0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Non-Repudiation and Irrevocability
By: bytezealot
April 22, 2017

Definitions of the pertinent concepts used in this article: Authenticity : Property that ensures that an identity of a subject or resource is, in fact, the real identity claimed. It applies to individuals (users), but also to other entity (applications, processes, systems, etc.). Integrity: Methods of ensuring that data is real, accurate, consistent ...

Cloud+ Outline - Module 10
By: cdoyle
April 22, 2017

Module 10: Security and Recovery Access ControlAuthentication Something you know Something you have Something you are Single Sign-On Allows a shared login to many networks Federation Uses SSO to allow users or devices to other network resources ...

UNM4SK3D: InterContinental Hotels, Bose, and Ransomware
By: Olivia
April 21, 2017

#hacked Nelly might regret staying at the Holiday Inn, and you might too. This week, InterContinental Hotels Group (IHG), owners of Holiday Inn and Crowne Plaza, have notified the public of malware found on payment card systems at 1,174 franchise hotels in the United States. This is the second breach ...

Instalando e Fixando audio no Kali Linux
By: Joelson
April 21, 2017

English translation below- Instalando e Fixando o som do Kali Linux – PULSEAUDIODepois de tentar todos os métodos do youtube, descobri que os drivers de áudio do kali não são reconhecidos por minha placa mãe. Então vou mostrar como resolvi.1. Primeiro temos que saber se seu driver de som esta instalado. a. Vá em configuração, sons, e olhe ...

Cloud+ Outline - Modules 7, 8 and 9
By: cdoyle
April 21, 2017

Module 7: Allocation and Optimizing Unit Overview VM and Host Resource Allocation Resources Memory CPU Disk Space Quotas Quotas are the total amount of resources that a Vm can use Hard – maximum amount of resources ...

30-Day Strategy for CISA Success
By: Hemang Doshi
April 20, 2017

What is the 30-day strategy for CISA success? We have specifically designed 30 question banks for each day with details as follow: (1)All questions have been designed considering CISA exam pattern. (2)From day 1 to day 10, each day contains 10 questions. From day 11 to day ...

Cloud+ Outline - Modules 5 and 6
By: cdoyle
April 19, 2017

Module 5: Virtualization Setup Unit Overview   Hypervisor Type 1 vs Type 2 Type 1 Loaded as a core Virtual machines loaded on bare metal  Type 2 Operating system installed then VM loaded on OS Both are controlled with ...

Teaching Kids about Cybersecurity: it’s never too early
By: rcubed
April 18, 2017

Children are taught from an early age about the many things in the world that can harm them. Even in a toddler’s narrow world, there are plenty of potential hazards lurking around almost every corner. With growing autonomy, children are then warned about an expanded set of dangers. These range from the dangers of talking to strangers, the need ...

Banner Grabbing with TELNET
By: lscianni
April 18, 2017

Banner Grabbing with TELNET Why use TELNET? With tools like Nmap and Metasploit available you're probably asking, "Why would I need to know how to use telnet?" While true, there are many tools that can be used to gather this information from services that are willing to dish it out, TELNET is available on Linux, Mac OS X, and Windows operating systems; ...

The Basics of the Check_MK Monitoring System
By: Tamas Szucs
April 18, 2017

Description of the system The Check_MK is an open source based monitoring system . It fits almost any infrastructure. Basic eleme n t the Nagios and WATO GUI , and includes ...