0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Do you want to create Email file backup? If yes, then read the following article. Here, we are going to provide you the best way by which you can easily create a backup of 40 email client services without losing a bit of information. So, keep reading the post and know how to backup email files easily. ...

What is Kerberos? Kerberos is a computer network authentication protocol that works on the basis of tickets. These tickets allow the nodes communicating over a non-secure network to authenticate in a secure manner. Kerberos is built into all major operating systems.Kerberos is a Client-Server modelSymmetric key model Meaning of Kerberos: The name Kerberos was taken from a Greek ...


Historical Background Since the ancient Romans it was clear the importance of critical infrastructures, so that for example they had invented a system of IPS / IDS for the protection of drinking water, raising trouts in pools far km away from Rome, sprayed by the same water conducted in the city by the famous Roman aqueducts, placing a look-out ...


Intelligence. It's the ability to think abstractly. Challenge the unknown. Solve the impossible. NSA employees work on some of the world's most demanding and exhilarating high-tech engineering challenges. Applying complex algorithms and expressing difficult cryptographic problems in terms of mathematics is part of the work NSA employees do every day.Today I solved the Crypto Challenge of week 15. It ...


I've seen the main facts about Security in the last months, and I still get amazing on how enterprises are being affected by several kinds of attacks. When taking a time to analyze it, we can figure out the main problem for all of these issues - a complete lack of strategies, good practices and architecture for cybersecurity. ...

Today, we introduce a new and essential subject for beginners and for a professional start in the hacker world. What is internet fraud? It is a term that refers to any tricks or schemes that are used online. For example: E-mail, websites, chat rooms and more. Internet fraud aims to deceive users for many harmful purposes such as ...


Red Hat Linux System Administration Written to help IT professionals get an overview of yum server configuration Yum Server What is Linux System Administration? Linux system administration is to manage the operations of a computer system. As most computing devices are powered by Linux, ...


A DoS attack is a type of attack where an attacker can suspend services of a host or a website by sending a large amount of traffic and making request constantly from two or more computer or by sending a large number of the packet which makes ...


Often it means to connect some gadgets with each other, and this is the very last option when you want to transfer files, and all other options are dead.We, humans, are moving very fast to an era which is wireless as many of us are moving towards latest gadgets like smartphone, laptop, tablet and many more, moving ...


In Windows Server 2012, Microsoft removed the Start button from the lower left. In R2 the Start button has been put back so you can access your application menu. You can still hit the Windows key to access your list if you’ve already gotten used to using it. If you’re not familiar with where the Windows key is, it’s to the left ...