José Lopes

José Lopes

Infosec Engineer working with Threat Detection, boldly following his own journey.

Mastering Performance

Tools, Rituals, and Reflections for Professional Growth in Infosec.

· 11min · José Lopes
Mastering Performance

Understanding Severity and Priority

Uncover optimal Detection Rule settings for consistent, efficient alerts.

· 3min · José Lopes
Understanding Severity and Priority

Productivity Unleashed

Unlock seamless productivity with strategic tools and a 2-step system for efficient organization and focus.

· 6min · José Lopes
Productivity Unleashed

Intelligence-Driven Incident Response

Discover how integrating CTI enhances Threat Detection and CSIRT for better cybersecurity results.

· 4min · José Lopes
Intelligence-Driven Incident Response

Chronicle SIEM: Insights and Challenges Explored

Exploring Chronicle SIEM: Features, benefits, and challenges in a review centered around Threat Detection.

· 12min · José Lopes
Chronicle SIEM: Insights and Challenges Explored

Portfolio Tracker: Mastering your Finances

Enhance your portfolio management with this free, powerful spreadsheet —empowering investors to make informed decisions.

· 17min · José Lopes
Portfolio Tracker: Mastering your Finances

Handling Floating Point Precision in Spreadsheets

Learn effective methods to handle floating point precision in spreadsheets, ensuring accurate financial calculations and avoiding errors.

· 3min · José Lopes
Handling Floating Point Precision in Spreadsheets

Effective Detection Rules for Network and Port Scans: Implementation Strategies

Mastering Effective Network and Port Scan Detection: Strategies, Implementation, and Rule Creation for Optimal Security.

· 7min · José Lopes
Effective Detection Rules for Network and Port Scans: Implementation Strategies

Hardening Email with DKIM, SPF, DMARC

Boost email security: Learn how DKIM, SPF, and DMARC can protect your domain from cyber threats.

· 5min · José Lopes
Hardening Email with DKIM, SPF, DMARC

Using GPT-3.5 for SEO Advice

A beginner's perspective on using OpenAI's GPT-3 to generate SEO-friendly post titles, summaries and tags.

· 8min · José Lopes
Using GPT-3.5 for SEO Advice

Export and Decode GAuth 2FA Accounts

Learn how to export and decode GAuth 2FA accounts to retrieve the secrets and password data.

· 3min · José Lopes
Export and Decode GAuth 2FA Accounts

Using AWS Secrets Manager in Your Scripts

Learn to authenticate in tools seamlessly and deal securely with your secrets in AWS Environment.

· 4min · José Lopes
Using AWS Secrets Manager in Your Scripts

Getting Started with CloudFlare for Web Protection

Learn how to use CloudFlare's free plan on personal sites for better security and protection.

· 4min · José Lopes
Getting Started with CloudFlare for Web Protection

Updating Signed Documents with GPG

Learn how to update GPG signed documents, from importing keys to patching multiple files.

· 4min · José Lopes
Updating Signed Documents with GPG

Getting Cryptocurrency Prices in Google Sheets

Learn how to get minor cryptocurrency prices in Google Sheets using Crypto Prices.

· 4min · José Lopes
Getting Cryptocurrency Prices in Google Sheets

Automating Incident Response: A Scalable and Robust Approach

Learn how to tackle log centralization, SIEM operationalization, and IR automation.

· 9min · José Lopes
Automating Incident Response: A Scalable and Robust Approach

The Importance of Logging Strategy

Logs are crucial tools for diagnosing incidents, but require streamlined planning and retention practices.

· 5min · José Lopes
The Importance of Logging Strategy

Friction Between Red Teams and Incident Response

Avoidable friction between cybersecurity teams during Red Team exercises causing stress and burnout.

· 7min · José Lopes
Friction Between Red Teams and Incident Response

My Minimalistic Approach to Mac System Setup

Learn how to setup your Mac system with fewer apps and keep it simple.

· 4min · José Lopes
My Minimalistic Approach to Mac System Setup

Query Security Services for IP Reputation

Learn how to query three security services in one shell script to check IP reputation.

· 4min · José Lopes
Query Security Services for IP Reputation

How to Change Zola Theme: Steps and Recommendations

Get valuable tips on how to change your Zola blog theme without breaking your site.

· 6min · José Lopes
How to Change Zola Theme: Steps and Recommendations

Creating a Hardened Testing Environment

Learn how to install and harden Arch Linux to create a safer environment for networking tests.

· 3min · José Lopes
Creating a Hardened Testing Environment

Set Static IP Address in Arch Linux

Learn how to set a static IP address in Arch Linux without DHCP support.

· 3min · José Lopes
Set Static IP Address in Arch Linux

Recovering from a PAM Misconfiguration in Arch Linux

Misconfigured PAM modules could render systems inaccessible, but this tutorial explains how to recover without a reinstall.

· 4min · José Lopes
Recovering from a PAM Misconfiguration in Arch Linux

Secure and Easy Password and MFA Management

Learn to manage your passwords and MFA tools to maximize security and usability.

· 10min · José Lopes
Secure and Easy Password and MFA Management

How to Calculate and Decompose Syslog Message Priority

Learn how to calculate Syslog message priority and decompose it to troubleshoot current configuration.

· 2min · José Lopes
How to Calculate and Decompose Syslog Message Priority

Real-time Log Forwarding with Python and Syslog

Learn how to create a smart log forwarding script using Python and Syslog to send logs in near real-time.

· 3min · José Lopes
Real-time Log Forwarding with Python and Syslog

AWS Certified Security - Specialty Review

Learn about the five domains and the materials used to pass the AWS Certified Security - Specialty exam.

· 4min · José Lopes
AWS Certified Security - Specialty Review

Logging Python Messages to Syslog in macOS

Learn how to send log messages from Python to Syslog and monitor them in macOS using the log utility.

· 1min · José Lopes
Logging Python Messages to Syslog in macOS

My Journey to CISSP Certification

Read about my experience getting the CISSP certification, from study strategies to material analysis.

· 17min · José Lopes
My Journey to CISSP Certification

Installing Nerd Fonts on Arch Linux

Learn how to install and use Nerd Fonts, a curated collection of fancy font families, focused on developers, on your Arch Linux system.

· 3min · José Lopes
Installing Nerd Fonts on Arch Linux

Arch Linux Workstation Setup

Install graphical environment and apps, setup configs for a workflow-oriented workstation.

· 6min · José Lopes
Arch Linux Workstation Setup

Linux Hardening with CIS Controls

Applying additional CIS controls for improving the security of an Arch Linux installation.

· 10min · José Lopes
Linux Hardening with CIS Controls

Arch Linux Hardened Installation Guide

Step-by-step guide to perform a hardened Arch Linux installation.

· 11min · José Lopes
Arch Linux Hardened Installation Guide

Blogging and the Freedom of the Web

Despite the rise of video tutorials, blogging remains a valuable platform for tech content sharing and personal growth.

· 3min · José Lopes
Blogging and the Freedom of the Web

Automating Network Management with NetBox Scanner

Discover how an open-source IPAM tool and a custom-built scanner have streamlined network management.

· 4min · José Lopes
Automating Network Management with NetBox Scanner

Verme Cervejeiro

[pt_BR] A broad and funny chronic about being a homebrewer in Brazil.

· 9min · José Lopes
Verme Cervejeiro

Trabalhando com Submódulos no Git

Aprenda a adicionar, atualizar e remover submódulos no Git, comandos úteis e referência.

· 3min · José Lopes
Trabalhando com Submódulos no Git

Criando um Tema para o Zola

Aprenda a criar um tema para Zola e contribua com a comunidade.

· 4min · José Lopes
Criando um Tema para o Zola

Minha Experiência Estudando para a Certificação CompTIA Security+

Relato de como se preparar para a certificação S+ e dicas para estudos.

· 6min · José Lopes
Minha Experiência Estudando para a Certificação CompTIA Security+

Certificações em Seleção de Pessoal

Descubra a importância das certificações na seleção de pessoal em TI.

· 4min · José Lopes
Certificações em Seleção de Pessoal

Aprendendo a Criar Sites Estáticos com Zola

Descubra como o Zola, um construtor de sites estáticos escrito em Rust, pode ser uma ótima opção para criar e manter sites seguros e de alta performance.

· 3min · José Lopes
Aprendendo a Criar Sites Estáticos com Zola