Phishing Attack (Cybersecurity class final project)

DO NOT USE THIS TOOL FOR MALICIOUS PURPOSES! Phishing is a form of cybercrime that involves attempting to acquire sensitive information, such as usernames, passwords, and credit card details, by posing as a trustworthy entity in electronic communication. Engaging in such activities is against the law and violates ethical standards. It’s important to use your cybersecurity knowledge and skills to protect and secure systems, data, and individuals from cyber threats, rather than using them for malicious purposes....

December 5, 2023 · 1 min · Lex romo

Rootuser MFA Budget IAM

AWS Here I create a Root user, I activated MFA to enhance the security of our AWS account. I activated the IAM because by default it is deactivated, and finally I activated and created a budget, so AWS can let us know when we are reaching our max budget. In Amazon Web Services (AWS): The “root user” refers to the initial administrative user account created when you first set up an AWS account....

December 5, 2023 · 3 min · Lex romo

Configure your .bashcr file in Linux

.bashrc: As a Linux enthusiast, you understand the power of customization in optimizing your workflow and enhancing productivity. At the heart of this customization lies the .bashrc file, a versatile tool I like to use that allows you to tailor your command line environment to suit your needs. By configuring your .bashrc file, you can create shortcuts and aliases for frequently used commands, enabling swift navigation and execution of tasks. Whether it’s accessing commonly used directories, launching preferred applications, or automating routine processes, these shortcuts can save valuable time and keystrokes in your daily interactions with the terminal....

December 1, 2023 · 3 min · Lex romo

IAM User Access Keys CLI

AWS In Amazon Web Services (AWS): IAM (Identity and Access Management): IAM is a service that helps you securely control access to resources in your cloud environment. In the context of AWS (Amazon Web Services), IAM allows you to manage users, groups, and permissions to access AWS resources. Here are some key components of IAM: Users: IAM users are entities that you create in AWS to represent the people and services that interact with AWS....

December 1, 2023 · 3 min · Lex romo

Project 3

December 1, 2023 · 0 min · Lex romo