0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Ethical Hacking: How To Use Batch Programming
By: usman47
November 18, 2015

Ethical Hacking: How To Use Batch Programming Everyone always want to perform ethical hacking easily. This includes using already built tools and exploits for your pentesting.Have you wondered about the easiest way to create a simple virus for Windows? I did and found that simpler things can get a big job done. Today, I am ...

Programming with Juliar (Part 2)
By: Rattar
November 18, 2015

"Because people wanted to write another article about this, I've decided to do so. The Modules have changed as well as the language itself. Therefore, I believe it will be useful for beginners and people who are interested in this language to read this." First thing first. Grab a copy of Juliar Programming language at  www.github.com/juliarLang/juliar Click ...

Please Help! The November Invite Campaign
By: ryan c
November 17, 2015

Hello Fellow Cybrarians,As you know, our promise to you at Cybrary is that we will continue to provide new, cutting edge cyber security classes for free, forever. We will never ask you to pay for our classes. We are working hard to continue to build more classes, and we are working on making the learning experience within our classes, ...

Virtualization with Oracle's Virtualbox
By: Gov't Mule
November 16, 2015

Virtualization with Oracle's VirtualboxAt some point almost everyone decides they want to try something new. Maybe you've decided you want to try a Linux distribution, or a new version of your present operating system, but you don't want to chance loosing your present operating system if you don't like the new one or something goes wrong. You can create ...

Active Manipulation/Reflecting Manipulation
By: Engel User0
November 16, 2015

Disclaimer: I do not take responsibility for the use of the following procedures. They may be used with good intentions. If they're used to damage or abuse, the responsibility lies solely on the user. This post is for educational purposes only.Manipulation can be used in various ways. It can be used in the cyber world and physically; I'll ...

Cybersecurity Industry Certifications: What You Need to Know
By: TREVORH
November 10, 2015

Cybersecurity certifications are very often required for employment in cybersecurity jobs. Certifications benefit employers by identifying prospective employees with specific skill sets, and certifications help prospective employees stand out when applying for a job in the desirable and competitive cybersecurity job market.Industry certifications are vendor-neutral (vendor certifications are for a vendor’s specific products) and provide industry-recognized evidence ...

Think a Cybersecurity Job is All Technical? Think again.
By: TREVORH
November 9, 2015

Struggling to get that promotion or land that cybersecurity job? Have all the right skills/certifications/years of experience but things just don’t seem to work out? You’ve read about the demand for cyber professionals, seems like a no brainer that the company should be need you. The articles say there are over 200,000 unfilled jobs in the US and several times that, worldwide. ...

Strong Passwords Technique for Android
By: rubins
November 9, 2015

The concept here is similar to the one I submitted here, Recommended: Strong Passwords Technique. https://www.cybrary.it/0p3n/recommended-strong-passwords-technique/ The only difference is that this one is for Android. In Android, we must install the app capable of calculating the hash value of text or file.This app is the Hash Droid by Hobby One https://play.google.com/store/apps/details?id=com.hobbyone.HashDroid&hl=en ...

Kali Linux 2.0: Alternate Install and Dual-Boot 'How To'
By: Doktor Frankenstein
November 6, 2015

Installation Minimum requirements: A minimum of 10 GB disk space for the Kali Linux instal l For i386 and amd64 architectures, a minimum of 512MB RAM CD-DVD Drive / USB boot support This is for anyone who has installed Kali 2.0 and ...

5 Reasons Cyber Professionals Don't Worry About Job Security
By: TREVORH
November 5, 2015

Updated August 2018 Job security in the field of Cyber Security: Cyber security, as much as it seems to be just a buzzword as of late, is very much part of our present and future lives. Today's cyber industry is more than just "generic IT," it revolves around not just hardware or software , but data, ...