Introduction to Hacking

Hacking is the process of achieving control to computer system or computer network without legal authorization. It is the most common activity amongst teenagers and young adults. Many hackers are keen to learn about computer and consider hacking as an art. They want to build program to display their problem solving skills not to harm others. ‘

A hacker first tries their skills on easy target and then after successful professional attacks on more secured site. Their goal is to have complete access on any computer so that they can deal, edit or comply any sites.

Computer h acker are employed by many companies to get complete access on the computer so that they can delete, edit, copy any file or install any program.

These hackers use their skills to find faults in company’s security system so that it can be repaired quickly. Sometime hacking also provides information or changes some financial or personal data. All the type of in authorized access can lead the hacker towards  the prison for 20 years.one way of hacking is to get a copy password file which is stored all user names and password in encrypted form or they can also use brute force attack trying all the possible combination of letters. Hacking is also done by emailing a program to anyone that runs automatically.


Black Hat Hackers

Black hat hackers are the bad hackers hacker they access computer system illegally for their purpose.


White Hat Hackers

White hat hackers are the good hacker they are also known as ethical hacker they are employed to protect system from black hat hacker.




Grey Hat

A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A Grey Hat Hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked, for example. Then they may offer to repair their system for a small fee.[

Blue Hat

A blue-hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed.

Denial of Service

A denial of service attack is specifically designed to interrupt normal system function and affect legitimate users access to the system. Hostile users send a flood of fake requests to a server, overwhelming it and making a connection between the server and legimate clients difficult or impossible to establish.

System Penetration

Hackers penetrate system illegally to steal information, modify data, or harm the system. Following factors are related to system.

System Holes

The design deficiency of operating system or application system that allows hijacking, security bypass, data manipulation

Port Scanning

A hacking technique used to check TCP/IP ports to reveal the services that are available and to identity the weakness of a computer system in order to explain them.

Network Sniffing

A hardware and software program to collect network data in order to decipher password with password cracking software.

Back Door

A hole used to gain unauthorized access to system. For more reading about technology news in singapore and seo to online marketing do view more about other pages.

Sourabh Bhunje

Sourabh Bhunje, B.E. IT from Pune University. Currently Working at Techliebe. Professional Skills: Programming - Software & Mobile, Web & Graphic Design, Localization, Content Writing, Sub-Titling etc. http://techliebe.com/about-us

Leave a Reply