0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Well, while transferring any amount of data from one device to another, we start to looking at the time duration. After some period, that time decreases per sec. You want to know why that is?So, the reason behind it is windowing, which is part of the TCP transmission. TCP transmission require establishment of connection for transmission of data.Let's assume ...


First of all, what’s hacking? In my own terms, I say: Hacking is an act manipulating things. Like making things do what you want and not what they were intended to do. That’s a simple term. And, the only way to learn how to hack is to first of all study and have good understanding of ...


This computer hardware chart contains information about: RAM Hard drives Processor cards and socket slots Different ports CPU sockets Desktop card slots Peripheral cards, etc. I hope it's helpful to you.


Hi Computer Security Enthusiasts,In this tutorial, I'm going to explain how to stay anonymous and keep your internet traffic private. Before starting, you know that every hacker needs to hide his tracks. We need to make it difficult for system administrators, investigators and others to track our moves or to spy on us. I believe we have the right ...


You were the Victim of Ransonware. Now What? The first step is to know some basic information, such as who was the first to arrive to answer the call. What information is visible the first time? Ransonware is usually quite flashy and noisy; it wants to seen. Moreover, one layperson can just pay a ...


I've been learning Python for about 4-5 months now. Before learning Python, I had no experience with programming languages. One of the hardest tasks for me was to find good resources to learn.Many people recommended the official Python documentation, which was OK. Personally, I found other resources much more helpful. Python is a pretty popular language, so I won't waste ...


Wikipedia defines a cryptographic hash as “a mathematical algorithm that maps data of arbitrary size to a bit string of a fixed size (a hash function) which is designed to also be one-way function, that is, a function which is infeasible to invert” (1). In fact, hashing is so cool that Wikipedia has a second page devoted to hashes ...


Randomness and Security: A Primer on Entropy and DRBGs When it comes to systems security engineering, randomness is everything. So many exploit mitigation technologies and cryptographic primitives rely on reliable, statistical randomness that getting it wrong is detrimental to the system as a whole. That said, ...


Linux is fun! Huhhh? OK, so you don’t believe me. Meet me at the end of this article and you'll believe that Linux is actually a fun box. 1. Command: sl (Steam Locomotive) You might be aware of command ‘ ls ‘ - the list command - and use it frequently to view the contents of ...


This post originally appeared on my blog: Offensive Privacy . I have cross-posted it here for the benefit of Cybrary users. On July 5, 2016, Pokémon GO was released in the United States for iOS and Android. Since launching, it has quickly become to most successful mobile app on both platforms, beating out the likes ...