Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

September 14, 2015
By: cdoyle
5391

Cryptography Outline
  (outline as of 9/13/2015)  Course Title: Cryptography Section 1-1 Topic: Introduction To Cryptography Learning Objectives: This introduction video provides an outline of the curriculum covered in Cybrary’s in-depth Cryptography course. Confidentiality, Integrity, Availability and Authentication How companies use cryptography How penetration testers can also use cryptography Tools, Techniques and Attacks Academics discusses history of encryption. Academics simply enc ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 14, 2015
6074

By: nullvyte
What is Cross Site Scripting? Cross-site scripting (or “XSS”) is a vulnerability in web applications that’s  caused by insecure coding practices, which do not sanitize user input. If a user of a vulnerable web application can pass scripts to the server and the server does not attempt to discover and remove scripts (“sanitizing in ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 11, 2015
2970

By: Doktor Frankenstein
Cygwin is a large collection of GNU and Open Source tools. Its a good way to get to know Linux.  Cygwin is a DLL module that’s a POSIX Emulation DLL from Red Hat that allows programs written for Unix / Linux systems to run on Windows. Originally “Cygnus Support”, Cygnus Solutions was founded in 1989. They  developed Cygwin ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 9, 2015
By: GrayHat4Life
504721

7 Types of Hackers You Should Know
First, a short myth: A 15-year-old boy sits behind a glowing black monitor, typing furiously. The green text streams across his screen like a waterfall. His nervousness escalates dramatically as he sends rapid-fire commands to the strained computer. Suddenly, he lets out a triumphant laugh and proceeds to steal money.   Such is the stereotypical view of a hacker. Yet, there’s so much more to this fine art than Hollywood or the media describes. Hackers are varied c ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 9, 2015
By: Doktor Frankenstein
6570

Code::Blocks and MinGW Installation for Windows
This was done on Win7 64bit OS. It’s pretty much the same on all Windows, with slight  variants. Code::Blocks is also available for Linux and Mac and has been ported to FreeBSD, OpenBSD, and Solaris.  This is geared towards beginners that want an awesome, free, open source cross-platform IDE that supports multiple compilers including GCC, Clang and Visual C++. Code::Blocks is oriented towards C, C++, and Fortran, but it can do other languages as well. It has  compi ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 8, 2015
3015

By: waota
Beaucoup de jeunes informaticiens ou amateurs rêvent de devenir « pirate informatique », c’est très souvent pour démontrer qu’on est un as en informatique. Alors ils se mettent à rechercher sur google « technique de piratage ; comment infiltrer un réseau informatique ; comment détourner un serveur ; comment surfer gratuitement ; ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 8, 2015
6083

By: Johan Grotherus
Nmap is probably the most known and capable network scanner available today. It has a ton of features, it’s open source and free to use. So, what’s not to like about it? One of the features is the NSE, the Nmap scripting engine, which extends Nmap’s functionality as a scanner. With the use of NSE, you can not only scan, but ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 8, 2015
By: HEGA GEOFFROY
17097

How to Bypass Website Blocking Using a Proxy Server
Usually, when we want to visit a website, we start our browser, type the address of the website in the URL address bar and wait for a response. In the meantime, the browser sends that web address to the local Domain Name Server (DNS) to convert it into respective IP address. The process of converting a website address or domain name into its respective IP address is known as a DNS lookup. Within a few seconds, your browser will get a response back from the DNS server and wil ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel