Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

November 23, 2018
By: Iselin
4245

Networking Part 1 IP Default gateway APIPA
Networking Part 1 IP Addresses “The virtual name and address of a device” IP addresses are logical addresses that are used for identifying devices on a network. IP addresses can be found where devices are connected to a network. For example, a phone, a computer, a router or a switch. It can either be static (Manually set and can not be changed automatically) or dynamic (automatically assigned by a DHCP). We have two versions of IP addresses called IPv4 and IPv6. IPv4 IPv ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 21, 2018
4929

By: Tatianna
This blog is sponsored by Thycotic Cybersecurity has again been a major focus in the past year as the compromise of elections and voting machines is on the top of everyone’s minds. Given the critical impact of the midterm elections on future governance, election security is a major concern. It’s especially concerning after it was ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 13, 2018
9546

By: Vikrant Saran
VMware is one of the most in-demand technologies in virtualization and cloud computing sphere. Owing to its rising demand in the IT industry and other enterprises, jobs in virtualization is very high. VMware provides an excellent feature to the users. As cloud computing and virtualization has solved many issues of an organization with an ease ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 9, 2018
By:
8957

Passwords Aren’t Enough: History of Passwords, Malware and More
Passwords are secure keys that we have to remember to access some document securely, online or offline. Sometimes they may be the only obstacle between a hacker and you. Today, password security is employed by all major sites across the internet and even in the local accounts of your PC, Laptop or Phones. Although there are many methods of cracking a password being developed every day, all of these squares down to two basic types: Brute-Force Dictionary There is also anoth ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 6, 2018
By: Ace
12516

Exploiting Vulnerabilities of Windows 2000 Server using NMAP, Nessus and Metasploit
Using NMAP to identify OS and services on the vulnerable machine (Windows 2000 server) Nmap is a free and open source for network discovery and security auditing. Firstly we have to setup the virtual environments of vulnerable machine (Windows 2000) and kali Linux on the VM virtual box. And we have to set their IP’s as in a same network range. Once open kali terminal, nmap –sV -O 192.168.56.99 (IP of the Windows 2000 machine) this will give us a report of version of ea ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 24, 2018
14554

By: kumarsandeep43
MS Outlook Shows Error Message Internal Error Code= 0000000E MS Outlook has two types of data files OST and PST. While PST is stored online on server the OST or (Offline Storage Table) is stored on the local computer which is a replica of PST. Both are important for smooth functioning of MS Outlook. Problem in OST can harm PST file too at tim ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 23, 2018
16557

By: masjter_ZA
“Terminal commands” Terminal commands: Command Line Interface What is a command? A command is a software program that when executed on the CLI (command line interface) in the terminal, performs an action on the computer. When you type in a command, a process is run by the operating system that can read input, manipulate data and ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 23, 2018
By: cynosurekp
10350

Disinformation is a Cyber Security Threat
It’s just Fake News… If you are a person who follows news from social media as most people do, you are exposed to a daily dose of Fake News. Fake News, misinformation, junk, deliberately distributed deception and (the newest addition) “fake memes” are various names given to contrived material that is presented to be factually accurate. With the advent of monetizing traffic through ad clicks, spammers have created social sites and social media profiles to crea ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel