Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Benchmarking BSD and Linux

Linux Setting the Clock on Linux
Post date: April 12, 2005, 13:04 Category: System Views: 46
Tutorial quote: There are 3 protocols dealing with time: NTP (port 123), Time (port 37), and Daytime (port 13). If you're connecting to the Internet periodically, then synchronizing your clock when you dial up or from crontab is good enough. This applies also to most Linux machines at home or at work, even if they are connected all the time. Here is a short tutorial on how to set your clock using these 3 protocols.
Unix+clones Using MySQL to benchmark OS performance
Post date: April 12, 2005, 03:04 Category: Benchmarks Views: 93
Tutorial quote: It seems to be an exciting time for *nix operating systems, with a number of them recently releasing new versions that bring the addition of expanded features and claims of improved performance. If you're using GNU/Linux, OpenBSD, NetBSD, FreeBSD, or Solaris as a database server, you've probably recently considered an upgrade or switch to another OS in that list due to marketing hype and hearsay. This article will show you how to benchmark operating system performance using MySQL on these OSes so you can find out for yourself if you're missing out. While this may not necessarily be indicative of overall system performance or overall database application performance, it will tell you specifically how well MySQL performs on your platform.

The following operating systems were used for the comparison testing:
- FreeBSD 4.11
- FreeBSD 5.3
- NetBSD 2.0
- Linux 2.6
- Linux 2.4
- Solaris 10 x86 (build 69)
- OpenBSD 3.6
Linux Building a Linux Cluster, Part 3: How To Get Started
Post date: April 25, 2005, 10:04 Category: Network Views: 74
Tutorial quote: In the previous two articles in this series, we examined some of the whys and whats of building Linux clusters. This article concludes our series by concentrating on the hows of cluster building. We've seen that a clustered approach to certain computing solutions can save lots of money in hardware and support costs. Now our job is to produce a method of building clusters that's repeatable and predictable—we don't want to give back our hard-won savings in project cost overruns.
Unix+clones Comparing MySQL performance
Post date: April 12, 2005, 03:04 Category: Benchmarks Views: 57
Tutorial quote: With the introduction of the 2.6 Linux kernel, FreeBSD-5-STABLE, Solaris 10, and now NetBSD 2.0, you might be wondering which of them offers superior database performance. In my previous article, I discussed the tools I chose to test these venerable operating systems and the methodology by which they were tested. The result is this MySQL performance comparison between OpenBSD 3.6; NetBSD 2.0; FreeBSD 5.3 and 4.10; Solaris Express (build 69); and Linux 2.4 and 2.6 (Gentoo-based). Read on for the results.
Linux Linux Web Filtering in 7 steps
Post date: April 12, 2005, 14:04 Category: Network Views: 423
Tutorial quote: How to install a transparent Squid proxy server with real-time HTTP virus scanning on Mandrake 10.0 using DansGuardian and ClamAV?

People quickly and easily access volumes of research on the Internet and correspond with a mouse click. For more and more companies, content filtering is part of the large battle to combat all kinds of online threats, including hackers, worms and viruses. Linux content filtering allows administrators to configure and manage Internet access across the entire network and to block unwanted Web content like pornography, shopping Web sites, games and gambling.

This guide contains all the necessary information for installing and understanding the architectural layout of the implementation. It was written with the assumption that you understand how to install programs and have a basic understanding of Linux Mandrake. This includes installing Linux Mandrake and RPM packages, editing files, making directories, compiling software and understanding general UNIX commands. This guide doesn’t explain how to use or configure Squid, DansGuardian and ClamAV but information on where to obtain this information can be found in the “Additional information” section.
OpenSUSE Hacking OpenSUSE
Post date: December 3, 2005, 12:12 Category: System Views: 133
Tutorial quote: There's more to SUSE Linux than simply installing it and going to work. To get the most from the operating system, you'll probably want to do some post-install fine tuning. This article by Jem Matzan explains how to: add download sources to YaST; install the Mozilla Thunderbird email client; add support for Java, Flash, Acrobat, Windows Media, MP3s, and RealMedia; play DVDs -- and more. It serves as a useful supplement to Steven J. Rosen's excellent how-to, "Installing SUSE Linux 10 on a Laptop," recently published here on DesktopLinux.com. Enjoy . . . !
Unix+clones Encrypted NFS with OpenSSH
Post date: May 21, 2005, 15:05 Category: Network Views: 44
Tutorial quote: NFS is a widely deployed, mature, and understood protocol that allows computers to share files over a network. The main problems with NFS are that it relies on the inherently insecure UDP protocol, transactions are not encrypted, hosts and users cannot be easily authenticated, and its difficulty in firewalling. This article provides a solution to most of these problems for Linux clients and servers. These principles may also be applied to any UNIX server with ssh installed. This article assumes basic knowledge of NFS and firewalling for Linux.
SuSe Working with SUSE Linux Enterprise Server 9
Post date: June 22, 2005, 05:06 Category: System Views: 130
Tutorial quote: Working with SUSE Linux Enterprise Server (SLES) requires an understanding of the login process, including local account files, system accounts, and managing identities.

Using a console shell or the graphical environment are two possible methods of working on a SLES machine.

Finding your way around a SLES installation requires an in-depth knowledge of the filesystem layout. Essential filesystem components are documented and explained in this chapter. Basic filesystem permissions are also described.
Linux Creating Really Teensy ELF Executables for Linux
Post date: April 12, 2005, 14:04 Category: Miscellaneous Views: 34
Tutorial quote: If you're a programmer who's become fed up with software bloat, then may you find herein the perfect antidote.

This document explores methods for squeezing excess bytes out of simple programs. (Of course, the more practical purpose of this document is to describe a few of the inner workings of the ELF file format and the Linux operating system. But hopefully you can also learn something about how to make really teensy ELF executables in the process.)

Please note that the information and examples given here are, for the most part, specific to ELF executables on a Linux platform running under an Intel-386 architecture. I imagine that a good bit of the information is applicable to other ELF-based Unices, but my experiences with such are too limited for me to say with certainty.

The assembly code that appears in this document is written for use with Nasm. (Besides being more appropriate for our needs, Nasm's syntax beats the hell out of AT&T syntax for anyone who learned x86 assembly language before learning to use Gas.) Nasm is freely available and extremely portable; see http://nasm.sourceforge.net/.

Please also note that if you aren't a little bit familiar with assembly code, you may find parts of this document sort of hard to follow.
Debian dmcrypt
Post date: January 25, 2006, 17:01 Category: Security Views: 85
Tutorial quote: Device-mapper is a new infrastructure in the Linux 2.6 kernel that provides a generic way to create virtual layers of block devices that can do different things on top of real block devices like striping, concatenation, mirroring, snapshotting, etc... The device-mapper is used by the LVM2 and EVMS 2.x tools. dm-crypt is such a device-mapper target that provides transparent encryption of block devices using the new Linux 2.6 cryptoapi. Writes to this device will be encrypted and reads decrypted. You can mount your filesystem on it as usual. But without the key you can't access your data. It does basically the same as cryptoloop only that it's a much cleaner code and better suits the need of a block device and has a more flexible configuration interface. The on-disk format is also compatible.