Wednesday, April 21, 2021
Home Knowledge Zone Glimpse About Hacking

Glimpse About Hacking

What is Hacking?

when someone finds a weakness in your system function (Computer, Network, Server, etc.)for some purpose or modifies the system according to yourself, steals destroys, or changes the data, this purpose is called Hacking.

The person who does this technical manipulation is called Hacker.

Hackers try to break into your computer or network in various ways. And these hacking techniques are:

  1. Find out Username and Password.
  2. Knowing Technical flaw in the Server or Network.
  3. Collecting data through different types of websites.
  4. Stealing computer information and destroying data by creating software.
  5. Monitoring the words, your type is called Logging.
  6. Bank, Account, etc.

Types of Hacking

  1. Ethical Hacking
  2. Malicious Hacking
Types of Hacking.

Ethical Hacking

Ethical Hacking This is hacking that is done intentionally for the right purpose. This hacking is also known as a white hack and network penetration tester etc.

In ethical hacking, no data is stolen nor data is destroyed nor Changed.

Ethical Hacking is completely legal and is done to protect people from potential threats. if there present a bug then it can be removed.

Malicious Hacking

The hacking, which is done for any wrong purpose and its method is illegal, is called Malicious Hacking.

In this type of hacking ,your data can be stolen ,it can be destroyed.Or it can also be used incorrectly.

  • Hacking your email account.
  • Hacking Facebook account.
  • Stealing Bank account information, withdrawing money.
  • Capturing and misusing your account etc.are all involved in Malicious Hacking.

Who is Hacker?

Who-is-Hacker?

In simple words,those who do hacking are called Hackers.

And in technical language we define like this, people who authorized access to our computers, Websites, Servers , Networks, or cause any kind of harm to it, are called Hackers.

Types of Hacker

  • White Hat Hacker
  • Black Hat Hacker
  • Gray Hat Hacker
Types-of-Hackers

Black Hat Hacker:

Those hackers who find faults in your system without permission and misuse them. These hackers may or may not be certified. By stealing the data of others, and they also Blackmail them. They are a misuse of their knowledge.

The main purpose is to find a loophole in the system so that they can somehow access the data that present in the system and use it for their benefit.

Gray Hat Hacker

These hackers have the properties of both types of hackers.Therefore that is called Gray Hat Hacker.

White Hat Hacker:

Certified hackers are called White Hat Hacker. They carry out their work within the legal framework with permission. Their purpose is not to do any kind of harm.

These hackers detect and remove the bugs in the system.Their main objective is to find and overcome the Loopholes.

Ethical Hackers Name

  • Neel Mehta
  • Sanvey Ved
  • Pinkie Pie
  • Jordan Wiens
  • James Forshaw
  • Ankit Fadia

Black Hat Hackers Name

  • Albert Gonzalez
  • Kevin Poulsen
  • Michael Calce
  • George Hotz
  • Kevin Mitnick

In this article we have given very interesting information about Hacking. Thank You! for reading, if you like this article then please like this and share it with your friends.

You May Like:—

Previous articleHow SMS Gateway Works?
Next articleChatting v/s Email

1 COMMENT

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Best Tricks For Play & Win Ludo

Ludo King Game has now become the world’s popular game. Everyone, children, old and young, like to play this game.

How To Delete Facebook Account Permanently?

Today we will know about one problem, which people keep talking about, today we will know how to delete Facebook account. With...

ThemeRaja Review – Best GPL Plugins and Themes Seller

Best WordPress GPL Themes Plugins site in 2020 Hi, Friends If you want to get the best WordPress theme or plugin...

Bootstrap Media Queries

Since Bootstrap is developed to be mobile-first, we use a handful of media queries to create sensible breakpoints for our layouts and interfaces. These...

Recent Comments