0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

A Brief Introduction to Fully Homomorphic Cryptosystems
By: Lawrence King
June 28, 2017

Recently, I completed a course through MIT Professional Education in Cybersecurity. During the course, we discussed many concepts, best practices, and policies in the field of cyber security. We also discussed the research being performed at MIT in the area of cybersecurity. One of the concepts that stood out was that of Fully Homomorphic Encryption. Fully Homomorphic ...

Your Complete Guide to Linux
By: Olivia
June 28, 2017

Since its’ inception, Linux has become a phenomenon in the IT world as programmers work to enhance the operating system. As it grows, Linux has gained a following among developers very quickly, as it appeals to a wide audience. Most specifically, Linux is ideal for those who know UNIX and want to run it on PC-type hardware, those ...

Google CTF 2017 Mind Reader Write-up
By: Motasem
June 28, 2017

MindReader was supposedly one of the easiest challenges at GoogleCTF and it’s after some guessing. So let’s start! First heading the challenge page we see a box with “read” button. First thing comes to mind is to try to test for “XSS” so a couple of XSS attempts were tested among them the following: <script>alert(test)</script> ...

PST Recovery Tool - Free Full Version
By: elbert04
June 27, 2017

Corrupt PST File Recovery Freeware can be used to fix unreadable PST file and return emails from dishonest PST file of Outlook (2016 to 97) applications. PST File Recovery also fixes oversized PST files and returns emails successfully from them. Corrupt PST File Recovery Freeware is an opportune PST Recovery software, which recovers the Augean, unreadable or ...

Apache Logs Analysis
By: Masood
June 27, 2017

Log analysis can be a tedious task.   Raw logs do not reveal much information unless they are processed through a log analysis engine or Security information and event management (SIEM) solution. In this article, I will pull the Apache logs of my site into a log collector ( Sumo Logic Free ...

Your Complete Guide to Hyper-V
By: Olivia
June 24, 2017

Let’s face it, virtualization is not going away any time soon. Companies will continued to be challenged by the limitations of their servers and the need for a money and time saving solutions will  increase over time. Many are familiar with the capabilities of VMware, but what about Hyper-V from Microsoft?Hyper-V is another popular and capable virtualization tool, ...

What is Tabnapping? Protection & Prevention Techniques
By: Cyber Tiger
June 23, 2017

The word 'Tab Napping' comes from the combination of 'tab' and 'kidnapping' used by clever phishers, scammers, and hackers. Tabnapping is an interesting, tricky, clever, and smart hacking technique for phishing and scamming. Through this, attackers take advantage and control a victim's unattended browser tabs by hijacking and redirecting him to malicious URLs where they can perform a phishing attack and ...

Free Solution for OST to PST
By: elbert04
June 22, 2017

Disclaimer: This article was not edited by Cybrary. Employed with any large-sized file can be quite herculean, as it may lentissimo doctor the overall show of the group. Similarly, in the cover of an offline Outlook OST file that is associated with Outlook organized with Replace server, an economical way to fall the ...

UNM4SK3D: NSA
By: Olivia
June 22, 2017

You may notice a change in the format of today's UNM4SK3D Cyber Security News. Cybrary wants to hear from you! Do you prefer a shorter newsletter focused on 1 topic or the extended version featuring 3 main topics? Comment below with your feedback.  #github In light of the Vault 7 ...

Your Complete Guide to VMware
By: Olivia
June 22, 2017

Traditionally, IT organizations are challenged by the limitations of today’s x86 servers, which are designed to run just one operating system and application at a time. This means that even small data centers have to deploy many servers, which is an incredibly inefficient practice.Gartner reports that over half of all server workloads are now virtualized, and that number will most likely ...