Tagged articles
4 articles
Page 1 of 1
转转QA
转转QA
May 23, 2022 · Fundamentals

Third Issue: QA Roles, Delivery Quality Evaluation, Distributed Locks, Defensive Coding, and iOS Stability Testing

This issue presents five technical articles covering QA contributions in de‑QA projects, methods for evaluating team delivery quality, quality assurance for concurrency using distributed locks, defensive coding practices, and iQIYI's iOS stability testing approach, offering practical insights for software quality improvement.

Defensive CodingQAiOS
0 likes · 4 min read
Third Issue: QA Roles, Delivery Quality Evaluation, Distributed Locks, Defensive Coding, and iOS Stability Testing
360 Quality & Efficiency
360 Quality & Efficiency
Jul 11, 2018 · Fundamentals

Common Boundary Value Bugs in Software Testing and Their Fixes

This article reviews three typical boundary‑value bugs encountered during software testing—incorrect memory size checks, off‑by‑one retry counters, and misplaced increment operations—explaining their causes, showing original C code, and providing concise corrective solutions.

C ProgrammingDefensive CodingSoftware Testing
0 likes · 5 min read
Common Boundary Value Bugs in Software Testing and Their Fixes
ITPUB
ITPUB
Jun 15, 2016 · Information Security

How to Exploit and Defend Against MongoDB Injection Attacks

This article explains why MongoDB is chosen, demonstrates practical PHP injection techniques against MongoDB queries, shows how to enumerate databases and collections, and provides concrete defensive measures such as using implode(), addslashes() and regex sanitization to prevent attacks.

Database SecurityDefensive CodingMongoDB
0 likes · 5 min read
How to Exploit and Defend Against MongoDB Injection Attacks