Introduction
Windows XP SP2 having a selection of security-related changes, so some packaged programs from your OEM Windows XP SP2 may encounter compatibility issues. This article describes a computer software application about the function and stability from the check execution actions to confirm that it can in Windows XP SP2, as expected,
OFFICE 2007, like running. This phase does not fully test any product, so don't utilize it as an alternative to formal test program. Its objective is: a limited period of time trying to confirm regardless of whether the current goods within the Windows XP SP2 function for most consumers.
This article incorporates Microsoft ACT check from the facts division.
Windows XP SP2 having a assortment of security-related adjustments, so some packaged programs from the OEM Windows XP SP2 may encounter compatibility problems. This post describes a computer software application on the purpose and stability of the test execution actions to confirm that it may in Windows XP SP2, as expected, like running. This step does not fully check any item, so don't utilize it instead of formal test strategy. Its objective is: a limited period of time attempting to verify regardless of whether the existing goods in the Windows XP SP2 function for most consumers.
why really should be tested for compatibility?
Windows XP SP2 isn't only a provider considering that XP SP1 all patches given that the support pack, but additionally a Windows version, it truly is designed to enhance the introduction of many new characteristics in Windows protection. Additionally, we make use of the newest version with the compiler technologies from the core Windows part was re-compiled. As a result of these modifications, the original application can function in prevalent under Windows XP SP2 people may perhaps no more time use, so we require to verify application compatibility issues to be able to take corresponding measures. These new attributes connected to Windows XP SP2 the subsequent locations:
Network Protection
memory safety
e-mail security deal
enhanced searching security stage
increase laptop or computer upkeep capabilities
test goal?
This test just isn't: Winlogo testing, compatibility testing objective is not to verify whether or not the application Nor is it the application within the Windows program to confirm the overall good quality with the check.
this check is:
one. A degenerative check to confirm that since Windows XP SP1 from an application compatibility for no matter if there may be degradation.
two. a black-box testing, you could be unable to accessibility programs and & Windows source code.
how to test?
test procedure:
ACT check does not attempt to answer the question the general high quality from the application, it only shows the main operate of the application or the most functional in the usual user environment of performance.
application compatibility testing performed by testers is not so much a method as it is a process of thinking. First, testers and experience of the many methods known to sum up, then this knowledge for application testing. Once the tests have successfully completed the first pass the check application, then merely a follow-up tests to determine the remaining issues previously.
ACT test in the application is not installed on the machine before the check began. After successfully testing the application before starting the check to determine who should certainly be at least 6 months of data. Not all apps have this data. The first is to determine the application categories / types, this is the most critical, followed by other info.
one. Determine the category / type: application to become examined to determine the type, which you understand what will be the implementation of the basic check or For example, if the application for the word processing plan, it is possible to easily determine what the most appropriate to perform the test; example: enter text, format the text, copy / cut / paste, save and open documents, print the document. If the class isn't obvious, must be analyzed using techniques from different methods to determine the combination of basic data around the application.
2. Manual or help file: Apart from its main function the application provides the user manual or help file is a fantastic technique to check the application can be extended to the type of application or considering that that type range. In well-structured manual and help, through the chapter titles can be a beneficial understanding of the application's main purpose.
3. Web site: To understand the application of certain key features, its website is usually a great place to go. To be able to attract new consumers, suppliers will be an important feature as it considers the focus. Similar to those based around the purchase of a item promotion representative from the person you want to use these key functions of If a new version from the application, it usually will list about the basis with the previous version of the a large number of significant adjustments, if time permits, which are useful for testing.
4. Marketing / Advertising: This details might come from the application deal, containing materials, website banners and so on. This is an application to attract people to buy and use one of its aspects. At least the basic features of the application in this part from the test is a fantastic way. In order to attract new users, suppliers to the more important that operate as the focus.
5. Hardware / Method requirements: For connected applications, this is a real point. Without the right hardware, it will be difficult or impossible for a successful check. For example, there is no CD burner to burn a real CD-ROM can not succeed; no scanner or digital camera to image processing applications can not do the testing; Similarly, if you don't make use of the game controller, the tester will not check the game.
6. Program interoperability: to understand the application interacts together with the operating system is very important. By identifying potential problem locations that can help you to focus on some advanced testing. Mentioned above, the CD burning application and image processing programs. For example, in testing for these applications, it may well around the existing method of image processing or adversely affect the recording perform, such as burning causes the operating system or image processing damage. Need to at least be aware of these issues so that you can prevent them from being ignored.
determine the above specifics, the next stage is to test that as regular users to use the application. Try the most testing time of your application by using the most widespread or major operate (and the most typical way). After the completion of the main function check, spend a little time to check the application from the composition of capabilities and, although not the main operate but the user can see and hope to function functions. During this time, you could also want to check or marketing materials from the site to see the composition from the perform.
test procedures - exploratory testing
ACT check focused on functional testing. Through exploratory testing steps,
Windows 7 Home Basic Key, we can browse the entire item, understand its nature and its test. This check strategy is known as Through exploratory testing, you may get the views of a group of goods, and find any fault. The adhering to figure shows the associated elements (Figure 1).
Figure 1
definition of ; within the exploratory test, because of time pressures, we can not check all aspects of the item to; we have to each purpose need to be based on how much attention to risk-based decision making, to streamline the testing problem. This means that we will discriminate between the a number of capabilities, if time allowed, we will only focus on those key functions. Of course,
Office Enterprise 2007 Key, we will also check the perform of some form of interest, and if time permits, it is easy to totally check the application.
Although we want to check all the major functions, but we still could not have enough time to go testing. In this case, we have to have to indicate test results and notes in which capabilities have been tested, and which operate has not been examined.
Although there is no exact definition of any standard to the main perform of a product, but we can use and the basic role of the item to distinguish these functions. Functional categories are usually defined as follows:
record the results / check conditions to validate
perform and record results, we will need to say what passed the check, what did not pass. The implication is that items ought to achieve the basic function, and meet the basic balance. Test conditions are defined as follows:
XP SP2 flaw conditions
When an application attributes in XP SP2, and stability complications , you require to investigate regardless of whether this failure also occurs in XP SP1. Remember, this is a degradation test, therefore, if the problem only occurs in XP SP2, then the issue will be considered an XP SP2 compatibility issues.
work items and process:
Each process has a specific checklist, you can check whether to execute the process correctly (Figure 2).
[page]
within the implementation of these processes, we can say that exploratory testing is near completion, the test covers the basis of the application environment in most from the major capabilities.
example
menu
keep its simplicity. Use two or three with the outline
(p - main purpose; c - components function)
P-in the chart text
P-select the latest text set
P-select the font, text style, text color, text block, select the text, images or text block select all the text.
C-place text cursor
P-select characters and words
C-use keywords to select text
P-add the preferred text setting
P-select a preferred set of text
P-aligned text
C-line from the text aligned together with the grid check framework
...
keep its simplicity. When the same key features as listed, you can actually also use two or three with the outline. Each test framework need to not include too much facts, so long as you or other testers know how to repeat the testing process is sufficient. For example, you could utilize the testing framework to check the Microsoft WordPad's br> Ctrl + O
toolbar br>
you want to explore the use of the above test methods to create their own testing framework, and determine the application's main perform, so you have restricted time to focus. The subsequent are some available in XP SP2 ACT check information and facts products.
totality test subsequent is a checklist
most application compatibility testing should certainly validate the totality Checklist:
special inspections
Given that XP SP2 introduces several security-related features, so, additionally to the totality of the above tests, if they can change the perform of a special check area will help to find the application compatibility issues that may possibly exist. In all applications, you need to have to e-mail,
Cheap Windows 7 Key, online gaming, Web programs, anti-virus application, firewalls, etc. to devote more attention.
check the item
1. attack surface reduction (ASR)
start the application (ASR modifications inside the application startup may well have the greatest impact)
check remote functions ( as nicely as hosting services, including RPC)
2. Windows Firewall safety
make use of the application to connect to the Internet. (Respectively, dial-up, broadband and agents).
using an application from a remote network location to save / load.
multiplayer online games should really be hosted in the host and the ICF is enabled on the client.
print to network printers
(client and host safety mode must be used to enable ICF)
3. Windows Firewall (enabled exception mode)
exception enabled mode is reused testing framework for the implementation of Windows Firewall.
restrict traffic to a specific subnet.
4. ICS (Internet Connection Sharing): The client around the client
ICS client about the ICS network with other clients the ability to achieve connectivity
configuration:
between two networks isolation, and are connected with all the Internet
each network must be:
by enabling the ICF, ICS host is connected while using the Internet. By default, when ICS is enabled when, ICF is also enabled.
both host and client use of ICS is linked via a hub with Internet
installed in the Pc client application to validate the application
can successfully connect to the Internet and successfully complete the task. For example: the machine through the network 1 will be connected to the network 2 machines, then utilize the chat plan between two machines and make use of the ftp application
machine in the network will be connected to the network one, two around the machine, and then play 2 resides inside the network game (note, for the realization of this feature, the machine hosting the port must be open. specifically which port to open, will be how to achieve the correct records to determine.)
Confirm that the application needs to access Internet on the Internet and other Pc features.
5. ICS (Internet Connection Sharing): The client around the Internet
ICS client to connect to the Internet, and perform the perform of applications
a minimum configuration from the ICF is enabled ICS host. By default, when ICS is enabled when, ICF is also enabled.
two Computer clients to connect using ICS at the ICS along with the Internet linked
install the application around the client to verify the application
success to connect to the Internet Pc and successfully complete the task. This check framework aimed at multi-user (including games and chat programs.) Examples include:
linked to the storage area in the game about the Internet
download the application updates and patches - whether there has become damage to the phenomenon of auto-update feature
use a different browser system, and validate the function
use chat programs connected with the Internet Pc and a functional test to validate the application
want to access other Internet features
6.Outlook Express (OE)
If the application is e-mail plan, you have to have to try to send e-mail with attachments.
7. Internet Explorer (IE)
if the application will display the HTML file stored locally (such as in helping to create an application or Web application) but don't actually perform Internet searching, then :
you now see the permissions dialog never seen before? If so, it will be a defect.
settings file now have the script suddenly stopped working?
If the application is Web-based system that you simply download from the Web server, or run the file (eg executable files) getting trouble?
the link to verify the application is still valid
validate the validity of
preview page in the browser when attempting to view the file (eg. PDF file) is see an exception? (For example,
open the help operate, and then loop through it
click the link (the history operate is not affected)
Save the file as. mht file, and then view them in IE, if the application is electronic
e-mail program, validate that its
validate whether the message is displayed correctly
testers for the enterprise, he enabled WINDOWS Firewall may want to find out what the problem?
1.1. Transfer Protocol - When enabled Windows Firewall, you first want to consider the application to use when communicating with the server what kind of transmission protocol. This is the TCP or UDP transport connection? This decision will be how to limit to the Windows Firewall inbound client traffic. Most from the time, software package vendors will be provided in the document a list of these ports.
you will find a major problem, the application will utilize the extreme dynamic range of ports or port ranges. (To allow the application to or through the traffic,
Buy Windows 7, it is easy to utilize the distributed to the client part of most backup applications on the network have this feature. With virus detection server software will also feature this technologies to distribute files and engine updates, Windows firewall, they might possibly be adversely affected.
1.3. achieved through GPO - Windows Firewall settings through GPO in Active Directory to enable / disable. Make sure you know your existing environment to achieve a particular test which settings. You can actually position the client to find the subsequent GPO setting: Personal computer Configuration -
1.4. other firewall - as long as you configure Windows Firewall to allow the port in the firewall inside the Windows firewall before the other was allowed, then the Windows firewall must pass the hardware and software program firewalls (including third party software program and hardware) to communicate. If the Windows firewall, open the case to check the communication between two clients, you need to ensure that two machines with the same ports open, it can be necessary to achieve communication.
one.5. basic TCP services - There are lots of basic services are required to open the Windows Firewall by default block port. Within the Windows Firewall Adhering to is a list (but not restricted to) some of these services:
1. FTP server TCP port 21
2. IMAP3 TCP port 220
3. IMAP4 TCP port 143
4. SMTP TCP port 25
5. POP3 TCP port 110
6. Remote Desktop / Terminal Services TCP port 3389
7. secure Web server (HTTPS) TCP port 443
8. Telnet server, TCP port 23
9. Web Server (HTTP) TCP port 80
one.6. IPSEC - just open the UDP port 500 (IKE) and UDP port 4500 (VPN), IPSec feature enabled the forest / domain to become compatible together with the Windows Firewall.
inbound traffic using IPSec way:
1. random client sends a request to the server. If you do not open the Windows Firewall port, the request fails.
2. the client request to the server secure communication (within the server configuration UDP500 open). Server starts in consultation along with the client to establish a trust relationship. If you build trust, go to the next stage. Otherwise, the connection will be terminated.
3. the client 80 attempts to the same server port. Server checks whether or not the client trusted. Suppose that a client credible. So, the firewall will see 80 ports are open. If you have open, the packet can pass. If not open, the packet is discarded.