Security Research

PopLab Security Research

Cloud Admin

AWS, OVH and Google CE Clouds administration. Public, Hybrid and Private Clouds maintenance.

LEARN MORE

Web Developer

Raw PHP and Laravel framework user. Boostrap, JQuery and ReactJS development .

LEARN MORE

Digital Marketing

Google AdWords and Analytics certified
, marketing automation and Leads generation.

LEARN MORE

Cyber Security

Threat Intelligence , Network Monitoring, Pentesting, Reporting and analysis of Phishing attacks.

LEARN MORE

OSINT

Open Data Evangelist and public APIs producer, need an API ?

Contact me.

LEARN MORE

Data Analytics

Correlate different data feeds to optimize decision and improve network security.

LEARN MORE

DIY Projects

Electricity background, Arduino and RF playground, compile , run, monitor, Pwn!

 Welcome IoT!

LEARN MORE

Networking / Telecom

Years of experience working with Cisco, Huawei, Alcatel, Nokia, Ericsson, Microsoft, Red Hat.

LEARN MORE

“It takes 20 years to build a reputation
and few minutes of cyber-incident to ruin it.”
― Stephane Nappo

Data Analytics

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

LEARN MORE

Social Marketing

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Learn More

Stay High under the Clouds

Web Tools

 

Social B0t

 

PopLab – Affiliate System

 

VPN Service

 

Public DNS Servers

 

CDN Network

 

WarDriving Portugal

 

TOR Services

 

WordPress Plugins

 

Intel-Data

 

Affiliate Networks DataBase

 

URL Short System

 

Join us. It will only take a minute

Cyber Security Enthusiast

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

POLICIES

Create a secure access policy network or an new IP Address scheme with security in mind.

IMPLEMENTATION

Deploy network security or surveillance devices to monitor your network

ADMINISTRATION

Hardening networks, Red Hat, Windows Server and network monitoring.

AUDIT

Network Security audits and possible attack vectors presentation.

Say Hello

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

[one_page_express_contact_form shortcode=”mautic type="form" id="1"”]

Lastest Neurons

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

[one_page_express_latest_news]