Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

October 2, 2018
By: sourajeet
5836

Starwars In CMD
Who wants to watch star wars in CMD just follow the steps. Open control panel. Click on programs. Click turn windows features on or off. A dialog box opens. Click Server telnet and client telnet then press Ok. Type Telnet in your search box. Click telnet.It appears Type “o” without the quotes, then click enter. Then type” towel.blinkenlights.nl” without inverted commas. Some writings appear… wait for some time don’t type anything then you ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 2, 2018
3622

By: Tatianna
This blog is sponsored by Cisco and was originally posted on their blog by: Marc Blackmer September 13, 2018 I recently heard a news story about a survey in which people were asked whether they would prefer to the ability to fly or to be invisible. Sure, it was a silly question*, but it was interesting to hear why people made their choices. T ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 29, 2018
4472

By: Vikrant Saran
Studying for an exam takes a lot of time, effort and perseverance. The PMP – Project Management Professional exam, is one of the highly regarded certification exams and need extensive preparation and proper planning and approach from the beginning. Even after following PMP exam tips, it requires thorough dedication as there is a lot of ma ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 28, 2018
By:
6744

HTML, CSS, and JavaScript
Before I start, please let me say that I am not a Master of any of the above languages. I am still a neophyte in my quest to become prolific, as well as articulate in conveying the power of these 3 computer languages. At a very young age, I have always been excited about computers. The way they work, how they’re built, and how they store, compile and execute data in a matter of seconds. Somewhere in Junior High School, we learned about the binary system. 1 means ON, an ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 27, 2018
By: nickv
5671

10 Steps to Secure and Mitigate Risk on Android (and more!)
Surrounded by IT hobbyists, technologists, professionals, and others, I’ve come to realize we don’t treat our phones as computers that store and access data. Many do not take the necessary steps to secure mobile devices. Many access their work and personal emails on these devices yet have not taken any steps to secure their devices and mitigate risks. Multi-layered security is the best approach to securing mobile devices. With the ever-growing popularity of Android phone ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 27, 2018
5100

By: alvina11
With the advancement of the technology, the PDF file format is the most reliable file format. It is the portable document format (PDF) which includes text formatting and images. It is independent of application software, hardware, and operating systems. Sometimes it is required to limit access to a PDF for the security purpose. So, it can be d ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 26, 2018
3899

By: fl00dz
Let’s Get Ready for WPA3! As with all WiFi Standards in the past such as WEP, WPA, and WPA2, WPA3 is focused on security. Mostly benefiting the end-users with weak passwords (hopefully this will not make end-users think having a weak password is okay). It will also prevent brute force attacks, and even give us new ease of use Smart Devic ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
September 26, 2018
By:
3106

A Bad Rabbit How To Secure Oneself Against Cyber Attack
What a cyber-attack is and how not to become its victim? What types of viruses exist and how to secure oneself against them? There are many viruses, and Bad Rabbit is one of them. The following article is about how to secure oneself against this virus and avoid cyber-attack. The Bad Rabbit virus demands a payment of 0, 05 bitcoin (a bit more than $281) for access to encrypted information. Later, the security system announced that technical specialists stopped viral shedding. ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel