Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

how to secure Linux systems

When It Comes to Security Don’t Overlook Your Linux Systems

When It Comes to Security, Don’t Overlook Your Linux Systems

There is a general perception that using Linux systems is somehow inherently safer than using macOS or Windows because of its technical nature and the

Latest Posts

Quickly Check If Linux System is Using BIOS or UEFI

Shrink Linux Root Filesystem by Migrating to New Disk

Quick Way to Install Gophish on Debian 12

Install Gophish on Ubuntu 22.04

What Should Companies Do To Increase IT Safety

Deploy All-in-One OpenStack with Kolla-Ansible on Ubuntu 22.04

Containers

Deploy Nagios as a Docker Container

Install and Use Docker on Debian 10 Buster

How to Check Docker Container RAM and CPU Usage

Step-by-Step Guide on Deploying an Application on Kubernetes Cluster

Setup Kubernetes Cluster on Ubuntu 22.04/20.04

Introduction to Kubernetes: What is it and why do you need it?

Security

How to Set Up Your Own Proxy

The Role of a Strategic Cybersecurity Strategy in Ensuring Business Continuity

Configure Availability Monitoring on AlienVault USM/OSSIM using Nagios

Install Passbolt Password Manager on Rocky Linux 8

Analyze PCAP Files using Malcolm Network Traffic Analysis tool

Install and Enroll Elastic Agents to Fleet Manager in Linux

Monitoring

Install and Configure Prometheus on Fedora 29/Fedora 28

Install Nagios Plugins on Rocky Linux 8

Install Elastic Stack 7 on Ubuntu 18.04/Debian 9.8

Logstash: Write Specific Events to Specific Index

Installing ELK Stack on CentOS 8

Configure Availability Monitoring on AlienVault USM/OSSIM using Nagios

© 2023 kifarunix.com

Home Advertise with us Privacy Policy