Who Are Computer Hackers? Dilli Sharma

Share It On:

A hacker is a person who uses a computer system to gain unauthorized access to a system’s data and to make the system unavailable or system down for a specific purpose such as stealing money, gaining fame by bringing down a system, taking the system under their control, making unavailable and destroying the system. A hacker can be classified into following types-white-hat hacker, grey-hat hacker, black-hat hacker, elite hacker, blue-hat hacker, script kiddies, and hack activist.

A white hat hacker breaks the security of a system for the non-malicious purpose, either to test its own system’s security capabilities with performing penetration tests or analyzing vulnerabilities of the system using the special software tools. A black hat hacker is an individual hacker who violates security policies or bypasses the network security for malicious purpose.

A grey hat hacker lies between a black hat and a white hat hacker, and the grey hat hacker hacks a system for the sole purpose of identifying and notifying the security defect to a system administrator. Similarly, a blue hat hacker is an individual who is used to test bugs of a system before its launch, looking for exploits so that the bugs can be closed.  An elite hacker is a highly skilled kind of pirate who can develop and use the intelligent software tools for the hacking, but a script kiddie is an amateur hacker who breaks the system by using automated tools developed by others. A hack activist is a hacker who extensively utilizes technology to publicize a social, ideological, religious or political message.

A brief Short Introduction of Author:

Computer Programmer, Software Developer, HoD of BSc CSIT Program, M.Sc. Degree in Computer Science from Pokhara University with the first position in the 2005 batch of the University. Decorated with Nepal Bidya Bhusan Padak ‘Kha’ in 2068 B.S. from the Government of Nepal. A recipient of ‘Dean’s List Award’ from the Pokhara University. Lecturer/Coordinator of Computer Science & IT at Prime College.

Author of the following Books:
1. JAVA Programming including Advanced Features
2. Data Structure and Algorithm A Practical Approach
3. Computer Programming with C


Share It On:

Recent Posts

Texas College CTF 2025: Individual Cybersecurity Challenges in Kathmandu

Texas College CTF 2025: Individual Cybersecurity Challenges in Kathmandu

Share It On:29th January 2025, Kathmandu Are you ready to test your cybersecurity skills in a real-world Capture The Flag

National AML Day 2025: Understanding Money Laundering & Laxmi Sunrise Bank’s Role

National AML Day 2025: Understanding Money Laundering & Laxmi Sunrise

Share It On:29th January 2025, Kathmandu National AML Day 2025: A Call to Stay Vigilant Against Financial Crimes: Understanding the

Social Media Regulation Bill 2081: Up to 5 Years Jail & Rs1.5M Fine for Fake News in Nepal

Social Media Regulation Bill 2081: Up to 5 Years Jail

Share It On:29th January 2025, Kathmandu The Government of Nepal has introduced the Social Media Regulation Bill 2081, which proposes

NRB Withdraws NPR 30 Billion from Banking System Through Bolkabol Bidding

NRB Withdraws NPR 30 Billion from Banking System Through Bolkabol

Share It On:28th January 2025, Kathmandu Nepal Rastra Bank (NRB) has started pulling NPR 30 billion in liquidity from the

Samsung Nepal Valentine’s Day Discounts on Galaxy S24 Ultra, Z Fold6, and Z Flip6

Samsung Nepal Valentine’s Day Discounts on Galaxy S24 Ultra, Z

Share It On:28th January 2025, Kathmandu The world witnessed the dawn of a new era of Mobile AI with the

“Future of Banking” Summit in Kathmandu: Exploring Cloud Computing, AI, and Cybersecurity

“Future of Banking” Summit in Kathmandu: Exploring Cloud Computing, AI,

Share It On:28th January 2025, Kathmandu Nepal’s financial sector came together for a transformative event at ‘The Future of Banking: