Breaking News

Hacking Details – Everything you want to know about Hacking

CAknowledge

Hacking Details – Everything you want to know about Hacking. Hacking Details- Check Complete details for Hacking, Like – Introduction for hacking, Types of Hackers, How to save our computers and mobiles from hackers etc. In this article you can find complete details for Hacking  like -What is hacking? Who are hacker? and Categories. Hacker Categories? Types of Hacker? Skill of hackers? Advantages & Disadvantages? How to save computer from hackers. Now you can scroll down below n check “Hacking Details – Everything you want to know about Hacking”

Hacking Details – Everything you want to know about Hacking

Hacking Details - Everything you want to know about Hacking

What is Hacking?

Hacking is the act of breaking in to a computer system and is a criminal offence under the computer misuse

Or

The really simple definition of hacking: is gaining an unauthorized access to a computer system

Who is Hacker ?

Hacking is the act of breaking in to a computer system and is a criminal offence under the computer misuse

Or

The really simple definition of hacking: is gaining an unauthorized access to a computer system

Hacker Categories

  1. Semi-Professional Hacking. Performed part-time and does not provide an income. They fit the classical hacker characteristics.. they work and play on the edge of society, have a gang mentality, strong negative responses to threats against his/her self-esteem, can have narcissistic personality disorders.
  1. Inter-City Hacking. Inner-city residence (any race, color, religion, creed, etc,), exhibits anger at social condition, exhibits no social conscience, jail is not a deterrent. Hacking gives them a sense of power and allows them to make their own rules.
  2. Euro hacking. More worldly , enlightened then US hackers and are generally motivated by philosophical or political concerns.  Generally thought of as a way of life and not a crime, thinks hacking is treating technology without respect; thinks its great sport to spin up intelligence communities.
  3. Professional Hacking. This encompasses any for profit activity such as spies, industrial espionage, Narco terrorist, White Collar criminals, etc.

Type of hacker

White-hat Hackers – The good guys who identify the security weakness of the system or network and inform the owner about them

Black Hat Hackers –  A black hat is the villain or bad guy, who crash into victim’s security to steal information and destroy the victims security network. Also known as ‘cracker’.

Grey hat Hackers – A grey hat, in the hacking community, refers to a skilled hacker who is somewhere in between white and black hat hackers

Skill of a hacker 

  • Routers: knowledge of routers, routing protocols, and access control lists
  • Microsoft: skills in operation, configuration and management.
  • Linux: knowledge of Linux/Unix; security setting, configuration, and services.
  • Firewalls: configurations, and operation of intrusion detection systems.
  • Mainframes
  • Network Protocols: TCP/IP; how they function and can be manipulated.
  • Project Management: knowledge of leading, planning, organizing, and controlling a penetration testing team.

Advantages of Hacking

  • Can be used to recover lost information where the computer password has been lost.
  • Teaches u that no technology is 100% secure
  • To test how good security is on your own network. 😉
  • They call it white hat computer hacking.
  • Hacking is good with games especially when you are online but the only problem is
    if the gaming server finds out that you have been hacking then you could get chucked off the gaming server so watch out

Disadvantages of Hacking

  • Criminals can use it to their advantage.
  • It can harm someone’s privacy.
  • It’s illegal.
  • It destroys other works.

How to save computer from hackers

Protect Your Computer: Avoid Computer Holes/Vulnerabilities

  • Install only trusted software and delete unknown emails .
  • If you have any doubt about a piece of software’s function, do not install it.
  • Avoid adult web sites, a hacker’s paradise.
  • Whether in your e-mail or online, do not click on ads. If the ad is of interest, find the site. Be careful with what you physically put into your computer. This is especially true for shared R/W CDs, USB hard disks, or flash drives. This is an easy path for a virus to follow from computer to computer.

Presented by:- Arpit Verma

e.mail i.d.- [email protected]

Ask Your Query

About Raju Choudhary

Article by Raju Choudhary Raju has written 537 articles. If you like This post, you can follow CAknowledge on Twitter. Subscribe to CAknowledge feed via RSS or EMAIL to receive instant updates.

Leave a Reply

Your email address will not be published. Required fields are marked *