All articles tagged with "Server Security"
Firewalls aren't enough anymore. Following the Heartbleed wake-up call, we explore how to implement a 'Zero-Trust' architecture on Linux servers using KVM, IPTables, and 2FA. Data sovereignty in Norway has never been more critical.
Manual security audits are a liability. Learn how to automate server hardening using Puppet and OSSEC on CentOS 6 to satisfy Datatilsynet requirements while maintaining peak performance on your Norwegian VPS.
Container virtualization offers speed, but default configurations leave you wide open. We dive into capability dropping, cgroups resource control, and why KVM isolation is the ultimate security layer for Norwegian mission-critical data.
It is 2013, and Linux Containers (LXC) are exploding in popularity. But shared kernels mean shared risks. We explore capability dropping, cgroups, and why KVM remains the isolation king for Norwegian enterprise data.
A pragmatic guide for CTOs on navigating EU Directive 95/46/EC and the Norwegian Personal Data Act using Puppet, IPTables, and KVM isolation in 2013.
Stop relying on US-hosted repos. Learn to deploy a secure, high-performance Gitolite server on Ubuntu 12.04 using strict SSH controls and SSD storage. Perfect for Norwegian teams needing compliance and raw speed.
Tired of your transactional emails disappearing into the void? We strip away the mystery of mail servers. Here is the definitive guide to configuring a bulletproof Postfix setup on Debian Squeeze, ensuring high deliverability and low latency for Norwegian infrastructure.
A battle-hardened guide to securing your CentOS and Debian servers against automated botnets. Covers SSH locking, iptables configuration, and Fail2Ban, specifically tailored for the Norwegian hosting landscape in 2011.
Don't gamble with public Wi-Fi security. This guide details the exact steps to build a hardened OpenVPN gateway on a KVM-based VPS, ensuring low latency via NIX and bypassing common OpenVZ limitations.
Stop script kiddies at the border. A battle-hardened guide to locking down CentOS and Debian servers using IPTables, SSH keys, and Fail2Ban. Essential reading for NIX-connected infrastructure.