0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Who is Suitable for an ITIL certification course?
By: priyajatoliya
December 26, 2017

Information Technology Infrastructure Library, popularly known as ITIL, is a popular framework for the management of IT services all over the world. Increasing number of global IT companies has now adopted this framework to make sure that the services they offer are in line with the well-defined and consistent set of processes which include best practices. ...

How to Import PST to Office 365 Mailbox Account: Quick Solution
By: magstephen08
December 25, 2017

MS Office 365 services provide the great opportunity for businesses to drag runny innovative capabilities to meet what they want. Moving to Exchange Online can be formidable, however, utilization of the Import services to import PST to Office 365 mailbox in the cloud makes this task easy.If you had a particular folder or outlook data files that you want to ...

Creating a Windows EXE FUD Reverse Shell in Python
By: Orion
December 25, 2017

What Is A Shell A shell is acts as an interface between the user and Operating system. You can use a shell to do many things such as view files, launch applications,  check network configurations, etc. Some examples would be Powershell in Windows and the Terminal in Linux. Reverse vs Bind Shells ...

TCP/IP Model
By: D3f3nd3r
December 24, 2017

The TCP/IP model, more commonly known as the Internet protocol suite, is another layering model that is simpler and has been widely adopted. It defines the four separate layers, some of which overlap with the OSI model: ·          Application : In ...

The Rules for Data Protection are Changing: Are you Ready for GDPR ?
By: Jide Olagundoye
December 23, 2017

Modern IT has created an electronic world to meet a variety of needs from simply providing information, to wide ranging and far reaching products and services. They are all available on the web. The individual communication and consumption has created a footprint of information and transaction history which is commercially useful. ...

OSI Model
By: D3f3nd3r
December 23, 2017

Historically, one method of talking about the different layers of network communication is the OSI model. OSI stands for Open Systems Interconnect. This model defines seven separate layers. The layers in this model are: ·          Application : The ...

UNM4SK3D: Kaspersky, Experian, and CTB-Locker
By: Olivia
December 22, 2017

#accusations Due process. That's what Kaspersky is saying they were denied of after the Trump administration banned the use of its products in government networks. Now, they're asking a U.S. federal court to overturn this ruling.  How did this all start? Well, back in October of this year, an article from the New York Times ...

Network Terminologies
By: D3f3nd3r
December 22, 2017

Connection : In networking, a connection refers to pieces of related information that are transferred through a network. This generally infers that a connection is built before the data transfer (by following the procedures laid out in a protocol) and then is deconstructed at the end of the data transfer. ...

By: Vikrant Saran
December 22, 2017

KNOW THE IMPORTANCE OF CLOUD COMPUTING IN IT SECTOR: Cloud computing is a global reality today. Cloud Computing Being in the clouds has become the destination for existence in the Internet world. The traditional way of IT environment involves ...

Corporate Politics vs. Corporate Security: A Conflict of Interest
By: Brian Scott Luke, MBA
December 21, 2017

When new employers are orientated, trained and onboarded there are many different types of issues brought to the attention of the new member of your occupational family. An individual may feel that they are part of a new community, may be receiving a high wage rate and may have a high degree of pride.It is important to ...