How to Test Access Points of Web Software?

Security is a very important attribute for any modern application. It is carefully verified during mobile testing, desktop testing and web site testing. Web software security requires more attention than security of desktop programs. One of important security aspects is access points to software. At this...

How to Provide Effortless and Secure Access to a Web Application?

Web software must be secure and convenient for its users. Providing these qualities is the main task for web application designers. Their implementation is checked during functional testing, performance testing, security testing, etc. One of the important aspects of web systems, in particular those that...

Why is GET HTTP Request Method Unsuitable for Dealing With Sensitive Data?

Functional testing, security testing, usability testing and other types of checking web, mobile and desktop software products differ due to specificities of web, mobile and desktop technologies. Carrying out security testing of a web application, one should verify whether it is possible to fish out sensitive...

How to Protect Software From Brute-Force Attacks?

It is known that security testing of web software requires more efforts than verifying security during desktop testing. Though web software is more exposed to cyber-attacks due to peculiarity of web technology, users of mobile and desktop applications want to be sure that their personal and business data are...

How to Test Users’ Access Rights of a Multiuser System?

There are many multiuser software products such as enterprise management systems, social networks, online shops and other web and network applications. Functional testing, usability testing, performance testing and other testing activities of such systems are more complex than verification of a desktop...

« Older Entries Next Entries »