0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Virtualization with Oracle's VirtualboxAt some point almost everyone decides they want to try something new. Maybe you've decided you want to try a Linux distribution, or a new version of your present operating system, but you don't want to chance loosing your present operating system if you don't like the new one or something goes wrong. You can create ...


Disclaimer: I do not take responsibility for the use of the following procedures. They may be used with good intentions. If they're used to damage or abuse, the responsibility lies solely on the user. This post is for educational purposes only.Manipulation can be used in various ways. It can be used in the cyber world and physically; I'll ...


Cybersecurity certifications are very often required for employment in cybersecurity jobs. Certifications benefit employers by identifying prospective employees with specific skill sets, and certifications help prospective employees stand out when applying for a job in the desirable and competitive cybersecurity job market.Industry certifications are vendor-neutral (vendor certifications are for a vendor’s specific products) and provide industry-recognized evidence ...


Struggling to get that promotion or land that cybersecurity job? Have all the right skills/certifications/years of experience but things just don’t seem to work out? You’ve read about the demand for cyber professionals, seems like a no brainer that the company should be need you. The articles say there are over 200,000 unfilled jobs in the US and several times that, worldwide. ...


The concept here is similar to the one I submitted here, Recommended: Strong Passwords Technique. https://www.cybrary.it/0p3n/recommended-strong-passwords-technique/ The only difference is that this one is for Android. In Android, we must install the app capable of calculating the hash value of text or file.This app is the Hash Droid by Hobby One https://play.google.com/store/apps/details?id=com.hobbyone.HashDroid&hl=en ...


Installation Minimum requirements: A minimum of 10 GB disk space for the Kali Linux instal l For i386 and amd64 architectures, a minimum of 512MB RAM CD-DVD Drive / USB boot support This is for anyone who has installed Kali 2.0 and ...


Updated August 2018 Job security in the field of Cyber Security: Cyber security, as much as it seems to be just a buzzword as of late, is very much part of our present and future lives. Today's cyber industry is more than just "generic IT," it revolves around not just hardware or software , but data, ...


Cyber security jobs offer lucrative financial rewards for protecting the nation’s computer networks and data from attack or unauthorized use. These top five highest paying positions command six-figure salaries:1. Chief Information Security Officer (CISO) Complex challenges to a CISO include the development and delivery of an Information Technology (IT) risk management strategy that is aligned with business security. The ...


In honor of November 5th, we will be issuing double Cybytes on all Cybyte based activity (not on purchases, these ones you have to earn). Cybytes activities can be found here: https://www.cybrary.it/cybytes/ So, any time on 11/5/2015, login and accumulate Cybytes, just like you would on any other day, we will reward you with double Cybytes, its ...


Hello -This post will cover integrating a Honey Pot into your DMZ or internal Network. This information is for security enthusiasts, professionals and administrators. First, lets define what a Honey Pot is: A Honey Pot is a computer, usually of the Linux variety, that emulates various services and ports (this is not a WikiPedia definition). Truth be told, Honey ...