I regularly need to find out which queries are being executed while debugging or investigating application performance. I used to configure MySQL to log into a file and then search the output to see what’s happening.
I recently ran into a problem when testing a website locally using an existing domain name. After adding the domain name to my hosts file and setting up a self-generated certificate, I was suprised to see that I could not ignore the expected certificate warnings.
In certain situations you might need to restrict access to your web application based on the request method. Maybe because the method isn’t implemented, or you need to deny certain actions as part of your security policy.
As a system administrator or web developer, you are using SSH daily to log in to your servers. If you only manage a handful of machines, you might be keeping track of their connection details in a text file or wiki entry.