Learning & Resource Center



Immediate Assistance(800) 989-2647


Recent Posts

IP Subnet Sheet

Have you ever wondered what is a /27?  Or how many IP addresses do I get to use with a /28?  Is there a use for a /31?  CIDR Subnet Mask Total IPs Usable IPs /32 1 1 /31 2 0* /30 4 2 /29 8 6 /28...

Agile Modeling

Agile Modeling (AM) is a practice-based methodology for effective modeling and the documentation of software-based systems.  Agile Modeling (AM) is a collection of values, principles, and practices for modeling software that can be applied on a software development...

Securing Your MongoDB

Securing your MongoDB Securing MongoDB must be a top priority for system administrators right now as ransom attacks are on the rise.  If you are using MongoDB to storing data on any public facing cloud server running on Linux, then you will need to make sure you lock...

Adaptive Software Development

Adaptive Software Development is part 1 of our 12 Principles of Agile Development series. Adaptive software development (ASD) is a software development process that grew out of the rapid application development work by Jim Highsmith and Sam Bayer. ASD is centered...

Vulnerability Feed

CVE-2019-10406 (jenkins)

Jenkins 2.196 and earlier, LTS 2.176.3 and earlier did not restrict or filter values set as Jenkins URL in the global configuration, resulting in a stored XSS vulnerability exploitable by attackers with Overall/Administer permission.

CVE-2013-2157 (keystone)

OpenStack Keystone Folsom, Grizzly before 2013.1.3, and Havana, when using LDAP with Anonymous binding, allows remote attackers to bypass authentication via an empty password.

CVE-2008-3872 (flash_player)

Adobe Flash Player and earlier, and 9.x up to, allows remote attackers to bypass the allowScriptAccess parameter setting via a crafted SWF file with unspecified "Filter evasion" manipulations.

SANS ISC Bulletins