0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.



Interviews can be complex – from the scheduling the meeting or call to the actual meeting to the follow-up. Candidates, recruiters, and hiring managers all play key roles in this somewhat difficult-to-navigate process. As a candidate, your role entails several elements, not the least of which is preparation.The Scouts (formerly known as the Boy Scouts), which was founded in ...

What is Data Protection Day? In 2007 the Council of Europe held the first “Data Protection Day”, known as “Data Privacy Day” outside of Europe, to increase awareness about rights to personal data protection and rights. In 2009 The USA joined this drive by declaring the ...
![7 Online Privacy Tips to Re-Take Control of Your Data [in 2019]](https://images.ctfassets.net/kvf8rpi09wgk/3tpSXLMbs6D0bXlTw8UucK/2d648c6dd1981c3fca93f5c03ea36bc7/blog-default.jpg?w=800&fm=webp)

Do you read about recent data scandals and cringe at the thought of how your personal data is being treated? Or do you feel that you should have at least some control over your data?You’re not alone.Many people are beginning to realize that social media and the internet have helped our society advance at unprecedented rates.But:They ...


Hello, Cybrary community!It has been a lot of time after my latest article about Tequila, a forensic distribution whose profile is presented as the first OS distribution focused on forensics in the Latam territory.Part of the project is also an additional suite of tools targeted to perform Incident Response over Windows environments called Agave. I promised in my ...


I'm sharing my cybersecurity journey till now with you guys. To tell you a bit about myself, I'm a B.Tech undergraduate in Computer Science and of course a Cyber Security enthusiast. 'Hacking' is the single most important thing that attracts me, besides football. I was the best programmer back in my school. I knew then that all I wanted was ...


If you look at the address bar in your browser you’ll see that my website is now showing Secure, with a green lock symbol, and that the address starts with https . This means that SSL website encryption is enabled and working. What is SSL? Secure Sockets Layer is a standard security protocol that is used to encrypt ...


I2p topology i2p is the so-called overlay network. Translated from English “overlay” – overlay or layering. In this case, there is a view of the layering over the already existing Internet, so i2p is sometimes also called the “network over the network”. All traffic on this network is completely isolated and encrypted, thereby ensuring the anonymity of data ...


You know all about privacy settings; from personal settings on your social media accounts to how to keep your passwords (you know, the ones you've written down and stuck to the bottom of your keyboard) hidden. But do you know the importance of data privacy, or what it entails? Data Privacy As part of the National Cyber ...


Advancements in information technology have greatly accelerated the pace of communications and by extension, the way people interact with each other. Outside of the digital divide, virtually anyone can be reached through some system of digital communication . ...


Introduction DNS Rebinding is a technique or situation in which attacker relies on the gap between SOP and DNS to achieve access to otherwise restricted areas or services ( local network, another website, etc.). Here we’re going to try and explain DNS Rebinding with a short example. DNS Rebinding With DNS rebinding a remote attacker can ...