Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Security

install linux malware detect on Ubuntu

Install Linux Malware Detect on Ubuntu 22.04/Ubuntu 20.04

Follow through this tutorial to learn how to install Linux Malware Detect on Ubuntu 22.04/Ubuntu 20.04. Linux Malware Detect, LMD, is an opensource malware scanner

squid proxy

Install and Configure Squid Proxy on CentOS 8

In this guide, we are going to learn how to install and configure Squid proxy on CentOS 8. Squid is a full-featured web proxy cache

Connect to OpenVPN using Network Manager on CentOS 8/Ubuntu 18.04

Sometimes it is easier to connect to an OpenVPN server from the graphical user interface using the Network Manager. In this guide, we are going

squid proxy

Setup Squid Proxy Authentication on Ubuntu 18.04/Fedora 29/28/CentOS 7

Welcome to our guide on how to setup Squid Proxy Authentication on Ubuntu 18.04/Fedora 29/28/CentOS 7 with username and password. You may also want to

Import Saved Passwords From Firefox to Chrome on Ubuntu 18.04

Welcome to our guide on how to import saved passwords from Firefox to Chrome on Ubuntu 18.04. So you have been using Firefox all along

Install and Configure Snort 3 on Ubuntu 22.04

Install and Configure Snort 3 on Ubuntu 22.04

In this tutorial, you will learn how to install and configure Snort 3 on Ubuntu 22.04. Snort is a lightweight network intrusion detection system. It

Install LibModsecurity with Apache on Ubuntu 18.04

Welcome to our guide on how to install LibModsecurity with Apache on Ubuntu 18.04. Libmodsecurity (Modsecurity v3), is an open source, cross platform web application

automount LUKS encrypted device in Linux on system startup

Automount LUKS Encrypted Device in Linux

In this tutorial, you will learn how to automount LUKS encrypted device in Linux on system startup. Unless you configure the device to automount, it

The Role of a Strategic Cybersecurity Strategy in Ensuring Business Continuity

The Role of a Strategic Cybersecurity Strategy in Ensuring Business Continuity

In today’s interconnected world, where businesses heavily rely on technology and digital systems, cybersecurity has emerged as a critical concern. The evolving threat landscape and

configure ssh tunneling/port forwarding

Configure SSH Local Port Forwarding in Linux

Welcome to our guide on how to configure SSH Local Port Forwarding in Linux. In order to understand how SSH tunneling or simply put, port

Older posts
Newer posts
← Previous Page1 … Page9 Page10 Page11 … Page32 Next →

Latest Posts

Automate RHEL OS Upgrades using Ansible infra.leapp Playbooks

Technology powers the expansion of online casinos

Upgrade RHEL 9 to RHEL 10 using LEAPP Tool

Upgrade RHEL 8 to RHEL 9 using LEAPP with Satellite Server Integration

Enable RHEL 10 Repositories in Red Hat Satellite: A Step-by-Step Guide

How to Disable Weak SSH Algorithms on RHEL 8/9/10 (SHA-1 HMACs, SHA-1 Kex, CBC, 3DES)

Containers

Quickly Install MySQL 8 on Debian 12

Mastering Kubernetes Autoscaling: Horizontal vs Vertical Scaling

Introduction to Role-Based Access Control (RBAC) in Kubernetes

Install Portainer on Debian 11/Debian 10

How to Upgrade OpenShift Cluster: Seamless Steps for Success

Deploy WordPress using Docker Compose

Security

Installing Metasploit on Ubuntu 18.04 LTS

Send Alert When ClamAV Finds Infected Files on Linux Systems

Install ClamAV on Ubuntu 24.04/Ubuntu 22.04

Process ModSecurity Logs using Wazuh

What Are the Benefits of SOCKS5 Proxy?

How to Install OpenVPN Server on Ubuntu 24.04

Monitoring

Install Prometheus on Rocky Linux 8

How to Install Grafana on Debian 12

Install Fleet Osquery Manager on Debian 10

Install Wazuh Manager with ELK on Debian 12

Install Grafana Data Visualization Tool on Ubuntu 18.04

Install and Setup Nagios Core on Ubuntu 20.04

© 2025 kifarunix.com

Home Advertise with us Privacy Policy