Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Security

modsecurity

Install ModSecurity 3 with Nginx on Debian 12

Welcome to our guide on how to install ModSecurity 3 with Nginx on Debian 12. Modsecurity is an open source, cross platform web application firewall

Install LibModsecurity with Apache on Fedora 30/29/CentOS 7

In this guide, we are going to learn how to install LibModsecurity with Apache on Fedora 30/29/CentOS 7. Modsecurity, is an open source web application

Cyber Security: 4 Reasons Why It Is Crucial for Your Business

Cyber Security: 6 Reasons Why It Is Crucial for Your Business

The world is changing and it seems like everyone has a cyber security concern nowadays. However, one thing remains true: there’s no such thing as

How to Install and Configure Maltrail on Ubuntu 18.04

Welcome to our guide on how to install and configure Maltrail on Ubuntu 18.04. Maltrail is a malicious traffic detection system. It utilizes the blacklists

Install and Setup OpenVAS 9 Vulnerability Scanner on Ubuntu 18.04

Install and Setup OpenVAS 9 Vulnerability Scanner on Ubuntu 18.04

Hello there. In this guide, we will be learning about how to install and setup OpenVAS 9 Vulnerability Scanner on Ubuntu 18.04. This post is

integrate Suricata with Wazuh for log processing

Integrate Suricata with Wazuh for Log Processing

Follow through this tutorial to learn how to integrate Suricata with Wazuh for log processing. With its ability to write its logs in YAML and

squid proxy

Install and Configure Squid Proxy on Rocky Linux 8

In this guide, we are going to learn how to install and configure Squid proxy on Rocky Linux 8. Squid is a full-featured web proxy cache

How to Configure Apache Tomcat with HTTPS

How to Configure Apache Tomcat with HTTPS

Is it possible to configure Apache Tomcat to run over HTTPS? Yes, this guide provides a step by step tutorial on how to configure Apache

Monitor Changes to Critical Files on Windows Systems using Wazuh and ELK

Monitor Changes to Critical Files on Windows Systems using Wazuh and ELK

In this tutorial, you will learn how to monitor changes to critical files on Windows systems using Wazuh and ELK Stack. File operations are logged

Easy way to Integrate TheHive with Cortex

Easy way to Integrate TheHive with Cortex

In this tutorial, you will learn how an easy way to integrate TheHive with Cortex. TheHive, an open source and free Security Incident Response Platform,

Older posts
Newer posts
← Previous Page1 … Page27 Page28 Page29 … Page32 Next →

Latest Posts

Automate OpenShift Deployments with GitLab CI/CD Pipelines

How to Automate OpenShift Builds with Git Webhooks: Step-by-Step Guide

How to Install Gitlab on Rocky Linux 10 with Let’s Encrypt SSL

How to Install Gitlab on AlmaLinux 10 with Let’s Encrypt SSL

How to Deploy Apps on OpenShift Using BuildConfig: A Step-by-Step Guide (2025)

OpenShift Builds and BuildConfig Essentials: A Comprehensive Guide

Containers

OpenShift Builds and BuildConfig Essentials: A Comprehensive Guide

Kubernetes Architecture: A High-level Overview of Kubernetes Cluster Components

Kubernetes Resource Optimization with Vertical Pod Autoscaler (VPA)

What are the core concepts in Kubernetes?

Deploy ELK Stack 8 Cluster on Docker using Ansible

Step-by-Step Guide to Using ConfigMaps in Kubernetes

Security

Install Wazuh Agent on pfSense

Install Osquery on Rocky Linux 8

Install LibModsecurity with Apache on Fedora 30/29/CentOS 7

Install and Setup VeraCrypt on Ubuntu 22.04/Ubuntu 20.04

Restrict Access to WordPress Login Page to Specific IPs with libModSecurity

How to Set Up Your Own Proxy

Monitoring

Install Elasticsearch 7 on Fedora 30

How to Configure SNMP version 3 on Debian 9

Deploy ELK Stack 8 on Docker Containers

How to Install Monitorix on CentOS 8

Install Grafana Metrics Monitoring Tool on Debian 9

Install and Configure Prometheus on Debian 9

© 2025 kifarunix.com

Home Advertise with us Privacy Policy