Hacking

Hacking is when someone has access or control over a computer network security features illegally. This is

something that can very easily lead to the loss of anonymity, privacy, and security for the individuals whose security was hacked. Hackers are the individuals who manage to get past the password encryption.

Hacker Culture
Hacker Culture is a community of computer enthusiasts, programmers and system designers. This idea was created in 1960 at Massachusetts Institute of Technology (MIT). This started with hardware and then later in software such as video games and software cracking.

Security related Hacking
Security Hackers are the people who purposely bypass computer security systems. There are multiple types of security hackers.

White Hats
White hats work to keep computer system information safe. They accomplish this by finding holes and bugs that other hackers might be able to get into. They do not work illegally because they are paid by agencies to complete this work.

Grey Hats
Grey hats work is in between White hat and Black hat hackers. Their work is often considered illegal as they may not have consent to bypass security. Often times these are users who like to troll for fun. They just do not usually get financial gain from their hacking.

Black Hats
These hackers have malicious intentions. These types of hackers are the ones that steal personal information and exploit people for money. Their work is almost always illegal. There is a type of Black hat hacker called a cracker who is very skilled and does what a white hat hacker does but will sometimes try and sell the information and fixes back to the system owner.

Anonymity
Hackers are masters at remaining anonymous and getting into security systems or other user's computers. Hackers are a serious risk to anonymity on the web. While they are masters at remaining anonymous, it is quite easy for them to break into the average surface web user's computers and gain their information. It is programs such as Sub7 which gains access through computers through emails and links that make it easier for hackers to get into the computers.

These programs make it easy for hackers to go through computer systems and files as well as get other personal information.

Reference

 * 1) Hacker. (2018, April 5). In Wikipedia. Retrieved April 5, 2018, from https://en.wikipedia.org/wiki/Hacker
 * 2) Seven Scary Things Hackers Can Do to your Computer. (2000). In whatismyipaddress.com. Retrieved from https://whatismyipaddress.com/hacking-targets
 * 3) Viinamäki, S. (Artist). (2016). Hacking Password Illustration. [Image of painting]. Creative Commons Wikimedia. Retrieved from https://commons.wikimedia.org/wiki/File:Hacking_password_illustration.jpg