Show all posts in 2014
2014-Nov-26 by Florian Staffort
PRTG Network Monitor offers various possibilities for Linux monitoring. The easiest way is to use one of our native sensors that run on the Local Probe or the Remote Probe of a Windows system, located in your network, and gather data via SNMP (Simple Network Management Protocol), WBEM (Web-Based Enterprise Management), or SSH (Secure Shell)—like, for example, monitoring the memory usage of your Linux/Unix system using the SSH Meminfo sensor.
2014-Nov-19 by Gerald Schoch
It's almost December and yet 2014 doesn't seem to leave any room for peace and quiet—at least not for system administrators. Even in the year's final quarter there seems to be no break from new headlines about security vulnerabilities: 2014 will definitely be one of those years for everyone in IT to remember. Unfortunately, not all memories are good ones. Some might even be downright scary. Do you recall the morning you went to work and received news about the OpenSSL Heartbleed Bug or the POODLE vulnerability only a few weeks ago? We certainly do—and this by far weren't the only security related surprises, the last few months held in store for IT administrators and managers worldwide.
2014-Nov-14 by Florian Staffort
Did you know with PRTG Network Monitor you have a full scale SNMP Trap Receiver at hand? With SNMP (Simple Network Management Protocol) traps you can easily track reports of important incidents and data. SNMP-enabled devices trigger these asynchronous notifications for various reasons, such as system events, outages, critical conditions, and many more. PRTG collects these messages, stores them in a high performance database, and analyzes their content.
2014-Nov- 6 by Matt Barringer
Now, one of the fun things about working on user-facing software is the constant, never-ending iteration that one goes through to get something that both looks decent and works well. We want our customers to be happy, and no one likes ugly, outdated, or confusing software. Mistakes are made, of course, and most of those mistakes get caught before they’re released … but in retrospect, this was one mistake that snuck through.
I do mean that the entire color scheme was a mistake. I don’t know what I was thinking with all that blue - it’s embarrassing, and I apologize to each and every one of you who spent more than five minutes looking at that with our first few months of releases.
2014-Oct-28 by Andrea Flachmann
Remember when we told you we're on our way to Barcelona? We gave our team a camera to ask happy customers for a short testimonial. A Paessler team would not be a Paessler team though if they did not use their camera for filming a tutorial during breaks.
2014-Oct-28 by Florian Staffort
Six years ago the IT landscape was quite different from what we are used to today. Six years ago? That doesn't seem like such a long time! Well, in technology it is. In this regard you could almost compare tech years to dog years. Let's think back to 2008: Apple has just released the first generation of its iPhone, virtualization was being made more approachable with VMware Workstation 6.5, and Windows 7 had not even reached its beta phase. From today's perspective it seems like another world and it's no surprise also PRTG Network Monitor has come a long way, since version 7 has been released in 2008.
2014-Oct-22 by Florian Staffort
After Heartbleed and Shellshock the next security vulnerability is eager to make 2014 one of the years for admins to remember. This one is called POODLE (Padding Oracle on Downloaded Legacy Encryption) and was found in SSL 3.0, an almost 18-year-old encryption technology that is only used in less than 1% of worldwide SSL traffic—but it's nonetheless still used on the server side to support old browsers like, for example, Internet Explorer 6.
2014-Oct-16 by Florian Staffort
Monitoring via Secure Shell (SSH) enables you to gather information not only from many Linux/Unix and Mac OS systems, but also from the host hardware of your virtualization solution. It is essential to keep a close eye on the host servers as they are the backbone of all your virtual machines. A failure or even unusual behavior could lead to unforeseeable damage and require hours of work that could easily have been prevented.
2014-Oct-10 by Florian Staffort
If you have read all previous articles of this blog series, you're already quite an expert on how to utilize the PRTG Mini Probe API for your monitoring needs. After providing you with the proof of concept for monitoring your Linux systems with the Python Mini Probe, we want to show you another area of application—a probe for monitoring Java applications using Java Management Extensions: the JMX Mini Probe.
2014-Oct- 9 by Andrea Flachmann
Last week has been crazy at the Paessler office – crazy empty. Everyone was on the road, all over the world. We had a team in New York, in London and in our hometown of Nuremberg. We are just dropping in for a second to tell you about these events because tomorrow we are gone again.