Tips & Tricks

Our products pack a punch when it comes to features and it would be easy to miss some of them. Here we post helpful tips & tricks about how to use our products & services.

Displaying posts 1 - 12 of 29 in total

Deploying Your Code with DeployHQ: A Beginner's Guide

Posted on Monday on the DeployHQ blog

So, you've written some amazing code and you're ready to share it with the world?Great! Let's dive into how to deploy it effortlessly using DeployHQ. Even if you're new to deployment, don't worry - we'll break it down step-by-step.

5 Ways to Create SSH Keys from the Command Line for DeployHQ

Posted 16 days ago on the DeployHQ blog

SSH keys are essential for securely connecting to your servers. DeployHQ allows you to upload custom SSH keys to manage your deployments. In this blog post, we'll explore 5 different ways to create SSH keys from the command line, each with its own algorithm and configuration options.

Mastering Git Deployments with DeployHQ: A Comprehensive Guide

Posted on the 29th July on the DeployHQ blog

Git has revolutionized the way we manage code, and DeployHQ is here to make the deployment process as smooth as possible. In this guide, we'll explore the different ways to deploy your Git projects using DeployHQ, from the intuitive GUI to powerful API integrations and seamless GitHub Actions workflows.

Deploying your PHP site with DeployHQ

Posted in May 2023 on the DeployHQ blog

One of the most common technologies used on the web today, and for the past few decades, is PHP, or as it was originally known, Personal Home Page. Now, it's...

Using DeployHQ with Shared Hosting providers

Posted in March 2023 on the DeployHQ blog

DeployHQ has always been flexible and easy to use with a variety of different servers, with support available for FTP, SSH/SFTP, and other proprietary services and protocols such as AWS...

Keeping your DeployHQ account secure

Posted in January 2023 on the DeployHQ blog

DeployHQ offers many security configuration options for your account, such as enforcing two factor authentication, IP restricted access, and granular user restrictions.