Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Common methods for online identity theft

How to Protect From Identity Theft Online: A Detailed Guide for 2022

How to Protect From Identity Theft Online: A Detailed Guide for 2022

With internet users increasing globally, identity theft numbers are spiking. According to the Federal Trade Commission (FTC), there was a 70% increase in fraud reports

Latest Posts

How to Enable HTTPS for Request Tracker on Linux

Install Request Tracker on AlmaLinux/Rocky Linux

Replace OpenShift Self-Signed Ingress and API SSL/TLS Certificates with Lets Encrypt

Step-by-Step Guide: How to Configure HTPasswd Identity Provider in OpenShift 4.x

How to Scan RHEL Systems for CIS Benchmark Compliance with Wazuh SCA

How to Install Wazuh Agent on RHEL 8/9/10

Containers

Working Guide: Deploy AWX on Kubernetes Cluster with AWX Operator

Install Portainer on Ubuntu 22.04

Patch Sudo CVEs 2025-32462 & 2025-32463 using Ansible AWX

Setup Highly Available Kubernetes Cluster with Haproxy and Keepalived

Why Docker Hardened Images Are a Game-Changer for Software Supply Chain Security

Control OpenShift Pod Permissions with SCCs and Service Accounts

Security

How to Perform System Security Auditing with Lynis on Ubuntu 18.04

Setup OpenVPN Server on CentOS 8

Install and Use Nikto Web Scanner on Ubuntu 18.04

Install Wazuh SIEM Server on Ubuntu 24.04

Install WPScan on Ubuntu 20.04

How to Install OSSEC Agent on Mac OS

Monitoring

How to Install and Configure AlienVault HIDs Agent on a Linux Host

How to Monitor Docker Containers using Nagios

Install and Configure Prometheus on CentOS 8

Monitor Docker Swarm Service Metrics using Grafana

Add Hosts to Nagios Server For Monitoring

How to run Multiple Filebeat Instances in Linux

© 2025 kifarunix.com

Home Advertise with us Privacy Policy