Browsing articles from "August, 2012"
Aug 6, 2012
admin

Cross-Browser Testing

Lets discuss a type of compatibility testing which is known as cross-browser testing, which is mostly “forgotten and ignored” in many projects with web based applications, or even with organization’s internal applications but with multiple browsers installed in their environments.
Several reasons which makes cross-browser testing as “Forgotten and ignored” , because a project team ,
1. Only considered testing the application/website on the browser (s) of choice
2. Considered it, but don’t have the “time” to do cross-browser testing across all browsers
3. Tested in the latest versions of two browsers of choice
Browsers generally use different layout engines, as well as having differences in the way they present and handle code. It is for this reason, that unless you are in a severely locked down environment with one installed browser, and nobody in the world outside your organization needs to use whatever it is that you are developing, then you need to perform cross-browser testing.

Not everyone uses the same browser. Similar to how everyone is running on a different operating system, you can’t expect all people to be using the same web browsing tool.
So what are the options? The data about current browser share varies depending on the source and the region, but in general, Internet Explorer, Firefox, Chrome, Safari, and Opera make up most of the market share, with Internet Explorer dominating the market.When there are so many different options out there, each running their own rendering engine, how do you ensure that your web design or application will hold up in each of them?

You do not need to go to the point of ridiculous and test every version of every possible browser.
But if you are developing something which will be seen in world wide web, and you want to ensure that it does not break or contain high severity bugs that may actually cost you more money to fix than to test, then you need to test it on the latest versions of the most popular browsers.

Why the latest versions? Because in the real world, people do update their browsers automatically from the internet. This update is usually with minimal impact on their browsing experience.
If you are lucky enough to be developing something that can be reached *from* the internet, you could also make use of Browsershots to give you visual feedback on a wide range of browsers. Be aware that if you are testing with sensitive data, do not consider using that option.

Below goes some help available on the web for cross-browser testing.
Adobe Browser Lab
(https://browserlab.adobe.com/)

Adobe Browserlab offers an awesome solution for viewing on demand screenshots of your site. This is usually my go-to program for testing in various browsers.

Browsrcamp(http://www.browsrcamp.com/)
Allows you to test the compatibility of your design with Mac OS X browsers.

The next time that you are on a Web application testing project, ask the question if it is not already discussed… “Are we testing on multiple browsers?”
And if you want to be noticed as a thinking tester, do ask, “Are we testing mobile phones? In which platforms? Android? Ios/iPhone? Do we have an interface optimised for mobile browsing?”
Sometimes, you will be amazed to hear that it has not been thought of yet.

I plan to discuss on testing your site in some web based mobile emulators in my next article

Aug 3, 2012
admin

Your Data is Everywhere

Your data is everywhere. Here now. Was there yesterday. It’s on devices you own and devices you don’t.
It’s being accessed from within the office, on the move. It’s up in the cloud, it’s back on the ground – somewhere, anywhere. Meanwhile, the constantly shape-shifting shadow of data loss looms over every business.

You must see how ready your organisation is to tackle these new security challenges. You must know
how your state of security-readiness compares to typical enterprises, the areas of concern
and prioritise your security.

Data Theft means theft of different forms of electronic data stored in a corporate network in various forms,formats and location. Data can be stolen either by an outsider if he/she gets access to your data sources or by the employees of the firm themselves.

Data theft occurs when an outsider/insider gets access to your data and uses it for malicious purposes either by copying it through some form (using Flash drive, CD/DVD etc) or transfering (through ftp, mail, IM etc) it to some different location

Data Theft can be prevented by finding out how much of data is currently exposed in a corporate network
through different data sources and contiuosly monitoring data usage so as to prevent if some confidential data is going outside.

Let me share two examples of small business data security incidents.In the first incident an employee left a company (let’s call Company C), but the employee’s email account was not turned off. There were no checks setup at Company C to delete employee access (email, network, etc), and the work email account was being forwarded to the former employee’s personal email. While employed with Company C in a sales management role, the employee had setup a competing company, and when the employee left Company C, he continued to receive sales lead emails from Company C’s clients.
This continued for several months, and today Company C is having to spend several thousands of dollars in litigation in addition to facing the loss of several key clients.

The second incident involved a colleague of mine. Her healthcare provider’s office was broken into,
and the computer was stolen. This computer contained the financial and personal information of hundreds of patients. Personal banks accounts were accessed and money was stolen among other things.
When a credit card is breached it is a major inconvenience, but it can be stopped relatively quickly.When a bank account is breached, it becomes a much more difficult issue to deal with and fix.
This business lost the trust of hundreds of patients in addition to putting their financial and
personal information at risk. This could have been easily prevented by encrypting the computer, which by the way can also be done for free.

The following steps highlight the security plan for any business.

Step-1 Asset Identification/Classification and Risk Assessment
(i) Identify Information Assets
(ii) Classify Information Assets
(iii) Risk Assessment of Information Assets
Step 2 – Network and Physical Access Security Controls
(i)Network, Computer, and Email Access Controls
(ii)Review of Access Controls
Step 3 – Network and Personal Computer Security Controls
(i)Encryption
(ii) Anti-Virus/Anti-Spyware
(iii)Downloads and System Acceptance
(iv) Firewall and Internet Connection
Step 4 – Paper document controls
(i)Information Classification Policy
(ii)Shared Documents
(iii)Filing Cabinets
Step 5 – General security controls
(i)Employee Background Checks and Training for new Hires
(ii)Third Party Review
(iii)Visitor Policy
(iv)Incident Management System
(v)Emergency Response Plan

For more details and consulting, contact lee.dave@aretetestlabs.com

Aug 1, 2012
admin

Arete TestLabs- Why?

Arete TestLabs ia an independent software testing company that prides itself on offering software testing services that matters to your business. By this we mean, we only recommend software testing that offers value to your business and your clients.

We make our most sincere efforts to understand your business and the software testing we recommend and perform reflects this.

At Arete TestLabs , We’ve grown in knowledge and understanding of what software testing means. We’ve studied software testing, software development and many other fields because we want to be the best software testers in India .

We want to share our testing ideas with you. We believe they will help you add value to your testing in a practical and visible way.

We are confident that you will like the testing we do, why not give us a call?

 

August 2012
M T W T F S S
« Jul   Sep »
 12345
6789101112
13141516171819
20212223242526
2728293031