Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

cybersecurity studies

Studying cybersecurity and gaining the greatest achievements in data protection

Studying cybersecurity and gaining the greatest achievements in data protection

The digital age brings many great opportunities to humanity. But these opportunities never go without challenges. In this case, it goes about cybersecurity threats. How

Latest Posts

Integrate Request Tracker (RT) with Active Directory for Authentication

How to Enable Self-Service Password Reset in Request Tracker (RT)

Configure Request Tracker to Send Mails using MSMTP via Gmail Relay

How to Enable HTTPS for Request Tracker on Linux

Install Request Tracker on AlmaLinux/Rocky Linux

Replace OpenShift Self-Signed Ingress and API SSL/TLS Certificates with Lets Encrypt

Containers

How to Monitor Docker Containers using Nagios

Step-by-Step Tutorial: Install Minikube on Debian 12

How to Use Secrets in Kubernetes Applications

Automate OpenShift Deployments with GitLab CI/CD Pipelines

How to Deploy an Application in a Docker Swarm Cluster

How to Install Docker CE on Debian 12

Security

Install Fleet Osquery Manager on Rocky Linux

Install and Configure OpenVPN Client on CentOS 8/Ubuntu 18.04

How to Setup a Local CA Server on Ubuntu

Install Zeek on Ubuntu 20.04

Install ClamAV on Rocky Linux 8

Cyber Security: 6 Reasons Why It Is Crucial for Your Business

Monitoring

Install Telegraf on Fedora 30/Fedora 29

Install and Setup Prometheus on Ubuntu 20.04

Nagios SNMP Monitoring of Linux Hosts on AlienVault USM/OSSIM

Install Wazuh Server on Rocky Linux 8/Rocky Linux 9

Complete Guide: Configuring Filebeat to Send Logs to Kafka

Install Filebeat on FreeBSD

© 2025 kifarunix.com

Home Advertise with us Privacy Policy