Virtual Advanced | Features | Download | Documentation | Support
VCONFIG.DOC
  1. VCONFIG
  2. Main Configuration
  3. Main Configuration - Screen 1
  4. Main Configuration - Screen 2
  5. Main Configuration - Screen 3
  6. Channel Configuration
  7. Database Configuration
  8. Message Databases
  9. File Databases
  10. Custom Databases
  11. Optimize Databases
  12. Compile Network Info
  13. Automatic QWK Numbering
  14. Make NEWS.LST for NNTP
  15. CDROM/HardDrive Auto-Setup
  16. Configuring and Editing Databases in VCONFIG
  17. Paths Configuration
  18. Download/Upload Protocols Configuration
  19. Networks Configuration
  20. Events Configuration
  21. Control Panel Configuration
  22. Doors Configuration
  23. Voting Booth
  24. Random Messages
  25. Text Sections
  26. Multi-Feedback
  27. Quick-Validation
  28. SLIP/CSLIP/PPP Pass-Thru
  29. Door Set-Up Hints
  30. Preparation Installation and Execution of Doors
  31. Games That Look in Their Own Directories
  32. Games That Examine a Configuration File
  33. Games That Use a Command Line Parameter
VCONFIG
		VCONFIG.EXE is the main Virtual Advanced (VA) configuration
	 utility, and you will more than likely spend alot of time with it.
	 It was designed to be simple to use and yet powerful enough to let
	 you manipulate configuration settings at the "low level" if desired.
	 VA Installation INSTALL.EXE will set most essential configuration
	 settings to proper default values when you set up the program for the
	 first time.  With the possible exception of COM port settings, you may
	 not need to make any changes to the configuration in order to execute
	 the software for the first time.  However, you will want to use VCONFIG
	 to customize your system before officially bringing your BBS online.
	 You may use VCONFIG at any time to make changes as needed.

	 The VCONFIG Main Menu:

	 Selection

	 1) Main Configuration
	 2) Channel Configuration
	 3) Database Configuration
	 4) Paths Configuration
	 5) Download Protocols
	 6) Upload Protocols
	 7) Network Configuration
	 8) Events Configuration
	 9) Control Panel Configuration
	 A) Doors Configuration
	 B) Voting Booth
	 C) Random Messages
	 D) Text Sections Configuration
	 E) Multi-Feedback Configuration
	 F) User Quick Validation
	 G) Heart Code (Ctrl-C) Colors
	 H) Diagnostics
Main Configuration
		The "Main Configuration" portion of the set-up actually
	 consists of several settings spread over three screenfuls.  Each
	 screen is devoted to a particular function.  Screen 1 is the screen
	 for alphanumeric data inputs such as BBS Name, Sysop Name and
	 the like.  Screen 2 is composed of several toggle switches, most
	 of the On/Off or Yes/No variety. Screen 3 deals with security
	 issues such as security levels to be assigned to new users and
	 so on.

		What follows is the name and description of each field:
Main Configuration - Screen 1
       > BBS Name

	 The name of your BBS.

       > SysOp Name

	 The name of the SysOp of System Administrator.  Whether you
	 enter your real name here, or an alias is up to you.  If you have
	 multiple system operators then this field should contain the name
	 of the primary operator.

       > Local Time Zone

	 This field should contain a description of the time zone
	 your BBS is located in.  For US SysOps, there are pricipally
	 four time zones: Eastern, Central, Mountain and Pacific.
	 The proper abbreviation depends on the time of year:

	 Zone                       Standard Time     Daylight Savings Time
				      (Winter)             (Summer)

	 Eastern                        EST                  EDT
	 Central                        CST                  CDT
	 Mountain                       MST                  MDT
	 Pacific                        PST                  PDT

       > New User Password

	 In this field, you may specify your system's new-user
	 password.  Leaving this field blank disables the new-user
	 password.  The presence of a password in this field will
	 require that a first-time remote caller know the password
	 to create an account.

       > System Password

	 This field contains your system password and is an optional
	 level of security.  All users with a security level (SL) of
	 255, or sysop security, will be prompted for the system password
	 when logging in.

       > Waiting-For-Call Screen Drive List

	 This is the list of hard drives you want displayed on the
	 WFC (Waiting-For-Call) screen.  The drive letter, size, free
	 space, and percentage of space free will be displayed.  If free
	 space drops below a particular percentage, that display line
	 will change color.

       > Phone Number Format

	 This setting lets you customize the entry format for phone
	 numbers as prompted during new user account creation.
	 United States systems, for example, should set this field to
	 ###-###-####.  Non-US systems should set this field as
	 appropriate for their local calling region.

       > Net Low Time
       > Net High Time

	 These two settings let you specify a period of time for
	 network transfers.  During net time, users calling the BBS
	 will receive the text message as configured in the external
	 string file and be logged off.  This is a way to open up a busy
	 BBS for network calls, typically late at night.  Use of this
	 feature may be required in some networks.  The "net low time"
	 is the beginning of the net period; the "net high time" is the end
	 of the net period.  The times must be entered in HH:MM format using
	 military time; if both are set to 00:00, the feature is disabled.

       > QWK Packet Filename

	 This is the name you wish to give to QWK packets being
	 sent from your system.  It is recommended that you give
	 this field a unique six-character alphanumeric name.
Main Configuration - Screen 2
       > Tossing Options

	 The possibilities for this switch are:

	 Direct       Incoming network posts written directory to
		      destination database, skipping LOCAL.NET
		      and increasing system efficiency.

	 Background   Instructs mail tossers to toss mail in the back-
		      ground, if possible, after completing network
		      transfers with other systems.

		      Note: VA-OS2 and OS/2's "START" command supported
			    at this time.  Future support to include
			    VA-DOS and Win95's "START" command.

	 LoadSense    Allows mail tosser to sense when users are online.
		      When users are online, a small amount of CPU time
		      is yielded by the mail tosser so that the system
		      is more responsive to users, while only slightly
		      slowing the pace of mail tossing.  When no users
		      are online, the mail tosser goes at full speed.

	 Note that the switches Direct, Background, and LoadSense may
	 be used together in any desired combination.

	 Standard     This indicates that all three switches are disabled.

       > New Upload Scanner

	 If set to Scan & Warn, VA will automatically scan uploaded
	 files for viruses, alert you, and keep the file for your
	 inspection.  If set to Scan & Delete, a suspect upload will
	 be automatically deleted.  If set to Disabled, VA will not
	 check uploaded files at all.

	 The included scanner program automatically identifies the
	 archive format (ZIP, ARJ, LZH, and ARC) and also tests uploaded
	 archives for integrity.  In addition, it automatically adds
	 your archive comment (ZIPCOMNT.TXT) and reads file descriptions
	 provided in FILE_ID.DIZ format.

	 The default virus scanner software supported by the upload checker
	 is McAfees SCAN software for DOS and OS/2.  A log file, UPLOAD.LOG
	 is created for your review.  Alternate virus scanners can be
	 configured through SCANNER1.CFG and SCANNER2.CFG files.

	 If you desire to configure alternate virus scanning software,
	 you must create two text files: SCANNER1.CFG and SCANNER2.CFG.
	 SCANNER1.CFG/SCANNER2.CFG should contain one line of ASCII
	 text describing the desired DOS or OS2 command line.

	 The command line configured in SCANNER1.CFG is used for scanning
	 a single file.  The command line configured in SCANNER2.CFG is used
	 for scanning a whole directory of files. %1 may be used on the
	 command line as a replacable parameter to mean either filename
	 (SCANNER1.CFG) or directory name (SCANNER2.CFG).

       > Log Detail Level

	 This defines the level of detail that VA maintains in
	 its BBS.LOG file.  There are two settings: Normal, which
	 shows the typical actions of a user (login time, door calls,
	 etc.), and Extended, which also shows the individual key-
	 strokes the user makes at the various menus within the system.

	 The Extended level is useful for tracking the users use of
	 the BBS; it can be particularly helpful in identifying users
	 who head straight for the Game or File Transfer sections.

       > LOGOFF.BAT/CMD

	 There are three possible settings for this option: No, Channel 1
	 Only, and All Channels.  This option allows you to configure
	 utilities (archive converters, information updates, etc.) to be
	 run when a user logs off.

	 Parameters passed to the batch file are:

	 %1  Channel Number
	 %2  COM Port

	 Note: VA for DOS executes LOGOFF.BAT
	       VA for OS2 executes LOGOFF.CMD

       > MultiTasker

	 This switch lets you optimize program execution depending
	 on which multitasker (Desqview, Windows 3.1, Windows 95,
	 Windows NT, or OS/2) you may optionally be using to multitask
	 two or more sessions of VA.

       > Allow Handles

	 If this setting is set to No, then users will be required to use
	 their real name as their Account or Login ID.  If this setting
	 is set to YES, then users are free to use either their real name,
	 or an arbitrary "handle" identification for their Login ID.

       > Sys PW/WFC SysOp

	 If this is set to Yes, then the system password is re-
	 quired to access certain functions from the WFC screen.
	 It is useful if your BBS needs to be secure locally; if you
	 have a lot of your users dropping by, or if you have
	 small children lurking about the computer, for example.

       > Ignore Extensions

	 VA automatically checks for duplicates when a caller uploads a
	 new file to the system.  With this option enabled, VA will treat
	 filenames with the same name (but different extensions) as being
	 the same, and therefore, duplicates of each other.

       > Req. Filename Entry

	 If set to No, the user is given the choice between entering
	 filenames and descriptions prior to upload or after the upload.

	 If set to Yes, the user is required to enter filenames and
	 descriptions before the upload.  When filenames and descriptions
	 are entered before the upload, the user is also given the option
	 of automatic logoff when the upload is complete.

	 It should also be noted that once the file has actually been
	 received, the BBS will check for the existance FILE_ID.DIZ
	 within the archive, and make use of that description data also.

       > Inverse Bar

	 If set to Yes, an inverse-color bar will be drawn on certain
	 input fields, to show the user how much space he/she has to
	 enter the information.  If set to No, the bar is not displayed.

       > Display Networks

	 If set to No, minimal network information is displayed
	 when the user does an online database listing.  If set to
	 Yes, then full network information is displayed.

       > Force Feedback

	 If set to Yes, then external string #397 is displayed to the
	 new user, and they are prompted to leave feedback to the sysop.

       > Auto-Check Polls

	 If set to On, VA checks to see if there are voting questions
	 the user has not answered yet.  If new questions are found,
	 the user is prompted to vote.

       > Allow DIRECTmail

	 If set to On, DIRECTmail is enabled.  This is necessary for
	 DIRECTmail FREQ ability.

	 For DIRECTmail to pass between two VA systems, this feature
	 must be enabled at BOTH ends of the connection.

       > Secure Uploads

	 If set to On, then all new uploads are pathed to the \SYSOP
	 directory, where they sit until the sysop manually moves
	 them to their proper directories.  If set to Off, uploads
	 go directly into the directory in which they're uploaded.

	 When enabled, you have the ability to check over each file
	 before it is made available to the users of your BBS.

       > SysOp F-Key Lockout

	 When set to Yes, the SysOp Function Keys normally available
	 to a SysOp when he/she or a user is online, are disabled.
	 You would use this option if you are using VA as a multi-user
	 mail system on a local area network with many people using
	 the system locally (ie not via modem).

       > Detect FIDOnet

	 If set to On, VA internal FIDOnet detection is enabled.  The
	 included VFIDO.EXE is called upon to handle the remainder of
	 the call if an incoming FIDOnet call is detected.

       > Allow Remote SysOp

	 If set to Yes, Virtual Advanced will allow remote sysop logins
	 ( security level >= 255 ). If set to No, then VA will allow
	 the caller to login, but at only 254 SL.
Main Configuration - Screen 3
     >>  Security Levels:

       > Autopost

	 This setting is the minimum security level (MSL) needed
	 to write an autopost on the system.

       > Email Others

	 This setting is the minimum security level (MSL) needed
	 to write email to other users (other than the SysOp).
	 You might use this to screen out problem users who misuse
	 the email functions of your BBS.

       > Email SysOp Att File

	 This setting is the minimum security level (MSL) needed
	 to write email to the sysop with attached file.

       > Email Other Att File

	 This setting is the minimum security level (MSL) needed
	 to write email to other users with attached file.

       > MultiMail

	 This setting is the minimum security level (MSL) needed
	 to be allowed to use the system's multi-mail (Mail List)
	 facilities.

       > Email Carbon Copy

	 This setting is the minimum security level (MSL) needed
	 to be allowed to use the carbon copy feature.

      >> New User Defaults

       > Security Level

	 This setting specifies the security level which is assigned to
	 new users who call your BBS.

       > Time Limit

	 This setting specifies the time limit which is assigned to
	 new users who call your BBS.

       > Credits

	 This setting specifies the number of credits which are given to
	 new users who call your BBS.

      >> Credit Accounting

       > Cost/Minute

	 This setting specifies the number of credits deducted per
	 minute of online time used by the caller.  A setting of zero
	 disables this feature.

       > Cost/Download KB

	 This setting specifies the number of credits deducted per
	 kilobyte downloaded by the caller.  A setting of zero
	 disables this feature.

       > Given/Post

	 This setting specifies the number of credits awarded per
	 message posted by the caller.  A setting of zero disables
	 this feature.  Note that if a user posts a message and deletes
	 it, they lose the credits they were awarded.  This keeps callers
	 from posting nonsense just to get credits.

       > Given/Upload KB

	 This setting specifies the number of credits awarded per
	 kilobyte uploaded by the caller.  A setting of zero disables
	 this feature.

      >> Call-Back Verifier

       > Security Level

	 This setting specifies the security level assigned to new
	 users who successfully pass call-back verification.  A setting
	 of zero for this field disables the call-back verifier.

       > Time Limit

	 This setting specifies the time limit assigned to new users who
	 successfully complete call-back verification.

      >> Auto-SysOp Validation

       > Security Level

	 This setting specifies the security level assigned to new users
	 who request auto-sysop validation.  A setting of zero for this
	 field disables auto-sysop validation.

       > Time Limit

	 This setting specifies the time limit assigned to new users who
	 who request auto-sysop validation.

      >> Miscellaneous

       > Inactivity Timeout

	 This numeric value determines how long a user may remain
	 inactive (not typing anything) before being automatically
	 logged off the BBS.  The value is expressed in seconds,
	 and the user will receive a "beep" warning at the midpoint
	 of the interval.  For example, a setting of 360 seconds would
	 allow for 6 minutes of inactivity.  The user would receive an
	 audible warning after 3 minutes, and be logged off after 3
	 more minutes of inactivity.

       > Blank WFC Screen

	 This setting configures the VA automatic WFC (Waiting
	 For Call) screen blanker.  Like the "Timeout" option,
	 this value is expressed in seconds; a value of 300 seconds in
	 this field would blank out the WFC screen after 5 minutes.
	 A value of 0 in this field disables screen blanking.

       > Reserve Space

	 This setting, expressed in kilobytes (KB), instructs VA
	 to reserve some of your hard-drive space so that suffi-
	 cient space to operate the BBS is always available on your
	 hard drive.  When the free space on your upload drive
	 drops below this value, uploads will not be allowed onto
	 the board; this is for your protection.  A value of 0 in
	 this field disables this feature.

       > # Active Channels

	 This setting lets you optimize VA for the number of
	 simultaneous online users (active ports) that you will be
	 running on your multi-user VA installation.  If you have two
	 lines running into your multi-user VA, set this to 2; if
	 you have four lines, set it to 4, and so on.  Single-line
	 VA installations should set this value to 1.

       > Network Poll Delay

	 This setting configures how often VA checks to see if
	 it needs to perform some type of automatic network dial-
	 out.  It is expressed in seconds (i.e., a value of 600
	 would represent 10 minutes).

       > UL/DL Ratio

	 This is the place for the desired upload to download ratio.

	 This setting specifies the optional system upload/down-
	 load ratio.  If enabled, it requires that users upload
	 files in order to be able to download them.  A setting of 0
	 disables ratio's entirely.  To calculate the value to enter
	 in this field, use the following formula:

	 decimal ratio = (required uploads) / (allowed downloads)

	 For example, to require that a user upload 1K for every
	 5K downloaded (a ratio of 1:5), you would convert the
	 fraction 1/5 into a decimal and enter the value .2 in
	 the ratio field.  Other values are possible; some of the
	 more common ones are:

		.1   (1:10 ratio)     .05  (1:20 ratio)
		.25  (1: 4 ratio)      .5  (1: 2 ratio)

       > QWK Message Limit

	 This setting defines the maximum number of QWK messages
	 to put into one QWK packet.

	 Suggesting a good number to enter in this field is dif-
	 ficult to do.  If you have a large number of active net-
	 worked message bases, you will probably want to set this
	 high (say, 500 or so).  This is a trial-and-error setting,
	 but easily changed.

       > Mail Hold Time

	 This specifies the time, in days, that E-mail should be
	 kept active on the system.  When an E-mail reaches the
	 age limit, it is automatically purged from the BBS.  A
	 value of 0 disables this feature, although this is not
	 recommended.

       > Max Time Bank

	 This specifies the maximum number of minutes that a user
	 may deposit into their time bank.  A setting of zero will
	 disable the built-in time bank feature.

       > Redial Attempts

	 This specifies the number of network redial attempts VA's
	 network utilities should make for each try.

       > Rings To Answer On

	 This setting defines how many times the phone will be
	 allowed to ring before VA answers.  For most installa-
	 tions, a setting of 1 is proper.  If you have Caller ID
	 on your system, you may want to set this to 2 to give your
	 equipment time to "capture" the originating phone number.

       > VCONFIG Colors

	 These allow you to set the screen colors used by VCONFIG.
Channel Configuration
		In this section of VCONFIG you can configure the multi-user
	 communications aspects of VA.  You can define the COM port, baud
	 rate, modem initialization string and so on for each CHANNEL (line)
	 you will be running.

		When you bring up the CHANNEL configuration screen, you
	 will see a long list of channel numbers and their current
	 characteristics.  To edit a particular line, use the arrow keys
	 to move the highlight bar to the channel you want to edit, then
	 press [Enter].  This will bring up a second screen with the
	 following information:

       > Serial Port

	 This setting can range from COM1 to COM8 for "standard"
	 communications ports, DigiPort 1 to DigiPort 64 for DigiBoard
	 ports, Fossil Device 0 to Fossil Device 15, or Local (no COM
	 port used).  Whichever port you specify here is what this channel
	 will use.  (By using the Local setting, VA could be used as an
	 inter-office mail system on a LAN.)

       > Base Address (Hex)
       > IRQ (Hex)

	 For unique addressing, you may configure the port base address
	 and IRQ directly.  Both entries should be entered in hexadecimal
	 format.

       > Baud Rate

	 This field sets the baud rate of the COM port.
	 Valid ranges for the DOS version are 300 to 115200 baud,
	 and for the OS/2 version, 300 to 57600 baud.

       > Locked Baud Rate

	 If you are using a standard 2400-baud modem without error
	 correction, this should be set to No.  If you are using a
	 high-speed modem, or a modem with error correction, this
	 should be set to Yes.

       > Hardware (RTS/CTS) Handshake

	 If you are using a standard 2400-baud modem without error
	 correction, this should be set to No.  If you are using a
	 high-speed modem, or a modem with error correction, this
	 should be set to Yes.

       > Minimum Baud Rate Allowed

	 This feature can be used to "lock out" users using slower
	 modems, should you desire to do so.  This can be config-
	 ured independently for each active channel.  For example,
	 a sysop running a single-channel installation may wish
	 to lock out 300-baud callers and would enter a value of
	 1200 in this field.  A value of 0 in this field disables
	 the minimum-baud-rate feature.

	 If you are running more than one channel, one of which
	 uses a high-speed modem, you may wish to use the minimum-
	 baud-rate feature to reserve the high-speed channel for
	 the exclusive use of high-speed callers.

       > Init String1

       > Init String2

       > Init String3

	 Up to 3 modem initialization strings of up to 40 characters
	 each may be entered here.

       > Off-Hook String

	 The string configured here is sent the modem when the BBS
	 needs to take the phone off-hook, as when processing netmail
	 or some other offline event or task.  If you do not want to
	 modem to busy out the phone line, then leave this field blank.
	 This field is typically set to ATH1, but can be altered to suit.

       > Answer String

	 The string configured here is sent the modem when the BBS
	 needs to answer an incoming call.  This field is typically
	 set to ATA.

       > Dial String

	 The string configured here is sent the modem when the BBS
	 needs to dial an outgoing call.  This field is typically set
	 to ATDT.

	 Modem strings may optionally contain the following special
	 characters, which VA will filter out and act upon accordingly:

	 ~    2 Second Pause
	 {    Carriage Return
Database Configuration
		VA uses a sophisticated database structure for storage
	 of message bases and file listing directories.  It can also be
	 used for custom script-based applications.

		There are three basic types of databases: message databases,
	 file databases, and other databases.  All databases may be set
	 up and grouped into Topic Areas.  Each topic area needs its own
	 DBGROUP identifier, which may be any letter, number or symbol
	 from ASCII characters 33 to 255.

	      When you enter the DATABASE configuration screen, you are
	 presented with a scrolling menu of choices:

	 Message Databases
	 File Databases
	 Custom Databases
	 Optimize Databases
	 Compile Network Info
	 Automatic QWK Numbering
	 Make NEWS.LST for NNTP
	 CDROM/HardDrive Auto-SetUp
Message Databases
	 Message bases, also known as "message subs" or simply "subs,"
	 are databases in which messages are stored.  Subs may be about
	 a specific topic, or they may simply be "chat"-type subs in
	 which people can write messages, or "post", about whatever is
	 on their minds.  Selecting this option will let you edit the
	 Message Base set-up.
File Databases
	 The file databases work in much the same way as the message bases,
	 except that they store file descriptions instead of messages.
	 The major difference between the way file and message databases
	 are set up is that each file database requires a unique, specific
	 sub-directory to store the actual files your users will be download-
	 ing from your BBS.  The file directory must be manually created by
	 the SysOp, and existing file downloads placed there.

	 To upload these files locally, the SysOp uses the /UPL command on
	 the Transfer Menu where he will be prompted to add descriptions.
	 Like message databases, file databases may be grouped into topic
	 areas by giving each topic a unique letter DBGROUP identifier.
	 Selecting this option will let you edit the File Area set-up.
Custom Databases
	 Custom databases may be set up to work in conjunction with
	 script-based applications.  Selecting this option will let
	 you edit Custom Database set-up.
Optimize Databases
	 Compresses and reorganizes the DATABASE.CFG file so that
	 database groups and databases can be accessed most quickly.
Compile Network Info
	 Recompiles the data which establishes the "connection"
	 bewteen a database and a networked message area or file area,
	 so that network interface programs like VUUCP and VFIDO
	 can run most quickly.
Automatic QWK Numbering
	 Automatically assigns QWK conference numbers to all un-numbered
	 (QWK conference number=0) message bases.
Make NEWS.LST for NNTP
	 Create the ASCII file NEWS.LST, for use by VISK's NNTP software.
	 VISK = Virtual Internet Survivial Kit.
CDROM/HardDrive Auto-SetUp
	 Allows the SysOp to automatically set-up file directories
	 in VCONFIG.  The directories can be on either hard-drive
	 or CDROM.  This program works by seeking out directories
	 containing FILES.BBS, and setting those directories up
	 in VCONFIG.

	 After this step is completed, login to the BBS as SysOp, and
	 do a sysop upload (/UPL) on the newly set-up directories, and
	 select Automatic Upload.  Files will be uploaded automatically
	 with minimal sysop intervention required.

	 This process should handle most BBS-ready CD's without the need
	 for any external utilities.

	 Tip: This procedure can be used to auto-upload files on
	 hard drive also. If you are migrating from another BBS
	 software that used FILES.BBS, then your set-up and conversion
	 should be very easy. If you don't have FILES.BBS in your
	 directories, then create a "fake" one that consists of
	 one empty line -- this will allow VCONFIG to find the
	 directory and set it up for you.
Configuring and Editing Databases in VCONFIG
	 Z) DB Group

	 This is a letter (A-Z), numeric digit (0-9) or any other
	 ASCII character from 33 to 255.  This field designates
	 which database topic group this database

	 It is not necessary to create a new database group each
	 time you wish to add a new database.  You may put up to 100
	 Databases into each Database Group.

	 1) File Name

	 This is the filename to be used by the database.  Any legal
	 filename of 8 characters or less may be used, and may not
	 contain periods or spaces.  Each database must be assigned
	 a unique filename.

	 The importance of giving databases unique filenames cannot
	 be overemphasized.  Database entries that have the same
	 database filename specify the same database!

	 2) Files Path

	 Enter a path in this field only if you are creating a
	 file database or a custom database that uses messages or
	 files.  If you are setting up a message database, leave
	 this field blank.

	 3) Long Name

	 This is the longer, more descriptive database name that
	 is displayed to the user, such as "General Discussion."

	 4) Private? (Y/N)

	 This switch is for special uses only.  You should set this to
	 No when creating public-access message and file databases.

	 5) Max Entries

	 This defines the desired size of the database (in messages or
	 files, not bytes).  A value of 0 in this field allows un-
	 limited message/file storage.  A non-zero number in this field
	 sets a limit on the number of messages/files.

	 When VA runs daily cleanup, it will "pack" the database
	 by removing enough of the oldest messages, bringing the database
	 back to the specified limit.

	 For file databases, you should set the limit to 0.
	 Gauging the proper limit for a message database is largely
	 a matter of trial and error.  For slow message bases, you
	 will want to keep the limit fairly low, to promote message
	 turn-over.  For active subs, like large FIDOnet and Internet
	 conferences, you may want to set it somewhat higher.

	 6) Read SL

	 This is the minimum security level needed to access (read)
	 the database.  If the user's SL is less than this value,
	 the database will not show up in their listing.

	 7) Write SL

	 This is the minimum security level needed to write (post)
	 in the database.  If the user's SL is less than this
	 value, the database will not allow posts or uploads.

	 8) Access Flag

	 This setting defines which access flag, if any, must be
	 set in the user's account to access the database.  This
	 value may be none, or a letter from A to Z.  If set to a
	 letter, the user must have a matching access flag in his
	 account information in order to access the database.  Access
	 flags are set in the user editor (see "The User Editor" for
	 details).

	 Access flags are useful for restricting access to databases
	 to a particular group of users.  For example, if you wanted
	 to have a sysops-only sub, you could enter an 'S' in
	 this field and give visiting sysops an 'S' access flag.
	 They would be the only users who could access the database.

	 9) Age Limit

	 This setting defines the minimum age required to access
	 this database.  For example, a value of 18 in this field would
	 require that a user be at least 18 years old to have access
	 to the database.

	 A) Tagline

	 This setting optionally specifies a tagline file to be used
	 with this database.  Contents of the tagline file are appended
	 to messages posted in the database.  If set to zero or left
	 blank, no tagline is added (see "System Taglines" for
	 more information).

	 B) Random Titles

	 This setting specifies which random title file to use in
	 messages, and is disabled if set to 0.  The range for
	 this value is 1 to 999; specifying a value here instructs
	 VA to look for the file RNDTITLE.xxx (where "xxx" is the
	 entered value, without leading zeroes) in your VA Text
	 Directory.  Entries in RNDTITLE.xxx file may be made using an
	 ASCII text editor and should be one per line in this file.

	 C) Name Used

	 This setting defines the name used in the "From:" field
	 when a new message or file upload is saved in the database.
	 The possible settings are handle, real name, or anonymous.

	 D) QWK Conference

	 This setting defines the database's QWK conference number
	 as used by QWK-format offline mail readers.  The range for
	 this value is from 2 to 255, and each QWK conference
	 assignment must be unique to the particular database.

	 E) Database Co-Sysop

	 Some sysops allow trusted users to moderate discussions on
	 local message bases.  This setting defines the co-sysop,
	 sub sysop, or moderator for the database.  Leaving this
	 field blank disables this feature; any nonzero value specifies
	 the user number of the moderator.

	 F) Req Net Validation

	 If you wish to review posts before they are transmitted
	 out to any networks, turn this option ON.  Post validation
	 is handled via the [V] option from the Sysop Menu within VA.

	 G) Networks Configuration

	 Selecting this option allows you to directly edit the network
	 configuration for the database.  This is not the recommended
	 approach; rather, VMB.EXE should be used for this purpose.
	 VMB.EXE makes it quick and easy and painless.  Use of the VCONFIG
	 editor lets you access the low-level portions of the database
	 configuration and do things manually:

	 If you wish the database to be networked, you must configure
	 the network and network sub/conference identifier.  VCONFIG
	 will prompt you for the network, then for the identifier.
	 The format of the identifier varies from network to network.

	 You can configure a database to be on one network or on several
	 networks.  Configuring a database to be on multiple networks
	 creates a "gateway" between two or more networks.  The common
	 term is "gating."

	 Prior to establishing a gateway connection, you should obtain
	 permission from any conference or message base host/moderator.
Paths Configuration
		This part of VCONFIG configures the path settings for your
	 VA installation.  These settings are set-up for you when you
	 install VA, but you may wish to change and/or optimize these
	 settings in the future.

	 1) Main Directory  (\VADV)

	 The system executables (*.EXE) belong in this directory along with
	 your configuration (*.CFG) files.  This should be your current
	 directory when you are executing the program.  A typical path
	 might be "C:\VADV".

	 2) Scripts Directory  (\VADV\V)

	 This is where VA expects to find script (*.V) and function-block
	 (*.FB) files.

	 3) Data Directory  (\VADV\DATA)

	 This is where VA expects to find system data files:
	 USERFILE.DAT    CONNECT .DAT     NET.1 ... NET.999
	 USERFILE.IDX    STATVBBS.DAT     NETWORKS.LST

	 4) System Text Files  (\VADV\TXT)

	 This is where VA expects to find system text files:
	 *.TXT     *.ANS    *.ASC     *.MNU     *.PDM     *.RIP     *.VWC

	 5) CONTROL.DAT Directory

	 This specifies in which directory VA will maintain the temporary
	 system file containing the current user's information.  It is
	 highly recommended that you use a RAMdrive for this directory.

	 6) Temporary Directory  (\VADV\TEMP)

	 This is the directory VA will use for temporary storage
	 of incoming network packets and files.  The directory you
	 specify here should not be used for any other purpose.

	 7) Database Directory  (\VADV\DB)

	 This is the directory where VA will store all database
	 information, such as messages and file descriptions.

	 8) Upload/E-Mail Directory  (\SYSOP)

	 This specifies the path for storage of E-mail attached files
	 and new uploads from users.

	 9) FDX Database Directory

	 This specifies the path for storage of the database files
	 .FDX components.  These components are responsible for
	 fast filename searches.  For optimum efficiency, this directory
	 should be a unique directory on your fastest hard drive, and
	 the directory should not be used for any other purpose.
	 It is also OK to use a RAMdrive for this directory, since
	 .FDX files are automatically rebuilt if missing.
Download/Upload Protocols Configuration
		Protocols are the means by which files are transferred to
	 and from your system.  VA comes preconfigured to handle Xmodem,
	 Ymodem, Zmodem protocols using the included VXY protocol driver.

		Other protocols may added at your discretion.  Each protocol
	 is configurable by:

	 1) Which letter the user will press to select that protocol.
	 2) The name and description of the protocol.
	 3) Command line to run protocol.  Parameters passed are:

	 %1  COM Port
	 %2  Baud Rate
	 %3  Filename
	 %4  Handshake
	 %5  UART Rate
	 %6  Port Base Address
	 %7  Port IRQ
	 %8  Channel Number
	 %9  Upload Directory
	 %C  COM Handle (VA-OS2 Only)

	 4) Whether the protocol is batch compatible or not.

		For most installations, the preconfigured protocols will
	 be more than sufficient.  Should you wish to add other protocols,
	 consult the protocol's documentation for information on constructing
	 the proper command line.
Networks Configuration
		For set-up of networking interfaces (VirtualNET, Internet,
	 FIDOnet, or QWKnet), plase see the appropriate DOC file devoted
	 to that particular interface.
Events Configuration
	      VA allows up to 48 timed events per day.  Possibilities for
	 these events include your daily external maintenance routine
	 (usually done through a batch file), network dialouts, online
	 game daily maintenance, etc.  An event is basically nothing more
	 than the ability to execute a batch file or program at a certain
	 time every day.

	 1) Time

	 The time the event is to run, entered in HH:MM format
	 using military time.  A time of 00:00 disables the event.

	 2) Command Line

	 The DOS command line or batch file to execute.  For example,
	 you might enter:

	 VCLEANDB.EXE
	 or
	 C:\VADV\CLEANUP.BAT

	 for an external daily-cleanup routine.  Complete pathnames
	 are not required if the batch files are located in your main
	 VA directory.
Control Panel Configuration
		In addition to the commands already configured in the WFC
	 menu, VA allows you to assign the F1 through F10, alt-F1 thru
	 alt-F10, shift-F1 thru shift-F10, and Ctrl-F1 thru Ctrl-F10
	 keys to execute what programs or batch files you desire.

		If you find yourself continually dropping to DOS to run
	 the same program over and over, it's probably a good idea to assign
	 a function key to handle it.
Doors Configuration
		VA will run almost all modern doors and online games
	 created for use on BBSes, either straight from the command line
	 or through the use of an external door converter, such as DOORWAY
	 or DoorMaster.  Doors can be called from function blocks or from
	 scripts, as well as this internal doors configuration.

		VA-DOS shrinks out of memory for all external programs,
	 reserving only a small amount of RAM for its "hooks" that allow
	 the user to return to the BBS.  VA creates the CHAIN.TXT, DOOR.SYS,
	 and DORINFOx.DEF "drop files" which contain user information for
	 use by the door program; most doors will accept at least ONE of
	 these formats.

		When you access this configuration option, you will see a
	 scrolling window screen listing the door programs you have
	 installed, along with the SL needed to access them.  Moving th
	 the highlight bar and pressing [Enter] selects that program's
	 configuration entry.

		This section describes the input fields that VCONFIG
	 allows you to configure for each door.  For more details on
	 door set-up, such as methods and batch files, please see
	 the end of this document.

		When configuring a door program in VCONFIG, you will be
	 prompted for the following information:

	 1) Program Name

	 The name of the door program, as it will be presented to the user.

	 2) Command Line

	 The name of the batch file or command line to execute the
	 door program, along with any command-line parameters that
	 need to be passed to the door.  Full pathnames are recommended
	 for better system security.

	 Also, there are a number of replacable parameters which may
	 be essential and/or conveneint to use:

	 %1  Channel Number
	 %2  COM Port
	 %3  Baud Rate
	 %C  COM Handle (VA-OS2 Only)

	 The above "place-holders" can be used on the Command Line,
	 and VA will replace them with the proper values at run-time
	 before passing the Command Line to the operating system for
	 execution.

	 3) Security Level

	 The Minimum Security Level needed to access the door.

	 4) Access Flag

	 If set, allows only those users with matching access flags
	 to access the door.  Access flags are set in the user editor;
	 for more information, see "The User Editor".

	 5) Single User

	 Indicates whether the game is playable on single nodes or
	 multi-nodally.  Single-line installations should leave this
	 set to Yes.

	 6) Credit Cost

	 Allows sysops running a credit system to charge credits for door
	 program access.  This is configurable for each individual game.

	 D) Delete This Entry

	 Removes this door from the configuration.

	 The importance of reading the door program's documentation
	 thoroughly, especially with regard to installation, cannot
	 be overstressed.
Voting Booth
		The VA Voting Booth allows you to present your users with
	 a perpetual survey in which they can "vote" on particular issues
	 you define.  Frequently-asked questions deal with political
	 candidates, which online games should be registered/discontinued,
	 reasons for calling the BBS, how users first heard of your BBS,
	 how they like changes you've made, etc.

		When you select this option from the VCONFIG Main Menu, you
	 will see a scrolling window containing the questions themselves.
	 To select a question for editing, move the highlight bar
	 to the correct entry and press [Enter].  The question and its
	 responses will then be available for editing.

		To add a new voting question, press [F1] at the scrolling
	 window screen.  You may then type in a question and supply up to
	 eight responses from which your users may choose.

		The poll results are displayed as the number of users choosing
	 a particular answer, along with the percentage of the total number
	 of votes each choice received.

		Automatic check for new voting questions upon login is
	 optional.  See VCONFIG Main Screen 2 for this switch.
Random Messages
		VA features an optional "random messages" function that can
	 display one-, two-, or three-line messages right before the user
	 initially sees the Main Menu.  Random messages are commonly used
	 for quips and quotes or friendly advertisements for other BBSes
	 in the area; you may, of course, use them for whatever purpose
	 you wish (or not use them at all, if you so desire).

	      To add a random message, press [F1] at the scrolling window
	 initial screen and type in your message.  DO NOT press [Enter],  as
	 that will delete the currently-highlighted random message.

	      Random messages are displayed by including the RANDOM command
	 from anywhere within a script or function block.
Text Sections
		Text files from within various directories on your system may
	 be configured here for display.  Types of text files commonly
	 configured here include (but are not limited to) game scoreboards,
	 general information about your BBS, standard operating procedures
	 and rules for your BBS, advertisements, and so on.

		To add a new entry to the text section configuration, press
	 [F1] at the scrolling window screen.  You will be prompted for
	 the following information:

	 1) Name

	 The name of the text section, as it will appear to the user.

	 2) Path

	 The full pathname to the directory in which the text file(s)
	 is located.

	 3) Security Level

	 The Minimum Security Level needed to access this text section.

	 4) Access Flag

	 The access flag needed to access this text section.

	 To edit an entry, move the highlight bar to the desired entry
	 and press [Enter].  You will have a chance to edit the above
	 information.

	 In VCONFIG, you can define any directory on your system as
	 containing text for a defined subject area.  Text directories may
	 be networked by using a script maintaining a database for text
	 files.
Multi-Feedback
		Here you can configure the feedback capabilities of your VA
	 installation.  This will allow users to E-mail you or any co-sysops
	 quickly and easily.

		To add an entry into the multi-feedback list, press [F1] at
	 the scrolling window screen.  You will then be prompted for the
	 following information:

	 1) Description

	 The name/title you want your users to see, like "The Great
	 and Powerful Wizard of Oz", "Sysop", or whatever.

	 2) Handle

	 The addressee's user handle.  If your system does not allow
	 handles, put the addressee's real name here.

	 3) User #

	 The addressee's user number.  For most sysops, this will be "1".

	 4) Net Address

	 The addressee's node number, regardless of network.  For
	 example, my net address would read '2056', without a
	 user number or an '@' symbol in front.  Since most feedback
	 is to a local sysop/co-sysop, most sysops will only need
	 to enter their OWN node number here.

	 5) Network #

	 The network on which the addressee will be receiving his
	 feedback.  The network number corresponds to the list in
	 the NETWORKS configuration screen.

	 You may delete an entry by selecting it and pressing [D].  You
	 will NOT be prompted for confirmation.
Quick-Validation
		The Quick-Validation feature allows the system operator to
	 preset up to nine validation 'Profile' levels.  These are used
	 to quickly enter pre-established Security Levels, Time Limits, and
	 Access Flags into the new user's account from the User Editor screen.
	 The idea is to let you validate something with as little effort
	 required as possible.

	 The following screen appears when you choose to edit this option:

	 Profile 1

	 1) Security Level
	 2) Time Limit
	 3) Access Flags

	 Simply choose the appropriate option and enter the respective
	 information.

	 When editing a user account via the User Editor, the various
	 profiles may be called up by pressing the (Z) Q-Val key as indicated
	 at the bottom of the User Editor screen.
SLIP/CSLIP/PPP Pass-Thru
		The Internet Pass-Thru feature allows your BBS to serve
	 double-duty as both a BBS, and a possible access point for real,
	 direct Internet access for your callers.  Simply put, this
	 mechanism allows you to share an Internet SLIP, CSLIP, and/or
	 PPP account with others, under controlled conditions, while
	 "metering" and/or restricting the amount of time used by
	 the caller.

		This text describes the set-up parameters in VCONFIG
	 for this feature.  For a more detailed description of how
	 it does what it does, see BBS.DOC.

	 ISP Phone Number

	 The phone number to be dialed to reach your Internet provider
	 for SLIP and/or CSLIP and/or PPP.  Which of the three connect
	 modes (SLIP, CSLIP, PPP) you'll be able to offer depends entirely
	 which ones are supported by your chosen ISP.  NOTE: THE ISP
	 YOU CHOOSE MUST SUPPORT THE STANDARD TEXT-STYLE login: / password:
	 SEQUENCE AS THE MEANS FOR LOGGING IN TO THE INTERNET AND
	 MUST NOT REQUIRE PAP (Password Authentication Protocol) OR
	 CHAP (Challenge Handshake Authentication Protocol).

	 Max Session (mins)

	 The maximum time a user can spend doing SLIP/CSLIP/PPP in
	 one session.  Setting this value to a non-zero value enables
	 this feature, and over-rides the normal user time limit
	 as necessary.  Setting this value to zero disables this feature
	 and is NOT recommended.

	 Max Monthly (mins)

	 The maximum time that can be used in one month.  Useful in cases
	 where your Internet account is limited to a specific number
	 of hours per month.  Setting this value to zero disables
	 the monthly limit -- something you could do if you aren't
	 concerned about the amount of Internet connect time used.
Door Set-Up Hints
		Dropfiles are the link between the BBS and the game itself.
	 A dropfile contains all of the required info for the game to
	 operate properly.  This includes the user's "handle" (so he al-
	 ways uses the same slot in the game), the user's COM port & speed
	 (so the game knows where to send the data), and other miscellan-
	 eous info - the BBS name, sysop name, user's time remaining (on
	 the BBS), etc.

	 Here is a list of the common dropfile formats that Virtual Advanced
	 supports:

		CHAIN.TXT
		 DOOR.SYS
	     DORINFOx.DEF

		The dropfile is created just before invocation of the door.
	 The dropfile is written in TWO places on your harddrive:

	 (a) In the Main VADV Directory

	    C:\VADV

	 (b) In a Private Node Directory

	    Channel 0  C:\VADV\TEMP\N0
	    Channel 1  C:\VADV\TEMP\N1
	    Channel 2  C:\VADV\TEMP\N2
		  ..and so on...

	 Which copy you decide to use is up to you.  On a single-user site,
	 using copy (a) from the VADV directory is always safe, and makes
	 game set-up easy.

	 On a multi-user system, it may be necessary to use the private copies
	 (b) which are segregated by channel.
Preparation Installation And Execution Of Doors
		Carefully read and follow the Door vendor's instructions
	 when installing the door.  You may have to modify one or more
	 of the door's configuration files.

		Typically, you will use batch files to execute the doors
	 on your system.  Most doors in existance run from their own
	 directories.  There are three basic methods doors use to find
	 the dropfiles.  Each will be discussed in turn.
Games That Look In Their Own Directories
		Most games look in their home directory for one of the
	 dropfiles mentioned above.  Your batch file, then must take a
	 few steps before actually starting the door.  Here is an example
	 VCONFIG door set-up and batch file for Trade Wars 2002, with VA
	 installed on Drive C, and Trade Wars installed on Drive D:

	 ** SINGLE-USER **

	 VCONFIG DOOR SET-UP:

	   TW.BAT                                            (1)

	 TW.BAT:

	   D:                                                (2)
	   cd \TRADEWAR                                      (3)
	   copy C:\VADV\CHAIN.TXT                            (4)
	   tw2002 -wwiv                                      (5)
	   C:                                                (6)
	   cd \VADV                                          (7)

	 (1) Execute TW.BAT.

	 (2) Log to Drive D.

	 (3) CD (CHDIR) to the TRADEWAR directory.

	 (4) Copy the CHAIN.TXT file from C:\VADV.

	 (5) Execute the game.

	 (6) Return to Drive C.

	 (7) Return back to the Main VADV Directory.

	 ** MULTI-USER **

	 VCONFIG DOOR SET-UP:

	   TW.BAT %1                                         (1)

	 TW.BAT:

	   D:                                                (2)
	   cd \TRADEWAR                                      (3)
	   copy C:\VADV\TEMP\N%1\CHAIN.TXT                   (4)
	   tw2002 -wwiv                                      (5)
	   C:                                                (6)
	   cd \VADV                                          (7)

	 (1) Execute TW.BAT, %1 replaced at run-time with channel number.

	 (2) Log to Drive D.

	 (3) CD (CHDIR) to the TRADEWAR directory.

	 (4) Copy the CHAIN.TXT file from C:\VADV\TEMP\N%1.  %1 is the
	     first prarameter passed to the batch file, which is the
	     channel number.  So, the expression evaluates as C:\VADV\TEMP\N0
	     for channel 0, C:\VADV\TEMP\N1 for channel 1, and so on.

	 (5) Execute the game.

	 (6) Return to Drive C.

	 (7) Return back to the Main VADV Directory.
Games That Examine A Configuration File
		Some doors use a configuration file to determine where
	 to look for dropfiles.  They will have a line where you can specify
	 a drive/directory where the BBS writes the dropfiles. On a single-
	 user system, set-up is easy.  You can just point the game's config
	 file to look in C:\VADV (for example) and you're ready to go:

	 VCONFIG DOOR SET-UP:

	   EXAMPLE.BAT                                            (1)

	 EXAMPLE.BAT:

	   D:                                                     (2)
	   cd \EXAMPLE                                            (3)
	   GAME.EXE                                               (4)
	   C:                                                     (5)
	   cd \VADV                                               (6)

	 (1) Execute EXAMPLE.BAT.

	 (2) Log to Drive D.

	 (3) CD (CHDIR) to the EXAMPLE directory.

	 (4) Execute the game.

	 (5) Return to Drive C.

	 (6) Return back to the Main VADV Directory.

	 On a multi-user system, however, you may need to create multiple
	 configuration files.  For example, if the door calls for a GAME.CFG
	 file which contains the path to the dropfiles, you might create 3
	 or 4 files called GAME0.CFG, GAME1.CFG, GAME2.CFG and so on, one for
	 each channel.  GAME0.CFG would point to C:\VADV\TEMP\N0, GAME1.CFG
	 would point to C:\VADV\TEMP\N1, and so on.  The batch file that you
	 use to run the door would then copy whichever GAMEx.CFG file is
	 is appropriate to GAME.CFG before starting the game:

	 VCONFIG DOOR SET-UP:

	   EXAMPLE.BAT %1                                         (1)

	 EXAMPLE.BAT:

	   D:                                                     (2)
	   cd \EXAMPLE                                            (3)
	   copy GAME%1.CFG GAME.CFG                               (4)
	   GAME.EXE                                               (5)
	   C:                                                     (6)
	   cd \VADV                                               (7)

	 (1) Execute EXAMPLE.BAT, %1 replaced at run-time with channel number.

	 (2) Log to Drive D.

	 (3) CD (CHDIR) to the EXAMPLE directory.

	 (4) Copy the GAME%1.CFG to GAME.CFG.  GAME%1.CFG evaluates as
	     GAME0.CFG for channel 0, GAME1.CFG for channel 1, and so on.

	 (5) Execute the game.

	 (6) Return to Drive C.

	 (7) Return back to the Main VADV Directory.
Games That Use A Command Line Parameter
		Yet another method employed by some doors to determine the
	 location of the dropfiles is to pass this information on the
	 command line:

	 ** SINGLE-USER **

	 VCONFIG DOOR SET-UP:

	   EXAMPLE.BAT                                            (1)

	 EXAMPLE.BAT:

	   D:                                                     (2)
	   cd \EXAMPLE                                            (3)
	   GAME.EXE /dropfile=C:\VADV                             (4)
	   C:                                                     (5)
	   cd \VADV                                               (6)

	 (1) Execute EXAMPLE.BAT.

	 (2) Log to Drive D.

	 (3) CD (CHDIR) to the EXAMPLE directory.

	 (4) Execute the game, with the proper command line:

	     GAME.EXE /dropfile=C:\VADV

	 (5) Return to Drive C.

	 (6) Return back to the Main VADV Directory.

	 ** MULTI-USER **

	 VCONFIG DOOR SET-UP:

	   EXAMPLE.BAT %1                                         (1)

	 EXAMPLE.BAT:

	   D:                                                     (2)
	   cd \EXAMPLE                                            (3)
	   GAME.EXE /dropfile=C:\VADV\TEMP\N%1                    (4)
	   C:                                                     (5)
	   cd \VADV                                               (6)

	 (1) Execute EXAMPLE.BAT, %1 replaced at run-time with channel number.

	 (2) Log to Drive D.

	 (3) CD (CHDIR) to the EXAMPLE directory.

	 (4) Execute the game, with the proper command line:

	     GAME.EXE /dropfile=C:\VADV\TEMP\N0 for channel 0,
	     GAME.EXE /dropfile=C:\VADV\TEMP\N1 for channel 1, and so on.

	 (5) Return to Drive C.

	 (6) Return back to the Main VADV Directory.
Home : News : Products : Downloads : Community : VirtualNET : Development : Support : About : Contact : Bug Reporting