0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Be a Learn-a-holic: Using Webinars as Supplemental Learning Tools
By: Olivia
December 27, 2016

I’d like to propose an idea. I want the title of ‘Cybrarian’ to become synonymous with the term ‘learn-a-holic.’ What’s a learnaholic? As the name implies, it’s someone addicted to learning.But not just learning in a general sense, rather someone who is so utterly excited by the idea of gaining new wisdom and imparting it on others or using that ...

Biometrics: Not the Promised Silver Bullet
By: rcubed
December 27, 2016

Remembering passwords has become a necessary annoyance in the Digital Age. We resort to using birth dates, pets’ and children’s names, and easily-remembered numeric sequences like ‘1234’ or ‘666’ (if you have a Satanic bent). The more creative among us will combine the aforementioned strategies into passwords that would take even the most determined hacker eons to ...

Career Path for a Forensic Investigator
By: Divya Lakshmanan
December 27, 2016

Do you enjoy exploring how things work? Do you have a knack for interpreting the basic skeletal structure of any system with ease? Then digital forensics might be for you. So how do you develop the skills needed? You need to give yourself a great deal of theoretical and practical training before you are ready to step ...

Docker Containers Security
By: chiheb chebbi
December 27, 2016

  Docker container  is an open source project (Apache License 2.0). Containers allow developers to package up their applications without worrying about libraries and dependencies, a headache, allowing them to ship their applications among any system running Linux operating system.You can look at them like Virtual machines but without the need for creating a whole virtual operating system. ...

Suricata IPS: A Deep Inspecting of Your Traffic
By: Abhishek Puranam
December 27, 2016

Hi Cybrarians,I recently integrated Suricata tool into our application to block malicious traffic. Here are my 2 cents in this article on why Suricata is a great engine to be installed to mark your traffic prior communicating to the world. About Suricata   Suricata is a signature based system, built to perform Intrusion Detection, Prevention, and Network Monitoring along with ...

CompTIA's New Cybersecurity Analyst (CSA+) Certification
By: erussell
December 26, 2016

In August I had the opportunity to take the CompTIA Cybersecurity Analyst+ (CompTIA CSA+) beta certification exam. CompTIA intends this to be a new vendor-neutral certification path between CompTIA's Security+ and the CompTIA Advanced Security Practitioner (CASP ). Similar to other CompTIA exams, this exam consists of both multiple choice and performance-based questions. My exam had ...

XSS Explained - From Theory to Practice
By: Dr3AMCoDeR
December 25, 2016

Hi there Cybrarians!As always, I should thank you to all of you for your support. I'm really happy that my articles are helpful to most of you, and now I'm back with another article. Let's also greet the moderators which are doing a great job with our contents in Cybrary.I was recently asked to explain how XSS attacks work ...

Password Generating Principles: Method 2
By: Cernyr
December 24, 2016

Hello Cybrarians,In the first article , I showed you a passphrase generating method. In this second article, I would like to introduce you another one, the password matrix. This type is an upgraded version of the ancient SATOR square. The original was used for mythological/mystical purposes and can be viewed in the Pompeii ruins.The advanced version is basically a ...

Server Documentation Tool
By: infosectdk
December 23, 2016

Hello, Cybrarians!“Where is your documentation?”This question can be asked by an auditor, a C-Level manager, your boss or a colleague.If you document everything and are methodical in how you work – well done to you.  But for everyone else, well let’s just say procrastination can set in, or we are distracted, we all know the excuses we could ...

You Say Cyber Security, I Say Cybersecurity
By: rcubed
December 22, 2016

Being it’s the Thursday before Christmas I thought a somewhat less technical post was in order to get us in the Holiday spirit. It would also be a good opportunity to clear up an issue that’s been nagging me for a long time: what is the proper spelling of cybersecurity? I’ve seen it spelled as a single ...