0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Cyber Pop: Biohacking
By: Olivia
August 24, 2017

In the not so distant past, opening doors with a wave of our hand seemed like something you’d see only in a Harry Potter film. Now, with biohacking, this ability has become possible. We are modifying human bodies to meet our technological needs. By embedding a microchip under your finger, you can open doors, unlock your computer, ...

Recovering a Stolen Car Using Code
By: Brian Scott Luke, MBA
August 24, 2017

Just a fun article on how basic technical and networking tools can help an information technology help desk recover a stolen automobile and laptop.  Scenario:  The call could come in like this “Yeah, Hello? Yeah I had my company car stolen.” Okay, thank you for confirming your identification. Was your automobile lo-jacked? “No.”  Okay, when ...

Security as a Service: SECaaS
By: Sasha Radenovic
August 24, 2017

Cloud computing, hosted services, and applications on demand redefined the way users access and exchange data, but security solutions have remained stuck in the past, cluttered with complicated architecture and limited thinking. The solution brings cloud, i.e. Security-as-a-Service (SECaaS).Companies that want to resist threats must consider a new security methodology, as traditional solutions encounter very serious challenges: ...

Your Complete Guide to ITIL
By: Olivia
August 23, 2017

According to Forbes, ITIL was ranked as one of the most valuable IT certifications for 2017, with holders earning an average yearly salary of $103,408. For many, there is a certain sense of mystery that surrounds this certification despite it being the most widely used framework for IT management, implemented by thousands of organizations worldwide including NASA, ...

Simple String Manipulation in Ruby, Via Password Generator
By: rchamblee
August 22, 2017

Ruby is a small, simple, yet powerful language used primarily for web development in the form of Ruby on Rails. What I'm going to present here, however, is a very simple ruby 'script' for generating passwords that I cooked up in a few minutes. For those interested in Ruby, there will be a line-by-line breakdown of the code, and ...

Welding Defect Rate Analysis & Rectification Using Six SIGMA
By: Decky Antony Kifta
August 22, 2017

Welding Defect Rate Analysis &Rectification Using Six SIGMA Method:Dan FMEA at PT XYZ ABSTRACT                 In order to achieve the company quality objectives and to promote PT XYZ to be the world leading fabricator ...

Cyber Pop: Holistic Security
By: Olivia
August 21, 2017

It is no surprise that as our global reach extends and information is shared across the world, security risks are increasing with the expansion of the attack surface. For this reason, security professionals can no longer take a siloed approach to security. The problem stems from reactions to one threat while the rest of ...

Beware of the Resume Scam
By: Stryker
August 21, 2017

I recently stumbled across a scam. There are fake employment agencies that are calling security techs and others for jobs while asking for your resume. In this scam, you send your resume to them and when they call back they claim now they need to have you sign a representation agreement and once you sign that they ...

Repair Corrupt 2GB Outlook PST File
By: shivgupta
August 21, 2017

A Personal Storage Table (PST) file is an MS Outlook file in which a user’s emails, contacts, to do lists, etc. are stored. The file is created on the user’s local hard disk drive and can be damaged any time due to various logical and physical reasons. Some of the common reasons behind PST file damage are abrupt system ...

Tutorial: MAC Address Generator Code
By: Bmsr256
August 20, 2017

Today, I will present a random MAC address generator tool written in Python. This code is for educational purposes and you can test this code and learn more about Python programming.MAC is an acronym for Media Access Control address and is a unique identifier assigned to network interfaces (e.g: NIC cards) for communications at the data link layer of a ...