The GroundWork Open Source company out of San Francisco CA has released its Nagios-based monitoring software in a new version 5.3, including a free Community Edition.more »
The remote package update manager program apt-dater is now available in version 0.7. It performs software updates on a mass of remote hosts.more »
Top Ten Tops We pick the top ten Top toolsDec 01, 2008
The famous Unix admin utility known as Top has many imitators. We take a look at some of the top Top tools.more »
Today R1Soft announced the beta release of Hot Copy for Linux, a command-line utility that takes instant readable and writeable snapshots of disks or volumes on any Linux server.more »
Open source developer Tobias Oetiker, in his presentation at the USENIX LISA conference in San Diego, described how he could help one thousand Windows users at Swisscom.com speed up their computers.more »
Fully Automated Nagios (FAN) is a CD distribution that should simplify the installation of Nagios along with numerous tools on a network monitoring server. FAN 1.0 is the current version.more »
Nagiosgraph, an extension of the Nagios monitoring software, is available as version 1.0.0. The program merges the performance data from the Nagios plug-in and presents them graphically on a webpage.more »
Kernel king admits his tone has alienated volunteers, but says the demands of the process require directness.
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.