We use cookies and similar technologies to improve your experience, analyze site traffic, and personalize content. By clicking "Accept All", you consent to our use of cookies. You can manage your preferences or learn more in our Privacy Policy.
Privacy & Cookie Settings
We respect your privacy and give you control over your data. Choose which cookies you want to allow:
These cookies are necessary for the website to function and cannot be disabled. They are set in response to actions made by you such as setting your privacy preferences, logging in, or filling in forms.
These cookies help us understand how visitors interact with our website by collecting and reporting information anonymously. This helps us improve our services.
Providers: Google Analytics, Plausible Analytics (privacy-friendly)
These cookies are used to track visitors across websites to display relevant advertisements and measure campaign effectiveness.
Providers: LinkedIn, Twitter/X, Reddit
These cookies enable the website to remember choices you make (such as your language preference or region) to provide enhanced, more personalized features.
Your Privacy Rights
Right to Access: You can request a copy of your personal data
Right to Deletion: You can request deletion of your data
Right to Object: You can object to processing of your data
Right to Portability: You can request your data in a portable format
It is 2015, and editing config files manually in production is no longer acceptable. Learn how to implement 'Infrastructure as Code' using Git hooks, Ansible, and Docker to ensure your Norwegian VPS environments are reproducible and robust.
The old "hard shell, soft center" security model is obsolete. Learn how to implement Google-style Zero Trust principles using KVM, iptables, and SSH hardening to protect your Norwegian VPS assets.
The castle-and-moat security model failed Sony and Anthem. It will fail you. Learn how to implement a Zero-Trust network using strict iptables, internal SSL, and 2FA on CentOS 7 and Ubuntu 14.04.
The 'Castle and Moat' security strategy is failing. Learn how to implement a Zero Trust architecture today using KVM, strict IPTables, and Two-Factor Authentication to secure your Norwegian infrastructure against modern threats.
Is your REST API choking under load? We dive deep into Linux kernel tuning, NGINX upstream keepalives, and why CPU Steal Time is the silent killer of API performance in virtualized environments.
Hypervisors are heavy. In a world demanding millisecond latency, Linux Containers (LXC) offer bare-metal performance with VM-like manageability. Here is why you should care.
Following the massive security breaches of 2011, default configurations are no longer acceptable. Learn how to lock down your CentOS and Debian servers using SSH keys, iptables, and Fail2Ban while ensuring compliance with Norwegian data laws.
Stop relying on 'security by obscurity'. A battle-hardened guide to securing your Linux VPS against script kiddies and botnets using iptables, SSH keys, and common sense. Written for the Norwegian landscape.
It's 2011 and LulzSec is on the loose. Default configurations are a death sentence. Here is the battle-tested guide to locking down CentOS 6 and Debian Squeeze.
With the rise of LulzSec and automated botnets in 2011, default configurations are a death sentence. Here is the battle-tested guide to hardening your Norwegian VPS, from iptables to SSH key management.
A battle-hardened guide to securing CentOS 6 and Debian servers. Learn how to configure iptables, secure SSH, and avoid common pitfalls before your new VPS hits the public internet.
Stop relying on shared hosting for critical email. This guide covers the essential Postfix configuration steps to ensure deliverability, secure your MTA against relays, and keep the Norwegian Data Inspectorate happy.
It is 2011, and the script kiddies are winning. Learn how to lock down your CentOS 6 or Debian Squeeze server using iptables, SSH keys, and proper KVM isolation before you become the next LulzSec statistic.
Security isn't a feature; it's a requirement. Learn the essential steps to lock down your Linux server, from iptables to SSH keys, and why Norwegian data sovereignty matters more than ever.
In an era of rising botnets and script kiddies, a default installation is a ticking time bomb. We cover the essential steps to secure your CentOS and Debian servers, from iptables to SSH keys, ensuring your Norwegian infrastructure stays online.
Stop guessing where your bandwidth is going. A battle-hardened guide to implementing AWStats for server-side analytics, optimizing I/O performance, and navigating Norwegian data privacy laws in 2011.
In an era of rising hacktivism, default Linux installs are not safe. Learn the battle-tested strategies to secure your CentOS and Debian servers, from iptables to kernel hardening, tailored for the Norwegian hosting market.
Script kiddies are scanning your IP right now. Stop relying on default configs. Here is the battle-tested guide to locking down CentOS 6 and Debian servers, securing SSH, and configuring iptables for Norwegian infrastructure.
A default Linux install is a sitting duck for botnets. From crafting strict iptables chains to locking down SSH, here is the battle-tested configuration for securing your Norwegian VPS infrastructure.
Stop relying on angry client emails as your monitoring system. We break down the classic Nagios and Munin setup to keep your Norwegian servers robust, compliant, and performant.
Client-side trackers miss 30% of your traffic. Learn how to configure AWStats for accurate, server-side traffic analysis and why disk I/O performance defines your reporting speed.
The 'LulzSec summer' proved no one is safe. From iptables policies to SSH key management, here is how to lock down your Norwegian VPS before you even point a domain at it.
Stop relying on default configurations. Learn how to lock down SSH, configure iptables manually, and protect your Norwegian VPS from the growing wave of automated botnets.
Client-side tracking misses 20% of your traffic. Learn how to configure AWStats for granular server-side analytics, optimize I/O performance for log parsing, and keep your data compliant with Norwegian privacy laws.
Plain text FTP is a massive security liability. Learn how to implement chrooted SFTP on CentOS and Debian to satisfy Datatilsynet requirements and secure your infrastructure.
Raw access logs tell the truth that Google Analytics misses. Learn how to configure AWStats for deep traffic insights on your Norwegian VPS without killing your server's I/O performance or violating Datatilsynet guidelines.
A default Linux installation is a welcome mat for attackers. From iptables to SSH keys, here is the battle-tested guide to securing your Norwegian VPS against script kiddies and targeted intrusions.
In the wild west of the 2011 internet, a default Linux install survives about 10 minutes before compromise. Here is the battle-tested roadmap to locking down your server using iptables, SSH keys, and common sense.
Stop relying on public cloud repos. Learn how to deploy a battle-hardened, self-hosted Git server using Gitolite on Ubuntu 10.04 LTS. Optimised for Norwegian teams requiring strict data sovereignty and low latency.
Stop relying on public cloud repos. Learn how to deploy a battle-hardened, self-hosted Git server using Gitolite on Ubuntu 10.04 LTS. Optimised for Norwegian teams requiring strict data sovereignty and low latency.