IP Spoofing Attack Types

I’ll explain some common IP spoofing attacks using stories and examples that are easy to understand. 1. Man-in-the-Middle (MitM) Attack Imagine you’re passing notes to your friend in class, but the class bully intercepts them and pretends to be both you and your friend. Story: Sarah and Tom were chatting online about planning a surprise party…

ISTQB Foundation study content for a Tester

ISTQB Contents Software Testing is a systematic method that controls whether a software product matches expected requirements and that ultimate goal is to ensure that the final product is Defect free. Though thinking that a software is free of defects principaly considered as deceiving. And “Absence of defect through a testing process does not mean no defects are present.”…

Test Tools

“A test tool is a software product that supports one or more test activities, such as planning and control, specification, building initial files and data, test execution and test analysis.” Definition above is provided in the ISTQB foundation level dictionary. In phylosophy I feel it shoul be more than a software in the mind of…

Use Case Testing

Use Case Testing is a functional black box testing technique. It helps testers to identify test scenarios to exercise the whole system on each transaction basis from start to finish (“End to end testing“). It makes sure that the user performs its function successfully, without any interruption or error. Use case testing is not performed to determine the quality…