Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

cybercrime

The reasons why spy apps are so popular

The reasons why spy apps are so popular

Sometimes it can be pretty difficult to resist the temptation to find out more about one person. Technologies move with the times, so people have

Latest Posts

How to Deploy an OpenShift Cluster Using Agent-Based Installer (Bootable ISO, KVM & Bare Metal)

Integrate Request Tracker (RT) with Active Directory for Authentication

How to Enable Self-Service Password Reset in Request Tracker (RT)

Configure Request Tracker to Send Mails using MSMTP via Gmail Relay

How to Enable HTTPS for Request Tracker on Linux

Install Request Tracker on AlmaLinux/Rocky Linux

Containers

Deploy HAProxy as a Docker Container

Step-by-Step Guide: How to Configure HTPasswd Identity Provider in OpenShift 4.x

Step-by-Step Guide to Using ConfigMaps in Kubernetes

Kubernetes Kustomize 101: Introduction and Basics

Provision Block Storage for Kubernetes on Rook Ceph Cluster

How to Use Secrets in Kubernetes Applications

Security

How to Enable Secure Shell (SSH) server on OPNsense

Install and Configure Snort 3 NIDS on Ubuntu 20.04

Intercept Malicious File Upload with ModSecurity and ClamAV

Install Wireshark on Rocky Linux

Install and Setup Lynis Security Auditing tool on CentOS 8

Step-by-Step Guide: Install and Setup OpenVPN Server on Ubuntu 22.04

Monitoring

Detect Changes to Critical Files in Linux using Auditbeat and ELK

Install Monitorix on Ubuntu 20.04

Easy Way to Install Wazuh Agents on Ubuntu/Debian

Install and Configure Filebeat 7 on Ubuntu 18.04/Debian 9.8

Install OSSEC Agent on Debian 10 Buster

Install ntopng on Rocky Linux 8

© 2026 kifarunix.com

Home Advertise with us Privacy Policy