There are three forms of hacker. There is White Hat Hacker, a Black Hat Hacker and a grey hat hacker.
A white hat hacker will often be someone who is working for a company to find exploits and security issues with the companies system. Any security issues will be passed on by the hacker to the person responsible for managing the system. A white hat hacker can also be someone who is hacking just for fun and a challenge without causing any damage or doing any malicious acts. They may even contact the person they have hacked to tell them about these security issues they have found.
A black hat hacker is almost definatly a person who is hacking with further intent of criminal acts. They will deface websites, steal data and perform many other malicious activities involving the data and information they have received via hacking.
A grey hat hacker is generally someone who performs a bit of both. They ofter do not perform extremely bad acts and may just deface a website rather than steal data and information such as credit card details, etc.
The motive behind hacking can often be more mischievous than sinister. For example: Someone may hack just to prove that they can.
A white hat hacker will often be someone who is working for a company to find exploits and security issues with the companies system. Any security issues will be passed on by the hacker to the person responsible for managing the system. A white hat hacker can also be someone who is hacking just for fun and a challenge without causing any damage or doing any malicious acts. They may even contact the person they have hacked to tell them about these security issues they have found.
A black hat hacker is almost definatly a person who is hacking with further intent of criminal acts. They will deface websites, steal data and perform many other malicious activities involving the data and information they have received via hacking.
A grey hat hacker is generally someone who performs a bit of both. They ofter do not perform extremely bad acts and may just deface a website rather than steal data and information such as credit card details, etc.
The motive behind hacking can often be more mischievous than sinister. For example: Someone may hack just to prove that they can.
Example invovling white hat hacker
Someone: "This is the most secure system we have to date, hard for any hacker to hack."
Hacker: "I'm sure i can find something wrong with it."
Someone: "Theres no chance."
Hacker: "Okay, i'll proove it."
Hacker: *Goes of and hacks the system*
Hacker: "Told you it is probably possible."
Someone: "What security issue did you manage to find?"
Hacker: "Well this is what i found..."
Someone: "This is the most secure system we have to date, hard for any hacker to hack."
Hacker: "I'm sure i can find something wrong with it."
Someone: "Theres no chance."
Hacker: "Okay, i'll proove it."
Hacker: *Goes of and hacks the system*
Hacker: "Told you it is probably possible."
Someone: "What security issue did you manage to find?"
Hacker: "Well this is what i found..."
by a n o n y m o u s July 18, 2008
Get the hacker mug.This is where a normal end user , who thinks that they are invulnerable to viruses and hacker attacks, does a scan on their machine to reveal that they actually have been infected with viruses that number more than the number of files on their machine.
This is typically an end user of the 1d10t level, who thinks that the monitor is often called a TV.
medical transcriptions fall into this category very clearly.
This is typically an end user of the 1d10t level, who thinks that the monitor is often called a TV.
medical transcriptions fall into this category very clearly.
by Bill W March 23, 2004
Get the hacker syphillis mug.Related Words
hack3r
• PRO HACK3R
• Black List Hack3rs
• hacker
• HackerMan
• h4ck3r
• hacker news
• Hacker Spaces
• HACKERBOT
• Hackering
A computer hacker from the ghetto, projects also known as the hood's computer genius. This guy is usually very thuggish looking and not what you would expect in a computer hacker. Hood C. Hacker is not the average nerd you want to start pushing around , but a mixture of rapper Dmx meets Bill Gates in one person.
by Jimmini Spittit September 25, 2011
Get the Hood C.Hacker mug.by Villaboricua October 28, 2003
Get the h4ck3r mug.by raid5 February 8, 2010
Get the hackbreak mug.A hacker, web terrorist, malware writer, a person writing malicious software with intentions to cause great harm to computer systems.
by JustaGeek June 15, 2011
Get the hackerist mug.by norsec0de August 30, 2015
Get the hackurate mug.