wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Types of Hackers.

profile
Yukta Bathe
Aug 30, 2022
0 Likes
0 Discussions
144 Reads

A Hacker is a person skilled in information technology Who uses their technical knowledge to achieve a goal or overcome an obstacle, with a computersized system by non-standard means. Though the term hacker has become associated in popular culture.

Security related hacking-

White hat hacker-

White hat are hackers who work to keep data safe from other hackers by finding system that can be mitigated. 

Black hat hacker -

Black hats hackers with malicious intensions. They often steal, exploit, and sell data, and are motivated by personal again. Their work is usually illegal. 

Grey hat hacker -

A Grey hat is a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker. 


Comments ()


Sign in

Read Next

File Management system

Blog banner

Building Confidence in Children Through Daily Routines and Play

Blog banner

Hacking Mobile Platforms

Blog banner

I/O Buffering

Blog banner

Indian Culture and Tradition

Blog banner

Virtual Machine's

Blog banner

How International Schools Build Global-Minded Students through Curriculum & Activities

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner

Understanding - Proof of Work!

Blog banner

Cloud Security: Trends and Innovations

Blog banner

Evolution of Operating system

Blog banner

Yahoo! mail

Blog banner

To travel is to live

Blog banner

Does School Infrastructure Really Matter For Learning?

Blog banner

5 Common Faults In Construction Tenders

Blog banner

Instagram

Blog banner

Steganography and Steganalysis

Blog banner

Vulnerability Assessment (Vulnerability Analysis)

Blog banner

Drawing tips for a beginner

Blog banner

SmartData Collective: Data Science aur Analytics ki Duniya

Blog banner

Functions Of Operating Systems

Blog banner

Why is online marketing is important in current scenario

Blog banner

Delhi city

Blog banner

MACHINE LEARNING

Blog banner

Threads in OS

Blog banner

Mumbai Metro 3

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

Race condition

Blog banner

1.1 basic elements

Blog banner

Digital Forensics Challenges and Tools

Blog banner

COMMUNICATION

Blog banner

Concurrency:Deadlock and Starvation

Blog banner

IT GOVERNANCE

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

MY MOST THRILLED TREK ..... BHAIRAVGAD

Blog banner

Security Issues

Blog banner

Interrupts in OS

Blog banner

Mumbai

Blog banner

ITIL Version 3 and 4 differenciation?

Blog banner

ODOO

Blog banner

Steganography

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner