Hey guys in this simple post i will show you how you could easily create passwords of multiple users with a simple script. !/bin/bash file=/user.txt for i in more $file do useradd $i newpass=mkpasswd echo “user $i added successfully” echo “$newpass” | passwd –stdin “$i” echo “password for user $i is $newpass” done Just create a file user.txt in / directory and add users to this file. give executable permissions to the file and run by typing e.g # sh file.sh Thanks, Salman A. Francishttps://youtube.com/linuxkinghttps://facebook.com/linuxking77Insta: Linuxking77Twitter: @Linuxking77
Cyber scams & Prevention
This document will help people understand what kind of famous Cyber scams exist and how to prevent yourself from falling for them. 1) Phishing 2) Vishing or voice mail scam 3) Email from CEO and CFO (Know as ) spear phishing or whaling 4) Smishing or Text message scam 5) Romance Scam 6) Social Media Scam 7) Tech and Email Support Mails 8) Robo Calling: 1) Phishing Scams: In this type of scam, a hacker will send an email to the victim with a clickable link. These emails will appear to come from major companies like facebook, vk, gmail, financial institution or even from the bank you are using for daily transaction. Even though these emails look completely similar to the one sent by legit companies, but in actual the links in these mails are kind of traps which are set by the scammer and hackers to steal the information. once the link is clicked, the victim will be directed to some fake website, which will ask for login and password. Once the user enters his / her details , the credentials are intercepted by the scammer or hacker. Solution: The solution is to delete such mails and avoid clicking the links. Most of the legit companies and financial institutions will never send mails asking to update your account or submitting sensitive information to fix account issues. The best bet would be to visiting the official site to check your information and If still unsure, making a phone call to the bank or company would save you from falling in the trap. Look at the url properly and make sure the website address is correct.Still not sure ? Contact IT Department immediately. 2) Text Message These scams are phone scams and are know as smishing. They are similar to phishing scam. In this type of scam the hacker or scammer will send you a text message , these messages will appear to come from a legit and established source however the links once clicked will ask for your personal information or funds. The personal information could be used to steal money or identity theft. Text message could appear like this: 1) Dear user, we wanted to offer 0% interest on new car. This could be your lucky day. We will also give you free iphone if you register today. Please click the link to accept this offer now ! 2) This is your “Bank” Support Team, Your account has been locked up due to suspicious activity. Please click the link below to confirm your identity and keep yourself safe. **note the 0 instead of o in the above link. 3) Message from postal service, that the parcel is available for pickup and click the link to update the information is correct. 4) Congratulations ! You have won the prize. Click the link to claim the prize now. Solution: Delete the message and block the number. Don’t give your personal details to anyone. Call your bank if you have clicked the link and want to make sure if you are still secure. 3) Vishing or voice mail scam: Vishing, or voicemail phishing, is the act of committing voicemail fraud to try to steal personal information. Similar to phishing. In vishing attack cybercriminals use an urgent or interesting voicemail message to try to get potential victims to call back with their personal information. Fake caller-ID information is often used to make the calls appear to be from a legitimate organization or business. Solution: Hangup the phone and block the number. Do not call back. 4) Spear Phishing or mail from CEO , CFO or Co Workers: Spear Phishing attacks target individuals with access to sensitive information such as people who have the ability to transfer funds( most particularly Finance / Accounts Departments) Spear-phishing emails typically appear to come from someone the target knows, such as a co-worker at their company or another business in their network. Whaling is a spear-phishing attack that specifically targets senior executives at a business. Solution: This kind of attack requires special attention. Let’s take a look at them one by one. 1) check for signs the sender is who they claim to be: 2) Look at the “from” field. Is the person or business’s name spelled correctly 3) does the email address actually match the name of the sender? Or are there a bunch of random characters in the email address instead? 4) does the email address seem close, but a little different? e.g Microsft.net, or Microsoft.co. Instead of microsoft.com 5) Remember not to click any links 6) Does the sender address you by name? “Customer” or “Sir” 7) Is it generally free from spelling errors or odd grammar? 8) What kind of tone the message has. Is it overly urgent or it’s a normal communication? If you think the message passed all the above test but you are still suspicious, the best way to beat such attacks are to call the person or contact IT Department immediately. 5) Tech Support Scam: The scammer will call / text / mail you as a representative of a major tech / IT company such as Microsoft / Oracle / Apple etc and will warn that your computer is being infected with a malware. While in reality there is no problem. Once you reply to the scammer , he might ask for a Remote access to solve the issue. Instead of solving the problem he will lock you out of the computer / encrypt your data and then ask for money, in case you need your data back. Sometimes the scammers will fix the problem but install a malware as a backdoor for future control and hack. Solution: Delete the mail or hangup if you receive such call. These companies will never call the consumer by themselves. Do not browse insecure sites. Do not click links sent by an unknown person. Do not give remote control access to any unknown person. 6) Social Media: You could receive a text
Setup a WordPress Website in 5 mins
Enjoy the Video below, Blog post coming soon ! Link to Download the Script: https://github.com/linuxking77/lampstack **Note: Once you have downloaded the script , rename it from .txt to .sh and give it executable permission with chmod +x lampstack.sh **Note: People who would setup the server on EC-2 need to make sure that the security group is allowing all the ports related to, http and https. Facebook: https://www.facebook.com/linuxking77 Instagram: linuxking77 Twitter: linuxking77 Web: https://www.tekco.net Blog: https://www.tekco.net/?page_id=1446 Don’t forget to Subscribe Thank you !!
Installing Python3 & pip in AWS EC-2 Instance
In this article we will see how to install python 3 and python pip in AWS EC-2 instance. CentOS 7 First step Installing epel repository [root@mail centos]# yum -y install epel-release Installing python3 [root@mail centos]# yum -y install python3 Then download the script from pypa.io [root@mail centos]# curl -O https://bootstrap.pypa.io/get-pip.py % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 1842k 100 1842k 0 0 6600k 0 –:–:– –:–:– –:–:– 6604k To install pip for everyone type the following command [root@mail centos]# python3 get-pip.pyCollecting pipDownloading pip-20.3.3-py2.py3-none-any.whl (1.5 MB)|████████████████████████████████| 1.5 MB 14.9 MB/sCollecting wheelDownloading wheel-0.36.2-py2.py3-none-any.whl (35 kB)Installing collected packages: pip, wheelAttempting uninstall: pipFound existing installation: pip 9.0.3Uninstalling pip-9.0.3:Successfully uninstalled pip-9.0.3WARNING: The scripts pip, pip3 and pip3.6 are installed in ‘/usr/local/bin’ which is not on PATH.Consider adding this directory to PATH or, if you prefer to suppress this warning, use –no-warn-script-location.WARNING: The script wheel is installed in ‘/usr/local/bin’ which is not on PATH.Consider adding this directory to PATH or, if you prefer to suppress this warning, use –no-warn-script-location.Successfully installed pip-20.3.3 wheel-0.36.2 Add the executable path, ~/.local/bin, to your PATH variable [root@mail centos]# export PATH=/usr/local/bin:$PATH Now you should be able to call pip directly [root@mail centos]# pip –versionpip 20.3.3 from /usr/local/lib/python3.6/site-packages/pip (python 3.6) Done Thank you for viewing my article.If you like what i am doing , please subscribe to my youtube channel and comment. Let me know if you would like to see an article of your choice.Please share with your friends and family. Thanks, Salman Francis https://www.youtube.com/linuxkinghttps://www.tekco.nethttps://www.facebook.com/linuxking77Twitter: @linuxking77Instagram: linuxking77
Create an Email Server in 5 mins for Email Marketing
Hey guys hope you are all doing good. Today i am gong to write a very interesting article in which i will show you how to set up your very own fully functional Email server for Email Marketing and of course to use the server as your very own email server for office or personal use. YouTube video can be found here: Also I would like to wish all of you a very happy new year, may the next year be filled with joy and happiness for all of us. So lets start. Before we setup the mail server, there are certain prerequisites. Security Group on EC-2 Once you have all in place lets setup our mail server with the script i already created. You can download the script from here: https://github.com/linuxking77/emailserver/archive/main.zip Once you have downloaded the script change the extension fron .txt to .sh then give it executable permissions. e.g EmailServer# mv emailscript.txt emailscript.sh EmailSever# chmod +x emailscript.sh then run the script as root with the following command EmailServer# sh emailscript.sh Once you start the script it will ask you couple of questions such as domain name, hostname, internal ip address (in case you are setting it on EC-2 instance in AWS and External IP Address in case you are setting it on your self hosted machine) After answering the questions you sit back and relax and let script do all for you. Once all is completed successfully , you can open webbrowser and type http://<yourdomain>?Admin This will bring you to the following screen. The credentials are: username: admin Pass: 12345 First thing what you would do is to change the password from 12345 to something strong. Then Click on Domain in the left panel and add the domain as show below: Click on Test and if all Goes well, you would see IMAP and SMTP in Green Color. Now you need to create a user in your Linux Mail Server , i have created two itpings and superman Once users are created, open the web browser and type http://<yourdomain>.com This time give the credentials of your user as following and you will login to send and receive emails. If you like what i am doing, please consider liking my Youtube Channel Thanks, Salman A. Francishttps://www.tekco.netYoutube: https://www.youtube.com/linuxking