I’ve written about deploying code to remote servers, SSH keys, and remote user security a few times now. However, it’s been brought to my attention that I’ve never covered some of the basics; namely, how I put all of this together when creating a “deploy” user on a remote Linux system. Well, as the old proverb goes, the best time to plant a tree was 20 years ago, the second best time is now. With that in mind, let’s take the time now to go over the steps used to create a new user on a Linux system to be used solely for code deployments.
We’ve all either had it happen to us, or we’ve been witness to other companies doing it: accidentally sending email blasts from development or staging environments. This article will show you how to easily stop WordPress from sending emails unless you are in the production environment, saving your pride and possibly even your job.
I’ve been using Sage for a little while now to create custom WordPress themes. Sage utilizes technologies like Sass (or Less), Bower, Browsersync, and gulp.js to make designing custom themes much more efficient. The only issue I encountered is that I couldn’t use my typical workflow of deploying code with git, because with gulp.js (as … Continued
With the recent passing of the Cybersecurity Information Sharing Act (CISA) here in the US, concerns over privacy on the Internet have taken center stage again. As most readers probably know already, a VPN is a good way to help protect your privacy online (or is it?). VPN Killswitch is a simple bash script that … Continued
SSH — Secure Shell — is a common method of securely logging into a remote server. First released in the mid 1990’s, it’s estimated that more than 2 million people now use SSH. Over the years, SSH has proven itself to be pretty secure, but by changing some of the default settings and behaviors it … Continued