.TOPIC:                                           
Paths Configuration

                                           VBBS 6.12 Documentation -- 2-F-1


         ͻ
          CHAPTER TWO ANNEX F    4. PATHS CONFIGURATION                  
         ͼ

                This is the section of VCONFIG in which you can configure
         and optimize VBBS' use of your hard-drive space.

         1) Main VBBS Directory  (\VBBS)
            
                The system executables (*.EXE) belong in this directory,
                along with WFC.COM and your configuration (*.CFG) files.
                This should be your current directory when you are exe-
                cuting the program.  A typical path might be

                        C:\VBBS

         2) Scripts Directory  (\V)
            
                This is where VBBS expects to find any script and func-
                tion-block files:

                   *.V     *.COD     *.LIT     *.FB

         3) Data Directory  (\DATA)
            
                Where VBBS expects to find system data files:

                   USERFILE.DAT     CONNECT .DAT     NET.1 ... NET.999
                   USERFILE.IDX     AREACODE.NET
                   STATVBBS.DAT     NETWORKS.LST

         4) System Text Files  (\TXT)
            
                Where VBBS expects to find system text files:

                   *.TXT     *.ANS    *.ASC     *.MNU     *.PDM  *.RIP

                Note that many online-game programs generate score files
                that may be placed in this directory and viewed using the
                [B]ulletins option from the Main Menu.

         5)  CONTROL.DAT Directory
             
                Specifies in which directory VBBS will maintain the tem-
                porary system file containing the current user's informa-
                tion.  Multi-user installations NEED to set up a RAMdrive
                for this file; the same is also *recommended* for single-
                line installations (see "Optimizing VBBS" for details on
                setting up a RAMdrive).

         6) Temporary Directory  (\TEMP)
            
                This is the directory VBBS will use for temporary storage
                of incoming network packets and files.  The directory you
                specify here should not be used for any other purpose,

                                           VBBS 6.12 Documentation -- 2-F-2


                and it is NOT recommended that you use a RAMdrive for this
                directory (if the power goes, you could lose an entire net
                packet).

         7) Database Directory  (\DB)
            
                This is the directory where VBBS will store ALL database
                information, such as messages and file descriptions.

         8) Upload/E-Mail Directory  (\SYSOP)
            
                Specifies path for storage of E-mail with attached files
                and uploads from users (if you have all uploads going to
                the \SYSOP directory).  For tighter security, you may want
                to place the \SYSOP directory directly off of your DOS
                root directory.

         --> IMPORTANT NOTE:  You may specify whatever paths you wish for
                              these directories (and will need to for di-
                              rectories you wish to place in a RAMdrive),
                              but it is much less confusing to use the
                              default paths set up by the INSTALL.EXE
                              program.  It is recommended that you run the
                              system diagnostics anytime you alter any 
                              settings in this section of VCONFIG to verify
                              that they are correct.

.TOPIC:                                           
Download/Upload Protocols

                                           VBBS 6.12 Documentation -- 2-G-1


         ͻ
          CHAPTER TWO ANNEX G     DOWNLOAD/UPLOAD PROTOCOLS              
         ͼ

                PROTOCOLS are the means by which files are transferred to
         and from your system.  The original protocol was XModem, devel-
         oped by Ward Christensen; there are many more to choose from now.
         VBBS comes "out of the package" preconfigured to handle XModem,
         YModem, ZModem, ZModem-Batch, and HS-Link protocols and it own
         proprietary VXY protocol. Other protocols may added at your
         discretion.  Each protocol is configurable by:

         1) Which letter the user will press to select that protocol
         2) The name and description of the protocol
         3) DOS command line to run protocol.  Parameters passed are

                %1  COM port
                %2  baud rate
                %3  filename
                %4  handshake
                %5  UART rate
                %6  port base
                %7  port IRQ
                %8  channel number
                %9  upload directory

         4) Batch compatible? (Y/N)

                For most installations, the preconfigured protocols will
         be more than sufficient; should you wish to add other protocols,
         consult the protocol documentation for information on construc-
         ting the proper command line.

         --> IMPORTANT NOTE:  It is HIGHLY recommended that you use the
                              FULL path when you specify the filename of
                              your transfer protocols; these programs are
                              notorious for their pickiness in this re-
                              gard.  For example, with ZModem, you might
                              use the following command line to set it up
                              to receive files (upload protocol):

                                 C:\VBBS\DSZ port %1 ha %4 restrict rz

.TOPIC:                                           
Networks Configuration

                                           VBBS 6.12 Documentation -- 2-H-1


         ͻ
          CHAPTER TWO ANNEX H    7. NETWORKS CONFIGURATION               
         ͼ

                Selecting this option brings you to a list of networks,
         which is derived from NETWORKS.LST, a master multi-net listing.
         NETWORKS.LST is updated periodically as needed and should be placed
         in your /DATA subdirectory.

         --> IMPORTANT NOTE:  The NETWORKS.LST file is configureable
                              by the sysop.


         What happens after you get to the first screen of the NETWORK
         Configuration depends on what type of network you're configu-
         ring.  

        
         Type 1 Networks (VirtualNET-Type)
         
                When you select this type of network, you will be prompted
                for the following information:

         1) Node Number         Your system's unique assigned network ad-
                                 dress, expressed as a number (e.g., 2056).
         2) Net Directory       The network directory to be used by this
                                 VNET-based network; each network you set
                                 up must have its own UNIQUE directory.
         3) Protocols Allowed   Options are Zmodem, Ymodem, HSlink, and
                                VXY protocols
         4) Protocol Prefer.    Protocol that will be used when your
                                system initiates network transfers.
         5) Server              Your server's node number.
         6) Server Phone #      Your server's phone number.
         7) Server Call         Whether call to server is LOCAL or LONG
                                 DISTANCE.
         8) Server Threshold    Number of kilobytes that must be pending
                                 before automatic callouts to a server are
                                 allowed.  Between the Server Call and
                                 Server Threshold settings, VBBS deter-
                                 mines if and when to call out to your
                                 server for a network transfer.  If your
                                 server is LOCAL, the system will call
                                 whenever the threshold is met or excee-
                                 ded; if LONG DISTANCE, the system will
                                 call, once per day, between the hours of
                                 11:00 p.m. and 6:00 a.m. if the threshold
                                 is met or exceeded.
         9) Server Macro        "Macro" file needed to log onto the ser-
                                 ver's BBS, if any.  Most of the time this
                                 is not needed, and can be left at <none>.
         A) Server Password     Network server's password (if used).

         B) ZIP Trigger Level   Default 50k for prezipping packets before
                                initiating network callout.

                                           VBBS 6.12 Documentation -- 2-H-2

         C) Add/Edit/List       Used only if your system functions as the
            Clients              server for other systems.  More on this
                                 in a moment -- I can only indent so far.

         E. Edit Extended        Permits you to designate up to four
            Connections          different VirtualNET servers to connect
                                 to.

         U) Uninstall This      Allows you to drop participation in a net-
            Network              work.  VBBS will prompt for confirmation.

         
         If your system functions as server for one or more other systems,
         you need to configure each client separately using the C) option
         above.  When you select this option, you get a screen prompting
         for the following information:

         1) Client Node Number          6) Client Password
         2) Client Phone Number         7) Client Protocol
         3) Client Call                 8) Client Compression
         4) Client Threshold
         5) Client Macro                D) Delete This Client

         These data fields function exactly as do the "server" fields de-
         scribed above.

         If your system will connect to more than one VirtualNET server,
         selecting option E) Edit Extended Connections  will bring up the
         following menu:

         1. Node Number:
         2. Phone #:
         3. Call:
         4. Threshold:
         5. Macro:
         6. Password:

         To use extended connects you must set up an EXTEND.0 file
         in your NET subdirectory.  Please see VirtualNet helpd.

         Type 2 Networks (WWIVnet-type)
         
                When you select this type of network, you will be promp-
         ted for the following information:

         1) Node Number         Your WWIVnet node number.
         2) Data Directory      The FULL path to your WWIV \DATA direc-
                                 tory.
         3) Mode                This is either NET (for WWIVnet-style 
                                 networks) or LINK (for WWIVLink-style
                                 networks).
         4) EXE Directory       The directory containing the WWIV and 
                                VWW4 executable files.
         5) Dialout Init        Your modem's init string for calling 
            String               WWIV systems.

                                          VBBS 6.12 Documentation -- 2-H-3
         Type 3 Networks (UUCP-type)
         
                When you select this type of network, you'll be prompted
         for the following information:

         1) System Name         Your UUCP system address.
         2) News Directory      Full path to your NEWS directory (for
                                 newsgroup usage).
         3) User Directory      Full path to your USER directory (for
                                 E-mail usage).


         Type 4 Networks (FIDO-type)
         
                When you choose this type of network, you'll be prompted
         for the following information:

         1) Fido Address        Your FIDOnet address in standard format.
         2) NetMail Directory   Full path to the directory into which 
                                 incoming FIDOnet packets will be placed.
         3) OutBound Direc-     Full path to the directory in which out-
            tory                 going net packets are stored.
         4) Archiver            FIDO archiver to use (e.g., PKZIP -U).
         5) UnArchiver          FIDO unarchiver to use (PKUNZIP, etc.).
         6) FIDO Front-End      This can be FRONTDOOR, BINKLEY, or STAND-
                                 ALONE (the default).
         7) Nodelist:           Name of the NODELIST
         8) Zones:              Options are 1-8
         D) Dial List           Allows editing of your dialing list.
         R) Routing             Specifies mail routing.
         A) AKA's               Allows for other Fido-type networks


         In each case, you may select [U] to uninstall the network; you
         will be prompted for confirmation.  For more information on the
         various networks available, see MULTINET.DOC and NETGUIDE.DOC,
         as well as the documentation for the various network interface
         softwares (see below).

         --> IMPORTANT NOTE:  In order to install networks of Types 2,
                              3, or 4, you will need the proper network
                              interface software (VWW4.EXE, VUUCP.EXE,
                              or VFIDO.EXE, respectively). These
                              programs are freely available to sysops.
                              You should also set up your VirtualNET
                              entry for mail tossing to work properly.

.TOPIC:                                            
Events Configuration

                                            VBBS 6.12 Documentation -- 2-I-1


         ͻ
          CHAPTER TWO ANNEX I    8. EVENTS CONFIGURATION                 
         ͼ

                VBBS allows up to 20 timed events per day.  Possibilities
         for these events include your daily external maintenance routine
         (usually done through a batch file or three), network dialouts,
         online game maintenance, etc.

         1) Time
            
                The time the event is to run, entered in HH:MM format
                using military time.  A time of 00:00 disables the event.

         2) Command Line
            
                The DOS command line or batch file to execute.  For exam-
                ple, you might enter

                   C:\VBBS\EXTERNAL.BAT

                for an external daily-cleanup routine.  Complete pathnames
                are not required if the routines are located in your main
                VBBS directory, but it's better to make sure.


         There are a number of external utilities specifically designed
         for use with VBBS; they are listed in APPENDIX K. For online-game
         maintenance, please consult the game documentation.

.TOPIC:                                           
Control Panel Configuration

                                           VBBS 6.12 Documentation -- 2-J-1


         ͻ
          CHAPTER TWO ANNEX J    9. CONTROL PANEL CONFIGURATION          
         ͼ

                In addition to the commands already configured in the WFC
         menu, VBBS allows you to assign the F1 through F10 keys for what-
         ever functions you desire.

         ͻ    If you find yourself continually dropping to DOS to run
         ͼ    the same program over and over, it's probably a good idea
                to assign a function key to handle it.

         The default VBBS setup suggests some possibilities for using the
         F-keys.  F1 through F4 come preconfigured, but that's easy to
         change if you so desire.

         F1     Looks for a batch file called TERMINAL.BAT, which you
                 must create using an ASCII text editor.  This batch file
                 contains the command line that will start up your communi-
                 cations program (Telix, etc.).  Hereis an example of
                 a command line:

                        C:\VBBS\TELIX.BAT

                 and put TELIX.BAT in the main VBBS directory.

         F2     Calls up the system log, where information about the day's
                 callers and what they did is located.  Viewing the log
                 requires the DOS command line

                        TYPE C:\VBBS\DATA\BBS.LOG | MORE

                 (your actual path may vary, depending on what you've set
                 up in the PATHS configuration) or an external text-brow-
                 sing utility, such as VLIST.EXE.  Note that the DOS com-
                 mand line above does not allow you to back up through
                 the text, use arrow keys, or PgUp/PgDown; We recommend
                 using VLIST.EXE or LIST.COM.
         F3     Same as F2, but brings up the network log (the filename
                 is NETWORK.LOG and should be in your \DATA directory).
         F4     Same as F2, but brings up the cumulative system statistics
                 (the filename is DAYSTATS.LOG and should be in your \DATA
                 directory).  This one is particularly useful for tracking 
                 usage cycles and upload/download trends.


                Other potential uses for the F-keys include invoking a
         shell program (such as DCOM or StereoShell), a text editor (the
         DOS 6.0 editor or similar), or other programs you frequently run
         outside of VBBS. Be aware that several add-on utilities have
         been specifically developed for VBBS to call up sub-menus from
         F-keys so that maximum flexibility is available to you.

         --> IMPORTANT NOTE     : Place all batch files to call up
                                  function keys in your main VBBS
                                  directory.

.TOPIC:                                           
Doors Configuration

                                           VBBS 6.12 Documentation -- 2-K-1


         ͻ
          CHAPTER TWO ANNEX K    A. DOORS CONFIGURATION                  
         ͼ

                VBBS will run almost all modern doors and online games
         created for use on BBSes, either straight from the command line
         or through the use of an external door converter, such as DOORWAY
         or DoorMaster.  Doors can be called from function blocks or from
         scripts, as well as this internal doors configuration.
                VBBS shrinks out of memory for all external programs, re-
         serving only a small amount of RAM for its "hooks" that allow
         the user to return to the BBS.  VBBS creates the CHAIN.TXT,
         DOOR.SYS, and DORINFOx.DEF "drop files" which contain user infor-
         mation for use by the door program; most doors will accept at
         least ONE of these formats.  It should be noted, however, that
         some games, particularly WWIV- and PCBoard-specific games, re-
         quire the use of a door converter because of their use of DOS
         interrupts and their methods of handling ANSI graphics.

                When you choose item [A] from the VCONFIG Main Menu, you
         will see a scrolling-window screen listing the door programs you
         have installed, along with the SL needed to access them.  Moving
         the highlight bar and pressing [Enter] selects that program's
         configuration entry.
                When configuring a door program in VCONFIG, you will be
         prompted for the following information:

         1) Program Name
            
                The name of the door program, as it will be presented to
                the user.  Try to keep it short; long names will be trun-
                cated (not good if you like to include version numbers).

         2) Command Line
            
                The name of the batch file or command line to execute the
                door program, along with any command-line parameters that
                need to be passed to the door.  Again, full pathnames are
                recommended.

         3) Security Lvl
            
                The MSL (remember *that* abbreviation?) needed to access
                the program.

         4) Access Flag
            
                If set, allows only those users with matching access flags
                to access the program.  Access flags are set in the user
                editor; for more information, see "The User Editor".

         ͻ    Access flags can be useful in "beta-testing" door programs
         ͼ    to see if you've installed them correctly.  Before announ-
                cing you've got a new online game, give a couple of your
                trusted users access to the game using access flags and

                                           VBBS 6.12 Documentation -- 2-K-2


                get them to try to crash the game, tweaking your game set-
                up as necessary.  Once all the glitches are fixed, THEN
                drop the access flag requirement and announce your new on-
                liner; this can spare you some grief from vexed hard-core
                gamers (the kind of feedback you LEAST want to hear).

         5) Single User
            
                Indicates whether the game is playable on single nodes or
                multi-nodally.  Single-line installations should leave
                this set to YES.

         6) Credit Cost
            
                Allows sysops running a credit system to charge credits
                for door program access.  This is configurable for each
                individual game.

         ͻ    Setting up a credit cost for games can either be a great
         ͼ    boost for your message-base traffic, or it can be a night-
                mare.  If you use this feature, make sure you don't set
                your credit costs so high that it takes an inordinate
                number of posts or uploads to earn enough credits to play 
                the games.  

         D) Delete This Entry
            
                Self-explanatory.


         ͻ    Getting door programs to run correctly, especially upon
         ͼ    exiting and re-entering the BBS, is probably the most
                difficult task a sysop faces.  Door games are rapidly
                becoming more complex, and as they do so, their indivi-
                dual requirements and quirks are doing likewise.

                In installing door programs, patience IS a virtue; many
                times, installation involves a good deal of trial and er-
                ror.  The importance of reading the door program's docu-
                mentation, especially with regard to installation, can
                not be overstressed.

                In addition, Appendix J contains sample batch files and
                command lines for some of the more popular online games.

         ͻ    Some door converters (not included with VBBS) will allow
         ͼ    the sysop to configure a remote sysop drop-to-DOS; this
                is a chancy business at best, and caution is advised.

              For installation of games under OS/2, please refer to
                Appendix D for information.

.TOPIC:                                           
Voting Booth

                                           VBBS 6.12 Documentation -- 2-L-1


         ͻ
          CHAPTER TWO ANNEX L    B. VOTING BOOTH                         
         ͼ

                VBBS' Voting Booth allows you to present your users with
         a perpetual survey in which they can "vote" on particular issues
         you define.  Frequently-asked questions deal with political can-
         didates, which online games should be registered/discontinued,
         reasons for calling the BBS, how users first heard of your BBS,
         how they like changes you've made, etc.

                When you select this option from the VCONFIG Main Menu,
         you will see a scrolling window containing the questions them-
         selves.  To select a question for editing, move the highlight
         bar to the correct entry and press [Enter].  The question and
         its responses will then be available for editing.
                To add a new voting question, press [F1] at the scrolling-
         window screen.  You may then type in a question and supply up to 
         eight responses from which your users may choose.
                The poll results are displayed as the number of users
         choosing a particular answer, along with the percentage of the
         total number of votes each choice received.

                In the default START.V, if new questions exist, when a
         user logs on, she is given the opportunity to vote.  If the user
         is up to date with the survey, the voting questions are ignored.
         You may use option [D] from Screen Three of the MAIN configura-
         tion to disable this automatic checking if you wish (see p. 15
         for details).

                There are several VSCRIPT-based voting programs avail-
         able, any of which may be used in lieu of the default voting 
         procedures.


.TOPIC:                                           
Random Messages

                                           VBBS 6.12 Documentation -- 2-M-1


         ͻ
          CHAPTER TWO ANNEX M    C. RANDOM MESSAGES                      
         ͼ

                VBBS features an optional "random messages" function that
         can display one-, two-, or three-line messages right before the
         user initially sees the Main Menu.  Random messages are commonly
         used for quips and quotes or friendly advertisements for other
         BBSes in the area; you may, of course, use them for whatever pur-
         pose you wish (or not use them at all, if you so desire).
                To add a random message, press [F1] at the scrolling-
         window initial screen and type in your message.  DO NOT press
         [Enter], as that will delete the currently-highlighted random
         message.
                Random messages are displayed by including the RANDOM com-
         mand from anywhere within a VSCRIPT or function block.

.TOPIC:                                           
Archive View Configration

                                           VBBS 6.12 Documentation -- 20N-1


         ͻ
          CHAPTER TWO ANNEX N    D. ARCHIVE VIEW CONFIGURATION           
         ͼ

                VBBS allows you to view the contents of a compressed file
         within the file transfer directories.  The default VBBS comes
         configured for .ZIP, .ARC, .ARJ, .ZOO, and .LZH archives; you
         may add others if you wish by pressing [F1] at the initial scrol-
         ling window and adding the information when prompted.

                Note that in order to view the contents of an archive for-
         mat, you must have the appropriate archive program where the sys-
         tem can find it; including the full path to the program in the
         command line is usually the best way to do this.

              OS/2 version   :  Please refer to Appendix D for
                                  archiver information related to OS/2.

