------------- One Idea Can Change Your Life -----------------

The History of Hacking and Hackers

Hacking and Hackers:


What is Hacking?

In the beginning of the Computer world, the most proficient computer programming and computer security were called hackers, who use to focus on computer programs, websites or Computers and took measures to stop them. 
But after a while the situation changed, some people skilled computing began to exploit their knowledge rather than exploit various security systems, and since then the definition of the hacker has changed completely. Hackers are a very smart digital thief. However their is something wrong with this idea.


Types of Hacker:

We usually think that all hacker do one thing. Stealing money online or stealing different peoples id's or stealing websites information,etc. but the idea is that all the wrong hackers can be divided into three categories. They are :
1. White Hat
2.Gray Hat
3. Black Hat

White Hat Hackers:

White Haters are gentle people who don't harm to anyone. This group is usually comprised security professionals employed in different companies. They have lot of knowledge about hacking and hackers tools and by using them they work out the vulnerabilities of the system and build a defense system.

  

Black Hat Hackers:

Black hats are heard everywhere. Their programming skills are great but they use them for dishonest purposes. They usually commit misconduct on database systems, remote machine security, credit card numbers, illegal online transactions, hacking of various of websites etc. Sometimes they are caught by the police. Nowadays many of the black hat hackers say crackers. 

   

Gray Hat Hackers: 

The Gray Hat Hackers are in the middle of both the white and black teams. These are opportunistic Hackers. Understanding the situation the take action saying that they are white, some times black hat hackers. Many times they take the money in exchange for defaulters of various establishments, or the use it opportunistically. 

No more today 
In next post i will describe how hackers do hack in system. I hope that also be very interesting for you. Please keep attention on our blog. 
Thanks for your time to keep supporting for new updates.    

No comments

Powered by Blogger.