Tuesday 15 January 2013

What is Hacking And Some Basic Concepts



Hello Friends And Welcome To a Very New Blog " Proud Hackers ". This is a New And Awesome Blog That Teaches You All About Hacking, It's Types, How To Hack And How To Protect. For Those High Terms You Would First Need To Know About What is Hacking And It's Types.

Gree Code With Black terminal For Hackers Basic

" No One Can Go Back And Start A New Beginning, But Any One Can Start Today And Make A New Ending. "

So Let's Start With The Post, You Will Find Many Articles Related To What is Hacking And It's Types But in Proud Hackers I'll Try To Provide The Best Of Knowledge Of Mine.

What is Hacking ?



Hacking Refers Mainly To Ability Of One To Understand The Computers Very Deeply And Change its Inner Mechanism Without Having Enough Permissions. Hacking is a Process of Modifying Computer Hardware and Software to Accomplish Goals Outside The Creator's Original Purpose.Hacking is Reverse Engineering But Because of Some Selfish Peoples The Term Hacking is Been Now Taken As Negative Term or Offensive.

One Who Involves in Such Type of Activities is Known As Hacker or Geek. Hacker is One Who Finds Vulnerability or Weakness On Someone Others Computer Without Enough Permissions.

White Hat Hacking



White Hat Hacking Refers To Hacking Which is Done To Protect Networks or Say Computers From Black Hat Hackers or ( Who Hacks For Their Personal Means ). White Hat Hacking is Done For Security Purpose or To Test Security Programs. White Hat Hacking Also Refers To Ethical Hacking.

Those White Hat Hackers Are Also Know As Ethical Hackers. Ethical Hacker hack For Non Malicious Reasons. They Have Defined Code Of Ethics, They Often Works With Manufacturer To Get Accurate Weakness.

Ethical Hacker or White Hat Hacker

Black Hat Hacking



Black Hat Hacking Violates Computer or Network Security For Some Personal Gain or For Some Type of Challenges. Black Hat Hacking is Illegal Because in Black Hat Hacker Gain Access To Systems Without Enough Security Permissions And Use it As Way He/She Wants.

The Person Who Perform Black Hat Hacking is Termed As Black Hat Hacker. They Gain Access To Systems And Make it Unusable For Others By Destroying It 's Inner Maintenance.

That's All That Can Be Mention in This Post According To Me, Miss Any Point And Want It To Be Included in The Article, Feel Free To Ask by Commenting Below.

If You Loved The Post Please Help Us And Keep Motivating By Sharing This Article.

Filled Under:

0 comments:

Post a Comment