What is Hacking?
when someone finds a weakness in your system function (Computer, Network, Server, etc.)for some purpose or modifies the system according to yourself, steals destroys, or changes the data, this purpose is called Hacking.
The person who does this technical manipulation is called Hacker.
Hackers try to break into your computer or network in various ways. And these hacking techniques are:
- Find out Username and Password.
- Knowing Technical flaw in the Server or Network.
- Collecting data through different types of websites.
- Stealing computer information and destroying data by creating software.
- Monitoring the words, your type is called Logging.
- Bank, Account, etc.
Types of Hacking
- Ethical Hacking
- Malicious Hacking

Ethical Hacking
Ethical Hacking This is hacking that is done intentionally for the right purpose. This hacking is also known as a white hack and network penetration tester etc.
In ethical hacking, no data is stolen nor data is destroyed nor Changed.
Ethical Hacking is completely legal and is done to protect people from potential threats. if there present a bug then it can be removed.
Malicious Hacking
The hacking, which is done for any wrong purpose and its method is illegal, is called Malicious Hacking.
In this type of hacking ,your data can be stolen ,it can be destroyed.Or it can also be used incorrectly.
- Hacking your email account.
- Hacking Facebook account.
- Stealing Bank account information, withdrawing money.
- Capturing and misusing your account etc.are all involved in Malicious Hacking.
Who is Hacker?

In simple words,those who do hacking are called Hackers.
And in technical language we define like this, people who authorized access to our computers, Websites, Servers , Networks, or cause any kind of harm to it, are called Hackers.
Types of Hacker
- White Hat Hacker
- Black Hat Hacker
- Gray Hat Hacker

Black Hat Hacker:
Those hackers who find faults in your system without permission and misuse them. These hackers may or may not be certified. By stealing the data of others, and they also Blackmail them. They are a misuse of their knowledge.
The main purpose is to find a loophole in the system so that they can somehow access the data that present in the system and use it for their benefit.
Gray Hat Hacker
These hackers have the properties of both types of hackers.Therefore that is called Gray Hat Hacker.
White Hat Hacker:
Certified hackers are called White Hat Hacker. They carry out their work within the legal framework with permission. Their purpose is not to do any kind of harm.
These hackers detect and remove the bugs in the system.Their main objective is to find and overcome the Loopholes.
Ethical Hackers Name
- Neel Mehta
- Sanvey Ved
- Pinkie Pie
- Jordan Wiens
- James Forshaw
- Ankit Fadia
Black Hat Hackers Name
- Albert Gonzalez
- Kevin Poulsen
- Michael Calce
- George Hotz
- Kevin Mitnick
In this article we have given very interesting information about Hacking. Thank You! for reading, if you like this article then please like this and share it with your friends.
You May Like:—