M |
MAIL command
|
/EDIT qualifier
|
/SUBJECT qualifier
|
Mail folders
|
creating
|
deleting
|
displaying list of
|
MAIL
|
NEWMAIL
|
selecting
|
WASTEBASKET
|
MAIL$INIT file
|
MAIL$INTERNET_MODE logical
|
MAIL$INTERNET_TRANSPORT logical
|
MAIL$KEYDEF.INI file
|
sample
|
MAIL.MAI file
|
Mail subdirectories
|
creating
|
MAIL$SYSTEM_FLAGS logical
|
Mail utility (MAIL)
|
appending files to messages
|
changes and enhancements
|
SET FORWARD command
|
deleting messages in
|
distribution lists
|
exchanging messages in
|
extracting messages to files
|
initialization files
|
invoking
|
keypad commands
|
problems and restrictions
|
replying to an address containing nested quotation marks
|
reading messages in #1
|
reading messages in #2
|
removing messages in
|
security measures
|
sending files
|
from DCL level
|
sending messages over the network
|
setting default editor in
|
summary of commands
|
transports
|
using EVE in #1
|
using EVE in #2
|
using text editors in
|
MAILEDIT.COM command procedure #1
|
MAILEDIT.COM command procedure #2
|
sample execution
|
MARK command
|
MERGE command
|
/KEY qualifier #1
|
/KEY qualifier #2
|
/NODUPLICATES qualifier
|
See also Sort/Merge utility
|
/STABLE qualifier
|
Message count
|
correcting in Mail
|
Messages
|
announcement
|
auditing
|
conventions used in system display
|
copying in Mail
|
during login
|
indicating command line error
|
informational
|
login failures #1
|
login failures #2
|
suppressing
|
system error
|
system responses to commands
|
MFDs (master file directories)
|
MIME$FILETYPES.DAT
|
MIME$MAILCAP.DAT
|
MIME utility
|
commands
|
encoding files
|
extracting files
|
MOUNT command #1
|
MOUNT command #2
|
/FOREIGN qualifier
|
format
|
Mount requests
|
Mounting volumes
|
and security audit
|
foreign
|
MOVE command
|
in Mail
|
Multinational character set
|
See DEC Multinational character set
|
Multiple file specifications
|
in a parameter list
|
N |
Network access control strings #1
|
Network access control strings #2
|
Network file specifications
|
conventional format
|
foreign file format
|
task specification strings
|
ULTRIX restrictions
|
Network nodes
|
local
|
remote
|
Networks
|
logout
|
losing connection to remote system
|
sending mail over
|
Node names
|
creating logical names
|
definition
|
format in file specifications
|
full
|
rules for entering
|
Nodes
|
local
|
Null characters
|
in DCL commands
|
Null values
|
for file names
|
for file types
|
Numbers
|
comparing #1
|
comparing #2
|
converting to string values
|
converting using lexical functions
|
evaluation of #1
|
evaluation of #2
|
integer values recognized by DCL #1
|
integer values recognized by DCL #2
|
integer values recognized by DCL #3
|
internal storage
|
Numeric expressions
|
and integer operands
|
Numeric overlays #1
|
Numeric overlays #2
|
Numeric overlays #3
|
O |
Object ownership
|
changing
|
Objects
|
changing security profile
|
displaying security profiles
|
security profiles
|
Octal numbers
|
in UIC directory specifications
|
ON command
|
setting Ctrl/Y action routines
|
ON CONTROL_Y command
|
enabling Ctrl/Y
|
OPEN command
|
in command procedures
|
creating logical names
|
process-permanent files
|
process-permanent logical names
|
OPEN SELECTED command
|
OpenVMS Cluster systems
|
device names
|
dual-pathed
|
format
|
node allocation class fields
|
OpenVMS screen management software
|
command recall
|
Operands
|
in character string expressions #1
|
in character string expressions #2
|
integer
|
Operators (mathematical)
|
order of evaluation
|
Output
|
from command procedures
|
redirecting from commands and images
|
Output streams
|
redirecting
|
Output strings
|
formatting with F$FAO lexical function
|
Overstrike mode
|
P |
Page and swap files
|
Parameter lists
|
defaults for multiple file specifications
|
multiple file specifications
|
Parameter qualifiers
|
Parameters
|
in DCL command lines
|
passing data to batch jobs with
|
passing data to nested command procedures with
|
specifying
|
as character strings
|
as integers
|
as null values
|
as symbols
|
using to pass data to command procedures
|
Password protection
|
dialup retries
|
Passwords
|
acceptable
|
automatically generated
|
changing
|
at login #1
|
at login #2
|
expired
|
frequency guidelines #1
|
frequency guidelines #2
|
secondary
|
using /NEW_PASSWORD qualifier
|
choosing
|
dual
|
expiration
|
failure to change
|
first
|
generated #1
|
generated #2
|
generated #3
|
generated #4
|
guessing
|
guidelines for choosing
|
high-risk
|
incorrect
|
initial
|
length #1
|
length #2
|
length #3
|
length #4
|
locked
|
new
|
omission in proxy login
|
open accounts and
|
primary #1
|
primary #2
|
protecting
|
reason for changing #1
|
reason for changing #2
|
restrictions
|
retries
|
reuse #1
|
reuse #2
|
secondary #1
|
secondary #2
|
entering
|
secure
|
setting a new one
|
supplying during dialups
|
system
|
causing login failures
|
entering
|
user
|
verifying change of
|
Percent sign (%)
|
as wildcard character
|
PID numbers
|
and process context
|
obtaining using F$PID lexical function
|
PIPE command #1
|
PIPE command #2
|
PIPE command #3
|
interrupting
|
Pipelines
|
Positional qualifiers
|
definition
|
PQL$_JTQUOTA quota list value
|
PQL_DJTQUOTA system parameter
|
PQL_MJTQUOTA system parameter
|
PRINT command
|
in Mail
|
qualifiers
|
Print jobs
|
delaying
|
executing
|
list of DCL commands to use with
|
obtaining multiple copies of
|
priorities
|
queue information
|
Print queues
|
controlling
|
Printing
|
landscape
|
Privileges
|
VOLPRO
|
Process contexts
|
list of characteristics #1
|
list of characteristics #2
|
list of characteristics #3
|
Processes
|
and job trees
|
changing characteristics using lexical functions
|
characteristics commonly changed
|
checking status with Ctrl/T
|
connecting to #1
|
connecting to #2
|
creating
|
definition
|
detached
|
disconnected #1
|
disconnected #2
|
logging out
|
displaying process rights identifiers
|
reconnecting
|
saving characteristics
|
Program stubs
|
in command procedures
|
replacing with commands
|
Programs
|
including in data files
|
Prompts
|
DCL
|
Protection
|
default
|
directory
|
objects
|
of files
|
in Mail
|
Protection codes
|
access types
|
categories of
|
Proxy accounts #1
|
Proxy accounts #2
|
default
|
for multiple users
|
for single user
|
general-access
|
maximum number allowed
|
naming
|
selecting from multiple
|
Proxy logins #1
|
Proxy logins #2
|
key characteristic
|
security benefits
|
PURGE command
|
in Mail #1
|
in Mail #2
|