Q: How many users can I simulate using Visual Studio Team Edition for Software Testers when conducting a Load Test? A: You may simulate as many virtual users as your hardware allows. Licensing is based per processor and not per virtual user. Q: What...
Testing for Trustworthiness
Filed Under:
Articles,
General,
Test Management
Liquidator

How does Testing verify that a product is “Trustworthy”? Is it a fuzzy definition? Is it based on user-perception, marketing, or are there tangible ways we can validate and verify that product is trustworthy ? Trust means more than secure. A web site...
Software Test Automation interview questions
Filed Under:
General,
Tips
Liquidator

Here is a list of probable "Software Test Automation" interview questions that i have compiled. You can use it for your practice :-) 1. What automating testing tools are you familiar with? 2. How did you use automating testing tools in your job?...
Release goals for Security testing
Filed Under:
Security Testing
Liquidator

1. Secure by Default Validate that the product is secure in its default configuration. For this, install the product and configure the product with the default settings. Then perform the appropriate security penetration tests to verify the product is...
Fuzz testing
Filed Under:
Security Testing,
Tips
Liquidator

Fuzz testing a simple technique for feeding random input to applications. There are two types of fuzz testing categories: 1. Completely random data 2. Partially incorrect data Random data is a series of arbitrary bytes sent to the interface that...
Buffer Overflow
Filed Under:
Security Testing,
Tips
Liquidator

Buffer overflows happen when more data is put into a buffer or holding area than the buffer can handle. This is due to a mismatch in processing rates between the producing and consuming processes. This can result in system crashes or the creation of...
Denial of Service
Filed Under:
Security Testing,
Tips
Liquidator

Denial-of-service attacks, some of the most difficult attacks to protect against, are characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service. Common denial-of-service attacks include the following:...