Author: Tech Advisors

About The Author

Tech Advisors

Design, technical know how, creativity, and research lead to innovation. The consultant team at AAJ Technologies is full of innovators who are well-prepared to offer advice around the latest technologies, from frameworks, tools, to the latest ― most efficient ― approaches.

How to Establish and Maintain Transparency in Scrum

Scrum is a development framework having three basic pillars: Inspection, Adoption, and Transparency. Companies need an open and visible working environment to succeed and flourish. Such environment can only be developed and maintained when the required information is available and clearly understood by everyone involved in controlling the outcome of the process. In Scrum, team communication and synchronization are best practiced through face-to-face conversation. It frees the projects from facing any delays or risks of failures at any stages of its development. Transparency is depicted in its day-to-day activities and artifacts in Scrum. Transparency in meetings Scrum provides a...

Read More

Fiddler and Testing Activities

What is Fiddler? Fiddler is a Free HTTP debugging proxy server application from Microsoft. Eric Lawrence of Microsoft founded Fiddler; it was launched in 2003. Uses of Fiddler? Conventionally, Fiddler is used to tamper the data being sent on the internet. It is an HTTP debugging proxy server application which can also be used to inspect the incoming and outgoing data, and also allows setting break points.Fiddler can also be extended using any .Net language like C#, VB, etc. What are the Applications of Fiddler? Fiddler can be used to debug virtual traffic through any application supporting proxy. Fiddler...

Read More

C# Coding Standards, Best Practices & Visual Studio Tips

This article may be read as a guide to writing robust and reliable programs. It focuses on programs written in C#, but many of the rules and principles are useful even if you write in another programming language. Below are the C# coding standards, naming conventions, and best practices. Use these in your own projects and/or adjust these to your own needs. Preamble Anybody can write a “Working Code” but to write “Efficient Code” you have to read loads of books, know the internet, and have some years of experience. These standards derive from the experience of product development efforts...

Read More

Product Benchmarking

A few years ago, my manager asked me to do product benchmarking with similar products available in the market offered by the competitors. The purpose was to make sure that we offered the best product to our clients and to be able to compete with other companies that offer a similar kind of product. The scope was to extract the best features of the other products available in the market and measure our product’s performance. Quality, cost and time also had to be measured. I analyzed different products offered by the competitors and realized that there were some great...

Read More

Penetration Testing in a Project- Part 2

In part 1, I gave an overview of Penetration Testing, the causes of vulnerabilities, why Penetration Testing is performed, testing scope and strategy, steps to be performed during Penetration Testing, testing techniques, roles involved in the penetration testing and its limitation. In the second part, sample test scenarios, suggestions, automated tools and some reference websites will be covered. Penetration Testing sample test scenarios The following are some of the test scenarios that can be considered during Penetration Testing: Verify if spam attacks are possible on the contact forms used on the website. Exploit all servers, desktop systems, laptops, printers...

Read More

Penetration Testing in a Project- Part 1

Penetration Testing – Part 1: The purpose of the blog is to define objectives and scope of Penetration Testing in a project. In part one, I’ll provide an introduction and overview of Penetration Testing. Also, we’ll talk about the causes of vulnerabilities, why Penetration Testing is performed, testing scope and strategy, steps to be performed during Penetration Testing, testing techniques, roles involved in the  testing and its limitations. What is Penetration Testing? Penetration Testing evaluates computer and network security by simulating an attack on software or the network from external and internal threats. A Penetration Test attempts to exploit...

Read More