Home / Computers / Trust me you are a Hacker!

Trust me you are a Hacker!

What is hacking?

Well we all know that hacking means unauthorized entry . Hacking is not only unauthorized entry, It also deals with various concepts like.. breaking the systems, security etc..

The Common definition of hacking for a common person is ” The thing which makes Life easy”. Think of it if you don’t get let us know in the comment session!


Who are hackers?

Is it me, you, him, her…??? Trust me we all are hackers.. Didn’t get what i meant? When u copy a data from anyone with their notice! you hacked that person’s data. Which in turn means you are hacker..

Coming to the technical term… There are three types of hackers

  1. Black Hat Hackers :-

    A black hat hacker is an individual with extensive computer knowledge whose purpose is to breach or bypass internet security. Black hat hackers are also known as crackers or dark-side hackers. The general view is that, while hackers build things, crackers break things. The stuff which they do are unofficial.

  2. White Hat Hackers :-

    A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term “white hat” in Internet slang refers to an ethical hacker. These guys do things officially. i.e., penetrating tester at a software company.

  3. Grey Hat Hackers :-

    These are those people who lie in Between “Black Hat Hackers” and “White Hat Hackers” Just like a semiconductor.


What Hacking deals with?

It Deals with the following points

  • Foot-printing and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Malware Threats
  • Sniffing
  • Session Hijacking
  • etc…


How/On which platform  hacking is Done?

Most of the hackers use  Linux operating system to perform their attack preferably “KALI LINUX” . Some of them use windows operating system also.

Hacking is done anonymously. Hackers use various methods to become anonymous like using proxy ip or using vpn(virtual private network) .

Hackers target the weak security websites and use sql injecting techniques to get access to the data base.. If you own a website then first make sure that the security is tight

About Rohan KM

Hey folks! I'm Rohan, I'm a blogger and musician! Music is my life where as blogging is my passion. Here I share my best knowledge about the things I know . Do subscribe to my blog and like @pantomath page to get more updates.

Check Also

Datatypes? what does datatype actually means in Programming Languages

Function returns as void There are various functions in C which do not return any …

One comment

  1. Excellent post. I used to be checking continuously this weblog and I am inspired! Very helpful information particularly the final phase 🙂 I maintain such information much. I used to be seeking this certain information for a long time. Thanks and good luck.

Leave a Reply

Your email address will not be published. Required fields are marked *