Openvms User's Manual

Openvms User's Manual

OpenVMS User’s Manual Order Number: AA–PV5JF–TK June 2002 This manual describes how to use the Compaq OpenVMS operating system. The information contained in this manual is intended for all OpenVMS users and is applicable to all computers running the OpenVMS operating system. Revision/Update Information: This manual supersedes the OpenVMS User’s Manual, Version 7.3. Software Version: OpenVMS Alpha Version 7.3–1 OpenVMS VAX Version 7.3 Compaq Computer Corporation Houston, Texas © 2002 Compaq Computer Corporation Compaq, the Compaq logo, AlphaServer, OpenVMS, POLYCENTER, Tru64, VAX, VMS, and the DIGITAL logo are trademarks of Compaq Information Technologies Group, L.P. in the U.S. and/or other countries. UNIX and X/Open are trademarks of The Open Group in the U.S. and/or other countries. All other product names mentioned herein may be trademarks of their respective companies. Confidential computer software. Valid license from Compaq required for possession, use, or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor’s standard commercial license. Compaq shall not be liable for technical or editorial errors or omissions contained herein. The information in this document is provided "as is" without warranty of any kind and is subject to change without notice. The warranties for Compaq products are set forth in the express limited warranty statements accompanying such products. Nothing herein should be construed as constituting an additional warranty. ZK6489 The Compaq OpenVMS documentation set is available on CD-ROM. Contents Preface ............................................................ xix 1 Getting Started with the OpenVMS Operating System 1.1 Logging In . ................................................ 1–1 1.1.1 Successful Logins . ........................................ 1–2 1.1.2 Login Errors ............................................. 1–3 1.2 Logging In From a PC ........................................ 1–3 1.3 Choosing Passwords for Your Account ............................ 1–3 1.3.1 Obtaining Your Initial Password ............................. 1–4 1.3.2 Changing Your Initial Password ............................. 1–4 1.3.3 Restrictions on Passwords . ................................ 1–4 1.3.4 Types of Passwords ....................................... 1–5 1.3.5 Entering a System Password ................................ 1–5 1.3.6 Entering a Secondary Password .............................. 1–6 1.3.7 Password Requirements for Different Types of Accounts ........... 1–6 1.4 Reading Informational Messages ................................ 1–7 1.4.1 Suppressing Messages ..................................... 1–8 1.4.2 Successful Login Messages . ................................ 1–8 1.5 Types of Logins and Login Classes ............................... 1–8 1.5.1 Interactive Logins ........................................ 1–8 1.5.2 Noninteractive Logins ..................................... 1–9 1.6 Login Failures .............................................. 1–9 1.6.1 Terminals That Require System Passwords ..................... 1–10 1.6.2 Login Class Restrictions .................................... 1–10 1.6.3 Shift Restrictions . ........................................ 1–10 1.6.4 Batch Jobs During Shift Restrictions . ....................... 1–10 1.6.5 Failures During Dialup Logins .............................. 1–11 1.6.6 Break-In Evasion Procedures ................................ 1–11 1.7 Changing Passwords . ........................................ 1–11 1.7.1 Selecting Your Own Password ............................... 1–12 1.7.2 Using Generated Passwords . ................................ 1–12 1.7.3 Generated Passwords: Disadvantages . ....................... 1–13 1.7.4 Changing a Secondary Password ............................. 1–13 1.7.5 Changing Passwords at Login ............................... 1–14 1.8 Password and Account Expiration Times . ....................... 1–14 1.8.1 Expired Passwords ........................................ 1–14 1.8.2 Using Secondary Passwords . ................................ 1–14 1.8.3 Failure to Change Passwords ................................ 1–15 1.8.4 Expired Accounts . ........................................ 1–15 1.9 Guidelines for Protecting Your Password . ....................... 1–15 1.10 Recognizing System Responses . ................................ 1–16 1.10.1 Default Actions . ........................................ 1–16 1.10.2 Informational System Messages .............................. 1–16 iii 1.10.3 System Error Messages .................................... 1–17 1.10.4 Checking Your Current Process . ............................ 1–17 1.11 Getting Help About the System ................................. 1–18 1.11.1 Using Online Help ........................................ 1–18 1.11.2 Getting Help on Specific Commands .......................... 1–19 1.11.3 Getting Help on System Messages ............................ 1–19 1.12 Logging Out of the System . .................................... 1–20 1.12.1 Obtaining Accounting Information ............................ 1–20 1.12.2 Ending a Remote Session ................................... 1–20 1.12.3 Lost Network Connections .................................. 1–20 1.13 Logging Out Without Compromising System Security ................ 1–21 1.14 Networks .................................................. 1–21 1.14.1 Network Nodes .......................................... 1–21 1.14.2 Executing Programs over Networks ........................... 1–22 2 Using DCL to Interact with the System 2.1 Entering Commands ......................................... 2–2 2.1.1 Usage Modes ............................................ 2–2 2.1.2 Types of DCL Commands ................................... 2–3 2.2 The DCL Command Line . .................................... 2–3 2.2.1 Syntax ................................................. 2–4 2.2.2 Canceling Commands . .................................... 2–5 2.2.3 Using Defaults ........................................... 2–5 2.2.4 Entering Multiple Line Commands ........................... 2–5 2.3 Rules for Entering DCL Commands . ............................ 2–6 2.4 Entering Parameters ......................................... 2–7 2.5 Entering Qualifiers .......................................... 2–7 2.5.1 Command Qualifiers . .................................... 2–8 2.5.2 Positional Qualifiers . .................................... 2–8 2.5.3 Parameter Qualifiers . .................................... 2–8 2.5.4 Conflicting Qualifiers . .................................... 2–9 2.5.5 Values Accepted by Qualifiers . ............................ 2–9 2.6 Entering Dates and Times as Values . ............................ 2–9 2.6.1 Absolute Time Format . .................................... 2–10 2.6.2 Delta Time Format ........................................ 2–10 2.6.3 Combination Time Format .................................. 2–11 2.7 Recalling Commands ......................................... 2–12 2.7.1 Pressing Ctrl/B .......................................... 2–12 2.7.2 Using Arrow Keys ........................................ 2–12 2.7.3 Using the RECALL Command . ............................ 2–13 2.8 Editing the DCL Command Line ................................ 2–14 2.8.1 SET TERMINAL Command ................................. 2–14 2.8.2 Deleting Parts of the Command Line .......................... 2–15 2.9 Defining Terminal Keys . .................................... 2–15 2.10 Key Sequences . ............................................ 2–15 iv 3 Storing Information with Files 3.1 Understanding File Names and File Specifications . ............... 3–2 3.1.1 Providing a Complete File Specification . ....................... 3–2 3.1.2 Rules for File Specifications . ................................ 3–3 3.1.3 Default File Types Used by DCL Commands .................... 3–4 3.1.4 Default File Types for Language Source Programs ............... 3–4 3.1.5 File Versions ............................................ 3–5 3.1.6 Network Node Names ..................................... 3–6 3.1.7 Specifying DECnet-Plus Node Full Names ...................... 3–6 3.1.8 Specifying TCP/IP Names and Addresses ...................... 3–7 3.1.9 Accessing Files on Remote Nodes Using DECnet . ............... 3–7 3.1.10 Accessing Files on Remote Nodes Using TCP/IP . ............... 3–8 3.1.11 Using Network File Specifications ............................ 3–8 3.1.11.1 Conventional File Specification ........................... 3–8 3.1.11.2 Foreign File Specification ................................ 3–8 3.1.11.3 Task Specification Strings ............................... 3–8 3.1.12 Access Control String Format ............................... 3–9 3.2 Using Wildcards with File Names ............................... 3–9 3.2.1 Asterisk ( * ) Wildcard Character ............................. 3–9 3.2.2 Percent Sign ( % ) Wildcard Character . ....................... 3–10 3.3 Other File Names . ........................................ 3–10 3.3.1 Null File Names and File Types .............................. 3–11 3.3.1.1 File References with Null File Types ....................... 3–11 3.3.2 Alternate File Names for Magnetic Tapes ...................... 3–11 3.4 Creating and Modifying Files . ................................ 3–12 3.4.1 Creating Files . ........................................ 3–12 3.4.2

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    502 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us