
Know about Ethical Hacking and It’s Aspects : What is Ethical Hacking?
Know about Ethical Hacking and It’s Aspects : Hacking is usually legal as long as it is being done to find weaknesses in a computer or network system for testing purpose. Ethical hacking act to locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers. Ethical hacking is also known as penetration testing.

History of Hacking
The first hacker was appeared in 1960’s at the Massachusetts Institute Of Technology(MIT).
In the 1980’s, phreaks started to migrate to computers, and the first Bulletin Board System (BBS) appeared.
Recent History of Hacking : Know about Ethical Hacking and It’s Aspects
• Know about Ethical Hacking and It’s Aspects : Earlier in April this year, hackers managed to break into a number of Vevo accounts on YouTube (which hosts the official videos of music artists) and defaced them, including videos by Katy Perry, Taylor Swift, Drake, and Shakira, as well as the record-setting Despacito by Luis Fonsi. Now, they’re finally paying for their actions.
Famous Ethical Hacking : Know about Ethical Hacking and It’s Aspects
RIZWAN SHAIKH
• Razwin Shaikh. From Mumbai
• Rizwan Shaikh A founder of “Pristine InfoSolutions”
• He has conducted many workshops. Seminars on Ethical Hacking & Information Security to spread Cyber Crime awareness.
Hack : Know about Ethical Hacking and It’s Aspects
• Examine something very minutely The rapid crafting of new program or the making of changes to existing, usually complicated software
Hacker : Know about Ethical Hacking and It’s Aspects
• The person who hacks
Cracker : Know about Ethical Hacking and It’s Aspects
Advantages of Hacking
• To recover lost information. Especially in case you lost your password.
• Perform penetration testing to strengthen computer. Also network security.
• Prevent security breaches.
• To have a computer system that prevents malicious. Hackers from gaining access.

Disadvantages of Hacking
• Massive security. Also breach.
• The Hampering system operation.
• The Malicious attack on the system.
Hacker and Ethical Hacker
Ethical Hacker
• Employed by companies to perform Penetration Tests
Hacker
• Access computer system or network without authorization
Types of Hacker
White Hat Hacker
A white hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security. White hat hackers use their skills to improve security by exposing vulnerabilities before malicious hackers (known as black hat hackers) can detect and exploit them. Although the methods used are similar, if not identical, to those employed by malicious hackers, white hat hackers have permission to employ them against the organization that has hired them.
Black Hat Hacker
Like all hackers, black hat hackers usually have extensive knowledge about breaking into computer networks and bypassing security protocols. They are also responsible for writing malware, which is a method used to gain access to these systems.
Grey Hat Hacker
• Goal of grey hat hackers is to provide national security
Types of Hacking
Website Hacking
• Hacking a website means taking control from the website owner to a person who hacks the website.
E-Mail Hacking
Network Hacking
• Network Hacking is generally means gathering information about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the network.
Password Hacking
• Password Hacking Password cracking the process of recovering secret passwords from data that has stored in or transmitted by a computer system.
Online – Banking Hacking
Computer Hacking
• Computer Hacking when files on your computer viewed, created, or edited without your authorization
Conclusion
Know about Ethical Hacking and It’s Aspects : Keep your password protected. Write your password should be with combination of characters, digits, special symbols. Do not respond to feck on fishing email. when you are doing any online transection always keep watch on site whether the protocol of site is https & whether there is a lock symbol