0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Business Intelligence (BI): French
By: radouan2018
March 20, 2018

L’ informatique décisionnelle  (en anglais  business intelligence  ( BI ) 1  ou  decision support system  ( DSS )) est l'informatique à l'usage des décideurs et des dirigeants d'entreprises. Elle désigne les moyens, les outils et les méthodes qui permettent de collecter, consolider, modéliser et ...

Comptia’s New PenTest+ Certification
By: erussell
March 20, 2018

  I took the opportunity to take the CompTIA PenTest+ beta certification exam. CompTIA intends this to be a new vendor-neutral intermediate certification between CompTIA’s Security+ and the CompTIA Advanced Security Practitioner (CASP) . This certification sits alongside the CompTIA Cybersecurity Analyst (CySA+). Similar to other CompTIA exams, this exam consists of both multiple choice and performance-based ...

Support for Beginners: Linux OS for Android
By: tniromin2
March 20, 2018

Termux can be introduced as a pocket edition of Linux OS, and I am highly recommending this for both beginners and package developers. You may visit their site   <  HERE    > and you may learn a few basics and aid your self from < Here >This OS(apk)  has a 99% similarity of commands ...

Resources and Career Information for Hackers
By: ahmedxbrov
March 18, 2018

  Breakthroughs      There are too many breakthroughs, but we can limit them to several key concepts:1 - penetrate sites and servers and forums.     2. LAN penetration.     3 - hacking personal computers. First: hacking sites and servers and forums      If we want to expand in this concept of breakthroughs, we find that it is divided ...

Network Basics: Proxychains
By: odin00
March 18, 2018

To understand what proxychains are we first need to understand what a proxy server is.This is the definition according to Wikipedia:" A P roxy server  is a  server  (a computer system or an application) that acts as an  intermediary  for requests from  clients  seeking resources from other servers.  A ...

Learn How to Add Zoho Mail to Outlook in a Seamless Manner?
By: techalphy
March 17, 2018

"Are you looking for an efficient approach to backup Zoho Mail data? If yes, then you are at the exact place as this blog is discussing the precise solution to export Zoho in Outlook. Read this blog in detail to learn how to configure Zoho Mail to Outlook." In this fast growing technology world, emails play ...

How to Convert EML Files to MBOX Format
By: angeljonson
March 17, 2018

Are you looking for a way to know how to convert EML files to MBOX format? Then read the following article. As in this post, we have come up with the most amazing and reliable tool that easily convert EML files to MBOX format. So, keep reading and get ...

SSL (Secure Shell Login)
By: sandycoder
March 16, 2018

There is two type of encryption symmetric key cryptography and public key cryptography.In the symmetric key cryptography, the same key is used to get the cypher text and the same key is used to revert it backin the public key cryptography, we have two keys one is public other is the private key.Something which is encrypted by ...

Abuse of Cloud Services and IoT
By: Olivia
March 15, 2018

We’re pleased to be partnering with Cisco for this blog. Scroll down to download the Cisco 2018 Annual Cybersecurity Report Ask any cybersecurity professional and most will agree that a large percentage of modern technology was developed without a ‘security first’ mindset. That is, companies work to ship a product and then try ...

Cryptography and Techniques for Hiding Information
By: Shaquib Izhar
March 14, 2018

  In computer science, cryptography is a method of hiding information in storage and during a communication so that only authorized person can access to that information.  Cryptography contains lot of cryptology method for securing communication and information like hiding text or messages behind images, Asymmetric encryption (public key cryptography) ...