The GroundWork Open Source firm has upgraded its network monitoring suite to version 6.0. Next to an Enterprise subscription edition it also provides, as before, its free Community edition.more »
Virtualization provider VMware has purchased open source firm SpringSource for $420 million.more »
Building a Munin Plugin Creating a custom Munin pluginJun 30, 2009
Munin collects information and plots parameters of your choice automatically and with minimal configuration. But if you can't find a plugin that captures the data you want to graph, you might have to roll your own.more »
The new NConf release, despite being a minor one, provides many clear improvements.more »
The 4th Open Source Monitoring Conference 2009 on Nagios has released its Call for Papers.more »
Nagios Enterprises founder and Nagios maintainer Ethan Galstad has admitted to development bottlenecks in his project and recognizes that Nagios developers want a stronger participation in the Icinga fork project. Nevertheless, he's disappointed that Icinga didn't engage with him before they struck off on their own.more »
Open source project Nagios is being forked into the Icinga project. The Netways firm, which specializes in open source IT management services and particularly the monitoring solution Nagios, will be managing the fork.more »
Charly's Column The Sysadmin's Daily Grind: UptimedMar 31, 2009
Who has the longest uptime? Linux systems used to win hands down when it comes to maximum uptime without rebooting. Today, uptime statistics help admins with monitoring tasks and discovering tricky bugs.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm