Author

Topic: What you should know about Hackers (Read 202 times)

copper member
Activity: 28
Merit: 0
September 09, 2020, 04:22:34 AM
#11
Hacker are the experts who really hack the bank accounts, mobile data, account details, and social media account data. Usually it is a illlegal act
newbie
Activity: 66
Merit: 0
July 08, 2020, 07:17:18 AM
#10
Well, not all hackers are "bad". There are QA engineers in enterprises, whose work is to try to bring down the system for developers to fix all the bugs.
On the other hand, there're people, who want some kind of information or the money for it. Or they just need to smash a program.
member
Activity: 490
Merit: 31
There is gold in volatility..
June 24, 2020, 09:57:12 AM
#9
4. Invest in cybersecurity. It's one of the most expensive asset of a company.

And the best way to do so i to hire hackers to protect you from hacking.
They know where can be a leak in order to get advantage of it so they are the best people to give you the know how on how to protect your digital assets from getting attacked.

You see, hackers should not be seen as all evil as they are gifted people that know how well to manipulate some digital security network. so, we just need to use this people to do the right thing.
some companies employ hackers to do the job of securing their digital assets against hackers. I believe these guys can be found in the leading tech businesses.
full member
Activity: 1904
Merit: 138
★Bitvest.io★ Play Plinko or Invest!
June 23, 2020, 05:16:08 PM
#8
These people are gifted of skills that only few has,thats why they become the expert in this field so lets accept the fact that if they will target us the opportunity of becoming a victim is always high.
The number of hackers in crypto has increased a lot If we don't give them our personal information they will never be able to hack our ID The first thing to know about hackers is to make sure that a website is safe before working on it. Try to stay away from the site that will ask for personal information Sites that want personal information hack more.
there are many types of hackers,even if you don't give them your personal information yet they can take your account using phishing sites or links.

Phishing sites are used by these hackers because they know at some point, there is one greedy user that will avail their services and will enter his details without knowing that it's a trap. They banked on individuals that don't do any kind of research and we all know that there are a lot of them that are being deceived by high rewards.
member
Activity: 980
Merit: 62
June 23, 2020, 12:38:31 PM
#7
4. Invest in cybersecurity. It's one of the most expensive asset of a company.

And the best way to do so i to hire hackers to protect you from hacking.
They know where can be a leak in order to get advantage of it so they are the best people to give you the know how on how to protect your digital assets from getting attacked.
member
Activity: 490
Merit: 31
There is gold in volatility..
June 23, 2020, 10:14:17 AM
#6

Can you define forking a bit more? I'm not sure if this refers to repository forking or something else.

I will define forking in the most simplest way. The taking copying of a network or software to form a similar network or software by a set of person is called forking. This had happened to many cryptocurrencies platforms such as Bitcoin-we have bitcoin cash as a forked bitcoin.

How do we categorize the set of persons that involve in this activity?



1. Unless they tell you personally or you've caught them, no one shall know on which side they are.

2. AFAIK, the security of blockchain network is tight and that is the reason why most of us are boasting this technology.

3. Forking of what? software fork? hardware fork just like what we have in cryptos?

4. Invest in cybersecurity. It's one of the most expensive asset of a company.

that is quite an impressive response. Here is where i want to know what your opinion is; DEC are some of the exchange that run on the blockchain software system, there are cases where they have had a hackin attack. Are they not part of the blockchain network? why are their security not tight like we have in bitcoin?



The number of hackers in crypto has increased a lot If we don't give them our personal information they will never be able to hack our ID The first thing to know about hackers is to make sure that a website is safe before working on it. Try to stay away from the site that will ask for personal information Sites that want personal information hack more.

i believe the basic of security of a website is a secured SSL certificate. I have discovered that some websites are not secured as such the padlock remain open and useful assets in the websites can be stolen by hackers.

[moderator's note: consecutive posts merged]
sr. member
Activity: 2618
Merit: 439
June 23, 2020, 06:59:15 AM
#5
These people are gifted of skills that only few has,thats why they become the expert in this field so lets accept the fact that if they will target us the opportunity of becoming a victim is always high.
The number of hackers in crypto has increased a lot If we don't give them our personal information they will never be able to hack our ID The first thing to know about hackers is to make sure that a website is safe before working on it. Try to stay away from the site that will ask for personal information Sites that want personal information hack more.
there are many types of hackers,even if you don't give them your personal information yet they can take your account using phishing sites or links.
sr. member
Activity: 1036
Merit: 258
★Bitvest.io★ Play Plinko or Invest!
June 23, 2020, 04:47:15 AM
#4
The number of hackers in crypto has increased a lot If we don't give them our personal information they will never be able to hack our ID The first thing to know about hackers is to make sure that a website is safe before working on it. Try to stay away from the site that will ask for personal information Sites that want personal information hack more.
hero member
Activity: 2982
Merit: 678
★Bitvest.io★ Play Plinko or Invest!
June 23, 2020, 12:38:28 AM
#3
1. Unless they tell you personally or you've caught them, no one shall know on which side they are.

2. AFAIK, the security of blockchain network is tight and that is the reason why most of us are boasting this technology.

3. Forking of what? software fork? hardware fork just like what we have in cryptos?

4. Invest in cybersecurity. It's one of the most expensive asset of a company.
copper member
Activity: 2856
Merit: 3071
https://bit.ly/387FXHi lightning theory
June 22, 2020, 10:44:35 AM
#2
I'd lump gray hat and black hat in the same black hat category.

White hat and red hat ha e approval of the software owner and blue hat have assumed permission.

The best way to protect yourself from hacking is by doing research on the vulnerabilities you might face or by hiring a consultant to take you through them. You can't expect people here to know everything as most people will cover the major parts and then parts specific to their applications only..

Can you define forking a bit more? I'm not sure if this refers to repository forking or something else.
member
Activity: 490
Merit: 31
There is gold in volatility..
June 22, 2020, 10:04:46 AM
#1
Many are enemies of progress in the game of software and programming. In the same game many fight the evil doers not to destroy or steal some useful assets in a software system.

That's what the concept of hacking means. A skilled computer programmer, who uses his skill to gain an unauthorized access to a network or software in order to steal some useful data is called a black hat hacker.

We have others who have the authorization of the owner of the software, he access the network or software to protect it against the black hat hackers.
They are the good guys in hacking.

In between is what's called gray hackers, they hack a system , program or network in order to sell the data they obtained.

I want this thread to follow this pattern of discussion.

1. How do we know if a hackers is black, grey or white hat?

2. Can blockchain be hacked, which is quite different from normal software?

3. Where do forking belong in the above hacking categorisation?

4. Let's assume I've digital platforms such as an application and a website, how do I personally protect it against hacking?
Jump to: