Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Common methods for online identity theft

How to Protect From Identity Theft Online: A Detailed Guide for 2022

How to Protect From Identity Theft Online: A Detailed Guide for 2022

With internet users increasing globally, identity theft numbers are spiking. According to the Federal Trade Commission (FTC), there was a 70% increase in fraud reports

Latest Posts

Install Ubuntu 24.04 with UEFI and Software RAID 1

How to Install Apache Guacamole on Ubuntu 24.04

Kubernetes Ingress Explained: How to Manage External Access to Your Services

Cisco Catalyst 8000v Edge Stuck on Bootloader upgrade not Necessary

Kubernetes Kustomize 101: Introduction and Basics

How to Install Android Studio on Ubuntu 24.04

Containers

Provision Block Storage for Kubernetes on Rook Ceph Cluster

Mastering Kubernetes Autoscaling: Horizontal vs Vertical Scaling

Gracefully Remove Worker Node from Kubernetes Cluster

Monitor Docker Containers Metrics using Grafana

Kubernetes User Management: Creating Users, Groups and Service Accounts

Step-by-Step Guide to Using ConfigMaps in Kubernetes

Security

What Should Companies Do To Increase IT Safety

How to Easily Enable and Configure Cortex Analyzers

Install VeraCrypt on Debian 11

4 Reasons Why Home and Remote Workers Should Use a VPN

Setup IPSec VPN server with Libreswan on Rocky Linux

Install ModSecurity with Apache on Debian 12

Monitoring

Install LibreNMS on Ubuntu 22.04/Ubuntu 20.04

Install Nagios Plugins From Source RHEL/CentOS/Oracle Linux

Enable Rsyslog Logging on Debian 12

Install and Enroll Elastic Agents to Fleet Manager in Linux

How to Integrate TheHive with MISP

Deploy Nagios NRPE Agents using Ansible

© 2024 kifarunix.com

Home Advertise with us Privacy Policy
x