0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

The Origin of the Blockchain
By: 奥力
June 3, 2018

The fact that the blockchain has emerged as the essential supporting mechanism for a new digital currency will play an important role in our understanding of this technology. The first mention of Bitcoin, a new form of peer-to-peer electronic cash, showed up in a paper written by someone called Satoshi Nakamoto in 2008. As it turns out, this is not a real ...

Best PDF File Organizer to Manage PDFs on Windows 10/8.1/8/7
By: sherry098
June 2, 2018

The PDF file format is acclaimed worldwide for being a secured format for document sharing. People including forensic investigators rely on PDFs for storing and sharing data. However, with PDF files, you can do a lot more than just securely share information. To get the best out of PDF files, users need to have the best PDF organizer kit ...

How to Split PST File to Manage Outlook Mailbox
By: semnaitik
June 2, 2018

An oversized PST file creates troubles for Microsoft Outlook users. Not only does it affect Outlook's performance, but it also leads to corruption. To handle an oversized PST file, you can break it into two or more parts. In this article, I'll show you how to split PST files to manage an Outlook mailbox. ...

Let's Learn SQL Injection!
By: Ashish jha
June 1, 2018

I am Ashish Jha, a security researcher from India . Today, I am going to teach you SQL injection , including what it is and how it works.Let's start!Every hacker who is new to or learning web application penetration testing (WAPT) is advised to review the OWASP TOP 10 because it has a ...

Enable Editing in Secured PDF Using PDF Unlocker Tool
By: sherry098
June 1, 2018

What are you thinking about right now? How to remove PDF edit protection? No need to worry. Here, we will share the best solution to enable editing in a secured PDF document.To preserve data privacy and content integrity of a PDF document, people generally set a password for a PDF file to make it safe. With that, those people ...

How to Convert PST to PDF with Attachments
By: lukaswright
May 31, 2018

In this article, the user will get the complete guide to converting PST files to PDF format with attachments and other data items. Here, we brought the best PST to PDF Converter for you to export your Outlook emails to PDF format in a couple of seconds. It is a completely risk-free solution which provides 100% accurate and ...

Interview Prep: Penetration Tester
By: Tatianna
May 30, 2018

Penetration testers are now a critical part of effective, secure IT. As noted by Info Security Magazine , good pen testers are now few and far between as the cybersecurity skills gap widens and the sheer volume of malicious attacks increase. What’s more, many companies have unrealistic expectations when it comes to penetration tester experience and expertise, meaning ...

Get Certified for a Red Hot Cyber Security Career
By: camiragano
May 30, 2018

“The global average cost of a data breach is $3.62 million in 2017, “reports the 12 th annual data breach study by Ponemon Institute . The increasing number of data breaches resulting in loss of money and reputation question the very existence of companies of any size, big and ...

2018 Exchange Online Backup Solution
By: magstephen08
May 30, 2018

The popularity of third-party Exchange Online Backup solutions is sprouting around the ecosystem. Organizations old and new are working to fill the gaps observed within the Office 365 Exchange Online data protection policy. Many Office 365 Exchange professionals, including Microsoft MVPs and Office 365 Experts, have written about how Exchange Online does not support great backup plans to protect ...

By: strainer
May 30, 2018

Threat hunting is a proactive task with an assumption that your organization has already been breached, and you wanted to beat the average “dwell time” of 256 days, at least for me as a DFIR practitioner. This is usually done with the help of different tools that we call “arsenals,” primarily SIEM ( security information and ...