QA articles

All About Protecting Applications

All About Protecting Applications

QA articles
Protecting applications is very essential to business. Application security is all about maintaining a positive brand, which builds the trust of clients and shareholders. It prevents security breaches that might affect the business. Applications are an essential part of doing business in the world wherein everything connects to the internet of things. Apps help the business to relate to mobile, peripheral, network, and wired devices. https://www.youtube.com/watch?v=sY7pUJU8a7U More About Application Security and Protecting Applications Application security is the procedure of making apps much more secure by fixing, finding, and improving security apps. Almost all of this happens while on the development phase that includes tools and methods to protect apps. It is imperative since hack...
What is SQL Injection

What is SQL Injection

QA articles
SQL INJECTION For starters, SQL is described as... SQL injection refers to the technique of injecting code that might destroy the database. It is of the most common web hacking techniques. SQL injection is all about inserting malicious code in the SQL statement through web page input. https://www.youtube.com/watch?v=wcaiKgQU6VE More about SQL injection SQL injection or also known as SQLI, is a common attack that uses ferocious SQL code for database manipulation. It aims to access data, which are not intended to display. Such information may include a number of items, sensitive data of the company, lists of users, or private clients’ details. A successful attack or unauthorized access may result in the deletion of entire tablets, specific cases, and gaining rights to databa
Requirement-Based Testing: The Pros and Cons

Requirement-Based Testing: The Pros and Cons

QA articles
What is requirement-based testing (RBT)? It is an approach in which test cases are obtained from requirements, especially its data and conditions. Requirement-based testing includes functional and non-functional attributes such as performance, reliability, and usability. The primary goal of requirement-based testing is to boost the possibility that the application under test will function properly. Likewise, it also ensures that the application will meet the specific requirements. https://www.youtube.com/watch?v=b26VSk736ng Requirement-based testing stages Requirement-based testing undergoes stages. The stages are: Criteria definition of the test completion Designing the test cases The execution of tests Verifying the test results Testers and developers must also per...
Tackling Shell Script Security

Tackling Shell Script Security

QA articles
SHELL SCRIPT SECURITY The shell script is a text file, including a command sequence for a UNIX-based operating system. Creating shell scripts are for the users that will need the command sequence repeatedly. Simply enter the name of the shell script on a command line to initiate the sequence of commands. https://www.youtube.com/watch?v=Dp9J7aktYDs&t=1s Shell script security considerations It is imperative to keep the shell script secured. In able to do this, there are specific security considerations that users should observe. This helps to secure the shell scripts. Permissions, execution, and ownership the first and most important consideration is the users should pay attention to the ownership, execution, and permissions of the script. Aside from wiring the shell script, ...
Anonymous Attacks Online

Anonymous Attacks Online

QA articles
Anonymous is a group of computer-savvy people who work towards a common cause called hacktivists. The term “hacktivist” comes from the combination of the word hacker and activist. It refers to someone who uses technology to protest against censorship and political, legal, or societal injustice. Anonymous is a famous group defacing popular websites by inputting graphics and text with their own messages. https://www.youtube.com/watch?v=_L0UbPl3qys Typically, they initiate distributed denial of service or commonly known as DDoS attacks. It refers to overloading the computer systems making sites and networks unavailable to anyone. For many years, Anonymous are succeeding to catch worldwide attention for specific causes or times. Anonymous hackers are actual people with real techniques
Brief Discussion of JavaScript

Brief Discussion of JavaScript

QA articles
Discussion of JavaScript Here is a short but informative discussion of JavaScript. JavaScript creator is Brendan Eich and developed in the year 1955. It first appears in Netscape, which is a popular browser during that time. JavaScript was formerly called LiveScript, but later on, the name changes. Many programmers think that Java and JavaScript are the same. But in reality, both are very much unrelated. Java is a programming language, while JavaScript is a scripting language. The programming language C greatly influenced the syntax of JavaScript. https://www.youtube.com/watch?v=W6NZfCO5SIk It is a lightweight, interpreted, or compiled programming language having first-class functions. JavaScript is well known as the scripting language for web pages. Besides, plenty of non- browser ...
Different Web Testing Myths

Different Web Testing Myths

QA articles
Even web testing has myths, too. Since it is just myths, it might not be true. To be more precise, myths are just misconceptions about web testing. The following are the most common web testing myths that many are wondering: https://www.youtube.com/watch?v=l5cAeQ3BhjI Testing is only to find bugs This is a common belief that executing tests are supposed to find bugs. Yes, testing indeed takes place to find bugs. However, testing also includes the following: Validating help documents Giving suggestions Giving ideas to increase productivity Reviewing the architecture of the product Analyzing the requirements Testing is primarily to find bugs, but it also incorporates other essential tasks. Testing is boring It can be boring for testers or individuals wh...
Exploring Big Data Testing

Exploring Big Data Testing

QA articles
What exactly is big data testing? Big data testing is about the testing of big data applications. Big data refers to a collection of large datasets unable to processed using traditional techniques. Testing such datasets involves different tools, techniques, and frameworks in order to process. Moreover, big data relates to data creation, storage, retrieval, and analysis. https://www.youtube.com/watch?v=4EhEh3AMSqc Big data forms Big data build its fame through its superiority in handling multiple formats of data. The data forms that big data handles are as follows: Structured data Includes any tabular information that is organized adequately under rows and columns with easy accessibility known as structure data. The data can be arranged under named columns in varying storage units, ...
Knowing Regression Testing and its Factors

Knowing Regression Testing and its Factors

QA articles
Discussing Regression Testing Regression testing is a kind of software testing that performs to confirm if the changes in code or program do not affect the existing features. This testing is either full or partial selection of executed test cases. Regression testing re-executed in order to ensure that the existing functionalities would work fine. Performing this type of testing will make sure that the new code changes would not have side effects on the current functions. In addition, regression testing makes the assurance that the old code will work just fine even the latest code is done. https://www.youtube.com/watch?v=xmQuLTarGI4 Factors that require Regression testing Some factors need the execution of the Regression Test. Such scenarios might include the following: Fixing th...
What is Penetration Testing

What is Penetration Testing

QA articles
Penetration testing is also known as Pen Test or ethical hacking. It refers to the practice of testing the computer system, networks, or web application in order to find security vulnerabilities. Automated or manually, penetration can use software applications. The process mainly involves: Gather info about the target before the test Identify the possible entry points Attempting to infiltrate either virtually or real The primary goal of penetration testing is to identify security weaknesses and give solutions or strategic decisions for remedies. Sometimes called “white hat” attacks since the good ones are attempting to break-in. https://www.youtube.com/watch?v=q2t91jLmh3k Penetration testing stages There are five stages for the penetration testing process. It can be brok