Utilizing Security Features in SSH
Securely manage remote systems by making use of the full set of security features SSH has to offer, including strong encryption algorithms, ssh agents, two-factor authentication, and more.
Securely manage remote systems by making use of the full set of security features SSH has to offer, including strong encryption algorithms, ssh agents, two-factor authentication, and more.
From firewalls, to user privileges, to access controls — this talk will not only explain the how, but also dive into the why of common security practices.
We all love Python, but not everyone is fortunate enough to use it at their day job. Come and listen as I detail the journey I took to establish Python as an onroad option at my company. Viewers will leave having learned from my experiences—both successes and mistakes—and with a solid plan for implementing Python at their job.
Secure your Droplet from malicious actors attempting to compromise your systems. This talk will cover the foundations of securing your droplet, protecting your users, and keeping your data safe.
While trying to cascade deletes of Droplets when I delete the parent Class they
would have been associated with in DigitalOcean Classroom, I attempted to
overwrite the delete
method. This only works part of the time, so I instead
turned to signals, specifically the post_delete
signal. Now no matter what
triggers the delete on the Class, my Droplets are cleaned up and deleted from
my account. I plan to use signals more for the creation process as well.
@receiver(post_delete, sender=Droplet)
def droplet_delete(sender, instance, using, **kwargs):
droplet = digitalocean.Droplet(token=settings.DO_TOKEN, id=instance.droplet_id)
try:
droplet.destroy()
except NotFoundError:
pass
Today I wanted to check if a page on this site was a TIL page and modify the list to not include a link if it was. To do this I used conditional statements in Hugo to check for equivalency.
{{ if eq .Type "TIL"}}
An overview of the history and fundamentals of computer security. Explore security best practices, policies, the different threats you might face, and common resources you can use to keep your infrastructure safe.
On my business card, I am a Developer Advocate. In my mind, I am an engineer. But in my heart, I am a teacher