0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Free OST Converter Software for OST file to PST Conversion
By: alvina11
September 19, 2017

SysInfoTools OST to PST Converter software is an advanced solution for Exchange to Outlook migration. Via this software, you can successfully export mailbox content from OST to PST file format. It causes no alteration or changes during OST to PST conversion and keeps the original OST file intact. If you ...

OST to PST Conversion
By: stevesmith27
September 19, 2017

Quickly Convert OST to PST Format to Import OST Data to Outlook Whenever users get an error while opening OST files, the user must go with the OST to PST Converter to overcome from this situation. It easily converts OST to PST format to save Exchange OST emails in Outlook PST format. Then only users are able to ...

Tutorial: Book Search Perl Application Code
By: Bmsr256
September 18, 2017

Today, I want to show you a book search source code written in Perl. Perl is a very useful and powerful programming language like Python, except Perl still remains on lots of Unix-like operating systems.This application searches for information on some web sites. I put Wikipedia, but you can change this with whatever you want. The code is posted ...

Windows 10: Securing the Boot Process
By: Mike Ship
September 18, 2017

                           Windows 10: Securing the Boot Process An operating system’s principal function is to provide a safe execution environment in which users’ programs run. This requires a basic framework for uniform program execution with a uniform and standardized way to use the hardware ...

Your Complete Guide to Raspberry Pi
By: Olivia
September 16, 2017

What is Raspberry Pi? Raspberry Pi is a small computer that costs between $5 and $35, but can function as a desktop computer or be used for additional functions, such as building smart devices. Originally, the Pi was intended for usage in schools as a method of increasing interest in computers among children and ...

UNM4SK3D: Equifax, Bluetooth, and Zerodium
By: Olivia
September 15, 2017

#hacked- big time.   Chances are you've heard about the Equifax breach, which led to the compromise of 143 million US consumer's data including the names, social security numbers, dates of birth, addresses, and in some cases, drivers license numbers. In the wake of the breach, we've heard stories of corrupt Equifax executives ...

Protect Your Network by "Thinking Like a Thief"
By: Bob
September 15, 2017

Protect  your network system: Kenya, like any other developed nation, is faced with increasing cyber security threats targeting core business functions for both the government and the private sector. Recent attacks on  Kenyan Banks, the Government tax collector, the IEBC systems, the rise of cyber bullying and the recent global attack by WannaCry ransomware, surely ...

Encryption is Everywhere
By: ginasilvertree
September 14, 2017

Encryption is everywhere (well, almost everywhere) around sensitive data in motion and, sometimes, sensitive data at rest. Without it, e-commerce transactions, government secrets and electronic medical records - and many other types of data - could not safely exist. Data is a precious resource in the electronic economy and, like every precious resource, it needs perpetual protection.As a member ...

3 Ways to Increase Office-365 Security
By: Sasha Radenovic
September 14, 2017

Cloud services are gaining popularity for some time, and one of the most popular office cloud services is Office 365, especially with SMB companies, and their main concern is security. Most of those companies do not have an Information Security Officer ( CISO ), just basic IT staff for administration and network issues. Microsoft's product and service set ...

Xerosploit – Toolkit to Perform MITM, Spoofing, DOS, Images Sniffing/Replacement, WD Attacks
By: BALAJI N
September 14, 2017

In this Kali Linux Tutorial, we are to work with Xerosploit. Xerosploit is a penetration testing toolbox whose objective is to perform the man in the middle attacks. It brings different modules that permit to acknowledge proficient assault and furthermore permits to do DOS attacks and port filtering.We can use this tool to perform DOS, MITM attacks, also the ...