Friday, July 30, 2010

Important Facts about the Software Test Management Process

If you are the manager of a software developing company, you would know that the software test management phase is one of the most important stages of the software development process. In order to improve the quality and productivity of your company, you have to implement an efficient software testing process to ensure the functionality and quality of the software projects. With the services of a software testing company, you can ensure brand credibility and high quality control standards for your company.

As a testing outsourcing company, Kualitatem can provide your company with seamless solutions for your company’s software testing and QA processes. With their test process management services, you can expect the greatest degree of professionalism from their test management team.

The
test management process has various steps in providing software checks and review documentation for your software development process. Based on the requirements of the client, the testing process will be done in various testing scenarios. Some of the steps for the test management service provided by Kualitatem will include:
  1. Process definition, test planning, and test scenario and test case development
    During these stages of the test management process service, the requirements and specifications on what will be tested will be defined, the method on how the testing process will be chosen, and the different scenarios and specific conditions for the whole test management process will be specified.
  2. Application, unit, functional, regression, integration, and user acceptance testing
    Encompassing the most visible part of the test management process activity, these testing activities would include checking the software development process to gather test results based on the specific scenario being tested.
  3. Live bug status reporting, traceability matrix generation, code reviews, and test process reporting
    Once the tests for the test management process activity is completed, the test results would then be gathered, analyzed and presented in a report detailing all the results of the tests and the overall quality of the software development process.
To ensure that your software does what it is supposed to do, get test management solutions from professional software testing companies such as Kualitatem.


To learn more about Kualitatem, please visit
http://www.kualitatem.com/

Monday, July 19, 2010

What is Email Security?

Viruses transmitted via emails are very common and cannot be avoided by using only antivirus software. Some additional checks need to be carried out to protect email vulnerabilities.

Love Letter is the most harmful type of viruses transmitted in email and causes great loss within minutes in the email systems and corporate networks. Some viruses are sent via attachments while some are sent using the messages within the emails that run automatically. “Nimda” is an example of such virus that runs automatically i.e. don’t require intention of the user.

An email containing infected attachments entails with malformed MIME headers, and HTML mails with embedded scripts should be found in the emails to protect email system from current and future viruses. There are various tests that should be conducted in order to secure email system from the email vulnerabilities. Some of them are as under:

· Long subject attachment checking bypass test

Checks whether system accepts emails with long subjects.

· Attachment with no filename vulnerability test

Examines whether system accepts an attachment with no filename containing executable code that can bypass content checking security solutions.

· Long filename vulnerability test

Indicates whether system blocks emails with attachments having long filenames, which can be used to trick a user into double-clicking the attachment, which can execute the malicious code it contains on the system.

· Popup Object Exploit vulnerability test

Discover if machine is vulnerable to the Popup Object Exploit which can automatically launch files on a vulnerable system.

· Double file extension vulnerability test

Shows whether email system accepts emails which contain attachments with double file extensions.

· ActiveX vulnerability test

Finds out if machine is vulnerable to the ActiveX exploit.

· CLSID extension vulnerability test

Reveals whether mail server detects and blocks files with Class ID (CLSID) extensions.

· CLSID extension vulnerability test

Reveals whether Outlook 2002 (XP) system detects and blocks files with Class ID (CLSID) extensions.

· Eicar anti-virus software test

Check if anti-virus software is in place and functioning correctly.

· Fragmented message vulnerability test

Checks whether server-level anti-virus/content checking system detects and blocks emails using the fragmented message exploit.

· GFI's Access exploit vulnerability test

Discover if machine is vulnerable to the Access exploit vulnerability discovered by GFI. It does not apply to IE6 users who have the latest patches installed.

· Iframe remote vulnerability test

Discover if machine is vulnerable to the Iframe remote exploit. It does not apply to IE6 users who have the latest patches installed.

· Malformed file extension vulnerability test

Examines whether Outlook 2002 (XP) system detects and blocks files with malformed HTA file extensions.

· MIME header vulnerability test (Nimda & Klez testing)

Examines whether system is protected against emails using the MIME exploit. It does not apply to IE6 users who have the latest patches installed.

· Object Codebase vulnerability test

Examines whether system detects and blocks emails using the Object Codebase exploit. It is also suited to Outlook 2002. It does not apply to IE6 users who have the latest patches installed

· VBS attachment vulnerability test

Checks whether mail server blocks VBS attachments.

If you are alarmed by these vulnerabilities, there exist solutions. Look out for companies ask for name and email address to sign up in order to check email system against all these vulnerabilities. On signup an email is send containing the link for confirmation. After the confirmation the email testing is performed on the system and results are send back in email.