Cybrary Pro Day is here!

0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

How to Convert OST to PST Format Manually
By: semnaitik
March 11, 2018

Many times I've heard Outlook users asking about OST to PST conversion. In fact, it's one of the most common topics among Microsoft Outlook users. Though both OST and PST are Outlook data files, both are different from each other. OST is an offline storage table while PST is a personal storage ...

Static Application Security Testing for Early Vulnerability Identification
By: Chiranjeevi
March 10, 2018

  Static Application Security Testing(SAST) or Secure code review is an inside-out (White box) test approach to identify the security vulnerabilities at code level. It is essential for an organization to identify and fix the security vulnerabilities at development stage to avoid last minute rush and improve the code quality which reduces the ...

How to Promote a Your Talents Online!
By: Isabella Roz
March 9, 2018

There are a lot of people on Cybrary (and other platforms) that want to share their knowledge and be recognized for that. Here are some great ways that I've learned to promote yourself (your personal brand/business) through your online writing and work. Of course, this isn't just cyber security specific, but I figure it is beneficial for ...

Is Destructive Malware Slowly Becoming a Common Trend?
By: sf_dod
March 8, 2018

  Ask any end user or general IT administrator which cyber-attack they are most fearful of. There is a good chance they will respond with “Ransomware”. I would quickly argue that any IT administrator who is worth their paycheck should not be fearful of Ransomware. A robust backup plan, a tested and proven incident response/recovery plan and an ...

How to Create and Manage MySQL WordPress Database Using WordPress phpMyAdmin
By: barrackdiego
March 8, 2018

WordPress is the leading blogging platform. In the last decade or so, it has been adopted as a great platform for building dynamic websites. The reason for its increased popularity can be attributed to its huge community and user-friendly interface. One thing that most people don’t know is that this platform ...

Introduction and Thoughts on DARKtrace: "The Enterprise Immune system"
By: Sean Mancini
March 7, 2018

 So it has been a few days since I was at the conference and I came across a few companies and products that I have not have the opportunity to see.One of the products that caught my eye was Darktrace they sell their product as the "Enterprise Immune System" essentially they are smashing Big Data ...

Hide Secret Message Inside an Image Using LSB-Steganography
By: Shaquib Izhar
March 7, 2018

Imagine a scenario where we want to send a confidential message and don't want anyone except the recipient to read it. We will use every possible methods to make our message hidden from any third person. So here I am going to use LSB-Steganography method to hide our message inside an image. What is LSB Least Significant ...

How to Secure your Social Media Accounts: 10 Helpful Tips
By: Olivia
March 6, 2018

I’ll admit that was I was very tempted to trick you all into reading this post by making the title ‘How to Hack Facebook,’ but I resisted. Unfortunately, that’s one of the most commonly asked questions in Cybrary support and shows just how important it is to keep your social media accounts secure.Those who are tempted to ...

Best Practices for Infrastructure as a Service (IaaS) in Microsoft Azure
By: Masood
March 6, 2018

According to Gartner, by 2020 worldwide public cloud services will account for $383 billion, a fifth of which (19%) will be Infrastructure as a Service. In a June 2017 report, Gartner put Microsoft as a leader in Magic Quadrant for Cloud Infrastructure as a Service, worldwide, along with Amazon Web Services. A ...

Start Your InfoSec Career by Learning LINUX
By: El1t3S1D
March 6, 2018

   Did you know that learning Linux/UNIX is one of the most important aspects of learning Cyber-Security/Information-Security? Q. What is Linux?A. Its a freaking OS. Linux is a family of free and open-source software operating systems built around the Linux kernel. Linux is packaged in a form known as a Linux distribution (or distro for short) ...