Cybrary Pro Day is here!

0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Securing Critical Infrastructure in the Digital Age
By: Tatianna
October 9, 2018

This blog is sponsored by Cisco and was originally posted on their blog by: Anthony Grieco September 26, 2018 We know adversaries have the expertise and tools necessary to take down critical infrastructure and systems that cripple entire regions. These critical systems are essential to our global economy, ...

Making the Case for Virtualization
By: Tatianna
October 9, 2018

Virtual Value — The Business Case for Virtualization Management The market for virtualization is growing: Recent predictions suggest steady growth in the data virtualization market over the next four years to more than four billion dollars, even as companies come to grips with the widening gap between critical IT jobs and the number of skilled professionals ...

Everything to you should know about Ethical Hacking
By: sourajeet
October 6, 2018

In today’s world, we hear the word hacking very often. Sometimes we hear of celebrities, or even your neighbors' accounts were hacked. But do we know what hacking actually is? Not really, at least many people don't fully understand it. Whenever people hear the word “hacking”— Facebook, Instagram, Twitter or WhatsApp is what usually comes to mind. But it's ...

Best RAID Recovery Software Till Date
By: martinhoff6
October 5, 2018

Summary – As a System Administrator, handling RAID arrays, you might have come across data loss situations due to RAID Controller/Card failure or any other reason leading to failed RAID arrays. In this article, we present an advanced RAID recovery software to date to rescue this situation. Read on to know more about the software utility, its features, ...

Netcat Vs Ncat—The Big Confusion!
By: Dr. Michael J. Garbade
October 4, 2018

Netcat and Ncat are tiny but robust tools that are used for reading from and writing to network connections using the TCP or the UDP protocol. The two tools are feature-rich and can function both as clients and servers. Transformers , who has extensive experience in penetration testing ...

In Pursuit of Invisibility: Fileless Malware
By: Tatianna
October 2, 2018

This blog is sponsored by Cisco and was originally posted on their blog by: Marc Blackmer September 13, 2018 I recently heard a news story about a survey in which people were asked whether they would prefer to the ability to fly or to be invisible. Sure, it was a silly question*, ...

Cloud Computing and Virtualization
By: Tatianna
October 1, 2018

Building Blocks: The Virtual Foundation of Effective Cloud Deployments Cloud computing is everywhere. From business networks to social services to the burgeoning IoT market, this former tech outlier is the now the go-to option for companies looking to compete on a global scale, secure networks and boost IT agility.The rapid rise of the cloud also has a secondary ...

HTML, CSS, and JavaScript
By: allisee7154
September 28, 2018

Before I start, please let me say that I am not a Master of any of the above languages. I am still a neophyte in my quest to become prolific, as well as articulate in conveying the power of these 3 computer languages.At a very young age, I have always been excited about computers. The way they work, how ...

How to Set Password for PDF File in Adobe Reader
By: alvina11
September 27, 2018

With the advancement of the technology, the PDF file format is the most reliable file format. It is the portable document format (PDF) which includes text formatting and images. It is independent of application software, hardware, and operating systems.Sometimes it is required to limit access to a PDF for the security purpose. So, it can be done by setting ...

Gaining Root Access on Mac OS
By: Tatianna
September 27, 2018

Apple computers are coveted as one of the world’s most valuable brands for a reason. Their computers are stylish, easy to use, and are owned and displayed as status objects across the world. However, one feature Apple computers are ...