What is hacking?

Hacking is a process where someone enters a computer or computer network without any valid permission. Those hackers are hackers. There may be many types of hacking. If you use your mobile phone, land phone, car tracking, different electronics and digital devices without the legal permission, then it will be hacked. Hackers usually hack the errors of these electronics devices by hacking them.

Now what is the hacker?
Hacker: The person who practices hacking is called a hacker. They know all the information including system structure, operation, how it works, which will hacking system. Before the computer was not so prevalent, hacker was hacking the phone. Calling on the phone was called Phreaker and the process is called Phreaking. They used to hack various telecommunication systems and use it for their own needs.

There are three types of hacks: Let's say hackers are identified with a hat or hat.

   1. White hat hacker
   2. Gray hat hacker


Gray hat hacker: Gray hat hacker is a two-face snake. Let me explain why that is why. When they remove errors in a security system, they will act like their mind. He will do what he wants at that time. If he wishes, the security mechanism of the security system can cause flaws or may see or destroy the information. You can use it for your own sake. Most Hikker Rai falls in the category.

Black hat hacker: And the most dangerous hacker is Black hat hacker. When they find errors in a security system, they quickly use that error for their own sake. That system is broken. Different viruses spread. Keeping the way in which it can enter the future itself again. Above all, the sub-system under which system tries to access it.

Hikers are very intelligent, it is well known or everyone knows. In a very good hacker life, no bad hacking has done. But they did a hacking to trap or get rid of someone. When any of the above categories, pelabe him? He is also Grey hat hacker because his hacking depends on his wishes or thoughts.

Below, I introduce you to a few more types of people

Anarchists: Anarchists are those hackers who like to break different computer security systems or any other system. They work to find opportunities for any target.

Crackers: Many times the harmful hacker is called cracker. Bad hackers are crackers. Their shock or profession is broken by breaking the password and creating Trojan Horses and making other harmful software. (Are you one of them? So you're the King of Hacking) The harmful software is called Warez. They use these harmful software for their own use or sell their own profits.

Script kiddies: They are not real hackers. There is no real knowledge about hacking. They are downloading or purchasing various Warez and using it after hacking.


Hackers make hacking in many ways. I'm discussing a few types of hacking


PISING: -

Denial of Service attack: Denial of Service attack: DoS Attack is a process where hackers lose access to a network without getting any access to it. Increases the net connection or router tariffs at DoS Attack.


Trojan Horses: is a program that destroys other programs. It's all known as Virus. Using trojan horses, the other programs can easily get rid of passwords or other information related to hackers by hackers.


Back Doors: Back Doors Finds Hackers Who Use the System Back Doors are administrative easy roads, configuration mistakes, easy-to-understand passwords, and unsaved dial-up connections. These are the errors of computers with the help of computers. Apart from these and using other weak places, no network can be used.


Rogue Access Points: Hackers use Rogue Access Points to access a wireless network.

No comments

Theme images by merrymoonmary. Powered by Blogger.