Friday, June 19, 2020

Welcome to the unknown world………
Hello friends
Unknown world here means hacking which is a different world.
If I talk about the real world, 80-85% people do not know about this hacking, they also didn’t know that one of their mistakes can send there all data  to the hacker . I will tell you all about this world how you can be hacked and how you can protect yourself from being hacked. I know that many people rise the question that why anyone hack me?


So friends, don't forget that today’s world is technology world, the king of this world is “Who has information”.
SO friend’s let’s start first I will define the hacker.........  




A Person who uses computers to gain unauthorized access to data.


Sometimes, "hacker" is simply used synonymously with "geek": "A true hacker is not a group person. He's a person who loves to stay up all night, he and the machine in a love-hate relationship... They're kids who tended to be brilliant but not very interested in conventional goals[...] It's a term of derision and also the ultimate compliment.





Type:
Hacker culture
Hacker culture is an idea derived from a community of enthusiast computer programmers and systems designers in the 1960s around the Massachusetts Institute of Technology's (MIT's) Tech Model Railroad Club and the MIT Artificial Intelligence Laboratory The concept expanded to the hobbyist home computing community, focusing on hardware in the late 1970s (e.g. the Homebrew Computer Club)and on software (video games, software cracking, the demoscene) in the 1980s/1990s. Later, this would go on to encompass many new definitions such as art, and life hacking.
Security related hacking 
Security hackers are people involved with circumvention of computer security. Among security hackers, there are several types, including:
White hat hacker

White hats are hackers who work to keep data safe from other hackers by finding system vulnerabilities that can be mitigated. White hats are usually employed by the target system's owner and are typically paid (sometimes quite well) for their work. Their work is not illegal because it is done with the system owner's consent.
Black hat hacker

Black hats or crackers are hackers with malicious intentions. They often steal, exploit, and sell data, and are usually motivated by personal gain. Their work is usually illegal. A cracker is like a black hat hackers, but is specifically someone who is very skilled and tries via hacking to make profits or to benefit, not just to vandalize. Crackers find exploits for system vulnerabilities and often use them to their advantage by either selling the fix to the system owner or selling the exploit to other black hat hackers, who in turn use it to steal information or gain royalties.
Grey hat hacker

Grey hats include those who hack for fun or to troll. They may both fix and exploit vulnerabilities, but usually not for financial gain. Even if not malicious, their work can still be illegal, if done without the target system owner's consent, and grey hats are usually associated with black hat hackers.


Motives

Four primary motives have been proposed as possibilities for why hackers attempt to break into computers and networks. First, there is a criminal financial gain to be had when hacking systems with the specific purpose of stealing credit card numbers or manipulating banking systems. Second, many hackers thrive off of increasing their reputation within the hacker subculture and will leave their handles on websites they defaced or leave some other evidence as proof that they were involved in a specific hack. Third, corporate espionage allows companies to acquire information on products or services that can be stolen or used as leverage within the marketplace. And fourth, state-sponsored attacks provide nation states with both wartime and intelligence collection options conducted on, in, or through cyberspace.