Joe Lopes

Joe Lopes

Infosec Engineer working with Threat Detection, boldly following his own journey.

A Little Hardening with Burp

Guide to MITRE ATT&CK with history and context for better usage.

· 3min · Joe Lopes
A Little Hardening with Burp

MITRE ATT&CK 101: Bridging the Gap

Guide to MITRE ATT&CK with history and context for better usage.

· 10min · Joe Lopes
MITRE ATT&CK 101: Bridging the Gap

Testing The Logfile Navigator

Exploring log analysis with lnav tool: challenges, insights, and tips.

· 6min · Joe Lopes
Testing The Logfile Navigator

Getting Real About MITRE ATT&CK

Understanding MITRE ATT&CK and using it in your favor.

· 4min · Joe Lopes
Getting Real About MITRE ATT&CK

Insights into Effective SIEM Deployment

Strategies and tips for successful SIEM deployment.

· 8min · Joe Lopes
Insights into Effective SIEM Deployment

Mastering your Performance

Tools, rituals, and reflections for professional growth in Infosec.

· 11min · Joe Lopes
Mastering your Performance

Understanding Severity and Priority

Uncover optimal Detection Rule settings for consistent, efficient alerts.

· 3min · Joe Lopes
Understanding Severity and Priority

Productivity Unleashed

Seamless productivity with tools and a process for better organization.

· 6min · Joe Lopes
Productivity Unleashed

Intelligence-Driven Incident Response

Discover how integrating CTI enhances Threat Detection and CSIRT.

· 4min · Joe Lopes
Intelligence-Driven Incident Response

Chronicle SIEM: Insights and Challenges Explored

Features and challenges in a review centered around Threat Detection.

· 12min · Joe Lopes
Chronicle SIEM: Insights and Challenges Explored

Portfolio Tracker: Mastering your Finances

Enhance your portfolio management with this free and powerful spreadsheet.

· 17min · Joe Lopes
Portfolio Tracker: Mastering your Finances

Handling Floating Point Precision in Spreadsheets

Effective methods to handle floating point precision in spreadsheets.

· 3min · Joe Lopes
Handling Floating Point Precision in Spreadsheets

Effective Detection Rules for Net and Port Scans

Effective network and port scan detection.

· 7min · Joe Lopes
Effective Detection Rules for Net and Port Scans

Hardening Email with DKIM, SPF, DMARC

Learn how to protect your mailboxes from cyber threats.

· 5min · Joe Lopes
Hardening Email with DKIM, SPF, DMARC

Using GPT-3.5 for SEO Advice

Using OpenAI's GPT-3 to generate SEO-friendly post metadata.

· 8min · Joe Lopes
Using GPT-3.5 for SEO Advice

Export and Decode GAuth 2FA Accounts

How to export and decode GAuth 2FA.

· 3min · Joe Lopes
Export and Decode GAuth 2FA Accounts

Using AWS Secrets Manager in Your Scripts

Learn to authenticate in tools seamlessly.

· 4min · Joe Lopes
Using AWS Secrets Manager in Your Scripts

Getting Started with CloudFlare for Web Protection

Use CloudFlare's free plan on personal sites for better security.

· 4min · Joe Lopes
Getting Started with CloudFlare for Web Protection

Updating Signed Documents with GPG

Update GPG signed documents, from key import to patching files in batch.

· 4min · Joe Lopes
Updating Signed Documents with GPG

Getting Cryptocurrency Prices in Google Sheets

Get minor cryptocurrency prices in Google Sheets using 3rd party service.

· 4min · Joe Lopes
Getting Cryptocurrency Prices in Google Sheets

Automating Incident Response

Tackling log centralization, SIEM operationalization, and IR automation.

· 9min · Joe Lopes
Automating Incident Response

The Importance of Logging Strategy

Streamlined planning and retention practices for better logging.

· 5min · Joe Lopes
The Importance of Logging Strategy

Friction Between Red Teams and Incident Response

Avoidable friction between cybersecurity teams during Red Team exercises.

· 7min · Joe Lopes
Friction Between Red Teams and Incident Response

My Minimalistic Approach to Mac System Setup

Learn how to setup your Mac system with fewer apps and keep it simple.

· 4min · Joe Lopes
My Minimalistic Approach to Mac System Setup

Query Security Services for IP Reputation

Query three security services in one shell script to check IP reputation.

· 4min · Joe Lopes
Query Security Services for IP Reputation

Changing the Zola Theme

Valuable tips on changing your Zola blog theme without breaking the site.

· 6min · Joe Lopes
Changing the Zola Theme

Creating a Hardened Testing Environment

Install and harden Arch Linux to create a safer OS for network tests.

· 3min · Joe Lopes
Creating a Hardened Testing Environment

Set Static IP Address in Arch Linux

Learn how to set a static IP address in Arch Linux without DHCP support.

· 3min · Joe Lopes
Set Static IP Address in Arch Linux

Recovering Arch Linux from a PAM Issue

How to recover Arch with a misconfigured PAM configuration.

· 4min · Joe Lopes
Recovering Arch Linux from a PAM Issue

Secure and Easy Password and MFA Management

Manage your passwords and MFA tools to maximize security and usability.

· 10min · Joe Lopes
Secure and Easy Password and MFA Management

Calculating and Decomposing Syslog Priority

Calculate and decompose Syslog message priority.

· 2min · Joe Lopes
Calculating and Decomposing Syslog Priority

Real-time Log Forwarding with Python and Syslog

Create a smart log forwarding script using Python and Syslog.

· 3min · Joe Lopes
Real-time Log Forwarding with Python and Syslog

AWS Certified Security - Specialty Review

The materials and strategy I used to get this certification.

· 4min · Joe Lopes
AWS Certified Security - Specialty Review

Logging Python Messages to Syslog in macOS

Send log messages from Python to Syslog in macOS.

· 1min · Joe Lopes
Logging Python Messages to Syslog in macOS

My Journey to CISSP Certification

Mmy experience getting the CISSP certification.

· 17min · Joe Lopes
My Journey to CISSP Certification

Installing Nerd Fonts on Arch Linux

Learn how to install and use Nerd Fonts.

· 3min · Joe Lopes
Installing Nerd Fonts on Arch Linux

Arch Linux Workstation Setup

Install graphical environment and apps, setup configs in your workstation.

· 6min · Joe Lopes
Arch Linux Workstation Setup

Linux Hardening with CIS Controls

Applying CIS controls for improving the security of an Arch Linux.

· 10min · Joe Lopes
Linux Hardening with CIS Controls

Arch Linux Hardened Installation Guide

Step-by-step guide to perform a hardened Arch Linux installation.

· 11min · Joe Lopes
Arch Linux Hardened Installation Guide

Blogging and the Freedom of the Web

Blogging remains a valuable platform for tech content.

· 3min · Joe Lopes
Blogging and the Freedom of the Web

Automating Network Management with NetBox Scanner

Streamlining network management with IPAM and a network scanner.

· 4min · Joe Lopes
Automating Network Management with NetBox Scanner

Verme Cervejeiro

[pt_BR] A broad and funny chronic about being a homebrewer in Brazil.

· 9min · Joe Lopes
Verme Cervejeiro

Trabalhando com Submódulos no Git

Adicione, atualize e remova submódulos no Git, comandos úteis e referência.

· 3min · Joe Lopes
Trabalhando com Submódulos no Git

Criando um Tema para o Zola

Aprenda a criar um tema para Zola e contribua com a comunidade.

· 4min · Joe Lopes
Criando um Tema para o Zola

Certificação CompTIA Security+

Relato de como se preparar para a certificação S+ e dicas para estudos.

· 6min · Joe Lopes
Certificação CompTIA Security+

Certificações em Seleção de Pessoal

Descubra a importância das certificações na seleção de pessoal em TI.

· 4min · Joe Lopes
Certificações em Seleção de Pessoal

Aprendendo a Criar Sites Estáticos com Zola

Zola comoopção para criar e manter sites seguros e de alta performance.

· 3min · Joe Lopes
Aprendendo a Criar Sites Estáticos com Zola