mirror of
https://github.com/kevinveenbirkenbach/computer-playbook.git
synced 2025-08-29 15:06:26 +02:00
Restructured mds
This commit is contained in:
17
docs/guides/user/Enterprise_Solutions.md
Normal file
17
docs/guides/user/Enterprise_Solutions.md
Normal file
@@ -0,0 +1,17 @@
|
||||
# Enterprise Solutions
|
||||
|
||||
**CyMaIS** provides powerful **enterprise-grade IT infrastructure solutions**, enabling businesses to scale securely and efficiently.
|
||||
|
||||
## How CyMaIS Helps Enterprises 🔧
|
||||
- **Automated Deployment** - Set up secure servers & workstations effortlessly
|
||||
- **Advanced Security** - Integrated 2FA, LDAP, encrypted storage
|
||||
- **High Availability** - Scalable infrastructure for growing enterprises
|
||||
- **Compliance & Audit Logs** - Maintain regulatory standards
|
||||
|
||||
## Use Cases 💼
|
||||
- ✅ **Cloud-Based Infrastructure** (Docker, Kubernetes, CI/CD pipelines)
|
||||
- ✅ **Enterprise Networking & VPN** (WireGuard, OpenVPN, Firewall rules)
|
||||
- ✅ **Database & Business Apps** (PostgreSQL, Nextcloud, ERP systems)
|
||||
- ✅ **Custom Security Solutions** (Keycloak, LDAP, 2FA enforcement)
|
||||
|
||||
Interested? Contact [Kevin Veen-Birkenbach](mailto:kevin@veen.world) to discuss tailored enterprise solutions.
|
66
docs/guides/user/Readme.md
Normal file
66
docs/guides/user/Readme.md
Normal file
@@ -0,0 +1,66 @@
|
||||
# User Guide
|
||||
|
||||
Welcome to **CyMaIS**! This guide is designed for **end-users** who want to use cloud services, email, and collaboration tools securely and efficiently. Whether you're an **enterprise user** or an **individual**, CyMaIS provides a wide range of services tailored to your needs.
|
||||
|
||||
## What Can CyMaIS Do for You? 💡
|
||||
CyMaIS enables you to securely and efficiently use a variety of **cloud-based applications**, including:
|
||||
|
||||
### 📂 Cloud Storage & File Sharing
|
||||
- **Nextcloud** – Securely store, sync, and share files across devices.
|
||||
- **OnlyOffice** – Work on documents, spreadsheets, and presentations directly within Nextcloud.
|
||||
- **LibreOffice** – A powerful office suite alternative to Microsoft Office.
|
||||
|
||||
### 💬 Secure Communication & Collaboration
|
||||
- **Matrix (Element)** – Encrypted messaging for teams and individuals.
|
||||
- **XMPP** – Secure instant messaging with various supported clients.
|
||||
- **Mailu** – A private, self-hosted email solution.
|
||||
- **Etherpad** – Real-time collaborative document editing.
|
||||
- **BigBlueButton** – Web conferencing with screen sharing and presentations.
|
||||
- **Jitsi** – Secure video conferencing without account requirements.
|
||||
|
||||
### 🎵 Social Media & Content Sharing
|
||||
- **Mastodon** – Decentralized microblogging platform (alternative to Twitter/X).
|
||||
- **Pixelfed** – Decentralized image sharing (alternative to Instagram).
|
||||
- **Friendica** – Social network supporting federation with Mastodon and others.
|
||||
- **Peertube** – Decentralized video streaming platform (alternative to YouTube).
|
||||
- **Funkwhale** – Self-hosted music streaming for individuals and communities.
|
||||
|
||||
### 🎮 Entertainment & Media
|
||||
- **Jellyfin** – Open-source media server for movies, TV, and music.
|
||||
- **Kodi** – Media center application with extensive plugin support.
|
||||
- **qBittorrent** – Open-source torrent client with secure remote access.
|
||||
|
||||
### 🔒 Privacy & Security
|
||||
- **WireGuard** – Secure and fast VPN solution.
|
||||
- **Tor Browser** – Browse the web anonymously and bypass censorship.
|
||||
- **Bitwarden** – Open-source password manager for secure credential storage.
|
||||
- **2FA Authentication** – Securely log in to your services with Two-Factor Authentication.
|
||||
|
||||
### 🔧 Developer & Productivity Tools
|
||||
- **Gitea** – Self-hosted Git repository management (alternative to GitHub/GitLab).
|
||||
- **Jenkins** – Automate software development pipelines.
|
||||
- **Discourse** – Community discussion forums for support and engagement.
|
||||
- **MediaWiki** – Create and manage knowledge bases and wikis.
|
||||
|
||||
## 🏢 Enterprise Users
|
||||
### How to Get Started 🏁
|
||||
If your organization provides CyMaIS services, follow these steps:
|
||||
- Your **administrator** will provide login credentials.
|
||||
- Access **cloud services** via a web browser or mobile apps.
|
||||
- For support, contact your **system administrator**.
|
||||
|
||||
## 🏠 Private Users
|
||||
### How to Get Started 🏁
|
||||
If you're an **individual user**, you can sign up for CyMaIS services:
|
||||
- **Register an account** at [cymais.cloud](https://cymais.cloud).
|
||||
- Choose the applications and services you need.
|
||||
- Follow the setup guide and start using CyMaIS services immediately.
|
||||
|
||||
## 📚 Learn More
|
||||
Discover more about CyMaIS applications:
|
||||
- :doc:`roles/application_glosar`
|
||||
- :doc:`roles/application_categories`
|
||||
|
||||
For further information, visit our **[Information Hub](https://hub.cymais.cloud)** for tutorials, FAQs, and community support.
|
||||
|
||||
You can also register for updates and support from our community.
|
23
docs/guides/user/Security_Guidelines.md
Normal file
23
docs/guides/user/Security_Guidelines.md
Normal file
@@ -0,0 +1,23 @@
|
||||
# Security Guidelines
|
||||
|
||||
CyMaIS is designed with security in mind. However, while following our guidelines can greatly improve your system’s security, no IT system can be 100% secure. Please report any vulnerabilities as soon as possible.
|
||||
|
||||
For optimal personal security, we **strongly recommend** the following:
|
||||
|
||||
- **Use a Password Manager**
|
||||
Use a reliable password manager such as [KeePass](https://keepass.info/) 🔐. (Learn more about [password managers](https://en.wikipedia.org/wiki/Password_manager) on Wikipedia.) KeePass is available for both smartphones and PCs, and it can automatically generate strong, random passwords.
|
||||
|
||||
- **Enable Two-Factor Authentication (2FA)**
|
||||
Always enable 2FA whenever possible. Many password managers (like KeePass) can generate [TOTP](https://en.wikipedia.org/wiki/Time-based_One-Time_Password) tokens, adding an extra layer of security even if your password is compromised.
|
||||
Synchronize your password database across devices using the [Nextcloud Client](https://nextcloud.com/) 📱💻.
|
||||
|
||||
- **Use Encrypted Systems**
|
||||
We recommend running CyMaIS only on systems with full disk encryption. For example, Linux distributions such as [Manjaro](https://manjaro.org/) (based on ArchLinux) with desktop environments like [GNOME](https://en.wikipedia.org/wiki/GNOME) provide excellent security. (Learn more about [disk encryption](https://en.wikipedia.org/wiki/Disk_encryption) on Wikipedia.)
|
||||
|
||||
- **Beware of Phishing and Social Engineering**
|
||||
Always verify email senders, avoid clicking on unknown links, and never share your passwords or 2FA codes with anyone. (Learn more about [Phishing](https://en.wikipedia.org/wiki/Phishing) and [Social Engineering](https://en.wikipedia.org/wiki/Social_engineering_(security)) on Wikipedia.)
|
||||
|
||||
Following these guidelines will significantly enhance your personal security—but remember, no system is completely immune to risk.
|
||||
|
||||
A tutorial how to setup secure password management you will find [here](https://blog.veen.world/blog/2025/04/04/%f0%9f%9b%a1%ef%b8%8f-keepassxc-cymais-cloud-the-ultimate-guide-to-cross-device-password-security/)
|
||||
---
|
Reference in New Issue
Block a user