0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Quickly Convert OST to PST Format to Import OST Data to Outlook Whenever users get an error while opening OST files, the user must go with the OST to PST Converter to overcome from this situation. It easily converts OST to PST format to save Exchange OST emails in Outlook PST format. Then only users are able to ...


Today, I want to show you a book search source code written in Perl. Perl is a very useful and powerful programming language like Python, except Perl still remains on lots of Unix-like operating systems.This application searches for information on some web sites. I put Wikipedia, but you can change this with whatever you want. The code is posted ...


Windows 10: Securing the Boot Process An operating system’s principal function is to provide a safe execution environment in which users’ programs run. This requires a basic framework for uniform program execution with a uniform and standardized way to use the hardware ...


What is Raspberry Pi? Raspberry Pi is a small computer that costs between $5 and $35, but can function as a desktop computer or be used for additional functions, such as building smart devices. Originally, the Pi was intended for usage in schools as a method of increasing interest in computers among children and ...


#hacked- big time. Chances are you've heard about the Equifax breach, which led to the compromise of 143 million US consumer's data including the names, social security numbers, dates of birth, addresses, and in some cases, drivers license numbers. In the wake of the breach, we've heard stories of corrupt Equifax executives ...


Protect your network system: Kenya, like any other developed nation, is faced with increasing cyber security threats targeting core business functions for both the government and the private sector. Recent attacks on Kenyan Banks, the Government tax collector, the IEBC systems, the rise of cyber bullying and the recent global attack by WannaCry ransomware, surely ...


Encryption is everywhere (well, almost everywhere) around sensitive data in motion and, sometimes, sensitive data at rest. Without it, e-commerce transactions, government secrets and electronic medical records - and many other types of data - could not safely exist. Data is a precious resource in the electronic economy and, like every precious resource, it needs perpetual protection.As a member ...


Cloud services are gaining popularity for some time, and one of the most popular office cloud services is Office 365, especially with SMB companies, and their main concern is security. Most of those companies do not have an Information Security Officer ( CISO ), just basic IT staff for administration and network issues. Microsoft's product and service set ...


In this Kali Linux Tutorial, we are to work with Xerosploit. Xerosploit is a penetration testing toolbox whose objective is to perform the man in the middle attacks. It brings different modules that permit to acknowledge proficient assault and furthermore permits to do DOS attacks and port filtering.We can use this tool to perform DOS, MITM attacks, also the ...


First, we need to differentiate between the public cloud and the private cloud: So, basically, the public cloud consists of cloud applications such as Office 365, Google Suite, Box.com, Dropbox, Salesforce, ServiceNow, etc. There are literally tens of thousands of cloud applications available. We call this Software as a Service (SaaS).On the other hand, a private cloud is when ...