0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Office 365 Updates to Enhance Productivity and Security
By: seoweb2writer
June 8, 2018

With cloud services becoming increasingly popular among businesses, service providers are investing heavily in developing sophisticated tools that facilitate greater collaboration between employees, clients, etc. for increased productivity. The new and improved versions not only help increase productivity but also ensure the security of personal information and the data of clients and customers. ...

Understanding and Handling Ransomware
By: michaelwarne
June 8, 2018

Ransomware is a type of cyberattack wherein malicious software takes control of a system and prohibits the user from accessing that system. The attacker usually encrypts a system to make it inaccessible and then demands a ransom from the user for resuming the services, which may or may not happen once the ransom is paid. The ...

Hack Your Way to a Rewarding and Challenging Pentesting Career
By: StevenE
June 7, 2018

What is hacking? Hacking though has negative connotations; it just means understanding the functioning of computer systems, and taking control of them, so they listen and act to your commands as against the original purpose for which they have been created! As such, hacking is only a tool or method and its consequences, good or bad, depends ...

7 Simple Steps to Safeguard Your WordPress Websites in 2018
By: thomassujain
June 7, 2018

We secure our homes with advanced padlocking systems. We keep our valuable possessions away in bank lockers. We know that our assets mean a lot to us, and over the years we have learned the best possible ways to fortify the security boundaries for them. However, when it comes to security on the Web, we find ourselves ...

How to Convert PST to MBOX with Attachments in Two Steps
By: lukaswright
June 7, 2018

Are you having trouble finding the perfect solution to convert PST files to MBOX format with attachments? In this article, users will get a complete guide on  how to convert PSTs to MBOX format. Follow the presented article until the end, which will help you import PSTs to MBOX-based email clients. As we ...

6 Reasons Why Every Programmer Should Learn Python
By: m-noor al-yassin
June 6, 2018

Python is one the best programming languages ever invented. It includes simple English that makes it easy to remember, as well as write commands. The code is easy to read and requires little knowledge, but it can be used in very complex tasks, such as AI development and hacking. In this article, I’m going to mention 5 reasons ...

Batch Watermark PDF Files With a Free Solution
By: sherry098
June 6, 2018

In this digital world, people create and share their documents every day. Whether it involves sharing information or sharing templates to fill in, documents are shared on big and small scales. Whether the document recipients are within the company or outside, security is the main concern when sharing data. However, many organizations prefer portable document format files (PDFs) as a ...

Unpacking the Interview - SOC Analyst
By: Tatianna
June 5, 2018

So you’re considering a career as a security operations center (SOC) analyst. You’re not alone — with more than 350,000 unfilled cybersecurity positions in the US and a predicted IT skills gap of more than 3.5 million open jobs by 2021, potential SOC analysts see the benefit of a job seeker’s marketplace that recognizes the ...

Best Ways to Prevent Outlook Corruption and Repair PST Files
By: semnaitik
June 5, 2018

Microsoft Outlook is a popular email client that has many smart features, but it has one major drawback as well. It's not just an email client; it's more than that. Other than email, it offers you great features like a calendar , task manager , contact manager , note taking , journal , ...

Getting Web Form Online Passwords With THC-Hydra & Burp Suite
By: shahinnishad
June 5, 2018

What Is THC-Hydra? Hydra is a parallelized login cracker which supports numerous protocols to attack. It is very fast and flexible, and new modules are easy to add. This tool makes it possible for researchers and security consultants to show how easy it would be to gain unauthorized access to a ...