0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Linux in 15 Steps
By: H5p
January 8, 2017

STEP 1: Getting the date command: date STEP 2: Finding who you are command: whoami STEP 3: Clearing the terminal command: clear STEP 4: Adding a user command: adduser username STEP 5: switching the users command: su username STEP 6: Fun with directories command 1 (list out directories): dircommand 2 (create directories): mkdir directory ...

Layered Security
By: YounessTast
January 7, 2017

  Security is an important matter in every domain. It stands for the act of “protecting” assets that have a significant value. This “protection” cannot be shortened into one simple definition, for it includes several aspects depending on the nature of the asset we want to protect and its specifications. ...

Today's History: Microsoft's Unveiling and Duoscopic TV
By: Tatianna
January 7, 2017

Every day holds significance to someone, but today is special to us because of Microsoft. Founded in 1975, Microsoft is the worldwide leader in software, services and Internet technologies for personal and business computing. The company offers a wide range of products and services designed to empower people through great software — any time, any place and on any ...

A Primer on Risk Management for Information Security
By: foxpro
January 6, 2017

Cyber security is the most talked about topic these days. There is a security breach every second on this planet. Security firms state that 99% computer users are vulnerable to exploit kits (software vulnerabilities). You only have to read the everyday headlines to realize how data breach, spoof emails, and ransomware are impacting individuals, corporations, and governments. While organizations rely on ...

UNM4SK3D: Bitcoin, Financial Services, and Smart Meters
By: Olivia
January 6, 2017

  #digitalcurrency While playing the Stock Market may not be for you, you may want to reconsider when it comes to digital currency. The worth of Bicoin is on the rise, with it's value surpassing $1,000 for the first time since November 2013. "Who wants to be a mystery Millionaire?" except instead of ...

Defeating the Air Gap - Exploring the USBee Attack Scenario
By: deleriumendless
January 6, 2017

USBee - Q [aka Quartermaster] must have come up with this ... It really does sound like something from a James Bond scenario - A standard USB device can become a transmitter without ever having to be removed from the system. By modulating the communication stream between the system and the USB device, electromagnetic activity can be created ...

[PODCAST] Update for our fans & monthly puzzle
By: CyDefe
January 5, 2017

Hey hey everyone it's been some time since our last post on here and since then we've had a few new episodes come out. Check out the links below to listen to our latest content. We streamed our last podcast recording live at https://www.twitch.tv/cydefe and we will continue to stream all of our podcasts live. If you ...

Tips for using Google like a Ninja
By: rcubed
January 5, 2017

[caption id="attachment_82714" align="alignleft" width="200"] (Google Logo by Google Inc. (google.com) [Public domain], via Wikimedia Commons.) -[/caption]This is the second in a series of posts on the topic of how to be an educated consumer of online information. Most online information searches begin with Google, so it only makes sense to kick off the in-depth portion ...

The Reality of Hacking
By: Nightfall
January 5, 2017

When we hear the word hacking, we see it as gaining an unauthorized access to the system and having a control over it. Normally, we think that the “system” I mentioned was just all about computers.  But it is wrong, hacking is not limited just to computer stuff.  Many beginners who wanted to learn how to ...

Advancements in Modern Vehicle Theft
By: ADM01
January 5, 2017

Your computer environment is safe;  but is your vehicle still in the driveway? You may need to check. Having worked in the automotive security industry, and witnessing the rise of talks emerging at DefCon now covering vehicle data adaptation, now is the time to get forewarned about vehicle security. You know what they say, to be forewarned is to ...