Technical articles
-
Security testing: SQL injections
13.12.2023In this article, we will look at the basic concepts of SQL injection, discuss some common examples, and you will also learn how to find and use different vulnerability types and how to prevent SQL injection.
-
Bug clustering
05.12.2023Being one of the 7 fundamental principles of testing, bug clustering is not just a theoretical concept. So, let’s talk about such a concept as «bug clustering».
-
How to know that there are enough test cases
28.11.2023Quality Assurance (QA) plays an important role in IT product development. QA specialists use test design techniques along with other tools to detect errors and bugs.
-
What are briefing and debriefing in games
21.11.2023You have probably noticed many times text messages that appear before or after completing a task. They are called briefing and debriefing, so today we are going to talk about these concepts.
-
Test progress monitoring
14.11.2023To conduct effective and successful testing of any software, there are special management techniques that help to track the testing process in order to improve its quality and efficiency. Such techniques are called test monitoring and control. In this article, we will look in more detail at what they are, what metrics are, and why they are important.
-
Mobile website testing checklist
31.10.2023Nowadays, we spend most of our time using our mobile devices. Mobile websites are in no way inferior to full versions of websites on PCs, on the contrary, sometimes they are more accessible and popular precisely because of the high level of mobile device use and their convenience.
-
Concepts of RPG and MMORPG and their differences
31.10.2023If we want to consider the concepts of RPG and MMORPG, as well as their differences, we should start with the fact that RPG and MMORPG are genres of computer games.
-
How to display the resource monitor in Windows
17.10.2023Resource Monitor is the most comprehensive Windows tool that you can use to fix system performance issues. With its help, it is possible to evaluate the use of the processor, RAM, network in Windows, etc.
Different methods to open the resource monitor on Windows 11 will be discussed in this article. -
Database testing: what to look for
10.10.2023We can no longer store information in paper folders on desks or bookshelves as technology advances. It would require too much paper and huge areas of space to store this paper. Instead, data centers with hard drives have replaced this method of storing information and databases have been invented, where masses of information are stored, processed, and structured.
-
Authentication, authorization, and identification: how not to confuse
05.10.2023There are three concepts to explain access control in cybersecurity: identification, authentication, and authorization. Although these terms are closely related, they have differences that need to be clarified in order to have a good understanding of the correct terminology.