HP OpenVMS Systems Documentation

Content starts here

OpenVMS User's Manual

Begin Index

Contents (summary)
Preface Preface
Chapter 1 Introduction: OpenVMS Concepts and Definitions
Chapter 2 Getting Started: Interacting with the OpenVMS Operating System
Chapter 3 The DIGITAL Command Language: Interacting with the System
Chapter 4 Files: Storing Information
Chapter 5 Directories: Organizing and Managing Files
Chapter 6 Mail: Communicating with Other Users
Chapter 7 Phone: Communicating with Other Users
Chapter 8 Editing Text Files: Using EVE
Chapter 9 Editing Text Files: Using EDT
Chapter 10 DIGITAL Standard Runoff (DSR): Formatting Text Files
Chapter 11 Sort/Merge Utility: Sorting and Merging Files
Chapter 12 Devices: Using Private Tapes and Disks
Chapter 13 Logical Names: Defining Names for Devices and Files
Chapter 14 Programming with DCL: Defining Symbols, Commands, and Expressions
Chapter 15 Programming with DCL: Introduction to Command Procedures
Chapter 16 Advanced Programming with DCL
Chapter 17 Lexical Functions: Obtaining and Manipulating Information
Chapter 18 Processes and Batch Jobs: Using the OpenVMS Environment
Chapter 19 Security: Controlling Access to Resources
Appendix A Customizing EVE
Appendix B Character Sets
Appendix C Annotated Command Procedures
Appendix D Terminal Keys


Preface Preface
Chapter 1
1 Introduction: OpenVMS Concepts and Definitions
     1.1     Logging In to the System
         1.1.1         Access Requirements
     1.2     Networks
         1.2.1         Network Nodes
         1.2.2         Executing Programs over Networks
     1.3     DIGITAL Command Language (DCL)
         1.3.1         Usage Modes
         1.3.2         Types of DCL Commands
         1.3.3         DCL Command Line
     1.4     Files and Directories
         1.4.1         File Name, File Type, and File Version
         1.4.2         Directory Structures
         1.4.3         Subdirectories
         1.4.4         File Specifications
         1.4.5         Characters for Directory and File Names
                Base Character Set
                Extended Character Set
     1.5     OpenVMS Utilities
         1.5.1         Mail and MIME Utilities
         1.5.2         Phone Utility
         1.5.3         Text Editors
         1.5.4         DIGITAL Standard Runoff (DSR)
         1.5.5         Sort/Merge Utility
     1.6     Devices
         1.6.1         Mass Storage Devices
         1.6.2         Record-Oriented Devices
         1.6.3         Disks and Magnetic Tapes
     1.7     Logical Names
         1.7.1         Readability
         1.7.2         File Independence
     1.8     Symbols
     1.9     Command Procedures
         1.9.1         System Login Command Procedures
         1.9.2         Personal Login Command Procedures
     1.10     Lexical Functions
     1.11     Processes and Programs
         1.11.1         User Authorization Files (UAFs)
         1.11.2         Creating Image Files
     1.12     System Security
         1.12.1         Protected Objects
Chapter 2
2 Getting Started: Interacting with the OpenVMS Operating System
     2.1     Logging In to the System
         2.1.1         Successful Logins
         2.1.2         Login Errors
     2.2     Choosing Passwords for Your Account
         2.2.1         Obtaining Your Initial Password
         2.2.2         Changing Your Initial Password
         2.2.3         Restrictions on Passwords
         2.2.4         Types of Passwords
         2.2.5         Entering a System Password
         2.2.6         Entering a Secondary Password
         2.2.7         Password Requirements for Different Types of Accounts
     2.3     Reading Informational Messages
         2.3.1         Suppressing Messages
         2.3.2         Successful Login Messages
     2.4     Types of Logins and Login Classes
         2.4.1         Interactive Logins
         2.4.2         Noninteractive Logins
     2.5     Login Failures
         2.5.1         Terminals That Require System Passwords
         2.5.2         Login Class Restrictions
         2.5.3         Shift Restrictions
         2.5.4         Batch Jobs During Shift Restrictions
         2.5.5         Failures During Dialup Logins
         2.5.6         Break-In Evasion Procedures
     2.6     Changing Passwords
         2.6.1         Selecting Your Own Password
         2.6.2         Using Generated Passwords
         2.6.3         Generated Passwords: Disadvantages
         2.6.4         Changing a Secondary Password
         2.6.5         Changing Passwords at Login
     2.7     Password and Account Expiration Times
         2.7.1         Expired Passwords
         2.7.2         Using Secondary Passwords
         2.7.3         Failure to Change Passwords
         2.7.4         Expired Accounts
     2.8     Guidelines for Protecting Your Password
     2.9     Recognizing System Responses
         2.9.1         Default Actions
         2.9.2         Informational System Messages
         2.9.3         System Error Messages
         2.9.4         Checking Your Current Process
     2.10     Getting Help About the System
         2.10.1         Using Online Help
         2.10.2         Getting Help on Specific Commands
         2.10.3         Getting Help on System Messages
     2.11     Logging Out of the System
         2.11.1         Obtaining Accounting Information
         2.11.2         Ending a Remote Session
         2.11.3         Lost Network Connections
     2.12     Logging Out Without Compromising System Security
         2.12.1         Reasons to Clear Your Terminal Screen
         2.12.2         Disposing of Hardcopy Output
         2.12.3         Breaking the Connection to a Dialup Line

Previous Next Contents Index