All articles tagged with SSH
The 'castle-and-moat' security strategy is failing. In a world of ransomware and looming GDPR regulations, here is how to implement a Zero-Trust model using standard Linux tools available today.
The 'Castle and Moat' security strategy is dead. In this guide, we dismantle the perimeter and implement strict access controls, 2FA SSH, and encrypted tunnels on Ubuntu 16.04, ensuring your data in Norway remains untouchable.
With the Safe Harbor framework invalidated and new EU regulations looming, manual security hardening is a liability. Learn how to automate server compliance using Ansible on CentOS 7 to satisfy auditors and secure your Nordic infrastructure.
With the recent death of Safe Harbor and the looming GDPR enforcement, the 'castle and moat' security strategy is obsolete. Here is a pragmatic guide to implementing micro-segmentation and strict access controls on your Norwegian VPS infrastructure.
The 'Castle and Moat' security model is dead. Following the invalidation of Safe Harbor, relying on perimeter firewalls is negligence. Here is how to implement a Zero-Trust architecture on Linux right now using CentOS 7, OpenVPN, and the new Let's Encrypt beta.
The 'Castle and Moat' security strategy is failing. Learn how to implement a Zero Trust architecture today using KVM, strict IPTables, and Two-Factor Authentication to secure your Norwegian infrastructure against modern threats.
Following the massive security breaches of 2011, default configurations are no longer acceptable. Learn how to lock down your CentOS and Debian servers using SSH keys, iptables, and Fail2Ban while ensuring compliance with Norwegian data laws.
Tired of slow pushes to US servers and paying per private repository? We deploy a production-ready, self-hosted Git server using Gitolite and SSH. Perfect for Norwegian teams demanding <5ms latency and full Datatilsynet compliance.
Stop relying on 'security by obscurity'. A battle-hardened guide to securing your Linux VPS against script kiddies and botnets using iptables, SSH keys, and common sense. Written for the Norwegian landscape.
It's 2011 and LulzSec is on the loose. Default configurations are a death sentence. Here is the battle-tested guide to locking down CentOS 6 and Debian Squeeze.
With the rise of LulzSec and automated botnets in 2011, default configurations are a death sentence. Here is the battle-tested guide to hardening your Norwegian VPS, from iptables to SSH key management.
Still relying on port 21? In 2011, transmitting data in plaintext is professional negligence. Learn how to configure chrooted SFTP on CentOS 6 and Debian to secure your infrastructure against packet sniffing while satisfying Datatilsynet requirements.
A battle-hardened guide to securing CentOS 6 and Debian servers. Learn how to configure iptables, secure SSH, and avoid common pitfalls before your new VPS hits the public internet.
Security isn't a feature; it's a requirement. Learn the essential steps to lock down your Linux server, from iptables to SSH keys, and why Norwegian data sovereignty matters more than ever.
In an era of rising botnets and script kiddies, a default installation is a ticking time bomb. We cover the essential steps to secure your CentOS and Debian servers, from iptables to SSH keys, ensuring your Norwegian infrastructure stays online.
Script kiddies are scanning your IP right now. Stop relying on default configs. Here is the battle-tested guide to locking down CentOS 6 and Debian servers, securing SSH, and configuring iptables for Norwegian infrastructure.
Sending passwords over port 21 is professional suicide in 2011. Learn how to implement SFTP with chroot jails on CentOS and Debian to satisfy Datatilsynet and protect your Norway VPS.
A default Linux install is a sitting duck for botnets. From crafting strict iptables chains to locking down SSH, here is the battle-tested configuration for securing your Norwegian VPS infrastructure.
Sending passwords in cleartext is professional suicide. We break down why standard FTP violates Norwegian data privacy laws and provide a step-by-step guide to hardening your file transfers using SFTP and OpenSSH on CentOS 6.
Sending passwords over port 21 is a security suicide mission. Here is how to lock down your file transfers using SFTP chroots on CentOS and Debian, ensuring compliance with Norwegian privacy standards.
Plain text FTP is a massive security liability. Learn how to implement chrooted SFTP on CentOS and Debian to satisfy Datatilsynet requirements and secure your infrastructure.
Plain text FTP is a security liability in 2011. Learn how to implement SFTP with chrooted jails on CentOS and Debian to satisfy Datatilsynet requirements and secure your Nordic infrastructure.
Plain text FTP is a liability. Learn how to implement chrooted SFTP on CentOS and Debian to satisfy Datatilsynet requirements and secure your infrastructure against sniffing attacks.
Sending passwords in plaintext is a fireable offense in 2011. Learn how to configure SFTP chroots, satisfy Datatilsynet requirements, and secure your file transfers on CentOS and Debian.
A default Linux installation is a welcome mat for attackers. From iptables to SSH keys, here is the battle-tested guide to securing your Norwegian VPS against script kiddies and targeted intrusions.
In the wild west of the 2011 internet, a default Linux install survives about 10 minutes before compromise. Here is the battle-tested roadmap to locking down your server using iptables, SSH keys, and common sense.
Stop relying on public cloud repos. Learn how to deploy a battle-hardened, self-hosted Git server using Gitolite on Ubuntu 10.04 LTS. Optimised for Norwegian teams requiring strict data sovereignty and low latency.
Sending passwords in cleartext over port 21 is professional suicide in 2011. Learn how to implement chrooted SFTP on your CoolVDS server to satisfy Datatilsynet and secure your infrastructure.
It is 2011. Sending credentials in cleartext is negligence. Learn how to harden your Norway VPS by replacing FTP with chrooted SFTP in OpenSSH.
Stop script kiddies in their tracks. A battle-hardened guide to securing your CentOS and Debian servers using iptables, SSH keys, and common sense.