Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Common methods for online identity theft

How to Protect From Identity Theft Online: A Detailed Guide for 2022

How to Protect From Identity Theft Online: A Detailed Guide for 2022

With internet users increasing globally, identity theft numbers are spiking. According to the Federal Trade Commission (FTC), there was a 70% increase in fraud reports

Latest Posts

DL Mining Happy New Year Contract: Secure & Profitable Cloud Mining for Crypto BTC/ETH/XRP Investors Earn $3K/day

Integrate Request Tracker (RT) with Active Directory for Authentication

How to Enable Self-Service Password Reset in Request Tracker (RT)

Configure Request Tracker to Send Mails using MSMTP via Gmail Relay

How to Enable HTTPS for Request Tracker on Linux

Install Request Tracker on AlmaLinux/Rocky Linux

Containers

Deploy Multinode OpenStack using Kolla-Ansible

Setup Kubernetes Cluster on Ubuntu 22.04/20.04

Mastering Kubernetes Autoscaling: Horizontal vs Vertical Scaling

Patch Sudo CVEs 2025-32462 & 2025-32463 using Ansible AWX

Gracefully Remove Worker Node from Kubernetes Cluster

Assign Roles to Users and Groups in Kubernetes Cluster

Security

Install OSSEC HIDS Agent on Ubuntu 20.04

Install Modsecurity with Nginx on Rocky Linux 8

Install and Setup Lynis Security Auditing tool on Ubuntu 20.04

ExpressVPN – Easy to Use VPN

Install WPScan on Ubuntu 20.04

Configure Apache with SSL/TLS Certificates on CentOS 8

Monitoring

How to Install Icinga 2 and Icinga Web 2 on Ubuntu 18.04 LTS

How to Install and Configure AlienVault HIDs Agent on a Linux Host

Setup Multi-node Elasticsearch Cluster

Setup Kibana Elasticsearch and Fluentd on CentOS 8

How to Enable Basic Authentication on ELK Stack

How to Configure SNMP Version 2c on Debian 9

© 2026 kifarunix.com

Home Advertise with us Privacy Policy