Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

October 15, 2015
By: udhayaprakash
2590

Insecure Data Storage on Android Mobile Phones
  Insecure Data Storage on Android Mobile Phones What Does this Mean? Today, cellular networks are becoming a vital element for exchanging the electronic data in low income countries. A problem arises: insecure data storage on mobile phones. This leads to theft of all important data from victims’ phones. I’m here to give a Solution for insecure data storage and transmission between the client and server in android. MDCS (Mobile Data Collection System) it’s a sy ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 12, 2015
2155

By: Hollywood27kt
One of the most frequent questions I get when working with clients who are currently using SharePoint Server is what the advantages and disadvantages of moving to the cloud, or mainly SharePoint Online/Office 365. SharePoint Online has been a technological forefront when it comes to web content management, and for good reason, too. I’ve ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 12, 2015
6751

By: Kouzelnik
Phone hacking has been around since creation of the phone line. Now, with VoIP technology, we face new issues. Let’s take a closer look at Cisco connections and troubleshooting of basic problems. Much depends on the connection and hardware you’re working with. Cisco phones are connected to the switch and managed via CME or CUCM. B ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 12, 2015
By: GodSpeed
9749

Examining the IoT from a Cyber Security Point of View
Before we start, here’s a fun fact: It wasn’t a researcher or an analyst to first use the term ‘Cyberspace,’ it was a science fiction author named William Gibson. It was used in 1982 in a short story; he later elaborated on the term in his novel ‘Neuromancer.’   Ironically, whatever he wrote as a fiction, is anything but fiction today. Since 2009, the Internet of Things (or simply IoT) has become immensely popular and is gaining ground faster than ever. In f ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 8, 2015
By: Krintoxi
17084

Stop ISP Espionage and Transparent Proxies Using DNS Cryptography
  Stop ISP Espionage and Transparent Proxies Using DNS Cryptography Hello, Today, I’ll show you how to properly setup a DNSCrypt to prevent monitoring and logging on your DNS by your default provider. We’ll do this by changing our DNS provider to an off-shore or other DNS service that does NOT log our requests, and encrypts DNS queries and responses. Before we explore how this works, we have to understand a bit about DNS and what it is.   DNS: Short f ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 7, 2015
3891

By: Rattar
Have you ever wanted to have a webtool that can help with security? I created a simple language written in JavaScript that can be used to get you started with programming. One of the features of the language is its support for modules. There are two modules that I will go into: l33t.juliar and security.juliar, which are made specifically for ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 5, 2015
4261

By: KaalBhairav
Q and A: What are DOS and DDOS Attacks?   Q1. What is a DOS attack? Ans: DOS attack is short for Denial of Service attack. An attacker sends a lot of garbage traffic to a server, such that it consumes all the resources on the server, rendering it unusable to the legitimate users. In the worst case, a DOS can cause the server to shut dow ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 5, 2015
By: scilley
5347

Configure a Debian Firewall Gateway
I am presenting to you, the Cybrary members, a Firewall/gateway configuration that’s used here in my home/HQ for Twisted Security. It’s recommended that you learn the basic Linux Command Line operations and know how to use the tools provided to scan and monitor your firewall.   1. Install Latest Debian Distro a. Absolute minimal install b. No Web, FTP, Mail or any services not needed to run the Server c. Change its internal IP on eth0 to static and .10 of t ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel