PRTG Network Monitor

Password Recovery

Please enter your user name.

A new password will be sent to you via email.

Paessler Blog

The Silex and the Fury: New Malware Tries to Destroy IoT Devices

A new malware called Silex is targeting IoT devices. The software does not want to take the devices over, in order to use them for DDoS attacks, but rather wants them to malfunction and shut down.

8 Reasons Why Documentation Is Vital for Your IT Environment

Is IT documentation a source of joy, or a necessary evil? Experience shows that most companies only maintain IT documentation to comply with legal regulations.

From Oil Pipelines to the IoT: A Brief History of MQTT

If it feels like the Internet of Things (IoT) has kind of gone from zero to ubiquitous hype in the space of no time at all, you're not wrong: it's only been around in its current form since the late 90s. Now I know, many might argue that there was a "smart" toaster in the 70s or a monitored coffee pot in the 80s, but the IoT as we now know it only really took shape at the turn of the century. And while it showed some potential right from the early days, it needed a few developments before it could truly become useful.

One Flew over the Paessler's Nest

More and more companies are paying attention to their energy consumption, but only a few generate their own energy. We are quite happy that our roof now serves as more than just rain protection.

Were You in IT Support 20 Years Ago? Then You Surely Experienced This!

A few weeks ago I wrote about 11 IT relics from the 90s. Your feedback was overwhelming. So many of you have contributed personal stories and experiences from that time, and there are more every day! If you haven't seen the article, check it out: You Experienced IT in the 90s If You Know These Relics All your stories got me thinking about how we actually did IT support two decades ago. The time is not so long ago, but still the procedures of today are hardly comparable with the those of the past, some of which were very complex. Four quite typical scenarios from the time between 1999 and 2004 are still in my memory. How was IT support back at that time?

Healthcare IT: Monitoring the Modalities

In an ongoing series of articles about monitoring healthcare IT, I've discussed monitoring the big picture, as well as monitoring the Picture Archiving and Communication System and the integration engine. Now, I want to cover the modalities. And monitoring these is not as simple as you would expect.

Artificial Intelligence Has Been Using You. For Years. How Does That Feel?

We live in an age of irresistible Al hype. Artificial intelligence has not only defeated the world's best Go players*, but has revolutionized our healthcare industry as well as the way we find knowledge. And as if that weren't enough, the insatiable AI monster also tries its digital hand as an artist. But what if AI has been using us for a long time to become more intuitive and human-like, and the big tech companies are doing a brilliant job of hiding it?

4 Facts about Memes You (Probably) Didn't Know

Memes are everywhere. They flood the Internet and correspond to every world-historical event, such as the new Stranger Things season. Here are some facts about memes you (probably) didn't know. 🎁 Plus, we've been working on our own Paessler Sysadmin Meme Page. Today is also the 20th annual System Administrator Appreciation Day, so we thought about declaring this our official gift. Cause we love you and stuff. ❤️

4 Metrics for Measuring Your Service Level Agreements

One of the buzzwords we constantly come across when answering PRTG requests is “SLA Reporting”. To keep up with demand, one of our partners created a PRTG plugin for SLA monitoring and back in March of this year, my colleague Sascha wrote a blog post on it. But what exactly is an SLA, when is it required and what does it have to do with monitoring?

Healthcare IT: 4 Ways to Monitor a PACS

In our previous discussions about healthcare IT on this blog, we've covered an overview of typical architecture that is found hospitals or clinics, and how to monitor it. More recently, we started looking at individual components (like the Integration Engine). Now, in this article, we take a look at another vital element: the Picture Archive and Communication System, or PACS.

How to Become Anonymous on the Internet - Part 2/2

Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say. (Edward Snowden) Our ideas of privacy and freedom have changed with the Internet. In earlier times, thoughts of freedom were enshrined in constitutions to protect us against tyrants and menaces. In our digital lives, there are complex threats and the laws that have been written to protect us belong to times no longer linked to our realities. The protection of your digital rights is an individual, personal undertaking. This is part 2/2. Find part 1 here, which covers achieving 30% and 60% anonymity.

You Experienced IT in the 90s If You Know These Relics

In the year I was born, the IBM 5150 PC was the benchmark in computing. The basic unit (16 kilobytes of RAM and no data storage) was sold for about $1,565, while the full version cost about $3,000. 16 years later, in the middle of the 1990s, I decided to move into the IT business.So today I want to take you on a trip down memory lane, to the golden computer age of the 90s. Let's wallow together in nostalgia and remember the times when there was hardly any IT monitoring, an internet connection was still established manually, and the mp3 file revolutionized the music business. Let's go! 😊

5 Ideas to Expand Your ETL Process Monitoring

Just about every kind of company or organization has a reliance on data for daily operations. Because of this, databases and data warehouses are central to many environments. And most data architectures look very similar: there is a number of data sources, such as external systems or apps, which deliver data into the central system. This incoming data is in different formats and structures, and so it needs to be consolidated and loaded into the database in a way that matches how the data is stored there. This is where Extract, Transform, and Load (referred to as “ETL”) processes come into play.

How to Become Anonymous on the Internet - Part 1/2

I think it only makes sense to seek out and identify structures of authority, hierarchy, and domination in every aspect of life - and to challenge them; unless a justification for them can be given, they are illegitimate and should be dismantled, to increase the scope of human freedom. (Noam Chomsky) Our ideas of privacy and freedom have changed with the Internet. In earlier times, thoughts of freedom were enshrined in constitutions to protect us against tyrants and menaces. In our digital lives, there are complex threats and the laws written to protect us belong to times no longer linked to our realities. The protection of your digital rights is an individual, personal undertaking.

Where Are We Going? Check Our PRTG Roadmap!

We are often asked if and when we want to integrate this or that feature into PRTG Network Monitor, or in which direction PRTG will develop further. From now on we will make this information available online in our PRTG Roadmap.