0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

What if the Sysprep Tool Fails?
By: speed10
August 10, 2016

Ever done something at work, then it backfires at you like it has a personal grudge with you?Sysprep can, at times, really mess up your jolly day should it 'decide' to backfire. I've seen a good number of IT Assistants run to format the PC simply because of the "Windows could not finish configuring the system. To attempt to ...

Understand the Cybersecurity Framework
By: Eric
August 10, 2016

Understand the Cybersecurity Framework Framework Overview The Cybersecurity Framework (CSF) is a risk-based approach to addressing information security risk.  The framework is composed of the following components: Framework Core The Framework Core involves actions that meet the requirements and guidelines to address cybersecurity concerns.  The core consists of the following elements: Functions Functions represent basic ...

Is Computer Hacking a Criminal Activity?
August 9, 2016

First of all, I would say “No,” because computer hacking is an act of manipulating a computer to do what you want it to do and it’s a very valuable skill in the Tech world. Actually, that’s not a criminal activity. You can sit in your home and hack your own computer legally.The only situation when it becomes a ...

The Reason Behind Decreasing Time
By: prabesh8583
August 9, 2016

Well, while transferring any amount of data from one device to another, we start to looking at the time duration. After some period, that time decreases per sec. You want to know why that is?So, the reason behind it is windowing, which is part of the TCP transmission. TCP transmission require establishment of connection for transmission of data.Let's assume ...

Book Recommendations for Becoming a Computer Hacker in a Short Time
August 9, 2016

First of all, what’s hacking? In my own terms, I say: Hacking is an act manipulating things. Like making things do what you want and not what they were intended to do. That’s a simple term. And, the only way to learn how to hack is to first of all study and have good understanding of ...

Computer Hardware Components Chart
By: Sardar Shaikh
August 8, 2016

This computer hardware chart contains information about: RAM Hard drives Processor cards and socket slots Different ports CPU sockets Desktop card slots Peripheral cards, etc.   I hope it's helpful to you.

Avoid Detection Using Proxychains
By: chiheb chebbi
August 8, 2016

Hi Computer Security Enthusiasts,In this tutorial, I'm going to explain how to stay anonymous and keep your internet traffic private. Before starting, you know that every hacker needs to hide his tracks. We need to make it difficult for system administrators, investigators and others to track our moves or to spy on us. I believe we have the right ...

You Were the Victim of Ransonware. Now What?
By: Erick Wellington
August 8, 2016

You were the Victim of Ransonware. Now What? The first step is to know some basic information, such as who was the first to arrive to answer the call. What information is visible the first time? Ransonware is usually quite flashy and noisy; it wants to seen. Moreover, one layperson can just pay a ...

Amazing Resources To Learn Python
By: nishan8583
August 5, 2016

I've been learning Python for about 4-5 months now. Before learning Python, I had no experience with programming languages. One of the hardest tasks for me was to find good resources to learn.Many people recommended the official Python documentation, which was OK. Personally, I found other resources much more helpful. Python is a pretty popular language, so I won't waste ...

Basic File Hashing Using Native Tools on Linux, OSX, and Windows 10
By: junkwerks
August 5, 2016

Wikipedia defines a cryptographic hash as “a mathematical algorithm that maps data of arbitrary size to a bit string of a fixed size (a hash function) which is designed to also be one-way function, that is, a function which is infeasible to invert” (1). In fact, hashing is so cool that Wikipedia has a second page devoted to hashes ...