[Digital logo]
[HR]

OpenVMS User's Manual


Previous | Contents

In most cases, a UFD exists for each user on the system. It contains the names of and pointers to files cataloged in a user's directory. Chapter 5 contains more information about directory structures.

1.5.4 Subdirectories

A subdirectory is a directory file within another directory or subdirectory file. You can have up to seven levels of subdirectories. Subdirectories let you organize files into meaningful groups. For example, you might have one subdirectory that contains memos and another subdirectory for status reports.

Like a directory, a subdirectory contains names and pointers for the files cataloged within it. It can contain an entry for another subdirectory, which can contain an entry for another subdirectory, and so on to seven levels of subdirectories. This structure (a top-level directory plus a maximum of seven levels of subdirectories) is called a hierarchical directory structure.

1.6 OpenVMS Utilities

The following sections provide an overview of some basic OpenVMS utilities described in this manual.

1.6.1 The Mail Utility

The OpenVMS Mail utility (MAIL) lets you send messages to and receive messages from other users on your system or on any computer that is connected to your system by DECnet software.

Chapter 6 describes how to use Mail.

1.6.2 The OpenVMS Phone Utility

The OpenVMS Phone utility (PHONE) lets you communicate with other users on your system or on any computer that is connected to your system by DECnet software.

Chapter 7 describes how to use Phone.

1.6.3 Text Editors

Text editors allow you to create and modify text files. With a text editor, you can enter text from a keyboard and modify the text using text editing commands. For example, you can type in data for a report and then rearrange sections, duplicate information, substitute phrases, or format text. You can use text editors to create and modify source files for programming languages (such as DEC C for OpenVMS or VAX BASIC) or text formatters (such as VAX DOCUMENT or DIGITAL Standard Runoff). The operating system supports several text editors. Chapter 8 describes how to use EVE, and Chapter 9 describes how to use EDT.

1.6.4 DIGITAL Standard Runoff (DSR)

DIGITAL Standard Runoff (DSR) is a text formatter that processes source files into formatted text and intermediate files, and creates tables of contents and indexes. You use a text editor to create a source file, to which you should give the file type .RNO. This file contains text, DSR formatting commands, flags (special instruction characters you insert), and control characters.

Chapter 10 describes how to use DSR and lists DSR commands.

1.6.5 The Sort/Merge Utility

The OpenVMS Sort/Merge (SORT/MERGE) utility can be invoked in two ways: by using the SORT command or by using the MERGE command. When you invoke the Sort/Merge utility with the DCL command SORT, it sorts records from one or more input files, according to the fields you select, and generates one reordered output file. You can use the Sort/Merge utility to reorder records in a file (or files) so that they are in alphabetic or numeric order and either ascending or descending order.

When you invoke the Sort/Merge utility with the DCL command MERGE, it combines up to 10 previously sorted files into one ordered output file.

For information about using the Sort/Merge utility, see Chapter 11.

1.7 Devices

The following sections provide an overview of devices you can use in an OpenVMS environment.

1.7.1 Mass Storage Devices

Mass storage devices, such as disks and magnetic tapes, save the contents of files on a magnetic medium. Files saved this way can be accessed, updated, modified, or reused at any time.

1.7.2 Record Oriented Devices

Record-oriented devices, such as terminals, printers, mailboxes, and card readers read and write only single physical units of data at a time and do not provide online storage of the data. (Printers and card readers are also called unit-record devices.)

1.7.3 Disks and Magnetic Tapes

The files you commonly access are stored on disks or magnetic tapes. Your user file directory (UFD) and your default directory with all your files and subdirectories are located on a disk. You can use a file specification that contains directory information only if the file is located on a disk. Magnetic tapes do not have directory structures. To obtain a file stored on tape, use a file specification that contains only file information.

1.7.4 For Additional Information

1.8 Logical Names

A logical name is a name equated to an equivalence string or to a list of equivalence strings. When you define a logical name, you equate one character string to an equivalence string, which is usually a full or partial file specification, another logical name, or any other character string. Once you equate a logical name to one or more equivalence strings, you can use the logical name to refer to those equivalence strings. For example, you might assign a logical name to your default disk and directory. Logical names serve two main functions: they increase readability and file independence.

1.8.1 Readability

You can define commonly used files, directories, and devices with short, meaningful logical names. Such names are easier to remember and type than the full file specifications. You can define names that you use frequently in your login command procedure. A system manager can define names that most users on your system use frequently in the site-specific system startup command procedure.

1.8.2 File Independence

You can use logical names to keep your programs and command procedures independent of physical file specifications. For example, if a command procedure references the logical name ACCOUNTS, you can equate ACCOUNTS to any file on any disk before executing

1.8.3 For Additional Information

Chapter 13 contains information about logical name tables and describes how to use logical names.

1.9 Symbols

Symbols are names that represent numeric, character, or logical values. When you use a symbol in a DCL command line, DCL uses the value you assign to the symbol. By defining a symbol as a command line, you can execute the command by typing only the symbol name.

1.9.1 When to Use Symbols

Entering DCL command lines that include parameters, multiple qualifiers, and values can make for much typing and can be time-consuming. To simplify your interaction with DCL and to save time, you can establish symbols to use in place of command names and entire command strings you type frequently.

You can also use symbols in command procedures to collect, store, and manipulate certain types of data.

1.9.2 For Additional Information

Chapter 14 describes how to use symbols in DCL commands and command procedures.

1.10 Command Procedures

A command procedure is a file that contains a series of DCL commands. Some simple command procedures might contain only one or two DCL commands; complex command procedures can function as sophisticated computer programs. When a command procedure is executed, the DCL interpreter reads the file and executes the commands it contains.

1.10.1 System Login Command Procedures

If your system manager has set up a system login command procedure, it is executed when you log in. A system login command procedure lets your system manager ensure that certain commands are always executed when you and other users on the system log in.

1.10.2 Personal Login Command Procedures

After executing the system login command procedure, the system executes your personal login command procedure, if one exists. Your personal login command procedure lets you customize your computing environment. The commands contained in it are executed every time you log in. When you log in, the system automatically executes up to two login command procedures (the systemwide login command procedure and your own login command procedure, if it exists).

1.10.3 Creating Login Command Procedures

The person who sets up your account might have placed a login command procedure in your top-level directory. If a login command procedure is not in your top-level directory, you can create one yourself, name it LOGIN.COM and place it in your top-level directory. Unless your system manager tells you otherwise, the LOGIN.COM file that you create will be executed when you log in. A sample personal login command procedure is included in Chapter 15.

1.10.4 For Additional Information

Appendix C contains several complete command procedures.

1.11 Lexical Functions

Lexical functions return information to a command line or command procedure. The information returned can be about your process, the system, files and devices, logical names, strings, or data types. Lexical functions are identified by the prefix F$.

1.11.1 Usage

You can use lexical functions in any context in which you normally use symbols or expressions. In command procedures, you can use lexical functions to translate logical names, to perform character string manipulations, and to determine the current processing mode of the procedure.

1.11.2 For Additional Information

Chapter 17 describes how to use lexical functions to obtain and manipulate information within a command procedure.

1.12 Processes and Programs

A process can be a detached process (a process that is independent of other processes) or a subprocess (a process that is dependent on another process for its existence and resources). Your main process, also called your parent process, is a detached process.

Chapter 18 describes how to use processes to perform computing tasks.

A program, also called an image or an executable image, is a file that contains instructions and data in machine-readable format. Some programs are associated with and invoked by a DCL command. For example, when you type the DCL command COPY, the system executes the program SYS$SYSTEM:COPY.EXE. Some programs are invoked by entering the DCL command RUN followed by the program name.

1.12.1 User Authorization Files (UAFs)

The system obtains the characteristics that are unique to your process from the user authorization file (UAF). The UAF lists those users permitted to access the system and defines the characteristics for each user's process. The system manager usually maintains the UAF. It is within your process that the system executes your programs (also called images or executable images) one at a time.

1.12.2 Creating Image Files

Image files can be supplied by the operating system or by you and usually have the other window file type .EXE. You cannot examine an image file with the DCL commands TYPE, PRINT, or EDIT because image files do not consist of ASCII characters. (Text files contain ASCII characters, which are a standard method of representing the alphabet, punctuation marks, numerals, and other special symbols.)

Chapter 18 contains more information about using programs.

1.13 System Security

Each system site has unique security requirements. For this reason, every site should have a system security policy that outlines physical and software security requirements for system managers and users. The OpenVMS Guide to System Security describes the security features available with the operating system and the tasks that system managers can perform to maintain account and system security.

1.13.1 Protected Objects

To ensure system security, the OpenVMS operating system controls both access to the system and access to any object that contains shareable information. These objects, such as devices, volumes, logical name tables, files, and queues, are known as protected objects. All protected objects list a set of access requirements that specify who has a right to access the object in a given manner.

1.13.2 For Additional Information


Chapter 2
Getting Started: Interacting with the OpenVMS Operating System

2.1 Overview

This chapter describes the following basic information that you need to know to interact with the OpenVMS operating system:

2.1.1 Site-Specific Procedures

The way you log in and log out of the OpenVMS operating system depends on how the system is set up at your site. This section provides a general description of logging in to and out of the operating system. Check with your system manager for the procedures specific to your site.

2.1.2 References

2.2 Logging In to the System

You need two pieces of information to log in to the system: a user name and a password. Your system manager usually sets up accounts and gives you a user name and initial password (see Section 2.3.2).

The following sections describe the login procedure.

2.2.1 How to Log In

To log in to the system, use the following procedure:
Step Task
1 Make sure your terminal is plugged in and the power is turned on.
2 Press the Return key to signal the system that you want to log in. You might need to press Return several times.

The system displays a prompt for your user name:

Username:
      
3 Enter your user name and press Return. You have approximately 30 seconds to do this; otherwise, the system "times out." If a timeout occurs, you must start the login procedure again.

The system displays your user name on the screen as you type it. For example:

Username: CASEY
      [Return]
      

The system prompts you for your password:

Password:
      
4 Enter your password and press Return.

The system does not display your password, which is sometimes referred to as "no echo."

5 Depending on how your system manager has set up your account, you might be required to enter a second password or to use an automatically generated password (see Section 2.3.5).

2.2.2 Successful Logins

If your login is successful, the system displays a dollar sign ($) in the left margin of your screen. The dollar sign is the default DCL prompt; it indicates that the system is ready to use.

2.2.3 Example

The following example shows a successful login:

[Return]
Username:  CASEY [Return]
Password:                 [Return]
        Welcome to OpenVMS on node MARS 
    Last interactive login on Friday, 11-DEC-1996 08:41 
    Last non-interactive login on Thursday, 10-DEC-1996 11:05 
$ 

2.2.4 Login Errors

If you make a mistake entering your user name or password or if your password has expired, the system displays the message User authorization failure and you are not logged in. If you make a mistake, press Return and try again. If your password has expired, you need to change your password; the system will automatically display the Set Password: prompt. See Section 2.7 for information on changing your password in this instance. If you have any other problems logging in, get help from the person who set up your account.

2.3 Choosing Passwords for Your Account

To choose a secure password, use the following guidelines:

Your system manager or security administrator may set up additional restrictions, for example, not allowing passwords with fewer than 10 characters or not allowing repeats of passwords.

2.3.1 Secure and High-Risk Passwords

The following table provides examples of secure passwords and high-risk passwords (words that others might easily guess):
Secure Passwords High-Risk Passwords
Nonsense syllables:
aladaskgam
eojfuvcue
joxtyois
Words with a strong personal association:
your name
the name of a loved one
the name of your pet
the name of your town
the name of your automobile
A mixed string:
492_weid
$924spa
zu_$rags
A work-related term:
your company name
a special project
your work group name

2.3.2 Obtaining Your Initial Password

Typically, when you learn that an account has been created for you on the system, you are told whether a user password is required. If user passwords are in effect, your system manager will usually assign a specific password for your first login. This password has been placed in the system user authorization file (UAF) with other information about how your account can be used.

It is inadvisable to have passwords that others could easily guess. Ask the person creating the account for you to specify a password that is difficult to guess. If you have no control over the password you are given, you might be given a password that is the same as your first name. If so, change it immediately after you log in. (The use of first or last names as passwords is a practice so well known that it is undesirable from a security standpoint.)

At the time your account is created, you should also be told a minimum length for your password and whether you can choose your new password or whether the system generates the password for you.

2.3.3 Changing Your Initial Password

Log in to your account soon after it is created to change your password. If there is a time lapse from the moment your account is created until your first login, other users might log in to your account successfully, gaining a chance to damage the system. Similarly, if you neglect to change the password or are unable to do so, the system remains vulnerable. Possible damage depends largely on what other security measures are in effect.

2.3.4 Restrictions on Passwords

The system screens passwords for acceptability, as follows:

The system rejects any passwords that it finds in a system dictionary, that you have used before, and that are shorter than the minimum password length specified in your UAF.

2.3.5 Types of Passwords

There are several types of passwords recognized by the OpenVMS operating system:

2.3.6 Entering a System Password

Your security administrator will tell you if you must specify a system password to log in to one or more of the terminals designated for your use. Ask your security administrator for the current system password, how often it changes, and how to obtain the new system password when it does change.

2.3.7 How to Enter a System Password

To specify a system password, do the following:
Step Task
1 Press the Return key until the terminal responds with the recognition character, which is commonly a bell.
      [Return]
      
<bell>
2 Enter the system password and press Return:
      [Return]
      

There is no prompt and the system does not display the characters you type. If you fail to specify the correct system password, the system does not notify you. (Initially, you might think the system is malfunctioning unless you know that a system password is required at that terminal.) If you do not receive a response from the system, assume that you have entered the wrong password and try again.

3 When you enter the correct system password, you receive the system announcement message, if there is one, followed by the Username: prompt. For example:
MAPLE - A member of the Forest Cluster
      
Unauthorized Access is Prohibited

Username:

2.3.8 Entering a Secondary Password

Your security administrator decides whether to require the use of secondary passwords for your account at the time your account is created. When your account requires primary and secondary passwords, you need two passwords to log in. Minimum password length, which the security administrator specifies in your UAF, applies to both passwords.

As with a single password login, the system allots a limited amount of time for the entire login. If you do not enter a secondary password in time, the login period expires.

2.3.9 Example

The following example shows a login that requires primary and secondary passwords:

 
     WILLOW - A member of the Forest Cluster
         Welcome to OpenVMS on node WILLOW
 
Username: RWOODS
Password:           [Return]
Password:           [Return]
    Last interactive login on Friday, 11-DEC-1996 10:22
$

2.3.10 Password Requirements for Different Types of Accounts

Four types of user accounts are available on OpenVMS systems:

2.4 Reading Informational Messages

When you log in from a terminal that is directly connected to a computer, the OpenVMS system displays informational system messages.

2.4.1 Example: Local Login Messages

WILLOW - A member of the Forest Cluster                        (1)
        Unlawful Access is Prohibited        
 
Username:  RWOODS
Password:
    You have the following disconnected process:               (2)
Terminal   Process name    Image name                              
VTA52:     RWOODS          (none)
Connect to above listed process [YES]: NO
         Welcome to OpenVMS on node WILLOW                     (3)   
    Last interactive login on Wednesday,  11-DEC-1996 10:20    (4)
    Last non-interactive login on Monday, 30-NOV-1996 17:39    (5)
        2 failures since last successful login                 (6)
 
          You have 1 new mail message.                         (7)
 
  $


Previous | Next | Contents | [Home] | [Comments] | [Ordering info] | [Help]

[HR]

  6489P001.HTM
  OSSG Documentation
  22-NOV-1996 13:16:31.87

Copyright © Digital Equipment Corporation 1996. All Rights Reserved.

Legal