Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

cybersecurity studies

Studying cybersecurity and gaining the greatest achievements in data protection

Studying cybersecurity and gaining the greatest achievements in data protection

The digital age brings many great opportunities to humanity. But these opportunities never go without challenges. In this case, it goes about cybersecurity threats. How

Latest Posts

How to Use RHEL 10 Lightspeed AI to Simplify Linux Administration Tasks

How to Install RHEL 10 on VirtualBox

How to Upgrade OpenShift Cluster: Seamless Steps for Success

Why Docker Hardened Images Are a Game-Changer for Software Supply Chain Security

Automate Tasks in OpenShift with Kubernetes Jobs and Cron Jobs: A Practical Guide

How to Setup Multinode Elasticsearch 9 Cluster

Containers

Introduction to Kubernetes: What is it and why do you need it?

Deploy a Single Node ELK Stack Cluster on Docker Containers

Configuring Shared Filesystem for Kubernetes on Rook Ceph Storage

Install and Run MariaDB as a Docker Container

Deploy NRPE Agent as a Docker Container

Easy Way to Install Kubernetes Dashboard on Ubuntu 22.04/20.04

Security

Install Gophish on Ubuntu 22.04

How to Install RKHunter (RootKit Hunter) On Ubuntu 18.04

Import Saved Passwords From Firefox to Chrome on Ubuntu 18.04

Quick Way to Enable Kibana HTTPS Connection

Install sysPass Password Manager on Debian 11/Debian 10

Creating Custom Nessus Scan Policy Templates

Monitoring

How to Setup Multinode Elasticsearch 9 Cluster

Install and Configure SNMP on Ubuntu 22.04/Debian 11

Install OSSEC HIDS Agent on Ubuntu 20.04

Visualize ClamAV Scan Logs on ELK Stack Kibana

Monitor Linux System Metrics with ELK Stack

Delete Specific Records from Elasticsearch Index

© 2025 kifarunix.com

Home Advertise with us Privacy Policy