0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Get Familiar with Visual Editor
By: KMCLink
April 23, 2018

Get Familiar with VI There are so many text editors for *nix systems, but VI is surely the most historically widespread. VI stands for "Visual editor", and VIM is an "IMproved" version of VI that can usually be installed via a package manager. You can find Visual Editor (VI) in any Linux distribution, in many Unix flavors , as ...

Office 365 Mailbox Backups
By: magstephen08
April 23, 2018

Is it Necessary to have an Office 365 Backup? One of the members of the audience asked me a question, i.e., how to backup Office 365 mailbox in a straightforward way without any trouble. People switching from an on-premise environment to Office 365 give rise to such type of ...

Bates Stamp Numbering for Documentation
By: BellaBlackwell
April 23, 2018

Bates numbering legal documents is mainly done for data determination and retrieval. It provides a clear identification, protection with auto_increment numbering to organize documents smartly. The prefix and suffix make it easier to find the central subject matter of the documents/files. The bates numbering method is utilized in many fields, such as to resolve legal cases, medical reports, and ...

Your Role in Cyber: Proper Online Usage & Threat Mitigation
By: Palita2018
April 23, 2018

The latin locution "Hic et Nunc" in the information process, created in the cyberspace domain, loses the space and time dimension and turns into "usquam et semper" because, as Paul Valery had prophetically described in his short essay of '33 entitled "La conquête de l'ubiquité", the rapid development and diffusion of new ...

NSA | Crypto Challenge of the Week | Week 16
By: Harwinder Singh
April 22, 2018

At the first glance, I recognized that this piece of text was a quote. I had to find similarities in the text so I thought about the possibility of the first word being similar to "PETER". From adding the letter E to the M's I found out that there was a short 3 letter word at the ...

Step into Cyber Security
By: Bisoye
April 22, 2018

There are so many open jobs in cyber security and IT, and many people wonder how to enter into the field. Many people may even wonder if they should enter the field, if they have what it takes, or even where they should start. Here are some steps to help you decide if cyber security is right for ...

The Importance of jQuery Mobile in 2018
By: thomassujain
April 22, 2018

5 Reasons to Include jQuery Mobile in Your Web Dev Plans for 2018 jQuery mobile makes the concept of optimizing a single website design for multiple mobile devices a reality. Write less to do more, is the correct way to describe the perks of the client-side JavaScript library for mobile. The need for mobile websites has ...

By: rowabi
April 21, 2018

HoneyBOT is a medium interaction honeypot for windows. It is a fake device occurrence on our local network. The device works as a target for hackers and to get what they want from fake data on the device. This is great to learn how the hacker thinks and what his intent is with our device and data. Also, we can learn how ...

Protect Your PC from Attack in 4 Steps
By: iven
April 21, 2018

STEPS TO PROTECT WINDOWS COMPUTER FROM CYBER ATTACK I waked this morning and decided to write an article about most common issues that daily faced by IT employee and the average folk in there home, shop, etc. let's have a look about below chart I found it while I google ...

Advanced PDS: OST to PST Converter Solution
By: elinalima
April 21, 2018

Advanced PDS OST to PST Converter Software 10.5 full version for 2016/ 2013/ 2010/ 2007 Corruption issues of Outlook OST File are: Internal error of OST file (error code=0000000E) Error 8004011D-526-80040115-0 Service-specific error 0 (0×0) Error code 0x8004103b OST Internal error ...