All articles tagged with linux security
The perimeter is dead. With GDPR enforcement looming in 2018, relying on a VPN is no longer sufficient. We dissect how to implement Google-style Zero Trust architecture using standard Linux tools and CoolVDS KVM instances.
The perimeter firewall is dead. With GDPR looming in 2018, relying on a 'trusted internal network' is negligence. Here is how to lock down your infrastructure using standard Linux tools, paranoia, and CoolVDS isolation.
With the GDPR enforcement date looming, the traditional 'castle and moat' security strategy is becoming a liability. We dismantle the perimeter and build a Zero-Trust model using KVM isolation, micro-segmentation, and rigorous identity management.
The 'castle-and-moat' security strategy is failing. In a world of ransomware and looming GDPR regulations, here is how to implement a Zero-Trust model using standard Linux tools available today.
The traditional VPN castle-and-moat security model is obsolete. With GDPR looming, learn how to implement Google-style BeyondCorp principles using Nginx mTLS, iptables, and strict KVM isolation.
The 'castle and moat' security strategy is dead. Learn how to implement a Zero-Trust architecture on Linux using Nginx mTLS, hardened SSH, and strict iptables rules on your VPS.
Docker is not a virtualization strategy; it is a delivery mechanism. We dissect kernel namespaces, capability dropping, and why running containers on KVM-backed infrastructure is the only way to satisfy Norwegian compliance standards.
RAID is not a backup. Snapshots are not a strategy. We define a battle-tested Disaster Recovery plan using MySQL 5.7 GTID replication, Lsyncd, and off-site Norwegian cold storage to keep your RTO under 15 minutes.
The 'Castle and Moat' security model has failed. Learn how to architect a Zero-Trust environment using strict iptables, 2FA, and segmented networks on CoolVDS infrastructure. Stop trusting your LAN.
With the recent death of Safe Harbor and the looming GDPR enforcement, the 'castle and moat' security strategy is obsolete. Here is a pragmatic guide to implementing micro-segmentation and strict access controls on your Norwegian VPS infrastructure.
It is July 2016, and Docker 1.12 has just dropped. But before you deploy Swarm mode, understand why running containers as root is a disaster waiting to happen. A deep dive into capabilities, CoW filesystems, and Norwegian data sovereignty.
RAID is not a backup. Snapshots are not a strategy. A battle-hardened look at designing failover systems for Norwegian infrastructure using MySQL replication, rsync, and KVM isolation.
Docker is revolutionizing deployment, but its default configuration is a security minefield. We dive into kernel capabilities, user namespaces, and why KVM isolation is non-negotiable for Norwegian data compliance in 2016.
It is 2015, and editing config files manually in production is no longer acceptable. Learn how to implement 'Infrastructure as Code' using Git hooks, Ansible, and Docker to ensure your Norwegian VPS environments are reproducible and robust.
The 'Castle and Moat' security strategy is failing. Learn how to implement a Zero Trust architecture today using KVM, strict IPTables, and Two-Factor Authentication to secure your Norwegian infrastructure against modern threats.
Following the massive security breaches of 2011, default configurations are no longer acceptable. Learn how to lock down your CentOS and Debian servers using SSH keys, iptables, and Fail2Ban while ensuring compliance with Norwegian data laws.
Stop relying on US-hosted code repositories. Learn how to deploy a secure, low-latency Git server using Gitolite on a Norwegian VPS, ensuring compliance with local data laws and maximizing push/pull speeds.
Stop relying on 'security by obscurity'. A battle-hardened guide to securing your Linux VPS against script kiddies and botnets using iptables, SSH keys, and common sense. Written for the Norwegian landscape.
With the rise of LulzSec and automated botnets in 2011, default configurations are a death sentence. Here is the battle-tested guide to hardening your Norwegian VPS, from iptables to SSH key management.
Stop trusting shared IPs with your business communications. A battle-hardened guide to configuring Postfix for maximum deliverability, speed, and security on a dedicated VPS environment.
A battle-hardened guide to securing CentOS 6 and Debian servers. Learn how to configure iptables, secure SSH, and avoid common pitfalls before your new VPS hits the public internet.
It is 2011, and the script kiddies are winning. Learn how to lock down your CentOS 6 or Debian Squeeze server using iptables, SSH keys, and proper KVM isolation before you become the next LulzSec statistic.
Security isn't a feature; it's a requirement. Learn the essential steps to lock down your Linux server, from iptables to SSH keys, and why Norwegian data sovereignty matters more than ever.
In an era of rising botnets and script kiddies, a default installation is a ticking time bomb. We cover the essential steps to secure your CentOS and Debian servers, from iptables to SSH keys, ensuring your Norwegian infrastructure stays online.
In an era of rising hacktivism, default Linux installs are not safe. Learn the battle-tested strategies to secure your CentOS and Debian servers, from iptables to kernel hardening, tailored for the Norwegian hosting market.
Script kiddies are scanning your IP right now. Stop relying on default configs. Here is the battle-tested guide to locking down CentOS 6 and Debian servers, securing SSH, and configuring iptables for Norwegian infrastructure.
Disaster recovery isn't a luxury; it's survival. From rsync scripts to MySQL consistency, learn how to secure your data against hardware failure and human error while navigating Norwegian data laws.
A default Linux install is a sitting duck for botnets. From crafting strict iptables chains to locking down SSH, here is the battle-tested configuration for securing your Norwegian VPS infrastructure.
Stop relying on default configurations. Learn how to lock down SSH, configure iptables manually, and protect your Norwegian VPS from the growing wave of automated botnets.
A default Linux installation is a welcome mat for attackers. From iptables to SSH keys, here is the battle-tested guide to securing your Norwegian VPS against script kiddies and targeted intrusions.