Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

cybersecurity studies

Studying cybersecurity and gaining the greatest achievements in data protection

Studying cybersecurity and gaining the greatest achievements in data protection

The digital age brings many great opportunities to humanity. But these opportunities never go without challenges. In this case, it goes about cybersecurity threats. How

Latest Posts

Configure Request Tracker to Send Mails using MSMTP via Gmail Relay

How to Enable HTTPS for Request Tracker on Linux

Install Request Tracker on AlmaLinux/Rocky Linux

Replace OpenShift Self-Signed Ingress and API SSL/TLS Certificates with Lets Encrypt

Step-by-Step Guide: How to Configure HTPasswd Identity Provider in OpenShift 4.x

How to Scan RHEL Systems for CIS Benchmark Compliance with Wazuh SCA

Containers

Step-by-Step Guide on Deploying an Application on Kubernetes Cluster

How to Install Docker CE on Debian 12

Deploy ELK Stack 8 Cluster on Docker using Ansible

Deploy All-In-One OpenStack with Kolla-Ansible on Ubuntu 18.04

Assign Roles to Users and Groups in Kubernetes Cluster

How to Install Docker Resource Usage Extension

Security

Monitor Linux Hosts using Nagios check_by_ssh Plugin

Encrypt Files and Directories with eCryptFS on Ubuntu 20.04

How to Protect SSH Server Authentication with Fail2ban Ubuntu 18.04

Install and Setup Velociraptor on Ubuntu 18.04

Install Wazuh Server on Rocky Linux 8/Rocky Linux 9

How to Configure Apache Tomcat with HTTPS

Monitoring

How to Monitor Disk Input/Output on Linux

How to Install Monitorix on CentOS 8

Install Icinga Web 2 on Debian 10 Buster

Deploy Nagios as a Docker Container

Install and Configure Telegraf on FreeBSD 12

Install Wazuh Agent on pfSense

© 2025 kifarunix.com

Home Advertise with us Privacy Policy