Hack, Hacking and Hacker

in #hacker7 years ago

Hacks: Now we understand that hacking is such that - stealing facebook passwords, using the free internet, installing games or games from the Play Store, etc .. There are more people who can use computers, mobile phones and the Internet better, they can search Google but they like short search like Hack, game hack, phone hack or facebook hack, but this is not how hacking can be understood. However, they know fairly about hacking, such as website hacks, bank account hacks, operating system hacking etc.

What is hacking?

Hacking is a process where someone enters a computer or computer network without any valid permission. Those hackers are hackers. There may be many types of hacking. If you use your mobile phone, land phone, car tracking, different electronics and digital instruments without the legal permission, then it is hacked. Hackers usually hack the errors of these electronics devices by hacking them.

Now who is the hacker?

Hacker: "The person who practices hacking is called a hacker". They know all the information including system structure, operation, how it works, which will be hacking the system. Before the computer was not so prevalent, hacker was hacking the phone. Calling on the phone was called Phreaker and the process is called Phreaking. They used to hack various telecommunication systems and use it for their own needs.

There are three types of hackers: let's say the hackers are identified with a hat or hat. 1. White Hat Hacker (White Hat Hacker)

  1. Gray hat hacker (Gray hat hacker)
  2. Black hat hacker (Black Hat hacker)

White Hat Hacker (White Hat Hacker): Many think hacking is a very bad thing, is not it? No hacking is not very bad. White hat hacker Hackers prove that hacking is not a bad job. For example, a white hat hacker brings out a security system error, and the security mechanism of that security system tells the error quickly. Now the security system can be a computer, a computer network, a web site, a software etc.

Gray hat hacker (Gray hat hacker ) is a two-face snake. Explain why I am saying this now. When they remove errors in a security system, they will act like their mind. He will do what he wants at that time. If he wishes, the security mechanism of the security system can cause flaws or could see or destroy information and damage. Again it can be used for its own interests. Most Haikar Rai falls in the category.

Black hat hacker: (Black Hash Hacker) And the most dangerous hacker is A Black hat hacker. When they find out the errors of a security system, they quickly use that error for their own sake. That system is broken. Different viruses spread. In the future, the way he can enter himself again in the future. Above all, the sub-system under which system tries to access it.

Hikers are very intelligent, it is well known or everyone knows. In a very good hacker life, no bad hacking has done. But they did a hacking to trap or get rid of someone. Then you will drop him in the above category? He is also Grey hat hacker because his hacking depends on his wishes or thoughts.

Below are a few more types of hackers introduced to you

Anarchists : Anarchists are those hackers who prefer to break different computer security systems or any other system. They work to find opportunities for any target.

Crackers : Many times the harmful hacker is called cracker. Bad hackers are crackers. Their shock or profession is broken by breaking across password and creating Trojan Horses and making other harmful software. (Are you one of them? Then you are the King of Hacking) The harmful software is called Warez. They use these harmful software for their own use or sell them for their own benefit.

Script kiddies: They are not real hackers . There is no real knowledge about hacking. They are downloading or purchasing various Warez and using Hacking.

Hackers make hacking in many ways. I'm discussing a few types of hacking

Denial of Service Attack : The main function of this attack is to disable the system for a long time. There is no need to have access to the system for this purpose. The first task of those who have a DOS attack is to take control of many computers (more than a thousand) in the first place. Then, continuously sending all requests from all the computers to the target website at the same time. This can cause the buffer overflow of the system to be ineffective for some time. What is the profit in this? Think, two competing companies sell online. If a company's website is bored for two hours, then how much profit from other companies!

Trojan Horse: Trojans Horse is a malware but not a virus. Trojan horse is basically an incognito program. How? Trojan horse system is installed through the user. But why a user knowingly install Trojan? In this case Trojans make the user fool Trojan horse malware holds such names that the user thinks they are a system program. Actually they do not. Do not check yourself a little. On your PC's Alter + Control + Dell, on the Task Bar. See whether there is a program called Local Service or SVCHost, whose user name in place of the administrator instead of the system administrator or login name showing. If this happens, it is definitely Trojan.

Backdoor: The basic task of backdoors is that through this, Atstrador can control your PC while sitting at his home. Even many backdoors can stream live video of your work done on your PC. Using your PC to attack any other system, your PC may also use illegal content to keep the controller.

Rogue Access Points: Hackers use Rogue Access Points to access a wireless network.

Coin Marketplace

STEEM 0.30
TRX 0.26
JST 0.039
BTC 95213.51
ETH 3406.88
USDT 1.00
SBD 3.49