What is Perl Testing?
- Testing of data base queries
- Testing of objects
- Testing of web sites and so on.
- Development of TAP
- Standardization of TAP
- Writing of test consumers
- Writing of test producers
- Evangelization of the language and so on.
Articles, comments, queries about the processes of Software Product Development, Software Testing Tutorial, Software Processes .
Posted by
Sunflower
at
10/25/2012 02:28:00 PM
0
comments
Labels: Automated, Automation, Code, Coding, Creation, Developers, Functionality, Languages, Libraries, Perl Testing, Protocol, Quality, Requirements, Software testing, Specification, Test Suites, Testers, Web site
| Subscribe by Email |
|
Posted by
Sunflower
at
9/27/2012 03:50:00 PM
0
comments
Labels: Application, Automatic, Automation, Broken links, Browsing, Check point, Functionality, Links, Manual, Page, Properties, QTP, Quick Test Professional, Record, Testing, Testing tools, Users, Web page, Web site
| Subscribe by Email |
|
Posted by
Sunflower
at
5/12/2012 11:39:00 PM
0
comments
Labels: Application, Attackers, Commands, Data, Database, Inference SQL injection attack, Security, SQL, SQL injection, SQL injection attack, SQL statements, Statements, Techniques, Types, Web form, Web site, Websites
| Subscribe by Email |
|
SQL injection attacks are one of the top 10 security vulnerabilities for web sites and applications as it has been declared by the open source web security. Being such a great threat, few measures have been designed to curb this SQL injection attack thing.
FACTORS CONTRIBUTING TO SQL INJECTION ATTACKS
SQL injection attacks are so very common these days. It is probably due to two main factors:
- The prevalence of the vulnerabilities related to SQL injection attacks are significant.
- The target of the SQL injection attacks i.e., web site’s or web application’s data base appears very attractive and useful to the attackers since it contains all the critical as well as sensitive data of the site or the application.
SQL INJECTION MEASURES
Here we are going to discuss those SQL injection measures.
- First thing to avoid the SQL injection attacks is to understand how exactly these attacks occur.
- An SQL injection attack occurs whenever a query is created by the dynamic data base of the web site.
- These queries contain nothing but the input entered by the user.
- When you know what actually is making it easy for the attackers to carry out an SQL injection attack on a web site or web application, it seems very easy to avoid the SQL injection attacks.
HOW TO AVOID SQL INJECTION ATTACK
There are 2 ways for avoiding the attacks which have been discussed below:
1. Dynamic queries should not be written. Some alternative for dynamic queries can be used.
2. The input supplied by the end user for malicious SQL statements. Queries containing such statements should be prevented from entering in to the data base as it will affect the code logic used in the query.
The above two ways can be used with any of the available programming languages and also with data bases of any type.
DEFENSE TECHNIQUES TO AVOID SQL ATTACKS
There are some primary defense techniques which you can follow to avoid SQL injection attacks. They have been stated below:
Defense 1:
- Escaping the input supplied by the user.
- Here the query statements are already prepared by the web site or web application developer.
- These queries are very easy to understand and also do not require much efforts like the dynamic queries.
- This method is implemented as follows.
- The developer is first asked to define the code for all the SQL statements.
- The defined code is then passed in to the respective parameter later when required.
- This technique grants the data base the ability to distinguish between the data and the code irrespective of what data the user has entered.
Defense 2:
- The web sites and web applications can make use of pre- designed queries or parametric queries.
- This approach is used when the other two fail.
- But, this is not much strong as the other two approaches.
Defense 3:
- The web sites and web applications can make use of pre- designed procedures.
- They are implemented in a way similar to that of the prepared statements.
In addition to these primary defense techniques, there are some additional defense measures which can be followed as well if you are not satisfied with the security offered by the primary defense techniques:
ADDITIONAL DEFENSE MEASURES
- Provide the least valued privileges.
- The web site or application developer can carry out a white list check for validation of the input queries. This proves to be effective since the non validated parameter which when appended to a query generated by the user, allows the attacker to inject the malicious SQL statements in to the data base of that particular web site or application. This method of injecting SQL statements in to the data base is used quite often by the attackers.
Posted by
Sunflower
at
2/15/2012 03:09:00 PM
0
comments
Labels: Application, Attackers, Commands, Database, Methods, Security, SQL, SQL injection, SQL injection attack, SQL statements, Statements, Techniques, Types, Web Applications, Web site, Websites
| Subscribe by Email |
|
SQL is the most rated vulnerability of today’s software world. SQL injection is emerging as a popular means for harming the security of the websites.
How exactly an SQL injection attack takes affect?
- In an SQL injection attack, some statements written in SQL language are inputted in a web form.
- This is done to obtain a web site that will carry out operations on the data base.
- Such obtained web sites through SQL injections are often badly designed.
- The attacker uses this badly designed web site to get the access of the data base contents.
- The web site can be used to carry out other operations also as desired by the attacker.
- It is a kind of code injection technique and is often employed for exploiting the security vulnerability in the software of the web site.
An injection attack occurs through two common mistakes which are:
1. Incorrect filtering of the user input for escape characters in string literals which are embedded in the SQL statements. Here becomes a scope for the potential manipulation of SQL statements. The manipulation is done by the end user who is using the data base.
2. The unexpected execution of the input entered by the user that has not been strongly typed. This is referred to as incorrect type handling. The constraints are left unchecked.
What can a SQL injection attack do?
- The SQL commands designed by the attacker are injected in to the data base of the web site or application via a web form through any of the two methods.
- These commands are capable of changing the content of the data base or they can even dump to the attacker’s wish.
- SQL injections attacks can even attack SQL databases rather than only attacking the web sites or web applications.
- SQL injection attacks can be prevented by the use of structured query language which is well designed and defined.
- Such attacks are usually aggressive. SQL injection attack is abbreviated to SQLIA.
According to a research, under normal usage an application experiences 71 attempts per hour in contrast to the 800- 1000 attempts per hour under a direct attack.
SQL injection attack has been declared by open web application security project as one of the top 10 vulnerabilities. It can be divided into 5 sub categories as listed below:
- Classic SQL injection attack
- Interactive SQL injection attack
- Inference SQL injection attack
- Compounded SQL injection attack and
- DBMS specific SQL injection attack
Types of SQL Injection Attack
- Classic SQL injection attack is not feared today since it has become out- dated.
- But, still many web sites and web applications are precautious against it.
- Inference SQL injection attack continues to be a great threat.
- Attackers mostly prefer this method since it is very flexible in deployment and dynamic in nature.
- Compounded SQL injection attack is a new kind of SQLIA.
- It is resultant of combination of SQL injection and web applications such as:
a) DOS attacks + SQL injection
b) DNS hijacking + SQL injection
c) Improper authentication + SQL injection
d) XSS + SQL injection
- A representation of compounded SQL injection attack is provided by the storm worm.
- The DBMS specific SQL injection attack is often considered as supportive.
- There is another kind of SQL injection called blind SQL injection attack which is used to defend a web site or application on verge of being attacked.
- The results of the SQL injection attack are made invisible to the attacker.
- This injection attack is time intensive.
Today several automated tools have also been developed for automation of these attacks. But, that also requires the location of the target information.
Posted by
Sunflower
at
2/14/2012 10:23:00 PM
0
comments
Labels: Application, Attackers, Commands, Data, Database, Security, SQL, SQL injection, SQL injection attack, SQL statements, Statements, Techniques, Types, Web form, Web site, Websites
| Subscribe by Email |
|
Web testing as we all know is defined as the software testing which focuses primarily on web applications and web sites. A complete testing of web server and applications is needed before they are presented live to the customers or clients.
Web testing mainly addresses the issues like web security, functionality of a particular site, feasibility and accessibility to the users, ability to handle traffic.
Nowadays there are several tools available for web testing. The most common and popular today being the “WAPT” abbreviated form for the web application performance tool.
What is WAPT?
- WAPT tool has been specially designed for testing the web related interfaces and web applications.
- Furthermore this tool can be effectively used for load testing, stress testing and performance testing of web sites, web applications, and web related interfaces.
- This tool tends to simulate a situation of virtual users.
- There are many challenges faced by WAPT and it is used for determining the compatibility of the browser, operating system and windows applications during the backend testing.
- This tool carries out tests via three kinds of loads namely:
1. Increasing user load
2. Constant user load
3. Periodic user load
These days some frameworks are available that give a tool box for testing the web applications.
Open source web testing tools are also available for web testing. The 2 very most common open source web testing tools are:
- HTTP test tool
It’s a tool based on scripting of the protocols. It is used for testing HTTP protocol based products.
- Apache j meter
It’s a tool programmed in java language. It is basically used for performance measurement and load testing of the web severs and web applications.
Next in the queue of web testing tools are web testing tools based on windows operating system. Few of them have been listed below:
- TOSCA test suite
It’s a software tool and has been designed for automated execution of regression testing and functional testing of the web applications.
- Testing anywhere
It is also an automated testing tool and it has been designed in such a way that it can perform any kind of testing from anywhere via automation feature.
- Test complete
This is another one in the line of automated testing tools. It was developed by the Smart Bear Software firm.
- Silk test
This is also an automation tool and has been designed specially for testing the functionalities of the web enterprise applications.
- Ranorex
- IBM Rational Functional Tester
- HP quick test Professional
It is an automated testing tool specially designed for functional testing and regression testing of the web applications and interfaces by HP.
- HP load runner
It can be called as a software tool from HP designed to carry out automated load testing and performance testing for web servers, web applications and other related interfaces.
Many web testing tools are available for Load testing and Performance Testing of web applications and web sites. Some have been listed below:
- Tsung:
Open source web testing tool. Tests load for multiple protocols.
- Performance Xpert
Performance testing and load testing.
- Load UI
Open source cross platform load testing tool.
- App view web
Cloud computing based performance testing tool.
- Sand storm
Load testing tool which supports testing of mobile, email and web protocols.
- Multi mechanize
- Load 2 test
- Xceptance load test
- Site Blaster
- Load intelligence
- Load storm
Some java based web testing tools have also been designed:
- Arquillian
- RTI
- Your kit java profiler
- Visual VM
- LAPSE
- Check marx
- Windows licker
- Cobertura
This is not the end of the list. Still there are many more. A new and improved tool is being developed every now and then.
Posted by
Sunflower
at
1/19/2012 10:40:00 PM
0
comments
Labels: Applications, Automated, Clients, Design, Framework, Functionality, Interfaces, Performance, Protocols, Security, Testing tools, Tools, Users, WAPT, Web page, Web servers, Web site, Web testing
| Subscribe by Email |
|
Apart from keyword analysis, other important elements of search engine optimization are:
- Page uses HTML links. These HTML links needs to be optimized and is an important element of search engine optimization. The HTML code should consists of search items which tells the search engine what is the page about. The following things should be optimized like page title, page headings, image text and link anchor text.
A good page title will not only be keyword targeted but also will entice a person to click on it in the search results.
- For good search engine optimization, good page content is also important. The content should be of high quality and unique. It should not be copied from other sites. A god content enhances the search.
- The code enhancement process determines your page rank on search engines. It understands the structure or pages of the website.
- Link building becomes very important for search engine optimization. It improves the ranking of the web page or web site.
Posted by
Sunflower
at
6/15/2011 07:47:00 PM
0
comments
Labels: Code, Content, Elements, Keywords, Link, Optimize, pages, Search, Search engine, Search Engine Optimization, SEO, Web page, Web site
| Subscribe by Email |
|
SEO web design is one of the most appropriate strategies to keep the competition.
A successful search engine optimization has few important elements includes a well targeted keyword focus, strong page element optimization and good quality content.
Keywords are most important element for search engines. These keywords are what search strings are matched against.The most crucial step is to find the correct keyword that can be used to optimize.
- Choosing the right keyword to optimize. It is best to focus on less competitive and highly specific keywords. The keyword should have the property of describing what is the purpose of your website. Also, check whether these keywords are relevant to your website or not.
- The website should be rich in keywords and have good keyword density. It is a measure to judge how relevant is the page.Keeping 5 to 10 keywords is termed as OK keyword density. Keyword stuffing should not be practiced.
- Quality of keywords and their position on the seb page is also very important. Keywords that appear in the heading, title are more effective than the keywords that are placed at the bottom.
- A balance has to be there between url keywords and site usability.
- The contents of page title tag are displayed during search so this is the special place where keywords can be given.
- From an SEO point of view, it is good to have as many headings with good keywords in it. The headings should not be very long as readability becomes difficult.
Posted by
Sunflower
at
6/14/2011 04:03:00 PM
1 comments
Labels: Effective, Elements, Focus areas, Headings, Keywords, Optimize, Page, Purpose, Search engine, Search Engine Optimization, SEO, Strategies, Usability, Web site
| Subscribe by Email |
|