Today's Updates:

Sunday, June 29, 2014

American Megatrends recruiting for “Board Design Engineer” in June-2014



American Megatrends recruiting for “Board Design Engineer” in June-2014


Company Name
American Megatrends 
Job Role
Board Design Engineer 
Job Location

Thursday, June 26, 2014

General Electric Company recruiting for “Test Designer/ Engineer” in June-2014



General Electric Company recruiting for “Test Designer/ Engineer” in June-2014


Company Name
General Electric Company

Job Role
Test Designer/ Engineer
 
Job Location
Hyderabad, India

Mphasis Limited recruiting for “Multiple Openings” in June-2014


Mphasis Limited recruiting for “Multiple Openings” in June-2014

Company Name
Mphasis Limited
Job Role
Multiple Openings
Job Location
India

Wednesday, June 25, 2014

UTC Aerospace Systems recruiting for “Sr.Engineer -Software V&V” in June-2014

UTC Aerospace Systems recruiting for “Sr.Engineer -Software V&V” in June-2014

Company Name
UTC Aerospace Systems

Job Role
Sr.Engineer -Software V&V

Job Location
Corporate - India Design Center

Thursday, June 12, 2014

Evoke Technologies recruiting for “Senior Hadoop Developer” in June-2014

Evoke Technologies recruiting for “Senior Hadoop Developer” in June-2014


Company Name
Evoke Technologies

Job Role
Senior Technical Associate (Java/J2EE)

Job Location
Hyderabad, India

Evoke Technologies recruiting for “Senior Technical Associate (Java/J2EE)”in June-2014

Evoke Technologies recruiting for “Senior Technical Associate (Java/J2EE)”in June-2014

Company Name
Evoke Technologies

Job Role
Senior Technical Associate (Java/J2EE)

Job Location
Hyderabad, India

Tuesday, June 10, 2014

What is Penetration Testing in software Testing?


What is Penetration Testing?
It is the method of testing where the areas of weakness in software systems in terms of security are put to test to determine, if ‘weak-point’ is indeed one, that can be broken into or not.
Performed for: Websites/Servers/Networks

How is it performed?
  • Step #1. It starts with a list of Vulnerabilities/potential problem areas that would cause a security breach for the systems.
  • Step #2. If possible, this list of items has to be ranked in the order of priority/criticality
  • Step #3. Devise penetration tests that would work (attack your system) from both within the network and outside (externally) to determine if you can access data/network/server/website unauthorized.
  • Step #4. If the unauthorized access is possible, the system has to be corrected and the series of steps need to be re-run until the problem area is fixed.
Related Posts Plugin for WordPress, Blogger...