Skip to content

Antonio Feijao UK

Learning by doing!

Buy-me a coffee

Hello! I believe in openly sharing knowledge, and I offer my insights and tips here for free.

Please use them at your own discretion.

If you find my content helpful, I would greatly appreciate your support by buying me a coffee ☕️ – it keeps the ideas flowing!😊

Buy Me a Coffee


video-playbackRate-speed-change

These single lines JavaScript increase, or change, the video playbackRate speed.

document.querySelector('video').playbackRate = 2.0;

document.getElementsByTagName('video')[0].playbackRate = 2.0;

Opinions are my own

playing with timelines

Historical Events Timeline

This timeline highlights significant events from the Big Bang to the modern era,
emphasizing the impact of knowledge sharing and education on humanity's progress.
* https://www.antoniofeijao.com/timeline/

Technology and Cybersecurity Timeline

Here you will find a comprehensive overview of the major events that have shaped the fields of technology and cybersecurity.
From the formation of the Earth and the first single-celled organisms to the latest advancements in artificial intelligence and quantum computing,
explore the key milestones that have driven human progress.
* https://www.antoniofeijao.com/timeline-technology-and-cybersecurity/


blog posts


AI generated - Daily Cyber Security news summary from various sources

play with OpenAI API

Generatting a daily Cyber Security news summary from various sources.


2025-02-10 - cyber news summary

The most commonly mentioned topics in these articles include cybersecurity threats and malicious activities, endpoint detection and response and host-based intrusion detection tools, government demands for backdoor access to data, and new cybersecurity practices and tools.

In particular, the XE Group has shifted from credit card skimming to exploiting zero-days, evidenced by a recent attack involved a VeraCore zero-day to deploy reverse shells and web shells (source).

Meanwhile, the UK government is demanding Apple create an iCloud backdoor, raising concerns over end-to-end encryption and user privacy (source).

Credit card skimmers have also been deployed on Magento stores using the Google Tag Manager (source).

In Georgia, the Memorial Hospital and Manor alerted 120,000 individuals of a data breach due to a ransomware attack in November (source).

The cybersecurity community is recommending strengthening Okta security settings, given its critical role in identity infrastructure (source).

Lastly, various tools have been highlighted, such as BestEDROfTheMarket for endpoint detection and response testing, AgentSmith HIDS for host-based intrusion detection, and padre for Padding Oracle attack exploitation (source 1, source 2, source 3).


Happy learning,

Antonio Feijao UK

Introduction to Cloudflare: Empowering Secure and Efficient Internet Experiences

Cloudflare has emerged as a critical player in enhancing the performance, reliability, and security of the internet.

Its suite of tools, including web application firewalls (WAFs), content delivery networks (CDNs), DDoS mitigation, and Zero Trust services, addresses the diverse needs of businesses in a digitally transforming world.

The company’s emphasis on automation and scalability makes it a go-to solution for both small enterprises and global corporations.


The Importance of Learning and Practice in Cloudflare’s Ecosystem

Understanding the capabilities of Cloudflare is essential for

AWS IAM Policy Simulator

How to Validate AWS IAM Policies with the AWS Policy Simulator. A Deep Dive

Introduction

Brief overview of the AWS Policy Simulator

An underutilised yet powerful tool that helps verify the impact of IAM policies before deployment.

Highlight the importance of policy validation to ensure the principle of least privilege, especially in environments with strict compliance requirements.

Hashcat in AWS GPUs NVIDIA and password cracking, including performance benchmarks

Cracking Passwords with Hashcat - Performance Benchmarks and Security Implications

Important

DISCLAIMER - this is for educational porpuses only! You are responsable for your own actions.

Alert

GPUs instances can be expensive! Make sure you know and you can affort the cost of the instances you are selecting


Introduction

Hashcat is a widely-used, high-performance tool for cracking password hashes.

Its versatility across various platforms, including local machines and cloud instances, highlights how quickly seemingly complex passwords can be broken.

This post delves into the practical applications of Hashcat, explores password security risks, and presents benchmark comparisons between Apple's M1 chip and AWS GPU instances.

CrowdStrike - Leading Cybersecurity through Major Incidents

CrowdStrike

CrowdStrike is a leading cybersecurity company specializing in endpoint protection, threat intelligence, and incident response. Their flagship product, CrowdStrike Falcon, is a cloud-native platform offering comprehensive security solutions.


Content below

The content below is the result of an interaction between Antonio Feijao UK and ChatGPT. Reminder that the content on this website are my own opinions. Use at your own responsibility.


Major Events and Contributions

The Power of Knowledge Sharing and Education

image generated by ChatGPT, image generator - prompt

Create an image that symbolizes the power of knowledge sharing and education. The scene should feature a diverse group of people exchanging books, ideas, and technology in a vibrant, modern setting. In the background, there could be elements representing historical knowledge, such as ancient scrolls and the Library of Alexandria, merging seamlessly with modern educational tools like computers and tablets. The atmosphere should be bright and inspiring, with visual metaphors for growth and enlightenment, such as light bulbs, open books with glowing pages, and interconnected networks symbolizing the spread of knowledge.

About this post

This post is result of an interaction between Antonio Feijao UK and ChatGPT.

timeline of major historical events

https://www.antoniofeijao.com/timeline/ - Example of a timeline with major historical events that, if prevented, could re-share history as we know it -


Preserving the Library of Alexandria

Historical Context

The Library of Alexandria, established in

Basics web scraping using Python3 with BeautifulSoup4 and then convert to Markdown

Basics web scraping using Python3 with BeautifulSoup4 and then converting to Markdown

Basic Python BeautifulSoup4 web scraping and then Markdown

pip install requests
pip install beautifulsoup4
pip install markdownify

import markdownify 

import requests
from bs4 import BeautifulSoup

def beautifulsoup_web_scrape_url(url):
  response = requests.get(url)
  soup = BeautifulSoup(response.content, 'html.parser')
  return str(soup)

url = "https://www.antoniofeijao.com/"

data = beautifulsoup_web_scrape_url(url)

print(data)



# convert html to markdown 
h = markdownify.markdownify(data, heading_style="ATX") 
  
print(h)


f = open("result.txt", "w")
f.write("##result file done. Woops! I have deleted the content!##")
f.write(h)
f.close()

#open and read the file after the overwriting:
f = open("result.txt", "r")
print(f.read())

inspiration-from


Happy learning

by Antonio Feijao UK

List all AWS VPCs or subnets with theirs tags and list them using jquery

Example AWS cli command with listing using [.jq(https://jqlang.github.io/jq/)].

This commands list all AWS VPCs within the account with their VpcId, CidrBlock and their Tags.

aws ec2 describe-vpcs | jq -r '.Vpcs[] | "\(.VpcId) \t \(.CidrBlock) \t \(.Tags[])" '

It is also possible to "select" a specific Tags.

aws ec2 describe-vpcs | jq -r '.Vpcs[] | "\(.VpcId) \t \(.CidrBlock) \t \(.Tags[] | select(.Key == "Application") | .Value)" '

example, select VPC name and sort by VPC name.

aws ec2 describe-vpcs | jq -r '.Vpcs[] | "\(.VpcId) \t \(.CidrBlock) \t \(.Tags[] | select(.Key == "Name")| .Value)" ' | sort -nk2

documentation for https://awscli.amazonaws.com/v2/documentation/api/latest/reference/ec2/describe-vpcs.html


List all Subnets with filter .key, .value data that I picked.

the sort -nk5 at the end, put on put the subnet with the least number of available IPs, taken from .AvailableIpAddressCount.

aws ec2 describe-subnets | jq -r '.Subnets[] | "\(.AvailabilityZone); \(.AvailabilityZoneId); \(.VpcId); \(.CidrBlock); \t \(.AvailableIpAddressCount); \t \(.Tags[] | select(.Key == "Name")| .Value)  "  ' | sort -nk5

documentation for https://awscli.amazonaws.com/v2/documentation/api/latest/reference/ec2/describe-subnets.html


Next, why not rotate through other AWS accounts in the Org if you have them?! and rotate through regions?! :)

I have been there, done that, so leave the challenge for you :)


Happy learning,

Antonio Feijao UK