0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Linux+ 104 Transcender Practice Test Question Preview
By: Olivia
August 19, 2017

Linux has grown into an industry-leading software and service delivery platform that is used for everything from super computers and Web servers to virtualized systems and your Android phone, meaning you will find many IT careers in the current market require these skills. The CompTIA LX0-104 Linux+ certification exam delves specifically into “applications, scripting, and security. This exam covers ...

How to Solve "MS Outlook Not Responding" Error
By: SHIV GUPTA
August 19, 2017

How to Solve "MS Outlook Not Responding" Error or Outlook Freezes When Opening a File or Sending Mail Receiving ‘Outlook Not Responding’ error can be annoying when you try to open an item or send an email message in Outlook 2010 or higher version. The users also experience frequent Outlook freezes while performing such activities. This error may ...

Cybrary Adds INFOSEC Curmudgeon Jeff Man to the Team
By: Olivia
August 18, 2017

As Cybrarians may or may not have noticed, Cybrary has entered an accelerated, high-growth phase. In addition to changes across the site, including the new offerings of various vendor products in the catalog, Cybrary has also begun to expand the team.[caption id="attachment_96849" align="alignleft" width="219"] Jeff Man, INFOSEC Curmudgeon & Cyber Security Evangelist[/caption]The newest addition ...

Cyber Fact: Hacktivism
By: Olivia
August 18, 2017

According to Heimdal Security, “Hacktivism accounts for half of the cyberattacks launched in the world.” What is hacktivism? Hacktivism is a politically or socially motivated form of hacking. Deeply rooted in hacker culture and ethics, it is often related to free speech, human rights, or freedom of information. Although hacktivism may seem positive, ...

Tutorial: Multiple Threads Downloader Source Code
By: Bmsr256
August 18, 2017

This time I will present you here a source code made in Python which you can download a file with multiple threads option. This source code is for educational purposes and I hope is helpful to you. If you find any bugs in this code or have questions, leave a message in the comments section. `#!/usr/bin/env python#coding=utf-8import osimport sysimport ...

UNM4SK3D: HBO, NetSarang, and Fancy Bear
By: Olivia
August 18, 2017

#hacked   Blackmail is coming. In a bizarre string of events, HBO hit show Game of Thrones is at the center of breaches and episode leaks, among other pieces to this growing hacker's puzzle.  Initially, unknown hackers claimed to have 1.5 terabytes of data from HBO and leaked that information in two batches ...

How to Connect Router/Firewall On GNS3 VM to a Host Machine
By: Parvez Ahmed
August 17, 2017

How to connect a Router/Firewall that is running on GNS3 VM to a host machine. Have you ever wondered how to connect your simulated device (Router/Firewall) on GNS3 VM to host machine so that you can pull/push the configuration from/to the device? Here is the solution: 1. You have to add one loopback adapter to your host ...

Linux+ 103 Transcender Practice Test Question Preview
By: Olivia
August 17, 2017

According to CompTIA, the Linux+ certification offers a framework for acquiring working knowledge of Linux for IT professionals working as junior-level system administrators, as well as those working in Web and software development.Successful candidates will have the following skills: Work at the Linux command line Perform easy maintenance tasks including assisting users, ...

Footprinting and Reconnaissance
By: Raul Pop
August 17, 2017

Today I am going to give you some tools to explore the Footprinting and Reconnaissance . For the new people on this long trip, enjoy the ride and good luck on your studies! For questions or help on how to use these tools, I will be glad to help you so feel free to contact me anytime. 1) ...

Cyber Pop: Pretty Good Privacy
By: Olivia
August 16, 2017

Privacy is a topic that the security community can never give too much attention. To. For those with an online presence, it is especially important to consider who has access to your information. One common method for doing so through an encryption method called Pretty Good Privacy (PGP) . What is Pretty Good Privacy (PGP)? Developed ...