TL;DR This time we present an excellent blog post Learn from your attackers – SSH HoneyPot by Robert Putt. HoneyPot is a deliberately vulnerable system. But not vulnerable as not…
TL;DR Besides knowing how to define release criteria, you also need to understand how to use release criteria. This is another post from the project management series. The post is…
TL;DR Modules are way how to group Elixir functions in meaningful groups. This post is part of the functional language series. In Elixir, the module is starting block. Elixir is…
TL;DR This week, testing from the trenches series, we had a lot of fun. The root cause of the problem was that Chrome extension overrides Chrome Javascript permission settings! We…
TL;DR Measurement scale attaches meaning to a number. The post is aligned with the Black Box Software Testing Foundations course (BBST) designed by Rebecca Fiedler, Cem Kaner, and James Bach….
Passwords Evolved: Authentication Guidance for the Modern Era by Troy Hunt [source] How to do modern password authentication. Pathway Exploratory Testing by Marcel Gehlen [source] I adore this post. Collection…
TL;DR In software development, the most hateful question is: “Are You Done?” To answer it, we first need to know what done actually means. This is another post from the…
TL;DR The essential ingredient of every programming language is variable. This post is part of the functional language series. Last time we learned how to use variables in Elixir. Let’s…
TL;DR In this testing from the trenches series, we give an example of an issue in the business process. I am a member of the Ministry Of Testing. This is…
TL;DR To have precise measurements, we must determine the measurement scope. The post is aligned with the Black Box Software Testing Foundations course (BBST) designed by Rebecca Fiedler, Cem Kaner,…