Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Studying cybersecurity and gaining the greatest achievements in data protection

Studying cybersecurity and gaining the greatest achievements in data protection

Studying cybersecurity and gaining the greatest achievements in data protection

The digital age brings many great opportunities to humanity. But these opportunities never go without challenges. In this case, it goes about cybersecurity threats. How

Latest Posts

Integrate Request Tracker (RT) with Active Directory for Authentication

How to Enable Self-Service Password Reset in Request Tracker (RT)

Configure Request Tracker to Send Mails using MSMTP via Gmail Relay

How to Enable HTTPS for Request Tracker on Linux

Install Request Tracker on AlmaLinux/Rocky Linux

Replace OpenShift Self-Signed Ingress and API SSL/TLS Certificates with Lets Encrypt

Containers

How to Use Secrets in Kubernetes Applications

Integrate OpenShift with Active Directory for Authentication

Install and Setup Kubernetes Cluster on Ubuntu 24.04

Kubernetes Pod Management: Static Pods vs Mirror Pods vs DaemonSets

How to Monitor Docker Containers using Nagios

Kubernetes Kustomize 101: Introduction and Basics

Security

Install ModSecurity with Apache on Ubuntu 22.04

How to Enable Basic Authentication on ELK Stack

Install WireGuard VPN Server on Rocky Linux

How to Install and Configure Nessus Scanner on Ubuntu 18.04/CentOS 7

Integrate Request Tracker (RT) with Active Directory for Authentication

Install Zeek on Ubuntu 20.04

Monitoring

How to Install Grafana on Ubuntu 24.04

Install MISP on Ubuntu 24.04/Ubuntu 22.04/Ubuntu 20.04

Configure ELK Stack Alerting with ElastAlert

How to Monitor Linux System Metrics using Sensu

Install Wazuh Server on Rocky Linux 8/Rocky Linux 9

Easily Install and Setup Cacti on Ubuntu 20.04

© 2025 kifarunix.com

Home Advertise with us Privacy Policy