0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Remove Duplicate Emails from PST Files Using Outlook Duplicate Remover
By: justin hansen
June 4, 2018

Inevitably, Microsoft Outlook has now become one of the most prominent emailing applications. It not only helps in the exchange of cross-communication, but it is also useful in the proper management of the database. Outlook generates two files for this purpose: PST and OST. It is useful for both a small and a big enterprise. With this great ...

How to Transfer Emails From Outlook Express to Outlook on Another Computer
By: justin hansen
June 4, 2018

Microsoft developed Outlook Express, a free desktop-based email client that comes free with Windows Vista, Windows XP, and older versions. But Microsoft has stopped the development and technical support for Outlook Express since 2015. Outlook Express is no longer the streamlined product of the big tech giant. But there are still many users of Outlook Express who need it ...

What is Social Engineering?
By: Jessica
June 3, 2018

Social engineering (SE) sounds like some kind of futuristic, scientific experiment, but the core of it is very simple to understand. Social engineering is the art and skill of psychologically manipulating people to take a certain course of action or share some type of information. Social engineering can take place online or offline, but online SE has ...

Public Wi-Fi: Should We Use It?
By: Jessica
June 3, 2018

The Internet is everywhere now. Gone are the days of having to go to a library to do online research. Also gone are the days of having to wait until you got home to get on the Web, which involved unplugging a telephone line to set up your dial-up Internet connection! We don’t have to wait anymore to get ...

How to Batch Convert PST to MSG with Attachments
By: lukaswright
June 3, 2018

In this post, users will get the complete guide to convert PST files to MSG format with attachments. This article will help you export Outlook emails to MSG format in bulk in just a couple of clicks. It is a short and direct method to save PST emails in MSG format. So, keep reading to learn ...

The Origin of the Blockchain
By: 奥力
June 3, 2018

The fact that the blockchain has emerged as the essential supporting mechanism for a new digital currency will play an important role in our understanding of this technology. The first mention of Bitcoin, a new form of peer-to-peer electronic cash, showed up in a paper written by someone called Satoshi Nakamoto in 2008. As it turns out, this is not a real ...

Best PDF File Organizer to Manage PDFs on Windows 10/8.1/8/7
By: sherry098
June 2, 2018

The PDF file format is acclaimed worldwide for being a secured format for document sharing. People including forensic investigators rely on PDFs for storing and sharing data. However, with PDF files, you can do a lot more than just securely share information. To get the best out of PDF files, users need to have the best PDF organizer kit ...

How to Split PST File to Manage Outlook Mailbox
By: semnaitik
June 2, 2018

An oversized PST file creates troubles for Microsoft Outlook users. Not only does it affect Outlook's performance, but it also leads to corruption. To handle an oversized PST file, you can break it into two or more parts. In this article, I'll show you how to split PST files to manage an Outlook mailbox. ...

Let's Learn SQL Injection!
By: Ashish jha
June 1, 2018

I am Ashish Jha, a security researcher from India . Today, I am going to teach you SQL injection , including what it is and how it works.Let's start!Every hacker who is new to or learning web application penetration testing (WAPT) is advised to review the OWASP TOP 10 because it has a ...

Enable Editing in Secured PDF Using PDF Unlocker Tool
By: sherry098
June 1, 2018

What are you thinking about right now? How to remove PDF edit protection? No need to worry. Here, we will share the best solution to enable editing in a secured PDF document.To preserve data privacy and content integrity of a PDF document, people generally set a password for a PDF file to make it safe. With that, those people ...