testing

What is Whole Team Approach in Agile Testing?

In Agile, the whole-team approach means involving everyone with different knowledge and skills to ensure project success. The team includes representatives from the customer also known as the Product Owner, and other business stakeholders who determine product features.

Read more

Read more
testing

How To Setup a QA Function From Scratch

It is a usual scenario: a startup company has a new idea and hires a number of developers to build a working model of the idea.

Read more

Read more
testing

Test Automation Advantages and Disadvantages

Test Automation, when done correctly can have many advantages and be very beneficial to the project and organization. There are however some pitfalls or disadvantages of test automation that we need to be aware of.

Read more

Read more
testing

Severity and Priority - What is the Difference?

Both Severity and Priority are attributes of a defect and should be provided in the bug report. This information is used to determine how quickly a bug should be fixed.

Read more

Read more
testing

What to Include in a Bug Report?

How to Write a Good Bug Report

Read more

Read more
operations

Linux ls Command - List Files

The ls command lists the contents of a specified directory. In this post we explain all the options available for the ls command.

Read more

Read more
development

How to Compare Strings in Java

In order to compare Strings for equality, you should use the String object’s equals or equalsIgnoreCase methods. We will also see why we should not use the == operator to compare strings.

Read more

Read more
operations

Network Scanning Techniques

Network scanning refers to the process of obtaining additional information and performing a more detailed reconnaissance based on the collected information in the footprinting phase.

Read more

Read more
operations

Footprinting and Reconnaissance

Footprinting refers to the process of gathering information about a target system. It is the first step of an attack in which the attacker tries to learn as much as possible about the target to find a way to break into the system.

Read more

Read more
operations

Network Protocol Basics and Terminologies

This post gives an overview of network protocols and covers some common network protocol terminologies with examples.

Read more

Read more
development

Convert List to Array in Java

Converting between List and Array is a very common operation in Java.

Read more

Read more
operations

How to Install Git on Mac and Generate SSH Keys

In this step-by-step Git Tutorial, we will go through how to install Git on a Mac machine, how to generate SSH keys and upload your public SSH key to your GitHub account for authorization.

Read more

Read more
operations

What are Different Types of Hackers?

What are the different types of hackers? Despite the popular belief, not all hackers are bad. There are several types of hackers, and in this post we will go through them.

Read more

Read more
development

Node.js - Hello World HTTP Server Example

In this example we’ll show how to create an HTTP server using Node.js. The server will listen on port 1337, and will send Hello, World! to the browser upon a GET request.

Read more

Read more
operations

How to Transfer Files in Linux with SCP and Rsync

In this tutorial we will explain how to use SCP (Secure Copy) and Rsync, two commands that can be used to transfer files between two machines.

Read more

Read more
testing

HTTP Basics for Software Testers

In this article, we’ll explain some of the most common HTTP terminologies and their meanings. This knowledge is especially useful when testing APIs.

Read more

Read more
development

Java Create File Examples

Creating files in Java is easy. In this post, we’ll look at four different ways to create files in Java. All we need to do is import the relevant package and use relevant methods.

Read more

Read more

Ethical Hacking Fundamentals

This blog post is an introduction to Penetration Testing and Ethical Hacking. We’ll cover the basics of Pen testing and explain why penetration testing is important to organizations.

Read more

Read more
development

Java Random Number Generation

Generating random numbers in Java is a common task. For example, you might want to execute tests with random values each time. In this post, we look at different ways we can generate random numbers in Java.

Read more

Read more
operations

Confidentiality, Integrity and Availability

Confidentiality, integrity, and availability, often known as the CIA triad, are the building blocks of information security. This post explains each term with examples.

Read more

Read more