[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] a (append) mode a format code (date() function) A format code (date() function) ab ApacheBench (performance tool) aborted connects status variable AbriaSoft Web site abs() function 2nd 3rd abuse preventing robots Web crawlers Web spiders preventing (performance) Accept mechanism network setting (scalability) access control access rules (IP addresses) rules (network/mask pair) rules (partial IP addresses) denied troubleshooting file system access settings (scalability) granting limiting HTTP methods 2nd methods combining restricing access control 2nd 3rd 4th restricting authentication 2nd authentication modules 2nd 3rd 4th 5th based on cookie values 2nd 3rd 4th 5th 6th 7th 8th client authentication access control access restricting 2nd 3rd 4th rules 2nd all clients domain names environment variables evaluating 2nd Access denied message access log log file AccessFileName directive per-directory configuration files accessing Apache browsers files last date accessed information MySQL 2nd MySQL functions variables 2nd 3rd 4th 5th 6th ACTION argument adding files documents users database file-based access control authentication 2nd addition (+) operator addition operator (+) addNums() function address book database table example date added field date modified field menus, creating 2nd record addition script 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th records, adding subentries to 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th records, deleting 2nd 3rd 4th 5th records, selecting and viewing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th table name fields 2nd 3rd 4th 5th 6th 7th 8th addresses IP IP addresses control access rules reverse DNS lookups IP addresses (partial) control access rules listening addresses (Listen directive) alert LogLevel directive option algorithms digest integrity (SSL protocols) digest algorithms public key cryptography symmetric cryptography all clients access control rules ALL command Allow directives access control rules Allow, Deny argument Order directive AllowOverride directive per-directory configuration files ALTER command ampersand (&) and operator (&&) analying logs analyzing digital certificates and (&&) operator and operator (&&) Apache configuration file structyure installing binary method from source methods for, selecting on Linux/Unix 2nd on Windows 2nd 3rd 4th 5th 6th 7th installing PHP on Linux/Unix with 2nd 3rd 4th 5th 6th integrating PHP with, on windows 2nd 3rd Web site apache.exe commands controlling Apache (Windows) shortcuts server binary command (Windows) ApacheBench performance tool (Web site) 2nd apachectl script apachectl tool control script command (UNIX) append (a) mode appending files applications setup.exe winmysqladmin winmysqladmin.exe applications. [See also discussion forums] applying directives directories files URLs arguments ACTION Allow, Deny argument Order directive AllowOverride directive CustomLog directive default values 2nd 3rd 4th Deny, Allow argument Order directive 2nd directives ENCRYPT flock() function format control strings and 2nd 3rd 4th function requiring two example 2nd HostNameLookups directive LogFormat directive logs rotating Mutual-Failure argument Order directive optional example 2nd 3rd reference passing ServerRoot directive TYPE value passing example 2nd 3rd 4th 5th arithmetic operators 2nd array data type arrays $GLOBALS looping through 2nd 3rd getdate() function mysql fetch array() function strings, breaking into 2nd aruments syslog daemon errors;logging (Unix) ASCII() function 2nd 3rd ASP tags 2nd asp tags setting assignment operator (=) 2nd 3rd assignment operator (=). [See also combined assignment operators]2nd [See also combined assignment operators]3rd [See also combined assignment operators]4th [See also combined assignment operators] asterisk (*) multiplication operator (*) asymmetric cryptography. [See public key cryptography] attacks abuse preventing (performance) attributes size auth cookie auth cookies 2nd auth users table 2nd 3rd AuthAuthoritative directives file-based authentication AuthConfig directive value AuthDBMGroupFile directive database file-based access control authentication AuthDBMUserFile directive database file-based access control authentication authentication access resticting 2nd basic 2nd browsers AuthType directive client authentication access;restricting communications security database file-based access control mod auth dbm module 2nd 3rd digest 2nd file-based mod auth module 2nd 3rd modules access (restricting) 2nd 3rd 4th 5th directives functions realm AuthName directive SSL protocols 2nd 3rd 4th connections 2nd authentication process errors in 2nd 3rd 4th authenticaton database file-based access control backend storage user managment 2nd file-based AuthAuthoritative directive backend storage user management AuthGroupFile directive users file backend storage AuthName directive authentication modules authoritative information functions authentication modules AuthType directive authentication modules AuthUserFile directive users file backend storage awstats log analysis |