Tags
archautomationawsbeerbitsbloggingcertificationcloudcloudflarecryptocurrencydetectionfinancegitgpghardeninglogsnetlifynetworknetworkingopenaipythonsecuritysiemspreadsheetstorysyslogunixworkstationzola
arch
Creating a Hardened Testing Environment
Bits #5: Set static IP address in Arch Linux
Bits #4: Recovering from a PAM Misconfiguration in Arch Linux
Installing Nerd Fonts on Arch Linux
Arch Linux Workstation Setup
Linux Hardening with CIS Controls
Arch Linux Hardened Installation Guide
automation
Using GPT-3.5 for SEO Advice
Automating Incident Response: A Scalable and Robust Approach
Automating Network Management with NetBox Scanner
bits
Bits #6: Getting Cryptocurrency Prices in Google Sheets
Bits #5: Set static IP address in Arch Linux
Bits #4: Recovering from a PAM Misconfiguration in Arch Linux
Bits #3: How to Calculate and Decompose Syslog Message Priority
Bits #2: Real-time Log Forwarding with Python and Syslog
Bits #1: Logging Python messages to Syslog in macOS
blogging
Using GPT-3.5 for SEO Advice
How to Change Zola Theme: Steps and Recommendations
Blogging and the Freedom of the Web
certification
AWS Certified Security - Specialty Review
My Journey to CISSP Certification
Minha Experiência Estudando para a Certificação CompTIA Security+
Certificações em seleção de pessoal
cloud
Using AWS Secrets Manager in Your Scripts
Getting Started with CloudFlare for Web Protection
AWS Certified Security - Specialty Review
finance
portfolio-tracker: mastering your finances
Handling Floating Point Precision in Spreadsheets
Bits #6: Getting Cryptocurrency Prices in Google Sheets
git
How to Change Zola Theme: Steps and Recommendations
Automating Network Management with NetBox Scanner
Trabalhando com Submódulos no Git
Aprendendo a criar sites estáticos com Zola
logs
Chronicle SIEM: Insights and Challenges Explored
Effective Detection Rules for Network and Port Scans: Implementation Strategies
Automating Incident Response: A Scalable and Robust Approach
The Importance of Logging Strategy
Bits #3: How to Calculate and Decompose Syslog Message Priority
Bits #2: Real-time Log Forwarding with Python and Syslog
Bits #1: Logging Python messages to Syslog in macOS
networking
Query Security Services for IP Reputation
Creating a Hardened Testing Environment
Bits #5: Set static IP address in Arch Linux
Automating Network Management with NetBox Scanner
python
Using GPT-3.5 for SEO Advice
Bits #2: Real-time Log Forwarding with Python and Syslog
Bits #1: Logging Python messages to Syslog in macOS
Automating Network Management with NetBox Scanner
security
Chronicle SIEM: Insights and Challenges Explored
Effective Detection Rules for Network and Port Scans: Implementation Strategies
Hardening Email with DKIM, SPF, DMARC
Export and Decode GAuth 2FA Accounts
Using AWS Secrets Manager in Your Scripts
Updating Signed Documents with GPG
Automating Incident Response: A Scalable and Robust Approach
The Importance of Logging Strategy
Friction Between Red Teams and Incident Response
Query Security Services for IP Reputation
Creating a Hardened Testing Environment
Secure and Easy Password and MFA Management
AWS Certified Security - Specialty Review
My Journey to CISSP Certification
Linux Hardening with CIS Controls
Arch Linux Hardened Installation Guide
Minha Experiência Estudando para a Certificação CompTIA Security+
siem
Chronicle SIEM: Insights and Challenges Explored
Effective Detection Rules for Network and Port Scans: Implementation Strategies
Automating Incident Response: A Scalable and Robust Approach
The Importance of Logging Strategy
spreadsheet
portfolio-tracker: mastering your finances
Handling Floating Point Precision in Spreadsheets
Bits #6: Getting Cryptocurrency Prices in Google Sheets
syslog
Bits #3: How to Calculate and Decompose Syslog Message Priority
Bits #2: Real-time Log Forwarding with Python and Syslog
Bits #1: Logging Python messages to Syslog in macOS
unix
My Minimalistic Approach to Mac System Setup
Query Security Services for IP Reputation
Creating a Hardened Testing Environment
Bits #5: Set static IP address in Arch Linux
Bits #4: Recovering from a PAM Misconfiguration in Arch Linux
Bits #2: Real-time Log Forwarding with Python and Syslog
Bits #1: Logging Python messages to Syslog in macOS
Installing Nerd Fonts on Arch Linux
Arch Linux Workstation Setup
Linux Hardening with CIS Controls
Arch Linux Hardened Installation Guide