Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Common methods for online identity theft

How to Protect From Identity Theft Online: A Detailed Guide for 2022

How to Protect From Identity Theft Online: A Detailed Guide for 2022

With internet users increasing globally, identity theft numbers are spiking. According to the Federal Trade Commission (FTC), there was a 70% increase in fraud reports

Latest Posts

Patch Sudo CVEs 2025-32462 & 2025-32463 using Ansible AWX

How to Install NoMachine on AlmaLinux 10

Install NoMachine on Rocky Linux 10

Install and Configure xrdp Server on AlmaLinux 10

Automate OpenShift Deployments with GitLab CI/CD Pipelines

How to Automate OpenShift Builds with Git Webhooks: Step-by-Step Guide

Containers

How to Setup Three Node Docker Swarm Cluster on Ubuntu 22.04

Monitor Docker Containers Metrics using Grafana

How to Install Docker Resource Usage Extension

OpenShift Builds and BuildConfig Essentials: A Comprehensive Guide

Extend OpenShift CoreOS /sysroot Root Filesystem

Step-by-Step Guide on Deploying an Application on Kubernetes Cluster

Security

Install and Setup Suricata on Ubuntu 22.04/Ubuntu 20.04

Install and Setup GVM 11 on Ubuntu 20.04

Create Locally Trusted SSL Certificates with mkcert on Ubuntu 18.04

Configure Ubuntu 20.04 as Linux Router

What You Can Do to Get Work as a Security Guard

Install and Setup Squid Proxy on Ubuntu 20.04

Monitoring

Install Monitorix on Debian 10

Install and Configure Logstash 7 on Ubuntu 18/Debian 9.8

Install ELK Stack on Debian 11

Install and Setup NetData on Ubuntu 20.04/18.04

Install ELK Stack on Rocky Linux 8

Integrate Wazuh Manager with ELK Stack

© 2025 kifarunix.com

Home Advertise with us Privacy Policy