What is Whole Team Approach in Agile Testing?
In Agile, the whole-team approach means involving everyone with different knowledge and skills to ensure project success. The team includes representatives from the customer also known as the Product Owner, and other business stakeholders who determine product features.
Read more
Read moreHow To Setup a QA Function From Scratch
It is a usual scenario: a startup company has a new idea and hires a number of developers to build a working model of the idea.
Read more
Read moreTest Automation Advantages and Disadvantages
Test Automation, when done correctly can have many advantages and be very beneficial to the project and organization. There are however some pitfalls or disadvantages of test automation that we need to be aware of.
Read more
Read moreSeverity and Priority - What is the Difference?
Both Severity and Priority are attributes of a defect and should be provided in the bug report. This information is used to determine how quickly a bug should be fixed.
Read more
Read moreLinux ls Command - List Files
The ls
command lists the contents of a specified directory. In this post we explain all the options available for the ls
command.
Read more
Read moreHow to Compare Strings in Java
In order to compare Strings for equality, you should use the String object’s equals
or equalsIgnoreCase
methods. We will also see why we should not use the ==
operator to compare strings.
Read more
Read moreNetwork Scanning Techniques
Network scanning refers to the process of obtaining additional information and performing a more detailed reconnaissance based on the collected information in the footprinting phase.
Read more
Read moreFootprinting and Reconnaissance
Footprinting refers to the process of gathering information about a target system. It is the first step of an attack in which the attacker tries to learn as much as possible about the target to find a way to break into the system.
Read more
Read moreNetwork Protocol Basics and Terminologies
This post gives an overview of network protocols and covers some common network protocol terminologies with examples.
Read more
Read moreConvert List to Array in Java
Converting between List and Array is a very common operation in Java.
Read more
Read moreHow to Install Git on Mac and Generate SSH Keys
In this step-by-step Git Tutorial, we will go through how to install Git on a Mac machine, how to generate SSH keys and upload your public SSH key to your GitHub account for authorization.
Read more
Read moreWhat are Different Types of Hackers?
What are the different types of hackers? Despite the popular belief, not all hackers are bad. There are several types of hackers, and in this post we will go through them.
Read more
Read moreNode.js - Hello World HTTP Server Example
In this example we’ll show how to create an HTTP server using Node.js. The server will listen on port 1337, and will send Hello, World!
to the browser upon a GET request.
Read more
Read moreHow to Transfer Files in Linux with SCP and Rsync
In this tutorial we will explain how to use SCP (Secure Copy) and Rsync, two commands that can be used to transfer files between two machines.
Read more
Read moreHTTP Basics for Software Testers
In this article, we’ll explain some of the most common HTTP terminologies and their meanings. This knowledge is especially useful when testing APIs.
Read more
Read moreJava Create File Examples
Creating files in Java is easy. In this post, we’ll look at four different ways to create files in Java. All we need to do is import the relevant package and use relevant methods.
Read more
Read moreEthical Hacking Fundamentals
This blog post is an introduction to Penetration Testing and Ethical Hacking. We’ll cover the basics of Pen testing and explain why penetration testing is important to organizations.
Read more
Read moreJava Random Number Generation
Generating random numbers in Java is a common task. For example, you might want to execute tests with random values each time. In this post, we look at different ways we can generate random numbers in Java.
Read more
Read moreConfidentiality, Integrity and Availability
Confidentiality, integrity, and availability, often known as the CIA triad, are the building blocks of information security. This post explains each term with examples.
Read more
Read more