0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

CSS Hacking: The Surprise of February
By: Joeri Jungschlager
March 4, 2018

To some it may have popped up earlier than 2018, for me it was quite new. I walked into the office after a week of teaching children how to code. Since the age group, the choice for HTML & CSS was more than acceptable. But to my surprise I may have got them way closer to writing ...

Quality Assurance
By: cgarth
March 3, 2018

  I am a Quality Assurance tester at my job. Quality Assurance or QA is a group of processes in place to make sure that an organization document what they do and they do what they document (focus on defect prevention). In other words, making sure the product meets the requirements of what is documented. In order to ...

How to Briskly Convert Exchange OST to MBOX with Attachments?
By: stevesmith27
March 2, 2018

If you have any intention to convert Exchange OST to MBOX format, then use OST to MBOX Converter. It safely exports OST to MBOX with attachments without losing any data items in just couple of clicks. There is no solution is available in the market, that’s why we suggest you ...

EML to PST Converter to Combine EML Files to PST Format
By: stevesmith27
February 28, 2018

Now, use EML to PST Converter for quick conversion of multiple EML files to PST format. It safely converts EML to PST format and combine EML files into PST format in few moments by using ZOOK EML to PST Converter . It is the best solution for users who are looking to import ...

What is Malware?
By: Mahroof CM
February 27, 2018

  You may have told your techy friends or your friends might have told you " I think my computer is having a virus". how do they know that?.  So Let's discuss  about malicious software in short " ...

Dr. Cyber Security: A Look into the Healthcare Industry
By: Olivia
February 27, 2018

While cyber security breaches continue to top headlines across industries, it seems that hackers have taken a special interest in the healthcare industry. According to Healthcare’s Electronic Protected Health Information (ePHI), patient medical records can be sold for as much as $100 each on the Dark Web. This lucrative market is continuing to provide the demand side ...

Python Port Scanner
By: thewind
February 27, 2018

Hello everyone, great to meet you    In this first article of series of python for hacker we are going to see how to write a port scanner with python.    I) what is Scanning ?    Reconnaissance is the first step of the kill chain when conducting a penetration ...

Try EML to PST Converter to Combine EML Files to PST Format
By: stevesmith27
February 26, 2018

Now, Try EML to PST Converter for quick conversion of multiple EML files to PST format. It safely converts EML to PST format and combine EML files into PST format in few moments. It is the best solution for users who are looking to import EML files to Outlook. This ...

Tips to Build a Better Career with MCITP Certification
By: michaelwarne
February 26, 2018

There are many advantages that the emerging technologies have given to the present generation, it has also made the level of competition really high for the individuals. It is no more possible for the individuals to gain the desired level of success unless and until they have something extra to offer to the company.While many companies look ...

How to Master Cyber Security
By: kunalgupta007
February 25, 2018

Cyber Security is now about few commands that you enter nor it is about some tools that you use (GUI based), to become a Ninja of Cyber Security you must know in-depth knowledge about working of a computer and network devices. This topic Cybersecurity is one emerging topic because data involved in it is very critical and ...