Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Linux VPN

When It Comes to Security Don’t Overlook Your Linux Systems

When It Comes to Security, Don’t Overlook Your Linux Systems

There is a general perception that using Linux systems is somehow inherently safer than using macOS or Windows because of its technical nature and the

Latest Posts

Integrate Request Tracker (RT) with Active Directory for Authentication

How to Enable Self-Service Password Reset in Request Tracker (RT)

Configure Request Tracker to Send Mails using MSMTP via Gmail Relay

How to Enable HTTPS for Request Tracker on Linux

Install Request Tracker on AlmaLinux/Rocky Linux

Replace OpenShift Self-Signed Ingress and API SSL/TLS Certificates with Lets Encrypt

Containers

How to Install Docker Resource Usage Extension

Install Portainer on Debian 11/Debian 10

How to Setup Three Node Docker Swarm Cluster on Ubuntu 22.04

Understanding Kubernetes States: Declared vs Observed states Explained

How to Deploy Multinode OpenShift Cluster Using UPI/User Provisioned Infrastructure

Extend OpenShift CoreOS /sysroot Root Filesystem

Security

Install and use ClamAV on Ubuntu 20.04

Install ModSecurity 3 with Nginx on Ubuntu 22.04

Install and Use Nikto Web Scanner on Ubuntu 18.04

Install and Setup Pritunl VPN Server on Debian

6 Tools That Can Help Protect Your Sensitive Business Information

Process and Visualize ModSecurity Logs on ELK Stack

Monitoring

Install Zabbix Agent on Windows Systems

Install Nagios Plugins and NRPE agents on CentOS 7/RHEL 7/Fedora 29

Install Zabbix Agent on FreeBSD 12

Restore Elasticsearch Snapshot to another Cluster

Deploy ELK Stack 8 Cluster on Docker Containers

Configure ELK Stack Alerting with ElastAlert

© 2025 kifarunix.com

Home Advertise with us Privacy Policy