0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

PST Recovery Tool - Free Full Version
By: elbert04
June 27, 2017

Corrupt PST File Recovery Freeware can be used to fix unreadable PST file and return emails from dishonest PST file of Outlook (2016 to 97) applications. PST File Recovery also fixes oversized PST files and returns emails successfully from them. Corrupt PST File Recovery Freeware is an opportune PST Recovery software, which recovers the Augean, unreadable or ...

Apache Logs Analysis
By: Masood
June 27, 2017

Log analysis can be a tedious task.   Raw logs do not reveal much information unless they are processed through a log analysis engine or Security information and event management (SIEM) solution. In this article, I will pull the Apache logs of my site into a log collector ( Sumo Logic Free ...

Your Complete Guide to Hyper-V
By: Olivia
June 24, 2017

Let’s face it, virtualization is not going away any time soon. Companies will continued to be challenged by the limitations of their servers and the need for a money and time saving solutions will  increase over time. Many are familiar with the capabilities of VMware, but what about Hyper-V from Microsoft?Hyper-V is another popular and capable virtualization tool, ...

What is Tabnapping? Protection & Prevention Techniques
By: Cyber Tiger
June 23, 2017

The word 'Tab Napping' comes from the combination of 'tab' and 'kidnapping' used by clever phishers, scammers, and hackers. Tabnapping is an interesting, tricky, clever, and smart hacking technique for phishing and scamming. Through this, attackers take advantage and control a victim's unattended browser tabs by hijacking and redirecting him to malicious URLs where they can perform a phishing attack and ...

Free Solution for OST to PST
By: elbert04
June 22, 2017

Disclaimer: This article was not edited by Cybrary. Employed with any large-sized file can be quite herculean, as it may lentissimo doctor the overall show of the group. Similarly, in the cover of an offline Outlook OST file that is associated with Outlook organized with Replace server, an economical way to fall the ...

UNM4SK3D: NSA
By: Olivia
June 22, 2017

You may notice a change in the format of today's UNM4SK3D Cyber Security News. Cybrary wants to hear from you! Do you prefer a shorter newsletter focused on 1 topic or the extended version featuring 3 main topics? Comment below with your feedback.  #github In light of the Vault 7 ...

Your Complete Guide to VMware
By: Olivia
June 22, 2017

Traditionally, IT organizations are challenged by the limitations of today’s x86 servers, which are designed to run just one operating system and application at a time. This means that even small data centers have to deploy many servers, which is an incredibly inefficient practice.Gartner reports that over half of all server workloads are now virtualized, and that number will most likely ...

Collecting Firewall and Router Logs
By: Masood
June 22, 2017

Syslogs vs NetFlow – Which one is right for you? Syslog: Syslog is a standard for message logging. Each message is labeled with a facility code and a severity label. Standard port for collecting logs is UDP 514. Syslog gives information about system events, interfaces up ...

Your Complete Guide to Wireshark
By: Olivia
June 21, 2017

You may know Wireshark as the ‘best network protocol analyzer in the world,’ but do you know how to use it? Being familiar with this popular tool can help you stand out on your resume, or can help you go further in your current IT role as it has plenty of benefits for users.“With more than 500,000 downloads a ...

My Top Tips For Preparing and Passing The CISSP Exam
By: Responsible Cyber
June 20, 2017

I would like to share 3 TIPS to be prepared for the CISSP exam , and opportunities for #women to start a #career in #cybersecurity .The (ISC)² Women’s InformationSecurity Scholarship program is directed by the Center for Cyber Safety and Education. Women who are passionate about Cyber Security should apply to ...