Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Securing your private network

How to Protect From Identity Theft Online: A Detailed Guide for 2022

How to Protect From Identity Theft Online: A Detailed Guide for 2022

With internet users increasing globally, identity theft numbers are spiking. According to the Federal Trade Commission (FTC), there was a 70% increase in fraud reports

Latest Posts

Integrate Request Tracker (RT) with Active Directory for Authentication

How to Enable Self-Service Password Reset in Request Tracker (RT)

Configure Request Tracker to Send Mails using MSMTP via Gmail Relay

How to Enable HTTPS for Request Tracker on Linux

Install Request Tracker on AlmaLinux/Rocky Linux

Replace OpenShift Self-Signed Ingress and API SSL/TLS Certificates with Lets Encrypt

Containers

Setup Highly Available Kubernetes Cluster with Haproxy and Keepalived

How to Install Docker Desktop on Ubuntu 22.04/Ubuntu 20.04

Install and Setup Kubernetes Cluster on RHEL 9

Serverless Computing with Linux on AWS Lambda

Introduction to Kubernetes: What is it and why do you need it?

Deploy a Single Node ELK Stack Cluster on Docker Containers

Security

How to Encrypt Data at Rest on Ceph Cluster OSD

Install LibModsecurity with Apache on Ubuntu 20.04

Get the Most Out of Your Penetration Testing Services: Tips and Tricks

How to Encrypt Files and Folders with eCryptFS on Ubuntu 18.04

How to Use VeraCrypt on Command Line to Encrypt Drives on Ubuntu

Install and Use Nikto Web Scanner on Ubuntu 20.04

Monitoring

Install LibreNMS on Ubuntu 22.04/Ubuntu 20.04

Install Graylog 3.0 on CentOS 7

How to Install Nagios Server on Ubuntu 24.04

Install Grafana Metrics Monitoring Tool on Debian 9

Easily Export Kibana Search Results to CSV/Excel file

Ship System Logs to ELK Stack using Elastic Agents

© 2026 kifarunix.com

Home Advertise with us Privacy Policy