10-Strike Software's blog
10-Strike Software's blog
  • Blog
  • Products
  • Download
  • Order
  • Partners
  • Contacts
  • Forum
27.04.2026

Group operations with users in the new version of the program “10-Strike Network Monitoring Pro” 8.3

10-Strike News, Updates network monitor 0 Comments

The March version 8.3 of 10-Strike Network Monitor, a network equipment and server monitoring program, adds support for user groups, and improves the S.M.A.R.T. hard drive and SSD disk health monitoring. This article also discusses how to use alternative messaging apps.

How else can you send messages besides Slack and Telegram?

This can be done in two ways:

1. Via a VBScript / JScript script.

If your messenger service supports the HTTP API, you can access it with a script like this (sending to Slack):

function Main
Dim request
Set request = CreateObject("MSXML2.XMLHTTP")
request.open "POST", "https://hooks.slack.com/services/AJHGK45J4/FTS5NFG73/UDz30ftMMzinOgFxhTx2zBBB", false
request.send "{""text"": ""It is a test! ""}"
Main = ""
end function

Or this one (on Telegram):

function Main
Dim request

 Set request = CreateObject("MSXML2.XMLHTTP")
request.open "POST", "https://api.telegram.org/bot454654680:ADFgdfghdf5p5tAQrdZ6Ilf_G7e_3dy0qhOCi1E/sendMessage?chat_id=344565393&text=test_message", false
request.send
Main = ""
end function

2. Using the curl utility

The second method is the same, but using the open-source curl utility. More

15.01.2026

Viewing switch configurations in the new LANState (Pro) 10.5

10-Strike News, Updates lanstate, switch 0 Comments

Let’s review the latest update of our network management program LANState to the version 10.5. There’s two pieces of news: one good, one great. Where should we start? 🙂

OK, let’s start by saying that LANState is now completely free… for home use 🙂 We provide unlimited functionality for up to 25 hosts. When you first launch LANState, you decide how you want to use it: a 30-day trial with 50 hosts or a use the program with 25 hosts forever. You can change this mode at any time in the program menu.

The second piece of news is that LANState can now retrieve the switch configuration files via SSH. These are the aforementioned running-config, startup-config, and vlan.dat files.

We’ll explain in more detail.

Viewing Switch Configurations
A new Switch Configuration section has been added to the System Information. This section allows you to remotely retrieve and view key configuration files from managed switches via a secure SSH connection. The following configuration types are supported:

  • running-config — the currently active configuration loaded into the device’s RAM.
  • startup-config — the saved configuration used during device boot.
  • vlan.dat — (for compatible devices, such as Cisco) — a file containing VLAN configuration information.

Configurations are retrieved directly via SSH commands (e.g., show running-config, show startup-config, etc.) and then displayed in a convenient text window within the program interface.

working with switch configuration files

More

28.11.2025

Monitoring changes to switch configuration files in the new version of 10-Strike Network Monitor Pro 8.2

10-Strike News, Updates network monitor, ssh, switch 0 Comments

We have released the version 8.2 of 10-Strike Network Monitor Pro, a program for monitoring various network equipment. It introduces an important feature for monitoring changes and viewing the managed switch configurations. This feature helps you quickly respond to even the slightest changes in your network, even if they may not be immediately noticeable.monitoring switch configuration file changes

We’ve also improved the user rights management mechanism and added a lot of useful features.

Now, a little more detail on the most important features.

Monitoring Switch Configuration Changes

In any corporate network, switches are more than just “boxes with ports.” They are critical nodes that determine the topology, security, performance, and availability of the entire infrastructure. Their configurations constitute the precise “genome” of the network: VLANs, ACLs, ports, STP, QoS, trunk settings, inter-VLAN routing, and much more. More

25.07.2025

Poll Server Hardware Sensors via IPMI and Use Updated Map Editor in the New 10-Strike Network Monitor Pro 8.1

10-Strike News, Updates network map, network monitor 0 Comments

In the summer update of our network monitoring program, we have added several useful “goodies” including the new IPMI server hardware monitoring function. The map editor was significantly improved in both the desktop and web versions of the program.

We tell you in detail…

Poll Server Hardware via IPMI

IPMI (Intelligent Platform Management Interface) is a standard interface for remote management and monitoring of server hardware that works independently of the operating system. It allows administrators to turn the server on/off, reboot it, mount disk images for OS installation, and monitor various hardware parameters such as temperature and fan speed, even if the server is turned off or unresponsive. The hardware controller (BMC) integrated into the motherboard is responsible for the operation of this interface. This means that it always works as long as there is power and does not depend on whether the operating system is running.

The program receives a list of sensors from the server so that you can quickly configure monitoring of one of them (in one check). Then it periodically polls it and compares the value with the specified one, signaling when threshold values are exceeded. For example, with the help of this check “IPMI Sensors” you can promptly find out about the beginning of server overheating or that one of the coolers has failed.IPMI server hardware monitoring - fan speed - temperature

You can receive the data from the controller via IPMI either directly, using the login and password for connection, or via the agent service installed on the remote server.

Network Map Module

More

29.04.2025

What is Syslog: Things You Need To Consider

10-Strike Articles network monitor, syslog 0 Comments

In today’s complex IT environments, effective logging and monitoring are critical for maintaining system integrity and security. Syslog, a foundational tool in centralized logging, enables organizations to log system messages and events across devices and applications. By transmitting log messages to a centralized syslog server, Syslog simplifies log management, allowing organizations to store, analyze, and act on important data efficiently.

 

What is Syslog?

Syslog is a standardized protocol for collecting and managing system messages in networked environments. It enables log data transmission from various devices and applications to a centralized server for efficient management and analysis.

 

History of Syslog

Syslog was developed in the 1980s by Eric Allman as part of the Sendmail project, which was a widely used mail transfer agent in Unix systems. It quickly became a de facto standard for centralized logging due to its simplicity and effectiveness in capturing log messages from various sources.

The protocol was not formally standardized until 2001 when the Internet Engineering Task Force (IETF) published RFC 3164, known as “BSD syslog.” This document outlined the basic structure and transport methods for syslog messages. In 2009, RFC 5424 superseded RFC 3164, introducing enhancements such as ISO-8601 timestamps, structured data fields, and support for UTF-8 encoding.

Initially, syslog messages were transmitted using User Datagram Protocol (UDP), which is fast but does not guarantee delivery. Over time, support for Transmission Control Protocol (TCP) and the Reliable Event Logging Protocol (RELP) was added to ensure more reliable message delivery. Modern implementations also support TLS encryption for secure transmission of log data.

More

28.04.2025

How to Monitor Linux Servers: Top Effective Techniques and Tools

10-Strike Articles network monitor, server, ssh 0 Comments

linux server

Did you know that when the server downtime is not monitored, this can cost businesses thousands of dollars every minute? Monitoring Linux servers isn’t just a best practice; it’s an operational necessity. Linux server management is important for maintaining optimal performance and ensuring uptime, especially in the context of cloud monitoring and containerized environments. Effective monitoring tools are crucial for system administrators and DevOps professionals to proactively manage server performance, security, and resource utilization.

This article delves into the fundamental Linux performance monitoring methods and tools that showed themselves as efficient for server monitoring.

 

Understanding ICMP Ping Monitoring

ICMP (Internet Control Message Protocol) ping monitoring is a fundamental technique for assessing the availability of a host over a network. By sending ICMP Echo Request packets to a designated host and waiting for Echo Reply packets, administrators can determine whether a server is reachable. This method is particularly useful in Linux network monitoring, as it provides a quick check on the status of Linux servers and other devices. 

Benefits of ICMP Ping Monitoring

  • Fast Availability Checks: ICMP ping is one of the quickest methods to ascertain if a server is online, making it a staple in network performance monitoring. For instance, a data center can use ICMP monitoring to quickly detect network outages and ensure connectivity for mission-critical applications.
  • Basic Diagnostic Tool: It helps identify issues in network traffic and intermediate network nodes, required for network management.
  • Agentless Monitoring: Suitable for environments where installing agents is not feasible, enabling monitoring of any Linux distribution.

More

10.04.2025

Understanding CCTV: A Quick Guide to Closed Circuit Television

10-Strike Articles camera, cctv, dvr, network monitor 0 Comments

cctv cameras

In an environment characterized by evolving security challenges, CCTV (full form—Closed Circuit Television) serves as a fundamental component of modern surveillance infrastructure. 

It goes beyond cameras and screens; it operates as an integrated framework that captures and interprets real-time activities, thereby bolstering safety.

To truly understand CCTV technology, one must dissect its essential components: the mechanics of camera operation, the strategies for video footage storage, and the broader implications of its application in diverse scenarios. This guide offers a detailed examination of CCTV’s functionalities and its critical role in modern security architectures.

What is CCTV?

The CCTV meaning goes far beyond just a camera. It is a system of interconnected cameras that captures video in designated areas, enabling real-time monitoring. Unlike conventional broadcast television, which is public space, CCTV video footage remains private, accessible only to authorized personnel.

The importance of “Closed Circuit”

The term “closed circuit” indicates that video signals are transmitted within a secure network, preventing unauthorized access. This configuration has several critical implications for security: More

03.04.2025

What is Server Monitoring? A Beginner’s Guide

10-Strike Articles network monitor, server 0 Comments

server monitoring

In our technology-advanced time, servers are the backbone of IT infrastructure, powering everything from websites to databases and communication systems. Their significant role demands a robust oversight mechanism—this is where server monitoring comes in.

What Is Server Monitoring

Server monitoring encompasses continuous tracking of the performance and the health of servers. By gathering data on essential metrics like CPU usage, memory consumption, disk space, and server network monitoring, IT specialists gain a deep vision into server operations. This knowledge allows them to spot potential issues before they escalate, ensuring optimal performance and reliability.

Why Server Monitoring Matters

Even minor disruptions can lead to downtime, data loss, and a poor user experience. Efficient monitoring is mission-critical. Let’s see why:

  • Preventing Downtime: 98% of organizations report that a single hour of downtime can cost over $100,000. On October 4, 2021, Facebook experienced a seven-hour outage that resulted in an estimated revenue loss of $79 million from advertising alone. Proactive monitoring helps prevent failures before they impact operations.
  • Optimizing Resources: By keeping an eye on server performance, businesses can better use their resources, ensuring attention to issues where it is much needed.
  • Meeting SLAs: Server monitoring helps organizations adhere to service level agreements (SLAs), maintaining high availability and reliability for users.
  • Improving Customer Experience: Downtime can severely damage customer perception. Research shows that 89% of customers will switch to a competitor after a poor experience, showcasing the long-term impact on customer retention and loyalty.

Effective server monitoring not only safeguards against disruptions, but also enhances operational efficiency and boosts productivity. By investing in robust monitoring solutions, organizations can protect their reputation and offer a seamless experience to users.

Best Practices for Server Monitoring

If done right, the server monitoring helps in maintaining optimal performance and reliability in an organization’s IT infrastructure. Implementing best practices means that efforts are comprehensive, proactive, and aligned with organizational goals. Make sure, you conduct these activities:

1. Hardware Checks

  • Regular monitoring helps prevent overheating by ensuring that cooling systems are functioning properly.
  • Keeping track of CPU usage allows administrators to identify bottlenecks and optimize resource allocation.
  • Monitoring disk space is important to prevent outages caused by full storage.

2. Software Monitoring

More

28.03.2025

Geomap and the SSH script alert reaction in the new LANState Pro 10.4

10-Strike News, Updates lanstate 0 Comments

In the new version of the network administration and monitoring tool 10-Strike LANState Pro 10.4, we have added the ability to place host markers on the Open Street Map (OSM) geomap, bind them to addresses, and perform certain actions with them via the context menu. The geomap allows you to monitor the status of hosts, quickly determining where exactly the equipment failure occurred. The map is easily scaled and moved with the mouse along with the host markers.geo map with host markers - host network monitoring

The geomap can be displayed either in a separate window or embedded in the main one. In the first case, the window with the map can be dragged to a separate screen – it will not interfere with the work with the program in the main window.

In addition, a new reaction to the check result has been added to the program. Now you can execute SSH scripts in response to failure alerts (this also works for receiving SNMP trap and Syslog messages). You can enable the execution of bash scripts and commands via SSH on the Execute script tab of the notifications section in the monitoring check properties. More

24.01.2025

Map editor in web interface, Netflow dashboard, IPFIX support, new actions, and Firebird 5 in the big update of 10-Strike Network Monitor Pro 8.0

10-Strike News, Updates netflow, network monitor 0 Comments

We planned to release another update of the network monitoring program before the New Year holidays. However, we thought about it and decided to include more new features, which we are sure you will appreciate. One of them is a map editor in the web interface application! We made the same editor as in the desktop console. Well, almost the same. Of course, in terms of capabilities, it does not yet reach the level of a full-fledged one, but we are constantly working on it. Now you can add new areas, hosts to the map and connect them with lines. And, of course, move objects, resize, and delete them.

network map editing in the web UI

 

We also worked on the Netflow engine, drawing attention to the fact that we poorly use the accumulated statistics. We corrected it: now the program draws a bunch of new graphs and diagrams on the traffic statistics.

Read further for more details… More

1 2 3

Popular

  • Group operations with users in the new version of the program "10-Strike Network Monitoring Pro" 8.3
    Group operations with users in the new version of the program "10-Strike Network Monitoring Pro" 8.3

Tags

camera cctv cnc dvr IIoT lanstate modbus mqtt netflow network inventory network map network monitor rtsp server ssd ssh switch syslog wifi

New

  • Group operations with users in the new version of the program “10-Strike Network Monitoring Pro” 8.3
    The March version 8.3 of 10-Strike Network Monitor, a
  • working with switch configuration filesViewing switch configurations in the new LANState (Pro) 10.5
    Let’s review the latest update of our network
  • monitoring switch configuration file changesMonitoring changes to switch configuration files in the new version of 10-Strike Network Monitor Pro 8.2
    We have released the version 8.2 of 10-Strike Network
  • IPMI server hardware monitoring - fan speed - temperaturePoll Server Hardware Sensors via IPMI and Use Updated Map Editor in the New 10-Strike Network Monitor Pro 8.1
    In the summer update of our network monitoring
  • What is Syslog: Things You Need To ConsiderWhat is Syslog: Things You Need To Consider
    In today’s complex IT environments, effective

↑

Copyright © 1998-2026, 10-Strike Software
Privacy Policy