1
0
mirror of https://github.com/opsxcq/mirror-textfiles.com.git synced 2025-09-02 02:22:37 +02:00
Files
mirror-textfiles.com/100/.modemlif.hac

313 lines
21 KiB
Plaintext
Raw Permalink Blame History

<!doctype html public "-//w3c//dtd html 4.0 transitional//en">
<html>
<head>
<title>The Modem Life</title>
</head>
<body>
<TABLE WIDTH=600>
<TR><TD>
&nbsp;
<p><i>On an average October lunch break in 2001 I fired up my web browser
to do my daily surfing of one of my favorite news sites, slashdot.org-
one of the featured stories included a link to the textfile.com web site.
Me being a BBS user of the 1980s I began to remiss of my computing days
of past and after some browsing I found myself speechless as I sat face
to face with my past- words that I had written sixteen years prior had
been preserved and to some degree, celebrated on this site. I remained
stunned for days and felt like I had just made contact with a long lost
brother as the message that I wrote all that time ago had some special
meaning to me. After a few e-mail exchanges with Jason (the webmaster)
he ask that I write some companion text to my original message to help
solidify the context of the message and to further the celebration of the
special times when it was written- times that proved to be the infancy
of the modern online community. I have included the added companion text
in this version of my letter which is written in italics and contained
in brackets.</i>
<br>&nbsp;
<br>&nbsp;
<p>The Modem Life. Is it Really Worth it?
<br>======================================
<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Written by The Nomad, for
<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; all BBS's that wish it.
<p>Note/Warning:
<br>===============
<br>The author of this file will go detailed into his life and will explain
his feelings quite openly.&nbsp; If you are not mature enough to handle
what the author is going to say and wish to insult him for his beliefs,
I suggest you read no further.
<p><i>[Users often focused much of their online time to systems that were
within their local calling zone for cost issues, multiplied with the fact
that there was a significantly smaller users community and it meant that
the same users would often converse on a number of local systems. As well,
with such a small home computer user base within the country many people
didn<EFBFBD>t have immediate contacts to share their passion for computers with
which often lead them to reach out to others they found in the online world
for friendship. I personally had arranged a number of meetings with others,
attended several mid-size user group parties and even, along with a few
others went to the funeral of an online friend that I had who I had never
meet. I wrote this disclaimer since many people that would be reading this
message had met me or had some idea of who I was and to let potential abusers
and our peers know that I considered the use of this message as ammunition
for abuse to be of extremely poor taste. Today, this might seem silly but
I felt it worthwhile as abuse was gaining popularity as an online activity.]</i>
<br>&nbsp;
<p>Well, another typical day in the modem world.&nbsp; Doesn't it just
make you want to throw-up all over the keyboard?
<p>Recently I thought I would call the numbers on the Megaterm 3.0 Famous
Systems phone book&nbsp; <i>[Megaterm was a terminal program used to dial-up
and communicate with BBSs, it<69>s distribution came with a list of BBSs that
were favorites of the author.]&nbsp;</i> thinking these would be the "Top
of the line" BBS's.&nbsp; As the Megaterm began to dial with Safehouse
I kicked back and watched.&nbsp; Busy.&nbsp; Not surprising.&nbsp; It then
proceeded to dial other BBS's, most of which I never have heard of.&nbsp;
After about two more tries the program started to freeze.&nbsp; Not sure
what was going on I picked up the phone only to hear the recording "We're
sorry but the number you have dialed has been disconnected or is no longer
in service...".&nbsp; I then hit [U] to unmark the number and continue
the Megaterm dialing.&nbsp; Not too worried that that board was down the
Megaterm continued to dial as I again kicked back and watched.&nbsp;&nbsp;
<i>[Obtaining a connection to a board often seemed like a ritual to many
online users of the day since access to most systems was limited to one
user at a time. Of course, the most popular systems were always the hardest
to get on to. The notation of using the brackets as in <20>[M]essage<67> was
sometimes used as a courtesy to identify valid system prompt commands (in
this case the letter <20>M<EFBFBD>), this is somewhat analogous to providing key
words.]</i> The very next number that was opening message and the prompt
for my password or 'NEW'.&nbsp; Being a new user I typed 'NEW'.&nbsp; To
my displeasure the system told me it was a private BBS that allowed no
new users and hung me up.&nbsp; Very displeased I kicked back in my chair
and started to listen a little closer to the TV in the other room as the
Megaterm began to start dialing again.&nbsp; After two more welcome busy
signals the Megaterm started to flip from 'Click' to 'Busy' and back and
forth.&nbsp; Confused, I picked up the phone and again heard that dreadful
recording "Were sorry...".&nbsp; Very uneasy I pressed [U] to unmark the
number.&nbsp; After a small welcome string of busy signals I got a ring.&nbsp;
The phone was answered and a carrier was sent.&nbsp; The Megaterm then
connected for me only to find that it was a Pixboard.&nbsp; Very pleased
(I love pixboards!) I called back and loaded up Pixterm. <i>[Pixboards
were special BBS<42>s that were capable of transmitting images to the caller,
this technology was quite revolutionary for the average online user of
the day who was accustom to viewing just plain old text.&nbsp; Pixterm
was the custom terminal program required to interact and view the images
on a Pixboard.]&nbsp;</i> Once connected, pleased to see some nice graphics
in the opening message I then typed in 'NEW'.&nbsp; Only to find out that
a $10 validation fee was required to access ANYTHING but the main menu
and [M]essage to SysOp. <i>[Most boards of the day offered a number of
different levels of user access and most systems required the SysOp to
validate a new user before they were granted privileges beyond reading
messages. Validated users could post messages to these boards and were
allowed to stay online for a longer period of time before being forced
to log-off. Higher levels of access, which were acquired either by purchase,
favor or personal contact, often provided benefits like allowing access
to restricted boards, longer online times and access to a BBSs<53> textfile
database. Some boards also had hidden levels of access which, if obtained,
allowed access to hidden message boards, allowed the user to know the identity
of otherwise anonymous posters and provided moderation capabilities to
delete messages.]</i>&nbsp; After messing around for a few minutes I got
bored and typed "OFF" to leave the system.&nbsp; I then returned to Megaterm
and it continued to dial.&nbsp; After another busy signal the numbers sequence
started over.&nbsp; And I got a ring, before I knew it, the words:
<p>&nbsp;&nbsp; THE SAFEHOUSE MEGANET - PORT #02
<br>&nbsp;&nbsp;&nbsp; "WHERE YOU'RE ALWAYS WELCOME!"
<p>were printed across the screen, me being a regular caller to the board
entered my name and password only then to be logged off due to the fact
the that port was being reserved for a level 5 user. <i>[The Safehouse
was one of the few systems that had multiple phone line capabilities but
reserved one of those lines for a user with higher-level access, which
I sadly didn<64>t have.]</i>
<p>&nbsp;Very discouraged and then realizing that some day, The Safehouse
would die too such as others favorite systems like Sherwood Forest II,
The Outpost, The World of Cryton, and Sherwood Forest ///. I then quietly
went to bed.
<p>&nbsp; [Extra Note:&nbsp; No offense Safehouse Manager]
<p>&nbsp;A day or two later I decided to give a few of the local boards
a call, only to find that the most active sub-boards around were abuse!&nbsp;
After reading a dozen or so messages I came across a message that was insulting
my personal favorite BBS, The Digital Dimension, on-line since Aug. 1983,
a VERY nice system.&nbsp; The post was saying how bad the board was because
the SysOp wouldn't give him high access, and never answered [F]eedback,
or [C]hats. <i>[Feedback was a simple e-mail letter to the SysOp. The chat
function was a request that could be invoked by an online user for the
SysOp to engage in a real-time conversation while the user was online.
Once activated, the user could then continue with their online session
while a message was displayed on the SysOp<4F> monitor indicating the function
had been activated. It was always fun when a SysOp would break in on your
session (particularly if the chat function was never invoked). To add to
the fun, many SysOps had a message automatically displayed as a prelude
to the chat that often included some overtones of a Godly entrance before
the chat began.]</i> I was pretty upset, the SysOp is a personal friend
so I naturally [P]osted about the matter and explained how he is a very
busy person and tries to do as much as he can, after all there are over
750 users!&nbsp; <i>[The number of registered users for a BBS was always
analogous to a tigers<72> stripes and a point of great pride to a SysOp.]</i>&nbsp;
Feeling satisfied I logged off and observed a few other local boards only
to find more abuse, hatred, and destruction.&nbsp; I then decided I would
go outside and get some fresh air and live a normal life, after all I don't
want to take the image of a 'computer freak'.&nbsp; <i>[Many people of
school age that had a computer were considered a computer freak by default
since the concept and benefits of why anyone would want a computer was
totally alien to the average person.]</i> A day later, very concerned,
I again auto-dialed to same board with Matthew Dornquast's beloved Megaterm.&nbsp;
After about a half an hour of dialing I heard the computer in the other
room signal that a ring was detected.&nbsp; I came in the room and went
through the logon procedures and went straight to the abuse board to find
about 10 new messages after mine!&nbsp; I began to read them; more of the
same hatred.&nbsp; I then came to a post about 4 after mine by the person
that I posted about.&nbsp; He told me off and posted my number.&nbsp; I
was very uneasy, I have never heard of the guy before and he posted my
number!&nbsp;&nbsp; <i>[Much like what will possibly always be, not all
online users of the day were cordial and some were even looking for trouble.
Posting an individuals<6C> phone number on a BBS&nbsp; was often used as a
method of attack against a person in an attempt to destroy that persons<6E>
anonymity of using an alias. It also attempted to demonstrate ones<65> resourcefulness
as personal information was often highly guarded from the general online
public.]</i> Not sure to post or not I sat there for a minute and said
why not.&nbsp; Not bothering to read the other new messages I [P]osted.&nbsp;
I then told him how everyone had their own right to say what they want
and that posting number solved nothing.&nbsp; Of course later that week,
for about three days I received prank calls, I would pick up the phone
with a "Hello?" Nothing.&nbsp; He would just sit there, hoping that I would
get upset with his deed.&nbsp; This will make him happy.&nbsp; I then started
to tell him how much of a man he was by prank calling, he was probably
expecting to here "We have a trace on our line blah blah blah!" I then
hung up.&nbsp; He never called back. <i>[These of course were all days
prior to Caller ID and related technologies. As phone abuse was often a
method of attack against another online user many people either did or
claimed to of declared to the phone company that they were receiving harassing
phone calls and worked out arrangements to have a call trace placed on
their line.]</i>&nbsp; Later on that day my very good SysOp friend of The
Digital Dimension called me.&nbsp; He started to explain how he was told
earlier today that he was going to be moving at the end of this school
year.&nbsp; He then asked me very seriously 'Bryan, will you please run
a copy of the board in Houston while I take a copy to Iowa.' I thought
long and hard, being a SysOp required a lot of work, time, and devotion.
A whole lot.&nbsp; I agreed.&nbsp; Many things were now needed to be done.&nbsp;
Now realizing that I didn't have the hardware to support the system, that
weekend I started a buying spree.&nbsp; I first bought my Sider 10 Megabyte
hard drive, $695. <i>[Can you believe 10MB for $700? The scary part is
that was considered cheap- the Sider was the first hard disk widely available
for under a $1000.]</i>&nbsp; Then bought a Thunderclock, another $110.&nbsp;
<i>[Apple II computers did not come equipped with a system clock, which
was necessary to keep track of users login times. The Thunderclock was
an expansion card that plugged into the system bus and provided this basic
function.]</i> I of course needed a firmware chip for my cat, $30.&nbsp;
<i>[This firmware EPROM plugged into a socket on an Applecat brand modem
and enhanced the functionality of the modem to allow it to answer phone
calls.]</i>&nbsp; And so my computer won't overheat, a System Saver, $70.&nbsp;
<i>[The <20>System Saver<65> was an encased fan that attached to the outside
air vents of the Apple II to provide increased airflow though the otherwise
fanless unit.]</i>&nbsp; I then realized that I would need my own phone
line so I called the phone company and got it installed, $120.&nbsp; Realizing
how many callers I would loose if the number changed, I would have to pay
an additional $60 to get the same number, 713/497-4633 but that will have
to wait <20>till he moves.&nbsp; After realizing I just spent over a thousand
dollars just to get the board started I began to get use to the software.&nbsp;
It was a home brew. <i>[custom written.]</i>&nbsp; Nevertheless, a very
nice one.&nbsp; I started to write new "mods" <i>[modifications]</i> and
features for the board.&nbsp; I only had a print out of the board then
so the SysOp could get his software copyrighted. <i>[More specifically,&nbsp;
the SysOp&nbsp; was ultimately wanting to get his software published and
was advised by his agent to not distribute electronic versions of the source
code for it.]</i> Knowing that in order to keep the high quality of the
system it would require many long nights over the keyboard, more night
then ever before.&nbsp; Typing...&nbsp; thinking... working...&nbsp; programming.&nbsp;
After showing the SysOp my progress, he was quite pleased.&nbsp; I rewrote
many functions.&nbsp; Many features were now more efficient and faster
then before.&nbsp; I also started the beginning of our soon to be enormous
[L]ibrary on our new 'baby' the 10 Meg Sider. <i>[It was often in the mind
of an individual to better understand ones computers and how to control
it. As well, me being the person I am, couldn<64>t leave good enough alone.]</i>
<p>&nbsp;After a month or so, with the same old BBS abuse and programming,
I took a look at all the work I had done.&nbsp; Over 200 files in the [L]ibrary
so far, many new features which have never appeared on a board in the U.S.&nbsp;
(to my knowledge) have been thought up, organized, and programmed.&nbsp;
I then thought, when I take the board over I will be the victim all this
major abuse on these other boards.&nbsp; What an honor.&nbsp; God, what
an honor!&nbsp; I then began to wonder, why, why does everyone abuse everyone
else so much?&nbsp; Are they insecure?&nbsp; Are they really that upset?&nbsp;
Are they just blowing off a little steam?&nbsp; Do they enjoy making enemies?&nbsp;
Do they feel superior to insult others?&nbsp; I don't know.&nbsp; I really
don't know.&nbsp; I myself like to make friends.&nbsp; Not only just friends
that I will talk to on the phone, but ones that come over on weekends,
go out partying on Friday nights, play sports, and just about anything
else a true friend does.&nbsp; Without knowing that I went to the same
school as Shadow's Pawn for almost a year I meet him at the SysOps house
and am now good friends with him.&nbsp; Despite the fact that I am two
years older then him, he is on the football team, I am in band and enjoy
playing the trumpet, and we had almost no common interests became good
friends because of similar interests, the computer.&nbsp; But I still came
back to the same question "Why do they abuse?" Why?&nbsp; Life is bad enough
as it is, and then there are the feds who are after all us pirates, phreakers,
and hackers.&nbsp; <i>[I had to laugh some when I read this. Pirates are
individuals that distribute copyrighted software. Phreakers are individuals
who acquire and use long distance PIN access numbers that don<6F>t belong
to them. Hackers are individuals who attempted to penetrate computer systems
that they weren<65>t granted access to. (The modern definition of this activity
has changed and is now referred to as cracking. Crackers of this day were
individuals that found methods to circumvent software copy protection schemes,
if someone was successful in a particular pursuit they would say they <20>Cracked
it<EFBFBD>.) While I<>ve never been one to not give people their due and don<6F>t
condone these activities I found that many people did them out of necessary
to further their knowledge of computers given their limited resources.
At that, many were minors and knew there was a limited recourse that could
be taken against them at that time. I laugh because the fear of the feds
was something that was often the buzz on different message boards while
the reality showed that they typically had little interest in what was
going on.]</i>&nbsp; Who needs more enemies?&nbsp; While we can all be
helping each other the "good old" traditional computer activities like
helping others get up to date "wares", even if they have a Networker modem
and not that "excepted" Applecat? <i>[Wares are the items of trade for
a software pirate. The Networker modem was capable of transferring data
at 300 baud while the Applecat could do 1200 so the bias was obvious.]</i>&nbsp;
I remember back when I first got my modem.&nbsp; I couldn't remember one
abuse board. Not one.&nbsp; Then suddenly one by one, slowly but surely,
they started coming up with the demand of them due to the large amount
of hatred from two users.&nbsp; Now, the abuse board is just as common
as the public board.&nbsp; Why?&nbsp; Why?&nbsp; Then somewhere, some one
person had a grand idea.&nbsp; The same thing that happened over two hundred
years ago.&nbsp; This genius said, that order in the modem society is a
must and some form of government must be formed.&nbsp; Thus came Tele-Trial,
with this new concept came new constitutions, new sub-boards, and an incensement
of tele-conferencing phreaking.&nbsp; The constitutions would set the laws
of the BBS. The sub-boards would provide a special meeting place for matters
of the tele-trial and the tele-conference for the often called "court room"
for the trial of the defendant.&nbsp; This system worked in many places.&nbsp;
Punishments were often deletion from that board or even to the great extent
of credit card information being released, and abused.&nbsp; But for many,
deleting ones password would not keep them off the system.&nbsp; They would
just call back with a new handle and abuse more people till he was deleted
again.&nbsp; And the process goes on and on.&nbsp; Believe me, I have seen
it happen.&nbsp; So I came to the conclusion that this method is not full
proof.&nbsp; I then came upon a crazy idea of mine.&nbsp; Not so sure of
myself I begin my think more in-depth.&nbsp; One hope for me remained,
and I then walked to my computer, put in Apple Writer and began to type.
<i>[Apple Writer was the de facto standard word processor for Apple II
users of the day.]</i> Now, I have completed my work.&nbsp; My task is
finished at this moment of Sunday May 26 1985 at 12:55 in the morning.&nbsp;
I thank you for you time and am sorry for any and all errors.
<p>&nbsp;&nbsp;&nbsp; Sincerely,
<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Bryan Nomad
<p><i>In Jason's comments about my letter he said that this was a plea
to the online community of 1985, in retrospect I have to concur that he
is right. What<61>s sad however is that you could change a small amount of
this message and make it meaningful to an online world that exists years
later- sufficient&nbsp; to say that it<69>s hard to imagine some aspects of
the online community ever changing so long as people can operate with some
degree of anonymity. Throughout the decades that I<>ve spent online I<>ve
found that, from a human perspective the modem lifes<65> greatest tool is
to allow people the freedom to express what they really want and be the
person they want to be- no excuses, no limits, no regrets.&nbsp; Some people
that appear as kind individuals in person live in shadows online where
their true self can run free without fear of retribution. Others however&nbsp;
prove themselves noble and dignified without reward and are often brighter
gems then what the eye beholds. The choices come from within, the freedom
is yours. In the end, I think you just have to ask yourself "What kind
of world do you want?"</i><i></i>
<p><i>Respectfully,</i><i></i>
<p><i>-Bryan (bpnomad@yahoo.com)</i>
<p>&nbsp;
</TR></TD>
</TABLE>
</body>
</html>