Openly Managing and Securing Your Digital World

Technologies list

This is a list of the technologies that we are familiar with. This list is not intented to define the limits of our capabilities, but it may give you an indication about what we can do.

  • Operating Systems:
    • GNU/Linux: major distributons (Debian, Ubuntu, RHEL, Suse), and we can even build your own distribution from scratch.
    • BSD systems: FreeBSD, NetBSD.
    • Solaris: OpenSolaris and Solaris.
  • Web Servers:
    • apache: industry standard.
    • nginx: fast and lightwaight.
  • Web Caching:
    • Squid: for forward proxy.
    • Varnish: for reverse proxy
  • Firewalls:
    • iptables: for linux systems.
    • ipfilter: for unix systems.
    • shorewall: linux firewall, based on iptables
  • Mail Servers:
    • postfix: the one that we recoommend to use
    • exim: normally used as a daemon to send emails from localhost.
    • qmail: legacy
  • Network Services:
    • DNS: using bind9
    • DHCP
  • Cloud Computing:
    • Amazon Web Services: EC2, EBS, S3, ... etc
    • Eucalyptus / Ubuntu Cloud: for self-hosted clouds.
  • High Availability:
    • Heartbeat
    • HAProxy
  • VPN and Tunneling:
    • OpenVPN: recommended VPN
    • PPTP: used only for comptability with window$
    • SSH tunnels: for secure data transfer without needing a whole VPN
  • File Sharing:
    • Samba: for file sharing with window$
    • NFS: for file sharing with *nix
  • Database Engines:
    • MySQL (Mysql proxy, sql relay) & replication
    • PostgresSQL (pgpool)
  • Version Control Systems:
    • Subversion
    • Git
  • WebApps Environments:
    • PHP: mod_php or FastCGI using PHP-FPM
    • RoR: thin or mod_rails
  • Automated Security Auditing:
    • OpenVAS
    • w3af
  • File System Cluster:
    • lustre
    • DRBD
  • Monitoring:
    • Xymon (hobbit): server monitoring
    • Nagios: server monitoring
    • monit: process monitoring
  • Directory:
    • OpenLDAP
  • Virtualization:
    • Xen
    • VMWare
  • Backup:
    • bacula
  • Defending DDoS attacks

Creative Commons License