0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Cyber Security Chronicles: Age of Blind Accessibility with No Vision
By: THE CYBER EAGLE (CYBER SECURITY + NETWORK SPECIALIST)
July 28, 2017

{Chronicle 3} By The CYBER EAGLE (Jeremy Bannister)  The Information Technology industry is in a major transition state as we move towards the end of the second decade of the millennium in the United States of America. Well, some might say that this industry is always in a transition state or in a constant state ...

Which MCSE Certification Is Best and In Demand?
By: michaelwarne
July 27, 2017

Microsoft Certified Systems Engineer is a top level IT credential validated by Microsoft. The MCSA (Microsoft Certified Solutions Associate) is the first requirement of eligibility for the (MCSE) . The MCSE ...

Understanding Unpredictable Threats: Advanced Malware
By: strainer
July 26, 2017

  Unpredictable Threats – Advanced Malware By: Art Rebultan How do you think a traditional, signature-based anti-malware can detect unpredictable threats like Polymorphic, Metamorphic and Cross-Platform malware? This advanced malware has the same destructive functionalities from any of the commonly known malware; Trojan, Worm, Virus, Keylogger, Ransomware, Bot, Adware, Rootkit, and Spyware. Polymorphic While ...

How to Split PST Files Manually and Automatically
By: alisahilton
July 26, 2017

  Do you want to know a short and automated method to split Outlook PST file into smaller parts ? Have you ever tried to perform it manually? If not, then we have come up with two manual tricks to split PST file along with a matchless solution. ...

Cyber Security as a Millennial
By: jrinehard
July 25, 2017

Are you a student looking for a rewarding area of study? Are you a recent college graduate with a totally different degree than IT/Cyber security? Are you just looking for a fresh job with progressive growth rates? If you answered “yes” to at least one of these, you should pursue a career in Cyber security. Cyber security ...

Free Windows Data Recovery Tool to Repair Corrupt Hard Disk Drive
By: mahima11
July 25, 2017

Windows Data Recovery tool is the best hard disk recovery software for Windows users. In extreme data loss situations or an event of hard disk failure, it can restore data from the hard drive containing FAT and NTFS file systems. It supports both FAT data recovery and NTFS data recovery from corrupt hard disk with ease. Via ...

A Simple & Easy Solution: EDB to PST Converter
By: alisahilton
July 25, 2017

  Exchange Server is most the widely used emailing server among the users. It uses EDB file to store all Exchange mailbox data such as tasks, calendars, contacts, emails, etc. Moreover, the EDB files totally depend on the Exchange server dependent. One needs to have an Exchange environment to access EDB file. It is merely ...

Convert Lotus Notes Mailbox to Outlook
By: alisahilton
July 24, 2017

  Are you one of them who want to migrate Lotus Notes to Microsoft Outlook? If yes, then do you know there are many users like you finding the solution for the same? However, they all have to face many challenges. Considering this, we ...

Black Hat 2017: Inside Look
By: Olivia
July 23, 2017

The History of Black Hat “From its inception in 1997, Black Hat has grown from a single annual conference in Las Vegas to a global conference series with annual events in Abu Dhabi, Barcelona, Las Vegas and Washington DC. It has also become a premiere venue for elite security researchers and the best security trainers ...

Cookies and Sessions
By: rithinskaria
July 21, 2017

Cookies and Sessions Sometimes, websites need to track the movement of visitors. They need to understand when a user is logged in. For example, when you log into Gmail and then navigate to the 'Compose Mail' web page of Gmail, it does not ask you to log in again. It 'remembers' that you are already logged in. Websites ...