The Online World by Odd De Presno

chapter 16 for more about this.

1844 words  |  Chapter 58

The more advanced your software is, the more time it will take to learn how to use it. The rewards are lower telephone costs, faster transfers, and less time spent doing technical online work. Recommended. Different needs, different solutions ------------------------------------ Frank Burns of the American online service MetaNet is spokesperson for the strategy SCAN - FOCUS - ACT. On your first visits to a new online service, you SCAN. The goal is to get an overview of what is being offered and find out how to use it most efficiently. Notes are made of interesting bulletins, databases, conferences, messages, news services, public domain and shareware programs, games, and more. Capture all of it to disk. Don't study it until disconnected from the service. Evaluate the material to prepare for your next moves: FOCUS and ACT. As you learn about offerings, users and applications, your use of the service changes. What was interesting on your first visits, lose out to new discoveries. Some applications may stay as 'regular online functions', like when you decide to read a given news report on Monday mornings. Here are some other hints: * Find out what you do NOT have to know and have enough self- confidence immediately to discard irrelevant material. Walk quickly through the information. Select what you need now, store other interesting items on your hard disk, clip references, and drop the remainder of your capture file. * Learn when and how to use people, computers, libraries and other resources. Prepare well before going online. Note that the online resource may not necessarily be the quickest way to the goal. If you want the name of Michael Jackson's latest album, you may get a faster answer by calling a local music shop. . . . * Make an outline of how to search the service before going online. If required, start by going online to collect help menus and lists of search commands (unless you already have the printed user information manual). Study the instructions carefully, plan your visit, and then call back. Often, it may be useful to do trial searches in online data, which you have previously captured to your hard disk. Do this to check if your use of search words is sensible. Who knows, you may even have what you are searching for right there. Besides, it is imperative that you use the correct search terms to find what you're looking for. Write your search strategy on a piece of paper. If you know how to write macros for your communications program, consider writing some for your planned search commands. - Few people can type 240 characters per second. Using macros may save you time, frustration and money. * It may be wise to do your search in two steps. On your first visit: Get a LIST of selected headlines or references, and then log off the service. Study your finds, and plan the next step. Then call back to get full-text of the most promising stories. This strategy is often better than just 'hanging online' while thinking. When you feel the pressure of the taximeter, it is easy to make costly mistakes. * Novices should always go the easiest way. Don't be shy. Ask SOS Assistance services for help, if available. Invest in special communication programs with built in automatic online searching features. They are designed to make your work easier. * Limit your search and avoid general and broad search terms. It is often wise to start with a search word that is so 'narrow' that it is unlikely to find articles outside your area of interest. Your goal is not to find many stories. You want the right ones. When everything fails --------------------- Data communications is simple - when you master it. Occasionally, however, you WILL lose data. You may even experience the worst of all: losing unread private email on your hard disk. A while ago, this happened to a friend. She logged on to her mailbox service using the communications program Procomm. After capturing all her mail, she tried to send a message. For some reason, the computer just froze. It was impossible to close the capture file. She had to switch the power OFF/ON to continue. All retrieved mail was obviously lost. The other day, I had a similar experience. After having written a long and difficult letter, something went wrong. The outfile was inexplicably closed. The resulting file size was 0 bytes. Both problems were solved by the MS-DOS program CHKDSK run with the /F option. If you ever get this problem, and have an MS-DOS computer, try it. It may save your day. Copyright notices and legal stuff --------------------------------- Most commercial online services protect their offerings with copyright notices. This is especially so for database information and news. Some vendors make you accept in writing not to store captured data on a local media (like diskettes or hard disks). Others (like Prodigy in the U.S.) force clients to use communication software that makes it impossible to store incoming data to disk. The reason is simple. Information providers want to protect their income. In most countries, you can quote from what others have written. You can cut pieces out of a whole and use in your own writing. What you cannot do, however, is copy news raw to resell to others. If an online service discovers you doing that, expect a law suit. Read copyright notices to learn about the limitations on your usage of data that you receive. Unwritten laws about personal conduct ------------------------------------- Some services let their users be anonymous. This is the case on many chat services. If you want to pose as Donald Duck or Jack the Ripper, just do that. Many free BBS systems let you register for full access to the service during your first visit. It is possible to use any name. Don't do that. Use your true name, unless asked to do otherwise. It's impolite and unrespectful of the other members to participate in online discussions using a false identity. Being helpful is an important aspect of the online world. The people you meet 'there' use of their time to help you and others. Often free. The atmosphere is one of gratitude, and a positive attitude toward all members. If you use rude words in public, expect your mailbox to fill with angry messages from others. Those who respond carefully to personal attacks, will never regret it. Don't say things online that you would not have said in person. REMEMBER: Words written in a moment of anger or frustration can be stored on at least one hard disk. Your 'sins' may stay there for a long time - to resurface when you least want it to. Here are some guidelines (often called 'online netiquette'): * If mail to a person doesn't make it through, avoid posting the message to a conference. Keep private messages private. * It is considered extremely bad taste to post private mail from someone else on public conferences, unless they give you explicit permission to redistribute it. * Many users end their messages with some lines about how to get in touch with them (their email address, phone number, address, etc.). Limit your personal "signature" to maximum four lines. * Do not send test messages to a public conference, unless they are set up to serve this purpose. * If someone requests that readers reply by private email, do that. Do not send to the conference, where the request appeared. * When replying to a message in a public conference, many users 'quote' the original message prefixed by '>' or another special character, as in You wrote: >I strongly believe it was wrong to attack >Fidel Castro in this way! When you quote another person, edit out whatever isn't directly applicable to your reply. By including the entire message, you'll only annoy those reading it. * Note that if you USE ALL CAPITAL LETTERS, people will think you're shouting. Finally, smile with me about the following story: According to Time magazine (7/19/93, p. 58), three women who corresponded with Mr. X over the network discovered his duplicity and went public on the network. The incident sparked a lively debate over electronic etiquette (and ruined Mr. Casanova's chances for further romance). Fax services weigh less than your computer's printer ---------------------------------------------------- Many online services let you send electronic mail as fax messages. This is an interesting feature when in that far away place without a printer. Send the draft contract or other texts to your hotel's fax machine or to your client's office to get a printout on paper. Privacy ------- The level of online privacy differs by network, service, and application. Whatever these services may claim, always expect that someone, somewhere, is able to watch, even record. All mailbox services have at least one person authorized to access your personal mail box in case of an emergency. Most of the time they not have a right to read it without your permission, but they can. In some countries, mailbox services may let outsiders (like the police) routinely read your private email to check for 'illegal' contents. In this respect, email is not safer than ordinary mail. The good news is that most 'inspectors' and 'sysops' are good, honest people. On the other hand, it is useful to know your situation. It is not safe to send sensitive information (like credit card details) by private electronic mail. True, the probability that an outsider should get hold of and take advantage of such information is small, but it definitely is not 100 percent safe. Encrypt your email to protect sensitive information. Always assume that someone is recording all that is being said in online conferences, chats, and other interactive social gatherings. In chats, anyone using a personal computer as a terminal can log the conversation, or use screen dump just to capture 'interesting parts'. Many PC users can scroll back the screen. They can wait and decide whether to save the conversation in a file until after the conversation has taken place. With these capabilities widely available, users of chats and talk should always assume that their conversations are being recorded. Do not say indiscreet things in small, informal discussions. It may be recorded and reposted under embarrassing circumstances. The program PGP has become the defacto international Internet standard for public key encryption. For more on privacy, check out [email protected]. The files RFC 1113 through 1115 are about 'Privacy enhancements for Internet electronic mail' (see appendix 1 for how to get them). Usenet has alt.privacy (Privacy issues in cyberspace), and comp.society.privacy (Effects of technology on privacy). File transfers through the Internet ----------------------------------- The Internet is a term used of a network interconnecting hundreds of thousands of computer centers around the world. These centers use different types of hardware and software, and different methods of file transfer. What method to use for file transfers depends on the source host and the type of mailbox computer that you are using. The transfer usually takes place in two steps:

Chapters

1. Chapter 1 2. 1992. 220 pages. Phone: +47 22 63 61 62. Fax: +47 22 63 60 09. 3. 1. Going online will make me rich, right? 4. 2. The online world 5. 3. How to use online services 6. 4. Hobbies, games, and fun 7. 5. Home, education, and work 8. 6. Your personal healthnet 9. 7. Electronic mail, telex, and fax 10. 8. Free expert assistance 11. 9. Your electronic daily news 12. 10. Looking for a needle in a bottle of hay 13. 11. Getting an edge over your competitor 14. 12. Practical tips 15. 13. Cheaper and better communications 16. 14. Keep what you find. 17. 15. You pay little for a lot! 18. 16. Automatic communication 19. 17. Gazing into the future. 20. 2. How to get started 21. 3. Your first online trip 22. 8. How to register 23. Chapter 1: Going online will make me rich, right? 24. Chapter 2: The online world 25. 1. Database producers and information providers. 26. 2. Online services 27. 3. Gateways and networks 28. 4. The services 29. 1. Menus for novices. The user can select (navigate) by 30. 2. Short menus or lists of commands for the intermediate user. 31. 3. A short prompt (often just a character, like a "!"), which 32. 4. Some services offer automatic access without any menus or 33. 1. Noise on the line, which may result in unreadable text or 34. 2. Expensive long distance calls 35. Chapter 13.) 36. Chapter 3: How to use the online services 37. 15. Federation II, the adult space fantasy........................FED 38. Chapter 4: Hobby, games and fun 39. 2. Mix onions, green peppers, mushrooms, green CHILIES, taco 40. 5. In crock pot or dish, layer meat mixture, cheese, and 41. Chapter 5: Home, education and work 42. 4. What can I do Now to make this come true? 43. Chapter 6: Your personal HealthNet 44. Chapter 7: Electronic mail, telex, and fax 45. 1990. Mail through the Internet and grassroots services on free 46. 105. This node has an automatic gateway to the Internet. 47. 2. The address to his system is: 2:480/10. His user name is Jan 48. Chapter 8: Free expert assistance 49. 1. Learning curve like Mt. Everest. Give me intuitive or give me 50. 4. It may be unsuited for what I wanted (outlining a book). Since 51. Chapter 9: Your electronic daily news 52. Chapter 13). The total cost for seven minutes was US$6.00, which 53. Chapter 10: Looking for a needle in a bottle of hay 54. Chapter 7. If your name is Jens Jensen, and you want to subscribe 55. Chapter 11: Getting an edge over your competitor 56. Chapter 11 Update (FI82) 57. Chapter 12: Practical tips 58. chapter 16 for more about this. 59. 1. Transferring files from a remote data center to your local 60. 2. Transfer from your local mailbox host to your personal 61. 1. Logon to your local email host and enter 'FTP remote- 62. 2. When connected to the remote center, you can request transfer 63. 3. The file will be transferred to your local mailbox computer 64. Chapter 13: Cheaper and better communication 65. Chapter 14: Keep what you find 66. Chapter 15: You pay little for a lot! 67. Chapter 16: Automatic communication 68. Chapter 17: Gazing into the future 69. 9962. In North America: InfoPro Technologies. Tel.: +1-703-442-0900. 70. 8446. Fax: +44-81-390-6561. NUA: 2342 1330 0310. Data: +44-81-390- 71. Chapter 9 for more information. Single-user (individual) prices 72. 7543. In Europe, contact British Telecom. 73. Chapter 4 for more about how to get these files.) 74. 9315. 1200 bps, 8,N,1. Your communications system must be able to 75. 2400. This tells that a connection has been set up at 2400 bps. 76. chapter 16, this chapter may not be that important. Your program 77. 1. Disconnect the phone cable from the telephone. Insert the 78. 2. You may be able to connect the phone to the modem using the 79. 1. Ask the bulletin board to send text only (select U for 80. 2. Set your computer for colors and graphics. This feature is 81. 1. Navigate to the file area. Tell SHS what you want by using 82. 2. Press PgUp, select XMODEM, enter a file name (TEST.TXT), and 83. 3. When the transfer is completed, my board will ask for a 84. 1991. US$24.95. Paperback, 520 pages.

Reading Tips

Use arrow keys to navigate

Press 'N' for next chapter

Press 'P' for previous chapter