Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Linux malware

When It Comes to Security Don’t Overlook Your Linux Systems

When It Comes to Security, Don’t Overlook Your Linux Systems

There is a general perception that using Linux systems is somehow inherently safer than using macOS or Windows because of its technical nature and the

Latest Posts

How to Deploy an OpenShift Cluster Using Agent-Based Installer (Bootable ISO, KVM & Bare Metal)

Integrate Request Tracker (RT) with Active Directory for Authentication

How to Enable Self-Service Password Reset in Request Tracker (RT)

Configure Request Tracker to Send Mails using MSMTP via Gmail Relay

How to Enable HTTPS for Request Tracker on Linux

Install Request Tracker on AlmaLinux/Rocky Linux

Containers

Install and Setup Kubernetes Cluster on RHEL 9

Kubernetes User Management: Creating Users, Groups and Service Accounts

Install Portainer on Debian 11/Debian 10

How to Automate OpenShift Builds with Git Webhooks: Step-by-Step Guide

Install and Use Docker on Debian 10 Buster

StatefulSets in Kubernetes: Everything You Need to Know

Security

Configure Filebeat-Elasticsearch Authentication

Integrate sysPass with OpenLDAP for Authentication

Install Arkime Full Packet Capture tool on Ubuntu

Install and Setup Squid Proxy on Ubuntu 20.04

Configure IPSEC VPN using StrongSwan on Ubuntu 18.04

Install Velociraptor Client on Linux and Windows Systems

Monitoring

Install Prometheus on Ubuntu 18.04

How to Install NSClient Nagios Monitoring Agent on Windows System

Configure Filebeat 8 to Write Logs to Specific Index

Enroll Osquery Hosts on Fleet Manager

Install MISP on Ubuntu 24.04/Ubuntu 22.04/Ubuntu 20.04

Install Osquery on Rocky Linux 8

© 2026 kifarunix.com

Home Advertise with us Privacy Policy