All articles tagged with Server Security
Is Node.js becoming a security liability? We dissect Deno, the secure-by-default runtime from Ryan Dahl, and demonstrate how to deploy a TypeScript-native API on high-performance Linux VPS in Norway.
The May 25th deadline has passed, but the real work has just begun. We strip away the legal jargon and dive into the technical reality of automating server hardening with Ansible to satisfy the Norwegian Datatilsynet without slowing down your release cycles.
The 'castle-and-moat' security model is dead. Learn how to implement Google-style BeyondCorp principles using Nginx mTLS, rigorous segmentation, and Norwegian data sovereignty on CoolVDS.
Firewalls aren't enough anymore. Following the Heartbleed wake-up call, we explore how to implement a 'Zero-Trust' architecture on Linux servers using KVM, IPTables, and 2FA. Data sovereignty in Norway has never been more critical.
Manual security audits are a liability. Learn how to automate server hardening using Puppet and OSSEC on CentOS 6 to satisfy Datatilsynet requirements while maintaining peak performance on your Norwegian VPS.
Container virtualization offers speed, but default configurations leave you wide open. We dive into capability dropping, cgroups resource control, and why KVM isolation is the ultimate security layer for Norwegian mission-critical data.
It is 2013, and Linux Containers (LXC) are exploding in popularity. But shared kernels mean shared risks. We explore capability dropping, cgroups, and why KVM remains the isolation king for Norwegian enterprise data.
A pragmatic guide for CTOs on navigating EU Directive 95/46/EC and the Norwegian Personal Data Act using Puppet, IPTables, and KVM isolation in 2013.
Stop relying on US-hosted repos. Learn to deploy a secure, high-performance Gitolite server on Ubuntu 12.04 using strict SSH controls and SSD storage. Perfect for Norwegian teams needing compliance and raw speed.
Tired of your transactional emails disappearing into the void? We strip away the mystery of mail servers. Here is the definitive guide to configuring a bulletproof Postfix setup on Debian Squeeze, ensuring high deliverability and low latency for Norwegian infrastructure.
It's 2011 and LulzSec is on the loose. Default configurations are a death sentence. Here is the battle-tested guide to locking down CentOS 6 and Debian Squeeze.
Still relying on port 21? In 2011, transmitting data in plaintext is professional negligence. Learn how to configure chrooted SFTP on CentOS 6 and Debian to secure your infrastructure against packet sniffing while satisfying Datatilsynet requirements.
Sending passwords over port 21 is professional suicide in 2011. Learn how to implement SFTP with chroot jails on CentOS and Debian to satisfy Datatilsynet and protect your Norway VPS.
Plain text FTP is a massive security liability. Learn how to implement chrooted SFTP on CentOS and Debian to satisfy Datatilsynet requirements and secure your infrastructure.
Plain text FTP is a security liability in 2011. Learn how to implement SFTP with chrooted jails on CentOS and Debian to satisfy Datatilsynet requirements and secure your Nordic infrastructure.
A battle-hardened guide to securing your CentOS and Debian servers against automated botnets. Covers SSH locking, iptables configuration, and Fail2Ban, specifically tailored for the Norwegian hosting landscape in 2011.
Sending passwords over port 21 is negligence. With tools like Firesheep making packet sniffing child's play, it is time to lock down your transfer protocols. Here is how to deploy chrooted SFTP on your CoolVDS instance today.
Plain FTP sends passwords in cleartext. In 2011, that is negligence. Learn how to configure chrooted SFTP on Linux, satisfy Datatilsynet, and secure your transfers.
Don't gamble with public Wi-Fi security. This guide details the exact steps to build a hardened OpenVPN gateway on a KVM-based VPS, ensuring low latency via NIX and bypassing common OpenVZ limitations.
Stop script kiddies at the border. A battle-hardened guide to locking down CentOS and Debian servers using IPTables, SSH keys, and Fail2Ban. Essential reading for NIX-connected infrastructure.
Script kiddies don't sleep, and neither should your firewall. A battle-hardened guide to securing CentOS and Debian servers against modern threats, from iptables strategies to hardware isolation.
A fresh Linux server survives about 15 minutes on the open web before the scanners hit. Here is the battle-tested guide to locking down CentOS and Debian, configuring IPTables, and why hardware virtualization matters for security.
Script kiddies are scanning your IP right now. Stop relying on default configs. Here is the battle-tested strategy using iptables, SSH keys, and Fail2Ban to secure your Nordic VPS infrastructure.
It is not a matter of if, but when a botnet scans your IP. From configuring iptables to securing SSH, here is how we lock down CentOS and Debian servers to comply with Datatilsynet standards.
Sending passwords in cleartext is professional negligence. Learn how to implement secure, chrooted SFTP on your servers using OpenSSH 5, ensuring compliance with Norwegian data laws without sacrificing speed.
As e-commerce grows in Norway, securing customer data is paramount. Discover the crucial SSL/TLS management strategies for 2009, from the shift to 2048-bit keys to the necessity of Dedicated IPs on VDS platforms.
Secure your VDS and Dedicated Servers against rising cyber threats. Learn essential firewall configurations for Linux and Windows Server 2008 tailored for the Norwegian IT landscape.
A comprehensive 2009 guide for Norwegian IT professionals on setting up secure, reliable email infrastructure using VDS and Dedicated Servers. Learn best practices for Postfix, Exchange, and spam prevention.
Discover essential Linux server administration strategies for 2009. From securing your VDS to optimizing Apache for high traffic, we guide Norwegian IT professionals through cost-effective hosting solutions amidst the current economic landscape.
A comprehensive guide for Norwegian IT professionals on managing SSL/TLS certificates amidst the new MD5 vulnerabilities. Learn how to secure your VDS, Dedicated Server, and Web Hosting environments while boosting customer trust with the latest EV certificates.