Home » Computers » Security

Are All Hackers That Bad?

Jan 20, 2008
Among the vicious attacks on computers are the attacks, which come daily from Spyware called Hackers. A relatively new term used by some in the computer protection business is the term Hacktivism. This term identifies a category of Spyware, used for vicious and unconscionable attacks on computers for a political reason.

Hacktivism is a derivation of the word hack, meaning to chop, cut, trim or break up something crudely, roughly or irregularly with the intent to do damage. A hacker is both the one who does this and the object with which this is accomplished. The object is the Spyware developed to do the hacking. The hacker is the skilled technician who develops an application aimed at entering a computer and doing damage to the person and the computer. The Spyware as the hacker is an application, which attaches to the system and does the damage. Hacktivism then is the act of hacking into a computer for the purpose, of breaking it or doing damage to it or the owner by stealing or distorting files, information data or in some cases the system, in whole or in part for a political reason.

There are two types of hackers, a white hat hacker and a black hat hacker. A hacker is a person usually "unauthorized" to access another person's computer system seeking to find vulnerabilities in your system. Vulnerabilities or deficiencies in an Internet Browser, through, which Spyware can enter your computer. This is why it is essential to check with your browser provider regularly for security updates and install them. Always respond to notices from Microsoft, Mozilla or whatever Browser you use, when there is an update available.

One who hacks into another's computer for a malice reason, curiosity or criminal intent for a political reason is committing the crime of hacktivism. The person is a black hat hacker who may enter a website and deface or distort information by changing the content. This person may also inhibit communication by freezing a computer or the hacker may prevent communication by a service denial message. This is hacking committed by a Cracker; a cracker is a hacker acting with malicious intent.

A black hat hacker is a person who is unauthorized to access a computer system and does so with illegal intent. The black hat hacker intends to use the information to do harm to your computer or steal your personal information. The purpose of a security system is to prevent these events from happening and to gather information on the black hat hacker and add it to the blacklist in the security program. This permits the security program to block this hacker in the event he or she tries again.
About the Author
Computer Expert Andres Berger usually writes about Foxfire browser. Get it today and enjoy a free course to stay secure on the Internet.
Rating:
Please Rate:
(Average: Not rated)
Views: 251
Print Email Report Share
Article Categories
    • Artists
    • Gambling
    • Humanities
    • Humor
    • Movies
    • Music
    • Photography
    • Tattoos
    • Television
    • Classic Cars
    • Motorcycles
    • Recreational Vehicles
    • SUVs
    • Trucks
    • Vans
    • Branding
    • Business Opportunities
    • Careers and Jobs
    • Corporate
    • Customer Service
    • Direct Mail
    • Entrepreneurship
    • Ethics
    • Financing
    • Franchising
    • Home-Based Business
    • Human Resources
    • Import and Export
    • Leadership
    • Management
    • Market Research
    • Marketing and Advertising
    • Negotiation
    • Network Marketing
    • Networking
    • Organizational
    • Presentation
    • Project Management
    • Public Relations
    • Small Business
    • Strategic Planning
    • Team Building
    • Telemarketing
    • Training
    • Ask an Expert
    • College and University
    • Home Schooling
    • K-12
    • Languages
    • Online Education
    • Psychology
    • Accounting
    • Credit
    • Currency Trading
    • Debt Consolidation
    • Insurance
    • Investing
    • Leasing
    • Loans
    • Mortgage
    • Mutual Funds
    • Personal Finance
    • Stock Market
    • Structured Settlements
    • Taxes
    • Wealth Building
    • Coffee
    • Cooking
    • Gourmet
    • Recipes
    • Wine and Spirits
    • Acne
    • Aerobics
    • Alternative Medicine
    • Beauty
    • Cancer
    • Cosmetics
    • Depression
    • Diabetes
    • Diseases and Conditions
    • Fitness Equipment
    • Fitness
    • Hair Loss
    • Heart Disease
    • Medicine
    • Men's Health
    • Muscle Building
    • Nutrition
    • Skin Care
    • Supplements and Vitamins
    • Weight Loss
    • Women's Health
    • Yoga
    • Arts and Crafts
    • Babies
    • Collecting
    • Elderly Care
    • Genealogy
    • Hobbies
    • Parenting
    • Pets
    • Pregnancy
    • Woodworking
    • Feng Shui
    • Gardening
    • Home Appliances
    • Home Security
    • Interior Design
    • Landscaping
    • Affiliate Programs
    • Article Marketing
    • Auctions
    • Audio
    • Banner Advertising
    • Blogging
    • Broadband
    • Domain Names
    • E-Books
    • E-Commerce
    • Email Marketing
    • Ezines and Newsletters
    • Forums
    • Internet Marketing
    • Link Popularity
    • Pay-Per-Click
    • Podcasting
    • RSS
    • Search Engine Marketing
    • Search Engine Optimization
    • Security
    • Social Media
    • Spam
    • Video
    • Viral Marketing
    • Web Design
    • Web Development
    • Web Hosting
    • Copyright
    • Cyber Law
    • Intellectual Property
    • National, State, Local
    • Patents
    • Regulatory Compliance
    • Trademarks
    • Buying
    • Selling
    • Baseball
    • Basketball
    • Boating
    • Cycling
    • Extreme Sports
    • Fishing
    • Football
    • Golf
    • Hockey
    • Hunting
    • Martial Arts
    • Running
    • Scuba Diving
    • Soccer
    • Swimming
    • Tennis
    • Dating
    • Divorce
    • Marriage
    • Weddings
    • Astrology
    • Buddhism
    • Christianity
    • Faith
    • Hinduism
    • Islam
    • Judaism
    • Meditation
    • Metaphysical
    • New Age
    • Cable and Satellite TV
    • Cell Phones
    • Communication
    • Gadgets and Gizmos
    • GPS
    • Satellite Radio
    • Video Conferencing
    • VoIP
    • Addictions
    • Coaching
    • Goal Setting
    • Motivational
    • Stress Management
    • Time Management
    • Clothing
    • Electronics
    • Fashion
    • Gifts
    • Jewelry
    • Causes and Organizations
    • Environment
    • History
    • Holidays
    • Men's Issues
    • Nature
    • Philosophy
    • Politics
    • Women's Issues
    • World Affairs
    • Air Travel
    • Camping
    • Cruises
    • Destinations
    • Outdoors
    • Article Writing
    • Book Reviews
    • Copywriting
    • Fiction
    • Non-Fiction
    • Poetry
    • Quotes
    • Screenplay
    • Tools and Resources