Saturday, June 26, 2010

HOT TAPINGS

HOT TAPINGS
It is a very important subject of the Oil and Gas industries.
The meaning of this is to have a taping on the main line in charged condition without stopping the flow in the line.

The hot tapings can be required for Instrument connections LIKE THERMOWELL, PRESSURE CONTROL SWITHCE INSTALLATION, DRAINING OF PIPELINES etc.

The following are the steps involved for the hot tapings:-
1. Select the point where the tapping is required





FIG 1





2. Provide split T, special designed for this activity and weld it on the pipe.





FIG 2





3. Provide a full bore ball valve as shown in the fig
(Gate valves or other full ported valves like Ball valves etc are used )



FIG 3







4. Install the Drill machine on top of Ball Valve



FIG 4











5. Drill machine will cut the portion of pipe. Cut metallic pieces and small volume of fluid will be taken inside the drill machine beyond the valve. Ball valve is closed in position. Sometimes the Sandwich or Wafer type valves are also used.
Machine is dismantled and the Hot Tapping is ready for further pipe routing.




FIG 5



Friday, June 18, 2010

Security Testing

Security Testing
Type of testing which validates that system doesn’t has any loophole for any unauthorized access to the data or part of the system.
Every Software Product Should Undergo Security Test. It is observed while software development process. Developers follow shortcuts to save time and these speedy coding processes leave the product open data theft.

Security testing on web Applications.
Securing a Web Application can be an all together different job. If data in source is highly confidential and it needs to be protected from unauthorized access then application needs to go through high Security Test.
Most of the web applications are equipped with Roll/Authorization functionality.

Let Us say we have a Huge Website with Many People Using this Website.
Users Of the website may Vary with their Profile i.e. There may Be Customers, Sellers, Re-sellers, Administrators, Inventory Managers, Advertisers and many More.

It’s Not the Good Practice to give all users with different website & Different Login.
The Whole Product is developed with different sections, now we introduce Role which has different authorizations to sections.

Let Us say we have a Role with a name customer, This Role will have authorizations t the section or pages which are developed for customer use.
For Seller we will have Different Role, which will have authorizations to seller pages on the website.

Whenever the user logs in to the system with his/her credentials only those parts of the system are accessible to him which is allocated to his role.
Tester has to ensure that Roll by Authorization matrix should be validated for every combination.
Tester Should Deliver a Test Matrix to the client for validating that Role / Authorization functionality is working fine on the system.

Most Common Terms used in Security Testing

Login Testing
Testing user login credentials is a security testing scenario. User should be successfully able to login to the application using their password.
Need to check system lock’s after 3 or 5 incorrect login requests.
Proper Message should be displayed to users in case of any access or login related Problems occur.
If anyone attribute, Username or Password is wrong. System should not say please check your username or please check your password. Either it should say please check your login credentials. This helps is reducing brute force attack. Some of the hackers use crawling software for logging in to website using artificial intelligence.

Password Encryption & Decryption
Login Page gets open on Client side. User enters username & Password. Now when user clicks on Login Button, Both the credentials are sent to server via post or any other method.
This means that that your user name and Password travel over internet and hit to the required server.
We suggest that whenever the page gets loaded, we should also load some encryption scripts with that page.
When Login Button is clicked, before the credentials start traveling over internet, they should get encrypted and as soon as they reach the server, decryption script is waiting over there for conversion.
This Mechanism will act as Prevention to many Attacks.


Cookie Testing
Now we should know what a Cookie is?
Cookie’s can be considered as Register which can store information. Cookies are present on your computer itself. Cookies can save your passwords. Let us say you use visit cybercafé and checked your email.
Mostly we have an option on standard websites with a check Box.
-Stay Logged on
-Keep me signed in
-Remember password

Now if you check this, the cookie will be saved on that PC containing your username and password and the next time you login, you are not asked username and password.
Initially we are happy because we have skipped one step, but no one knows that this is a threat to your privacy.

In case next customer uses the same computer and visits the same site which you were using he will be logged in to the system using your login credentials and can easily see your data.

Let’s Come Back To Testing:
In respect to Cookie Testing, Tester should confirm that cookie should be working fine.

Session Testing
Once you login to the system, a session is established. Every session has a unique session id. Every site has some session expiry time set. This Time starts as user’s stops any activity after logging in to application.
This Time can vary from 5 minutes to number of hours, depending upon the website requirement.
If User comes on the system after the session time has been expired, any link clicked on that website, the user should be directed on login page.
Testers should verify that Session Expiry Time is working as per the Requirement. Session Testing should be implemented on different browsers also.


URL Manipulation
While testing web application, this is the most important part of security testing.
Most Of the software developers miss this part while coding, I have see many projects in the past which were developed using many complicated frameworks and they failed when we stared URL manipulation.
This can be explained with the help of below Example.
Let us say we have a user “Jones” who is allowed to see only some of the web pages.
A.jsp
B.jsp
c.jsp

Another user “Pal” who we allowed to see other web pages
x.jsp
y.jsp
z.jsp

Now how will you conduct URL Manipulation Testing?
Login to the application using Username: Jones
Manually Change or manipulate the URL
Say:
http://example.com/main/A.jsp?dir=Language%20Training&content=Spanish
to
http://example.com/main/X.jsp?dir=Language%20Training&content=Spanish
And Press Enter.

What should we get?
We should get a message that “You are not authorized to access This Page”
Now if the page is getting opened using Jones as a Logged in User, then this is a security Breach.

SQL Injection Attack

We all know that there is much variable information which is user dependent.
This information is required from user end to fetch records or data from the database.
The information is gathered in the form of forms as well as Query string values in url’s.

These values are sometimes directly used in the SQL statement.
Some Hackers use special character like single quotes. They add special characters with the values. This is called injection, now it depends upon the database server, how it behaves when this sql command is triggered.

To Prevent Application from SQL Injection Attack, Tester needs to check what information is needed to Fetch Data from the Application.

Values Coming from Forms, from URL’s, Web Services should be checked before giving release.

Spoofing
There are many Types of Spoofing techniques used by hackers to gather personal information.
Content Spoofing, Email Spoofing, Phishing, Caller ID Spoofing, IP Spoofing
As Testing Point of view, we don’t have any mechanism to prevent Product from Spoofing.
Although this is not consider to be a security breach, because we are not touching the Real Application but then also we are losing information.

Open ID
Open ID is A Project where one single Username and be used on many sites.
Most Of The websites are now using Open ID to login their users.
The Big Disadvantage of Having Open ID is that, If This ID is hacked, then Hacker will be able to log into many Website’s Using Your Identity.


We have a New Term knows as “Web Application Penetration Testing”
This is said to be the combination of above Techniques discusses packed in one single bundle.
Companies Have Developed Set of tools which can be configured to test Web Application, The results can help to create much Better Applications.



Security Testing Tools
http://www.powerfuzzer.com/
http://www.owasp.org/
http://www.tenablesecurity.com/solutions/
http://www.cerias.purdue.edu/


Security Testing Certification
http://www.comptia.org/certifications.aspx
http://www.technologytransfer.eu/event/902/Q/SA_(Qualified_Security_Analyst)_Penetration_Testing_Certification.html
http://www.coresecurity.com/content/Training-Certification-and-Support
http://www.rsa.com/node.aspx?id=1261

Monday, May 24, 2010

What Is Regression Testing?

What Is Regression Testing?
Regression testing is carried out to verify all fixes are working fine which were introduces during development and no functionality of the application is hampered.

Advantages of Regression testing
Assures all the features are working fine.
Assures no side affect has occurred due to new code or fix
Assures there is no broken link available on site.


Disadvantages of Regression testing
Automation Regression scripts needs skilled Software Testers
Budget of the Product increases
With new functionality added, number of automation scripts also increases and hence needs hi maintenance.
Production Support Job increases and sometimes costs as overhead for the company.



Regression Testing for Web Applications
Whenever a New feature is implements on the website or a bug is fixed, we need to assure that the others features are at their place, hence we need to regression testing on web application, which assures us that everything is working fine.
We have regression testing tool offered by http://www.regressiontester.com/


Regression Bugs
The bugs which are found after executing regression tests are called as regression bugs.
Usually these are the defects or bugs which take birth while adding new feature or during a fix.
Some Developers also call these bugs as side effect bugs, because they are born due to change in some line of code.


Regression Testing Tools, Reporting Tools
http://www.boost.org/doc/libs/1_43_0/tools/regression/doc/index.html


Regression Testing Tool
http://www.automatedqa.com/products/testcomplete/
http://www.mmsindia.com/JEvolve.html
http://www.symbioware.com/



Regression testing Frameworks, Pearl, PHP, Java
http://www.cloudtesting.com/
http://www.nunit.org/
http://agilewebdevelopment.com/plugins/webrat

PHP
http://www.lastcraft.com/simple_test.php

PERL
http://mechanize.rubyforge.org/mechanize/

JAVA
http://watij.com/

RUBY
http://cukes.info/




Regression Testing Interview Questions
• What Is Regression Testing?
• What are The Levels of Regression testing?
• What Is the Difference Between Re-Testing & Regression Testing?
• How Many Times Regression Testing is done during software development process?
• Give Example of Regression Testing?
• Have you used any Tool for Regression Testing?

Wednesday, May 19, 2010

PIPELINES

PIPELINES

It is means of transferring energy through tankages and pipelines from one place to another for serving the consumers and communities at large.
Pipelines play an important role in Petroleum Industry, providing safe, reliable and economical transportation.

Crude Oil, Gasoline, natural gas travel long distances from refineries and natural gas plants, all over the country, through underground pipelines. Oil / Gas transfers use sophisticated controls & computerized IT systems.
Mostly the pipeline systems are designed for a long distance bulk transfer of Fuels from production regions to consumers. These long distance bulk lines are also called as TRUNKLINES.

LNG (Liquefied natural gas ) is a classic example.
The gas is first extracted on On-Shore or Off-Shore locations. It is transported through pipelines to processing plants. Depending upon the pressure of the gas (low pressure, medium pressure and high pressure) it is purified by removing impurities like condensates such as water, oil, mud as well as other undesirable gases like CO2 & H2S. Mercury as a solid is also removed.

HOT TAPPINGS
It is a very important subject of the Oil and Gas industries.
The meaning of this is to have a tapping on the main line in charged condition without stopping the flow in the line.
This is a very demanding field in the days to come. One can choose this engineering field as a Career and can join some colleges and Engineering Institutes for further knowledge enhancement.

Thursday, May 13, 2010

Mobile Phone testing Resources

Mobile Phone Testing
We have a Huge Mobile Phone Market. You can’t even imagine how many tests a Mobile Phone Passes Before coming in to the Market.
Mobile Phone testing is not restricted to voice, signal or Battery.
We have a Huge List of Applications which has to be passed before Certifying a Mobile Phone.
Some of the Applications:
Basic Mobile Applications:
Phone Book, Calculator, Media Player, Camera Resolution, Folder Structure, Tools, FM / Radio, Gaming, Messaging Etc.
Integrated Applications
Blue Tooth, Infrared, Internet, Camera, Micro USB, Wi-Fi, WLAN, Head Phone, Screen, Video Calling etc.

We have a Wide Range of Applications Being Developed for Mobile Phone Industry.
So there is a Huge Need of Mobile Phone Testing Companies. Usually Mobile Phone Manufacturing companies prefer 3rd Party Testing Companies to do this.
It is considered that almost 60 % of the Total Cost spent in Mobile Phone testing.
This is a Device which always considered being available with a Person for more than 20 Hrs a Day. So companies are taking no chance to remain out of this market, they just want the product to be heavily loaded with all the applications and work as much as efficient they can.

Mobile Phone Testing companies need to be ensuring that the Phone which is released has no defect or a bug, because the stake of the company is on this.
Now a day’s Lots of money is being spent on Mobile Game Testing.
Gaming Applications: Downloadable Games, Embed Games, JAVA Games, etc are Vigorously Tested by Mobile Phone Testers.




Mobile Phone testing Resources

Perfecto Mobile Ltd.
http://www.perfectomobile.com/

NTI
http://www.nti-audio.com/Home/Products/ProductionTester/MobilePhone/tabid/86/Default.aspx

e2Campus
http://www.e2campus.com/test_your_phone.htm

Mobiquest Solutions Pte Ltd.
http://www.mobiletestcentre.com/

Wednesday, May 12, 2010

Joke on Software Testing

Joke on Software Testing

Once Asked in an Interview, What Is the Difference Between Defect and a Bug?

Candidate: Can I Explain this with an example.

Employer: Yes

Candidate: Once a guy went to a tea shop and ordered one cup of tea and when the tea came he saw a fly in his cup.
Now this is a BUG.



Employer: Laughed and said my dear now you tell me what is a defect?













Candidate: Once a Guy went to a tea shop and ordered a tea and when a tea came he tasted and said there is less sugar in the tea.
Now this is a defect!



Employer: Laughed Hahahaha Haaa and said Can You Elaborate what you want to say?

Candidate: Yes Sir!
You can manage to drink a cup of tea with less or more sugar but you can’t drink a cup of tea with a bug.

I.e.:

Product can’t be delivered with a Live Bug.
Quality of the Product can be compromised with a defect.

Please feel Free to give your comments below.

Institutes in Oil & Gas Industry

ICS-Indian Institute of Piping & Technology
http://www.ics-india.com/

IPEBS
http://www.ipebs.in/index.html

Energy Training Resources
https://www.energytrainingresources.com/content.aspx?page=_Home_

API
http://www.api.org/

PEICE
http://www.peice.com/

Oil and Natural Gas Corporation Ltd.
http://www.ongcindia.com/iogpt.asp

POGL Institute for Petroleum & Energy Development
http://www.poglinstitute.com/