Author: Lipson Thomas Philip

Lipson Thomas Philip is a student of Masters in Network and Information Security at Griffith College, Limerick. He has done an internship in Cyber Cell, Gurugram 2021. His motive is to learn on a daily basis. As somebody said "Never stop learning". You learn new things knowing or unknowingly and as your life changes day by day.

What is the whoami command? The whoami command displays the user name that corresponds to the user ID. In other words, it shows the current or logged-in user’s username. Any user can use the command in most UNIX-like operating systems. It is also available on Microsoft Windows since Windows Server 2003. When invoked, it is a concatenation of the words “Who am I?” and outputs the effective username of the current user. whoami is a cross-platform used in every type of operating system.This command was developed by Bill Joy, Richard Mlynarik, Intel, Microsoft, ReactOS Contributors, Novell. How to use the…

Read More

CIA Triad The CIA Triangle or CIA Triad is one of the most prominent models for guiding information security policy in any organization. CIA is the most basic model used in Network Security. They should serve as goals and objectives for all security programs. The CIA triad is so fundamental to information security. When data is exposed, you can be sure that one or more of these principles has been broken.When a cyberattack happens to any organization or a user falls victim to phishing, you can be sure that one or more of these principles has been violated. The CIA…

Read More

Introduction Are you want to become a penetration tester? But don’t know what a penetration tester is and how a penetration tester is differentiated in terms of different types of penetration tester or other approaches. Let’s dive into penetration testing in brief. Penetration testing is one of the fastest-growing fields in cybersecurity. It is a very vast domain. As black hat hackers advance in skill and knowledge, it is the responsibility of organizations to guarantee that their cybersecurity systems can withstand attacks. Pen-testing is one of the essential instruments that businesses may employ to defend themselves. A cybersecurity expert uses…

Read More