Skip to main content

Cyber hacking

 Cyber hacking

When we hear the terms "hacking" or "hacker," the image that comes to mind is of a clever individual that is criminal by nature, who assaults other computer systems, ruins them, breaks codes and passwords, sends viruses, and so on. Their mentality is that 'hackers' are computer criminals. They have a highly erroneous perception of the 'Hackers,' and have a very negative attitude toward them.


In this case, the media has incorrectly labelled computer criminals as "hackers." The media has played a significant part in the formation of a negative connotation for the term "hacker." Although the general population may propagate rumors, it is difficult to trust that someone is talking about anything wholly fresh.

However, the phrases "hacker" and "computer criminal" are completely distinct and have nothing to do with each other. They express what they have read and listen to what others have to say. As a result, anytime a cyber-crime was committed through the unauthorized use of other computer systems, the word "hacking" was used to describe the news that was produced and distributed to the public. As a result, we may conclude that people's animosity or unfavorable feelings toward 'hackers' stem from the media.

Now, if these cyber criminals are not hackers, two big questions arise:

1. What is a hacker? And,

2. What are the names of these cyber criminals?

'Hackers,' on the other hand, are highly bright individuals who employ their abilities in a constructive and good manner. They assist the government in safeguarding critical national papers, assist corporations in safeguarding documents and trade secrets, and even assist justice in achieving its goals by extracting electronic evidence. Rather, they are those who assist in the pursuit of cyber criminals.

Now we'll get to the second component, which is what these cyber thieves are called. The correct term for such offenders is 'cracker,' not 'hacker.'

"Traditionally, hackers were computer geeks who understood practically everything about computers and were generally renowned for their vast variety of knowledge," stated Ankit Fadia, a famous master mind of India in the subject of "Hacking."

In view of how the term 'hacking' is often interpreted by individuals, the term 'hacker' may be used to describe all of the following: -


1. Code Hackers - They know all there is to know about computers. They have complete control over the computer and can make it do almost whatever they want.

2. Crackers are those who attempt to get access to computer systems. Their favourite pastime is eluding operating systems and their security. It entails compromising software applications' security.

3. Cyber Punks - They are cryptography's masters.

4. Phreakers - They use their extensive understanding of the Internet and the telecommunications infrastructure to solve problems.

5. Virus Creators - Virus events have resulted in severe and data loss at some point. The loss might be caused by: -

Viruses - A virus is a computer programme that can't attach to a file and reproduce itself. It can target any region, from altering the contents of the file it infiltrates to attempting to crash the computer by exploiting the computer's processing resources.

* Worms - Worms may infiltrate a computer and take its resources in order to proliferate. They utilize the internet to propagate their message. A contemporary example is "Love Bug."

* Trojan horse The Trojan horse is a risky proposition. It pretends to perform one thing but actually does another. It's possible that the system will accept it as one item. Its execution may result in the deployment of a virus, worm, or logic bomb.

* Logic bomb - A logic bomb is an attack that is initiated by a certain event, such as a computer clock reaching a certain time.


Comments

Popular posts from this blog

LAW INTERNSHIP AND TRAINEE OPPORTUNITY

  LAW INTERNSHIP AND TRAINEE OPPORTUNITY: LEXIS AND COMPANY, renowned for its excellence in the legal field, is thrilled to announce an exceptional internship and trainee opportunity for aspiring final year law students and newly enrolled Advocates. This highly coveted internship  and trainee opportunity  is a paid position, providing a remarkable platform for career growth and experiential learning in a corporate environment. Eligibility: Only for final year Students and Newly Enrolled Advocates. We are offering a limited number of vacancies, designed for law students and newly enrolled advocates in the dynamic world of the legal profession. This is an immediate joining opportunity, available to candidates who are interested to work in the area of commercial and civil litigation and have interest towards drafting, and legal research. As a team member at  LEXIS AND COMPANY,  you will refine your research and drafting skills while witnessing the meticulous professional conduct expected

Physical Internship & Training Program - Legal (LEVEL - 1)

   Physical Internship & Training Program - Legal (LEVEL - 1) --- PLEASE READ THE COMPLETE JOB DESCRIPTION BEFORE APPLYING ---   Urgent Hiring for: LAW STUDENTS/CS STUDENTS/ FRESHER LAW GRADUATES/ FRESHER CS. Position: Physical Internship & Training Program - Legal (LEVEL - 1) Department: Legal. Firm Name: LEXIS AND COMPANY – LAW FIRM. Location: Janakpuri, New Delhi. CTC: RS 5000/- Per Month. Additional Allowance: All official expenses including travelling allowance for official purposes will be paid from the day 1 of the service with the firm.   We are urgently looking for LAW STUDENTS / CS STUDENTS / FRESHER LAW GRADUATES / FRESHER CS for the position of Physical Internship & Training Program - Legal (LEVEL - 1) for our Law Firm in Janakpuri, New Delhi.   Eligibility: Mandatory Qualification: Any LAW STUDENTS / CS STUDENTS / FRESHER LAW GRADUATES / FRESHER CS who wants to learn as a beginner. Desired Qualification: Any additional qualification  will be pre

The Doctrine of Alternative Danger

  THE DOCTRINE OF ALTERNATIVE DANGER Although the plaintiff is supposed to be cautious in spite of the defendant’s Negligence, there can also be certain situations when the plaintiff is justified in taking some threat where some unsafe state of affairs has been created by way of the defendant. The plaintiff may appear as puzzled or worried through a hazardous state of affairs created via the defendant and to store his man or woman or property, or now and again to store a third party from such danger, he may take a choice risk. The law, therefore, lets in the plaintiff to come across a choice danger to shop by himself from the chance created via the defendant. If the path adopted by him results in some harm to himself, his motion in opposition to the defendant will now not fail. The judgment of the plaintiff, however, is not rash. The position can be defined by means of the case of Jones v . Boyce . In that case, the plaintiff used to be a passenger in the defendant’s train and instruct