Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Optimizing C/C++ programs using the GProf profiler

Unix+clones

Optimizing C/C++ programs using the GProf profiler

Post date: May 24, 2005, 18:05 Category: Optimizing Views: 6543 Comments
Tutorial quote: One of the most important things to keep in mind while optimizing an application is: optimize where it counts. It is no use to spend hours optimizing a piece of code that usually runs for only 0.04 seconds anyway.

GProf provides a surprisingly easy way to profile your C/C++ application and spot the interesting pieces right away. A small case study shows how GProf was used to reduce the running time of a real-world application from over 3 minutes to under 5 seconds, by identifying 2 data structures as important and optimizing those.

Historically, the program goes back as far as 1982, when it was introduced on the the SIGPLAN Symposium on Compiler Construction. It is now a standard tool available on virtually all flavors of UNIX.
OSX

Optimizing Mac OS X performance

Post date: January 18, 2006, 16:01 Category: Optimizing Views: 7022 Comments
Tutorial quote: This FAQ provides recommendations for optimizing MacĀ® OS X performance. Additionally, it provides advice and links to advice for troubleshooting certain Mac OS X performance problems.
Unix+clones

UNIX Shell Programming QuickStart

Post date: April 13, 2005, 02:04 Category: Programming Views: 3260 Comments
Tutorial quote: If you read, write, or maintain programs, the following samples will give you a quick overview of the construction and style of a shell script and introduce you to some of the constructs and syntax found in these programs.
Debian

Checksecurity

Post date: September 25, 2007, 18:09 Category: Security Views: 2977 Comments
Tutorial quote: Checksecurity does some very basic system security checks,such as looking for changes in which programs have setuid permissions, and that remote filesystems are not allowed to have runnable setuid programs.
Linux

HowTo install software from Source Code

Post date: October 4, 2008, 17:10 Category: Software Views: 27826 Comments
Tutorial quote: We usually download linux programs through package handling tools such as yum and apt-get. Download programs through package handling tools is easy, but not all programs is available in your Linux distribution repository. Sometimes, we need to download the source code, compile and install manually.
Linux

iptables: The Linux Firewall Administration Program

Post date: November 29, 2005, 20:11 Category: Network Views: 2826 Comments
Tutorial quote: This chapter covers the iptables firewall administration program used to build a Netfilter firewall. For those of you who are familiar with or accustomed to the older ipfwadm and ipchains programs used with the IPFW technology, iptables will look very similar to those programs. However, it is much more feature-rich and flexible, and it is very different on subtle levels.
RedHat

Tuning and Optimizing Red Hat Enterprise Linux for Oracle 9i and 10g Databases

Post date: December 19, 2007, 06:12 Category: Optimizing Views: 9508 Comments
Tutorial quote: This article is a step by step guide for tuning and optimizing Red Hat Enterprise Linux on x86 and x86-64 platforms running Oracle 9i (32bit/64bit) and Oracle 10g (32bit/64bit) standalone and RAC databases. This guide covers Red Hat Enterprise Linux Advanced Server 3 and 4 and the older version 2.1.
RedHat

Tips & tricks: Performance tuning

Post date: November 26, 2005, 00:11 Category: Optimizing Views: 8541 Comments
Tutorial quote: Advanced tips on optimizing your Red Hat server.
Unix+clones

How to scan your Linux-Distro for Root Kits

Post date: May 19, 2006, 18:05 Category: Security Views: 3179 Comments
Tutorial quote: Do you suspect that you have a compromised system ?
Check now for root kits that the intruder may have installed !!!

So... What in the hell is a root kit ???
A root kit is a collection of programs that intruders often install after they have compromised the root account of a system.
These programs will help the intruders clean up their tracks, as well as provide access back into the system.
Root kits will sometimes leave processes running so that the intruder can come back easily and without the system administrator's knowledge !

Solution....
Scripts like chkrootkit will do the job for you automatically.
Ubuntu

Windows to Ubuntu Transition Guide

Post date: April 8, 2006, 15:04 Category: Miscellaneous Views: 11164 Comments
Tutorial quote: Alright, so you have successfully installed Ubuntu Linux, but now what do you do with it? You are in the right place. I am going to get you started with a guide on how to use your new Ubuntu system. This transition guide is targeted at existing Windows users and will show you how to do program installations, a little system configuration, but primarily highlight some Windows "replacement" programs for common applications you can't live without. This guide's intent is to introduce you to equivalent programs to what you are accustomed to and, hopefully, to cover a good amount of what you might want in a new install. I am basing the content on what I have personally experienced, email feedback from my installation article, questions from the PC Mech Forums, and common topics from the Ubuntu Forums. Hopefully this will answer a lot of questions you may have before you ever have them.
Web-based applications and online marketing solutions - LumoLink