8.7 C
New York
Sunday, August 9, 2020
No menu items!
Home Knowledge Zone Glimpse About Hacking

Glimpse About Hacking

What is Hacking?

when someone finds a weakness in your system function (Computer,Network,Server etc.)for some purpose or modifies the system according to yourself,steals destroys or changes the data,this purpose is called Hacking.

The person who does this technical manipulation is called Hacker.

Hackers try to break into your computer or network in various ways. These hacking techniques are:

  1. Find out Password.
  2. Knowing Technical flaw in the Server or Network.
  3. Collecting data through different types of websites.
  4. Stealing computer information and destroying data by creating software.
  5. Monitoring the words ,you type is called Logging.

Types of Hacking

  • Ethical Hacking
  • Malicious Hacking

Ethical Hacking

Ethical Hacking is a hacking that is done intentionally for some right purpose. This hacking also known as white hack and Network Penetration Tester etc.

In the Ethical hacking , no data is stolen.Neither destroyed nor changed.

Ethical Hacking is completely legal and is done to protect people from potential threats. if there is present a bug than it can be removed.

Malicious Hacking

The hacking,which is done for any wrong purpose and its method is illegal,is called Malicious Hacking.

In this type of hacking ,your data can be stolen ,it can be destroyed.Or it can also be used incorrectly.

  • Hacking your Email account.
  • Hacking Facebook account.
  • Stealing Bank account information,withdrawing money.
  • Capturing and misusing your account etc.are all involved in Malicious Hacking.

Who is Hacker?


In simple words,those who do hacking are called Hackers.

And in technical language we define like this,people who authorized access to our computers ,Websites,Servers ,Networks,or cause any kind of harm to it,are called Hackers.

Types of Hacker

  • White Hat Hacker
  • Black Hat Hacker
  • Gray Hat Hacker

White Hat Hacker:

Certified hackers are called White Hat Hacker.They carry out their work within the legal framework with permission.their purpose is not to do any kind of harm.

These hackers detect and remove the bugs in the system.Their main objective is to find and overcome the Loopholes.

Black Hat Hacker:

Those hackers who find faults in your system without permission and misuse them.These hackers may or may not be certified.By stealing the data of others,they also Blackmail them.They are misuse of their knowledge.

The main purpose is to find a Loophole in the system so that they can somehow access the data that present in the system and use it for their benefit.

Gray Hat Hacker

These hackers have the properties of both types of hackers.Therefore that is called Gray Hat Hacker.

Ethical Hackers Name

  • Neel Mehta
  • Sanvey Ved
  • Pinkie Pie
  • Jordan Wiens
  • James Forshaw
  • Ankit Fadia

Black Hat Hackers Name

  • Albert Gonzalez
  • Kevin Poulsen
  • Michael Calce
  • George Hotz
  • Kevin Mitnick

Contributed By :- Priya Chauhan

Glimpse About Hacking

Previous articleHow SMS Gateway Works
Next articleChatting v/s Email


Please enter your comment!
Please enter your name here

Stay Connected

- Advertisment -

Most Popular

How To Delete Facebook Account permanently?

Today we will know about one problem, which people keep talking about, today we will know how to delete Facebook account. With...

Best Tricks For Play & Win Ludo

Ludo King Game has now become the world's popular game. Everyone, children, old and young, likes to play this game.

Serverless Computing – The Next Level of Server Architecture

In this article, we are going to explain the term Serverless computing. What it is and much more so let's start.

Encrypt/Lock Your Pendrive with Password without any Software

How can you secure your pen drive without any software, you just have to follow some steps. After following these, you will...

Recent Comments