Tags
archautomationawsbeerbitsbloggingcertificationcloudcloudflarecryptocurrencyfinancegitgpggsheetslogsmfanetlifynetworkingopenaipampasswordspythonsecuritysiemstorysyslogunixworkstationzola
arch
Creating a Hardened Testing Environment
Bits #5: Set static IP address in Arch Linux
Bits #4: Recovering from a PAM Misconfiguration in Arch Linux
Installing Nerd Fonts on Arch Linux
Arch Linux Workstation Setup
Linux Hardening with CIS Controls
Arch Linux Hardened Installation Guide
automation
Using GPT-3.5 for SEO Advice
Automating Incident Response: A Scalable and Robust Approach
Automating Network Management with NetBox Scanner
bits
Bits #6: Getting Cryptocurrency Prices in Google Sheets
Bits #5: Set static IP address in Arch Linux
Bits #4: Recovering from a PAM Misconfiguration in Arch Linux
Bits #3: How to Calculate and Decompose Syslog Message Priority
Bits #2: Real-time Log Forwarding with Python and Syslog
Bits #1: Logging Python messages to Syslog in macOS
certification
AWS Certified Security - Specialty Review
My Journey to CISSP Certification
Minha Experiência Estudando para a Certificação CompTIA Security+
Certificações em seleção de pessoal
cloud
Using AWS Secrets Manager in Your Scripts
Getting Started with CloudFlare for Web Protection
AWS Certified Security - Specialty Review
git
How to Change Zola Theme: Steps and Recommendations
Automating Network Management with NetBox Scanner
Trabalhando com Submódulos no Git
Aprendendo a criar sites estáticos com Zola
logs
Automating Incident Response: A Scalable and Robust Approach
The Importance of Logging Strategy
Bits #3: How to Calculate and Decompose Syslog Message Priority
Bits #2: Real-time Log Forwarding with Python and Syslog
Bits #1: Logging Python messages to Syslog in macOS
networking
Query Security Services for IP Reputation
Creating a Hardened Testing Environment
Bits #5: Set static IP address in Arch Linux
Automating Network Management with NetBox Scanner
python
Using GPT-3.5 for SEO Advice
Bits #2: Real-time Log Forwarding with Python and Syslog
Bits #1: Logging Python messages to Syslog in macOS
Automating Network Management with NetBox Scanner
security
Export and Decode GAuth 2FA Accounts
Using AWS Secrets Manager in Your Scripts
Updating Signed Documents with GPG
Automating Incident Response: A Scalable and Robust Approach
The Importance of Logging Strategy
Friction Between Red Teams and Incident Response
Query Security Services for IP Reputation
Creating a Hardened Testing Environment
Secure and Easy Password and MFA Management
AWS Certified Security - Specialty Review
My Journey to CISSP Certification
Linux Hardening with CIS Controls
Arch Linux Hardened Installation Guide
Minha Experiência Estudando para a Certificação CompTIA Security+
siem
Automating Incident Response: A Scalable and Robust Approach
The Importance of Logging Strategy
syslog
Bits #3: How to Calculate and Decompose Syslog Message Priority
Bits #2: Real-time Log Forwarding with Python and Syslog
Bits #1: Logging Python messages to Syslog in macOS
unix
My Minimalistic Approach to Mac System Setup
Query Security Services for IP Reputation
Creating a Hardened Testing Environment
Bits #5: Set static IP address in Arch Linux
Bits #4: Recovering from a PAM Misconfiguration in Arch Linux
Bits #2: Real-time Log Forwarding with Python and Syslog
Bits #1: Logging Python messages to Syslog in macOS
Installing Nerd Fonts on Arch Linux
Arch Linux Workstation Setup
Linux Hardening with CIS Controls
Arch Linux Hardened Installation Guide