Menu
![]() Instead, they’ll report to the client and help them devise a fix for their security vulnerability. If they manage to break in, they’ll steal or damage nothing. For example, a company wanting to test their network security may hire a white hat hacker to do a “penetration test”. These hackers never break the law and everything they do is with the consent of their targets. White Hat hackers are also referred to as “ethical” hackers. There are three kinds of hackers: white hat, grey hat and black hat. It used to be that legal hackers insisted that criminal hackers be referred to as “crackers”, but the term never really stuck in the mainstream. ![]() ![]() Let’s start off by clearing up a few misconceptions.
0 Comments
Leave a Reply. |