What is Hacker?
A person who obtains information from other persons' computers and computer networks for his personal benefit to harm him illegally is called a hacker.Hacking means finding the weakness in the computer system and then taking advantage of the same weakness to blackmail the owner of that computer. Hacking is done by a person through a computer which we call Hacker and he has a lot of knowledge of computer and computer knowledge, so he is expert in stealing data from other computers. Hearing the name of Hacking, it is known that this is a wrong thing because it is Illegal and a person can be punished by doing so. But it is not wrong to Hacking every time because not all Hackers are same, some are good Hackers and some are Bad Hackers. Who are the good and bad hackers and what do they do? Let's find out about it further.
Types of Hacking: -
Website Hacking: - This type of Hacking means to gain unauthorized control over a web server and its associated software like databases and other interfaces.Network Hacking: - This type of Hacking means to get all the information over a network and for which there are many tools like Telnet, NS lookup, Ping, Tracert, Netstat, etc. The main purpose of doing this is only to damage the network system and its operation.
Email Hacking: - This type of Hacking means that in this hacker gets unauthorized access to his email account without the permission of the owner. Later he is going to use it for his illigal works
Ethical Hacking: - This type of Hacking means identifying the weaknesses of a system or network and helping the owner to fix it. This is a safe hacking process in which all work is done under the supervision of the owner.
Password Hacking: - This type of Hacking means that in which secret passwords are retrieved from data which are stored or transmit in the computer system by a computer system.
Computer Hacking: -This type of Hacking means that in which the hacker knows the computer ID and password of a computer system, air using hacking methods so that they gain unauthorized access to a computer system. This puts owners at risk of getting their data stolen.
No comments:
Post a Comment