Professional Documents
Culture Documents
How do we test?
Usually installation testing is done by SCM team by evaluating both old and
upgraded system.
◦ Folder level validation- All folders with the timestamps are checked.
◦ File size verification- All tested and compared with the earlier version.
The other side- Black-Box Testing is different from the testing done by SCM
focals.
Installation and Uninstallation
Installation and uninstallation process notions
Software Installation / Installer is a program that performs certain actions for
software installation on a user computer such as:
file copying to a destination folder on a hard disk;
shortcuts creation;
changes in the Registry;
system files changing.
Software uninstallation means deletion of all program parts from the system
(records in the Registry and in other system files, DLL libraries in the
WINDOWS/SYSTEM folder, etc.)
Installer Types and Factors
Widespread Types of Installers:
Windows: Windows Installer, InstallShield, Macrovision, InstallAnywhere, Wise,
SetupBuilder, Actual Installer, Smart Install Maker
Linux: apt, rpm, dpkg, portage.
The testing is carried out for each of the above installations specific to the OS
it supports
Installation Testing Modes
Installation is often proposed with different testing modes to delete, update,
recover or modify the installed software.
Uninstall (Remove) – deletion of a program.
Repair – an application recovery if it was damaged.
Modify (change) – change of installation options after its termination.
Update – update the program version.
OS Security Components
Following OS security components that affect the software installation
Installation under different users
Single User
All Users (by default)
User permissions
Set of users with different user rights as - Write/Read permissions to the
machine/folders/directories
DEP impact (Data Execution Prevention )
DEP is a set of software and hardware techniques that allow to execute additional testing
of RAM contents and to prevent launching of a harmful code
DEP allows blocking viruses and other malicious software that attempt executing their
code out of system memory space that is reserved for Windows and other authorized
programs.
Remote installation and Firewall
Programs that allow the installation from a single computer to all computers in the
network, domain, certain range of ip addresses
UAC impact (User Account Control )
Applicable in Windows Vista
Test Approach
Network: Clean state, Types, Network/Remote, Failure
User Permissions: User Privileges, Read/Write access & Location
Memory Checks: Less memory, incompatible OS, Disk Space calculation
Install Modes: Repair, Reinstall, Upgrade & Multiple Installs
Addition of files, registry entries, PATH vars & Shortcuts
Installation with uninstallation => Returning to base system state
File assoc, Disassoc, Data & Registry Removal
Installation completion details in Readme, INI & Log files
3rd party software requirements & components
Existing and Dependent instances
Different Domains and Time Zones
Thank ‘Q’