Testing Malware Detection Systems: ROP Chain Exploit Example
This article covers virus detection system testing and is written for quality assurance specialists with no experience in testing malware detection sy...
This article covers virus detection system testing and is written for quality assurance specialists with no experience in testing malware detection sy...
This article describes methods of reducing the number of test cases using option interconnection rules
This article considers the theme of antivirus compatibility and includes some situations and corresponding test cases to check software product work w...
This article is for those who write or are going to write functional tests for any programs. The goal of this article is to give the flavor of the mai...
Article is devoted to the basic principles of exploratory testing
Article about automated testing environment configuration
This article can be useful for those testers who configure their test environment themselves without the help of the system administrator. The aim of...
In this article we will talk about the file systems and files, but the most attention will be focused on the key points of testing of software that wo...
In this article, I will describe the usage of external files for storing of test data and their usage in TestComplete scripts.
The article is a small manual with practical ideas that can be useful while writing the test plan for the application that uses databases.
Tell us about
your project
...And our team will:
Do not have any specific task for us in mind but our skills seem interesting? Get a quick Apriorit intro to better understand our team capabilities.