CEH v10 - Post Exam Study Write Up
I recently took the CEH v10 exam and passed. In this post, I summarize my experience in pursuing the path to becoming a Certified Ethical Hacker.
Read more
Read morePurpose of Overriding toString() Method in Java
What is the purpose of toString()
method in Java?
Read more
Read moreGatling - How to Save Response Body
How to save response body in Gatling?
Read more
Read moreHTTP Status Codes With Explanations
HTTP Status Codes or Response Codes are grouped into five categories. 1×× Informational, 2×× Success, 3×× Redirection, 4×× Client Error, 5×× Server Error.
Read more
Read moreTesting in DevOps World
DevOps is an amalgamation of the Development and Operations practices for Software development and Delivery.
Read more
Read moreWhy Would You Want To Automate a Test?
Why would you automate a test? What benefits do we get with test automation?
Read more
Read moreWhy Automated Tests Don't Find Bugs?
It is widely believed that the purpose of automated tests is not to find new defects but rather find regression bugs as new features are developed.
Read more
Read moreWhen to Automate User Stories?
If you have worked in an agile environment as a QA, most probably you would have come across some sort of test automation. I don’t mean unit test automation which is typically a developer centric activity, but functional acceptance test automation which is normally done by QA or the new fancy role of Software Developer in Test.
Read more
Read moreHead of QA - Roles and Responsibilities
Head of QA role is a senior position within an organization which is normally the next level up from a QA manager role. In this article, we list out the responsibilities of a Head of QA role.
Read more
Read moreThere is NO QA Team in Agile
Agile is all about working collaboratively with people who have different skills and mindsets to achieve a common goal.
Read more
Read moreWeb Application Hacking Methodologies
Web applications are programs that allow users to interact with web servers. They are run on web browsers with the help of client- and server-side scripts.
Read more
Read moreHacking Web Servers - An Overview
Web server is a system used for storing, processing, and delivering websites. It is designed to host web applications, allowing clients to access those applications.
Read more
Read moreCryptography Fundamentals
Cryptography refers to the process of hiding information by converting the readable text into unreadable text using some sort of a key or encryption algorithm.
Read more
Read moreSecurity Threats and Attack Vectors
In this post we will learn about why cyber attacks happen, what are hackers’ motives, classifications of threats and the different attack vectors.
Read more
Read moreInformation Security Overview
Information security refers to a set of processes and activities performed in order to protect information. The main objective of information security is to prevent unauthorized users from stealing and misusing information or services.
Read more
Read moreJUnit 5 Annotations With Examples
JUnit 5 is the next generation of JUnit. The goal is to create an up-to-date foundation for developer-side testing on the JVM. This includes focusing on Java 8 and above, as well as enabling many different styles of testing.
Read more
Read moreDifference Between Iterative and Incremental Development in Agile
In agile software development, what is the difference between iterative and incremental development? Are they the same thing? What is the distinction between these two words?
Read more
Read more