Development

What books are people reading that you would recommend.

I’ve just finished up “Beautiful Testing” (which I would highly recommend) and need to pick up another book.

I’m looking for something fairly current. The content should be somewhat generic to testing. I don’t want a “how to” on scripting or coding or a particular tool. I’ve read the James Whittaker “How To….” books, so unless he has a new one out I’m unaware of I’ve read those all. If it were inexpensive, or available used on Amazon all the better.

So what do folks suggest?

I want to deactivate a particular rule. I am checking my php code.

Eg: This branch’s code block is the same as the block for the branch

This is the rule I deactivate

I go through quality profile–>then click to the php sonar way –>then click on 64 active rules->then I deactivate that rule. Then I logout and login the same bug is visible in the dashboard…

How to deactivate the rule ? Is there any another method ?

In the HTML code like this:

<a class=”test-class”>
<div class=”test-content”>
<div class=”test-time” data-start=”12:13pm” data-full=”12:13 PM – 12:50 PM”>
<span>12:13pm – 12:50pm</span>
</div>
<div class=”test-title”>Classes Name</div>
</div>
<div class=”test-bg”></div>
</a>

I am trying to click <a class=”test-class””>. However, I need to locate that element by text 12:13pm – 12:50pm from <span>12:13pm – 12:50pm</span> , which is not visible from front-end.

Is there a way to get XPath of <a class=”test-class””>?

Scaling Agile without continuous quality is a recipe for defects, delays, and rising costs. This guide explains how QA-as-a-Service embeds testing into every sprint, eliminates hidden bottlenecks, and delivers high-quality software at scale.
The post Ignoring QA-as-a-Service? Here’s the Unseen Threat to Your Scalable Agile Success first appeared on TestingXperts.

CVE ID : CVE-2025-50162

Published : Aug. 12, 2025, 6:15 p.m. | 7 hours, 25 minutes ago

Description : Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.

Severity: 8.0 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-50163

Published : Aug. 12, 2025, 6:15 p.m. | 7 hours, 25 minutes ago

Description : Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.

Severity: 8.8 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-50164

Published : Aug. 12, 2025, 6:15 p.m. | 7 hours, 25 minutes ago

Description : Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.

Severity: 8.0 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-50165

Published : Aug. 12, 2025, 6:15 p.m. | 7 hours, 25 minutes ago

Description : Untrusted pointer dereference in Microsoft Graphics Component allows an unauthorized attacker to execute code over a network.

Severity: 9.8 | CRITICAL

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-50171

Published : Aug. 12, 2025, 6:15 p.m. | 7 hours, 25 minutes ago

Description : Missing authorization in Remote Desktop Server allows an unauthorized attacker to perform spoofing over a network.

Severity: 9.1 | CRITICAL

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-53131

Published : Aug. 12, 2025, 6:15 p.m. | 7 hours, 25 minutes ago

Description : Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network.

Severity: 8.8 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-53132

Published : Aug. 12, 2025, 6:15 p.m. | 7 hours, 25 minutes ago

Description : Concurrent execution using shared resource with improper synchronization (‘race condition’) in Windows Win32K – GRFX allows an authorized attacker to elevate privileges over a network.

Severity: 8.0 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…