Hackers are back!

Hacking has been part of computing for 40 years. The primary computer hacked emerged at MIT, while Hacking is began in 1960s at MIT, origin of the term “Hacker”.

The truth hacker amongst our societies have thirst for the knowledge, which suggests Boredom is rarely an object of challenge for the hackers.

What is hacking?

The process of attempting to achieve or successfully gaining, unauthorized access to computer resources is termed hacking.

Who is a hacker?

In the computer security context, a hacker is someone who seeks and exploits weaknesses in a very computing system or electronic network

The term hacker could be a reclaimed by computer programmers who argue that somebody breaking into computers is healthier called a “cracker

Why do hackers hack? 

  • Just for fun.
  • Show off.
  • Hack other systems secretly.
  • Notify many people their thought.
  • Steal important information 
  • Destroy enemy’s electronic network during the war.

Types of hacking:

1-  Website hacking: hacking a web site means taking control from the web site owners to an individual who hacks the website.

2- Network hacking: is usually means gathering information about domain by using tools like Telent, Ns, Look up, Ping , Tracert, Netstat, etc… over the network.

3- Ethical hacking: is where an individual hacks to search out weaknesses in a very system and so usually patches them.

4- Email hacking: Is illicit access to an email account or electronic message.

5- Password hacking: Password hacking Password cracking is that the process of recovering secret passwords from data that has been stored in or transmitted by a computing system.

6- Online banking hacking: Unauthorized accessing bank accounts without knowing the password or without permission of account holder is thought as online banking hacking

7-Computer hacking: is when files on your computer are viewed, created or edited without your authorization. 

What should do after hacking ? 

  • Shut down the system or turn it off.
  • Separate the system from network.
  • Restore the system with the backup or reinstall all programs.
  • Connect the system to the network.
  • It may be good to call the police.

How to provides a password to account?

-Use unique passwords for your account 

-Choose a mixture of letters, numbers or symbols to creat a novel and hard password.

Advantages of hacking:

  • Can be used to recover lost information where the the PC password has been lost.
  • Teaches you that no technology is 100% secure.
  • To test how good security is on your own network.
  • They call it white hat computer hacking.

Disadvantages of hacking:

  • Criminals can use it to their advantage 
  • It can harm someone’s privacy 
  • It’s illegal  

Keep you password protected, and write your password should be with combination of characters, digits, special symbols. 

Do not reply to spam emails, and after you do any online transaction always keep eye on site whether the protocol of site is http & whether there’s a lock symbol.

Resources:

https://en.m.wikipedia.org/wiki/Hacker

https://en.m.wikipedia.org/wiki/Hacking

Leave a comment

Design a site like this with WordPress.com
Get started