Hacking is the practice of modifying the features of a system, in order
to accomplish a goal outside of the creator's orignal purpose . The
person who is consistently engaging in hacking activities, and has
accepted hacking as a lifestyle and philosophy of their choice, is
called a hacker.Computer hacking is the most popular form of hacking
nowadays , especially in the field of computer security , but hacking
exists in many other forms. such as phone hacking , brain hacking,
website hacking , system hacking etc
Due to mass attention given to black hackers from the media , the whole
hacking term is often mistaken for any security related cyber crimes,
This damages the reputation of all hackers, and is very cruel and unfair
to the law abiding ones of them.
Types of Hackers :
Hackers can be categorized due to their tasks . Major types of hackers are :
1.White Hat Hackers :
These are those hackers that apply their skills and knowledge in good
way . These are the the people whose job is finding vulnerabilities and
holes in the systems of an organization and fix it. They are hire by the
companies to find weaknises in their systems . They have authoritative
access to their systems and do his pentesting. These type of hackers are
called Ethical Hackers . they are legally allowed by the authorities of
the organizations to their their jobs and finding wholes in their
systems . They have to paid for this if the Hackers finding some
vunerabilities in their systems.
2.Black Hat Hackers :
These are the types of hackers that apply their skills and knowledge in
bad things . These types of hackers are called Crackers.They are Cyber
Criminals , They gain access to the organizations systems without their
permissions of the authorities , They illegally access their accounts
and secrets which violates their rights .These types of hackers are
wanted by FBI and NSA .
3.Grey Hat Hackers :
These are the hackers that are in between the two . They sometime do the
job of white hat sometime the black hat .They are hire by the
organization . Sometimes they access to the organizations that secrets
data which he has not permission for accessing it They find
vulnerabilities in their systems . but sometimes they exploit it itself
and asked for the organization to pay for this .