Flylib.com
sendmail Performance Tuning
sendmail Performance Tuning
ISBN: 0321115708
EAN: 2147483647
Year: 2005
Pages: 67
Authors:
Nick Christenson
BUY ON AMAZON
Main Page
Table of content
Copyright
Praise for sendmail Performance Tuning
Preface
Chapter 1. Introduction
1.1 Performance Tuning Examples
1.2 sendmail Versions Covered
1.3 Definitions
1.4 Email Server Tasks
1.5 Tuning Isn t Always Necessary
1.6 Not So Fast . . .
1.7 Email System Profiling
1.8 General Tuning Ideas
1.9 Summary
Chapter 2. sendmail Introduction
2.1 Obtaining sendmail
2.2 Building sendmail
2.3 Creating a .cf file
2.4 Why Use M4?
2.5 System Setup
2.6 Summary
Chapter 3. Tuning Email Relaying
3.1 What Happens During Relaying
3.2 Synchronization
3.3 Filesystems
3.4 File Space
3.5 Networking
3.6 Summary
Chapter 4. Tuning Email Reception
4.1 What Happens During Email Reception
4.2 Recipient Verification
4.3 Storage Systems
4.4 Disks
4.5 Solid State Disks
4.6 POP Tuning Specifics
4.7 Message Store Hashing
4.8 IMAP Tuning Specifics
4.9 Summary
Chapter 5. Tuning Email Sending
5.1 Mailing Lists
5.2 Command-Line Message Generation
5.3 Draining Queues
5.4 Another Mailing List Strategy
5.5 SMTP PIPELINING
5.6 More Notes on Mass Mailing
5.7 Summary
Chapter 6. Configuration, Security, and Architecture
6.1 Configuration
6.2 Security and Performance
6.3 Other General Strategies
6.4 Summary
Chapter 7. Finding and Removing Bottlenecks
7.1 Kernel Parameters Run Amok
7.2 The Quick Fix
7.3 Tools
7.4 syslog
7.5 Removing Bottlenecks
7.6 Summary
Chapter 8. Load Generation and Testing
8.1 Test System Setup
8.2 Testing Tools
8.3 Load Testing Pitfalls
8.4 Summary
Chapter 9. Conclusion
Bibliography
sendmail Performance Tuning
ISBN: 0321115708
EAN: 2147483647
Year: 2005
Pages: 67
Authors:
Nick Christenson
BUY ON AMAZON
Certified Ethical Hacker Exam Prep
Apply Your Knowledge
Wireless Hacking Tools
System Hacking
Hacking Wireless Networks
Linux Hacking
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Securing CallManager Communications Using HTTPS
Preventing Call Forward and Voice-Mail Toll Fraud Using Calling Search Spaces
Review Questions
Cisco VT Advantage Overview
C & Data Structures (Charles River Media Computer Engineering)
Introduction to the C Language
C Operators
Control Structures
Strings
Trees
Cisco Voice Gateways and Gatekeepers
The Role of IP-to-IP Gateways
Case Study: Configuring an MGCP Gateway
Security
Need for DSP Resources
Review Questions
Cisco CallManager Fundamentals (2nd Edition)
Circuit-Switched Systems
Enterprise Deployment of CallManager Clusters
Calling Search Spaces and Partitions
VoIP Gateway Security
Summary
MPLS Configuration on Cisco IOS Software
Frame-Mode MPLS
Basic MPLS Configuration
Option 1: Inter-Provider VPN Using Back-to-Back VRF Method
Hierarchical VPLS-Distributed PE Architecture
Implementing Quality of Service in MPLS Networks
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies