ßßßßßß ßßßßß ßßßßßßß ßßß ßß ßßßßßßß ßßßßßßßß ßß ßß ßß ßß ßßßß ßß ßß ßß ßß ßßß ßßßßß ßß ßß ßß ßßßßß ßß ßß ßß ßß ßß ßß ßßßß ßß ßß ßßßßßß ßßßßß ßßßßßßß ßß ßßß ßßßßßßß ßß ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ» ºVol 2 This Month's Features of IceNEWS Issue 1º º Feb ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 1993 º º º º 1. Software Piracy, The Law & Sysop Responsibilities. º º º º By: Don Christopher Kassay ................ 1 @9952 º º º º 2. How to be a Good Cosysop - by Louie............6 @1 º º º º 3. Mod of the Month - WFC_Screen - by Odin....... 1 @7664 º º º º 4. Rusty 'n Edie's BBS Busted for Software Piracy. º º º º From Master Mechanic....................... 1 @6461 º º º º This Month's Editors: Louie 6 @1 and Zeus 2 @7664 º ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ ÖÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ· º º º 1. Software Piracy, the Law, and Sysops Responsibilities - Part 2 of 2 º º ------------------------------------------------------------------- º º By: Don Christopher Kassay º Ç º ÓÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄĽ Since last month's article pertained to Software Piracy and the Law, this month's article will focus mainly on Sysops and their responsibilities in operating an Electronic Bulletin Board (BBS). Introduction ============ Since the introduction of the first computer in the 1950's. We have been striving to develop a symbiosis between ourselves and the enigmatic computer. From its embryonic stage to present day, the computer has presented us with numerous opportunities and ever-expanding ingenious methods for doing things. However, nowhere else has this technological marvel made greater impact in our lives than in the area of communication. In times past, computer-based communications were typically performed by experienced programmers or very dedicated computer hobbyists who had both the knowledge and tenacity to forge ahead. Today, microcomputers are in the hands of non-experts; ordinary people, who do not possess the knowledge or understanding of the total scope and potential represented by the very machine they use for business and fun. Many of these people take great pleasure in communicating with others through their computers, and they do so readily and frequently, often completely unaware of the underlying legal consequences involved... This is why it is SO important that the OWNER/OPERATORS (hereinafter referred to as SYSOP(s)) of Electronic Bulletin Boards (hereinafter referred to as BBS System) be very cautious and concerned in how they operate their respective BBS Systems.. Most Sysops have very little knowledge regarding the LAWS governing Electronic Communications; in this case BBS Systems. Most Sysops do not realize that their BBS System, in its entity, is, indeed, an information system and as a result, The Sysop(s) is also in the "Construction Business", i.e. they build their framework and foundation from which his/her BBS System operates. A Sysop must recognize that ALL components of his BBS System are necessary and MUST perform as intended. A Sysop inspects the results, and makes adjustments accordingly. The Control mechanism represents the entire Legal, Social and Economic Environment under which the system performs. In the following article, I hope to help Sysops understand what their ROLE is in operating a BBS System. However many of the aspects are beyond the scope of this document. As a result, we shall examine the 'Legal Aspects' ONLY. The first of these involves a brief summary describing the methods by which users access the 'Information Center'. First, what is a Sysop; sometimes referred to as a System Operator..? A Sysop is: 1. An information Broker; 2. A Data Center Manager, and 3. An Information Resource Manager Well, I can hear it now..."I only started my BBS System for FUN"...Well it does NOT work that way..When you started your "BBS System for FUN" you also got the FCC involved (You are using telephone lines for communicating) and there are state and federal laws that YOU MUST abide by.. As an Information Broker, the Sysop obtains information from a variety of sources, stores it, and provides others access to it. He is responsible for updating the information and for maintaining the hardware and software needed for its storage and its access. As a Data Center Manager, the Sysop provides assurances to users that the information, along with the hardware and software used to store it and maintain it, are reliable, safe and secure. One aspect that CANNOT be ignored in his role as a Data Center Manager is that which necessitates his providing for the integrity of not only the service itself, but of all who access it. The Sysop provides a service, one that is expected to promote a healthy, constructive, legal environment may derive information and enjoyment. As an information Resource Manager, the Sysop has the underlying commitment to integrate his role of Information Broker with his role as Data Center Manager. This responsibility deals with the BBS in its totalilty, i.e. an information system that combines hardware, software, information, users, and Sysop into an integrated whole.. Sysop Responsibility To The General Public ========================================== When you started your BBS System, whether for FUN or PROFIT, and you advertised your BBS System either by word-of-mouth or through one of the numerous BBS Listings or Magazines, you were INVITING Patrons to call your BBS System. In a LEGAL sense, this invitation to participate in your BBS System may well be defined as an act by which the Sysop solicits or incites others to make use of his BBS System for the purpose he intends. An invitation may also include an inducement on the part of the Sysop to others that provide them with a reasonable belief of a least three (3) legal concepts; 1. The Attractive Nuisance Doctrine 2. The Nature of the Invitee (The person Invited) 3. Trespass Briefly put, Attractive Nuisance Doctrine deals with the perception of the BBS as being a source of danger or harm to CHILDREN. The Sysop, as an inviter, is under a LEGAL DUTY to take appropriate precautions to prevent injury or harm to the children who he knows can or will access his BBS System, or the children who will be attracted to access his BBS System. A Sysop SHOULD consider this doctrine if and when he invites others to visit by expressing or implying the availablity of "PORNOGRAPHY" or "ADULT-ONLY material available on his BBS System. Nature of Invitee ================= The LAW defines an invitee condition when the following conditions are met: 1. The visitor entered by invitation 2. The entry itself is connected with, in this instance, the BBS System or connected with what the Sysop permits to be conducted on his BBS; and, 3. Both the invitee and the Sysop derive a benefit, or, more importantly, just the Sysop derives a benefit from the invitation. Legal experts are in basic agreement that if and when the Sysop encourages others to access his BBS System, particularly if it is intended to further the Sysop's own purpose -- as both hobbyist - and business-type-systems tend to do, that the Sysop has exercised reasonable care to make the place safe and secure for all who visit.. Trespass ======== Trespass provides for some interesting implications. The courts have generally interpreted trepass to be an "unlawful interference with one's person, property, or rights." In view of a BBS System, trespass may be regarded as any unlawful act that damages the system itself, the reputation of the Sysop, or the reputation (or even the property i.e. computer system) of the USER. The unlawful act may include actual or implied violence, such that the result caused injury or harm to befall a person, a person's property, or a person's relative rights. Subscription ============ A second alternative involving access to a BBS System is the SUBSCRIPTION.. Many of the concepts involved in an invitation are also encountered in a subscription access, with some important differences. A subscription is a legal and binding contract. The Restatement of the Law of Contracts, Section 1, states that, "A contract is a promise or a set of promises for the breach of which the law gives remedy, or the performance of which the law in some way recognizes a duty." The contract may be an express contract, in which both the Sysop and User demonstrate their mutual agreement through words, which may be either written or spoken. In addition, the contract may be implied-in-fact, in which both the Sysop and the User demonstrate their mutual agreement based upon their conduct. In many instances, the act of inviting users to subscribe, i.e., pay for, a subscription to a BBS presents a clear intention on the part of the Sysop to contract. This is referred to as an "Invitation to Trade". This special type of invitation may be accepted in one of several ways. A common approach is referred to as the "Deposited-Acceptance-Rule". Under this rule, an offer is considered accepted the moment the user, for example, places his acceptance into the same or better channel of communication as used by the Sysop to place the offer. The offer is considered accepted as soon as the acceptance leaves control of the user. This may include mailing of a check, or the sending of a Feedback or E-mail message. License ======= A third, and final access alternative is the LICENSE. A LICENSE is defined as the permission by a "Competent Authority" for someone else to do something, which, without such permission, would be illegal, a trespass or a tort. This alternative is typical in many situations, though it may not be recognized as such. However, it is particularly appropriate in a Network configuration. Under the Network approach, a Sysop is granted "Permission" to access another BBS System directly, for the purpose defined by the "License-of-Access agreement". Such purposes typically include the exchange and transfer of mail and messages. The "License-of Access Agreement" usually contains a set of procedures or guidelines that define the boundaries and policies of the Network, and, in a sense, governs the manner in which the Network is operated and accessed in at least an administrative sense. Violations of this agreement by a "Licensee" may serve cause for the administrators of the Network (the Licensors) to seek various remedies. However, at least one area that is a bit unclear in a "License Agreement" for Network access is the issue of 'Liability', i.e. as pertains to the effects of 'Malfeasance' (the doing of a wrongful or illegal act) on the part of one Network NODE and the exposure of the other Network NODE(s). Some questions that have been brought to my attention and the attention of other attorneys are including Congress are: 1. Is the 'Liabiltiy' of one Node assumable by another Node? 2. Are there possible or potential class actions that the Network and Nodes are exposed to? 3. How does an identity relationship define the extent to which a Node may lose its unique identity and be classified as merely a member of an overall networked system? For example, how does the user perceive the Node's identity? Is it considered an individual BBS? Is it merely one area of contact, whereby one Node is merely an extension of the overall Network System? Or, something in between? In this regard, the Sysop's view and the User's view may not converge. In other words, is the Node truly a Node? Or is it merely an individual BBS System that happens to be temporarily "plugged into" a larger structure of configuration? And, of course, what is used to define that structure and/or configuration.. Mail and Messages ================= At this time in our discussion of computer law, we will talk about a subject that concerns most Sysops, and that is the 'responsibility of Sysops to manage their 'Information Data Bases', i.e. Electronic mail and messages. We shall examine this resource in a manner that is consistent with the Sysop being an 'Information Resource Manager', and that views the BBS System as a true information and communication medium. Not only is 'Electronic communications growing faster than the traditional media of "publication", but also this mode of delivery is bringing the press, journals, and books into the electronic world. One question raised by these changes is whether some social features are inherent in the electronic character of the emerging media. Are electromagnetic pulses simply an alternative conduit to delivery of whatever is wanted, or are there aspects of electronic technology that make it different from print -- more centralized or more decentralized, more banal or more profound, more private or more government dependent? The electronic transmission of the media occurs not in a vacuum, but in a specific historical and legal context. Freedom for communication has been one of our proudest traditions, but, just what is it that the courts will protect, and how does it differ from how the courts will act when the media through which ideas flow are computers? What images do policy makers (Legislation) have of how computers work? How far are these images valid? What will happen to these images when the facts change. In each of the three parts of communications system -- print, common carriers, and broadcasting, the law has rested on a perception of technology that is sometimes accurate, often inaccurate, and which changes as slowly as technology changes fast. Each new advance in the technology of communications disturbs a status quo. It meets resistance from those whose dominance it threatens. Initially, because it is new, the invention comes into use in a rather clumsy form. Technical laymen, such as judges and politicians, perceive the new technology in that early, clumsy form, which then becomes their image of its nature, possibilities, and use. The perception becomes an incubus on later understanding. The courts and regulatory agencies in our system enter as aribters of the conflicts among entrepreneurs, interest groups, and political organizations, all battling for control of the new technology. These arbiters, applying the familiar analogies from the past to their lay image of the new technology, creates a partly old, partly new structure of 'Rights and Obligations'. The legal system thus invented may in some instances be a 'tour de force' of political creativity, but in other instances is much less worthy. In many instances, the system thus created turns out to be inappropriate to the more habile forms of the technology that gradually emerge as technology progresses. Yet, within this context, and within the boundaries applicable to our BBS environment, two important legal issues are so ever present: 'Libel and Privacy' ================= These two topics could be written as a separate article by themselves, but they are important issues that are being discussed by law makers at this time, so I am going to briefly discuss each one. It is very difficult to keep this simple, because to understand 'Libel and Privacy', you must know what they mean in legal terms in order to understand how they you as a Sysop can be affected. The legal definition of 'Libel' is: A tort consisting of a false and malicious publication printed for the purpose of defaming one who is living (spoken defamation is called 'Slander'). In tort law, only a living person may be defamed: statutes in several states have made defamation of the dead a crime but no civil liability has been implied. Prosser & Keetton. Torts 795 (5th edition 1984). "Libel" includes "any unprivileged, false and malicious publication which by printing, writing, signs or pictures tends to expose a person to public scorn, hatred, contempt or ridicule...and also embraced therein is any such publication that relates to a person's office, trade, business, or employment, if the publication imputes to him or her some incapacity or lack of due qualifications to fill the position or some positive past misconduct which will injuriously affect him or her in it...252A. 2d 755, 722. (The truth of the published statement creates a valid defense to an action for libel). NOTE: The 'First Amendment' protects the press against certain 'Libel' unless actual malice is shown. Public officials i.e governor, president, judges, district attorney , and public figures i.e. entertainers, movie stars, etc. MUST prove that the published information is 'False' and that the defendant published it with reckless disregard for the truth. 376 U.S. 254 (public Officials). 388 U.S 130 (public figures) In contrast, the common law presumed that published information was false and forced the publisher to prove its truthfulness. The constitutional limitation does NOT apply to defamation by a 'Newspaper of private persons, where only some degree of fault on the part of the newspaper is required 418 U.S 323, 347 There is NO question that "Danger' of Libel Abuse exists, and that the BBS arena provides a forum that may be used to proliferate the potential for abuse. The New York Times rule arms the irresponsible as well as the responsible 'journalist' with a weapon of awesome power. The privilege of 'publishing' is constantly being expanded. Fair comment is becoming easier and easier to invoke. Malice is harder and harder to prove. Undoubtedly, some people misuse their power. Untruths can lead to personal injury; misstatements of facts do result in the adoption of unwise polices. Good people are sometimes maligned and bad people do sometimes prevail. Without question, writers, journalist, and Sysops who want to destroy a person may have a good chance of doing so and getting away with it. But, the trend toward freedom must be considered in proper legal context. From its beginnings, the law of defamation has evolved by the balancing of conflicting interests, the interest of the individual in the protection of his or her reputation, the interest in the writer in communicating facts and ideas to his or her readers, and the interest of the public in information. However, we are not homefree just because we may decide to erect a defense against libel. There is a growing trend in law that poses increasing dangers; the concept of 'Privacy'. Privacy ======= The legal definition of 'Privacy' is "The 'General Right to be left Alone'. 389 U.S 347; "The Right to Live Life from Unwarranted Publicity". 127 So. 2d 715, 716.A. "To be inherent in the concept of ordered liberty, including protection from governmental interference (in the areas of) intimate personal relationships or activities, freedoms of the individual to make fundamental choices involving himself, his family, and his relationship with others". 540 S.W. 2d 668, 679. "The right is NOT absolute and so does not apply to private conduct harmful to individual participants or to society". 533 F. Supp. 1121. It must be noted here that the Federal Constitution DOES NOT explicitly provide for this right, "zones of privacy may be created by specific Constitutional guarantees and impose limits upon governmental power". 424 U.S. 693, 712. These 'Zones' have been implied from the general thrust of the "Bill of Rights", 381 U.S 479, and specifically the 'First, Third, Fourth, Fifth, and Ninth Amendments, which cover a broad spectrum of areas from 'Abortion (subject to certain state regulations) 410 U.S 113, to counsel married persons concerning birth control, 381 U.S. 479, to possess or view 'Obscene' materials in the home, 413 U.S. 49, and to keep certain types of information private, 440 U.S. 301, 318. Invasion of ones privacy constitutes a tort for which remedies are available. The four different types of torts are: (1) appropriation, or the use of a person's name, picture, or likeness as a symbol for his or her identity without compensation; (2) an intrusion upon a person's physical solitude or seclusion; (3) the public disclosure of private facts; and (4) placing a person in a false light in the public eye by associating this person with beliefs or activities with which this person has NO connection. Prosser & Keeton Torts 117 (5 ed. 1984). Privacy of personal information is something that Sysops should be very concerned with because it could be a significant factor in determining how you change the operation of your BBS System. When it does, its effects will be felt throughout the BBS community. Because of the special nature of personal information, it may be looked upon as having a new status. The most important attribute of this new class of data is that it may no longer be fully under the Sysop(s) control. Underlying most of the privacy legislation is the realization that the individual has a proprietary interest in this information. You cannot unilaterally decide what to do with it. Society, and the law, are there, leaning over your shoulder, each and every time you access or use someone's personal information. Modern technology seems to be exhibiting all of the foibles that its detractors had hoped for. The result: a somewhat skeptical public. Users may have legitimate concern about the amount and quality of personal information you maintain in your system, and what you are doing with it. What seems to be more and more apparent is the reticence on the part of users to take part in an arrangement where they feel that the information collection process is infringing on their privacy. What happens if and when a user is dissatisfied with the way you are treating their information? You need to get personally involved, and unless you address the problem head on, you may end up fighting it out in "Court". A good point to remember is: "Every American Citizen has the 'Right' to express his ideas, his opinions and his sentiments. The content of those expressions is within the personal discretion and judgment of the individual, though it is NOT free from control. If the expressions are "Dangerous, Illegal, or offensive when they are made, then the person is subject to the consequences and the penalties imposed. Although the will of the individual to express himself is 'Free from Restraint', it is the abuse of that 'Free' will which is the object of the punishment. Information is 'Power'. The leverage provided by information can be demonstrated in many ways. Therefore, a simplistic rule is that the more information you have about someone, the more power you have over them. Of course, running contrary to this is the issue of privacy, often viewed as diminishing one's power. Adding this all up.! What it means is that more and more the individual is being perceived as a passive source of information for the automated system. With each new development or application put in place for the good of individuals will also come an assault on their person freedoms. All of this represents new challenges to our current concepts and controls of privacy. Here is a simple story to emphasize the point. Back in September of 1985, one of the major computer trade journals, 'Computer World', reported the following: In an effort to identify people who fail to file tax returns, the Internal Revenue Service is matching its files against available lists of names and addresses of U. S. Citizens who have purchased computers for home use. The IRS continues to seek out sources for such information. This information is matched against the IRS master file of taxpayers to see if those who have not filed can be identified. Individuals who purchase computers for home use, tend to represent a segment of the population that may be classified as middle - to upper-class. In addition, the IRS wishes to 'monitor' the deductions taken by these people. This plan raises a great deal of concern among privacy advocates who fear that this method of information-gathering, while perfectly legal, may dangerously increase IRS capabilities and put citizens in jeopardy of government investigations solely because of unverified life-style data suppled by third parties. As a Sysop, you maintain user files. Who is to say that the IRS will not approach you and somehow obtain your user-file data? What would you do? What may other, less scupulous Sysops do? Outside Forces That Affect How We Operate Our Computers ======================================================== At this point, I feel I MUST discuss an 'Outside Force' that has a great impact on how Sysops and computer owners operate their BBS System and Computers. This outside force is something that most of us NEVER consider, especially if we are operating our BBS System for FUN. The subject is TAXES and how they may impact the nature of your BBS, particularly if you are also a 'Shareware Author'. Beginning in the 1985 Tax year, the government began to tighten the screws on how we deduct the 'Use' of our computers. First, there were new tax laws that limited the eligibility of home computer owners to take deductions for their home systems, i.e. if a person operates a separate business from home, even if it is just a sideline to his regular job, he can still deduct all or part of the cost of the computer and supplies required to maintain and use it. But, deductions cannot be taken by employees who buy computers to do work they take home from the office, unless the computer is required by the employer. Computers and their associated expenses are precluded from ANY tax benefits for those people who operate their BBS as a HOBBY. The laws also cracks down on mixed business and personal use of home computers. If you fall into this category, you must keep a log of computing time spent on different activities. Logs may be kept either manually or by the computer. (I use a computer program for this purpose). However, you will have to certify in writing, that you are keeping a computer 'Log'. If you are audited, the IRS will request to examine your 'log'. If everything is NOT in proper order, your deductions could be disallowed and penalties may be imposed. One additional item regarding taxes that deserves attention -- that of sales taxes, particularly if you are a shareware author. When you sell your software, you may have to collect sales taxes from the buyers. There have been a lot of 'Legislation' on this subject the past couple of years concerning both sales and use taxes. State laws still vary a bit on whether to impose sales and use taxes on computer software and with many lawsuits been filed over the past couple of years and many still pending, it appears that 'Legislation' is leaning toward a more uniform treatment of the issue. I am keeping a close watch on the outcome since I am very involved in ALL aspects of computer law, and I strongly suggest if you are a 'Shareware Author' you consult a competent attorney, or the appropriate state agency to learn about the 'Rules and Regulations that exist and any 'Rules and Regulations pending in your own state. The Professional Sysop ====================== As stated previously, the ranks of the BBS System and the services it offers are expanding rapidly. Since a Sysop is a provider of computer services and products through his BBS System, he is perceived by many to be a computer professional, or at least some sort of computer specialist. As such, the Sysop needs to be familiar with the circumstances under which he could be exposed to 'Legal Liability' and how he may limit that exposure. For subscription Sysops and Shareware Authors, giving people their money back when they are dissatisfied with your product or your service may be a relatively minor concern. For all Sysops and authors, however, a much more potentially serious problem is the possibility of being forced to compensate a 'User' for losses or injuries. There are four (4) important legal conditions under which you might be considered liable for a 'Users' loss or injury. 1. Breach of warranty 2. Breach of contract 3. Ordinary negligence 4. Professional negligence (Malpractice) What is breach of warranty? A warranty is a promise that a fact or statement about a product will turn out to be true. Warranties are governed by the Uniform Commercial Code, adopted in all states except Louisiana. The UCC governed warranties apply only to the sale of goods, not to any provisions of services. How does breach of warranty affect you as a Sysop? If your are a shareware author, its implications are rather clear. However, many of the BBSers carry a "For Sale" Sub or Forum, where all sorts of products are offered to members of the public. Should you, by an express or implied statement, condone, sponsor or certify the validity of legitimacy of items posted in your 'For Sale Sub or Forum, you may share the liability along with the actual seller for 'Breach of Warranty'. Custom software may or may not fit under the UCC warranty, depending on how closely the transaction resembles a sale of packaged software and on the decisions of the courts of the particular state. There are different types of warranties, and they can lead to some serious liability issues. Warranties are either expressed or implied. Express warranties are promises made by the seller about the quality or characteristics of the product. For example, if you give a prospective customer a demonstration in which the program prepares a complete set of reports, or functions in a specific way, there is an express warranty that the copy of the software purchased by the customer will do the same. For an implied warranty to be created, it is unnecessary for the seller to make a promise. Under the UCC, every sale of goods creates an 'Implied Warranty' of merchantability. This warranty requires that the product performs as it would ordinarily be expected to perform. Another version of the implied warranty is the warranty of fitness for a particular purpose. This is created when a seller recommends a product as suitable for the buyers needs. When a warranty is breached, the buyer can take legal action against the seller. Should consequential damages be involved, they can be 'Quite High'. (Note: I will discuss disclaimers later, but it must be noted that in MOST states, a 'Disclaimer', particularly regarding software, may be preclude, i.e. may be disallowed regardless of their presentment). The second legal condition, under which a Sysop might be considered liable for any loss to a 'User', is the 'Breach of Contract'. When you are not selling a product, UCC Warranties do NOT apply. This legal theory is more applicable to subscription systems, but even 'Hobbyist Systems' may form the basis of a contract given that the four elements of a contract are present A. Offer of Acceptance B. Consideration C. Legal competency of the parties D. Legality of purpose If you are a Sysop, you should take care that your contracts 'do not' contain vague promises that could be used against you in a dispute. You should also provide a detailed description of what is expected from you and your users. If you have any doubts, these doubts need to be communicated. The third legal theory is ordinary negligence. Everyone needs to exercise reasonable care in his or her work. Careless mistakes can be the basis of a 'Lawsuit'. As long as you are reasonably careful in your role as a Sysop, chances are that mistakes or oversights will be forgiven. Last, but not least, is the legal theory of professional negligence, i.e. malpractice. If an injured party sues for professional negligence, the courts 'Will Not' be so forgiving if you are found to be professionally negligent. Generally speaking, advice given and activities performed by certain professionals regarding their field of specialty are subject to a high standard of care. Up to now, for the most part, computer specialist as professionals were not held to a professional standard of care because at least two necessary elements in defining a professional for malpractice purposes were missing: 1. The computer professionaal did not have a standardized, well-defined body of knowledge that all members must know. 2. Examination and licensing procedures were not available. Now however, these missing elements are beginning to appear as part of the computer professional's stock-in-trade. For example, there are organizations for shareware authors that claim to establish a standard of practice for members; some computer professionals have become "certified". Colleges and universities are establishing a more standardized curriculum for computer studies. All of this may not necessarily lead to actual licensing of all computer professionals, but it needs to be viewed as a step for creating a professional for 'Legal' purposes. Regardless, computer professionals do have a knowledge and skills that other people do not have. Customers, clients, and users often know little about computers, software, services and such. They tend to rely on the advice of the computer specialist. Under such circumstances, the courts may begin to impose 'Malpractice Liability' upon the computer professional. At the very least, all Sysops should be prepared to held to a higher standard of care in their efforts than the ordinary person. This view is suggested because it appears that the courts will 'Expand' the conditions of liability in the 'Electronic Arena' in the very near future. I am personally monitoring the actions of 'Legislation' at this time regarding this possible and now probable expansion. Quality Control =============== The best way to avoid 'Legal Liability' is to make sure that nothing goes wrong in the first place. If you claim to maintain the "Privacy of Private Messages and User Data", you had better do just that. If you claim to monitor all conferences for inappropriate or illegal communications (POSTS), you may need to be able to demonstrate that is exactly what you do. If you claim, either expressly or implied or by implication, that you test all programs uploaded to your BBS System, you need to 'Make Sure' that you do so. If you claim to verify the authenticity of all your users, then it is something that you should do. You will not have to worry about 'Lawsuits' if there are no problems with what you do or with what you promise or imply that you do. Promises ======== One important rule to follow is 'Do Not' make promises that you cannot or will not keep. If you make a statement about results or conditions, it could be interpreted as a contractual obligation, or if it involves a product, you may be held bound by express or implied statements that you may not have really intended to make. Disclosure ========== Disclose necessary information. There is little else that 'Angers' the courts more than a situation where an informed person (Sysop) has taken unfair advantage of an uninformed person (User). You may be held accountable for not only malpractice but also for 'Fraud'. Disclaimers =========== Disclaimers on BBS Systems have been debated for many years by Sysops as to their significant purposes. I am going to hopefully settle that dispute right now. The purpose of a "Disclaimer" on a BBS System is to post publicly "how you will operate your BBS System, what you expect from your members and what they can expect from you or your assignees (Co-Sysops)". To be effective, disclaimers have to be 'Clear and Conspicuous'. If you put your disclaimers at the end of the manual, or off in some corner of your BBS System where it is 'NOT' easily available for your users to read, the courts could consider them 'Invalid'. Disclaimers 'Cannot' be put just anywhere it is convenient, and especially not as an 'Afterthought', or as a by-the-way. When making a disclaimer, besides disclaiming warranties, make sure you also disclaim responsibility for incidental or consequential damages. Now it must be understood by all Sysops that by posting a "Disclaimer" it 'Does Not' necessarily relieve you of the responsibility of your actions or damage(s) caused to persons, property or personal rights of your users. Disclaimers do NOT relieve your or their assignee(s) of ALL responsibility . Remember that even if ALL warranties are disclaimed, YOU may still be 'Sued' for "Negligence or Malpractice". In closing, I would like to say that it is us, the Sysop, that is going to determine how WIDE the GATE is going to be opened in the future for Electronic Bulletin Board Communication. There are a LOT of legal arguments going on as I write this article that will determine whether the GATE is going to be opened WIDER or if the GATE is going to CLOSE. Our ACTIONS are going to determine in the next few years our own FATES. Stop and ask yourself often, will my actions do -- 'Open the Gates, or close them.. In ending, I would like to say that writing an article such as this one and the article on software Piracy and the Law (December issue of IceNET News Magazine) has been a great experience for me. I have really enjoyed sharing the Laws governing how we operate our computers both for 'Fun and Profit', but these two articles are ONLY the 'Icing on the Cake'. Congress is deciding everyday if new laws are needed to control the electronic media. As time goes by, I will write other articles regarding computer law i.e. Pornography on a BBS System and also try to keep you informed of "New Laws' that are voted in by our 'Legislators' in Washington, DC. Again, I would like to thank Jim Nunn for asking me to write this article and the United States Justice Department for allowing me to access to their law library... ÖÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ· º º º How to be a Good Cosysop º º 2. ------------------------ º º by Louie (IceNET 6@1) º º º ÓÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄĽ This article for the IceNET News is an attempt at an article on how to be a good cosysop. These are tips and ideas and advice that I have picked up over the years as a cosysop in BBSing. Qualifications : -------------- Before I go any further, your probably wondering what the heck my qualifications for writing are article like this are. Well, right now I am a cosysop on both of Jim's (1@1 IceNET) boards. I've been a cosysop on TGWN (@1) for a while now. Recently Jim asked for help on his second board, Paragon (@7654), as well. I was more than happy to lend him a hand there too. I am also a cosysop on several boards in the WNY Area. Mainly I confine my roamings to The Keep of Ultimate Evil (@7) and Artificial-NON- Intelligence (@7667) and the The Sanitarium (@5). Sysop : ----- Before you can go further here it will help to understand what a sysop is first. A sysop is the person that owns the board, pays the bills, and has the number one account. The first two stipulations there are obvious, but the last some may question. Why is the sysop the guy with the number 1 account? Because that is the person that gets the feedbacks, complaints, and complements normally. That is the person people think of as the sysop. It is that account that normally deals with other sysops in the network. Heck, there are even rules about sub requests normally having to come from a #1 account. Yes, there may be some exceptions to this general rule, but exceptions are not the general rule. That is why they are called exceptions. Sysops and Cosysops : ------------------- There are three difference classes of bbsers. Sysops, Cosysops and Users. Every now and then you hear of the weird half beast called the "Remote Sysop". I don't believe in their existence. There are sysops (#1 account) and cosysops. A Cosysop with a 255 is just a very trusted cosysop. I don't see any reason for the fourth class of "Remotes". Besides, to do any real major work on a board it is a great help to be local to the bbs computer. Yes, you can do a lot from remote, but I can't stand doing anything more than adding a sub or two that way. To do major work, being local is almost a requirement. Case in point, recently Jim wanted some major remodeling of Paragons message base section done. I could have done the remodeling from remote but it would have taken a long time to do. I was reluctant to do it because of the time it would have taken. So, Jim then invited me over to his place so that I could do the work there. What would have been a good 15 hour job from remote only took about 6 hours from the local keyboard. Another thing that bugs me are those cosysops that sign posts "Cosysop of This-That Board". They really tick me off at times. The way I figure it, if a user calls a board regularly they know who the cosysops there are. They don't need to be reminded all time time. Somebody signing all their posts as "Cosysop" normally is done for one reason: intimidate those he is talking to. If people are talking about abortion, or some other debate topic, and some cosysop signs a post "Cosysop of this board", then you have intimidation. It might not be intended, but it will will exist. Weather the cosysop in question knows they are doing it does not matter. It is the affect that matters. There are only two cases I can think of where I would sign a post as "cosysop". 1) When dealing with a new user, 2) when dealing with other sysops in the network. And both of these only occur in e-mail situations. Now, I don't expect the sysops in the network to take my "cosysop" as meaning anything either when I deal with them. Just sometimes, if they know me a little, instead of going through Jim I can cut out the middle man and get something done quicker by sending the mail myself I'll do it. Normally who I am dealing with there knows a little about me already, such as Midnight Tree Bandit (the Weirdo of WWIVlink fame). There are several things that cosysops can do for the sysop of a board. I am going to list some of the things I have done in the past. These are not the only things that a cosysop can do, but they are the obvious ones that are seen around in common existence. They are : 1. Sub-board Management. 2. Transfer Section Management. 3. On-Line Chains Management. 4. User Record Management. 5. The Resident Modder. 6. A little of everything. Sub-board Management : -------------------- This is the guy who keeps the subs of a board moving. He posts a lot. Deletes "below-par" posts. Network Validates the net subs the board hosts. Keeps track of who posts and who doesn't. Help people out in regards to the sub-boards. Posting a lot is very important for a cosysop of this type to do. Leading by example is much easyer than just telling people what to do. If some cosysop just posts "Why aren't you all posting here?" or "Post or Die" messages, then people are going to think the cosysop is just plain weird. I will admit, I've done both of those, but I try for messages like that to be more humorous than anything else. I post a lot on the subs. If I post something on the political sub I know that I can get others to respond because they will disagree with me. Then, as long as I am staying on topic others will also stay on topic because they are mainly responding to me. The one problem I have found with this formula is "BBSing Burnout". I can get so involved in debates at times that I don't want to call a board I'm a co- on because I don't really want to post a message on some debate topic at times. (I know, some of you reading this are thinking that Post-Aholic Louie doesn't want to post sometimes. Wow! But then, I even amaze myself at times). When I then call, finally, I have so much work to do on the board that I don't want to deal with much really. Just to much to do that then I don't want to do it because there is so much to be done. Deleting "Below Par" posts is very important as well. If users are posting bad messages it can be worse than having users than don't post at all. Keeping the message bases stocked with high quality posts is something that is very important for a boards. But what should be deleted? That can be a difficult question to answer at times. The obvious things that have to be deleted are those messages that are just vulgarity. Sometimes new users just log on a board and post a message of everything vulgar they ever heard. Things like that should always be deleted. What is vulgar? I normally just regulate vulgarity to things without a point. A list of sware words about the sysop. Now, there are adult subs on some boards, and what might be vulgar to one person might not be to another. Keeping those adult posts to the adult subs is something that should be enforced though. Also, keeping posts on topic is important as well. What might be "Below par" on the political sub might be perfect for the General sub. Thats where the cosysop just hits "M" and moves the post to the proper sub. Normally I follow that up with an e-mail to the user that made the simple mistake and explain what I did and why. Now, network validation is something that also means dealing with "below par" posts. Network validation means reading, and possibly posting on, the subs hosted by the board your a cosysop on. On TGWN and Paragon net-validation is turned on in Boardedit for all the subs Jim hosts. I read the subs determine for each post weather it meets our standards for the sub in question. I also have some special rules for network subs that I enforce. The rules I use are something I recommend for all systems in the network for boards that host a sub. They are : 1. Delete anything with profanity in it. There are people out there that don't mind sware words, and there are people who do mind. If your hosting a sub you want to appeal to the widest possible audience, normally, and that probably means enforceing a no profanity rule. 2. Delete anything that is short and doesn't really say anything. "I'm Pro-Choice/Life" as a whole post doesn't really say much. I delete those regularly. What is wanted are longer, well thought out, posts that say something. Another example is the "I agree" posts that are seen sometimes. 3. Quotes and Tag lines. This is something that I saw posted by the master, Wayne Bell himself, once. He pointed out that if somebody quotes a long post and only adds a few lines of commentary such as "Your wrong." doesn't add much. Why post it. Say why the person is wrong is what would be proper. Now, if a message has quotes in it from a previous message, add up the quoted lines and if the added text exceeds the amount quoted, then let it go through. It text from the poster is not equal to or greater than the quoted text, delete it. The network costs money, and sysops don't need to be paying for a message to be sent out twice. Tag line length I also add it to the number of lines quoted. I don't see tag lines as worth while to the post. If 14 lines are quoted and there is a 3 line tag line, that is at least 17 lines of text that should have been added to it. If there are not at least 17 lines of added commentary, I normally delete the post. 4. Things that should have been said in e-mail : Somebody who posts something like "Hey, Wizard. Whats your phone number so I can call and talk to you about this" should be deleted as well. Posts like that don't need to be read by the 100 or systems that subscribe the IceNET national General Sub. That is much easyer to ask in e-mail. 5. Lastly, flaming and warring should be deleted. This probably goes without saying though. Except for the last point, there may be exceptions to each of these general rules about deleting network posts. But exceptions are just that, exceptions. They are not the general rule. Just in case your wondering why these rules are important... They are important because of the costs of the network. IceNET is run by sysops that pay phone bills for long distance calling. The LD bills cost more money the longer they take and the more bytes in a net packet means more transmission time. Thus, the sysops are then paying to have messages they (or there users) don't really want to read sent to them. On TGWN (@1) we host many subs. The IceNET National General Sub probably has about 1200 messages go out on it a month. That is 1200 posts that met the standards we use around here. There are probably 2000 total messages on it, but I delete a large number of them. Imagine the network costs if I didn't delete all the "I agree"/"Your Wrong" type of posts. At the moment, I validate the following Subs hosted by TGWN on a regular basis. The IceNET National General sub the busyest, by far... But the Sports, Politics and Philosophy subs are big traffic net subs as well. IceNET Nat. Gen. has about 90 subscribers, while those other three have about 40 subscribers each. The music discussion sub, IBM Tech an gaming subs are also high traffic for the number of subscribers that they have. (Did you really think I wasn't going to plug the subs that I run???? :) hehehe) Sub-Type Host Note Sub Name -------- ---- ----- ------------------------------------------------ 6 1 RTN Computer Wizards of the North (IBM Tech Talk) 7 1 RTN Illuminati (Poetry Sub) 8000 1 RTN Scarlett Letters 18006 1 RTN Jimi Hendrix's Talk Show (Music discussions) 28000 1 RTN Network Sports 38000 1 RTN Software Discussion/Gaming 48000 1 RTN Ice NET National General 58000 1 RTN Philosophy Sub 61000 1 RTN Political Thought and Remark Keeping track of posters : There is something I like to do on boards I'm a cosysop on. I will go through uedit every now and then and compile a list of the top posters on the board. Usually the top 10 ( ala Lettermen). I then post it. People like to receive recognition for their efforts. If some user has posted 300 times on a board, they might like to be singled out for the job well down. It also gives something for the new users to shoot for. Helping Users : This is something that applys to all types of cosysops, but maybe a little more with message bases than in other areas. Message bases are what users read. They read, post and talk to people. If they have a problem doing this, then help from the cosysop will be appreciated a little more so than with other areas. Transfer Section Management : --------------------------- I'm going to be up front with you here. I have never really done the job of a Transfer Section cosysop, except in emergency situations at times when the board wouldn't have any available disk space for posting. I would then wander in to the Transfers and delete some old file that was 500k large or something so that people could post again. The two best cosysops I know who do the transfer section management particularly well are Perseus (9@7) and Trigger (Trigger@7654). What this job entails, basically, is checking new uploads and keeping files in the proper directorys (ie, Keeping games in the games section and out of the business spreadsheets section). Checking new uploads entails making sure things are newer software. Making sure the lastest PD Stuff uploaded is the lastest version. Making sure that there are no virii present by running the McAffee Stuff on the uploads. Making sure they are in the proper Zip format, or whatever the local standard of compression is, Zip, Arc, Arj, Pak, ect... Locally we all use Zip, though we do have a few who love Arj around here. It seems the accepted Standard we use on Paragon and TGWN are Zip compression. We also have rules about keeping things virus free (da) and if a virus is detected we try to inform everybody we can of the program in question, who uploaded it, and weather it was intentional or not. We also like to have it so that all the available software is less then 1 year old, and that it is the lastest version of the PD program in question. Jim is throughly anti-pirate software, and we do not tolerate pirate files being uploaded to us. Also keeping files in the proper transfer directory is important as well. Keeping giffs in the giff directory. Keeping business software in the business directory. This is important in order to give the users the best in public domain downloads. I think you could say that manageing the transfer section isn't difficult but can be very time consumeing due to the cosysop in question having to upload and download a lot. We also like to think that Paragon is better at serving downloading sysops due to its being a WWIV Source distribution site. Jim tells me that right now there are about 50-55 sysops with verifyed accounts on Paragon for that purpose. Paragons number is 716-837-1636. (The second plug for our boards. :) hehehehe) On-Line Chain Management : ------------------------ This means, the dude in charge of the games section mainly. Just On-Line Chain Management sounds better. The cosysop in charge of the chains makes sure that users are not just being game leeches. Makes sure that games are secondary and not the only reason people are calling. This means that the cosysop should go through the //LOG and //YLOG and make sure people are posting if they are playing games. He might also run the On-line Games sub, if there be such a sub on the system. Where people could talk Tradewars, Globule Wars, Space Dynasty, ect... Best best and most popular game is Tradewars. A cosysop in charge of running the games may be running a Tradewars Tournament. Personally, I think tournament are nuts. I think the ideal tradewars game is in competeing against other users, and not having to fight a cosysop with Tedit as well. I think the game is already close to perfect and doesn't need help to make it better. I think making sure people are posting as well as playing games is more important than running Tournaments. Games should be secondary to posting. User Record Management : ---------------------- This means a variety of things. Making sure that users are posting. Making sure that new users are real people and not somebody looking to have a second account with which to play Tradewars or leech more files. Deleteing users that have not called in a long while. The main thing of this job is voice validating users. Calling them and telling them your calling from the BBS and saying your just making sure they are real people. It might help to ask them a question about their account as well. Asking their age might catch some 14 year old kid off guard who claimed he was 23 so that he could have access to adult subs. You don't want minors on subs like that. Legal problems as well as moral problems with minors and adult material. It can also entail giving out SL Raises. If a user is calling the board and doing a good job posting, uploading, and not being a big game leech, then after a certain length of time of doing well for the board they deserve a reward of having more time on the board with which to be better. Usually I would go through once a month, and if a user had continued to post a lot I would give them a 10 point SL raise. The limit would be an 80 SL though. Those with the high SL might even be considered for being made a cosysop in the future if another might be needed. Deleteing old users that have not called in a while is a good idea as well. You don't want user records taking up space on the hard drive. And more users in the files the slower than WWIV runs. Besides, you normally get several users that call once and then never call back. No real sense in keeping those persons around. They are not contributing to the board. The Resident Modder : ------------------- Heavily modded boards usually have a sysop who mods his own board a lot. Some boards, though, have sysops who can't program really. So since they want a modded board, they would ask a bbser who they know to be a good C programmer to mod their board for them. These are the type of people who know how to program in C, and are the local Techie experts normally. What makes for a good mod? Well, a good mod is something that has a function on the board. That simplifys sometime, or adds something that should be in WWIV normally. They also help to make a board have a slightly different look and feel from other wwiv boards. Now, don't get me wrong... I see very little wrong with stock WWIV. There are some minor things I might add here and there though. These are the reasons for mods. The worst mod out there has got to be the Random title Mod. Serves no purpose in my opinion. Humorous the first few times you see it, but after seeing 100,000 random title the affect wears off. A good mod would be the mods that allow you to know what sub your reading while reading posts. A good mod might be the Sysop Avialiable for chat status that you see sometimes. A Mod should have a purpose. It shouldn't just be in for the sake of having another mod. A Little of Everything : ---------------------- This what what, I think, most cosysops really do. This combines everything from above, plus a little more. He talks with his sysop a lot about board related things. The read and post on the subs, look at the logs and wander through Uedit and make sure that the users are all who they claim to be. Maybe play games. Basically, super users that help the sysop of the board out. There are several things a good WWIV cosysop should do every call and pay attention to. They should 8almost always look at the sysops logs : //LOG, //YLOG,; the activity //ZLOG; the network info //NLOG and //PENDING; and look at the boards daily //STATUS. These are important commands that can show you whats going on. You can then investigate things that look out of place with regards to all the Cosysop jobs that I described. Some other things that can be looked at and done are to make Voting questions with //IVOTES. Find out what people are thinking and look at what democracy with the users might bring you. Just make sure that you don't give them weird answers to give if you what serious feedback with the voting section. Manageing the general files section can be another minor thing to do. Locally, in 716, we have a BBS publication called the WNY BBS Quarterly and we like to have it in gfile sections on BBSes so that users around the area can read it. So, I put it in the gfiles all the time when a new update of it comes out. I also keep the BBS List on the boards straight. No use having dead boards listed in the BBS List. So, every now and then, I edit the BBS list and keep it updated. I take 8out old dead BBSes and add in the newer boards that have gone up. This helps to keep people from asking every now and then why they can't get through to some board that went down a year ago...but that is still in bbs lists on boards around the area. At least with the lists on TGWN and Paragon. This has been a long article and I'm getting tired now. A lot of this is philosophical thinkings on what a cosysop should do. How to do it is another all together. Different people have different ideas on how to get things done. No one way is better than other ways. If what your doing works, don't change it. I think a lot of new sysops and cosysops could use this advise constructively. None of it is gospel and please don't take this all to mean that I am preaching the word of the Holy Modem in the Sky or anything. If you wish to reach me I can be reached at the following node addresses : 6 @1 - IceNET 6 @7655 - WWIVnet 6 @17662 - WWIVlink 9 @7679 - DragonNET 3. Mod of the Month ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³Name: WFCSCRN.MOD ³ ³Author: Odin #1@7664 (IceNET) - C stuff (My first 4.22 mod!) ³ ³ Jim #1@1 (IceNET) - Ansi ³ ³Version: 4.22 ³ ³Files Affected: BBS.C ³ ³ XINIT.C ³ ³ VARS.H ³ ³ ³ ³Difficulty: Easy ²²°°°°° Hard ³ ³Description: Are you tired of the blinking cursor at the top of your ³ ³ WFC (waiting for call) screen. Well here is a nice ³ ³ record of your BBS while your board is inactive. ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ This is mod will allow a sysop to see the status of her board while the board is waiting for a caller. The information includes: time, date, disk space available, mail waiting, user activity, and other information. You may think,"Why would I want something that could "burn" onto my screen?" Well, don't fret. It has a built in screen saver. The "box" moves around the screen and changes color as it moves, so that it never is "locked" in one place for to long. Also, if you wish to not see the "box", then pressing the "=" will turn the screen off and you will return to the blinking cursor at the top of the screen. Pressing the "=" will also return the "box" to the screen. STEP 1: BACK UP YOUR SOURCES ------ STEP 2: Load in BBS.C and locate "void getcaller" ------ Before this line, block copy the following void into BBS.C: void wfc_window(int NoScreen) { int am, i, wx, wy, width, len, tmp, clr1, clr2, Imove; char otstr[30]; double d; long hr, min,l; float ftmp; if(!NoScreen) { run_external1_x("ICE"); d=timer(); ftmp=d/3600.0; hr=(int) ftmp; ftmp=60.0*(ftmp-(float) hr); min=(int) ftmp; am=1; Imove=rand() % 3; if(hr>11){ am=0; hr=hr-12; } if(hr==0) hr=12; wx=12; wy=6; if(Imove<2) { /*MOVE*/ wx=rand() % 24; /*MOVE*/ wy=rand() % 11; /*MOVE*/ } /*MOVE*/ width=55; len=10; randomize(); clr1=rand() % 10; clr2=rand() % 10; if(clr1==6) clr1=5; /*Changes red to green */ /*SELECT COLOR*/ ansic(clr1); makewindow(wx,wy+2,width,len); ansic(clr2); makewindow(wx,wy,width,3); tmp=(width-strlen(syscfg.systemname))/2; movecsr(wx+tmp,wy+1); sprintf(otstr,"%s",syscfg.systemname); outs(otstr); movecsr(wx+width-8,wy+1); sprintf(otstr,"%2ld:%-2.2ld",hr,min); outs(otstr); movecsr(wx+width-3,wy+1); if(am) { sprintf(otstr,"am"); } else sprintf(otstr,"pm"); outs(otstr); movecsr(wx+1,wy+1); sprintf(otstr,"%s",status.date1); outs(otstr); ansic(clr1); movecsr(wx+1,wy+4); sprintf(otstr,"Calls today : %4u",status.callstoday); outs(otstr); movecsr(wx+1,wy+5); sprintf(otstr,"Actvity : %5.2f%%" ,((float) status.activetoday)/14.4); outs(otstr); movecsr(wx+1,wy+6); sprintf(otstr,"Mail Waiting: %4u",fwaiting); outs(otstr); movecsr(wx+1,wy+7); sprintf(otstr,"Uploads : %4u",status.uptoday); outs(otstr); movecsr(wx+1,wy+8); sprintf(otstr,"Posts Today : %4u",status.msgposttoday); outs(otstr); movecsr(wx+1,wy+9); sprintf(otstr,"Total Users : %4u",status.users); outs(otstr); movecsr(wx+1,wy+10); sprintf(otstr,"Total Calls : %5ld",status.callernum1); outs(otstr); movecsr(wx+30,wy+5); sprintf(otstr,"Minutes : %4u",status.activetoday); outs(otstr); movecsr(wx+30,wy+6); sprintf(otstr,"Max Users : %4u",syscfg.maxusers); outs(otstr); movecsr(wx+30,wy+7); sprintf(otstr,"Com Port : %2u",syscfg.primaryport); outs(otstr); movecsr(wx+30,wy+8); sprintf(otstr,"NETxx Ver : %4u",status.net_version); outs(otstr); movecsr(wx+30,wy+9); sprintf(otstr,"WWIV Ver : %4u",status.wwiv_version); outs(otstr); movecsr(wx+30,wy+10); sprintf(otstr,"WWIV Reg. # : %5ld",syscfg.wwiv_reg_number); outs(otstr); movecsr(wx+30,wy+4); i=3; l=(long) freek(3); while ((l>0) && ((i+'@')<=cdir[0])) { npr("%c: ",i+'@'); sprintf(otstr,"FreeSpace: %8ldk",l); outs(otstr); i++; if ((i+'@')<=cdir[0]) l=(long) freek(i); } ansic(0); movecsr(0,22); } } STEP 3: All the following changes/additions occur in void getcaller ------ ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ Legend ³ ³! - this line changed ³ ³+ - add this line ³ ³= - this there before ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ -In the declaration section, make the following changes: ! int i,i1,i2,i3,any,wfc_on; ! double d,d1,tstamp,tmp; -Search for "srand((unsigned int)d);". Then change accordingly. = srand((unsigned int)d); + wfc_window(NoScreen); + tstamp=timer(); wfc_on=1; = do { -Search for "attempt_callout();". Then change accordingly. = if ((!any) && ((rand() % 8000)==0) && (net_sysnum) && = (ok_modem_stuff)) { = attempt_callout(); + wfc_on=0; = any=1; -In the switch section, add these lines + case '=': + if (NoScreen) NoScreen=0; + else NoScreen=1; + break; -Search for "if ((comhit())". Change accordingly. = } = okskey=0; + wfc_on=0; = } = if ((comhit()) && (ok_modem_stuff) && (!lokb)) { any=1; -Search for "giveup". Change accordingly. = giveup_timeslice(); = } + tmp=timer()-tstamp; + if((!wfc_on) || (60<=tmp) || (0>tmp)) { + tstamp=timer(); + wfc_on=1; + wfc_window(NoScreen); } = } while ((!incom) && (!lokb) && (!endday)); -In XINIT.C, search for "chat_file=0;" = chat_file=0; + NoScreen=0; /* 1 if you wish to default to off */ = sysop_alert=0; -In SHRINK.C search for "READ(sysop_alert);" this is in int restore_data = READ(sysop_alert); = READ(do_event); + READ(NoScreen); /* WFC_SCRN.MOD */ = if (stat) { = READ(andwith); = READ(usernum); -In SHRINK.C search for = WRITE(sysop_alert); = WRITE(do_event); + WRITE(NoScreen); /* WFC_SCRN.MOD */ = WRITE(andwith); = WRITE(usernum); -And last but not least, in VARS.H search for "no_hangup" and put ", NoScreen" after it It should something lik this: noklevel, no_hangup, NoScreen, numbatch, numbatchdl, numchain, STEP 4: Re-compile using TCC or BCC. ------- STEP 5: Place ICE.COM into your main BBS directory. A copy is at the ------- end of this mod. (To extract ICE.COM, simplify type UUDECODE where is this entire file. STEP 6: Copy BBS.EXE, RETURN.EXE, and INIT.EXE into your main BBS directory. ------ That's it. DISCLAIMER: Well, if your hard drive crashes, your BBS decides to nuke all ---------- the accounts, your sister runs away with the milkman, or you just screwed up, DON'T BLAME ME. This method worked great for me. The following is ICE.COM uuencoded. Use UUDECODE to return it to its original state and place it into your main BBS directory. section 1 of uuencode 5.13 of file ice.com by R.E.M. begin 644 ice.com M_+T@`8MN`(NF`@"+G@0`M$K-(:$L`(F&&@"+G@``_^,P`8H41@K2=`:T`LTA MZ_/#P`D6#`(!&`P9#1H.&P^?Z%)0Z)'H4!ZX1-=0N``"```;6S0P;1M;,DH; M6S([,4@;6S,[,4@;6S0[,4@;6S4[,4@;6S8[,4@;6S<[,4@;6SE#&ULP.S%M ML;&QL;&QL;&QL;&QL;&QL;&QL;&QL;&QL;&QL;&QL;&QL;&QL;&QL;&QL;&Q ML;&QL;&QL;&QL;&QL;&QL;$;6S@[,4@;6SE#L;&QL;&QL;&QL;&QL;&QL;&Q ML;&QL;&QL;&QL;&QL;&QL;&QL;&QL;&QL;&QL;&QL;&QL;&QL;&QL;&QL;$; M6S,V;;&Q&ULY.S%(&ULY0QM;,S=ML;&QL;$;6S`[,S5ML;&QL;&QL;&QL;&Q ML;&QL;&QL;&QL;&QL;&QL;$;6W,*#0`;6W6QL;&QL;&QL;&QL;&QL;&QL;&Q ML;&QL;&QL1M;,3LS-VVQL1M;,S9ML;$;6S$P.S%(&ULY0QM;,S=ML;&QL;$; M6S`[,S5ML;&QL;&QL;&QL;&QL;&QL;&QL;&QL;&QL;&QL;&QL;&QL;&QL;&Q ML;&QL;&QL;&QL;&QL;&QL1M;,3LS-VVQL1M;,S9ML;$;6S$Q.S%(&ULY0QM; M,S=ML;&QL;$;6S`[,S5ML;&QL;&QL;&QL;&QL;&QL;&QL;&QL;&QL;&QL;&Q ML;&QL;&QL;&QL;&QL;&QL;&QL;&QL;&QL1M;,3LS-VVQL1M;,S9ML;$;6S$R M.S%(&UMS"@T`&UMU&ULY0QM;,S=ML;&QL;$;6S`[,S5ML;&QL;&QL;&QL;&Q ML;&QL;&QL;&QL;&QL;&QL;&QL;&QL;&QL;&QL;&QL;&QL;&QL;&QL;&QL1M; M,3LS-VVQL1M;,S9ML;$;6S$S.S%(&ULY0QM;,S=ML;&QL;$;6S`[,S5ML;&Q ML1M;,3LS-VW?W]_?W]\;6S`[,S5ML;&Q&ULQ.S,W;=_?W]_?&ULP.S,U;;&Q M&ULQ.S,W;=_?W]_?W]\;6S`[,S5ML1M;,3LS-VW?W]\;6S`[,S5ML;&Q&ULQ M.S,W;=_?&ULP.S,U;;$;6S$[,S=MW]_?W]_?WQM;,#LS-6VQ&UMS"@T`&UMU M&ULQ.S,W;=_?W]_?W]_?&ULP.S,U;;&Q&ULQ.S,W;;&Q&ULS-FVQL1M;,30[ M,4@;6SE#&ULS-VVQL;&QL1M;,#LS-6VQL;&QL1M;,3LS-VW?WQM;,#LS-6VQ ML;&Q&ULQ.S,W;=_?&ULP.S,U;;&QL1M;,3LS-VW?WQM;,#LS-6VQ&ULQ.S,W M;=_?&ULP.S,U;;&QL;&QL1M;,3LS-VW?W]_?&ULP.S,U;;&Q&ULQ.S,W;=_? M&ULP.S,U;;$;6S$[,S=MW]\;6S`[,S5ML;&QL;&QL;&Q&ULQ.S,W;=_?&ULP M.S,U;;&QL;&QL1M;,3LS-VVQL1M;,S9M&UMS"@T`&UMUL;$;6S$U.S%(&ULY M0QM;,S=ML;&QL;$;6S`[,S5ML;&QL1M;,3LS-VW?WQM;,#LS-6VQL;$;6S$[ M,S=MW]_?&ULP.S,U;;&QL;&QL1M;,3LS-VW?W]_?WQM;,#LS-6VQL;$;6S$[ M,S=MW]\;6S`[,S5ML1M;,3LS-VW?WQM;,#LS-6VQ&ULQ.S,W;=_?&ULP.S,U M;;$;6S$[,S=MW]_?W]\;6S`[,S5ML;&QL;&Q&ULQ.S,W;=_?&ULP.S,U;;&Q ML;&QL;$;6S$[,S=ML;$;6S,V;;&Q&ULQ-CLQ2!M;.4,;6S,W;;&QL;&Q&ULP M.S,U;;&QL1M;