check_logfiles Log file analysis with the Nagios check_logfiles pluginMar 29, 2009
The Nagios check_logfiles plugin helps you monitor your logfiles – even if the logs rotate and change names.more »
MRTG Visualizing system performance with MRTGMar 29, 2009
MRTG generates simple graphs for viewing network performance at a glance.more »
Open Source Monitoring Tools Tuning in with Hobbit, Nagios, and monitMar 29, 2009
Open source tools such as Hobbit, Nagios, and monit provide system monitoring for large or small networks.more »
The first full version of the new Rhodes framework allows application developers to embed HTML in mobile devices, now also including Android.more »
The Free Software Foundation (FSF) has announced the winners of its annual free software awards, with Richard Stallman as the presenter.more »
A botnet named psyb0t has been nesting for a few months in consumer devices that run on Linux with MIPS CPUs, notably routers. Infested devices connect through a botnet over a private Internet Relay Chat (IRC) server to await commands.more »
Kernel 2.6.29 has arrived and brings with it a string of new features. We're presenting some of them and describe what to make of them.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm