#git

How to Install Git on Mac and Generate SSH Keys

In this step-by-step Git Tutorial, we will go through how to install Git on a Mac machine, how to generate SSH keys and upload your public SSH key ...

Git Commands Every Tester Should Know

This post is a Git Cheat Sheet with the most common Git commands you will likely use on a daily basis.

#security

Web Application Hacking Methodologies

Web applications are programs that allow users to interact with web servers. They are run on web browsers with the help of client- and server-side ...

Hacking Web Servers - An Overview

Web server is a system used for storing, processing, and delivering websites. It is designed to host web applications, allowing clients to access t...

Cryptography Fundamentals

Cryptography refers to the process of hiding information by converting the readable text into unreadable text using some sort of a key or encryptio...

Security Threats and Attack Vectors

In this post we will learn about why cyber attacks happen, what are hackers’ motives, classifications of threats and the different attack vectors.

Information Security Overview

Information security refers to a set of processes and activities performed in order to protect information. The main objective of information secur...

Network Scanning Techniques

Network scanning refers to the process of obtaining additional information and performing a more detailed reconnaissance based on the collected inf...

Footprinting and Reconnaissance

Footprinting refers to the process of gathering information about a target system. It is the first step of an attack in which the attacker tries to...

Network Protocol Basics and Terminologies

This post gives an overview of network protocols and covers some common network protocol terminologies with examples.

What are Different Types of Hackers?

What are the different types of hackers? Despite the popular belief, not all hackers are bad. There are several types of hackers, and in this post ...

Ethical Hacking Fundamentals

This blog post is an introduction to Penetration Testing and Ethical Hacking. We’ll cover the basics of Pen testing and explain why penetration tes...

Confidentiality, Integrity and Availability

Confidentiality, integrity, and availability, often known as the CIA triad, are the building blocks of information security. This post explains eac...

#java

JUnit 5 Annotations With Examples

JUnit 5 is the next generation of JUnit. The goal is to create an up-to-date foundation for developer-side testing on the JVM. This includes focusi...

How to Compare Strings in Java

In order to compare Strings for equality, you should use the String object’s equals or equalsIgnoreCase methods. We will also see why we should not...

Convert List to Array in Java

Converting between List and Array is a very common operation in Java.The best and easiest way to convert a List into an Array in Java is to use the...

Java Create File Examples

Creating files in Java is easy. In this post, we’ll look at four different ways to create files in Java. All we need to do is import the relevant p...

Java Random Number Generation

Generating random numbers in Java is a common task. For example, you might want to execute tests with random values each time. In this post, we loo...

#http

HTTP Basics for Software Testers

In this article, we’ll explain some of the most common HTTP terminologies and their meanings. This knowledge is especially useful when testing APIs.

#linux

Linux ls Command - List Files

The ls command lists the contents of a specified directory. In this post we explain all the options available for the ls command.

How to Transfer Files in Linux with SCP and Rsync

In this tutorial we will explain how to use SCP (Secure Copy) and Rsync, two commands that can be used to transfer files between two machines.

#node js

Node.js - Hello World HTTP Server Example

In this example we’ll show how to create an HTTP server using Node.js. The server will listen on port 1337, and will send Hello, World! to the brow...

#networking

Network Scanning Techniques

Network scanning refers to the process of obtaining additional information and performing a more detailed reconnaissance based on the collected inf...

Network Protocol Basics and Terminologies

This post gives an overview of network protocols and covers some common network protocol terminologies with examples.

#devops

Network Protocol Basics and Terminologies

This post gives an overview of network protocols and covers some common network protocol terminologies with examples.

#bash

Linux ls Command - List Files

The ls command lists the contents of a specified directory. In this post we explain all the options available for the ls command.

#qa

How To Setup a QA Function From Scratch

It is a usual scenario: a startup company has a new idea and hires a number of developers to build a working model of the idea.

Severity and Priority - What is the Difference?

Both Severity and Priority are attributes of a defect and should be provided in the bug report. This information is used to determine how quickly a...

What to Include in a Bug Report?

How to Write a Good Bug ReportWriting a good defect or bug report goes a long way in identifying and resolving the problems quickly. In this post, ...

How To Setup a QA Function From Scratch

It is a usual scenario: a startup company has a new idea and hires a number of developers to build a working model of the idea.

Test Automation Advantages and Disadvantages

Test Automation, when done correctly can have many advantages and be very beneficial to the project and organization. There are however some pitfal...

#automation

Test Automation Advantages and Disadvantages

Test Automation, when done correctly can have many advantages and be very beneficial to the project and organization. There are however some pitfal...

#tips

Test Automation Advantages and Disadvantages

Test Automation, when done correctly can have many advantages and be very beneficial to the project and organization. There are however some pitfal...

#agile

How To Setup a QA Function From Scratch

It is a usual scenario: a startup company has a new idea and hires a number of developers to build a working model of the idea.