Openvms User's Manual

Total Page:16

File Type:pdf, Size:1020Kb

Openvms User's Manual OpenVMS User’s Manual Order Number: AA–PV5JE–TK April 2001 This manual describes how to use the Compaq OpenVMS operating system. The information contained in this manual is intended for all OpenVMS users and is applicable to all computers running the OpenVMS operating system. Revision/Update Information: This manual supersedes the OpenVMS User’s Manual, Version 7.2. Software Version: OpenVMS Alpha Version 7.3 OpenVMS VAX Version 7.3 Compaq Computer Corporation Houston, Texas © 2001 Compaq Computer Corporation Compaq, VAX, VMS, and the Compaq logo Registered in U.S. Patent and Trademark Office. OpenVMS is a trademark of Compaq Information Technologies Group, L.P. in the United States and other countries. Microsoft, MS, and MS–DOS are registered trademarks of Microsoft Corporation. Motif, OSF, OSF/1, and OSF/Motif are registered trademarks, and Open Software Foundation is a trademark of The Open Group. All other product names mentioned herein may be trademarks of their respective companies. Confidential computer software. Valid license from Compaq required for possession, use, or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor’s standard commercial license. Compaq shall not be liable for technical or editorial errors or omissions contained herein. The information in this document is provided "as is" without warranty of any kind and is subject to change without notice. The warranties for Compaq products are set forth in the express limited warranty statements accompanying such products. Nothing herein should be construed as constituting an additional warranty. ZK6489 The Compaq OpenVMS documentation set is available on CD-ROM. Contents Preface ............................................................ xxiii 1 Introduction: OpenVMS Concepts and Definitions 1.1 Logging In to the System ...................................... 1–2 1.1.1 Access Requirements ...................................... 1–2 1.2 Networks . ................................................ 1–2 1.2.1 Network Nodes . ........................................ 1–3 1.2.2 Executing Programs over Networks ........................... 1–3 1.3 DIGITAL Command Language (DCL) ............................ 1–3 1.3.1 Usage Modes ............................................ 1–3 1.3.2 Types of DCL Commands . ................................ 1–4 1.3.3 DCL Command Line ...................................... 1–4 1.4 Files and Directories . ........................................ 1–5 1.4.1 File Name, File Type, and File Version . ....................... 1–5 1.4.2 Directory Structures ...................................... 1–5 1.4.3 Subdirectories . ........................................ 1–6 1.4.4 File Specifications ........................................ 1–6 1.4.5 Characters for Directory and File Names ....................... 1–6 1.4.5.1 Base Character Set .................................... 1–6 1.4.5.2 Extended Character Set . ................................ 1–6 1.5 OpenVMS Utilities . ........................................ 1–7 1.5.1 Mail and MIME Utilities . ................................ 1–7 1.5.2 Phone Utility ............................................ 1–7 1.5.3 Text Editors ............................................. 1–7 1.5.4 DIGITAL Standard Runoff (DSR) ............................ 1–7 1.5.5 Sort/Merge Utility ........................................ 1–7 1.6 Devices .................................................... 1–8 1.6.1 Mass Storage Devices ...................................... 1–8 1.6.2 Record-Oriented Devices . ................................ 1–8 1.6.3 Disks and Magnetic Tapes . ................................ 1–8 1.7 Logical Names .............................................. 1–8 1.7.1 Readability .............................................. 1–8 1.7.2 File Independence ........................................ 1–8 1.8 Symbols . ................................................ 1–9 1.9 Command Procedures ........................................ 1–9 1.9.1 System Login Command Procedures . ....................... 1–9 1.9.2 Personal Login Command Procedures . ....................... 1–9 1.10 Lexical Functions ............................................ 1–9 1.11 Processes and Programs ....................................... 1–10 1.11.1 User Authorization Files (UAFs) ............................. 1–10 1.11.2 Creating Image Files ...................................... 1–10 1.12 System Security ............................................. 1–10 1.12.1 Protected Objects . ........................................ 1–10 iii 2 Getting Started: Interacting with the OpenVMS Operating System 2.1 Logging In to the System . .................................... 2–1 2.1.1 Successful Logins ......................................... 2–2 2.1.2 Login Errors . ............................................ 2–2 2.2 Choosing Passwords for Your Account ............................ 2–3 2.2.1 Obtaining Your Initial Password . ............................ 2–3 2.2.2 Changing Your Initial Password . ............................ 2–4 2.2.3 Restrictions on Passwords .................................. 2–4 2.2.4 Types of Passwords . .................................... 2–4 2.2.5 Entering a System Password ................................ 2–5 2.2.6 Entering a Secondary Password . ............................ 2–5 2.2.7 Password Requirements for Different Types of Accounts ........... 2–6 2.3 Reading Informational Messages ................................ 2–6 2.3.1 Suppressing Messages . .................................... 2–7 2.3.2 Successful Login Messages .................................. 2–7 2.4 Types of Logins and Login Classes . ............................ 2–8 2.4.1 Interactive Logins ........................................ 2–8 2.4.2 Noninteractive Logins . .................................... 2–8 2.5 Login Failures . ............................................ 2–9 2.5.1 Terminals That Require System Passwords . ................... 2–9 2.5.2 Login Class Restrictions .................................... 2–10 2.5.3 Shift Restrictions ......................................... 2–10 2.5.4 Batch Jobs During Shift Restrictions .......................... 2–10 2.5.5 Failures During Dialup Logins . ............................ 2–10 2.5.6 Break-In Evasion Procedures ................................ 2–10 2.6 Changing Passwords ......................................... 2–11 2.6.1 Selecting Your Own Password . ............................ 2–11 2.6.2 Using Generated Passwords ................................. 2–11 2.6.3 Generated Passwords: Disadvantages ......................... 2–12 2.6.4 Changing a Secondary Password . ............................ 2–13 2.6.5 Changing Passwords at Login . ............................ 2–13 2.7 Password and Account Expiration Times .......................... 2–13 2.7.1 Expired Passwords ........................................ 2–13 2.7.2 Using Secondary Passwords ................................. 2–14 2.7.3 Failure to Change Passwords ................................ 2–14 2.7.4 Expired Accounts ......................................... 2–14 2.8 Guidelines for Protecting Your Password .......................... 2–14 2.9 Recognizing System Responses ................................. 2–16 2.9.1 Default Actions .......................................... 2–16 2.9.2 Informational System Messages . ............................ 2–16 2.9.3 System Error Messages .................................... 2–16 2.9.4 Checking Your Current Process . ............................ 2–17 2.10 Getting Help About the System ................................. 2–18 2.10.1 Using Online Help ........................................ 2–18 2.10.2 Getting Help on Specific Commands .......................... 2–19 2.10.3 Getting Help on System Messages ............................ 2–19 2.11 Logging Out of the System . .................................... 2–19 2.11.1 Obtaining Accounting Information ............................ 2–20 2.11.2 Ending a Remote Session ................................... 2–20 2.11.3 Lost Network Connections .................................. 2–20 2.12 Logging Out Without Compromising System Security ................ 2–21 2.12.1 Reasons to Clear Your Terminal Screen ........................ 2–21 2.12.2 Disposing of Hardcopy Output . ............................ 2–21 2.12.3 Breaking the Connection to a Dialup Line . ................... 2–22 iv 3 The DIGITAL Command Language: Interacting with the System 3.1 Using DCL Commands ........................................ 3–1 3.1.1 Entering Commands ...................................... 3–2 3.1.2 Commonly Used DCL Commands ............................ 3–2 3.1.3 Key Sequences . ........................................ 3–2 3.2 Constructing DCL Commands . ................................ 3–3 3.2.1 Other Components of Command Lines . ....................... 3–4 3.2.2 Syntax . ................................................ 3–4 3.3 Entering DCL Commands ..................................... 3–4 3.3.1 Canceling Commands ...................................... 3–5 3.3.2 Using Defaults . ........................................ 3–5 3.3.3 Entering Multiple Line Commands ........................... 3–5 3.4 Rules for Entering DCL Commands .............................. 3–6 3.4.1 Case Sensitivity . ........................................ 3–6 3.4.2 Required Spaces . .......................................
Recommended publications
  • Openvms Record Management Services Reference Manual
    OpenVMS Record Management Services Reference Manual Order Number: AA-PV6RD-TK April 2001 This reference manual contains general information intended for use in any OpenVMS programming language, as well as specific information on writing programs that use OpenVMS Record Management Services (OpenVMS RMS). Revision/Update Information: This manual supersedes the OpenVMS Record Management Services Reference Manual, OpenVMS Alpha Version 7.2 and OpenVMS VAX Version 7.2 Software Version: OpenVMS Alpha Version 7.3 OpenVMS VAX Version 7.3 Compaq Computer Corporation Houston, Texas © 2001 Compaq Computer Corporation Compaq, AlphaServer, VAX, VMS, the Compaq logo Registered in U.S. Patent and Trademark Office. Alpha, PATHWORKS, DECnet, DEC, and OpenVMS are trademarks of Compaq Information Technologies Group, L.P. in the United States and other countries. UNIX and X/Open are trademarks of The Open Group in the United States and other countries. All other product names mentioned herein may be the trademarks of their respective companies. Confidential computer software. Valid license from Compaq required for possession, use, or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor’s standard commercial license. Compaq shall not be liable for technical or editorial errors or omissions contained herein. The information in this document is provided "as is" without warranty of any kind and is subject to change without notice. The warranties for Compaq products are set forth in the express limited warranty statements accompanying such products. Nothing herein should be construed as constituting an additional warranty.
    [Show full text]
  • Oracle Database Installation Guide 10G Release 2 (10.2)
    Oracle®[1] Database Installation Guide 11g Release 2 (11.2) for HP OpenVMS Itanium E56668-01 June 2015 Oracle Database Installation Guide, 11g Release 2 (11.2) for HP OpenVMS Itanium E56668-01 Copyright © 2008, 2015, Oracle and/or its affiliates. All rights reserved. Primary Author: Nisha Sridhar Contributors: Dave Hayter, Gary Huffman, Marc Noel, Chris Schuetz, David Miller, Kevin Duffy, Steve Holck, Grant Hayden, Gary Tate This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs.
    [Show full text]
  • Storageworks RAID Array 200 Online Mgt Utility for Openvms AXP User's
    StorageWorks RAID Array 200 Online Management Utility for OpenVMS AXP User's Guide AA–Q6WVB–TE Digital Equipment Corporation Maynard, Massachusetts Second Printing, April 1995 The information in this document is subject to change without notice and should not be construed as a commitment by Digital Equipment Corporation. Digital Equipment Corporation assumes no responsibility for any errors that might appear in this document. The software, if any, described in this document is furnished under a license and may be used or copied only in accordance with the terms of such license. No responsibility is assumed for the use or reliability of software or equipment that is not supplied by Digital Equipment Corporation or its affiliated companies. Copyright 1995 by Digital Equipment Corporation. All rights reserved. Printed in the U.S.A. The following are trademarks of Digital Equipment Corporation: AXP, OpenVMS, StorageWorks, SWXCR, and the Digital logo. The following are third-party trademarks: Microsoft and MS-DOS are registered trademarks and Windows is a trademark of Microsoft Corporation. Intel, Intel486, and i486 are trademarks of Intel Corporation. All other trademarks and registered trademarks are the property of their respective holders. Contents Revision Record...................................................................................................................ix About This Guide ...............................................................................................................xi 1 Installing the RAID Array
    [Show full text]
  • Software Product Description and Quickspecs
    VSI OpenVMS Alpha Version 8.4-2L2 Operating System DO-DVASPQ-01A Software Product Description and QuickSpecs PRODUCT NAME: VSI OpenVMS Alpha Version 8.4-2L2 DO-DVASPQ-01A This SPD and QuickSpecs describes the VSI OpenVMS Alpha Performance Release Operating System software, Version 8.4-2L2 (hereafter referred to as VSI OpenVMS Alpha V8.4-2L2). DESCRIPTION OpenVMS is a general purpose, multiuser operating system that runs in both production and development environments. VSI OpenVMS Alpha Version 8.4-2L2 is the latest release of the OpenVMS Alpha computing environment by VMS Software, Inc (VSI). VSI OpenVMS Alpha V8.4-2L2 is compiled to take advantage of architectural features such as byte and word memory reference instructions, and floating-point improvements, which are available only in HPE AlphaServer EV6 or later processors. This optimized release improves performance by taking advantage of faster hardware-based instructions that were previously emulated in software. NOTE: VSI OpenVMS Alpha V8.4-2L2 does not work on, and is not supported on, HPE AlphaServer pre-EV6 systems. OpenVMS Alpha supports HPE’s AlphaServer series computers. OpenVMS software supports industry standards, facilitating application portability and interoperability. OpenVMS provides symmetric multiprocessing (SMP) support for multiprocessing systems. The OpenVMS operating system can be tuned to perform well in a wide variety of environments. This includes combinations of compute-intensive, I/O-intensive, client/server, real-time, and other environments. Actual system performance depends on the type of computer, available physical memory, and the number and type of active disk and tape drives. The OpenVMS operating system has well-integrated networking, distributed computing, client/server, windowing, multi-processing, and authentication capabilities.
    [Show full text]
  • Openvms: an Introduction
    The Operating System Handbook or, Fake Your Way Through Minis and Mainframes by Bob DuCharme VMS Table of Contents Chapter 7 OpenVMS: An Introduction.............................................................................. 7.1 History..........................................................................................................................2 7.1.1 Today........................................................................................................................3 7.1.1.1 Popular VMS Software..........................................................................................4 7.1.2 VMS, DCL................................................................................................................4 Chapter 8 Getting Started with OpenVMS........................................................................ 8.1 Starting Up...................................................................................................................7 8.1.1 Finishing Your VMS Session...................................................................................7 8.1.1.1 Reconnecting..........................................................................................................7 8.1.2 Entering Commands..................................................................................................8 8.1.2.1 Retrieving Previous Commands............................................................................9 8.1.2.2 Aborting Screen Output.........................................................................................9
    [Show full text]
  • Openvms Security
    OpenVMS Security Presented by Paul Williams PARSEC Group 999 18th Street, Suite 1725 Denver, CO 80202 www.parsec.com | 888-4-PARSEC To Download this Presentation, please visit: http://www.parsec.com/public/openvmssecurity.pdf To E-mail Paul [email protected] www.parsec.com | 888-4-PARSEC Outline • OpenVMS Security Design • Physical Security • Object Security • UIC/ACL Security • User Access • Break-in Detection • Network and Internet Considerations • Encrypted Network Communication • Kerberos • Secure Socket Layer (SSL) Goals • Discuss the important points and consideration of OpenVMS Security • Concentrate on the mechanics and mechanisms of OpenVMS features. • Show how OpenVMS is one of the most secure operating systems on the market. OpenVMS Security Design • Security was designed into OpenVMS since V1.0 • Many different levels of security in OpenVMS Physical Security Object Security User Management Network Security • Has never had a virus Physical Security • System • System Console • Storage devices and media System Disk Data and Database Volumes Backups • Network devices and media Physical Security: System • Increase system reliability through restricted access Prevent intentional tampering and outage Prevent outage due to accidents • Prevent Front Panel Access Halts Reset/initializations Power switch/source Power on action settings (VAX) switch Physical Security: Console • Can be a big security hole for OpenVMS Anyone with physical access to the console can break into OpenVMS buy getting into the SYSBOOT utility. Then OpenVMS can be broken into: Buy redirecting startup Buy changing system parameters Physical Security: Getting to SYSBOOT on the Integrity Console Example • On the Integrity shutdown to the EFI Boot Manager and select the EFI Shell and create a alias.
    [Show full text]
  • Getting Even More Grip on Your Security with Pointsecure Or
    OpenVMS and Security getting even more grip on your security with Pointsecure or NDC Gerrit Woertman VSI Professional Services Alliance member VSI OpenVMS trainer EMEA & VSI OpenVMS Ambassador [email protected] www.vmsconsultancy.com Agenda • OpenVMS and Security • EU security laws to report security issues • Non‐HPE/VSI Security packages • Pointsecure – PointAudit – System Detective • Networking Dynamics Corporation (NDC) – Peek & Spy – KEY Capture – Assassin • Questions OpenVMS and Security ‐ 1 • OpenVMS – secure by design • No viruses • One of the first to become US DoD C2‐rating • Declared “Cool and Unhackable” at 2001 DefCon9 as described in 4AA0‐2896ENW.pdf (HP, 11/2005) Alpha OpenVMS with the help of Pointsecure System Detective OpenVMS and Security ‐ 2 • OpenVMS has got optional security solutions – OpenSSL (Secure Socket Layer) https://www.openssl.org/ – Common Data Security Architecture (CDSA) – Kerberos • Everything fine? Seems so, but there is still need for more and better implementation – On VSI’s research list OpenVMS and Security – 3 • OpenVMS ‐ Linux – Windows • With 100% OpenVMS no problems – fine – That’s not real; today’s softwarestacks complex – Splendid isolation? • OpenSource – is that safe? ? OpenVMS and Security – 4 • From http://vmssoftware.com/products.html Unmatched Security Compare OpenVMS' security vulnerability record against other operating systems at CVE Details: http://www.cvedetails.com. The following are direct links to reports for OpenVMS, Linux and Windows: • OpenVMS http://www.cvedetails.com/product/4990/HP‐Openvms.html?vendor_id=10
    [Show full text]
  • Tyson Kopczynski
    www.it-ebooks.info Tyson Kopczynski Windows® PowerShell UNLEASHED 800 East 96th Street, Indianapolis, Indiana 46240 USA www.it-ebooks.info Windows® PowerShell Unleashed Editor-in-Chief Copyright © 2007 by Sams Publishing Karen Gettman All rights reserved. No part of this book shall be reproduced, stored in a retrieval system, or transmitted by any means, electronic, mechanical, photocopying, recording, Senior Acquisitions or otherwise, without written permission from the publisher. No patent liability is Editor assumed with respect to the use of the information contained herein. Although every Neil Rowe precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions. Nor is any liability assumed for Development Editor damages resulting from the use of the information contained herein. Mark Renfrow International Standard Book Number: 0-672-32953-0 Managing Editor Library of Congress Cataloging-in-Publication Data Gina Kanouse Kopczynski, Tyson. Project Editor Microsoft PowerShell unleashed / Tyson Kopczynski. George E. Nedeff p. cm. ISBN 0-672-32953-0 Copy Editor 1. Microsoft Windows (Computer file) 2. Operating systems (Computers) I. Title. Lisa M. Lord QA76.76.O63K66 2007 Senior Indexer 005.4’46—dc22 Cheryl Lenser 2007008894 Proofreader Printed in the United States of America Water Crest First Printing: Publishing 10090807 4321 Contributing Authors Trademarks Pete Handley, Mark All terms mentioned in this book that are known to be trademarks or service marks Weinhardt, and have been appropriately capitalized. Sams Publishing cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the Josh Tolle validity of any trademark or service mark.
    [Show full text]
  • Oracle Rdb7™ Guide to Using the Oracle SQL/Services™ Client API
    Oracle Rdb7™ Guide to Using the Oracle SQL/Services™ Client API Release 7.0 Part No. A41981-1 ® Guide to Using the Oracle SQL/Services Client API Release 7.0 Part No. A41981-1 Copyright © 1993, 1996, Oracle Corporation. All rights reserved. This software contains proprietary information of Oracle Corporation; it is provided under a license agreement containing restrictions on use and disclosure and is also protected by copyright law. Reverse engineering of the software is prohibited. The information contained in this document is subject to change without notice. If you find any problems in the documentation, please report them to us in writing. Oracle Corporation does not warrant that this document is error free. Restricted Rights Legend Programs delivered subject to the DOD FAR Supplement are ’commercial computer software’ and use, duplication and disclosure of the programs shall be subject to the licensing restrictions set forth in the applicable Oracle license agreement. Otherwise, programs delivered subject to the Federal Acquisition Regulations are ’restricted computer software’ and use, duplication and disclosure of the programs shall be subject to the restrictions in FAR 52.227-14, Rights in Data—General, including Alternate III (June 1987). Oracle Corporation, 500 Oracle Parkway, Redwood City, CA 94065. The programs are not intended for use in any nuclear, aviation, mass transit, medical, or other inherently dangerous applications. It shall be the licensee’s responsibility to take all appropriate fail-safe, back up, redundancy and other measures to ensure the safe use of such applications if the programs are used for such purposes, and Oracle disclaims liability for any damages caused by such use of the programs.
    [Show full text]
  • Microsoft Staff and Student Advantage
    Microsoft Staff and Student Advantage Microsoft have launched Student Advantage to provide eligible staff and pupils with a free subscription of Microsoft Office 365 ProPlus. This allows staff and pupils to install Microsoft Office ProPlus on up to 5 devices simultaneously. This facility is available to all staff and pupils in Dundee schools exclusively through their Dundee Microsoft Office365 account. Use of this account is covered by the Acceptable Use Policy. Use is not compulsory and the facility is provided as-is. The information below is from Microsoft's Student Advantage and Office 365 FAQ blog post. What is included with Office 365 ProPlus subscription license? Office 365 ProPlus for PC (Office 2013 ProPlus base applications) Office 365 ProPlus for Mac (Office 2011 for Mac base applications) Office Mobile for iPhone/iPod Touch Office Mobile for Android Office 365 ProPlus Details How to download / What you Help and System Format get? Support Requirements Windows Server 2008 R2 Windows 7 Windows Server 2012 Windows 8 Download the application via your 32-bit Office can be installed webbased Dundee email account, See on 32-bit or 64-bit operating Below is a link to systems. details at the bottom of this page. What some excellent However 64-bit Office can you get: Word 2013 training guides on only be installed on 64-bit Excel 2013 Office 2013: operating system. To find out if you have 32-bit or PowerPoint 2013 What's new 64-bit Windows, click the start OneNote 2013 Learn the basics button, right-click Computer Office 365 Access 2013 Quick start guides then click Properties, then under ProPlus for Publisher 2013 Video tutorials System Type you should see PC Outlook 2013 Microsoft online help either 32-bit or 64-bit operating Lync 2013 resources system.
    [Show full text]
  • The Top 10 Mistakes to Avoid When Starting an Online Help Project
    Th e top 10 mistakes to avoid when starting an online help project Whitepaper Th e top 10 mistakes to avoid when starting an online help project Modern help authoring tools like RoboHelp® are very powerful and offer great flexibility to authors. However, the same power and flexibility can get new projects off to a bad start. Some mistakes are plain silly, while others can lead to hiring the wrong author, picking the wrong output format, or letting a project spin out of control in ways that call for expensive rework later. The risk involved in employing modern help authoring tools has existed ever since they appeared in 1991. Thereafter, these tools became even more powerful and feature-rich expanding the scope for errors. Two changes in the recent years can magnify the effect of such mistakes: • The ‘internalization’ of help into an accelerating documentation process In the past, help authors could make mistakes and had time to find, fix, and learn from them. But Test drive Adobe® RoboHelp 9 today, tighter time-to-market and ROI (return on investment) demands are eliminating the authors’ Try the full functionality of ability to make and learn from mistakes. It’s more important than ever to ‘get it right the first time’. RoboHelp 9 (as a part of Adobe Technical Communication Suite 3.5) • The shift from viewing online help as ‘documentation’ to ‘content’ for reuse beyond the in minutes—without downloading boundaries of the doc group the soft ware. Tutorials are also included. To test drive RoboHelp 9 Help authors now have to consider how their content may be used on a company web site, now, visit www.runaware.com/ on mobile devices, or can be found via Google searches, and more.
    [Show full text]
  • HP Openvms Utility Routines Manual
    HP OpenVMS Utility Routines Manual Order Number: BA554-90019 June 2010 This manual describes the OpenVMS utility routines, a set of routines that provide a programming interface to various OpenVMS utilities. Revision/Update Information: This manual supersedes the HP OpenVMS Utility Routines Manual, OpenVMS Alpha Version 8.3. Software Version: OpenVMS Version 8.4 for Integrity servers OpenVMS Alpha Version 8.4 Hewlett-Packard Company Palo Alto, California © Copyright 2010 Hewlett-Packard Development Company, L.P. Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor’s standard commercial license. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. Intel and Itanium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. ZK4493 The HP OpenVMS documentation set is available on CD. This document was prepared using DECdocument, Version 3.3-1B. Contents Preface ............................................................ xvii 1 Introduction to Utility Routines 2 Access Control List (ACL) Editor Routine 2.1 Introduction to the ACL Editor Routine ........................... ACL–1 2.2 Using the ACL Editor Routine: An Example ....................... ACL–1 2.3 ACL Editor Routine . ........................................ ACL–2 ACLEDIT$EDIT ...........................................
    [Show full text]