Create and use mouse cursors that look and feel far superior to anything you've ever seen before!
Blog is under Construction!
Hacking 4 fun is back this time ,Coming soon with the new ,ultimate and great hacking style!This time we gonna enjoy and love this much more than before.until then like this page on facebook
Thanks 4 your co-operation.
You are the back-bone of Hacking 4 fun.
your's sincerly
Asad Raza
Like Us
Wednesday, August 26, 2009
Saturday, August 15, 2009
Sunday, August 9, 2009
Hacker's Types
Hackers can be divided into three groups: white hats, black hats, and grey hats. Ethical hackers
usually fall into the white-hat category, but sometimes they’re former grey hats who have become
security professionals and who use their skills in an ethical manner.
White Hat:-
White Hats are the good guys, the ethical hackers who use their hacking skills for
defensive purposes. White-hat hackers are usually security professionals with knowledge of
hacking and the hacker toolset and who use this knowledge to locate weaknesses and implement
countermeasures.
Black Hat:-
Black hats are the bad guys: the malicious hackers or
crackers
who use their skills
for illegal or malicious purposes. They break into or otherwise violate the system integrity of
remote machines, with malicious intent. Having gained unauthorized access, black-hat hackers
destroy vital data, deny legitimate users service, and basically cause problems for their targets.
Black-hat hackers and crackers can easily be differentiated from white-hat hackers because their
actions are malicious.
Grey Hat:-
Grey hats are hackers who may work offensively or defensively, depending on the situation.
This is the dividing line between hacker and cracker. Both are powerful forces on the Internet,
and both will remain permanently. And some individuals qualify for both categories. The
existence of such individuals further clouds the division between these two groups of people.
In addition to these groups, there are self-proclaimed ethical hackers, who are interested in
hacker tools mostly from a curiosity standpoint. They may want to highlight security problems
in a system or educate victims so they secure their systems properly. These hackers are
doing their “victims” a favor. For instance, if a weakness is discovered in a service offered by
an investment bank, the hacker is doing the bank a favor by giving the bank a chance to rectify
the vulnerability.
usually fall into the white-hat category, but sometimes they’re former grey hats who have become
security professionals and who use their skills in an ethical manner.
White Hat:-
White Hats are the good guys, the ethical hackers who use their hacking skills for
defensive purposes. White-hat hackers are usually security professionals with knowledge of
hacking and the hacker toolset and who use this knowledge to locate weaknesses and implement
countermeasures.
Black Hat:-
Black hats are the bad guys: the malicious hackers or
crackers
who use their skills
for illegal or malicious purposes. They break into or otherwise violate the system integrity of
remote machines, with malicious intent. Having gained unauthorized access, black-hat hackers
destroy vital data, deny legitimate users service, and basically cause problems for their targets.
Black-hat hackers and crackers can easily be differentiated from white-hat hackers because their
actions are malicious.
Grey Hat:-
Grey hats are hackers who may work offensively or defensively, depending on the situation.
This is the dividing line between hacker and cracker. Both are powerful forces on the Internet,
and both will remain permanently. And some individuals qualify for both categories. The
existence of such individuals further clouds the division between these two groups of people.
In addition to these groups, there are self-proclaimed ethical hackers, who are interested in
hacker tools mostly from a curiosity standpoint. They may want to highlight security problems
in a system or educate victims so they secure their systems properly. These hackers are
doing their “victims” a favor. For instance, if a weakness is discovered in a service offered by
an investment bank, the hacker is doing the bank a favor by giving the bank a chance to rectify
the vulnerability.
Subscribe to:
Posts (Atom)