Skip to main content

Cyber hacking

 Cyber hacking

When we hear the terms "hacking" or "hacker," the image that comes to mind is of a clever individual that is criminal by nature, who assaults other computer systems, ruins them, breaks codes and passwords, sends viruses, and so on. Their mentality is that 'hackers' are computer criminals. They have a highly erroneous perception of the 'Hackers,' and have a very negative attitude toward them.


In this case, the media has incorrectly labelled computer criminals as "hackers." The media has played a significant part in the formation of a negative connotation for the term "hacker." Although the general population may propagate rumors, it is difficult to trust that someone is talking about anything wholly fresh.

However, the phrases "hacker" and "computer criminal" are completely distinct and have nothing to do with each other. They express what they have read and listen to what others have to say. As a result, anytime a cyber-crime was committed through the unauthorized use of other computer systems, the word "hacking" was used to describe the news that was produced and distributed to the public. As a result, we may conclude that people's animosity or unfavorable feelings toward 'hackers' stem from the media.

Now, if these cyber criminals are not hackers, two big questions arise:

1. What is a hacker? And,

2. What are the names of these cyber criminals?

'Hackers,' on the other hand, are highly bright individuals who employ their abilities in a constructive and good manner. They assist the government in safeguarding critical national papers, assist corporations in safeguarding documents and trade secrets, and even assist justice in achieving its goals by extracting electronic evidence. Rather, they are those who assist in the pursuit of cyber criminals.

Now we'll get to the second component, which is what these cyber thieves are called. The correct term for such offenders is 'cracker,' not 'hacker.'

"Traditionally, hackers were computer geeks who understood practically everything about computers and were generally renowned for their vast variety of knowledge," stated Ankit Fadia, a famous master mind of India in the subject of "Hacking."

In view of how the term 'hacking' is often interpreted by individuals, the term 'hacker' may be used to describe all of the following: -


1. Code Hackers - They know all there is to know about computers. They have complete control over the computer and can make it do almost whatever they want.

2. Crackers are those who attempt to get access to computer systems. Their favourite pastime is eluding operating systems and their security. It entails compromising software applications' security.

3. Cyber Punks - They are cryptography's masters.

4. Phreakers - They use their extensive understanding of the Internet and the telecommunications infrastructure to solve problems.

5. Virus Creators - Virus events have resulted in severe and data loss at some point. The loss might be caused by: -

Viruses - A virus is a computer programme that can't attach to a file and reproduce itself. It can target any region, from altering the contents of the file it infiltrates to attempting to crash the computer by exploiting the computer's processing resources.

* Worms - Worms may infiltrate a computer and take its resources in order to proliferate. They utilize the internet to propagate their message. A contemporary example is "Love Bug."

* Trojan horse The Trojan horse is a risky proposition. It pretends to perform one thing but actually does another. It's possible that the system will accept it as one item. Its execution may result in the deployment of a virus, worm, or logic bomb.

* Logic bomb - A logic bomb is an attack that is initiated by a certain event, such as a computer clock reaching a certain time.


Comments

Popular posts from this blog

Understanding Counterclaims: A Comprehensive Guide

  Understanding Counterclaims: A Comprehensive Guide In legal proceedings, a counterclaim is a vital tool that allows defendants to assert their own claims against the plaintiff. This strategic maneuver not only defends against the plaintiff's allegations but also enables defendants to seek their own relief. In this comprehensive guide, we delve into the intricacies of counterclaims, exploring their purpose, procedures, and implications in various legal contexts. Introduction to Counterclaims Definition A counterclaim is a legal claim brought by a defendant against the plaintiff in response to the plaintiff's initial complaint. It serves as a means for defendants to assert their own rights, defenses, or causes of action arising from the same transaction or occurrence as the plaintiff's claim. Purpose The primary purpose of a counterclaim is to allow defendants to present their side of the story and seek appropriate remedies or relief. By filing a counterclaim, defendants ca...

Title: Legal Recourse Against Electronic Harassment, Including V2K: Understanding Options and Rights

  Title: Legal Recourse Against Electronic Harassment, Including V2K: Understanding Options and Rights Electronic harassment, including technologies like Voice-to-Skull (V2K) and other forms of electronic harassment, can inflict significant psychological and emotional harm on individuals. Victims of such harassment often wonder if there are legal avenues available to seek redress and hold perpetrators accountable for their actions. While navigating legal action in cases of electronic harassment can be complex, understanding available options and rights is crucial. Here's a detailed exploration of the possibility of taking legal action against individuals engaged in electronic harassment: Understanding Electronic Harassment (0-7 days) : Electronic harassment encompasses a range of behaviors involving the use of electronic devices or technologies to inflict harm, including V2K, electronic surveillance, cyberstalking, and cyberbullying. V2K, in particular, refers to the transmission o...

Title: Understanding "Your Complaint has been Disposed under a Closed Complaint"

  Title: Understanding "Your Complaint has been Disposed under a Closed Complaint" When you receive a notification stating "Your complaint has been disposed under a closed complaint," it signifies the closure of the complaint you filed with the respective entity or organization. This phrase is commonly used by customer service departments, grievance redressal cells, regulatory bodies, or complaint management systems to inform complainants about the resolution status of their complaint. Here's a detailed explanation of what it means and its implications: Disposition of Complaint (0-7 days) : "Disposed" indicates that the complaint has been addressed, reviewed, and resolved by the concerned authority or entity. The closure of the complaint signifies that the responsible party has taken appropriate action to address the issues raised in the complaint. Closure Status (0-7 days) : "Closed complaint" indicates that the complaint resolution process ...