IPHost

2008
Novosibirsk, Russia
May 29, 2020   |  By IPHost Monitor
Certain changes in services or devices can often be misheeded; failure to recognize even subtle changes can later result in unpleasant consequences. Below we list several examples of such incidents; the checks described are rather lightweight and can be run frequently for critical network assets. The cases below assume that any change in current device’ state should be treated as security issue.
May 25, 2020   |  By IPHost Monitor
There are three basic types of activity in information security – those that should be performed periodically to reduce possible risks to minimum. Periodic updates is one of them: as software pieces are being developed and enhanced, it is required to update them for many reasons, one of them being possible vulnerabilities.
May 15, 2020   |  By IPHost Monitor
While monitoring different types of OS, it is essential to reduce the number of tools used to a logical and reasonable minimum. Under “tools”, we understand all kinds of APIs, software packages and technologies are used to perform the monitoring tasks. For example, same or similar tasks of monitoring system resources can be solved by using SNMP, WMI, various scripting languages, such as PS1, Python, VBasic and so on.
May 8, 2020   |  By IPHost Monitor
WMI (Windows Management Instrumentation) is an actual standard to access and/or control Windows components, services and applications. With its query language (resembling the SQL used by many relational databases), WMI allows collecting information from multiple sources, so-called providers. However, this comes at a cost: running WMI query is a resource- and time-consuming operation (comparing to certain alternatives).
May 1, 2020   |  By IPHost Monitor
Nowadays, many people, even those far from IT industry, depend on remote conferencing services, either on premises, or global ones. Unless the status of those services is watched, its unexpected absence can disrupt upcoming meetings, causing all kinds of negative consequences. Let us provide a brief list of several remote conference services along with means to monitor their status and availability.
Dec 22, 2015   |  By IPHost
IPHost Network Monitor application: short overview
Dec 15, 2015   |  By IPHost
IPHost Network Monitor: create a simple PING monitor in a few clicks.
Dec 11, 2015   |  By IPHost
Create your monitoring system from scratch with IPHost Network Monitor application.
Jun 30, 2015   |  By IPHost
IPHost Network Monitor application installation