Skip to main content

How Many types of Hackers ?


There are good and bad hackers. Here is a window into what they do and why:

White Hat Hackers: These are the good guys, computer security experts who specialize in penetration testing and other methodologies to ensure that a company’s information systems are secure. These IT security professionals rely on a constantly evolving arsenal of technology to battle hackers.

Black Hat Hackers: These are the bad guys, who are typically referred to as just plain hackers. The term is often used specifically for hackers who break into networks or computers, or create computer viruses. Black hat hackers continue to technologically outpace white hats. They often manage to find the path of least resistance, whether due to human error or laziness, or with a new type of attack. Hacking purists often use the term “crackers” to refer to black hat hackers. Black hats’ motivation is generally to get paid.

Script Kiddies:
 This is a derogatory term for black hat hackers who use borrowed programs to attack networks and deface websites in an attempt to make names for themselves.

Hacktivists:
 Some hacker activists are motivated by politics or religion, while others may wish to expose wrongdoing, or exact revenge, or simply harass their target for their own entertainment.

State Sponsored Hackers:
 Governments around the globe realize that it serves their military objectives to be well positioned online. The saying used to be, “He who controls the seas controls the world,” and then it was, “He who controls the air controls the world.” Now it’s all about controlling cyberspace. State sponsored hackers have limitless time and funding to target civilians, corporations, and governments.

Spy Hackers: Corporations hire hackers to infiltrate the competition and steal trade secrets. They may hack in from the outside or gain employment in order to act as a mole. Spy hackers may use similar tactics as hacktivists, but their only agenda is to serve their client’s goals and get paid.

Cyber Terrorists: These hackers, generally motivated by religious or political beliefs, attempt to create fear and chaos by disrupting critical infrastructures. Cyber terrorists are by far the most dangerous, with a wide range of skills and goals. Cyber Terrorists ultimate motivation is to spread fear, terror and commit murder.

Comments

Popular posts from this blog

30 Mathematical symbols

Mathematical symbols: 1. Multiplication ( x ) - рдЧुрдгा 2. Subtraction ( - ) - рдШрдЯाрдиा 3. Addition ( + ) - рдЬोреЬрдиा 4. Equals ( = ) - рдмрд░ाрдмрд░  5. Division ( ÷ ) - рднाрдЧ 6. Is greater than (  > ) - рд╕े рдЕрдзिрдХ 7. Is less than ( < ) - рд╕े рдХрдо 8. Is not equal to ( ≠ ) - рдХे рдмрд░ाрдмрд░ рдирд╣ीं  9. Is similar to ( ~ ) - рдХे рдЬैрд╕ा 10. Is congruent to ( ≅ ) -  рдХे  рд╕рдорд░ूрдк  11. Infinity (∞) - рдЕрдирди्рддрддा 12. Implies ( ⇒ ) - рд╕ंрдХेрдд рджрд░्рд╢ाрдиा  рдХрд░рдиा 13. Theta ( ╬╕ )  a plane angle 14. Empty set ( ├Ш ) - the unique set having no elements 15. Triangle ( ╬Ф ) - рдд्рд░िрдХोрдг 16. Integral ( ∫ ) - рдЕрд╡िрднाрдЬ्рдп 17. The intersection of two sets ( ∩ )  18. Union of two sets ( ∪ )  19. Factorial ( ! ) - рднाрдЬ्рдп-рд╕ंрдмंрдзी 20. Percent ( % ) - рдк्рд░рддिрд╢рдд рджрд░्рд╢ाрдиा 21. Right angle ( ∟) - рд╕рдордХोрдг 22. Angle ( ∠ ) - рдХोрдг 23. Sum of ( ∑ ) - рдХा рдЬोреЬ 24. Braces (grouping) ( { } ) 25. Brackets ( [ ] ) - рдм्рд░ैрдХेрдЯ рд▓рдЧाрдиा 26. Parentheses ( ( ) ) - рдХोрд╖्рдЯрдХ 27. Therefore

How to enter the BIOS or CMOS setup?

Because of the wide variety of computer and BIOS manufacturers over the evolution of computers, there are numerous ways to enter the BIOS or CMOS Setup. Below is a listing of most of these methods, as well as other recommendations for entering the BIOS setup. ⚠ Note: Apple, or Mac, computers do not have a BIOS and instead utilize an EFI, which does not need to modified based on the hardware in the computer, like a BIOS. The EFI provides better integration between hardware and software for Apple computers, virtually eliminating the need for a BIOS. ⚠ Note: This document does not help if you cannot enter the CMOS setup with password. New computers Computers manufactured in the last few years allow you to enter the BIOS setup using one of the five keys shown below during the boot process. ⇾  F1 ⇾  F2 * ⇾  F10 ** ⇾  DEL ⇾  ESC * If pressing F2 opens a diagnostics tool, your setup key is likely F10 ** F10 is also used for the boot menu. If F10 opens a boot menu, your

What is Motherboard ?

Motherboard is a printed circuit board containing the principal components of a computer or other device, with connectors for other circuit boards to be slotted into.