0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Your Intro to Capture The Flag (CTF)
By: clairvo
April 17, 2018

Welcome, to any enthusiastic cybrarian viewing this.I am a high school senior and my entire senior project is based on the world of CTF. In the following article, I will be translating the first section of my senior project documentation for everyone interested in getting a better understanding of CTF. 1.1. Introduction CTF ...

Improve Internet Security by Blocking Malicious Domains
By: Shaquib Izhar
April 16, 2018

What is this post about? In this post, I will show you how can you block all malware domain which hosts malicious code on their sites which can compromise your system or your browser by saving some bad cookies or malware on your computer, not only this it will also block ads and online tracking ...

Outlook is Back "In"? How to Bulk Convert MSG to PST
By: lukaswright
April 16, 2018

Are you looking to bulk import MSG files to Outlook 2016, 2013, 2010, 2007, and below editions? Then, download best MSG to PST Converter to combine multiple MSG files to PST with attachments . In this article, you will get the complete solution to convert MSG to PST without Outlook. Before moving on, let us ...

The Best Email Backup for Email File Hoarders
By: angeljonson
April 16, 2018

Do you want to create Email file backup? If yes, then read the following article. Here, we are going to provide you the best way by which you can easily create a backup of 40 email client services without losing a bit of information. So, keep reading the post and know how to backup email files easily. ...

Kerberos Authentication Protocol Overview
April 16, 2018

What is Kerberos?  Kerberos is a computer network authentication protocol that works on the basis of tickets. These tickets allow the nodes communicating over a non-secure network to authenticate in a secure manner. Kerberos is built into all major operating systems.Kerberos is a Client-Server modelSymmetric key model Meaning of Kerberos:  The name Kerberos was taken from a Greek ...

The Resilience of Critical Infrastructures
By: Palita2018
April 15, 2018

Historical Background Since the ancient Romans it was clear the importance of critical infrastructures, so that for example they had invented a system of IPS / IDS for the protection of drinking water, raising trouts in pools far km away from Rome, sprayed by the same water conducted in the city by the famous Roman aqueducts, placing a look-out ...

NSA | Crypto Challenge of the Week | Week 15
By: Harwinder Singh
April 14, 2018

Intelligence. It's the ability to think abstractly. Challenge the unknown. Solve the impossible. NSA employees work on some of the world's most demanding and exhilarating high-tech engineering challenges. Applying complex algorithms and expressing difficult cryptographic problems in terms of mathematics is part of the work NSA employees do every day.Today I solved the Crypto Challenge of week 15. It ...

The Best Firewall for your Company: Yourself
By: usouzajr
April 13, 2018

I've seen the main facts about Security in the last months, and I still get amazing on how enterprises are being affected by several kinds of attacks. When taking a time to analyze it, we can figure out the main problem for all of these issues - a complete lack of strategies, good practices and architecture for cybersecurity. ...

Social Engineering & Online Fraud
By: mohamad lajeen
April 13, 2018

Today, we introduce a new and essential subject for beginners and for a professional start in the hacker world. What is internet fraud? It is a term that refers to any tricks or schemes that are used online. For example: E-mail, websites, chat rooms and more. Internet fraud aims to deceive users for many harmful purposes such as ...

Red Hat Server Administration: Yum Server Configuration
By: variiable
April 13, 2018

Red Hat Linux System Administration Written to help IT professionals get an overview of yum server configuration   Yum Server What is Linux System Administration? Linux system administration is to manage the operations of a computer system. As most computing devices are powered by Linux, ...