HP OpenVMS Systems Documentation

Content starts here

OpenVMS User's Manual

Begin Index

Contents (summary)
Preface Preface
Chapter 1 Getting Started with the OpenVMS Operating System
Chapter 2 Using DCL to Interact with the System
Chapter 3 Storing Information with Files
Chapter 4 Organizing Files with Directories
Chapter 5 Extended File Specifications
Chapter 6 Using Disk and Tape Drives
Chapter 7 Using Mail to Communicate with Others
Chapter 8 Editing Text Files with EVE
Chapter 9 Sorting and Merging Files
Chapter 10 Controlling Access to Resources
Chapter 11 Defining Logical Names for Devices and Files
Chapter 12 Defining Symbols, Commands, and Expressions
Chapter 13 Introduction to Command Procedures
Chapter 14 Advanced Programming with DCL
Chapter 15 Using Lexical Functions to Obtain and Manipulate Information
Chapter 16 Understanding Processes and Batch Jobs
Appendix A Character Sets
Appendix B Annotated Command Procedures


Preface Preface
Chapter 1
1 Getting Started with the OpenVMS Operating System
     1.1     Logging In
         1.1.1         Successful Logins
         1.1.2         Login Errors
     1.2     Logging In From a PC
     1.3     Choosing Passwords for Your Account
         1.3.1         Obtaining Your Initial Password
         1.3.2         Changing Your Initial Password
         1.3.3         Restrictions on Passwords
         1.3.4         Types of Passwords
         1.3.5         Entering a System Password
         1.3.6         Entering a Secondary Password
         1.3.7         Password Requirements for Different Types of Accounts
     1.4     Reading Informational Messages
         1.4.1         Suppressing Messages
         1.4.2         Successful Login Messages
     1.5     Types of Logins and Login Classes
         1.5.1         Interactive Logins
         1.5.2         Noninteractive Logins
     1.6     Login Failures
         1.6.1         Terminals That Require System Passwords
         1.6.2         Login Class Restrictions
         1.6.3         Shift Restrictions
         1.6.4         Batch Jobs During Shift Restrictions
         1.6.5         Failures During Dialup Logins
         1.6.6         Break-In Evasion Procedures
     1.7     Changing Passwords
         1.7.1         Selecting Your Own Password
         1.7.2         Using Generated Passwords
         1.7.3         Generated Passwords: Disadvantages
         1.7.4         Changing a Secondary Password
         1.7.5         Changing Passwords at Login
     1.8     Password and Account Expiration Times
         1.8.1         Expired Passwords
         1.8.2         Using Secondary Passwords
         1.8.3         Failure to Change Passwords
         1.8.4         Expired Accounts
     1.9     Guidelines for Protecting Your Password
     1.10     Recognizing System Responses
         1.10.1         Default Actions
         1.10.2         Informational System Messages
         1.10.3         System Error Messages
         1.10.4         Checking Your Current Process
     1.11     Getting Help About the System
         1.11.1         Using Online Help
         1.11.2         Getting Help on Specific Commands
         1.11.3         Getting Help on System Messages
     1.12     Logging Out of the System
         1.12.1         Obtaining Accounting Information
         1.12.2         Ending a Remote Session
         1.12.3         Lost Network Connections
     1.13     Logging Out Without Compromising System Security
     1.14     Networks
         1.14.1         Network Nodes
         1.14.2         Executing Programs over Networks
Chapter 2
2 Using DCL to Interact with the System
     2.1     Entering Commands
         2.1.1         Usage Modes
         2.1.2         Types of DCL Commands
     2.2     The DCL Command Line
         2.2.1         Syntax
         2.2.2         Canceling Commands
         2.2.3         Using Defaults
         2.2.4         Entering Multiple Line Commands
     2.3     Rules for Entering DCL Commands
     2.4     Entering Parameters
     2.5     Entering Qualifiers
         2.5.1         Command Qualifiers
         2.5.2         Positional Qualifiers
         2.5.3         Parameter Qualifiers
         2.5.4         Conflicting Qualifiers
         2.5.5         Values Accepted by Qualifiers
     2.6     Entering Dates and Times as Values
         2.6.1         Absolute Time Format
         2.6.2         Delta Time Format
         2.6.3         Combination Time Format
     2.7     Recalling Commands
         2.7.1         Pressing Ctrl/B
         2.7.2         Using Arrow Keys
         2.7.3         Using the RECALL Command
     2.8     Editing the DCL Command Line
         2.8.1         SET TERMINAL Command
         2.8.2         Deleting Parts of the Command Line
     2.9     Defining Terminal Keys
     2.10     Key Sequences
Chapter 3
3 Storing Information with Files
     3.1     Understanding File Names and File Specifications
         3.1.1         Providing a Complete File Specification
         3.1.2         Rules for File Specifications
         3.1.3         Default File Types Used by DCL Commands
         3.1.4         Default File Types for Language Source Programs
         3.1.5         File Versions
         3.1.6         Network Node Names
         3.1.7         Specifying DECnet-Plus Node Full Names
         3.1.8         Specifying TCP/IP Names and Addresses
         3.1.9         Accessing Files on Remote Nodes Using DECnet
         3.1.10         Accessing Files on Remote Nodes Using TCP/IP
         3.1.11         Using Network File Specifications
                Conventional File Specification
                Foreign File Specification
                Task Specification Strings
         3.1.12         Access Control String Format
     3.2     Using Wildcards with File Names
         3.2.1         Asterisk (*) Wildcard Character
         3.2.2         Percent Sign (%) Wildcard Character
     3.3     Other File Names
         3.3.1         Null File Names and File Types
                File References with Null File Types
         3.3.2         Alternate File Names for Magnetic Tapes
     3.4     Creating and Modifying Files
         3.4.1         Creating Files
         3.4.2         Copying Files
         3.4.3         File Concatenation
         3.4.4         Copying Files from a Remote Node to Your Node Using DECnet
         3.4.5         Copying Files from Your Node to a Remote Node Using DECnet
         3.4.6         Copying Files on Remote Systems Using TCP/IP
         3.4.7         Using Access Control Strings to Copy Files
         3.4.8         Renaming Files
     3.5     Displaying the Contents of Files
         3.5.1         Using the TYPE Command
         3.5.2         Controlling the Display
         3.5.3         Displaying Files on Remote Nodes
         3.5.4         Displaying Files with Wildcards
         3.5.5         Displaying Multiple Files
     3.6     Deleting Files
         3.6.1         Using the PURGE Command
     3.7     Protecting Files from Other Users
         3.7.1         Access Control Lists (ACLs)
         3.7.2         Types of Protection
     3.8     Printing Files
         3.8.1         Print Job Priority
         3.8.2         Displaying Queue Information
         3.8.3         Print Forms
         3.8.4         Stopping a Print Job
         3.8.5         Printing Files on Other Nodes
         3.8.6         PRINT Command Qualifiers
         3.8.7         WWPPS Utility (Alpha Only)
                Invoking WWPPS
                WWPPS Utility Commands

Previous Next Contents Index