What is a hacker
The term hacker or hacking historically refers to intelligence and deductive reasoning and was not only associated with computer systems and the Internet and in the world of computers or computers and internet networks, hacking is any technical effort made by any person to manipulate, and control the flow of, the natural order of networks or devices, Thus, the hacker is the person responsible for the hacking process and tampering with the functioning of devices and When engineers at the Massachusetts Institute of Technology (MIT) first decided to popularize the term hacking and its concepts, and then began working on these concepts at that time, engineers were doing hacking as a matter of scientific and technical experiments. Do not cause any harm.
Hacking methods
Hackers or hackers rely on different sources to access computers, but the main and primary source that hackers rely on is computer code, as the vast majority of internet hackers rely on these codes, which are easy to get. On the Internet, while there are some hackers who write their own code, there are also a large number of malicious programs that help hackers infiltrate devices and networks, and hackers use these programs for various reasons:
- The ability to record keystrokes made by the victim.
- Hack victim passwords.
- Find and browse for loopholes (in English: Get a backdoor).
ethical hacking
Ethical hacking, or otherwise known as ethical hacking, is hacking operations carried out by computer hackers and experts, in order to identify and correct weaknesses in the system to be protected. The world of electronic hacking is divided into two parts; The first is the black hat corrupt hackers, the second section is the white hat ethical hackers, and the presence of white hats or ethical hacking in the Internet world is very important, as the Internet is a repository of endless amounts of private and confidential information, and as a result of the presence of this huge amount of Information, there must be a constant updating of the system, and a permanent development of protection systems, and here lies the role of ethical hacking, preventing corrupt hackers from gaining access to private information and
Comments
Post a Comment