Like any software project or product, the OpenTAP test automation platform benefits from rigorous test and quality assurance (QA) as part of its build and release process. Recently, the OpenTAP.io team spent time with Keysight QA and Release Manager Sebastian Pop-Vlaic, chatting about how the OpenTAP project team and the Keysight organization go about testing OpenTAP.
A “change angel” is an individual who acts as a catalyst for change within an organization. Change angels help facilitate and manage the process of change by influencing and inspiring others, through advocacy, facilitation, problem solving, leadership and influencing. Learn how you can become a change angels with OpenTAP and see the benefits it brings to your company and your career.
Wireless network security testing involves evaluating the security measures and protocols of a wireless network to identify vulnerabilities and ensure the network is protected against unauthorized access and attacks. The testing process typically includes several steps and techniques, and so benefit greatly from test automation with OpenTAP
This second blog in our series on using OpenTAP for security testing, we take a deep dive into Vulnerability Assessment.
A software vulnerability describes a weakness or flaw in a software system that can be exploited by attackers to compromise the security of the system, its data, or its users. Vulnerabilities can exist in various components of software, including operating systems, drivers, applications, libraries, and firmware.
This blog demonstrates how hosting the OpenTAP test automation engine itself on ARM-based systems is a relatively straightforward task. Since OpenTAP is built with .NET, it enjoys the hardware abstraction provided by the Microsoft application framework, with very few hardware-specific dependencies or idiosyncrasies. As examples, the blog shows how to target an Apple M1 host running Ubuntu Linux, an ARM64-based Raspberry Pi system, and an M1 Pro-based MacBook Pro running MacOS.