Who is the hacker and what are the types and objectives - JooTechno

Breaking

Post Top Ad

Post Top Ad

Wednesday, September 18, 2019

Who is the hacker and what are the types and objectives

Who is the hacker and what are the types and objectives

hacker,hackers,who is the game master,who are hackers,hackers & threats,who is a cyber security engineer,footprinting and reconnaissance,what is penetration testing,what do hackers do,vulnerability and penetration testing,hide and seek in minecraft,hide and seek,footprinting tools and techniques,cyberpunk class abilities and traits,tips and tricks,minecraft hide and seek,who are crackers
hacker,hackers,who is the game master,who are hackers,hackers & threats,who is a cyber security engineer,footprinting and reconnaissance,what is penetration testing,what do hackers do,vulnerability and penetration testing,hide and seek in minecraft,hide and seek,footprinting tools and techniques,cyberpunk class abilities and traits,tips and tricks,minecraft hide and seek,who are crackers

Did you know who is the hacker or what is the meaning of the word hacker is a foreign word "Hacker" It means "pirate" At this time the word hacker means a person who is able to computer skills, information security, and originally that the word hacker was launched on a group of programmers who challenge systems But the hacker's goal is not always a personal interest or sabotage a certain party or commit a crime whatsoever. To test his abilities without identifying himself or a But there are those who use it criminally or to spy on a particular party or theft. 


Hence companies such as Microsoft have appointed these hackers in high positions to penetrate their systems and fill open gaps, due to the need to protect their systems, hence the idea that the hacker can be used to prevent damage, and that opens a good room for the hacker to be a good reputation, but the basic name One word hacker, a programmer with special abilities that can be used in right and can be used in error.

The difference between the definition of hacker
Many view hacker as a destructive computer hacker and this view comes from the path of what is contained in the media.

The origin of the dispute is due to some academics, who did not understand the nature of the hacker and the nature of his work and the importance of his existence, although the hacker is originally a creative person and a professional developer and principles, but they see that he is a corrupt person with a bad nature, ignoring that there are a lot of huge projects were developed by the hackers, The time of those Linux projects, Wikipedia, and many open-source targeted projects.


And the emergence of a new term called "Cracker", a term launched after the difference to distinguish between the good (moral) and hacker spoiler (immoral), and despite this term, the hacker has a bad reputation, and the reason for this is due to hacker (immoral) or cracker because it Always acts of sabotage and harmony without reasons, but the media, which always talk about the hacker and confuse the hacker corrupted and reformer, and overtime was associated with the name of the hacker spoiler or saboteur.


Hacker rating

There are three types of hackers.

1 - White Hat Pirate, this name is called a good hacker (moral hacker).


2 - Black Hat Pirate, this term is called the Pirate Vandal (unethical pirate).


3- The gray-haired pirate The latter is fickle between a good pirate and a spoiler.


As for the term "hats", its origin is related to the history of cinema and cinema.

The key role of the hacker

The hacker was still contributing to the construction of Internet technologies, and hackers are still making a great effort to improve networks and the development of networking techniques, the hacker is a distinct category of computer developers.

1 - to detect security flaws and fill the gaps, the completion of open source projects and carry them on the Internet for free, such as the operating system Linux.

2. Develop and modify existing scripts on the Internet.

3 - Provide security consulting for large companies such as Microsoft, Google, and others, as well as airlines and industrial enterprises and archive government information.

4 - Assist the security authorities and prevent the entry of intruders and fill the gaps to control those who abuse the technology.

Although the hacker has an important and significant role, the negative perception will not change. But the hacker will continue to follow in this way non-stop, as well as for the pirate (immoral).

1 comment:

  1. I have spent a lot of the time in different blogs but this is really a unique blog for me.
    UI/UX design agency

    ReplyDelete

Post down Ad