About Me
I transform complex IT challenges into tangible, high-security results. Since 2003, my work in self-employed Linux projects has been driven by a commitment to precision, structured analysis, and the implementation of robust server environments.
How I Work
Think First, Act Second: I prioritize a step-by-step analytical approach. By thoroughly deconstructing a problem before execution, I ensure efficiency and long-term stability.
Focus on the Essential: I value concise, actionable information. My goal is to deliver clarity without unnecessary overhead—straight to the point and ready for implementation.
Structure & Design: Using "Structured Analysis" (SA) and "Structured Design" (SD), I bridge the gap between complex technical requirements and clean, manageable project outcomes.
Core Expertise
High-Security Environments: Planning and setup based on PCI/DSS, BSI, and ISO27001 specifications, including audit preparation and guidance.
Linux Infrastructure: Comprehensive setup of mail servers (Postfix/Sendmail), web environments (Apache/PHP), and secure file services (SMB/NFS).
Hardening & Privacy: Implementing "Linux Hardening" to reduce attack surfaces and utilizing tools like "Security in a Box" to protect digital footprints.
My Commitment:
I don’t settle for the obvious. I strive to understand deep-seated technical correlations to provide solutions that offer real added value—efficient, well-founded, and strictly practice-oriented.
Planning and Setup of server environments for small / medium enterprises:
Firewall (IPChains, IPTabels)
Mail-server (sendmail, postfix, Spamassassin, ClamAV)
Web-server (Apache)
CMS-System (Apache, PHP4, J2EE)
Fileserver (SMB, Appletalk, NFS)
Remote Administration (Webmin/Usermin)
Security analysis and audit (PCI/DSS, BSI, ISO27001)
Using the method “Structured Analysis” (SA) and “Structured Design” (SD) for Analysis and Design in the solution- and project-management. ITIL based project management.
Common methods in project management for planning
Controlling and supervising complex projects in EDP-surroundings
Design, setup and implement Change- Release and Patch management based on ITIL specifications. Analyze and design of PCI/DSS compliant environments including pre-audit sessions and audit assistance.
Planning and implementation of presentations and trade shows
Acquiring and supervising of system partners for the integration and the deployment of standard products in complex projects
Planning the deployment of complex investments and consulting in EDP-surroundings
Planning and setup of High-Security environments based on PCI/DSS and ISO27001 specifications (audit preparation and guidance)
Security in a box (Tactical Tech and Frontline Defenders): printed and online. 13 languages. Aimed at beginning users. Includes how-to booklet, Hands-on guides, and glossary. Sections can be remixed: security in context: tools and tactics for the LGBT community in the Arabic region.
Me and My Shadow uses the shadow metaphor to help beginning users understand their “digital shadow” or “digital footprint” and minimize it. Includes “trace my shadow” interactive tool which lets you investigate the traces you have left through the use of your applications and devices. Gives tips for “taking control of your information” and “turning the tables.”
Linux Hardening At its core, hardening is reducing the ways in which your system can be attacked. Under some threat models, the attack surface presented by a specific program may be too large to be acceptable.
Cryptoparty Handbook Crowdsources. Low tech. Requires background in technology. Used in tandem with cryptoparties, where people show each other how to use Tor, OTR, PGP.