Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Security

squid proxy

Install and Setup Squid Proxy on Debian 11/10

In this tutorial, we are going to learn how to install and setup Squid Proxy on Debian 11/Debian 10. Squid is a full-featured web proxy cache

Top 10 Colleges with Cyber Security Programs

Choosing a university is important for every student. The rapid changes and innovation in the cybersecurity field serve to make this decision process much more

How to Enable Self-Service Password Reset in Request Tracker (RT)

How to Enable Self-Service Password Reset in Request Tracker (RT)

In this tutorial, you will learn how to enable self-service password reset in Request Tracker (RT). By default, RT doesn’t ship with a built-in password

Install LibModsecurity with Apache on Ubuntu 20.04

Install LibModsecurity with Apache on Ubuntu 20.04

Welcome to our guide on how to install LibModsecurity with Apache on Ubuntu 20.04. Libmodsecurity (Modsecurity v3), is an open source, cross platform web application

Studying cybersecurity and gaining the greatest achievements in data protection

Studying cybersecurity and gaining the greatest achievements in data protection

The digital age brings many great opportunities to humanity. But these opportunities never go without challenges. In this case, it goes about cybersecurity threats. How

Encrypt Drives with LUKS in Linux

Encrypt Drives with LUKS in Linux

In this tutorial, you will learn how to encrypt drives with LUKS in Linux. LUKS, the Linux Unified Key Setup, is a standard for disk

How to Reset Ceph Dashboard Admin Password

How to Reset Ceph Dashboard Admin Password

In this blog post, you will learn how to reset Ceph dashboard admin password. The Ceph dashboard serves as a central hub for monitoring and

How To Ensure Top Security For Your Business

How To Ensure Top Security For Your Business

The present business is completely data-oriented. You deal with loads of data to have a better understanding. But recent activities of data thefts have brought

Why Cybersecurity Investments Are Non-Negotiable for Modern Businesses

Why Cybersecurity Investments Are Non-Negotiable for Modern Businesses

Cybersecurity is no longer an optional extra for businesses looking to remain competitive in today’s digital landscape. As hackers become more and more sophisticated, every

6 Little-Known Things You Can Do With a VPN

6 Little-Known Things You Can Do With a VPN

A VPN (a virtual private network) makes it possible to use the internet and connect to websites without revealing your identity or location. It gives

Older posts
Newer posts
← Previous Page1 … Page27 Page28 Page29 … Page32 Next →

Latest Posts

How to Enable User Workload Monitoring in OpenShift 4.20: Let Developers Monitor Their Apps

How to Configure Production-Ready Monitoring in OpenShift: Prometheus, Alertmanager & Persistent Storage

Configure OpenShift 4 Image Registry Persistent Storage with ODF: 2026 Step-by-Step Guide

How to Install and Configure OpenShift Data Foundation (ODF) on OpenShift 4.20: Step-by-Step Guide [2026]

How to Deploy an OpenShift Cluster Using Agent-Based Installer (Bootable ISO, KVM & Bare Metal)

Integrate Request Tracker (RT) with Active Directory for Authentication

Containers

Replace OpenShift Self-Signed Ingress and API SSL/TLS Certificates with Lets Encrypt

Step-by-Step Guide to Using ConfigMaps in Kubernetes

Install Portainer Extension on Docker Desktop

Install and Use Docker CE on CentOS 8

Install and Setup Kubernetes Cluster on RHEL 9

How to Install Docker Desktop on Ubuntu 22.04/Ubuntu 20.04

Security

How to Protect SSH Server Authentication with Fail2ban Ubuntu 18.04

Top 8 Security Skills To Prevent Cyber Threats

How to Install IBM QRadar Community Edition SIEM on VirtualBox

Install and Configure Libreswan VPN Client on Ubuntu/Debian

Is a Firewall Box All You Need for Home and Small Office Security?

Integrate Request Tracker (RT) with Active Directory for Authentication

Monitoring

Install and Setup Kolide Fleet on Ubuntu 18.04

Configure Nagios Email Notification Using Gmail

Install and Configure Nagios Core from Repos on Ubuntu 18.04

Install Elastic Stack 7 on Ubuntu 18.04/Debian 9.8

How to Debug Logstash Grok Filters

Install Osquery on Debian 10 Buster

© 2026 kifarunix.com

Home Advertise with us Privacy Policy