[SYMBOL][A][B][C][D][E][F][G][H][I][J][K][L][M][N][O][P][Q][R][S][T][U][V][W][X][Y][Z]r (read)mode r format code (date() function) RAM disksscoreboard filesfile system access (scalability) rand switchkey pairscreating (certificates) raw headersfroms 2nd RC2symmetric cryptography RC4symmetric cryptography read mode readdir() function 2nd 3rd readingdirectory contents 2nd 3rd filesarbitrary data amounts 2nd 3rd characters 2nd 3rd lines 2nd 3rd using popen() function 2nd 3rd 4th 5th 6th README file realmsauthenticationAuthName directive recordingeventserror log recordsaddress book database table examplerecord addition script 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th records, adding subentries to 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th records, deleting 2nd 3rd 4th records, selecting and viewing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th records, selecting and viewingt inserting 2nd rectanglesImageFilledRectangle() function ImageRectangle() function reducingtransmitted data (performance) 2nd reference passing (arguments) REFERENCES command registeringmultiple session variables 2nd relationships many-to-many 2nd 3rd 4th 5th one-to-many 2nd one-to-one 2nd RELOAD command removingprivileges 2nd REPEAT() function REPLACE command 2nd 3rd 4th REPLACE() function replacingstring portions 2nd substrings 2nd Reply-to header request headersname-based virtual hosting (syntax) 2nd request logscreating requestsclient requeststracking (access log) requests. [See also HTTP requests]Require directiveauthentication modules require once() function require() function 2nd reset() functionarrays resolvinghostnames(managing logs) resource data type restrictingaccessauthentication 2nd authentication modules 2nd 3rd 4th 5th based on cookie values 2nd 3rd 4th 5th 6th 7th 8th client authentication access (access control) 2nd 3rd 4th return statementsfunction values 2nd reverse DNS lookupsIP addresses REVOKE command 2nd 3rd 4th RGB color valuesimage creation 2nd RIGHT JOIN command RIGHT() function 2nd RLimitCPU directiveexternal processesoperating systems (scalability) RLimitMem directiveexternal processesoperating systems (scalability) RLimitNProc directiveexternal processesoperating systems (scalability) rmdir() function robotsabusepreventing robots.txt fileWeb spiders (preventing abuse) root user non-root users running MySQL asstopping root usersMySQL running as 2nd rotatelogs programlogsrotating (Unix) rotatelogs utilitylogging program rotatelogs.exe programlogsrotating (Unix) rotatinglogs rowsmysql num rows() function RPAD() function RSApublic key cryptography RTRIM() function 2nd 3rd 4th running commandswith exec() function 2nd 3rd 4th with passthru() function with system() function 2nd 3rd 4th 5th