0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Convert EDB to PST For Free
By: ashcatch9
June 14, 2018

My First Experience of Getting Stuck in “Exchange Corruption" and My R ecommendation For a Free EDB to PST Converter Solution  Now, it is possible for all users to solve all Exchange corruption issues within a few seconds, and I want to share my views regarding my EDB corruption. ...

What is the Best OST to PST Converter and Migration Tool?
By: Praveen Dixit
June 13, 2018

Nowadays, conversion and migration of OST files to PST files can be a necessity for many users because OST files are not directly accessible in MS Outlook. Therefore, a user must have knowledge about the best OST to PST converter software and its features. But first, before getting into conversion, the user must have knowledge about OST files ...

Common Cyber Security Threats and How to Secure Your Business Against Them
By: thomassujain
June 13, 2018

The Internet has brought with it so many great things that we now cannot imagine life without it. Imagine not being able to shop or trade stocks online. Imagine not being able to find out what your former classmates are up to through Instagram or Facebook, or not being able to watch product reviews on YouTube before settling on ...

You're Being Socially Engineered! Trust No One.
By: AlwaysSometimes
June 13, 2018

Social engineering is instinctual and necessary for the survival of many species. Some birds fake an injury to lure potential predators away from a nest. In humans, social engineering seems to start at infancy. A baby cries, and a parent comes to the rescue. Without these early signals, a baby might starve to death. Initially, this is a subconscious ...

What is a Security Operations Center (SOC)?
By: parves kamal
June 12, 2018

It’s a great thing to live in the Age of Information.  With a few clicks of a mouse or keystrokes on a keyboard, we can find out almost anything we want, purchase delightful products, and communicate with friends and family on the other side of the world. Unfortunately, the downside to this age of marvels is ...

PATCHING HUMAN S2PDT 102 - "Phishing Defense with OSInt"
By: strainer
June 12, 2018

Synopsis When I spoke at one of the local cybersecurity conferences in Panay last November of 2017 on " Evading Social Engineering Attack | Hacker's Frontier, " specifically with phishing , most of the approaches discussed were manual. In this article, I would like to share an approach that is automated using Open Source Intelligence ( ...

Home Network Defense Center
By: Terumo
June 12, 2018

When I test network security, I frequently get asked "How can I protect my house network?" After I discuss the "typical solutions" (good passwords, configurations, MAC filters, permissions, firewalls, IDS, etc.), some people reach the conclusion that all those solutions are "too passive." When they work, they simply block possible attacks, and we have to simply trust them to ...

How To Open an OST File In MS Outlook 2016
By: jamiekaler
June 11, 2018

An OST file is an important necessity when working with an MS® Exchange mailbox account, as it helps to provide a replica of the Exchange server account. The OST file is highly helpful in difficult scenarios when there is server downtime or some Exchange crash, or when Exchange is not available because of scheduled tasks. In such ...

How to Convert EML Files to PST File Format
By: imstefanie90
June 11, 2018

EML files are the most commonly known file format across the world. More then 30+ email clients use .eml files to store their emails/messages. EML is a plain text file that contains the header, body, and footer. EML Header - contains an email address, subject, from, to, cc, bcc, time, date, ...

Are Your Home Security Cameras Safe?
By: Jessica
June 10, 2018

You need to have eyes everywhere. With the countless sources of danger that exist everywhere from the grocery store to the park, you have to constantly remain alert and watchful. This is especially true for many when it comes to their homes, the personal sanctuaries they share with family and loved ones. Homes are major financial and emotional investments, ...