Skip to main content

Who are Hackers


 Who are Hackers || How to become a Hacker.

(Note: This article is for cyber knowledge only. )

Before you go through the whole process of “How to become an Ethical Hacker” and read this article, I want to ask you a question? And this is a very important question that you have to ask yourself. Do you want to become an Ethical Hacker so that you can hack your friends' Facebook account and become cool in front of your friends? If your answer is 'yes' then sorry my friend, you have chosen the wrong track, you should reconsider your decision because becoming an ethical hacker is more than this. If you really want to become an Ethical Hacker then you have to dedicate yourself to Ethical Hacking.

In the digital world: According to the electronic world, a hacker is a person who finds the weak points in any computer, computer programs or network (Network: Internet is made up of many networks) and finds its solution. Weak points and vulnerabilities in the internet world are called vulnerabilities.
I thought it necessary to define the word Hacker because whenever a person speaks Hacker, a misconception automatically arises in our mind.
And as a result of this we feel that hackers are always wrong who are causing havoc all over the world and hence it is infamous.
But I want to make sure you that this point is half right and you can either say that half is wrong.
There are many hackers all over the world and certainly not all hackers are bad. Just like some people living in the world are bad and do wrong things but not all people are bad, similarly not all hackers are bad.

Types of Hacker
In the Internet world, Hackers are divided into 3 types, keeping in mind their tasks and activities.

White Hat Hacker – Good Hacker
You can also call these hackers heroes of the internet world. White Hat Hackers prevent bad things from happening and make the Internet a safer place. In other words, these hackers fight with bad people who are known as Black Hat Hackers. White hat hacker is called Ethical Hacker.


An Ethical Hacker first takes permission for any kind of testing on Internet technology, from the owner of that technology, which is legally valid. If he does testing for a private or public (government) organization, then first he has to get permission from that organization.
This means that you as an Ethical Hacker are associated with any organization and work for them. This hacker follows the right path and follows all the government rules and regulations.

Grey Hat Hacker – Neither Good nor Bad (50:50)
As the name suggests, these hackers have the characteristics of a little white and a little black.
This means that they are neither completely innocent nor completely criminal.
These hackers are called mischievous (naughty) and notorious (notorious) hackers in the world of internet hacking.


Gray Hat Hackers do not take any permission from any organization to launch testing or attack. But their intentions are not wrong. Their purpose is not to harm any organization. They do all this just for fun.
But still, it is not wrong, because whatever organization you are testing on, first you have to get permission from them.
Gray hat hackers occasionally violate the rules but they do not launch any kind of harmful or malicious attack.

Black Hat Hacker – The Bad Guy
This is the hacker about whom we always hear in news channels and newspapers. And this is the person due to which we have been misunderstood the word "Hacker".
As we call White Hat Hacker as hero, on the contrary we can call this type of Hacker as villain. He actually plays the role of a villain, whose only aim is to harm people and steal their data.


This also clearly shows that these hackers do not take any kind of permission before launching any attack.
Black Hat Hackers do not work under or for any organization. Even if he does, then that organization is not valid from any government authorities. This means that these people always live in darkness, there is no golden future for them.
Note: If you want to choose ethical hacking career path and want to make your future in it then definitely you should become a white hat hacker (a good person).
After knowing this difference, I hope that all your doubts will be cleared towards Ethical Hacker like; What is Ethical Hacking? Which Hacker is legally certified? Are all hackers bad?
So let's start the process of knowing “How to become an Ethical Hacker”.

Comments

Read this Article

All Microsoft Excel Shortcuts (2025) – Beginner to Advanced Guide

📊 All Microsoft Excel Keyboard Shortcuts – Complete Guide (2025) Microsoft Excel is the world’s most powerful spreadsheet tool. Whether you're analyzing data, creating financial models, or simply formatting sheets, learning Excel shortcuts can make your work faster and smarter. Here's the ultimate list of Excel keyboard shortcuts for Windows users. 🖥️ Basic Excel Shortcuts Shortcut Action Ctrl + N Create new workbook Ctrl + O Open workbook Ctrl + S Save workbook Ctrl + P Print Ctrl + Z Undo Ctrl + Y Redo 🔢 Cell Editing & Selection Shortcut Action F2 Edit active cell Ctrl + C Copy Ctrl + X Cut Ctrl + V Paste Ctrl + Z Undo Ctrl + A Select entire worksheet or range Ctrl + Shift + Arrow Select data range 🧮 Excel Formula Shortcuts Shortcut Function = Start a formula Alt + = AutoSum Ctrl + ` Show all formulas F9 Calculate workbook Shift + F9 Calculate active sheet 📊 Na...

How to Create a Multi-Boot USB Pendrive (Windows + Linux) – Step-by-Step Guide 2025

💻 How to Make a Multiple Boot USB Pendrive (2025) Want to carry Windows, Linux, and tools all on one USB? Here's an easy guide to creating a multi-boot pendrive using free tools like Ventoy and YUMI. 🧰 Requirements USB drive (16GB or more) ISO files of OS or tools (Windows, Ubuntu, etc.) Free software like Ventoy or YUMI 🟢 Method 1: Using Ventoy (Recommended) Download from ventoy.net Install Ventoy to USB (formats drive) Copy ISO files to USB – just drag and drop! Boot and select any OS from menu 💡 Advantages of Ventoy: No need to extract or format ISOs Supports UEFI and Legacy boot Works with Windows, Linux, and utility tools 🔧 Method 2: Using YUMI Download from pendrivelinux.com Select USB and choose ISO file in tool Add more ISOs one by one ✅ Final Thoughts Using a multiboot USB saves time and is perfect for technicians, students, and ethical hackers. We recommend Ventoy for its simplicity...

All About the Sun: Formation, Age, Working Principle & Facts

All About the Sun: Formation, Age, Working Principle & Facts ☀️ Everything About the Sun The Sun is not just a glowing object in the sky. It’s a massive, powerful star that keeps our planet alive. In this article, we’ll explore how the Sun was formed, how it works, its structure, age, and future — in the simplest terms. 🌌 How the Sun Was Formed About 4.6 billion years ago, a huge cloud of gas and dust (a solar nebula) collapsed due to gravity. This led to the creation of a hot core — the protostar. As the core became hotter, nuclear fusion began, forming the Sun. Read More 🌫️ Nebula Collapse: Gravity pulled gas and dust inward. 🔥 Protostar Formed: A dense, hot core appeared. ☀️ Fusion Ignition: Hydrogen atoms fused into helium. 🌞 Main-Sequence Star: The Sun was born! ⏳ Age of the Sun The Sun is estimated to be 4.6 billion years old . It is in the middle of...