All articles tagged with ["Linux Security"
Following the Heartbleed and Shellshock disasters of 2014, the traditional 'castle and moat' security model is obsolete. Learn how to implement a verify-every-packet strategy using iptables, SELinux, and Two-Factor SSH on high-performance Norwegian infrastructure.
The old model of 'trusted LAN, untrusted WAN' is obsolete. Following the chaos of Heartbleed and Shellshock, we explore how to build a manual Zero-Trust architecture using iptables, strict SSH tunneling, and KVM isolation on Norwegian infrastructure.
The traditional network perimeter is dead. Discover how to implement a 'Never Trust, Always Verify' security model on Linux using KVM isolation, granular iptables, and strict access controls suitable for 2014's threat landscape.
Docker is the new hotness, but running LXC in production requires serious hardening. We dissect cgroups, capabilities, and why KVM is still the safest boundary for Norwegian data.
The perimeter is dead. Following the recent Snowden leaks, relying on firewalls alone is negligence. Learn how to implement a Zero-Trust model using KVM, OpenVPN, and aggressive iptables rules to secure your Norwegian VPS.
The traditional perimeter firewall is dead. Learn how to architect a 'Zero Trust' infrastructure on KVM VPS using IPTables, OpenVPN, and strict access controlsβassuming your local network is already compromised.
A battle-hardened guide to securing your Linux VPS against modern threats. We cover SSH keys, IPTables strategies, and why kernel isolation matters for compliance in Norway.
Stop relying on default configs. A battle-hardened sysadmin's guide to locking down CentOS 6 and Ubuntu 12.04 using iptables, key-based auth, and kernel tuning. Essential reading for Norwegian deployments.
A battle-tested guide to securing your CentOS 6 and Debian 6 servers. From iptables to SSH keys, learn how to protect your infrastructure against rising botnets while leveraging Norwegian privacy standards.
It is not a matter of if you get scanned, but when. We break down the essential iptables rules, SSH configurations, and kernel tweaks needed to survive on the hostile open web of 2012.
A default Linux install is a vulnerability waiting to happen. Learn the battle-tested configuration strategies to secure your CentOS 6 and Ubuntu 12.04 servers against brute force attacks, while ensuring compliance with Norwegian data laws.
Secure your CentOS 6 and Ubuntu 12.04 servers against modern threats. We cover IPTables, SSH hardening, and kernel tuning, tailored for the Norwegian hosting landscape.
In an era of increasing automated attacks, default configurations are a death sentence. Here is the battle-tested roadmap to securing your Norwegian VPS, from iptables to SSH keys, strictly adhering to the Personal Data Act.
Don't become a statistic. From configuring iptables to securing SSH keys, this guide covers the mandatory steps to harden your CentOS and Debian servers against modern threats. Featuring specific configurations for Norwegian compliance.
FTP sends passwords in cleartext. Stop exposing your infrastructure. This guide covers `internal-sftp` configuration, permission lockdowns, and compliance with Norwegian data laws.
FTP is a security relic that exposes credentials in plain text. Learn how to implement chrooted SFTP on CentOS 6 and Debian 6 to satisfy Datatilsynet requirements and secure your infrastructure.
In an era of LulzSec and automated botnets, default settings are a death sentence. Here is the battle-hardened guide to securing your CentOS and Debian servers, optimized for Norwegian infrastructure standards.
Default installations are dangerous. From securing SSH to configuring iptables and Fail2Ban, here is the battle-tested guide to hardening your Linux VPS against brute-force attacks and exploits.
Stop relying on 'security through obscurity'. From configuring rigid iptables to navigating Norwegian privacy laws, this guide covers the mandatory steps to secure your VPS against modern botnets and brute-force attacks.
Sending credentials in cleartext is professional suicide in 2011. We analyze the risks of legacy FTP, demonstrate how to implement a chrooted SFTP environment using OpenSSH, and discuss why Norwegian data privacy laws demand better encryption standards.
Botnets don't sleep. Secure your CentOS and Ubuntu servers with these battle-tested hardening techniques. From iptables to SSH keys, here is how to keep your data safe in compliance with Datatilsynet standards.
The default Linux installation is not secure. From locking down SSH to configuring iptables, here is the battle-tested guide to securing your VPS against the rising tide of automated botnets targeting European infrastructure.
A battle-tested guide to locking down RHEL/CentOS and Debian systems in 2010. From accurate iptables chains to kernel tuning against SYN floods, we cover what actually works in the Norwegian threat landscape.
Stop script kiddies cold. A battle-hardened guide to securing your CentOS and Debian servers using iptables, SSH keys, and common sense. Written for the paranoid admin.