0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

WCRY or WannaCry Ransomware Technical Analysis
By: S-Connect
May 24, 2017

Welcome Back! As you are all aware of the facts surrounding the ransomware attacks, they are increasing rapidly from past years. Consider the biggest hits till now, you will come across these well-known names i.e. 1. CryptXXX 2. Dogspectus 3. Crypto Locker 4. Petya 5. Cerber ...

Why "Hackers" Are Important for the Virtual World
By: Umar SK Pathan
May 23, 2017

Hackers! One of the most mysterious words in the dictionary. They seek for justice in an unjustified way. They are the guardians of the internet. They are everywhere, on every computer, on every network.  Who are they? What do they want? What is their motive? Let’s find out here.Nowadays, we live in two different worlds at the same time. ...

Project Management: Construction Delays
By: themindandbeauty
May 23, 2017

  Construction Delays An Introduction I consider the construction delay as the utmost charged because it is the big obstacle that interrupts the construction projects and affects their progress. To understand the delay issue and handle its consequences, it is crucial that we investigate its ...

Construction Project Management: Contract Types
By: themindandbeauty
May 22, 2017

  Types of Contracts At the early stage of the construction projects, the essential argument that disturbs the owner and contractor is accepting a suitable form of the contract that meets the common objectives. (Elbeltagi, 2009). Specifying the suitable form of the contract is the first step to confirm the ...

Ransomware Apocalypse: WannaCrypt Is the the Largest Virus Attack in History
By: David Balaban
May 22, 2017

The extortion virus called WannaCrypt has infected tens of thousands of computers around the world. It has paralyzed the work of British hospitals and Spanish companies, and then made its way to Russia, attacking the regional departments of the Ministry of Internal Affairs and the Investigative Committee.Kaspersky reports that tens of thousands of computers in 74 countries ...

Getting Available Memory from Juliar.Future (Juliar Compiler)
By: Rattar
May 21, 2017

Hello RatTeamsters and Cybrarians,Today we will be learning about checking the memory in Juliar.Future. So why is it important to check the memory? Sometimes an application can take up a lot of memory and you might need to reduce it. Find out how much memory some object or class takes ...

Project Management: Cost Management & Analysis
By: themindandbeauty
May 20, 2017

  Cost Management It is the cost which we relate to cost objects as it attributes to many objects and elements. It is the difficulty which we face allocating the cost concerning those many elements as we should distribute the indirect costs such fairly and regularly. It is the regular distribution which helps to make ...

Securing Your Web Browsers from Hackers
May 19, 2017

Nowadays, Web Browsers such as Internet Explorer, Mozilla Firefox, Apple Safari, Google Chrome, UC Browser and Opera Mini are installed on almost all the computers. Often, they come pre-installed with operating systems and are set on default configuration which is very insecure . Due to which Web Browsers are used frequently and exploiting vulnerabilities on web ...

UNM4SK3D: WannaCry, Bell Canada, and CIA
By: Olivia
May 19, 2017

#ransomware You've probably heard so much about it that by now you WannaCry, but on May 12th what is believed to be the most massive ransomware campaign 'WannaCry'  targeted over 45,000 computers in 74 countries, including United States, Russia, Germany, Turkey, Italy, Philippines and Vietnam, and that the number grew to an estimated ...

Auditing *Nix Systems in Under 2 Minutes
By: Alfie
May 18, 2017

Want to do a quick comprehensive audit for your *nix workstation or server? Granted, more than 100 controls will be tested, but use Nix Auditor.Steps:1.  Download the script https://github.com/XalfiE/Nix-Auditor  2.  Make the script executable - using chmod +x  3. Run the script - ensure you are root for comprehensive results 4. Analyze the results under the following ...