Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

June 21, 2015
By: Alan Raff
11897

A Comprehensive Look at Cyberterrorism, Hactivism and Cyber Espionage
The Idea of Terrorism What images come to mind when someone says “terrorism”? Many people may think of bombs, hostages, and/or other conventional weapons. What people don’t consider might easily be the biggest and most harmful weapon of all: technology. Today, everything revolves around computers. Computers and computer systems were designed to work, but not necessarily with security in mind. What if all these highly beneficial systems were used against us? One ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 19, 2015
5097

By: smoke
Encryption Software and Combating Cyber Crime Abstract Encryption software has been a controversial topic in the legal world since its inception. There are differing views on the legalities of this type of software, each with their own valid viewpoints. There have been many cases decided on this matter in various courts but no federal guideli ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 19, 2015
8215

By: HakTuts
Introduction LINUX is a Unix-like and mostly POSIX-compliant computer operating system assembled under the model of free and open-source software development and distribution. The defining component of Linux is the Linux kernel, an operating system kernel first released on 5 October 1991 by Linus Torvalds. The Free Software Foundation uses th ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 17, 2015
By: HakTuts
7596

Introduction to Cryptography
What is cryptography? Cryptography derives its name from the Greek word “Kryptos,” which means “Hidden Secrets.” Cryptography is the practice and study of hiding information. It’s the Art or Science of converting a plain intelligible data into unintelligible data and again re-transforming that message into its original form. It provides: Confidentiality, Integrity, Accuracy. Encryption The process of converting plain text into an unintelligible format (cipher ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 17, 2015
By: Kierc117
1358

Automatas Finitos
Contribution Credit: @kierc117   Automata Finito Un automata finito es un vector de 3 elementos M=(I,S,DELTA,F) donde I es el conjunto finito de entradas (no vacio), S es el conjunto finito de estados, DELTA es la funcion de transicion de estados y F es el conjunto finito de estados finales (incluidos en S) el hecho de que todos los conjuntos sean finitos le otortga a este elemento el atributo de finito. Tambien se puede desprender de la definicion que un automata finit ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 15, 2015
19660

By: HakTuts
Introduction to Ethical Hacking When security experts offer “safety talks” to business groups, they share definitions for VPN’s, encryption, laptop security, network security, online piracy and so on. Then, they explore instances when establishing security are ineffective: vulnerabilities are found and harmful components cree ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 15, 2015
0

By: HakTuts
Introduction to Ethical Hacking When security experts offer “safety talks” to business groups, they share definitions for VPN’s, encryption, laptop security, network security, online piracy and so on. Then, they explore instances when establishing security are ineffective: vulnerabilities are found and harmful components cree ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 15, 2015
By: HakTuts
0

The Comprehensive Guide to Ethical Hacking
Introduction to Ethical Hacking When security experts offer “safety talks” to business groups, they share definitions for VPN’s, encryption, laptop security, network security, online piracy and so on. Then, they explore instances when establishing security are ineffective: vulnerabilities are found and harmful components creep in. At this point, the security expert introduces the idea of “Ethical Hackers,” whose primary occupation is to eliminat ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

Is Linux Worth Learning in 2020?
Views: 335 / December 14, 2019
How do I Get MTA Certified?
Views: 927 / December 12, 2019
How much does your PAM software really cost?
Views: 1380 / December 10, 2019
How Do I Get into Android Development?
Views: 1758 / December 8, 2019

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel