0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

SaaS ( Software as a Service ) Benefits & Security Implications
By: Christopher Bainbridge
December 27, 2017

SaaS ( Software as a Service ) Benefits & Security Implications As use software-as-a-service grows, more and more small to medium businesses that utilise SaaS in order to remain agile and keep down hardware and maintenance costs, so do their concerns about SaaS security. So what are the benefits of ...

Digital Forensics Books Catalogue
By: Divya Lakshmanan
December 27, 2017

This article is your personal catalogue to apprise you about the standard books out there in the various branches of digital forensics. If formal education is not your forte - all you need is passion, time and the right resources to get the skills you desire. Dive into the books, get your hands dirty with ...

Installing Splunk Standalone and Agents on Ubuntu
By: Klimdy
December 26, 2017

Installing Splunk standalone and agents on Ubuntu It's my little guide to how to use Splunk , maybe I write more about Apps, configuration Splunk and another theme if you want it)))Before installing Splunk Enterprise, you need to download it, the easiest way is to do it "directly" on the server itself: ...

Who is Suitable for an ITIL certification course?
By: priyajatoliya
December 26, 2017

Information Technology Infrastructure Library, popularly known as ITIL, is a popular framework for the management of IT services all over the world. Increasing number of global IT companies has now adopted this framework to make sure that the services they offer are in line with the well-defined and consistent set of processes which include best practices. ...

Creating a Windows EXE FUD Reverse Shell in Python
By: Orion
December 25, 2017

What Is A Shell A shell is acts as an interface between the user and Operating system. You can use a shell to do many things such as view files, launch applications,  check network configurations, etc. Some examples would be Powershell in Windows and the Terminal in Linux. Reverse vs Bind Shells ...

TCP/IP Model
By: D3f3nd3r
December 24, 2017

The TCP/IP model, more commonly known as the Internet protocol suite, is another layering model that is simpler and has been widely adopted. It defines the four separate layers, some of which overlap with the OSI model: ·          Application : In ...

The Rules for Data Protection are Changing: Are you Ready for GDPR ?
By: Jide Olagundoye
December 23, 2017

Modern IT has created an electronic world to meet a variety of needs from simply providing information, to wide ranging and far reaching products and services. They are all available on the web. The individual communication and consumption has created a footprint of information and transaction history which is commercially useful. ...

OSI Model
By: D3f3nd3r
December 23, 2017

Historically, one method of talking about the different layers of network communication is the OSI model. OSI stands for Open Systems Interconnect. This model defines seven separate layers. The layers in this model are: ·          Application : The ...

UNM4SK3D: Kaspersky, Experian, and CTB-Locker
By: Olivia
December 22, 2017

#accusations Due process. That's what Kaspersky is saying they were denied of after the Trump administration banned the use of its products in government networks. Now, they're asking a U.S. federal court to overturn this ruling.  How did this all start? Well, back in October of this year, an article from the New York Times ...

Network Terminologies
By: D3f3nd3r
December 22, 2017

Connection : In networking, a connection refers to pieces of related information that are transferred through a network. This generally infers that a connection is built before the data transfer (by following the procedures laid out in a protocol) and then is deconstructed at the end of the data transfer. ...