Dive into Docker takes you from "What is Docker?" to confidently applying Docker to your own projects. It's packed with best practices and examples. Start Learning Docker →
We'll go over signing commits and tags with a GPG key along with sending and receiving GPG public keys to a Keyserver for verification.
We'll go over how to create, edit, set a passphrase, revoke, export, backup and restore a GPG key pair.
Turns out you can't set a custom webhook API version through Stripe's web UI as of Nov 2020, but here's how to do it through their API.
Vim's spell check is quite powerful on its own but we'll also go over using a plugin to make it easy to see your typos in 1 spot.
Vim makes it kind of easy to add unwanted characters like :w to files you're editing. Let's go over how to find them.
This is specific to using Docker Compose on a single server deploy. Here's how I arrived at this choice after years of experimenting.
This panned out over the last 11 months of running a podcast where I chatted with folks about tech stacks, lessons learned and best tips.
Topics were covered such as using the command line, terminals, shells, scripting, aliases, prompt, history, tmux, Vim, dotfiles and more.
In this video we'll add a few lines to our vimrc file so we can easily cycle between slides. We'll use Goyo too, but that's optional.
In this video we'll pipe together twarc, jq, sed, sort and head to pick a random reply from a tweet. This could be useful for contests.
In this video we'll go over how you can use this tool to test your app's webhooks but you can use it for other things too.
In this video, we'll go over how to generate a password of custom length with at least 1 uppercase / special char and 1 number.
In this video we'll go over how I use Fern to view and manipulate files in Vim. It's extremely fast and supports marking multiple files.
I received an interesting email where I thought an elaborate phishing attempt was going to take place, but it turns out it was DNS again.
In this video, we'll go over both backing up and restoring a database with a few lines of shell scripting and 2 cron jobs.
In this video, we'll use AWS Rekognition to identify driver's licenses using machine learning but without having to write any ML code.
In this video, we'll update the config files of a few tools using a combination of shell scripting, grep and perl.
In this video, we'll go over both the why and how to set up a number of web app servers to log to stdout.
In this video, we'll use the mountpoint command to check if a directory is mounted and improve a backup script to use it.
In this video, we'll identify and go over how to fix 3 different WSL 2 issues that'll likely cause you trouble over time.
Like you, I'm super protective of my inbox, so don't worry about getting spammed. You can expect a few emails per month (at most), and you can 1-click unsubscribe at any time. See what else you'll get too.