0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

The Reason Behind Decreasing Time
By: prabesh8583
August 9, 2016

Well, while transferring any amount of data from one device to another, we start to looking at the time duration. After some period, that time decreases per sec. You want to know why that is?So, the reason behind it is windowing, which is part of the TCP transmission. TCP transmission require establishment of connection for transmission of data.Let's assume ...

Book Recommendations for Becoming a Computer Hacker in a Short Time
August 9, 2016

First of all, what’s hacking? In my own terms, I say: Hacking is an act manipulating things. Like making things do what you want and not what they were intended to do. That’s a simple term. And, the only way to learn how to hack is to first of all study and have good understanding of ...

Computer Hardware Components Chart
By: Sardar Shaikh
August 8, 2016

This computer hardware chart contains information about: RAM Hard drives Processor cards and socket slots Different ports CPU sockets Desktop card slots Peripheral cards, etc.   I hope it's helpful to you.

Avoid Detection Using Proxychains
By: chiheb chebbi
August 8, 2016

Hi Computer Security Enthusiasts,In this tutorial, I'm going to explain how to stay anonymous and keep your internet traffic private. Before starting, you know that every hacker needs to hide his tracks. We need to make it difficult for system administrators, investigators and others to track our moves or to spy on us. I believe we have the right ...

You Were the Victim of Ransonware. Now What?
By: Erick Wellington
August 8, 2016

You were the Victim of Ransonware. Now What? The first step is to know some basic information, such as who was the first to arrive to answer the call. What information is visible the first time? Ransonware is usually quite flashy and noisy; it wants to seen. Moreover, one layperson can just pay a ...

Amazing Resources To Learn Python
By: nishan8583
August 5, 2016

I've been learning Python for about 4-5 months now. Before learning Python, I had no experience with programming languages. One of the hardest tasks for me was to find good resources to learn.Many people recommended the official Python documentation, which was OK. Personally, I found other resources much more helpful. Python is a pretty popular language, so I won't waste ...

Basic File Hashing Using Native Tools on Linux, OSX, and Windows 10
By: junkwerks
August 5, 2016

Wikipedia defines a cryptographic hash as “a mathematical algorithm that maps data of arbitrary size to a bit string of a fixed size (a hash function) which is designed to also be one-way function, that is, a function which is infeasible to invert” (1). In fact, hashing is so cool that Wikipedia has a second page devoted to hashes ...

Randomness and Security: A Primer on Entropy and DRBGs
By: badfilemagic
August 5, 2016

Randomness and Security: A Primer on Entropy and DRBGs When it comes to systems security engineering, randomness is everything. So many exploit mitigation technologies and cryptographic primitives rely on reliable, statistical randomness that getting it wrong is detrimental to the system as a whole.  That said, ...

Linux is Fun in Terminal (Really)!
By: 5kYp01n7
August 4, 2016

Linux is fun! Huhhh? OK, so you don’t believe me. Meet me at the end of this article and you'll believe that Linux is actually a fun box. 1. Command: sl (Steam Locomotive) You might be aware of command ‘ ls ‘ - the list command - and use it frequently to view the contents of ...

Pokémon GO and Your Privacy
By: cedwardsmedia
August 4, 2016

This post originally appeared on my blog: Offensive Privacy . I have cross-posted it here for the benefit of Cybrary users. On July 5, 2016, Pokémon GO was released in the United States for iOS and Android. Since launching, it has quickly become to most successful mobile app on both platforms, beating out the likes ...