Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Zero Trust

Top 15 Emerging Technology in Cybersecurity

Top 15 Emerging Technology in Cybersecurity

The need for cybersecurity is at an all-time high as the global corporate environment moves to cloud data storage and online management. With greater internet

Latest Posts

How to Automate OpenShift Builds with Git Webhooks: Step-by-Step Guide

How to Install Gitlab on Rocky Linux 10 with Let’s Encrypt SSL

How to Install Gitlab on AlmaLinux 10 with Let’s Encrypt SSL

How to Deploy Apps on OpenShift Using BuildConfig: A Step-by-Step Guide (2025)

OpenShift Builds and BuildConfig Essentials: A Comprehensive Guide

Automate Windows Server Patching with Ansible AWX: Step-by-Step

Containers

Automate Tasks in OpenShift with Kubernetes Jobs and Cron Jobs: A Practical Guide

Install Portainer on Rocky Linux

Deploy Nagios as a Docker Container

Step-by-Step Tutorial: Install Minikube on Debian 12

Deploy All-in-One OpenStack with Kolla-Ansible on Ubuntu 22.04

How Kubernetes Schedules Pods: A Step-by-Step Guide for Beginners

Security

Install GVM 21.4 on Ubuntu 20.04

Install ClamAV on Rocky Linux 8

Install Kali Linux 2020.3 on VirtualBox

How to Recover Deleted Data on a Linux System

Install FortiClient VPN Client on Ubuntu 20.04/Ubuntu 18.04

Setup OpenVPN Server on Rocky Linux 8

Monitoring

Install OSSEC HIDS Agent on Ubuntu 20.04

Install LibreNMS on Ubuntu 22.04/Ubuntu 20.04

Integrate Suricata with Wazuh for Log Processing

Configure Filebeat 8 to Write Logs to Specific Data Stream

Install Velociraptor Client on Linux and Windows Systems

How to Monitor Remote Linux Hosts and Services with Icinga 2 on Ubuntu 18.04

© 2025 kifarunix.com

Home Advertise with us Privacy Policy