Skip to main content

Who are Hackers


 Who are Hackers || How to become a Hacker.

(Note: This article is for cyber knowledge only. )

Before you go through the whole process of “How to become an Ethical Hacker” and read this article, I want to ask you a question? And this is a very important question that you have to ask yourself. Do you want to become an Ethical Hacker so that you can hack your friends' Facebook account and become cool in front of your friends? If your answer is 'yes' then sorry my friend, you have chosen the wrong track, you should reconsider your decision because becoming an ethical hacker is more than this. If you really want to become an Ethical Hacker then you have to dedicate yourself to Ethical Hacking.

In the digital world: According to the electronic world, a hacker is a person who finds the weak points in any computer, computer programs or network (Network: Internet is made up of many networks) and finds its solution. Weak points and vulnerabilities in the internet world are called vulnerabilities.
I thought it necessary to define the word Hacker because whenever a person speaks Hacker, a misconception automatically arises in our mind.
And as a result of this we feel that hackers are always wrong who are causing havoc all over the world and hence it is infamous.
But I want to make sure you that this point is half right and you can either say that half is wrong.
There are many hackers all over the world and certainly not all hackers are bad. Just like some people living in the world are bad and do wrong things but not all people are bad, similarly not all hackers are bad.

Types of Hacker
In the Internet world, Hackers are divided into 3 types, keeping in mind their tasks and activities.

White Hat Hacker – Good Hacker
You can also call these hackers heroes of the internet world. White Hat Hackers prevent bad things from happening and make the Internet a safer place. In other words, these hackers fight with bad people who are known as Black Hat Hackers. White hat hacker is called Ethical Hacker.


An Ethical Hacker first takes permission for any kind of testing on Internet technology, from the owner of that technology, which is legally valid. If he does testing for a private or public (government) organization, then first he has to get permission from that organization.
This means that you as an Ethical Hacker are associated with any organization and work for them. This hacker follows the right path and follows all the government rules and regulations.

Grey Hat Hacker – Neither Good nor Bad (50:50)
As the name suggests, these hackers have the characteristics of a little white and a little black.
This means that they are neither completely innocent nor completely criminal.
These hackers are called mischievous (naughty) and notorious (notorious) hackers in the world of internet hacking.


Gray Hat Hackers do not take any permission from any organization to launch testing or attack. But their intentions are not wrong. Their purpose is not to harm any organization. They do all this just for fun.
But still, it is not wrong, because whatever organization you are testing on, first you have to get permission from them.
Gray hat hackers occasionally violate the rules but they do not launch any kind of harmful or malicious attack.

Black Hat Hacker – The Bad Guy
This is the hacker about whom we always hear in news channels and newspapers. And this is the person due to which we have been misunderstood the word "Hacker".
As we call White Hat Hacker as hero, on the contrary we can call this type of Hacker as villain. He actually plays the role of a villain, whose only aim is to harm people and steal their data.


This also clearly shows that these hackers do not take any kind of permission before launching any attack.
Black Hat Hackers do not work under or for any organization. Even if he does, then that organization is not valid from any government authorities. This means that these people always live in darkness, there is no golden future for them.
Note: If you want to choose ethical hacking career path and want to make your future in it then definitely you should become a white hat hacker (a good person).
After knowing this difference, I hope that all your doubts will be cleared towards Ethical Hacker like; What is Ethical Hacking? Which Hacker is legally certified? Are all hackers bad?
So let's start the process of knowing “How to become an Ethical Hacker”.

Comments

Read this Article

Jharkhand D2D exam syllabus

  Jharkhand D2D lateral entry Syllabus * Mathematics * • Complex number • Numerical analysis • Application of derivatives • Statistics • Differentiation • Limits • Set relation and function • Inverse trigonometric function • Matrices and determinant • Continuity • Integration ( definite and indefinite) • Application of integration • Differential equation • Vector • Co ordinate geometry and 3D • Probability • L.P.P • Logarithm • Sequence and series • Trigonometry • Binomial theorem • Partial fraction ___________________ ___________________ * Chemistry * • Solid state • Solution • Chemical kinetics • Chemical bonding • Periodic table • Aldehyde/ ketone/ Carboxylic Acid • Co-ordination Compound • Surface chemistry • Hydrocarbon • Amines • Bio molecules • Polymer • Mole concept • Thermodynamics • D and F blocks • Halo alkane/ Halo arene • Basic concepts of organic chemistry • Environmental chemistry • P-block • Chemical equilibrium • Metallurgy • Ether/ alcohol/ phenol • Atomic s...

Questions from potentiometer

  Potentiometer Questions from potentiometer Q1. Why is a potentiometer preferred over a voltmeter for measuring the emf of a cell? Ans. Potentiometer work on null method, It does not draw any current from the cell thus there there is no potential drop due to the internal resistance of the cell. It measures the potential difference in an open circuit which is equal to the actual EMF of the cell. It is very accurate device. On the other hand, voltmeter draw small current from the cell for its operation. So it measures terminal potential difference in a closed circuit which is less than EMF of the cell Q2. The sensitivity of a potentiometer increases with increase in length of its wire. Explain why? Ans. When the length of the wire increases the fall of potential per unit length of the wire become smaller (i.e potential gradient K= V/L ). Hence even a small potential difference can be measured. Q3. Sometime the balance point in the potentiometer may not be obtained on the wire ...

Before Buying a Refurbished Laptop – Run These Software Tools to Check Everything!

💻 Before Buying a Refurbished Laptop – Run These Tools First! Buying a refurbished or second-hand laptop can save a lot of money, but how do you make sure you're not getting a faulty machine? Here's a list of FREE and trusted software tools you should use before finalizing your purchase. 🔋 1. Check Battery Health – BatteryInfoView Use: Checks current battery capacity vs. original capacity. Download: BatteryInfoView (NirSoft) 💽 2. Test Hard Drive Health – CrystalDiskInfo Use: View hard disk or SSD health status using S.M.A.R.T. data. Download: CrystalDiskInfo 🔥 3. CPU & GPU Temperature – HWMonitor Use: Real-time temperature monitoring for processor and graphics card. Download: HWMonitor 📺 4. Dead Pixel & Display Test – InjuredPixels Use: Tests laptop screen for dead or stuck pixels. Download: InjuredPixels 💡 5. System Information Report – Speccy Use: Gives detailed info about RAM, motherboard, CPU, and storage. Download: ...