FireFox Tweeking: is pipelining a good idea?
Posted: Mon 23 May 2005, 12:24
For all of you power browsers out there. I found this information concerning super charging the stand alone FireFox. It works. And in my opinion is much better for the Internet than the other methods of WebAcceleration. Enjoy your Puppy Linux !
Super Charged FireFox :
To boost Firefox, simply do the following after launching your browser.
1. Type "about:config" into the address bar (no spaces) and hit Return. Scroll down and look for the following entries:
--network.http.pipelining
--network.http.proxy.pipelining
--network.http.pipelining.maxrequests
Normally the browser will make one request at a time to a Web page. When you enable pipelining, the browser will make several at once, which really speeds up page loading.
2. Alter the entries as follows:
Set "network.http.pipelining" to "true"
Set "network.http.proxy.pipelining" to "true"
Set "network.http.pipelining.maxrequests" to some number like 20. (This tells the browser to make 20 requests at once.) (Instead of the defalt of 4)
3. Lastly, right-click anywhere and select New-> Integer. Name it "nglayout.initialpaint.delay" and set its value to "0". This value is the amount of time the browser waits before acting on received information.
Okay. That's all it takes. But now let's dig into the controversy that is foaming up discussion boards across the land. The term the hard core use for opening 20 server calls at one time is not pretty, but says it all: server raping. Taking up 20 simultaneous sessions is a major don't, since most servers bomb out at around 100. If five people using this tweak hit a page at the exact same time, they would crash everything, warned many a geek. Definately -- NOT SO -- !
But not so, according to the other camp, who explain that pipelining is not about opening multiple sessions but simply changing how a single session pulls down information. The irony is that most developers gave up on pipelining after broadband became more widespread, and browsers today ship with this default set to "Off" or "False" to protect servers from throwing up bugs during a rapid pipeline burst.
I have to say that I have been using my jacked-up Firefox and have not crashed sites or been denied access because of my browser's action being confused for a flood attack. I have noticed much more bad code, though in third-party ads, mostly. Not in Google ads
Super Charged FireFox :
To boost Firefox, simply do the following after launching your browser.
1. Type "about:config" into the address bar (no spaces) and hit Return. Scroll down and look for the following entries:
--network.http.pipelining
--network.http.proxy.pipelining
--network.http.pipelining.maxrequests
Normally the browser will make one request at a time to a Web page. When you enable pipelining, the browser will make several at once, which really speeds up page loading.
2. Alter the entries as follows:
Set "network.http.pipelining" to "true"
Set "network.http.proxy.pipelining" to "true"
Set "network.http.pipelining.maxrequests" to some number like 20. (This tells the browser to make 20 requests at once.) (Instead of the defalt of 4)
3. Lastly, right-click anywhere and select New-> Integer. Name it "nglayout.initialpaint.delay" and set its value to "0". This value is the amount of time the browser waits before acting on received information.
Okay. That's all it takes. But now let's dig into the controversy that is foaming up discussion boards across the land. The term the hard core use for opening 20 server calls at one time is not pretty, but says it all: server raping. Taking up 20 simultaneous sessions is a major don't, since most servers bomb out at around 100. If five people using this tweak hit a page at the exact same time, they would crash everything, warned many a geek. Definately -- NOT SO -- !
But not so, according to the other camp, who explain that pipelining is not about opening multiple sessions but simply changing how a single session pulls down information. The irony is that most developers gave up on pipelining after broadband became more widespread, and browsers today ship with this default set to "Off" or "False" to protect servers from throwing up bugs during a rapid pipeline burst.
I have to say that I have been using my jacked-up Firefox and have not crashed sites or been denied access because of my browser's action being confused for a flood attack. I have noticed much more bad code, though in third-party ads, mostly. Not in Google ads