Friday, 17 May 2013



What is computer hacking?

 In a cyber security world, the person who is able to discover weakness in a system and managed to exploit it to accomplish his goal referred as a Hacker , and the process is referred as Hacking. Now a days, People started think that hacking is only hijacking Facebook accounts or defacing websites. Yes, it is also part of hacking field but it doesn't mean that it is the main part of hacking. So what is exactly hacking, what should i do to become a hacker?! Don't worry, you will learn it from Hack and Security. The main thing you need to become a hacker is self-interest. You should always ready to learn something and learn to create something new.

 Now , let me explain about different kind of hackers in the cyber security world.

 Script Kiddie:
 Script Kiddies are the persons who use tools , scripts, methods and programs created by real hackers. In a simple word, the one who doesn't know how a system works but still able to exploit it with previously available tools.

 White Hat Hacker:-

 White Hat hackers are good guys who does the hacking for defensing. The main aim of a Whitehat hacker is to improve the security of a system by finding security flaws and fixing it. They work for an organization or individually to make the cyber space more secure. Hack for Security only concentrates on white-hat hacking and help you to learn the Ethical Hacking world.

 Black Hat Hacker(hackers):

 BlackHat hackers are bad guys , cyber criminals , who have malicious intent. The hackers who steal money, infect systems with malware ,etc are referred as BlackHat hackers. They use their hacking skills for illegal purposes. The Hacker is one of the Security w0rm of Computer, who search for Vulnerability (Vulnerability means Weakness Point of any Program or web application) and Explode it for his Popularity, Profit or warn someone like (Government). Basically Just Hacker word is for Black Hat hackers, All Black hat hackers considered as a Cyber Criminal until they do Cyber Crime such as Defacing websites, Stealing data, Exploding Bank data's and I-llegal Contenting in Word Wide.
Hacker's earn in their own way from Internet Marketing service or working for Cyber Hacker's group such as Anonymous, Lulz Sec or Null/Crew etc.

 GreyHat hackers:

 The hackers who may work offensively or defensively, depending on the situation. Hackers who don't have malicious intentions but still like to break into third-party system for fun or just for showing the existence of vulnerability.

 Hacktivists: The hackers who use their hacking skills for protesting against injustice and attack a target system and websites to bring the justice. One of the popular hacktivists is Anonymous.



Security Professional :-

 Security Professional is one of the higher and Greater Security Master, no one is higher then Security Professional, Basically Sec Pro Work for Cyber Space Investigation Department or he search for Vulnerability and solve it to Prevent and Care System. In India there are very less Sec Pro and Cyber Crime in India is increasing day by day, that's the reason Indian Cyber Space require education in Computer Security.
In today's generation Indian Cyber Space Demand's of Security Professional and studies in Computer Security.
In Simple words Security Professional have complete knowledge of Computer Security even more then Black hat hacker's.


 Security Researcher :-

 Security Researcher is also called a White Hat hacker, Security researcher are real Hero of Internet. They search for Bugs or Vulnerability in Website and report it to admin or Cyber Space Investigation Cell. Security Researcher just report the vulnerability and Security Professional Fix the vulnerability and writing of Exploit Code, Security researcher basically are hired by many IT's Company to save their data and prevent hacking.

 Certified Ethical Hacker :-

 CEH is the base of the Hacking field which give you 3 option to become in your Life :-

1.Black Hat
2.Security Professional
3.Security Researcher

and that's all depend upon you in which field you want to make your future carrier.

All beginners hackers and learner have to start with CEH and get ceritified. It's just a base to enter's into HACKING WORLD :)

Categories:

16 comments:

  1. This is the exact information every hacker should know before pursuing hacking course. Thanks for sharing this great information.

    ethical hacking course in chennai

    ReplyDelete
    Replies
    1. Download Without Survey Click Here www.Howtodohack.com

      Download Without Survey Click Here www.Howtodohack.com

      Download Without Survey Click Here www.Howtodohack.com

      Download Without Survey Click Here www.Howtodohack.com

      Download Without Survey Click Here www.Howtodohack.com

      Delete
    2. HACKER ALERT!!! I just made good grades with the help of a ethical hacker a course mate introduced me to, He has been making use of this hacker in fixing his grades since he got into college and there hasnt been a trace from the school. And now this same hacker has proven himself to be one of the best at what he does by helping me fix my college grades at a reasonable price within just 27hours. Isn't that amazing?, This is for you all interested in the services of a professional hacker, go ahead and reach him via his email address at spystealth.org@gmail.com. Your minds will be blown by his hacking skills.

      Delete
  2. Simple Steps to start making money online with PayPal Money Generator Hack Tool
    Starting Today, You’ll Make $200-$400 and More Every Day.
    Full Functionality will promise you to get your merited cash!
    You have to turn it on to carry out the occupation! Along these lines you will get your Money!
    It's simple and quick! You don't need to hold up days or weeks to get your cash! Hold up 20 minutes and check your Account! You will be exceptionally glad that you have downloaded the Generator and you will make us cheerful that a someone else out there can pay his bills or stuff and appreciate the great locales of life!
    So click to Download Hack tips and Hacking tools


    ReplyDelete
  3. Hello everyone, my name is Kate Johnson. I was able to hack my husband's phone remotely and gained access to all his texts and calls with the help of ghosthacker692@gmail.com,he is reliable and really fast,I use him whenever I want to be sure of someone.if you require his services tell him I referred you.

    ReplyDelete
  4. .i want to sincerely and openly thank blackhatservers@gmail.com for her service…She saved me from infidelity and lies of my cheating husband. She was able to hack his phone so i listen to every call he either make or receive, email passwords and Facebook …i know there are lots of people out there looking for proof and evidence about one thing or the other. Be open and real with her so she can even be at the best of her service to you. Do contact her by email on blackhatservers@gmail.com

    ReplyDelete
  5. I am really very happy to find this particular site. I just wanted to say thank you for this huge read!! I absolutely enjoying every petite bit of it and I have you bookmarked to test out new substance you post.

    ReplyDelete
  6. GOD bless jeajamhacker@gmail.com for helping me hack into my wife phone under 24 hours with out physical contact to my wife phone he hacked into my wife whats-app messages,call logs,text messages and many more this hacker is a solution maker so if you think your partner is cheating on you and you want to find who your spouse is texting contact jeajamhacker@gmail.com he has worked for me and never disappointed me for once THANK YOU

    ReplyDelete
  7. Be ware of scammers i have been scammed 3 times because i was trying to know if my husband was cheating until i met this hacker named jeajamhacker@gmail.com who helped me hack into my spouse phone for real this great hacker hacked into my spouse whats-app messages,Facebook messages.text messages,call logs,deleted text messages and many more i was impressed with his job and he brought me results under 24 hours believe me he is real and his services are cheap and affordable.

    ReplyDelete
  8. If you need help of an ethical hacker to help you know more about your spouse contact jeajamhacker@gmail.com he is reliable he also helped me hack into my spouse phone without physical access to his phone and got me results of his whats-app messages,text messages,call logs,Facebook messages,viber,deleted text messages and many more and it was very clear to me that my husband is a big time cheat thanks to jeajamhacker@gmail.com he is the best

    ReplyDelete
  9. Fake hackers every where until i met this hacker named jeajamhacker@gmail.com who helped me hack into my partner phone with out physical access to his phone and this hacker is also good at increasing school grades and many more he also helped my friend child to increase his school grades and this hacker has never disappointed us for once he is good,cheap and affordable if you need solutions you can also contact him

    ReplyDelete
  10. Fake hackers every where until i met this hacker named jeajamhacker@gmail.com who helped me hack into my partner phone with out physical access to his phone and this hacker is also good at increasing school grades and many more he also helped my friend child to increase his school grades and this hacker has never disappointed us for once he is good,cheap and affordable if you need solutions you can also contact him

    ReplyDelete
  11. Hello jeajamhacker@gmail.com is the best and very good at hacking he helped my son increase his school grade and also helped my friend hack into her spouse phone and brought results in 24 hours this great hacker hacked into my friend spouse whats-app messages,call logs,Facebook messages,text messages,viber messages,kik and even brought her deleted text am so happy this hacker is real,cheap and affordable tell him i refereed you to him jeajamhacker@gmail.com has never disappointed for once

    ReplyDelete




    Ankush Mohanty: is a Security Researcher and Analyst, with experience in various aspects of Information Security. Other then this he is a Certified Ethical Hacker. His all efforts are to make internet more Secure.


    MyFreeCopyright.com Registered & Protected
    MyFreeCopyright.com Registered & Protected