All articles tagged with Privacy
Post-Mirai botnet analysis: Why your 'backup script' isn't a Disaster Recovery Plan. We break down Master-Slave replication on Ubuntu 16.04, the legal reality of data residency in Norway, and why NVMe restores save jobs.
Backup is not disaster recovery. In this guide, we dismantle common data safety myths, explore 2016's evolving privacy regulations in Norway, and implement a master-slave replication architecture using KVM and NVMe storage.
RAID is not a backup. In the wake of the new EU-US Privacy Shield, we dissect how to build a legally compliant, KVM-based failover strategy for high-availability systems in Norway.
Docker is revolutionizing deployment, but its default configuration is a security minefield. We dive into kernel capabilities, user namespaces, and why KVM isolation is non-negotiable for Norwegian data compliance in 2016.
Don't let a hardware failure become a business failure. We analyze the specific constraints of Norwegian data laws following the Safe Harbor collapse and implement a robust KVM-based recovery plan using MySQL 5.6 replication and rsync.
It is October 2015. The ECJ just invalidated Safe Harbor, and your Nagios dashboard says everything is fine while your users see 504 errors. Here is why the shift from simple monitoring to deep observability is critical for Norwegian CTOs right now.
Is public cloud lock-in draining your IT budget? We analyze the TCO of hybrid architectures in 2015, combining AWS scalability with the raw IOPS of local KVM VPS, and why keeping core data in Norway matters more than ever.
It is not a matter of if your server will fail, but when. We dissect practical Disaster Recovery strategies for 2015, from MySQL replication to complying with Datatilsynet, ensuring your data survives the worst.
As the Norwegian digital landscape evolves in 2015, VDS hosting emerges as the superior choice for businesses seeking the power of dedicated servers with the flexibility of the cloud.
Stop relying on US-hosted code repositories. Learn how to deploy a secure, low-latency Git server using Gitolite on a Norwegian VPS, ensuring compliance with local data laws and maximizing push/pull speeds.
It is 2011, and while everyone talks about CPU cores, disk latency is silently killing your database performance. We dissect the difference between SAN and Local RAID-10, analyze the impact of 'noisy neighbors' in virtualization, and explain why Norwegian data sovereignty protects you from the US Patriot Act.
Still relying on port 21? In 2011, transmitting data in plaintext is professional negligence. Learn how to configure chrooted SFTP on CentOS 6 and Debian to secure your infrastructure against packet sniffing while satisfying Datatilsynet requirements.
Is the cloud hype worth the latency? We analyze the storage landscape of 2011, from Amazon S3 object storage to local RAID-10 SAS arrays, and why keeping your data in Norway matters for latency and the Data Protection Directive.
Stop guessing where your bandwidth is going. A battle-hardened guide to implementing AWStats for server-side analytics, optimizing I/O performance, and navigating Norwegian data privacy laws in 2011.
Is your server load spiking while CPU usage sits idle? You are likely a victim of the 'IO Bottleneck' common in traditional SAN setups. We explore why switching to local SSD storage and KVM virtualization is the critical move for serious systems administrators in Norway.
With the DLD looming over Norway and packet sniffers lurking on public WiFi, a private VPN is mandatory. Learn how to deploy a hardened OpenVPN 2.2 server on CentOS 6 with dedicated resources.
With the rise of public WiFi insecurity and data privacy concerns, a personal VPN is mandatory for sysadmins. Learn how to deploy OpenVPN on a Norwegian VPS to secure your traffic against snooping and comply with strict local privacy laws.
Is your server crawling despite low CPU usage? The bottleneck isn't your codeβit's likely your storage architecture. We analyze the shift from spinning rust to SSD-cached virtualization and why data sovereignty in Norway matters more than ever.
Forget PPTP. In the wake of Firesheep and DLD debates, tunneling traffic through a secure Norwegian node is mandatory. Here is the production-grade OpenVPN configuration I use.
Raw access logs tell the truth that Google Analytics misses. Learn how to configure AWStats for deep traffic insights on your Norwegian VPS without killing your server's I/O performance or violating Datatilsynet guidelines.
Raw logs don't lie, but they are impossible to read. Learn how to deploy AWStats on CentOS 5/6, comply with Datatilsynet privacy rules, and why dedicated I/O is critical for log parsing.
Client-side analytics lie. Bots, script-blockers, and timeouts skew your data. Learn how to deploy AWStats 7.0 for forensic-level traffic analysis, and why high I/O throughput is non-negotiable for log parsing.
Is the "Cloud" just a marketing buzzword for slow remote servers? We dissect the state of storage technology in 2011, from spinning rust to the SSD revolution, and explain why hosting in Norway matters.
Public Wi-Fi is a security minefield. Learn how to deploy a rock-solid OpenVPN server on Debian Squeeze to encrypt your traffic, bypass restrictive firewalls, and keep your data subject to Norwegian privacy laws.
Tired of sniffing risks like Firesheep on public networks? Learn how to deploy a rock-solid OpenVPN server on a Norwegian VPS. We cover iptables, routing, and 2048-bit encryption.
Public WiFi is compromised. PPTP is dead. Learn how to deploy a battle-ready OpenVPN server with 2048-bit encryption on a Norwegian VPS to bypass surveillance and secure your traffic.
Running your own mail server isn't just about sending emails; it's about control, privacy, and deliverability. Learn how to configure Postfix 2.8 correctly to avoid blacklists and ensure strict data compliance under Norwegian law.
Raw access logs tell the truth, but they are impossible to read. Learn how to deploy AWStats for granular traffic analysis without relying on JavaScript trackers, and why high I/O performance is critical for log processing.
Raw access logs are your server's black box. Learn how to configure AWStats for granular traffic insight without killing your disk I/O, and why Norwegian privacy laws demand you handle IP data carefully.
Raw access logs tell the truth, but they are impossible to read. Learn how to configure AWStats for granular traffic insight, optimize Perl execution for large datasets, and ensure Norwegian privacy compliance without killing your I/O.