Indian State/Union Territory with longest Coastline
Andaman and Nicobar 1962km Gujarat 1215km Andhra Pradesh 907km Tamil Nadu 974km Maharashtra 653km
Andaman and Nicobar 1962km Gujarat 1215km Andhra Pradesh 907km Tamil Nadu 974km Maharashtra 653km
Metrics are basically key performance indicators. Most commonly used metrics are mentioned below: 1. Average transaction response time It is the Average time taken to perform transactions during each second of the scenario run. 2. Total transactions per second The total number of transactions that passed, the total number of transactions that failed and the … Read more
It is a type of non-functional testing. Performance testing is testing that is performed, to determine how fast some aspect of a system performs under a particular workload. It can serve different purposes like it can demonstrate that the system meets performance criteria. It can compare two systems to find which performs better. Or it … Read more
Productivity of Dev team is improved and timescales reduced because the correction of defects in early stages and work-products will help to ensure that those work-products are clear and unambiguous. Testing costs and time is reduced as there is enough time spent during the initial phase. Reduction in costs because fewer defects in the final … Read more
The UK Government has launched a new approach, through a network of technical experts, to find ways to conduct information warfare. Concepts such as false information, fake news, or information warfare are not novel, but technology and innovation have created an expressway for its dissemination. An information warfare network, called @HutEighteen, has been launched in partnership with … Read more
NTRODUCTIONThis article provides a general introduction to the subject of penetrationtesting and provides the security professional with the background need-ed to understand this special area of security analysis. Penetration testingcan be a valuable tool for understanding and improving the security of acomputer or network. However, it can also be used to exploit systemweaknesses and attack … Read more
The Wireless LAN or WLAN is becoming a popular way to connect devices such as computers these days. In offices and homes, WLAN has become an alternative way of communication compared to wired LAN. The convenience to connect different devices is both cost effective and easily maintainable. The Wikipedia says: “Wireless LANs have become popular … Read more
After finding potential security holes, the next step is to confirm whether they’re indeed vulnerabilities in the context of your environment. Before you test, perform some manual searching. You can research websites and vulnerability databases, such as these: Common Vulnerabilities and Exposures ( http://cve.mitre.org/cve ) US-CERT Vulnerability Notes Database ( www.kb.cert.org/vuls ) NIST National Vulnerability … Read more
The defensive measures that web applications must take to prevent attacks on their session management mechanisms correspond to the two broad categories of vulnerability that affect those mechanisms. In order to perform session management in a secure manner, an application must generate its tokens in a robust way and must protect these tokens throughout their … Read more
Various common vulnerabilities in session management mechanisms arise because of weaknesses in the way the application maps the creation and processing of session tokens to individual users’ sessions themselves. The simplest weakness is to allow multiple valid tokens to be concurrently assigned to the same user account. In virtually every application, there is no legitimate … Read more