What is Hacking?

in #hacking6 years ago

hacker-room_v2-1024x512.jpg

There was no interest in hacking. I was just about programming, but it was so bad that some of the best sites in our country were hacked a few days ago. So I thought there would be something against non-ethical hackers. From that I am an anti-hacker, all Bangladeshi ethical hackers are creating a group on Facebook. If you want to stay with us then you can come. My purpose to protect from hacking is not to teach hacking. Those who have tuned to learn hacking have no reason to be frustrated, because if you want to get rid of hacking, you have to let them know before hacking.

hacker-hoax-19-08-17-1.jpg

Hacker: The person who practices hacking is called a hacker. They know all the information including the system structure, operation, how it works, which will hacking the system. Before the computer was not so prevalent, hacker was hacking the phone. Calling on the phone was called Phreaker and the process is called Phreaking. They used to hack various telecommunication systems and use it for their own needs.

hacking-and-ethicalhacking-by-satish-6-638.jpg

There are three types of hikes:

Let's say hackers are identified with a hat or hat.

 White hat hacker
 Gray hat hacker
 Black hat hacker

study-for-white-hat-hacker-associate-certification-cwa.1280x600.jpg

White hat hacker: Everyone think hacking is a bad thing, is not it? No hacking is not very bad. For him, you can see Hasan Zobayer's tune. Here is the story of our Bangladeshi white hat hacker story. White hat hacker Hackers prove that hacking is not a bad thing. For example, a white hat hacker brings out a security system error, and the security mechanism of that security system tells the error quickly. Now the security system can be a computer, a computer network, a web site, a software etc.

black-hat-hacker.png

Black hat hacker: And the most dangerous hacker is Black hat hacker. When they find out the errors of a security system, they quickly use that error for their own sake. That system is broken. Different viruses spread. In the future, the way he can enter himself again in the future. Above all, the sub-system under which system tries to access it.

Hikers are very intelligent, it is well known or everyone knows. In a very good hacker life, no bad hacking has done. But they did a hacking to trap or get rid of someone. When any of the above categories, pelabe him? He is also Grey hat hacker because his hacking depends on his wishes or thoughts.

Grey-Hat-Hacker.png

Gray hat hacker: Gray hat hacker is a two-face snake. Explain why I am saying this now. When they remove errors in a security system, they will act like their mind. He will do what he wants at that time. If he wishes, the security mechanism of the security system can cause flaws or could see or destroy information and damage. Again it can be used for its own interests. Most Haikar Rai falls in the category.

Sort:  

Congratulations @ibrahim.tech! You have completed some achievement on Steemit and have been rewarded with new badge(s) :

You published your First Post
Award for the number of upvotes

Click on any badge to view your own Board of Honor on SteemitBoard.
For more information about SteemitBoard, click here

If you no longer want to receive notifications, reply to this comment with the word STOP

By upvoting this notification, you can help all Steemit users. Learn how here!