What Is Hacker First Step Of Haking
What Is Hacker And How Can Start Learning Hacking
During
the 1960s, the word "hacker" grew to prominence describing a person
with strong computer skills, an extensive understanding of how computer
programs worked, and a driving curiosity about computer systems.
Hacking, however, soon became nearly synonymous with illegal activity.
While the first incidents of hacking dealt with breaking into phone
systems, hackers also began diving into computer systems as technology
advanced.
During
the 1960s, the word "hacker" grew to prominence describing a person
with strong computer skills, an extensive understanding of how computer
programs worked, and a driving curiosity about computer systems.
Hacking, however, soon became nearly synonymous with illegal activity.
While the first incidents of hacking dealt with breaking into phone
systems, hackers also began diving into computer systems as technology
advanced.
Hacking
became increasingly problematic during the 1980s. As a result, the
Computer Fraud and Abuse Act were created, imposing more severe
punishments for those caught abusing computer systems. In the early
1980s, the Federal Bureau of Investigation (FBI) made one of its first
arrests related to hacking. A Milwaukee-based group known as the 414s
was accused of breaking into 60 different computer systems including the
Memorial Sloan-Kettering Cancer Center and the Los Alamos National
Laboratory. Later that decade, the infamous Kevin Mitnick was arrested
and sentenced to one year in jail for damaging computers and stealing
software. He was arrested again in 1995 for computer fraud and put in
jail for hacking Motorola Inc., Sun Microsystems Inc., NEC Corp., and
Novell Inc. to steal software, product plans, and data. Mitnick
eventually cost the firms a total of roughly $80 million.

What is hacking?
Hacking is
the practice of modifying the features of a system, in order to
accomplish a goal outside of the creator's original purpose. The person
who is consistently engaging in hacking activities, and has accepted
hacking as a lifestyle and philosophy of their choice, is called a
hacker.
Computer
hacking is the most popular form of hacking nowadays, especially in the
field of computer security, but hacking exists in many other forms, such
as phone hacking, brain hacking, etc. and it's not limited to either of
them.
Due to the
mass attention given to blackhat hackers from the media, the whole
hacking term is often mistaken for any security related cyber crime.
This damages the reputation of all hackers, and is very cruel and unfair
to the law abiding ones of them, from who the term itself originated.
The goal of this website is to introduce people the true philosophy and
ethics of hackers, hopefully clearing their name and giving them the
social status they deserve.

Types of Computer Hackers
There are various types of computer hackers that all have different
malicious intent. It's important to know these different types of
hackers so you can properly defend your data.
The term hacker is a generic term to
describe attackers. Not all have intent to steal your data. Below is a
list of various types of hackers.
White hat has the skills to break into
computer systems and do damage. However, they use their skills to help
organizations. For example a white hat might work for an organization to
test for security weaknesses and vulnerabilities in the network.
Black Hat also known as a cracker uses
his skills to break into computer systems for unethical reasons. For
example, steal user data like, username and password, credit card
numbers, bank information.
This type can be thought of as a white
hat attacker who sometimes acts unethically. They could be employed as a
legit network security administrator. But, during this person's duties,
he may find an opportunity for gaining access to company data and
stealing that data.
A phreaker is simply a hacker of
telecommunications. An example of this is tricking the phone system into
letting you make free long distance calls.
A Script Kiddy is someone who lacks the
skills of a typical hacker. They rely on downloading hacking programs
or utilities sometimes calls scripts to perform an attack.
This is a person with political
motivations, such as someone defacing a website and leaving messages on
the hacked site for the world to see.
This is someone who knows the technical
aspects of computer networking and security. This person could attack a
network protected by a firewall or IPS by fragmenting packets.
This type is typically an employee or
studentat an institution of higher education. They would use the
institutions computing resources to write malicious programs.
This is someone that tends to focus
more on home computing. Such as, modifying existing hardware or
software, use software without a license, unlock Apple iPhone.
No comments:
Post a Comment