1. What is hacking?

Ans: Technically, Hacking is an art of exploring uncommon things or modifying things to achieve uncommon functionalities.
 In other words, Hacking is an act of penetrating computer system to gain knowledge about the system and how it works.

2. Who are hackers or Ethical hackers?

Ans: A Hacker is a person who is extremely interested in exploring the things and recondite workings of any computer system or networking system. Most often, hackers are the expert programmers. These are also called Ethical Hackers or white hat hackers. And the technique or hacking they perform is called ethical hacking.
Ethical Hacking Means you think like Hackers that is first you Hack the Systems and find out the loop holes and then try to correct those Loop Holes. These types of hackers protect the cyber world from every possible threat and fix the future coming security loop holes. These peoples are also called as "GURU's" of Computer Security.

3. Who are Crackers?

Ans: Crackers or Black Hat hackers or cheaters or simply criminals, they are called criminals because they are having the mindset of causing harm to security and they steals very useful data and use it in wrong ways. 
Phishers also come in this category who steals account info and steal your credit card nos. and money over the Net.

4. How hackers are different from crackers?

Ans: Hackers are good guys and Crackers are bad guys in the field of hacking.

5. Who is script kiddy?

Ans: A Script Kiddy is a novice hacker or hacker at very beginner level who lacks the knowledge of how different stuffs works and use easy technique and ready-made tools to attempt hacking.

6. what is ethical hacking?

Ans: The term Ethical Hacking refers to the co-ordinate and comprehensive check of security of a network and on systems inside it, in order to assess the actual risk level data is exposed to, and to propose possible corrective actions aimed at raising the security level.

7. Skills of Ethical hackers? 
   
Ans: 


  •      Has in-depth knowledge of target platforms, such as Windows, Unix, Linux etc.
  •      Has exemplary knowledge of networking and related hardware and software
  •      Has knowledge of security areas and related issues
  •      Has "High technical" knowledge to launch sophisticated attacks

             Any many more....

Post a Comment

 
Top