Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Security

install clamav

Install and use ClamAV on Ubuntu 20.04

In this tutorial, we are going to learn how to install and use ClamAV on Ubuntu 20.04. ClamAV is an open source antivirus engine for

Why Creating a Secure Password is Crucial

Why Creating a Secure Password is Crucial

In today’s digital age, where almost every aspect of our lives has moved online, the security of our personal information is more important than ever.

Send Windows logs to Elastic Stack using Winlogbeat and Sysmon

Send Windows logs to Elastic Stack using Winlogbeat and Sysmon

In this guide, we are going to learn how to send Windows logs to Elastic Stack using Winlogbeat and Sysmon. Winlogbeat is an Elastic Beat

squid proxy

Install and Setup Squid Proxy on pfSense

In this tutorial, we are going to learn how to install and setup Squid proxy on pfSense. pfSense is a free and open source firewall and

What You Can Do to Get Work as a Security Guard

What You Can Do to Get Work as a Security Guard

Many people who work in the security industry enjoy a range of benefits, and there are lots of people who are keen to enter into

Configure Apache Kafka SSL/TLS Encryption for Enhanced Security

Quick Guide: Configure Apache Kafka SSL/TLS Encryption for Enhanced Security

In this quick guide, we will take you through steps on how to configure Apache Kafka SSL/TLS encryption for enhanced security. By default, Kafka uses

How to Disable Weak SSH Algorithms on RHEL 8/9/10 (SHA-1 HMACs, SHA-1 Kex, CBC, 3DES)

How to Disable Weak SSH Algorithms on RHEL 8/9/10 (SHA-1 HMACs, SHA-1 Kex, CBC, 3DES)

In this tutorial, we will quickly look at how to disable weak SSH algorithms on RHEL 8/9/10, including SHA-1 HMACs, SHA-1 key exchange methods, CBC

The Benefits & Risks of Using Website Encryption

The Benefits & Risks of Using Website Encryption

Website encryption is becoming increasingly popular for businesses of all sizes. While it does help ensure that customer data is secure and protected, there are

Install MISP on Ubuntu 22.04/Ubuntu 20.04

Install MISP on Ubuntu 24.04/Ubuntu 22.04/Ubuntu 20.04

In this tutorial, you will learn how to install MISP on Ubuntu 24.04/Ubuntu 22.04/Ubuntu 20.04. MISP, an acronym for Malware Information Sharing Platform, is an

Tips For Secure Gaming: Why Do You Need a VPN While Playing? 

Tips For Secure Gaming: Why Do You Need a VPN While Playing? 

For some, playing online video games is a way of living, while for others, it’s that perfect moment to relax and feel good. Some people

Older posts
Newer posts
← Previous Page1 … Page27 Page28 Page29 … Page32 Next →

Latest Posts

How to Enable User Workload Monitoring in OpenShift 4.20: Let Developers Monitor Their Apps

How to Configure Production-Ready Monitoring in OpenShift: Prometheus, Alertmanager & Persistent Storage

Configure OpenShift 4 Image Registry Persistent Storage with ODF: 2026 Step-by-Step Guide

How to Install and Configure OpenShift Data Foundation (ODF) on OpenShift 4.20: Step-by-Step Guide [2026]

How to Deploy an OpenShift Cluster Using Agent-Based Installer (Bootable ISO, KVM & Bare Metal)

Integrate Request Tracker (RT) with Active Directory for Authentication

Containers

How to Deploy Multinode OpenShift Cluster Using UPI/User Provisioned Infrastructure

Connect to Remote Docker Environment on Docker Desktop

How to Automate OpenShift Builds with Git Webhooks: Step-by-Step Guide

How to Configure Production-Ready Monitoring in OpenShift: Prometheus, Alertmanager & Persistent Storage

How to Monitor Docker Containers using Nagios

Install Portainer on Ubuntu 22.04

Security

Install pfSense Firewall on KVM

How to Enable Ping response On IBM QRadar SIEM

Install and Setup Lynis Security Auditing tool on Ubuntu 20.04

Install sysPass Password Manager on Ubuntu 22.04/Ubuntu 20.04

Analyze Network Traffic Using Brim Security

Cybersecurity for Your Business: What Is the Importance of Implementing It

Monitoring

How to Install Wazuh SIEM Server on RHEL 9/RHEL 10

How to Monitor Remote Linux Hosts and Services with Icinga 2 on Ubuntu 18.04

Easy way to Integrate TheHive with Cortex

Create Custom ELK Ingest Pipeline for Custom Log Processing

Install Zabbix Server on Rocky Linux

Install OSSEC Agent on Debian 10 Buster

© 2026 kifarunix.com

Home Advertise with us Privacy Policy