Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Security

auditbeat 1

Detect Changes to Critical Files in Linux using Auditbeat and ELK

In this tutorial, you will learn how to detect changes to critical files in Linux using Auditbeat and ELK. Auditbeat is one of the elastic

Stages of Anonymity and Security Development on the Internet

Stages of Anonymity and Security Development on the Internet

Most people do not like when their computers and sensitive data are easily available on the Internet. The reasons may differ. Most often, people need

Install and Configure Snort 3 on Ubuntu 22.04

Install and Configure Snort 3 on Rocky Linux

In this tutorial, you will learn how to install and configure Snort 3 on Rocky Linux. Snort is a lightweight network intrusion detection system. It

How to Add and Scan a Target for Vulnerabilities on OpenVAS Scanner

How to Add and Scan a Target for Vulnerabilities on OpenVAS Scanner

In this tutorial, we are going to learn how to add and scan a target host for any vulnerability using OpenVAS Scanner. Want to use

Integrate Linux Malware Detect with ClamAV

Easily Integrate Linux Malware Detect with ClamAV

Follow through this guide to learn how you can integrate Linux Malware Detect with ClamAV. Linux Malware Detect (LMD), can be configured to use ClamAV

role-based access control in kubernetes

Introduction to Role-Based Access Control (RBAC) in Kubernetes

This blog post serves as an introduction to Role-Based Access Control (RBAC) in Kubernetes. It is no doubt that currently, Kubernetes is the de facto

Install OSSEC Agent on Solaris

How to Install OSSEC Agent on Solaris 11.4

In this tutorial, we are going to learn how to install OSSEC agent on Solaris 11.4. Note that this is not an official guide but

squid proxy

Setup Squid Proxy Authentication on Ubuntu 18.04/Fedora 29/28/CentOS 7

Welcome to our guide on how to setup Squid Proxy Authentication on Ubuntu 18.04/Fedora 29/28/CentOS 7 with username and password. You may also want to

How to Enable and Configure Cortex Analyzers

How to Easily Enable and Configure Cortex Analyzers

Follow through this tutorial to learn how to enable and configure Cortex Analyzers. Cortex is an opensource software created by TheHive that can be used

What You Can Do to Get Work as a Security Guard

What You Can Do to Get Work as a Security Guard

Many people who work in the security industry enjoy a range of benefits, and there are lots of people who are keen to enter into

Older posts
Page1 Page2 … Page32 Next →

Latest Posts

Configure OpenShift 4 Image Registry Persistent Storage with ODF: 2026 Step-by-Step Guide

How to Install and Configure OpenShift Data Foundation (ODF) on OpenShift 4.20: Step-by-Step Guide [2026]

How to Deploy an OpenShift Cluster Using Agent-Based Installer (Bootable ISO, KVM & Bare Metal)

Integrate Request Tracker (RT) with Active Directory for Authentication

How to Enable Self-Service Password Reset in Request Tracker (RT)

Configure Request Tracker to Send Mails using MSMTP via Gmail Relay

Containers

Deploy ELK Stack 8 Cluster on Docker Containers

How to Upgrade OpenShift Cluster: Seamless Steps for Success

Understanding OpenShift Security Context Constraints: The Complete Guide

Install Portainer on Ubuntu 22.04

Monitor Docker Swarm and Container metrics using Metricbeat

Configure OpenShift 4 Image Registry Persistent Storage with ODF: 2026 Step-by-Step Guide

Security

Automount LUKS Encrypted Device in Linux

How to Scan a Remote Host using Nessus Vulnerability Scanner

Install and Setup Lynis Security Auditing tool on CentOS 8

How to Monitor OpenVPN Connections using openvpn-monitor tool

Install Wazuh SIEM Server on Ubuntu 24.04

Install and Setup VeraCrypt on Ubuntu 22.04/Ubuntu 20.04

Monitoring

Install Cortex on Ubuntu 22.04/Ubuntu 20.04

Install and Setup OSSEC agent on Ubuntu 18.04/CentOS 7

Install ELK Stack 8.x on Ubuntu 24.04/Ubuntu 22.04

How to Monitor Disk Input/Output on Linux

Easily Configure Elasticsearch HTTPS Connection

Easy way to Configure Filebeat-Logstash SSL/TLS Connection

© 2026 kifarunix.com

Home Advertise with us Privacy Policy