Google Workspace – useful GAM commands for calendar privacy

I just had a problem where Google Calendar’s default privacy setting was changed to “freeBusy” but didn’t replicate to all users. Looking into it, the privacy change is only applied if the user hasn’t changed their calendar’s default settings. It’s not clear what settings influence this. Anyway, we needed to use GAM to fix the…

GSUITE / Google Workspace – How to transform a user account into a group and keep all e-mails

Edit (15/02): Thanks to hjkimbrian for warning that there is no way to backup emails from a group. Do you have user accounts in your org that are “shared” between your employees?If you do, that’s a big no no. Account sharing is a horrible practice and is basically a ticking clock to some security incident…

GCP – How to automatically export backups (MySQL and instances) to other places (AWS, Offline, etc…)

GCP has a pretty good backup system which is really easy to configure. For instances, you can schedule automatic snapshots and also convert theses snapshots to images whenever you want.For MySQL databases (not sure about the other types) you can schedule backups which are stored in a neat “full backup + incremental backups” to save…

How I passed the GCIH Exam with a score of 96%

On 17/07/2019, after many weekends of studying and preparation, i finally passed the GCIH exam. I was impressed by my final score, since on the practice exams i had only scored about 84-86%. I managed to get into the SANS Advisory Board and now my mailbox is filled with juicy discussions about lots of cool…

How to copy data from an Excel Spreadsheet protected by Information Rights Management (IRM).

Note: This applies to cases where you have editing privileges but no copy privileges. I haven’t tested other cases. The enterprise edition of Office 365 contains a feature called “Information Rights Management” (IRM). It allows you to designate edit/copy/view privileges on Office files for specific users (or groups) in your company. I honestly had no…

Rainbow Tables – O que são? Como usar?

Nota: A explicação técnica do que é uma Rainbow Table está na parte 3. Pule para lá, se quiser. Imagine que você, após utilizar todas suas habilidades de 1337 h4xx0r, consegue uma lista de hashes de senha e quer recuperar as senhas originais. Quais são as suas opções? 1) Brute-Force Esse é metodo menos custoso…