0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

The Best Email Backup for Email File Hoarders
By: angeljonson
April 16, 2018

Do you want to create Email file backup? If yes, then read the following article. Here, we are going to provide you the best way by which you can easily create a backup of 40 email client services without losing a bit of information. So, keep reading the post and know how to backup email files easily. ...

Kerberos Authentication Protocol Overview
By: CHITTILLA VENKATA VISWANATH
April 16, 2018

What is Kerberos?  Kerberos is a computer network authentication protocol that works on the basis of tickets. These tickets allow the nodes communicating over a non-secure network to authenticate in a secure manner. Kerberos is built into all major operating systems.Kerberos is a Client-Server modelSymmetric key model Meaning of Kerberos:  The name Kerberos was taken from a Greek ...

The Resilience of Critical Infrastructures
By: Palita2018
April 15, 2018

Historical Background Since the ancient Romans it was clear the importance of critical infrastructures, so that for example they had invented a system of IPS / IDS for the protection of drinking water, raising trouts in pools far km away from Rome, sprayed by the same water conducted in the city by the famous Roman aqueducts, placing a look-out ...

NSA | Crypto Challenge of the Week | Week 15
By: Harwinder Singh
April 14, 2018

Intelligence. It's the ability to think abstractly. Challenge the unknown. Solve the impossible. NSA employees work on some of the world's most demanding and exhilarating high-tech engineering challenges. Applying complex algorithms and expressing difficult cryptographic problems in terms of mathematics is part of the work NSA employees do every day.Today I solved the Crypto Challenge of week 15. It ...

The Best Firewall for your Company: Yourself
By: usouzajr
April 13, 2018

I've seen the main facts about Security in the last months, and I still get amazing on how enterprises are being affected by several kinds of attacks. When taking a time to analyze it, we can figure out the main problem for all of these issues - a complete lack of strategies, good practices and architecture for cybersecurity. ...

Social Engineering & Online Fraud
By: mohamad lajeen
April 13, 2018

Today, we introduce a new and essential subject for beginners and for a professional start in the hacker world. What is internet fraud? It is a term that refers to any tricks or schemes that are used online. For example: E-mail, websites, chat rooms and more. Internet fraud aims to deceive users for many harmful purposes such as ...

Red Hat Server Administration: Yum Server Configuration
By: variiable
April 13, 2018

Red Hat Linux System Administration Written to help IT professionals get an overview of yum server configuration   Yum Server What is Linux System Administration? Linux system administration is to manage the operations of a computer system. As most computing devices are powered by Linux, ...

Website Takedown with the "Slowloris DoS Attack"
By: Shaquib Izhar
April 12, 2018

  A DoS attack is a type of attack where an attacker can suspend services of a host or a website by sending a large amount of traffic and making request constantly from two or more computer or by sending a large number of the packet which makes ...

Bluetooth's War on Windows 10
By: shubhamg
April 12, 2018

Often it means to connect some gadgets with each other, and this is the very last option when you want to transfer files, and all other options are dead.We, humans, are moving very fast to an era which is wireless as many of us are moving towards latest gadgets like smartphone, laptop, tablet and many more, moving ...

Server Upgrades and Desktop Changes
By: Muhammad Ahsan Shakeel
April 11, 2018

In Windows Server 2012, Microsoft removed the Start button from the lower left. In R2 the Start button has been put back so you can access your application menu. You can still hit the Windows key to access your list if you’ve already gotten used to using it. If you’re not familiar with where the Windows key is, it’s to the left ...