0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Corporate Politics vs. Corporate Security: A Conflict of Interest
By: Brian Scott Luke, MBA
December 21, 2017

When new employers are orientated, trained and onboarded there are many different types of issues brought to the attention of the new member of your occupational family. An individual may feel that they are part of a new community, may be receiving a high wage rate and may have a high degree of pride.It is important to ...

To Mouse or not to Mouse: That is the Question, Part 1
By: Ka0sDem0n
December 21, 2017

Click-click, click… click… click… click…. The sound most mice make “click”. In this article, I would like to show you how in Windows to minimize the number of mouse clicks using your keyboard. Many users don’t know how to navigate with just a keyboard. This article will focus on the ...

Knowledge Is Power: Your Journey On Cybrary
By: ginasilvertree
December 20, 2017

You may have heard the expression, "Knowledge is power" and, if not, you've heard it now!People around the world come to Cybrary for IT/cybersecurity training and tools that help them gain knowledge and ultimately, power - power they apply and leverage to change their lives and circumstances. And with more than 1.4 million users, Cybrarians' lives and circumstances are ...

Market Trends of 2018
By: Samantha Voss
December 20, 2017

  The Market Constantly advancing, the Cybersecurity space continues to disrupt the market. As Digital Marketers, it's crucial that we frequently analyze our consumers naturally adapting attitudes, ensuring that we continue to meet their expectations of the 'latest and greatest'. Both the Technology and Cybersecurity Industries are growing exponentially. This is great from a market growth perspective, but ...

Online Security: Always be Humble, Kind, and Smart
By: Brian Scott Luke, MBA
December 20, 2017

  Annually, internet-based criminal activity costs the American public billions of dollars and businesses due to the necessity to repair computer systems hit by cyber-attacks. When cyber-attacks and ID theft occur the costs may be passed down to consumers, systems and additional authentication may be required to counter various types of criminal activity, such additional ...

Python data_exfiltration with socket programming and network
December 19, 2017

 dataexfiltration is the technic used by the hacker for unauthorized the transfer of data of victim Computer in the hacker computer. The hacker used malicous program to upload in the remote computer and after when the victim computer are infected , the hacker take the control of remote computer and start to exfiltred the data or files ...

Juliar Blue: Simulating Network (Virtual) under VM
By: Rattar
December 19, 2017

Hey Everyone,I haven't posted anything in a while but now I am back.My team and I are currently working on a new Juliar.Future release codenamed Juliar.Future Blue.Mostly we want to remove the old interface, and replace it with a new "Drag and Drop" design. One of the features that we are working on is an ability to quickly ...

The Flaws of Privacy
By: Terumo
December 19, 2017

"Privacy" is a interesting, and very commonly misundestood, concept in IT. Lots of security flaws online can have its origins on this misunderstanding, hence the relevance of clearly all this. This topic is relevant for both security and programming perspectives.Privacy for humans is, (most of the time) simple. When we tell someone "this is private", ...

Are iPhones Safe from Virus attacks?
By: karel11
December 18, 2017

In June 2012, Mikko Hypponen, an anti-virus veteran, shared an exciting tweet which said — "iPhone is 5 years old today. After 5 years, not a single serious malware case. It's not just luck; we need to congratulate Apple on this." It is a matter of time. ...

Why Should You Go for a Security+ Certification?
By: netcomlearning
December 18, 2017

We are currently living in an era that is highly impacted by technology. From our day to day living to all essential tasks, we are immensely surrounded by technology. Going with the tide, if there is a good investment in today’s time then it surely is in technology. Today, IT certifications are an investment ...