We use cookies and similar technologies to improve your experience, analyze site traffic, and personalize content. By clicking "Accept All", you consent to our use of cookies. You can manage your preferences or learn more in our Privacy Policy.
Privacy & Cookie Settings
We respect your privacy and give you control over your data. Choose which cookies you want to allow:
These cookies are necessary for the website to function and cannot be disabled. They are set in response to actions made by you such as setting your privacy preferences, logging in, or filling in forms.
These cookies help us understand how visitors interact with our website by collecting and reporting information anonymously. This helps us improve our services.
Providers: Google Analytics, Plausible Analytics (privacy-friendly)
These cookies are used to track visitors across websites to display relevant advertisements and measure campaign effectiveness.
Providers: LinkedIn, Twitter/X, Reddit
These cookies enable the website to remember choices you make (such as your language preference or region) to provide enhanced, more personalized features.
Your Privacy Rights
Right to Access: You can request a copy of your personal data
Right to Deletion: You can request deletion of your data
Right to Object: You can object to processing of your data
Right to Portability: You can request your data in a portable format
Stop waking up at 3 AM for false positives. A battle-tested guide to architecting a monitoring stack that handles massive throughput using Zabbix, Logstash, and high-IOPS NVMe storage.
Safe Harbor is dead and hardware fails. Here is a battle-tested guide to surviving server outages using Master-Slave replication and local Norwegian infrastructure.
Docker 1.9 is changing the game, but running containers as root is a recipe for disaster. Here is the battle-tested guide to hardening your stack, surviving the 'Safe Harbor' collapse, and why KVM is your only safety net.
Hardcoded IPs are killing your uptime. With the recent fall of Safe Harbor, it's time to bring your infrastructure home to Norway and automate your networking. Here is the battle-tested guide to dynamic service discovery in late 2015.
With the recent EU court ruling invalidating Safe Harbor, your Disaster Recovery strategy isn't just about backups—it's about data sovereignty. Here is a battle-tested technical guide to replicating MySQL and assets to Norwegian soil.
Migrating a live production database without killing your uptime is a surgical procedure. We break down the Master-Slave swing strategy, disk I/O bottlenecks, and why keeping your data on Norwegian soil is the smartest compliance move you can make right now.
Moving a live database doesn't have to be a game of Russian Roulette. We explore battle-tested strategies using Master-Slave replication, Percona XtraBackup, and high-performance local storage to keep your uptime intact.
In 2015, manual server hardening is a liability. Learn how to automate security baselines using Ansible 1.9 and why keeping data on Norwegian soil is the smartest move for your risk profile.
Migrating a production database doesn't have to mean 3 AM panic attacks. We explore battle-tested strategies using replication and high-IOPS storage to keep your data compliant and consistent.
Hardware fails. Data centers go dark. Is your disaster recovery plan just 'hope'? We explore battle-tested strategies using rsync, Percona XtraBackup, and Norwegian data sovereignty principles to keep your uptime intact.
Vertical scaling has a ceiling. When your MySQL process locks up despite 64GB of RAM, it's time to shard. Here is a battle-tested guide to horizontal partitioning without losing your mind.
It's 2011 and LulzSec is on the loose. Default configurations are a death sentence. Here is the battle-tested guide to locking down CentOS 6 and Debian Squeeze.
With the rise of LulzSec and automated botnets in 2011, default configurations are a death sentence. Here is the battle-tested guide to hardening your Norwegian VPS, from iptables to SSH key management.
Stop paying for private GitHub repos or suffering through Subversion merge hell. Here is the battle-tested guide to deploying a self-hosted Git server on KVM infrastructure in Oslo, ensuring sub-millisecond push latency and strict data sovereignty.
In an era of rising hacktivism, default Linux installs are not safe. Learn the battle-tested strategies to secure your CentOS and Debian servers, from iptables to kernel hardening, tailored for the Norwegian hosting market.
Script kiddies are scanning your IP right now. Stop relying on default configs. Here is the battle-tested guide to locking down CentOS 6 and Debian servers, securing SSH, and configuring iptables for Norwegian infrastructure.
A default Linux install is a sitting duck for botnets. From crafting strict iptables chains to locking down SSH, here is the battle-tested configuration for securing your Norwegian VPS infrastructure.
RAID is not a backup. In this guide, we explore battle-tested strategies using rsync, cron, and offsite storage to protect your data under Norwegian compliance standards.
Stop reacting to downtime and start predicting it. A battle-tested guide to deploying Nagios for alerts and Munin for trending on high-performance Linux VPS environments.
A default Linux installation is a welcome mat for attackers. From iptables to SSH keys, here is the battle-tested guide to securing your Norwegian VPS against script kiddies and targeted intrusions.
Stop relying on angry customer emails to track downtime. We deploy a battle-tested monitoring stack using Munin for trending and Nagios for alerting, specifically tuned for the Nordic high-performance hosting market.
In the wild west of the 2011 internet, a default Linux install survives about 10 minutes before compromise. Here is the battle-tested roadmap to locking down your server using iptables, SSH keys, and common sense.
Stop waking up to crashed servers at 3 AM. Learn how to deploy the battle-tested 2011 monitoring stack—Nagios for alerts and Munin for trends—on your Norwegian VPS.
Stop relying on angry client emails to know when your server is down. We implement a battle-tested monitoring stack using Nagios 3 and Munin on Debian Squeeze to ensure uptime and visualize performance trends.
With the recent release of Debian 6 and the rise of automated botnets, default configurations are a liability. Here is the battle-tested guide to locking down your VPS before you even point a DNS record at it.
In an era of automated botnets and script kiddies, a default Linux install is a ticking time bomb. Learn the battle-tested strategies to lock down your VPS, comply with Norwegian data laws, and sleep soundly knowing your iptables are holding the line.
Stop getting blacklisted. A battle-tested guide to configuring Postfix for maximum deliverability and security in the Norwegian hosting landscape, focusing on clean IP reputation and strict relay controls.
Secure your remote connections against packet sniffers. A battle-tested guide to OpenVPN installation, iptables routing, and avoiding common virtualization pitfalls in 2010.
Sending email is easy; landing in the Inbox is war. Here is a battle-tested guide to configuring Postfix on CentOS 5, securing your reputation, and why clean IPs matter more than your config.
Your default install is vulnerable. From iptables policies to SSH keys, here is the battle-tested roadmap to securing your Norwegian VPS against brute-force attacks and script kiddies.