Shortest Postfix sudo mail queue command list

Commands

mailq # note the message id – ten (10) alpha key to emails in queue

postcat -vq nnnnnnnnnn

postsuper -d nnnnnnnnnn

cd /etc/postfix; vi virtual; postmap virtual # forwarding

cd /etc/postfix; vi rbl_override; postmap rbl_override #whitelist

Postfix queues: pending and deferred.

Deferred queue is for messages that have soft-failed. Postfix will retry sending deferred emails.

Basic Python Pyramid Virtual Environment

Init

sudo apt-get install virtualenv python-pip python-dev
pip install –upgrade pip setuptools
pip install pyramid gunicorn waitress

check pip settings in ~/.local/bin/pip

Python 3.6

sudo add-apt-repository ppa:deadsnakes/ppa
sudo apt-get update
sudo apt-get install python3.6
python3.6
virtualenv –python=python3.6 name_of_ve_dir

Create Virtual Environment from Pyramid setup.py

virtualenv –python=python3.6 ve4e9
source ve4e9/bin/activate
cd MyProject
python setup.py install
pserve development.ini

Activate Virtual Environment

source ve4e9/bin/activate

Pyramid Bakery

pip install cookiecutter

Create simple

cookiecutter gh:Pylons/pyramid-cookiecutter-starter
pip install -e “.[testing]”
pserve development.ini

Create Alchemy

cookiecutter gh:Pylons/pyramid-cookiecutter-alchemy
pip install -e “.[testing]”
initialize_MyProject_db development.ini
pserve development.ini

Clone

git clone ssh://account@repositoryurl.com/~/MyProject

Invoke

cd MyProject
pserve development.ini

Windows Networks Identity Management

Active Directory Domain Controller – Server 2008 r2, Server 2012 r2, Server 2016

Windows -> Start -> Administrative Tools -> Active Directory Users and Computers

All computers on the local network that have been joined to the local domain use the Active Directory User library. Instead of setting up user accounts on each computer, a central database is used to store logon names and passwords. (Generally) Kerberos is used to encrypt and exchange with handshake user logon name and password information. (Windows Professional required for workstations)

Jumpcloud

Install the jumpcloud client on all computers managed by the Jumpcloud database. (Generally) TLS1.1 is used for logon name and password information. First 10 users are free, then $7.50 per user per month.

15 users – 5*7.5*12*.75 = $ 1.875 per user per month paid annual

25 users – 15*7.5*12*.75 = $ 3.375 per user per month paid annual

50 users – $4.50 per user per month paid annual ($ 2,700 annual)

 

Server Costs

  • Server Acquisition – $1,500 – $25,000
  • Professional Installation – $1,000 – $5,000
  • Monthly support costs – $200 – $1,000
  • UPS – $250 – $2,000
  • Five (5) year warranty cost – $1,500 – $5,000 (4 hour repair)
  • Backup
  • Power
  • Heating and Cooling
  • Space utilization and access control

Ubuntu 16 server setup

adduser {{username}}
adduser {{username}} sudo

apt-get install apache2
apt-get install php
apt-get intsall libapache2-mod-php
apt-get install php-mcrypt
apt-get install php-mysql

apt install iptables
apt install fail2ban

apt update
apt full-upgrade
apt install build-essential
apt install tcl

add some swap

fallocate -l 1G /mnt/1GB.swap
dd if=/dev/zero of=/mnt/1GB.swap bs=1024 count=1048576
mkswap /mnt/1GB.swap
swapon /mnt/1GB.swap
chmod 0600 /mnt/1GB.swap
echo "/mnt/1GB.swap  none  swap  sw 0  0" >>/etc/fstab 

apt install mysql-server
mysql_secure_installation

## {{su}}
curl latest redis.io stable
make
make test
make install
mkdir /etc/redis
cp redis.conf /etc/redis

## create /etc/systemd/system/redis.service – e.g.

[Unit]
Description=Redis
After=network.target
[Service]
User=redis
Group=redis
ExecStart=/usr/local/bin/redis-server /etc/redis/redis.conf
ExecStop=/usr/local/bin/redis-cli shutdown
Restart=always
[Install]
WantedBy=multi-user.target

## now you need to diff your redis.conf – password, persistence, binding, etc.

## when you are ready to move … (or to test, see ExecStart)
systemctl enable redis

## next

cd /etc/apache2
ln mods-available/rewrite.load mods-enabled/rewrite.load

SEO Scams from gmail accounts

If you have a website contact form, and a popular website, you will receive daily emails promising high quality and low priced google ranking or SEO. Always unsolicited, here are some examples of the text of the inquiry;

Internet Marketing Services We would like to get your website on first page of Google. All of our processes use the most ethical “white hat” Search Engine Optimization techniques that Will not get your website banned or penalized. Please reply and I would be happy to send you a proposal.
Let us do the tedious SEO work for you. You know your business, we know SEO. Our rates are some of the most competitive in the industry. We will put in writing that everything we do adheres to all ethical Search Engine Optimization guidelines. At a minimum you owe it to yourself and your business to reply to this email so I can send you more information.
SEO Do you wish you could increase your online leads? Getting a GUARANTEED 1ST PAGE GOOGLE RANKING is easier and more cost-effective than you might think. We have helped a lot of businesses thrive in this market and we can help you! Simply hit reply and I’ll share with you the cost and the benefits See you at the top!
Then for the kicker, they want me to respond to a gmail, hotmail or yahoo account. I will never send an email to an unsolicited public account. No phone number to call. For all I know, these emails are just a way to build a mailing list for spam.

What indicates this is a waste of time is that there is never a company behind the message. Legitimate company owners and marketing departments want the name of their company known. There is no phone number. Often the name does not match the email account name.

Reputable SEO companies will meet with, have a phone number, a website and email addresses that match the website. At Web-Atlanta, we can meet face to face and provide references.

If this leads you to a cheap SEO service, Why not try it? Because effective optimization is a careful and cooperative effort. Unskilled or off-shore efforts not only waste your time and money but can hurt your ranking or lead to search engine penalties, or even getting your website banned!

Notpetya goldeneye windows versions vulnerable

Ransomware also known as Wannacry is attacking again, but Windows 7 and Windows 10 operating systems with March and April updates fully applied appear to be immune. The computers being hacked are old versions of Windows 10, 8, 7 and XP that have not had security updates installed. XP is especially vulnerable.

Symantec, McAffee and any other virus protection provider are not required to tell you that you do not need their products to protect against these infections, and in fact, you probably should have a virus program.

If you are not encrypted, but have an outdated computer, consider using fixmestick.com, then applying updates, then installing Norton anti-virus.

For more sophisticated users, use Microsoft Defender or Security Center, plus Malware Bytes, as well as an occasional scan with fixmestick.

If you are not encrypted but cannot update the operating system, back up your data and either buy a new computer or reformat the hard drive. If fixmestick cannot get the virus out of the computer, or the Windows Update program just will not run, the cost of remediation probably exceeds the cost of a new computer.

Wanncry struck about two months ago. The newest Petya is a very refined improvement of the virus. EternalBlue was first formalized by the US NSA for spying purposes. But if they had not formalized the code, someone else would have done the same. North Korea is known to have produced a variant that was less sophisticated.

The initial infection of NotPetya comes from an email phishing scheme, sometimes in a password protected Microsoft Word document. Then, using the EternalBlue exploit it can worm its way within private networks of vulnerable networks.

Another NSA project called EternalRomance may have code in NotPetya. NotPetya has capabilities that allow it to steal administrator passwords and use them to further replicate. However, using Microsoft password facilities best practices would appear to make this a less likely threat.