This is the age of the computers and mobiles. Every hand is holding a device . Mobile and Computers have made our life so easy that we can talk to our friends and relatives which are thousands of miles away from us or if you want to see any video or something you can see that . It is like we are having the world in our pockets . But the problem is that those devices are not safe . They can be hacked at any time .
What is Hacking ?
Hacking is nothing but to enter inside other's system (exploit other's system ) and retrieve their personal and confidential data . Or we can say that the unauthorized access of someone other's computer system for some illicit purpose is hacking . Those who perform these hacking operations are called hackers .
Type of Hackers
Hackers are majorly classified in three categories .
1. Black Hat Hacker :
They are the real hackers . They hack the system illegally without any permission . To do this first of all they collect the data of the target and try to find the weak points and there they strike . Mostly they do hacking to steal the money or to achieve their own illegal goals .
2. White Hat Hacker :
They are the ethical hackers or in other words we can say that they are the penetration tester. Their objective is to protect the system from the hackers. Although they are also hackers but not the black hat. They work for the security . They also uses the same techniques that black hat hackers use and try to find out the vulnerability in the system.
3. Grey Hat Hacker :
They are the mixture of the white hat hackers and the black hat hackers . They don't damage the system but they can hack any system without permission . Mostly they tell to system administrator that you have some vulnerabilities , on which you should work to protect your system.