THis is a submission from the VAX Professional Magazine. The file 1_MASTER_LIST.TXT is information on the material in this submission and information on the VAX Professional Magazine. ORDERING INFO CONTACTS Georgiann Dunion (215) 957-4266 VAX Professional subscriptions Back issue information and orders *** *** *** Tape Contents: C Utilities In Ada Filename: ADA.VAX This file features code published in VAX Professional, February 1991. It was written by Alan Cohn and appeared in his article, "C Utilities In Ada." The procedure, called ada.string, contains astring functions and procedures. RMS Block I/O Filename: BLOCKO.VAX This file features code published in VAX Professional, February 1991. It was written by Mark Petrie and appeared in his article, "RMS Block I/O." RMS offers the capability to do block I/O transfers which allow for large data transfers. Each block contains many records, so you can move a lot of data per call. This procedure allows you to do that. This file was updated to include a correction, described in a text forward to the actual program. Synchronize Processing Across A VAXcluster System Filename: SYNCHR.VAX The programs featured in this file were published in VAX Professional, February 1991, as part of an article titled "Using The VAX Distributed Lock Manager To Synchronize Processing Across A VAXcluster System," written by Tom Speake. The programs LATCH and STROBE start programs simultaneously on several VAXcluster nodes. Zeroing In On Runaway Identifiers Filename: RUVOLO.VAX This file features code published in VAX Professional, February 1991. It was written by Joseph P. Ruvolo as part of his article, "Zeroing In On Runaway Identifiers." The program finds all the holders of an identifier or all the identifiers of a holder. Using PHONE Object To Show Users On Another Node Filename: PHONEU.VAX This file features code published in VAX Professional, February 1991. It was written by Jim Egerton and appeared in his article, "Using The PHONE Object To Show Users On Another Node." The procedure tells you if a particular user is logged onto another node in the network. It starts up a PHONE slave process through Decnet and follows the PHONE protocol. Storing The Terminal Server And Port Filename: LOGPRT.VAX This file features code published in VAX Professional, February 1991. It was written by Kevin Homan and appeared in his article, "Storing The Terminal Server And Port In VMS Accounting." This procedure stores the port and server in the remote ID and remote node name fields, and restricts AUDIT to logging only login failures and break-in attempts. The Hitchhiker's Guide To VMS: Episode 7.2 Filename: HIKER7.VAX This file features code published in VAX Professional, February 1991. It was published under the title, "The Hitchhiker's Guide To VMS: Episode 7.2," by Bruce Ellis. The program prompts for a directory specification, opens the directory file, and uses the file ID of the files catalogued in the directory to count the number of file headers and mapping pointers for each file. Creating DECterm Windows Filename: DECTRM.VAX This file features code published in VAX Professional, February 1991. It was written by David W. Bynon as part of his article, "Creating DECterm Windows." The program enables you to create your own DECterm windows for just about any purpose, including working on multiple accounts. Break-In Detection Notifier Facility Filename: BREAKN.VAX This file features code published in VAX Professional, February 1991. It was written by J. Wren Hunt and appeared in his article, "Break-In Detection Notifier Facility." The program reads the audit mailbox, acts on incoming audit messages, and notifies designated terminals of break-in attempts. VMS Kernels: MAIL In Alphabetical Order Filename: MAIL.VAX This file features code published in the April 1991 issue of VAX Professional magazine. Written by Jerrold Leichter, Ph.D. as part of his article, "VMS Kernels: MAIL In Alphabetical Order," which appeared on page 32, the program here cleans up and reorganizes mail stuff. Evrything in the DEAD folder is discarded. Everything in the DELETED folder more than a month old is discarded. Then the MAIL.MAI file is rebuilt, and the mail subdirectory is rebuilt. A Remote DECterm Client And Server Filename: WINDOW.VAX This file features code previously published in the April 1991 issue of VAX Professional magazine. The procedure was written by John McMahon as part of his article, "A Remote DECterm Client And Server," which appears on page 15. Here's a resource saving twist on the normal method of having the local VAXstation access a remote VAX through DECwindows. With the procedure presented here, a remote VAX opens a window on the local workstation. Extending VAX COBOLs Argument-Accepting Mechanism Filename: RENAME.VAX This file features code previously published in the April 1991 issue of VAX Professional magazine. Originally run as part of Joseph P. Ruvolo's article, "Extending VAX COBOL's Argument-Accepting Mechanisms," which appears on page 20, the program here makes COBOL programs accept arguments both by reference and descriptor. Saving And Restoring The DCL Recall Buffer Filename: RECALL.VAX This file features code previously published in the April 1991 issue of VAX Professional magazine. It was originally run as part of M.D. Kosta and Phil LoVecchio's article, "Saving And Restoring The DCL Recall Buffer," which appeared on page 28. Sometimes, it might be handy to reconstruct the contents of the RECALL buffer after logging out of a session. Here's a method to accomplish that task. Poor Man's CASE Filename: FDE.VAX This file features code previously published in the April 1991 issue of VAX Professional magazine. Originally run as part of Don Weyel's article, "Poor Man's CASE," which appeared on page 24, this home-grown CASE utility uses existing VMS facilities to increase programmer productivity on small to medium sized programming projects. It lacks the bells and whistles of VAXset; use it when simplicity is sufficient. Using PC DECwindows Filename: PCDECW.VAX This file contains code previously published in the April 1991 issue of VAX Professional magazine. Written by Hunter Goatley and originally run as part of his article, "Using PC DECwindows," which appears on page 8, the command file is executed by the PC DECwindows display facility. It starts the DECwindows Session Manager (DECW$SESSION), waits for it to get started, and then starts the DECwindows Window Manager (DECW$WINMGR). The Hitchhiker's Guide To VMS: Episode 8 Filename: GUIDE8.VAX This file features Episode 8 of Bruce Ellis' "The Hitchhiker's Guide To VMS," which ran in the April 1991 issue of VAX Professional magazine on page 34. The code here has a lengthy description which wouldn't fit into this tiny buffer. What does Billy do when he gets stuck in heavy traffic? Read Episode 8 and see! Automating Cluster Shutdown Filename: SHUTDN.VAX This file features a commmand procedure to shut down all the nodes on a cluster. It preserves most of the flexibility of the standard VMS shutdown command. It asks the same questions in the same order as the normal shutdown procedure. It synchronizes the shutdown so the nodes can exit in the correct order. SHUTDN.VAX first ran on page 14 of the June 1991 VAX Professional, as part of Barry J. Gillin's article, "Automating Cluster Shutdown." X Views: Using DEC PHIGS With DECwindows Filename: PHIGSX.VAX This file features code previously published in the June 1991 issue of VAX Professional magazine. It was first run as part of Garry Poegel's article, "X Views: Using DEC PHIGS, DEC GKS, And DEC GKS-3D With DECwindows," which appeared on page 29. DEC GKS, DEC GKS-3D and DEC PHIGS provide facilites that allow an application to use both the graphics library and X11 as needed. Here's how to integrate these higher-level graphics with X. The Hitchhiker's Guide To VMS: Episode 9 Filename: HIKER9.VAX This file features code written by Bruce Ellis as part of his article, "The Hitchhiker's Guide To VMS: Episode 9." Originally run in the June 1991 issue of VAX Professional magazine on page 35, Episode 9 answers these questions: Does Billy ever write a program to track open files or is he just blowing smoke? Does the girl really like the SHOW_SHARE program? Does she like Billy? Can OLTP really be done on windowing systems? Restricting Access To WAN And Cluster Nodes Filename: CHECK.VAX This file features code published in the June 1991 issue of VAX Professional magazine, as part of James McNamara's article "Restricting Access To WAN And Cluster Nodes," which appeared on page 17. Because of programs like the WANK worm, you might want to restrict network access by FAL, PHONE and NML to a small group of trusted nodes in a WAN. A filter program run at login can serve this purpose by logging out access attempts by unknown nodes.