0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Dr. Cyber Security: A Look into the Healthcare Industry
By: Olivia
February 27, 2018

While cyber security breaches continue to top headlines across industries, it seems that hackers have taken a special interest in the healthcare industry. According to Healthcare’s Electronic Protected Health Information (ePHI), patient medical records can be sold for as much as $100 each on the Dark Web. This lucrative market is continuing to provide the demand side ...

Python Port Scanner
By: thewind
February 27, 2018

Hello everyone, great to meet you    In this first article of series of python for hacker we are going to see how to write a port scanner with python.    I) what is Scanning ?    Reconnaissance is the first step of the kill chain when conducting a penetration ...

Try EML to PST Converter to Combine EML Files to PST Format
By: stevesmith27
February 26, 2018

Now, Try EML to PST Converter for quick conversion of multiple EML files to PST format. It safely converts EML to PST format and combine EML files into PST format in few moments. It is the best solution for users who are looking to import EML files to Outlook. This ...

Tips to Build a Better Career with MCITP Certification
By: michaelwarne
February 26, 2018

There are many advantages that the emerging technologies have given to the present generation, it has also made the level of competition really high for the individuals. It is no more possible for the individuals to gain the desired level of success unless and until they have something extra to offer to the company.While many companies look ...

How to Master Cyber Security
By: kunalgupta007
February 25, 2018

Cyber Security is now about few commands that you enter nor it is about some tools that you use (GUI based), to become a Ninja of Cyber Security you must know in-depth knowledge about working of a computer and network devices. This topic Cybersecurity is one emerging topic because data involved in it is very critical and ...

Intro to HTML
By: SP
February 24, 2018

What is HTML? HTML is the standard markup language for creating Web pages. HTML stands for Hyper Text Markup Language HTML describes the structure of Web pages using markup HTML elements are the building blocks of HTML pages HTML elements ...

How to Convert EML Files to PST
By: angeljonson
February 24, 2018

Conversion from EML files to Outlook PST format is not an easy task. To make the conversion ease, we have come up with the Mailsware EML to PST Converter . The software successfully converts EML files to PST without Outlook installation. So, if you want to export EML to PST ...

How to Become a CISO
By: Olivia
February 24, 2018

As many of you probably already know, today’s organizations cannot take the risk of a data breach but, as yet another system hack tops headlines, we’re drawn back to the same questions of how did it happen and who is at fault? But maybe the better questions are, what are those companies not making headlines doing to ...

Who's Really to Blame for Compromised Passwords?
By: sf_dod
February 23, 2018

When a password is compromised and ultimately leads to a breach, whose fault is it? Most people would place the blame on the employee whose password was compromised and argue that they failed to create a strong and secure password. On the other hand, blame could be placed squarely on the shoulders of the IT administrator ...

Export Apple Mail to Windows Outlook 2016, 2013, 2010, 2007, 2003
By: techalphy
February 22, 2018

The MAC OS running the OS X 10.0 or later versions has Apple Mail as an email client by default. This has a lot of features which can be advantageous to the users. This is naturally preferred by the Mac users, but there might be various reasons prompting a user to transfer or export Apple Mail to Windows Outlook. ...