Skip to main content

Who are Hackers


 Who are Hackers || How to become a Hacker.

(Note: This article is for cyber knowledge only. )

Before you go through the whole process of “How to become an Ethical Hacker” and read this article, I want to ask you a question? And this is a very important question that you have to ask yourself. Do you want to become an Ethical Hacker so that you can hack your friends' Facebook account and become cool in front of your friends? If your answer is 'yes' then sorry my friend, you have chosen the wrong track, you should reconsider your decision because becoming an ethical hacker is more than this. If you really want to become an Ethical Hacker then you have to dedicate yourself to Ethical Hacking.

In the digital world: According to the electronic world, a hacker is a person who finds the weak points in any computer, computer programs or network (Network: Internet is made up of many networks) and finds its solution. Weak points and vulnerabilities in the internet world are called vulnerabilities.
I thought it necessary to define the word Hacker because whenever a person speaks Hacker, a misconception automatically arises in our mind.
And as a result of this we feel that hackers are always wrong who are causing havoc all over the world and hence it is infamous.
But I want to make sure you that this point is half right and you can either say that half is wrong.
There are many hackers all over the world and certainly not all hackers are bad. Just like some people living in the world are bad and do wrong things but not all people are bad, similarly not all hackers are bad.

Types of Hacker
In the Internet world, Hackers are divided into 3 types, keeping in mind their tasks and activities.

White Hat Hacker – Good Hacker
You can also call these hackers heroes of the internet world. White Hat Hackers prevent bad things from happening and make the Internet a safer place. In other words, these hackers fight with bad people who are known as Black Hat Hackers. White hat hacker is called Ethical Hacker.


An Ethical Hacker first takes permission for any kind of testing on Internet technology, from the owner of that technology, which is legally valid. If he does testing for a private or public (government) organization, then first he has to get permission from that organization.
This means that you as an Ethical Hacker are associated with any organization and work for them. This hacker follows the right path and follows all the government rules and regulations.

Grey Hat Hacker – Neither Good nor Bad (50:50)
As the name suggests, these hackers have the characteristics of a little white and a little black.
This means that they are neither completely innocent nor completely criminal.
These hackers are called mischievous (naughty) and notorious (notorious) hackers in the world of internet hacking.


Gray Hat Hackers do not take any permission from any organization to launch testing or attack. But their intentions are not wrong. Their purpose is not to harm any organization. They do all this just for fun.
But still, it is not wrong, because whatever organization you are testing on, first you have to get permission from them.
Gray hat hackers occasionally violate the rules but they do not launch any kind of harmful or malicious attack.

Black Hat Hacker – The Bad Guy
This is the hacker about whom we always hear in news channels and newspapers. And this is the person due to which we have been misunderstood the word "Hacker".
As we call White Hat Hacker as hero, on the contrary we can call this type of Hacker as villain. He actually plays the role of a villain, whose only aim is to harm people and steal their data.


This also clearly shows that these hackers do not take any kind of permission before launching any attack.
Black Hat Hackers do not work under or for any organization. Even if he does, then that organization is not valid from any government authorities. This means that these people always live in darkness, there is no golden future for them.
Note: If you want to choose ethical hacking career path and want to make your future in it then definitely you should become a white hat hacker (a good person).
After knowing this difference, I hope that all your doubts will be cleared towards Ethical Hacker like; What is Ethical Hacking? Which Hacker is legally certified? Are all hackers bad?
So let's start the process of knowing “How to become an Ethical Hacker”.

Comments

Read this Article

Poverty as a Challenge ncert notes

 Chapter-3 Economics  Poverty as a Challenge  In our daily life we come across many poor people such as landless labourers in villages, people living in jhuggis, daily wage workers at construction sites, child labourers in dhabas, rickshaw-pullers, domestic servants, cobblers, beggars, etc. • Poverty : Usually the levels of income and consumption are used to define poverty. In India, poverty has been defined as a situation in which a person fails to earn income sufficient to buy him bare means of subsistence.  • Other Indicators of Poverty : Now poverty is looked through other indicators like illiteracy level, lack of access to health care, lack of job opportunities, lack of access to safe drinking water, sanitation, etc. Nowadays, the concept of social exclusion is becoming very common in the analysis of poverty.  • Estimates of Poverty : The incidence of poverty in India was around 55 per cent in 1973 which declined to 36 per cent in 1993 and further to 26 per cent in 200

The Story of Village Palampur-key points - digieducation learning point

  Chapter – 1 Economics  The Story of Village Palampur - key points  • Village Palampur: Palampur is a small village having about 450 families. It is 3 km away from Raiganj — a big village. Shahpur is the nearest town to the village.  • Main Production Activities: Farming is the main production activity in the village Palampur.  Most of the people are dependent on farming for their livelihood. Non-farming activities such as dairy, small-scale manufacturing (e.g. activities of weavers and potters, etc.), transport, etc., are carried out on a limited scale. • Factors of Production (Or Requirements for Production of Goods and Services): Land, labour and capital are the basic requirements for production of goods and services which are popularly known as factors of production. Land includes all free gifts of nature, e.g., soil, water, forests, minerals, etc. Labour means human effort which of course includes physical as well as mental labour. Physical capital is the third requir

Lists of IIITs in India for students

  List of IlITs Lists of IIITs in India 1. Atal Bihari Vajpayee lIT, Gwalior, MP 2. IIIT, Kanchipuram, Tamil Nadu 3. IIIT, Kottayam, Kerala 4. IIIT, Jhalwa, Allahabad, Uttar Pradesh 5. Pandit Dwarka Pd. Mishra lIIT, Jabalpur, M.P. 6.IIIT, Guwahati, Assam 7. IIIT, Kota, Rajasthan 8. IIIT, Chittoor, Andhra Pradesh 9. IIT, Vadodara, Gujarat 10. IIIT, Una, Himachal Pradesh 11. IIIT, Kalyani, West Bengal 12. IIIT, Sonepat, Haryana 13. IIIT, Tiruchirapalli 14. IIIT, Lucknow 15. IIIT, Manipur Mantripukhri, Imphal 16.Indian Institute of Information Tech., Dharwad 17. Indian Institute of Information Tech., Ranchi 18. IIIT, Kurnool, Andhra Pradesh 19. Indian Institute of Information Tech., Nagpur 20. Indian Institute of Information Tech., Pune 21. Indian Institute of Info. Tech., Bhagalpur 22. Indian Institute of Information Tech., Bhopal 23. Indian Institute of Information Tech., Surat 24. Indian Institute of Information Tech., Agartala 25.Indian Institute of Information Tech., Karnataka 26.