Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Securing your private network

How to Protect From Identity Theft Online: A Detailed Guide for 2022

How to Protect From Identity Theft Online: A Detailed Guide for 2022

With internet users increasing globally, identity theft numbers are spiking. According to the Federal Trade Commission (FTC), there was a 70% increase in fraud reports

Latest Posts

How to Install and Configure OpenShift Data Foundation (ODF) on OpenShift 4.20: Step-by-Step Guide [2026]

How to Deploy an OpenShift Cluster Using Agent-Based Installer (Bootable ISO, KVM & Bare Metal)

Integrate Request Tracker (RT) with Active Directory for Authentication

How to Enable Self-Service Password Reset in Request Tracker (RT)

Configure Request Tracker to Send Mails using MSMTP via Gmail Relay

How to Enable HTTPS for Request Tracker on Linux

Containers

Install Fedora CoreOS on KVM Using an ISO File: A Step-by-Step Guide

Why Docker Hardened Images Are a Game-Changer for Software Supply Chain Security

Deploy ELK Stack 8 Cluster on Docker using Ansible

Install Portainer Extension on Docker Desktop

Install and Setup Kubernetes Cluster on RHEL 9

Install Docker on Rocky Linux 8|9

Security

How to Install and Use ClamAV Antivirus on Ubuntu 18.04

Analyze Network Traffic using Zeek

Install and Setup OpenVAS 9 Vulnerability Scanner on Ubuntu 18.04

Assign Static IP Addresses for OpenVPN Clients

Configure CentOS/Rocky/Oracle Linux as a Linux Router

Connect to Cisco VPN Using PCF file on Ubuntu

Monitoring

Install GoAccess on Ubuntu 18.04/Debian 10 Buster

Install Cortex on Ubuntu 22.04/Ubuntu 20.04

Enroll Osquery Hosts on Fleet Manager

Install and Configure SNMP on Debian 10 Buster

Install OSSEC Agent on CentOS 8

Send Windows logs to Elastic Stack using Winlogbeat and Sysmon

© 2026 kifarunix.com

Home Advertise with us Privacy Policy