0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

How to Convert MSG to MBOX Format
By: angeljonson
June 27, 2018

We all understand that there are several desktop email client applications available these days. Despite the actual fact that each of those desktop email clients has its own significance, it’s a standard trend to switch from one platform to another. In this article, we'll be discussing a way to convert MSG to MBOX format and ...

Business Continuity vs. Disaster Recovery
By: eyancy
June 27, 2018

What is a Business Continuity Plan and a Disaster Recovery Plan?   Is there a difference between the two? Although they are often confused and intermixed in the discussion, a business continuity plan and a disaster recovery plan are two very distinct and separate exercises.  A business continuity plan (BCP) is a process in which an environment is ...

2018 FIFA World Cup Cyber Threats: Things to Watch Out For
By: Dr. Michael J. Garbade
June 26, 2018

The ongoing FIFA World Cup in Russia is one of the most followed sporting events in the world. In fact, it’s estimated that 3.4 billion people, about half of the world’s population, will be viewing the event until it ends on July 15 th . As soccer fans (or football fans if ...

Convert OST Files to PST Format
By: Allansmith
June 25, 2018

We all regard MS Outlook as one of the best electronic mail services, and it is commonly used in business for correspondence. But due to some unfortunate conditions, the OST database can get corrupted, and the corruption incident is unable to be resolved. In this case, the user may try some alternative method to access the OST files, and ...

What is a Corrupted File?
By: Jessica
June 24, 2018

At some point or another, every computer user has tried opening up a file on his device only to see a message that says “The file you are trying to access is unavailable or has been corrupted.” This may understandably alarm some users, as a “corrupted file” sounds like one that has taken on a life of its own ...

What is Open-Source Software?
By: Jessica
June 24, 2018

With the never-ending releases of web applications and tools like Internet browsers, browser add-ons, and file-sharing systems, you may have heard the term “open source” get tossed around a lot. But what exactly does open source mean, and how does it compare to another popular term, “freeware”? More importantly, how does the “open source” or “freeware” status of an ...

Learn From Mistakes Resulting From Data Breach Incidents
By: Ugra Narayan Pandey
June 24, 2018

The sudden of occurrence of data breaches in the Internet world gives a direct call for safety violation prevention. These incidents occur when an individual tries to cross the boundaries of confidential IT in an illegal way. Such situations lead to cyber hacking of unauthorized networks, services, applications, and secret information. Severe disasters like bankruptcy and destruction of ...

Convert NSF to PST Format and Migrate IBM Lotus Notes Data to Outlook
By: Rude Jonson
June 24, 2018

Method to Convert NSF to PST Format – Expert Solutions When we work with NSF files, we need a Domino server, and when we work with PST files, we need an Exchange server. The Domino server works with Lotus Notes (IBM), and the Exchange server works with Microsoft Outlook. Both are different platforms, so if we ...

MBOX to PDF Converter Wizard to Batch Convert & Migrate MBOX to PDF
By: imstefanie90
June 23, 2018

Convert MBOX Files to PDF with Attachments - MBOX to PDF Converter This review is about the MBOX to PDF Converter, Version: 1.0, Size: 24.2 MB, which helps users convert MBOX files to PDF format without any issue. MBOX is a file format supported by lots of email applications, such as Opera Mail, Thunderbird, Entourage, Apple ...

Introduction to Computer Forensics
By: varsonun
June 23, 2018

A computer is a device that solves problems, manipulates information, processes data, performs calculations, and stores and retrieves data . Computers are classified by size and power. Some categories of the computer are the personal computer, workstation, minicomputer, mainframe, and a supercomputer. It uses different programs to perform different tasks. Forensics can be ...