SSH is the most valuable tool to manage your servers. As you already know, SSH allows you to remotely connect to your server and access a shell. With the power SSH possess, it’s important to protect SSH to ensure the only trusted people are able to connect. This post will go through the SSH configuration settings that need to be modified to help protect your server. Editing SSHD Configuration Files To prevent this tutorial from repeating itself too frequently, here is an overview of how to edit the /etc/ssh/sshd_config file.
Creating an envelope is most office suites only requires you to dive one or two levels into a menu. As for Google Drive, this just isn’t the case. It’s possible to change a Google Drive document’s page setup by navigating to “File - Page Setup”, but there are only eleven predefined paper formats you can choose from. To change the actual dimensions of the Google Drive document, you need to use a Google Apps Script that changes the documents dimensions.
Uploading website files routinely can become a chore, and no one wants that. Queue a deployment script, at the very least, it’s a script that uploads files to the server, but can be as advanced as verifying files once uploaded, run code tests, and update database structures along. There are two different methods to run a deployment script. First being automated deployment with continuous integration systems to a staging or production servers.
Below you will learn how to configure Nginx to stop logging sensitive information and help protect the privacy of your users along with protect authorization keys and query strings from being logged. Each section below outlines how to stop logging a specific page or piece of information. Multiple sections below can be combined to fully customize how you log visitors to your website. Basics to Nginx Log Options Before actually modifying any configuration files, here is an overview of the Nginx log options we will be using.