Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Securing your private network

How to Protect From Identity Theft Online: A Detailed Guide for 2022

How to Protect From Identity Theft Online: A Detailed Guide for 2022

With internet users increasing globally, identity theft numbers are spiking. According to the Federal Trade Commission (FTC), there was a 70% increase in fraud reports

Latest Posts

Integrate Request Tracker (RT) with Active Directory for Authentication

How to Enable Self-Service Password Reset in Request Tracker (RT)

Configure Request Tracker to Send Mails using MSMTP via Gmail Relay

How to Enable HTTPS for Request Tracker on Linux

Install Request Tracker on AlmaLinux/Rocky Linux

Replace OpenShift Self-Signed Ingress and API SSL/TLS Certificates with Lets Encrypt

Containers

How to Deploy Multinode OpenShift Cluster Using UPI/User Provisioned Infrastructure

Install Docker on Rocky Linux 8|9

Install and Use Docker on Debian 10 Buster

Deploy NRPE Agent as a Docker Container

How to Check Docker Container RAM and CPU Usage

What is Kubeconfig File in a Kubernetes Cluster?

Security

Install ClamAV on Debian 11

How to Protect Single User Mode with Password in Ubuntu 18.04

Monitor SSL/TLS Certificate Expiry with Prometheus and Grafana

Create Locally Trusted SSL Certificates with mkcert on Ubuntu 18.04

3 Internet Security Tips for 2022

Install Wazuh Manager with ELK on Debian 12

Monitoring

Install Wazuh Server on Rocky Linux 8/Rocky Linux 9

How to run Multiple Filebeat Instances in Linux

Install and Configure SNMP on Ubuntu 22.04/Debian 11

Install and Configure Tripwire Security Monitoring tool on CentOS 8

Monitor Changes to Critical Files on Windows Systems using Wazuh and ELK

Install Grafana Plugins Behind a Proxy server

© 2025 kifarunix.com

Home Advertise with us Privacy Policy