Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

how to secure Linux systems

When It Comes to Security Don’t Overlook Your Linux Systems

When It Comes to Security, Don’t Overlook Your Linux Systems

There is a general perception that using Linux systems is somehow inherently safer than using macOS or Windows because of its technical nature and the

Latest Posts

Technology powers the expansion of online casinos

Upgrade RHEL 9 to RHEL 10 using LEAPP Tool

Upgrade RHEL 8 to RHEL 9 using LEAPP with Satellite Server Integration

Enable RHEL 10 Repositories in Red Hat Satellite: A Step-by-Step Guide

How to Disable Weak SSH Algorithms on RHEL 8/9/10 (SHA-1 HMACs, SHA-1 Kex, CBC, 3DES)

Integrate OpenShift with Active Directory for Authentication

Containers

Safely Upgrade Kubeadm Kubernetes Cluster: A Step-by-Step Guide

Patch Sudo CVEs 2025-32462 & 2025-32463 using Ansible AWX

Monitor Docker Swarm Service Metrics using Grafana

Quickly Install MySQL 8 on Debian 12

Gracefully Remove Worker Node from Kubernetes Cluster

Mastering Kubernetes Autoscaling: Horizontal vs Vertical Scaling

Security

Install OpenVPN Server on Debian 11/Debian 10

Enable SSH 2-Factor Authentication on Ubuntu 18.04

Install and Configure NAXSI Nginx WAF on Ubuntu 18.04 LTS

Install and Configure Snort 3 on Ubuntu 22.04

Install and Setup Lynis Security Auditing tool on Ubuntu 20.04

Why Creating a Secure Password is Crucial

Monitoring

How to Configure SNMP version 3 on Debian 9

Deploy Nagios NRPE Agents using Ansible

Install Wazuh Agent on pfSense

Install Wazuh Server on Rocky Linux 8/Rocky Linux 9

Install and Configure SNMP on Ubuntu 22.04/Debian 11

Configure Filebeat 8 to Write Logs to Specific Data Stream

© 2025 kifarunix.com

Home Advertise with us Privacy Policy