What is Hacking? Types of Hackers - MrAboutTech


Wednesday, December 6, 2017

What is Hacking? Types of Hackers

What is Hacking

What is Hacking?

Hacking is finding or identifying weakness in a computer network or a system, exploiting on the basis of that weakness and gaining an unauthorized access to and/or control over the system.

Nowadays computers are obligatory. It dosen’t matter if you have a business or if you are a person doing 10 to 5 job or if you are a student, you will see that computers are everywhere and are useful in your daily work.
Think of a morning when you weak up, get ready and go to work. You reach at your work place and go straight to your cubicle to complete your yesterdays work which you left of completing today. But when you turn on your computer to start your work, you see a dialog box showing system data is encrypted. And pay given amount to decrypt data.
This kind of dialog is what you will see when your system gets hacked.
This is an example of ransomware attack.
This year in May (2017), a cyber attack raised by a cryptoworm called WannaCry Ransomware targeted Windows OS by encrypting data on the system.

Types of Hackers?

Hacker is a person who finds weakness in the system to exploits and gain access to it.

Different types of hacker are:

White Hat
A hacker are Ethical hackers who gain access to fix weakness in the system. They are called penetration testers. White hat hacking is not illegal. There are jobs available for these hackers to test the system for any weakness.

Black Hat
Black hat hackers are those who hack the system to gain unauthorized access to the system and can steal or destroy the data. These type of hackers are illegal and are called crackers.

Gray Hat
Gray hat hackers are those who are considered as half black hat and half white hat. They hack the system without permission, find the weakness in the system and then tell the owner about it. They do not hack to harm the system but do it without permission.

Neophyte are those who are new to hacking and may have some or no knowledge about hacking. They are sometimes called Green Hat hackers.

Script Kiddies
Script kiddies are those who have very less knowledge and are considered non-skilled. They do not care much about how they hack. They use tools which are made by some other person for hacking.

Hacktivist are those who hack to send a public message on social political or religious topics. This involves hacking website and leaving a message on it. This is also done by Denial-Of-Service (DOS) attack.

So, these are the types of hackers.

Now, the question arises, how can anyone protect the data on there system from hackers, especially which are not good.

So, there are some things which you need to follow and take care of. They are below:
  • You should use a Antivirus software and that to which gives you total protection.
  • You must not open any unknown file (executable file).
  • You should not use cracked software's.
  • You should scan your PC and other devices, such as pen drive or external drive, as you connect it to your computer.
  • You should not download any random file from Internet and also avoid visiting any anonymous or non secure website in the first place.
  • Frequently backup of your data. This is the best thing to do before something goes wrong.

So these are some of the things which you should take care of if you want to make sure that your data is safe.


  1. it is nice to read your blog and im really appreciate to read that.thanks to you for giving wonderfull ideas..thankyou
    ethical hacking training in chennai
    ethical hacking course in coimbatore
    best ethical hacking institute in bangalore

  2. Subscription boxes are a type of boxes which are delivered to the regular customers in order to build goodwill of the brand. They are also a part of the product distribution strategy. As a woman, you should subscribe to these boxes to bless yourself with a new and astonishing box of happiness each month. visit mysubscriptionsboxes

  3. Tamil Song Lyrics is a Lyrics based blog that provides latest songs lyrics songs with singers, music composers and other informations

    Do Visit: Tamil Song lyrics


  4. The article you have shared here is great. I read your post with carefully, the points you mentioned can be very helpful. It is nice seeing your wonderful post.Get for more information black hat hackers for hire

  5. Thanks for sharing the best information and suggestions, I love your content, and they are very nice and very useful to us. Get for more information i need a hacker to change my grades

  6. Great post, and great website. Thanks for the information! Cracking

  7. Extremely helpful post. This is my first time visiting here. I discovered such a large number of intriguing stuff in your blog particularly its exchange. Truly its extraordinary article. Keep it up. password hacking service online

  8. Pretty good post. I just stumbled upon your blog and wanted to say that I have really enjoyed reading your blog posts. Any way I'll be subscribing to your feed and I hope you post again soon. Big thanks for the useful info. Carding Forum

  9. Very good points you wrote here..Great stuff...I think you've made some truly interesting points.Keep up the good work. darknetpro.ne

  10. This is quite an incredible asset that you are giving and you part with it for nothing. I love seeing online journals that comprehend the benefit of giving a quality asset about hacker. dissertation proofreading uk

  11. Great work! I am totally impressed with your work. I got some amazing ideas from your article about hacking. Thanks and keep sharing. Professional Hacker For Hire Online

  12. I generally want quality content and I found that in your post about hacking. The information you have shared. IT is beneficial and significant for us. Keep sharing these kinds of articles here. Thank you. Hacker for hire

  13. I am very thankful to you that you have shared this information with us. I got some different kind of knowledge from your web page, and it is really helpful for everyone. Thanks for share it. Professional hacker for hire

  14. Please continue this great work and I look forward to more of your awesome blog posts. Hire a verified hacker

  15. This is very educational content and written well for a change. It's nice to see that some people still understand how to write a quality post.! best i need a hacker urgently service provider.

  16. Thank you a bunch for sharing this with all of us you actually realize what you are talking about! Bookmarked. Please also seek advice from my site =). We could have a hyperlink change contract between us! สล็อตโจ๊กเกอร์

  17. I can’t imagine focusing long enough to research; much less write this kind of article. You’ve outdone yourself with this material. This is great content. superslot

  18. I admire this article for the well-researched content and excellent wording. I got so involved in this material that I couldn’t stop reading. I am impressed with your work and skill. Thank you so much. Ethical Hacker For Hire

  19. It's very nice of you to share your knowledge through posts. I love to read stories about your experiences. They're very useful and interesting. I am excited to read the next posts. I'm so grateful for all that you've done. Keep plugging. Many viewers like me fancy your writing. Thank you for sharing precious information with us. Best hire a hacker to fix credit score service provider.

  20. Hey what a brilliant post I have come across and believe me I have been searching out for this similar kind of post for past a week and hardly came across this. Thank you very much and will look for more postings from you. Best social media hackers for hire service provider

  21. It’s great to come across a blog every once in a while that isn’t the same out of date rehashed material. Fantastic read.Best social media hackers for hire service provider


  22. Hey what a brilliant post I have come across and believe me I have been searching out for this similar kind of post for past a week and hardly came across this. Thank you very much and will look for more postings from you Best phone hackers for hire Services Provider