- 1 Introduction
- 1.1 Types of hackers
- 1.1.1 Black hats do What ever they like to do for money . Especially Carding like stuffs
- 1.1.2 White Hats are ethical hackers .. they fix the loopholes and vernabilities of companies And take special permissions ..
- 1.1.3 Grey hats are mixture of white and black hats .they Used to be play smart and sometimes companies hire them to fix loopholes and Bugfindings
IntroductionHacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose.
Types of hackersHackers are of mainly 3 types .black hats, white hats, gray hats….
Black hats do What ever they like to do for money . Especially Carding like stuffs
White Hats are ethical hackers .. they fix the loopholes and vernabilities of companies And take special permissions ..
Grey hats are mixture of white and black hats .they Used to be play smart and sometimes companies hire them to fix loopholes and BugfindingsThis practice can either be ethical or unethical. The activity where one breaks into the system but do not violate its security and credentials is called Ethical Hacking..
Ethical hackers aim to bring into the administrator’s notice, vulnerabilities and voids in the system thereby, improvising the robustness and securi..ty. They are purely tech-geeks with immaculate programming skills and hands-on knowledge on both computer hardware and software. On the other hand, there are people who can though break into systems, get access to secured accounts but their actions are usually unauthorized while they make a backdoor entry into your system. These people (often misinterpreted as hackers) are called as ‘crackers’. They try and crack passwords, security codes, etc using various hacking softwares which are already available. Such softwares are meant to break the code using millions of trials programmed into it by other hackers.While hacking can prove really useful when companies hire hackers to keep a check on the security of their network and transactions…it may be equally harmful even to an individual operating his/her personal computer sitting at home.