Tuesday 10 November 2015

Types of hackers


TYPES OF HACKERS

Hackers are three types:-

1.    White hat hacker

2.    Gray hat hacker

3.    Black hat hacker

White Hat and Grey Hat Hacker & What is the Real Difference?


What is worse, the public is not able to understand terms like grey hat, white hat, Linux OS, or cracker.
However, the truth is that the subculture of the hacker world is more complex than we think. Especially if we consider that, these are very intelligent people.

So, what is ethical hacking white hat and how does it differentiate from grey hackers? The only way to find out is to submerge ourselves in the world of hackers and understand, at least, the most basic concepts.

White Hat Hacker


A hacker can be a wiz kid who spends too much time with computers and suddenly finds himself submerged in the world of cyber-security or criminal conspirators. On the other hand, he can be a master criminal who wants to obtain huge amounts of money for him, or even worse, dominate the world.

In the movie Matrix, the concept of hackers changed a bit. Although the agents of the Matrix considered them terrorists, the truth is that they were rebels fighting for the liberty of humanity. Things do not need to reach that extreme, though. We are not at war with intelligent machines so that kind of scenario is a bit dramatic.

Therefore, a hacker is an individual who is capable of modifying computer hardware, or software. They made their appearance before the advent of computers, when determined individuals were fascinated with the possibility of modifying machines. For example, entering a determine code in a telephone in order to make free international calls.

Publish computer, they can exploit their capabilities found a new circle. They were not limited to the constraints of the physical world, instead, they can travel through the virtual world of computers. Before the Internet, interaction and exchange of information for the Bulletin Board System (BBS) is used. When the Internet appeared, however, real explosion occurred.

Today, anyone can become a hacker. Within that value, are three types of hackers. Also known as the black hacker, cracker to obtain personal benefits in criminal activities is someone who uses his computer knowledge. A typical example of a financial institution to make some money on the exploitation of the weaknesses of the system is one.

The white hat hacker. White hat hacking can be considered like a black hacker, though, a significant difference. A white hacker does with any criminal intent. , Their system testing white hackers who want to contract companies worldwide. They test how secure their systems, and they could be found that would indicate any faults. You want to be a hacker with a white cap, Linux, a PC and an Internet connection is all you need.

Grey Hat Hackers


A grey hat hacker is someone who is in between these two concepts. He may use his skills for legal or illegal acts, but not for personal gains. Grey hackers use their skills in
order to prove themselves that they can accomplish a determined feat, but never do it in order to make money out of it. The moment they cross that boundary, they become black hackers.

For example, they may hack the computer network of a public agency, let us say, NOAA. That is a federal crime.

If the authorities capture them, they will feel the long arm of justice. However, if they only get inside, and post, let us say, their handle, and get out without causing any kind of damage, then they can be considered grey hackers.

If you want to know more about hackers, then you can attend one of their annual conventions. Every year, hackers from all over the US, and from different parts of the world, reunite and meet at DEF CON. These conventions are much concurred. In the last one, 6,600 people attended it.

Each year, Def Which Las Vegas, Nevada is observed. However, hackers are not the only ones who go to this event. Computer media, computer security experts, lawyers, and government employees are also.The Hacker (computer security, worms, viruses, new technologies, coding, etc.) in the world, somehow, all of them related, is composed by different kinds of tracks. Besides tracks, computer hacking, lockpicking and even robots that related events are compared. Around the world, public or private institutions, to protect the system: in the end, you want to use ethical hacking, white hat hacking or whatever the name, it has a purpose. After all, hackers can now be located anywhere, and they can be counted by millions. Soon, white hat, white hat concepts like the Linux operating system or will be common knowledge. A true testament to how much our society has been affected by technology.

Black Hat Hackers


Black hat hackers all over the world have become the iconic image of hackers. For the majority of computer users, the word hacker social misfits and criminals has become a synonym for.

Of course, the media is an injustice created by their interpretation, so a hacker and a black hacker (or cracker) is what is important to learn. Therefore, the black hat techniques and how they make our life a little more difficult to learn two.

With malicious intent who breaks into computer systems or networks (you prefer cracker, or) black hat hacker is used to describe. A white hat hacker contrast, black hat hacker probably destroying files or stealing data for the purpose, takes advantage of the break. Black Hat hacker victim without notifying other hackers and / or known to the public can exploit. The other organization is able to secure it offers the opportunity to exploit the vulnerability.

No comments:

Post a Comment