Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Security

encrypt ceph osd drive

How to Encrypt Data at Rest on Ceph Cluster OSD

In this tutorial, you will learn how to encrypt data at rest on Ceph Cluster OSD. Current release versions of Ceph now support data encryption

Import Saved Passwords From Firefox to Chrome on Ubuntu 18.04

Welcome to our guide on how to import saved passwords from Firefox to Chrome on Ubuntu 18.04. So you have been using Firefox all along

How to Integrate ELK Stack with TheHive

How to Integrate ELK Stack with TheHive

In this tutorial, we are going to learn how to integrate ELK stack with TheHive. ELK Stack can be configured to sent event alerts to

8 Handy Ways You Can Use A VPN In Your Everyday Life

8 Handy Ways You Can Use A VPN In Your Everyday Life

VPN’s aren’t just a thing for big corporations and tech gurus. You can use a VPN in your everyday online activities. They are very useful

How to Protect SSH Server Authentication with Fail2ban Ubuntu 18.04

Hello there. Welcome to our tutorial on how to protect SSH server authentication with fail2ban on Ubuntu 18.04. Fail2ban is intrusion prevention tool written in

modsecurity

Install ModSecurity 3 with Nginx on Debian 12

Welcome to our guide on how to install ModSecurity 3 with Nginx on Debian 12. Modsecurity is an open source, cross platform web application firewall

What You Can Do to Get Work as a Security Guard

What You Can Do to Get Work as a Security Guard

Many people who work in the security industry enjoy a range of benefits, and there are lots of people who are keen to enter into

squid proxy

Install and Configure Squid Proxy on Rocky Linux 8

In this guide, we are going to learn how to install and configure Squid proxy on Rocky Linux 8. Squid is a full-featured web proxy cache

Install and Setup DVWA on CentOS 8

In this guide, we are going to learn how to install and Setup DVWA on CentOS 8. As you already know, DVWA, an acronym for

The Benefits & Risks of Using Website Encryption

The Benefits & Risks of Using Website Encryption

Website encryption is becoming increasingly popular for businesses of all sizes. While it does help ensure that customer data is secure and protected, there are

Older posts
Page1 Page2 … Page32 Next →

Latest Posts

Integrate Request Tracker (RT) with Active Directory for Authentication

How to Enable Self-Service Password Reset in Request Tracker (RT)

Configure Request Tracker to Send Mails using MSMTP via Gmail Relay

How to Enable HTTPS for Request Tracker on Linux

Install Request Tracker on AlmaLinux/Rocky Linux

Replace OpenShift Self-Signed Ingress and API SSL/TLS Certificates with Lets Encrypt

Containers

How to Deploy an Application in a Docker Swarm Cluster

Provision Block Storage for Kubernetes on Rook Ceph Cluster

Understanding OpenShift Security Context Constraints: The Complete Guide

How to Deploy Apps on OpenShift Using BuildConfig: A Step-by-Step Guide (2025)

Deploy All-in-One OpenStack with Kolla-Ansible on Ubuntu 22.04

How to Integrate MinIO S3 Storage with Kubernetes/OpenShift

Security

Install Arkime Full Packet Capture tool on Ubuntu

Import Assets to AlienVault USM/OSSIM using a CSV file

How to Increase Your Security With the Help of Advanced Tech Solutions

Configure Guacamole SSL/TLS with Nginx Reverse Proxy

List  of top 10 Tips to Protect your Privacy Online

Securely SSH to Remote Host via Multiple Jump Hosts

Monitoring

Detect Changes to Critical Files in Linux using Auditbeat and ELK

Full Automation of Nagios Monitoring Setup with Ansible

Configure Filebeat-Elasticsearch Authentication

Install and Configure Prometheus on CentOS 8

How to Monitor Remote Linux Hosts and Services with Icinga 2 on Ubuntu 18.04

Monitoring Gitlab Metrics with Prometheus and Grafana

© 2025 kifarunix.com

Home Advertise with us Privacy Policy