Featured

How to Secure Passwords with Specops Password Policy

Learn how to install, configure, and create Specops Password Policy to start protecting your Active Directory user passwords.

June Castillote Avatar June Castillote

14 min. read

How to Build a Terraform Module Example

Learn to build a Terraform module to manage increasingly complex configurations by going through a Terraform module example in this step-by-step tutorial!

Michael Thanh Avatar Michael Thanh

7 min. read

Exploring Processes and Applications with 1E Tachyon

Learn to use the PowerShell and Tachyon integration to solve a specific use-case scenario.

Adam Bertram Avatar Adam Bertram

6 min. read

How to Execute Directives with the Ansible Command Module

Learn how to execute directives to perform different tasks individually or simultaneously with the Ansible command module in this tutorial!

Edem Avatar Edem

8 min. read

How to Secure Passwords with Specops Password Policy

Learn how to install, configure, and create Specops Password Policy to start protecting your Active Directory user passwords.

June Castillote Avatar June Castillote

14 min. read

How to Install Jenkins CI/CD in Ubuntu Linux

Learn how to install Jenkins CI/CD in Ubuntu Linux to start utilizing pipelines and automation in this step-by-step tutorial!

Shanky Avatar Shanky

7 min. read

How To Set Up WireGuard VPN on Linux

Learn how to set up WireGuard VPN on Linux to securely connect and access your network, in this step-by-step tutorial!

Nicholas Xuan Nguyen Avatar Nicholas Xuan Nguyen

8 min. read

How to Secure a Linux Firewall With IPTables Rules

Secure your vulnerable Ubuntu Linux system with powerful firewall IPTables rules in this step-by-step how-to tutorial!

Nicholas Xuan Nguyen Avatar Nicholas Xuan Nguyen

9 min. read

Disk2Vhd: Learn to convert Physical Machines to Virtual Disks

Learn to convert running physical machines with Microsoft Sysinternals Disk2VHD in this practical how-to tutorial!

Edem Avatar Edem

7 min. read

Configuring Suricata as an Intrusion Prevention System (IPS)

Learn how to configure Suricata IPS to detect and prevent suspicious activities on your network with this step-by-step tutorial!

Nicholas Xuan Nguyen Avatar Nicholas Xuan Nguyen

8 min. read

How To Manage Logfiles with Logrotate in Linux

Learn how to effectively manage, control, and tame logfiles with Logrotate in Linux with this step-by-step tutorial!

Nalty Lam Avatar Nalty Lam

7 min. read

Learning Identity and Access Management (IAM) AWS Through Examples

Learn the fundamentals of managing user permissions with IAM in AWS in this step-by-step tutorial!

Nicholas Xuan Nguyen Avatar Nicholas Xuan Nguyen

11 min. read

Getting Started with MicroK8s on Ubuntu

Looking for lightweight, fast, and highly-available Kubernetes? In this tutorial learn to install MicroK8s on Ubuntu!

Joseph Eshiett Avatar Joseph Eshiett

6 min. read

How to Manage Virtual Machines With Ansible EC2 AWS Module

Learn how to manage multiple virtual machines, like AWS EC2 instances with the Ansible EC2 AWS module in this tutorial!

Shanky Avatar Shanky

7 min. read

Understanding and Configuring the GRUB Linux Bootloader

Learn what Ubuntu GRUB is, how the booting process works, and dive into several helpful GRUB configurations in this ATA tutorial!

Shanky Avatar Shanky

7 min. read

How To Deploy a Python Flask API Application on Docker

Quickly need to deploy a Python API application? Learn how to deploy a Python Flask API application via Docker in this step-by-step tutorial!

Shanky Avatar Shanky

6 min. read

Learning Ubuntu Apt Get Through Examples

Switched to Linux, but not sure how to install or remove software packages? Learn how to run Ubuntu apt-get commands to manage software packages!

Chaitanya Avatar Chaitanya

6 min. read

How To Secure SSH with Fail2Ban

Stop worrying about brute-force attacks on your server. Learn how Fail2Ban secures SSH on your server in this step-by-step tutorial!

Nicholas Xuan Nguyen Avatar Nicholas Xuan Nguyen

8 min. read

How To Set Up the UFW Firewall on Linux

Learn how to set up the UWF firewall on Linux and configure firewall rules to either allow or block connections on your network in this tutorial!

Nicholas Xuan Nguyen Avatar Nicholas Xuan Nguyen

8 min. read

How to Perform a Secure Redis Install on Linux

Learn how to do the Redis install then secure your Redis server with a password, and set up a firewall in this step-by-step tutorial!

Nicholas Xuan Nguyen Avatar Nicholas Xuan Nguyen

9 min. read

How to Create a Jenkins CI CD Pipeline

Learn how to implement a Jenkins CI CD pipeline to significantly improve and automate your software development process!

Uzma Younas Avatar Uzma Younas

6 min. read

Subscribe to Stay in Touch

Never miss out on your favorite ATA posts and our latest announcements!