0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Website Security with SSL
By: walt.hutsky
January 24, 2019

If you look at the address bar in your browser you’ll see that my website is now showing Secure, with a green lock symbol, and that the address starts with https . This means that SSL website encryption is enabled and working. What is SSL? Secure Sockets Layer is a standard security protocol that is used to encrypt ...

i2p Networks, Tor and Freenet Features: Pros + Cons
By: Dra4hos7
January 23, 2019

I2p topology i2p is the so-called overlay network. Translated from English “overlay” – overlay or layering. In this case, there is a view of the layering over the already existing Internet, so i2p is sometimes also called the “network over the network”. All traffic on this network is completely isolated and encrypted, thereby ensuring the anonymity of data ...

Data Privacy Day 2019: How to Stay #PrivacyAware
By: Tatianna
January 23, 2019

You know all about privacy settings; from personal settings on your social media accounts to how to keep your passwords (you know, the ones you've written down and stuck to the bottom of your keyboard) hidden. But do you know the importance of data privacy, or what it entails? Data Privacy As part of the National Cyber ...

Securing Critical Data with Traditional Media
By: Guest Writer
January 23, 2019

Advancements in information technology have greatly accelerated the pace of communications and by extension, the way people interact with each other. Outside of the digital divide, virtually anyone can be reached through some system of digital communication . ...

DNS Rebinding – Behind The Enemy Lines
By: Dra4hos7
January 19, 2019

Introduction DNS Rebinding is a technique or situation in which attacker relies on the gap between SOP and DNS to achieve access to otherwise restricted areas or services ( local network, another website, etc.). Here we’re going to try and explain DNS Rebinding with a short example. DNS Rebinding With DNS rebinding a remote attacker can ...

A New Age of Digital Interconnection
By: dks11
January 18, 2019

Today, everything, and everyone is digital. From the young teens all having the newest smartphone, to just about everything (including refrigerators and baby monitors…) being connected in the IOT (internet of things), technology is ruling our lives and connecting it and every little way. The IOT The IOT alone is a vast network connecting various devices to the internet ...

7 Project Management Basic Rules
By: Vikrant Saran
January 17, 2019

Project management is the process of planning, managing and executing the required work in a specified time to achieve the organizational goals. There are certain guidelines that one would need for the successful completion and execution of a project. Working as per the deadlines, managing the resources and organizing the tasks at every stage of the process are some ...

Security with Host-based Intrusion Detection System (HIDS)
By: Falko
January 16, 2019

I've been thinking for some time what topic could be interesting for you (the general Cybrary population) out there. After a few days I decided to introduce you one of my favorite tools. I'll tell you a few words about Host-based Intrusion Detection System named OSSEC. What is HIDS? Maybe you are already familiar with NIDS (Network-based intrusion detection system) ...

New to Cybrary: Katie Wandtke
By: Tatianna
January 16, 2019

New to Cybrary: Katie Wandtke One of the newest members to the Cybrary team is Katie . The Cybrary Team wants to introduce you to the newest woman on-board and why she is a vital part of Cybrary's future. "Erin, HR is a Joke" - Toby Flenderson Just kidding. We feel like more Michael Scott ...

Building Botnets with VPS and Virtualization
By: Tatianna
January 15, 2019

A botnet is a network of devices running automated tasks as “bots”. Bots can carry out any type of complex task at high speeds indefinitely. Often times a botnet is used to carry out many tasks at once ...