Enjoy 0P3N?
Share now!
Facebook
Twitter
Google+
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

December 6, 2018
By: Iselin
3879

Networking Part 4: Convergence, STP, Switching Loops, NAT & PAT
Convergence «When settings are synchronized in a network» When all routers in the same internetwork have same topology and information, having caught up with each others.  Routing tables and the most useful paths are being exchanged along with other information. Also known as the Network routing «Nirvana». Switching loops «When loops form and can eventually shut down our network» A Switching loop or bridge loop occurs when a device is being sent a packet and it broadc ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
December 5, 2018
3276

By: robinshanab
Summary: Despite working with one of the most widely used spreadsheet software, the users of Microsoft Excel face troubles such as frequent corruption and excel file damage. Thus, it is a must to backup the files regularly and also keeps tabs on the latest and most efficient Excel recovery software available in the market for disaster situati ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
December 5, 2018
5851

By: Iselin
Routing Metrics “Qualities used to determine best path” • Hop count: how many other routers does a signal need to pass? • Maximum Transmission Unit (MTU): The maximum size of a single packet we can send. Bandwidth and ports limit how much data can be pushed through • Casts: reliability, Roundtrip, cost etc. • Latency: The amount o ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
December 4, 2018
By: Joe (Research Director)
4049

Quora Data Breach Affects ~100,000,000 Customers.
Just the Facts Monday night (for me, I’m in England at the moment), the question/answer site Quora.com reported a data breach potentially affecting 100 million accounts (for those who read my last article, this is about a 1.5 on the Thriller scale). According to their release, the following information was obtained by attackers: Name Email Password (hashed) data imported from linked networks Public content (upvotes, questions/answers) Private comment (DMs, downvotes ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
November 30, 2018
By: Joe (Research Director)
4056

Marriott Reports the Loss of 500 Million Customer Records in Massive Data Breach
Good news Dell! You are no longer the cybersecurity nightmare of the week. Bad news 500 million people! You are now the victims of a truly magnificent data breach.   First, just the facts. On 30 November, 2018, Marriott International issued a press release informing the world that they had discovered a data breach affecting up to 500 million customers. The release contained the following salient details:   On 8 September, 2018, an internal security tool began issuing ale ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
November 30, 2018
4060

By: Devendra
CISSP is considered as Internationally acknowledged benchmark for the information security professional. From the past two decades, it has gone through the test of times and proved its mettle. Stands for Certified Information Systems Security Professional and is expected to take a great deal of time and efforts from the aspirants by studying C ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
November 30, 2018
2772

By: rituallyunclean
Open Source Intelligence (OSINT) is defined as intelligence collected from publicly available sources. In the intelligence community, the term “open” refers to overt, publicly available sources; it is not related to open-source software or public intelligence. This form of gathering and analysis of information is crucial to underst ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
November 29, 2018
By: manishbhickta26
2534

Digital Age Data Recovery Myths
With the increase in data loss occurrences, there is a massive demand for data recovery solutions. In the world of internet, the supply of information is often surplus than needed. However, a large number of solutions and fixes on the internet—that promises to restore data and fix most drive issues—consists of myths; Myths that can permanently destroy your drive and the data beyond the scope of recovery. Also, relying on these fixes wastes your time, energy, efforts, an ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel