wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Types of Hackers.

profile
Yukta Bathe
Aug 30, 2022
0 Likes
0 Discussions
144 Reads

A Hacker is a person skilled in information technology Who uses their technical knowledge to achieve a goal or overcome an obstacle, with a computersized system by non-standard means. Though the term hacker has become associated in popular culture.

Security related hacking-

White hat hacker-

White hat are hackers who work to keep data safe from other hackers by finding system that can be mitigated. 

Black hat hacker -

Black hats hackers with malicious intensions. They often steal, exploit, and sell data, and are motivated by personal again. Their work is usually illegal. 

Grey hat hacker -

A Grey hat is a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker. 


Comments ()


Sign in

Read Next

Artical on FreshBooks

Blog banner

Modern operating system

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

Emailing the merger document

Blog banner

Incident management in ITSM

Blog banner

security controls

Blog banner

Evolution of Operating System

Blog banner

ARTICAL ON MANAGEMENT SYSTEM

Blog banner

Multiprocessor scheduling

Blog banner

OPERATING SYSTEM OBJECTIVES AND FAULT TOLERENCE.

Blog banner

The Importance of Financial Literacy for College Students

Blog banner

What is thread and alse multithreading

Blog banner

Direct Memory Access

Blog banner

Memory management

Blog banner

Characteristics of Etherum

Blog banner

Threads

Blog banner

Tracking Emails & Email Crimes

Blog banner

Operating system

Blog banner

OLA

Blog banner

Threads

Blog banner

Threads

Blog banner

Interrupts in OS

Blog banner

Cyber Forensics

Blog banner

INTERRUPTS

Blog banner

Have You Explored India Yet?

Blog banner

Impact of social media on the human life

Blog banner

Sniffing: A Cyber Security Threat

Blog banner

Teamwork

Blog banner

Service stratergy principles

Blog banner

INTERNET

Blog banner

"Geographic Information Systems (GIS) and its Applications in Urban Planning"

Blog banner

Operating system evolution

Blog banner

ARTICLE ON WRIKE CORPORATION

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

Emotional Intelligence in Children: Why It Is as Important as Academics

Blog banner

Rain bow

Blog banner

EMAIL INVESTIGATION

Blog banner

Palm Vein Biometric Technology; Contactless vein authentication

Blog banner

Bit Coins

Blog banner

The Role of cryptography in cyber security

Blog banner

Way to make your meal healthier.

Blog banner