We use cookies and similar technologies to improve your experience, analyze site traffic, and personalize content. By clicking "Accept All", you consent to our use of cookies. You can manage your preferences or learn more in our Privacy Policy.
Privacy & Cookie Settings
We respect your privacy and give you control over your data. Choose which cookies you want to allow:
These cookies are necessary for the website to function and cannot be disabled. They are set in response to actions made by you such as setting your privacy preferences, logging in, or filling in forms.
These cookies help us understand how visitors interact with our website by collecting and reporting information anonymously. This helps us improve our services.
Providers: Google Analytics, Plausible Analytics (privacy-friendly)
These cookies are used to track visitors across websites to display relevant advertisements and measure campaign effectiveness.
Providers: LinkedIn, Twitter/X, Reddit
These cookies enable the website to remember choices you make (such as your language preference or region) to provide enhanced, more personalized features.
Your Privacy Rights
Right to Access: You can request a copy of your personal data
Right to Deletion: You can request deletion of your data
Right to Object: You can object to processing of your data
Right to Portability: You can request your data in a portable format
In 2015, managing server security via spreadsheets is negligence. We explore how to replace manual checklists with Ansible and OpenSCAP on Norwegian infrastructure to satisfy Datatilsynet and PCI-DSS requirements.
Manual security audits are a liability. Learn how to automate compliance using OpenSCAP and Ansible on CentOS 7, ensuring your infrastructure meets Datatilsynet standards while keeping data strictly within Norwegian borders.
Manual security checklists are a liability. Learn how to automate compliance using Ansible and OpenSCAP on KVM infrastructure, keeping your data strictly within Norwegian jurisdiction.
Running a mail server in 2011 is not for the faint of heart. Learn how to configure Postfix for maximum deliverability, secure it against relays, and keep the Norwegian Data Inspectorate happy.
In an era of rising botnets and script kiddies, a default installation is a ticking time bomb. We cover the essential steps to secure your CentOS and Debian servers, from iptables to SSH keys, ensuring your Norwegian infrastructure stays online.
With the DLD looming over Norway and packet sniffers lurking on public WiFi, a private VPN is mandatory. Learn how to deploy a hardened OpenVPN 2.2 server on CentOS 6 with dedicated resources.
Sending passwords over port 21 is a security suicide mission. Here is how to lock down your file transfers using SFTP chroots on CentOS and Debian, ensuring compliance with Norwegian privacy standards.
Client-side tracking misses the full picture. Discover how to configure AWStats 7.0 for deep server-side analysis, uncover botnets, and audit bandwidth on high-performance infrastructure.
Client-side analytics lie. Bots, script-blockers, and timeouts skew your data. Learn how to deploy AWStats 7.0 for forensic-level traffic analysis, and why high I/O throughput is non-negotiable for log parsing.
Raw access logs are useless for trend analysis. Learn how to deploy AWStats on your VPS to track bandwidth, bots, and visitors without crashing your server during the parsing process.
Email delivery in 2011 is a war against RBLs and aggressive spam filters. Learn how to configure Postfix on CentOS and Debian to ensure your emails actually reach the inbox, leveraging clean IPs and proper PTR records.
With tools like Firesheep compromising public Wi-Fi, an encrypted tunnel is no longer optional. Here is how to deploy OpenVPN on Ubuntu 10.04 LTS with hardware-accelerated encryption on CoolVDS.
Is your single Apache server ready for a traffic spike? Learn how to deploy HAProxy 1.4 for robust load balancing and failover. We cover Layer 7 switching, configuration strategies, and why low-latency hardware in Oslo matters for Norwegian businesses.
In an era of automated botnets and script kiddies, a default Linux install is a ticking time bomb. Learn the battle-tested strategies to lock down your VPS, comply with Norwegian data laws, and sleep soundly knowing your iptables are holding the line.
Is your single Apache server choking on traffic? Learn how to deploy HAProxy 1.4 on CentOS 5 to split traffic, survive traffic spikes, and maintain uptime when it matters most.
Default installations are a security risk. Learn the critical steps to harden your CentOS and Debian servers using iptables, SSH keys, and Fail2Ban before your IP hits a botnet list.
Client-side trackers miss 30% of your traffic. Learn how to configure AWStats on CentOS and Debian to uncover botnets, bandwidth theft, and 404 errors, ensuring your Norway-based infrastructure remains compliant and performant.
Google Analytics misses 30% of your traffic. Learn how to deploy AWStats for raw, server-side truth, configure Perl parsers for performance, and why distinct I/O isolation matters for log analysis.
Client-side tracking lies. Discover how to configure AWStats on your Linux VPS to uncover bandwidth thieves, fix 404 errors, and audit traffic with forensic precision.
A battle-hardened guide to setting up Postfix on CentOS 5/Debian Lenny. Learn to secure port 25, master main.cf restrictions, and keep your IP off Spamhaus blacklists.
Raw logs don't lie, but they are impossible to read during a traffic spike. Learn how to deploy AWStats for real-time visualization without killing your server's I/O, and why storage speed is the bottleneck you aren't watching.
Client-side trackers lie. Real sysadmins use raw logs. A deep dive into configuring AWStats on Apache, handling log rotation, and why Disk I/O matters.
Is Subversion slowing your team down? Learn how to deploy a secure, private Git server on CentOS 5 using SSH. Cut latency between Oslo and Kyiv and regain control of your code.
A comprehensive 2009 guide for Norwegian IT professionals on setting up secure, reliable email infrastructure using VDS and Dedicated Servers. Learn best practices for Postfix, Exchange, and spam prevention.
Is your website sluggish? Discover how advanced cache optimization can save bandwidth, improve user experience, and boost your SEO rankings in the competitive Norwegian market.
As Norwegian e-commerce grows despite the financial crisis, choosing the right hosting is critical. We analyze why Virtual Dedicated Servers (VDS) offer the perfect balance of performance, security, and cost for 2009.
As we enter 2009, 'Cloud Computing' is shifting from a buzzword to a business reality. For Norwegian IT managers, the shift to VDS and Cloud Hosting offers cost efficiency, but security remains the primary barrier. This guide details essential security strategies, from data sovereignty under Norwegian law to hypervisor hardening.
Kubernetes 1.1 is finally production-ready, but the networking model remains a black box for many. We dissect the overlay network tax, optimization of kube-proxy, and why the recent Safe Harbor ruling makes hosting your cluster in Norway critical.
Kubernetes 1.1 is finally production-ready, but the networking model remains a black box for many. We dissect the overlay network tax, optimization of kube-proxy, and why the recent Safe Harbor ruling makes hosting your cluster in Norway critical.