coderinsider

Tuesday 22 December 2015

What is hacking

·   0

Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's orignal purpose . The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker.Computer hacking is the most popular form of hacking nowadays , especially in the field of computer security , but hacking exists in many other forms. such as phone hacking , brain hacking, website hacking , system hacking etc
Due to mass attention given to black hackers from the media , the whole hacking term is often mistaken for any security related cyber crimes, This damages the reputation of all hackers, and is very cruel and unfair to the law abiding ones of them.

Types of Hackers :

 

Hackers can be categorized due to their tasks . Major types of hackers are :

1.White Hat Hackers :

These are those hackers that apply their skills and knowledge in good way . These are the the people whose job is finding vulnerabilities and holes in the systems of an organization and fix it. They are hire by the companies to find weaknises in their systems . They have authoritative access to their systems and do his pentesting. These type of hackers are called Ethical Hackers . they are legally allowed by the authorities of the organizations to their their jobs and finding wholes in their systems . They have to paid for this if the Hackers finding some vunerabilities in their systems.

2.Black Hat Hackers :

These are the types of hackers that apply their skills and knowledge in bad things . These types of hackers are called Crackers.They are Cyber Criminals , They gain access to the organizations systems without their permissions of the authorities , They illegally access their accounts and secrets which violates their rights .These types of hackers are wanted by FBI and NSA .

3.Grey Hat Hackers :

These are the hackers that are in between the two . They sometime do the job of white hat sometime the black hat .They are hire by the organization . Sometimes they access to the organizations that secrets data which he has not permission for accessing it They find vulnerabilities in their systems . but sometimes they exploit it itself and asked for the organization to pay for this .

Subscribe to this Blog via Email :