DailyExposition

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, May 2, 2013

Understanding Types Of Hackers

Posted on 5:00 PM by Unknown

One of the main misconceptions is that all hackers are bad and that they are all out to steal our information for personal gain. The truth is that most hackers are not evil, and there are organizations of hackers that are Good, Bad, Neutral all of which exist for their own purposes. They have their own names that classify these groups, and I will go into these and explain what their purposes are. Just keep an open mind while reading this article.




Types Of Hackers

Black Hat   Simple Answer - Bad

There are 3 types of hackers all that have their own purpose those groups are White, Black, and Grey Hat. These groups operate for their own purposes, and we only know of the Black Hat group which would be Anonymous. A black hat group is a group of hackers that hack for personal gain and have no real morals to doing it. They are doing it for personal gain, and they don't do anything constructive. For instance anonymous takes down important sites for NO reason. While they think it is fair for their own gain they do it for the wrong reason. They do it in a protesting manner which puts them under the Black Hat group. To make it simple these are the bad guys.

Grey Hat  Simple Answer- Neutral

The Grey Hat group is a group of hackers who generally hack for sport and do it for fun. They don't generally work with other hackers because their goals are very modest like checking the safety of their site. They might also hack a game on their computer to give them unlimited everything. The thing to remember about this group is that they don't hack for gain but for sport this is what separate them from the other two groups.

White Hat Simple Answer- Good

The Third and final group of hackers are the White Hat Hackers these are the ones who work and find exploits in software and hardware to report to companies to make them better. These are not well known, and it is a very large group that is growing in this era because of the growth in technology. They are also paid very handsomely to find exploits in servers and websites to protect the company from many forms of hackers. Because thousands of accounts, websites, computers are hacked daily.  

Then There Are Those People


There is the group of people who claim to be hacker because someone did not log out of a computer and they got onto their Facebook account. THIS IS NOT HACKING. This is the reason the term "hacker" is so misused.

Hacker is defined as:
Noun


An enthusiastic and skillful computer programmer or user.
A person who uses computers to gain unauthorized access to data.

Getting into your friends facebook account is not hacking. Anyone can do that now if you created a keylogger and captured their keystrokes and logged on from your computer, that is hacking. That is not legal but that is hacking. The term hacking is being misrepresented and it gives a lot of "hackers" bad names because they are the one who actually hack you just did a simple task to get into their Facebook account.


Email ThisBlogThis!Share to XShare to Facebook
Posted in general | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Gaming Communities
    Many gamers out there are looking for quality content and are looking to get their name out there. Now what if I said I found a website that...
  • What Is Adware
    Adware one of the most commonly misunderstood form of malware right next to the common virus. The issue with Adware is people try to assume...
  • What Is Quick Scoping
    Many people in call of duty say that they are good at quick scoping, and many people don't know what this is. So in this article I will ...
  • Which Internet Browser Should I Use
    Most people have heard of the big 3 or 5 internet browsers . However many of you don't know of the many other internet browsers out ther...
  • Youtube Monetization Not Available In Your Country
    As we all know today thousands maybe millions of users are not able to monetize their newly submitted videos. Now Google at the time of this...
  • Free Online Classes
    Coursera is a website that offers college classes for free to anyone who knows how to use the internet. They started this website under the ...
  • Tera Sorcerer Skill List
    Before I go into the full skill list let me break down what the sorcerer is. The sorcerer in Tera is a character of mass destruction. They a...
  • Black Ops 2 Review
    Black-ops 2 is another game in the well known Call of Duty series. This game is a lot like all the other games it has multiplayer, and it is...
  • Internet Browser Test Results
    From my last post on this issue someone pointed out that it looked like I was favoring Google Chrome. Now while I like its UI the best it sc...
  • List Of Second Opinon Malware Scanners
    Why Do I Need A Secondary  Malware  Scanner? You want a secondary scanner because no 1 antivirus program can keep you safe from every threat...

Categories

  • 2013
  • 2013 Total Security
  • Android
  • Anti-Virus
  • antivirus
  • Apple
  • Asynchrony
  • Bitdefender
  • Bitdefender Wallet
  • Blackberry
  • Car dealership
  • cloud storage
  • CNET
  • Computer Support
  • computers
  • coupons
  • CX
  • Data loss
  • Direct selling
  • Download
  • Editor's Choice
  • forums
  • free software
  • Gamer
  • gaming
  • general
  • Google
  • HTML
  • internet
  • Internet access
  • ios 6 jailbreak
  • iOS 6.1 Jailbreak Tweaks
  • Jumpshot
  • LeBron James
  • Linux
  • Loader (computing)
  • loading
  • malware
  • malware encyclopedia
  • Miami Heat
  • Microsoft
  • Mobile security
  • Nokia
  • PageSpeed
  • Personal computer
  • Play Station 4
  • Product Reviews
  • Program
  • Programming
  • science
  • Searching
  • security
  • Servers
  • Shareware
  • SONY
  • technology
  • Tesla
  • Tesla Motors
  • top 5 ios
  • top 5 ios 6 cydia tweaks
  • Trade
  • videogames
  • Web page
  • Website
  • White House
  • Windows
  • Windows 8
  • Windows Update
  • worm
  • Xbox
  • Xbox 360
  • Xbox One
  • Yahoo
  • Youtube

Blog Archive

  • ▼  2013 (170)
    • ►  September (15)
    • ►  August (13)
    • ►  July (13)
    • ►  June (16)
    • ▼  May (29)
      • Editor's Choice For Best Paid Antivirus Program
      • Editors Choice For Best Free Antivirus Software
      • Bitdefender Free Antivirus Review
      • Trojan.Zbot!gen44
      • Infostealer!gen4
      • Skype Might Not Be That Private
      • Trojan.Blackrev
      • Best Microsoft Office Replacements (Desktop)
      • Trojan.Zbot!gen41
      • Skype Bitcoin Malware
      • Comodo Firewall 6 Review
      • Malware Removal Guide
      • W32.Phopifas!gen2
      • Issues With The American Patent System
      • Packed.Generic.410
      • Malware: WN32.Changeup!gen41
      • Slde Show Images
      • Contact Us
      • Free Daily Software
      • Securing Your Computer For Free Complete Guide
      • Malware: Trojan:Win32/Urausy.D
      • What Is A Trojan:JS/Seedabutor.B
      • What Is RAM?
      • What Is A VPN?
      • Editors Choice Badge
      • Understanding Types Of Hackers
      • Blog Archive
      • List Of Second Opinon Malware Scanners
      • What Is A Second Opinon Malware Scanner?
    • ►  April (28)
    • ►  March (30)
    • ►  February (22)
    • ►  January (4)
Powered by Blogger.

About Me

Unknown
View my complete profile