Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

cybersecurity studies

Studying cybersecurity and gaining the greatest achievements in data protection

Studying cybersecurity and gaining the greatest achievements in data protection

The digital age brings many great opportunities to humanity. But these opportunities never go without challenges. In this case, it goes about cybersecurity threats. How

Latest Posts

Enable RHEL 10 Repositories in Red Hat Satellite: A Step-by-Step Guide

How to Disable Weak SSH Algorithms on RHEL 8/9/10 (SHA-1 HMACs, SHA-1 Kex, CBC, 3DES)

Integrate OpenShift with Active Directory for Authentication

Install and Set Up Active Directory on Windows Server 2025 with LDAPS

How to Join RHEL 8/9/10 to Windows AD with SSSD

Configure SSSD for Windows AD Authentication on Ubuntu 24.04

Containers

Extend OpenShift CoreOS /sysroot Root Filesystem

Monitor Docker Swarm Service Metrics using Grafana

Disaster Recovery in Kubernetes: etcd Backup and Restore with etcdctl and etcdutl

Deploy ELK Stack 8 Cluster on Docker Containers

Kubernetes User Management: Creating Users, Groups and Service Accounts

Installing Minikube on Ubuntu 24.04

Security

Common Mistakes When Using A White Paper Example

Install and Configure Snort 3 NIDS on Ubuntu 20.04

Configure Filebeat-Elasticsearch Authentication

Intercept Malicious File Upload with ModSecurity and ClamAV

How to Integrate ELK Stack with TheHive

Install and Setup OSSEC agent on Ubuntu 18.04/CentOS 7

Monitoring

Visualize WordPress User Activity Logs on ELK Stack

Install and Configure Telegraf on FreeBSD 12

Install and Setup AWStats Log Analyzer on CentOS 8

Install Zabbix Server on Debian 10 Buster

Install Zabbix Agent on Ubuntu 22.04/Debian 11

Configure Logstash Elasticsearch Basic Authentication

© 2025 kifarunix.com

Home Advertise with us Privacy Policy