Curl is a fantastic tool for making web requests from the command line. As a developer, I find this tool particularly useful. Retrieve Content at a URL curl https://salferrarello.com/ Making a HEAD Call Sometimes, we want to see the Header Values returned from a URL using the HEAD. The HTTP HEAD method requests the headers […]
When working with Git on the command line, I spend a lot of time switching back and forth between two branches. Even with Git tab completion, it is a lot of typing. However Git has a shortcut for the previous branch, a single dash (-).
When creating 301 redirects, I often want to check multiple URLs quickly from the command line (to avoid the manual clicking in the browser and browser caching of results). I’ve written this script to speed up my process.
When faced with a folder full of gzipped files, I found I was unable to use my usual go to program grep to search for text in the files. However, zgrep came to my rescue.
You can look up the name servers associated with a domain name using either “whois” or “dig NS”. In some rare occasions, I have gotten back two different answers using these two techniques. In my experience, “dig NS” is the more trustworthy of the two.
Using SSH keys allows greater security than a password when remoting into a machine, using SFTP, or WP CLI on a remote machine – however, they do require more work to setup. For security reasons, I generate a new key pair for each site I work on. To generate a new key pair I do the following.
When working on my Mac, sometimes I find a process in Activity Monitor and I want to know what application the process belongs to. I was introduced to this command to do just that.
These are my reminder notes on how to quickly populate the LICENSE information for one of my projects from the command line.
There are lots of ways to target a git commit and one way that I often forget to use (but really like it when I remember) is targeting a specific git commit by the commit message.
The checksum is like a fingerprint for the file. A file is processed through a known algorithm which results in the checksum, a.k.a “hash”, which is a string of letters and numbers unique to that file, e.g. 8ab686eafeb1f44702738c8b0f24f2567c36da6d. If the file is modified, the resulting checksum will be different. This allows a quick way to […]