We are Anonymous

1 41
Avatar for Ezy10
Written by
3 years ago

Faceless People Online

Do you know who are the faceless people online? Maybe some of you will say that all trolls account is the faceless people in social media and in other websites. Today we will talk about those faceless people online, they are called hackers. Trolls is much better than hackers, trolls uses fake identities to make troubles in different social media sites unlike hackers this people are hard to track. They are unidentified people who lurk online with different motives. Do you know who hackers are? What kind of people are they? What do they do? What are the different types of hackers? Do you think that hackers are criminals or notorious people that makes trouble in different sites? Now let's find out the different types of hackers.

This article will help you to be more vigilant and will help you to know what kind of protection you must do to avoid this faceless people online. There are so much danger today in online world, be more vigilant and know the people you must avoid. Commonly we know this people who wear a ski mask and glued on his laptop/desktop 24/7 waiting to get your personal information or to exploit in a particular system that they want to hacked. Majority of the people think that hackers are criminals that cause trouble online, but did you know that there is more about this story. In everything, opposite force is always present, if there is a bad hackers there is also good hackers. Hackers differs base on their angenda;

👉Methodologies

👉Skill practice

Here are the types of Hackers;

1. White Hat Hackers

White hat hackers are also known as good guys in online world, that's why they are also called as "Ethical Hackers." They are cybersecurity expert who help the government and other organizations, they do penetration system and identify different loopholes in their securities. These hackers will penetrate your system with a good intentions, they are present in online world to provide immediate rescue if black hat hackers interfere. White hat hackers may penetrate your system but they will just check it if their is some issues that need to be fixed. They track the vulnerability of the system, they even removed viruses and malware in your system.

2. Black Hat Hackers

These are the hackers that you should be worried, there intention is the total opposite of those white hackers. These hackers find loopholes and vulnerabilities in your Pcs, organization and bank systems. If they find loopholes in your system they can hacked your network and steal your personal information, business information and even your financial information.

3. Gray Hat Hackers

Gray hat hackers are identified as two faced hackers, they can be considered as white hackers or black hackers. Let me explain it for you, a hackers becomes a black hat hackers when he used his skills for personal gain to ruin something or to steal something, in comparison white hat hackers ang legal hackers authorized by the government to provide security online. Gray hat hackers becomes a black hat hackers when they used theirs skills based on their personal gain but if they used their skills on good event we cannot fully considered them as white hackers because they have no legal authority to operate or to hacked a particular system.

Now lets find out more about hackers.

4. Script Kiddies Hackers

These hackers are considered as amateur hackers because they do not pay much more attentions in coding which is mostly used by white hat and black hat hackers. Script Kiddies used tools which is developed by other hackers. One of the main goal of this hackers is to impress someone especially his friends and families. Script Kiddies are amateur hackers that may launched an attacked in your system without weighing the total damaged it can caused. Most common attacks of script kiddies hackers are DoS and DDoS attacked.

5. Green Hat Hackers

These hackers is also an amateur in online hacking but in comparison to script kiddies hackers, green hat hackers is much more engrossed in hacking. They have the goal in their mind to learn the hacking trade in online world. They have the goal to be an expert in hacking. Green hat hackers are curious hackers that are eager to learn in his fellow hackers they asked several questions and they do not stop until they learned it.

6. Blue Hat Hackers

These are also a novice hackers in online world, they used their skills just to take revenge on the people who makes them angry. These hackers has no desire to learn hacking they just want to take revenge on the people who hurt them. Blue hat hackers use simple cyber attacks just like flooding your IP with overloaded packets that results in DLS attack.

7. Red Hat Hackers

The agenda of red hat hackers are similar to those white hackers. They also fight those black hackers but compare to white hat hackers red hat hackers are much more aggressive in dealing a black hat hackers. They launched an aggressive cyber attacked on the system of black hat hackers where the system is totally ruined to the point that black hat hackers need to replaced it.

8. Nation Sponsored Hackers

These hackers are legally hired by a certain government with the aimed of penetrating the system of a certain agency, companies or rival nations. They are paid hackers by the government to steal confidential information in companies and in other nations.

9. Hacktivist

These hackers has one main goal, their goal is to share their personal opinions on a certain situations. Hackers like this may appear in government, organization and religious group they hacked the system to show there discontent and opposition on a particular case.

10. Whistleblower

These hackers are employees in a certain companies which is hired to gather secrets on the rival companies to stay on top. Hackers like this are one of the key factors why certain companies stays on top.

What are the common hacking techniques?

Hackers are everywhere you just need to put in your mind that when you go online you are prone from several dangers. So what are the common techniques used by most hackers?

👉Phishing- this technique is one of the most common bait of hackers. Hackers will send a message or email that will appear as a legal message or a message that comes from a trusted networks or companies then the receiver will open the message disclosing his/her personal information without the knowledge that he is already been hacked.

👉Viruses and malware-in this techniques hackers send several codes including worms and trojan horses in the websites files with the aim of stealing cookies that will help them to track the online activity of the user.

👉DoS and DDos- one of the most common problem of some sites, these techniques make it hard for the users to access their computer systems, networks, and services. In short, a criminal hacker uses this technique to crash web servers, systems or networks by disrupting the normal flow of traffic.

Is there a chance to avoid this people?

Anyone who works or connected online is prone to hackers. All we need to do is to be mindful and always analyze the situation first before you click any buttons in your computer. Hackers can find you in different ways, they may tried to deliver spammed emails and instant messages to lure you to deliver dangerous virus and malware that can compromise your computer security. If they successfully enter your system they can steal your personal information, financial information and they can also read confidential conversation inside your computer.

What are the things that a hacker can do to you?

Hackers with malicious intent is a dangerous one. In can pose several dangers to your personal accounts. In some most cases hackers can:

👉Steal your personal accounts

👉Manage your savings

👉They can also make purchases in online market using your name.

👉They can also sell your personal information

👉If worse they can change your passwords

What is the best way to protect myself online?

👉Always check your computer

👉Limit any personal information that you post online

👉Do not enter on questionable websites that can pose danger

👉Check the people who sent messages to you

👉Do not open spam emails because it may have viruses or malware

👉Use Antivirus software

👉Only download software from the site you trust

Kevin Mitnick is the top notorious hackers of all time. He hacks several computer systems that has a high security.

👉In 1981, he was charged with stealing computer manuals from Pacific Bell.

👉In 1982, he hacked the North American Defense Command (NORAD)

👉In 1989, he hacked Digital Equipment Corporation's (DEC) network and made copies of their software.

Guarding yourself and being cautious every time is the best thing that you can do online. Do not trust easily. Hackers are one of the most cunning beings online;

“ Yesterday, I changed my wifi name to “HACK ME IF YOU CAN” when I checked it today it was “CHALLENGE ACCEPTED”

I was hacked😁 Be cautious ✅

Note: To do this article I made some research about this. I hope that you learned something I just explained some points base on my understanding about hackers.

4
$ 0.01
$ 0.01 from @Hiyamoni
Avatar for Ezy10
Written by
3 years ago

Comments

Yeah.You are absolutely right. Hackers are such a faceless people. Some are good, work for their own country development and protest against bad hackers.But maximum are bad person.

$ 0.00
3 years ago