We use cookies and similar technologies to improve your experience, analyze site traffic, and personalize content. By clicking "Accept All", you consent to our use of cookies. You can manage your preferences or learn more in our Privacy Policy.
Privacy & Cookie Settings
We respect your privacy and give you control over your data. Choose which cookies you want to allow:
These cookies are necessary for the website to function and cannot be disabled. They are set in response to actions made by you such as setting your privacy preferences, logging in, or filling in forms.
These cookies help us understand how visitors interact with our website by collecting and reporting information anonymously. This helps us improve our services.
Providers: Google Analytics, Plausible Analytics (privacy-friendly)
These cookies are used to track visitors across websites to display relevant advertisements and measure campaign effectiveness.
Providers: LinkedIn, Twitter/X, Reddit
These cookies enable the website to remember choices you make (such as your language preference or region) to provide enhanced, more personalized features.
Your Privacy Rights
Right to Access: You can request a copy of your personal data
Right to Deletion: You can request deletion of your data
Right to Object: You can object to processing of your data
Right to Portability: You can request your data in a portable format
It is 2009, and the internet is the Wild West. If you leave your SSH port default on a public IP, you’ll be brute-forced within minutes. Here is the no-nonsense guide to locking down your CentOS 5 or Debian Lenny server.
A fresh Linux server survives about 15 minutes on the open web before the scanners hit. Here is the battle-tested guide to locking down CentOS and Debian, configuring IPTables, and why hardware virtualization matters for security.
Alert fatigue and steal time are silent killers. We explore how to build a robust Prometheus & Grafana stack on CentOS 7 to catch what simple ping checks miss, specifically tailored for the Norwegian hosting landscape.
Following the massive security breaches of 2011, default configurations are no longer acceptable. Learn how to lock down your CentOS and Debian servers using SSH keys, iptables, and Fail2Ban while ensuring compliance with Norwegian data laws.
Stop relying on 'security by obscurity'. A battle-hardened guide to securing your Linux VPS against script kiddies and botnets using iptables, SSH keys, and common sense. Written for the Norwegian landscape.
With the rise of LulzSec and automated botnets in 2011, default configurations are a death sentence. Here is the battle-tested guide to hardening your Norwegian VPS, from iptables to SSH key management.
A battle-hardened guide to securing CentOS 6 and Debian servers. Learn how to configure iptables, secure SSH, and avoid common pitfalls before your new VPS hits the public internet.
Script kiddies are scanning your IP right now. Stop relying on default configs. Here is the battle-tested guide to locking down CentOS 6 and Debian servers, securing SSH, and configuring iptables for Norwegian infrastructure.
Forget centralized SVN headaches. Learn how to deploy a secure, high-performance Git server using Gitolite on a Norwegian VPS, ensuring low latency and compliance with Personopplysningsloven.
Email delivery in 2011 is a war against RBLs and aggressive spam filters. Learn how to configure Postfix on CentOS and Debian to ensure your emails actually reach the inbox, leveraging clean IPs and proper PTR records.
Raw access logs tell the truth, but they are impossible to read. Learn how to deploy AWStats for granular traffic analysis without relying on JavaScript trackers, and why high I/O performance is critical for log processing.
With the recent release of Debian 6 and the rise of automated botnets, default configurations are a liability. Here is the battle-tested guide to locking down your VPS before you even point a DNS record at it.
Client-side tracking misses 30% of your traffic. Discover how to deploy AWStats for forensic-level log analysis, why I/O performance dictates parsing speed, and how to keep your data compliant with Norwegian privacy laws.
Is your Apache server choking on concurrent connections? Learn how to deploy Nginx as a reverse proxy to handle thousands of requests, reduce RAM usage, and improve latency for Norwegian users.
Public WiFi is a security minefield. Learn how to deploy a military-grade OpenVPN tunnel on a Norwegian VPS to secure your data against sniffers while keeping latency practically non-existent.
Is your LAMP stack choking on memory? Learn how to configure Nginx 0.8 as a lightweight reverse proxy in front of Apache to handle the C10k problem, optimize for Norwegian latency, and keep your sysadmin pager silent.
Google Analytics misses 30% of your traffic. Learn how to deploy AWStats for raw, server-side truth, configure Perl parsers for performance, and why distinct I/O isolation matters for log analysis.
The panic of May 25th is over, but the liability remains. Learn how to automate server hardening using Ansible and OpenSCAP on Norwegian infrastructure to satisfy Datatilsynet without burning out your DevOps team.
With GDPR fully enforceable as of May 2018, manual server hardening is a liability. We explore using Ansible and OpenSCAP to automate compliance on CoolVDS instances in Norway.
Latency kills. Learn how to tune the Linux kernel and Nginx for high-throughput API gateways, specifically tailored for the Norwegian network topology available in 2017.
It's 2011 and LulzSec is on the loose. Default configurations are a death sentence. Here is the battle-tested guide to locking down CentOS 6 and Debian Squeeze.
Stop gambling with 'burstable' RAM. We break down the architecture of Xen PV vs HVM, kernel tuning for Linux guests, and why true hardware isolation is the only path for serious Norwegian infrastructure.
Stop relying on user complaints to know when your server is down. A battle-hardened guide to setting up Nagios for alerts and Munin for performance graphing on CentOS and Debian systems.
Stop relying on US-based hosting for your proprietary code. A battle-hardened guide to setting up a high-performance, self-hosted Git server on CentOS using SSH and CoolVDS infrastructure.
Plain FTP sends passwords in cleartext. In 2011, that is negligence. Learn how to configure chrooted SFTP on Linux, satisfy Datatilsynet, and secure your transfers.
Tired of your legitimate business emails landing in junk folders? This guide covers the essential Postfix configuration, RBL integration, and infrastructure requirements to ensure deliverability and compliance with Norwegian data laws.
While the industry buzzes about 'The Cloud,' system administrators know the pain of network latency. We analyze why local RAID 10 configurations outperform networked storage for database-heavy applications in the Norwegian market.
Stop script kiddies dead in their tracks. A battle-hardened guide to locking down CentOS and Debian servers using iptables, SSH keys, and common sense. Secure your VPS now.
Stop your emails from hitting the spam folder. A battle-hardened guide to configuring Postfix in 2009, ensuring clean headers, proper rDNS, and compliance with Norwegian data laws.