Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] r (read)mode r format code (date() function) RAM disks scoreboard files file system access (scalability) rand switch key pairs creating (certificates) raw headers froms 2nd RC2 symmetric cryptography RC4 symmetric cryptography read mode readdir() function 2nd 3rd 4th reading directory contents 2nd 3rd 4th files arbitrary data amounts 2nd 3rd characters 2nd 3rd lines 2nd using popen() function 2nd 3rd 4th 5th 6th reading from files feof() function 2nd 3rd 4th fgetc() 2nd fgets() function 2nd 3rd 4th fread() 2nd 3rd 4th fseek() function README file realms authentication AuthName directive recording events error log records address book database table example record addition script 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th records, adding subentries to 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th records, deleting 2nd 3rd 4th records, selecting and viewing 2nd 3rd 4th 5th 6th 7th 8th 9th records, selecting and viewingt inserting 2nd rectangles ImageFilledRectangle() function ImageRectangle() function reducing transmitted data (performance) 2nd reference passing (arguments) 2nd 3rd 4th REFERENCES command registered users sessions with 2nd registering multiple session variables relationships many-to-many 2nd 3rd 4th 5th one-to-many 2nd one-to-one 2nd RELOAD command removing privileges 2nd REPEAT() function REPLACE command 2nd 3rd 4th REPLACE() function replacing string portions 2nd strings 2nd 3rd Reply-to header request headers name-based virtual hosting (syntax) 2nd request logs creating requests client requests tracking (access log) requests. [See also HTTP requests] Require directive authentication modules require once() function require() function 2nd reset() function arrays resolving hostnames(managing logs) resource data type restricting access authentication 2nd authentication modules 2nd 3rd 4th 5th based on cookie values 2nd 3rd 4th 5th 6th 7th client authentication access (access control) 2nd 3rd 4th return statement argument swapping return statements function values 2nd 3rd returning values form included documents 2nd reverse DNS lookups IP addresses REVOKE command 2nd 3rd 4th RGB color values image creation 2nd RIGHT JOIN command RIGHT() function RIGHT() functions RIGHT(); function RLimitCPU directive external processes operating systems (scalability) RLimitMem directive external processes operating systems (scalability) RLimitNProc directive external processes operating systems (scalability) rmdir() function robots abuse preventing robots.txt file Web spiders (preventing abuse) root user non-root users running MySQL as stopping root users MySQL running as 2nd rotatelogs program logs rotating (Unix) rotatelogs utility logging program rotatelogs.exe program logs rotating (Unix) rotating logs round robin DNS rows mysql num rows() function RPAD() function RTRIM() function 2nd 3rd 4th rtrim() function strings, cleaning up running commands with exec() function 2nd 3rd 4th with passthru() function with system() function 2nd 3rd 4th 5th |