Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Securing your private network

How to Protect From Identity Theft Online: A Detailed Guide for 2022

How to Protect From Identity Theft Online: A Detailed Guide for 2022

With internet users increasing globally, identity theft numbers are spiking. According to the Federal Trade Commission (FTC), there was a 70% increase in fraud reports

Latest Posts

How to Automate OpenShift Builds with Git Webhooks: Step-by-Step Guide

How to Install Gitlab on Rocky Linux 10 with Let’s Encrypt SSL

How to Install Gitlab on AlmaLinux 10 with Let’s Encrypt SSL

How to Deploy Apps on OpenShift Using BuildConfig: A Step-by-Step Guide (2025)

OpenShift Builds and BuildConfig Essentials: A Comprehensive Guide

Automate Windows Server Patching with Ansible AWX: Step-by-Step

Containers

How to Install Docker Desktop on Ubuntu 22.04/Ubuntu 20.04

Install and Setup Kubernetes Cluster on Ubuntu 24.04

Install and Use Docker CE on CentOS 8

Install Docker on Rocky Linux 8|9

Step-by-Step Guide on Deploying an Application on Kubernetes Cluster

How to Integrate MinIO S3 Storage with Kubernetes/OpenShift

Security

Install and Configure Squid Proxy on Fedora 29/Fedora 28/CentOS 7

Install GVM 21.4 on Ubuntu 20.04

Install and Setup VeraCrypt on Rocky Linux

Install and Setup OSSEC agent on Ubuntu 18.04/CentOS 7

Install Wazuh Server on Rocky Linux 8/Rocky Linux 9

Enable HTTPS Connection Between Elasticsearch Nodes

Monitoring

Complete Guide: Configuring Filebeat to Send Logs to Kafka

Monitor Linux System Metrics with ELK Stack

Install ELK Stack on Debian 11

Delete Specific Records from Elasticsearch Index

Enroll Windows Systems into Osquery Fleet Manager

Install and Setup Nagios Core on Ubuntu 20.04

© 2025 kifarunix.com

Home Advertise with us Privacy Policy