Lopes Logbook
tags
archive
library
about
Archive
2024
19
Towards Actionable Detection
12-18
The Missing Readme
12-05
Countdown to Zero Day
10-04
Project Nebula: Debriefing
09-25
Project Nebula: Detecting with Elastic
09-23
Project Nebula: Detecting with Wazuh
09-20
Project Nebula: Build a Simple Detection Lab
09-18
Practical Threat Detection Engineering
07-26
Auto-Cleaning Lists in Chronicle SIEM
07-18
Endpoint Security Reflections feat. EDR
07-08
Integrating MISP with Chronicle SIEM
06-26
Debunking Threat Detection Myths
05-14
How to Sign Commits in Git(Hub)
05-13
Portfolio Tracker v4
05-08
Improving SecOps Beyond Tuning Analytics
03-14
The Cuckoo's Egg
03-13
The Threat Detection Fundamental Dilemma
03-08
A Little Hardening with Burp
02-23
MITRE ATT&CK 101: Bridging the Gap
01-12
2023
17
Testing The Logfile Navigator
12-15
Getting Real About MITRE ATT&CK
12-14
Insights into Effective SIEM Deployment
11-29
Mastering your Performance
11-28
Understanding Severity and Priority
11-23
Productivity Unleashed
11-14
Intelligence-Driven Incident Response
10-17
Chronicle SIEM: Insights and Challenges Explored
09-23
Portfolio Tracker: Mastering your Finances
08-23
Handling Floating Point Precision in Spreadsheets
06-30
Effective Detection Rules for Net and Port Scans
05-30
Hardening Email with DKIM, SPF, DMARC
05-24
Using GPT-3.5 for SEO Advice
03-17
Export and Decode GAuth 2FA Accounts
01-18
Using AWS Secrets Manager in Your Scripts
01-05
Getting Started with CloudFlare for Web Protection
01-02
Updating Signed Documents with GPG
01-02
2022
7
Getting Cryptocurrency Prices in Google Sheets
12-26
Automating Incident Response
10-25
The Importance of Logging Strategy
10-09
Friction Between Red Teams and Incident Response
10-04
My Minimalistic Approach to Mac System Setup
09-30
Query Security Services for IP Reputation
09-06
Changing the Zola Theme
08-29
2021
8
Creating a Hardened Testing Environment
11-04
Set Static IP Address in Arch Linux
10-27
Recovering Arch Linux from a PAM Issue
10-26
Secure and Easy Password and MFA Management
10-05
Calculating and Decomposing Syslog Priority
09-02
Real-time Log Forwarding with Python and Syslog
09-01
AWS Certified Security - Specialty Review
08-24
Logging Python Messages to Syslog in macOS
08-17
2020
13
My Journey to CISSP Certification
11-05
Installing Nerd Fonts on Arch Linux
07-27
Arch Linux Workstation Setup
07-15
Linux Hardening with CIS Controls
07-08
Arch Linux Hardened Installation Guide
07-07
Blogging and the Freedom of the Web
06-09
Automating Network Management with NetBox Scanner
05-31
Verme Cervejeiro
05-19
Trabalhando com Submódulos no Git
05-12
Criando um Tema para o Zola
05-11
Certificação CompTIA Security+
05-05
Certificações em Seleção de Pessoal
04-30
Aprendendo a Criar Sites Estáticos com Zola
04-27