wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Types of Hackers.

profile
Yukta Bathe
Aug 30, 2022
0 Likes
0 Discussions
144 Reads

A Hacker is a person skilled in information technology Who uses their technical knowledge to achieve a goal or overcome an obstacle, with a computersized system by non-standard means. Though the term hacker has become associated in popular culture.

Security related hacking-

White hat hacker-

White hat are hackers who work to keep data safe from other hackers by finding system that can be mitigated. 

Black hat hacker -

Black hats hackers with malicious intensions. They often steal, exploit, and sell data, and are motivated by personal again. Their work is usually illegal. 

Grey hat hacker -

A Grey hat is a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker. 


Comments ()


Sign in

Read Next

Proof-of-Stake (PoS)

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

Starvation

Blog banner

OLA

Blog banner

Pooja Silver

Blog banner

City of Mumbai (Bombay):

Blog banner

Os Virtual Memory

Blog banner

Operating system

Blog banner

Privacy LAWs in IT

Blog banner

5 Common Faults In Construction Tenders

Blog banner

Water Resources are about to exhaust...

Blog banner

What is online marketing and why do you need to know about it ?

Blog banner

Tracking Emails & Email Crimes

Blog banner

Cyber Forensic in the Banking sector

Blog banner

bulk email software

Blog banner

virtual memory

Blog banner

Indian Food

Blog banner

Rain bow

Blog banner

" THE ANSWERS THAT LED INDIAN BEAUTIES TO THE MISS UNIVERSE HISTORIC WIN. "

Blog banner

Life

Blog banner

Memory heirachy (Operating system)

Blog banner

World end

Blog banner

What is Anxiety? How to manage Anxiety?

Blog banner

Kids Grieve Too

Blog banner

Deadlock

Blog banner

Why Should You Schedule Tweets on Twitter?

Blog banner

Hubspot

Blog banner

Top 3 Places To Stay In Vienna

Blog banner

SPEM

Blog banner

DMZ: Your Secret Weapon for Data Security

Blog banner

Direct memory access

Blog banner

Cache memory

Blog banner

"The Benefits of Using GIS in Agriculture"

Blog banner

5 People who claimed to have Time Traveled

Blog banner

UniProcessor Scheduling

Blog banner

Virtualization

Blog banner

What makes Nugget RC Racing Florida’s Most Exciting Racing Events?

Blog banner

About myself

Blog banner

A book review

Blog banner

Vulnerabilities in OnePlus Devices

Blog banner

15 Interesting Facts about India

Blog banner

Excel records

Blog banner