Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

February 18, 2019
By:
1771

Benefits of virtualization
Virtualization is the process of creating a lot of machines on one machine , as if they work separately.This technology is becoming very popular due to its benefits . To understand it well , let’s consider 3 protocols of virtualization : Application / OS / hardware , when virtualization is used we can considder that there are more than one application and each one is working on its OS: Application(i)/OS(i)/virtualization layer/OS for (i..to n). (n number of VMS) The hyp ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
February 17, 2019
2139

By: dks11
Have you ever gotten an email titled something like “You have an outstanding invoice” or “YOU ARE THE LUCKY WINNER!!!!” and (hopefully) as quickly as you saw it, deleted it? Well, this is a form of social engineering. Social engineering takes many forms and the above example is one of the many ways attackers will try to exploit you an ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
February 15, 2019
3843

By: Muhammad Tariq Ahmed Khan
Since the threats from cyberattacks have emerged significantly and are continuously evolving, managing cybersecurity risks has become one of the substantial challenges faced by the organizations nowadays. Organizations have put in place technical and procedural controls to attain optimum cybersecurity. Furthermore, governments and regulators h ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
February 15, 2019
By: sambocetta
2103

Can the Presidential Alarm System be Hacked?
The autumn of 2018 brought something new to the general alert system of the United States. While the country’s old Emergency Alert System (EAS) that’s been in place for decades is still in use, a process for using text message alerts was added. The first test of what has been dubbed the Presidential Alert System appeared to be a success. Alerts by text are nothing new. Early 21st century legislation made it possible for states and other jurisdictions to set up emergency ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
February 14, 2019
By:
2366

Ruminations on how I became the Tech Guy in my personal and professional life
I love that we live in an era where we can communicate almost instantaneously with friends, relatives, and colleagues. I am thankful that God graced me a career field where I can work remotely and is in high demand and seems like it will always be so. Of course, no one gets where they are alone, although I did work my rear off to get where I am. I would be remiss if I did not first pay homage to the support of my two amazing parents who were both successful IT professionals i ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
February 14, 2019
2689

By: Ahmed Abouzid
Hello everybody… Before reading my contribution here, I will explain in the beginning the following: why I am posting this! what you will find and might learn. Index of content. ( DON’T WASTE YOUR TIME ) because I know that your time is the most valuable thing you own in life… so if you can’t find your interests in th ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
February 13, 2019
1698

By: Dra4hos7
A consolidated team of specialists from Tel Aviv University, the University of Adelaide, the University of Michigan, the Weizmann Institute, as well as the NCC Group and Data61 presented a report(PDF) on the new variations of the Bleichenbacher attack, which is a threat even to the newest TLS 1.3. To understand the essence of the problem, you ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
February 13, 2019
By: kumarsandeep43
1566

Top 5 Methods to Avoid SQL Database Corruption and Maintain Database
SQL Server is the best database used by organizations. Large applications run of SQL database and use to store their data. However, human errors or system failure may cause corruption in database. So, it is better to adopt methods to prevent SQL database corruption. Database corruption could lead to huge data loss and thus proper maintenance of database should be done.   The SQL server has inbuilt tools by which you can remove minor errors and prevent database from corru ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel