0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

What You Need to Know about Cybersecurity
By: diceus
March 8, 2019

Cybersecurity is a valuable issue nowadays not only for the IT department but for the whole company as well. Because of the significant business risk and security threats customers start worrying about it as well. Media informs that global security incidents have become so widespread as the weather forecast. Cybersecurity  is essential because a military, government, ...

Understanding Data Integrity
By: Ryan Stewart
March 8, 2019

What is data integrity and why is it so important? Data integrity is about protecting your data against manipulation, harmful maintenance practices, or unwanted modifications. It is crucial for applications and services that require accurate, protected data. Integrity, the "I" ...

Reasons to go for Microsoft Azure Career
By: Vikrant Saran
March 8, 2019

To maintain your place in the IT industry, you need to advance and adhere to its technological developments and trends. Realizing the need of the hour, and to inculcate the best way of operations in their organizations, the companies are migrating their computing base to the cloud. Being a professional with a developed outlook, you must know ...

Once again about IP-addresses, subnet masks and in general.
By: Dra4hos7
March 7, 2019

A little literacy.  Inspired by previous copy-paste of various rubbish on this topic.  Forgive the nosing staff.  The IP address (v4) consists of 32-bit.  Any self-respecting administrator, and indeed an IT specialist (I’m silent about network engineers), being awakened in the middle of the night or in a state ...

Write a program to substitute hosts (with ++)
By: Dra4hos7
March 7, 2019

We write the program for substitution of hosts (with ++)For a start, a little bit of information from google what is itQuote:hosts - a text file containing a database of domain names and used when translating them into the network addresses of nodes. This file takes precedence over DNS servers. Unlike DNS, the contents of the file are controlled ...

A Short Discussion on “Cloud Computing”
By: Zubair Ansari
March 6, 2019

History of cloud computing       I.             Start up for the cloud. Cloud can be considered as a model where related user can get on demand access to the shared ...

How Your Identity is Being Threatened by the Digitalized World
By: evanmorris
March 6, 2019

Today, cyber threats are looming larger than physical threats such as terrorism. According to research that was conducted by the Unisys Security Index™ in 2017 this is true for both developed and developing nations. This is because we're now embracing more digital devices and services in both our work and personal lives. As such, most of us ...

Cybrary's breadth of content, a boon to Dev(Sec)Ops practices
By: [GDT] Brad Davenport
March 6, 2019

Our Engineers and Devs have learned a great deal during the short time they've been afforded access to the multitude of resources housed within the virtual walls of Cybrary Business . Many solution integrators would probably agree, embarking on a voyage into the next generation of IT is an endeavor fraught with paradoxes. If I make the system ...

Configuring a LAN with DHCP and VLANs – PART II
By: farazde
March 6, 2019

Ever heard about router on a stick? It literally does not mean that a router should be placed on a stick. It means that a router and switch are connected via a single physical interface configured as 802.1q trunk. The switch has multiple VLANs configured and the router is taking care of the routing between the different ...

How to Repair and Rebuild SQL Database Manually
By: sandycullen
March 6, 2019

Applications working on SQL database platform are easy to use but they have risk of data loss because of SQL MDF File. Despite Database Administrator maintains the SQL database it is prone to corruption as it is highly affected by external factors. Operating system errors, abrupt system shutdown and changes made by user affect the SQL database, so ...