Document revision date: 15 July 2002
OpenVMS User's Manual
Previous
Contents
Index
M
MAIL command
/EDIT qualifier
/SUBJECT qualifier
Mail folders
creating
deleting
displaying list of
MAIL
NEWMAIL
selecting
WASTEBASKET
MAIL$INIT file
MAIL$INTERNET_MODE logical
MAIL$INTERNET_TRANSPORT logical
MAIL$KEYDEF.INI file
sample
MAIL.MAI file
Mail subdirectories
creating
MAIL$SYSTEM_FLAGS logical
Mail utility (MAIL)
appending files to messages
changes and enhancements
SET FORWARD command
deleting messages in
distribution lists
exchanging messages in
extracting messages to files
initialization files
invoking
keypad commands
problems and restrictions
replying to an address containing nested quotation marks
reading messages in #1
reading messages in #2
removing messages in
security measures
sending files
from DCL level
sending messages over the network
setting default editor in
summary of commands
transports
using EVE in #1
using EVE in #2
using text editors in
MAILEDIT.COM command procedure #1
MAILEDIT.COM command procedure #2
sample execution
MARK command
MERGE command
/KEY qualifier #1
/KEY qualifier #2
/NODUPLICATES qualifier
See also Sort/Merge utility
/STABLE qualifier
Message count
correcting in Mail
Messages
announcement
auditing
conventions used in system display
copying in Mail
during login
indicating command line error
informational
login failures #1
login failures #2
suppressing
system error
system responses to commands
MFDs (master file directories)
MIME$FILETYPES.DAT
MIME$MAILCAP.DAT
MIME utility
commands
encoding files
extracting files
MOUNT command #1
MOUNT command #2
/FOREIGN qualifier
format
Mount requests
Mounting volumes
and security audit
foreign
MOVE command
in Mail
Multinational character set
See DEC Multinational character set
Multiple file specifications
in a parameter list
N
Network access control strings #1
Network access control strings #2
Network file specifications
conventional format
foreign file format
task specification strings
ULTRIX restrictions
Network nodes
local
remote
Networks
logout
losing connection to remote system
sending mail over
Node names
creating logical names
definition
format in file specifications
full
rules for entering
Nodes
local
Null characters
in DCL commands
Null values
for file names
for file types
Numbers
comparing #1
comparing #2
converting to string values
converting using lexical functions
evaluation of #1
evaluation of #2
integer values recognized by DCL #1
integer values recognized by DCL #2
integer values recognized by DCL #3
internal storage
Numeric expressions
and integer operands
Numeric overlays #1
Numeric overlays #2
Numeric overlays #3
O
Object ownership
changing
Objects
changing security profile
displaying security profiles
security profiles
Octal numbers
in UIC directory specifications
ON command
setting Ctrl/Y action routines
ON CONTROL_Y command
enabling Ctrl/Y
OPEN command
in command procedures
creating logical names
process-permanent files
process-permanent logical names
OPEN SELECTED command
OpenVMS Cluster systems
device names
dual-pathed
format
node allocation class fields
OpenVMS screen management software
command recall
Operands
in character string expressions #1
in character string expressions #2
integer
Operators (mathematical)
order of evaluation
Output
from command procedures
redirecting from commands and images
Output streams
redirecting
Output strings
formatting with F$FAO lexical function
Overstrike mode
P
Page and swap files
Parameter lists
defaults for multiple file specifications
multiple file specifications
Parameter qualifiers
Parameters
in DCL command lines
passing data to batch jobs with
passing data to nested command procedures with
specifying
as character strings
as integers
as null values
as symbols
using to pass data to command procedures
Password protection
dialup retries
Passwords
acceptable
automatically generated
changing
at login #1
at login #2
expired
frequency guidelines #1
frequency guidelines #2
secondary
using /NEW_PASSWORD qualifier
choosing
dual
expiration
failure to change
first
generated #1
generated #2
generated #3
generated #4
guessing
guidelines for choosing
high-risk
incorrect
initial
length #1
length #2
length #3
length #4
locked
new
omission in proxy login
open accounts and
primary #1
primary #2
protecting
reason for changing #1
reason for changing #2
restrictions
retries
reuse #1
reuse #2
secondary #1
secondary #2
entering
secure
setting a new one
supplying during dialups
system
causing login failures
entering
user
verifying change of
Percent sign (%)
as wildcard character
PID numbers
and process context
obtaining using F$PID lexical function
PIPE command #1
PIPE command #2
PIPE command #3
interrupting
Pipelines
Positional qualifiers
definition
PQL$_JTQUOTA quota list value
PQL_DJTQUOTA system parameter
PQL_MJTQUOTA system parameter
PRINT command
in Mail
qualifiers
Print jobs
delaying
executing
list of DCL commands to use with
obtaining multiple copies of
priorities
queue information
Print queues
controlling
Printing
landscape
Privileges
VOLPRO
Process contexts
list of characteristics #1
list of characteristics #2
list of characteristics #3
Processes
and job trees
changing characteristics using lexical functions
characteristics commonly changed
checking status with Ctrl/T
connecting to #1
connecting to #2
creating
definition
detached
disconnected #1
disconnected #2
logging out
displaying process rights identifiers
reconnecting
saving characteristics
Program stubs
in command procedures
replacing with commands
Programs
including in data files
Prompts
DCL
Protection
default
directory
objects
of files
in Mail
Protection codes
access types
categories of
Proxy accounts #1
Proxy accounts #2
default
for multiple users
for single user
general-access
maximum number allowed
naming
selecting from multiple
Proxy logins #1
Proxy logins #2
key characteristic
security benefits
PURGE command
in Mail #1
in Mail #2
Previous
Next
Contents
Index
privacy and legal statement
6489PRO_INDEX_005.HTML