How to Read Linux Iostat’s Output and Interpret System Performance

Source :   The primary tool for inspecting Linux disk performance is iostat. The output includes many important statistics, but they’re difficult for beginners to understand. This article explains what they mean and how they’re calculated. I usually run iostat like this: […]

How to create and use Linux aliases

  Source :   Unix/Linux aliases FAQ: Can you share some example of the Linux alias command, as well as some alias command examples? Using Linux aliases Aliases in Unix and Linux operating systems are cool. They let you define your own commands, or command […]

How to identify duplicate files on Linux

Source : Some files on a Linux system can appear in more than one location. Follow these instructions to find and identify these “identical twins” and learn why hard links can be so advantageous. Identifying files that share disk space relies on […]

Power of SSH Tunneling

  Source :   Quoting SSH man page to remind us all to check them more often. ssh (SSH client) is a program for logging into a remote machine and for executing commands on a remote machine. It is intended to provide […]

Linux commands you should never run on your system

Source:   This article refers to some of the Linux commands you should never run on your system as they might prove to be DEADLY for your Linux systems. So before I proceed, I would like to point out that this article […]

Injecting userdata to allow ssh

One of the most common issues people experience is loosing ssh connection to their instances which could be due to various reasons such as permissions, ownership or even firewalls. You can easily resolve any of these issues using userdata. This will have […]


  Summary of above video tutorial: Edit (Preferences) > Settings > Connection > SFTP, Click “Add key file” Browse to the location of your .pem file and select it. A message box will appear asking your permission to convert the file into […]