What is Hacking ?



Introduction to Hacking and Hackers!!


This is My First Tutorial Of Hacking . In this tutorial I will Tell you what is hacking.. ethical hacking security...who are hackers...why we do hacking...and Introduction to some basic terms...
First of all I will try Explain what the Hacking really is...


What Is Hacking??

Technically, a hacker is someone who is enthusiastic about computer programming and all things relating to the technical workings of a computer.Everyone here thinks that hacking is just stealing of data and information illegally but this perception is absolutely wrong

"Hacking is unauthorized use of computer and network resources. (The term "hacker" originally meant a very gifted programmer. In recent years though, with easier access to multiple systems, it now has negative implications.)" - wikipedia

Hacking definition by me -

"
Hacking is art of Exploiting and finding loop holes in the security and use them to benefit the others" :)



WHO ARE HACKERS ??

Everybody here thinks that hackers are criminals of the virtual world (i.e Cyber World ). But this thought is also wrong. Hackers are not always criminals.. It doesn't have any doubt that Hackers are extremely genius peoples in the field of Computers...

Hackers are categorized in to three Parts :-


1.White Hat Hacker : - A
white hat hacker or "Ethical Hacker" is a white hat because he/she doesn't destroy/exploit systems he/she has broken into. and instead somehow notifies the admin of the cracked systems security holes and flaws.

2.Black Hat Hacker : - A black hat or "CRACKER" on the other hand is a hacking into systems (usually) only to destroy something or to steal information like bank information.

3.Grey Hat Hacker : - the grey hat is just in between them in some way maybe not always leaving a note to the admin telling about the flaws in the system or the loop hole he/she used. or maybe just peeking abit in the logs.

Some Terms in Hacking you have to be know :-

Threat –An action or event that might compromise security. A threat is a potential violation of
security.


Vulnerability –Existence of a weakness, design, or implementation error that can lead to an unexpected, undesirable event compromising the security of the system.


Exploit –A defined way to breach the security of an system through vulnerability. i.e Use the vulnerability to damage the database or system.


Attack –An assault on system security that derives from an intelligent threat. An attack is any action that violates security.


Target of Evaluation – An IT system, product, or component that is identified/subjected as requiring security evaluation.


Security – A state of well-being of information and infrastructures in which the possibility of successful yet undetected theft, tampering, and disruption of information and services is kept low or tolerable.

That’s all for today I think You all would have like this and want to see more.. I will regularly post material. THANKS FOR READING !!

Have Fun and keep Hacking :)

Kindly Bookmark this Post using your favorite Bookmarking service:
Technorati Digg This Stumble Stumble Facebook Twitter
YOUR ADSENSE CODE GOES HERE

0 comments:

Post a Comment

 

| THE BEST HACKING © 2009. All Rights Reserved | Template Style by My Blogger Tricks .com | Design by Brian Gardner | Back To Top |