Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Linux malware

When It Comes to Security Don’t Overlook Your Linux Systems

When It Comes to Security, Don’t Overlook Your Linux Systems

There is a general perception that using Linux systems is somehow inherently safer than using macOS or Windows because of its technical nature and the

Latest Posts

Integrate Request Tracker (RT) with Active Directory for Authentication

How to Enable Self-Service Password Reset in Request Tracker (RT)

Configure Request Tracker to Send Mails using MSMTP via Gmail Relay

How to Enable HTTPS for Request Tracker on Linux

Install Request Tracker on AlmaLinux/Rocky Linux

Replace OpenShift Self-Signed Ingress and API SSL/TLS Certificates with Lets Encrypt

Containers

How to Upgrade OpenShift Cluster: Seamless Steps for Success

How to Install Docker Resource Usage Extension

Kubernetes User Management: Creating Users, Groups and Service Accounts

Patch Sudo CVEs 2025-32462 & 2025-32463 using Ansible AWX

Mastering Kubernetes Autoscaling: Horizontal vs Vertical Scaling

Understanding Deployments in Kubernetes: A Comprehensive Guide

Security

Enable SSH 2-Factor Authentication on Ubuntu 18.04

Install and Configure AlienVault OSSIM on VirtualBox

Install Cortex on Ubuntu 22.04/Ubuntu 20.04

Quick Way to Enable Kibana HTTPS Connection

Process ModSecurity Logs using Wazuh

Install and setup GVM 20.08 on Debian 10

Monitoring

Install Nagios NRPE Agents on Ubuntu 22.04/Ubuntu 20.04

Install Wazuh Manager with ELK on Debian 12

How to Copy Kibana Dashboard to Another Kibana Space

How to Measure CPU Usage in Linux

Configure ELK Stack Alerting with ElastAlert

Full Automation of Nagios Monitoring Setup with Ansible

© 2026 kifarunix.com

Home Advertise with us Privacy Policy