Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

cybersecurity studies

Studying cybersecurity and gaining the greatest achievements in data protection

Studying cybersecurity and gaining the greatest achievements in data protection

The digital age brings many great opportunities to humanity. But these opportunities never go without challenges. In this case, it goes about cybersecurity threats. How

Latest Posts

How to Scan RHEL Systems for CIS Benchmark Compliance with Wazuh SCA

How to Install Wazuh Agent on RHEL 8/9/10

How to Install Wazuh SIEM Server on RHEL 9/RHEL 10

How to Automate RHEL OS Upgrades Using Ansible Automation Platform (AAP)

Install Ansible Automation Platform on RHEL 9 using RPM

Automate RHEL OS Upgrades using Ansible infra.leapp Playbooks

Containers

How to Check Docker Container RAM and CPU Usage

Install and Setup Kubernetes Cluster on RHEL 9

Install Portainer on Rocky Linux

Quickly Install MySQL 8 on Debian 12

Easy Way to Install Kubernetes Dashboard on Ubuntu 22.04/20.04

What are the core concepts in Kubernetes?

Security

Install ModSecurity 3 with Nginx on Ubuntu 22.04

Creating Custom Nessus Scan Policy Templates

How to Recover Deleted Data on a Linux System

4 Reasons Why Home and Remote Workers Should Use a VPN

Install reNgine on Ubuntu 20.04|Ubuntu 18.04

Send Windows logs to Elastic Stack using Winlogbeat and Sysmon

Monitoring

Integrate Prometheus with Grafana for Monitoring

Install Icinga Web 2 on Debian 10 Buster

Install ELK Stack 9.x on Ubuntu 24.04

Deploy a Single Node ELK Stack Cluster on Docker Containers

Easy Steps: Install Apache Kafka on Debian 12

Setup Multinode Elasticsearch 8.x Cluster

© 2025 kifarunix.com

Home Advertise with us Privacy Policy