Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

cybersecurity studies

Studying cybersecurity and gaining the greatest achievements in data protection

Studying cybersecurity and gaining the greatest achievements in data protection

The digital age brings many great opportunities to humanity. But these opportunities never go without challenges. In this case, it goes about cybersecurity threats. How

Latest Posts

Integrate Request Tracker (RT) with Active Directory for Authentication

How to Enable Self-Service Password Reset in Request Tracker (RT)

Configure Request Tracker to Send Mails using MSMTP via Gmail Relay

How to Enable HTTPS for Request Tracker on Linux

Install Request Tracker on AlmaLinux/Rocky Linux

Replace OpenShift Self-Signed Ingress and API SSL/TLS Certificates with Lets Encrypt

Containers

Install Kubernetes Metrics Server on a Kubernetes Cluster

Connect to Remote Docker Environment on Docker Desktop

How to Use Secrets in Kubernetes Applications

Safely Upgrade Kubeadm Kubernetes Cluster: A Step-by-Step Guide

How to Install Docker Desktop on Kali Linux

Easy Way to Install Kubernetes Dashboard on Ubuntu 22.04/20.04

Security

Install OpenVPN Server on Debian 11/Debian 10

Quick Guide: Configure Apache Kafka SSL/TLS Encryption for Enhanced Security

Creating Custom Nessus Scan Policy Templates

How to Automate eCryptfs Mounting Procedure

How to Enable HTTPS for Request Tracker on Linux

How to Install and Configure Nessus Scanner on Ubuntu 18.04/CentOS 7

Monitoring

Quick Way to Install and Configure SNMP on Ubuntu 20.04

Monitor Docker Containers Metrics using Grafana

Enable Rsyslog Logging on Debian 12

Install Monitorix on Ubuntu 20.04

Install Nagios Plugins on CentOS 8

How to Monitor Docker Containers using Nagios

© 2025 kifarunix.com

Home Advertise with us Privacy Policy