Skip to main content

Hacking...Is hacking always bad?

Initially, Hacking was used to describe an activity done as a hobby, usually in a sophisticated manner. It basically had no relations with doing anything with computers (Harvey, n.d.), and only after the discovery of computers, the term “Computer Hacking” came into use. In actual sense, computer hacking meant doing anything using the computer as a pastime, which included making computers do almost anything that they are normally not made for.

However, at present, people generally refer to computer hacking as a criminal offence that consists of activities like breaking into computer systems, stealing people’s or organizations’ data, and doing some sort of damage, using computers or computer-like devices. Quite easily, the list can go on. Historically, many illegal activities done using computers have been recorded as the acts of hacking. Hacking has mostly been perceived as doing illicit things with computers though the hackers (and their communities) have disagreed with all of it and labeled such people with unethical intents as “crackers” and/or “phreaks” (BBC News, 2000).

Hacking can acceptable in many cases, for instance, if a group of hackers are trying test security loopholes in order to avoid cyber attacks to important websites then it is a “good” activity on all grounds. In fact, such a community exists and they are known as “White Hat Hackers” (Techopedia, n.d.), and they work to counter the problems created by “Black Hat Hackers”. Similarly, if some hackers are helping the email companies to identify “spam” mails then it is also a morally acceptable act.

Looking at various examples and opinions of hacker communities, it can be clearly seen that hacking is not always unethical. The reason for claiming this is that their intent might not be malicious all the time. There are many hackers that breach laws for their personal benefit or satisfaction, but there are others too, who work to save people from such wrongdoers. Hence, hacking is not always bad.

References:
Harvey, B. (n.d.), What is a Hacker?, Retrieved fromhttp://www.cs.berkeley.edu/~bh/hacker.html
BBC News (October 27, 2000), Hacking: A history, Retrieved fromhttp://news.bbc.co.uk/2/hi/science/nature/994700.stm

Techopedia (n.d.), White Hat Hacker, Retrieved fromhttp://www.techopedia.com/definition/10349/white-hat-hacker

Comments

Popular posts from this blog

SQL Dorks

-------------------------------------------------------------------------------- Admin 22-05-2014, 08:20 PM cat.asp?-cat= productlist.asp?catalogid= Category.asp?category_id= Category.cfm?category_id= category.asp?cid= category.cfm?cid= category.asp?cat= category.cfm?cat= category.asp?id= index.cfm?pageid= category.asp?catid= Category.asp?c= Category.cfm?c= productlist.cfm?catalogid= productlist.asp?catalogid= viewitem.asp?catalogid= viewitem.cfm?catalogid= catalog.cfm?catalogId= catalog.asp?catalogId= department.cfm?dept= department.asp?dept= itemdetails.cfm?catalogId= itemdetails.asp?catalogId= product_detail.asp?catalogid= product_detail.cfm?catalogid= product_list.asp?catalogid= product_list.cfm?catalogid= ShowProduct.cfm?CatID= ShowProduct.asp?CatID= search_results.cfm?txtsearchParamCat= search_results.asp?txtsearchParamCat= itemdetails.cfm?catalogId= itemdetails.asp?catalogId= store-page.cfm?go= store-page.asp?go= Detail.cfm?CatalogID= Detail.asp?CatalogID= browse.cfm?category_i...

10 BEST LINUX DISTRIBUTION FOR HACKING &PEN TESTING 2020

🔴Use wisely🔴 ⭕️Info:     These Linux distributions offer lots of useful tools for penetration testing, wireless security, forensic, etc.  ✍1. BackTrack 5r3 ✅useful : wireless cracking, exploiting, web application assessment, learning. ✍2. BackBox Linux  ✅Useful: penetration tests and security assessments. It provides all suspects for Forensic Analysis, Documentation & Reporting, Reverse Engineering with John, Nmap, Social Engineering Tool, etc. ✍3. Blackbuntu ✅Useful:   Tools for Information Gathering, Network Mapping, Vulnerability Identification, Penetration, Maintaining Access, radio Network Analysis, Reverse Engineering, etc.  ✍4.Samurai Web Testing Framework ✅Useful: It offers lots of open source and free tools that would help you focus on testing and attacking websites. ✍5. Knoppix STD ✅useful:  live CD and can be installed on a hard disk. The STD stands for Security Tools Distribution. Knoppix provides you a full scenario for cry...

🔰How To Remove Shortcut Virus From Your Pc🔰

✅ Method 1.  - Clean up and remove Shortcut Virus by CMD - 1. Click on  Start  and select  Run; 2. Type: CMD  and Hit Enter to open  Command Prompt; 3. Type the  drive letter  of your hard drive partition in PC or USB flash drive and hit Enter; (G for example.) 4. Type:  attrib g:*.* /d /s -h -r -s  and hit Enter. You’ll be able to see your files and data on Windows PC or USB flash drive now. ✅Method 2.  -Cleanup Shortcut Virus with Shortcut Virus Remover or Anti-virus Software- *If you need a double guarantee, you can download and install anti-virus software to clean up all shortcut virus from Windows 10/8/7 computer and USB etc external storage devices. Here below you’ll see a list of anti-virus software and tools and you can selectively choose one to try* ➡️Trojan Removal Tool; ➡️Shortcut virus fixfolder; ➡️Malwarebytes Anti-Malware, etc. ✅Method 3.  - Delete/Wipe Shortcut Virus from Registry - 1. Press Win+R and type: reged...