Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Securing your private network

How to Protect From Identity Theft Online: A Detailed Guide for 2022

How to Protect From Identity Theft Online: A Detailed Guide for 2022

With internet users increasing globally, identity theft numbers are spiking. According to the Federal Trade Commission (FTC), there was a 70% increase in fraud reports

Latest Posts

How to Install NoMachine on AlmaLinux 10

Install NoMachine on Rocky Linux 10

Install and Configure xrdp Server on AlmaLinux 10

Automate OpenShift Deployments with GitLab CI/CD Pipelines

How to Automate OpenShift Builds with Git Webhooks: Step-by-Step Guide

How to Install Gitlab on Rocky Linux 10 with Let’s Encrypt SSL

Containers

Setup Kubernetes Cluster on Ubuntu 22.04/20.04

How to Install Docker on Ubuntu 24.04

Setup Portainer with SSL Certificates

How to Use Secrets in Kubernetes Applications

Deploy HAProxy as a Docker Container

Introduction to Role-Based Access Control (RBAC) in Kubernetes

Security

Setup IPSec VPN server with Libreswan on Rocky Linux

How to Increase Your Security With the Help of Advanced Tech Solutions

Encrypt Emails using Enigmail on Thunderbird

Configure strongSwan VPN Client on Ubuntu 18.04/CentOS 8

Fix AlienVault HIDS Events Displaying 0.0.0.0 as IP Address

Easily Install FortiClient VPN on Oracle Linux

Monitoring

Install and Configure NXLog CE on Ubuntu 20.04

Install Zabbix Server on Rocky Linux

How to Enable Basic Authentication on ELK Stack

Monitor Squid logs with Grafana and Graylog

Add Hosts to Nagios Server For Monitoring

Monitoring Gitlab Metrics with Prometheus and Grafana

© 2025 kifarunix.com

Home Advertise with us Privacy Policy