Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Security

5 Things You Didn’t Know You Can Do with a VPN

VPN is something you have been hearing quite a lot and dozens of times. We bet, sometimes you were also informed about its banning or

6 Little-Known Things You Can Do With a VPN

6 Little-Known Things You Can Do With a VPN

A VPN (a virtual private network) makes it possible to use the internet and connect to websites without revealing your identity or location. It gives

encrypt ceph osd drive

How to Encrypt Data at Rest on Ceph Cluster OSD

In this tutorial, you will learn how to encrypt data at rest on Ceph Cluster OSD. Current release versions of Ceph now support data encryption

SSH to Remote Host via Multiple Jump Hosts

Securely SSH to Remote Host via Multiple Jump Hosts

In this comprehensive guide, we’ll walk you through the steps to securely SSH to remote host via multiple jump hosts. If you’re a system administrator

8 Handy Ways You Can Use A VPN In Your Everyday Life

8 Handy Ways You Can Use A VPN In Your Everyday Life

VPN’s aren’t just a thing for big corporations and tech gurus. You can use a VPN in your everyday online activities. They are very useful

brim desktop app

Analyze Network Traffic Using Brim Security

In this tutorial, you will learn how you can analyze network traffic using Brim security tool. Brim is an open source desktop application that can

modsecurity

Configure LibModsecurity with Nginx on CentOS 8

In this guide, we are going to learn how to configure LibModsecurity with Nginx on CentOS 8. LibMosecurity is the newest version of ModSecurity version

Enable HTTPS Connection Between Elasticsearch Nodes

Enable HTTPS Connection Between Elasticsearch Nodes

In this tutorial, you will learn how to enable HTTPS connection between Elasticsearch nodes. One of the Elastic security features is to enable encryption between

How VPNs Safeguard Your Online Presence

Protecting Your Privacy: How VPNs Safeguard Your Online Presence

In today’s digital age, safeguarding your online privacy has become increasingly important. With the rise of cyber threats and the extensive tracking and surveillance practices

Replace OpenShift Self-Signed Ingress and API SSL/TLS Certificates with Lets Encrypt

Replace OpenShift Self-Signed Ingress and API SSL/TLS Certificates with Lets Encrypt

In this tutorial, you will learn how to replace OpenShift self-signed Ingress and API SSL/TLS certificates with Lets Encrypt. When you install a new Red

Older posts
Newer posts
← Previous Page1 … Page14 Page15 Page16 … Page32 Next →

Latest Posts

Integrate Request Tracker (RT) with Active Directory for Authentication

How to Enable Self-Service Password Reset in Request Tracker (RT)

Configure Request Tracker to Send Mails using MSMTP via Gmail Relay

How to Enable HTTPS for Request Tracker on Linux

Install Request Tracker on AlmaLinux/Rocky Linux

Replace OpenShift Self-Signed Ingress and API SSL/TLS Certificates with Lets Encrypt

Containers

How to Install Docker Desktop on Ubuntu 22.04/Ubuntu 20.04

Safely Upgrade Kubeadm Kubernetes Cluster: A Step-by-Step Guide

How to Use Secrets in Kubernetes Applications

How to Install Docker CE on Debian 12

How to Setup Three Node Docker Swarm Cluster on Ubuntu 22.04

Monitor Docker Swarm Service Metrics using Grafana

Security

Install and Configure Squid Proxy on CentOS 8

How to Install and Configure Maltrail on Ubuntu 18.04

Install GVM 21.04 on Debian 11/Debian 10

How to Install Wazuh SIEM Server on RHEL 9/RHEL 10

Scan a Web Application Using Acunetix Scanner

Install and Setup Squid Proxy on pfSense

Monitoring

Monitor Squid logs with Grafana and Graylog

Install and Setup Velociraptor on Ubuntu 20.04

Install Graylog 3.0 on CentOS 7

Install Sensu Go on Debian 11

Install Cortex on Ubuntu 22.04/Ubuntu 20.04

Install and Setup Security Onion on VirtualBox

© 2025 kifarunix.com

Home Advertise with us Privacy Policy