- Image check point
- Standard check point
- Table check point
- Bit map check point
- Accessibility check point
- Page check point
- Text check point
- XML check point
- Data base check
point
Wednesday, October 3, 2012
What is Accessibility Checkpoint in QTP?
Posted by
Sunflower
at
10/03/2012 02:30:00 AM
0
comments
Labels: Accessibility Checkpoint, Application, Automated, Automation, Check points, Current, Environment, Expected, QTP, Quick Test Professional, Software System, Testing tools, Types, Value, Web, Web page, Website
![]() | Subscribe by Email |
|
Monday, August 27, 2012
Is load testing possible using WinRunner? Does WinRunner help you in web testing?
How is load testing possible using WinRunner?
How WinRunner helps you in web testing?
- Back button
- Forward
buttons
- Navigate
buttons and so on.
- Text links
- Frames
- Images
- Web form
objects
- Tables and so
on.
- identification
of the objects
- Retrieval and
checking of the property values.
- Performing web
functions.
Posted by
Sunflower
at
8/27/2012 03:55:00 PM
0
comments
Labels: Action, Application, Automated Testing Tool, Automation, Browse, Client, Events, Functionality, GUI, HTML, Load, Load Testing, Objects, Recording, Session, Software System, Users, Web browser, Website, WinRunner
![]() | Subscribe by Email |
|
Saturday, July 28, 2012
What is virtual user script? Why do you need to parametrize fields in your virtual user script?
What is a Virtual User?
What is a Virtual User Script & Need to Parametrize fields?
- Static
text
- Edit
text
- Pictures
- Icons
- User
items and so on.
- Select
- Drag
- Type
- Close
- Click
and so on.
Posted by
Sunflower
at
7/28/2012 10:52:00 PM
0
comments
Labels: Application, Behavior, Capacity, Fields, Functions, Load, Parameters, Parametrize, Scripts, Simulate, Software System, Statements, Stress, Tasks, Testing, Users, Virtual, Virtual Script, Virtual user, Website
![]() | Subscribe by Email |
|
Friday, July 20, 2012
Explain how the data is secured in HTTPS?
How data is secured in HTTPS
- Request URL
which states the particular web page that was requested.
- Query
parameters
- Headers
- Cookies containing
the identity information about the user and so on.
Negative Points of HTTPS
- Authenticating
the web pages,
- Providing
security to the accounts,
- Maintaining
the privacy of the user communications, web browsing and identity.
Posted by
Sunflower
at
7/20/2012 12:57:00 PM
0
comments
Labels: attacks, Clients, Communication, Content, Data, Encryption, HTTP, HTTPS, Hyper text transfer protocol secure, Internet, Negative, Network, Protection, Protocol, Security, Servers, Users, Web server, Website
![]() | Subscribe by Email |
|
Sunday, July 15, 2012
Describe some Caching Issues?
What are different caching issues?
Wednesday, July 11, 2012
What is website usability testing?
- It checks if the web site or the web
application is being used by a series of individuals under some guidance
from a facilitator.
- It checks whether or not the web site
or the web application can be successfully used by the outsiders.
- It checks if the web site or the web
application is focusing only on a particular group.
- Observer: An observer is the person in
charge of the observation of the of the test that is in progress and he/
she often sits in another room.
- Facilitator: He/ she is the person in
charge of the guidance of the user while the usability test is under
progress and takes relevant notes.
- Owner: Owns the web site or the web
application.
- Web site development team: This team
constitutes of all the people who are involved with the development and
maintenance of the web site or the web application. It includes the
following:
- User: The person who uses the web
application or web testing during the usability testing.
- Usability: It can be thought of as a
measure up to which the intended user achieve his/ her goals using the web
site or web application that is under test.
- At the time of the conception of the
web site you can start by testing a printed mock up of the home page of
the site.
- Before a re development plan is
created.
- Repeatedly during development.
- Whenever an anomaly shows up in a
traffic analysis.
- When the owner of the web site calls
for some info regarding his web site or web application.
Posted by
Sunflower
at
7/11/2012 03:29:00 PM
0
comments
Labels: Development, End users, Functionality, Observer, Owner, Quality, Quality assurance, Site, Software testing, Team, Testers, Tests, Time, Usability, Web Applications, Website, Website Usability Testing, Websites
![]() | Subscribe by Email |
|
Wednesday, May 30, 2012
Explain the concepts of URL manipulation?
Components of URL
- The scheme name which is usually a protocol.
- The scheme is followed by a colon
- Two slashes
- Name of the domain (if any depending on the
scheme).
- A port number
- CGI (common gateway scripts) scripts
- Query string
- Fragment identifier (optional)
Categories of URL
What is meant by URL Manipulation?
What is URL Poisoning?
Posted by
Sunflower
at
5/30/2012 11:55:00 PM
0
comments
Labels: Categories, Characters, Components, Domain, files, Internet, Parameters, Protocol, Resources, Server, Strings, Technique, Uniform Resource Locator, URL, URL Manipulation, Web pages, Website
![]() | Subscribe by Email |
|
Thursday, March 15, 2012
What are different kind of browser bugs?
It is a universal fact that every thing in this world is infected with some discrepancies. So does it hold well for the web browsers! This article is here to discuss about the bugs associated with the web browsers.
Till date so many bugs of the web browsers like Mozilla, internet explorer, Netscape, opera and so on have been discovered. Let us check out some of the prominent errors:
Multiple browsers bugs
Bugs discovered under this category are:
(a) Font variant ligatures are not implemented by most of the bugs. The font module level 3 of the CSS defines the property of the font variant ligatures to specify the use of ligatures. Till now no such browser has been developed that supports this property fully.
(b) Font weight is not implemented consistently by the browsers. This font weight property of CSS lays down the specifications regarding the numeric values and key words.
(c) Data tables are not managed properly by the browsers. Most of the table properties are not supported by the browsers.
(d) Layout affected by outlining property.
(e) Styling legend tags
(f) Bugs in Mozilla Firefox
Styling is not applied and problems have been experienced with the horizontal scroll bar.
(g) Bugs in Internet Explorer
When the cursor is hovered over some elements, they did not work properly with the forms; the left origin of the positioning coordinates is incorrectly set.
(h) Bugs in Opera
&rsquo and &isquo entities were not recognizable by the opera, but this was later fixed in the 8th version.
(i) Bugs in Safari
These crashes were reported when : hover :: after was used.
(j) The borders separating the head and the body sections are often placed incorrectly by the opera.
(k) Multi-column ordered list remembering.
(l) Backgrounds show through invisible tables.
(m) Buttons with images cannot be aligned with those having only text.
(n) In some browsers even the fixed elements align along with the adjacent elements.
WHAT CHALLENGES ARE FACED WHILE DEVELOPING A WEBSITE
- When you start developing or designing your web sites choose carefully between the CSS and HTML.
- Don’t go for such an advance version of the languages because if you did then you may run in to the problems with the incompatibility of the browser.
- There is so much of competition going around the whole software market.
- The browser developers are releasing new browsers at very fast pace without even testing them properly which then becomes a headache for the web site designers.
- The new languages being used today like HTML 5 and CSS 3 are now gaining very much popularity though they are pretty much complex then their preceding versions.
- Number of features to be implemented is quite huge which is the major cause of the bugs.
- Whenever you come across a bug, do not forget to report it since it may be so very rare that nobody else would have stumbled up on it.
- One thing you should always remember is to keep the problem in the reduced form as much as possible.
- For doing this you an simply make up a copy of the code and from that remove the java script or CSS files one by one and ultimately you’ll come at a point when the problem will go away.
- Now you add that file and remove the others from the ones that you did previously.
- If you find that the bug is now going away even after removing all the files then it is likely that the bug lies in HTML coding.
- Now after you know that which aspect houses the problem, you need to locate that file or code.
Posted by
Sunflower
at
3/15/2012 11:54:00 PM
0
comments
Labels: Browsers, Bugs, Challenges, Compatible, Defects, Design, Elements, Font, HTML, Keywords, Tables, Tags, Text format, Web Applications, Web browser, Web pages, Website
![]() | Subscribe by Email |
|
Sunday, March 11, 2012
What is meant by content spoofing in detail?
Content spoofing is a rarely discussed topic and is much unheard by the many of us!
So let's evaluate the concepts of content spoofing in detail:
- Content spoofing has been categorized as an attack technique using which the attacker is able to inject a malicious code or payload in to the good content of a web site or a web application.
- This malicious payload or code is later thought of as being the legitimate content of that particular web site or web application which is a wrong interpretation.
- Content spoofing affects usually the web pages which have been built dynamically.
- Text only content spoofing is the technique in which the payload usually as text is passed in to the body of the web page or application in the form of a query string value.
- This approach usually takes effect on the pages of the web sites displaying some news entries and error pages.
- Such content is then later posted on the web site as its legitimate content.
- So when the users visit that particular link they perceive that the spoofed content is nothing but the legitimate content.
- In some cases it is possible that the pay load may exist on the web page for a longer time than estimated.
- Most of the web pages have been built dynamically with the sources from the HTML (hyper text mark up language).
- The attacker can easily change the content and when the particular web page is accessed by a browser, the location comes of the same domain as the user expected but the user does not come to know that the content is not legitimate instead it is shrouded one.
- As this is not enough to harm a web site, some attackers even manage to send malicious links to the users through emails and messages.
- In some cases the malicious links can be enforced up on the users following a cross site scripting attack.
- When the user clicks that link, he/ she visits the web page designed by the attacker with the malicious URL (uniform resource locator).
- The user will not come to know about this that he/ she is actually viewing am unauthentic web page.
- They will unknowingly believe that the spoofed content that they are viewing is purely authentic but this is not the case.
- Content spoofing does nothing but spoils the trust that the user has on the web site.
- The technique of content spoofing is being used like anything for the creation of fake web sites including fake login pages, press releases and defacement.
- Another point to be noted is that if you can fall victim to a cross site scripting attack, then the chances are that you may fall prey to content spoofing attacks as well.
- Content spoofing is a type of exploitation activity used by the hackers who have wrong intentions like presenting certain web pages to the user as if they are legitimate and not from an external source.
- This is somewhat similar to the SQL injection attacks. In both the cases the victims are defrauded like in phishing.
- Some attackers can even access the data base of a web application stored in a server and alter the contents.
- Content spoofing cannot be readily detected since there is large apparent difference between the actual and the spoofed content.
- The content spoofing carried out with the help of dynamic hyper text mark up language or DHTML is considered to be the most dangerous type since it can be used to form fake login pages.
- When any user inputs his sensitive data (can be a password, credit card number etc) in that page, the data goes directly to the attacker without the knowledge of the user that he has fallen victim to an identity theft.
Posted by
Sunflower
at
3/11/2012 12:51:00 PM
0
comments
Labels: Attackers, Code, Content, Content Spoofing, Database, Detection, Errors, Input, Load, Login, Malicious, pages, Sensitive, Spoofed, Text format, Users, Victim, Web Applications, Web pages, Website
![]() | Subscribe by Email |
|