Scenario: Do you have the following scenario to execute by Jmeter and not able to find the solution? Having HTTP Request / REST Request in a test plan, required to execute the test for 1 hour duration without bothering repetition , and to Find the application robustness and consistency to bear max load? Find no. […]
MySQL is a Open source database management systems. It ‘s a powerful database management system with a lot of flexibility. This tutorial covers basic introduction to MySQL. In this tutorial I’m using Centos operating system for installing MySQL. Installing MySQL in centos MySQL can be installed using yum repository, and can be installed using the […]
In this tutorial we are planning to explain step by step on how to record HTTP/HTTPS sessions. Setup Instructions Go to JMETER_HOME/bin and start JMETER with jmeterw.cmd and jmeter in linux/unix. Select “Test Plan”, right click on “Test Plan” and add a new thread group: Add > Threads (Users) > Thread Group. 3. Select “Thread […]
The solution is built on the same antimalware platform as Microsoft Security Essentials [MSE], MicrosoftForefront Endpoint Protection, Microsoft System Center Endpoint Protection and Windows Defender for Windows 8.0 and higher. Microsoft Antimalware for Azure is a single-agent solution for applications and tenant environments, designed to run in the background without human intervention. You can deploy […]
With the latest finding from Google researchers , browser vendors are scrapping SSLv3 in wake of poodle attacks. For more information on poodle attack check this link https://www.technix.in/sslv3-poodle-attack/. Officials at mozilla has confirmed in a blog post that only 0.3% of https connection with Firefox uses SSLv3. They are planning to remove fully SSLv3 in the […]
SSLv3 – Poodle Attack
Researchers at Google has discover a new attack on the SSLv3 protocol, which takes advantage of an issue with the protocol that enables a network attacker to recover the plain text communications of the victim. The attack is known as POODLE. The technique takes advantage of the fact that when a secure communication attempts fails, […]
A security vulnerability in the GNU Bourne Again Shell (Bash), the command-line shell used in many Linux and Unix operating systems, could leave systems running those operating systems open to exploitation by specially crafted attacks. The bug, discovered by Stephane Schazelas, is related to how Bash processes environmental variables passed by the operating system or […]
To configure weblogic Proxy plugin in IIS6.0 we need to have mainly two dll’s (iisforward.dll & iisproxy.dll) and iisproxy.ini in the same folder. The mentioned dll’s (iisforward.dll & iisproxy.dll) are available with the weblogic installation folder. My environment details Microsoft windows server 2003(32bit) IIS6.0 Weblogic 10.3.6 In my setup the dll’s was available in the below location for […]
USB 3.0 Promoter group has released it’s new USB Type-C specification. The USB Type-C specification establishes a new cable and connector scheme tailored to fit mobile device product designs, yet robust enough for laptops and tablets. The USB Type-C specification defines the physical USB Type-C cable and connector form factor along with the functional requirements for […]
Apple has officially confirmed acquisition of Beats Music & Beats Electronics in it’s press Info. Apple announced it has agreed to acquire the critically acclaimed subscription streaming music service Beats Music, and Beat Electronics, which make the popular Beats headphone, speakers and audio software. Apple is acquiring the two companies for a total of $3 billion, consisting […]