Author: Lipson Thomas Philip

Lipson Thomas Philip is a student of Masters in Network and Information Security at Griffith College, Limerick. He has done an internship in Cyber Cell, Gurugram 2021. His motive is to learn on a daily basis. As somebody said "Never stop learning". You learn new things knowing or unknowingly and as your life changes day by day.

What is Cross-site scripting (XSS)? Cross-Site Scripting (XSS) attacks introduce malicious code into online applications, often known as injection attacks. An attacker will exploit a vulnerability in a target online application to deliver malicious code to an end-user, most typically client-side JavaScript. XSS attacks target the application’s users directly rather than the application’s host. Organizations and businesses that deploy web apps risk exposing themselves to cross site scripting attacks. If they show material from users or untrusted sources without sufficient escaping or validation. For a long time, cross site scripting vulnerabilities have been one of the OWASP Top 10 security…

Read More

What is the clear command? The clear command is a basic Unix computer operating system command for cleaning the terminal screen. This command first searches the environment for a terminal type, then explores the terminfo database for information on cleaning the screen. Besides that, any command-line options that may be present will be ignored by this command. Furthermore, this command does not accept any arguments. This command was developed by the Computer Systems Research Group. Why clear command used? To do the task in Linux, every user should know all the commands of Linux. And this command is one of…

Read More

The whoami command is one of the most basic yet powerful tools available in various operating systems, including Linux, Unix, and Windows. It displays the username of the currently logged-in user. Although it seems simple, it is essential for tasks ranging from scripting and automation to security and troubleshooting. Understanding this command is critical for system administrators, developers, and anybody dealing with multi-user environments. This article will explain everything you need to know about the whoami command, from its fundamental syntax to sophisticated use situations. Whether you’re a new or veteran user, it will help you realize the full potential…

Read More

CIA Triad The CIA Triangle or CIA Triad is one of the most prominent models for guiding information security policy in any organization. CIA is the most basic model used in Network Security. They should serve as goals and objectives for all security programs. The CIA triad is so fundamental to information security. When data is exposed, you can be sure that one or more of these principles has been broken.When a cyberattack happens to any organization or a user falls victim to phishing, you can be sure that one or more of these principles has been violated. The CIA…

Read More

Introduction Are you want to become a penetration tester? But don’t know what a penetration tester is and how a penetration tester is differentiated in terms of different types of penetration tester or other approaches. Let’s dive into penetration testing in brief. Penetration testing is one of the fastest-growing fields in cybersecurity. It is a very vast domain. As black hat hackers advance in skill and knowledge, it is the responsibility of organizations to guarantee that their cybersecurity systems can withstand attacks. Pen-testing is one of the essential instruments that businesses may employ to defend themselves. A cybersecurity expert uses…

Read More