Author: Katherine Kelly

Reading Time: 10 minutes

What is MongoDB?

mongodb logo

MongoDB is a documented database management system that does not require the description of a table scheme. It is representative of a NoSQL based system (NoSQL is an approach to implement a scalable database storage system within a flexible data model), which uses JSON like documents and database schemas often used in web development. It is written in C, C++, JavaScript, and since it is cross-platform, it allows one to deploy it on any platform.

Continue reading →
Reading Time: 7 minutes

What is MongoDB?

mongodb logo

MongoDB is a documented database management system that does not require the description of the table scheme. It is an example of NoSQL systems (NoSQL - this is an approach to implement scalable db storage with a flexible data model), MongoDB uses JSON like documents and a database scheme. It is often used in web-development along with Big data. MongoDB is written in C++, C, and JavaScript. It is also cross-platform, which lets us deploy it on multiple platforms.  

Continue reading →
Reading Time: 7 minutes
hw vs sw raid

What is RAID?

RAID (or a Redundant Array of Inexpensive Disks) is a way of storing logical data across a medium which is composed of multiple physical hard disk drives blended into one or more logical units or volumes that is used for data redundancy, performance improvement, and reliability.

Continue reading →
Reading Time: 14 minutes

Introduction

Ansible is a system of configuration management written in Python programming language which uses a declarative markup language to describe configurations. It’s used for automation of configuration and OS setup. Ansible is often used to manage Linux-nodes, but Windows is also supported. It supports work with devices with Python v2.4 and higher installed through SSH connection. In this article, we are going to review the DevOps tool called Ansible.    

Continue reading →
Reading Time: 7 minutes

What is Mimikatz?

Mimikatz is a tool created by the French developer, Benjamin Delpy used to gather credentials and can carry out a range of operations connected with penetration testing. Its creation stems from a noted vulnerability of the Windows system function called WDigest. WDigest is designed to allow larger Windows-based network users to establish credentials in multiple applications on a LAN or WAN. This feature stores authentication credentials in memory and allows for their automatic reuse so users only have to enter their login details once.

Continue reading →
Have Some Questions?

Our Sales and Support teams are available 24 hours by phone or e-mail to assist.

1.800.580.4985
1.517.322.0434