I know, I KNOW!! I’ve been away for a really long time.. almost a month and I haven’t posted anything, well here goes.
This one is going to be a long one. I don’t expect you to stay with me all the way because it might get really boring but since it’s my work I’m gonna do it anyways.
Hacker – The official term used by normal people to identify a person who could hack a Facebook account, like that’s the base of what a hacker should know. Now let’s get to the real hacker and hacking .
Hacking is a skill, like pure awesome skill! A skill where the hacker has to be aware of a lot of events or else He’d be somewhere, where we don’t wanna be.
Once my Hacker friend said a hacker in general posses the skills of
- A Detective
- An Assassin
- A doctor
sounds odd?? Le me explain
A detective has to research everything about the given case, a hacker has to do the same to find the loop hole for him to complete his work. An Assassin is stealthy or you can say slow , consistent and hidden and is good at what he does, taking it to the point of hacking you have to be careful and slow at times and be hidden while doing whatever you are doing.
A doctor, uses alternative ways to find the disease and then has multiple solutions to cure but chooses the best one, I don’t think i need to explain this.
But wait, what is a hacker supposed to do?
There are 2 types of Hacking
- White Hat
- Black Hat
- Grey Hat
I know I said 2 types.. but Grey Hat is like the mixture of Black and White hat hackers so let’s forget counting for a little bit.
White Hat Hackers
These are hackers that work under limitations of the company they are working for, also called as the Ethical Hackers / Cyber Security Professionals. These hack to protect you from hackers. The most common task done by these kind of hackers are identified as Anti Virus programs.
Black Hat Hackers
These are the one you think have the power to hack Facebook Accounts (-.-) ( i need help!).
The black hats do it for the sole purpose of money or fun. Yeah, FUN! Some hackers just like to hack into things and have fun with the data. These hackers have no limitations on what they do and yeah , this kind of hacking is illegal. You’re safe till you’re not caught.
The black hats do it for the sole purpose of money or fun. Yeah, FUN! Some hackers just like to hack into things and have fun with the data. These hackers have no limitations on what they do and yeah , this kind of hacking is illegal. You’re safe till you’re not caught.
Grey Hat Hackers
Now 70% of the hackers present on earth are grey hat hackers who use their skills based on their mood. A pissed of Grey Hat hacker might hack the hell out of your connection but these are also the Ethical Hackers when normal. It’s like a girl on her… I mean … Nothing!
How is hacking done?
There is no simple explanation for this question but I’ll just try.
Being able to get into the network to get access to data using the loop holes in the security of the targeted system is hacking. This is just one of the ways this could be seen. Ability to hack Facebook accounts is not hacking (–.–). Technically it is hacking but a hacker is not someone who’s sole purpose if to fiddle with social accounts.
Being able to get into the network to get access to data using the loop holes in the security of the targeted system is hacking. This is just one of the ways this could be seen. Ability to hack Facebook accounts is not hacking (–.–). Technically it is hacking but a hacker is not someone who’s sole purpose if to fiddle with social accounts.
The complex explanation goes like this
We all live in a world where almost every electronic device is connected to the internet ( Just guessing you didn’t know this ) , this internet is a connection between several devices. So, you are now connected to me through some kind of path and an identification number is provided to your computer know as the IP Address this allows me to target your system to send data or receive data from you.
We all live in a world where almost every electronic device is connected to the internet ( Just guessing you didn’t know this ) , this internet is a connection between several devices. So, you are now connected to me through some kind of path and an identification number is provided to your computer know as the IP Address this allows me to target your system to send data or receive data from you.
A hacker’s task is to get in between this transaction of data and change the digital signals to his liking or maybe even get the signals to transfer the data to him. The hacker could get on your nerves by sending you a virus that has the ability to send the whole systems data to him , even worse… HE COULD CHANGE YOUR Wi-Fi PASSWORD!.
These are all done by using loop holes in the network or the security issues in the targeted system. To avoid it we have various programs and tips but then again these are also created by the hackers and hackers are human and might have made a mistake which could act as an advantage to the black hats. or the white hat could go rogue and hack too…he made the system, he could obviously break the system.
What do I do to protect myself?
There is nothing you can do because you can’t stay away from the internet in the modern world and using anti virus programs or other malware avoiding programs are all made using the human brain and might contain something that could cause just enough problem, but since you need a little protection all I could suggest is don’t download stuff from unidentified sources or use Anti Virus programs that use too much of your systems resources at this might slow down your system and also lead to the point where you won’t be able to act quick when a virus hits your system because the system starts to lag and crash at the same time ( Wonderful!) .
How do I learn Hacking?
You’re in luck! Cybrary seems to be working on this and has proper guides to help you learn networking and computer basics and yeah it’s FREE!! wait wait wait!! I’m not being paid to promote them so there is no real catch behind this promotion, its been included because its a nice resource.
Plus you could continue checking the blog for future tutorials.
That’s all for now and I’ll catch you later ( Shocked that you reached the end of the post…)
0 comments: