Kinaro's blog
How To Install Mikrotik CHR in Proxmox Virtual Environment
File Compression and Archival
Learn to create and extract compressed file archives
Linux Users and Permissions
Learn the Linux Shell
Linux Filesystem Structure
How the Linux Filesystem is organized
Users in Linux
How the concept of users works in Linux
Linux Shell
Learn the Linux Shell
Make Money as a Beginner Developer
Here are a few ways to start making money with just your HTML and CSS skills
Install a different Python version in Ubuntu
Most GNU/Linux operating systems come with Python 2 and 3 preinstalled. These versions are usually several releases behind the current version. In this guide, we are going to install a recent Python version without interfering with the default configuration
Synchronizing Joplin notes with NextCloud
Store your notes and To-do lists privately
Creating encrypted containers in Linux
Create encrypted containers for sensitive data
Multi-factor Authentication
Multi-factor authentication allows a user to log in to a service by presenting additional proof of identity other than the username and password
Hosting emails for other domains on your Mail-in-a-Box
Host emails for other domains using a Mail-in-a-Box server
Set Up a private email server
Set up a private email server on a VPS
Fileless malware
Fileless malware
Private DNS in Android 9 Pie
Set up private DNS in Android 9
Distributed Denial of Service
DDoS
Botnets
Zombie computing devices used my hackers to commit illicit activities online
Password Brute Force Attack
In a password brute force attack, a hacker attempts all possible usernames and passwords to gain illegal access into a system
Let's go phishing
Phishing techniques and mitigation
Homoglyph attack
Homoglyph attacks
Cryptojacking
Cryptojacking
Virtualization
Running multiple operating systems concurrently
Secure data erasure
Get rid of data securely
Evil Twin Attack
Evil twin Wi-Fi attacks
ARP Spoofing
Hijacking the address resolution protocol
Verify file integrity
Verify the file integrity to detect tampering
Audit your web server using Lynis
Auditing servers using lynis
Firewalls
A firewall is a hardware or software device that filters and blocks incoming or outgoing traffic based on a predefined set of rules.
Disk Encryption
Keep your data safe against unauthorized physical access.