Openvms download iso






















But hardware only lives that long. The current technology standard is X86 and the vast majority of available computer equipment is based on that architecture. Unfortunately, your Alpha and VAX software installation is incompatible with X86, which makes it difficult to move away from the old hardware. An elegant and inexpensive solution to your problem.

It is abysmal code, but it provides an interesting look at the way locks are being used on your system. Eventually this will become a better program, it is really only an "alpha" test program at this point. While looking through the results of this program, you will want to look at the Appendix in Volume 2 of the Update Express version of the Internals and Data Structures Manual.

It recurses through directory trees, building HTML pages and imagemap GIF or JPEG files to allow the user to navigate through collections of thumbnail images somewhat similar to 'xv' and select the images to view with a mouse click. ImageMagick is needed to run it. OBJ and. STB files and turn them into source files for various languages. By logging in to the other account the privileged user inherits the other user's complete environment, privileges, logical names, dcl symbols, process quotas etc.

Splits long files into segments that fit on floppy disks. This is to help determine security issues releating to passwords. I use this program to verify that new users don't use "simple" passwords. This contains various headers used by the utilities.

McCracken, Northern Arizona University, in This version implements a stack of the last 16 directories visited, as well as short-cuts for specifying directory specs.

Instead it is meant to cover the search needs for a single company, campus, or even a particular sub section of a web site. The type of these different web servers doesn't matter as long as they understand the HTTP 1.

The program appears to run correctly and identically on Alpha and IA I haven't tried this version on VAX, or on any other operating system. Also modified by Jerome Lauret. Bugfizes by Bart Z. The package includes tools for image conversion, annotation, compositing, animation, and creating montages. ImageMagick can read and write many of the more popular image formats e.

ZIP format and decompress them. It has two main windows oprating on whole tracks and single events. There are special functions like GS sound editing and random rhythm generation. It is currently set up to build correctly on VAX systems. Peirce, VAX and Alpha. OBJs added by Hunter Goatley 80 JPI An OpenVMS wide-area network tool which is used to create a one line per process static information display for all processes matching specified selection criteria, displaying the output according to display criteria.

JPI V2. This defragger will defragment albeit somewhat slowly VMS volumes and uses Movefile as its only method of moving files. It is rather a resource hog, but will work. Limitations are placed on Operators: they cannot target users who have more than a certain set of privileges unless they are specifically authorised to do so. Jonathan Ridler 30 v2.

Think of it as a terminate and stay resident program for VAXen. It is suitable to dump text files containing Japanese Kanji or Hankaku Katakana characters. COM creates or extends a system file in as contiguous a manner as possible. COM logically combines feedback data from multiple files.

MAR program. COM: version with abbreviated, more-compact output, and optional support for disaster-tolerant clusters. KILL accepts usernames on the command line; each process running under that username is displayed and you are given the chance to kill it or force an exit for the process.

Includes the ability to kill only disconnected processes, processes on a particular node, etc. It has flexible scheduling criteria, an error-minimizing interface, and a set of useful sample jobs to demonstrate system mangement and security functions. Kronos has been designed to be reliable and flexible.

Works with many types of printers, handles LAT devices, page accounting, flag and trailer pages, Ascii and Postscript files.

Written by Rick Watson, changes by Mark London 10 , 20, 30, 40, 80 last The LAST program provides information on when the last time a user logged in, what group they are from and how many days it has been. This is done using system routines. This was done under the assumption that the user's directory was created when the account was created. Jonathan C. This allows one to grab another's last command no matter in what environment the target user may be.

Utilities using SMG do not use the typeahead buffer and there are a few other exceptions. In these cases, LASTCMD will still report the last command in the typeahead buffer; that command just may not be the very, very thing the user is doing at the moment. The first 12 bytes are three "F"-type floats which are the 1, 5, and 15 minute load averages respectively.

The next 12 bytes are the 1, 5, and 15 minute average blocking priority if your process is below the average blocking priority you aren't going to get much CPU, if above it you will get a lot. It features a new DCL command that can request or release a lock on an arbitrary named resource. LCK also features a callable interface a. API so that programmers can use the same mechanism from within their programs, without having to write cumbersome system calls.

VAX Jur van der Burg 10 , 20, 30, 40, 50, 60 7. It is used by several software packages, including Python. The utility will allow a user to modify their own information no one else's. Those defs are then copied into the Modify Table list. Each process has a default list of logical name tables available to its environment.

These modules allow you to specify 66 lines, 80 chars, portrait; 66 lines, chars, landscape; various others, or to create your own. This utility generates 'mail directory'-styled listings of a mail file. Messages to be listed can be selected based on from, to, subject, date or folder name. Messages from more than one folder can be listed. West 80 lww-remtree Deletes all subdirectories and files in a tree Lyle W.

West 80 lww-revert Changes file version numbers of files in a directory Lyle W. And it has a TPU routine to do rot encryption.

DAT originally by W. Eric Wentz 7-Jan , Version 4. MBU can create mailboxes, delete mailboxes, read and write mailbox messages, and display and change the characteristics of mailboxes.

It can also view messages in a mailbox without reading them. It features a new DCL command that can create, delete, attach, detach, write to, and read from mailboxes. MBX also features a callable interface a. This API is available as an upward-compatible shareable image. The kit contains a definition of the six service calls in pascal environment format, and in SDL syntax.

Marc VanDyck 50 MD5 MD5 is a tool used to verify file downloads and for checking for file integrity in the event of accidental or intentional file modifications. MENU provides the menu builder with a fairly simple, yet fairly robust set of options to create menus.

A second "free flow" type of menu is also supported, although there isn't support for selecting items via arrow key manipulation. Menus are composed of instructions that create title lines text lines , item lines which describe an item that can be selected with the arrow keys , and command lines lines that define "hidden" items, or otherwise affect menus.

It also Huffman packs files for archive purposes, and can unpack these packed archive files. To the extent that Mesa utilizes the OpenGL command syntax or state machine, it is being used with authorization from Silicon Graphics, Inc. Miniproc is intended to be a portable, and much simpler, alternative to perl and M4. Following modes can be set or cleaned. It enables one to use standalone programs as if they were plugins for Mozilla. The primary goal of these codecs is to provide the functionality - these codecs are not optimized for speed, rather completeness, and some of the code is kludgey.

Gregory P. The decoder is implemented as a library that will take a video stream and display it in an X window on an 8, 24 or 32 bit deep display. The main routine is supplied to demonstrate the use of the decoder library. Several dithering algorithms are supplied based on the Floyd-Steinberg, ordered dither, and half-toning algorithms that tradeoff quality and performance. Neither the library nor the main routine handle real-time synchronization or audio streams. Lawrence A.

MPEG 1. These exe's require VMS V7. Version 1. It was created by support professionals with over 50 years combined experience engineering, architecting, and implementing customer support and help desk automation solutions. Daniel Taupin 40 MX 4. MX uses VMS Mail for local message entry and delivery, and includes support for mailing lists and mail-based file servers. By using the NNTP server, users can read news from personal workstations with the program accessing the news groups and articles from a central repository on the local area network.

Version 0. It uses the cluster multicast message to gather information about clusters. Alternately, it displays your new message count. NIST-ACTS will compute the actual round trip delay and if it receives four consecutive echos that fall within a certain range of variation, it will calculate the round trip time and divide by two, then send a special character in a final message to indicate that time synchronization has been achieved.

In any case, it logs all data traffic along with the difference between the system time and NIST time. This allows you to queue up mail to nodes that are currently unreachable, for example, or to transmit long documents without needing to wait until transmission is complete.

West NOTES Notes conferences allow discussions among engineering teams, and can also be used for publication, tracking, and other related tasks. Wilson, S. Oscar's Menu Interpreter is a menu environment that reads menu files and represents the menu structure on a ChUI based window. OMI does not perform any actions on its own. Additional procedures are required to handle upon the users input. It comes with a toolbox loaded with functions that can be used to create these procedures.

OMI is written to create a standard user interface for all kinds of actions, with a clear structure, support for different security levels and password protection. It also checks for pointers in MAIL. MAI with no mail message files. You can limit the numbers of parallel uses of a locally-licensed application using the LMF units or activitiesmechanisms, and you can enable or disable access to an application by loading or unloading a particular locally-defined license PAK.

This module does not allow the password to be the following: The username and variations on such The account name from the UAF and variations on such.

In addition to the converters, the package includes some simple tools for manipulating the portable formats. ALerts are generated if values outside the calculated norm are seen. Full source and doc included. It was designed specifically with novice computer users in mind, but can be tailored to accommodate the needs of "power users" as well. Pine uses Internet message protocols e. It was generated from the Fortran source code with Netlib's F2C.

If you use the DecWindows environment, you can use mouse-clicks, otherwise you must use keyboard-keys. You can establish, change or remove: a vacation message; multiple forwarding addresses; multiple filters to discard messages based on "From" and "Subject" lines.

This version has been modified to display it's preview window on plane systems, as well as 8-plane systems. It is also "quiet" by default does not print information messages. TGA files into. It is designed for ease-of-use by users and operators who do not wish to learn, or have no direct access to, the DCL commands which are relevant to printer queues.

The report produced lists all images run on the systems sorted by product name if known and imagename with the maximum number of concurrent users and the number of different usernames running the product on each node.

It supports the standard 35 PostScript fonts and color. The information retrieved includes: The process name. The name of the node on which the process is running. The current process state. The CPU time that has been charged to the process so far. Current process resource quotas. Enabled and pending AST's for this process.

It is intended to help investigating why a process appears hung. The caller should be asked these questions. If they are answered correctly, the password can be changed. If not, the account can be disabled. It can keep a relatively small amount of information about a relatively large number of people or things, and provide fast access to that information over the Internet.

It contains new features, but has not been thoroughly tested. Only text-only card files are supported. It contains graphical interfaces for SunView, X11 and XView, as well as being able to function on normal display terminals using a termcap interface. C, Program to print indexed file alternate key statistics. C, Example program from RMS reference manual which will show the index root levels for files. Proven useful trying to recover remote files over slow links.

This utility allows non-stop application operation where it might otherwise be unavailable due to having to create new RMS after-image journal files on a periodic basis.

RuleWorks is an evolutionary step past OPS5. There is a Run-Time Library for each supported platform and C compiler. Only disks directly connected to a VAX or Alpha machine can be used. It provides a free security suite, a hierarchical storage manager function, and a RELIABLE undelete system plus fragmentation avoidance and other handy utilities.

John Malmberg 50 , 70, 80 2. Dachtera Sapphire Sapphire is an acoustic compiler: a program which takes a representation of sound as a text file and generates the sound from it, rather like a ray-tracing package takes a text representation of a scene and generates a picture from it.

Finnis 40 Scan Printers Scan Printers periodically scans printers queues and sends requests to several "operators" for stalled, paused or stooped queues. It can also restart these queues and release holding jobs. Hooks are available for customers to write their own CPU class scheduling policies. This article discusses some potential uses of class scheduling and the callouts available to system programmers for writing a class scheduler policy.

A sample CPU class scheduler is provided. Thomas M. Thus you can take unlike disks and make virtual disks out of parts of them, and shadow the parts. The remaining parts of the disks can be used either as separate virtual disks or as other file structures, if you decide to make file structures on the raw disks first and place the virtual disks on contiguous files on them. Provides graphical display of users accross the cluster.

Original author unknown, modifications by Jonathan C. Load averages for the number of computables processes and disk queue lengths are displayed. If a user is running at a rate that is consuming more than 30 CPU minutes per hour of connect time MPH , the user is flagged with an asterisk. It then interrogates all processes on the system in order to find which processes have the given global section mapped. It uses the process id as first parameter. Full sources are present. AXP and Vax executables are present.

Setuser - "become" some other user if you have privs. Full source present. Works on little endian machines e. AXP or big endian ones e. Knows kermit and xmodem and its own protocols and has a sophisticated script language so it can be used to call pagers etc.

Note the kermit protocol used is a basic one, but it does work. Xmodem checksum or crc are both there. It contains executables for 7.

It can accomodate any number of sounds at once, each with any number of channels. Each channel is normally displayed in its own window, with its own cursor, edit history, and marks; each sound has a 'control panel' to try out various changes quickly, and an expression parser, used mainly during searches; there is an overall stack of 'regions' that can be browsed and edited; channels and sounds can be grouped together during editing; edits can be undone and redone without restriction 'unlimited undo' ; Snd can be customized and extended using a built-in Scheme interpreter Gnu Guile ; and it's free; the code is available via anonymous ftp from ccrma-ftp.

This release understands "raw" files in various binary formats, raw textual data, Sound Blaster. The sound effects include changing the sample rate, adding echo delay lines, applying low-, high, and band-pass filtering, reversing a sample in order to search for Satanic messages, and the infamous Fender Vibro effect. Some of the interfaces used here are documented, some are not. Some of the examples are commented, some are not.

HLP for more info. See WHO. PHOTO starts terminal input and output logging to a log file. Can be configured to record both input and output, or just terminal input.

It provides all of the functionality of the original command as well as several enhancements and a greatly simplified user interface. This utility will read a log file created by the Tru64 Unix "collect" utility, which collects system performance information, and convert it to a CSV comma separated value text file which is compatible with T4 performance data collection utilities.

VAX E. Babbitt, Jr. The program replaces two of the VMS symbiont routines, "output" and "job setup", you may wish to replace other routines based on your specific requirements. It can be used to check the operation and performance of block-oriented IO caching products or as a benchmark between different physical devices.

The main features are: Ability to perform random or sequential access scans. Ability to select logical or physical seek ranges. Ability to perform parallel multi-threaded IO's. Spieler and R. The audio data can be played through any sound device or stored on disk.

On a fast machine, music can be played in real time. Trusted Contributor. Anyone succeeded with createing such an ISO image? I so, what program did you use? Thanks, Guenther. Tags: ISO image. All forum topics Previous Topic Next Topic.

Valued Contributor. I hope this helps. Honored Contributor. It did exactly what I wanted. The opinions expressed above are the personal opinions of the authors, not of Hewlett Packard Enterprise. By using this site, you accept the Terms of Use and Rules of Participation.



0コメント

  • 1000 / 1000