0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Virtualization with Oracle's Virtualbox
By: Gov't Mule
November 16, 2015

Virtualization with Oracle's VirtualboxAt some point almost everyone decides they want to try something new. Maybe you've decided you want to try a Linux distribution, or a new version of your present operating system, but you don't want to chance loosing your present operating system if you don't like the new one or something goes wrong. You can create ...

Active Manipulation/Reflecting Manipulation
By: Engel User0
November 16, 2015

Disclaimer: I do not take responsibility for the use of the following procedures. They may be used with good intentions. If they're used to damage or abuse, the responsibility lies solely on the user. This post is for educational purposes only.Manipulation can be used in various ways. It can be used in the cyber world and physically; I'll ...

Cybersecurity Industry Certifications: What You Need to Know
By: TREVORH
November 10, 2015

Cybersecurity certifications are very often required for employment in cybersecurity jobs. Certifications benefit employers by identifying prospective employees with specific skill sets, and certifications help prospective employees stand out when applying for a job in the desirable and competitive cybersecurity job market.Industry certifications are vendor-neutral (vendor certifications are for a vendor’s specific products) and provide industry-recognized evidence ...

Think a Cybersecurity Job is All Technical? Think again.
By: TREVORH
November 9, 2015

Struggling to get that promotion or land that cybersecurity job? Have all the right skills/certifications/years of experience but things just don’t seem to work out? You’ve read about the demand for cyber professionals, seems like a no brainer that the company should be need you. The articles say there are over 200,000 unfilled jobs in the US and several times that, worldwide. ...

Strong Passwords Technique for Android
By: rubins
November 9, 2015

The concept here is similar to the one I submitted here, Recommended: Strong Passwords Technique. https://www.cybrary.it/0p3n/recommended-strong-passwords-technique/ The only difference is that this one is for Android. In Android, we must install the app capable of calculating the hash value of text or file.This app is the Hash Droid by Hobby One https://play.google.com/store/apps/details?id=com.hobbyone.HashDroid&hl=en ...

Kali Linux 2.0: Alternate Install and Dual-Boot 'How To'
By: Doktor Frankenstein
November 6, 2015

Installation Minimum requirements: A minimum of 10 GB disk space for the Kali Linux instal l For i386 and amd64 architectures, a minimum of 512MB RAM CD-DVD Drive / USB boot support This is for anyone who has installed Kali 2.0 and ...

5 Reasons Cyber Professionals Don't Worry About Job Security
By: TREVORH
November 5, 2015

Updated August 2018 Job security in the field of Cyber Security: Cyber security, as much as it seems to be just a buzzword as of late, is very much part of our present and future lives. Today's cyber industry is more than just "generic IT," it revolves around not just hardware or software , but data, ...

Top 5 Highest Paying Cyber Security Jobs
By: TREVORH
November 4, 2015

Cyber security jobs offer lucrative financial rewards for protecting the nation’s computer networks and data from attack or unauthorized use. These top five highest paying positions command six-figure salaries:1. Chief Information Security Officer (CISO) Complex challenges to a CISO include the development and delivery of an Information Technology (IT) risk management strategy that is aligned with business security. The ...

Remember Remember the Fifth of November - #RememberRemember
By: ryan c
November 4, 2015

In honor of November 5th, we will be issuing double Cybytes on all Cybyte based activity (not on purchases, these ones you have to earn). Cybytes activities can be found here:  https://www.cybrary.it/cybytes/ So, any time on 11/5/2015, login and accumulate Cybytes, just like you would on any other day, we will reward you with double Cybytes, its ...

Integrating a Honey Pot into Your Network
By: scilley
November 4, 2015

Hello -This post will cover integrating a Honey Pot into your DMZ or internal Network. This information is for security enthusiasts, professionals and administrators.  First, lets define what a Honey Pot is: A Honey Pot is a computer, usually of the Linux variety, that emulates various services and ports (this is not a WikiPedia definition). Truth be told, Honey ...