Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

types of online threats

Useful Information You Should Know About Data Privacy

Useful Information You Should Know About Data Privacy

Staying safe online is something that’s becoming increasingly important, but how do you know if your data is really secure? From keeping track of our

Latest Posts

Integrate Request Tracker (RT) with Active Directory for Authentication

How to Enable Self-Service Password Reset in Request Tracker (RT)

Configure Request Tracker to Send Mails using MSMTP via Gmail Relay

How to Enable HTTPS for Request Tracker on Linux

Install Request Tracker on AlmaLinux/Rocky Linux

Replace OpenShift Self-Signed Ingress and API SSL/TLS Certificates with Lets Encrypt

Containers

Install and Run MariaDB as a Docker Container

Kubernetes Resource Optimization with Vertical Pod Autoscaler (VPA)

Install and Use Docker on Debian 10 Buster

Kubernetes User Management: Creating Users, Groups and Service Accounts

Step-by-Step Guide: How to Configure HTPasswd Identity Provider in OpenShift 4.x

Automate Tasks in OpenShift with Kubernetes Jobs and Cron Jobs: A Practical Guide

Security

How to Integrate TheHive with MISP

How to Disable Weak SSH Algorithms on RHEL 8/9/10 (SHA-1 HMACs, SHA-1 Kex, CBC, 3DES)

Install and Use Nikto Web Scanner on Ubuntu 20.04

Install and Setup DVWA on Debian 10

Detect Changes to Critical Files in Linux using Auditbeat and ELK

Configure strongSwan VPN Client on Ubuntu 18.04/CentOS 8

Monitoring

Install Zabbix Agent on Debian 10 Buster

How to Install Prometheus on Debian 12

Install Nagios Plugins From Source RHEL/CentOS/Oracle Linux

Create Squid Logs Extractors on Graylog Server

Install LibreNMS on Rocky Linux

Install ModSecurity with Apache on Ubuntu 22.04

© 2025 kifarunix.com

Home Advertise with us Privacy Policy