Skip to main content

Who are Hackers


 Who are Hackers || How to become a Hacker.

(Note: This article is for cyber knowledge only. )

Before you go through the whole process of “How to become an Ethical Hacker” and read this article, I want to ask you a question? And this is a very important question that you have to ask yourself. Do you want to become an Ethical Hacker so that you can hack your friends' Facebook account and become cool in front of your friends? If your answer is 'yes' then sorry my friend, you have chosen the wrong track, you should reconsider your decision because becoming an ethical hacker is more than this. If you really want to become an Ethical Hacker then you have to dedicate yourself to Ethical Hacking.

In the digital world: According to the electronic world, a hacker is a person who finds the weak points in any computer, computer programs or network (Network: Internet is made up of many networks) and finds its solution. Weak points and vulnerabilities in the internet world are called vulnerabilities.
I thought it necessary to define the word Hacker because whenever a person speaks Hacker, a misconception automatically arises in our mind.
And as a result of this we feel that hackers are always wrong who are causing havoc all over the world and hence it is infamous.
But I want to make sure you that this point is half right and you can either say that half is wrong.
There are many hackers all over the world and certainly not all hackers are bad. Just like some people living in the world are bad and do wrong things but not all people are bad, similarly not all hackers are bad.

Types of Hacker
In the Internet world, Hackers are divided into 3 types, keeping in mind their tasks and activities.

White Hat Hacker – Good Hacker
You can also call these hackers heroes of the internet world. White Hat Hackers prevent bad things from happening and make the Internet a safer place. In other words, these hackers fight with bad people who are known as Black Hat Hackers. White hat hacker is called Ethical Hacker.


An Ethical Hacker first takes permission for any kind of testing on Internet technology, from the owner of that technology, which is legally valid. If he does testing for a private or public (government) organization, then first he has to get permission from that organization.
This means that you as an Ethical Hacker are associated with any organization and work for them. This hacker follows the right path and follows all the government rules and regulations.

Grey Hat Hacker – Neither Good nor Bad (50:50)
As the name suggests, these hackers have the characteristics of a little white and a little black.
This means that they are neither completely innocent nor completely criminal.
These hackers are called mischievous (naughty) and notorious (notorious) hackers in the world of internet hacking.


Gray Hat Hackers do not take any permission from any organization to launch testing or attack. But their intentions are not wrong. Their purpose is not to harm any organization. They do all this just for fun.
But still, it is not wrong, because whatever organization you are testing on, first you have to get permission from them.
Gray hat hackers occasionally violate the rules but they do not launch any kind of harmful or malicious attack.

Black Hat Hacker – The Bad Guy
This is the hacker about whom we always hear in news channels and newspapers. And this is the person due to which we have been misunderstood the word "Hacker".
As we call White Hat Hacker as hero, on the contrary we can call this type of Hacker as villain. He actually plays the role of a villain, whose only aim is to harm people and steal their data.


This also clearly shows that these hackers do not take any kind of permission before launching any attack.
Black Hat Hackers do not work under or for any organization. Even if he does, then that organization is not valid from any government authorities. This means that these people always live in darkness, there is no golden future for them.
Note: If you want to choose ethical hacking career path and want to make your future in it then definitely you should become a white hat hacker (a good person).
After knowing this difference, I hope that all your doubts will be cleared towards Ethical Hacker like; What is Ethical Hacking? Which Hacker is legally certified? Are all hackers bad?
So let's start the process of knowing “How to become an Ethical Hacker”.

Comments

Read this Article

Modern farming techniques

 Modern farming techniques make agriculture more efficient, productive, and sustainable by using advanced tools and methods. Here’s a simpler explanation: 1. Precision Farming Using tools like GPS and sensors to give plants exactly what they need—water, fertilizers, or pesticides—at the right time and place. 2. Soil-Free Farming Hydroponics: Growing plants in water with nutrients instead of soil. Aquaponics: Combining fish farming with plant growing, where fish waste fertilizes plants. 3. Vertical Farming Growing crops in stacked layers indoors, saving space and water, especially in cities. 4. Drones in Farming Small flying machines that check crops, spray pesticides, and help map farms for better management. 5. Smart Machines and AI Robots and smart tools that help plant, water, or harvest crops. AI can also predict weather and detect crop diseases. 6. Improved Seeds Scientists create seeds that produce more food, resist pests, and grow in tough conditions like drought. 7. E...

Lists of IIITs in India for students

  List of IlITs Lists of IIITs in India 1. Atal Bihari Vajpayee lIT, Gwalior, MP 2. IIIT, Kanchipuram, Tamil Nadu 3. IIIT, Kottayam, Kerala 4. IIIT, Jhalwa, Allahabad, Uttar Pradesh 5. Pandit Dwarka Pd. Mishra lIIT, Jabalpur, M.P. 6.IIIT, Guwahati, Assam 7. IIIT, Kota, Rajasthan 8. IIIT, Chittoor, Andhra Pradesh 9. IIT, Vadodara, Gujarat 10. IIIT, Una, Himachal Pradesh 11. IIIT, Kalyani, West Bengal 12. IIIT, Sonepat, Haryana 13. IIIT, Tiruchirapalli 14. IIIT, Lucknow 15. IIIT, Manipur Mantripukhri, Imphal 16.Indian Institute of Information Tech., Dharwad 17. Indian Institute of Information Tech., Ranchi 18. IIIT, Kurnool, Andhra Pradesh 19. Indian Institute of Information Tech., Nagpur 20. Indian Institute of Information Tech., Pune 21. Indian Institute of Info. Tech., Bhagalpur 22. Indian Institute of Information Tech., Bhopal 23. Indian Institute of Information Tech., Surat 24. Indian Institute of Information Tech., Agartala 25.Indian Institute of Information Tech., Karnataka ...

project on adsorption

                     Adsorption Introduction There are several examples, which reveal that the surface of a solid has the tendency to attract and retain the molecules of the phase with which it  comes into contact. Thesemolecules remain only at the surface and do not go deeper into the bulk. Adsorption The accumulation of molecular species at the surface rather than in the bulk of a solid or liquid is termed  adsorption.   Adsorbate The molecular species or substance, which concentrates or accumulates at the surface is termed adsorbate . Adsorbent The material on the surface  of which the adsorption takes place is called adsorbent . Adsorption in action (i) If a gas like O2 , H2  , CO, Cl2  , NH3  or SO2   is taken in a closed vessel  containing powdered charcoal, it is observed that the pressure of the  gas in the enclosed vessel decreases. The gas molecules concentrate...