Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Security

Lock Linux User Account after Multiple Failed Login Attempts

Lock Linux User Account after Multiple Failed Login Attempts

Follow through this guide to learn how to lock Linux user account after multiple failed login attempts. Linux through Pluggable Authentication Modules, PAM, can be

install suricata

Install and Setup Suricata on Ubuntu 18.04

Today, we are going to learn how to install and setup Suricata on Ubuntu 18.04. Suricata is an opensource network threat detection tool. Suricata uses

Process and Visualize ModSecurity Logs on ELK Stack

Visualize ClamAV Scan Logs on ELK Stack Kibana

In this tutorial, you will learn how to visualize ClamAV scan logs on ELK stack Kibana. ClamAV is an opensource antivirus engine for detecting trojans,

Install and Configure AlienVault OSSIM on VirtualBox

Install and Configure AlienVault OSSIM on VirtualBox

In this tutorial, we are going to learn how to install and configure AlienVault OSSIM on VirtualBox. If you are a Blue Team security analyst,

Enforce Password Complexity Policy On CentOS 7/RHEL Derivatives

In this guide, we are going to learn how to enforce password complexity policy on CentOS 7/RHEL based derivatives. Our previous guide covered the enforcement

Fix AlienVault HIDS Events Displaying 0.0.0.0 as IP Address

In this guide, we are going to show you how to fix AlienVault HIDS events displaying 0.0.0.0 as IP address. Are you running AlienVault OSSIM

Install and Configure Libreswan VPN Client on Ubuntu/Debian

Install and Configure Libreswan VPN Client on Ubuntu/Debian

In this tutorial, you will learn how to install and configure Libreswan VPN client on Ubuntu/Debian Systems. We are using Ubuntu 20.04 and Debian 11

Monitor Changes to Critical Files on Windows Systems using Wazuh and ELK

Monitor Changes to Critical Files on Windows Systems using Wazuh and ELK

In this tutorial, you will learn how to monitor changes to critical files on Windows systems using Wazuh and ELK Stack. File operations are logged

How to Install and Configure DVWA Lab on Ubuntu 18.04 server

Hello there, today we are going to learn how to install and configure DVWA lab on Ubuntu 18.04 server. DVWA has been defined as a

Install OSSEC HIDS Agent

Install OSSEC Agent on Debian 10 Buster

In this guide, we are going to learn how to install OSSEC Agent on Debian 10 Buster. OSSEC is an open source host intrusion detection

Older posts
Page1 Page2 … Page32 Next →

Latest Posts

How to Deploy an OpenShift Cluster Using Agent-Based Installer (Bootable ISO, KVM & Bare Metal)

Integrate Request Tracker (RT) with Active Directory for Authentication

How to Enable Self-Service Password Reset in Request Tracker (RT)

Configure Request Tracker to Send Mails using MSMTP via Gmail Relay

How to Enable HTTPS for Request Tracker on Linux

Install Request Tracker on AlmaLinux/Rocky Linux

Containers

Understanding Deployments in Kubernetes: A Comprehensive Guide

How to Deploy an OpenShift Cluster Using Agent-Based Installer (Bootable ISO, KVM & Bare Metal)

How to Automate OpenShift Builds with Git Webhooks: Step-by-Step Guide

Kubernetes Nodes Maintenance: Drain vs. Cordon Demystified

Deploy Nagios as a Docker Container

Deploy ELK Stack 8 Cluster on Docker using Ansible

Security

How to Install and Setup AlienVault HIDS Agent on a Windows Host

Install Malcolm Network Traffic Analysis Tool on Ubuntu 22.04

Install Osquery on Ubuntu 20.04

How to Configure NTP Server on pfSense

Install and Configure Squid Proxy on CentOS 8

Install and Setup Velociraptor on Ubuntu 20.04

Monitoring

Install Sensu Agent on Ubuntu/Debian

Install Icinga 2 on Debian 10 Buster

Install Nagios Plugins and NRPE agents on CentOS 7/RHEL 7/Fedora 29

Install OSSEC HIDS Agent on Ubuntu 20.04

Install Filebeat on Fedora 30/Fedora 29/CentOS 7

Install Prometheus on Rocky Linux 8

© 2026 kifarunix.com

Home Advertise with us Privacy Policy