wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Types of Hackers.

profile
Yukta Bathe
Aug 30, 2022
0 Likes
0 Discussions
144 Reads

A Hacker is a person skilled in information technology Who uses their technical knowledge to achieve a goal or overcome an obstacle, with a computersized system by non-standard means. Though the term hacker has become associated in popular culture.

Security related hacking-

White hat hacker-

White hat are hackers who work to keep data safe from other hackers by finding system that can be mitigated. 

Black hat hacker -

Black hats hackers with malicious intensions. They often steal, exploit, and sell data, and are motivated by personal again. Their work is usually illegal. 

Grey hat hacker -

A Grey hat is a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker. 


Comments ()


Sign in

Read Next

EID UL FITR

Blog banner

Juveniles, Internet and Computer Crime

Blog banner

Deadlock

Blog banner

MQTT (MQ Telemetry Transport) in Data Science

Blog banner

How College Events Build Real-world Skills You Can’t Learn From Textbooks

Blog banner

Blockchain technology: security risk and prevention

Blog banner

Balance

Blog banner

Defining youtubr

Blog banner

5 Stages of Digital Marketing

Blog banner

LINUX

Blog banner

Python as a tool for Data science task & project

Blog banner

Stay Close To Adventure In Arcadia, Florida At Oak Tree Hotel

Blog banner

I/O Buffering

Blog banner

The Bold Digital Marketing Moves That Made Durex India’s Second-Largest Condom Brand

Blog banner

The Art of Slow Fashion: Why Patola Defines Sustainable Luxury

Blog banner

Apache Spark :- Powerful Data Processing Tool

Blog banner

Eating Well With Meal Maharaj on Busy Workdays Without Cooking

Blog banner

Kernel in Operating System

Blog banner

What is time ? The term which has astonished Scientists

Blog banner

Virtualisation

Blog banner

Data Mining

Blog banner

Kernel Modes: User Mode vs. Kernel Mode - 80

Blog banner

Monday. com App

Blog banner

Understanding Business Layer in Data Science

Blog banner

Why Does Hierarchy Still matter in Organizations?

Blog banner

I/O Management and Disk Scheduling

Blog banner

What is Virtual Memory

Blog banner

Cache memory

Blog banner

MySQL

Blog banner

Direct Memory Access

Blog banner

Fitness

Blog banner

Getting into Anime

Blog banner

My Favorite Sportsperson

Blog banner

Clustering Techniques

Blog banner

MPL and how its effects?

Blog banner

Types of Malware in Cyber Security

Blog banner

Memory input output management

Blog banner

CYBERBULLYING: Negative comments!

Blog banner

Deadlock

Blog banner

Deadlock and Starvation

Blog banner

Microsoft Windows Overview

Blog banner

Super Garlicky Tomato Soup with Smashed White Beans

Blog banner