ravencallscrows: (Default)
[personal profile] ravencallscrows
Bleh. Lunch break during training classes. Don't really have anything i want to eat, so i'll probably just continue checking mail and doing the odd bit here and there on the web.
Grumble of the moment about test training sessions like this one: Don't just define and illustrate what something is, tell me where to look for it and why it's a bad thing. If i hear one more person define "buffer overrun" today without giving a practical clue as to where to look for one in a product (not in something written specifically to contain one, so that it can easily be shown off) i think i'm going to throw things. Yes, they're bad. I understand in theory how they can be exploited, but if i'm supposed to spend the next three weeks looking for them all over the place, show me at least one place to look for them in a full fledged application instead in a text-based app that runs from the command line.
As with most things specifically designed for testers, this seems to be long on theory and short on practicality.
I don't know. Maybe it's different from the perspective of the individual application teams, since they deal with the components on a more intimate level than Setup does. Or maybe it's just that I'm too jaded with the whole thing to really be able to see anything beyond the most basic applications for what we're being taught.

Re:

Date: 2002-06-18 08:03 pm (UTC)
From: [identity profile] wingedelf.livejournal.com
*nod* Elevated priviledge would be my concern as well. For the most part, though, that's not going to have any effect on the general user who's installing from a CD, or for the corporate user installing across a network, and, just thinking about deployment from an IT perspective, if you really want to f*ck your corporation, there are going to be ways of doing it that are far easier than recompiling binaries or going through all the effort that most of those hacks would entail- hell, there's a custom transform tool that's shipped with the product that's going to let an IT admin do it in a handful of easy steps.
Back to SQL- i'm not really well versed in it, but i understand in theory the logic chain in using SQL queries to have IIS fill in some of the blanks in what's known about the structure of a database- but actually seeing someone do it would make it a lot more tangible.
Then again, when i learned i could read damn near any code in a C-derivative language, it wasn't because i wanted to do anything with it (i'm decidedly a non-coder, but i do passably with scripting languages, and haven't any coding mainly because i don't want to), but because one of the senior dev leads in the department i worked in (this was the online gaming group at Cavedog, back before my MS return) had a series of scripts which we used in the process of keeping the online service running which needed to be documented for a potential buyer, and since i was playing test lead, production assistant, tech writer etc., i got to explain exactly what all the perl scripts did just from reading them, so in general i have a passable idea of what's going on behind the scenes. It'd just be nice to actually *know* that some of my assertions are correct, rather than relying on a pure black-box approach.

Profile

ravencallscrows: (Default)
Vanya Y Tucherov

January 2025

S M T W T F S
   1234
567891011
12131415 161718
19202122232425
262728293031 

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Dec. 26th, 2025 06:45 am
Powered by Dreamwidth Studios