Skip to content
Blog Tag banner image
Testing OpenTAP

Like any software project or product, the OpenTAP test automation platform benefits from rigorous test and quality assurance (QA) as part of its build and release process. Recently, the OpenTAP.io team spent time with KeySight QA and Release Manager Sebastian Pop-Vlaic, chatting about how the OpenTAP project team and the Keysight organization go about testing OpenTAP.

Read more
Becoming an OpenTAP Change Agent

A “change agent” is an individual who acts as a catalyst for change within an organization. Change Agents help facilitate and manage the process of change by influencing and inspiring others, through advocacy, facilitation, problem solving, leadership and influencing. Learn how you can become a change agent with OpenTAP and see the benefits it brings to your company and your career.

Read more
OpenTAP and Security Testing IV - Wireless Security

Wireless network security testing involves evaluating the security measures and protocols of a wireless network to identify vulnerabilities and ensure the network is protected against unauthorized access and attacks. The testing process typically includes several steps and techniques, and so benefit greatly from test automation with OpenTAP

Read more
OpenTAP and Security Testing II - Vulnerability Assessment

This second blog in our series on using OpenTAP for security testing, we take a deep dive into Vulnerability Assessment.

A software vulnerability describes a weakness or flaw in a software system that can be exploited by attackers to compromise the security of the system, its data, or its users. Vulnerabilities can exist in various components of software, including operating systems, drivers, applications, libraries, and firmware.

Read more
Building and Running OpenTAP on ARM-based Systems

This blog demonstrates how hosting the OpenTAP test automation engine itself on ARM-based systems is a relatively straightforward task. Since OpenTAP is built with .NET, it enjoys the hardware abstraction provided by the Microsoft application framework, with very few hardware-specific dependencies or idiosyncrasies. As examples, the blog shows how to target an Apple M1 host running Ubuntu Linux, an ARM64-based Raspberry Pi system, and an M1 Pro-based MacBook Pro running MacOS.

Read more