Index: R - e-Reading Library
start page | rating of books | rating of authors | reviews | copyrights
Symbols & Numbers
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: R
- rand command (awk): 20.10.7. Alphabetical Summary of Commands
- random numbers in nawk (srand): 20.10.7. Alphabetical Summary of Commands
- ranges
- .. (integer-range) operator in zsh: 28.4. Build Strings with { }
- character ranges (hyphen-separated): 21.11. Hacking on Characters with tr
- character ranges in regular expressions: 21.11. Hacking on Characters with tr
- 32.8. Regular Expressions: Specifying a Range of Characters with [...]
- expanding: 9.23.2. Expanding Ranges
- Perl regular expression syntax for: 32.9. Regular Expressions: Exceptions in a Character Set
- rc shell: 1.6. There Are Many Shells
- rcp command: 1.21. Unix Networking and Communications
- -r option: 10.12. Copying Directory Trees with cp -r
- RCS (Revision Control System): 39.5. RCS Basics
- archiving files: 39.4. Managing and Sharing Files with RCS and CVS
- ci (checkin) command: 39.5. RCS Basics
- co (checkout command)
- -p option, sending file to standard output: 39.5. RCS Basics
- comparing directory with subdirectory, using pr: 21.15.1. One File per Column: -m
- Emacs support for: 19.2. Emacs Features: A Laundry List
- file utility, recognizing archives with: 12.6. Finding File Types
- listing revision numbers with rcsrevs script: 39.6. List RCS Revision Numbers with rcsrevs
- merging two or more file versions with rcsmerge and co Ðj: 39.5. RCS Basics
- searching files with rcsgrep commands: 13.7. Search RCS Files with rcsgrep
- unlocking files: 39.5. RCS Basics
- rcsdiff command: 11.3. Context diffs
- 39.6. List RCS Revision Numbers with rcsrevs
- rcsegrep.fast script: 13.7.2. rcsegrep.fast
- rcsgrep command: 13.1. Different Versions of grep
- 13.7. Search RCS Files with rcsgrep
- -a option: 39.6. List RCS Revision Numbers with rcsrevs
- rcsgrep script: 13.7.1. rcsgrep, rcsegrep, rcsfgrep
- RD (Receive Data) light: 5.6.4. Stalled Data Connection?
- rdesktop (RDP client for Unix): 47.9.2. rdesktop
- read command: 28.9.2. A for Loop
- ex editor: 20.4. Useful ex Commands
- reading from the keyboard: 35.18. read: Reading from the Keyboard
- while loops using: 36.11. Standard Input to a for Loop
- read-only files: 50.7. Protect Important Files: Make Them Unwritable
- read-only functions: 29.12. Shell Function Specifics
- read permission
- changing with chmod: 50.5. Using chmod to Change File Permission
- for directories: 7.3. Access to Directories
- 50.2. Tutorial on File and Directory Permissions
- execute permission without: 50.10. A Directory That People Can Access but Can't List
- finding files by: 9.15. Searching for Files by Permission
- shell scripts: 50.13. Shell Scripts Must Be Readable and (Usually) Executable
- reading files, access time and: 8.2. The Three Unix File Times
- reading from terminals
- process groups and: 24.3. Managing Processes: Overall Concepts
- reading-tar process: 10.13. Copying Directory Trees with tar and Pipes
- readline command: 5.8. Setting Your Erase, Kill, and Interrupt Characters
- Readline library
- inputrc file: 30.14.5. bash Editing
- setup filename, choosing: 35.5. Predefined Environment Variables
- recomment script: 21.4.1. The recomment Script
- recovering files
- cpio tape archive: 38.13. The cpio Tape Archiver
- Emacs, using: 19.4. Backup and Auto-Save Files
- vi -r command: 17.19. vi File Recovery Versus Networked Filesystems
- recovered buffers, cautions about: 17.20. Be Careful with vi -r Recovered Buffers
- recursion, tracing depth of: 29.11.4. Functions Calling Functions: Factorials
- recursive aliases: 29.8. Avoiding C-Shell Alias Loops
- recursive functions: 29.11.4. Functions Calling Functions: Factorials
- recursive permission changing: 50.5. Using chmod to Change File Permission
- recursive searching with grep: 9.11. Custom -exec Tests Applied
- Red Hat Linux (see Linux)
- redirect operator (>>): 17.12. Appending to an Existing File
- redirecting input and output: 43.1. Using Standard Input and Output
- C shell: 43.5. Redirection in C Shell: Capture Errors, Too?
- cat command: 43.2. One Argument with a cat Isn't Enough
- commands combined with grouping (( )) operator: 43.7. The ( ) Subshell Operators
- cron system output: 25.2. Periodic Program Execution: The cron Facility
- to /dev/null: 43.12. What Can You Do with an Empty File?
- FIFOs, using: 43.11. Named Pipes: FIFOs
- line numbers in redirected loops: 37.1.5. Line Numbers Reset Inside Redirected Loops
- to multiple processes: 43.10. Redirecting Output to More Than One Place
- noclobber, using: 43.6. Safe I/O Redirection with noclobber
- openstandard I/O files without: 36.15. Overview: Open Files and File Descriptors
- pagers, piping to: 43.4. Problems Piping to a Pager
- of programs: 36.15. Overview: Open Files and File Descriptors
- shell capabilities: 36.15. Overview: Open Files and File Descriptors
- shell output and errors into temporary file: 37.1.1. Use -xv
- standard error (only), piping: 43.3. Send (Only) Standard Error Down a Pipe
- standard input and standard output, using: 43.1. Using Standard Input and Output
- standard output and standard error: 36.16. n>&m: Swap Standard Output and Standard Error
- Bourne shells: 27.11. Is It "2>&1 file" or "> file 2>&1"? Why?
- standard output, shell processing of: 27.4. Command Evaluation and Accidentally Overwriting Files
- tee program: 43.8. Send Output Two or More Places
- redo operator (Perl): 41.6. Perl Boot Camp, Part 3: Branching and Looping
- references (Perl): 41.4. Perl Boot Camp, Part 1: Typical Script Anatomy
- 41.5.4. References
- dereferencing: 41.5.4. References
- reformatting text from one window before pasting it into another: 5.21. Tips for Copy and Paste Between Windows
- registry settings for clear text SMB passwords: 47.3. Securing Samba
- regular expressions: 13.2. Searching for Text with grep
- 17.8. Using Search Patterns and Global Commands
- 32.1. That's an Expression
- agrep command: 13.6. Approximate grep: agrep
- 13.6. Approximate grep: agrep
- awk utility: 20.10.2.1. Patterns
- egrep command: 9.22. lookfor: Which File Has That Word?
- 13.4. Extended Searching for Text with egrep
- examples of: 32.19. I Never Meta Character I Didn't Like
- expr command
- matching parts of strings: 36.23.1. Matching with expr
- testing character strings: 36.22. Testing Characters in a String with expr
- expressions, understanding: 32.3. Understanding Expressions
- extended: 32.15. Extended Regular Expressions
- alternation mechanism: 32.15. Extended Regular Expressions
- filename-matching patterns vs.: 32.2. Don't Confuse Regular Expressions with Wildcards
- finding lines that don't match a pattern: 13.3. Finding Text That Doesn't Match
- globally substituting for each match: 20.10.7. Alphabetical Summary of Commands
- interpreting: 32.3. Understanding Expressions
- limiting extent of match: 32.18. Limiting the Extent of a Match
- matching a character with a character set: 32.6. Regular Expressions: Matching a Character with a Character Set
- matching specific number of sets with { }: 32.11. Regular Expressions: Matching a Specific Number of Sets with { and }
- matching words with < >: 32.12. Regular Expressions: Matching Words with < and >
- metacharacters: 27.17. "Special" Characters and Operators
- 32.3. Understanding Expressions
- 32.4. Using Metacharacters in Regular Expressions
- for different Unix programs: 32.20. Valid Metacharacters for Different Unix Programs
- pattern context: 32.16. Getting Regular Expressions Right
- pattern matching, quick reference: 32.21. Pattern Matching Quick Reference with Examples
- replacement patterns: 32.21. Pattern Matching Quick Reference with Examples
- search and replace commands: 32.21.2. Examples of Searching and Replacing
- search patterns: 32.21. Pattern Matching Quick Reference with Examples
- 32.21.1. Examples of Searching
- Perl: 41.7. Perl Boot Camp, Part 4: Pattern Matching
- metacharacters in: 41.7. Perl Boot Camp, Part 4: Pattern Matching
- potential problem areas: 32.14. Regular Expressions: Potential Problems
- range of characters, specifying with [ ]: 32.8. Regular Expressions: Specifying a Range of Characters with [...]
- repeated patterns, matching with ( ): 32.13. Regular Expressions: Remembering Patterns with (, ), and 1
- repeating character sets with *: 32.10. Regular Expressions: Repeating Character Sets with *
- retrieving only matched text with xgrep script: 32.17. Just What Does a Regular Expression Match?
- sed editor: 13.11. Narrowing a Search Quickly
- addresses: 34.5. sed Addressing Basics
- 34.5. sed Addressing Basics
- delimiting: 34.8. Delimiting a Regular Expression
- searching for patterns split across lines: 34.18. Searching for Patterns Split Across Lines
- sequence of characters, describing: 32.3. Understanding Expressions
- showmatch script, testing with: 32.17. Just What Does a Regular Expression Match?
- simple vs. extended: 32.4. Using Metacharacters in Regular Expressions
- substituting for matches in nawk: 20.10.7. Alphabetical Summary of Commands
- tar archive files, matching filenames of: 38.10.1. Without GNU tar
- wildcards vs.: 32.2. Don't Confuse Regular Expressions with Wildcards
- rehash command: 7.4. A bin Directory for Your Programs and Scripts
- 27.6. Controlling Shell Command Searches
- resetting command search table: 35.1. Writing a Simple Shell Program
- relational operators: 36.21.1. Syntax
- 41.5.1. Scalars
- if command, awk: 20.10.7. Alphabetical Summary of Commands
- relative pathnames: 1.16. Making Pathnames
- 31.2. Using Relative and Absolute Pathnames
- creating: 31.2. Using Relative and Absolute Pathnames
- current directory and: 31.3. What Good Is a Current Directory?
- links, avoiding invalidation of: 10.6. Stale Symbolic Links
- in shell setup files: 3.7. Use Absolute Pathnames in Shell Setup Files
- symbolic links to: 10.8. Showing the Actual Filenames for Symbolic Links
- remainder, modulus (%) operator: 36.21.1. Syntax
- remote access
- conrolling (see ssh)
- disallowing for security: 48.11. Disallow rlogin and rsh
- rsh (see rsh)
- remote clients, starting for X window systems: 6.10. Starting Remote X Clients
- Remote Desktop Protocol (RDP): 47.9. Citrix: Making Windows Multiuser
- client for Unix (rdesktop): 47.9.2. rdesktop
- remote directories, hung terminals and: 5.6. Checklist: Terminal Hangs When I Log In
- remote files
- Emacs, opening with: 19.2. Emacs Features: A Laundry List
- shortcut for copying: 28.4. Build Strings with { }
- remote logins
- status line updates: 4.8. Session Info in Window Title or Status Line
- stopping sessions: 23.13. Stopping Remote Login Sessions
- remote restoration of backup files: 38.6.2. Remote Restoring
- remote shells: 3.8. Setup Files Aren't Read When You Want?
- (see also rsh; ssh)
- setup files for: 3.8. Setup Files Aren't Read When You Want?
- remote tape drive, tar backups to: 38.7. Using tar to a Remote Tape Drive
- 38.8. Using GNU tar with a Remote Tape Drive
- remove option (xrdb): 6.8. Setting Resources with xrdb
- removing
- command-line arguments: 35.20.2. With a Loop
- software packages, dependency conflicts caused by: 40.5.3. Choosing Packages for Installation or Removal
- removing files: 14.1. The Cycle of Creation and Destruction
- confirmation before deletion: 14.5. Answer "Yes" or "No" Forever with yes
- deleting directories: 14.16. Problems Deleting Directories
- deleting files with odd names: 14.11. Deleting Files with Odd Names
- eight-bit filenames: 14.14. Using unlink to Remove a File with a Strange Name
- filenames starting with - (dash): 14.13. Handling a Filename Starting with a Dash (-)
- i-numbers, using: 14.15. Removing a Strange File by its i-number
- directory sticky bit permission and: 50.4. Protecting Files with the Sticky Bit
- emptying files instead of: 15.2. Instead of Removing a File, Empty It
- excluding some files from: 14.18. Removing Every File but One
- find command and: 14.19. Using find to Clear Out Unneeded Files
- interactively, with file-deletion script or alias: 14.7. A Faster Way to Remove Files Interactively
- rm command
- -f option (no confirmation): 14.10. Deletion with Prejudice: rm -f
- dangers of: 14.3. rm and Its Dangers
- safety techniques for: 14.4. Tricks for Making rm Safer
- safe delete program: 14.9. Safe Delete: Pros and Cons
- safer file deletion in some directories: 14.8. Safer File Deletion in Some Directories
- selective deletion of: 14.6. Remove Some, Leave Some
- stale files, deleting: 14.17. Deleting Stale Files
- rename function: 41.8. Perl Boot Camp, Part 5: Perl Knows Unix
- renaming files
- directory sticky bit permission and: 50.4. Protecting Files with the Sticky Bit
- groups of: 10.1. What's So Complicated About Copying Files
- 10.9. Renaming, Copying, or Comparing a Set of Files
- interactively: 10.10. Renaming a List of Files Interactively
- mv command, using: 8.11. Can't Access a File? Look for Spaces in the Name
- with nonprinting characters in names: 8.12. Showing Nonprintable Characters in Filenames
- ownership and: 50.3. Who Will Own a New File?
- write access and: 50.9. A Loophole: Modifying Files Without Write Access
- renice command: 23.7. System Overloaded? Try Stopping Some Jobs
- 26.5. Know When to Be "nice" to Other Users...and When Not To
- 26.7. Changing a Running Job's Niceness
- rep command, vis command vs.: 28.11. Repeating a Time-Varying Command
- repeat command: 28.8. Repeating Commands
- . (dot), in vi: 17.7. Get Back What You Deleted with Numbered Buffers
- clearing directory stack with popd: 31.7. The Shells' pushd and popd Commands
- repeating commands: 28.8. Repeating Commands
- 30.1. The Lessons of History
- at set intervals: 28.11. Repeating a Time-Varying Command
- copy and paste, using: 28.10. Repeating a Command with Copy-and-Paste
- cycle of commands: 30.9. Repeating a Cycle of Commands
- with history substitution: 30.8. History Substitutions
- with variations: 28.9.1. A foreach Loop
- for loop, using: 28.9.2. A for Loop
- foreach loop, using: 28.9.1. A foreach Loop
- replacement patterns
- sed editor, delimiting: 34.8. Delimiting a Regular Expression
- special characters in: 32.21. Pattern Matching Quick Reference with Examples
- valid regular expression metacharacters for: 32.20. Valid Metacharacters for Different Unix Programs
- replacements: 20.4. Useful ex Commands
- 20.4. Useful ex Commands
- (see also substitution commands)
- confirming in vi editor: 17.9. Confirming Substitutions in vi
- global, with vi editor: 17.8.1. Global Searches
- patterns, matching for: 17.14. Useful Global Commands (with Pattern Matches)
- sed editor
- newlines in: 34.9. Newlines in a sed Replacement
- referencing portions of search string in: 34.11. Referencing Portions of a Search String
- referencing the search string in: 34.10. Referencing the Search String in a Replacement
- specifying one match among many possible matches: 34.12. Search and Replacement: One Match Among Many
- repositories, CVS archives: 39.7. CVS Basics
- modifications, commiting and pushing into: 39.7. CVS Basics
- setting up: 39.8. More CVS
- reprint character (CTRL-r): 28.2. Reprinting Your Command Line with CTRL-r
- requote shell script: 5.21. Tips for Copy and Paste Between Windows
- fmt width option: 5.21. Tips for Copy and Paste Between Windows
- resize command: 3.16. Terminal Setup: Testing Window Size
- c or u options to force use of C- or Bourne-shell syntax: 5.5. Querying Your xterm Size: resize
- xterm windows: 5.5. Querying Your xterm Size: resize
- RESOURCE_MANAGER property: 6.8. Setting Resources with xrdb
- resources
- overloaded: 23.7. System Overloaded? Try Stopping Some Jobs
- removing definitions: 6.8. Setting Resources with xrdb
- setting for X Window system
- resource database manager: 6.5. Setting X Resources: Overview
- restart command (lpc): 45.3. Printer Control with lpc
- restoring files: 38.6. Restoring Files from Tape with tar
- (see also backups; tar utility)
- RCS, using: 39.5. RCS Basics
- from remote tape drives: 38.7. Using tar to a Remote Tape Drive
- from tape with tar: 38.6. Restoring Files from Tape with tar
- restricted command access (rsh) shell: 27.1. What the Shell Does
- restricted shell: 6.10.2. Starting a Remote Client with rsh and ssh
- RETURN characters (in .exrc file for vi editor): 17.30. Setting Up vi with the .exrc File
- return command
- awk utility: 20.10.7. Alphabetical Summary of Commands
- shell function, use in: 29.11.3. Setting Current Shell Environment: The work Function
- reverse order, command history listed in: 30.7. History by Number
- reversing patch: 20.9. patch: Generalized Updating of Files That Differ
- reversing sort order: 22.6.6. Reverse Sort
- revision control (see CVS RCS)
- revision control programs,
file versions and: 1.11. Filenames
- Revision Control System (see RCS)
- revnum shell variable: 39.6. List RCS Revision Numbers with rcsrevs
- rftp script: 28.18.2. Automating /bin/passwd
- .rhosts file: 5.22. Running a Single Command with xterm -e
- 6.10.2. Starting a Remote Client with rsh and ssh
- 38.7. Using tar to a Remote Tape Drive
- Rich Site Summary files, collecting: 25.1. Building Software Robots the Easy Way
- right-side prompts: 4.11. Right-Side Prompts
- rlogin utility: 6.10.1. Starting Remote X Clients from Interactive Logins
- disabling for security reasons: 48.11. Disallow rlogin and rsh
- enabling on Mac OS X: 51.1. Enabling Remote Access on Mac OS X
- logging in to host again from same terminal: 3.6. Tip for Changing Account Setup: Keep a Shell Ready
- network ports for: 3.13. Terminal Setup: Testing Port
- stalled connection with: 5.6.4. Stalled Data Connection?
- rm command: 14.3. rm and Its Dangers
- -f option: 14.10. Deletion with Prejudice: rm -f
- 35.17. Trapping Exits Caused by Interrupts
- 50.7. Protect Important Files: Make Them Unwritable
- -i option: 14.14. Using unlink to Remove a File with a Strange Name
- confirmation of deletions: 14.5. Answer "Yes" or "No" Forever with yes
- creating -i file for: 14.8. Safer File Deletion in Some Directories
- -r option: 14.16. Problems Deleting Directories
- excluding files from deletion: 14.18. Removing Every File but One
- filenames beginning with - (dash): 14.13. Handling a Filename Starting with a Dash (-)
- filenames beginning with . (dot): 14.16. Problems Deleting Directories
- linked files, deleting: 10.4.1. Differences Between Hard and Symbolic Links
- links, removing: 10.5. Creating and Removing Links
- rf option: 14.14. Using unlink to Remove a File with a Strange Name
- safety techniques for: 14.4. Tricks for Making rm Safer
- rmdir (remove directory) command: 14.16. Problems Deleting Directories
- rmstar variable (tcsh shell): 14.4. Tricks for Making rm Safer
- root access
- enabling in Darwin: 49.12. Enabling Root in Darwin
- logins: 4.10. Highlighting and Color in Shell Prompts
- logins, external: 49.10. Never Log In as root
- password, forgetting: 49.3. Forgetting the root Password
- providing with sudo application: 49.11. Providing Superpowers with sudo
- root directory: 1.16. Making Pathnames
- subdirectories located directly off: 40.1. /usr/bin and Other Software Directories
- root of a filename (:r string editing operator): 28.5. String Editing (Colon) Operators
- root servers (DNS): 46.9. Domain Name Service (DNS)
- rot program: 21.21. Rotating Text
- route command: 46.3. Status and Troubleshooting
- routers
- DSL, firewalls: 46.12. Firewalls
- functioning as gateways: 46.11. Gateways and NAT
- routing
- diagnosing routes with traceroute: 46.4. Where, Oh Where Did That Packet Go?
- packets, preventing with firewalls: 46.12. Firewalls
- routing tables, displaying with netstart -r: 46.3. Status and Troubleshooting
- RPM, finding and installing packaged software: 40.11. Finding and Installing RPM Packaged Software
- rprnt key: 5.8. Setting Your Erase, Kill, and Interrupt Characters
- rsh: 1.21. Unix Networking and Communications
- 27.1. What the Shell Does
- disabling for security reasons: 48.11. Disallow rlogin and rsh
- display option: 6.10.2. Starting a Remote Client with rsh and ssh
- enabling on Mac OS X: 51.1. Enabling Remote Access on Mac OS X
- n option: 6.10.2. Starting a Remote Client with rsh and ssh
- remote tape drive, accessing with GNU tar: 38.8. Using GNU tar with a Remote Tape Drive
- restoring files from remote tape drives: 38.7. Using tar to a Remote Tape Drive
- rsync program: 20.6. Change Many Files by Editing Just One
- running reading- or writing-tar on remote system: 10.13. Copying Directory Trees with tar and Pipes
- starting remote X clients: 6.10.2. Starting a Remote Client with rsh and ssh
- stopping sessions: 23.13. Stopping Remote Login Sessions
- rsync command: 20.6. Change Many Files by Editing Just One
- 25.2. Periodic Program Execution: The cron Facility
- run-parts script: 25.2.2. A Little Help, etc.
- runaway processes: 24.7.2. BSD
- killing by name: 24.15. Killing Processes by Name?
- runsed script: 34.4.2. runsed
- rusers command: 35.25.2. Setting (and Parsing) Parameters
- rxvt terminal program: 5.9. Working with xterm and Friends
- fonts and command-line options: 5.18.1. VT Fonts Menu
- login shell, running: 5.10. Login xterms and rxvts
Symbols & Numbers
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2003
O'Reilly & Associates, Inc.
All Rights Reserved.