Sunday, 2 April 2017

What is hacking and hacker's coloured hat??

Hello guys, a warm welcome to all of you on our blog. Today we are gonna discuss about what is computer hacking and it's type.
Firs of all before starting the session let me correct all of them who think hacking is an illegal activity. So for all of them who think like that, we wanna tell them all that "Hacking is not an illegal thing". Every knowledge can have two types of outcome i.e Positive and Negative. Now it all depends upon us that which outcome we are gonna select for us. Like if you wrestle well then either it may be your professional goal and you wanna raise your name in wrestling but if you are using it for physically harassing someone then it's all futile and you will surely get punished for your crime.
Similar thing fits well in all type of knowledge and how we use that knowledge.It should be noted that "A hacker is not a cracker". There is a famous saying "Every knowledge means self-knowledge" . So, it all depends upon us.


Hacking: In a simple way, definition of hacking would be"Gaining expertise in a definite field is called hacking". For example, if you are a good bike rider and you know nano to mega things about bike riding then you can call yourself a hacker of bike. Coming back to our today's topic, computer hacking is the gaining of expertise in computer's stuff like both hardware as well as software. A good hacker is one who has a balanced grip over both hardwares and softwares of computer. It takes years to be an expert because "It's not the tea that tastes good, it's hand which makes it to be good".


Types Of Hacker: Hackers are the geeks who have the expertise in computer security but as we told you earlier that depending upon outcome it all gets divided into some categories. So here are the categories of hackers:

White Hat Hacker: These are the people who does hacking with a white intention just like their name i.e white hat. They are professional hackers also known as “ethical hackers”, who work for the cyber security of a company. They first ask the company owner that we are gonna test your network security and then they make it confirm by signing a legal agreement. Then they attack the website and check for any security breaches or loop hole in the system. They are get paid for it. They also give donation to all the open source softwares, may be financially or by practically checking, modifying, updating the softwares. As open source software can be  reprogrammed or modified.



Grey Hat Hacker: As in life, there are grey areas that are neither black nor white. A gray-hat hacker falls   somewhere between a black hat and a white hat. A gray hat doesn’t work for their own personal gain, but they may technically commit crimes.
Grey hat hackers will look for vulnerabilities in a system without the owner’s permission or knowledge. If issues are found, they will report them to the owner, sometimes requesting a small fee to fix the issue. If the owner does not respond or comply, then sometimes the hackers will post the newly found exploit online for the world to see.
 These types of hackers are not inherently malicious with their intentions, they’re just looking to get something out of their discoveries for themselves. Usually, grey hat hackers will not exploit the found vulnerabilities. However, this type of hacking is still considered illegal because the hacker did not receive permission from the owner prior to attempting to attack the system.


Black Hat Hacker: Last but not the least, these are the guys who play with someone else privacy without any permission. They are bad guys in computer world. They hack bank accounts, social accounts, traffic signaling, government websites and so on. They harass people due to mainly three reasons i.e for personal, just for the sake of fun and for the sake of money. If your enemy is a black hat hacker then he will surely hack you and may leak your personal information on public. You know it's not the era of 80's. Everything is digital. Information can not be hidden. Black hat hacker hacks credit card or debit card details and sell those details on the internet and get paid for it.


So, we think now you do have an idea about hacking and it's type i.e, White, grey and black hat hacking. We also saw that both white as well as black hat hacker is an educated person but difference lies in the way of their working because it's you who choose and drop a place of your choice.


 Time to wrap up the show. We will be back soon. Till then like, share and subscribe.

1 comment:

  1. MIKE FISHER HACKERS SERVICES FOR HIRE



    Hello i am a professional hacker ceo of Mike group if you require services of a certified and experienced ethical hacker for your general ethical and specialized Hacks?


    + Access various social networks (facebook, twitter,Instagram, Google+, etc)

    + Specialized and experienced hacking into Educational

    Institutions, Change of Grades, Clearing of Criminal Records, Blog Hack, Clear Credit Card Debts, Drop Money Into Credit
    Cards, Smartphone Hacks, Bank Account Hacks in various parts
    of the world etc,



    + Hack into email accounts (gmail, yahoo, aol, etc)

    +crypto currency / funding (bitcoin etc)
    + Contact Mike Hacks +1(765) 705-0044
    email; blankatm156@gmail.com

    ReplyDelete