0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Flaw in μTorrent That Lets Hackers Control Your PC Remotely
By: shantanurauthan
March 5, 2018

Most of us are using the popular and handy software called μTorrent for downloading and streaming stuff and if you are one of them then you must download its latest version ASAP. You must have seen after pressing that red cross button to close torrent, it still runs in the background until you ...

Passive Scanning with Free Online Tools [Resources for Hackers]
By: RUm83r0
March 5, 2018

All white hat hackers should master different tools for different phases in penetration-testing (reconnaissance, scanning, gaining access, maintaining access, covering tracks/creating report). It takes months or maybe years to master all the tools for scanning.A lot of information gathering and scanning can be done by active scanning using tools from Kali Linux distro. But if you want ...

CSS Hacking: The Surprise of February
By: Joeri Jungschlager
March 4, 2018

To some it may have popped up earlier than 2018, for me it was quite new. I walked into the office after a week of teaching children how to code. Since the age group, the choice for HTML & CSS was more than acceptable. But to my surprise I may have got them way closer to writing ...

Quality Assurance
By: cgarth
March 3, 2018

  I am a Quality Assurance tester at my job. Quality Assurance or QA is a group of processes in place to make sure that an organization document what they do and they do what they document (focus on defect prevention). In other words, making sure the product meets the requirements of what is documented. In order to ...

How to Briskly Convert Exchange OST to MBOX with Attachments?
By: stevesmith27
March 2, 2018

If you have any intention to convert Exchange OST to MBOX format, then use OST to MBOX Converter. It safely exports OST to MBOX with attachments without losing any data items in just couple of clicks. There is no solution is available in the market, that’s why we suggest you ...

EML to PST Converter to Combine EML Files to PST Format
By: stevesmith27
February 28, 2018

Now, use EML to PST Converter for quick conversion of multiple EML files to PST format. It safely converts EML to PST format and combine EML files into PST format in few moments by using ZOOK EML to PST Converter . It is the best solution for users who are looking to import ...

What is Malware?
By: Mahroof CM
February 27, 2018

  You may have told your techy friends or your friends might have told you " I think my computer is having a virus". how do they know that?.  So Let's discuss  about malicious software in short " ...

Dr. Cyber Security: A Look into the Healthcare Industry
By: Olivia
February 27, 2018

While cyber security breaches continue to top headlines across industries, it seems that hackers have taken a special interest in the healthcare industry. According to Healthcare’s Electronic Protected Health Information (ePHI), patient medical records can be sold for as much as $100 each on the Dark Web. This lucrative market is continuing to provide the demand side ...

Python Port Scanner
By: thewind
February 27, 2018

Hello everyone, great to meet you    In this first article of series of python for hacker we are going to see how to write a port scanner with python.    I) what is Scanning ?    Reconnaissance is the first step of the kill chain when conducting a penetration ...

Try EML to PST Converter to Combine EML Files to PST Format
By: stevesmith27
February 26, 2018

Now, Try EML to PST Converter for quick conversion of multiple EML files to PST format. It safely converts EML to PST format and combine EML files into PST format in few moments. It is the best solution for users who are looking to import EML files to Outlook. This ...