[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] r (read)mode r format code (date() function) RAM disks scoreboard files file system access (scalability) rand switch key pairs creating (certificates) raw headers froms 2nd RC2 symmetric cryptography RC4 symmetric cryptography read mode readdir() function 2nd 3rd reading directory contents 2nd 3rd files arbitrary data amounts 2nd 3rd characters 2nd 3rd lines 2nd 3rd README file realms authentication AuthName directive recording events error log records address book database table example record addition script 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th records, adding subentries to 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th records, deleting 2nd 3rd 4th 5th records, selecting and viewing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th records, selecting and viewingt inserting 2nd 3rd 4th reducing transmitted data (performance) 2nd reference passing (arguments) REFERENCES command registering multiple session variables 2nd relationships many-to-many 2nd 3rd 4th 5th one-to-many 2nd one-to-one 2nd RELOAD command removing privileges 2nd REPEAT() function REPLACE command 2nd 3rd 4th REPLACE() function replacing string portions 2nd substrings 2nd 3rd Reply-to header request headers name-based virtual hosting (syntax) 2nd request logs creating requests client requests tracking (access log) requests. [See also HTTP requests] Require directive authentication modules require once() function require() function 2nd resolving hostnames(managing logs) 2nd resource data type restricting access authentication 2nd authentication modules 2nd 3rd 4th 5th based on cookie values 2nd 3rd 4th 5th 6th 7th 8th client authentication access (access control) 2nd 3rd 4th return statements function values 2nd 3rd reverse DNS lookups IP addresses REVOKE command 2nd 3rd 4th RIGHT JOIN command RIGHT() function 2nd RLimitCPU directive external processes operating systems (scalability) RLimitMem directive external processes operating systems (scalability) RLimitNProc directive external processes operating systems (scalability) rmdir() function robots abuse preventing robots.txt file Web spiders (preventing abuse) root user non-root users running MySQL as stopping root users MySQL running as rotatelogs program logs rotating (Unix) rotatelogs utility logging program rotatelogs.exe program logs rotating (Unix) rotating logs 2nd rows mysql num rows() function RPAD() function RPMS installing MySQL on Linux.Unix using RSA public key cryptography rtrim() function 2nd 3rd RTRIM() function 2nd 3rd 4th |