0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Cryptographic and Testing Frameworks for Python Developers
By: Praveen Manohar
February 17, 2018

Hi there, I'm Praveen, Now we gone see the Useful tools, plugin available in GitHub for python developers.There lot of algorithm procedures available in online for a developer which is useful to develop your own applications. Here something to share,1) Cryptography : C ryptography  :   A package designed to expose cryptographic primitives ...

Convert OLM to PST Essentiality by Using Mac OLM Converter
By: rollinsduke
February 17, 2018

Convert OLM to PST format easily after that you can easily import OLM files to Outlook (Windows) with the help of all on one OLM converter which is fully loaded with advanced features. Outlook has consistently been ideal and default desktop mailing application for most of the users ...

Insights into Bitcoin Forensics
By: Apurv Singh Gautam
February 16, 2018

Bitcoin is a cryptocurrency. It is an attempt to bring back a Decentralized currency of people. It is not controlled by any central body. It works on peer to peer network. Bitcoin woks on Blockchain technology.Blockchain is a type of distributed ledger. The data is stored in blocks. These blocks contain digitally recorded data that is unchangeable. ...

Cracking Encrypted PDF Password Using Dictionary Attack
By: Shaquib Izhar
February 15, 2018

 In this post we will crack encrypted PDF with a very easy method. This is a very simple and easy method for cracking encrypted PDF password which is helpful for beginners in password cracking. There are also different method for cracking PDF password by generating hash and cracking it with ...

Mobile Security
By: srikanthchiku
February 14, 2018

Mobile security , or more specifically  mobile device security , has become increasingly important in  mobile computing . Of particular concern is the  security  of personal and business information now stored on  smartphones . More and more users and businesses use smartphones to communicate, but also to plan and organize their users' ...

What Is Kali Linux and Why Do Hackers Use Kali Linux OS
By: rohitkharat
February 14, 2018

What is Kali? Kali is the latest and greatest version of the ever popular Backtrack Linux penetration testingdistribution. The creators of the Backtrack series kept Kali in a format very similar to Backtrack, soanyone familiar with the older Backtrack platform will feel right at home.Kali has been re-vamped from the ground up to be the best ...

Free Tool to Open VHD File in Windows
By: Adom Click
February 13, 2018

Virtual Hard Disk ( VHD) file is a file that acts as a virtual hard drive and can contain everything on a hard disk, such as a file system, files, folders and more. While going through this article you will come to know both the manual and the alternative method to Repair VHD File .   ...

Winter Olympics 2018: Hackers Going for Gold
By: Olivia
February 13, 2018

During past Olympic Games in Beijing, London, and Brazil, there were reportedly millions of attempted cyberattacks a day, of which some were successful. As the breadth and depth of technology used in conjunction with the Games expands, everything from VR to IoT, the attack surface widens and attackers find more creative at ways of leveraging this monumental ...

Top Methods to Convert NSF to PST to Export Lotus Notes to Outlook
By: justin hansen
February 13, 2018

With the advancement in the technologies, there are numerous options available to accomplish a single task. At that time, a user needs to decide with which alternative should one go. The same scenario exists when the users talk about various email clients available in the software industry. In the list of these email client, the two famous ...

Share Your Knowledge with the World: Teach on Cybrary
By: Olivia
February 12, 2018

If you've watched popular courses like How to Go from Solider to Cyber Pro , The Art of Exploitation , and Network Operations and Security , you may be surprised to learn that all of these courses were contributed to Cybrary by users."You can change how people around you protect themselves and others," says  ...