0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Error Based Injection
By: D3f3nd3r
January 18, 2018

Error Based Injection Error based injection mainly concentrated on Hacking Microsoft powered technologies like asp and aspx. Error based injection works on MS-SQL database and is bit different from the previous attack that is Union Based injection deployed on My-SQL database.• Here Database will be Ms-Sql Database:MY-SQL : PHPMS-SQL :  .asp or .aspx Difference between Union and Error ...

Audit in Action: Your Blueprint to a Unified Security Approach
By: Olivia
January 17, 2018

We’re pleased to be partnering with Cisco for this post. Scroll down to see a chance to win! Only Fortune 100s need to worry about cybersecurity, right? Unfortunately, this is a mindset that many individuals, small business owners, and even corporations believed. We now know that it simply isn’t the case. All ...

Top IT Certifications: Must Do in 2018
By: dhananjaykumar61
January 17, 2018

What makes you valuable in this highly competitive IT industry? An Experience, experience with knowledge and what else?   With these two you need to be tech-trained and have one of the top IT certifications. Acquiring a globally recognized professional certification is ...

Convert MBOX to PST for Outlook Import
By: rollinsduke
January 17, 2018

Convert MBOX to PST to Import them in Outlook 2016, 2013, 2010, 2007 Now everybody can easily convert MBOX to PST format to import MBOX files to Outlook 2016, 2013, 2010, 2007 editions by using best MBOX to PST converter which comes with a lot of technically advanced features which make it special software comparing to ...

AWS: Your Complete Guide
By: Olivia
January 16, 2018

Even those new to IT have probably heard that everyone is “moving to the cloud.” This transition from standard infrastructure is thanks in large part to Amazon Web Services .Currently, AWS offers “over 90 fully featured services for computing, storage, networking, analytics, application services, deployment, identity and access management, directory services, security. All of these services ...

How SSL Certificates Really Work
By: Romansh Yadav
January 16, 2018

SSL stands for secure socket layer.  The SSL certificate is used to create an encrypted connection between user/browser and the server. So, let’s start from very basic. When you type Google in your browser, your browser sends this request to DNS server and DNS ...

Five Best ZIP Recovery Tools
By: rohanwiese
January 16, 2018

Data with the ZIP record extension is a ZIP Compressed file and is the most favored archive format you'll run into.A ZIP file, like other archive file formats, is simply a collection of one or more documents and/or folders but is compressed into an one file for easy transportation and compression.The most common use for ZIP files is made ...

How to Convert EML Files to Multiple Formats with Attachments
By: angeljonson
January 15, 2018

Nowadays, there are a number of email client applications available to manage and organize the information in the digital industry. Every email client saves their data into the different file formats. But, there are some applications that used to save the data into EML file format. Some of the EML supportive applications are ...

Juliar - Using recurrence to solve difficult problems
By: Rattar
January 13, 2018

Hey Everyone,I am creating a series of the insides of Juliar in order to educate you guys in better understanding Juliar and hopefully converting you to firm believers of it :)In this first tutorial in the series, we will explore the use of recurrence in order to speed up Juliar.So let's look at a basic built in ...

UNM4SK3D: WhatsApp, WPA3, and FBI
By: Olivia
January 12, 2018

#vulnerability Hate it when someone tries to read your messages over your shoulder? So do we. A new discovery by researchers from Ruhr-Universität Bochum (RUB) in Germany found that an outsider may be able to secretly eavesdrop on your 'private,' encrypted group chats through WhatsApp and Signal messaging apps. As a reminder, WhatsApp and ...