0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Computer Hardware Components Chart
By: Sardar Shaikh
August 8, 2016

This computer hardware chart contains information about: RAM Hard drives Processor cards and socket slots Different ports CPU sockets Desktop card slots Peripheral cards, etc.   I hope it's helpful to you.

Avoid Detection Using Proxychains
By: chiheb chebbi
August 8, 2016

Hi Computer Security Enthusiasts,In this tutorial, I'm going to explain how to stay anonymous and keep your internet traffic private. Before starting, you know that every hacker needs to hide his tracks. We need to make it difficult for system administrators, investigators and others to track our moves or to spy on us. I believe we have the right ...

You Were the Victim of Ransonware. Now What?
By: Erick Wellington
August 8, 2016

You were the Victim of Ransonware. Now What? The first step is to know some basic information, such as who was the first to arrive to answer the call. What information is visible the first time? Ransonware is usually quite flashy and noisy; it wants to seen. Moreover, one layperson can just pay a ...

Amazing Resources To Learn Python
By: nishan8583
August 5, 2016

I've been learning Python for about 4-5 months now. Before learning Python, I had no experience with programming languages. One of the hardest tasks for me was to find good resources to learn.Many people recommended the official Python documentation, which was OK. Personally, I found other resources much more helpful. Python is a pretty popular language, so I won't waste ...

Basic File Hashing Using Native Tools on Linux, OSX, and Windows 10
By: junkwerks
August 5, 2016

Wikipedia defines a cryptographic hash as “a mathematical algorithm that maps data of arbitrary size to a bit string of a fixed size (a hash function) which is designed to also be one-way function, that is, a function which is infeasible to invert” (1). In fact, hashing is so cool that Wikipedia has a second page devoted to hashes ...

Randomness and Security: A Primer on Entropy and DRBGs
By: badfilemagic
August 5, 2016

Randomness and Security: A Primer on Entropy and DRBGs When it comes to systems security engineering, randomness is everything. So many exploit mitigation technologies and cryptographic primitives rely on reliable, statistical randomness that getting it wrong is detrimental to the system as a whole.  That said, ...

Linux is Fun in Terminal (Really)!
By: 5kYp01n7
August 4, 2016

Linux is fun! Huhhh? OK, so you don’t believe me. Meet me at the end of this article and you'll believe that Linux is actually a fun box. 1. Command: sl (Steam Locomotive) You might be aware of command ‘ ls ‘ - the list command - and use it frequently to view the contents of ...

Pokémon GO and Your Privacy
By: cedwardsmedia
August 4, 2016

This post originally appeared on my blog: Offensive Privacy . I have cross-posted it here for the benefit of Cybrary users. On July 5, 2016, Pokémon GO was released in the United States for iOS and Android. Since launching, it has quickly become to most successful mobile app on both platforms, beating out the likes ...

A-Z Kali Linux: Useful Commands Everyone Should Know
By: 5kYp01n7
August 4, 2016

a apropos  Search Help manual pages (man -k) apt-get  Search for and install software packages (Debian) aptitude  Search for and install software packages (Debian) aspell  Spell Checker awk  Find and Replace text, database sort/validate/index ...

CyDefe Cyber Security Podcast Episode 23
By: CyDefe
August 3, 2016

On this weeks episode we are joined by Ben0xA who works for https://www.trustedsec.com you can follow him on twitter @Ben0xA . This week we discuss Macs and iPhones have a Stagefright-style bug, Android banking malware blocks victims’ outgoing calls to customer service, Hidden 'backdoor' in Dell security software gives hackers full access, and Companies failing to plan for many cyber dangers. ...