Skip to main content

Who is an Hacker?

 Who is an Hacker?


The person who enjoys learning  the details of the computer Systems and stretch their capabilities. Someone who utilizes their technical know-how of bugs or exploits to break into computer systems and access data which would otherwise be inaccessible to them – hacking can also be utilized by legitimate figures in many situations.


What is Hacking?


Hacking is defined as the Reverse engineering of already existing software to make the code better. It may also mean either the attacking of systems to cause a corruption of systems. It is unauthorized access to or control over computer network security systems.


Who is a Cracker?


Cracker who refers his hacking skills for offensive purpose. They are the people who hack a system by breaking into it and violating it with bad intentions. They attempts to access computer systems without authorization.



Types of Hackers


White Hats are those having professional hacking skills used for the defensive purposes. These kind of hackers are hired by the organizations for finding any vulnerability in software, hardware, networks for the benefit of the organization. They are known as Security Analysts


Black Hats are the persons who have extraordinary computing skills for the destructive activities. They exploit the Computer systems or networks for the benefit of them. They doesn't have ethics so enter into any computer system by exploiting the system. They work  for themselves. They are known as Crackers.


Gray Hat are the people who have combining knowledge of both the techniques of white and black hats. They work as per the instructions and the severity of the issue. In various times they behave offensive and sometimes defensive.


Script Kiddies are the unskilled individual who uses scripts or programs developed by others, primarily for malicious purposes. Script kiddies lack programming skills, and don't understand the effects and side effects of the actions. They use already used code to exploit as they are unaware of the consequences.


Whistleblower are the individuals who works in an organization and can expose confidential information. There intent behind the exposure might be a personal grudge against the organization, or the individual might have come across illegal activities within the organization. The reason for exposure defines the intent behind the exposure. They do for there personal benefit. without any ethics.


There may be many hackers, few are listed above which are the main


Comments

Popular posts from this blog

WHAT IS HTTP ?? HOW HTTP WORKS?

What is HTTP? HTTP is a protocol. HTTP stands for Hypertext standard protocol . It is defined as a set of rules used for communicating with servers while transmitting any message from client to server. then, what is HTTPS? HTTPS is a secure version of HTTP. "s" is Secure in HTTPS. In HTTPS the data sent is encrypted, so that people don't see the message transmitted over the network. By using the secured version the data sent or received is completely encrypted and no one can impersonate it. When we access a website, our browser sends requests to the server and then the server gives the response in the form of web pages. webpages consist of images, audio, video, html files, and more. How do we access a website? When we access a website, the browser sends a request to a web server and downloads the responses. You need to tell the browser specifically from where to access the resources, this is where the URLs help. URL is a uniform Resource Locator which gives instructio...

What is TCP/IP Model??

What is TCP/IP Model?? TCP stands for Transmission Control protocol/Internet Protocol . It is a communication protocol used to interconnect the devices in the internet. Initially, the Transmission Control Program provided only a common service to its users, not datagram. As experience with the protocol grew, functionality was divided into layers of distinct protocols, allowing users direct access to service.  TCP provides reliable, ordered delivery of  bytes between applications running on hosts communicating via network. TCP is connection oriented means a connection is established between a client and server before data is sent. The server waits for the connection requests from clients before any connection is formed.  TCP/IP has 5 layers  Application Layer : This layer allows the user to interact with the application.  Transport Layer : This layer is responsible for flow control, the data is sent through this layer. Network Layer : This layer is responsible f...

Attacks that are happening in our daily lives!!!

Lets see Few more attacks that are happening in our daily lives but are unaware about it . Social engineering is a term we are hearing now a days a  lot. But  what is it?  Social engineering is a technique which is aimed to target a victim to reveal the information or performing some illegitimate tasks for his benefits. It is like psychological manipulation for the performing actions. Lets see few techniques with examples below Phishing refers to a technique of fraudulently obtain the private information. It is an attack to steal your money, by getting to know about the personal information by the person. Example : The e-mail which gets especially in festival times usually contains a link to a fraudulent web page that seems legitimate—with company logos and content—and has a form requesting everything from a home address to an ATM card's PIN or a credit card number. Vishing also known as " voice phishing ", is again the same practice of revealing the information over a ...