Consolidating Logs with Logstash Collect and Analyze System Data from a Single InterfaceJun 18, 2013
When something goes wrong on a system, the logfile is the first place to look for troubleshooting clues. Logstash, a log server with built-in analysis tools, consolidates logs from many servers and even makes the data searchable.more »
Tracing Tools Monitoring activities and system processesDec 19, 2012
Programs rarely reveal what they are doing in the background, but a few clever tools, of interest to both programmers and administrators, monitor this activity and log system functions.more »
Tune Your Hard Disk with hdparm Disk Inspector: Retrieving and setting hard drive parameters with hdparmDec 16, 2012
Hdparm is the tool to use when it comes to tuning your hard disk or DVD drive, but it can also measure read speed, deliver valuable information about the device, change important drive settings, and even erase SSDs securely.more »
Charly's Column: Animated GIFs The sys admin’s daily grind – GIF animationsNov 26, 2012
Beyond flashing web emoticons, animated gif images can present trends that catch your eye in system monitoring.more »
The PowerTOP tool developed by Intel helps you save power. In version 2.0, it can also handle GPUs and offers advanced tracking features.more »
Byobu Byobu, a session manager for the command lineJun 21, 2012
The Byobu session manager extends the shell, adding a range of useful functions, such as splitting the screen, running programs in the background, or organizing programs in tabs. In particular, administrators who rely on SSH will appreciate Byobu.more »
Charly's Column: QPS The sys admin’s daily grind: QPSJun 21, 2012
The graphical tool QPS frees admins from Kafkaesque ambiguities about the cause, history, and side effects of running processes. Depending on the view, either clarity or detailed information dominate the scene.more »
Secure your enterprise, monitor system performance, and more by harnessing the power of Splunk to search, monitor, report, and analyze events and data from any source.more »
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.
Legendary Uber-distro splits over the systemd controversy.
One of CeBIT’s most successful forums returns in 2015.
A new study says it is possible to unmask 81% of TOR users.
Redmond joins the revolution by turning the .NET Core Runtime into a GitHub project.
Users only had 7 hours to update before the intrusions started.
It's official: The new web arrives