0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


The mindset of an IR is always one of proactive and out-of-the-box thinking against both insiders and advanced persistent threat (APT’s). He is always assuming that the network has been breached and is paranoid of the adversary’s tools, techniques, and procedures (TTP’s) from any attacks.Critical reasoning, agility, and self-drive are musts for an IR. He does not rely alone ...


The thought of productivity tools probably conjures up images of apps and technological tools. Such tools are not the routes to greater productivity though, unfortunately. In fact, technology consumes more time than it saves. Instead, you should be thinking about the following productivity tools that don’t need technology and will increase your productivity. ...


[caption id="" align="alignleft" width="332"] Courtesy of Pinterest[/caption] Technology continues to change and improve, evolving faster and faster as it advances. Along with it, careers in the information technology industry also continue to grow. As a network engineer, you will be in the heart of the technological realm. You will have a wide range of duties that include designing, building, ...


WordPress is one of the most widely used tools for website designing and content management systems (CMS's). Design only isn’t sufficient to set up a website. One also requires a host to keep the website running. Different hosting services for WordPress include shared, VPS, managed, and dedicated, with each having its own advantages and disadvantages. All of these hosting ...


We all understand that there are several desktop email client applications available these days. Despite the actual fact that each of those desktop email clients has its own significance, it’s a standard trend to switch from one platform to another. In this article, we'll be discussing a way to convert MSG to MBOX format and ...


What is a Business Continuity Plan and a Disaster Recovery Plan? Is there a difference between the two? Although they are often confused and intermixed in the discussion, a business continuity plan and a disaster recovery plan are two very distinct and separate exercises. A business continuity plan (BCP) is a process in which an environment is ...

The ongoing FIFA World Cup in Russia is one of the most followed sporting events in the world. In fact, it’s estimated that 3.4 billion people, about half of the world’s population, will be viewing the event until it ends on July 15 th . As soccer fans (or football fans if ...


We all regard MS Outlook as one of the best electronic mail services, and it is commonly used in business for correspondence. But due to some unfortunate conditions, the OST database can get corrupted, and the corruption incident is unable to be resolved. In this case, the user may try some alternative method to access the OST files, and ...


At some point or another, every computer user has tried opening up a file on his device only to see a message that says “The file you are trying to access is unavailable or has been corrupted.” This may understandably alarm some users, as a “corrupted file” sounds like one that has taken on a life of its own ...


With the never-ending releases of web applications and tools like Internet browsers, browser add-ons, and file-sharing systems, you may have heard the term “open source” get tossed around a lot. But what exactly does open source mean, and how does it compare to another popular term, “freeware”? More importantly, how does the “open source” or “freeware” status of an ...