Month: May 2019
How to create and use Linux aliases
Source : https://alvinalexander.com/blog/post/linux-unix/create-aliases Unix/Linux aliases FAQ: Can you share some example of the Linux alias command, as well as some alias command examples? Using Linux aliases Aliases in Unix and Linux operating systems are cool. They let you define your own commands, or command […]
procSpy : Python tool that monitors and logs user-run commands on a Linux system
To download and install, please visit the link below: https://github.com/itsKindred/procSpy DISCLAIMER: This tool is still in VERY early stages of development. Please contact me on twitter @kindredsec if you have any questions/concerns/requests. I will continue adding onto this project for the […]
How to identify duplicate files on Linux
Source : https://www.networkworld.com/article/3387961/how-to-identify-duplicate-files-on-linux.amp.html Some files on a Linux system can appear in more than one location. Follow these instructions to find and identify these “identical twins” and learn why hard links can be so advantageous. Identifying files that share disk space relies on […]
Power of SSH Tunneling
Source : https://medium.com/tarkalabs/power-of-ssh-tunneling-cf82bc56da67 Quoting SSH man page to remind us all to check them more often. ssh (SSH client) is a program for logging into a remote machine and for executing commands on a remote machine. It is intended to provide […]
Linux commands you should never run on your system
Source: https://linuxtechlab.com/linux-commands-you-should-never-run-on-your-system/ This article refers to some of the Linux commands you should never run on your system as they might prove to be DEADLY for your Linux systems. So before I proceed, I would like to point out that this article […]
Injecting userdata to allow ssh
One of the most common issues people experience is loosing ssh connection to their instances which could be due to various reasons such as permissions, ownership or even firewalls. You can easily resolve any of these issues using userdata. This will have […]
Filezilla
Summary of above video tutorial: Edit (Preferences) > Settings > Connection > SFTP, Click “Add key file” Browse to the location of your .pem file and select it. A message box will appear asking your permission to convert the file into […]
Source : https://www.xaprb.com/blog/2010/01/09/how-linux-iostat-computes-its-results/ The primary tool for inspecting Linux disk performance is iostat. The output includes many important statistics, but they’re difficult for beginners to understand. This article explains what they mean and how they’re calculated. I usually run iostat like this: […]