0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


We usually spend a lot of time on the social networks , and we use them often in everyday situations so we could share a pictures with our family, attend to some great events, share our locations, and we use them even to chat with our friends and tell them some secrets, and we blindly trust them. I must agree that it's true that ...


What we are about to present are facts regarding why the Google Play Support team decided to remove our app from their app marketplace, and how this position by Google Play reflects a negative stance against the free flow of cyber security education, and an enactment of censorship of what should be available knowledge to the cyber security community. If ...


Cybersecurity – Choosing a Career As computer systems store more and more confidential personal, financial, medical, and top secret data, protecting that data is becoming more and more important to governments and businesses, worldwide. Enterprises must respond to the increasing number of complex threats and attacks by hiring cybersecurity professionals with deep technical experience in a variety of new ...


If you've not read the previous tutorial, “Creating a Forensic Disk Image Using the Guymager Utility” , please consider reviewing it as this tutorial presupposes you have an image file created using Guymager or a tool with similar capabilities.In the previous tutorial, we used the Guymager Linux utility to create a forensic image of a target disk in ...


Background: Guymager is an Open Source disk imaging tool for Linux created by Dutch developer Guy Voncken, licensed under the GPLv2 license. Guymager is not a Windows program. It runs only on Linux.It's one of the tools included on popular Linux distributions, which are focused on Data Security, Penetration Testing and Forensics such as Kali, Deft, Caine, Forens*nix and ...


Almost 80% of home users use Microsoft Windows daily, as it's their OS of choice and pretty easy to use. Most Hackers, like myself, are against using Windows as it's a very insecure environment for a normal user to work in. Plus, most of the people don't understand the kind of threats they're facing and think ...


Welcome!So, you want to be an... Ethical Hacker , Linux guru, programming master, network admin, expert of all things IT?Here's a collection of tutorials and learning resources that will get you started on whatever path you're hoping to take!I've personally accessed each site to ensure it's online and operational at the time of this writing.Some of the links are ...


Ethical Hacking: How To Use Batch Programming Everyone always want to perform ethical hacking easily. This includes using already built tools and exploits for your pentesting.Have you wondered about the easiest way to create a simple virus for Windows? I did and found that simpler things can get a big job done. Today, I am ...


"Because people wanted to write another article about this, I've decided to do so. The Modules have changed as well as the language itself. Therefore, I believe it will be useful for beginners and people who are interested in this language to read this." First thing first. Grab a copy of Juliar Programming language at www.github.com/juliarLang/juliar Click ...


Hello Fellow Cybrarians,As you know, our promise to you at Cybrary is that we will continue to provide new, cutting edge cyber security classes for free, forever. We will never ask you to pay for our classes. We are working hard to continue to build more classes, and we are working on making the learning experience within our classes, ...