Sysdig: A Linux Diagnostics Tool

Original post date: May 13, 2014

We’ve mentioned sysdig several times before, but we haven’t published anything in our English-language blog about the program itself. Today, we’ll be pulling an article out of our archives and looking at our original review of sysdig. Read more

Advanced DDoS Mitigation

A DDoS attack can cause a company to lose legitimate traffic, or in other words, users. That’s why these attacks are often used as leverage to create unfair competition, and victims often include online shops, games, and e-payment systems.

Selectel’s Anti DDoS service was launched in 2015 and successfully mitigates the most common attacks, including at the L2 level. Read more

Maximizing Game Monetization with a CDN

Gaming is a global business, and new opportunities are being presented practically every day…for those with the knowhow. The golden rule when it comes to increasing revenue is to constantly increase your player base (number of players). The global market has presented an unprecedented potential for profit growth. The Internet provides over two billion people with access to various kinds of entertainment, and more than half of these people are potential gamers. Read more

Happy System Administrator Appreciation Day

Linux is a pleasure to use, and system administrators agree, especially on the last Friday in July, a.k.a. System Administrator Appreciation Day (a.k.a. SysAdmin Day, a.k.a. Sysmas).

In honor of Sysadmin Day, we’ve put together a list of our favorite features and Easter eggs in Linux. Enjoy! Read more

New Firewalls: Fortinet FG-100D


We recently started offering our clients a new firewall. In addition to the Cisco ASA 5512 and Cisco ASA 5508-X, we now offer the Fortinet FortiGate FG-100D.

The initial reaction from most of our clients went something along the lines of, “Why would you suggest this noname product over Cisco?” Truth be told, we had mixed feelings about it here at Selectel, too; however, our experience with these firewalls has shown us that this solution at least deserves a try. Read more

Containers and Security: Seccomp


When working with potentially dangerous, unverified, or simply raw software, developers often use sandboxes. These are special environments that isolate or restrict programs and code from accessing data outside the environment. Sandboxes limit the software’s network access, OS interactions, and information from IO devices.

Lately, people have been turning more and more towards containers for launching unverified and non-secure software. Read more