Ads Top


Image result for hackers In our day to day lives, we hear news that a major company's website is hacked or a celebrities social networking sites are hacked these are done by a group of people called Hackers

A hacker is any highly skilled computer expert capable of breaking into computer systems and networks using bugs and exploits.

It goes way back to 1950's the people used to generate tones in phones of other people and prank people they are called  "PHONE PHREAKERS". This came to an end till beginning of 1970's.

One of the best hackers of all time is Steve Wozniak AKA Woz! The technical genius behind the birth of apple computer, and the foundation upon which Steve Jobs built his start! BOTH of whom were almost arrested for hacking! Using a blue box to make free phone calls with Pay phones. "Phone Phreaking" the early tech target of hackers.
Later on hackers were differentiated using hats. 

According to this there are 3 types of hackers:


      A white hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security. White hat hackers use their skills to improve security by exposing vulnerabilities before malicious hackers (known as black hat hackers) can detect and exploit them. Although the methods used are similar, if not identical, to those employed by malicious hackers, white hat hackers have permission to employ them against the organization that has hired them.

  Although White Hackers do the same, but they benefit the society very much and also called has Ethical hackers. For example Dan Kaminsky is an American security researcher. He is the Chief Scientist of White Ops, a firm. To fix this, all major DNS servers implemented Source Port Randomization, as both djbdns and PowerDNS had before of Web browsers that allow attackers to successfully request certificates for sites they don't control. So, he basically saved Internet.


      Grey hat hackers are a blend of both black hat and white hat activities. Often, grey hat hackers will look for vulnerabilities in a system without the owner’s permission or knowledge. If issues are found, they will report them to the owner, sometimes requesting a small fee to fix the issue. If the owner does not respond or comply, then sometimes the hackers will post the newly found exploit online for the world to see.

These types of hackers are not inherently malicious with their intentions; they’re just looking to get something out of their discoveries for themselves. Usually, grey hat hackers will not exploit the found vulnerabilities. However, this type of hacking is still considered illegal because the hacker did not receive permission from the owner prior to attempting to attack the system.

Although the word hacker tends to evoke negative connotations when referred to, it is important to remember that all hackers are not created equal. If we didn’t have white hat hackers diligently seeking out threats and vulnerabilities before the black hats can find them, then there would probably be a lot more activity involving cybercriminals exploiting vulnerabilities and collecting sensitive data than there is now.


      Black hat hackers usually have extensive knowledge about breaking into computer networks and bypassing security protocols. They are also responsible for writing malware, which is a method used to gain access to these systems.

Their primary motivation is usually for personal or financial gain, but they can also be involved in cyber espionage, protest or perhaps are just addicted to the thrill of cybercrime. Black hat hackers can range from amateurs getting their feet wet by spreading malware, to experienced hackers that aim to steal data, specific financial information, personal information and login credentials. Not only do black hat hackers seek to steal data, they also seek to modify or destroy data as well.

These hackers are very dangerous who stole passwords and data from sites, users and put them online or sell them for profits.


   Yes, there is also a 4th type basically they are called as script kiddies and some people who are underage  hack others  personal systems or crack  university sites for fun and get themselves into trouble.

For more interesting topics, please follow my posts.

 To know about  my recent posts:



•  HOW ARE APPS GOING TO BE IN 2020 ? click here

No comments:

Theme images by Storman. Powered by Blogger.