0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

A Quick Overview of VHDX Recovery Software
By: abrienne
July 14, 2017

Recover corrupted VHDX files and extract files from corrupt VHDX in Windows OS VHDX Recovery Tool is an ideal software to make you access your corrupted/deleted VHDX files . VHDX Recovery is a powerful program that smartly performs the recovery of corrupted Hyper-V VHDX files.  The software extensively supports Hyper-V virtual ...

UNM4SK3D: Verizon, CIA, and Google Play
By: Olivia
July 14, 2017

#exposed As if the net neutrality battle wasn't bad enough, Verizon customers beware! It is estimated that as many as 14 million customer's data was exposed after NICE Systems , a third-party vendor, mistakenly left the sensitive users’ details available on a server. How did this happen, you ask? According to UpGuard director of ...

Windows Password Cracking Without External Tools
By: Techquest89
July 14, 2017

Imagine if you will, a 17 hour work day, some idiot unplugged the main switch to your server rack (at the end of your 8 hour work day) and causes the entire server rack to go catatonic.  Zoom ahead forward, you finally have gotten almost everything fixed, the last server comes up and you are greeted with the lovely ...

An Introduction to Ethical Hacking
By: ziednamouchi
July 13, 2017

Information security overview 1- Definition Information security is a state of well-being of information and infrastructure in which the possibility of theft, tampering, and disruption of information and services is kept low. 2- Essential terminology Hack value - is the notion among hackers ...

Convert NSF Files To PST Format
By: lucasdawson1984
July 12, 2017

IBM Lotus Notes has been one of the most preferred email clients for a long time as it provides unmatched security through encryption. But maintenance of this email client has become very costly ever since the support for the product has been discontinued. To reduce excessive maintenance for the email client, many organizations are now shifting to newer email ...

Your Complete Guide to Snort
By: Olivia
July 12, 2017

The 2017 Ponemon Cost of Data Breach Study from IBM recently reported that average data breach costs organizations $3.62 million, approximately $141 per lost or stolen record. Their research indicates that the average size of a breach has increased, 1.8%, the equivalent of 24,000 records per breach.That being said, malicious activity can be very serious for a number of ...

Use Intelligence to Build SOC
By: pankaj1251
July 12, 2017

In the last three years, the proliferation in the growth of active threat actors such as polymorphic attacks and availability of sophisticated hacking tool has rapidly impacted the security posture and expenditure of any size of the organization. The driving factor for adoption of next generation SOC is constantly changing the environment, adapting more cloud-centric approach, and ...

The Best Way To Prepare For A CCNA Certification Exam
By: priyajatoliya
July 11, 2017

The CCNA is regarded as one of the most sought-after certifications in the IT industry for no simple reason. It is required to earn some of the higher level certifications like CCNP. This certification is highly valuable for candidates who are eager to enhance their career with better jobs and higher salary packages. The CCNA certification ...

Making Sense of Certifications: SSCP vs. Security+
By: Olivia
July 11, 2017

In an earlier post, I compared the CSA+ against the CEH, and touched upon a few additional security certs I felt may be of interest. Since then, I’ve gotten the suggestion to compare two other popular security certifications, the Systems Security Certified Practitioner (SSCP)  from ISC 2 and CompTIA’s Security+ .Perhaps both fortunately and unfortunately for ...

Introduction to Network Security: Protocols
By: imarchany
July 11, 2017

Network security has been a top notch in the cybersecurity field due to the interconnected devices across the world. It has become very important in our lives because the Internet continues to evolve and computer networks grow dramatically. The fundamentals of network protocols give you a better understanding how the network is structured and how communications are being ...