0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Easily Convert MSG to PDF with Attachments
By: lukaswright
May 16, 2018

Download the most genuine solution ZOOK MSG to PDF Converter to batch convert MSG to PDF with attachments easily. It allows a user to bulk export and print MSG files to PDF format in two simple steps. This best MSG to PDF converter tool which easily exports multiple MSG to PDF format in a ...

Free Download OST to PST Converter Software
By: martinhoff6
May 16, 2018

Whether it is to extract mailbox data saved within a badly damaged OST file or the need to move OST mailboxes to a different machine, converting Outlook OST file into PST format is the most feasible solution. Stellar OST to PST Converter is the most reliable and user-friendly software for achieving accurate and quick OST 2 PST conversion.It is ...

5 Tips to Prepare and Pass for the VMware VCP Exam
By: Vikrant Saran
May 15, 2018

The adoption of digital workspaces is indeed adding value to the core businesses with a new outlook for the business approach and processes. As a known fact, a comprehensive end-user computing platform is the backbone of this digital transformation drive. In this lane, VMware has witnessed a tremendous growth in India. The digital workspace solutions adopted by ...

CSIRT - Quick Guide & Overview
By: elazarbiro
May 14, 2018

CSIRT – What to do: A CSIRT may perform both reactive and proactive functions to help protect and secure the critical assets of an organization. There is not one standard set of functions or services that a CSIRT provides. The team chooses their services based on the needs of their ...

Denial of Service Using Malformed NTFS Files
By: seoweb2writer
May 14, 2018

A Romanian cyber security expert released a proof-of-concept- code that exposes the vulnerabilities in Windows7 / Windows 10, which can easily cause the blue screen of death, even when the system is locked.  This rogue code helps user or hacker deliver a denial of service type attack that can crash the windows machine within minutes, even when ...

How to Footprint Web Applications
By: Dr. Michael J. Garbade
May 14, 2018

Footprinting is an essential aspect of the hacking process. It involves acquiring vital information about the computer system or application to be targeted. It can be carried out either passively or actively. The passive collection of information implies the lack of active interaction between the attacker and the targeted system. In ethical hacking, footprinting is ...

The PGP key Panic: Safety 101
By: Joeri Jungschlager
May 14, 2018

Most of us have been using PGP for at least 5 years, some even more than 10 or 20. Nothing could be more stressful than our users and more our selves with the safety of PGP,  the Asymmetric key standard for encryption of emails and files. So the article:   Attention PGP Users: New Vulnerabilities Require You To Take Action ...

Protecting Your Online Information with Encryption
By: Jessica
May 13, 2018

With the recent rash of online security incidents that include data breaches and ransomware attacks, one thing has become clear: no information online is safe. If major entities like the email provider Yahoo!, the credit bureau Equifax, and software giant Adobe can fall victim to the data breaches carried out by cyber thieves, then everyday end users are certainly ...

Has Your Email Been Hacked?
By: Jessica
May 13, 2018

Back in the day, people used to anxiously wait for the mailman to drop off mail in their residential mailboxes. Instead of waiting by the mailbox, people now constantly refresh their email apps to check for new messages in their electronic mailboxes. Fast, convenient, and within the palm of one’s hands, email gives users a sense of control, especially ...

Tulpar - Python Web Application Vulnerability Scanner + Telnetlib
By: anilbaranyelken
May 8, 2018

This brief tutorial/guide is just to provide you with some basic information about Tulpar and port scanning. Tulpar means winged horse in Turkish mythology. It is an open source web vulnerability scanner for written to make web penetration testing automated. Tulpar has the following features: Sql Injection (GET Method) XSS (GET Method) ...