Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Securing your private network

How to Protect From Identity Theft Online: A Detailed Guide for 2022

How to Protect From Identity Theft Online: A Detailed Guide for 2022

With internet users increasing globally, identity theft numbers are spiking. According to the Federal Trade Commission (FTC), there was a 70% increase in fraud reports

Latest Posts

Automate RHEL OS Upgrades using Ansible infra.leapp Playbooks

Technology powers the expansion of online casinos

Upgrade RHEL 9 to RHEL 10 using LEAPP Tool

Upgrade RHEL 8 to RHEL 9 using LEAPP with Satellite Server Integration

Enable RHEL 10 Repositories in Red Hat Satellite: A Step-by-Step Guide

How to Disable Weak SSH Algorithms on RHEL 8/9/10 (SHA-1 HMACs, SHA-1 Kex, CBC, 3DES)

Containers

How to Use Secrets in Kubernetes Applications

How to Integrate MinIO S3 Storage with Kubernetes/OpenShift

Install Dozzle Real-Time Log Viewer for Docker Containers on Ubuntu

Quickly Install MySQL 8 on Debian 12

Install Docker on Rocky Linux 8|9

Install and Setup Kubernetes Cluster on RHEL 9

Security

Configure IPSEC VPN using StrongSwan on Ubuntu 18.04

Integrate Portainer with OpenLDAP for Authentication

Install and Configure AlienVault OSSIM on VirtualBox

How to Install and Configure DVWA Lab on Ubuntu 18.04 server

Install and Setup Velociraptor on Ubuntu 18.04

Install OSSEC Agent on Debian 10 Buster

Monitoring

Deploy Nagios as a Docker Container

Configure Filebeat-Elasticsearch Authentication

Install Zabbix Agent on Debian 10 Buster

Install Fleet Osquery Manager on Ubuntu 20.04/Ubuntu 22.04

Monitor Linux System Metrics with Prometheus Node Exporter

Install Grafana on Ubuntu 22.04/20.04/18.04

© 2025 kifarunix.com

Home Advertise with us Privacy Policy