Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Securing your private network

How to Protect From Identity Theft Online: A Detailed Guide for 2022

How to Protect From Identity Theft Online: A Detailed Guide for 2022

With internet users increasing globally, identity theft numbers are spiking. According to the Federal Trade Commission (FTC), there was a 70% increase in fraud reports

Latest Posts

Why Docker Hardened Images Are a Game-Changer for Software Supply Chain Security

Automate Tasks in OpenShift with Kubernetes Jobs and Cron Jobs: A Practical Guide

How to Setup Multinode Elasticsearch 9 Cluster

Install Filebeat 9 on Ubuntu/Debian

Install Logstash 9 on Ubuntu/Debian

Install ELK Stack 9.x on Ubuntu 24.04

Containers

Disaster Recovery in Kubernetes: etcd Backup and Restore with etcdctl and etcdutl

Install and Run MariaDB as a Docker Container

Kubernetes Nodes Maintenance: Drain vs. Cordon Demystified

Kubernetes Kustomize 101: Introduction and Basics

Introduction to Kubernetes: What is it and why do you need it?

Install Portainer on Debian 11/Debian 10

Security

Install Greenbone Vulnerability Management (GVM) on Debian 12

Install and Configure Squid Proxy on Rocky Linux 8

Website Security Testing: What Is It and Why Is It Important?

Install and Setup VeraCrypt on Ubuntu 22.04/Ubuntu 20.04

Install Linux Malware Detect on Ubuntu 22.04/Ubuntu 20.04

Install VeraCrypt on Debian 11

Monitoring

Install Cortex on Ubuntu 22.04/Ubuntu 20.04

How to Easily Enable and Configure Cortex Analyzers

Monitor Docker Swarm and Container metrics using Metricbeat

Install Wazuh Agent on pfSense

Install and Setup Prometheus on Ubuntu 20.04

Monitor Windows System Metrics using Sensu

© 2025 kifarunix.com

Home Advertise with us Privacy Policy