0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

How to Import OST to Office 365 + Upload Data to Exchange Online
By: PankajDohre
June 22, 2018

Here we will talk about How to Import OST file to Office 365 cloud platform. I have discussed two different methods for migrating OST to Exchange Online (Office 365). If you are planning to switch Office 365 then this blog will surely help you. How Can We Migrate OST File to Office 365 Cloud Mailbox? There ...

CVE-2017-8464 LNK Remote Code Execution Vulnerability
By: Ashish jha
June 21, 2018

Hello, wonderful people! This is your friend, Ashish. Today, we'll hack a Windows 7 machine with a relatively new vulnerability called LNK RCE in Windows.Being a white hat, I have to be in the practice of finding new vulnerabilities but also in the practice of knowing the exploitation of newly discovered vulnerabilities. And that's what I want from you ...

Manage Microsoft Endpoint Security with PowerShell
By: Clysm
June 20, 2018

The Microsoft System Center Configuration Manager, or SCCM, has seven reports that you can use to help manage your Microsoft Endpoint Protection software. From an Overall Status and History to Top User Threat List, you can usually get what you need. In some cases though, you may have to dig into a few reports, export the data to an ...

About a Hacker: A walk on the 'Bad Side' (Arabic to English)
By: Mohamed Abdellatif Jaber
June 19, 2018

  قصه عن القراصنه   كان القرصنة جزءا من الحوسبة لمدة 40 عاما ظهرت أول قراصنة الكمبيوتر في معهد ماساتشوستس للتكنولوجيا. بدأ القرصنة في 1960 في معهد ( MIT ) ماساتشوستس للتكنولوجيا، أصل "القراصنة". الحقيقة القراصنة بين مجتمعاتنا ...

ZOOK Email Backup Software
By: lukaswright
June 19, 2018

Have you been wondering how to make backups of emails from your email account? Try this amazing email backup application named ZOOK Email Backup Software, which successfully allows you to fix all your issues. It also offers you the ability to create backup emails from 40+ online email service providers. ...

What is Spyware and How Can I Prevent It?
By: Jessica
June 17, 2018

There are eyes everywhere. Between the security cameras that businesses set up around their locations and virtually everyone having a camera phone, every person out in the public is on display in some way, shape, or form. Whether it’s in a grocery store or on a random street corner, we are always being watched. When you’re within the privacy ...

Payload: The hacking beyond imagination
By: adityapatel
June 17, 2018

In this post, we are discussing a very intersting topic: payload. So what is a PAYLOAD?? What can be done using it?? Well, a payload can be considered to be somewhat similar to a virus. A payload is a set of malicious codes that carry crucial information that can be used to hack any device beyond limits that ...

How Credit Card Numbers Get Stolen
By: Jessica
June 17, 2018

It seems like most people care for carrying around cash anymore, especially younger people like teenagers. But with the endless conveniences that those little pieces of plastic called credit cards offer, who still wants to bother with physical money anymore? Virtually all places of business accept credit cards as a form of payment, credit cards can be used to ...

Router: The First Line of Defense or the First Mistake?
By: Terumo
June 17, 2018

Routers are those devices that nearly everyone has at home, but most of them have serious security flaws and are barely understood.Let's be honest: we talk about security, regulations, pen tests, etc., but those topics only apply to companies. How many standard households have their routers poorly configured, either because of the ISP technician's lack of effort (most of ...

Top Free Methods For Exporting Mac Outlook 2016 to PST
By: justin hansen
June 16, 2018

Summary: This article is about how to export Mac Outlook 2016 to PST file format. The user will get a clear idea about OLM and PST file types, their needs, and their differences. We will also learn about different techniques to migrate from Mac Outlook to Windows Outlook with the help of the SysTools OLM Converter .Although Mac ...