0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

The Resilience of Critical Infrastructures
By: Palita2018
April 17, 2018

2.4 What to Protect Against - Cyber Threats Wikipedia updated list: 0–9 A B C ...

Better Performance for MacBook Users
By: evavergis
April 17, 2018

One important piece of advice I can give mac users is to invest in a good quality USB type-C hub for your MacBook Pro for better performance. In other words, if you have an amazing engine and a nice looking exterior, what good it is if the car doesn't have wheels/tires to go anywhere? More and more people are ...

Your Intro to Capture The Flag (CTF)
By: clairvo
April 17, 2018

Welcome, to any enthusiastic cybrarian viewing this.I am a high school senior and my entire senior project is based on the world of CTF. In the following article, I will be translating the first section of my senior project documentation for everyone interested in getting a better understanding of CTF. 1.1. Introduction CTF ...

Improve Internet Security by Blocking Malicious Domains
By: Shaquib Izhar
April 16, 2018

What is this post about? In this post, I will show you how can you block all malware domain which hosts malicious code on their sites which can compromise your system or your browser by saving some bad cookies or malware on your computer, not only this it will also block ads and online tracking ...

Outlook is Back "In"? How to Bulk Convert MSG to PST
By: lukaswright
April 16, 2018

Are you looking to bulk import MSG files to Outlook 2016, 2013, 2010, 2007, and below editions? Then, download best MSG to PST Converter to combine multiple MSG files to PST with attachments . In this article, you will get the complete solution to convert MSG to PST without Outlook. Before moving on, let us ...

The Best Email Backup for Email File Hoarders
By: angeljonson
April 16, 2018

Do you want to create Email file backup? If yes, then read the following article. Here, we are going to provide you the best way by which you can easily create a backup of 40 email client services without losing a bit of information. So, keep reading the post and know how to backup email files easily. ...

Kerberos Authentication Protocol Overview
By: CHITTILLA VENKATA VISWANATH
April 16, 2018

What is Kerberos?  Kerberos is a computer network authentication protocol that works on the basis of tickets. These tickets allow the nodes communicating over a non-secure network to authenticate in a secure manner. Kerberos is built into all major operating systems.Kerberos is a Client-Server modelSymmetric key model Meaning of Kerberos:  The name Kerberos was taken from a Greek ...

The Resilience of Critical Infrastructures
By: Palita2018
April 15, 2018

Historical Background Since the ancient Romans it was clear the importance of critical infrastructures, so that for example they had invented a system of IPS / IDS for the protection of drinking water, raising trouts in pools far km away from Rome, sprayed by the same water conducted in the city by the famous Roman aqueducts, placing a look-out ...

NSA | Crypto Challenge of the Week | Week 15
By: Harwinder Singh
April 14, 2018

Intelligence. It's the ability to think abstractly. Challenge the unknown. Solve the impossible. NSA employees work on some of the world's most demanding and exhilarating high-tech engineering challenges. Applying complex algorithms and expressing difficult cryptographic problems in terms of mathematics is part of the work NSA employees do every day.Today I solved the Crypto Challenge of week 15. It ...

The Best Firewall for your Company: Yourself
By: usouzajr
April 13, 2018

I've seen the main facts about Security in the last months, and I still get amazing on how enterprises are being affected by several kinds of attacks. When taking a time to analyze it, we can figure out the main problem for all of these issues - a complete lack of strategies, good practices and architecture for cybersecurity. ...