We use cookies and similar technologies to improve your experience, analyze site traffic, and personalize content. By clicking "Accept All", you consent to our use of cookies. You can manage your preferences or learn more in our Privacy Policy.
Privacy & Cookie Settings
We respect your privacy and give you control over your data. Choose which cookies you want to allow:
These cookies are necessary for the website to function and cannot be disabled. They are set in response to actions made by you such as setting your privacy preferences, logging in, or filling in forms.
These cookies help us understand how visitors interact with our website by collecting and reporting information anonymously. This helps us improve our services.
Providers: Google Analytics, Plausible Analytics (privacy-friendly)
These cookies are used to track visitors across websites to display relevant advertisements and measure campaign effectiveness.
Providers: LinkedIn, Twitter/X, Reddit
These cookies enable the website to remember choices you make (such as your language preference or region) to provide enhanced, more personalized features.
Your Privacy Rights
Right to Access: You can request a copy of your personal data
Right to Deletion: You can request deletion of your data
Right to Object: You can object to processing of your data
Right to Portability: You can request your data in a portable format
The 'castle and moat' security strategy is obsolete. With GDPR enforcement looming and sophisticated lateral attacks on the rise, Norwegian CTOs must pivot to a Zero-Trust model. Here is how to implement Google-style BeyondCorp security on your Linux infrastructure today.
For Scandinavian user bases, hosting in Frankfurt is a compromise you can't afford. We dive into TCP stack tuning, NIX peering, and why 'Edge' means local hardware in 2016.
It is 2016, and Docker is eating the world. But most implementations I see in Norway are wide-open security nightmares. Here is how to lock down your containers on Ubuntu 16.04 and CentOS 7 before you get hit.
Your build server is the heartbeat of deployment. If it lags, you bleed money. We dissect how I/O bottlenecks kill CI/CD performance and how to fix it using Jenkins tuning, Docker OverlayFS, and local Norwegian infrastructure.
Cloud bills are skyrocketing. Learn how to cut hosting costs by 40% through rigorous rightsizing, understanding KVM overhead, and leveraging local Norwegian peering without sacrificing I/O performance.
Docker is revolutionizing deployment, but its default configuration is a security minefield. We dive into kernel capabilities, user namespaces, and why KVM isolation is non-negotiable for Norwegian data compliance in 2016.
Kubernetes 1.1 has brought massive changes to networking with the new iptables proxy mode. We dive deep into CNI, Flannel configuration, and why the recent Safe Harbor invalidation makes running your own K8s cluster in Norway a smart move.
A default Linux install is a sitting duck. From iptables strategies to SSH key enforcement, here is how we secure servers in Norway's strict regulatory environment.
Script kiddies are scanning your IP right now. In this guide, we ditch the theory and apply battle-tested security configurations for CentOS 5 and Debian Lenny to keep your data safe under Norwegian law.
It’s 2009 and the script kiddies are already scanning your IP. Here is the no-nonsense guide to hardening your CentOS or Debian server, configuring iptables, and keeping Datatilsynet happy.
In an era of rising hacktivism, default Linux installs are not safe. Learn the battle-tested strategies to secure your CentOS and Debian servers, from iptables to kernel hardening, tailored for the Norwegian hosting market.
It is 2009, and the internet is the Wild West. If you leave your SSH port default on a public IP, you’ll be brute-forced within minutes. Here is the no-nonsense guide to locking down your CentOS 5 or Debian Lenny server.
A fresh Linux server survives about 15 minutes on the open web before the scanners hit. Here is the battle-tested guide to locking down CentOS and Debian, configuring IPTables, and why hardware virtualization matters for security.
Alert fatigue and steal time are silent killers. We explore how to build a robust Prometheus & Grafana stack on CentOS 7 to catch what simple ping checks miss, specifically tailored for the Norwegian hosting landscape.
Following the massive security breaches of 2011, default configurations are no longer acceptable. Learn how to lock down your CentOS and Debian servers using SSH keys, iptables, and Fail2Ban while ensuring compliance with Norwegian data laws.
Stop relying on 'security by obscurity'. A battle-hardened guide to securing your Linux VPS against script kiddies and botnets using iptables, SSH keys, and common sense. Written for the Norwegian landscape.
With the rise of LulzSec and automated botnets in 2011, default configurations are a death sentence. Here is the battle-tested guide to hardening your Norwegian VPS, from iptables to SSH key management.
A battle-hardened guide to securing CentOS 6 and Debian servers. Learn how to configure iptables, secure SSH, and avoid common pitfalls before your new VPS hits the public internet.
Script kiddies are scanning your IP right now. Stop relying on default configs. Here is the battle-tested guide to locking down CentOS 6 and Debian servers, securing SSH, and configuring iptables for Norwegian infrastructure.
Forget centralized SVN headaches. Learn how to deploy a secure, high-performance Git server using Gitolite on a Norwegian VPS, ensuring low latency and compliance with Personopplysningsloven.
Email delivery in 2011 is a war against RBLs and aggressive spam filters. Learn how to configure Postfix on CentOS and Debian to ensure your emails actually reach the inbox, leveraging clean IPs and proper PTR records.
Raw access logs tell the truth, but they are impossible to read. Learn how to deploy AWStats for granular traffic analysis without relying on JavaScript trackers, and why high I/O performance is critical for log processing.
With the recent release of Debian 6 and the rise of automated botnets, default configurations are a liability. Here is the battle-tested guide to locking down your VPS before you even point a DNS record at it.
Client-side tracking misses 30% of your traffic. Discover how to deploy AWStats for forensic-level log analysis, why I/O performance dictates parsing speed, and how to keep your data compliant with Norwegian privacy laws.
Is your Apache server choking on concurrent connections? Learn how to deploy Nginx as a reverse proxy to handle thousands of requests, reduce RAM usage, and improve latency for Norwegian users.
Public WiFi is a security minefield. Learn how to deploy a military-grade OpenVPN tunnel on a Norwegian VPS to secure your data against sniffers while keeping latency practically non-existent.
Is your LAMP stack choking on memory? Learn how to configure Nginx 0.8 as a lightweight reverse proxy in front of Apache to handle the C10k problem, optimize for Norwegian latency, and keep your sysadmin pager silent.
Google Analytics misses 30% of your traffic. Learn how to deploy AWStats for raw, server-side truth, configure Perl parsers for performance, and why distinct I/O isolation matters for log analysis.
Latency kills. Learn how to tune the Linux kernel and Nginx for high-throughput API gateways, specifically tailored for the Norwegian network topology available in 2017.