Security Threats and Attack Vectors

In this post we will learn about why cyber attacks happen, what are hackers’ motives, classifications of threats and the different attack vectors.

Information Security Overview

Information security refers to a set of processes and activities performed in order to protect information. The main objective of information secur...

JUnit 5 Annotations With Examples

JUnit 5 is the next generation of JUnit. The goal is to create an up-to-date foundation for developer-side testing on the JVM. This includes focusi...

How To Setup a QA Function From Scratch

It is a usual scenario: a startup company has a new idea and hires a number of developers to build a working model of the idea.

Test Automation Advantages and Disadvantages

Test Automation, when done correctly can have many advantages and be very beneficial to the project and organization. There are however some pitfal...

Severity and Priority - What is the Difference?

Both Severity and Priority are attributes of a defect and should be provided in the bug report. This information is used to determine how quickly a...

What to Include in a Bug Report?

How to Write a Good Bug ReportWriting a good defect or bug report goes a long way in identifying and resolving the problems quickly. In this post, ...

Linux ls Command - List Files

The ls command lists the contents of a specified directory. In this post we explain all the options available for the ls command.

How to Compare Strings in Java

In order to compare Strings for equality, you should use the String object’s equals or equalsIgnoreCase methods. We will also see why we should not...

Network Scanning Techniques

Network scanning refers to the process of obtaining additional information and performing a more detailed reconnaissance based on the collected inf...

Footprinting and Reconnaissance

Footprinting refers to the process of gathering information about a target system. It is the first step of an attack in which the attacker tries to...

Network Protocol Basics and Terminologies

This post gives an overview of network protocols and covers some common network protocol terminologies with examples.