We use cookies and similar technologies to improve your experience, analyze site traffic, and personalize content. By clicking "Accept All", you consent to our use of cookies. You can manage your preferences or learn more in our Privacy Policy.
Privacy & Cookie Settings
We respect your privacy and give you control over your data. Choose which cookies you want to allow:
These cookies are necessary for the website to function and cannot be disabled. They are set in response to actions made by you such as setting your privacy preferences, logging in, or filling in forms.
These cookies help us understand how visitors interact with our website by collecting and reporting information anonymously. This helps us improve our services.
Providers: Google Analytics, Plausible Analytics (privacy-friendly)
These cookies are used to track visitors across websites to display relevant advertisements and measure campaign effectiveness.
Providers: LinkedIn, Twitter/X, Reddit
These cookies enable the website to remember choices you make (such as your language preference or region) to provide enhanced, more personalized features.
Your Privacy Rights
Right to Access: You can request a copy of your personal data
Right to Deletion: You can request deletion of your data
Right to Object: You can object to processing of your data
Right to Portability: You can request your data in a portable format
The 'castle and moat' security model failed Target and OPM. It will fail you. Learn how to implement the Google BeyondCorp philosophy using Nginx, OpenVPN, and iptables on Norwegian infrastructure.
The 'Serverless' buzzword is dominating 2016, but Function-as-a-Service isn't a silver bullet. We explore how to build a pragmatically 'serverless' architecture using Docker, Nginx, and high-performance KVM instances in Norway.
Is your deployment pipeline bleeding time? We dissect disk I/O blocking, proper Docker caching strategies, and the critical impact of hardware virtualization on CI/CD performance. Learn how to cut build times by 40% using KVM and NVMe infrastructure.
With the recent collapse of the Safe Harbor agreement, relying on a simple firewall is no longer sufficient. Learn how to implement Google's 'Zero Trust' model using Linux primitives, strict access controls, and Norwegian infrastructure.
AWS Lambda and the 'Serverless' movement are dominating headlines in 2015, but is the technology ready for mission-critical Nordic workloads? We analyze the latency trade-offs, vendor lock-in risks, and hybrid architectures that combine FaaS agility with the raw power of KVM virtualization.
Moving from monolithic architectures to microservices introduces network complexity and latency challenges. We explore service discovery, containerization with Docker 1.6, and why raw KVM performance is non-negotiable for distributed systems in 2015.
Running a mail server in 2011 is not for the faint of heart. Learn how to configure Postfix for maximum deliverability, secure it against relays, and keep the Norwegian Data Inspectorate happy.
Stop relying on third-party cloud providers for your proprietary code. Learn how to deploy a battle-hardened, private Git server using Gitolite and SSH keys on a Norwegian VPS, ensuring compliance with Datatilsynet and blistering fast push/pull speeds.
The 'LulzSec summer' proved no one is safe. From iptables policies to SSH key management, here is how to lock down your Norwegian VPS before you even point a domain at it.
Is your single Apache instance choking on traffic? We break down proven load balancing techniques from Round Robin to HAProxy, tailored for Norwegian latency requirements.
Client-side tracking misses the full picture. Discover how to configure AWStats 7.0 for deep server-side analysis, uncover botnets, and audit bandwidth on high-performance infrastructure.
Raw access logs tell the truth that Google Analytics misses. Learn how to configure AWStats for deep traffic insights on your Norwegian VPS without killing your server's I/O performance or violating Datatilsynet guidelines.
Stop waking up to crashed servers. A battle-hardened SysAdmin's guide to configuring Nagios for alerts and Munin for trending on CentOS 5, ensuring your Norwegian VPS infrastructure stays stable.
Raw logs don't lie, but they are impossible to read. Learn how to deploy AWStats on CentOS 5/6, comply with Datatilsynet privacy rules, and why dedicated I/O is critical for log parsing.
Raw access logs are useless if you can't read them. Learn how to deploy AWStats for granular traffic analysis without killing your disk I/O, tailored for Norwegian compliance standards.
Raw access logs are useless for trend analysis. Learn how to deploy AWStats on your VPS to track bandwidth, bots, and visitors without crashing your server during the parsing process.
Client-side tracking misses the full picture. Learn how to deploy AWStats on CentOS for granular traffic analysis, manage heavy I/O loads, and comply with Norwegian data retention standards.
Stop forcing users to wait for 30 hops to Oslo. We break down how to pair a robust Norwegian VDS with a Content Delivery Network using Nginx and Varnish for sub-100ms loads.
Running your own mail server isn't just about sending emails; it's about control, privacy, and deliverability. Learn how to configure Postfix 2.8 correctly to avoid blacklists and ensure strict data compliance under Norwegian law.
Email delivery in 2011 is a war against RBLs and aggressive spam filters. Learn how to configure Postfix on CentOS and Debian to ensure your emails actually reach the inbox, leveraging clean IPs and proper PTR records.
Red Hat Enterprise Linux 6 has shifted the battlefield from Xen to KVM. We analyze the kernel-level differences, I/O scheduling, and why 'containers' like OpenVZ might be killing your database performance.
Raw access logs are your server's black box. Learn how to configure AWStats for granular traffic insight without killing your disk I/O, and why Norwegian privacy laws demand you handle IP data carefully.
Manual FTP copies are a recipe for disaster. Learn how to automate reliable backups using Bash, cron, and rsync while adhering to Norway's Datatilsynet regulations.
Stop getting blacklisted. A battle-tested guide to configuring Postfix for maximum deliverability and security in the Norwegian hosting landscape, focusing on clean IP reputation and strict relay controls.
Client-side tracking misses bots, hotlinkers, and errors. Reclaim your data sovereignty by deploying AWStats on a VDS. Here is the 2010 guide to server-side analytics.
Sending email is easy; landing in the Inbox is war. Here is a battle-tested guide to configuring Postfix on CentOS 5, securing your reputation, and why clean IPs matter more than your config.
Is your site sluggish during peak hours? We analyze the technical limitations of shared hosting environments and why migrating to a Xen-based VPS in Norway is the only path for stability in 2010.
Is your budget VPS slowing down during peak hours? We dive into the kernel-level differences between OpenVZ containers and Xen virtualization to explain why 'guaranteed resources' are often anything but.
The internet is a hostile environment. Learn how to lock down your CentOS or Debian VPS against brute-force attacks and script kiddies using tools like iptables and Fail2Ban, while keeping your data compliant with Datatilsynet standards.