Consolidating Logs with Logstash Collect and Analyze System Data from a Single InterfaceJun 18, 2013
When something goes wrong on a system, the logfile is the first place to look for troubleshooting clues. Logstash, a log server with built-in analysis tools, consolidates logs from many servers and even makes the data searchable.more »
Tracing Tools Monitoring activities and system processesDec 19, 2012
Programs rarely reveal what they are doing in the background, but a few clever tools, of interest to both programmers and administrators, monitor this activity and log system functions.more »
Tune Your Hard Disk with hdparm Disk Inspector: Retrieving and setting hard drive parameters with hdparmDec 16, 2012
Hdparm is the tool to use when it comes to tuning your hard disk or DVD drive, but it can also measure read speed, deliver valuable information about the device, change important drive settings, and even erase SSDs securely.more »
Charly's Column: Animated GIFs The sys admin’s daily grind – GIF animationsNov 26, 2012
Beyond flashing web emoticons, animated gif images can present trends that catch your eye in system monitoring.more »
The PowerTOP tool developed by Intel helps you save power. In version 2.0, it can also handle GPUs and offers advanced tracking features.more »
Byobu Byobu, a session manager for the command lineJun 21, 2012
The Byobu session manager extends the shell, adding a range of useful functions, such as splitting the screen, running programs in the background, or organizing programs in tabs. In particular, administrators who rely on SSH will appreciate Byobu.more »
Charly's Column: QPS The sys admin’s daily grind: QPSJun 21, 2012
The graphical tool QPS frees admins from Kafkaesque ambiguities about the cause, history, and side effects of running processes. Depending on the view, either clarity or detailed information dominate the scene.more »
Secure your enterprise, monitor system performance, and more by harnessing the power of Splunk to search, monitor, report, and analyze events and data from any source.more »
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.