Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Security

Configure APT Proxy on Debian 10 Buster

In this guide guide, we are going to learn how to configure APT Proxy on Debian 10 Buster. If you are be running a Debian

How to Protect SSH Server Authentication with Fail2ban Ubuntu 18.04

Hello there. Welcome to our tutorial on how to protect SSH server authentication with fail2ban on Ubuntu 18.04. Fail2ban is intrusion prevention tool written in

How to Install RKHunter (RootKit Hunter) On Ubuntu 18.04

In this tutorial, you will learn how to install RKHunter (RootKit Hunter) On Ubuntu 18.04. RootKit Hunter is a Unix-based shell script that can scan

Restrict Access to WordPress Login Page to Specific IPs with libModSecurity

In this tutorial, we are going to learn how to restrict access to WordPress login page to specific IPs with libModSecurity. libModSecurity is also known as

Install Wazuh Manager with ELK on Debian

Install Wazuh Manager with ELK on Debian 12

In this tutorial, you will learn how to install Wazuh Manager with ELK on Debian 12. According to the documentation, Wazuh is a free and

Top 10 Colleges with Cyber Security Programs

Choosing a university is important for every student. The rapid changes and innovation in the cybersecurity field serve to make this decision process much more

Install NSClient Nagios Monitoring Agent on Windows System

How to Install NSClient Nagios Monitoring Agent on Windows System

In this tutorial, we are going to learn how to install NSClient Nagios monitoring agent on Windows systems. NSClient++ is a monitoring agent/daemon for Windows

Integrate Request Tracker (RT) with Active Directory for Authentication

Integrate Request Tracker (RT) with Active Directory for Authentication

In this guide, you will learn how to integrate Request Tracker (RT) with Active Directory for authentication. Request Tracker is a powerful, open-source ticketing system

What You Can Do to Get Work as a Security Guard

What You Can Do to Get Work as a Security Guard

Many people who work in the security industry enjoy a range of benefits, and there are lots of people who are keen to enter into

Install LibModsecurity with Apache on Fedora 30/29/CentOS 7

In this guide, we are going to learn how to install LibModsecurity with Apache on Fedora 30/29/CentOS 7. Modsecurity, is an open source web application

Older posts
Page1 Page2 … Page32 Next →

Latest Posts

Global Investors Use DL Mining App to Grow Portfolios with Profitable BTC, ETH and XRP Mining Earn $3k/day

Integrate Request Tracker (RT) with Active Directory for Authentication

How to Enable Self-Service Password Reset in Request Tracker (RT)

Configure Request Tracker to Send Mails using MSMTP via Gmail Relay

How to Enable HTTPS for Request Tracker on Linux

Install Request Tracker on AlmaLinux/Rocky Linux

Containers

Step-by-Step: Provisioning Kubernetes Persistent Volumes with CephFS CSI Driver

Setup Highly Available Kubernetes Cluster with Haproxy and Keepalived

Setup Kubernetes Cluster on Ubuntu 22.04/20.04

Deploy All-In-One OpenStack with Kolla-Ansible on Ubuntu 18.04

Assign Roles to Users and Groups in Kubernetes Cluster

Kubernetes Pod Management: Static Pods vs Mirror Pods vs DaemonSets

Security

8 Handy Ways You Can Use A VPN In Your Everyday Life

How to Install and Setup GRR clients on Ubuntu 18.04/Debian 9

Install Osquery on Ubuntu 20.04

Configure Availability Monitoring on AlienVault USM/OSSIM using Nagios

Setup IPSec Site-to-Site VPN Tunnel on pfSense

Install FortiClient VPN Client on Ubuntu 20.04/Ubuntu 18.04

Monitoring

Install Nagios Plugins and NRPE agents on CentOS 7/RHEL 7/Fedora 29

Install Elastic Stack 7 on Fedora 30/Fedora 29/CentOS 7

Install Nagios NRPE Agents on Ubuntu 22.04/Ubuntu 20.04

Install Graylog 3.0 on CentOS 7

Install and Configure SNMP on Debian 10 Buster

Setup Multi-node Elasticsearch Cluster

© 2025 kifarunix.com

Home Advertise with us Privacy Policy