0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.



According to Gartner, by 2020 worldwide public cloud services will account for $383 billion, a fifth of which (19%) will be Infrastructure as a Service. In a June 2017 report, Gartner put Microsoft as a leader in Magic Quadrant for Cloud Infrastructure as a Service, worldwide, along with Amazon Web Services. A ...


Did you know that learning Linux/UNIX is one of the most important aspects of learning Cyber-Security/Information-Security? Q. What is Linux?A. Its a freaking OS. Linux is a family of free and open-source software operating systems built around the Linux kernel. Linux is packaged in a form known as a Linux distribution (or distro for short) ...


Another cool gadget I saw at the Toronto Tech Security Conference was ultra-secure USB storage by Apricorn https://www.apricorn.com. Now, this is cool their product is a secure USB thumb drive or SSD portable hard-drive it features built-in encryption built into the chip meaning no software needed on the PC.They have a wide range of drives and ...


Most of us are using the popular and handy software called μTorrent for downloading and streaming stuff and if you are one of them then you must download its latest version ASAP. You must have seen after pressing that red cross button to close torrent, it still runs in the background until you ...
![Passive Scanning with Free Online Tools [Resources for Hackers]](https://images.ctfassets.net/kvf8rpi09wgk/3tpSXLMbs6D0bXlTw8UucK/2d648c6dd1981c3fca93f5c03ea36bc7/blog-default.jpg?w=800&fm=webp)

All white hat hackers should master different tools for different phases in penetration-testing (reconnaissance, scanning, gaining access, maintaining access, covering tracks/creating report). It takes months or maybe years to master all the tools for scanning.A lot of information gathering and scanning can be done by active scanning using tools from Kali Linux distro. But if you want ...


To some it may have popped up earlier than 2018, for me it was quite new. I walked into the office after a week of teaching children how to code. Since the age group, the choice for HTML & CSS was more than acceptable. But to my surprise I may have got them way closer to writing ...


I am a Quality Assurance tester at my job. Quality Assurance or QA is a group of processes in place to make sure that an organization document what they do and they do what they document (focus on defect prevention). In other words, making sure the product meets the requirements of what is documented. In order to ...


If you have any intention to convert Exchange OST to MBOX format, then use OST to MBOX Converter. It safely exports OST to MBOX with attachments without losing any data items in just couple of clicks. There is no solution is available in the market, that’s why we suggest you ...


Now, use EML to PST Converter for quick conversion of multiple EML files to PST format. It safely converts EML to PST format and combine EML files into PST format in few moments by using ZOOK EML to PST Converter . It is the best solution for users who are looking to import ...


You may have told your techy friends or your friends might have told you " I think my computer is having a virus". how do they know that?. So Let's discuss about malicious software in short " ...