Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

brim security setup

brim desktop app

Analyze Network Traffic Using Brim Security

In this tutorial, you will learn how you can analyze network traffic using Brim security tool. Brim is an open source desktop application that can

Latest Posts

Integrate Request Tracker (RT) with Active Directory for Authentication

How to Enable Self-Service Password Reset in Request Tracker (RT)

Configure Request Tracker to Send Mails using MSMTP via Gmail Relay

How to Enable HTTPS for Request Tracker on Linux

Install Request Tracker on AlmaLinux/Rocky Linux

Replace OpenShift Self-Signed Ingress and API SSL/TLS Certificates with Lets Encrypt

Containers

Kubernetes User Management: Creating Users, Groups and Service Accounts

Kubernetes Resource Optimization with Vertical Pod Autoscaler (VPA)

Install Portainer on Rocky Linux

Kubernetes Kustomize 101: Introduction and Basics

Monitor Docker Containers Metrics using Grafana

Introduction to Role-Based Access Control (RBAC) in Kubernetes

Security

Install ClamAV on Ubuntu 24.04/Ubuntu 22.04

Install and Setup Squid Proxy on Ubuntu 20.04

Install and Setup GVM 11 on Ubuntu 20.04

Configure Nginx with SSL/TLS certificates on CentOS 8

Install Nessus Professional Scanner on Debian 10

Install Pritunl VPN client on Debian/Ubuntu

Monitoring

Deploy Nagios as a Docker Container

Install Wazuh Agent on Rocky Linux 8

Monitor Windows Systems using Elastic Osquery Manager

Install ModSecurity with Apache on Ubuntu 22.04

Install Icinga 2 on Debian 10 Buster

Install and Setup AWStats Log Analyzer on CentOS 8

© 2025 kifarunix.com

Home Advertise with us Privacy Policy