[Date Prev][Date Next][Thread Prev][Thread Next][Date Index ][Thread Index ]

Manual



COVER
                        THE BURMANAUT GUIDE
    A GUIDE TO THE INTERNET FOR THOSE WORKING ON BURMESE ISSUES
                           Thailand Edition
                        Published by BurmaNet
       "Appropriate information technologies---practical strategies"
                     E-mail: strider@xxxxxxxxxxx 
_____________________________________________________________________________
 
                TOPOLOGY OF THE INTERNET IN THAILAND
_____________________________________________________________________________
 
         Thammasat U (Thaprachan)
                |  
         Thammasat U.(Rangsit)                     
                 \
                  \ Kasetsart U.(Bangkhen)
                   \      |         Khon Kaen U.  
                    \     |           /  Min. of Pub. Health
Tech.Info.Access Cen.\    |Rangsit U /  /
                  \   \   |    /    /  /
                   \   \  |   /    /  /
                    \   \ |  /    /  /  Natl. Inst. for Development Admin.
                     \   \| /    /  /___/                
Internet            +++++++++++++++//            King Mongkut Inst. of Tech
in the______________+ N E C T E C +--------------(North Bangkok)
US via              +++++++++++++++\_____________             
UUNET                     |\                     \
 |                        | \     Prince of Songkhla U.(Songkhla)
 |                        |  \                         |
 |                        | Suranaree U.ofT.(Khorat)   |
 |                        |                            |
 |                  King Mongkut Inst. of Tech         |
 |                  (Ladkrabang)               Prince of Songkhla U.(Pattani)
 |                        |                        
 |                        |                                
 |                        |                                        
 |                        |
Internet             +++++++++++++++++++++
in the_______________+  Chulalongkorn U. +  
US via               +++++++++++++++++++++
UUNET                  /  |  \
 |                    /   |   \
 |                   /    |    \
 |          Chiangmai U.  |   Mahidol U.
 |                        |
 |                        |
 |                        |
 |                   Assumption U.
 |
Internet
in the
US via_____________ (Multiple BBSs in Thailand)
Fidonet
PAGE BREAKPAGE 1
______________________________________________________
 
CONTENTS
______________________________________________________
 
INTRODUCTION                                      PAGE 2
 
WHAT YOU WILL NEED TO GET STARTED                 PAGE 2
 
GETTING AN INTERNET ACCOUNT                       PAGE 3
 NECTEC
 Bulletin Board Services (BBSs)
 
LOGGING-ON                                        PAGE 5
 
NECTEC's MENU                                     PAGE 6
 
ELECTRONIC MAIL                                   PAGE 7
 Using PINE
 Sending E-mail
 Terminal Problems?
 The Most Important PINE Commands
 A Note About Valid E-mail Addresses
 Reading Incoming E-mail
 Other Commands In Pine                                       
 Summary Of Menu Commands And General PINE Information         
 
UPLOADING AND DOWNLOADING                         PAGE 12
 Uploading (sending files from your home 
           computer to your account at NECTEC):
 Downloading: (sending files from your account 
               at NECTEC to your home computer):
 Binary Files
 Screen Capture
 Inserting or Attaching Uploaded Files 
 
READING THE USENET NEWS                           PAGE 15
 Using a Newsreader
 Soc.culture.burma newsgroup archives
 
TELNET                                            PAGE 19
 
SECURITY                                          
 Anonymous e-mail
 Data encryption
 
MISCELLANEOUS                                     PAGE 24
 Equipment and Electricity
 Request for Comments or Suggestions
 New Edition Planned
 Appendix 1: List of BBSs in Bangkok
 Appendix 2: UP-COUNTRY Online Listing
 Appendix 3: NECTEC's UNIX HOST Dial-up Phone Listing  
PAGE BREAKPAGE 2
______________________________________________________
 
INTRODUCTION
______________________________________________________
 
This manual is meant to give a very basic introduction to the Internet for
individuals or groups working on Burmese issues in Thailand.  It covers using
electronic mail (e-mail), reading computer newsgroups and electronic mail
security.  This manual does not pretend to be comprehensive and you would do
well to use it in conjunction with a commercially published Internet guide.
 
To learn more about e-mail and related topics, consider buying any of a dozen
recently published books written for Internet novices.  In Thailand, these
are available at several bookstores and computer shops including the Book
Chest at either Panthip Plaza or Siam Square (just around the corner from the
DK Bookhouse and opposite the British Council).  Some recent guides to the
Internet are "The Internet Navigator" and "The Dummy's Guide to the
Internet."  The price of most guides is around 500 baht.
 
______________________________________________________
 
WHAT YOU WILL NEED TO GET STARTED
______________________________________________________
 
To use electronic mail, you will need:
 
     A computer     IBM-compatible or Macintosh computers are the most common
                    and will work equally well.
 
     A modem        Modems are similar to fax machines and they allow one
                    computer to communicate with another over a phone line. 
                    You cannot use an IBM-compatible modem with a Macintosh
                    computer, and vice-versa.  A good modem will communicate
                    at speeds of 14,400bps or faster and should cost about
                    6500 baht in Thailand or $150 in the U.S.
 
     Communications A computer program that operates the modem.  Common
     software       programs for IBM-compatible computers are Telix, Procomm
                    and Bitcom.  Telix is the most widely used program in
                    Thailand.  Software is usually included when you purchase
                    a modem.
 
     A phone line   There is no need to get an extra phone line. An existing
                    voice or fax line can be shared.  You will not be able to
                    use the phone for voice communications at the same time
                    you are using the modem.
 
     An Internet    To send and receive e-mail or read the USENET news, you
     Account        must have an account on a an Internet service provider. 
                    When you get an account, you will be assigned a unique
                    Internet electronic mail address.  Connecting to this
                    account from your home or office computer is called
                    logging-on.
PAGE BREAKPAGE 3
______________________________________________________
 
GETTING AN INTERNET ACCOUNT
______________________________________________________
 
If you can get an account through your office or university, do so.  It is
the cheapest and easiest way.  If this is not an option, you have two basic
service providers to choose from: NECTEC and a bulletin board service such as
the War-On-Virus BBS in Bangkok.  In general, NECTEC has more to offer and is
similarly priced.  The instructions in the rest of this manual presuppose
that you are using NECTEC or some other Unix-based e-mail account provider
(i.e. not a BBS).  Because most universities in Thailand that offer Internet
accounts use Unix-based software to operate those accounts, this guide should
apply to these universities as well (although with slight variations).
 
A supplement to this guide will give instructions on using a BBS.
 
_________
 
NECTEC
_________
 
To get an account at NECTEC, fill out the application form appended to this
manual and mail or take to them.  If there is no application form, contact
them by fax or phone.  You will need to give them your mailing address and
they will the application kit (written in Thai) for the "Thaisarn Internet
Service."  If you have a fax, it would be more convenient for the people at
NECTEC rather than phoning them. 
 
There are two things to keep in mind about e-mail in Thailand.  First, anyone
applying for an account will have to show a Thai ID card or a valid passport. 
The second thing is that the laws governing the Internet are in flux. 
Basically, two government agencies, NECTEC and the Communications Authority
of Thailand (CAT) are fighting.  CAT would prefer that you use faxes over
their international circuits (expensive) rather than e-mail over leased
Internet circuits (cheap).  Because of this conflict, Internet accounts in
Thailand are technically restricted to the academic community, although this
is certain to change soon as the business community presses for greater
Internet access.  In the meantime, you will need to list your profession on
the NECTEC application as "researcher."  NECTEC is trying to promote the
Internet in Thailand and they will not ask you to provide supporting
documentation.
 
You must sign-up and pay for service in either six-month or one year
increments.  There is also a one-time 300 baht fee charged for documentation
and an orientation course (in Thai).  The services are:
 
Service A, for novices and simple-e-mail users.  With this service you will
be able to use electronic mail. upload/download files and read/write USENET
news (i.e. news groups such as the ones on Burma).  Service A allows users to
log on for up to 20 hours per month and has a monthly subscription fee of 300
baht.
PAGE BREAKPAGE 4
Service B, for sophisticated Internet users.  With this service you will be
able to use electronic mail, upload/download files, read/write USENET news
(i.e. news groups such as the ones on Burma), read the World-wide Web
Hypertext Database and download files from TIS's local data bank, and use all
other online services from NECTEC's node, such as telnet/hytelnet, gopher,
WAIS (Wide-Area Information Services), FTP (file-transfer protocol), talk,
ircII (internet relay chat), etc. Service B allows users to log on for 30
hours per month and has a monthly subscription fee of 500 baht.
 
 
National Center for Computer Technology (NECTEC)
Ministry of Science, Technology and the Environment
Rama VI Road
Rajthevi
Bangkok 10400
Tel: (662) 248-8087         Fax: (662) 247-1335 
 
To Go In Person:  
The office for e-mail is on the 7th floor of the NECTEC building.  The NECTEC
building is behind the Ministry of Science, Technology and the Environment on
Rama VI road near the Rama Vibhadi Hospital and the Ministry of Foreign
Affairs.
_________
 
Bulletin Board Services (BBSs)
_________
 
In the unlikely event that you have difficulty getting an account at NECTEC,
you can easily get an account at the one of many BBSs in Thailand.  BBSs
accounts offer fewer services than real Internet accounts, but they do
support electronic mail and many allow you to read the USENET news.  Because
there are so many BBSs in Thailand no detailed instructions will be given
here.  A supplement on BBSs will be published later.  See Appendix 1 and 2 at
the end of this guide for a list of all BBS phone numbers in Thailand.
 
In addition to being easier to get an account on, BBSs have the advantage of
being privately-owned.  Most system operators will be willing to provide
accounts as long as the user is willing to pay the bill.  If you have trouble
with a government-owned provider like NECTEC, BBSs provide an easy-to-find
alternative.
 
Two BBSs that should be among your first choices are:
 
In Bangkok; the War-On-Virus BBS         In Chiang Mai; the TG BBS
Alan Dawson, system operator             Fran Woods, system operator
Data: 252-5087      Voice: 255-5982      Data: 053-249316   Voice: 053-243589
 
 
With BBSs, you log-on to them and then you will automatically be guided
through the sign-up proceedures.  In order to exchange international
electronic mail, you will initially need to get permission from the system
operator.  This is usually done by paying a relatively small fee.
PAGE BREAKPAGE 5
______________________________________________________
LOGGING-ON
______________________________________________________
 
Log-on procedures will vary depending on which software you use and whether
you use an IBM-compatible computer or a Macintosh.  The manual accompanying
your software should give instructions for logging-on.
 
If you are using the Telix program, the manual should be a text file in the
same directory as the program.  Look for telix.doc and use a word processor
to view or print it.
 
The phone numbers for logging-on to NECTEC are 248-8070-8076.  NECTEC
currently has seven dial-up lines but is planning to add more soon.  Because
of a shortage of phone lines, logging on to NECTEC can be difficult,
especially in the late-afternoon and evening.  Late-nights and mornings tend
to be the best times.
 
The log-on procedure involves having your computer instruct your modem to
dial the appropriate phone number.  Once you have done this at NECTEC, you
will get the following message:
 
***************************************************************
CONNECT 9600
 
        Welcome to THAISARN:
 
        To DOWNLOAD during this session - please type: terminal download
        Please choose HOST COMPUTER - please type: morakot or nwg
 
TIS>
***************************************************************
 
NWG accounts are reserved for government employees.  Morakot accounts are
open to members of the academic community.  Your account will almost
certainly be on Morakot, so type: morakot
 
You will then see the following message:
 
***************************************************************
* Trying MORAKOT (192.150.251.21)... Open
*
* SunOS UNIX (morakot)
*
* login:
* Password:
***************************************************************
 
Once you enter your user ID at the login: line and your password at the
Password: line, you will see see the following prompt:
 
 morakot%
PAGE BREAKPAGE 6
 
If you are logging-on to a different machine in Thailand, the prompt you
receive will probably the dollar sign $, also called the string prompt.
>From the prompt, you can invoke your e-mail program as well as the program
that controls the USENET news.  Once you have logged-on, the things that you
will need to learn next are how to do are send e-mail, read incoming e-mail,
upload/download files and access the USENET news.  
______________________________________________________
 
NECTEC's MENU
______________________________________________________
 
After logging-on, you can either invoke programs from the morakot% prompt or
if your account is at NECTEC, you can use their Menu system.  The menu system
simply organizes the basic commands in an easy-to-use menu.  To invoke the
menu from the Morakot% prompt, type: Menu
 
You should then be presented with a screen that looks like this:
 
***************************************************************
________General Services_________________________________________________
<WHAT>  About this menu service, status, etc.
<ALERT!> Latest news, development and announcement of TIS.
[USAGE] View your account status, usage statistics, billing, etc.
[pine]  Electronic mail
[rtin]  Read/write USENET news.
[INFO]  General guide and information service on system usage.
<ICTR>  A Few Information Centers: World-Wide Web(lynx), NSTDA, NITC, etc..
 
________B-services for the demandig Internet Users________________________
[gopher]   The internet-wide information service, hierarchical menu style.
[hytelnet] HyTelnet - Access any information center via menu.
[ftp   ]   File Transfer Protocol - Get+Deposit files to other Internet
sites.
[archie]   Archie - Looking for archived files/information.
[talk]     Talk - Interactive keyboard chat for two Internet users.
[ircII]    ircII - Internet Relay Chat, a multiparty realtime 'talk' service.
___________________________________________________________________________
Other ...  What is <NECTEC>    What is <ThaiSarn> and <Pubnet>?What is the
<Internet> and the ThaiSarn-Internet Service <TIS>?
___________________________________________________________________________
up/down arrows = move,  enter = run selection, m=main menu,  q=quit program
 
***************************************************************
 
To choose any one of these options, scroll down or up to it using the arrow
keys and then press ENTER.  The programs covered in this manual will be pine
and rtin.
 
PAGE BREAKPAGE 7
______________________________________________________
 
ELECTRONIC MAIL
______________________________________________________
 
The program that controls both incoming and outgoing electronic mail at
NECTEC and most other systems in Thailand is called PINE.  PINE is an
improved version of an earlier e-mail program called ELM and in what passes
for computer humor, PINE stands for Pine-Is-Nearly-Elm.
_________
 
Using PINE
_________
 
If you are using NECTEC's Menu, scroll down until the highlighted cursor is
on the line:  and press ENTER.
 
Or, if you can invoke PINE from the morakot% prompt by typing:
 
 PINE
 
This will take you into PINE's Main Menu, which will look something like the
following:
 
 
***************************************************************
 
PINE 3.89   MAIN MENU                          Folder: (CLOSED)  0 Messages 
 
?     HELP               -  Get help using Pine   
C     COMPOSE MESSAGE    -  Compose and send a message   
I     FOLDER INDEX       -  View messages in current folder   
L     FOLDER LIST        -  Select a folder to view   
A     ADDRESS BOOK       -  Update address book   
S     SETUP              -  Configure or update Pine   
Q     QUIT               -  Exit the Pine program
 
Copyright 1989-1993.  PINE is a trademark of the University of Washington.
? Help                     P PrevCmd                  R RelNotes
O OTHER CMDS L [ListFldrs] N NextCmd                  K KBLock
***************************************************************
 
_________
 
Terminal Problems?
_________
 
If you should type PINE and receive something that looks like the following
message:
 
 Your terminal, of type "dumb", is lacking functions needed to run pine.
 
 
PAGE BREAKPAGE 8
 
Then type the following:
 
 set term=vt100 
 
Then, press ENTER.  After you have done this, try typing PINE again.
_________
 
The Most Important PINE Commands
_________
 
The four most important PINE commands to learn are:
 
 C     COMPOSE MESSAGE    - Compose and send a message
 
 I     FOLDER INDEX       -  View messages in current folder   
 
 ?     HELP               -  Get help using Pine   
 
These three commands are all part of the Main Menu.  The fourth command you
should learn will return you to the Main Menu from wherever you are in PINE. 
To return to the Main Menu, type:
 
 M 
 
_________
 
Sending E-mail
_________
 
To begin with, you should compose (and send) an e-mail note.  From the Main
Menu, type:
 
 C
 
Your screen should now look something like this:
 
***************************************************************
COMPOSE MESSAGE                     
 
To      : 
Cc      : 
Attchmnt: 
Subject : 
----- Message Text -----
 
 
 
 
^G Get Help  ^C Cancel    ^R Read File ^Y Prev Pg   ^K Cut Text  ^O Postpone 
^X Send      ^J Justify   ^W Where is  ^V Next Pg   ^U UnCut Text^T To Spell 
***************************************************************
PAGE BREAKPAGE 9
 
When you begin to compose a message, your cursor will automatically begin at
the top on the line marked: 
 
 To: 
 
Enter a valid e-mail address and use the down arrow key to scroll down to the
next appropriate line.  If you want to cc. a copy of your note to someone,
enter a valid e-mail address on that line as well.  Unless you begin to need
more advanced commands, you can safely skip the Attchment: line for now.  In
the Subject: line, you can type a one-line summary of what your message is
about.  This, however, is optional.
 
Once you have finished all the header information, scroll down until your
cursor is in the --- Message Text --- area and begin to type your message.
 
Once you are ready to send your message, type:
 
 ^X
 
You will now be asked:
 
 Send message? [y] :                                                        
 
Type either y (for yes) or n (for no) as appropriate.  If you type y, there
will be a short pause while the computer sends your mail and you will see
this:
 
 [Sending mail.....]
 
Once your mail has been sent, you will automatically be returned to the Main
Menu.  If you want to send another message, type "c" again.  At any time
before you send a message, you can cancel it by typing ^C.
 
_________
 
A Note About Valid E-mail Addresses
_________
 
A valid e-mail address will take the following form:  
recipient@xxxxxxxxxxxxxxxxxxxxxxxx
 
For example, this address: sysadmin@xxxxxxxxxxxxxxxxxxxx 
                            / \   / \  / \   / \   / \/ \
                            1      2    3     4     5  6
 1 sysadmin (System administrator)
 2 @ (at)
 3 morakot (The "semi"-public access computer for e-mail accounts)
 4 nectec (The National Computer Technology Center)
 5 th (The Thailand Internet domain, i.e. e-mail addresses in Thailand)
 
 
PAGE BREAKPAGE 10
 
E-mail addresses may consist of numbers or letters and may be dissimilar to
this example.  The only consistent rule of e-mail addresses is that all of
them will have the @ sign in them.  By the way, if you ever have a question
or problem with e-mail at NECTEC, address your questions to the sysadmin at
the address above.
 
A Note About The Control Key:  When composing mail and in a few other places
in Pine you have to use Control keys which means pressing the control key and
the letter indicated at the same time.  This is usually shown with a "^" in
front of the letter.
_________
 
Reading Incoming E-mail
_________
 
To read your incoming e-mail, from the Main Menu type:  I
 
This will take you into your incoming mail folder which is called your INBOX.
Your screen will look something like the following (assuming that you have
any incoming mail):
 
****************************************************************
INBOX  5 Messages   [Folder "INBOX" opened with 5 messages]  
PINE 3.89   FOLDER INDEX                 
Folder: INBOX  Message 5 of 5
 
+   1   May 12 Tim Soe             (2,033)  Re: DVB and the news
+   2   May 12 finn@xxxxxxxxxxxxx  (1,754)  dial up number
+   3   May 13 strider@xxxxxxxxxx (51,057)  Transcript of ASSK interview
+   4   May 14 strider@xxxxxxxxxx  (2,771)  What is the source of that quote?
+   5   May 25 tun@xxxxxxxxxxxxxxx   (975)  The photos you asked about
 
? Help       M Main Menu  P PrevMsg     - PrevPage    D Delete      R Reply
O OTHER CMDS V [ViewMsg]  N NextMsg   Spc NextPage    U Undelete    F Forward 
****************************************************************
 
To read your incoming mail, you can either type in the number corresponding
to the piece of e-mail that you want to read, or scroll the highlighted line
up or down until it is on the message you want to read.  Once the message you
want to read is highlighted, press your ENTER or RETURN key.
 
If you wanted to read message #6, press 6 or scroll down to it.  Once you
have done this, something like the following will show up:
 
PAGE BREAKPAGE 11
 
*****************************************************************
 
Folder: INBOX  
Message 5 of 5 100% ANS  Date: Wed, 25 May 1994 09:52:56 +0200 (MET DST) 
To: strider@xxxxxxxxxxx
 
Hello again 
 
I have a paper copy of that picture. I was told that the negative was here,
but now I cannot find it. Can you make slide copies of the paper/picture if
I send it to you? 
 
Ct
 
? Help       M Main Menu  P PrevMsg     - PrevPage    D Delete      R Reply 
O OTHER CMDS V ViewAttch  N NextMsg   Spc NextPage    U Undelete    F Forward
 
****************************************************************
 
Once you have read a message, you have several options.  You can reply to it
(type R), forward it to someone else (type F), delete it (type D), file it
away in another folder (type E), or leave it alone for the moment.  In this
case, either go on to the next message (type N), list all of your incoming
messages (type I) or go back to the Main Menu (type M).
 
_________
 
Other Commands In Pine                                       
_________
 
     COMMANDS: The bottom two lines of the screen are always used to list the
     commands you can give.  You press the keys that are highlighted to give
     the command.  The commands for getting help and going back to the main
     menu are always present (except when viewing help as you are now).
 
     OTHER COMMANDS: The "Other Commands" function changes the keys you see
     at the bottom of any screen.  In some cases there are three different
     pages of keys which it toggles through.  ALL COMMANDS ARE ACTIVE, even
     if they are not currently showing at the bottom of your screen.
                                                                        
     PAGING UP/DOWN: The "+" and "-" keys are used for moving to the next or
     previous page.  The space bar is a synonym for "+".  You may also use ^V
     to page down and ^Y to page up as you do in the message composer. 
 
     RETURN KEY: The return key is usually a synonym for a frequently used
     command.  When viewing a message, there is currently not a default
     command, so RETURN does nothing; when in the index, it is synonymous
     with "view msg". In the key menu at the bottom of the screen, whatever
     is enclosed in square brackets [] is the same as the return key.
 
PAGE BREAKPAGE 12
 
     REPAINTING THE SCREEN Sometimes what is displayed on the screen will be
     incorrect due to noise on the phone line or other causes and you will
     want to repaint the whole screen to make it correct.  You can use the ^L
     command to do this.  It never hurts to do it when in doubt.
 
If your terminal has no arrow keys, you may use the usual emacs commands for
moving around the screen:
 
    ^F  Forward       ^B Backward       ^N  Next Line     ^P Previous Line
 
Also to be consistent with the composer the following always work:
 
    ^V  Next Pg      ^Y Prev Pg        ^G  Get Help      ^L Redraw Screen
 
And where appropriate
 
    ^D Delete character   ^K Kill line     ^U Undelete/Unjustify
 
_________
 
SUMMARY OF MENU COMMANDS and GENERAL PINE INFORMATION                    
_________
 
General Pine Commands      MAIN MENU Screen Commands
---------------------      -------------------------
?  Show help text          O  Show all other available commands
C  Compose a message       P  Select previous command up on menu
I  FOLDER INDEX screen     N  Select next command down on menu
L  FOLDER LIST screen      R  Display complete Pine release notes
A  ADDRESS BOOK screen     K  Lock keyboard (Unix Pine Only)
S  SETUP functions         G  Goto a specified folder
Q  Quit Pine
 
______________________________________________________
 
UPLOADING AND DOWNLOADING
______________________________________________________
 
NOTE: Uploading and downloading are used in conjunction with electronic mail. 
They are somewhat more advanced topics and you may want to skip them in the
beginning. If so, proceed directly to the section on the USENET news.
 
At this point, you should be able to send and receive e-mail messages using
PINE.  PINE is generally used to compose a message while you are on-line, or
to send a message that you have prepared earlier.  If you want to prepare a
message off-line (which is a good idea if the message is long), you will need
to learn how to upload.
 
Also, you may want to move messages from your account at NECTEC to your home
computer.  To do this, you will need to learn how to download.
 
PAGE BREAKPAGE 13
 
_________
 
UPLOADING (TO SEND FILES FROM YOUR COMPUTER TO YOUR ACCOUNT AT NECTEC):
_________
 
Note: These instructions work for if you are running the Procomm
communications software on your IBM-compatible home computer.  Virtually
every piece of communications software supports the Kermit protocol but the
means of invoking it will vary from software to software.  If you are using
a Macintosh computer or a different piece of software, consult your
communications software instructions for guidance on Kermit emulation.  The
basic ideas will still apply but the commands used to make it work will be
different.
 
The five basic steps to uploading are:
 
 1 At Morakot% prompt, type kermit -r
 2 Press the PAGE UP key
 
 3 Select Kermit (#2)
 
 4 Press the ENTER key
 
 5 When prompted, type the name and directory of the file you want to upload. 
 To upload a file named upload.fil in the c:\procomm directory, you would
 type:
 
 c:\procomm\upload.fil
 
and then press the ENTER key.
 
_________
 
DOWNLOADING: (TO SEND FILES FROM ACCOUNT AT NECTEC TO YOUR HOME COMPUTER):
_________
 
Downloading is slightly more complex than uploading.  The four basic steps to
downloading are:
 
1 From the Morakot% prompt, type 
 
 kermit -s [/directory/subdirectory/filespecs] 
 
(Your incoming e-mail is stored in a file that is identical to your user ID,
in the directory /usr/spool/mail.  Therefore, to download all of your
incoming mail, you would type:
 
 kermit -s /usr/spool/mail/YOUR-USER-ID
 
If for example, your user ID is myint, then you would type:
 
PAGE BREAKPAGE 14
 
 kermit -s  /usr/spool/mail/myint
 
2 When prompted, press the PAGE DOWN key
 
3 Select Kermit (#2)
 
4 Press the ENTER key
 
Whichever file you have specified will now be downloaded to your computer's
hard disk.  Your communications software should specify the file name and
directory of the downloaded file.  In all likelihood, it will be in the same
directory as your communications software.
 
_________
 
Binary Files
_________
 
The instructions given for uploading/downloading thus far have assumed that
standard text files are being moved.  Another type of file is the binary
file.  Most people will never have to move binary files around so the topic
will not be treated in depth here.  The main difference in uploading or
downloading binary files using the kermit protocol is to use -ir or -is
switch.  Therefore, to upload a file, you would use the command: kermit -ir
To download a binary file, the correct syntax would be: 
 
 kermit -is [/directory/subdirectory/filespecs] 
 
_________
 
Screen Capture
_________
 
The simplest way to download is to run a screen capture session.  Check your
communications software manual for instructions.  Using Procomm, you would
press Alt-F1 and when prompted, enter what you want the plain text file on
your hard disk to be named.  Your communications software would then
"capture" every character that goes across your computer screen until you end
the captures session by pressing Alt-F1 again.  You could then read the
resulting plaintext file when you are off-line using a word processor.
 
_________
 
Inserting or Attaching Uploaded Files 
_________
 
Once you have uploaded a file that you wish to send to someone else, you must
then get the uploaded file into an electronic mail message.  To do this,
begin composing an electronic mail message (see the section on Sending E-mail
(PAGES 7-8)).  Once you have entered a valid e-mail address, you can either
attach a file to the message or insert it into the body of the message.  To
attach a file, scroll down to the Attchmnt: line and enter the name of the
PAGE BREAKPAGE 15
 
file to be attached.  If you do not remember the name of the file you want to
attach, press the Ctrl-R keys.  You will be prompted for the name of the
file/s you want to attach.  Press the Ctrl-T keys.  You will now see a list
of files stored in your home directory.  Scroll the cursor to the appropriate
file and press the ENTER key.  You should see a notice that the file has been
attached to your e-mail message although you will not be able to see the text
of the attached message.
 
To insert the uploaded file into the body of your message, scroll down to the
body of the message you are composing and using the process just described,
insert the file.  This time, you will be able to see the text of the inserted
message.
 
______________________________________________________
 
READING THE USENET NEWS
______________________________________________________
 
There are about 6,000 newsgroups on the Internet covering virtually any
subject you can imagine.  Computer newsgroups function something like
bulletin boards.  You can read the messages on the board and if you choose,
respond either directly to the person who posted a message, or post a message
of your own to the board.  Newsgroups are primarily a place to get news, ask
questions and carry on conversations.  These boards are a good way to
distribute news letters, appeals and announcements to people around the world
who are interested in Burma.
 
 
NECTEC, like most other Internet sites, carries a limited selection of the
available newsgroups.  This is called a USENET feed.  The soc.culture.burma
newsgroup is the USENET newsgroup most useful to people interested in Burma. 
Soc.culture.burma is carried at thousands of sites around the world and
messages there may be read by a relatively large group of people.  Another
newsgroup that may be of interest is soc.culture.thai.
 
_________
 
Using a Newsreader
_________
 
The program used to read the USENET news is called a newsreader.  The
newsreader used at NECTEC is a program called Read-The-Internet-News.  To
start the program from NECTEC's Menu, scroll down to the USENET news line and
press ENTER.  You can also invoke the newsreader from the morakot% prompt by
typing:
 
 rtin
 
If your e-mail provider in Thailand is not NECTEC, rtin may not work.  Other
commonly used programs are The-Internet-News (type: tin) or simple, News
(type: news).
 
PAGE BREAKPAGE 16
 
Once you have invoked your newsreader, you will get a screen that looks
something like this:
 
***************************************************************
 
rtin 1.2 PL2 [UNIX] (c) Copyright 1991-93 Iain Lea.
Connecting to news.nectec.or.th...
Reading news active file...
Subscribe to new group alt.bbs.majorbbs (y/n/q) [n]: y
Checking...Subscribe to new group alt.usenet.kooks (y/n/q) [n]: n
Checking...Subscribe to new group alt.education.research (y/n/q) [n]: n
 
***************************************************************
 
You may or may not be prompted to answer whether you want to subscribe to
several newly formed newsgroups.  Newsgroups come and go all the time on the
Internet, although the major ones remain fairly steady.  If you choose to
subscribe to a group, it will be grouped together at the top of the list of
all groups available.  You can still read groups that you don't subscribe to
but may have to scroll through several screens to get at them.  If you don't
want to subscribe to any of the new newsgroups, type: q
 
The next screen you should see will list the available newsgroups.  It will
look something like this:
 
 
***************************************************************
 
Group Selection (news.nectec.or.th  2372)       
       1  1662  soc.culture.thai                                            
       2        th.pubnet.chitchat                                          
       3     1  th.pubnet.general                                           
       4     1  th.pubnet.it-stds                                           
       5        th.pubnet.lnews                                             
       6    69  th.pubnet.nettalk                                           
       7     2  th.pubnet.pc                                                
       8        th.pubnet.politik                                           
       9        th.pubnet.qol                                               
      10        th.pubnet.soc-econ                                          
      11     7  th.pubnet.test                                              
      12     1  th.pubnet.unix                                              
      13   103  th.sci.lang                                                 
      14        th.misc.jobs.resumes                                        
      15        th.misc.jobs.offered                                        
  
<n>=set current to n, TAB=next unread, /=search pattern, c)atchup,g)oto,
j=line down, k=line up, h)elp, m)ove, q)uit, r=toggle all/unread,s)ubscribe,
S)ub pattern, u)nsubscribe, U)nsub pattern, y)ank in/out       1  1662  
 
***************************************************************
 
PAGE BREAKPAGE 17
 
At present, NECTEC carries about 2,300 newsgroups although the exact number
changes daily.  To see the next screen of groups, press the ENTER key.  To
quit the newsreader and return to the Morakot% prompt, type: q
 
Three columns of are information displayed.  The first column is the number
of the newsgroup.  The second is the number of unread messages in the
newsgroup and the third is the name of the newsgroup.
 
To read a particular newsgroup, either scroll down to it (one line will
always be highlighted) or type the name of the newsgroup and press ENTER.
One other way to move to or find a particular newsgroup is to run a search
for it.  To run a search, press the / key.
 
You will then see a prompt that looks like this:
 
 Search forwards []> 
 
At this point, type the word you want to search for and press ENTER.  For
example, to find the newsgroup about Burma, type "Burma" and then press the
ENTER key (do not type the quotation marks).  This search takes us to
newsgroup #2139, which is named soc.culture.burma and has 12 unread messages.
 
    2139    12  soc.culture.burma                                           
 
Once this newsgroup is highlighted, press ENTER.  The next screen you see
will look something like this:
 
***************************************************************
 
Group soc.culture.burma ('q' to quit)...         Threading articles...h=help
soc.culture.burma (11T 12A 0K 0H R)     
 
1  +    Burma's deferred democracy (repeat?)            Coban Tun           
2  +    Thai-Burma relation                             Coban Tun           
3  +    Salween Dams: a study                           strider@xxxxxxxxxx  
4  +    Thai-Burma relation                             Gwyn Williams       
5  +    Burmese Troops Tangle with Khun Sa'             strider@xxxxxxxxxx  
6  +    Thai Attacks On Immigrant Workers               strider@xxxxxxxxxx  
7  + 2  Burma visa.                                     derek horlock       
8  +    Burma visa                                      Coban Tun           
9  +    Looking for a friend in Austin, Tx (Donald My   NGUYEN              
10  +    "The Fascist Disneyland: The Human Rights Dis  Coban Tun          
11  +    my "I love you" list                           Knipper John      
 
<n>=set current to n, TAB=next unread, /=search pattern,
^K)ill/select,a)uthor search, c)atchup, j=line down, k=line up, K=mark read,
l)ist thread,|=pipe, m)ail, o=print, q)uit, r=toggle all/unread, s)ave, t)ag,
 
***************************************************************
 
PAGE BREAKPAGE 18
 
Again, you can either move the highlighted cursor to the appropriate message,
or type the number of the message you want to read and press the ENTER key. 
If there are no messages that you want to read, type: q
This will take you back to the complete list of newsgroups.
By way of example, to read message #7, we could either scroll down to it, or
type 7, and then press the ENTER key.  The next screen would show the text of
the message and a menu of options:
 
 
***************************************************************
 
Reading...Wed, 25 May 1994 00:08:33   soc.culture.burma    Thread 7 of   11
Lines 9  Burma visa. 1 Response
 
derek@xxxxxxxxxxxxxxxxxxx                       
derek horlock at Myorganisation
 
derek horlock
Can anyone help me with information on independent travel to Burma.
I am hoping to travel there from the UK in December for a couple of
weeks. I hear that they are now giving visas for up to a month. If
this so what are the requirements and is there a consulate in London?
Any tips or experiences would be much appreciated.
Thanks Derek.
 
- Next response --<n>=set current to n, TAB=next unread, /=search pattern,
^K)ill/select,a)uthor search, B)ody search, c)atchup, f)ollowup, K=mark
read,|=pipe, m)ail, o=print, q)uit, r)eply mail, s)ave, t)ag
 
***************************************************************
 
If the message you are reading fills more than one screen, press the space
bar to read further.  Press the ENTER key to read the next message.  If you
are done reading a message and want to go back to the main listing of
messages in the newsgroup, type: q
 
If you wanted to reply to Derek's message, you would type: r
You would be prompted on whether you wished to reply to Derek personally or
to the soc.culture.burma newsgroup so that others could read the reply as
well.
 
One more useful option that you have is to mail a copy of the article to
yourself or someone else.  To mail it to someone, type: m
You will then be prompted for the e-mail address of the recipient.  Type the
recipient's e-mail address and press the ENTER key.
 
Note: You cannot delete messages because you are reading a public newsgroup
rather than your personal mail.  If you decide you never want to hear from a
particularly annoying author, press ^K to add him/her to your kill file. 
Your newsreader will then automatically screen out future messages from
anyone you have put in your kill file.  Other people will still be able to
read his/her messages but you won't have to.
PAGE BREAKPAGE 19
 
_________
 
Soc.culture.burma newsgroup archives
_________
 
The soc.culture.burma newsgroup is now being archived.  A slightly modified
version of Trin Tansetthi's announcement is reproduced here:
 
 
An archive for soc.culture.burma articles is now online for anonymous FTP
from ftp.nectec.or.th in directory
 
/pub/archives/soc.culture.burma/1994
 
Articles posted in the current month are not on the archive, they will be
online in the following month.
 
Searching for an article is best done via WAIS full-text search/retrieval
facility. There are many WAIS utilities available for many platforms on
the Internet. 
 
To search and/or retrieve, specify the database:
  soc.culture.burma-1994 
 
On the host nexus.nectec.or.th, for instance, from the $ prompt, typing:
 
 $ waissearch -d soc.culture.burma-1994 -h nexus.nectec.or.th 'charter'
 
would locate articles in the archive that contain the word 'charter'. For
more information about WAIS, consult the newsgroup comp.infosystems.wais.
 
The original notice was by Trin Tansetthi
 
______________________________________________________
 
TELNET
______________________________________________________
 
An extremely useful program usable on the Internet is Telnet.  With telnet,
you can log-on to one account using another.  For example, if you log-on to
your normal account and have another account somewhere else, you can log-on
to the second account from the first one.  For security reasons, this may be
helpful because it will mean that your e-mail is not sitting on a computer in
Thailand and your communications will therefore be somewhat more secure.
To operate telnet, you must first have an account somewhere else.  Assuming
that you have access to a second account, from the morakot% prompt, you would
type:
 
telnet [host.site]
 
 
PAGE BREAKPAGE 20
 
For example, if you were logging-on to the computer at the University of
California, San Fransisco, you would type:
 
telnet macpsy.ucsf.edu
 
Once you were connected, you would then operate the remote system as if you
were logged-on to it directly.  Since there are so many possible variations
of what this would look like, you will have to figure this out on your own. 
You may be able to get help with specific systems by contacting BurmaNet
directly.
 
______________________________________________________
 
SECURITY
______________________________________________________
 
_________
 
Anonymous E-mail
_________
 
 
Anonymous e-mail is mostly used by people posting messages to public
newsgroups when they don't want their identities known.  During 1993, a
diplomat from the Burmese embassy in Washington was known to post pro-SLORC
messages and presumably, to read anti-SLORC messages.  The diplomat hasn't
been heard from on the net lately but if you want to post messages to
soc.culture.burma or soc.culture.thai but are uncomfortable with the
possibility of a Burmese official knowing your identity, post anonymously. 
Anonymous email may also be useful in Thailand if you are worried that you
could lose your account if you use it for political activity.
_________
 
The Anonymizer, A Modified Excerpt.
(Original by Johan Helsingius)
_________ 
 
So what does an anon server really do? Well, it provides a front for
sending mail messages and posting news items anonymously. As you send your
very first message to the server, it automatically allocates you an id of
the form anNNN, and sends you a message containing the allocated id. This id
is used in all your subsequent anon posts/mails. Any mail messages sent to
your-id@xxxxxxxxxxxxx gets redirected to your original, real address. Any
reply is of course anonymized in the same way, so the server provides a
double-blind. You will not know the true identity of any user, unless she
chooses to reveal her identity explicitly.
 
In the anonymization process all headers indicating the true originator are
removed, and an attempt is made to remove any automatically-included
signatures, by looking for a line starting with two dashes (--), and zapping
everything from there on. But if your signature starts with anything else,
it's your own responsibility to remove it from your messages.
PAGE BREAKPAGE 21
 
There are two basic ways to use the system. The easiest way is by sending a
message to recipient@xxxxxxxxxxxxx:
 
     To: soc.culture.burma@xxxxxxxxxxxxx
     To: an74593@xxxxxxxxxxxxx
     To: help@xxxxxxxxxxxxx
 
You can also post to soc.culture.burma via the following addresses:
 
     To: soc.culture.burma.usenet@xxxxxxxxxxxxxx
     To: soc.culture.burma@xxxxxxxxxxxxxxxx
 
Of course, in the case of mailing to a known user, you have to use addresses
of the form user%host.domain@xxxxxxxxxxxxx, or the pretty obscure source
addressing construct of @anon.penet.fi:user@xxxxxxxxxxxx These constructs are
not necessarily handled properly by all mail systems, so I strongly recommend
the "X-Anon-To:" approach in these cases. This works by you sending a message
to "anon@xxxxxxxxxxxxx", including a X-Anon-To: header line containing the
desired recipient. But this really has to be a field in the message header,
before the first empty line in the message. So:
 
     To: anon@xxxxxxxxxxxxx
     X-Anon-To: soc.culture.burma@xxxxxxxxxxxxx, an74593@xxxxxxxxxxxxx
 
     To: anon@xxxxxxxxxxxxx     X-Anon-To: an74593@xxxxxxxxxxxxx
 
If you intend to mail/post something that might cost you your job or
marriage or inheritance, _please_ send a test message first. The software
has been pretty well tested, but some mailers on the way (and out of my
control) screw things up. And if you happen to find a problem, _please_ for
the sake of all the other users, _let me know asap_.
 
And _please_ use the appropriate test newsgroups, such as alt.test or
misc.test. Yes, _you_ might get excited by reading 2000 "This is a test.."
messages on alt.sex, but I warn you that most psychologists consider this
rather aberrant...
 
And remember this is a service that some people (in groups such as
alt.sexual.abuse.recovery) _need_. Please don't do anything stupid that
would force me to close down the service. As I am running my own company,
there is very little political pressure anyone can put on me, but if
somebody starts using the system for criminal activities (that is, things
that would be criminal in Finland), the authorities might be able to order me
to shut down the service. I don't particularly want to find out, however...
 
If you think these instructions are unclear and confusing, you are right. If
you come up with suggestions for improving this text, please mail me!
Remember, English is my third language...
Safe postings! Johan Helsingius     julf@xxxxxxxx  
 
For more information about anonymous e-mail, send an e-mail message to:
    help@xxxxxxxxxxxxx
PAGE BREAKPAGE 22
 
_________
 
Data Encryption
_________
 
If you don't need data encryption, don't bother--it is somewhat difficult and
time consuming to use.
 
Someone else's electronic mail is fairly easy to read for a computer hacker. 
It is easier still for the people running the computers that run the Internet
or who can wiretap phone lines that carry e-mail.  However, unless you are
sending or receiving sensitive business or personal information via
electronic mail, you probably have no reason to worry about data security. 
Put simply, nobody is likely to go to the trouble of reading your e-mail
unless you are doing something that a government really wants to know about,
which you probably aren't.
 
You will have to decide for yourself where the line between paranoia and
prudence.  If you do have real security considerations (or simply enjoy
learning arcane computer programs), then PGP may be for you.  The following
excerpt from an article in the Wall Street Journal is as good an explanation
of PGP as any.
_________
 
PGP
_________
 
The Wall Street Journal, Vol. LXXV No. 138
Thursday April 28, 1994, Page 1.
 
CIPHER PROBE:
Popularity Overseas Of Encryption Code Has the U.S. Worried
Grand Jury Ponders if Creator 'Exported' the Program Through the Internet
`Genie Is Out of the Bottle'
By William M. Bulkeley--Staff Reporter of The Wall Street Journal
 
BOULDER, Colo. - During the battle between Boris Yeltsin and the Russian
Parliament last October, with Russian freedom hanging in the balance,
software author Philip Zimmermann received an electronic-mail message from
Latvia. "If dictatorship takes over Russia," it read, "your PGP is widespread
from Baltic to Far East now and will help democratic people if necessary.
Thanks."
 
PGP - for Pretty Good Privacy - is a program written by Mr. Zimmermann for
scrambling computer messages.  Dissidents around the world use it to protect
their electronic communications from the prying eyes of secret police...
Admired by freedom lovers and criminals alike, PGP is one thing: 
uncrackable, or as close to it as a secret code has ever been.  Even U.S.
government snoopers can't break it.  And that places Mr. Zimmermann - a
paunchy, bearded, 40-year-old computer consultant who is fast becoming a
folk hero on the information highway - in peril.
PAGE BREAKPAGE 23
A federal grand jury in San Jose, Calif., is examining whether he broke
laws against exporting encryption codes.  The Federal Bureau of Investigation
suspects that Mr. Zimmermann had a role in putting PGP on the Internet, the
world-wide web of computer networks, making it easy for foreign governments
and terrorists to use it and render their computer traffic impervious to
U.S. spying....
 
The world-wide use of Mr. Zimmermann's software has altered forever 
notions of government surveillance, electronic privacy and export bans on
cryptography.  Until recently, difficult codes could always be deciphered
by stealing the key that unraveled the encryption puzzle....
 
KEYS ARE THE KEY
But PGP, like a growing number of encryption programs, takes advantage of
a new, mathematically sophisticated encrypting technology that requires two
different keys, both of which are necessary to unlock the puzzle.  The sender
needs only one to send a message.  The receiver decodes the message with the
second key - which never needs to leave his computer, where it can be
protected by passwords from easy pilfering.  Although the mathematics are
daunting, the program makes the process quick and straightforward.
 
In an age when computers can whip up codes of devilish complexity and
zip them around the globe for anyone with a personal computer, the lot of
the encryption policeman is not a happy one.  The Internet alone reaches 20
million people. "The genie is out of the bottle," says Leonard Mikus,
president of ViaCrypt, a Phoenix company that sells a $100 version of PGP in
the U.S. "There's no way anybody can stop the technology."....
 
THE PERSONAL TOUCH
 .... Mr. Zimmermann stopped consulting and holed up in the computer-filled
workroom in the back of a bungalow in Boulder, where he lives with his wife
and two children.  He said he spent six months of 12-hour days writing the
program, drained his family's savings and missed five months of mortgage
payments.  He finished the program in June 1991, and named it Pretty Good
Privacy - in deference to Ralph's Pretty Good Grocery in humorist Garrison
Keillor's Prairie Home Companion radio show.
 
When Mr. Zimmermann was through, he gave the encryption program to friends. 
One of them, whom he won't identify, placed it on the Internet, sometime
around June or July 1991, he says.  Once there, any computer user in the
world with access to the Internet could download it.  Almost immediately,
many did.
 
But federal laws covering munitions prohibit exporting encryption software
without a license.  A year ago, U.S. Customs Service agents asked Mr.
Zimmermann how his software went overseas.  In September the U.S. Attorney's
office in San Jose, which has expertise on computer crimes because of its
proximity to Silicon Valley, told Mr. Zimmermann that he was a target of an
investigation....
 
For human-rights advocates, the consequences of compromised sources can
be devastating.  Daniel Salcedo, who works for the Human Rights Project of
the American Association for the Advancement of Science in Washington,
PAGE BREAKPAGE 24
 
teaches activists in El Salvador and Guatemala to use PGP.  "In this
business, lots of people have been killed," Mr. Salcedo says.
 
Alan Dawson, a writer living in Thailand, says rebels opposing the regime
in neighboring Burma are using PGP to encrypt information sent among rebel
groups.  Before use of PGP became widespread, Mr. Dawson wrote Mr.
Zimmermann, "captured documents have resulted directly in arrests, including
whole families and their torture and death."
 
 ...Mr. Zimmermann says he is disturbed by criminal use of encryption, but
thinks the benefit of providing electronic privacy to everyone outweighs the
costs.  "It is impossible to obtain real privacy in the information age
without good cryptography," he says.  Encryption also raises some eyebrows
inside corporations.  Mr. Bass, the Washington lawyer, notes that most
companies assert the right to read employees' e-mail, since it is composed on
their computers and travels their networks.  "What will they do when people
start encrypting messages to each other?" he asks.
 
Without e-mail encryption, widespread surveillance would be easier.  In 
theory, CIA, FBI and police computers could tap telephone cables and look for
key words such as "missile" or "bomb" to find people who needed closer
watching.  Mr. Zimmermann says: "This is analogous to drift-net fishing."
 
Computerized encryption "is a technology that for a change benefits our civil
liberties," he adds.  "The government law-enforcement agencies have benefited
from many technologies," such as telephones that made wire-tapping
undetectable.  In fact, Mr. Zimmermann is currently seeking funding for a
project to create a phone that uses a personal computer equipped with
a microphone and a speaker, to encrypt voice conversations just as PGP
encrypts data exchanges....
________________________________________________________________________
For detailed information on how to get a free copy of PGP, contact BurmaNet
by e-mail message at:
 
  strider@xxxxxxxxxxx
 
You can also get PGP by yourself.  PGP is generally distributed over the
Internet using a program called File-Transfer-Protocal (FTP).  Under U.S.
law, it is illegal to export PGP from the United States.  You can get around
this however by getting PGP from one of the many sites in Europe that carry
it.  If you know how to use FTP, log-on to nic.funet.fi (128.214.6.100) and
look for any of the following files.
 
        /pub/crypt/pgp23.zip
        /pub/crypt/pgp23src.zip
        /pub/crypt/pgp23.tar.Z
        /pub/crypt/MacPGP2.2
 
 
For detailed instructions on how to use FTP, purchase one of the Internet
manuals suggested earlier in this document.
PAGE BREAKPAGE 25
______________________________________________________
 
MISCELLANEOUS
______________________________________________________
 
_________
 
Equipment and Electricity
_________
 
As a rule, the best place in Thailand to find computer books and software is
the Book Chest-Siam Square.  For computer equipment, supplies and repairs, go
to one of the many shops in Panthip Plaza.
 
Most computer equipment in Thailand is significantly more expensive than in
Singapore, Hong Kong or the United States.  Equipment manufactured in
Thailand is competitively priced but unfortunately, is limited to inferior
IBM-compatible desktop computers.   Mailing computer equipment into Thailand
is risky because it is likely to be held until an import duty is paid.  The
duty is expensive and the process time-consuming.  If possible, laptops,
modems and other difficult to find equipment should be purchased abroad,
removed from their original packaging and taken in as carry-on luggage.
 
Electric current in Thailand is 220v 50hz.  Converters for 110v-220v are
readily available in most department stores, but if possible, get 220v or
variable 110/220v equipment.
 
_________
 
Request for Comments or Suggestions
_________
BurmaNet would like to know if you find this publication helpful.  Also, if
you have any suggestions for improving this guide, please contact BurmaNet:
 
Snailmail:     1267 11th Avenue, #3        E-mail:     strider@xxxxxxxxxxx
               San Francisco, CA 94122
               USA
_________
 
New Edition Planned
_________
This is the second edition of the Bangkok-To-Burma guide.  A third edition is
planned for release in mid-1994.  Planned revisions include:
 
1    Instructions for sending documents written in Burmese, Karen, Mon or
     Kachin fonts
2    More information on communications software and connecting to the
     Internet using a Macintosh computer.
3    Instructions for getting and using the DOS or Mac version of the data
     encryption program PGP ver. 2.6 as well as a PGPShell program that makes
     use of PGP easier and faster
4    Directions for finding Burma-related material on the Internet using
     Gopher, Veronica, WWW, hytelnet.
PAGE BREAKPAGE 26
 
Appendix 1: List of BBSs in Bangkok
 
          ==========================================================     
          Piyabute Fuangkhon's BBS LIST Update 05/30/1994 Revision A     
          ==========================================================     
                            Khun Piyabute Fuangkhon                      
                    Mathayom 6 Bodindecha (Sing Singhaseni)              
                         Telephone Number 66 2 3747811                   
          * Please tell me, if you have new information about BBSs *     
     ----------------------------------------------------------------------
                           Includes UNIX HOST Systems                     
     ----------------------------------------------------------------------
BANGKOK Online Listing 
 
     IMMMMMMMMMMMMMMMMMMMMMMMMKMKMMMMMMMMKMMMMMMMMKMMMMMMMMMMMMMMMKMMMMMMM;
     : BULLETIN BOARD SYSTEM  :S:Data/Fax:Phone(s):  Online Time  : Speed :
     LMMMMMMMMMMMMMMMMMMMMMMMMNMNMMMMMMMMNMMMMMMMMNMMMMMMMMMMMMMMMNMMMMMMM9
     : Abyss                  : :526-6530:   -    :2230-0600      :144    :
     : Ansi&Rip Tech.         : :287-3421:   -    :24 Hours       :144    :
     :                        : :287-3422:   -    :24 Hours       :144    :
     :                        : :286-2287:   -    :24 Hours       :144    :
     :                        : :286-2932:   -    :24 Hours       :144    :
     :                        : :286-2367:   -    :24 Hours       :144    :
     : Aqua                   :T:279-9867:279-9867:24 Hours       :144    :
     : AU Net                 : :300-4541:   -    :24 Hours       :096    :
     : BIOS                   : :570-5198:   -    :24 Hours       :144,19Z:
     : BUG III                : :381-3109:   -    :24 Hours       :144    :
     : CCAN                   : :428-5615:   -    :1900-0700      :096    :
     : Computer Time          : :391-9002:   -    :1800-0600 Mo-Fr:096    :
     :                        : :   -    :   -    :1300-0600 Sa   :096    :
     :                        : :   -    :   -    :24 Hours  Su   :096    :
     : DataNet                : :251-7157:   -    :24 Hours       :096    :
     : DataWay                : :437-2085:   -    :24 Hours       :144    :
     : Eternity               : :374-3384:   -    :1800-0600      :144    :
     :                        : :381-2632:392-3709:24 Hours       :144,19Z:
     : Flash                  : :224-7110:   -    :24 Hours       :144,19Z:
     :                        : :   -    :   -    :Open 04 June 94:       :
     : GODS                   : :215-4312:215-4312:2300-1530 Mo-Fr:144,19Z:
     :                        : :   -    :   -    :2300-0800 Fr-Sa:       :
     :                        : :   -    :   -    :2300-2300 Sa-Su:       :
     : Graphic Vision         : :319-7916:   -    :24 Hours       :024    :
     : Great                  : :225-2415:   -    :1900-1200      :144    :
     : Green Leaf             : :399-2616:   -    :24 Hours       :144    :
     :                        : :331-3638:   -    :24 Hours       :024    :
     : Guacomole              : :275-4966:   -    :24 Hours       :144    :
     : Infoserve              : :509-5354:   -    :24 Hours       :144    :
     : KMIT North             : :587-8261:   -    :24 Hours       :144    :
     : Mac Attack             : :235-2196:   -    :22:00-07:00    :144,16Z:
     :                        : :235-7901:   -    :24 Hours       :144    :
     :                        : :235-8286:   -    :24 Hours       :144    :
     : Magic                  : :249-1513:   -    :24 Hours       :144,16Z:
     : Man                    : :517-2652:517-1414:2000-0900 Tu-Fr:144    :
PAGE BREAKPAGE 27
 
     IMMMMMMMMMMMMMMMMMMMMMMMMKMKMMMMMMMMKMMMMMMMMKMMMMMMMMMMMMMMMKMMMMMMM;
     :                        : :   -    :517-2424:24 Hours  Sa-Mo:       :
     : ManNet OS              : :276-9850:   -    :24 Hours       :096    :
     : March                  : :256-0440:   -    :24 Hours       :144,19Z:
     : Maya                   : :316-6302:   -    :0900-2400      :144,16Z:
     : MUA-TCG                : :245-8927:246-6333:24 Hours       :144,16Z:
     :                        : :245-8926:   -    :24 Hours       :144,16Z:
     :                        : :246-6522:   -    :24 Hours       :144,16Z:
     :                        : :246-6356:   -    :24 Hours       :144,16Z:
     : NetwaX                 : :583-8748:   -    :1800-0600      :144    :
     : OuterNet               : :939-8627:   -    :1800-0900 Mo-Sa:xxx    :
     : Phoenix                : :255-7540:   -    :24 Hours       :144    :
     : PhotoMania             : :578-0020:   -    :24 Hours       :144,19Z:
     : Post Database          : :240-3671:   -    :24 Hours       :144    :
     :                        : :240-3672:   -    :24 Hours       :096    :
     : Scuba                  : :578-1018:   -    :24 Hours       :144    :
     :                        : :578-0419:   -    :24 Hours       :024    :
     : SDB                    : :251-2227:   -    :1700-0700      :144    :
     :                        : :652-7459:   -    :1700-0700      :144    :
     : Seagate                : :531-8111:   -    :24 Hours       :096    :
     : Seta                   : :259-7526:   -    :1900-0700 Su-Fr:144,16Z:
     :                        : :   -    :   -    :24 Hours  Sa   :       :
     : SIS                    : :392-5020:   -    :1800-0900 Mo-Fr:144    :
     :                        : :   -    :   -    :24 Hours  Sa-Su:       :
     : SmashingNet            : :390-2435:382-0424:24 Hours       :144,19Z:
     : SML-Net                : :412-9172:   -    :24 Hours       :144,19Z:
     :                        : :412-9173:   -    :24 Hours       :144,19Z:
     :                        : :412-9174:   -    :24 Hours       :144,19Z:
     :                        : :412-9175:   -    :24 Hours       :144,19Z:
     :                        : :411-4469:   -    :24 Hours       :144,19Z:
     : Strike                 :*:581-1071:   -    :2100-1800      :144,19Z:
     :                        : :   -    :   -    :Open 30 May 94 :144,19Z:
     : TECC                   : :516-4550:   -    :2030-0800      :144,19Z:
     : Thaisoft               : :236-9945:   -    :24 Hours       :024    :
     : The BBS!               : :570-1778:   -    :24 Hours       :144    :
     :                        : :570-1779:   -    :24 Hours       :144    :
     :                        : :570-1785:   -    :24 Hours       :288    :
     :                        : :570-1793:   -    :24 Hours       :144,19Z:
     : TOPS                   : :253-5851:   -    :1800-0800 Mo-Fr:144    :
     :                        : :   -    :   -    :24 Hours  Sa-Su:       :
     : Visual                 : :300-5281:300-5278:24 Hours       :144    :
     : War on Virus           : :252-5087:   -    :24 Hours       :144    :
     : Zeus                   : :273-9069:   -    :1800-0600 Mo-Fr:       :
     HMMMMMMMMMMMMMMMMMMMMMMMMJMJMMMMMMMMJMMMMMMMMJMMMMMMMMMMMMMMMJMMMMMMM<
 
PAGE BREAKPAGE 28
 
Appendix 2: UP-COUNTRY Online Listing 
 
     IMMMMMMMMMMMMMMMMMMMMMMMMKMKMMMMMMMMMMKMMMMMMKMMMMMMMMMMMMMMMKMMMMMMM;
     : BULLETIN BOARD SYSTEM  :S: Data/Fax :Phone :  Online Time  : Speed :
     LMMMMMMMMMMMMMMMMMMMMMMMMNMNMMMMMMMMMMNMMMMMMNMMMMMMMMMMMMMMMNMMMMMMM9
     : Blackmail (Rayong)     : :038-225741:      :24 Hours       :144    :
     : Chiangmai Univer.      : :053-217149:      :24 Hours       :024    :
     : TG (Chiang Mai)        : :053-249316:243589:1800-0700      :144    :
     : Dark Coder (Chiang Mai): :053-560021:512171:0800-2000      :144    :
     : Pulse (Khorat)         : :044-255334:      :24 Hours       :144    :
     : RDI (Khon Kaen)        : :043-244506:      :24 Hours       :024    :
     : Thesis Maker (Rayong/  : :038-381725:      :1800-1100 Mo-Fr:144,19Z:
     :              Chonburi) : :   -      :      :24 Hours  Sa-Su:       :
     HMMMMMMMMMMMMMMMMMMMMMMMMJMJMMMMMMMMMMJMMMMMMJMMMMMMMMMMMMMMMJMMMMMMM<
 
     Status Explanation
     ==================
      = Support 28,800 BPS V.34 or V.Fast
      = Change Online Time
     * = Recommend New BBS
     N = No Have Information
     T = Temporary Down System
 
Appendix 3: NECTEC's UNIX HOST Dial-up Phone Listing 
 
     IMMMMMMMMMMMMMMMMMMMMMMMMMMKMMMMMMMMKMMMMMMMMKMMMMMMMMMMMMMMMKMMMMMMM;
     : NECTEC's UNIX HOST       :Data/Fax: Phones :  Online Time  : Speed :
     LMMMMMMMMMMMMMMMMMMMMMMMMMMNMMMMMMMMNMMMMMMMMNMMMMMMMMMMMMMMMNMMMMMMM9
     : ThaiSarn                 :248-8070:248-8078:24 Hours       :144    :
     : - nwg.nectec.or.th       :248-8071:/621    :24 Hours       :144    :
     : - morakot.nectec.or.th   :248-8072:        :24 Hours       :144    :
     : - senior.nectec.or.th    :248-8073:        :24 Hours       :144    :
     : - ftp.nectec.or.th       :248-8074:        :24 Hours       :144    :
     : - nexus.nectec.or.th     :248-8075:        :24 Hours       :144    :
     :                          :248-8076:        :24 Hours       :144    :
     :                          :248-8080:        :2000-1600 Mo-Fr:144    :
     :                          :        :        :24 Hours  Sa-Su:144    :
     :                          :248-8081:        :2000-1600 Mo-Fr:144    :
     :                          :        :        :24 Hours  Sa-Su:144    :
     :                          :248-8082:        :2000-1600 Mo-Fr:144    :
     :                          :        :        :24 Hours  Sa-Su:144    :
     :                          :248-8083:        :2000-1600 Mo-Fr:144    :
     :                          :        :        :24 Hours  Sa-Su:144    :
     :                          :248-8084:        :2000-1600 Mo-Fr:144    :
     :                          :        :        :24 Hours  Sa-Su:144    :
     HMMMMMMMMMMMMMMMMMMMMMMMMMMJMMMMMMMMJMMMMMMMMJMMMMMMMMMMMMMMMJMMMMMMM<
     - Fee for NECTEC account...
       Service A: 20 Hours/Month  600KB/200KB    300 baht/month/person
       Service B: 30 Hours/Month 1024KB/200KB    500 baht/month/person
       Fee for new user                          300 baht/person
       Option  D: Add each 200KB                 100 baht/month/person
       Option  T: Add each 10 Hours/Month        100 baht/month/person