Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Securing your private network

How to Protect From Identity Theft Online: A Detailed Guide for 2022

How to Protect From Identity Theft Online: A Detailed Guide for 2022

With internet users increasing globally, identity theft numbers are spiking. According to the Federal Trade Commission (FTC), there was a 70% increase in fraud reports

Latest Posts

How to Install NoMachine on AlmaLinux 10

Install NoMachine on Rocky Linux 10

Install and Configure xrdp Server on AlmaLinux 10

Automate OpenShift Deployments with GitLab CI/CD Pipelines

How to Automate OpenShift Builds with Git Webhooks: Step-by-Step Guide

How to Install Gitlab on Rocky Linux 10 with Let’s Encrypt SSL

Containers

Monitor Docker Swarm and Container metrics using Metricbeat

Gracefully Remove Worker Node from Kubernetes Cluster

Step-by-Step Guide: How to Install Helm on Kubernetes Cluster

Automate Tasks in OpenShift with Kubernetes Jobs and Cron Jobs: A Practical Guide

How to Install Docker Desktop on Ubuntu 22.04/Ubuntu 20.04

Step-by-Step Tutorial: Install Minikube on Debian 12

Security

Enforce Password Complexity Policy On Ubuntu 18.04

Install and Setup Squid Proxy on pfSense

The Benefits & Risks of Using Website Encryption

Top Ways To Raise Cybersecurity Awareness In Your Business

How to Add and Scan a Target for Vulnerabilities on OpenVAS Scanner

Configure Filebeat-Elasticsearch Authentication

Monitoring

Monitor SSL/TLS Certificate Expiry with Prometheus and Grafana

How to Integrate TheHive with MISP

Forward Apache Logs to Central Log Server with Rsyslog

Add Hosts to Nagios Server For Monitoring

Install Zabbix Agent on Debian 10 Buster

Install ELK Stack on Debian 11

© 2025 kifarunix.com

Home Advertise with us Privacy Policy