Sponsored Content
Operating Systems Linux Using SQUID to reduce traffic usage in the office - how effective? Post 302264139 by FractalizeR on Wednesday 3rd of December 2008 08:13:44 AM
Old 12-03-2008
Question Using SQUID to reduce traffic usage in the office - how effective?

We are working in the office where about 5-6 machines have Internet access. We pay for each GB of traffic we consume and that's quite expensive. Almost no worker download files. Just surfing websites (including our corporate one that is located outside of local network thus we pay for accessing it too).

I am thinking of purchasing low-end cheap PC to install SQUID and setup NAT to direct all office internet traffic through it.

Should I expect traffic consumption reduce counted by ISP in this case at all? If yes, what is the estimated factor of bandwidth consumtion reduce? I understand, that that depends on what internet sites are the staff surfs etc etc. I just care about something average coming from someone's practice. Increasing SQUID HDD cache to 10-20Gb is not a big problem I think. HDDs are pretty big and cheap nowadays.
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

most effective search ?

what's the most efficient and effective search for a file in a dir ? I see many guys use this # find - print or something as such ? and sometimes pipe it to something else ? Is there a better way of using "grep" in all of this ? thanks simon2000 (3 Replies)
Discussion started by: simon2000
3 Replies

2. UNIX for Advanced & Expert Users

How to reduce GZIP memory usage

I am using the ZLIB_VERSION "1.2.3" . The memory requirement for Zlib/GZIP compression is stated as /* The memory requirements for deflate are (in bytes): (1 << (windowBits+2)) + (1 << (memLevel+9)) that is: 128K for windowBits=15 + 128K for memLevel = 8 (default values) ... (0 Replies)
Discussion started by: Parmod Garg
0 Replies

3. HP-UX

how can I find cpu usage memory usage swap usage and logical volume usage

how can I find cpu usage memory usage swap usage and I want to know CPU usage above X% and contiue Y times and memory usage above X % and contiue Y times my final destination is monitor process logical volume usage above X % and number of Logical voluage above can I not to... (3 Replies)
Discussion started by: alert0919
3 Replies

4. AIX

How to monitor the IBM AIX server for I/O usage,memory usage,CPU usage,network..?

How to monitor the IBM AIX server for I/O usage, memory usage, CPU usage, network usage, storage usage? (3 Replies)
Discussion started by: laknar
3 Replies

5. UNIX for Advanced & Expert Users

Finger command not showing Office, Office Phone from /etc/passwd

Not sure if this is the best place to post, but at this point my question seems to be an advanced topic. I'm curious why it is that the "office phone" column of finger does not seem to report anything even when data is entered in the GECOS field of /etc/passwd. I am using Ubuntu 8.10, kernel... (1 Reply)
Discussion started by: gratuitous_arp
1 Replies

6. UNIX for Dummies Questions & Answers

Help regarding effective usage of diff for comparing files

Help regarding effective usage of diff for comparing files Hi All, I have few doubts regarding best usage of diff command. I also have some questions with out put of diff command. File1: ABC DEF File2: ABC DEFAA diff file1 file2 2c2 <DEF ----- (1 Reply)
Discussion started by: sarbjit
1 Replies

7. IP Networking

Routing traffic problem between 3G and Office Lan Network

Hi, I would like to ask some networking solution regarding my work LAN and 3G usb network problem. I want to route my internet traffic to the 3G network and sometimes connect to some of my work network for ssh to configure some workstation or print something. Currently my problem is i can't... (0 Replies)
Discussion started by: jao_madn
0 Replies

8. IP Networking

Squid vs iptables = no Squid access.log?

Hello, I have a pretty useless satellite link at home (far from any civilization), so I wanted to set up caching in order to speed things up. My Squid 2.6 runs "3128 transparent" and is set up quite well on a separate machine. I also have my dd-wrt router to move all port 80 traffic through... (0 Replies)
Discussion started by: theWojtek
0 Replies

9. AIX

How to reduce and findout CPU usage?

Frequently i am getting "total CPU is now 100.00%, which is above the error threshold (90%)" this error . (3 Replies)
Discussion started by: ranjithm
3 Replies
chfn(1) 						      General Commands Manual							   chfn(1)

NAME
chfn - change finger information SYNOPSIS
chfn [-D binddn] [-P path] [-f name] [-o office] [-p phone] [-h home_phone] [-m other] [-r service] [-q] [-u] [-v] [user] DESCRIPTION
chfn is used to change the user finger information. This are the users fullname, office room number, office phone number and home phone number. This information is stored in the /etc/passwd file and typically printed by finger(1) and similiar programs. A normal user may only change the fields for their own account, the super user may change the fields for any account. Also, only the super user may use the -o option to change the undefined portions of the GECOS field. If no information is given on the command line, chfn operates in an interactive fashion, prompting the user for each field. Enter the new value to change the field, or leave the line blank to use the current value. Enter none or a blank only to remove the current value. The current value is displayed between a pair of [ ] marks. The only restrictions placed on the contents of the fields is that no control characters may be present, nor any of comma, colon, or equal sign. The other field does not have this restriction, and is used to store accounting information used by other applications. This version of chfn is able to change the shell of local, NIS, NIS+ and LDAP accounts, if the permissions allow it. OPTIONS
-D, --binddn binddn Use the Distinguished Name binddn to bind to the LDAP directory. The user will be prompted for a password for simple authentica- tion. -P, --path path The passwd and shadow files are located below the specified directory path. chfn will use this files, not /etc/passwd and /etc/shadow. This is useful for example on NIS master servers, where you do not want to give all users in the NIS database auto- matic access to your NIS server and the NIS map is build from special files. -f, --full-name Specify your real name. -o, --office Specify your office room number. -p, --phone Specify your office phone number. -h, --home-phone Specify your home phone number. -m, --other Specify the undefined portions of the GECOS field. -r, --service Specify the service where the GECOS field should be changed. Supported services are files, ldap, nis and nisplus. -q, --quite Don't be verbose. -u, --usage Print a usage message and exit. --help Print a more verbose help text and exit. -v, --version Print version information and exit. ENVIRONMENT
SHADOW_CHFN - If this environment variable is set to 1, the chfn options are compatible to the version from the shadow suite. FILES
/etc/passwd - user account information SEE ALSO
chsh(1), finger(1), passwd(5) AUTHOR
Thorsten Kukuk <kukuk@suse.de> pwdutils February 2004 chfn(1)
All times are GMT -4. The time now is 10:20 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy