Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Linux VPN

When It Comes to Security Don’t Overlook Your Linux Systems

When It Comes to Security, Don’t Overlook Your Linux Systems

There is a general perception that using Linux systems is somehow inherently safer than using macOS or Windows because of its technical nature and the

Latest Posts

Integrate Request Tracker (RT) with Active Directory for Authentication

How to Enable Self-Service Password Reset in Request Tracker (RT)

Configure Request Tracker to Send Mails using MSMTP via Gmail Relay

How to Enable HTTPS for Request Tracker on Linux

Install Request Tracker on AlmaLinux/Rocky Linux

Replace OpenShift Self-Signed Ingress and API SSL/TLS Certificates with Lets Encrypt

Containers

Install and Use Docker on Debian 10 Buster

Install Docker on Rocky Linux 8|9

Kubernetes Pod Management: Static Pods vs Mirror Pods vs DaemonSets

Provision Block Storage for Kubernetes on Rook Ceph Cluster

Kubernetes User Management: Creating Users, Groups and Service Accounts

Step-by-Step Guide: How to Configure HTPasswd Identity Provider in OpenShift 4.x

Security

Install Nagios NRPE Agent on RHEL/CentOS/Oracle Linux

Import Saved Passwords From Firefox to Chrome on Ubuntu 18.04

Install and Setup Suricata on Ubuntu 22.04/Ubuntu 20.04

Install LibModsecurity with Apache on Fedora 30/29/CentOS 7

Why Cybersecurity Investments Are Non-Negotiable for Modern Businesses

Detect Changes to Critical Files in Linux using Auditbeat and ELK

Monitoring

Install and Configure Telegraf on FreeBSD 12

Create Custom ELK Ingest Pipeline for Custom Log Processing

Install Elasticsearch 7.x on Ubuntu 18.04/Debian 9.8

Install Nagios Plugins on CentOS 8

Install Zabbix Server on Debian 10 Buster

How to Install Monitorix on CentOS 8

© 2025 kifarunix.com

Home Advertise with us Privacy Policy