0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.



4 Noob’s guide to ransomware DISCLAIMER: For educational and informative purposes only. The author bears no responsibility for any form of usage of the knowledge presented in here. Every one of us has been a victim of at least one computer malware infection at some point in our lives. ...


TOR Browser / Tails OS Setup Virtual Machine, install Linux OS (fully updated and patched) Configure VPN software for hiding your location on your host OS (disable geolocation, clear all log, change your OS default language to some other country) Configure proxy switcher for your tor browser on VM (Linux) ...


#hacked It seems that word of new breaches have been released almost daily as of late. The latest, coming on the back on the devastating Equifax breach, is news that the Securities and Exchange Commission (SEC) was hacked last year. Gulp. The SEC is the top U.S. market's regulator. Their official website states, "The mission ...


If the Outlook PST files causing trouble in opening or viewing, then there are very many chances of PST file corruption or it may be due to something else. If those PST files are corrupted or inaccessible than user won't able to view Emails, Calendars, Contacts, Notes, Tasks and Journal entries etc., and if those PST files are important to user then ...


Every infosec professional who has ever argued against the CEH exam may change their minds after this recent announcement from EC Council. The certifying body will be launching a new, fully-proctored ‘Licensed Penetration Tester (LPT)’ Certification at this year’s Hacker Halted.The new LPT certification exam will be delivered as a live test that can be ...


Regarding Cloud technologies, there are two sides of the story: on the one hand, there are suppliers of new technologies that, as always move forward, and on the other hand, users who do not want to change anything won't change anything. So let’s try to approach this “problem” with win-win solutions for both sides, but with emphasis on ...


Preventive Security - Alive or Dead There are some new buzz words in the cyber security industry today. Terms such as “data-driven security” and “security analytics” seem to be in the forefront and what all of the “cool” kids are talking about while the “old-timers” dig in ...


Tight on cash? Same here. So, today, I set out to find all the low-cost and no-cost items on Cybrary. After a few searches, I found several posts that highlight free tools, free classes and low-cost study tools. Now, my reading/study lists are set for the next few weeks, months...years :)First, here's a list of all the free beginner, ...


SysInfoTools OST to PST Converter software is an advanced solution for Exchange to Outlook migration. Via this software, you can successfully export mailbox content from OST to PST file format. It causes no alteration or changes during OST to PST conversion and keeps the original OST file intact. If you ...


Quickly Convert OST to PST Format to Import OST Data to Outlook Whenever users get an error while opening OST files, the user must go with the OST to PST Converter to overcome from this situation. It easily converts OST to PST format to save Exchange OST emails in Outlook PST format. Then only users are able to ...