0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Best Practices for Infrastructure as a Service (IaaS) in Microsoft Azure
By: Masood
March 6, 2018

According to Gartner, by 2020 worldwide public cloud services will account for $383 billion, a fifth of which (19%) will be Infrastructure as a Service. In a June 2017 report, Gartner put Microsoft as a leader in Magic Quadrant for Cloud Infrastructure as a Service, worldwide, along with Amazon Web Services. A ...

Start Your InfoSec Career by Learning LINUX
By: El1t3S1D
March 6, 2018

   Did you know that learning Linux/UNIX is one of the most important aspects of learning Cyber-Security/Information-Security? Q. What is Linux?A. Its a freaking OS. Linux is a family of free and open-source software operating systems built around the Linux kernel. Linux is packaged in a form known as a Linux distribution (or distro for short) ...

Aegis Secure USB Key by Apricorn - Super Secure USB stick for data in transit
By: Sean Mancini
March 6, 2018

  Another cool gadget I saw at the Toronto Tech Security Conference was ultra-secure USB storage by Apricorn https://www.apricorn.com. Now, this is cool their product is a secure USB thumb drive or SSD portable hard-drive it features built-in encryption built into the chip meaning no software needed on the PC.They have a wide range of drives and ...

Flaw in μTorrent That Lets Hackers Control Your PC Remotely
By: shantanurauthan
March 5, 2018

Most of us are using the popular and handy software called μTorrent for downloading and streaming stuff and if you are one of them then you must download its latest version ASAP. You must have seen after pressing that red cross button to close torrent, it still runs in the background until you ...

Passive Scanning with Free Online Tools [Resources for Hackers]
By: RUm83r0
March 5, 2018

All white hat hackers should master different tools for different phases in penetration-testing (reconnaissance, scanning, gaining access, maintaining access, covering tracks/creating report). It takes months or maybe years to master all the tools for scanning.A lot of information gathering and scanning can be done by active scanning using tools from Kali Linux distro. But if you want ...

CSS Hacking: The Surprise of February
By: Joeri Jungschlager
March 4, 2018

To some it may have popped up earlier than 2018, for me it was quite new. I walked into the office after a week of teaching children how to code. Since the age group, the choice for HTML & CSS was more than acceptable. But to my surprise I may have got them way closer to writing ...

Quality Assurance
By: cgarth
March 3, 2018

  I am a Quality Assurance tester at my job. Quality Assurance or QA is a group of processes in place to make sure that an organization document what they do and they do what they document (focus on defect prevention). In other words, making sure the product meets the requirements of what is documented. In order to ...

How to Briskly Convert Exchange OST to MBOX with Attachments?
By: stevesmith27
March 2, 2018

If you have any intention to convert Exchange OST to MBOX format, then use OST to MBOX Converter. It safely exports OST to MBOX with attachments without losing any data items in just couple of clicks. There is no solution is available in the market, that’s why we suggest you ...

EML to PST Converter to Combine EML Files to PST Format
By: stevesmith27
February 28, 2018

Now, use EML to PST Converter for quick conversion of multiple EML files to PST format. It safely converts EML to PST format and combine EML files into PST format in few moments by using ZOOK EML to PST Converter . It is the best solution for users who are looking to import ...

What is Malware?
By: Mahroof CM
February 27, 2018

  You may have told your techy friends or your friends might have told you " I think my computer is having a virus". how do they know that?.  So Let's discuss  about malicious software in short " ...