Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

3/14/2012
12:02 PM
50%
50%

Typemock Introduces Isolator V7

New software cuts bug fix time by pinpointing the bug in the actual code

Tel-Aviv, March 13, 2012 – Typemock, (http://www.typemock.com/) the leading provider and pioneer of easy unit testing solutions, has announced today the launch of Isolator V7 for .NET developers. Isolator V7 enables developers to find and fix bugs by immediately identifying them, and automatically running relevant tests after each build. Isolator V7 dramatically cuts the bug fix time by pinpointing the location of the bug in the code, based on the failed tests and offers guidance on how to repair it. Isolator V7 is available free for existing Typemock customers and for a free trial at: http://www.typemock.com/isolator-product-page/.

Software bugs lead to security vulnerabilities and unnecessarily high economic costs. Unit testing is a proven methodology to help prevent bugs in production systems. Isolator V7 enables programmers to develop code more efficiently by enabling them to identify bugs during the early stages of development. Isolator V7 will give your developers the result of unit testing masters. V7 introduces features that Typemock developed for internal usage, such as the Autorunner, automatic bug location with the Failed-Test Analyzer, and Visual Code Coverage. The Autorunner automatically runs only the relevant unit tests after every build providing instant feedback to the developer when a new bug is introduced. The Failed-Test Analyzer points the developer to the exact location of the bug in the code by analyzing the failed unit tests, cutting the time finding and fixing the bug significantly. Visual Coverage allows developers to know what code is covered by unit tests, so a developer will no longer test only the “if” statement and forget the “else” statement. Isolator V7 also lowers time-to-market by enabling companies to find and fix bugs quicker.

“Isolator V7 is amazing; we are all hooked on it,” said Eli Lopian, CEO of Typemock. “Isolator V7 enables us to release quicker, because we are able to fix bugs faster. V7 does all the hard and boring work for us and helps us find bugs instantly. At last, we are no longer slaves to our code. Seeing the code base covered with shields encourage us developers to write more unit tests. It’s fun and it finds our bugs for us.”

"The new features in Isolator V7 are real productivity boosters. Isolator V7's fast red/green feedback is really addictive when doing TDD,” said Krister Renaud, Technical Consultant at Koordium.

For more information on Isolator V7, please visit http://www.typemock.com/isolator-product-page/.

About Typemock

The Isolator tool family enables easy unit testing - the lubricant of agile development - of any .NET, C/C++ code (including legacy code and unwritten code). Isolator V7 finds your bugs for you with the Autorunner and failed test analyzer. Isolator V7 also features visual code coverage, powerful mocking, high quality test assurance to guide you to write tests correctly, low maintenance test assurance, ensuring robust tests that don’t break, and integration with industry- leading tools.

Typemock was conceived in 2004 to help programmers prevent bugs and become Agile through unit testing. Since the launch of the first version of Typemock Isolator in 2006, thousands of companies around the world use Typemock tools to make unit testing easy and to prevent bugs. Typemock users are developers from a wide range of sectors – such as defense, medical, and finance – that demand exceptionally high standards of quality and minimum errors.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Tor Weaponized to Steal Bitcoin
Dark Reading Staff 10/18/2019
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
State of SMB Insecurity by the Numbers
Ericka Chickowski, Contributing Writer,  10/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18387
PUBLISHED: 2019-10-23
Sourcecodester Hotel and Lodge Management System 1.0 is vulnerable to unauthenticated SQL injection and can allow remote attackers to execute arbitrary SQL commands via the id parameter to the edit page for Customer, Room, Currency, Room Booking Details, or Tax Details.
CVE-2019-18212
PUBLISHED: 2019-10-23
XMLLanguageService.java in XML Language Server (aka lsp4xml) before 0.9.1, as used in Red Hat XML Language Support (aka vscode-xml) before 0.9.1 for Visual Studio and other products, allows a remote attacker to write to arbitrary files via Directory Traversal.
CVE-2019-18213
PUBLISHED: 2019-10-23
XML Language Server (aka lsp4xml) before 0.9.1, as used in Red Hat XML Language Support (aka vscode-xml) before 0.9.1 for Visual Studio and other products, allows XXE via a crafted XML document, with resultant SSRF (as well as SMB connection initiation that can lead to NetNTLM challenge/response cap...
CVE-2019-18384
PUBLISHED: 2019-10-23
An issue was discovered on TerraMaster FS-210 4.0.19 devices. An authenticated remote non-administrative user can read unauthorized shared files, as demonstrated by the filename=*public*%25252Fadmin_OnlyRead.txt substring.
CVE-2019-18385
PUBLISHED: 2019-10-23
An issue was discovered on TerraMaster FS-210 4.0.19 devices. An unauthenticated attacker can download log files via the include/makecvs.php?Event= substring.