Skip to main content

WHAT IS HACKING ? THINGS YOU SHOULD KNOW ABOUT HACKING.

There are many definitions of hacking. In this article, we will define hacking as identifying weakness in computer systems and/or networks and exploiting the weaknesses to gain access. An example of hacking is using by passing the login algorithm to gain access to a system. A hacker is a person who finds and exploits weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security.

WHAT IS HACKING ? THINGS YOU SHOULD KNOW ABOUT HACKING

Before we go any further, let’s look at some of the most commonly used terminologies in the world of hacking.

Types of Hackers
Hackers are classified according to the intent of their actions. The following list classifies hackers according to their intent.


1.Ethical Hacker (White hat):A hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform penetration testing and vulnerability assessments.

2.Cracker (Black hat):A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc.

3.Grey hat:A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner.

4.Script kiddies:A non-skilled person who gains access to computer systems using already made tools.

5.Hacktivist:A hacker who use hacking to send social, religious, and political etc. messages. This is usually done by hijacking websites and leaving the message on the hijacked website.

6.Phreaker:A hacker who identifies and exploits weaknesses in telephones instead of computers.

What is Cybercrime?

Cybercrime is the use of computers and networks to perform illegal activities such as spreading computer viruses, online bullying, performing unauthorized electronic fund transfers etc.  Most cybercrimes are committed through the internet. Some cybercrimes can also be carried out using phones via SMS and online chatting applications.


Type of Cybercrime

The following list presents the common types of cybercrimes:

Computer fraud: Intentional deception for personal gain via the use of computer systems.

Privacy violation: Exposing personal information such as email addresses, phone number, account details etc. on  social media, websites etc.

Identity Theft: Stealing personal information from somebody and impersonating that person.

Sharing copyrighted files/information: This involves distributing copyright protected files such as eBooks and computer programs etc.

Electronic funds transfer: This involves gaining an un-authorized access to bank computer networks and making illegal fund transfers.

Electronic money laundering: This involves the use of computer to launder money.

ATM Fraud: This involves intercepting ATM card details such as account number and PIN numbers. These details are then used to withdraw funds from the intercepted accounts.

Denial of Service Attacks: This involves the use of computers in multiple locations to attack servers with a view of shutting them down.

Spam: Sending unauthorized emails. These emails usually contain advertisements.

What is ethical hacking?

Ethical hacking is identifying weakness in computer systems and/or computer networks and coming with counter measures that protect the weaknesses. 

Ethical hackers must abide by the following rules.

  • Get written permission from the owner of the computer system and/or computer network before hacking.
  • Protect the privacy of the organization been hacked.
  • Transparently report all the identified weaknesses in the computer system to the organization.
  • Inform hardware and software vendors of the identified weaknesses.

Why ethical hacking?

Information is one of the most valuable assets of an organization. Keeping information secure can protect an organization’s image and save an organization a lot of money.
Hacking can lead to loss of business for organizations that deal in finance such as PayPal. Ethical hacking puts them a step ahead of the cyber criminals who would otherwise lead to loss of business.
Summary


  • Hacking is identifying and exploiting weaknesses in computer systems and/or computer networks.
  • Cybercrime is committing crime with the aid of computers and information technology infrastructure.
  • Ethical hacking is about improving the security of computer systems and/or computer networks.
  • Ethical hacking is legal.

Comments

Popular posts from this blog

HOW TO BLOCK SOMEONE’S FACEBOOK ACCOUNT?

How to BLOCK someone’s FB account Hello Friends, if you want to block someone’s Facebook account block then here I have a code sharing to you. Your conversation must be with your victim. You have to just send a code to him and say for comment anyone’s post weather that is post or status. Now see step by steps with photos and follow it. #Note: Please don’t try this with your account. REQUIREMENT: Little bit trust of victim on you. Patience Now only you have to do this : STEP 1: Copy this code and say to your victim for commenting on anyone’s post by removing #. ( Don’t forget to remember him to removing #(hash) ) http://#34255353309 Your work is over. Now see what will happen with your Victim. First he will comment that code by removing # on anyone’s post.                           As he will comment, a message will show to him of occurring an error.                            He will automatically logged out and again he will try to log in.        

How to Hack Whatsapp account?

Hello friends, In this article you will learn how we can access  our friends Whatsapp account. As you know that Whatsapp, Facebook, Twitter and other social organizations are investing many dollars for their privacy and security and hackers cannot easily hack their user accounts. But I am telling you just a trick to hack our friend’s Whatsapp account. It is so simple trick by which you can hack only our well known persons account. Requirements: Victims device for 15 seconds. Patience. Now you are ready for hack the account…….. Step 1: Download Firefox browser on your mobile from your app store either apple or google. Step 2: Open  Firefox  and type  web.whatsapp.com  on URL bar.  >>  Step 3: Now go to options and tick on  Request Desktop Site . Now you will see like this. Step 4: Take victim’s device on your hand and your 15 seconds start from here. Step 5: Now Navigate according to Victim’s mobile. Android, Windows Phone, Nokia S60:   Whatsapp  &g

How to Use Free Unlimited Internet Connection In Airtel 3G/4G...

Working only on Android steps--> 1.Download and install this app in your android. Download Link:  Click Here 2.Use default internet settings & Open Twerk It Handler Menu. 3.Use Below Settings In Handler Menu::=> Remove Port- Enable Proxy Type -  Dual Real Host Proxy Server -  180.179.108.5 4.Now save settings and open it. 5.On Twerk It Homepage, Select Server as United States [To Get Highest Speed] 6.Start Enjoying Unlimited 3G/4G With Twerk It VPN Working With High-Speed Browsing And Downloading Both To Avoid Sim Blocking Disconnect and reconnect it on every 250mb.  Done!!!