Your cart is currently empty!
Category: Phoenix Ignited Tech Blog
Using Wazuh for File Integrity Monitoring
Using Wazuh for File Integrity Monitoring Using Wazuh for File Integrity Monitoring August 16, 2024 In this tutorial I go through Wazuh’s File Integrity Monitoring (FIM) capabilities. I will explore the FIM dashboards, experiment with modifying some files, and some minor configuration changes. The aim is that by the end of the tutorial you have…
Installing Wazuh on Ubuntu
Installing Wazuh on Ubuntu Installing Wazuh on Ubuntu August 15, 2024 In this tutorial I go through installing Wazuh, an opensource SIEM on Ubuntu. It covers installing both the Wazuh Manager and the Wazuh Agent. The official Wazuh quickstart docs can be found here: https://documentation.wazuh.com/current/quickstart.html so if you are running an OS other than Ubuntu…
Using Keycloak as an IAM Provider for WordPress
Using Keycloak as an IAM for WordPress Using Keycloak as an IAM for WordPress August 9, 2024 This tutorial walks you through setting up Keycloak as an IAM for one or more WordPress sites. Before You Implement This in Production I have only done this in a development environment and this setup is likely lacking…
Vanilla Bare Metal Keycloak Install for Linux in Dev Mode
Vanilla Bare Metal Keycloak Install -Linux Vanilla Bare Metal Keycloak Install -Linux August 9, 2024 This is the the bare metal plain vanilla keycloak install on Linux. I used an Ubuntu like machine, however it should work on any distro. This tutorial follows the directions in the official docs which can be found here: https://www.keycloak.org/getting-started/getting-started-zip.…
-
ICMP Flood DoS Attack Explained
ICMP Flood DoS Attack Explained ICMP Flood DoS Attack Explained August 6, 2024 What is an ICMP Flood DoS Attack? ICMP stands for Internet Control Message Protocol and serves as a means to troubleshoot network issues, network diagnostics, and so forth. When one computer sends an ICMP echo-request to another computer, the receiving computer responds…
SYN Flood DoS Attack Explained
SYN Flood DoS Attack Explained SYN Flood DoS Attack Explained August 6, 2024 What is a SYN Flood DoS Attack? When two devices first create a TCP connection via the TCP three way handshake, the client machine sends what is called a SYN request to the server. The server then responds with a SYN/ACK and…
Installing VirtualBox on Debian Based Systems
Installing VirtualBox on Debian Based Systems Installing VirtualBox on Debian Based Systems August 3, 2024 Virtualbox runs as a hypervisor on top of your host operating system, enabling you to create virtual machines on top of your host machine. In this tutorial I go through installing virtualbox on Debian based systems. This tutorial assumes you…
Installing Vendure Locally on Bare Metal in Dev Mode
Installing Vendure Locally on Bare Metal in Dev Mode Installing Vendure Locally on Bare Metal in Dev Mode July 20, 2024 Vendure is a headless open source ecommerce and marketplace solution for running online marketplaces such as etsy, amazon, etc. or for simply running a simple online store like you would with woocommerce. As it…
Binary Search Algorithm
Binary Search Algorithm Binary Search Algorithm July 18, 2024 The Binary Search Algorithm takes a set of pre-organized data, such as an array of numbers like {1, 2, 3, 4, 5, 6, 11, 13, 199, 201,} and divides the set by two, then takes the middle number and compares it to the target number, if…
Linear Search Algorithm
Linear Search Algorithm Linear Search Algorithm July 18, 2024 The Linear Search Algorithm is the most fundamental / “base” search algorithm. It is incredibly simple and straightforward and in fact you use it every day, most often without even realizing it. The Linear Search Algorithm takes a “target” value of a set of data, and…