0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Is Telephony Really No Longer Considered Harmful?
By: ITSimeon
May 17, 2018

Telephony No Longer Considered Harmful Simeon Miller Abstract Statisticians agree that low-energy modalities are an interesting new topic in the field of self-learning hardware and architecture, and scholars concur. Given the current status of ubiquitous modalities, steganographers shockingly desire the development of DNS, which embodies the private principles of cryptography. BolnVis, our new framework ...

VulnHub Walk-through - LazySysAdmin
By: grokdesigns
May 17, 2018

This is the first walk-through I have written for a VulnHub machine. Please send any feedback if you have ideas for improving it!Today we'll see if we can obtain root access to the LazySysAdmin: 1 machine from VulnHub .The first step in attacking a local vulnerable machine is obviously finding its address. To do this, we ...

Migrate Zoho to Google Apps – Quick Guide
By: techalphy
May 17, 2018

Zoho mail is one of the widely used online email service used for data transaction purpose. It provides a very simple and easy service to both the individuals and business users. Apart from having so many important and helpful features, many of the users searching for Zoho to Google Apps migration techniques. One of the main reason for this ...

Easily Convert MSG to PDF with Attachments
By: lukaswright
May 16, 2018

Download the most genuine solution ZOOK MSG to PDF Converter to batch convert MSG to PDF with attachments easily. It allows a user to bulk export and print MSG files to PDF format in two simple steps. This best MSG to PDF converter tool which easily exports multiple MSG to PDF format in a ...

Free Download OST to PST Converter Software
By: martinhoff6
May 16, 2018

Whether it is to extract mailbox data saved within a badly damaged OST file or the need to move OST mailboxes to a different machine, converting Outlook OST file into PST format is the most feasible solution. Stellar OST to PST Converter is the most reliable and user-friendly software for achieving accurate and quick OST 2 PST conversion.It is ...

5 Tips to Prepare and Pass for the VMware VCP Exam
By: Vikrant Saran
May 15, 2018

The adoption of digital workspaces is indeed adding value to the core businesses with a new outlook for the business approach and processes. As a known fact, a comprehensive end-user computing platform is the backbone of this digital transformation drive. In this lane, VMware has witnessed a tremendous growth in India. The digital workspace solutions adopted by ...

CSIRT - Quick Guide & Overview
By: elazarbiro
May 14, 2018

CSIRT – What to do: A CSIRT may perform both reactive and proactive functions to help protect and secure the critical assets of an organization. There is not one standard set of functions or services that a CSIRT provides. The team chooses their services based on the needs of their ...

Denial of Service Using Malformed NTFS Files
By: seoweb2writer
May 14, 2018

A Romanian cyber security expert released a proof-of-concept- code that exposes the vulnerabilities in Windows7 / Windows 10, which can easily cause the blue screen of death, even when the system is locked.  This rogue code helps user or hacker deliver a denial of service type attack that can crash the windows machine within minutes, even when ...

How to Footprint Web Applications
By: Dr. Michael J. Garbade
May 14, 2018

Footprinting is an essential aspect of the hacking process. It involves acquiring vital information about the computer system or application to be targeted. It can be carried out either passively or actively. The passive collection of information implies the lack of active interaction between the attacker and the targeted system. In ethical hacking, footprinting is ...

The PGP key Panic: Safety 101
By: Joeri Jungschlager
May 14, 2018

Most of us have been using PGP for at least 5 years, some even more than 10 or 20. Nothing could be more stressful than our users and more our selves with the safety of PGP,  the Asymmetric key standard for encryption of emails and files. So the article:   Attention PGP Users: New Vulnerabilities Require You To Take Action ...