wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Types of Hackers.

profile
Yukta Bathe
Aug 30, 2022
0 Likes
0 Discussions
144 Reads

A Hacker is a person skilled in information technology Who uses their technical knowledge to achieve a goal or overcome an obstacle, with a computersized system by non-standard means. Though the term hacker has become associated in popular culture.

Security related hacking-

White hat hacker-

White hat are hackers who work to keep data safe from other hackers by finding system that can be mitigated. 

Black hat hacker -

Black hats hackers with malicious intensions. They often steal, exploit, and sell data, and are motivated by personal again. Their work is usually illegal. 

Grey hat hacker -

A Grey hat is a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker. 


Comments ()


Sign in

Read Next

Culture Of Ladakh

Blog banner

Why Friendship at Work is Important

Blog banner

Man In The Middle Attack

Blog banner

Best password managers: Reviews of the top products

Blog banner

How Cyber Forensics use in AI

Blog banner

EVOLUTION OF THE MIRCOPROCESSOR

Blog banner

Privacy-Enhancing Computation Techniques

Blog banner

The Evolution of the Microprocessor ~ Aditya Pai

Blog banner

File Allocation Methods

Blog banner

10 Reasons to date your best friend

Blog banner

Data carving - using hex editor

Blog banner

Types Of scheduling

Blog banner

MAHAKAL LOK UJJAIN

Blog banner

History of ITIL

Blog banner

Texting is actually better than talking in person

Blog banner

Memory input output management

Blog banner

Linux 94

Blog banner

SAVE TREES

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

Recipe of Paneer Butter Masala

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

FAMILY WHERE LIFE BEGINS....

Blog banner

Modern Operating System

Blog banner

Microsoft powerpoint presentation

Blog banner

SESSION HIJACKING

Blog banner

Operating System Objectives and Functions

Blog banner

'C', 'C++' and 'Java': Head-to-Head

Blog banner

virtual memory

Blog banner

Virtual memory in os

Blog banner

Goa Trip With Friends

Blog banner

JUSTICE FOR EVERY “BEZUBAAN ANIMAL”

Blog banner

ASANA- A Management System.

Blog banner

Memory heirchy

Blog banner

What is Data, Information and Knowledge?

Blog banner

Title: Network Sniffing Techniques: Uncovering the Secrets of Data Transfer

Blog banner

Cyber Forensic in the Banking sector

Blog banner

How To Setup DVWA Using XAMPP on Windows

Blog banner

10 Unsolved Mysteries all over the world

Blog banner

Social Engineering

Blog banner

Top 5 Places To Stay And Visit In Berlin, Germany

Blog banner

Fault Tolerance

Blog banner

Why Soft Skills Matter as Much as Grades?

Blog banner