MIME$HELP.HLB  —  SHOW  CONTENT_TYPE, MIME$MAILCAP.DAT
 The Content-Type table defines how an attachment is read, and
 optionally,  how its output is converted when extracted with the
 X-FDL=file option. It is constructed from program built-in types
 and is read from the optional MIME$MAILCAP.DAT configuration files
 (if they exist).

   SYS$MANAGER:MIME$MAILCAP.DAT

   SYS$LOGIN:MIME$MAILCAP.DAT

 System-wide Content-Types are specified by the file
 SYS$MANAGER:MIME$MAILCAP.DAT and can be supplemented with
 additional entries found in the SYS$LOGIN:MIME$MAILCAP.DAT file.
 These files are not created by default for customization on a per
 system/site basis. The MIME$MAILCAP.DAT file follows the general
 format of (Request for Comments) RFC 1524.

   TYPE/SUBTYPE VIEW_COMMAND

 The Content-Type table is constructed beginning with the built-in
 types, then adding the system definitions from the system manager's
 MIME$MAILCAP.DAT file, and ending with data from the user's
 default login directory MIME$MAILCAP.DAT file.

 The entries are displayed in order of the most recently defined
 (LIFO) entries. In the case of duplicate entries, the first entry
 is used. This allows a user to customize their own environment while
 the system manager defines a default system or site environment
 for all users.

 Note that by default, only the minimal ASCII types and subtypes are
 defined. This allows customizing MIME to the system, and for security
 reasons, allows a regulated site environment.

 Consider the effect of a malicious user mailing a harmful image
 (.EXE) file that is executed upon being read with the OpenVMS MIME
 utility. RFC 2046 lists certain security considerations that should
 be noted, such as PostScript files that include PostScript operators
 such as "deletefile" and others that can be used in a malicious
 manner.

 For more information, see Example_MIME$MAILCAP.DAT help section.
Close Help