reading-notes

Code Fellows courses Notes

This project is maintained by QamarAlkhatib

API Deployment

Configuring Django Settings: Best Practices

Managing Django Settings: Issues

Different Approaches to Configuration

Without hardcoding Django settings, there is no built-in global mechanism to configure them. However, literature, open-source software, and work initiatives offer numerous suggestions and techniques on how to do it best. Let’s take a look at the most popular ones and see what their flaws and merits are.


SSH Tutorial

SSH stands for Secure Shell. Secure Shell, or SSH, is a remote administration protocol that allows users to administer and modify distant servers via the Internet. The service was designed to be a secure alternative to unencrypted Telnet, and it employs cryptographic techniques to ensure that all communication to and from the remote server is encrypted. It allows you to authenticate a remote user, send inputs from the client to the host, and then relay the output back to the client.

Understanding the Different Types of Encryption

SSH has a significant advantage over its predecessors in that it uses encryption to ensure secure data transit between the host and the client. The host is the remote server you’re trying to connect to, and the client is the machine you’re using to connect to it. SSH makes use of three different encryption technologies:

Authenticating the User

Authenticating the user’s credentials is the final step before the user is permitted access to the server. Most SSH users use a password for this. The user is then prompted to provide their login and password. These credentials are safely transmitted across the symmetrically encrypted tunnel, ensuring that they are not intercepted by a third party.

Despite the fact that passwords are encrypted, they are not recommended for secure connections. Because many bots may simply brute force simple or default passwords to obtain access to your account, this is the case. SSH Key Pairs is the suggested choice instead.

These are a collection of asymmetric keys that can be used to authenticate a user without requiring them to enter a password.