0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Beware of the Resume Scam
By: Stryker
August 21, 2017

I recently stumbled across a scam. There are fake employment agencies that are calling security techs and others for jobs while asking for your resume. In this scam, you send your resume to them and when they call back they claim now they need to have you sign a representation agreement and once you sign that they ...

Repair Corrupt 2GB Outlook PST File
By: shivgupta
August 21, 2017

A Personal Storage Table (PST) file is an MS Outlook file in which a user’s emails, contacts, to do lists, etc. are stored. The file is created on the user’s local hard disk drive and can be damaged any time due to various logical and physical reasons. Some of the common reasons behind PST file damage are abrupt system ...

Tutorial: MAC Address Generator Code
By: Bmsr256
August 20, 2017

Today, I will present a random MAC address generator tool written in Python. This code is for educational purposes and you can test this code and learn more about Python programming.MAC is an acronym for Media Access Control address and is a unique identifier assigned to network interfaces (e.g: NIC cards) for communications at the data link layer of a ...

Linux+ 104 Transcender Practice Test Question Preview
By: Olivia
August 19, 2017

Linux has grown into an industry-leading software and service delivery platform that is used for everything from super computers and Web servers to virtualized systems and your Android phone, meaning you will find many IT careers in the current market require these skills. The CompTIA LX0-104 Linux+ certification exam delves specifically into “applications, scripting, and security. This exam covers ...

How to Solve "MS Outlook Not Responding" Error
By: SHIV GUPTA
August 19, 2017

How to Solve "MS Outlook Not Responding" Error or Outlook Freezes When Opening a File or Sending Mail Receiving ‘Outlook Not Responding’ error can be annoying when you try to open an item or send an email message in Outlook 2010 or higher version. The users also experience frequent Outlook freezes while performing such activities. This error may ...

Cybrary Adds INFOSEC Curmudgeon Jeff Man to the Team
By: Olivia
August 18, 2017

As Cybrarians may or may not have noticed, Cybrary has entered an accelerated, high-growth phase. In addition to changes across the site, including the new offerings of various vendor products in the catalog, Cybrary has also begun to expand the team.[caption id="attachment_96849" align="alignleft" width="219"] Jeff Man, INFOSEC Curmudgeon & Cyber Security Evangelist[/caption]The newest addition ...

Cyber Fact: Hacktivism
By: Olivia
August 18, 2017

According to Heimdal Security, “Hacktivism accounts for half of the cyberattacks launched in the world.” What is hacktivism? Hacktivism is a politically or socially motivated form of hacking. Deeply rooted in hacker culture and ethics, it is often related to free speech, human rights, or freedom of information. Although hacktivism may seem positive, ...

Tutorial: Multiple Threads Downloader Source Code
By: Bmsr256
August 18, 2017

This time I will present you here a source code made in Python which you can download a file with multiple threads option. This source code is for educational purposes and I hope is helpful to you. If you find any bugs in this code or have questions, leave a message in the comments section. `#!/usr/bin/env python#coding=utf-8import osimport sysimport ...

UNM4SK3D: HBO, NetSarang, and Fancy Bear
By: Olivia
August 18, 2017

#hacked   Blackmail is coming. In a bizarre string of events, HBO hit show Game of Thrones is at the center of breaches and episode leaks, among other pieces to this growing hacker's puzzle.  Initially, unknown hackers claimed to have 1.5 terabytes of data from HBO and leaked that information in two batches ...

How to Connect Router/Firewall On GNS3 VM to a Host Machine
By: Parvez Ahmed
August 17, 2017

How to connect a Router/Firewall that is running on GNS3 VM to a host machine. Have you ever wondered how to connect your simulated device (Router/Firewall) on GNS3 VM to host machine so that you can pull/push the configuration from/to the device? Here is the solution: 1. You have to add one loopback adapter to your host ...