Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Security

Install and Setup Passbolt Password Manager on Ubuntu 20.04

In this tutorial, you will learn how to install and setup Passbolt password manager on Ubuntu 20.04. Passbolt is is a free, open source, self-hosted,

squid proxy

Install and Setup Squid Proxy on Debian 11/10

In this tutorial, we are going to learn how to install and setup Squid Proxy on Debian 11/Debian 10. Squid is a full-featured web proxy cache

Restrict Access to WordPress Login Page to Specific IPs with libModSecurity

In this tutorial, we are going to learn how to restrict access to WordPress login page to specific IPs with libModSecurity. libModSecurity is also known as

install Malcolm network traffic analysis tool on Ubuntu

Analyze PCAP Files using Malcolm Network Traffic Analysis tool

In this tutorial, you will learn how to analyze PCAP files using Malcolm network traffic analysis tool. Malcolm can be used to analyze offline full

Install and Configure Tripwire Security Monitoring tool on CentOS 8

In this tutorial, you will learn how to install and configure Tripwire security monitoring tool on CentOS 8. Tripwire is available is as an open

role-based access control in kubernetes

Introduction to Role-Based Access Control (RBAC) in Kubernetes

This blog post serves as an introduction to Role-Based Access Control (RBAC) in Kubernetes. It is no doubt that currently, Kubernetes is the de facto

fleet

Install and Enroll Elastic Agents to Fleet Manager in Linux

This tutorial will take you through how you can install and enroll Elastic agents to Fleet manager in Linux. According to Elastic Fleet and Elastic

How to Configure Apache Tomcat with HTTPS

How to Configure Apache Tomcat with HTTPS

Is it possible to configure Apache Tomcat to run over HTTPS? Yes, this guide provides a step by step tutorial on how to configure Apache

Studying cybersecurity and gaining the greatest achievements in data protection

Studying cybersecurity and gaining the greatest achievements in data protection

The digital age brings many great opportunities to humanity. But these opportunities never go without challenges. In this case, it goes about cybersecurity threats. How

Why Should You Be Using Ubuntu? 6 Advantages

Why Should You Be Using Ubuntu? 6 Advantages

Imagine: The first time people see your desktop, they ask in surprise why it looks so different. “It’s Ubuntu, an effective, lightweight Linux operating system

Older posts
Newer posts
← Previous Page1 … Page22 Page23 Page24 … Page31 Next →

Latest Posts

How to Install MinIO Object Storage Server on RHEL 9

How to Install MinIO on Ubuntu 24.04: A Step-by-Step Guide

Install and Configure iSCSI Storage Server on Ubuntu 24.04

Control OpenShift Pod Permissions with SCCs and Service Accounts

How to Install Red Hat Discovery Tool on RHEL 9

Understanding OpenShift Security Context Constraints: The Complete Guide

Containers

Install Dozzle Real-Time Log Viewer for Docker Containers on Ubuntu

Install and Setup Kubernetes Cluster on Ubuntu 24.04

What is Kubeconfig File in a Kubernetes Cluster?

Deploy All-in-One OpenStack with Kolla-Ansible on Ubuntu 22.04

Introduction to Kubernetes: What is it and why do you need it?

How to Install Docker Desktop on Kali Linux

Security

How To Reset Or Recover Root Password On OPNsense

Install ClamAV on Debian 11

Install and Configure Wazuh Manager on Ubuntu 22.04

Configure Site-to-Site IPSec VPN on pfSense and Libreswan

Analyze PCAP Files using Malcolm Network Traffic Analysis tool

Encrypt Drives with LUKS in Linux

Monitoring

Install Nagios NRPE Agents on Debian 11/Debian 10

Deploy ELK Stack 8 on Docker Containers

Install OSSEC Agent on Rocky Linux 8

Monitor Docker Swarm Node Metrics using Grafana

How to Install OSSEC Agent on Solaris 11.4

How to Install Prometheus on Debian 12

© 2025 kifarunix.com

Home Advertise with us Privacy Policy