Hackings....

in #news6 years ago

Generally, almost everybody think hacking is just hacking a website, and many people think hacking means just hack the computer or computer network. Actually there may be many types of hacking.
image-37551-1523512533.jpg

Mobile phones, land phones, car tracking, electronic electronic and digital instruments, without valid permission, and under hacking. Generally hackers usually get the error of these electronic devices and they hack it.

The hacker is the hacker who is the hacker. They know all the information about how the system is structured, processed, and how they hack into the system. Before the computer was not so popular, hackers were hacking phones.

They used to hack various telecommunications systems and use it for their own needs.

In the 1950s to the 1960s, M.I.T. engineers started the first hacking word. It's basically started to break the coding of the Mainframe Computer and just for fun.

In the next decade, some unrighteous hacker started hacking mobile phone for unethical purposes! Before the computer was not so popular, hackers were hacking phones.

Phone hackers were called Phreaker and this process is called Phreaking. They used to hack various telecommunication systems and use it for their own needs.

Hackers are usually 2 types- 1. Ethical Hacker 2 Non-Ethical Hacker can be divided into another way. By considering the hats they are.

There are three types of hackers that hackers are identified with hat or hat. 1. White hat hacker 2 Gray hat hacker 3 Black hat hacker

  1. White hat hacker: Everyone think hacking is a bad thing, is not it? No hacking is not very bad. White hat hacker Hackers prove that hacking is not a bad job. For example, a white hat hacker finds errors in a security system and tells the malicious security of the security system. Now the security system can be a computer, a computer network? A website, a software etc.

  2. Gray hat hacker: This category hackers do not enter any system for making any money or blackmail. They use their skills to make fun of such a system. But they do not accept permission to enter any system. Here's why they do not hack into any harm or to make money, so their black hat hackers can not be said. Again, because they enter the system without permission, they can not even be called white hat hackers. So these are called Gray Hat Hackers. That means the middle and middle stage of black and white.

  3. Black hat hacker: The most dangerous hacker is Black hat hacker. When they find out the trunks of a security system they quickly use that error in their own interests. That system is damaged. Different viruses spread. In the future, it will be the way it can enter again. Above all, try to enter the sub-systems under that system. Hackers are pretty intelligent, it's universally recognized or everyone knows. In a very good hacker life, no bad hacking has happened. But in many cases they are trapped or hacked to confuse anyone.

Hackers usually hack in a few ways, including a pic. This pissing uses almost all the hiccups. Denial of Service attack DoS Attack is a process where hackers lose access to any network without losing any access to the hackers. Increasing the net connection or router's tariffs on the flyoff. There are also more Trojan Horses.

This is a program that destroys other programs. Everyone knows this as Virus. By using Trojan Horses, other programs are broken down, as well as passwords or other information to the hackers. Rogue Access Points: Hackers use Rogue Access Points to access a wireless network. Other than this, hackers can do more hacking.

Everything is good and bad, it has technology, it's like its own, but you can use it well or it depends on you.

Hacking and good aspects like Ethical Hacking The meaning of the word 'ethical' means 'moral' ie moral or legitimate hacking. And those hackers who have their policies do not do anything immoral. They are Ethical Hacker.

Ethical hacking is being done by hackers after getting permissions from a system admin or software company. If he breaks the security of the system, then he has full permission to do so, he does not work without permission of malicious hacker.

An ethical hacker must respect any company or system's privacy and must work with permission. After doing that, after checking the system, if it finds an error, it will surely inform the company about the error and help secure the system by providing security pants.

A lot of good moral hackers are now abroad from the country. Because a moral hacker can survive millions or millions of dollars of a company.

Although webmasters use encryption to avoid hacking websites. Anyway, many weblogs

Sort:  

just amazing writing sir.so imformative news...hackertypes of hacker,what are havker.really impressed,,,,i dont knew it before...thats amazing....all hackers was not bad there will be good one..... every works have negative and positive sides.....you mention it so clearly.......sometimes hackers are usefull. for example white hackers,, if white hackers are not exist we fall in risk condition..... thanks sir,, for your great status......hopefully everyone like it......

You got a 3.88% upvote from @upmewhale courtesy of @robin5581!

Earn 100% earning payout by delegating SP to @upmewhale. Visit http://www.upmewhale.com for details!

Great post!
Thanks for tasting the eden!

Coin Marketplace

STEEM 0.30
TRX 0.12
JST 0.033
BTC 64344.02
ETH 3142.36
USDT 1.00
SBD 4.01