Friday, 7 June 2013

computer hacking



What is computer hacking?


In a cyber security world, the person who is able to discover weakness in a system and managed to exploit it to accomplish his goal referred as a Hacker , and the process is referred as Hacking.

Now a days, People started think that hacking is only hijacking Facebook accounts or defacing websites. Yes, it is also part of hacking field but it doesn't mean that it is the main part of hacking.

So what is exactly hacking, what should i do to become a hacker?! Don't worry, you will learn it from Break The Security. The main thing you need to become a hacker is self-interest. You should always ready to learn something and learn to create something new.


Now , let me explain about different kind of hackers in the cyber security world.


Script Kiddie

Script Kiddies are the persons who use tools , scripts, methods and programs created by real hackers. In a simple word, the one who doesn't know how a system works but still able to exploit it with previously available tools.

White Hat Hacker:
White Hat hackers are good guys who does the hacking for defensing. The main aim of a Whitehat hacker is to improve the security of a system by finding security flaws and fixing it. They work for an organization or individually to make the cyber space more secure.

Break The Security only concentrates on white-hat hacking and help you to learn the Ethical Hacking world.

Black Hat Hacker:
BlackHat hackers are bad guys , cyber criminals , who have malicious intent. The hackers who steal money, infect systems with malware ,etc are referred as BlackHat hackers. They use their hacking skills for illegal purposes.


GreyHat hackers:

The hackers who may work offensively or defensively, depending on the situation. Hackers who don't have malicious intentions but still like to break into third-party system for fun or just for showing the existence of vulnerability.

Hacktivists

The hackers who use their hacking skills for protesting against injustice and attack a target system and websites to bring the justice. One of the popular hacktivists is Anonymous.


Related Posts:

  • How Web Servers Work How Web Servers Workand web server vulnerabilitiesWeb servers use Hypertext Transfer Protocol (HTTP) and Hypertext Transfer ProtocolSecure (HTTPS) to allow web-based clients to connect to them and view and downloadfiles. HTT… Read More
  • How Torrent Works How Torrent WorksBitTorrent BitTorrent is a protocol that enables fast downloading of large files using minimum Internet bandwidth. It costs nothing to use and includes no spyware or pop-up advertising.Unlike other download… Read More
  • Android 4.4 KitKat detailed again in new Nexus 5 Android 4.4 KitKat detailed again in new Nexus 5  photo leak Purported photos of Google's next flagship Nexus phone crop up showing what looks like a final version of Android 4.4 KitKat. (Credit: Tutto Andr… Read More
  • How does Google Search work ? How does Google Search work ? Google search engine is undoubtedly most widely used search engine. It was founded by Larry Page and Sergey Brin. We must have the knowledge of basic working and methodology used by google searc… Read More
  • The Galaxy Gear Samsung is the first major tech company out of the gate with a modern wearable device, the Galaxy Gear.The Galaxy Gear is a $300 Android-powered watch with a 1.6-inch touchscreen. It only works if you tether it to Samsung's … Read More

0 comments:

Post a Comment