1
0
mirror of https://github.com/opsxcq/mirror-textfiles.com.git synced 2025-09-02 20:02:43 +02:00
Files
mirror-textfiles.com/100/.realpira.hum

1350 lines
66 KiB
Plaintext

---------------------------------------------------------------------------
The Annotated Real Pirate's Guide:
A Cultural Guidepost, with notes from
Jason Scott, TEXTFILES.COM 01/04/2002
---------------------------------------------------------------------------
How This Came About:
In early 2001 I was asked to add to a music project by reading from whatever
I considered to be a "classic" textfile. I chose an old, early 1980's file
called "The Real Pirate's Guide", by "Rabid Rasta". I figured that this
example of textfile writing would stand out in everyone's mind as the best
type of Pirate Hubris and harken back to the days when 300 baud modems
ruled the earth and no one really dreamed that people would have more speed
going to their homes than once existed as the entire ARPAnet's backbone.
As I browsed over the file and began reading it as if anew, however,
I found that I was straining to understand all the references that Rabid
Rasta was making, and that if it was giving ME trouble, with all the recent
studying I'd been doing of BBS-era textfiles, then a whole generation of
computer users were going to have the historical text available at a single
mouseclick or URL, but lose the full meaning of what the text referred to.
I decided to try, as a sort of experiment, to annotate the Real Pirate's
Guide, and give some context to the lines in the file. This is not the
best way to read this file for the first time; you should read the
unaltered original, and then come back to this version. (A copy of the
original file exists at http://www.textfiles.com/100/realpira.hum)
To my surprise, this file has touched on many different aspects of the
1980's BBS era, much more than an instruction guide for "Real Pirates"
would be expected to, and the effort has been well worth it.
I've tried to be as complete as possible about a subject being touched on
by this file. In some cases, I go completely overboard, but I'd rather have
the maximum amount of information about a piece of history than not enough.
Any entries and comments that I'm making are couched in a bunch of -----
lines, and be upper and lowercase, 80 columns. The original text is 40
columns, all uppercase.
I invite any comments and additions to improve this file.
- Jason Scott
TEXTFILES.COM
============================================================================
The following file, "The Real Pirate's Guide", was a file distributed on
computer Bulletin Board Systems (BBSes) in the early 1980's. Dated as 1984,
this file was probably written as a parody of specific figures within the
author's local calling area. It was then "uploaded" (sent) to a number of
BBSes, where its entertaining nature and easy accessibility as a humor piece
encouraged users to "download" (retrieve) it and send it to other Bulletin
Board Systems around the country, and later the world. Its popularity and
quality show in the fact that a search of the Internet in 2001 finds copies
of the file still accessible from at least two dozen sites, and it is likely
buried in archives at even more, 17 years after it was first written.
By 1984 there were thousands of BBSes connected to single phone lines
throughout the country, running on microcomputers and using modems to
answer calls coming in from all over. While most BBSes of the time could be
considered "above-board" and focusing on computer tips, political discussion
and generally "acceptable" conversation, there were also a large amount of
"underground" BBSes, which contained information on computer hacking, phone
phreaking, and software piracy. Lacking the space for large-scale program
storage, very few BBSes actually contained pirated software for download
(or would only have one or two programs available on a rotating basis)
but they were often used as meeting places to arrange trade between two
otherwise unlikely-to-meet users. This environment of piracy brought
with it the usual baggage of a subculture composed of young teens: Hubris,
One-Upmanship, wild claims, and most interestingly, unique and shifting
language meant to leave nonparticipants in the dust. In this environment,
an author calling himself "Rabid Rasta" created a humorous/instructive
textfile about the world of online software piracy called "The Real Pirate's
Guide."
The idea of the "Textfile" or "G-Phile" was that aside from the messages and
writing that users posted to a BBS, some essays and thoughts were considered
important or entertaining enough to be given a separate section to read from.
A number of BBS programs called this section the "General Files" section,
reachable from their main menu with a "G" command, and these writings were
soon referred to as "G Files", later "G Philes". At first just a random
selection of textfiles, a small subset of the BBS world formed into groups
who would produce a series of text; these serials soon became hot items for
some BBSes as the newest installments would come out. The "Real Pirate's
Guide" did spawn a large amount of sequels and homages (over 20), but Rabid
Rasta's involvement with them seems minimal.
Here, then, is the "Real Pirate's Guide", with my additional notes. I
have tried to be as accurate as possible and kept my opinions to myself,
focusing instead on why certain phrases are said the way they are, and to
try to give context to Rabid Rasta's work.
The file has undergone a number of edits and changes over time, making
determination of what it originally looked like somewhat difficult, but I
believe the file being annotated in this document is the "canonical"
text, which I downloaded from a BBS around late 1984.
-------------------
[/] [\] [/] [\] [/] [\] [/] [\] [/] [\]
[\] [/]
[/] THE REAL PIRATE'S GUIDE [\]
[\] [/]
[/] COMPILED BY [\]
[\] RABID RASTA [/]
[/] [\]
[\] [/] [\] [/] [\] [/] [\] [/] [\] [/]
-------------------
This file was originally written in 40 columns, all uppercase. Why? Because
the Apple II, one of the more popular home computers of the early 1980's,
did not originally come with the ability to do 80 columns, or lowercase.
This was later remedied, and for those who paid the money, a chip could be
installed to give older Apples these missing features.
BBS programs would often ask you how many columns you wished to see the BBS
in. This normally only came into play in the message bases, where you might
see the same message others were seeing, but converted back down to 40
columns.
To a very small amount, the 40 column/80 column difference was used as a
sign of eliteness or status, although Apple computers were already on the
high end of the cost scale for most people and focusing on such a minor
thing was not ultimately that relevant. Then again, the social strata
around the speed of one's modem persisted for well over a decade.
The use of 40 columns/uppercase helps the historian to locate the time of
a file, although some people continued to use their 40 column computers
well into the late 1980's. Additionally, as more and more BBSes became
purely 80 columns, many older textfiles were converted to 80 columns
upper/lower by later authors, who sometimes took this opportunity to put
their own name on the works. This unfortunately muddles the vintage of a
given file.
In this particular case, Rabid Rasta was kind enough to give the date of
his work as 1984, which helps indicate where things stood historically.
Apples were now on the market for roughly 7 years, BBSes were in the
middle of a huge explosion of computer users, and a reasonably popular
file (like this one) could be expected to be distributed around the
country, if not worldwide.
Note that Rabid Rasta has put [/] characters around the title of his file.
It's not currently known where exactly this habit started, but the use of
minimal "text graphics" to surround the title and author of a textfile has
continued to the present day. Even back then, the graphics could get
somewhat elaborate, although nothing like it ended up becoming in the 90's.
-------------------
[SIMULATION]
FROM-> JHONNY THE AVENGER
DATE-> SAT AUG 4 10:21 PM
I SAW YOUR MESSAGE ON THE PIRATE BOARD
ABOUT YOU HAVEING SIDE 2 OF SUMMER GAM
ES!MY CONNECTIONS MR.ZEROX AND CHEIF S
URGEN BLACK BAG ARE'NT AROUND TO MAIL
IT 2 ME SO WANNA DO SOME SERIUS TRADEI
NG?I HAVE GRAFORTH ,CHOPLIFTER ,MARS
CARS,DISK MUNCHER AND SOME K00L OTHER
STUFF AND GAMES.CALL ME AT 312-323-
3741.IF YOU NEED PHREAK CODES I HAVE
THEM TO AND BOX PLANS.BYE
*** ***** **
* * * *
* * * ******
** HONNY * HE * * VENGER
*THE KNIGHTS OF MYSTERIOUS KEYBOARDS*!
THE AWESOMEST HACK GROUP IN TOWN
-------------------
Rabid Rasta is parodying a particularly geeky software pirate's message
on a BBS. Besides the intentionally bad spelling (as opposed to the
unintentional bad spelling RR has in the rest of the file), he also tries
to touch on some of the more annoying aspects of "pirates" from the era.
This file is very Apple-centric, and all the software packages mentioned
were available on the Apple II. A few were ported to other platforms, but
only the Apple had every package. "Choplifter" was a top-selling game of
1982, "Mars Cars" was never a top seller but was made in roughly 1983,
and "Disk Muncher" was a disk copy program that was as ubiquitous as you
could get, with its ability to copy a disk in four passes. "GraForth"
was a graphics-oriented Forth language interpreter for the Apple II.
(FORTH, the computer language, was created by Charles Moore in 1968.)
The inclusion of a programming language disk in a listing of games is
likely an intentional jab at "Jhonny"'s lack of computer savvy.
As for "Side 2" of "Summer Games" (created by Epyx Software in 1983),
this is a reference to the fact that floppy disks at the time could be
double-sided, with each side holding 140k of information. If a game or
program was particularly large, a company would put information on both
sides of a disk, requiring the user to flip over the disk when prompted
to by the program. This could be a headache for pirates who would get a
copy of a game, only to find that what they had was a copy of just one
side of the disk. Begging for "Side 2" would then commence, which made
you look particularly foolish, since you hadn't even been able to pirate
a complete program.
"Jhonny" also makes reference to several prominent pirates and one
pirating group in his message. Many pirates would band together into
groups, under which they would all distribute their pirated games. Like
any such culture, groups which made prominent, popular releases would
gain positive reputations, while others that came off as a bunch of
kids who were just giving themselves a big name would not.
"Mr. Xerox" was not a member of the "Black Bag" pirating group as far
as I can determine, but "Chief Surgeon" most certainly was. Obviously,
these are both misspelled in the example.
The "Knights of Mysterious Keyboards" is probably a reference to the
"Knights of Shadow", a somewhat prominent phreaking group of the time
whose most famous member was Bioc Agent 003, who wrote the "Basics
of Telecommunications" series of phreaking files.
As for the phone number in the example, I've gone through the trouble
of tracking its history and it was in fact the phone number of a BBS
called "The Chipmunk BBS", running in the Chicago area on an Apple II,
that dates back to the early 1980's. This points strongly to Rabid
Rasta making a not-so-veiled reference to an actual user of BBSes.
-------------------
IS THE AUTHOR OF THE ABOVE MESSAGE A
TRUE PIRATE? SINCE THE BEGINNING OF
TIME THERE HAS BEEN AN IMPLICIT CODE
OF ETIQUETTE GOVERNING THE ACTIONS OF
SOFTWARE PIRATES, BUT AS MANY OF YOU
MAY HAVE NOTICED AS OF LATE, THAT CODE
HAS BEEN KNOCKED AROUND A BIT. ALTHOUGH
IT'S NOT DIFFICULT TO DIFFERENTIATE A
TRUE PIRATE FROM ONE OF THESE POOR IMI
TATIONS, I BELIEVE THAT, WITH THE NUM-
BER OF TRUE PIRATES DECREASING AT SUCH
AN ALARMING RATE, THIS CODE SHOULD BE
SET STRAIGHT. AFTER ALL, ALTHOUGH
"JHONNY" IS ADMITTEDLY A MORON, IT'S
NOT HIS FAULT THAT HE NEVER RECEIVED
PROPER GUIDANCE.
--------------------
The entire idea of "Real" guides (as this file spawned dozens and dozens
of imitations) stems from a humor book written in 1982 called "Real Men
Don't Eat Quiche", by Bruce Feirstein. In this book, you're told what
makes a real man, with rule after rule accompanied by illustrations. This
simple approach was easy for Rabid Rasta to use for this file, and for
others to use when they made copy-cat files.
Essentially, the structure is this: Line after line of "Real XXX do..."
and "Real XXX don't...", with an occasional Corollary to make things
clearer (or funnier, whichever was better). How well this worked depended
on the talent of the writer. In the case of this first file, he did very
well indeed, although as we'll see, the jokes are very "inside" and often
haven't stood the test of time.
By 1984 personal computers were becoming more ubiquitous, and with these
computers came modems, and with the modems came more and more users of
BBSes (and BBSes, as well). The cycle of the "January Losers" was now
underway, where each January the local BBSes were filled with all the
young kids who'd been given shiny new modems for Christmas and had hit
up all their friends for BBS numbers to call. If you'd started calling
BBSes from 1981 or 1982, it wouldn't be hard to feel like the barbarians
were at the gates, and the special community you'd built up and good
reputation you had was now on the verge of being worthless. To some
extent, this is where the concept of "elite" came from, as you had to
have some way to differentiate yourself from all the new unwashed
masses that were keeping every BBS line busy well into the night.
Eventually, of course, came a January that Never Ended (on the Internet
the was called the September that Never Ended) when the number of people
who now had modems arrive was so great than their flooding of the BBS
world would never subside again until the 1990s.
--------------------
ONE OF THE FIRST AND FOREMOST RULES OF
PIRACY:REAL PIRATES ARE OVER 15 YEARS
OLD! EXCEPTIONS TO THIS RULE ARE EX-
TREMELY RARE AT BEST.
--------------------
In 1984, anyone 15 or older would have been born in 1969 or earlier.
--------------------
COROLLARY: YOU NEVER HAVE TO WONDER
WHO BREEDED MICKEY MOUSE WITH A 2600 HZ
TONE TO PRODUCE A REAL PIRATE'S VOICE.
---------------------
The 2600hz tone had meaning in the context of blue boxing, where sending
that frequency down a phone line in certain situations would cause the Bell
telephone system equipment to suddenly start treating you as an operator.
By sending additional signals (with the assistance of a blue box or other
such phreaking device) you would then be able to do all sorts of interesting
tricks.
This number, chosen because it was unlikely to be a sound that would
otherwise come over a phone line, is the source of the title of 2600
Magazine, the Hackers' Quarterly.
For all that, Rabid Rasta is merely saying that a real pirate does not have
a high, squeaky voice. Mentioning phone phreaking terminology in such an
offhand manner was just showing off.
----------------------
ALIASES
-------
REAL PIRATES ARE MORE IMAGINATIVE THAN TO
USE THE WORD "COPY" IN THEIR ALIAS.
COROLLARY: REAL PIRATES AREN'T NAMED
"MR. COPY" BECAUSE REAL PIRATES DON'T
BRAG ABOUT CRACKING DUNG BEETLES.
THE WORD "CRACK" (OR "KRACK") IS FOUND
NOWHERE IN A REAL PIRATE'S NAME...UN-
LESS HE REALLY KNOWS HOW TO.
---------------
An "Alias" was basically the name used by a user on a BBS, to shield their
identity and give them more room to express themselves, or theoretically
stop the law from tracking them down. Other terms for an alias were
"handles" and "screen names". Often, an alias was an unintentional insight
into the personality of the individual behind it.
"Mr. Copy" appears to be local to Rabid Rasta, or at least someone who called
to the same BBSes. He's attacked several times in the file, and is painted as
an example of someone who is not a "Real Pirate" but who wishes he was one.
"Cracking" in the context of this file means to completely remove the copy
protection of a software product. It has been a major headache and project for
Software companies since the beginning of the industry to prevent users from
simply making a digital copy of a purchased (or borrowed) piece of software
and distributing it to all their friends. To combat this happening, a
company might invest many thousands of dollars in research and programming to
make a program stop functioning once it was duplicated. In response, pirates
with just as much talent as the companies would piece together how the
protection had been added, strip it out, and modify the software code to no
longer pay attantion to the protection. The result would be a "cracked"
piece of software, which could be copied with ease, as if it were a standard
disk (which it had not been before). In some cases, pirates would be talented
enough to reduce an entire disk to a single file, making it possible to put
several programs on a single disk accessible by a menu where previously only
one program had been before. This made it easier to transfer the program over
modems (as it was smaller and took less time to do so) and it earned you the
right to brag about your ability as a "Cracker". Most crackers were pirates,
but not many pirates were crackers.
In recent times, "Cracker" has taken on additional meanings within computers.
While nearly everyone would agree that the process of removing complicated
disk protection from a commercial game is at the very least a formidable task
requiring a lot of (misused) talent, the new meaning denotes an almost
slack-jawed use of pre-made tools to cause trouble. To people who saw the
first usage of the word as applied to computers, the new use of the term
is especially onerous.
The game "Dung Beetles" is a Pac-Man clone where your character goes through
a maze leaving dots while a number of creatures (the Dung Beetles of the title)
try to find you. The gimmick of this game was that the maze was actually very
large, and a magnifying glass would follow your character as it moved around,
letting you have a very clear view of the maze directly around you, but not
so great a knowledge of the entire maze. By the time this file was written,
the "Dung Beetles" game was over 3 years old, so either Rabid Rasta is
insulting Mr. Copy because he has cracked a very old game, or he's claiming
that Mr. Copy did no such cracking at all.
---------------
REAL PIRATES' ALIASES DON'T SOUND AS
IF THEY WERE EXTRACTED FROM THE LYRICS
OF AN OZZY OZBOURNE SONG (I.E.
PROVISIONER OF SATAN, BLACK AVENGER,
DARK PHANTOM, ETC.).
REAL PIRATES DON'T NAME THEMSELVES AF-
TER HEAVY METAL GROUPS.
---------------
Around this time was the rise of the Neon Knights and Metal Communications,
who most certainly named themselves after Heavy Metal themes and kept up both
the Metal theme and references to Satan and Hell wherever they could. Metal
in 1984 was yet another major genre playing on the radio, so it would make
sense that it would inspire some kids to base their handles and group names
on those themes.
It wasn't rare to see some people sticking upside-down crosses and 666s all
over their messages or files, or some variation of "HAIL SATAN". But like a
lot of the Heavy Metal of the 1980's, this wasn't all that serious a call to
the powers of darkness.
----------------
REAL PIRATES, IF NAMED AFTER SOME AS-
PECT OF PIRATE LEGEND (I.E. JOLLY ROGER,
CAPTAIN HOOK, EYE PATCH, ETC.) DON'T SAY,
"AVAST YE SCURVY DOGS," OR ANYTHING
OF THE LIKE.
-----------------
While pirates generally didn't use the words "Avast Ye Scurvy Dogs", there
was a definite Days-of-Yore theme that went through a lot of Pirate BBSes.
Some boards from the time were named "The Pirates' Cove", "The Treasure
Chest", "The Pirates' Corner", etc. While in some ways it was unwise to
advertise the true, illegal nature of your board, giving it a mysterious
name would guarantee a greater amount of callers, which was the lifeblood
of a BBS.
A common calling card of pirates who had "cracked" a game was adding code
to display a graphic "splash screen" or "intro screen" to the front of the
program, giving credits to the pirates who had cracked the software, and
the BBSes they called! In these little graphic displays, there was often
a solid "pirates" theme, with the Jolly Roger or english lettering making
an appearance. Often, after pressing a key while looking at this screen,
the user would then be able to use the actual game.
In a few cases, the "intro screen" code written by the pirates was better
written code than the program itself, loading an image within a fraction
of a second or doing a neat graphic trick. Occasionally, this code would
itself be "pirated" by other pirate groups for use in THEIR cracks!
-----------------
REAL PIRATES' NAMES AREN'T PARODIES OF
OTHER REPUTABLE PIRATES (I.E. RESIDENT
OF LAVENDER BAG, MR. PAC MAN, FRANKLIN
BANDIT, ETC.).
-----------------
"Lavender Bag" is a parody of the previously mentioned "Black Bag" Pirating
group.
"Mr. Pac Man" is a reference to "Mr. Krac-Man", whose name was probably most
seen on a cracked version of the Electronic Arts game "Hard Hat Mack".
The "Franklin" was a runalike version of the Apple II that was, in some ways,
quite superior (the disk drive was internal, for example), which was among the
Apple clones that were all sued by Apple for patent infringement. A prominent
pirate of this time was "Apple Bandit", hence "Franklin Bandit".
-----------------
REAL PIRATES DON'T NAME THEMSELVES AF-
TER ALCOHOLIC BEVERAGES (I.E. JACK
DANIELS, HARVEY WALLBANGER, JIM BEAM,
ETC.) ESPECIALLY WHEN THEY'VE NEVER HAD
ONE.
REAL PIRATES SPELL THEIR ALIASES COR-
RECTLY (UNLIKE "THE POENIX").
REAL PIRATES AREN'T NAMED SAM HOUSTON,
SIR SPANKY, THE GAMEMASTER, LORD FAGEN,
NIKKI SIX, (INSERT YOUR OWN LOSERS
HERE), OR MR. COPY.
---------------
Again, these appear to be local pirates who Rabid Rasta doesn't like,
especially Mr. Copy. Ironically, the appearance of their names in this file
has guaranteed some amount of fame/persistence of their handles that otherwise
would have never been. In insulting them, Rabid Rasta saved knowledge of them.
---------------
WARES
-----
REAL PIRATES WOULD NEVER THINK OF DE-
LETING "SABOTAGE". IT'S TOO MUCH FUN
IMAGINING THOSE LITTLE MEN ARE ACTUAL-
LY SIR KNIGHT.
---------------
The term "wares" is most likely a contraction of the word "software", as
in "I have some software to trade with others" being shortened into "I
have software" or "I have softwares" and finally "wares". This sort of
corruption happens frequently in social groups, as commonly done activities
and terms for them are repeated over and over until a new clever term
arrives. If the term makes a perverse sort of sense, enough people will
use it until newcomers assume it has always been that way, and things
perpetuate. A good example of this is the "-gate" suffix to mean "scandal",
(Contra-gate, Monica-Gate) even though the original Watergate Scandal
simply referred to the name of a hotel.
"Sabotage" is a program that is probably still stuck in the mind of anyone
who originally played it on an Apple II, even if the name itself has faded
from memory. This was a simple game on one level: You had a gun on the
bottom of the screen that you could aim left and right with two keys. On
the top of the screen, planes would drift by, dropping men with parachutes,
who would float towards the ground. If five men landed, they would gang up
on your gun and blow it up. Your task was to destroy the men before they
landed. Occasionally, a plane would come by and drop a bomb on your gun
that you had to shoot away quickly, but this was just to keep your attention.
On the surface, this may sound repetitive, but the program was really
well-done. While you could shoot the men and make them explode, it was
possible to aim your shots just right and blow away a man's parachute,
leaving him to plummet to the ground and explode on his own. You could
also shoot a man who was above another man, making him plummet into his
comrade and sending both to their deaths. Ship debris cascading on
parachutists, needless torture of characters, and the simplicity of the
controls added up to a really fun game.
As for the resemblance to Sir Knight, I have the memory of having heard
from others that Sir Knight was a somewhat unpleasant personality to be
around, but this wouldn't make him unusual around the sub-culture. More
likely, Rabid Rasta or a friend had a poor experience with Sir Knight and
it transmuted itself into a less-than-positive mention in this file. Sir
Knight created a file called "Making Your Phone Into a Cheesebox", which
is neither informative nor inspiring. Perhaps he doesn't need a parachute,
after all.
----------------
REAL PIRATES PLAY "BILESTOAD".
----------------
"The Bilestoad" was a unique and spectacular game for the Apple II that
came out in 1982. It won the 1983 Golden Floppy award for excellence from
Electronic Fun with Computers and Games Magazine, and quickly became a
must-have for anyone with an Apple II or access to one. Pirates considered
it an especially sweet plum in their collection.
In the game, you controlled one of two "meatlings", humanoid figures who
were put on a large map with lots of different disks, or "shyben". The
view was from above, and you had a complicated (but learnable) set of keys
to make your Meatling walk around the map and swing weapons. If the two
meatlings were not in the same area, the game would flip between the
two players until they came together, a multi-screen concept that doesn't
really make another major appearance until the 1990s.. You could attack
your opponent with amazing ferocity, and the game had a relatively large
amount of blood and gore (although at graphics levels that wouldn't raise
an eyebrow today).
The game is credited to "Mangrove Earthshoe", who in fact was a Georgia
Institute of Technology student named Marc Goodman. Mr. Goodman created a
number of games for the Apple, and has since gone on to do much research
and work in data mining and projective visualization, as well as gain a
doctorate. Dr. Goodman went on to create a Macintosh version of The
Bilestoad, which he still maintains and sells.
-----------------
REAL PIRATES HAVE LONG SINCE DELETED
"SNEAKERS", "E.T.", "ALIEN MUNCHIES",
"BUG BATTLE", "SNACK ATTACK", AND
EVERYTHING FROM SSI, AVALON HILL, AND
SCOTT ADAMS.
------------------
Rabid Rasta throws out a few examples of "Old Wares" in this paragraph,
showing that if a game isn't recent, it's probably not worth your time or
even space on your floppy disks. His list actually cuts through a large
variety of computer game companies for the Apple II, and it's worth delving
a bit into their histories.
"Sneakers" was a somewhat straightforward Space Invaders clone for the Apple
from Sirius Software that was published in 1981. It had multiple waves of
unique characters and was popular when it first came out, although by three
years later it was probably losing a bit of its sheen. It was written by a
16-year old Mark Turmell, who went on to co-create such later arcade games
as "NFL Blitz", "NBA Jam", "Smash TV" and "Wrestlemania" for Midway. Sirius
Software went out of business in 1984, and some of their games were then
sold to Broderbund and other rival game companies.
"Bug Battle" was a clone of "Centipede", the arcade game by Atari. Very
little else could be found about it; it's an almost exact duplicate of the
original, and was pirated by "The Untouchables". As the original Centipede
came out in 1980, it was likely that this clone came out in 1981 or 1982.
"E.T." is very likely a reference to "E.T. Comes Back", an adventure game
by Alliance Software that arrived in 1984. Obviously, it didn't leave much
of a positive impression on Rabid Rasta. The game was cracked by "The Nut
Cracker" and has a very strong similarity to the work of the Sierra On-Line
Adventures such as "The Dark Crystal", with simple drawings of locations and
two-word commands. Some of this genre was memorable indeed, but not this
particular game.
"Alien Munchies" was a game that consisted of pulling a propane barbeque
back and forth along the bottom of the screen to capture aliens falling
from the sky. As an interesting side note, the cracked, file-based version
of this game includes the following message: "Re-kraked by the disk jockey.
Learn to krak right, freeze. Also, if you take out the author's name again
to put in yours, I'll break all your arms and legs. No kidding. Sincerely,
the disk jockey."
"Snack Attack" by Dan Illowsky of Datamost Software was a Pac-Man clone from
1982 that was one of the Softalk top 10 Apple II games for that year. Datamost
software was also the publisher of the aforementioned "Bilestoad", as well
as several computer-related books. The company went under in 1984, although
it apparently resurfaced in 1986 until 1989 to produce another set of games.
SSI (Strategic Simulations International) and Avalon Hill were both leaders
in Turn-Based Roleplaying games for the Apple II (and many other platforms)
in the early 1980's. The focus of these roleplaying games would be on famous
armed conflicts from history, although games based on sports, famous books,
or medieval times/witchcraft also made their appearance.
Avalon Hill was founded in 1958 and had been involved in actual board games
of conflict simulations, also known as "turn-based roleplaying", where you
had advancing armies and troops that moved in rounds towards a goal. With
pieces, maps, and historical background of the conflict being portrayed,
this sort of game was very popular with a subset of the gaming audience.
The first forays by Avalon Hill into computer games were, needless to say,
rather sedate in terms of gameplay, with the focus being on "porting" the
board games into a computer version without much regard for the advantages
a computer may bring. Many were text-based, and all were still turn-based,
requiring a set of commands and then telling you where to move. This did not
impress a generation of Apple Users who had seen the potential of the
computer in games like Broderbund Software's "Choplifter" and Electronic
Arts' "Skyfox", where graphics were starting to come into their own and the
rewards in terms of gameplay were immediate and spectacular. To be given a
game from Avalon Hill meant that you weren't exactly getting the greatest
computer-based experience on a floppy.
Strategic Simulations International was a little less staid than Avalon Hill,
having been formed in 1979 and better focused towards the potential of the
computer. Starting from their first game, "Computer Bismarck", they were
soon a major challenger to Avalon Hill's market, and they had a much better
grip on using graphics and sound to enhance the experience. After 1984, the
company continued to expand upon its games and had a number of successes
with many different types of genres, with role-playing being just a part
of their entire outlay.
Both companies were later bought out, and are part of other, larger firms
at this point: SSI is a division of The Learning Company, which also bought
out such diverse firms as Broderbund Software, Softkey, and Compton's.
Avalon Hill is now a division of Hasbro, and continues to focus on Turn-based
games for computer, albeit with much flashier graphics and interfaces.
The Learning Company itself was purchased by Mattel, but later sold to "Gores
Technology Group", and parts of it were spun off to other firms. Suffice to
say, the story is rather depressing if you attach any sort of nostalgia to
the products from these firms and try to track down where they are now.
As an aside, if you're seeking happy endings, it's much more effective (and
rewarding) to follow the lives of the programmers who made the actual games.
For example, Joel Billings, who founded SSI out of college in 1979, has gone
on to continue his work with computer gaming to this day with a company
called "2by3 Games" (World War 2 By Three Guys) and has held to his initial
love of wargames.
Finally, Scott Adams sits a bit apart from these other programs. Founding
his software company "Adventure International" in 1979, Scott Adams created
a series of adventure games (text adventures, where you entered two word
commands to move around in locations and solve puzzles) that garnered much
praise from magazines and reviewers of the time. Adventure International
expanded in scope, creating games and other programs not only for the Apple
II but a wide variety of other plaforms, including the Atari 400/800,
Commodore 64, TRS-80, and Texas Instruments TI/99. Ultimately, however, the
games business took a downturn and Adventure International went out of
business in 1984. Scott Adams has since worked for Avista Inc. as a senior
programmer. It is likely that his dozen adventure programs that were
written for the Apple II were distributed far and wide and were pretty
hard to consider "exclusive" wares, and therefore the subject of Rabid
Rasta's scorn.
-------------------
REAL PIRATES UPLOAD. THEY REALIZE
THAT LEECHING IS THE #2 SIN (BEHIND, OF
COURSE, BEING 13 YEARS OLD).
----------------
Setting aside the moral and legal issues of pirating software, there were
and are a lot of aspects to the sub-culture that are worth noting. When you
have a rough alliance of hundreds of people dealing in copying and
distributing commercial games, certain interesting conventions and issues
arose and continue to make themselves known.
A major issue when trading in copied software is that people tend to just
take all the software being offered and not actually give anything back
in return. This process, often called "leeching" (and recently,
"freeloading") is a natural human tendency and efforts have been made
for decades to counterract it, with varying results.
One solution that presented itself was the "Ratio", where people could only
download a certain amount of files before they were forced to upload. Ratios
could be somewhat lax, like requiring an upload for every 99 downloads (which
wasn't really a ratio at all) or extremely strict, like requiring one (or
two!) uploads for every download.
Other variations have included "validation", where users could browse the site
and see what it had to offer, but they couldn't download any files or post
messages until they were given a higher level by the System Operator (SysOp).
On some sites, especially pirate boards, you might be required to fill out
an application to join, not unlike an exclusive school or club, which in some
ways this was.
Obviously, if you knew the right people, you got everything anyway; this was
just a set of walls set up so that the principles of spreading files far and
wide were upheld, but a board wasn't completely taken advantage of.
----------------
REAL PIRATES REALIZE THAT PENGUIN AREN'T
REALLY "THE GRAPHICS PEOPLE".
----------------
Penguin Software (renamed after legal issues to "Polarware" in 1987) were
the creator of a number of graphics programs for the Apple II. Among their
more famous products were "The Graphics Magician" and a game called "The
Spy's Demise". They had a large number of game companies license graphics
routines from them, and they gave themselves the motto "The Graphics People".
Obviously, Rabid Rasta did not agree.
----------------
REAL PIRATES FEEL GUILTY WHEN PIRATING
BEAGLE BROTHERS. OF COURSE, THAT NEVER
STOPS THEM.
------------
Pirates would feel guilty about pirating Beagle Brothers because they were
one of several companies that took the risk of releasing their software with
absolutely no copy protection on it, and then imploring people to make the
best judgement and not make copies of their software except for backups. This
approach was also taken by Penguin Software, with similar success.
Beagle Brothers were also reknown for making absolutely fantastic software;
they had a special talent for cramming as many goodies and hacks onto every
disk they sold. You might be buying a word processor or programming tips disk
and find a whole plethora of fascinating code buried within the disk as well.
You could definitely feel bad about ripping off the Beagle Brothers.
------------
REAL PIRATES DON'T BELIEVE THE MORONS
WHO SAY THEY HAVE ULTIMA IV AND POLE
POSITION.
------------
In the modern day, where Ultima now means "Ultima Online", it should be
mentioned that the Ultima series by Lord British (Richard Garriott) was
created in 1980 for several platforms, including the Apple II. The object
of the game was to guide your player (named "Avatar") through a series of
adventures in the land of Britannia. Ultimately, there have been nine
Ultima Games (and then Ultima Online), with each new chapter over the last
20 years being more anticipated than the last. This game had a major cult
following even in its early years, and promises by pirates that they had
the next version of Ultima became a constant, shrill joke on BBSes. Ultima
III had been released in 1983, and this file was written in 1984. Ultima
IV did not make an appearance until 1985, although it was theoretically
possible that someone could have had an early copy of Ultima IV in 1984.
This was a very unlikely prospect, though.
"Pole Position", the Namco-Produced Arcade Game that was licensed by Atari and
brought to the United Stated under their name, was in fact announced for the
Apple II by Atarisoft in April of 1984. This indicates that either Rabid Rasta
had assumed that Pole Position, an Atari game, would never come out for
non-Atari computers, or the file was written before April of that year. As
it turned out, however, Atari never did release Pole Position (although it
did release a number of other programs for the Apple II) and the program
joined the legion of "vaporware" that has accompanied the history of the
computer since its beginning.
------------
COROLLARY: REAL PIRATES REALIZE THAT
THERE IS A DIFFERENCE BETWEEN FORMULA I
RACER AND POLE POSITION.
------------
I am unable to find any direct information about a game called "Formula I"
for the Apple II, but it wouldn't be that hard to assume that Formula I was
a racing game that, if one convinced oneself with great effort, might be
similar to Pole Position, minus the graphics and sound.
------------
BOARDS
------
REAL PIRATES AREN'T THE FIFTH TO POST
THE SAME "I HAVE..." MESSAGE.
CORROLARY: REAL PIRATES DON'T POST
"I HAVE..." MESSAGES WHEN THEY REALLY DON'T
HAVE.
------------
"Boards" in this case refer to message sub-boards, sections on a BBS that
are dedicated to one subject that users could post to. In this case, the
subject is trading games.
The "I Have" messages being referenced here are messages that would be posted
on the "Trading" sub-board of a BBS, where users would announce what disks
or programs they had available, and others would send them mail asking to
trade for other programs. Messages that were just asking for programs were
"I Want" messages.
In this way, BBSes provided a way for disparate groups of people to get
together to trade files, because otherwise things came down to the same
dozen disks within a social group. Alliances and friendships would be struck
over these trades.
------------
REAL PIRATES DON'T DOWNLOAD PROGRAMS
FROM PUBLIC AE'S AND THEN POST "I KNOW
IT'S OLD, BUT I HAVE...TOO" MESSAGES
ON PIRATE BOARDS.
-------------
The term "AE" is used only twice in this file, It stands for "Ascii Express",
which was a terminal program for the Apple II that changed the face of
Apple II piracy forever. While the use-the-modem-to-connect-to-BBSes side
of the Ascii Express program was uneventful, it had a second feature, whereby
it could run as a sort of file server, allowing anyone who dialed in and
typed the password to browse the operator's disks.
This changed everything. People could put up Ascii Express on their phone
lines with absolutely no difficulty or preparation, and just start offering
copies of programs out to anyone who called. Obviously they would also hope
that others would upload to their "AE Line" as well.
AE Lines were among the best way to distribute files and disk images on a
previously-unknown scale, requiring only one of the two users involved in
the trade to do the work. This was also a situation where "cracks" into a
single file from a full disk worked to a great advantage, as a maximum amount
of programs could be made available on a single or double-disk system.
-------------
REAL PIRATES DON'T POST THEIR HIGH SCORES.
COROLLARY: REAL PIRATES DON'T KEEP SCORE.
REAL PIRATES DON'T SAY "K-K00L",
"K-AWESOME", "X10DER", "L8R0N", OR
ANYTHING OF THE SORT.
REAL PIRATES KNOW THE DIFFERENCE BE-
TWEEN "F" AND "PH" (I.E."PHILES",
"PHUCK", "FONE", ETC.).
--------------
The use of the spelling "fone" for "telephone" stems back from the days of
the Technological Assistance Party (or Youth International Party Line),
which preceeded 2600 magazine in bringing deep-hidden secrets about the
phone company (the once-invincible Ma Bell) to an eager audience. There is
a very good likelihood that this F-PH switching goes back to the 60's and
even beyond; people who really got into the technology of the phone company
might be referred to as "freaks", and it would be a logical step that they
would playfully call themselves "Phone Phreaks". It's known that Phone
Phreaking started at least as far back as the 1950's, but compared to today's
level of organization within this sub-culture, it was probably a very
loosely-knit and disparate group of people who took the term to refer to
themselves, possibly independent of each other.
(The History of Phone Phreaks and Phreaking in general is far beyond the
scope of this file, but is a subject worth exploring. A number of books
have gone into more recent groups of Phone Phreaks, and they make an
excellent start for the historian trying to understand this fascinating
culture.)
It is entirely a guess on my part, but made from observation of hundreds
of textfiles, that the "K-" prefix is an abbreviation for "OK," as in
"OK, Cool" becoming "K-Kool". This quickly mutated into forms for "K-Rad",
"K-Awesome", and the like.
The origins of the word "OK" itself comes from an abbreviation fad in
the late 1830s, where it stood for "Oll Korrect", and was part of a family
of silly abbreviations that newspapers were using at the time. This
abbreviation was later grabbed by Martin "Old Kinderhook" Van Buren in
his presidential campaign, and it fell into common use some time later as
a result of that publicity. So, one could argue that "K-Rad" has a history
of more than a century and a half, which is both breathtaking and depressing
in one swoop.
Finally, the use of 1 for "I", "0" for "O" and the like are traditions
going very far back and are also worthy of a treatise in themselves. There
is a belief that these alternate spellings are the result of a Usenet
phenomenon called "B1FF", but "B1FF" was created by Joe Talmadge in 1988,
and is in fact an homage to the already-existent spellings that were on BBSes
for years before.
--------------
REAL PIRATES DON'T WASTE EVERYONE'S TIME
BACKSPACING OVER THEIR ALIAS 50 TIMES.
COROLLARY: REAL PIRATES DON'T USE
BACKSPACING IN FEEDBACK TO SYSOPS.
(SYSOPS DON'T READ FEEDBACK AT 300 BAUD)
-------------
This was the reference that first inspired me to write this file; the concept
of "backspacing" is almost completely lost in the modern world, where DSL and
cable modems can download at the rate of an entire Apple II disk in a SECOND.
This is far past the concept of "baud" as a speed measurement; we now use
kilobits or kilobytes per second, instead of thinking of something as 128,000
baud or the like. A good percentage of the country in this new century can
connect at between 33,600 baud and 56,000 baud. But once, the best you could
do was 300.
In the era of 300 baud, text would crawl along the screen; it was very
possible for a talented typist to type as fast as 300 baud, and reading at
that speed was just as easy. This meant that the BBS experience, when you
weren't downloading a file, was a matter of watching the cursor leak across
the screen, line by line, sentence by sentence. This could be very exciting
or extremely boring, depending on what was happening at the time. For example,
typing "?" for a menu at the BBS prompt when you meant to type something else
would mean another 15-30 seconds sucked out of your life.
Besides all the standard alphanumeric characters, some BBS programs would
let you enter unusual key sequences in your keyboard to add deletes or cursor
moves to your message.
Imagine, then, that when signing your name, for extra emphasis, you enter
it into the message system like this:
THE WYVERN<delete><delete><delete><delete><delete><delete><space><space>
<space><space><space><space><delete><delete><delete><delete><delete><delete>
WYVERN
...and so on. What anyone reading your message at 300 baud would see, as
they got to the end of your message, was your name, and then the name
reversing and erasing itself, and then the name appearing again. This little
text trick would give your name a sort of shimmer, and then the message
would be finished.
Obviously, if someone mistyped as they entered these sequences, it would leave
half-finished lines and words scattered throughout their message, which was
an unintentional joke in itself.
A more involved concept was the spinning cursor, where you would add a
sequence to look like a spinning line after your name:
-<delete>\<delete>|<delete>/<delete>-
As the message constantly printed characters and then deletes, it would look
a little like a line spinning in place. (Trust me on this.) A remnant of this
trick exists in the boot-up sequence of Sun Microsystem's Solaris Operating
System, where the cursor spins for you, like the old days, as your system
loads.
The tricks and oddities of backspaces began to fade with 1200 baud, where
they would spin ludicrously fast, and came to a complete death with 2400 and
9600 baud, where you couldn't make out what was being done. And as Rabid
Rasta indicates, reading these messages locally (on the same computer as
the BBS, which the System Operator would be) was an exercise in frustation
as these little keyboard tricks made the screen a mess.
"Feedback", by the way, was the general term for messages sent directly to
the System Operator, or Sysop.
-------------
REAL PIRATES NEVER USE TEXT GRAPHICS IN
THEIR MESSAGES.
-------------
Text Graphics sounds like an oxymoron, but it's the use of text characters
in a message or textfile to look more like a pictogram than just letters.
To illustrate, I'll point to the signature of the great Count Nibble:
/\/oo\/\ Count Nibble /\/oo\/\
Obviously, as time has gone on text graphics have gotten much more
elaborate, and a small "ASCII Scene" still exists wherein different groups
of text artists try to outdo themselves and others with 'Art Packs' of
collected works.
-------------
REAL PIRATES DON'T CARE ABOUT THE CURSE
BBS'S "K-K00L M0DS".
-------------
The idea of "Mods" is explained in further detail a few paragraphs below,
after the description of GBBS software. The Curse BBS appears to be a
BBS that has implemented a very large amount of "Mods", none of which,
in Rabid Rasta's mind, have improved the quality of the Board itself.
There was a Curse BBS which hosted Hot Rod of the Black Bag Apple pirate
group, located in Minnesota, and is very likely the BBS Rabid Rasta is
referring to.
-------------
REAL PIRATES DON'T SEARCH FOR NEW WAYS
TO SPELL "WARES".
-------------
Regardless, this search has continued to this day, nearly two decades later.
-------------
REAL PIRATES DON'T USE THE LAST 5 LINES
OF THEIR MESSAGES BRAGGING ABOUT THE 8
MEANINGLESS ORGANIZATIONS THAT THEY BELONG TO.
COROLLARY: REAL PIRATES DON'T BELONG
TO SWAPP, DOS/NPG, OR NASCOMP.
------------
Rabid Rasta is referring to the interesting situation of "Pirate Groups",
which were (usually short-lived) clubs consisting of pirates, who would
brand all the releases and text by its members. Some groups have survived
over a decade, but most barely made it past the first couple of months.
Sadly, SWAPP, DOS/NPG, and NASCOMP have all faded into obscurity, leaving
very little trace of their existence beyond Rabid Rasta's mention. Ironically,
Rabid Rasta helped these organizations to perpetuate their names for
decades be giving them as examples of groups not worth being a part of.
NPG very likely stands for "New Pirates' Guild". A good number of "Guilds",
"Brotherhoods", "Societies", "Alliances" and "Exchanges" existed, containing
groups of youths who either knew each other in person, or only through BBSes.
Some groups might actually acquire software (by working at computer stores
or even at some development firms) and then make it available to the public,
while others would simply take what was already out and being traded and put
their own names on it.
-------------
REAL PIRATES WHO ARE GBBS SYSOPS ARE
PROUD TO HAVE STOLEN FROM GREG SCHAEFER.
-------------
It's not entirely clear why one would be proud to steal software from Greg
Schaefer in particular; perhaps Rabid Rasta is simply saying that someone who
would write this software is deserving of being stolen from. I've been
informed that Greg Shaefer was particularly anti-piracy and spoke out against
it; but it's not clear if Rabid Rasta knew this.
GBBS was one of several BBS programs for the Apple II that came out in the
early 1980's; it was popular because of its easy setup, and more importantly,
that it was partially written in BASIC, allowing people to make all sorts of
modifications, or "mods", to the software. The subculture of "mods" is an
entire chapter in itself; suffice to say that many budding SysOps would make
many good (and bad) modifications to their BBS software to try and get more
users.
For his part, Mr. Schaefer never lost his interest in the Apple II: In the
late 1980's, working for InSync software, he created "Proterm", an Apple II
telecommunications program still for sale in the present day. InSync changed
its name to InTrec software and created a version of Proterm for the Apple
Macintosh.
-------------
REAL PIRATES ARE SATISFIED WITH ONE
EXCLAMATION POINT.
-------------
This belief has continued through to today; putting many exclamation points
after your statements (I HAVE INCREDIBLE NEWS!!!!!!!!) impresses no-one and
makes the person writing it seem overly excitable and perhaps a bit flaky.
One off-shoot of this bad habit should be mentioned: If you are typing a lot
of exclamation points and your hand comes off the shift key for a moment
(perhaps because you're an excitable youth who is typing something too
quickly), then you suddenly put a "1" down instead of a "!". Hence, there are
many, many references in many textfiles of the era to losers or other
undesirables writing things like:
I HAVE INCREDIBLE WAREZ TO TRADE!!!11!!!!!1!!!!1!
This quickly became an in-joke among the "elite" of BBSes, to show how far
they'd come, by acting like they hadn't come anywhere at all, in an ironic
fashion.
--------------
REAL PIRATES DON'T CALL DIAL-YOUR-
MATCH.
--------------
Dial-Your-Match (or DYM) was a BBS program that had many of the standard
features of Bulletin Boards, that is, message bases, private e-mail (within
the userbase of the board) and file sections.
But its key feature was a questionaire that you were required to fill out,
asking you all sorts of personal questions (many of which were configurable
by the BBS operator). Having filled out this questionaire, you could then
choose to see who else on the BBS you were a great "match" with.
Assuming you found someone who was very compatible with you, you could
elect to send them e-mail or arrange for a date. The prospect of using the
computer to meet people was apparently a popular one, because Dial-Your-Match
BBSes flourished in the early 1980s.
This was a particularly interesting piece of software because the BBS world
was extremely male-dominated, and many times there would be 200+ male users
vying for the attention of less than a dozen female users. If they were in
fact female users. It must have been a unique experience for all involved.
--------------
REAL PIRATES NEVER GET INTO "BITCH WARS"
UNLESS, OF COURSE, THEY ARE GRINDING
SOME 13 YEAR OLD TI USER INTO THE DUST.
TRANSFERS
---------
REAL PIRATES DON'T DFX.
REAL PIRATES NO LONGER BUY MICROMODEM
II'S, SSM MODEMCARDS, OR NETWORKER
MODEMS.
COROLLARY: REAL PIRATES BUY APPLE CATS.
------------
"Bitch Wars" are more often known as "Flame Wars", where two people, shielded
from each other via keyboard and modem, begin to harass and insult each other
way beyond the normal course of human conversation. After a while, these
attacks were entertaining enough for others that some BBSes specifically
created sub-boards (discussion groups) called "Bitch Boards" or "Bitchwar
Boards" that users were invited to start vicious debates on.
"TI User" means someone who owned a Texas Instruments 99/4A. This ill-fated
entry into the personal computer market, while in some ways a relatively
powerful and worthwhile machine, was itself ground into the dust when Texas
Instruments insisted on controlling all distribution of software for it
and demanded licensing fees for the rights to make cartridges or sell
programs for it. After they began litigating several companies that had
ignored this admonition, support dried up and TI exited from the business.
Ironically, this caused a massive dumping of TI 99/4A machines into the
market, which gained a large and ready audience happy to grab a personal
computer and peripherals for less than $200. A small boom occured afterwards
in software for the machine, but it never got away from its constrictive,
cheap reputation.
If there was the slightest doubt that this file is Apple-Centric, it's all
dispelled by the time Rabid Rasta starts discussing file transfers via modem.
He quickly mentions a good portion of the competing Apple modem hardware
available in 1984.
The Hayes Micromodem II was created by the Hayes corporation, which had
started the home computer modem market in 1977 with the creation of a
modem for the S-100 bus, and soon after the Apple II. The Micromodem II's
speed was 110 baud and 300 baud.
In fact, it appears that Rabid Rasta is referring to a group of 300 baud
modems that had been out on the market for a while. The SSM Modemcard was
also 110/300 baud, as was the Zoom Telephonics Networker.
The Novation Apple Cat, on the other hand, was one of those pieces of
hardware that sounds almost too good to be true. Created by Novation, Inc.
to be a powerful and flexible modem, it soon turned out to be VERY
powerful and ALL TOO flexible for some tastes. It was possible to have
two 300 baud Apple Cats communicate with each other and work at 1200
baud. The Apple Cat's tone generators were programmable and it was
possible to program the modem to do four-part music down the phone
line. The ability to recognize tones coming down the phone line meant
the "Cat" could know if it was getting a fast busy, slow bust, disconnect
message, or a ring; besides the advantages of knowing to a better extent
what was wrong with the BBS you were calling, the modem could take
your voice if you spoke through it and modify it as you spoke. Needless
to say, this was one incredible piece of technology.
As for Real Pirates and "DFX": DFX is short for "DOS File Exchange", a
program written in 1982 by Blacksmith of Arrow Micro Software. This was a
terminal program that allowed users to transfer DOS 3.3 disks using the
Micromodem II. This program also allowed users to chat at the same time
that these disk images were being transferred. One can infer that the
adherence to the inferior Micromodem II as opposed to the Apple Cat Modem
insured that this program was not the choice of "Real" Pirates.
------------
COROLLARY TO THE COROLLARY: REAL PI-
RATES ACCEPT THE REALITY THAT 300 BAUD
IS DEAD.
------------
Of all the battles that were fought over status, none were as clearly defined
along cost lines than the baud wars.
300 baud, the standard for modems, in the early 1960's, had been around since
the late 1960's. But with the demand for faster speeds from the growing home
computer market, 1200 baud modems started to proliferate.
It's somewhat difficult to put down a time to say "At this year, 1200 baud
modems were introduced to consumers." In fact, 2400 baud modems were
available as early as 1982-3, but they cost in the range of $500, well
beyond the means of many families. 300 baud modems at the same time,
however, were in the $100 range. Prices varied wildly, and under any
circumstance it was hard to justify to parents the added advantage of
a 1200 baud modem that could be in the range of $300.
This led some desperate types to start dabbling in credit card fraud, to be
able to acquire the hardware needed to stay ahead of the curve. Credit card
fraud, incidentally, was often what brought down a BBS or AE Line, more
than having pirated games; once you started going into the thousands of
dollars of fraudulently acquired hardware, you got the attention of some
pretty heavy law enforcement.
In 1984, the price had started to come down enough for 1200 baud to
proliferate, but 300 baud modems could still be seen. Since the faster speed
was available, there came into place the "1200 only" board, that would no
longer allow collections from the lower speeds. When 2400 proliferated,
"2400 only" started to appear.
To some extent, this elitism on the part of pirates was understandable; with
the process of transferring floppies taking beyond an hour for 300 baud
users and time being cut to 25 percent for 1200 baud users, this meant more
distribution, more users, and more uploads.
------------
REAL PIRATES AREN'T AROUND TO TRADE ON
FRIDAY OR SATURDAY NIGHTS.
COROLLARY: REAL PIRATES HAVEN'T
WATCHED LOVE BOAT SINCE THEY WERE 13.
------------
The "Love Boat" Television Series on ABC ran from 1977 until 1986, so when
this file was written there were still two more excruciating years to go.
The reference in this case is that "Love Boat" ran on Saturday nights,
meaning if you were watching Love Boat, you were not exactly having a
real exciting party or social life.
------------
REAL PIRATES TYPE "BRUN AE" WITHOUT
THE SPACEBAR IN BETWEEN.
------------
A rather obscure reference to a parsing trick on Apple IIs where only the
first 4 letters of a keyword (internal command) were looked at, and you
could put the next piece of information (the filename) right after the
4 letters, with no space. For example, LOADPROGRAM was the same as typing
LOAD PROGRAM. In this case, typing BRUNAE is the same as typing BRUN AE.
AE is the filename for the aforementioned ASCII Express telecommunications
program, one of the most popular modem programs on the Apple II. "BRUN" is
a command that means "Binary Run", as opposed to RUN, which means "Run this
text program". There were similar differences in the commands for LOAD/BLOAD.
Perhaps in conjunction with other learned shortcuts, it would be impressive
to see someone typing the absolute least amount of commands to get the job
done. Or maybe this is just meant to be a quick showoff, to demonstrate
that Rabid Rasta knows all the right moves.
------------
REAL PIRATES CAN GET DISKFER/CATSEND
TO WORK RIGHT THE FIRST TIME.
---------------
Catsend and Diskfer were one of a legion of programs written to support the
Novation Apple Cat modem. In this case, these two programs were meant to
make disk distribution much easier.
To understand what need they were filling, it helps to know that terminal
software usually geared itself towards the transfer of individual files and
then only as a side feature for the program, not as its main driving force.
Telecommunications programs also tended to be more general purpose, and not
designed to work with specific modems. The Apple Cat programs, meanwhile,
only worked with one specific modem, and as previously discussed, a powerful
modem indeed.
"Diskfer", written by The Redheaded Freak, Checksum, and The Black Hole of
the Independents, greatly optimized the process of sending floppies by
allowing the automation of sending an entire disk. It was actually possible
to set up a session where two disks on the sending machine were being
recieved at the same time on the destination machine. This sped up the
process greatly.
CatFur, by the Night Owl and the Micron, was a similar sort of disk transfer
program as well, although it had a different set of features. It included a
utility to set all unused portions of a disk to $00 (Null) so that the disk
would compress to a greater degree, making a major difference in a 300 baud
transfer. It also had an "unattended" mode that functioned very similarly to
Ascii Express.
What this meant, was that you could set your Apple up as an optimized disk
disk distribution node, and others (running the right program) would then
be able to get full copies of your offered disks, unattended, with the
machines closing down after they were done. This was especially useful if you
were doing your transfers on your parents' phone line late at night and
wanted the lines clear the next morning.
---------------
CONCLUSION
----------
THAT'S IT...FOR NOW. SINCE LOSERS IN-
VENT NEW WAYS TO BE LOSERS EVERY DAY,
EXPECT A "REAL PIRATE'S GUIDE, VOLUME
2" VERY SOON.
---------------
A "Real Pirate's Guide Part 2" did make an appearance (as well as Parts 3, 4,
and the dozens of other "Real" files) but it was not written by Rabid Rasta.
It's mentioned in the Real Pirate's Guide Volume Two that Rabid Rasta had
gone off to college, which indicates that his age at the time of writing this
file was between 17 and 19. Unfortunately, this is only a guess.
---------------
IF ANY OF YOU WERE TERRIBLY OFFENDED
BY ANYTHING IN THIS FILE, THAT'S YOUR
CLUE TO RETIRE FROM THE PIRATE WORLD.
AFTER ALL, REAL PIRATES DON'T GET
OFFENDED BY THINGS WRITTEN IN
TEXTFILES.
THANKS TO THE FOLLOWING FOR THEIR
CONTRIBUTIONS TO THIS FILE:
OTTO SHINEFLUG, CTRL RESET,
BIT O'NASTY, LORD CHAOS,
NILONIEL I, AND WHATEVER
CON MAN CALLS HIMSELF OUT OF STATE.
--------------
CTRL RESET was the author of The Real Pirate's Guide Volume Two. He claimed
to have worked closely with Rabid Rasta on this file, which might have meant
a number of suggestions for rules and corollaries. The second file, suffering
from the same problems that many sequels do, uses many of the same jokes and
follows the same formula.
The other names mentioned don't show up in my research, probably because they
posted no files of their own. This actually happened a lot; people would join
a BBS because they thought it was a fun place to play around in, and they
would be asked for a handle. They'd put down whatever silly name they wanted,
and posted a few messages under that name, and maybe hung out with other
friends on and off the BBS who used handles, and that was that. It was only
those who then took those handles and created textfiles or programs with
them that have had their names persist to this day.
--------------
(C)1984 RABID RASTA;
UBANGI JUNGLE PUBLISHING
--------------
The Ubangi is a river in Africa, roughly 1,400 miles long, that is formed
by the union of the Mbomu and Uele rivers, and is the main northern tributary
of the Congo. What this might have to do with a textfile writing group is
left up to the reader.
Some Final Notes;
No person directly associated with the Real Pirate's Guide was consulted
in the creation of this file, meaning that there might always be alternative
and completely viable explanations for why things were written the way they
were. However, I have taken my best educated guesses based on the information
and research available to me. The purpose of this document was to give
context and hopefully get some history right; history is a funny thing, and
can be radically different based on who you're interacting with at that
moment. It would be a wonderful thing if someone associated with this file
would speak up and let their side of the story be heard.
The story of OK was based on the work of Professor Allen Walker Read,
and is gone into a more helpful and simpler detail in a book by Cecil
Adams called "More of the Straight Dope", where I picked it up. If
etymology is of great interest to you, you will find the story of OK
to be fascinating indeed.
The clarification of B1FF comes from several sources, notably the Hacker
Jargon File, edited by Eric S. Raymond among others, and from several
messages posted on Usenet about the date of B1FF's arrival.
While I knew in my mind that the Novation Apple Cat modem was powerful and
could do many magic things (I still remember the night in 1986 that
someone played "The Entertainer" to me over the phone with it), it was
the web page of James W. Abendschan that allowed me to easily recount
some of the specific tricks it was capable of.
Information about different gaming companies came from many sources, including
the remaining home pages of the companies under their new ownership, but one
other source that shone brightly was the Giant List of Classic Game
Programmers, maintained by James Hague, which allowed me to determine what
company manufactured a given game.
---------------