Tools, Rituals, and Reflections for Professional Growth in Infosec.
Understanding Severity and Priority
Uncover optimal Detection Rule settings for consistent, efficient alerts.
Unlock seamless productivity with strategic tools and a 2-step system for efficient organization and focus.
Intelligence-Driven Incident Response
Discover how integrating CTI enhances Threat Detection and CSIRT for better cybersecurity results.
Chronicle SIEM: Insights and Challenges Explored
Exploring Chronicle SIEM: Features, benefits, and challenges in a review centered around Threat Detection.
Portfolio Tracker: Mastering your Finances
Enhance your portfolio management with this free, powerful spreadsheet —empowering investors to make informed decisions.
Handling Floating Point Precision in Spreadsheets
Learn effective methods to handle floating point precision in spreadsheets, ensuring accurate financial calculations and avoiding errors.
Effective Detection Rules for Network and Port Scans: Implementation Strategies
Mastering Effective Network and Port Scan Detection: Strategies, Implementation, and Rule Creation for Optimal Security.
Hardening Email with DKIM, SPF, DMARC
Boost email security: Learn how DKIM, SPF, and DMARC can protect your domain from cyber threats.
Using GPT-3.5 for SEO Advice
A beginner's perspective on using OpenAI's GPT-3 to generate SEO-friendly post titles, summaries and tags.
Export and Decode GAuth 2FA Accounts
Learn how to export and decode GAuth 2FA accounts to retrieve the secrets and password data.
Using AWS Secrets Manager in Your Scripts
Learn to authenticate in tools seamlessly and deal securely with your secrets in AWS Environment.
Getting Started with CloudFlare for Web Protection
Learn how to use CloudFlare's free plan on personal sites for better security and protection.
Updating Signed Documents with GPG
Learn how to update GPG signed documents, from importing keys to patching multiple files.
Getting Cryptocurrency Prices in Google Sheets
Learn how to get minor cryptocurrency prices in Google Sheets using Crypto Prices.
Automating Incident Response: A Scalable and Robust Approach
Learn how to tackle log centralization, SIEM operationalization, and IR automation.
The Importance of Logging Strategy
Logs are crucial tools for diagnosing incidents, but require streamlined planning and retention practices.
Friction Between Red Teams and Incident Response
Avoidable friction between cybersecurity teams during Red Team exercises causing stress and burnout.
My Minimalistic Approach to Mac System Setup
Learn how to setup your Mac system with fewer apps and keep it simple.
Query Security Services for IP Reputation
Learn how to query three security services in one shell script to check IP reputation.
How to Change Zola Theme: Steps and Recommendations
Get valuable tips on how to change your Zola blog theme without breaking your site.
Creating a Hardened Testing Environment
Learn how to install and harden Arch Linux to create a safer environment for networking tests.
Set Static IP Address in Arch Linux
Learn how to set a static IP address in Arch Linux without DHCP support.
Recovering from a PAM Misconfiguration in Arch Linux
Misconfigured PAM modules could render systems inaccessible, but this tutorial explains how to recover without a reinstall.
Secure and Easy Password and MFA Management
Learn to manage your passwords and MFA tools to maximize security and usability.
How to Calculate and Decompose Syslog Message Priority
Learn how to calculate Syslog message priority and decompose it to troubleshoot current configuration.
Real-time Log Forwarding with Python and Syslog
Learn how to create a smart log forwarding script using Python and Syslog to send logs in near real-time.
AWS Certified Security - Specialty Review
Learn about the five domains and the materials used to pass the AWS Certified Security - Specialty exam.
Logging Python Messages to Syslog in macOS
Learn how to send log messages from Python to Syslog and monitor them in macOS using the log utility.
My Journey to CISSP Certification
Read about my experience getting the CISSP certification, from study strategies to material analysis.
Installing Nerd Fonts on Arch Linux
Learn how to install and use Nerd Fonts, a curated collection of fancy font families, focused on developers, on your Arch Linux system.
Arch Linux Workstation Setup
Install graphical environment and apps, setup configs for a workflow-oriented workstation.
Linux Hardening with CIS Controls
Applying additional CIS controls for improving the security of an Arch Linux installation.
Arch Linux Hardened Installation Guide
Step-by-step guide to perform a hardened Arch Linux installation.
Blogging and the Freedom of the Web
Despite the rise of video tutorials, blogging remains a valuable platform for tech content sharing and personal growth.
Automating Network Management with NetBox Scanner
Discover how an open-source IPAM tool and a custom-built scanner have streamlined network management.
[pt_BR] A broad and funny chronic about being a homebrewer in Brazil.
Trabalhando com Submódulos no Git
Aprenda a adicionar, atualizar e remover submódulos no Git, comandos úteis e referência.
Criando um Tema para o Zola
Aprenda a criar um tema para Zola e contribua com a comunidade.
Minha Experiência Estudando para a Certificação CompTIA Security+
Relato de como se preparar para a certificação S+ e dicas para estudos.
Certificações em Seleção de Pessoal
Descubra a importância das certificações na seleção de pessoal em TI.
Aprendendo a Criar Sites Estáticos com Zola
Descubra como o Zola, um construtor de sites estáticos escrito em Rust, pode ser uma ótima opção para criar e manter sites seguros e de alta performance.