Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Security

Install and Setup VeraCrypt

Install and Setup VeraCrypt on Rocky Linux

In this guide, we are going to learn how to install and setup VeraCrypt on Rocky Linux. VeraCrypt, a fork of TrueCrypt, is a free

Integrate Request Tracker (RT) with Active Directory for Authentication

Integrate Request Tracker (RT) with Active Directory for Authentication

In this guide, you will learn how to integrate Request Tracker (RT) with Active Directory for authentication. Request Tracker is a powerful, open-source ticketing system

Install GRR Incident Response Framework

Install GRR Incident Response Framework on Ubuntu 18.04

Hello folks. Today we are going to learn how to install GRR incident response framework on Ubuntu 18.04. Google Rapid Response (GRR) is a python

metasploit

Install Metasploit Framework on Fedora 29

Welcome to our guide on how to install Metasploit Framework on Fedora 29. Metasploit Framework is the opensource community version of the most popular penetration

Configure Nginx with SSL/TLS certificates on CentOS 8

In this tutorial, we are going to learn how to configure Nginx with SSL/TLS certificates on CentOS 8. The use of SSL/TLS certificates ensures secured

Automate eCryptfs Mounting Procedure

How to Automate eCryptfs Mounting Procedure

In this guide, you will learn how to automate ecryptfs mounting procedure. In our previous article, we learnt how to encrypt files and directories on

How to Reset Ceph Dashboard Admin Password

How to Reset Ceph Dashboard Admin Password

In this blog post, you will learn how to reset Ceph dashboard admin password. The Ceph dashboard serves as a central hub for monitoring and

5 Things You Didn’t Know You Can Do with a VPN

VPN is something you have been hearing quite a lot and dozens of times. We bet, sometimes you were also informed about its banning or

6 Tools That Can Help Protect Your Sensitive Business Information

6 Tools That Can Help Protect Your Sensitive Business Information

How do you protect your business information? The answer to that question can be a difficult one, but it’s important because the amount of sensitive

Enable HTTPS Connection Between Elasticsearch Nodes

Enable HTTPS Connection Between Elasticsearch Nodes

In this tutorial, you will learn how to enable HTTPS connection between Elasticsearch nodes. One of the Elastic security features is to enable encryption between

Older posts
Newer posts
← Previous Page1 … Page15 Page16 Page17 … Page32 Next →

Latest Posts

Integrate Request Tracker (RT) with Active Directory for Authentication

How to Enable Self-Service Password Reset in Request Tracker (RT)

Configure Request Tracker to Send Mails using MSMTP via Gmail Relay

How to Enable HTTPS for Request Tracker on Linux

Install Request Tracker on AlmaLinux/Rocky Linux

Replace OpenShift Self-Signed Ingress and API SSL/TLS Certificates with Lets Encrypt

Containers

Monitor Docker Swarm and Container metrics using Metricbeat

How to Upgrade OpenShift Cluster: Seamless Steps for Success

Deploy ELK Stack 8 Cluster on Docker using Ansible

Install Portainer Extension on Docker Desktop

How to Install etcdctl on Kubernetes Cluster

Mastering Kubernetes Autoscaling: Horizontal vs Vertical Scaling

Security

How to Protect Single User Mode with Password in Ubuntu 18.04

Install Wireshark on Rocky Linux

Configure LibModsecurity with Nginx on CentOS 8

Securely SSH to Remote Host via Multiple Jump Hosts

Enable HTTPS Connection Between Elasticsearch Nodes

How to Install Wazuh Agent on RHEL 8/9/10

Monitoring

Install and Setup Wazuh Server in CentOS 8/Fedora 32

Detecting Malicious Files with Wazuh and VirusTotal

Install ELK Stack 8 on Debian 12

Enable Rsyslog Logging on Debian 12

Install Osquery on Debian 10 Buster

Install and Configure Elastic Auditbeat on Ubuntu 18.04

© 2026 kifarunix.com

Home Advertise with us Privacy Policy