Posts

Showing posts from October, 2020

Create GUI Map- Software Testing

 The first stage is to create the GUI map so WinRunner can recognize the GUI objects in the application being tested. ➢ Use the Rapid Test Script wizard to review the user interface of your  application and systematically add descriptions of every GUI object to the GUI map ➢ Alternatively, you can add descriptions of individual objects to the GUI map by clicking objects while recording a test The GUI Map is made up of all currently loaded GUI Map files. GUI Map files are viewed in the GUI Map Editor. The GUI map file  contains the logical names and physical descriptions of GUI objects. WinRunner stores information it learns about a window or object in a GUI Map. 

WinRunner Testing Modes

WinRunner Testing Modes  ➢ WinRunner facilitates easy test creation by recording how you work on your application.  ➢ As you point and click GUI (Graphical User Interface) objects in your application,  ➢ WinRunner generates a test script in the C-like Test Script Language (TSL).  ➢ You can further enhance your test scripts with manual programming.  ➢ WinRunner includes the Function Generator, which helps you quickly and easily add functions to your recorded tests The WinRunner Testing Process 1. Create GUI Map 2. Create Tests 3. Debug Tests 4. Run Tests 5. View Results 6. Report Defects

Phishing- Cyber Security

Phishing  Phishing is the use to social engineering tactics to trick users into revealing confidential or sensitive  information. Phishing has become a universal phenomenon and is still a major threat in the present  era. Attackers take advantage of various contemporary incidents to craft threatening or enticing  messages which makes the users click fake links and provide necessary information for the attackers.  Wikipedia defines phishing as criminally fraudulent process of attempting to acquire sensitive  information such as usernames, passwords and credit card details by masquerading as a trustworthy  entity in an electronic communication. E-mail is a popular medium used in the phishing attacks and such emails are also called as spam.  However, not all emails are spam emails. It is important to understand these types of emails with  which we deal every day. We will discuss about two such emails:  Spam emails Hoax emails.

Key Loggers- Cyber Security

  Key Loggers A keylogger is a software or a program to capture keystrokes and other information on the victim  machine while the user is typing on the machine. The information is captured in a covert manner and  is sent to the hacker who might be at a remote location. Keyloggers can be classified into two types:  Software keyloggers  Hardware keyloggers Software keyloggers Software keylogger is a program installed on the victim machine for keylogging. The keylogger can  be installed without the knowledge of the target user by sending is as an attachment to an email or  through other means like virus, worm, or a trojan. Software keyloggers are generally spread as trojans  and viruses. A keylogger generally contains a DLL files and an EXE file. Hardware keyloggers Hardware keyloggers are small physical devices which can be inserted or attached to target computer  systems or other electronic machines to capture the keystrokes. To install these ...

WinRunner Tool - Software Testing

 If you have ever tested software manually, you are aware of its drawbacks.Manual  testing is time-consuming and tedious, requiring a heavy investment in human  resources. Worst of all, time constraints often make it impossible to manually test every  feature thoroughly before the software is released. This leaves you wondering whether  serious bugs have gone undetected.   Automated testing with WinRunner addresses these problems by dramatically  speeding up the testing process. You can create test scripts that check all aspects of  your application, and then run these tests on each new build. As WinRunner runs tests,  it simulates a human user by moving the mouse cursor over the application, clicking  Graphical User Interface (GUI) objects, and entering keyboard input—but WinRunner  does this faster than any human user.

Anti Forensic Cyber Security

 Anti-forensics can be a computer investigator's worst nightmare. Programmers design anti-forensic tools to make it hard or impossible to retrieve information during an investigation. Essentially, anti-forensics refers to any technique, gadget or software designed to hamper a computer investigation. There are dozens of ways people can hide information. Some programs can fool computers by changing the information in files' headers. A file header is normally invisible to humans, but it's extremely important -- it tells the computer what kind of file the header is attached to. If you were to rename an mp3 file so that it had a .gif extension, the computer would still know the file was really an mp3 because of the information in the header. Some programs let you change the information in the header so that the computer thinks it's a different kind of file. Detectives looking for a specific file format could skip over important evidence because it looked like it wasn't r...

Conductors, Insulators and Semi Conductors

 The DC electrical flow inside the computer, or outside for that matter, travels over a conductor, which is any material, such as copper or gold, that readily carries electricity without much resistance. It is common that a conductor is wrapped or coated by another material, called an insulator, such as rubber, that is not a good conductor of electricity. A good and easily found example is the cord to your lamp. Most likely it is a rubber cord with copper wires inside. The copper wire is the conductor and the rubber coating is the insulator. Many of the electronic components inside the computer are neither conductors or in- sulators. They are made of materials, such as silicone, that is both and neither a conductor or an insulator. These materials, which can be made chemically and electronically to be either conductive or insulating, are called semiconductors. Depending on the type and purpose of a circuit, a semiconductor can be set to provide the right action. A semicon- ductor c...