What Is a Hacker?
The common idea of a hacker, is a person who does crime using a computer. When you hear that someone is a hacker, you feel insecure and vulnerable around that person because you know that person can do almost anything. According to common belief, a hacker is someone who cracks through a system for fun because they can. So bottom-line, the concept of a hacker is not very positive or light. This is very much understandable looking at the news about hackers and their activities right? But the very idea of a hacker and its activities do not sound as dangerous and criminalistic as it is infamous for.
Originally in the 1960’s a hacker is that person in class who doesn’t attend class and sleep all day to pursue a hobby all night. This hobby may be science fiction, telephones, railroads, or radios. The concept of a computer hacker came later on when the computers were introduced and people studied and tinkered with a computer as a hobby. So we can say that a hacker is someone who knows how a computer work and how he can tell/make it to do things beyond its intended use. Because of these hackers going beyond with the computers, the internet, the UNIX OS, and the World Wide Web was created.
What goes through a hacker’s mind? Why do they do this? What good will they get out of it? The common denominators are curiosity and ego. They can bypass a tight system, because they can. They can hack through your Wi-Fi for your password, because they can. They can look through your emails, because they can. They can do a lot more things relating to a computer, because they can. And seldom, that it is because of the money. Most of the time they will tinker on the computer out of curiosity and then try out what they learned on actual systems.
The Different Hackers
There are different kinds of hackers, we’ll be discussing the common ones namely the white and black hats, the occasional grey hat, crackers, and the script kiddies.
The infamous and known hacker of the set is the black hats. The black hats are the ones usually the media focuses and sees. This is what the world sees. These are the hackers that gives the usual wrong and dangerous impression of a hacker. Their intentions are purely malicious. At times, companies seek black hats to steal information from their competitors. This, of course, have a really big pay-out. Sometimes they are called crackers because they try to break in systems and crack passwords.
The hacker that focuses on the defense against security threats are the white hats. These are the moral programmers or the “ethical hackers”. These are the people who hack for good, defensive, and legal purposes rather than criminal purposes. They will try to do penetration test, under which the consent of the target, and help design a framework to fix the flaws and possible risks that would endanger the assets of the target. They can’t touch things that they are not permitted to touch, they are restricted on what they can work on. They go through the same steps and mindset a black hat would use so they can properly arrange the defenses to prevent such threats.
The other kind of hackers are the grey hats. These are the hackers that use the unethical practices against unethical things. They will use illegal means to get the fight off threats. They are sometimes called “hacktivists”. Known hacktivists are the Anonymous hacktivists. These are the hackers that would defend against black hats without appropriate permissions from the target, unlike the white hats. Even if the grey hats did not use their access for bad intentions, they still used a secure system without permission, which is still considered illegal.
These are the most dangerous hackers, the script kiddies. They are dangerous because they are the amateurs that don’t have half the idea they are doing. They don’t go through the careful steps the usual hackers use in penetrating the system. They use automated scripts to penetrate a system without the knowledge of the IT and information security. They are dangerous because script kiddies might do irreversible damages without them having an idea on what they are dealing with.
We have discussed the true meaning of the term hackers and its origins. We have discussed what drives a hacker in doing these acts and what the common reason behind it is. We also have discussed the different hackers, what they do, their practices and impact. We hope that you, reader, will have a more broad idea of what hackers are and how they think.
 What is a Hacker? https://www.cs.berkeley.edu/~bh/hacker.html
 Hacker’s Manifesto
 How to become a Hacker https://www.catb.org/esr/faqs/hacker-howto.html