Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

cybersecurity studies

Studying cybersecurity and gaining the greatest achievements in data protection

Studying cybersecurity and gaining the greatest achievements in data protection

The digital age brings many great opportunities to humanity. But these opportunities never go without challenges. In this case, it goes about cybersecurity threats. How

Latest Posts

How to Automate OpenShift Builds with Git Webhooks: Step-by-Step Guide

How to Install Gitlab on Rocky Linux 10 with Let’s Encrypt SSL

How to Install Gitlab on AlmaLinux 10 with Let’s Encrypt SSL

How to Deploy Apps on OpenShift Using BuildConfig: A Step-by-Step Guide (2025)

OpenShift Builds and BuildConfig Essentials: A Comprehensive Guide

Automate Windows Server Patching with Ansible AWX: Step-by-Step

Containers

Introduction to Role-Based Access Control (RBAC) in Kubernetes

How to Install Docker Desktop on Ubuntu 22.04/Ubuntu 20.04

How to Setup Three Node Docker Swarm Cluster on Ubuntu 22.04

Install and Run MariaDB as a Docker Container

Install Fedora CoreOS on KVM Using an ISO File: A Step-by-Step Guide

Kubernetes Pod Management: Static Pods vs Mirror Pods vs DaemonSets

Security

Install Zammad Ticketing System on Debian 12

ExpressVPN – Easy to Use VPN

Install GVM 21.04 on Rocky Linux 8

Install Cisco AnyConnect Client on CentOS 8

Install and Configure Squid Proxy on Fedora 29/Fedora 28/CentOS 7

Cybersecurity In The Home: 3 Steps Households Can Take

Monitoring

Install Latest Grafana on CentOS 8

Setup Highly Available Elasticsearch Cluster with Keepalived

Configure Log Retention Period in ELK Stack

Install and Setup Kolide Fleet on Ubuntu 18.04

How to Install Prometheus on Ubuntu 24.04

How to Monitor Remote Linux Hosts and Services with Icinga 2 on Ubuntu 18.04

© 2025 kifarunix.com

Home Advertise with us Privacy Policy