wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Types of Hackers.

profile
Yukta Bathe
Aug 30, 2022
0 Likes
0 Discussions
144 Reads

A Hacker is a person skilled in information technology Who uses their technical knowledge to achieve a goal or overcome an obstacle, with a computersized system by non-standard means. Though the term hacker has become associated in popular culture.

Security related hacking-

White hat hacker-

White hat are hackers who work to keep data safe from other hackers by finding system that can be mitigated. 

Black hat hacker -

Black hats hackers with malicious intensions. They often steal, exploit, and sell data, and are motivated by personal again. Their work is usually illegal. 

Grey hat hacker -

A Grey hat is a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker. 


Comments ()


Sign in

Read Next

What does the Australian summer have in store for your oral health?

Blog banner

Virtual memory

Blog banner

Mumbai famous street food

Blog banner

Blockchain

Blog banner

Bit Coins

Blog banner

Deadlock

Blog banner

PERSONAL STORIES

Blog banner

Koinex is shutting down and here is how you can withdraw...

Blog banner

Virtual Machine

Blog banner

Deadlock and starvation in operating system

Blog banner

Beyond the Track: Why the Best Hotel in Arcadia, Florida, Completes Your IMSA Sebring Getaway

Blog banner

Health and fitness in technology

Blog banner

GOOGLE

Blog banner

Deadlocks in Operating Systems

Blog banner

The launch of UniMap by HERE

Blog banner

Uniprocessor Scheduling

Blog banner

Define Instagram.

Blog banner

Solving Problems with AI: The Power of Search Algorithms

Blog banner

Article on Team Work

Blog banner

Deadlock in Operating System

Blog banner

Mariana Trench: The deepest depths

Blog banner

AutoML: The Future of Automated Data Science

Blog banner

What is 'Multi-core and Multi-threading' ?

Blog banner

Vulnerability Assessment

Blog banner

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner

BUFFER OVERFLOW_142

Blog banner

Computer security techniques

Blog banner

gis substation

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

Explain the concept of ( MIS) Management information systems

Blog banner

objectives and functions of operating system

Blog banner

MULTITHREADING:ENHANCEING PERFORMANCE AND EFFICIENCY IN COMPUTING

Blog banner

Life lesson

Blog banner

Virtual Machine

Blog banner

File management

Blog banner

memory managment

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

Disk scheduling

Blog banner

Twisted world

Blog banner

Modern operating systems (OS)

Blog banner

De-Coding Love

Blog banner