0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Project Management: Construction Delays
By: themindandbeauty
May 23, 2017

  Construction Delays An Introduction I consider the construction delay as the utmost charged because it is the big obstacle that interrupts the construction projects and affects their progress. To understand the delay issue and handle its consequences, it is crucial that we investigate its ...

Construction Project Management: Contract Types
By: themindandbeauty
May 22, 2017

  Types of Contracts At the early stage of the construction projects, the essential argument that disturbs the owner and contractor is accepting a suitable form of the contract that meets the common objectives. (Elbeltagi, 2009). Specifying the suitable form of the contract is the first step to confirm the ...

Ransomware Apocalypse: WannaCrypt Is the the Largest Virus Attack in History
By: David Balaban
May 22, 2017

The extortion virus called WannaCrypt has infected tens of thousands of computers around the world. It has paralyzed the work of British hospitals and Spanish companies, and then made its way to Russia, attacking the regional departments of the Ministry of Internal Affairs and the Investigative Committee.Kaspersky reports that tens of thousands of computers in 74 countries ...

Getting Available Memory from Juliar.Future (Juliar Compiler)
By: Rattar
May 21, 2017

Hello RatTeamsters and Cybrarians,Today we will be learning about checking the memory in Juliar.Future. So why is it important to check the memory? Sometimes an application can take up a lot of memory and you might need to reduce it. Find out how much memory some object or class takes ...

Project Management: Cost Management & Analysis
By: themindandbeauty
May 20, 2017

  Cost Management It is the cost which we relate to cost objects as it attributes to many objects and elements. It is the difficulty which we face allocating the cost concerning those many elements as we should distribute the indirect costs such fairly and regularly. It is the regular distribution which helps to make ...

Securing Your Web Browsers from Hackers
May 19, 2017

Nowadays, Web Browsers such as Internet Explorer, Mozilla Firefox, Apple Safari, Google Chrome, UC Browser and Opera Mini are installed on almost all the computers. Often, they come pre-installed with operating systems and are set on default configuration which is very insecure . Due to which Web Browsers are used frequently and exploiting vulnerabilities on web ...

UNM4SK3D: WannaCry, Bell Canada, and CIA
By: Olivia
May 19, 2017

#ransomware You've probably heard so much about it that by now you WannaCry, but on May 12th what is believed to be the most massive ransomware campaign 'WannaCry'  targeted over 45,000 computers in 74 countries, including United States, Russia, Germany, Turkey, Italy, Philippines and Vietnam, and that the number grew to an estimated ...

Auditing *Nix Systems in Under 2 Minutes
By: Alfie
May 18, 2017

Want to do a quick comprehensive audit for your *nix workstation or server? Granted, more than 100 controls will be tested, but use Nix Auditor.Steps:1.  Download the script https://github.com/XalfiE/Nix-Auditor  2.  Make the script executable - using chmod +x  3. Run the script - ensure you are root for comprehensive results 4. Analyze the results under the following ...

Craft Attacks from Geographic Location Data on Social Media Using Creepy
By: B15MU7H
May 18, 2017

Craft Attacks from Geographic Location Data on Social Media Using CreepyCree.py is an open source intelligence tool dedicated to determining victim geographic location (exact longitude and latitude) based on their social media posts. This article will provide a tutorial on what you can do with creepy and how you can use it to your advantage. How to Use Creepy ...

Online Privacy was Never so Exposed - Trends & Measures for 2017
By: candicebrown
May 16, 2017

The Internet is changing the way we communicate. Be it for business pursuits online, or just to chatting with friends, or enjoying some casual entertainment, the internet helps us to stay connected.However, one of the most imperative concerns of internet usage is online privacy, and how cyber crooks may choose to take advantage of it.In fact, internet privacy is a ...