What
is Hacking?
Hacking
is finding or identifying weakness in a computer network or a system,
exploiting on the basis of that weakness and gaining an unauthorized
access to and/or control over the system.
Nowadays
computers are
obligatory. It
dosen’t matter if you have a business or if you are a person doing
10 to 5 job or if you are a student, you will see that computers are
everywhere and are useful in your daily work.
Think
of a morning when you weak up, get ready and go to work. You reach at
your work place and go straight
to your cubicle
to complete your yesterdays work which you left
of completing today. But
when you turn on your
computer to start your work, you see a dialog box showing system data
is encrypted. And pay given amount to
decrypt data.
This
kind of dialog is what you will see when your system gets hacked.
This
is an example of ransomware attack.
This
year in May (2017), a cyber attack raised by a cryptoworm called
WannaCry Ransomware targeted Windows OS by encrypting data on the
system.
Types
of Hackers?
Hacker
is a person who finds weakness in the system to exploits and gain
access to it.
Different
types of hacker are:
White
Hat
A
hacker are Ethical
hackers who gain
access to fix weakness in the system. They are called penetration
testers. White hat hacking is not illegal. There are jobs available
for these hackers to test the system for any weakness.
Black
Hat
Black
hat hackers are those who hack
the system to gain unauthorized access to the system and can steal or
destroy the data. These type of hackers are illegal and are called
crackers.
Gray
Hat
Gray
hat hackers are those who are considered as half black hat and half
white hat. They hack the system without permission, find the weakness
in the system and then tell the owner about it. They do not hack to
harm the system but do it without permission.
Neophyte
Neophyte
are those who are new to hacking and may have some or no knowledge
about hacking. They are sometimes called Green
Hat hackers.
Script
Kiddies
Script kiddies are those who
have very less knowledge and are considered non-skilled. They do not
care much about how they hack. They use tools which are made by some
other person for hacking.
Hacktivist
Hacktivist are those who hack
to send a public message on social political or religious topics.
This involves hacking website and leaving a message on it. This is
also done by Denial-Of-Service (DOS) attack.
So, these are the types of
hackers.
Now, the question arises, how
can anyone protect the data on there system from hackers, especially
which are not good.
So, there are some things
which you need to follow and take care of. They are below:
-
You should use a Antivirus software and that to which gives you total protection.
-
You must not open any unknown file (executable file).
-
You should not use cracked software's.
-
You should scan your PC and other devices, such as pen drive or external drive, as you connect it to your computer.
-
You should not download any random file from Internet and also avoid visiting any anonymous or non secure website in the first place.
-
Frequently backup of your data. This is the best thing to do before something goes wrong.
So these are some of the
things which you should take care of if you want to make sure that
your data is safe.
it is nice to read your blog and im really appreciate to read that.thanks to you for giving wonderfull ideas..thankyou
ReplyDeleteethical hacking training in chennai
ethical hacking course in coimbatore
best ethical hacking institute in bangalore
Thanks for reading.
DeleteSubscription boxes are a type of boxes which are delivered to the regular customers in order to build goodwill of the brand. They are also a part of the product distribution strategy. As a woman, you should subscribe to these boxes to bless yourself with a new and astonishing box of happiness each month. visit mysubscriptionsboxes
ReplyDeleteTamil Song Lyrics is a Lyrics based blog that provides latest songs lyrics songs with singers, music composers and other informations
ReplyDeleteDo Visit: Tamil Song lyrics
ReplyDeleteThe article you have shared here is great. I read your post with carefully, the points you mentioned can be very helpful. It is nice seeing your wonderful post.Get for more information black hat hackers for hire
Thanks for sharing the best information and suggestions, I love your content, and they are very nice and very useful to us. Get for more information i need a hacker to change my grades
ReplyDeleteThanks for sharing us. Hacking Forum
ReplyDeleteGreat post, and great website. Thanks for the information! Cracking
ReplyDeleteHow to hire a hacker on the dark web hire a hacker
ReplyDeleteExtremely helpful post. This is my first time visiting here. I discovered such a large number of intriguing stuff in your blog particularly its exchange. Truly its extraordinary article. Keep it up. password hacking service online
ReplyDeletePretty good post. I just stumbled upon your blog and wanted to say that I have really enjoyed reading your blog posts. Any way I'll be subscribing to your feed and I hope you post again soon. Big thanks for the useful info. Carding Forum
ReplyDeleteVery good points you wrote here..Great stuff...I think you've made some truly interesting points.Keep up the good work. darknetpro.ne
ReplyDeleteThis is quite an incredible asset that you are giving and you part with it for nothing. I love seeing online journals that comprehend the benefit of giving a quality asset about hacker. dissertation proofreading uk
ReplyDelete