Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

September 28, 2015
By: Jafar Hasan
5902

What is Doxing?
I’d like to clarify what Doxing is. Doxing is the procedure of picking up data about somebody or something by utilizing sources on the Internet and utilizing essential reasoning abilities. Its name comes from “Documents” – in short it’s the recovery of “Documents” on a person or organization. You may be thinking: “So, it’s essentially getting data from looking up somebody’s email on Google, right?” Yes, but th ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 25, 2015
4127

By: Krintoxi
Hello – Today I’ll be providing a set-by-step guide to Steganography and its crypto. We’ll look at its uses in third world countries and oppressive regimes that have complete control over the Net, including Cuba, Venezuela, North Korea, China, Syria etc. Oppressive systems are known to shut down secure ways of communicating, ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 23, 2015
4154

By: Krintoxi
With the growing concern of online privacy, this is by far the best way I’ve found to keep your communications private using a combination of O.T.R., TOR, Linux and a trustworthy VPN service. Note – This guide can be used by the following communities of people and others: Activists: Operating around the wold, all governments spyi ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 23, 2015
By: blahmed
119072

An Unforgettable Trick to Remember the OSI Model 7 Layers
It’s easy to remember the sequence of OSI Model 7 Layers using this simple sentence: “All people seem to need data processing.” All = Application Layer People= Presentation Layer Seem = Session Layer To = Transport Layer Need = Network Layer Data = Data Link Layer Processing = Physical Layer   Let’s look at the layers more closely…   Application Layer (DATA) Application Layer provides Interface between users and machines. Protocols of ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 23, 2015
By: Falko
3296

Testing Your Linux Firewall Configuration
At Cybrary.it, it’s all about security and penetrating. I’ve decided to write this little guide for testing your own firewall configuration. We’re going to use Firewall Tester (FTester) tool. Important: this tool is now outdated. However, I find it still useful and nice to use for beginners. The Firewall Tester (FTester) is a tool designed for testing firewall filtering policies and Intrusion Detection System (IDS) capabilities. The tool consists of two per ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 21, 2015
6280

By: Rafik
It’s hard to administer systems nowadays without security. Managing and administering systems almost always includes a security component, if not an outright security focus. Are you interested in moving from a systems administration position into a more security-focused role? And, do you want to design your career in information system ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 21, 2015
3573

By: Wushi09
Internet Protocols: Versions 4 and 6 Analysis and Comparison of IPv4 and IPv6   Usman Jibril Department of Management Information Systems Cyprus International University Lefkosa, North Cyprus. wushi09@outlook.com Akintoye Oluwasegun Ogundiya Department of Management Information Systems Cyprus International University Lefkosa, North Cyprus. s ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 21, 2015
By: Rana Daniyal Khan
64898

Hacking a WiFi Network with MAC Filtering Enabled
Don’t try this on networks on which you lack permission for penetration testing.   Intro: MAC: “MAC is a 42 bit address used to uniquely identify a device. “ “MAC filtering is a way in which the network administrator allows only specific mac address to connect to the router.”    Let’s divide this topic in two threads: [-] Crack WiFi network. [-] Get in to it even if MAC filtering is enabled.   Tools: 1-Kali Linux Rather th ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel