Sunday, July 6, 2014


Computer hacking is the practice of altering computer hardware and software to carry out a goal outside of the creator’s original intention. People who slot in computer hacking actions and activities are offend entitled as hackers.


                The term hacking can be termed as the art of breaching of the security of the admin panels or the control panels in order to extract the information. And the Principle of hacking also states that, “If a hacker or a malicious person wants to get into any system say server, computer systems or networks he/she will be there is nothing you can do to stop them. There’s only one thing you can do is to make it harder for them to enter into your security system.”

Always remember this quote that in this world nothing is 100% secure it’s just a matter of time that one day the security has to be broken.

Generally Hackers are divided into four classes:

Black Hat


Person having the extraordinary skill in hardware and software and implement their knowledge in the destructive manner. These are the persons whom definition in today’s world as a hacker. The Black Hat community actually does the hacking for the sake of enjoyment or revenge. As at present the Anonymous is famous as a Black Hat for taking revenge on the governments of different countries.

White Hat


Persons using their skills in a defensive way and secure their systems so that crackers do not gain access to these. And white hats are actually the persons who perform their skills to stop Black Hats. White Hats are also known as The HACKERS.

Grey Hat


Persons using their skills for both offensively and defensively. Grey Hats actually work in an offensive manner till when they got their rights but when time comes to take revenge they act like Black Hats.

Suicide Hackers


Those who do hacking and do not bother about if they have to spend 20 years in jail. This class of hackers are also known as the ‘script kiddies’. This class is basically a very dangerous class because these are young generation hackers and usually use the scripts that are made by others.

0 comments:

Post a Comment

Popular Posts

Recent Posts