Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

December 5, 2018
By: robinshanab
6346

Microsoft Excel Recovery Software – Your Top 5 Vetted Options
Summary: Despite working with one of the most widely used spreadsheet software, the users of Microsoft Excel face troubles such as frequent corruption and excel file damage. Thus, it is a must to backup the files regularly and also keeps tabs on the latest and most efficient Excel recovery software available in the market for disaster situations. The millions of people worldwide use Microsoft Excel to perform to perform tasks such as storing information in an organized manne ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 5, 2018
11566

By: Iselin
Routing Metrics “Qualities used to determine best path” • Hop count: how many other routers does a signal need to pass? • Maximum Transmission Unit (MTU): The maximum size of a single packet we can send. Bandwidth and ports limit how much data can be pushed through • Casts: reliability, Roundtrip, cost etc. • Latency: The amount o ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 4, 2018
7403

By: Joe (Research Director)
Just the Facts Monday night (for me, I’m in England at the moment), the question/answer site Quora.com reported a data breach potentially affecting 100 million accounts (for those who read my last article, this is about a 1.5 on the Thriller scale). According to their release, the following information was obtained by attackers: Name ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 30, 2018
By: Joe (Research Director)
5229

Marriott Reports the Loss of 500 Million Customer Records in Massive Data Breach
Good news Dell! You are no longer the cybersecurity nightmare of the week. Bad news 500 million people! You are now the victims of a truly magnificent data breach.   First, just the facts. On 30 November, 2018, Marriott International issued a press release informing the world that they had discovered a data breach affecting up to 500 million customers. The release contained the following salient details:   On 8 September, 2018, an internal security tool began issuing ale ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 30, 2018
By: Vikrant Saran
5644

Is the CISSP Certification Worth it?
CISSP is considered as Internationally acknowledged benchmark for the information security professional. From the past two decades, it has gone through the test of times and proved its mettle. Stands for Certified Information Systems Security Professional and is expected to take a great deal of time and efforts from the aspirants by studying CBK – Common Body of Knowledge and completing other training to gain sufficient professional expertise and finally pass the exam. ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 30, 2018
9161

By: Joshua Sodaghar
Open Source Intelligence (OSINT) is defined as intelligence collected from publicly available sources. In the intelligence community, the term “open” refers to overt, publicly available sources; it is not related to open-source software or public intelligence. This form of gathering and analysis of information is crucial to underst ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 29, 2018
2970

By: manishbhickta26
With the increase in data loss occurrences, there is a massive demand for data recovery solutions. In the world of internet, the supply of information is often surplus than needed. However, a large number of solutions and fixes on the internet—that promises to restore data and fix most drive issues—consists of myths; Myths that can perma ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 28, 2018
By: Yeridani
3743

Web Application Firewall
The new age security growing under different aspects, the spotlight are direct now to the Web Application Firewall (or WAF) filters for monitors, and blocks HTTP traffic to and from a web application, the proliferation of web application and the pervasiveness of mobile technology make web-based attacks even more attractive and even easier to launch and Web Application Firewall (WAF) is an intermediate tool between web server and users that provides comprehensive prote ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel