Index: R
Symbols & Numbers
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: R
- rand command (awk): 20.10.7. Alphabetical Summary of Commands
 
- random numbers in nawk (srand): 20.10.7. Alphabetical Summary of Commands
 
- ranges
 
  
  
  - .. (integer-range) operator in zsh: 28.4. Build Strings with { }
 
  
  
  
  - character ranges (hyphen-separated): 21.11. Hacking on Characters with tr
 
  
  
  
  - character ranges in regular expressions: 21.11. Hacking on Characters with tr
 
    - 32.8. Regular Expressions: Specifying a Range of Characters with [...]
 
  
 
  
  
  
  - expanding: 9.23.2. Expanding Ranges
 
  
  
  
  - Perl regular expression syntax for: 32.9. Regular Expressions: Exceptions in a Character Set
 
  
 
- rc shell: 1.6. There Are Many Shells
 
- rcp command: 1.21. Unix Networking and Communications
 
  
  
  - -r option: 10.12. Copying Directory Trees with cp -r
 
  
 
- RCS (Revision Control System): 39.5. RCS Basics
 
  
  
  - archiving files: 39.4. Managing and Sharing Files with RCS and CVS
 
  
  
  
  - ci (checkin) command: 39.5. RCS Basics
 
  
  
  
  - co (checkout command)
 
    
    
    - -p option, sending file to standard output: 39.5. RCS Basics
 
    
  
 
  
  
  
  - comparing directory with subdirectory, using pr: 21.15.1. One File per Column: -m
 
  
  
  
  - Emacs support for: 19.2. Emacs Features: A Laundry List
 
  
  
  
  - file utility, recognizing archives with: 12.6. Finding File Types
 
  
  
  
  - listing revision numbers with rcsrevs script: 39.6. List RCS Revision Numbers with rcsrevs
 
  
  
  
  - merging two or more file versions with rcsmerge and co Ðj: 39.5. RCS Basics
 
  
  
  
  - searching files with rcsgrep commands: 13.7. Search RCS Files with rcsgrep
 
  
  
  
  - unlocking files: 39.5. RCS Basics
 
  
 
- rcsdiff command: 11.3. Context diffs
 
  - 39.6. List RCS Revision Numbers with rcsrevs
 
 
- rcsegrep.fast script: 13.7.2. rcsegrep.fast
 
- rcsgrep command: 13.1. Different Versions of grep
 
  - 13.7. Search RCS Files with rcsgrep
 
  
  
  - -a option: 39.6. List RCS Revision Numbers with rcsrevs
 
  
 
- rcsgrep script: 13.7.1. rcsgrep, rcsegrep, rcsfgrep
 
- RD (Receive Data) light: 5.6.4. Stalled Data Connection?
 
- rdesktop (RDP client for Unix): 47.9.2. rdesktop
 
- read command: 28.9.2. A for Loop
 
  
  
  - ex editor: 20.4. Useful ex Commands
 
  
  
  
  - reading from the keyboard: 35.18. read: Reading from the Keyboard
 
  
  
  
  - while loops using: 36.11. Standard Input to a for Loop
 
  
 
- read-only files: 50.7. Protect Important Files: Make Them Unwritable
 
- read-only functions: 29.12. Shell Function Specifics
 
- read permission
 
  
  
  - changing with chmod: 50.5. Using chmod to Change File Permission
 
  
  
  
  - for directories: 7.3. Access to Directories
 
    - 50.2. Tutorial on File and Directory Permissions
 
  
 
  
  
  
  - execute permission without: 50.10. A Directory That People Can Access but Can't List
 
  
  
  
  - finding files by: 9.15. Searching for Files by Permission
 
  
  
  
  - shell scripts: 50.13. Shell Scripts Must Be Readable and (Usually) Executable
 
  
 
- reading files, access time and: 8.2. The Three Unix File Times
 
- reading from terminals
 
  
  
  - process groups and: 24.3. Managing Processes: Overall Concepts
 
  
 
- reading-tar process: 10.13. Copying Directory Trees with tar and Pipes
 
- readline command: 5.8. Setting Your Erase, Kill, and Interrupt Characters
 
- Readline library
 
  
  
  - inputrc file: 30.14.5. bash Editing
 
  
  
  
  - setup filename, choosing: 35.5. Predefined Environment Variables
 
  
 
- recomment script: 21.4.1. The recomment Script
 
- recovering files
 
  
  
  - cpio tape archive: 38.13. The cpio Tape Archiver
 
  
  
  
  - Emacs, using: 19.4. Backup and Auto-Save Files
 
  
  
  
  - vi -r command: 17.19. vi File Recovery Versus Networked Filesystems
 
    
    
    - recovered buffers, cautions about: 17.20. Be Careful with vi -r Recovered Buffers
 
    
  
 
  
 
- recursion, tracing depth of: 29.11.4. Functions Calling Functions: Factorials
 
- recursive aliases: 29.8. Avoiding C-Shell Alias Loops
 
- recursive functions: 29.11.4. Functions Calling Functions: Factorials
 
- recursive permission changing: 50.5. Using chmod to Change File Permission
 
- recursive searching with grep: 9.11. Custom -exec Tests Applied
 
- Red Hat Linux (see Linux)
 
- redirect operator (>>): 17.12. Appending to an Existing File
 
- redirecting input and output: 43.1. Using Standard Input and Output
 
  
  
  - C shell: 43.5. Redirection in C Shell: Capture Errors, Too?
 
  
  
  
  - cat command: 43.2. One Argument with a cat Isn't Enough
 
  
  
  
  - commands combined with grouping (( )) operator: 43.7. The ( ) Subshell Operators
 
  
  
  
  - cron system output: 25.2. Periodic Program Execution: The cron Facility
 
  
  
  
  - to /dev/null: 43.12. What Can You Do with an Empty File?
 
  
  
  
  - FIFOs, using: 43.11. Named Pipes: FIFOs
 
  
  
  
  - line numbers in redirected loops: 37.1.5. Line Numbers Reset Inside Redirected Loops
 
  
  
  
  - to multiple processes: 43.10. Redirecting Output to More Than One Place
 
  
  
  
  - noclobber, using: 43.6. Safe I/O Redirection with noclobber
 
  
  
  
  - openstandard I/O files without: 36.15. Overview: Open Files and File Descriptors
 
  
  
  
  - pagers, piping to: 43.4. Problems Piping to a Pager
 
  
  
  
  - of programs: 36.15. Overview: Open Files and File Descriptors
 
  
  
  
  - shell capabilities: 36.15. Overview: Open Files and File Descriptors
 
  
  
  
  - shell output and errors into temporary file: 37.1.1. Use -xv
 
  
  
  
  - standard error (only), piping: 43.3. Send (Only) Standard Error Down a Pipe
 
  
  
  
  - standard input and standard output, using: 43.1. Using Standard Input and Output
 
  
  
  
  - standard output and standard error: 36.16. n>&m: Swap Standard Output and Standard Error
 
    
    
    - Bourne shells: 27.11. Is It "2>&1 file" or "> file 2>&1"? Why?
 
    
  
 
  
  
  
  - standard output, shell processing of: 27.4. Command Evaluation and Accidentally Overwriting Files
 
  
  
  
  - tee program: 43.8. Send Output Two or More Places
 
  
 
- redo operator (Perl): 41.6. Perl Boot Camp, Part 3: Branching and Looping
 
- references (Perl): 41.4. Perl Boot Camp, Part 1: Typical Script Anatomy
 
  - 41.5.4. References
 
  
  
  - dereferencing: 41.5.4. References
 
  
 
- reformatting text from one window before pasting it into another: 5.21. Tips for Copy and Paste Between Windows
 
- registry settings for clear text SMB passwords: 47.3. Securing Samba
 
- regular expressions: 13.2. Searching for Text with grep
 
  - 17.8. Using Search Patterns and Global Commands
 
  - 32.1. That's an Expression
 
  
  
  - agrep command: 13.6. Approximate grep: agrep
 
    - 13.6. Approximate grep: agrep
 
  
 
  
  
  
  - awk utility: 20.10.2.1. Patterns
 
  
  
  
  - egrep command: 9.22. lookfor: Which File Has That Word?
 
    - 13.4. Extended Searching for Text with egrep
 
  
 
  
  
  
  - examples of: 32.19. I Never Meta Character I Didn't Like
 
  
  
  
  - expr command
 
    
    
    - matching parts of strings: 36.23.1. Matching with expr
 
    
    
    
    - testing character strings: 36.22. Testing Characters in a String with expr
 
    
  
 
  
  
  
  - expressions, understanding: 32.3. Understanding Expressions
 
  
  
  
  - extended: 32.15. Extended Regular Expressions
 
    
    
    - alternation mechanism: 32.15. Extended Regular Expressions
 
    
  
 
  
  
  
  - filename-matching patterns vs.: 32.2. Don't Confuse Regular Expressions with Wildcards
 
  
  
  
  - finding lines that don't match a pattern: 13.3. Finding Text That Doesn't Match
 
  
  
  
  - globally substituting for each match: 20.10.7. Alphabetical Summary of Commands
 
  
  
  
  - interpreting: 32.3. Understanding Expressions
 
  
  
  
  - limiting extent of match: 32.18. Limiting the Extent of a Match
 
  
  
  
  - matching a character with a character set: 32.6. Regular Expressions: Matching a Character with a Character Set
 
  
  
  
  - matching specific number of sets with { }: 32.11. Regular Expressions: Matching a Specific Number of Sets with  { and  }
 
  
  
  
  - matching words with < >: 32.12. Regular Expressions: Matching Words with  < and  >
 
  
  
  
  - metacharacters: 27.17. "Special" Characters and Operators
 
    - 32.3. Understanding Expressions
 
    - 32.4. Using Metacharacters in Regular Expressions
 
    
    
    - for different Unix programs: 32.20. Valid Metacharacters for Different Unix Programs
 
    
  
 
  
  
  
  - pattern context: 32.16. Getting Regular Expressions Right
 
  
  
  
  - pattern matching, quick reference: 32.21. Pattern Matching Quick Reference with Examples
 
    
    
    - replacement patterns: 32.21. Pattern Matching Quick Reference with Examples
 
    
    
    
    - search and replace commands: 32.21.2. Examples of Searching and Replacing
 
    
    
    
    - search patterns: 32.21. Pattern Matching Quick Reference with Examples
 
      - 32.21.1. Examples of Searching
 
    
 
    
  
 
  
  
  
  - Perl: 41.7. Perl Boot Camp, Part 4: Pattern Matching
 
    
    
    - metacharacters in: 41.7. Perl Boot Camp, Part 4: Pattern Matching
 
    
  
 
  
  
  
  - potential problem areas: 32.14. Regular Expressions: Potential Problems
 
  
  
  
  - range of characters, specifying with [ ]: 32.8. Regular Expressions: Specifying a Range of Characters with [...]
 
  
  
  
  - repeated patterns, matching with ( ): 32.13. Regular Expressions: Remembering Patterns with  (,  ), and 1
 
  
  
  
  - repeating character sets with *: 32.10. Regular Expressions: Repeating Character Sets with *
 
  
  
  
  - retrieving only matched text with xgrep script: 32.17. Just What Does a Regular Expression Match?
 
  
  
  
  - sed editor: 13.11. Narrowing a Search Quickly
 
    
    
    - addresses: 34.5. sed Addressing Basics
 
      - 34.5. sed Addressing Basics
 
    
 
    
    
    
    - delimiting: 34.8. Delimiting a Regular Expression
 
    
    
    
    - searching for patterns split across lines: 34.18. Searching for Patterns Split Across Lines
 
    
  
 
  
  
  
  - sequence of characters, describing: 32.3. Understanding Expressions
 
  
  
  
  - showmatch script, testing with: 32.17. Just What Does a Regular Expression Match?
 
  
  
  
  - simple vs. extended: 32.4. Using Metacharacters in Regular Expressions
 
  
  
  
  - substituting for matches in nawk: 20.10.7. Alphabetical Summary of Commands
 
  
  
  
  - tar archive files, matching filenames of: 38.10.1. Without GNU tar
 
  
  
  
  - wildcards vs.: 32.2. Don't Confuse Regular Expressions with Wildcards
 
  
 
- rehash command: 7.4. A bin Directory for Your Programs and Scripts
 
  - 27.6. Controlling Shell Command Searches
 
  
  
  - resetting command search table: 35.1. Writing a Simple Shell Program
 
  
 
- relational operators: 36.21.1. Syntax
 
  - 41.5.1. Scalars
 
  
  
  - if command, awk: 20.10.7. Alphabetical Summary of Commands
 
  
 
- relative pathnames: 1.16. Making Pathnames
 
  - 31.2. Using Relative and Absolute Pathnames
 
  
  
  - creating: 31.2. Using Relative and Absolute Pathnames
 
  
  
  
  - current directory and: 31.3. What Good Is a Current Directory?
 
  
  
  
  - links, avoiding invalidation of: 10.6. Stale Symbolic Links
 
  
  
  
  - in shell setup files: 3.7. Use Absolute Pathnames in Shell Setup Files
 
  
  
  
  - symbolic links to: 10.8. Showing the Actual Filenames for Symbolic Links
 
  
 
- remainder, modulus (%) operator: 36.21.1. Syntax
 
- remote access
 
  
  
  - conrolling (see ssh)
 
  
  
  
  - disallowing for security: 48.11. Disallow rlogin and rsh
 
  
  
  
  - rsh (see rsh)
 
  
 
- remote clients, starting for X window systems: 6.10. Starting Remote X Clients
 
- Remote Desktop Protocol (RDP): 47.9. Citrix: Making Windows Multiuser
 
  
  
  - client for Unix (rdesktop): 47.9.2. rdesktop
 
  
 
- remote directories, hung terminals and: 5.6. Checklist: Terminal Hangs When I Log In
 
- remote files
 
  
  
  - Emacs, opening with: 19.2. Emacs Features: A Laundry List
 
  
  
  
  - shortcut for copying: 28.4. Build Strings with { }
 
  
 
- remote logins
 
  
  
  - status line updates: 4.8. Session Info in Window Title or Status Line
 
  
  
  
  - stopping sessions: 23.13. Stopping Remote Login Sessions
 
  
 
- remote restoration of backup files: 38.6.2. Remote Restoring
 
- remote shells: 3.8. Setup Files Aren't Read When You Want?
 
  - (see also rsh; ssh)
 
  
  
  - setup files for: 3.8. Setup Files Aren't Read When You Want?
 
  
 
- remote tape drive, tar backups to: 38.7. Using tar to a Remote Tape Drive
 
  - 38.8. Using GNU tar with a Remote Tape Drive
 
 
- remove option (xrdb): 6.8. Setting Resources with xrdb
 
- removing
 
  
  
  - command-line arguments: 35.20.2. With a Loop
 
  
  
  
  - software packages, dependency conflicts caused by: 40.5.3. Choosing Packages for Installation or Removal
 
  
 
- removing files: 14.1. The Cycle of Creation and Destruction
 
  
  
  - confirmation before deletion: 14.5. Answer "Yes" or "No" Forever with yes
 
  
  
  
  - deleting directories: 14.16. Problems Deleting Directories
 
  
  
  
  - deleting files with odd names: 14.11. Deleting Files with Odd Names
 
    
    
    - eight-bit filenames: 14.14. Using unlink to Remove a File with a Strange Name
 
    
    
    
    - filenames starting with - (dash): 14.13. Handling a Filename Starting with a Dash (-)
 
    
    
    
    - i-numbers, using: 14.15. Removing a Strange File by its i-number
 
    
  
 
  
  
  
  - directory sticky bit permission and: 50.4. Protecting Files with the Sticky Bit
 
  
  
  
  - emptying files instead of: 15.2. Instead of Removing a File, Empty It
 
  
  
  
  - excluding some files from: 14.18. Removing Every File but One
 
  
  
  
  - find command and: 14.19. Using find to Clear Out Unneeded Files
 
  
  
  
  - interactively, with file-deletion script or alias: 14.7. A Faster Way to Remove Files Interactively
 
  
  
  
  - rm command
 
    
    
    - -f option (no confirmation): 14.10. Deletion with Prejudice: rm -f
 
    
    
    
    - dangers of: 14.3. rm and Its Dangers
 
    
    
    
    - safety techniques for: 14.4. Tricks for Making rm Safer
 
    
  
 
  
  
  
  - safe delete program: 14.9. Safe Delete: Pros and Cons
 
  
  
  
  - safer file deletion in some directories: 14.8. Safer File Deletion in Some Directories
 
  
  
  
  - selective deletion of: 14.6. Remove Some, Leave Some
 
  
  
  
  - stale files, deleting: 14.17. Deleting Stale Files
 
  
 
- rename function: 41.8. Perl Boot Camp, Part 5: Perl Knows Unix
 
- renaming files
 
  
  
  - directory sticky bit permission and: 50.4. Protecting Files with the Sticky Bit
 
  
  
  
  - groups of: 10.1. What's So Complicated About Copying Files
 
    - 10.9. Renaming, Copying, or Comparing a Set of Files
 
  
 
  
  
  
  - interactively: 10.10. Renaming a List of Files Interactively
 
  
  
  
  - mv command, using: 8.11. Can't Access a File? Look for Spaces in the Name
 
  
  
  
  - with nonprinting characters in names: 8.12. Showing Nonprintable Characters in Filenames
 
  
  
  
  - ownership and: 50.3. Who Will Own a New File?
 
  
  
  
  - write access and: 50.9. A Loophole: Modifying Files Without Write Access
 
  
 
- renice command: 23.7. System Overloaded? Try Stopping Some Jobs
 
  - 26.5. Know When to Be "nice" to Other Users...and When Not To
 
  - 26.7. Changing a Running Job's Niceness
 
 
- rep command, vis command vs.: 28.11. Repeating a Time-Varying Command
 
- repeat command: 28.8. Repeating Commands
 
  
  
  - . (dot), in vi: 17.7. Get Back What You Deleted with Numbered Buffers
 
  
  
  
  - clearing directory stack with popd: 31.7. The Shells' pushd and popd Commands
 
  
 
- repeating commands: 28.8. Repeating Commands
 
  - 30.1. The Lessons of History
 
  
  
  - at set intervals: 28.11. Repeating a Time-Varying Command
 
  
  
  
  - copy and paste, using: 28.10. Repeating a Command with Copy-and-Paste
 
  
  
  
  - cycle of commands: 30.9. Repeating a Cycle of Commands
 
  
  
  
  - with history substitution: 30.8. History Substitutions
 
  
  
  
  - with variations: 28.9.1. A foreach Loop
 
    
    
    - for loop, using: 28.9.2. A for Loop
 
    
    
    
    - foreach loop, using: 28.9.1. A foreach Loop
 
    
  
 
  
 
- replacement patterns
 
  
  
  - sed editor, delimiting: 34.8. Delimiting a Regular Expression
 
  
  
  
  - special characters in: 32.21. Pattern Matching Quick Reference with Examples
 
  
  
  
  - valid regular expression metacharacters for: 32.20. Valid Metacharacters for Different Unix Programs
 
  
 
- replacements: 20.4. Useful ex Commands
 
  - 20.4. Useful ex Commands
 
  - (see also substitution commands)
 
  
  
  - confirming in vi editor: 17.9. Confirming Substitutions in vi
 
  
  
  
  - global, with vi editor: 17.8.1. Global Searches
 
  
  
  
  - patterns, matching for: 17.14. Useful Global Commands (with Pattern Matches)
 
  
  
  
  - sed editor
 
    
    
    - newlines in: 34.9. Newlines in a sed Replacement
 
    
    
    
    - referencing portions of search string in: 34.11. Referencing Portions of a Search String
 
    
    
    
    - referencing the search string in: 34.10. Referencing the Search String in a Replacement
 
    
    
    
    - specifying one match among many possible matches: 34.12. Search and Replacement: One Match Among Many
 
    
  
 
  
 
- repositories, CVS archives: 39.7. CVS Basics
 
  
  
  - modifications, commiting and pushing into: 39.7. CVS Basics
 
  
  
  
  - setting up: 39.8. More CVS
 
  
 
- reprint character (CTRL-r): 28.2. Reprinting Your Command Line with CTRL-r
 
- requote shell script: 5.21. Tips for Copy and Paste Between Windows
 
  
  
  - fmt width option: 5.21. Tips for Copy and Paste Between Windows
 
  
 
- resize command: 3.16. Terminal Setup: Testing Window Size
 
  
  
  - c or u options to force use of C- or Bourne-shell syntax: 5.5. Querying Your xterm Size: resize
 
  
  
  
  - xterm windows: 5.5. Querying Your xterm Size: resize
 
  
 
- RESOURCE_MANAGER property: 6.8. Setting Resources with xrdb
 
- resources
 
  
  
  - overloaded: 23.7. System Overloaded? Try Stopping Some Jobs
 
  
  
  
  - removing definitions: 6.8. Setting Resources with xrdb
 
  
  
  
  - setting for X Window system
 
    
    
    - resource database manager: 6.5. Setting X Resources: Overview
 
    
  
 
  
 
- restart command (lpc): 45.3. Printer Control with lpc
 
- restoring files: 38.6. Restoring Files from Tape with tar
 
  - (see also backups; tar utility)
 
  
  
  - RCS, using: 39.5. RCS Basics
 
  
  
  
  - from remote tape drives: 38.7. Using tar to a Remote Tape Drive
 
  
  
  
  - from tape with tar: 38.6. Restoring Files from Tape with tar
 
  
 
- restricted command access (rsh) shell: 27.1. What the Shell Does
 
- restricted shell: 6.10.2. Starting a Remote Client with rsh and ssh
 
- RETURN characters (in .exrc file for vi editor): 17.30. Setting Up vi with the .exrc File
 
- return command
 
  
  
  - awk utility: 20.10.7. Alphabetical Summary of Commands
 
  
  
  
  - shell function, use in: 29.11.3. Setting Current Shell Environment: The work Function
 
  
 
- reverse order, command history listed in: 30.7. History by Number
 
- reversing patch: 20.9. patch: Generalized Updating of Files That Differ
 
- reversing sort order: 22.6.6. Reverse Sort
 
- revision control (see CVS RCS)
 
- revision control programs, 
  
  
  file versions and: 1.11. Filenames
 
  
- Revision Control System (see RCS)
 
- revnum shell variable: 39.6. List RCS Revision Numbers with rcsrevs
 
- rftp script: 28.18.2. Automating /bin/passwd
 
- .rhosts file: 5.22. Running a Single Command with xterm -e
 
  - 6.10.2. Starting a Remote Client with rsh and ssh
 
  - 38.7. Using tar to a Remote Tape Drive
 
 
- Rich Site Summary files, collecting: 25.1. Building Software Robots the Easy Way
 
- right-side prompts: 4.11. Right-Side Prompts
 
- rlogin utility: 6.10.1. Starting Remote X Clients from Interactive Logins
 
  
  
  - disabling for security reasons: 48.11. Disallow rlogin and rsh
 
  
  
  
  - enabling on Mac OS X: 51.1. Enabling Remote Access on Mac OS X
 
  
  
  
  - logging in to host again from same terminal: 3.6. Tip for Changing Account Setup: Keep a Shell Ready
 
  
  
  
  - network ports for: 3.13. Terminal Setup: Testing Port
 
  
  
  
  - stalled connection with: 5.6.4. Stalled Data Connection?
 
  
 
- rm command: 14.3. rm and Its Dangers
 
  
  
  - -f option: 14.10. Deletion with Prejudice: rm -f
 
    - 35.17. Trapping Exits Caused by Interrupts
 
    - 50.7. Protect Important Files: Make Them Unwritable
 
  
 
  
  
  
  - -i option: 14.14. Using unlink to Remove a File with a Strange Name
 
    
    
    - confirmation of deletions: 14.5. Answer "Yes" or "No" Forever with yes
 
    
    
    
    - creating -i file for: 14.8. Safer File Deletion in Some Directories
 
    
  
 
  
  
  
  - -r option: 14.16. Problems Deleting Directories
 
  
  
  
  - excluding files from deletion: 14.18. Removing Every File but One
 
  
  
  
  - filenames beginning with - (dash): 14.13. Handling a Filename Starting with a Dash (-)
 
  
  
  
  - filenames beginning with . (dot): 14.16. Problems Deleting Directories
 
  
  
  
  - linked files, deleting: 10.4.1. Differences Between Hard and Symbolic Links
 
  
  
  
  - links, removing: 10.5. Creating and Removing Links
 
  
  
  
  - rf option: 14.14. Using unlink to Remove a File with a Strange Name
 
  
  
  
  - safety techniques for: 14.4. Tricks for Making rm Safer
 
  
 
- rmdir (remove directory) command: 14.16. Problems Deleting Directories
 
- rmstar variable (tcsh shell): 14.4. Tricks for Making rm Safer
 
- root access
 
  
  
  - enabling in Darwin: 49.12. Enabling Root in Darwin
 
  
  
  
  - logins: 4.10. Highlighting and Color in Shell Prompts
 
  
  
  
  - logins, external: 49.10. Never Log In as root
 
  
  
  
  - password, forgetting: 49.3. Forgetting the root Password
 
  
  
  
  - providing with sudo application: 49.11. Providing Superpowers with sudo
 
  
 
- root directory: 1.16. Making Pathnames
 
  
  
  - subdirectories located directly off: 40.1. /usr/bin and Other Software Directories
 
  
 
- root of a filename (:r string editing operator): 28.5. String Editing (Colon) Operators
 
- root servers (DNS): 46.9. Domain Name Service (DNS)
 
- rot program: 21.21. Rotating Text
 
- route command: 46.3. Status and Troubleshooting
 
- routers
 
  
  
  - DSL, firewalls: 46.12. Firewalls
 
  
  
  
  - functioning as gateways: 46.11. Gateways and NAT
 
  
 
- routing
 
  
  
  - diagnosing routes with traceroute: 46.4. Where, Oh Where Did That Packet Go?
 
  
  
  
  - packets, preventing with firewalls: 46.12. Firewalls
 
  
 
- routing tables, displaying with netstart -r: 46.3. Status and Troubleshooting
 
- RPM, finding and installing packaged software: 40.11. Finding and Installing RPM Packaged Software
 
- rprnt key: 5.8. Setting Your Erase, Kill, and Interrupt Characters
 
- rsh: 1.21. Unix Networking and Communications
 
  - 27.1. What the Shell Does
 
  
  
  - disabling for security reasons: 48.11. Disallow rlogin and rsh
 
  
  
  
  - display option: 6.10.2. Starting a Remote Client with rsh and ssh
 
  
  
  
  - enabling on Mac OS X: 51.1. Enabling Remote Access on Mac OS X
 
  
  
  
  - n option: 6.10.2. Starting a Remote Client with rsh and ssh
 
  
  
  
  - remote tape drive, accessing with GNU tar: 38.8. Using GNU tar with a Remote Tape Drive
 
  
  
  
  - restoring files from remote tape drives: 38.7. Using tar to a Remote Tape Drive
 
  
  
  
  - rsync program: 20.6. Change Many Files by Editing Just One
 
  
  
  
  - running reading- or writing-tar on remote system: 10.13. Copying Directory Trees with tar and Pipes
 
  
  
  
  - starting remote X clients: 6.10.2. Starting a Remote Client with rsh and ssh
 
  
  
  
  - stopping sessions: 23.13. Stopping Remote Login Sessions
 
  
 
- rsync command: 20.6. Change Many Files by Editing Just One
 
  - 25.2. Periodic Program Execution: The cron Facility
 
 
- run-parts script: 25.2.2. A Little Help, etc.
 
- runaway processes: 24.7.2. BSD
 
  
  
  - killing by name: 24.15. Killing Processes by Name?
 
  
 
- runsed script: 34.4.2. runsed
 
- rusers command: 35.25.2. Setting (and Parsing) Parameters
 
- rxvt terminal program: 5.9. Working with xterm and Friends
 
  
  
  - fonts and command-line options: 5.18.1. VT Fonts Menu
 
  
  
  
  - login shell, running: 5.10. Login xterms and rxvts
 
  
 
Symbols & Numbers
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2003
O'Reilly & Associates, Inc.
All Rights Reserved.