check_logfiles Log file analysis with the Nagios check_logfiles pluginMar 29, 2009
The Nagios check_logfiles plugin helps you monitor your logfiles – even if the logs rotate and change names.more »
MRTG Visualizing system performance with MRTGMar 29, 2009
MRTG generates simple graphs for viewing network performance at a glance.more »
Open Source Monitoring Tools Tuning in with Hobbit, Nagios, and monitMar 29, 2009
Open source tools such as Hobbit, Nagios, and monit provide system monitoring for large or small networks.more »
The first full version of the new Rhodes framework allows application developers to embed HTML in mobile devices, now also including Android.more »
The Free Software Foundation (FSF) has announced the winners of its annual free software awards, with Richard Stallman as the presenter.more »
A botnet named psyb0t has been nesting for a few months in consumer devices that run on Linux with MIPS CPUs, notably routers. Infested devices connect through a botnet over a private Internet Relay Chat (IRC) server to await commands.more »
Kernel 2.6.29 has arrived and brings with it a string of new features. We're presenting some of them and describe what to make of them.more »
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.