0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Anyone who works with Exchange mailbox accounts in offline mode needs OST file for Outlook which stores your mail and data. The OST file gets synced when Outlook is connected to the server. This is useful when the server has a maintenance or crash or any other issues. But, if you need it on a different computer, usually ...


In this ever-changing world, a new stride in the field of technology is being made every day. The newest and latest technologies are being replaced by even newer and better versions of the same. However, some advancements create a turning point in their particular field. Advancements so noteworthy that they are later referred to as 'Legendary'. PDF (Portable ...


IT security certifications are critical for a career in the world of cyber security. But in order to get into the world, you have to clear certification exams that meet the industry parameters and standards. There are two points to a business’ security - the first is testing vulnerabilities of a testing system and the second is the management ...


Cyber Security Chronicles - Chapter 4, Anatomy of a Hacker: The Color Guard When you think of the word hacker, you probably have negative thoughts automatically rush to the forefront of your brain. However, there are several different types of hackers and a great majority of them are actually on the ...


#wikileaks The floodgates that are Wikileaks have yet to close. Another week has passed with yet another leak, the latest dubbed 'ExpressLane,' a tool which allows the CIA to spy on intelligence agencies such as the Federal Bureau of Investigation (FBI), Department of Homeland Security (DHS) and National Security Agency (NSA) while secretly ...


Targeted, Technical Certifications: $600 for an $18,000 raise? Now this probably won't come as a surprise at all to those who've spent a few years in cyber security organizations, but for those looking to get into cyber security, or are early on in their path, I think this is valuable information. I did some ...


In the not so distant past, opening doors with a wave of our hand seemed like something you’d see only in a Harry Potter film. Now, with biohacking, this ability has become possible. We are modifying human bodies to meet our technological needs. By embedding a microchip under your finger, you can open doors, unlock your computer, ...


Just a fun article on how basic technical and networking tools can help an information technology help desk recover a stolen automobile and laptop. Scenario: The call could come in like this “Yeah, Hello? Yeah I had my company car stolen.” Okay, thank you for confirming your identification. Was your automobile lo-jacked? “No.” Okay, when ...


Cloud computing, hosted services, and applications on demand redefined the way users access and exchange data, but security solutions have remained stuck in the past, cluttered with complicated architecture and limited thinking. The solution brings cloud, i.e. Security-as-a-Service (SECaaS).Companies that want to resist threats must consider a new security methodology, as traditional solutions encounter very serious challenges: ...


According to Forbes, ITIL was ranked as one of the most valuable IT certifications for 2017, with holders earning an average yearly salary of $103,408. For many, there is a certain sense of mystery that surrounds this certification despite it being the most widely used framework for IT management, implemented by thousands of organizations worldwide including NASA, ...