======================================================================= T h e F i d o G a z e t t e! Volume V Number VII June 1st 2011 ======================================================================= +--------------------------+------------------------------------------+ | .----------------------. | dr.debug: dr.debug @ filegate.net | | | A monthly E-Zine | | bbslists: bbslists @ filegate.net | | | published by Fidonet | | articles: fidogazette @ filegate.net| | | to promote BBSing | +------------------------------------------+ | | ____________. | | | | / __ | "Anyone who has never made a mistake | | | / / \ | has never tried anything new." | | | WOOF! ( /|oo \ | Albert Einstein | | \_______\(_| /_) | | | \@/ \ | Got Something To Say? | | .---.\ _ | Say it in the | | (jk) _ |usb| \ \\ | =The FidoGazette= | | / | .___. \ ))| | | / | /_ | / \// | Editor: Janis Kracht | | |___| // || _\ / | janis @ filegate . net | | .--`-. (_|(_|(____/ | janis kracht 1:261/38 | | |____| (jm) | | +--------------------------+------------------------------------------+ ======================================================================= ==-=-=-=-=-=-=-=-=-=-=-=Contents=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= ======================================================================= Editorial......................................2 New/Returning SysOps...........................3 Surge Protectors, Lightening and How to Survive a Blast.....................4 How We Survived a 24-hour Blackout.............5 Old School ToolBox.............................6 Cooking: Even SysOps have to Eat...............7 Configuring a Networked Printer with Win7 and An Older Computer Via Your LAN.............8 10 Things You Can Do to Pop Off the Filter Bubble..................................9 Region 13 Coordinator Election - Time to vote..10 BBS SoftWare List..............................11 FidoGazette BBSList............................12 Info (How to Submit an Article)................13 Page 1 ======================================================================= T h e F i d o G a z e t t e! Volume V Number VII June 1st 2011 ======================================================================= Editorial ========= Deadware, Shareware and Just-Plain-Broken-ware By Janis Kracht, 1:261/38 I noticed in the IREX echo a brief discussion regarding Irex and it's shortcomings, notibly not much support for versions of Irex other than the Windows version. It would seem Windows users of Irex don't have many problems.. but from I hear, that is not neccessarily true of the OS/2 version of Irex nor is it true for the Linux version. Michiel van der Vlist's comments in the IREX echo about Irex and IPV6 were also met with silence.. my guess is that further development of Irex and IPV6 will not be forthcoming in the future... at least Charles Cruden, author Irex, hasn't mentioned anything anywhere that I've seen. I for one am very grateful that the software I run on < I just changed the mains breaker box last year, and JD> had it inspected (a must). JD> I installed a surge protector at the breaker box, JD> which also did not trip, and JD> the only antenna on the A/V receiver, is an inside JD> wire It is fed from the JD> Sat reveiver, and that is working just fine as is the JD> TV, all of which were JD> hooked up (plugged in) to the same surge proteced bar, JD> which also did not trip. JD> The two battery backup units (I have 3) got fried and took JD> the computers JD> attched to them with them. Fried the MB on both. You JD> can see a blown whatever JD> it was next to the CPU fan connecte, so more then likely that JD> CPU while working, is not to be trusted. What so few people, even that ham radio folks seem to understand is that lightning is *NOT* electricity as such. It is a radio wave issue. What happens is that 'all' lightning which is cloud to ground, really for the most part ground to cloud, is attempting to dissipate itself across the surface of the ground. It does *NOT* go inside wires, metal; whatever. It goes only on the surface. As such what this means is that, the as NEMA defined normal protection with surge protectors, even at your main breaker box, and all the plug-in stuff, do *NOT* protect at all from a major strike issue. Because lightning is a radio wave issue and it has a frequency or a wavelength, we are faced with the normal quarter wave high voltage with low current point on the 'antenna' and then a quarter wave later with low voltage and high current! A 'normal' lightning stroke at some point in the life span of the stroke has a frequency of about 1MHZ or a quarter wave of about 250 feet or so. But at a major point in the stroke, the wavelength is about eight or ten or twelve feet! Plus, in that it is only going on the SURFACE of whatever is conducting it, even if your protective device such as a surge protector or MOV varistor or whatever has shunted it to GROUND wiring, may not even remotely favor going to the ground rod at all! You see, a ground rod, driven into the ground at the meter point is *NOT* even a bit able to spread the lightning radio pulse to the surface of the earth! The ONLY way to do this, is to fan out a radial wire grid from the SURFACE point on the ground rod, on the SURFACE or right along the SURFACE of the earth out like spokes on a wagon wheel, just like the radials on a vertical antenna! These must be at least eight or ten feet long or so - say at least eight or more of them. So that they will spread the energy of the strike to the SURFACE of the earth where it absolutely MUST go. Now that is also affected by the quarter wave reasonance point for the metal grid which is conducting whatever to wherever. Which in MANY cases for a house or building, actually shunts the majority of the strike plasma energy INTO the building with no dissipation grid present and in the worst possible way you could imagine, on the SURFACE of even the green ground wire on your protection device for computers, instead, to the INSIDE of every power device plugged into that protector! The normal way for this to be even worse, is that *ANY* switching type power supply for modern computer work is such that this ABSOLUTELY takes the complete strike effect down the GROUND side of the system to the circuit boards! Thus blowing everything up inside your printer, your computer, your phone system, your hi-fi, your wonderful flat screen TV, your cookstove burner control; whatever. If you understand what I am saying here, now you can see why, even on the same power wire source in a house, at times the TV will blow up, but eight or ten feet down the same power line, the Hi-Fi will not! Quarter wave phase reversal stuff, all set into place by the strike being on the outside of the GROUND wire that is connecting all to safety? Yeah, right... As well, since lighting is a plasma conducted radio wave, it also generates EMP pulse issues, which, radiate outward from the bolt traveling in the sky in what we see as lightning. OK, your entire wire grid in a house or building which has no faraday or metal shielding design on the outside wall surface, picks up the pulse which can spike the wave into the whole wire circuitry in a building, with absolutely no conduction from, for example, the power line coming into it, or the phone line, but, for example from your TV antenna, or HAM antenna, or even your metal flag pole next to your building on the wall there! Seriously, protection from lightning strikes is a VERY serious and special engineering project. I've been a specialist at this since a VERY long time ago when I was chief engineer at WTAW radio here in College Station, Texas at the home of Texas A&M University in the 1950's to 1960's. I've been a NARTE Certified Master Telecommunications Engineer since 1986 having had to really study and learn all this just to protect us professionally back then. As well as my own remote HF ham antenna location for my W5WQN sites since the 1960's. Which since I really did the work to protect the equipment, even though I get at least two or three direct hits every year, I have never lost any gear from powerline or antenna line strike issues, nor pulse stuff for any other than a few phone line modem damage issues. Take EVERYTHING to ground at EVERY tower. Spike around it with these little radial wires to spread the hit to the surface. Take EVERY antenna line to a proper protection device at that ground center point and then take it only inside ypur building from a below the surface line into the house. Put the radial wire grid around the outside of the NEMA ground rod. Put a solid wire ground loop at the surface around the whole house or building you wish to protect. Take any lightning rod protection to this ground loop which also has wire surface dissipation radials. In my experiece this will end your damage issues as you saw you took. Mike Luther N117C at 1:117/100 NARTE E1-02468 since 1986 -@- Maximus 3.01 Origin: BV HUB CLL(979)696-3600 (1:117/100) --> Sleep well; OS2's still awake! ;) Mike Luther Mike.Luther@ziplog.com Mike.Luther@f3001.n117.z1.fidonet.org =#= Page 4 ======================================================================= T h e F i d o G a z e t t e! Volume V Number VII June 1st 2011 ======================================================================= How We Survived a 24-hour Blackout By Janis Kracht, 1:261/38 It was 8:50 PM, EST, when the storm moved toward our little village.. Careening toward us was a storm that took the shape of a horned devil.. it's two long orange horns jutting out on either side of the storm like flames.. it's tips curled in a bit, looking to essentially cup our village if it had continued in the path the "map in motion" displayed. I figured I had a little time to see if it was going to change it's path and hit us head on.. We'd been lucky in the 12 years we've been in Windsor. It's not really a heavy-storm area, and it's certainly not often that one sees tornados here or even receives a tornado 'watch'. Even during snow/blizzard warnings for Binghamton (the nearest large city), our little village escaped the worst since we're tucked in behind some mountains, and in a little safe valley :) Violent thunderstorms had been predicted Thursday night though - Ron and I didn't like the idea at all.. we'd already lost two UPS battery backup external units in a previous storm. We knew we'd either have to take our chances with sudden power loss against our Windows and Linux systems, or take the systems down before the worst hit us. Needless to say, my hand was ready to pull the phone jack out of the modem, and swipe the power supply cord from the modem as well. I mean, there's important stuff and there's important stuff :) My USRobotics Courier had already lived through some 17+ years of nasty weather, but I wasn't going to take chances with that baby, given that any problems it developed in this stage of it's life would reduce it to a very funny looking planter or coaster. There'd be no servicing it from USRobotics, I was sure of that. If it needed to be replaced with a new modem, it would have to go on the list of "crap, we have to get one of these when there's enough money" list.. Not that they're that expensive, but right now is not a good time. Certainly I'd have to wait a month or longer, or horrors (!) reinstall the internal HSFModem in this Dell 531S system.. I'd had enough of that one months back! So I watched the weather map.. and watched the local weather stations online.. and sure enough those darned horns moved just to the right enough to engulf our village.. I could see it coming.. I pulled the plugs on the modem, but left the system going, with the telnet and binkp nodes running. By now it was 9PM, and I knew my linux bash scripts would not run the nodelist/nodediff processing until 11:45PM. Maybe I'd have time to let them run and at least get them out to the major Fidonet Stars that I meshed echomail and files with. Well, it wasn't to be.. boom.. a really nasty loud deep lightening strike hit somewhere.. and poof, our electric power was gone. No big deal we figured then.. Typically this area has an incredibly fast response time by NYSEG (New York State Electric and Gas) when the power goes out.. part of that I'm sure is the not too distant mile-wise Hotel/Resort structure from the 50/60's in Sullivan county. The borchst belt (as we called it in my youth) would never tolerate long delays in getting power reconnected (Performers back then were people like Jerry Lewis, Red Buttons, Mel Brooks, Sid Caesar, George Burns and Gracie Allen, Rodney Dangerfield, Buddy Hackett, Danny Kay, Zero Mostel and more more more)... Even closer right in this area, IBM's earlier (and still somewhat) presence assured us that whatever outages we'd get, would not be terribly long. Boy were we off with this storm :( What had hit the area were massive winds (no one is sure yet if a tornado touched down, but I'd think that if one had, we'd know by today, Tuesday, May 31st), interspersed with powerful lightening strikes across at least a 5 county area.. Over 20 miles of electrical lines were ripped from their tethers, and 36 electric poles were ripped from the ground.. several thousands of customers, we'd learn later, had lost their electrical power. Our telephones are electrical 'portable' devices, not the old regular desktop telephones.. so until we could dig up the one ancient telephone we had "somewhere", we couldn't even call the electric company to find out how bad the outage was. We lit candles around the house so we didn't trip over the dogs and cats, and mostly read as much we could in the dim light. Finally we had to give that up, so we turned on the bedroom light figuring when the power came back in an hour or so, we'd wake up and "continue" on :) Well, we slept soundly until about 7AM. Still no juice. At least in the daylight, we were able to locate that phone.. being the lazy dog I am, I simply plugged the modem line into it.. at least with the way the phone lines are layed out in the house, I could sit and call NYSEG to hear how bad it was going to be.. At this point, about 10/11 hours into the outage, was the longest ever we'd gone with out electric.. we truly kept figuring, "any moment now" haha Calls to NYSEG were met with recordings only.. First they stated briefly that the storm was very intense, the damage was heavy and people should not expect electrical service to return for at least another day. With subsequent calls, the message changed for the worst: "All NYSEG Customers should expect to be without power for 3-5 days, given the intensity of the damage from this storm" omg :) Unconnected! Unable to read the news Lol.. My NODELIST! :) Well, I figured if they'd get things together sometime that day, I could still manually kick out a nodelist with a few changes to my makenl CTL files.. Great.. In the midst of this somewhat despairing situation, the modem line, now plugged into my working telphone, rang.. It was Richard Webb, who was calling to see if weather reports he'd seen for our area had knocked out my system or modem.. I tell you, I was more than thrilled to hear from a fidonet person at this point :) :) (thanks again Richard :)) I knew Richard had other feeds for echomail, so I asked him to contact some people and put a post in Z1C for me. As the day went on, I figured it was time to salvage what I could of the fresh meat we'd bought on Thursday.. so I emptied the contents of my freezer's large ice-cube maker into a large garbage bag. I dragged down the three huge heavy stock pots from my hanging Pot Rack, and lined them with garbages that I stuffed with shopping bags. I layed one smaller garbage bag of ice across the bottom, put the meats in there, and topped them with another bag of ice, and then more garbage bags stuffed with shopping bags.. Close-fitting lids were place on top of all. For lunch we ate a lot of sausage that I figured was better cooked than not :) My gas range luckily does let me light it with a match when the elecricity is out.. I've had some that won't do that, so if this range had been like that, I'd have been out of luck. I moped around a bit.. decided it was better to read than rot in our misery so I dug up some sci-fi books I'd been in the midst of reading.. Then Ron and I played some games of backgammon (Meanie Ron beat me at 2 out of 3 games.. geez ). I made some no-bake cookies just because I could: 1/2 cup peanut butter 1 cup oatmeal 1/4 cup butter pinch salt 1 cup sugar 1/2 tsp. vanilla extract 2 Tb. cocoa powder Boil in a pan for about 3 minutes, then spoon out on to tin foil. Eat when coo. 1/2 cup raisins I figured if we could have no electric for more than another day, I needed chocolate! :) Ok, we'd given up on the power coming back 'fast'.. by now we figured it would be an eternity.. and then at around 9pm suddenly on Friday night, with a loud boom, our power came back. I didn't quite trust it.. I waited another half hour before I put my linux box back up.. then went through the routine of getting my external IO card with serial ports re-configured.. plugged my modem back in, and went on to quickly put the remaining meat in the 'fridge which hadn't been opened the whole time we'd lost power.. Amazingly the meat was still cold.. those cubes had saved us :) The next morning though, we were out again.. As Ron had figured, it would be easiest if NYSEG isolated our area, and then got us power.. Saturday morning's outage was only for a few hours, as NSEG then probably connected us to the rest of Broome County. I was a little upset, but hey.. it's held steady since :) =#= Page 5 ======================================================================= T h e F i d o G a z e t t e! Volume V Number VII June 1st 2011 ======================================================================= The Old School Toolbox By Richard Webb, 1:116/901 Email and the panopticon Most people go under the assumption that their email is private. They assume, often quite wrongly that nobody else can/will access their communications with others. They discuss the most intimate details of their lives with family and friends. Unless they work somewhere that requires them to use encryption and other safeguards they just operate under the assumption that their private email is just that. I prefer methods of exchanging email which immediately retrieve any mail for me from the server on which it resides, then deletes it. Once that information is within my custody, within my home or office it's mine. Others have no right to view it or in any other way manipulate/handle it in any way without a warrant signed by a judge at that point. Chances are pretty darned good it contains nothing of a criminal nature, but it's communication to/from me to other parties, and scrutiny, whether that be by marketing consultant or cop is unwelcome. You want to see it, get that warrant, signed by that judge, then enter my domicile or office. I also take my responsibility as a router of traffic seriously. I recall back in the days when the great Fidonet debate on encryption was occurring legal experts told SysOps that if you do not view private mail other than what's necessary to ensure technical compliance, or preferably not view it at all then you're in the position of common carrier. That's the position I take regarding netmail to/from other systems not destined to me personally. Netmail to/from any other users of my system is moved from my primary netmail area to a secondary area, which I do not view. I encourage users to utilize netmail if they wish, and delete any received messages. Yet being a pots only system I'm not overwhelmed with users, and that's fine too. Still, netmail passing through is just that, passing through. Any logging of it is headers which are kept for statistical analysis, and other than statistical analysis sent to downlinks not utilized for anything else. Yes I see some of this analysis product too, but then it tells me which downlink received and/or sent how many pieces of netmail over the period. Who it was to/from and what it contained is no business of mine. I may look at the header logs with the intention of solving any problems in the handling of mail, but reliability and technical compliance are the goal. But, then for those of us in the U.S, there's been that little problem with your email and the fourth amendment to the constitution. All somebody need do was show up at your internet service provider's server farm or office, shake somebody's hand and ask nicely to view the contents of your email. The courts did not recognize the usual fourth amendment protections. However, in December of last year a judge ruled differently. If those rulings stand in higher courts that gives you protection from the man with the badge and official bona fides, but, it does nothing to protect you from the unscrupulous types who would utilize your information for other nefarious purposes. Recently, in a couple of echoes we've had discussion of spammers accessing gmail accounts by hacking passwords of users to then send spam to everybody in that user's contact list. Hotmail users have seen the same sort of activity recently. I've told every associate of mine who uses gmail or hotmail to remove my addresses from their contact lists using those services. So, how do you protect yourself and still use them? First, if the email service you intend to use doesn't offer pop3 and capability, just say no. If the service offers regular pop3 and SMTP access you can then use your favorite email application, and store your address book information on your local system. Put it out there in the "cloud" and it's no longer secure. Protect your data. Would you allow somebody to just waltz into your home or office and start rummaging through your desk drawers? I'd sure hope not. So treat the net in the same way. Insist on utilizing services that allow you to maintain total control of your information. In most reasonably free societies a fundamental "right" is the right to be let alone. This is the one right which is quickly being eroded, not just by governments, but by commercial interests that make money from selling data. Who shops at Target? Who's got a fatal disease, or doesn't have? Who doesn't have, but might be interested in ... Many think the solution lies in more laws. But, laws have loopholes, deliberately created exemptions, etc. That still leaves the ultimate responsibility with the user. I'll talk more about that next month in the final installment in this series. =#= Page 6 ======================================================================= T h e F i d o G a z e t t e! Volume V Number VII June 1st 2011 ======================================================================= -=-=-=-=-=- F O O D Even sysops have to eat! -=-=-=-=-=- Want to contribute something here? Send recipes, articles, reviews etc. to janis@filegate.net, or fidogazette@filegate.net. This issue, we have two recipes submitted by Sean Dennis: Lasagne Cupcakes MM'd by Sean Dennis, 1:18/200 I was browsing the Web a few days ago when I stumbled upon this interesting recipe. It's called "Lasagna Cupcakes" and while I haven't made this yet, this might be a good appetizer or a kid's meal. MMMMM----- Recipe via Meal-Master (tm) v8.06 Title: Lasagna Cupcakes Categories: Main dish, Appetizers, Italian, Seandennis Yield: 6 Cupcakes 1 c Marinara sauce 3/4 lb Ground beef 12 Wonton wrappers 8 oz Shredded mozzarella 3 oz Parmesan cheese 4 oz Ricotta cheese Basil for garnish (optional) Preheat oven to 375 degrees F. Spray muffin tin with cooking spray. Brown beef and season with salt and pepper. Drain. Cut wonton wrappers into circle shapes using a biscuit cutter or using the top of a drinking glass. You can cut several at a time. Reserve 6 tablespoons of Parmaesan cheese and 6 tablespoons of mozzarella for the top of your cupcakes. Start layering your lasagna cupcakes. Begin with a wonton wrapper and press it into the bottom of each muffin tin. Sprinkle a little Parmaesan cheese, Ricotta cheese and mozzarella cheese on the wrapper. Top with a little meat sauce and marinara sauce. Use around 1-2 teaspoons of all of the ingredients on each wrapper depending on your personal preference. Repeat layers ending in marinara sauce. Top with reserved Parmaesan and mozzarella cheese. Bake for 18-20 minutes or until edges are brown. Remove from oven and let cool for 5 minutes. To remove, use a knife to loosen the edges then pop each lasagna out. Garnish with basil and serve. From: http://quick-dish.tablespoon.com/2011/03/31/lasagna-cupcakes MM'd by Sean Dennis on 17 May 2011. MMMMM Low-Cal Macaroni Bake By Sean Dennis, 1:18/200 If you're looking for a simple, satisfying dish for dinner, this macaroni bake is good. I've made this myself but left out the dill weed and parsley. This dish is easy to prepare and even easier to eat! MMMMM----- Recipe via Meal-Master (tm) v8.06 Title: Macaroni Bake, Low cal Categories: Main dish, Low-cal Yield: 5 servings 2 c Macaroni, cooked 1 Onion, chopped 2 tb Margarine 1/4 c Flour 2 c Skimmed milk 2 ts Dill weed 2 ts Parsley 1/8 ts Garlic powder 1/2 ts Pepper 2 c Low fat cottage cheese 1/3 c Bread crumbs 1 pn Paprika Preheat oven 350F. Saute onions in margarine, add flour. Stir in milk, little at a time until thick. Add spices. Add cheese. Add macaroni. Pour into shallow pan. Top with crumbs and paprika. Bake 45 minutes. MMMMM ==#== Page 7 ======================================================================= T h e F i d o G a z e t t e! Volume V Number VII June 1st 2011 ======================================================================= Configuring a Networked Printer with Win7 and An Older Computer Via Your LAN Sean Dennis Today, I decided to set up my old, but very reliable, Panasonic KX-P2624 (24-pin, 136-column) dot-matrix printer on my BBS machine, which was rather easy under OS/2 since there is a driver for the printer. I then wanted to share the printer with my 32-bit Windows 7 Enterprise box that I use personally via my LAN. That is when I discovered setting up an older networked printer was a whole different kettle of fish on Windows 7 than with Windows XP. At first, I tried the usual network setup, but oddly enough, as soon as I clicked "OK" to have Windows set up a printer, Windows spat out a rather cryptic error: Cannot connect to printer error 0x0000086 That certainly wasn't the result I was hoping for. I started looking around Google using the numeric error above for searching. I discovered two things: first, Panasonic said to use Windows 7's "EPSON LQ Series 1(136) INBOX Driver" for my printer. This printer can emulate an Epson LQ or an IBM ProPrinter. Second result I found: in order for this to work, I had to go into Control Panel, select "Add A Printer", then create a "Local Port" using the printer's UNC (Universal Naming Convention)* address. That would look like "\\computername\sharename" (no quotes) if you were going to type it in. So I did that and selected the driver that Panasonic recommended. The computer whirred away as it was doing its thing and then I saw the "print a test page" screen pop up. Things were going well so far. I clicked on "Print test page" and to my surprise, the printer fired up and printed out a Windows test page. I wasn't too pleased with the rotten-looking printout, but hey, I'm just using this printer to dump code out on and print out text documents. After some more research, I discovered that using the "Local Port" option is the preferred method to connect a printer to Windows 7 that is physically connected to another computer running an older version of Windows (or OS/2 in my case). I hope this will help someone else that might be attempting to do the same thing with an older printer. My Panasonic printer might be old, but it works great and is very cheap to use since you can find ribbons very cheap online. * = For more information about UNC, check out this webpage: http://compnetworking.about.com/od/windowsnetworking/g/unc-name.htm Page 8 ======================================================================= T h e F i d o G a z e t t e! Volume V Number VII June 1st 2011 ======================================================================= 10 Things You Can Do to Pop Off the Filter Bubble by Janis Kracht, 1:261/38 In the Fidogazette echo, I recently posted portions of Eli Pariser's Q&A column regarding his new book, _The Filter Bubble_ You can see the entire Q%26A file here: (wraps) http://www.amazon.com/Filter-Bubble-What-Internet-Hiding/ dp/1594203008/ref=sr_1_1?ie=UTF8%26qid=1305553500%26sr=8-1 PLEASE go to http://www.thefilterbubble.com and listen to Eli Pariser's speech at the TED confernence! Then read through Eli's 10 Things You Can Do list below. If you go to the site , you can find any links referenced in this text. http://www.thefilterbubble.com/10-things-you-can-do From Eli Pariser's blog === 10 Things You Can Do === By Eli Pariser So you want to pop your filter bubble — to see the neutral, un-filtered, un-personalized web. How do you go about it? Unfortunately, there are no magic bullets: The ad companies and personal data vendors that power and profit from personalization are far more technologically advanced than most of the tools for controlling your personal data. That's why The Filter Bubble calls on companies and governments to change the rules they operate by - without those changes, it's simply not possible to escape targeting and personalization entirely. But that doesn't mean all is lost. Here are 10 simple steps you can take to de-personalize your web experience. They won't work forever, but for now they'll take you out of your own personal echo chamber. 1. Burn your cookies. Cookies are one of the easiest ways for companies to track you from site to site. When you visit a site that uses cookies (almost all of them do these days), the site stores identifying data on your computer. With permission, other sites can then access that data and use it to change what you see. So if you want to see outside the filter bubble, erase your cookies regularly (Google provides helpful instructions here) - and disable the "tracking cookies" that are a common way for ad networks to learn about you: In Chrome, go to Preferences > Under the Hood > Content Settings (You can also see all the cookies on your machine here.) Firefox: Preferences > Privacy > Use custom settings for history Safari: Preferences > Security Internet Explorer: Internet options > Privacy 2. Erase your web history. Those who remember their web history are doomed to repeat it. Much of Google's search personalization (though not all) is powered by your web history - the list of sites you've visited via Google. By default, if you're logged in Google tracks this for you, compiling a list that can be years long. To remove this data store: Go to the Google homepage Click your username in top right and go to "Account settings" Click "edit" next to the "My Products" header Click "Remove Web History Permanently" 3. Tell Facebook to keep your data private. More than any other company, Facebook has made a massive amount of previously private data public. On a number of occasions, the company has changed data settings so that what was once private is now public (for example, the pages you Like were private but are now mandatorily public). And while these changes aren't clear to users, they make it possible for companies like Rapleaf to build and sell profiles of you to whomever they want. So, the primary thing to remember is: Never tell Facebook anything you don't want the whole Web (and world) to know about you. To add additional protections, set your Facebook privacy settings all the way up. (Facebook explains how to do that here.) If you're logged into Facebook, it may also transmit information about you to other websites - you can turn off Instant Personalization by following the steps here. 4. It's your birthday, and you can hide it if you want to. One of the biggest challenges for personal data vendors like Experian, Acxiom, and Rapleaf is figuring out who is who. Say you've got the list of John Smith's Facebook Likes, and you want to match that with, say, his voting records. How do you go about it, given that there are thousands of John Smiths out there? As it turns out, one of the most common "keys" for identifying particular people is your birthday. The number of John Smiths who share your birthday is far smaller - often there's just one. So, keep your birthday to yourself when you can. Take it off your Facebook profile - or even just take off the year, which makes it much less useful. Revealing it rarely results in better services, but for data miners, it's gold. (By the same token, always using "firstnamelastname" as a username also makes it easy for companies to match data about you from many different websites. Plus, it's way less fun than something like "Dragonmachine38") 5. Turn off targeted ads, and tell the stalking sneakers to buzz off. If you'd rather not be followed around the internet by merchandise you're vaguely interested in, the major ad networks offer a relatively easy opt-out. You can quickly alert many of them in one place here (this is a voluntary restriction, so undoubtedly there are other ad networks that don't abide by these rules.) You can also turn this off in your browser: Install Google's 'Keep My Opt-Outs' extension for Chrome Enable IE9's 'Tracking Protection' option Enable Firefox's 'Do Not Track' option Safari's 'Tracking Protection' will be released this summer 6. Go incognito. This one's easy: most recent browsers have a "private browsing" or "incognito" mode that turns off history tracking, hides your cookies (and deletes the new ones when you close the window), and logs you out from sites like Google and Facebook. By opening a page in this mode, you can more easily see how different your cookie-driven personalized version is. There's a catch, though: Since many companies (including Google) use data that doesn't live on your computer to personalize, you may see different sites than a friend even in incognito mode. 7. Or better yet, go anonymous. Sites like Torproject.org and Anonymizer.com allow you to run all of your browser traffic through their servers, effectively removing some of the signals that come through when you're in incognito mode. 8. Depersonalize your browser. If you're using one of those sites, you've turned off your cookies, and you're in incognito mode, there's no way that anyone could tell who you are, right? Not so fast. As it turns out, every request to download a web page reveals a lot about how your computer is configured - and many of those configurations are unique. The Electronic Frontier Foundation (EFF) makes it easy to see how unique your settings are here. And they give some good guidelines on how to make your settings harder to track here. 9. Tell Google and Facebook to make it easier to see and control your filters. While both companies provide nominal tools to access your personal information and manipulate your filters, they mostly fall far short of actually useful. This is partly because many of the engineers we've talked to don't believe that this is something people really care about. You can let them know by getting in touch here: Google: http://www.google.com/publicpolicy/feedback.html Facebook: http://www.facebook.com/help/?topic=suggestions 10. Tell Congress you care. Lobbyists for the big personalizers and data vendors are telling Congress the same thing: consumers don't really care about this stuff, and it's not worth seriously regulating. Your letter to your Senator or Representative can help counteract this trend and demonstrate that we are paying attention and want action. Write Congress here: House: https//writerep.house.gov/writerep/welcome.shtml Senate: http://www.senate.gov/general/contact_information/senators_cfm.cfm =#= Page 9 ======================================================================= T h e F i d o G a z e t t e! Volume V Number VII June 1st 2011 ======================================================================= Region 13 Coordinator Election - Time to vote Michael Luko, 1:266/512 In early May I posted in the R13_Election echo, my background information and plans that I will carry out if re-elected to the Region 13 Coordinator position. I hope you have had a chance to read it. If not you can find a copy of that information below. If you agree with my plans to promote growth to region 13 just I have done in the past now is the time to support me by your vote. You heard right! Every system node operator in region 13 has an opportunity to cast a vote and participate in the Region 13 coordinator election. The voting period runs from Friday, 6-03-11, and ends on 6-9-11 at 11:59pm. You can support me by netmailing your vote addressed to Robert Wolfe@1:13/2. Your netmail should include your name, node number, password of your choice for confirmation and to remain anonymous in the vote tally, and your vote for Michael Luko. Example: To: Robert Wolfe@1:13/2 Subject: Regional Coordinator Election Vote Body: System Operator: (your name) Node Number: (your node number) Password: (password of your choice) Vote: Michael Luko If you have any question regarding my background, plans or the voting process itself just give me a yell. Thank you once again for your time and now for your vote of support. ====> Michael Luko <==== Sysop, Christian Fellowship BBS (856) 933-7096 Telnet: cfbbs.dtdns.net or cfbbs.no-ip.com Netmail: Michael Luko@1:266/512 Email: Michael.Luko@verizon.net ------------------------------------------------------------ Personal Info: Name: Michael Luko Sysop, Christian Fellowship 1:266/512 Net Coordinator - Net266 Regional Coordinator - Region 13 Age: 42 Email: Michael.Luko@verizon.net Background: Been a member BBS in fidonet since April of 1997. Took over as NC for Net 266 June of 2005. Cleaned up Net 266's node list segment. Assisted with the regionalization process in 2006. Expanded Net 266 to include all of New Jersey and Delaware. Currently serve and perform duties as RC13. Function as a regional POTS netmail gate for systems that need it. Provide echomail feeds for those who need a feed. Help new sysops with getting their system setup and promote growth. Duties to continue to perform if re-elected as RC13: 1. Provide NC's with any help the may need or request. 2. Let NC's handle their network matters unless asked to become involved. 3. Promote growth to the region by directing potential BBSs to their Networks within our region. 4. Provide Fido Nodelist's Nodediff's and Fidonews to any node that request it. 5. Maintain the Independent node list segment and process Network segments, sending the regions segment to the Zone Coordinator. 6. Ensure smooth operation of the region and the networks that make up the region as per policy 4. 7. Act as Temporary NC for a network that is without one, and rise up a suitable NC from within that network. 8. Provide Netmail routing for the region. 9. Maintain contact with NC's within the region and the ZC1. 10. Webmaster and host the Region 13 website. 11. Appoint and support the election coordinator. 12. Perform all other specific RC duties policy4 mandates. 13. Poll region for FTSC feedback votes and cast an official vote representing the region during the FTSC Elections. 14. Will abide by the terms and conditions of approved regional policy, so that it can be maintained in perpetuity for the benefit of the members of the region as stated in section 6 in the R13 election policy. Action Plan: 1. Seek out NC's for net 129 and 261 even if from a new member bbs with proper teaching and coaching on my part. Net 261 is in the works. 2. Seek out BBSes that are with in our region and invite them to be part of fidonet and link them up with the NC that covers their location. 3. Continue to maintain and update the Region 13 website with the current nodelist, nodediff, fidonews and gazette. =#= Page 10 ======================================================================= T h e F i d o G a z e t t e! Volume V Number VII June 1st 2011 ======================================================================= BBS Software List Updated 4 March 2011 Maintained by Sean Dennis (1:18/200) Editors Emeritus: Robert Couture, Janis Kracht M=Mailer T=Tosser B=BBS D=Door C=Comm/Terminal P=Points E=Editor I=Internet U=Utility #=Info F=TIC/SRIF Processor *=Software is available and may be registerable, but no longer supported or updated. @=Website is operating but is no longer updated. ?=Software's updating/support status is unknown. O=Software is open source. This list contains BBS-related software that is available for registration (not necessarily supported), open source software and actively developed/supported software by its author. Software listed may be available for DOS, Linux, OS/2 (eComStation), Windows (16 or 32 bit) and OSX. .- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -. |Software: Author |Type |URL, Contact, Ver, Notes Help Node| `- - - - - - - - - - -+- - -+- - - - - - - - - - - - - - - - - - - -' ==> FRONT-END/INTERNET MAILERS Argus |MI*? |http://www.ritlabs.com/en/products/argus/ | | v3.210 on Mar 29 2001 BinkleyTerm XE |MO* |http://btxe.sourceforge.net | | 2.60XE Beta-XH7 on Oct 22 2000 BinkD |MI? |http://2f.ru/binkd/ | | maloff@corbina.net | | v0.94 on Jul 24 2000 (Outdated) | |http://www.filegate.net/r50/aftnbinkd/ D'Bridge |MTCPE|http://www.nickandre.com 1:1/130 |I | v3.59 on March 4 2011 FIDO-Deluxe IP |MPUI |http://www.fido-deluxe.de.vu 2:2432/280 Michael Haase | | m.haase@gmx.net | | v2.4 on Sep 26 2003 FrontDoor, FD/APX: |MITPC|http://www.defsol.se 2:201/330 Definite Solutions |? | sales@defsol.se | | v2.26SW %26 v2.33ml FD, v1.15 APX Husky Project |MTPUI|http://husky.sourceforge.net/ |O? | v1.9 RC2 on Apr 20 2010 Taurus |MI |http://www.fidotel.com/public/forums/ (based on Radius) |? | taurus/index.htm | | v5.0 Jun 12 2006 | | T-Mail |MI |http://www.tmail.spb.ru (Russian only) |? | v2608 on Dec 12 2001 +- - - - - - - - - - -+- - -+- - - - - - - - - - - - - - - - - - - -+ ==> MAIL TOSSERS Crashmail II |TO |http://ftnapps.sourceforge.net/ | | FastEcho |T |http://www.softeq.de/Products/FastEcho/ | | fastecho.html | | v1.46.1 on 13 Nov 2007 | | Registration keys are free and available | | by request from the author Fidogate |TUI? |http://www.fidogate.org | | v4.4.10 on Aug 27 2004 | | FMail |TO*? |http://fmail.sourceforge.net/ | | v1.60 on Mar 8 2008 | | Source code only! Squish |T* |http://www.filegate.net/maximus_bbs/ | | v1.11R2 on Jan 1 2009 | | Source code available in the Maximus BBS | | archive: http://maximus.sourceforge.net +- - - - - - - - - - -+- - -+- - - - - - - - - - - - - - - - - - - -+ ==> BBS SOFTWARE BBBS |BICTM|http://www.bbbs.net 2:22/222 | | b@bbbs.net | | v4.01 on January 28 2007 EleBBS |BO*? |http://www.elebbs.com | | v0.10.RC1 on Jun 9 2002 Enthral BBS |B |http://enthralbbs.com 1:250/501 Linux/BSD/OSX | | v0.429/Alpha on 14 October 2010 | | Fidonet filebone SCENEENT Ezycom BBS |BT |http://www.ezycom-bbs.com 3:690/682 | | v2.15g2 on Nov 16 2009 GT Power |B |http://www.gtpowerbbs.com/ | | v19.00 Hermes II Project |BT |http://www.hermesbbs.com/ Macintosh-based | | malyn@strangegizmo.com | | v3.5.10b3 Maximus BBS |BO* |http://www.filegate.net/maximus_bbs/ | | v3.03 | | Source code available at: | | http://maximus.sourceforge.net/ MBSE BBS |BIO? |http://mbse.sourceforge.net 2:280/2802 | | mbroek@users.sourceforge.net | | v0.92.0 on Oct 16 2007 Meltdown BBS |UIO |http://meltdown-bbs.sourceforge.net/ | | v1.0b on Apr 26 2004 Mystic BBS |BO* |http://www.mysticbbs.com | | v1.07.3 on May 13th 2001 RemoteAccess BBS |B? |http://www.rapro.com 1:1/120 | | bfmorse@rapro.com | | v2.62.2SW Renegade BBS |B |http://renegadebbs.info 1:129/305 | | v1.10/DOS on 3 Oct 2009 Spitfire BBS |B? |http://www.buffalocrk.com/ | | mdwoltz@buffalocrk.com | | v3.6 on Aug 20 1999 Synchronet BBS |BTIO |http://www.synchro.net 1:103/705 | | v3.16 on 31 Dec 2006 Telegard BBS |B* |http://www.telegard.net | | v3.09g2-sp4/mL on Dec 19 1999 WildCat! Interactive |MTBEI|http://www.santronics.com Net Server, Platinum| | sales@santronics.com Xpress: Santronics | | Software, Inc. | | +- - - - - - - - - - -+- - -+- - - - - - - - - - - - - - - - - - - -+ ==> TIC PROCESSORS/FILEFIX/SRIF Allfix |FIUT |http://www.allfix.com/ 1:140/12 Bob Seaborn | | v6.0.22 on 26 January 2011 NEF/pk |F |http://nefpk.8m.com/ | | v2.45b2 on 5 March 2000 TinyTIC |FO |http://ftnapps.sourceforge.net/ | | 1:120/544 VIReq |FO |http://ftnapps.sourceforge.net/ | | 1:120/544 +- - - - - - - - - - -+- - -+- - - - - - - - - - - - - - - - - - - -+ ==> BBS DOORS/UTILITIES Cheepware |DU |http://kd5col.info/cheepware.html Sean Dennis | | sdennis72@gmail.com 1:18/200 | | Fidonet filebone CH-WARE DDS (Doorware |D@ |http://www.doorgames.org Distribution System)| | ruth@doorgames.org Ruth Argust | | Jibben Software |D* |http://www.jibbensoftware.com/ | | bbs-door-games.cfm | | scott@jibben.com | | 1995-99 Release dates John Dailey Software |DU? |http://www.johndaileysoftware.com Shining Star |D* |http://www.shiningstar.net/bbsdoors/ | | nannette@shiningstar.net | | Doors are still registerable via website Sunrise Doors: |D |http://www.sunrisedoors.com Al Lawrence | | al@sunrisedoors.com | | Tel: (404) 256-9518 T1ny's Software |DU |http://www.tinysbbs.com/files/tsoft/ Shawn Highfield | | shighfield@gmail.com 1:229/452 | | Fidonet filebone CH-WARE The Brainex System |D |http://www.brainex.com/brainex_system/ | | stanley@brainex.com | | 1994-99 Releases Trade Wars |D* |http://www.eisonline.com/tradewars/ | | jpritch@eisonline.com | | v3.09 (DOS-32) in 2002 Vagabond Software |DU* |http://http://vbsoft.dhakota.org | | d@dhakota.org | | Last update: Apr 11 2008 +- - - - - - - - - - -+- - -+- - - - - - - - - - - - - - - - - - - -+ ==> POINT SOFTWARE CrossPoint (XP) |P? |http://www.crosspoint.de (German only) | | pm@crosspoint.de | | v3.12d on Dec 22 1999 FreeXP |P |http://www.freexp.de (German only) | | support@freexp.de | | v3.42 on Jun 27 2010 +- - - - - - - - - - -+- - -+- - - - - - - - - - - - - - - - - - - -+ ==> SYSOP MAIL EDITORS GoldEd+ |EO*? |http://golded-plus.sourceforge.net/ | | v1.1.5 (Snapshot) on Apr 29 2010 | | NOTE: Unstable versions released often SqEd32 |E |http://www.sqed.de 2:2476/493 | | v1.15 on Dec 15 1999 | | Website is in German and English +- - - - - - - - - - -+- - -+- - - - - - - - - - - - - - - - - - - -+ ==> INTERNET UTILITIES JamNNTPd |UIO |http://ftnapps.sourceforge.net/ | | 1:120/544 Internet Rex |UI? |http://members.shaw.ca/InternetRex/ | | telnet://xanadubbs.ca 1:342/806 | | v2.29 on Oct 21st 2001 TransNet |UIO? |http://www-personal.umich.edu/~mressl/ | | transnet/index.html | | transnet@ressl.com.ar | | v2.11 on Sep 13 2007 Ifmail |UIO |http://ifmail.sourceforge.net | | crosser@average.org MakeNL |UO |http://www.filegate.net/coordutl/ | | v3.2.9 on Feb 1 2010 +- - - - - - - - - - -+- - -+- - - - - - - - - - - - - - - - - - - -+ ==> INFORMATIONAL WEBSITES/BBS LISTS Telnet/Dialup BBS |# |http://www.telnetbbsguide.com 1:275/89 Guide | | Maintained by Dave Perrussel | | This is probably the most updated BBS | | list on the Internet for a general | | BBS list. Synchronet BBS List |# |http://www.synchro.net/sbbslist.html | | Maintained automatically | | This list is specifically for | | Synchronet-based BBS systems and is | | automatically updated nightly. The BBS Corner |# |http://www.bbscorner.com | | This website is more than just files, | | it's an encyclopedia of knowledge for | | BBS sysops and people who want to | | become sysops. This site is run by | | the same person who does the Telnet | | BBS Guide. +- - - - - - - - - - -+- - -+- - - - - - - - - - - - - - - - - - - -+ File Archives: http://archives.thebbs.org http://sysopscorner.thebbs.org (site is no longer maintained) http://www.simtel.net http://www.bbsfiles.com http://hobbes.nmsu.edu (OS/2 specific) http://www.filegate.net/ (FTP access via port 60721) http://www.tinysbbs.com/files/ Note: Most also provide FTP access (use ftp instead of http above) The BBS Software List is published monthly in the FidoGazette. If you have corrections, suggestions or additions to the information above, please contact Sean Dennis with your information via the FIDOGAZETTE echo, netmail at 1:18/200 or email at sean@kd5col.info. Page 11 ======================================================================= T h e F i d o G a z e t t e! Volume V Number VII June 1st 2011 ======================================================================= =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= !!! G A Z E T T E B B S L I S T !!! =-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-==-=-=-=-=-=-=-= By bbslist @ filegate.net Send updates, changes to address above or to janis @ filegate.net. System.......Capitol City Online FidoAddress..1:2320/105 Phone........502-875-8938 Software.....GT Power OS...........OS/2 C/B Verify...None Access.......First Call access to most of BBS upon finishing new user questionnaire Telnet.......cco.ath.cx telnet access to GT Power BBS - same as dial-up www:.........http://cco.ath.cx This site runs Synchronet under linux. Requires separate user registration. Has same message areas as dial-up/telnet bbs. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= System.......Christian Fellowship FidoAddress..1:266/512 Phone........1-856-933-7096 Software.....PCBoard 15.3 OS...........Windows XP pro C/B Verify...Manually via email or voice usually within 24 hours. Access.......Read only until verified. Once verified write access to Msg bases, file areas, chat and doors/games. Telnet.......cfbbs.dtdns.net or cfbbs.no-ip.com =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= System.......Lightning BBS FidoAddress..1:311/2 Software.....Virtual Advanced OS...........Windows XP C/B Verify...None Access.......First call access to doors, files and message reading. Message posting requires validation. Telnet.......lightningbbs.com www:.........http:/www.lightningbbs.com/index.php Thanks to VADV-PHP you can access almost everything the BBS has to offer from the web, with the exception of door games. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= System.......Lionsden BBS FidoAddress..1:224/303 Phone........613-392-8896 oftware.....Sunchronet OS...........Windows XP C/B Verify...None Access.......First Call access to Msg bases, and file areas. Telnet.......lionsden.darktech.org telnet access offers full features of the standard bbs such as doors, qwkmail, Files, etc. www:.........http:/www.lionsden.darktech.org You will redirected to a menu where you can choose one of three sites. The first one is private and requires PW to get into. FTP..........FTP://lionsden.darktech.org Files only =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= System.......Paragon BBS FidoAddress..1:18/200 Phone........423-434-0851 Software.....Telegard/2 v3.09.g2-sp4/mL OS...........OS/2 Warp 4.52 C/B Verify...None Access.......Partial access on full call; manual verification for full access Telnet.......paragon.darktech.org, kd5col.info/goto.html www:.........http://kd5col.info =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= System.......Prism BBS FidoAddress..1:261/38 Phone........607-655-5652 Software.....BBBS/Li6 v4.10 Dada-1 OS...........Linux (Ubuntu) C/B Verify...None Access.......First Call access to Msg bases, file areas, all features of the BBS. Telnet.......filegate.net telnet access offers full features of the standard bbs such as doors, qwkmail, BWmail,Files, chat, group chat, etc. www:.........http:/www.filegate.net:8080/bbbs web interface is limited to reading messages and replying online, or downloading messages in qwk packets, but not uploading them, file download access, guest account. FTP: filegate.net, port 60721. public access to file areas (please note change of port for public access). =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= System.......Roach Guts BBS FidoAddress..1:396/60 Phone:.......337-433-4135 Software.....Maximus on Port 23 (primary) Synchronet on Port 24 (temporary) OS...........Windows XP C/B Verify...None Access.......First call access to doors, files and message reading. Message posting requires validation. Telnet.......roachguts.com =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= System.......Time Warp of the Future BBS FidoAddress..1:14/400 Phone........none Software.....sbbs 3.15a (very beta) OS...........win. (xp pro. sp3) C/B Verify...None Access.......First Call access to Msg bases, and file areas. Telnet.......time.synchro.net:24 or time.darktech.org:24 or timewarpfuture.dyndns.org:24 telnet access offers full features of the standard bbs such as doors, messages or file area etc. www:.........http://time.synchro.net:81 Web interface is limited really to reading messages and replying online, or downloading messages in qwk packets, but not uploading them, and file download access. SBBS files available. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Page 12 ======================================================================= T h e F i d o G a z e t t e! Volume V Number VII June 1st 2011 ======================================================================= INFO: Fidogazette is published by Janis Kracht, Editor, with the help of Richard Webb 1:116/901 (Old School ToolBox), and Sean Dennis 1:18/200 (The Slightly Crusty Sysop). If you have an idea for a column or a series of articles, please contact me :) New! MailingList subsriptions via www.filegate.net // lists / ?p=subscribe but of course you can always link into your uplink and use Tick or a tick compatible program. Where to Send Your Articles Unlike most editors, I surely do not mind running my mouth when there is a sparcity of articles for the 'zine. I'd MUCH rather you sent in material... lacking that, I will fill these issues with my meanderings and thoughts and hopefully we will grow into something of consequence here :) Write an article! If you WOULD like to submit an article, feel free to drop your article off at: Email attach to address: janis @ filegate.net Fidonet attach: Janis Kracht at 1:261/38 Modem: 607-655-5652 1:261/100 filegate.net port 24555 via binkp or telnet mailer (If you are using routed fidonet mail, don't send articles as routed attaches. They will fail somewhere along the path before getting here. Send them instead direct to filegate.net). Standard binkp port only supports BinkP (24554). Give it a title, sign your name and network address if you have one and send it along! Don't worry about the format, I can take anything you send me and mutilate it further as you can see above. Linux is nice that way (g). Spell checking your own work will help though (something I'm typically guilty of (g)). To send reviews or recipes to the Food section, email or netmail Janis as above. Email address for submissions to Dr.Debug: To send a question to Dr. Debug, email a question to: drdebug @ filegate.net or post in the fidogazette echo! :) To send a listing to the FidoGazette bbslist, email your listing to: bbslist @ filegate.net or post it in the fidogazette echo! Page 13 Published with MakeNews by Janis Kracht