0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

The Best Firewall for your Company: Yourself
By: usouzajr
April 13, 2018

I've seen the main facts about Security in the last months, and I still get amazing on how enterprises are being affected by several kinds of attacks. When taking a time to analyze it, we can figure out the main problem for all of these issues - a complete lack of strategies, good practices and architecture for cybersecurity. ...

Social Engineering & Online Fraud
By: mohamad lajeen
April 13, 2018

Today, we introduce a new and essential subject for beginners and for a professional start in the hacker world. What is internet fraud? It is a term that refers to any tricks or schemes that are used online. For example: E-mail, websites, chat rooms and more. Internet fraud aims to deceive users for many harmful purposes such as ...

Red Hat Server Administration: Yum Server Configuration
By: variiable
April 13, 2018

Red Hat Linux System Administration Written to help IT professionals get an overview of yum server configuration   Yum Server What is Linux System Administration? Linux system administration is to manage the operations of a computer system. As most computing devices are powered by Linux, ...

Website Takedown with the "Slowloris DoS Attack"
By: Shaquib Izhar
April 12, 2018

  A DoS attack is a type of attack where an attacker can suspend services of a host or a website by sending a large amount of traffic and making request constantly from two or more computer or by sending a large number of the packet which makes ...

Bluetooth's War on Windows 10
By: shubhamg
April 12, 2018

Often it means to connect some gadgets with each other, and this is the very last option when you want to transfer files, and all other options are dead.We, humans, are moving very fast to an era which is wireless as many of us are moving towards latest gadgets like smartphone, laptop, tablet and many more, moving ...

Server Upgrades and Desktop Changes
By: Muhammad Ahsan Shakeel
April 11, 2018

In Windows Server 2012, Microsoft removed the Start button from the lower left. In R2 the Start button has been put back so you can access your application menu. You can still hit the Windows key to access your list if you’ve already gotten used to using it. If you’re not familiar with where the Windows key is, it’s to the left ...

Converter Alert! How to Move Non-Unicode PST to Unicode
By: rollinsduke
April 11, 2018

A Non-Unicode PST means ANSI file in MS Outlook. Outlook supports two file formats ANSI (lower version of MS Outlook) and Unicode (upgraded edition of MS Outlook). ANSI provides size limit of 2 GB whereas Unicode provides 20 GB support to Outlook PST files. Non-Unicode PST to Unicode converter is developed to upgrade ANSI files to Unicode ...

Top 5 CompTIA Certification Courses That Are Most Sought After
By: priyajatoliya
April 10, 2018

If you are a computer professional such as network administrator, software developer or systems engineer then there are some lucrative job opportunities that you are ducking all along while you have been working at your job – while being on the IT industry forefront, missing out on key skills that build a great career and greater pay ...

SysInternal: A Tool for Every IT Administrator
By: kunalgupta007
April 9, 2018

I will not be surprised if don't have any idea about Microsoft "Sysinternals". But it is not something that you should miss if you're working in Security/Networking/Linux as an Administrator.  Why Sysinternals? I know It is good to know all CMD Commands but sometimes you may get confused between ...

Encrypted Hard Drive Data Recovery Techniques
By: PURUSHOTTAM SHRIVASTAVA
April 8, 2018

By Purushottam Shrivastava In order to protect email archives, payment databases and other important information many businesses and institutions use some type of encryptions, but using tools like EFS, BitLocker and Guardian Edge can greatly improve corporate security, but they can also create data access issues. ...