0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


SaaS ( Software as a Service ) Benefits & Security Implications As use software-as-a-service grows, more and more small to medium businesses that utilise SaaS in order to remain agile and keep down hardware and maintenance costs, so do their concerns about SaaS security. So what are the benefits of ...


This article is your personal catalogue to apprise you about the standard books out there in the various branches of digital forensics. If formal education is not your forte - all you need is passion, time and the right resources to get the skills you desire. Dive into the books, get your hands dirty with ...


Installing Splunk standalone and agents on Ubuntu It's my little guide to how to use Splunk , maybe I write more about Apps, configuration Splunk and another theme if you want it)))Before installing Splunk Enterprise, you need to download it, the easiest way is to do it "directly" on the server itself: ...


Information Technology Infrastructure Library, popularly known as ITIL, is a popular framework for the management of IT services all over the world. Increasing number of global IT companies has now adopted this framework to make sure that the services they offer are in line with the well-defined and consistent set of processes which include best practices. ...


What Is A Shell A shell is acts as an interface between the user and Operating system. You can use a shell to do many things such as view files, launch applications, check network configurations, etc. Some examples would be Powershell in Windows and the Terminal in Linux. Reverse vs Bind Shells ...


The TCP/IP model, more commonly known as the Internet protocol suite, is another layering model that is simpler and has been widely adopted. It defines the four separate layers, some of which overlap with the OSI model: · Application : In ...


Modern IT has created an electronic world to meet a variety of needs from simply providing information, to wide ranging and far reaching products and services. They are all available on the web. The individual communication and consumption has created a footprint of information and transaction history which is commercially useful. ...


Historically, one method of talking about the different layers of network communication is the OSI model. OSI stands for Open Systems Interconnect. This model defines seven separate layers. The layers in this model are: · Application : The ...


#accusations Due process. That's what Kaspersky is saying they were denied of after the Trump administration banned the use of its products in government networks. Now, they're asking a U.S. federal court to overturn this ruling. How did this all start? Well, back in October of this year, an article from the New York Times ...


Connection : In networking, a connection refers to pieces of related information that are transferred through a network. This generally infers that a connection is built before the data transfer (by following the procedures laid out in a protocol) and then is deconstructed at the end of the data transfer. ...