Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

October 19, 2015
By: Rattar
4422

Create Great Passwords By the Book
Do you have one password for all your devices? Do you have 100 passwords and sometimes forget them? Do you have trouble remembering passwords? Do you write your passwords on notecards or post-it notes? If you answered yes to any of these questions, then you should read this post. If not, read it anyway, as it may offer something that may change your life. A lot of people ask, “Andy, how should I pick a password?” or “How do I make my password secure?” ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 15, 2015
2526

By: udhayaprakash
  Insecure Data Storage on Android Mobile Phones What Does this Mean? Today, cellular networks are becoming a vital element for exchanging the electronic data in low income countries. A problem arises: insecure data storage on mobile phones. This leads to theft of all important data from victims’ phones. I’m here to give a Solutio ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 12, 2015
2089

By: Hollywood27kt
One of the most frequent questions I get when working with clients who are currently using SharePoint Server is what the advantages and disadvantages of moving to the cloud, or mainly SharePoint Online/Office 365. SharePoint Online has been a technological forefront when it comes to web content management, and for good reason, too. I’ve ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 12, 2015
By: Kouzelnik
6591

Tutorial: Hacking/Troubleshooting VoIP and ISDN
Phone hacking has been around since creation of the phone line. Now, with VoIP technology, we face new issues. Let’s take a closer look at Cisco connections and troubleshooting of basic problems. Much depends on the connection and hardware you’re working with. Cisco phones are connected to the switch and managed via CME or CUCM. Below, you’ll find basic ways and commands to troubleshoot VoIP issues. I also added few basics of ISDN troubleshooting.   Ho ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 12, 2015
By: GodSpeed
9564

Examining the IoT from a Cyber Security Point of View
Before we start, here’s a fun fact: It wasn’t a researcher or an analyst to first use the term ‘Cyberspace,’ it was a science fiction author named William Gibson. It was used in 1982 in a short story; he later elaborated on the term in his novel ‘Neuromancer.’   Ironically, whatever he wrote as a fiction, is anything but fiction today. Since 2009, the Internet of Things (or simply IoT) has become immensely popular and is gaining ground faster than ever. In f ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 8, 2015
16152

By: Krintoxi
  Stop ISP Espionage and Transparent Proxies Using DNS Cryptography Hello, Today, I’ll show you how to properly setup a DNSCrypt to prevent monitoring and logging on your DNS by your default provider. We’ll do this by changing our DNS provider to an off-shore or other DNS service that does NOT log our requests, and encrypts ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 7, 2015
3792

By: Rattar
Have you ever wanted to have a webtool that can help with security? I created a simple language written in JavaScript that can be used to get you started with programming. One of the features of the language is its support for modules. There are two modules that I will go into: l33t.juliar and security.juliar, which are made specifically for ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 5, 2015
By: KaalBhairav
4113

Q and A: What are DOS and DDOS Attacks?
Q and A: What are DOS and DDOS Attacks?   Q1. What is a DOS attack? Ans: DOS attack is short for Denial of Service attack. An attacker sends a lot of garbage traffic to a server, such that it consumes all the resources on the server, rendering it unusable to the legitimate users. In the worst case, a DOS can cause the server to shut down temporarily.   Q2. Whats the difference between DOS and DDOS attacks? Ans: When a DOS attack originates from hundreds of Botnets ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel