Dear Readers welcome to awareness adda. myself Sudheer one of CEO of the awareness adda. Today we are going to discussing on Hacking. We are providing short notes on Hacking.
Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers.
What is Hacking?
Hacking is nothing but an identifying weakness in a computer system or networks to exploit its weaknesses to gain access.Hacking has been a part of computing for 40 years. The first computer hacker emerged at MIT. Hacking is begun in the 1960’s at MIT, Origin of the term “hacker“. The truth hacker amongst our societies has thirst for the Knowledge. Boredom is never an object of a challenge for the hacker.
Example: A hacker uses a password cracking algorithm to a system or a network.
Nowadays computers are become mandatory in daily life to run successful businesses. it is not enough to have isolated computers systems they need to be networked to facilitate communication with external businesses this exposes them to the outside world and hacking. Actually, the internet was established in 1969. Almost immediately after the network. was established, researchers have confronted fact. the internet was not secure and could easily be cracked. today security technology is quite complex and the internet is still easily cracked.
Famous hackers in history?
There is some persons are very popular in hacking here is the list given below.
- Ian Murphy.
- Kevin Mitnick.
- Johan Helsinguis.
- Linus Torvalds.
- Mark Abene.
- Robert Morries.
Who is a hacker?
The person who is able to discover a weakness in a system and managed to exploit it to accomplish his goal referred as a Hacker and the process is referred as Hacking. All these hackers are usually skilled computer programmers with knowledge of computer security.
What are the different types of hackers?
There are different types of hackers we have those are given below.
- Ethical Hacker ( White hat).
- Cracker (Black Hat).
- Grey Hat.
- Script kiddies.
all these are can be explained below.
Ethical Hacker (White Hat):
A hacker who gains access to systems with a view to fixing the identified the identified weaknesses. They may also perform Penetration Testing and Vulnerability Assessments are called Ethical Hacker and also named as White Hat.
Cracker (Black Hat):
A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc. is called as Cracker. and also named as Black Hat.
A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner was called as Grey Hat.
Here is a non-professional person who gains an access to computer or network by using of pre-made tools. is called Script Kiddies.
The hackers who use their hacking skills for protesting against injustice and attack a target system and websites to bring the justice. One of the popular hacktivists is Anonymous and RedHack.
A hacker who identifies and exploits weaknesses in telephones instead of computers is called Phreaker.
All the above are the different types of hackers. and all these hackers use different types of methods. Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an “art” form. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. It’s a chance to demonstrate their abilities, not an opportunity to harm others. If you are interested in protecting your home computer against malicious hackers, investing in a good firewall is highly recommended. It’s also a good idea to check your software programs for updates on a regular basis. For example, Microsoft offers a number of free security patches for its Internet Explorer browser.
Types of Hacking?
There are different types of hacking those are given below.
- Website Hacking.
- Network Hacking.
- Ethical Hacking.
- Email Hacking.
- Password Hacking.
- Online Banking Hacking.
- Computer Hacking.
Advantages of Hacking?
There are some advantages doing hacking those can be shown below.
Hacking can be used to recover lost information where the computer password has been lost. and to test how good security is on your own network. and Teaches you that no technology is 100% secure.
Disadvantages of Hacking?
There are some disadvantages in hacking. those are given below.
Some persons can use it to their advantage. and it can harm someone’s privacy and mainly it’s illegal to get others information like personal confidential things.
keep your password protected write your password should be a combination of characters, digits and special symbols. and don’t respond to fishing emails, and always keep watch on the site whether the protocol of site is https while doing online money transactions. and always update your firewall protection on your computer.
Thanks for visiting Awareness Adda. Next time we will provide another topic so keep in touch with us. if you need any topic please write in the comments section we will provide the note on the topic. Thank you…!