Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

December 7, 2015
By: Daelphinux
5288

Shatter this Myth: Passwords Keep Your Data Totally Safe
“Door locks keep the good people out. The bad guys will break a window.”   For the life of me, I can’t remember where I heard that quote, but it’s an important one to remember when approaching cyber security problems. Most “preventative” security measures (the kinds of things that make us feel safe) are not as effective as people think. Many efforts lull users into a false sense of security, which may be the single most dangerous pla ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 3, 2015
7864

By: JoshBellamy
With U.S.-supplied, highly enriched uranium Iran was able to fuel a small nuclear reactor, effectively beginning their nuclear program in the 1960’s.  Though advancement of the nuclear program slowed during the Islamic revolution and Iran-Iraq war, by the middle of the 1990’s, Iran publicly pursued continuation of their nuclear program. ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 3, 2015
23488

By: usman47
If you’ve read my older articles 7 Steps to Create a Defensive Security Shield for MS Windows and Ethical Hacking: How To Use Batch Programming then you might have noticed one thing: getting hacked on a Windows machine is so damn easy. I thought that I should give you guys some info on how to hunt down malware in your computer. As alway ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 30, 2015
By: Daelphinux
8587

3 Social Engineering Scenarios You Should Know
Social Engineering is one of the most terrifying aspects of trying to secure anything in any way. Unfortunately, most people lack the ability to understand they’re being engineered and act on that realization.   Social engineering attacks rely on common tropes, which can easily be learned if you understand: when compassion is necessary how to pay attention to questions how to recognize when you’re being encouraged to “fill in the blank” the need to loo ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 25, 2015
By: Dr3AMCoDeR
1877

Protect Yourself from Social Engineering Used on Social Networks
We usually spend a lot of time on the social networks , and we use them often in everyday situations so we could share a pictures with our family, attend to some great events, share our locations, and we use them even to chat with our friends and tell them some secrets, and we blindly trust them. I must agree that it’s true that our well-known social networks are somewhat safe, because they really try to push the limits and use the technology to protect the everyday ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 24, 2015
5254

By: coypu76
If you’ve not read the previous tutorial, “Creating a Forensic Disk Image Using the Guymager Utility”, please consider reviewing it as this tutorial presupposes you have an image file created using Guymager or a tool with similar capabilities. In the previous tutorial, we used the Guymager Linux utility to create a forensic image of ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 24, 2015
22391

By: coypu76
Background: Guymager is an Open Source disk imaging tool for Linux created by Dutch developer Guy Voncken, licensed under the GPLv2 license. Guymager is not a Windows program. It runs only on Linux. It’s one of the tools included on popular Linux distributions, which are focused on Data Security, Penetration Testing and Forensics such ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 23, 2015
By: usman47
8869

7 Steps to Create a Defensive Security Shield for MS Windows
Almost 80% of home users use Microsoft Windows daily, as it’s their OS of choice and pretty easy to use. Most Hackers, like myself, are against using Windows as it’s a very insecure environment for a normal user to work in. Plus, most of the people don’t understand the kind of threats they’re facing and think installing antivirus software is a solution for all their problems. So, I thought that I should teach you guys the steps to create a multi-layer ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel