Preface |
Preface
|
Preface
|
Chapter 1 |
1
|
Getting Started with the OpenVMS Operating System
|
1.1
|
Logging In
|
1.1.1
|
Successful Logins
|
1.1.2
|
Login Errors
|
1.2
|
Logging In From a PC
|
1.3
|
Choosing Passwords for Your Account
|
1.3.1
|
Obtaining Your Initial Password
|
1.3.2
|
Changing Your Initial Password
|
1.3.3
|
Restrictions on Passwords
|
1.3.4
|
Types of Passwords
|
1.3.5
|
Entering a System Password
|
1.3.6
|
Entering a Secondary Password
|
1.3.7
|
Password Requirements for Different Types of Accounts
|
1.4
|
Reading Informational Messages
|
1.4.1
|
Suppressing Messages
|
1.4.2
|
Successful Login Messages
|
1.5
|
Types of Logins and Login Classes
|
1.5.1
|
Interactive Logins
|
1.5.2
|
Noninteractive Logins
|
1.6
|
Login Failures
|
1.6.1
|
Terminals That Require System Passwords
|
1.6.2
|
Login Class Restrictions
|
1.6.3
|
Shift Restrictions
|
1.6.4
|
Batch Jobs During Shift Restrictions
|
1.6.5
|
Failures During Dialup Logins
|
1.6.6
|
Break-In Evasion Procedures
|
1.7
|
Changing Passwords
|
1.7.1
|
Selecting Your Own Password
|
1.7.2
|
Using Generated Passwords
|
1.7.3
|
Generated Passwords: Disadvantages
|
1.7.4
|
Changing a Secondary Password
|
1.7.5
|
Changing Passwords at Login
|
1.8
|
Password and Account Expiration Times
|
1.8.1
|
Expired Passwords
|
1.8.2
|
Using Secondary Passwords
|
1.8.3
|
Failure to Change Passwords
|
1.8.4
|
Expired Accounts
|
1.9
|
Guidelines for Protecting Your Password
|
1.10
|
Recognizing System Responses
|
1.10.1
|
Default Actions
|
1.10.2
|
Informational System Messages
|
1.10.3
|
System Error Messages
|
1.10.4
|
Checking Your Current Process
|
1.11
|
Getting Help About the System
|
1.11.1
|
Using Online Help
|
1.11.2
|
Getting Help on Specific Commands
|
1.11.3
|
Getting Help on System Messages
|
1.12
|
Logging Out of the System
|
1.12.1
|
Obtaining Accounting Information
|
1.12.2
|
Ending a Remote Session
|
1.12.3
|
Lost Network Connections
|
1.13
|
Logging Out Without Compromising System Security
|
1.14
|
Networks
|
1.14.1
|
Network Nodes
|
1.14.2
|
Executing Programs over Networks
|
Chapter 2 |
2
|
Using DCL to Interact with the System
|
2.1
|
Entering Commands
|
2.1.1
|
Usage Modes
|
2.1.2
|
Types of DCL Commands
|
2.2
|
The DCL Command Line
|
2.2.1
|
Syntax
|
2.2.2
|
Canceling Commands
|
2.2.3
|
Using Defaults
|
2.2.4
|
Entering Multiple Line Commands
|
2.3
|
Rules for Entering DCL Commands
|
2.4
|
Entering Parameters
|
2.5
|
Entering Qualifiers
|
2.5.1
|
Command Qualifiers
|
2.5.2
|
Positional Qualifiers
|
2.5.3
|
Parameter Qualifiers
|
2.5.4
|
Conflicting Qualifiers
|
2.5.5
|
Values Accepted by Qualifiers
|
2.6
|
Entering Dates and Times as Values
|
2.6.1
|
Absolute Time Format
|
2.6.2
|
Delta Time Format
|
2.6.3
|
Combination Time Format
|
2.7
|
Recalling Commands
|
2.7.1
|
Pressing Ctrl/B
|
2.7.2
|
Using Arrow Keys
|
2.7.3
|
Using the RECALL Command
|
2.8
|
Editing the DCL Command Line
|
2.8.1
|
SET TERMINAL Command
|
2.8.2
|
Deleting Parts of the Command Line
|
2.9
|
Defining Terminal Keys
|
2.10
|
Key Sequences
|
Chapter 3 |
3
|
Storing Information with Files
|
3.1
|
Understanding File Names and File Specifications
|
3.1.1
|
Providing a Complete File Specification
|
3.1.2
|
Rules for File Specifications
|
3.1.3
|
Default File Types Used by DCL Commands
|
3.1.4
|
Default File Types for Language Source Programs
|
3.1.5
|
File Versions
|
3.1.6
|
Network Node Names
|
3.1.7
|
Specifying DECnet-Plus Node Full Names
|
3.1.8
|
Specifying TCP/IP Names and Addresses
|
3.1.9
|
Accessing Files on Remote Nodes Using DECnet
|
3.1.10
|
Accessing Files on Remote Nodes Using TCP/IP
|
3.1.11
|
Using Network File Specifications
|
3.1.11.1
|
Conventional File Specification
|
3.1.11.2
|
Foreign File Specification
|
3.1.11.3
|
Task Specification Strings
|
3.1.12
|
Access Control String Format
|
3.2
|
Using Wildcards with File Names
|
3.2.1
|
Asterisk (*) Wildcard Character
|
3.2.2
|
Percent Sign (%) Wildcard Character
|
3.3
|
Other File Names
|
3.3.1
|
Null File Names and File Types
|
3.3.1.1
|
File References with Null File Types
|
3.3.2
|
Alternate File Names for Magnetic Tapes
|
3.4
|
Creating and Modifying Files
|
3.4.1
|
Creating Files
|
3.4.2
|
Copying Files
|
3.4.3
|
File Concatenation
|
3.4.4
|
Copying Files from a Remote Node to Your Node Using DECnet
|
3.4.5
|
Copying Files from Your Node to a Remote Node Using DECnet
|
3.4.6
|
Copying Files on Remote Systems Using TCP/IP
|
3.4.7
|
Using Access Control Strings to Copy Files
|
3.4.8
|
Renaming Files
|
3.5
|
Displaying the Contents of Files
|
3.5.1
|
Using the TYPE Command
|
3.5.2
|
Controlling the Display
|
3.5.3
|
Displaying Files on Remote Nodes
|
3.5.4
|
Displaying Files with Wildcards
|
3.5.5
|
Displaying Multiple Files
|
3.6
|
Deleting Files
|
3.6.1
|
Using the PURGE Command
|
3.7
|
Protecting Files from Other Users
|
3.7.1
|
Access Control Lists (ACLs)
|
3.7.2
|
Types of Protection
|
3.8
|
Printing Files
|
3.8.1
|
Print Job Priority
|
3.8.2
|
Displaying Queue Information
|
3.8.3
|
Print Forms
|
3.8.4
|
Stopping a Print Job
|
3.8.5
|
Printing Files on Other Nodes
|
3.8.6
|
PRINT Command Qualifiers
|
3.8.7
|
WWPPS Utility (Alpha Only)
|
3.8.7.1
|
Invoking WWPPS
|
3.8.7.2
|
WWPPS Utility Commands
|