What is hacking?

What Is Hacking And Who Are Hacker?

Hacking is distinctive weakness in pc systems or networks to take advantage of its weaknesses to realize access.

The person engaged in hacking activities is thought as a hacker.

Hackers area unit sometimes masterly pc programmers with data of pc security.

There are different types of hacker but mainly White hat (Ethical) and Black hat (Unethical) are the two basic types of hacker.

What is Ethical Hacking?

Some call them white hat hackers, other call them legal hackers, and some use the term pentester. All those mean the same thing: A hacker who helps the organizations to uncover the security issues with the goal of preventing those security flaws (weak point) from being exploited. The idea behind ethical hacking is to pay the good hacker (good guy) to find any backdoor(holes) the bad hacker (bad guy) would, before the bad hacker can get to them. Ethical hacker uses penetration testing and other techniques to analyze an organization’s networks, systems, and applications. As we can say, ethical hacker uses the same tool and techniques as the malicious hackers to find the real vulnerabilities. But the only difference is Ethical hacker report them back to the organization to resolve the vulnerabilities.

Some facts about Hacking

The hacker Kevin Mitnick was kept in solitary confinement for 8 months because he could start nuclear war just by whistling code in a payphone.

A 15-year previous named Jonathan James once hacked NASA and caused a 21-day closure of their computers.

 

The hacking within the moving picture Matrix was performed exploitation real tools.

 

Apple co-founder Steve Wozniak was expelled from the University of Colorado after hacking into the school’s computer system.

Think your Mac is hackproof? A security researcher Charlie Miller used a flaw in Safari to break into a MacBook in under 10 seconds.

Lenovo Computers is part in hand by the Chinese government and their computers return preloaded with secret backdoor access.

As result MI6, the CIA and other spy agencies have banned their use.

Enjoyed this article? Stay informed by joining our newsletter!

Comments

You must be logged in to post a comment.

About Author