understand the Radio Frequency Interface (RFI)
Tuesday, December 30, 2014
What is Biometric Mouse and USB Security
Biometric Mouse and USB Security
Learn How To Protect your Computer and Data with Biometric Mouse and USB SecurityMicrosoft Excel Tutorial:How to Protect Cells and Worksheets
Excel Tutorial: Protecting Cells and Worksheets
Monday, December 29, 2014
Information Security: Denial of Service (DOS) Attack and Intrusion Deduction System
Denial of Service (DOS): It is an Attack on the Availability of network resources
Ways to Intitiate the DOS are :-
Distributed Denial of Service Attack (DDoS): When a attacker uses a convenient method to distribute trojan horses to as many target machine possible
Security
Intrusion Detection System (IDS) : It is a device that monitors and deduct the suspicious events
Terminology used in IDS
Ways to Intitiate the DOS are :-
- Transmission Failure
- Traffic Redirection
- DNS Attack
- Connection Flooding
Types of Connection Flooding Attack
- ECHO Chargen
- Ping of Death
- Smurf Attack
- SYN Flood
- Teardroop
Distributed Denial of Service Attack (DDoS): When a attacker uses a convenient method to distribute trojan horses to as many target machine possible
Security
Intrusion Detection System (IDS) : It is a device that monitors and deduct the suspicious events
Terminology used in IDS
- Anomaly
- Misuse
- Intrusion
- Audit
- Profiling
- Detect Attach properly
- Monitor System Effectively with minimal resources
Response of IDS
- Monitor the Attack
- Protect system and reduce exposure
- Alter a human
Sunday, December 28, 2014
Saturday, December 27, 2014
Regression Testing
It is a testing performed during change management (when a function/ module/ program is changed or added to the existing software) in order to ensure that new/ changed functions executes properly and integrates with other module as expected.
The purpose of regression testing is to confirm that a recent program or code change has not adversely affected existing features.
Regression testing is nothing but full or partial selection of already executed test cases which are re-executed to ensure existing functionalities work fine.
This testing is done to make sure that new code changes should not have side effects on the existing functionalities. It ensures that old code still works once the new code changes are done.
Integration Testing
Integration Testing is a level of the software testing process where individual units are combined and tested as a group to achieve the objective of Information System.
Is is Necessary to test whether all the modules / functions work together seamlessly and communicate appropriately during execution.
Approaches of Integration Testing :
1. Big Bang is an approach to Integration Testing where all or most of the units are combined together and tested at one go. This approach is taken when the testing team receives the entire software in a bundle. So what is the difference between Big Bang Integration Testing and System Testing? Well, the former tests only the interactions between the units while the latter tests the entire system.
2. Bottom Up Integration : It is used to integrate the Components of the software system starting from smallest module/ functon/ program.
Bottom Up is an approach to Integration Testing where bottom level units are tested first and upper level units step by step after that. This approach is taken when bottom up development approach is followed. Test Drivers are needed to simulate higher level units which may not be available during the initial phases.
3. Top Down Integration : is an approach to Integration Testing where top level units are tested first and lower level units are tested step by step after that. This approach is taken when top down development approach is followed. Test Stubs are needed to simulate lower level units which may not be available during the initial phases.
4. Sandwich/Hybrid is an approach to Integration Testing which is a combination of Top Down and Bottom Up approaches.
Example
Methods of Unit Testing
Methods of Unit Testing
A) Static Analysis TestingB) Dynamic Analysis Testing
A) Static Analysis Testing :-
a) Desk Check method
This is done by the programer to check the logical syntax errors abd deviation from the coding standards.. The Programmer uses paper and pen to verify the Logic of code by jotting down values of data sets and thinking like computer to arrive at possible values.
Example :-
b). Structured Walk Through :
Desk Checks performed with team or peers who scan through the text of the program and explanations try to uncover errors
A structured walkthrough is an organized procedure for a
group of peers to review and discuss the technical aspects of software
development and maintenance deliverables and outputs. The major objectives in a structured
walkthrough are to find errors and to improve the quality of the product. Errors typically occur as omissions or
contradictions, flaws in logic, or inconsistencies in the output style (e.g., poorly
stated requirements and inefficient code).
Structured walkthroughs are not be used to discuss
solutions for the errors found. The
basic purpose of a walkthrough is error detection, not error correction. When the walkthrough is finished, the author of
the output is responsible for taking the necessary actions to correct the
errors. The author may hold private
conversations with reviewers or conduct follow-up meetings to discuss potential
solutions.
Structured walkthroughs are conducted during all phases
of the software lifecycle. Walkthroughs can be conducted in various
formats, with various levels of formality, and with different types of
participants.
In some cases, it might be useful and expedient to
include users in walkthroughs. Management representatives do not participate
in structured walkthroughs. Regardless
of the variations in format and participants, the basic activity (peer review)
and the major objectives (find errors and improve quality) of the structured
walkthroughs remain the same.
c) Code Inspecton :
The Program is reviewed is by a formal committee . Review is done with formal Checklist
B) Dynamic Analysis Testing
a) Black Box Testing
A software testing technique whereby the internal workings of the item being tested are not known by the tester. For example, in a black box test on a software design the tester only knows the inputs and what the expected outcomes should be and not how the program arrives at those outputs. The tester does not ever examine the programming codea nd does not need any further knowledge of the program other than its specifications.
A software testing technique whereby the internal workings of the item being tested are not known by the tester. For example, in a black box test on a software design the tester only knows the inputs and what the expected outcomes should be and not how the program arrives at those outputs. The tester does not ever examine the programming codea nd does not need any further knowledge of the program other than its specifications.
EXAMPLE
A tester, without knowledge of the internal structures of a website, tests the web pages by using a browser; providing inputs (clicks, keystrokes) and verifying the outputs against the expected outcome.
b) White Box Testing
White Box is a software testing method in which the internal structure/design/implementation of the item being tested is known to the tester. The tester chooses inputs to exercise paths through the code and determines the appropriate outputs. Programming know-how and the implementation knowledge is essential. White box testing is testing beyond the user interface and into the nitty-gritty of a system.
This method is named so because the software program, in the eyes of the tester, is like a white/transparent box; inside which one clearly sees.
There are automated tools (like Test tools/ debuggers etc) are available to conduct this type of testing
EXAMPLE
A tester, usually a developer as well, studies the implementation code of a certain field on a webpage, determines all legal (valid and invalid) AND illegal inputs and verifies the outputs against the expected outcomes, which is also determined by studying the implementation code.
EXAMPLE
A tester, usually a developer as well, studies the implementation code of a certain field on a webpage, determines all legal (valid and invalid) AND illegal inputs and verifies the outputs against the expected outcomes, which is also determined by studying the implementation code.
c) Gray Testing
It uses both the Black box testing and White Box testing .
Tester applies a limited number of test cases to the internal workings of the software under test. .
In the remaining part of the grey box testing , one takes a black box approach in applying inputs to
the software under test and observing the outputs.
It uses both the Black box testing and White Box testing .
Tester applies a limited number of test cases to the internal workings of the software under test. .
In the remaining part of the grey box testing , one takes a black box approach in applying inputs to
the software under test and observing the outputs.
Google's Balloon:To bring internet to the remotest places on Earth
Goolge Project : Loon
Google has launched 30 balloons into the stratosphere from New Zealand as it
experiments with ways to bring affordable internet access to the world.
The signals would hop forward, from one balloon to the next, along a backbone of up to five balloons.
Google's balloons fly free and out of sight, scavenging power from card table-sized solar panels that dangle below and gather enough charge in four hours to power them for a day as the balloons sail around the globe on the prevailing winds.
The helium-filled balloons inflate to 49ft in diameter and carry transmitters that could beam 3G-speed internet to some of the 4.8billion people in the world that are not yet online, supplying an area of about 780 square miles - twice the size of New York City.
Far below, ground stations with internet capabilities about 60 miles (100km) apart bounce signals up to the balloons.
Nicknamed Project Loon, the internet giant is sending the superpressure balloons 12 miles up into the air, where they will sail around the globe at twice the altitude of aeroplanes.
Project Loon was developed in the company's X Lab by the same team behind Google Glasses and the driverless car. It is hoped it could save developing countries the high cost of laying fibre cables to get online and lead to a dramatic increase in internet access for the likes of Africa and south-east Asia.
Loon could even provide emergency back-up for areas during natural disasters.
This week the balloons, made from a thin polyethylene film, were released from a frozen field near Lake Tekapo on New Zealand's South Island, where they sailed past the magnificent Southern Alps mountains on their ascent.
'It's pretty hard to get the internet to lots of parts of the world,' Richard DeVaul, chief technical architect at Google, told the BBC.
'Just because in principle you could take a satellite phone to sub-Saharan Africa and get a connection there, it doesn't mean the people have a cost-effective way of getting online.
'The idea behind Loon was that it might be easier to tie the world together by using what it has in common - the skies - than the process of laying fibre and trying to put up cellphone infrastructure.'
Fifty volunteer residents signed up to be a tester for a project that was so secret no-one would tell them what it was for.
Technicians came to the volunteers' homes and attached bright red receivers the size of basketballs that look like giant Google map pins - which every building would need to receive the signal.
Charles Nimmo, a farmer and entrepreneur in the small town of Leeston, was the first tester to get online from the airborne balloons.
Mr Nimmo was able to spend about 15 minutes surfing the web before the balloon transmitting the signal sailed past.
His first stop was to check out the weather. He wanted to find out if it was an optimal time for 'crutching' his sheep, the term for trimming away the wool around a sheep's bottom.
Mr Nimmo is among the many people living in rural areas, even in developed countries, who cannot get broadband access.
After ditching his dial-up service four years ago in favour of satellite internet, he found himself stuck with hefty bills.
'It's been weird,' he said of the Google Balloon Internet experience. 'But it's been exciting to be part of something new.'
Project leader Mike Cassidy said: 'It's a huge moonshot. A really big goal to go after. The power of the internet is probably one of the most transformative technologies of our time.'
People have used balloons for communication, transportation and entertainment for centuries. In recent years, the military and aeronautical researchers have used tethered balloons to beam internet signals back to bases on Earth.
Before heading to New Zealand, Google spent a few months secretly launching between two and five flights a week in California's central valley.
'We were chasing balloons around from trucks on the ground,' said Mr DeVaul.
'People were calling in reports about UFOs.'
TV White Space: White- Fi
What is TV White Space:
Television White space technology works like wi-fi on a bigger scale to provide wireless connectivity across 10 km radius at a speed of upto 16 mbs, by using chunks of airways lying between spectrum kept untouched by broadcasters to avoid interfaces or disturbances between transmission.
The white- Fi technology has already been successfuly implemented in the US and Singapore ans is being tested in Kenya, the Phillippines , South Africa and Tanzania among others. It works on chunks of unused spectrum available in broadcasting brands in the lower frequencies from 200 MHz to 700 MHz.
Accroding to Microsoft, it cost less than Rs 10 Lakhs to install a white space technology router.
For India , the company proposes to make use of as much as 19% of spectrum unused by Doordarshan , the national TV broadcaster , in the sub -GHz brand.
Thursday, December 25, 2014
Functional Point Analysis :Software Size Estimation
Function Point Analysis : Meaning
Function Point Analysis with Example
Function Point Analysis with Example
Wednesday, December 24, 2014
Scope Creep
Project Scope Creep
Example of Scope Creep and How to Deal with it
Meaning :
Scope creep refers to a project that has seen
its original goals expand while it's in progress. As the term suggests, scope
creep is a subtle process that starts with small adjustments and ends up
resulting in projects that take far longer to complete or even fail before they
are finished. Even if the project is completed, scope creep can result in final
deliverables that look nothing like what was originally envisioned. Scope creep may also be called creep of scope.
Reasons
for Scope Screep
Scope creep can occur
for a number of reasons, including:
- A poor understanding of the
original project
- Changing market conditions
- Competing forces within a
company
To avoid the worst kinds of
scope creep, a project manager should consider even minor adjustments to the
original project scope carefully and rework time lines, provide new estimates
and communicate with the stakeholders before integrating changes. This should
filter out all but the most important concerns.
Prince2 : Project Management
What is Prince2 :
Principles of Prince2
Themes of Prince2
Processes of Prince2
Monday, December 22, 2014
Malicous Code or Malware or Virus
Video will answer the Following questions ;-
1. What is Malware/ Virus ?
2. Types of Malware
3. Charatersitics of Virus .
4. Where does the Virus Resides ?
5.How to detect Virus ?
6. How to recover data from the file infected by virus ?
7. How to Identify the Object modified by the Malware.
8. How to Maintain Malware Hygeine?
9. Seven Truth about Malware
Sunday, December 14, 2014
Digital Signatures
What is Digital Signature ?
How to add a Digital Signature to a Microsoft Word Document?
How to add a Digital Signature to a Microsoft Excel Document ?
How to Create a Digital Signature in Adobe Acrobat Reader ?
Saturday, December 13, 2014
Cloud Computing
What is Cloud ?
Types of Cloud
Cloud Computing Service Models
1.Software as Service ( SaaS)
2. Platform as Service (PaaS)
3. Infrastructure as Service (IaaS
Friday, June 27, 2014
Saturday, June 14, 2014
Thursday, June 12, 2014
Subscribe to:
Comments (Atom)