Welcome to
the unknown world………
Hello friends
Unknown world here means hacking which
is a different world.
If I talk about the real world, 80-85%
people do not know about this hacking, they also didn’t know that one of their
mistakes can send there all data to the
hacker . I will tell you all about this world how you can be hacked and how you
can protect yourself from being hacked. I know that many people rise the question that
why anyone hack me?
So friends, don't forget that today’s world is technology world, the king of this world is “Who has information”.
SO friend’s let’s start first I will define the hacker.........
A Person who uses computers to gain unauthorized access to data.
Sometimes, "hacker" is simply used synonymously with "geek": "A true hacker is not a group person. He's a person who loves to stay up all night, he and the machine in a love-hate relationship... They're kids who tended to be brilliant but not very interested in conventional goals[...] It's a term of derision and also the ultimate compliment.
Type:
Hacker culture
Hacker culture is an idea derived from a community of enthusiast
computer programmers and systems designers in the 1960s around the
Massachusetts Institute of Technology's (MIT's) Tech Model Railroad Club and
the MIT Artificial Intelligence Laboratory The concept expanded to the hobbyist
home computing community, focusing on hardware in the late 1970s (e.g. the
Homebrew Computer Club)and on software (video games, software cracking, the
demoscene) in the 1980s/1990s. Later, this would go on to encompass many new
definitions such as art, and life hacking.
Security related hacking
Security hackers are people involved with circumvention of
computer security. Among security hackers, there are several types, including:
White hat hacker
White hats are hackers who work to keep data safe from other
hackers by finding system vulnerabilities that can be mitigated. White hats are
usually employed by the target system's owner and are typically paid (sometimes
quite well) for their work. Their work is not illegal because it is done with
the system owner's consent.
Black hat hacker
Black hats or crackers are hackers with malicious intentions. They
often steal, exploit, and sell data, and are usually motivated by personal
gain. Their work is usually illegal. A cracker is like a black hat hackers, but
is specifically someone who is very skilled and tries via hacking to make
profits or to benefit, not just to vandalize. Crackers find exploits for system
vulnerabilities and often use them to their advantage by either selling the fix
to the system owner or selling the exploit to other black hat hackers, who in
turn use it to steal information or gain royalties.
Grey hat hacker
Grey hats include those who hack for fun or to troll. They may
both fix and exploit vulnerabilities, but usually not for financial gain. Even
if not malicious, their work can still be illegal, if done without the target
system owner's consent, and grey hats are usually associated with black hat
hackers.
Motives
Four
primary motives have been proposed as possibilities for why hackers attempt to
break into computers and networks. First, there is a criminal financial gain to
be had when hacking systems with the specific purpose of stealing credit card numbers or manipulating banking
systems. Second, many hackers thrive off of increasing their reputation
within the hacker subculture and will leave their handles on websites they
defaced or leave some other evidence as proof that they were involved in a
specific hack. Third, corporate espionage allows companies to acquire
information on products or services that can be stolen or used as leverage
within the marketplace. And fourth, state-sponsored attacks provide nation
states with both wartime and intelligence collection options conducted on, in,
or through cyberspace.