0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Your Role in Cyber: Proper Online Usage & Threat Mitigation
By: Palita2018
April 23, 2018

The latin locution "Hic et Nunc" in the information process, created in the cyberspace domain, loses the space and time dimension and turns into "usquam et semper" because, as Paul Valery had prophetically described in his short essay of '33 entitled "La conquête de l'ubiquité", the rapid development and diffusion of new ...

NSA | Crypto Challenge of the Week | Week 16
By: Harwinder Singh
April 22, 2018

At the first glance, I recognized that this piece of text was a quote. I had to find similarities in the text so I thought about the possibility of the first word being similar to "PETER". From adding the letter E to the M's I found out that there was a short 3 letter word at the ...

Step into Cyber Security
By: Bisoye
April 22, 2018

There are so many open jobs in cyber security and IT, and many people wonder how to enter into the field. Many people may even wonder if they should enter the field, if they have what it takes, or even where they should start. Here are some steps to help you decide if cyber security is right for ...

The Importance of jQuery Mobile in 2018
By: thomassujain
April 22, 2018

5 Reasons to Include jQuery Mobile in Your Web Dev Plans for 2018 jQuery mobile makes the concept of optimizing a single website design for multiple mobile devices a reality. Write less to do more, is the correct way to describe the perks of the client-side JavaScript library for mobile. The need for mobile websites has ...

HoneyBOT
By: rowabi
April 21, 2018

HoneyBOT is a medium interaction honeypot for windows. It is a fake device occurrence on our local network. The device works as a target for hackers and to get what they want from fake data on the device. This is great to learn how the hacker thinks and what his intent is with our device and data. Also, we can learn how ...

Protect Your PC from Attack in 4 Steps
By: iven
April 21, 2018

STEPS TO PROTECT WINDOWS COMPUTER FROM CYBER ATTACK I waked this morning and decided to write an article about most common issues that daily faced by IT employee and the average folk in there home, shop, etc. let's have a look about below chart I found it while I google ...

Advanced PDS: OST to PST Converter Solution
By: elinalima
April 21, 2018

Advanced PDS OST to PST Converter Software 10.5 full version for 2016/ 2013/ 2010/ 2007 Corruption issues of Outlook OST File are: Internal error of OST file (error code=0000000E) Error 8004011D-526-80040115-0 Service-specific error 0 (0×0) Error code 0x8004103b OST Internal error ...

XFS File System - RHEL7
By: saurabh1809
April 20, 2018

Linux works with a very secure file system which is known as ext, but in spite of that, it provides another file system like XFS. Today will explain how it works, and what unique features it has. One of the many questions people often ask is, if Linux has many file systems, then why would we use XFS? Let's take ...

Cyber Security Utilities: SysInternals
By: kunalgupta007
April 20, 2018

I would not be surprised if you didn't have any idea about Microsoft "Sysinternals." But it is not something that you should miss if you're working in Security/Networking/Linux as an Administrator.Why Sysinternals?I know, it is good to know all CMD Commands, but sometimes you may get confused between commands. If you're a beginner, then you have yo learn them, right?So here SysInternal comes ...

Read Yahoo Mail in Outlook – Migration Tips
By: techalphy
April 20, 2018

Are you looking for a solution to access Yahoo mail in Outlook 2016 in an efficient way? If yes, you are at the right place as we come up with different ways to configure Ymail in MS Outlook 2007/ 2010/ 2013/ 2016. Here, we will discuss all reasons to sync Yahoo email with Outlook ...