Flylib.com
sendmail Performance Tuning
sendmail Performance Tuning
ISBN: 0321115708
EAN: 2147483647
Year: 2005
Pages: 67
Authors:
Nick Christenson
BUY ON AMAZON
Main Page
Table of content
Copyright
Praise for sendmail Performance Tuning
Preface
Chapter 1. Introduction
1.1 Performance Tuning Examples
1.2 sendmail Versions Covered
1.3 Definitions
1.4 Email Server Tasks
1.5 Tuning Isn t Always Necessary
1.6 Not So Fast . . .
1.7 Email System Profiling
1.8 General Tuning Ideas
1.9 Summary
Chapter 2. sendmail Introduction
2.1 Obtaining sendmail
2.2 Building sendmail
2.3 Creating a .cf file
2.4 Why Use M4?
2.5 System Setup
2.6 Summary
Chapter 3. Tuning Email Relaying
3.1 What Happens During Relaying
3.2 Synchronization
3.3 Filesystems
3.4 File Space
3.5 Networking
3.6 Summary
Chapter 4. Tuning Email Reception
4.1 What Happens During Email Reception
4.2 Recipient Verification
4.3 Storage Systems
4.4 Disks
4.5 Solid State Disks
4.6 POP Tuning Specifics
4.7 Message Store Hashing
4.8 IMAP Tuning Specifics
4.9 Summary
Chapter 5. Tuning Email Sending
5.1 Mailing Lists
5.2 Command-Line Message Generation
5.3 Draining Queues
5.4 Another Mailing List Strategy
5.5 SMTP PIPELINING
5.6 More Notes on Mass Mailing
5.7 Summary
Chapter 6. Configuration, Security, and Architecture
6.1 Configuration
6.2 Security and Performance
6.3 Other General Strategies
6.4 Summary
Chapter 7. Finding and Removing Bottlenecks
7.1 Kernel Parameters Run Amok
7.2 The Quick Fix
7.3 Tools
7.4 syslog
7.5 Removing Bottlenecks
7.6 Summary
Chapter 8. Load Generation and Testing
8.1 Test System Setup
8.2 Testing Tools
8.3 Load Testing Pitfalls
8.4 Summary
Chapter 9. Conclusion
Bibliography
sendmail Performance Tuning
ISBN: 0321115708
EAN: 2147483647
Year: 2005
Pages: 67
Authors:
Nick Christenson
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 2.1 Use the OpenSSH Tool Suite to Replace Clear-Text Programs
Step 3.4 Use PuTTYs Tools to Transfer Files from the Windows Command Line
Step 4.5 How to use OpenSSH Passphrase Agents
Step 4.6 How to use PuTTY Passphrase Agents
Step 6.3 X11 Forwarding
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Finding Things in Strings
Finding the nth Instance of a Substring
Doing a Case-Insensitive String Search
Streams and Files
Computing the Number of Elements in a Container
A Practitioners Guide to Software Test Design
Section III - Testing Paradigms
Exploratory Testing
Test Planning
When to Stop Testing
Section V - Some Final Thoughts
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Wide Area Network (WAN) Technologies
Internet Protocol (IP) Basics
Internet Protocol (IP) Routing
Transmission Control Protocol (TCP) Connections
Virtual Private Networks (VPNs)
Cisco CallManager Fundamentals (2nd Edition)
Enterprise Deployment of CallManager Clusters
Station Devices
H.323 Gateways
Appendix B. Cisco Integrated Solutions
Appendix C. Protocol Details
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 23. Find All Available Wireless Networks
Hack 82. Use Your Orinoco Card with Hermes AP
Section A.6. Bluetooth: Cable Replacement for Devices
Section A.9. FRS and GMRS: Super Walkie-Talkies
Section B.5. 802.11 Hardware Suppliers
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies