Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

cybersecurity studies

Studying cybersecurity and gaining the greatest achievements in data protection

Studying cybersecurity and gaining the greatest achievements in data protection

The digital age brings many great opportunities to humanity. But these opportunities never go without challenges. In this case, it goes about cybersecurity threats. How

Latest Posts

Integrate Request Tracker (RT) with Active Directory for Authentication

How to Enable Self-Service Password Reset in Request Tracker (RT)

Configure Request Tracker to Send Mails using MSMTP via Gmail Relay

How to Enable HTTPS for Request Tracker on Linux

Install Request Tracker on AlmaLinux/Rocky Linux

Replace OpenShift Self-Signed Ingress and API SSL/TLS Certificates with Lets Encrypt

Containers

Setup Portainer with SSL Certificates

How to Deploy Multinode OpenShift Cluster Using UPI/User Provisioned Infrastructure

Automate OpenShift Deployments with GitLab CI/CD Pipelines

Install and Run MariaDB as a Docker Container

Control OpenShift Pod Permissions with SCCs and Service Accounts

OpenShift Builds and BuildConfig Essentials: A Comprehensive Guide

Security

How to Install Wazuh Agent on RHEL 8/9/10

Install and Setup Squid Proxy on pfSense

How to Install and Use WPScan WordPress Vulnerability Scanner Ubuntu 18.04

5 Things You Didn’t Know You Can Do with a VPN

How to Enable Self-Service Password Reset in Request Tracker (RT)

How to Protect Single User Mode with Password in Ubuntu 18.04

Monitoring

Integrate Prometheus with Grafana for Monitoring

Monitor System Metrics with TICK Stack on Ubuntu 20.04

Integrate Osquery Manager with ELK Stack

Install Nagios Plugins on CentOS 8

Install Nagios Server on CentOS 8

Install Logstash 7 on Fedora 30/Fedora 29/CentOS 7

© 2025 kifarunix.com

Home Advertise with us Privacy Policy