================================================================= The $ R / O R E A D O N L Y -=( November 1986 Issue )=- The monthly news magazine of the Tampa Bay Kaypro User's Group and the DataCOM Super Systems(tm) ================================================================= News and reviews of programs, hardware, and peripherals for users of microcomputers with CP/M, MP/M, MS-DOS, PC-DOS, or TurboDOS multi-user operating system. ================================================================= Steven L. Sanders - Editor (Sysop) ================================================================= The DataCOM Super Systems(tm) is a "state of the art" multi-user remote database with 115mb of files online. An annual fee of $35.00 is required for access, an application may be downloaded by calling (813) 791-1454 at 300/1200/2400 baud, (813) 796-5627 at 1200 or 2400 baud, or send a SASE along with your request to: TBKUG / DataCOM Super Systems(tm) 2643 Cedar View Court Clearwater, FL 33519 -==( DISCLAIMER )==- Articles and reviews of microcomputers, hardware, software, and other peripherals reflect currently advertised prices as released by the distributors and are included here for YOUR INFORMATION ONLY. The TBKUG/DataCOM Super Systems(tm) is NOT being paid to advertise these products and we cannot be held accountable for the actual retail price and/or performance of said products. ================================================================= -={ WHATSNEW - New Files }=- [MS/PC-DOS] QMODEM23.ARC The latest version (2.3) of QMODEM, one of the premier shareware modem programs for DOS. QMODEM supports every known transfer protocol, has nice pop-up (and moveable) window displays, settable colors, script language, and the list goes on and on. If you've never heard of QMODEM, you should! PCOPY5.ARC PCOPY is a DOS command utility used to copy files between disks and directories on disks. In addition to just copying files, PCOPY also allows selection criteria to be specified to better qualify the files to be copied. PCOPY provides a safer way to copy files than is provided by the DOS COPY command. It warns you if a file is about to be overlayed and lets you have complete control over the copy operation. VCRDBASE.ARC is a program used by a person who needs an easy and structured way of keeping track of all the movies he or she has. VCRDBASE is quite unique in that it uses a Linked List data structure for record management and sorting. In this data structure, the Header file, HEADER.DAT, contains the record number of the first alphabetical movie. That movie (the first alphabetical) contains a forward link and a backward link. The forward link contains the record number of the next alphabetical movie and the backward link contains the record number of the preceding record. GT1012-1.ARC, GT1012-2.ARC, & GT1012-3.ARC - GT Power Comm v10.12 GT is a very nice IBM-PC modem program with all the features we've come to expect; pop-up help windows, settable colors, all standard file transfer protocols including YMODEM. Super-nice review buffer, complete script file language for auto-logon files and auto-download sessions. GT is right up there with Procomm and Qmodem, I use em all! However, all these rapid-fire updates tend to wear us collectors out. GT and ProComm have been getting updated every three weeks lately which makes for great confusion as to which is current, etc... DP12.ARC DataPath is used to specify directories, other than the current one, to be searched by executing programs, in the event that a file that needs to be read cannot be found in the current directory. DataPath requires 2162 bytes of disk space (5 512-byte sectors). It becomes memory resident the first time it is run and increases the size of the operating system by 1440 bytes. It will run on any computer using the MS-DOS or PC-DOS operating systems version 2.0 or higher. HOTDOS2.ARC HOT-DOS is a small but powerful program that, with the press of the CTRL-SHIFT -- LEFT-SHIFT combination, allows any currently executing program to be temporarily suspended so that a second copy of COMMAND.COM can be loaded and run in the background (the aptly named HOT-DOS partition.) MPLANNER.ARC MANAGER'S PLANNER vers 1.00 is designed to help you plan your workday for maximum effectiveness. It maintains your schedule, organizes your daily tasks, and gives you the tools to keep your mind on the high priority activities which really deserve your attention. With MP, you can put your promises and future obligations out of your thoughts until you are ready for them, and still never forget. Run MP once a day, either at the end of your workday or first thing in the morning. At the end of your session, MP will print out a plan for your workday. TELIX110.ARC Excellent communication program v1.10 Very fast & Clean I must admit that I've sort of snuck this one on the system for the moment by using the date of release of the file rather than today's date. I'll cahnge that later after I've had a chance to really put this new version of Telix through its paces. PCGAZ108.ARC PC-Gazette magazine 10/86 edition. A very inter- esting graphic-oriented monthly magazine with programming tips for Turbo Pascal and 'C' programmers. Some very nice graphic displays as well. Seems to be getting better than some of the earlier issues. MASTRKEY.ARC The search for a shareware program that unerases on large hard disks formatted with DOS 3.x is over. This one works, and it's easy to use and has many other powerful capabilities as well. Master Key is a utility that gives you full access to your MS-DOS disks. It is a collection of features bundled into one easy to use program. It is a disk editor, a file editor, a file manipulator, and more. It gives you the ability to work with individual files or the disk as a whole and lets you perform operations that DOS usually isn't able to provide. Generally, it lets you manipulate everything on your disks easily and with very few restrictions. PRCM242A.ARC This is a minor update to ProComm 2.4 that 99% of the users would never notice, a very obscure bug was fixed, see PRCM242.NEW file. For those of you who have already downloaded the PRCM24A, PRCM24B, and PRCM24C archives, you only need the PRCM242A.ARC for the new EXE file. Anyone upgrading from v2.3 needs all three archives plus notice that there have been major changes in the syntax for script files. IR164F.ARC Instant Recall was designed for the busy person who has many ideas and doesn't know where to store them. The business executive. The writer. The personnel administrator. It was designed to replace awkward filing cabinets and restrictive database systems with an instant cross- referencing system that lets you store bits and pieces and retrieve them together so you can turn them into a coherent whole . And it lets you cut and paste information from Instant Recall's records right into another document without exiting from either program. PATCH1.ARC The hottest tool for getting into and fiddling with the nitty- gritty of any kind of file, or just taking a good look at it. It is called PATCH, and it's a "byte editor". What that means is that you see a HEX/ASCII display screen (it kinda' looks like "dump" in DEBUG) of your file, and can move around in it with your standard cursor movement keys, making changes it it in either HEX or ASCII. For futzing with binary files, PATCH is to DEBUG as WordStar is to EDLIN. It is a "full screen" byte editor. CAMERA.ARC CAMERA will remain resident in memory and reduce your available memory by 1552 bytes (not much). The program is invoked by pressing Alt PrtSc which will take the contents of the graphics screen buffer and save it in a file, the contents of the mode and color registers will also be saved so that the image will be displayed with the settings in effect when its picture was taken. If the image on the display screen is a graphic image it will be stored in a compressed mode. Text screens will be saved "as is", in other words a 40x25 screen will use 2048 bytes of storage and an 80x25 screen will use 409 bytes. ROS-PC35.ARC Remote Operating System (ROS) v3.5 by Steve Fox. This is the new DOS version of a very fine RBBS system that was originally written and developed for CP/M computers. Program written entirely in Borland's Turbo Pascal and distributed as ready-to-run compiled programs. Very easy to install for part- time Sysops or anyone who wants a very secure full-featured RBBS system. ROS even allows access to LBR and ARC files from the Files menu system. XMODEM CRC and YMODEM transfers are fully supported as well as ASCII with XON/XOFF protocol. -={ 720k Capacity Floppies with DOS 3.2 }=- by Dave Whittle The following procedure will format a double-sided, double- density diskette to allow 720KB of storage on one disk using a 1.2MB drive and DOS 3.2. 1) Change your CONFIG.SYS file to include the line: DEVICE=DRIVER.SYS /D:0 assuming the file DRIVER.SYS from DOS 3.2 is in the root directory and drive D: is the next available logical disk, i.e. that you have one fixed disk but no ramdisk or external drives. Alternatively, if your DOS files are in a subdirectory named C:\DOS, and if you have a ramdisk and an extra fixed disk, then drive F: would be your next logical drive and the command line to include in your CONFIG.SYS file would be: DEVICE=C:\DOS\DRIVER.SYS /F:0 The rest of the steps will assume your next logical drive is D:. 2) Reboot using DOS 3.2. 3) Insert a DS/DD diskette in the High Density drive. 4) Make sure you can access drive D: by issuing the command DIR D: from the DOS prompt, making sure the light on the High Density drive comes on. If the wrong drive or no drive lights up, D: is not your next logical drive. Try E: or whatever. 5) Respond with 'Abort' to the time-out query if the diskette is not already formatted. 6) Issue the command FORMAT D: 7) After the drive starts formatting, press Ctrl-Break to abort. 8) Issue the command DEBUG from the DOS prompt. 9) From the DEBUG - prompt, press E 40:90 . 10) Press 57 to change the byte from 15 or 74 or whatever. 11) Press Q . 12) Again issue the FORMAT D: command, but this time let it go to completion. 13) Answer N to the question about formatting another. You have to go through steps 6-12 for each diskette. 14) Optionally, you can remove the DEVICE= command from your CONFIG.SYS file, or leave it in if you have memory to burn and think you might want to format 720K diskettes often. 15) If you get brave, experiment with skipping the first FORMAT D: and Ctrl-Break commands. That's it! The DS/DD diskette is now formatted to hold 720KB. Obviously, you can't hurt your drives, but you may want to exercise caution with the kinds of data you entrust to the newly formatted diskettes. -={ Tough New Computer Crime Bill Passed }=- by Wayne Rash Senate Passes Computer Crime Bill The US Senate last night passed unanimously the Computer Fraud and Abuse Act of 1986. The bill places penalties of up to $100,000 and/or prison terms of up to 20 years for breaking into computers used by the government or by financial institutions. The bill goes to the White House next, where a signing by Reagan is virtually assured. Under the bill, a person would be guilty of computer fraud if he or she caused the loss of $1000 or more from any computer owned or used by the government or any of its agencies or by a federally insured financial institution. The bill offers similar penalties for modifying or destroying government medical information. The bill also prohibits traffic in passwords and other information related to accessing these computers or where such use affects interstate or foreign commerce. This is an attempt by the government to give federal prosecutors a way to crack down on pirate bulletin boards and similar operations since virtually all large business computers, networks such as Tymnet, and services such as BIX are considered interstate commerce. The bill was sponsored by Sen. Paul Trible (R-VA) and was passed by the US House of Represent- atives in identical form earlier this year. Computer Fraud and Abuse Act of 1986 The Computer Fraud and Abuse Act of 1986, passed by the full Senate on October 1, makes some sweeping changes in how the federal government can deal with activities it considers to be criminal. For the first time, it will be illegal to simply use computer time on a government computer if you're not supposed to be there, even if you don't change or copy data. This is also the first time it will be a violation of federal law to access computers owned or used by financial institutions or medical facilities. While it is unclear just how far the prohibition of this access will go, it will serve to put a new weapon in the hands of federal prosecutors in their battles against computer criminals. One of the most significant changes is in the way the government determines if it has suffered loss. Previously, the government had to prove that the data itself suffered significant losses before fraud could be shown. With the passage of this bill, all the government has to prove is that any combination of losses adds up to $1000 before a person falls under the provisions of this bill. These losses can be counted in a variety of ways, including actual costs to replace data or to reprogram. They also include the cost of computer time, the cost of the network to reach the computer, as well as the costs involved with making the port unavailable to others. These costs can be combined from one incident or the combination of many incidents over a period of time. To be guilty of computer fraud or abuse, the person only needs to be performing the act intentionally and without authorization. The bill also provides for people who are authorized to use a specific computer but exceed the level of authorization they are permitted. This is the first time a federal computer crime statute has included federally insured financial institutions. This relates to banks, savings and loans organizations, credit unions, and the like. As in the case of government computers, the bill covers computers owned or used by these institutions. It is unclear whether this would include credit bureau computers that are accessed directly by banks. Any combination of losses must exceed $1000 for a case to fall under the provisions of this bill. Cases involving the breaking into of medical computers don't have the $1000 threshold. In those cases, any change that modifies or impairs medical diagnoses or treatment records would cause the person doing so without authorization to be dealt with according to the provisions of the bill. In what might put a crimp on pirate bulletin boards, the bill prohibits traffic in passwords or other similar information needed for computer access. A bulletin board operator would have to do this knowingly and intentionally, which would protect operators in those circumstances where a message containing this information was posted without the operator's permission or knowledge. The bill prohibits traffic in passwords or similar access information for any computer engaged in interstate or foreign commerce. In the hearings on the bill, it was the obvious intent of the drafters that this provision would include services such as Tymnet and Telenet and systems such as BIX, CompuServe, and the Source. The Computer Fraud and Abuse Act of 1986, S.2281, was sponsored by Senator Paul Trible (R-VA) and was passed unanimously by the Senate. If signed into law by the President, the bill will amend title 18 of the United States Code. -={ TROJAN PROGRAM ALERT }=- The following has been posted on GEnie, "General Electric Network for Information Exchange," IBM Roundtable BBS special alert notice. Seems SOFTGUARD may be distributing a TROJAN "unprotect" program to erase disks and bolster their "shrinking" copy protection business. 86Sep19 02:15pm from Andy Meyer 86Sep18 02:46pm from Ted Mozer @ Brick **** DANGER !!!! Data Destroying Program !!! The File called SUG.ARC (or SUG.COM) is purported to be an unprotect for Softgard. It is, in reality, a real Worm of the worst magnitude! This little Gem will ask you to put your ORIGINAL Softgard protected disk in the drive, and then BAM!! it displays this message: "You have violated the license agreement under which you received the software. All your data has been destroyed. This destruction constitutes prima facia evidence of your criminal violation. If you attempt to challenge Softguard Systems, Inc. or the software vendor in court, you will be vigorously counter-sued for infringement and theft of services; we believe that our case will have more merit to it than yours. If you have any questions con- cerning this matter, you are invited to contact our lawyers at the following address: Softguard Systems Incorporated [address and telephone number given]. We'll be happy to explain to you the precarious legal position you're in. We wish you good luck in restoring your software from backups and we hope that in the future you'll act more like an honest user and less like a thief. Happy Computing." ... AND IT IS SERIOUS!! It will look for drives A: & B: and, get this, a Drive C: or better!! In other words, it will wipe out the FAT on your hard disk too, just to "teach you a lesson". Attorneys are presently looking into what can be done to stick this up the lower abdominal region of the person or persons responsible for its existence. .. IF YOU HAVE IT, GET RID OF IT !!! // Interesting? Here's one from the the Atlanta PC User's Group BBS, home of the Lone Victor: Date: 09-03-86 (17:14) Number: 3265 To: LONE VICTOR Refer#: NONE From: BILL MOSS Recv'd: YES Subj: SUG.ARC Sec'ty: PUBLIC MESSAGE Please take a look at SUG.ARC which purports to unprotect Softguard, but destroys the diskette by erasing all files but not the FAT. It appears to be in retaliation for your work. More than ever we need your help with SOFTGUARD 3.00. The lecture that goes along with SUG.ARC is too much!!! Assuming that Sofguard really did create this file, I have the following comments. First, Softguard's battle (battle? you might prefer to call it terrorism) against protection busters is almost moot, for most major software publishers have dropped the idea of copy- protection altogether. Perhaps this very fact has put Softguard's management in a mood bad enough to lash out thus. Second, Softguard's legal position seems quite shakey to me. Last year Vault corporation announced a software protection scheme that would, if it detected a fradulent effort to copy the software, make "Vietnam look like a birthday party" (or some such thing) by planting a worm that would slowly but surely destroy the user's files. When Vault announced its worm-based copy- protection scheme, many knowledgeable people expressed the opinion that Vault was likely to be liable for damages if people lost valuable data because of the scheme. What Softguard seems to be doing is definitely more vicious. Add together a probably unenforcible license agreement (to which Softguard isn't even a party as far as the user is concerned) and clear evidence of a vicious attempt to destroy the user's data, and you have a pretty good case against SUG.ARC's creator. In fact, you could very easily create a test case by (a) taking a legally-purchased copy of Softguard-protected software; (b) unpacking it without ever reading the "license agreement" in a state other than the handful (such as Lousiana and Illinois) that attempt to make such agreements enforcible; (c) having some valuable software on your hard disk, (d) "accidentally" destroying any backup copy already provided, and (e) trying to make a backup copy of the original with the help of SUG.ARC. It would be interesting to see what would happen if you then sued Softguard for damages. Interesting, but not very surprising. I think therefore that the Softguard folks (if SUG.ARC did indeed originate from them) are relying on the individual not having the financial resources to sue them or to withstand a long legal battle if they sue him. It's therefore a strategy of intimidation. (As an aside: That such a strategy of intimidation could be a viable one demonstrates a major flaw in this legal system. Justice costs a lot, sometimes so much that one can't afford it. There are several reasons for this, all avoidable, but none appropriate for discussion in this RT or under this topic.) How do users fight back? Perhaps we won't have to. It may be enough that the presence of this dangerous file be made widely known. Possibly as a result of the public outcry that followed its announcement of the worm scheme, Vault went into Chapter 11 bankruptcy -- poetic justice, I think. This left Softguard with a near-monopoly on the software protection business in the IBM PC world. If the SUG.ARC file is indeed Softguard's creation, then it seems to me they are following Vault down the Yellow Brick Road (or is it the garden path?) -- and I look forward to more poetic justice when the public outcry occurs again. Until next month - happy computing! Steve Sanders - Editor. {eof}