Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

cybersecurity studies

Studying cybersecurity and gaining the greatest achievements in data protection

Studying cybersecurity and gaining the greatest achievements in data protection

The digital age brings many great opportunities to humanity. But these opportunities never go without challenges. In this case, it goes about cybersecurity threats. How

Latest Posts

How to Deploy an OpenShift Cluster Using Agent-Based Installer (Bootable ISO, KVM & Bare Metal)

Integrate Request Tracker (RT) with Active Directory for Authentication

How to Enable Self-Service Password Reset in Request Tracker (RT)

Configure Request Tracker to Send Mails using MSMTP via Gmail Relay

How to Enable HTTPS for Request Tracker on Linux

Install Request Tracker on AlmaLinux/Rocky Linux

Containers

Understanding Deployments in Kubernetes: A Comprehensive Guide

Kubernetes User Management: Creating Users, Groups and Service Accounts

Step-by-Step Guide: How to Configure HTPasswd Identity Provider in OpenShift 4.x

How to Deploy an Application in a Docker Swarm Cluster

What are the core concepts in Kubernetes?

Gracefully Remove Worker Node from Kubernetes Cluster

Security

Encrypt Drives with LUKS in Linux

Install MISP on Ubuntu 24.04/Ubuntu 22.04/Ubuntu 20.04

Install Zeek on Ubuntu 20.04

How to Install OpenVPN Server on Ubuntu 24.04

How to Set System Wide Proxy in Ubuntu 18.04

Create Locally Trusted SSL Certificates with mkcert on Ubuntu 18.04

Monitoring

How to Monitor Disk Input/Output on Linux

Install LibreNMS on Debian 11/Debian 10

Generate Wildcard SSL Certificates for Elasticsearch

Install Grafana Data Visualization Tool on Ubuntu 18.04

Create Custom ELK Ingest Pipeline for Custom Log Processing

Install and Configure Prometheus on Debian 9

© 2026 kifarunix.com

Home Advertise with us Privacy Policy