
be sent to the modem during the program initialization sequence, and
every time the software needs to reset the modem to accept another
call. The normal initialization string for a Hayes 2400 baud modem

ATE0 S0=1 S2=1 X4 V1 &C1 &D2

This string tells the modem:


the Hayes Attention signal


do not echo commands


answer the phone on the first ring


redefines the modem's 'escape' character to SOH (hex 01)


use extended result codes


use text result codes


DCD signal follows carrier


reset modem and go to command state when DTR goes low

How To Configure Modems

In general, you want to configure your modem so that it does not echo
commands, configure it for auto-answer, and configure it to return
text result codes that specify the connected baud rate.

Flow Control

Flow control seems to be one of the real problem areas for many sysops
and users. Many modems these days can compress data as it is transmitted.
Modems that support MNP-5 and V.42bis protocols
are examples of this capability. In order to use this feature, the
baud rate between the computer and the modem must be higher than the
baud rate between the local modem and the remote modem.

For example, if you call a 14,400 bps modem with your own 14,400 modem,
the 2 modems may be able to compress the data going between them. To
take advantage of this feature, the baud rate at which your computer
talks to your modem should be higher than the 14,400 modem-to-modem
rate. Use a baud rate at least twice the speed of the modem speed
rating. This can lead to problems if your computer transmits data
that cannot be compressed, and begins to overflow the modem. The
modem must be able to indicate to your computer that it is ready or
not ready to accept more data. This is called flow control.

There are two methods of performing flow control. Software flow control
is performed using special characters, called XON and XOFF. The receiving
side tells the transmitting side to stop sending data by sending an
XOFF character to the transmitting side. When it is safe to send
more data, the receiving side sends an XON character to the transmitter. This
method will not work when raw computer files are being transferred,
because a raw computer file may contain binary codes that look like
the XON and XOFF characters.

Hardware flow control is generally more reliable, and will work with
any kind of data. A pair of electrical connections between the modem
and computer are used to indicate that each side is ready for data. This
flow control method is also called RTS/CTS flow control, since the
Request-To-Send (RTS) and Clear-To-Send(CTS) lines are used for flow
control signals.

If your modem supports hardware flow control, then use it. If your
modem does not support hardware flow control, then use software flow

Baud Rates

If your modem supports MNP-5 or V.42bis, then
set the baud rate to the modem to at least twice the modems speed. If
you have a 9600 baud modem with V.42bis, set the speed to 19200 baud
and set the FIXED BAUD flag to prevent the BBS from changing the BBS-to-modem
baud rate. The maximum baud rate supported by FALKEN is 38400 bps.



This is a simple text file that can be created with
any text editor. It is displayed to each user when they log onto
your system. This file should contain only ASCII text, meaning that
the control codes used by many word processors should be stripped
from the file. You can put any message here that you may wish, up
to a total of 2000 bytes, or about 1 screen worth of text. This is an excellent place to put special announcements
or warnings that need immediate attention by your users.



Each of the
files contains a version of each menu or screen. For instance the
MC_MAINMENU message exists in each of these files, but the contents
of the message will likely be different. One will be straight text,
one will be ANSI codes, one will be a
RIP graphics menu. After these files have been modified the idxmaker
program must be run for each of these files individually:

idxmaker msgansi
idxmaker msgtext
idxmaker msgrip

The output of IDXMAKER is a file with the .IDX extension
which is what FALKEN reads to display the menus/screens. Copy these
.IDX files to your RAM disk for better system performance.

RIPscrip Graphics

RIPscrip stands for "Remote Imaging Protocol Script" language. This
graphical language is one answer to the graphics needs of the BBS
community and has serious tools for implementation and practical use.

RIPscrip is a text based Script language for displaying online graphics.
The script language conforms to 7-bit ASCII, avoiding the use of Extended
ASCII characters. This allows transmission over X.25 networks and
other carriers that do not support full 8-bit binary transfers easily.
RIPscrip allows RIPscrip graphical statements
to be mixed with printable ASCII text and [de facto standard] ANSI/VT-100 directives. RIPscrip can dynamically
determine what is graphics and what is text and display them appropriately
in separate windows (a graphics window and a text window).

For more information on RIPaint, RIPterm or RIPscrip development
tools, contact:

TeleGrafix Communications, Inc.
16458 Bolsa Chica #15
Huntington Beach, CA 92649
VOICE: (714) 379-2131
FAX: (714) 379-2132
DATA: (714) 379-2133

An example RIP graphics file FALK7.RIP is included on
your distribution diskette. This file was created by the
RIPaint utility provided by TeleGrafix. The file is displayed to
remote callers who have called in using RIPterm or another
RIP graphics capable terminal program. If you look at the MSGRIP.MSG file you'll see how this file is called:

mc_hello {}

The @ symbol tells FALKEN to pull the message, menu, or full screen
from an external file located in the FALKEN work directory. This
file must be present when you compile MSGRIP.MSG with the IDXMAKER utility.

How Falken Supports RIP

The use of RIP is transparent to Falken. The MSGRIP.MSG file can
contain RIP screens, ANSI screens, and regular text. Falken simply
takes the contents of the messages and sends them to the user unmodified. Falken

will automatically sense RIP terminal programs during the login sequence,
to determine whether to send the RIP mc_hello message or the normal
text mc_hello message.

Editing .MSG files


Make sure you keep backups
of these files, and NEVER edit your only copy of these files.

The file is composed of message names followed by the text of the
message. A message may be a menu or a help screen, or just a single
line of text. The basic format is:

msgname {Put message text here. This
will all be considered one line.\r Here is the second line.}

Some characters have special meaning in this file. The curly brackets,
{ and } are used to enclose text. The sequence \r is used to force
a Carriage Return on output. If you do not use the \r, then NO Carriage
Returns will be placed into the text. The end of a line in the message
is treated as a "soft Return", and a space is placed in the file,
trusting the automatic word-wrap feature of the BBS to take care of
text formatting.

Use code \[ to represent an ANSI prefix (ESCAPE character
and [), if you wish to use ANSI screen controls in
your messages. If you wished to clear the screen before printing
the message above, it would look like this (the [ESC][2J is the code
for clear screen):

msgname {\[2JPut message text here. This
will all be considered one line. \rHere is the second line.}

To imbed a backslash (\) in the text, enter 2 of them:


To call an external text file use the following format:

msgname {@filename.ext}

Substitution strings in .user, .status, .who commands,
and in message menus

There are three global commands that provide information
about the user and other user accounts. In the .MSG files you can select which account fields are displayed
when these commands are isued. In each example provided below the
text of the @ string is replaced by the information you've specified.
You can put an optional length parameter after the name, such as @handle[20]
which means to reserve at least 20 bytes for the handle. This allows
you to ensure information is lined up in your displays. The account
fields include the following information:


The caller's handle


The caller's real name


The caller's street address


What city the caller is calling from


What state the caller is calling from


The date of the caller's last call. If the caller is online, the
date of THIS call is shown


The time of the caller's last call


How many minutes he has been online this call


How many minutes left for this call


Which line the caller is on


What the caller is doing message base, tlcf, etc)


The caller's timer level (0-5)


Access flags, i.e. 1111000110


The caller's comment line


The date the caller's account was created


Either 'A = graphics' or 'no graphics'


Baud rate at which the caller logged on


prints the mc_sysoplogon or mc_suboplogon string from messages.msg
if the caller is a sysop or subop


The caller's birthday


The caller's home telephone number


The caller's work telephone number


The date the caller's account expires


how many logons since the last billing


Total logons since the caller's account was created


Total minutes online since the last billing


Total minutes online since the caller's account was created


total time spent in tlcf


shows how many credits the caller has left


the caller's account number


Prints 'Male' or 'Female' accordingly


shows the caller's age, calculated from Birthday


as defined in BBSCFG


as defined in BBSCFG


as defined in BBSCFG


as defined in BBSCFG


as defined in BBSCFG


as defined in BBSCFG

Here is a sample message that will be displayed when a non-sysop uses
the .USER command:

mc_bios_format1 {User information for @handle : access=
@timerlevel, Comment: @comment\rAccount created : @acctdate, Last
logon : @logontime\r}

This second example is of the "bios_format_2" message which is displayed
when a sysop issues the .USER command:

mc_bios_format2 {Real name : @realname Birthday : @birthday
Phone : @homephone\r Access Flags = @flags, Account expires on @expiredate\r}

This third example utilizes many of the account fields and displays
the specified information when the .WHO command is used:

mc_who_format { @line[2]: @handle [@comment] in @area. Logon
at @logontime @address @city @state @zip @timeonline @timeleft @timerlevel
@flags @acctdate @ansi @baud @sysop\r}


The mc_bios_format3 message
is not used, but MUST be present.

This last example gives you an idea of how to set up the user status
(.STATUS) command which is used by your callers to get information
about their own account:

mc_user_status { \r\r\r\[2J\[3;20f\[1mAccount Status
Information\[0m\r \rName: @handle
\rAccount Number: @acctnum \rAccount Created: @acctdate
\rAccount Expires: @expiredate \rAccess
Level: @timerlevel \rTotal Logons: @totlogons
\rLogons Since Last Billing: @logons \rTotal Connect Time: @totconnecttime
minutes \rConnect Time since Last Billing: @connecttime minutes
\rTotal Time Spent in Teleconference: @tlcftime minutes \rCredits
Remaining: @credits\r}



The file BBS.BAT is a batch file that starts the FALKEN
BBS software. Use this batch file to run the program every time it
is started.

To run the FALKEN BBS, type:


You will see the FALKEN program banner screen displayed. Some useful
information is displayed on this screen which we will discuss later.
Refer to the System Status Screen while reading the following paragraphs
explaining each window:



This window shows you what each active line is doing, including who
is logged on and what area they are in. You will notice there is
a configured line for every modem you have specified in the BBSCFG, plus ONE. The last line is used for local login.


This window logs logons, logoffs, module activations, chat
calls and system errors. The log file on disk (if activated) is actually
a copy of the information written to this window.


This window shows the amount of memory
left over in this program's allocated space. The MEM display shows
2 numbers, e.g. 26/1024 . The 26 is the amount of conventional memory
that FALKEN has reserved for passing messages between tasks. The
1024 is the amount of expanded memory it has to
run doors in. When FALKEN starts up, it reports a page frame
size. That page frame will be used to run doors. If
your system reports a 192K page frame, then multiple
192K modules can be run simultaneously. The 26K conventional
memory is fairly normal. The amount will always be between 16K and
32K, since that is all FALKEN requires for that purpose. The following
discussion assumes you have a 386 processor, or higher, and at least
1 MB of RAM, and a memory manager such as QEMM, 386MAX or EMM386.

When FALKEN runs, it reports 3 different memory sizes. These

FALKEN will use the EMS capabilities
of the memory manager to convert as much conventional memory as it
can into EMS memory. FALKEN will round up the start
of the EMS memory to a 16K boundary, but will leave
at least 16K of conventional memory. This small chunk of conventional
memory (between 16K and 31K) is used to pass messages between FALKEN
and the external program modules.

The new EMS page frame will normally
be between 128K and 300K, depending on how much memory
you are using with drivers and such, and how many lines you have active
on FALKEN. This is the EMS FRAME size. One
EMS FRAME will be used to run one module. So, if your
EMS FRAME is 160K, you can only run doors which require less
than 160K of memory. Remember that the .EXE file size is no indicator
of the memory the module requires, since some modules
use large memory buffers that are allocated when the program runs.

The EMS size is the total amount of EMS memory available. It will be divided up among the active
module programs, with no one module getting more than
EMS FRAME size of memory. If you have 1024K of EMS
memory, and 8 people all try to load a module that requires 256K,
then 4 of those people will get a load error, because there is no
memory to load the module into (assuming your EMS FRAME
is at least 256K).

When using QEMM, make sure you have the 'dma=64' switch in the qemm386
line in your config.sys - this is necessary or else you will get strange
memory errors caused by too few DMA channels.

Since FALKEN does not use graphics, you can tell QEMM to map the graphics
memory range as conventional memory. The switch 'I=A000-AFFF' in
the QEMM386 line in CONFIG.SYS does this. If you have a CGA/EGA/VGA
card, you can also map the monochrome text area, by changing the afff
to b7ff. This gives you an extra 64K or 96K of EMS FRAME so you can run larger external program


This is a dialog window for you. When you are typing a message to
someone that is online, or answering a system query, you will be typing
in this window. Anytime a response is expected of you, the cursor
will be in this window.


This window allows you to monitor everything that
occurs on a particular modem. You can have a dialog with
a user by monitoring that user's line, and using
the SEND (1) key to compose messages to be sent to that user's

Note that this window displays everything that is transmitted on the
line. Normally this will enable you to see the user's input, since
input is echoed by the BBS in text mode. In binary mode (file transfers),
input is not echoed, so you will only see the data transmitted by
the BBS.


You control the system using the function keys. The various function
key assignments are described below:

1 Send

Transmits text to one or more lines. After pressing this key, you
have the choice of sending to one line, everyone in a specific teleconference,
or every line (broadcast). 0 quits. After you choose one of
these options, the COMMAND window will accept your text, up to 1000
characters. The window scrolls as you type, but you can only correct
mistakes by back-spacing. When you press J, your text is transmitted
to the line(s) you have selected.

V1 Redraw

Redraws the Sysop's console screen.

2 Acct Util

Pressing 2 will cause a second function key menu to
be displayed. The options available from this second menu are:

1 (Account Edit): This function lets you add,
delete, and edit account records.

7 (Chat Bell): This function enables and disbales
the BELL that normally sounds when a user wishes to Chat with the
sysop. If you usually do not choose to be disturbed,
set the "Sysop Chat Bell at Startup" option in the GENERAL SETUP screen
of BBSCFG to 0 (turn off chat bell). Then
you can use this toggle to turn the bell off or on.

4 (User Email Count)
: Counts how much EMAIL each user has
on the system. Large amounts of email
being stored on the system can drastically slow down the system when
a user logs on, since the mail is searched for NEW letters. A text
file named EMAIL.CNT is produced with a report on how much mail each
user has.

The BBS will be locked out to all users while this utility is running. Make
sure no one is online when executing.

3 Emulate

Emulates a channel,
for local logon. 3 allows you to log on as a user. You will
be asked if your computer supports ANSI. Type "N"
for no. You can answer "Y" for yes if ANSI.SYS is
installed in your DOS' CONFIG.SYS file. You can get
back to the system screen by pressing 0. While you
are logged on, you can toggle between your online screen and the system
screen with 0 and 3.

4 Monitor

Specifies which channel you wish to monitor. When
the system first starts, it is set to the last line configured on
the system (the Emulation channel). When monitoring any line, you may offer help to that user by using
the 6 function key and actually take over their keyboard to
help them out if needed.

5 DOS Command

Executes a limited number of DOS commands. A help
function is provided to explain how to use this feature. This is
called The FALKEN Command Interpreter
(FCI) and will place you in a simulated DOS environment which wil
allow you to perform most of the DOS internal commands such as: Dir,
type, copy etc. Type "help" at the FCI Prompt for help on available commands.

6 Lock On

Locks onto a specified active line, where you will see
everything the user sees, and your keystrokes appear to FALKEN as
if they came from the user's line. This is an effective way of 'guiding'
someone through the system if they are unfamiliar with computers and
BBSes. You can also log on to any idle line simply by monitoring that line with the 4 key, and pressing the
6 key.

7 Scheduled Activities

Lists time-related activities scheduled to occur in the BBS log window. These must be
listed in the BBSCFG
Utility in order to run.

8 Hangup

Disconnects (hangs up on) a user. It can be useful to reset a modem
that does not seem to be responding properly.

9 Record

Records everything that occurs on a particular line. You
will be asked which line to record. A file named RECORD.LIN
will be created to store the text. Everything the user types, and
everything the system sends to the user will be recorded
(except binary file transfers). Use the 9 key to toggle recording off when done. If you start recording
again, the RECORD.LIN file will be overwritten, so copy that file
to another name if you wish to save it.

0 Halt

Halts the system, and returns you to DOS. You will be asked to verify
this request before the system halts.



Press 3. The system should respond by starting the LOGIN sequence. You
will be asked if your computer supports ANSI. Type
"Y" Only if you have ANSI.SYS in your CONFIG.SYS
file in the root Directory of your boot drive.

When asked for name, type NEW. Go through the prompts, answering
all the questions. When your account is set up, log off by typing
"x" at the main menu, then typing "y" when the system asks if you
are sure.

Now press 0. You will see the system screen again. Press
2. Press 1 for Account Edit.

Your new account should be on the
screen. If an account named "SYSOP" is on the screen, press d
to get to your account. Press J several times until you are
at the "Account Expires" entry. Give yourself
more than the few weeks this defaults to (i.e. 1999). Continue on
until you get to the Timer Level entry. Give yourself a level access
that equates to 0 (no time limit) as configured in BBSCFG. Continue on to the SYSTEM
ACCESS FLAGS, and set them ALL to 1. This gives you access to ALL
system functions, including
SUBOP and SYSOP functions.

Press 5 to save the record.

Press 0 to return to the system screen.


When a user logs on through the modem they will see the same sequence
of questions as outlined above. Once they have completed the logon
questions their account will be given privileges as established in
New Account Menu. If they have already established an account on
your system, then they will be processed through any logon doors,
given status on new Email or Bulletins, and then brought to the system's Main

There are three ways for the Sysop
to upgrade a user's account once established:


Online using the UPGR.EXE
utility (this is the most automated method).


Online using the Sysop's menu Edit Account function.


Offline using the Account Edit function
from the System Status Screen.

See the Sysop Guide and Utilities sections of this manual for further



You will enter the editor whenever you write a message on the system
(i.e. post a message, write Email, or provide feedback). When
you first enter the editor you are placed in "Text Editor Insert Mode". Whatever
you type will be placed into the editor's buffer. This buffer will
hold up to 100 lines of 80 characters, no more! Enter your message
without pressing J until you reach the end of a paragraph or
once you have entered 15 lines of text. The system will "wordwrap"
your message for you so don't be concerned about where words end on
a line. Once you have reached the end of a line the system will move
the word being typed onto the next line automatically.

Editor Commands

When you first enter the editor you are in INSERT mode. Enter /m
on blank line to see the menu of available editor commands available
in COMMAND mode. A "/" in the first column of a line will place you
in the editor command mode. Commands are single letters, followed
by one or more prompts, as described below. Following is a list of
editor commands:


append input to the end of the file.


insert lines of text.


list lines of text.

w or s

writes the text to the disk.


find a text string.


change text, replacing old string with new string.


delete lines of text.




replace current line with this line.


get external file. (Sysop only)


put (save) to external file. (Sysop only)

Command Details


Append text lines to the end of the buffer. All text lines entered
will be appended to the end of the text already in the editor's buffer
starting at the first available line number. Line numbers range from
1 to 100. Appending to line 100 will just overwrite line 100.


Insert lines of text. This command places you in "insert mode". The
editor will prompt you with: "Insert text in front of which line ?"
Text lines will be inserted in front of the line number specified
pushing existing text down into the buffer to accomodate the new lines. If
you exceed 100 lines of text while inserting your message will be


List lines of text. The editor will prompt: "Start listing at which
line number ?" If you press enter without specifing the start line
the text buffer will be listed beginning at line 0 through line 18. If
you specify a line number that line and the 18 lines following will
be listed.

W or S

Write text buffer to disk. This command actually saves the message
you have composed and returns you to the previous command level menu
(message base, Email, etc.).


Locates the first occurrence of the specified text string starting
at the specified line.


Replaces (changes) the first occurrence of a text string to a new
text string in the specified range of lines. The editor will prompt
you for the text string you want to change, what you want the text
changed to, at which line to start replacing text, and how many lines
to search.

D [start line] [number of lines]

Delete lines of text. Text is moved down to replace deleted lines
in the buffer.

H or ?

Displays this help information while online.


Quits, i.e. returns you to the previous command level without saving
your message to disk.

Advanced Techniques

G [filename]

(SYSOP only) get text file from disk. Sysop level users
can read a file into the editor from a specified directory on the
system's hard disk, and write files to the hard disk from the editor. The
command "/g filename" will get (read) a text file into the editor
buffer. Remember that the editor buffer only has a 8000 character
limit. Exceeding this limit will truncate the file being retrieved.

P [name]

(SYSOP only) The command "/p filename" will put (write) a text file
from the editor buffer to the system hard disk.

FALKEN Full Screen Editor

The J command invokes the FALKEN full screen text editor. To
use this editor you must be supporting ANSI graphics
within your terminal program.

This is a basic full-screen editor, when invoked the editor is normally
in 'INSERT MODE', meaning that whatever characters you type will be
inserted into the text, pushing any characters that lie to the right
of the cursor right one position. Use the arrow keys on your keyboard
to move around on the screen.

To enter COMMAND MODE press CTRL-K. The following menu bar will be

COMMANDS: [ESC]=Ins-Mode [F]ind [T]op [U]pload [D]el
[S]ave [Q]uit [H]elp

To see the help screen, press 'h'.

The following commands are available while using the FALKEN full screen


Go to beginning of line


Go to end of line


Delete character under cursor


Delete the current line


Return to INSERT mode

^K d

delete characters/words/lines

^K r

Redraw Screen

^K j

Combine 2 lines

^K u

ASCII Text Upload

^K h

Help Screen

^K t

Go to TOP of buffer

^K b

Go to BOTTOM of buffer

^K q

Quit without saving

^K s

Save text and exit

^K f

Find text


Undelete (paste) line


move Forward 12 lines


move Back 12 lines

Cursor movement is controlled with the ARROW keys. Your computer
must be in ANSI emulation to send the correct codes for these keys.


The MAIN MENU is the major branching point to all areas
of the system. This section of the documentation will give you a
brief overview of each of these subsystems. For
more detailed information, please refer to the respective sections
within this manual.

The basic Main Menu, as shipped with FALKEN, appears
as follows:


FALKEN's Private Electronic Mail system is an independent private
message base. Although you can send Email to a
user from the Public Message Base, there
is no other logical connection between the two subsystems. Seperate
database and index records are maintained for both. The system was
designed this way to allow for separate maintenance functions and
to ensure complete privacy on those systems where the sysop wishes
to provide a higher degree of protection for proprietary information.

Email Functions

To read mail addressed to you, type "R" at the email

To read only the NEW mail in your mailbox, enter "RN" at the email

After each message has been displayed you will be given the option
to Delete that message, Forward it to another user, Reply to the sender,
or eXit back to the Email menu. If you just press
J you will go to the next message (if there is one),
without deleting the message you just read. Typing A at this prompt
will redisplay the letter.

Send Mail

To send mail to another user you must know their system name. If
you are unsure, you can browse the User List (.userlist command). Enter
"S" from the Email menu then answer the prompt
to indicate to whom the message is to be sent. You will see a message
verifying the name of the user to whom you are sending mail. Once
completed and saved you will not be able to edit the message, so be
sure everything is acceptable before saving.

File Attach

You will also have the option of attaching a file to your private
mail. After entering the user's name and a subject line, you will
recieve a prompt for whether or not you wish to attach a file. If
you enter YES the system will place you in the file send mode for
the transfer. Once the file has been transfered successfully, you
will be placed in the editor to write your message. When the Email is read by the recipient, he or she will be given notice
that a file has been attached and is ready for downloading.

Delivery Status

To check the delivery status of mail you have sent select "D" from
the Email menu. You will be prompted to enter
the name of the user you have sent mail to. If the message has not
been read by the recipient, the entire message will be displayed and
you will be given the option to Delete this letter or Copy it to another
user. You can use the Copy feature to easily send a single message
to multiple users.

List Mail Waiting

You can list the mail in your mailbox with the 'L' command. Letters
in your mailbox will be numbered 1-x. To start reading at a particular
letter, type 'r ?' where ? is the message number.

Mailing Lists

You can create or update a mailing list with
the "M" command. The Mailing List Option allows you to create a special
group of users for which you would like to send mail to on a frequent
basis. You can View, Change, Add, and Delete these mailing lists
as required. To send a letter to everyone on a particular mailing
list, type "s" then enter the mailing list name prefixed with the
"@" symbol. When the message is saved it will be sent to those users
in the specified mailing list.


When a user selects the "Feedback" option from the MAIN MENU they are placed into the system editor so that they
may write a private message to the System Operator (sysop). The feedback
will be delivered to the system operator via the normal EMAIL
function. The system references the sysop account
as specified in the BBSCFG setup.


Bulletins are typically used by the sysop to place important system
information such as system rules and policies. These bulletins
can be marked as "MUST READ" bulletins
for new callers to force them to read this information prior to accessing
other areas of the system. Although bulletins
can be modified easily and frequently using the FALKEN editor (or
for larger files an offline word processor) you may find it more practical
to use bulletins for information that changes

FALKEN will accommodate up to 32 bulletins each
having its own flag in BBSCFG to indicate whether
it is to be a "must read" or not. Each bulletin
will be displayed as a "new" bulletin to a user
if it has been updated since the last time the bulletins
area has been accessed by that user. The system updates the users
account status upon entering the Bulletins area
and uses this date stamp to compare with the date the bulletins were
last modified. Once a user exits the Bulletins
area all existing bulletins will no longer be displayed as "new" whether
or not the user actually read them. To force a user to display a
bulletin use the BBSCFG
"must read" flag.


FALKEN's teleconference is where users can congregate for real-time
chatting. There are numerous unique features available to provide
both entertainment as well as functionality to support many uses.

Certain commands apply to the teleconference
area. All commands in this area must be preceded by a period "."
to distinguish them from a broadcast message. Whenever a "." is found
in the first column, a command is assumed.



In the examples that follow, [ ] denotes required parameters,
while { } denotes optional parameters.


Shows all active conferences, subjects, and members.


Allows you to see messages you type as they are seen by others in
the teleconference when sent.


Default setting. Your messages will not be echoed back to you when
sent to the teleconference.


Shows your current teleconference status.

.MAKE [conference name]

Creates a new conference with the given name, and places you in it. If
no subject is given, "general" is used.

.JOIN [conference name]

Places you in the named conference, unless it is private.


If you are in the "open" conference, you exit the teleconference area
and return to the main menu. If you are in any conference
except the "open" conference, you are placed in the "open" teleconference. When
the last person has left a non-permanent conference, the conference
is removed from the system.


declares the conference you are in "private". No one else may join
it unless you issue the .INVITE [handle] command.


declares the conference you are in "public". Others may join it.

.INVITE [handle]

allows "handle" to join your private conference.

.SAYTO [handle] [message]

send a private message to another user. If the other user is in
the teleconference area he/she will receive the message, even if the
user is in a different conference, whether private or public. No one
else will see the message.

.PAGE [handle]

pages the specified user to the teleconference area (except when that
user is in the process of transferring a program file).

.SUBJECT [subject]

changes the subject field for your conference as it appears in the
st command (limit to 40 characters).


return to main menu from the OPEN conference or any other
private or public conferences.

.POST [message]

allows users to leave one line (70 character) messages on the teleconference
"chalkboard". The chalkboard can hold up to 20 messages before the
oldest message will scroll off to make room for a new message.


allows users to view messages on the FALKEN "chalkboard".


views messages and displays name of user
who posted it.

.ERASE [message#]

Erases the chalkboard message number
indicated (Sysop can erase any message while other users can only
erase messages they posted).


for the chalkboard, allows sysop to erase the whole chalkboard.


allows a user to 'buffer' input, where all input is stored in a text
buffer for subsequent transmission to the teleconference.


transmits the contents of the text buffer to all users of the conference,
allowing multi-line messages to be sent.


cancels the effects of a previous .BUFFER command.

/[user] [message]

Shortcut command to send private message to specified user. Subsequent
messages to the same user can be entered as "// [message]".

// [message]

Sends the private message to the user on the line that was implied
by the last /[user] command. If that user logs off the system and
another logs on to the same line then message will be sent to user
that is currently logged onto that line.


changes you to a different channel within the tlcf. Channels are
in addition to the separate conferences, and they span conferences. You
can send messages to all the people that are on the same channel with
you by typing a single quote (') as the first character of the message
( as in 'hello to all on this channel).

.channel 90 switches you to channel 90

Advanced Features


this is a SYSOP command that makes the current
conference permanent. Usually, conferences created with the .MAKE
command disappear when the last user leaves it. This command causes
the conference to remain active even if no users are in it.


This SYSOP command removes the effects of
a previous .PERM command, allowing the conference to disappear when
the last user leaves.


There are 64 available libraries each having 20 sub-categories. The
libraries are configured in the BBSCFG
setup utility.

Options available at the Software Library Menu are:


List available files

a <>

Verbose description of a file

t <>

Tag a file(s) for download


Upload a file(s)


Show list of tagged files


Download tagged files


Sysop Functions


Return to main menu

Software Library Menu Commands


List available files. You will be asked which library(s) you
wish the search to include. Once the library has been selected, you
will be prompted for a keyword to look for, and for how many days
back to look for files. A short, one line listing of the file information
will be displayed.

If you answer "n" (for new files) when asked how many days back to
search, FALKEN will limit the search to those files placed into downloads
since the last time you logged on.

Available file libraries (example) :

1. Falken 2. Falken Doors

3. Programming 4. Falken Utilities

5. Falken Upgrades 6. Miscellaneous

Enter new library selections, separated by spaces, or
Enter ALL to search all libraries.


<> Verbose file description. Provides the full (verbose)
description of each file along with the user who uploaded the file,
date of last download, and the total number of times the file has
been downloaded.


<> Transfer file. Marks the file for batch or singular


Upload a file. This command will prompt the user for the name
of the file to be sent to the BBS. After entering the file name,
the user is placed into the system's editor to allow for a brief description
to be written. Once this description is saved, the file transfer
protocol selected will be initiated and the user will be requested
to begin the transfer from their end.


List tagged files. This command will display a list of files
presently tagged for downloading.


Download tagged files. This command tells the system that
the user wishs to receive the files that have been tagged. The system
will prompt the user for the transfer protocol to use during the transfer,
then prompt him or her to enter file receive mode on their computer.


Exit back to main menu.


Message Base Menu

When you enter the message base, you can
press J to obtain a list of the active
folders. From the Message Base Menu you have the following options:


Skip folder # when searching for new messages. This folder will always
be skipped unless you later Unskip it.


Unskip folder #.


By selecting a folder number you will be
taken directly to that folder.


Reads all NEW messages in each (unskipped) folder.


Post a message. The system will prompt you
for a message folder.


Post a message anonymously
(if allowed in BBSCFG).


Displays Message Base information.


Quits to FALKEN Main Menu.

Message Folder Menu

When you enter the folder of your choice,
you are presented with the Message Folder menu. From there you can
scan message subjects, read messages, post messages, cancel or edit
messages and responses you posted, or exit back to the Message Base
or Main Menu. The "new" option on the scan and read
commands (SN or RN) allows you to single out messages which were posted
or responded to since the last time you accessed the folder. The
read command also allows you to specify a particular message number
to start reading from (R#x where x is the message number). To edit
or cancel a message, include #xRn after the command, i.e. C#3R1 to
cancel message number 3 Response 1. The original message is response
0, with actual responses numbered 1-31.

Reading Messages

When reading messages, you will be shown the message, then the
responses. After each response you may enter:


to exit back to the Message base menu


to advance to the next message


to skip this rest of the responses to this message


to add a response to the message immediately


to skip to the next NEW response


to back up "n" responses, to re-read a response


to send a private message, via email, to the author
of the response


to cancel a message you've posted


read the next response

When all responses have been read, you may enter:


to respond to the message


to exit to the message base menu


to send a private response to the user that posted the message


read the next message.

If you press J while a message or response is printing, the
output buffer for your line is cleared, and all buffered text is discarded. The
next response is then displayed. If there are no more responses,
you are allowed to respond to the message. You may add a response
to a message at any time when you are viewing the message or its list
of responses. Entering "R" to the "Next Response" prompt will allow
you to add a response to the response list, and then continue through
the rest of the responses.

You can leave a private response to the originator of the last response
by replying with a "P". To send a private reply to anyone other than
the originator, reply with "P handle.

When posting a new message, you will be asked to provide a subject. Limit
the subject description to under 40 characters.


Many of the commands found in teleconference
can be used at almost any system prompt no matter where you are on
the system (one exception is when executing a door program). These
command are called GLOBAL commands and will execute
the same way as if you were in the teleconference subsystem. Once
the command has been executed by the system you will return to the
system prompt the command was issued from (unless you have selected
to logoff).


shows who is logged on and where they are on the system.

.USER [name]

displays the information file provided by the user indicated. You
may also enter the user's handle.

.USERLIST [starting point]

displays a list of known users. If no starting point is given, the
list starts at the beginning, in alphabetical order. If you give
a starting point, such as a name or even just a letter, the list starts
at that point.

.LASTLOGON [handle]

Displays the last 2 times the user logged on the system.


displays date and time.


turns ANSI on.


turns off ANSI and RIP graphics from the BBS.


turns on RIP graphics.


turns off RIP graphics.

.SEND [handle] [message]

sends a message to any user, even if the user is not in teleconference
at the time. This command would allow a sysop
to send instructions or information to any online user.


Will log you off the system bypassing any further menus.



UPGR is started on-line as a normal FALKEN door. If you
specify a parameter after UPGR on the command line, that
parameter will be used as a password to prevent unauthorized
entry. i.e. "upgrdoor pswrd" would cause upgrdoor
to have a password, namely "pswrd". When a user
starts upgrdoor, it will prompt for this password.

Upgr allows you to upgrade a user while online. It allows
searches by Handle, Real name, access level, and accounts that will
expire soon. Once an account has been located,
you may set permissions on the account, delete the account, or Skip
that account and go to the next.

Changing permissions is accomplished by referencing a set of 'canned'
permissions contained in the file 'upgrdoor.dat'. This
file contains up to 10 'canned' permission settings. These settings
include read/post flags for message base,
upload flags, download flags, general access flags, timer level (0-5),
and the number of days to add to the user's 'expiration
date'. See the file for examples. Each 'canned' permission setting
is assigned a name in upgrdoor.dat. To assign one of
these canned permissions to an account, simply enter the number associated
with the permission name.


This offline utility was briefly described in the "Customizing"
section of this document. It is used to create the system menus and
text screens for the BBS. In general you may edit the file MESSAGES.MSG, to customize the menus
and text screens in any way you wish, as long as each entry is not
longer than 4000 characters.


As the database files are used, they will grow very large. This is
due to the fact that unused space from deleted data records is not
reused. To reduce the size of the database files, and to check the
databases for consistency, you should run PACKFILE once
per day. PACKFILE will process each of the 5 database
files, compressing them to eliminate unused space between records,
and verifying that the index files have not been damaged in some way. Also,
USERBIO and EMAIL records are deleted if no ACCOUNT
record is found for the user.

Packfile verifies records as it compresses the files. Any
records which do not read correctly are deleted. Likewise, email
and user biography records for users whose accounts no longer exist
are deleted.

Just typing PACKFILE will pack all files. To pack any
file, enter the appropriate letter(s) on the command line:


account file


message base file




download database


user bios file

You can pack multiple files by putting several letters on the command
line, separated by spaces:



There are 2 utilities to help you maintain your download
section. The first is DLREAD.EXE which reads the download
database and prints the download list to your screen and to a disk
file. The file it creates is named DLOAD.DMP . This
provides you with a text file suitable for editing, or any other use.
It is usually a good idea to have a current list of your downloads
available for people to download and view offline.

The second utility is DLOADADD.EXE which
reads a text file and creates database entries. This is pretty much
the opposite of the function performed by DLREAD. DLOAD.DMP
is written in a format acceptable to DLOADADD, so you
can simply edit DLOAD.DMP and make any changes or additions
that you like, then rebuild the database file with DLOADADD.
When you run DLOADADD you are asked to supply the name
of the text file that contains the text entries.

If an entry already exists that matches the file name, category, and
library number of the record to be added, the existing record is overwritten,
otherwise the new record is added to the file.

The format for text entries to be processed by DLOADADD
is listed below. Each entry consists of at least 2 lines. The first
line has 8 fields which may be separated by commas or tabs. The fields


File Library number (1-64)


File Category within library (1-20)


The file name, with extension


The file size


The date the file was created, in MM/DD/YY format


How many times the file has been downloaded


The date the file was last downloaded


The name of the user who uploaded the file. This field
may also be used to specify the exact path to the file. This is particularly
useful when using CD-ROM
drives where files may be spread across dozens of subdirectories. If
the first character of this field is '@', then the rest of the field
is interpreted as the path to the file, i.e. @F:\120A\


[optional] Password.

The next 1-15 lines contain the file description. The file description
is terminated by a line of at least 10 equal signs ( ========== )
starting in column 1.

Below are 3 file listings acceptable to DLOADADD.EXE. Note
that there are no blank lines between entries, and each entry ends
with a line of at least 10 equal signs. The first line of each entry
uses commas to separate the 8 fields.

The first listing goes into Library 0 Category 0

The second listing goes into Library 1 Category 0, and has the password 'HELLO'

The third listing goes into Library 2 Category 3, and is located in
the directory specified, F:\UTILITY\


This is a set of text files that describe how to write
DOORS programs for the FALKEN BBS. The interfaces between the doors
programs is the BBS program is described, and sample programs are
included to demonstrate the processes required for successful communication
between tasks. Unarchive with ARC or PKUNPAK.



Captain Comic - a shareware game for IBM computers
with EGA graphics. This is a pretty good arcade-style game. Worth
the time to d/l it!


(NOTE: The trailing \ must be present!) This
program analyzes your writing style for you.



This file will allow you to read email sent to
any user. We like to think that email is private;
however, you are responsible for everything on your computer. If
illegal activity is performed on your computer you may be held liable. This
utility gives you the ability to monitor everything that
happens on your system. Use this ability wisely. To send the mail
to a file, type "EMREAD filename".


If your email file gets corrupted, it may be possible
to salvage it by rebuilding the indexes. The EMIDX program
does that for you. It will rebuild the EMAIL.IDX file from the contents
of the EMAIL.DAT file.


This is a very important utility. Using this utility,
you can extract information from the account file to be used in a
database program, or printed for your information, or whatever. You
are allowed to specify which fields are reported, and how the fields
are separated. The fields for each record are all put on a single
line, and you can separate with spaces, commas, or tabs. Using tabs
to separate fields is a very common way to import data into database
programs, so this is a convenient way to handle billing and user statistics.

You are given the option of zeroing each user's current connect time
and current time-in-tlcf (can be monthly totals). These options are
provided for various billing options, where you may wish to charge
a connect fee, or a premium for tlcf access. The Total Connect and
Total Time-in-tlcf is not affected.



This utility
will reinitialize current database files, permanently destroying all
records. DO NOT USE this utility if working database files currently

Use this utility to create your database files (account,
email, dload, userbio, msgbase) before running the system for the
first time, or to recreate any of the files should they become corrupted
and unusable. The program will ask you whether to create each file,
and you must enter "y" or "n" to create or not create each file.


The bulletin text is contained in a simple ASCII
file with the bulletin's title placed in the
very first line of the text and the bulletin
text on subsequent lines. Bulletins will automatically
pause after 24 lines of output are displayed, so you can make the
bulletins as long as you like.

To create your first bulletin logon to your
system and enter the FALKEN editor from anywhere on the system (Feedback,
E- Mail, etc.). Type in a sample bulletin title
on the first line (line 0). On subsequent lines enter some sample
text. Now use the /PUT command to save this bulletin
as BULLETIN.1 (i.e. /PUT BULLETIN.1). The bulletin
will be written into your FALKEN directory and can now be displayed
in the Bulletins area. Other bulletin files must be saved as BULLETIN.2,
BULLETIN.3, etc. (up to 32).

Marking a Bulletin as "MUST

Run BBSCFG and enter General Setup. There is
a 'must- read' flag for each bulletin
(1-32). If the corresponding flag is set to 1, and the bulletin file has been created or modified since the users
last call, then the user MUST read that bulletin
before they are allowed access to TLCF, Message
Base, Files, or Email. To turn off the MUST READ
feature for a specific bulletin change
the flag back to 0.

Bulletin Source Code

The C source code for the bulletins program
is included in the FALKEN distribution disks, so that sysops who know
how to program in C may make local modifications.


The DIALOUT door is used to dial out on one of your lines
while the BBS is online. Set up a menu entry in BBSCFG
like this :

Keys Function Cost

dial_ dialout passwd__________ 0

When a user enters "dial" at the correct menu, the dialout
door will be executed. The command line parameter, "passwd" in this
case, is a password. The user will be asked to supply
the password before dialout will work.

Once the user has correctly supplied the password,
dialout will check all the lines on the system, and display
a list of the idle lines. You may then choose one of these lines
to dial out on. When you make the selection, dialout takes
control of that line. From that point on, all your keystrokes are
transmitted to the line, and all incoming characters from that line
are transmitted to you.

Typing 3 tildes (~~~) will invoke a small command menu. From that
menu you can exit the program, or select a NETWORK
mode for linking FALKEN systems.


Writing doors for FALKEN, or converting existing doors
programs to run well under FALKEN is easy and straightforward. A
FALKEN API is available with full documentation for writing programs
in C for FALKEN. For more information, download the door writers
information file (DOORINFO.ZIP) from our support BBS.



Select option "Z" from the Main Menu and supply the correct
password (specified in BBSCFG),
and you will call up the online system operators menu.


The following options are available at the System Level Menu:

[K]ill a user

[D]isplay user info

[E]dit user info

[L] Turn Log File Off

[crashit] reboots computer

[DOS] execute FALKENs DOS gateway. This is an external program called
CMDPROC.EXE. This is the same program that is executed when you press
F5 at the local keyboard, except in this case it is run as a

[enter] to return to main menu

FALKEN Command Interpreter (DOS Interface)

The FALKEN Command Interpreter
(FCI) provides you with a subset of DOS commands which
work online. When you run FCI,
you will see a prompt similar to the DOS prompt, with the current
directory shown at the left column. Type "HELP" at the FCI prompt
to see a list of available commands. In brief, you are given the
following commands:


directory list similar to DOS


copy files, similar to DOS


delete files, similar to DOS


remove directory


make directory


find a file (searches the entire disk drive)


display a text file on the screen, with page breaks


display any file on the screen, in both ascii and hex format


.KILL [line number]

Will hangup on the selected user very abruptly. .KILL # Will hangup
the selected line number and reset the modem. This command
also serves to reset a hung modem remotely.

.EXTEND [handle]

Provides the selected user with an additional 30 minutes of time on
the system to avoid auto-logoff. Repeated use will have a cumulative
effect. If the command is issued three times in succession for a
selected user 90 minutes will be added.

.CHAT [handle]

Allows the Sysop and the selected user to enter a private
chat mode where all inputs between the sysop and the user are handled
privately. Hit the ESC key to exit and return the user to where he
was prior to going in to chat.

.YANK [handle]

Places a user into the Sysop's chat area. The user
will not be able to exit the chat area until you issue the .UNFIX

.UNFIX [handle]

Allows user to exit who has been .YANKed into the Sysop's
chat area.

.GAG [handle]

This sysop command will silence a user by
not permitting then to enter text into the teleconference. The
user will still be able to receive other user messages.

.NOTE [text]

Allows the sysop to record a text note about
any subject. The text is saved in a file SYSNOTES.TXT for later review. This
function is handy to record information about users or system function
requiring attention at a later time.



This command will erase all messages from the teleconference chalkboard.

.FIX [handle]

Locks the user into the Chat area until the .NOFIX command is entered.

.REMOVE [handle]

Takes a user out of teleconference and places them at the main menu.

.ALLOW [handle]

Permits a user to enter the teleconference even though his account
access control flag does not. Once he exits the teleconference he
will not be able to return.


File Libraries Command for Sysops

For those who have SYSOP or SUBOP privileges several other choices are presented at
this menu. You may do a directory list of either the UPLOAD or DOWNLOAD
directory. You may delete files from either directory. You may save
files (move from uploads to downloads).

When you SAVE a file, you are asked for the file name in the upload
directory, and what file name to save it as. You are also asked who
uploaded it, and you are asked to supply
a password. If you just press return, no
password is assigned, and none is needed
to access the file. If you enter a password,
then the file cannot be downloaded until the user provides the password.

You may move files from one library to another, or to a different
category within the same file library. To
do this, enter "M filename". FALKEN will prompt you for the library
to move the file to, and the category into which the file should be

You may also perform a directory list of the download directory ('W'),
or the upload directory ('Y'). You can delete files from the download
library ('D filename') or from the upload directory ('Z filename'). You
can also move a file from one download library/category to another
('M filename').


There are times when you, as a sysop,
need to log into the BBS to perform maintenance
activities without being visible to other users, to avoid .sends,
etc. FALKEN allows you to do this. When prompted for your account
name, put a '!' in front of your name, as in :

Please enter your account name : !herb

Stealth logins are visible to sysops, but not to normal users. Once you are logged on
in stealth mode, the command .NOSTEALTH will return
you to a normal login. You can enter stealth mode
from a normal login by typing .STEALTH. This feature can be enabled
for other users by setting the "allow" flag for stealth in their user
account record.


Account maintenance can best be performed from the system console. Press
F2 for system utilities, then press F1 for
Account Edit. To find a particular account, use the F7 key
after entering the user's system name in the proper field. Make whatever
changes you like, then use the F5 key to save the changes. F10
will quit back to the main screen.

If you change the account name, then save, a NEW account will be created
with that name. If you truly wished to change an account name, you can go
back and DELETE the original account.

Use the F9 key to DELETE an account.

At the Account Edit screen, various editing functions are available,
including Delete to end, Restore
Field, and Restore ALL Fields. Follow the menu on the bottom of the
screen, and you should have no problems.

If you accidently delete an account, IT IS GONE, WITH NO RECOVERY
POSSIBLE! Make sure you have backups of the account files
and other important system files before you start making changes!

To find an account that you wish to view or change, type the user's
name or partial name in the 'Account Name' field, and press F7. The
account will be displayed, or, if that account is not found, the account
whose name comes next in the file (alphabetically) from the name entered
will be displayed.


You should perform a backup once per day. Use several tapes or sets
of disks, and rotate them, so that at any one time you have at least
2 backups that you know are good. At a minimum use the
XCOPY DOS command to make copies of the system dynamic files (accounts,
Email, message, etc.) onto a floppy for safe keeping. This would
protect you if your hard disk were to fail. See your DOS manual for
information on using the XCOPY command.

All important information, such as user account records, private mail,
message indexes, etc. are kept in indexed database files. These
files include:


ACCOUNT records indexes.


actual ACCOUNT records.


EMAIL records indexes.


actual EMAIL records.


MESSAGE folder indexes.


MESSAGE folder records.


DOWNLOAD records indexes.


actual DOWNLOAD records.


user BIO file indexes.


user BIO records.

The BTREE functions of the C/Database Toolbox, from MIX Software,
are used to maintain the database files.



FALKEN keeps track of the last 20 callers and the number of calls
in a file called CALLCNT.BBS. It will report what
caller number you are upon login. It will report the last 20 callers
even after restarting the software.


Every character received from the line goes through a filter, or translation
table. This table contains all 256 possible 8-bit codes, and a translation
value for each one. Normally, all printable ASCII characters (32
to 127, plus CR and Backspace) are translated as themselves, while
all other characters translate to a NULL, and do not pass through,
thus preventing someone from using strange codes to adversely affect
your system. During binary file transfers, this filter is not used. You
have the ability to change ANY translation value in this table, by
specifying the new translation in this file.

EXAMPLE: Enabling the BELL in Teleconference. Normally,
the BELL (CTRL-G, or ASCII 7) gets filtered out by the software, preventing
someone from sending "beeps" to others in the teleconference, or imbedding
them in messages. You can override this setting by entering this
line in the XLATE.DAT file:

007 : 007

Which tells the system to translate the 7 to a 7, thereby allowing
the BELL to pass through intact. Or you can translate the BELL to
something else, like this:

007 : 042

Which would cause the BELL to be translated to an asterisk.

When someone types a CTRL-G for a bell, other users would see an asterisk!
If you wish to allow your users to enter ANSI screen
control for their messages, you must have the following line in the

027 : 027

This allows the Escape character to pass through.


FALKEN BBS: 703-749-2889

If you require helpful guidance in setting up or operating your FALKEN
BBS please use our user support voice number (703-803-8431) or call
the support BBS at 703-749-2889. Leaving a message with an explanation
of what assistance you need and a good time for us to return your
call will get the fastest results. System updates can be downloaded
from this system. Leave a message to the SYSOP to obtain the password
for the Update Library.

Voice Support Line: 703-803-8431

For situations where you need more immediate assistance please call
our voice support line at 703-803-8431 and explain the nature of your
problem. We will have the appropriate person call you back as soon
as possible.

Standard Support Schedule

FREE support is provided for the first 4 months after purchase and
includes all software updates distributed during this period. By
that time you should have become familiar with the system. However,
if you would like to continue to receive additional support you may
purchase Extended Support from INFO*SHARE. We would recommend this
service to those of you who wish to continue to receive FALKEN BBS
updates as they become available and need a high level of support
for a system that is operating as a profit making business. The
payment schedule is as follows:

Extended Support Schedule

2-64 Line Systems .......... $60.00 per year

Comments and Suggestions

And finally, If you've found some errors or inconsistencies with this
Operators Manual, please make a note of them and provide these inputs
to us as if you had found a problem with the software. Your comments
and suggestions are always appreciated.