0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

How to reduce LAN Congestion
By: imumair
February 4, 2019

In networking term LAN congestion is too much data forced through a route that results in the inability to process the data fast enough which inevitably leads to delays and packet loss. This is common and very serious issue for the network and h ere’s list of major 5 things that commonly cause LAN traffic congestion: ...

The Cyber Security Mindset and Important Success Strategies.
By: Witheredforest
February 1, 2019

Cyber security is a difficult field, but it is by no means impossible - it all comes down to the cybersecurity mindset. Let's perform a hypothetical scenario that may be very real to many of you...It's been a few weeks/months since you started your career studies and you catch yourself looking at job descriptions and feeling insignificant, feeling ...

Network Attacks: Entrenchment & Exfiltration
By: Guest Writer
January 31, 2019

SSH, Telnet, Exfiltration, and Whoami? For many cybersecurity professionals, simply compromising a network may only be the first step in an attack. It may require a great technical effort to gain undetected access to a network, but entrenchment ...

5 Simple Ways to Prepare for IT/Cybersecurity Interviews
By: ginasilvertree
January 28, 2019

Interviews can be complex – from the scheduling the meeting or call to the actual meeting to the follow-up. Candidates, recruiters, and hiring managers all play key roles in this somewhat difficult-to-navigate process. As a candidate, your role entails several elements, not the least of which is preparation.The Scouts (formerly known as the Boy Scouts), which was founded in ...

28th January – Data Protection Day
By: bulek
January 28, 2019

What is Data Protection Day? In 2007 the Council of Europe held the first “Data Protection Day”, known as “Data Privacy Day” outside of Europe, to increase awareness about rights to personal data protection and rights. In 2009 The USA joined this drive by declaring the ...

7 Online Privacy Tips to Re-Take Control of Your Data [in 2019]
By: CyberX
January 28, 2019

Do you read about recent data scandals and cringe at the thought of how your personal data is being treated? Or do you feel that you should have at least some control over your data?You’re not alone.Many people are beginning to realize that social media and the internet have helped our society advance at unprecedented rates.But:They ...

Agave – A complete suite of tools for Incident Response
By: andresBello
January 25, 2019

Hello, Cybrary community!It has been a lot of time after my latest article about Tequila, a forensic distribution whose profile is presented as the first OS distribution focused on forensics in the Latam territory.Part of the project is also an additional suite of tools targeted to perform Incident Response over Windows environments called Agave. I promised in my ...

From Noob to Exploit Developer | My Journey
By: y.kashyap007
January 24, 2019

I'm sharing my cybersecurity journey till now with you guys. To tell you a bit about myself, I'm a B.Tech undergraduate in Computer Science and of course a Cyber Security enthusiast. 'Hacking' is the single most important thing that attracts me, besides football. I was the best programmer back in my school. I knew then that all I wanted was ...

Website Security with SSL
By: walt.hutsky
January 24, 2019

If you look at the address bar in your browser you’ll see that my website is now showing Secure, with a green lock symbol, and that the address starts with https . This means that SSL website encryption is enabled and working. What is SSL? Secure Sockets Layer is a standard security protocol that is used to encrypt ...

i2p Networks, Tor and Freenet Features: Pros + Cons
By: Dra4hos7
January 23, 2019

I2p topology i2p is the so-called overlay network. Translated from English “overlay” – overlay or layering. In this case, there is a view of the layering over the already existing Internet, so i2p is sometimes also called the “network over the network”. All traffic on this network is completely isolated and encrypted, thereby ensuring the anonymity of data ...