HP OpenVMS Systems Documentation
OpenVMS User's Manual
Begin
Index
Contents (summary)
Preface
Preface
Chapter 1
Getting Started with the OpenVMS Operating System
Chapter 2
Using DCL to Interact with the System
Chapter 3
Storing Information with Files
Chapter 4
Organizing Files with Directories
Chapter 5
Extended File Specifications
Chapter 6
Using Disk and Tape Drives
Chapter 7
Using Mail to Communicate with Others
Chapter 8
Editing Text Files with EVE
Chapter 9
Sorting and Merging Files
Chapter 10
Controlling Access to Resources
Chapter 11
Defining Logical Names for Devices and Files
Chapter 12
Defining Symbols, Commands, and Expressions
Chapter 13
Introduction to Command Procedures
Chapter 14
Advanced Programming with DCL
Chapter 15
Using Lexical Functions to Obtain and Manipulate Information
Chapter 16
Understanding Processes and Batch Jobs
Appendix A
Character Sets
Appendix B
Annotated Command Procedures
Glossary
Index
Figures
Examples
Tables
Contents
Preface
Preface
Preface
Chapter 1
1
Getting Started with the OpenVMS Operating System
1.1
Logging In
1.1.1
Successful Logins
1.1.2
Login Errors
1.2
Logging In From a PC
1.3
Choosing Passwords for Your Account
1.3.1
Obtaining Your Initial Password
1.3.2
Changing Your Initial Password
1.3.3
Restrictions on Passwords
1.3.4
Types of Passwords
1.3.5
Entering a System Password
1.3.6
Entering a Secondary Password
1.3.7
Password Requirements for Different Types of Accounts
1.4
Reading Informational Messages
1.4.1
Suppressing Messages
1.4.2
Successful Login Messages
1.5
Types of Logins and Login Classes
1.5.1
Interactive Logins
1.5.2
Noninteractive Logins
1.6
Login Failures
1.6.1
Terminals That Require System Passwords
1.6.2
Login Class Restrictions
1.6.3
Shift Restrictions
1.6.4
Batch Jobs During Shift Restrictions
1.6.5
Failures During Dialup Logins
1.6.6
Break-In Evasion Procedures
1.7
Changing Passwords
1.7.1
Selecting Your Own Password
1.7.2
Using Generated Passwords
1.7.3
Generated Passwords: Disadvantages
1.7.4
Changing a Secondary Password
1.7.5
Changing Passwords at Login
1.8
Password and Account Expiration Times
1.8.1
Expired Passwords
1.8.2
Using Secondary Passwords
1.8.3
Failure to Change Passwords
1.8.4
Expired Accounts
1.9
Guidelines for Protecting Your Password
1.10
Recognizing System Responses
1.10.1
Default Actions
1.10.2
Informational System Messages
1.10.3
System Error Messages
1.10.4
Checking Your Current Process
1.11
Getting Help About the System
1.11.1
Using Online Help
1.11.2
Getting Help on Specific Commands
1.11.3
Getting Help on System Messages
1.12
Logging Out of the System
1.12.1
Obtaining Accounting Information
1.12.2
Ending a Remote Session
1.12.3
Lost Network Connections
1.13
Logging Out Without Compromising System Security
1.14
Networks
1.14.1
Network Nodes
1.14.2
Executing Programs over Networks
Chapter 2
2
Using DCL to Interact with the System
2.1
Entering Commands
2.1.1
Usage Modes
2.1.2
Types of DCL Commands
2.2
The DCL Command Line
2.2.1
Syntax
2.2.2
Canceling Commands
2.2.3
Using Defaults
2.2.4
Entering Multiple Line Commands
2.3
Rules for Entering DCL Commands
2.4
Entering Parameters
2.5
Entering Qualifiers
2.5.1
Command Qualifiers
2.5.2
Positional Qualifiers
2.5.3
Parameter Qualifiers
2.5.4
Conflicting Qualifiers
2.5.5
Values Accepted by Qualifiers
2.6
Entering Dates and Times as Values
2.6.1
Absolute Time Format
2.6.2
Delta Time Format
2.6.3
Combination Time Format
2.7
Recalling Commands
2.7.1
Pressing Ctrl/B
2.7.2
Using Arrow Keys
2.7.3
Using the RECALL Command
2.8
Editing the DCL Command Line
2.8.1
SET TERMINAL Command
2.8.2
Deleting Parts of the Command Line
2.9
Defining Terminal Keys
2.10
Key Sequences
Chapter 3
3
Storing Information with Files
3.1
Understanding File Names and File Specifications
3.1.1
Providing a Complete File Specification
3.1.2
Rules for File Specifications
3.1.3
Default File Types Used by DCL Commands
3.1.4
Default File Types for Language Source Programs
3.1.5
File Versions
3.1.6
Network Node Names
3.1.7
Specifying DECnet-Plus Node Full Names
3.1.8
Specifying TCP/IP Names and Addresses
3.1.9
Accessing Files on Remote Nodes Using DECnet
3.1.10
Accessing Files on Remote Nodes Using TCP/IP
3.1.11
Using Network File Specifications
3.1.11.1
Conventional File Specification
3.1.11.2
Foreign File Specification
3.1.11.3
Task Specification Strings
3.1.12
Access Control String Format
3.2
Using Wildcards with File Names
3.2.1
Asterisk (*) Wildcard Character
3.2.2
Percent Sign (%) Wildcard Character
3.3
Other File Names
3.3.1
Null File Names and File Types
3.3.1.1
File References with Null File Types
3.3.2
Alternate File Names for Magnetic Tapes
3.4
Creating and Modifying Files
3.4.1
Creating Files
3.4.2
Copying Files
3.4.3
File Concatenation
3.4.4
Copying Files from a Remote Node to Your Node Using DECnet
3.4.5
Copying Files from Your Node to a Remote Node Using DECnet
3.4.6
Copying Files on Remote Systems Using TCP/IP
3.4.7
Using Access Control Strings to Copy Files
3.4.8
Renaming Files
3.5
Displaying the Contents of Files
3.5.1
Using the TYPE Command
3.5.2
Controlling the Display
3.5.3
Displaying Files on Remote Nodes
3.5.4
Displaying Files with Wildcards
3.5.5
Displaying Multiple Files
3.6
Deleting Files
3.6.1
Using the PURGE Command
3.7
Protecting Files from Other Users
3.7.1
Access Control Lists (ACLs)
3.7.2
Types of Protection
3.8
Printing Files
3.8.1
Print Job Priority
3.8.2
Displaying Queue Information
3.8.3
Print Forms
3.8.4
Stopping a Print Job
3.8.5
Printing Files on Other Nodes
3.8.6
PRINT Command Qualifiers
3.8.7
WWPPS Utility (Alpha Only)
3.8.7.1
Invoking WWPPS
3.8.7.2
WWPPS Utility Commands
Previous
Next
Contents
Index