Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Security

modsecurity

Configure LibModsecurity with Nginx on CentOS 8

In this guide, we are going to learn how to configure LibModsecurity with Nginx on CentOS 8. LibMosecurity is the newest version of ModSecurity version

Install Greenbone Vulnerability Management (GVM) on Debian 12

Install GVM Vulnerability Scanner on Ubuntu 24.04

In this guide, you will learn how to install GVM Vulnerability Scanner on Ubuntu 24.04. Greenbone Vulnerability Management (GVM), previously known as OpenVAS, is a network security scanner

Configure APT Proxy on Debian 10 Buster

In this guide guide, we are going to learn how to configure APT Proxy on Debian 10 Buster. If you are be running a Debian

Essential Cybersecurity Measures for Small Businesses

Essential Cybersecurity Measures for Small Businesses

When you run a business, regardless of size, it’s essential that you take the proper methods to secure all assets and company data. Without securing

Why Creating a Secure Password is Crucial

Why Creating a Secure Password is Crucial

In today’s digital age, where almost every aspect of our lives has moved online, the security of our personal information is more important than ever.

install clamav

How to Install and Use ClamAV Antivirus on Ubuntu 18.04

In this tutorial, you will learn how to install and use ClamAV antivirus on Ubuntu 18.04. ClamAV is an open source antivirus engine for detecting

What are the Benefits Of Using a Password Management For Your Business

What are the Benefits Of Using a Password Management For Your Business

In this age of technology, it is imperative to have top-notch cybersecurity as data breaches, identity thefts, and cyberattacks are ever-increasing. With big data becoming

velociraptor

Install Velociraptor Client on Linux and Windows Systems

In this tutorial, you will learn how to install Velociraptor Client on Linux and Windows Systems. Velociraptor endpoint agents are called clients. Clients connect to the

How to Reset Ceph Dashboard Admin Password

How to Reset Ceph Dashboard Admin Password

In this blog post, you will learn how to reset Ceph dashboard admin password. The Ceph dashboard serves as a central hub for monitoring and

Install Nessus Professional Scanner on Debian 10

In this guide, you are going to learn how to install Nessus Professional Scanner on Debian 10 Buster server. Nessus is vulnerability scanner developed by

Older posts
Page1 Page2 … Page32 Next →

Latest Posts

Integrate Request Tracker (RT) with Active Directory for Authentication

How to Enable Self-Service Password Reset in Request Tracker (RT)

Configure Request Tracker to Send Mails using MSMTP via Gmail Relay

How to Enable HTTPS for Request Tracker on Linux

Install Request Tracker on AlmaLinux/Rocky Linux

Replace OpenShift Self-Signed Ingress and API SSL/TLS Certificates with Lets Encrypt

Containers

Install Portainer Extension on Docker Desktop

Patch Sudo CVEs 2025-32462 & 2025-32463 using Ansible AWX

Deploy All-in-One OpenStack with Kolla-Ansible on Ubuntu 22.04

Understanding Deployments in Kubernetes: A Comprehensive Guide

Deploy ELK Stack 8 Cluster on Docker using Ansible

Disaster Recovery in Kubernetes: etcd Backup and Restore with etcdctl and etcdutl

Security

Install and Setup Lynis Security Auditing tool on CentOS 8

Get the Most Out of Your Penetration Testing Services: Tips and Tricks

Tips For Choosing The Right Antivirus Software

What Are the Benefits of SOCKS5 Proxy?

Install Wireshark on Rocky Linux

Install Gophish on Ubuntu 22.04

Monitoring

Install and Setup Security Onion on VirtualBox

Visualize WordPress User Activity Logs on ELK Stack

Install and Configure SNMP on CentOS 8

Install Nagios Server on Rocky Linux 8

Install and Configure Prometheus on CentOS 8

Monitor Changes to Critical Files on Windows Systems using Wazuh and ELK

© 2026 kifarunix.com

Home Advertise with us Privacy Policy