1 / 233

; *****************************************************************

; *****************************************************************. ; * *. ; * CID.PPE V 1.50 *. ; * *.

aadi
Download Presentation

; *****************************************************************

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ; *****************************************************************

  2. ; * *

  3. ; * CID.PPE V 1.50 *

  4. ; * *

  5. ; * Written in PPL 3.0 for PCBoard 15.2 *

  6. ; * *

  7. ; * Designed By: Gary Meeker *

  8. ; * *

  9. ; * Began development: 04-06-93 *

  10. ; * *

  11. ; *****************************************************************

  12. ;

  13. ; This .PPE checks the secrity level of a user and if within the specified

  14. ; range, checks the Caller ID info for the phone number. If a number is

  15. ; found, then it writes it to the file specified.

  16. ;

  17. ; Usage:

  18. ;

  19. ; !CID.PPE C:\PCB\PPE\CID.CFG

  20. ;

  21. ; IF the configuration file is not specified, the CID.CFG in the same directory

  22. ; as CID.PPE will be used.

  23. ;

  24. STRING ConfigFile, CID, Private, Outside, Search, NameSearch, Temp

  25. STRING CIDFile, PrivateFile, OutsideFile, NoMatchFile, LockOutFile

  26. STRING BadNumFile, PCPNumFile, PCPUserFile, FileName, Label

  27. STRING HVPHONE, BDPHONE, PhoneNumber, Formatted, Filter

  28. BYTE SecLow, SecHigh, Pos, Offset, NamePos, NameOffset, X, Length

  29. BOOLEAN LogName, LogNoMatch, LogLockout, LogPCPursuit, HexFormat, CIDTest, Done

  30. ;Characters to Filter out of Users Record Phone Numbers

  31. Filter = " -()+"

  32. ;Parse the command line for possible ConfigFile

  33. GETTOKEN ConfigFile

  34. ;If not present use PPE info

  35. IF (ConfigFile = "") LET ConfigFile = PPEPATH() + PPENAME() + ".CFG"

  36. ;Read configuration file

  37. IF (EXIST(ConfigFile)) THEN

  38. FOPEN 1, ConFigFile, O_RD, S_DN

  39. FDEFIN 1

  40. FDGET Temp

  41. Search = REPLACE(Temp, CHR(255), " ")

  42. FDGET Temp

  43. NameSearch = REPLACE(Temp, CHR(255), " ")

  44. FDGET Temp

  45. TOKENIZE Temp

  46. GETTOKEN Private

  47. IF (Private="") LET Private = "P" 'usually indicates a PRIVATE number

  48. GETTOKEN Outside

  49. IF (Outside="") LET Outside = "O" 'usually indicates a OUTSIDE AREA number

  50. GETTOKEN SecLow

More Related