Hackers are categorized into the following classes:

* Black Hat Hackers (Crackers): These are persons who are computer specialists and use their hacking skills to carry out malicious attacks on information systems.
* Gray Hat Hackers: These are persons who sometimes do not break laws and help to defend a network, but sometimes act as Black Hat Hackers.
* White Hat Hackers (Ethical Hackers): These are persons who have excellent computer skills and use their knowledge to secure information systems.
* Security Providing Organizations:
Some organizations and communities also provide security to information systems.

Explore More

The Internet or Cyber Laws

Internet is a behemoth, cutting across physical country boundaries and accessible to anyone and everyone from any corner of the world. Precisely due to this pervading nature, Internet is not

How to Hack a Window XP Admins Password

This is a cool little computertrick for Microsoft Windows trick I’ve picked up in my travels and decided to share it with you fine and ethical individuals =). Log in

What are the user authentications supported by the SSH-2 protocol?

The SSH-2 protocol supports the following user authentications: * Public key authentication (DSA, RSA*, OpenPGP) * Host-based authentication * Password-based authentication Note: SSH-1 supports a wider range of user authentications,