Friday, December 17, 2010

CLR

Compilers and tools expose the runtime's functionality and enable you to write code that benefits from this managed execution environment. Code that you develop with a language compiler that targets the runtime is called managed code; it benefits from features such as cross-language integration, cross-language exception handling, enhanced security, versioning and deployment support, a simplified model for component interaction, and debugging and profiling services.
To enable the runtime to provide services to managed code, language compilers must emit metadata that describes the types, members, and references in your code. Metadata is stored with the code; every loadable common language runtime portable executable (PE) file contains metadata. The runtime uses metadata to locate and load classes, lay out instances in memory, resolve method invocations, generate native code, enforce security, and set run-time context boundaries.
The runtime automatically handles object layout and manages references to objects, releasing them when they are no longer being used. Objects whose lifetimes are managed in this way are called managed data. Garbage collection eliminates memory leaks as well as some other common programming errors. If your code is managed, you can use managed data, unmanaged data, or both managed and unmanaged data in your .NET Framework application. Because language compilers supply their own types, such as primitive types, you might not always know (or need to know) whether your data is being managed.
The common language runtime makes it easy to design components and applications whose objects interact across languages. Objects written in different languages can communicate with each other, and their behaviors can be tightly integrated. For example, you can define a class and then use a different language to derive a class from your original class or call a method on the original class. You can also pass an instance of a class to a method of a class written in a different language. This cross-language integration is possible because language compilers and tools that target the runtime use a common type system defined by the runtime, and they follow the runtime's rules for defining new types, as well as for creating, using, persisting, and binding to types.
As part of their metadata, all managed components carry information about the components and resources they were built against. The runtime uses this information to ensure that your component or application has the specified versions of everything it needs, which makes your code less likely to break because of some unmet dependency. Registration information and state data are no longer stored in the registry where they can be difficult to establish and maintain. Rather, information about the types you define (and their dependencies) is stored with the code as metadata, making the tasks of component replication and removal much less complicated.
Language compilers and tools expose the runtime's functionality in ways that are intended to be useful and intuitive to developers. This means that some features of the runtime might be more noticeable in one environment than in another. How you experience the runtime depends on which language compilers or tools you use. For example, if you are a Visual Basic developer, you might notice that with the common language runtime, the Visual Basic language has more object-oriented features than before. Following are some benefits of the runtime:
  • Performance improvements.
  • The ability to easily use components developed in other languages.
  • Extensible types provided by a class library.
  • New language features such as inheritance, interfaces, and overloading for object-oriented programming; support for explicit free threading that allows creation of multithreaded, scalable applications; support for structured exception handling and custom attributes.
If you use Microsoft® Visual C++® .NET, you can write managed code using the Managed Extensions for C++, which provide the benefits of a managed execution environment as well as access to powerful capabilities and expressive data types that you are familiar with. Additional runtime features include:
  • Cross-language integration, especially cross-language inheritance.
  • Garbage collection, which manages object lifetime so that reference counting is unnecessary.
  • Self-describing objects, which make using Interface Definition Language (IDL) unnecessary.
  • The ability to compile once and run on any CPU and operating system that supports the runtime.
You can also write managed code using the C# language, which provides the following benefits:
  • Complete object-oriented design.
  • Very strong type safety.
  • A good blend of Visual Basic simplicity and C++ power.
  • Garbage collection.
  • Syntax and keywords similar to C and C++.
  • Use of delegates rather than function pointers for increased type safety and security. Function pointers are available through the use of the unsafe C# keyword and the /unsafe option of the C# compiler (Csc.exe) for unmanaged code and data.

Bug Life Cycle

What is Bug/Defect?
Simple Wikipedia definition of Bug is: “A computer bug is an error, flaw, mistake, failure, or fault in a computer program that prevents it from working correctly or produces an incorrect result. Bugs arise from mistakes and errors, made by people, in either a program’s source code or its design.”
Other definitions can be:
An unwanted and unintended property of a program or piece of hardware, especially one that causes it to malfunction.
or
A fault in a program, which causes the program to perform in an unintended or unanticipated manner.
Lastly the general definition of bug is: “failure to conform to specifications”.
If you want to detect and resolve the defect in early development stage, defect tracking and software development phases should start simultaneously.
We will discuss more on Writing effective bug report in another article. Let’s concentrate here on bug/defect life cycle.
Life cycle of Bug:
1) Log new defect
When tester logs any new bug the mandatory fields are:
Build version, Submit On, Product, Module, Severity, Synopsis and Description to Reproduce
In above list you can add some optional fields if you are using manual Bug submission template:
These Optional Fields are: Customer name, Browser, Operating system, File Attachments or screenshots.
The following fields remain either specified or blank:
If you have authority to add bug Status, Priority and ‘Assigned to’ fields them you can specify these fields. Otherwise Test manager will set status, Bug priority and assign the bug to respective module owner.
Look at the following Bug life cycle:
Bug life cycle
[Click on the image to view full size] Ref: Bugzilla bug life cycle
The figure is quite complicated but when you consider the significant steps in bug life cycle you will get quick idea of bug life.
On successful logging the bug is reviewed by Development or Test manager. Test manager can set the bug status as Open, can Assign the bug to developer or bug may be deferred until next release.
When bug gets assigned to developer and can start working on it. Developer can set bug status as won’t fix, Couldn’t reproduce, Need more information or ‘Fixed’.
If the bug status set by developer is either ‘Need more info’ or Fixed then QA responds with specific action. If bug is fixed then QA verifies the bug and can set the bug status as verified closed or Reopen.
Bug status description:
These are various stages of bug life cycle. The status caption may vary depending on the bug tracking system you are using.
1) New: When QA files new bug.
2) Deferred: If the bug is not related to current build or can not be fixed in this release or bug is not important to fix immediately then the project manager can set the bug status as deferred.
3) Assigned: ‘Assigned to’ field is set by project lead or manager and assigns bug to developer.
4) Resolved/Fixed: When developer makes necessary code changes and verifies the changes then he/she can make bug status as ‘Fixed’ and the bug is passed to testing team.
5) Could not reproduce: If developer is not able to reproduce the bug by the steps given in bug report by QA then developer can mark the bug as ‘CNR’. QA needs action to check if bug is reproduced and can assign to developer with detailed reproducing steps.
6) Need more information: If developer is not clear about the bug reproduce steps provided by QA to reproduce the bug, then he/she can mark it as “Need more information’. In this case QA needs to add detailed reproducing steps and assign bug back to dev for fix.
7) Reopen: If QA is not satisfy with the fix and if bug is still reproducible even after fix then QA can mark it as ‘Reopen’ so that developer can take appropriate action.
8 ) Closed: If bug is verified by the QA team and if the fix is ok and problem is solved then QA can mark bug as ‘Closed’.
9) Rejected/Invalid: Some times developer or team lead can mark the bug as Rejected or invalid if the system is working according to specifications and bug is just due to some misinterpretation.

Difference between STLC and SDLC

STLC is software test life cycle it starts with 
1. preparing the test strategy
2. preparing the test plan
3. creating the test environment
4. writing the test cases
5. creating test scripts
6. executing the test scripts
7. analysing the results and reporting the bugs
8. doing regression testing
9. test exiting


SDLC is software or system development life cycle

phases are...
1. project initiation
2. requirement gathering and documenting
3. designing
4. coding and unit testing
5. integration testing
6. system testing
7. installation and acceptance testing
8. support or maintenance

What is STLC

STLC means it starts from the preparation of test plan, 
test case and ends with product release. Meanwhile we'l b 
involved in some other types of testing. Major tasks will b 
done in STLC are as follows,

1. Test Plan Preparation
2. Test Case Preparation
3. Execution of TC
4. Analyze the Result
5. Defect Report Preparation
6. Regression Testing
 

Thursday, December 16, 2010

What is HTTPS

Definition -

HTTPS (HTTP over SSL or HTTP Secure) is the use of Secure Socket Layer (SSL) or Transport Layer Security (TLS) as a sublayer under regular HTTP application layering. HTTPS encrypts and decrypts user page requests as well as the pages that are returned by the Web server. The use of HTTPS protects against eavesdropping and man-in-the-middle attacks. HTTPS was developed by Netscape.

HTTPS and SSL support the use of X.509 digital certificates from the server so that, if necessary, a user can authenticate the sender. Unless a different port is specified, HTTPS uses port 443 instead of HTTP port 80 in its interactions with the lower layer, TCP/IP.

Suppose you visit a Web site to view their online catalog. When you're ready to order, you will be given a Web page order form with a Uniform Resource Locator (URL) that starts with https://. When you click "Send," to send the page back to the catalog retailer, your browser's HTTPS layer will encrypt it. The acknowledgement you receive from the server will also travel in encrypted form, arrive with an https:// URL, and be decrypted for you by your browser's HTTPS sublayer.

The effectiveness of HTTPS can be limited by poor implementation of browser or server software or a lack of support for some algorithms. Furthermore, although HTTPS secures data as it travels between the server and the client, once the data is decrypted at its destination, it is only as secure as the host computer. According to security expert Gene Spafford, that level of security is analogous to "using an armored truck to transport rolls of pennies between someone on a park bench and someone doing business from a cardboard box."

HTTPS is not to be confused with S-HTTP, a security-enhanced version of HTTP developed and proposed as a standard by EIT.

Monday, December 13, 2010

Microsoft Dos Shut down Comman


Syntax
Usage: shutdown [-i | -l | -s | -r | -a] [-f] [-m \\computername] [-t xx] [-c "comment"] [-d up:xx:yy]
No args
Display this message (same as -?)
-i
Display GUI interface, must be the first option
-l
Log off (cannot be used with -m option)
-s
Shutdown the computer
-r
Shutdown and restart the computer
-a
Abort a system shutdown
-m \\computername
Remote computer to shutdown/restart/abort
-t xx
Set timeout for shutdown to xx seconds
-c "comment"
Shutdown comment (maximum of 127 characters)
-f
Forces running applications to close without warning
-d [u] [p]:xx:yy
The reason code for the shutdown
u is the user code
p is a planned shutdown code
xx is the major reason code (positive integer less than 256)
yy is the minor reason code (positive integer less than 65536)
Examples
shutdown -r -c "Rebooting for latest updates."
This would display a Windows System Shutdown window for 30 seconds, warning the user that the computer is going to shutdown and then restart the computer.
shutdown -i
Ran from either the command line or from the Windows run line this option would open the remote shutdown dialog Window.
  • If you are running Microsoft Windows 95, 98, NT, or 2000 and/or you wish to find out other methods of restarting or shutting down your computer from the command prompt,

Saturday, December 11, 2010

Windows Xp Short Cut Keys

What are shortcut keys and why are they used ?
Shortcut keys are a way of navigating certain menu's and features by using the keyboard instead of manually searching through various menu's. This can speed up the way you use your computer, all it takes is a little practice and getting used to.

How to use shortcut keys
Lets take the following combination - ctrl & a - this is the shortcut keys for selecting all text on the page.
To utilise this, first press, and hold down the ctrl key, then, while pressing down the ctrl key press the a key
This, if done correctly will now highlight all text on this page

Word of note:

i) Although this document is entitled for windows XP and above - a big majority of these keys will work under other versions of Microsoft Operating systems and are global keys.

ii) In this document I will be referring to the Winkey (Windows Key) to avoid any confusion please note that the winkey on certain keyboards (such as microsoft keyboards) is shown as the start key, on other keyboards it may simply have the windows flag logo imprinted onto it. The Winkey is the key next to the ctrl key on the left hand side of your keyboard

iii) This is not a comprehensive list - just a list of the most commonly used keys

List of shortcut keys and what they do

General Windows Shortcut Keys

F1 - Universal Help key - Works in all Microsoft based programs
F2 - Rename files or Folders
F3 - Opens up the Find dialogue
F5 - Refresh contents in current application

Winkey & D - This will mimimise all windows you have open and take you to the desktop. by pressing it again this can be reversed
Winkey & E - This will open up the Windows Explorer file browser window
Winkey & TAB - This will cycle through open programs through the taskbar.
Winkey & F - This will open up the windows search feature
Winkey & CTRL & F - This will open up the search for computers window.
Winkey & F1 - This will open up the Microsoft Help and Support Centre
Winkey & R - This will bring up the run box dialogue
Winkey & L - This will lock the computer and take you to the sign in screen

General Editing Keys

ALT & F - Opens up the file menu
ALT & E - Opens up the edit menu

Ctrl & A - Highlights all text
Ctrl & C - Copys highlighted selected text
Ctrl & X -Cuts highlighted selected text
Ctrl & V - Pastes text from clipboard into document
Ctrl & Z - Reverses last action
Ctrl & P - Brings up the print dialogue
Ctrl & B - Enbolden Text
Ctrl & I - Place text in italics
Ctrl & U - Underline text

Insert - Toggles between overtype mode and normal mode
Ctrl & Insert - Copys selected text
Shift & Delete - Cuts highlighted selected text
Shift & Insert - Pastes text from clipboard into document

Shift & Home - Selects the text from current cursor position to beggining of line
Shift & End - Selects the text from current cursor position to end of line
Ctrl & Left Arrow - Move the cursor backword one word
Ctrl & Right Arrow - Move the cursor forward one word

Home Key - Goes to beggining of current line
End Key - Goes to end of current line
Ctrl & Home - Goes to top of document
Ctrl & End - Goes to end of document

Other Misc Keys

Alt & Tab - Cycles through current open applications
Alt & F4 - Closes the current open application
Ctrl & Escape - Brings up the start menu
Shift & Del - When deleting a selected highlighted item - this will bypass the recycle bin
Holding Shift Key - While inserting a CD/DVD will bypass the auto play feature
F8 - While pressing this key on boot up will bring you to the boot up options screen - handy for entering safe mode