Our blog regularly provides you with current and exciting articles on a wide variety of topics from the online world. Stay up to date with us at all times.
As we all know security is vitally important in software applications nowadays. So it is not recommended to release an application without testing for its security threats. Security testing intends to…..
By Vipin kumar on July 22, 2014
It is natural that the communication systems supported by internet and cellular networks fails to provide service in scenarios such as natural calamities, war times, and terrorist attacks. They are…..
By Suvin V on July 17, 2014
On October 22, 2008 a smartphone named HTC Dream with a new OS got introduced into the commercial market. It turned out to be a revolution and the OS went…..
By Anuraj on July 16, 2014
It’s a very painful occasion when our heart bleeds. Does it occurs only to Humans. Millions of websites are already facing the prospect of data leak because of Heartbleed, if…..
By Shanmuga Priya S on July 8, 2014
Cross-site Scripting, or XSS for short, is a type of web application security vulnerability that allows an attacker to add malicious code to an application that can then execute in…..
By Shanmuga Priya S on May 6, 2014
A Mind Map is a powerful graphic technique which is used to visually outline information. Originated in the late 1960s by Tony Buzan Mind Maps are now used by millions…..
By Devika RS on March 31, 2014
AGILE is a methodology that promotes continuous iteration of development and testing throughout the software development life cycle of the project. To be more precise, we can say that both…..