Base64 Algorithm

Image
  Introduction              -----> Base64 encoding is used to c onvert binary data into a text-like format that allows it to be transported in environments that can handle only text safely.               -----> Base64 is sometimes also refered to as PEM , which stands for Privacy-enhanced Electronic Mail . There, Base64 was used to create printable text again after binary e-mail data that was generated during the e-mail encryption process.   How it works               Base64 encoding takes the original binary data and operates on it by dividing it into tokens of three bytes . A byte consists of eight bits, so Base64 takes 24bits in total. These 3 bytes are then converted into four printable characters from the ASCII standard.  The first step is to take the three bytes (24bit) of binary data and split it into f our numbers of six bits . Because the ASCII standard defines the use of seven bits, Base64 only uses 6 bits (corresponding to 2^6 = 64 characters) to ensur

Types Of Hackers

Types of Hackers
    In this article we are going to see the types of hackers present 
 
 
 
This will help you understand what kind of protection you require for your system and who are the faceless criminals targeting your personal or business information. Before you become proactive for your safety, it is essential to understand what you are facing or fighting.
So now, let’s begin
  1.   White Hat Hackers
  2.   Black Hat Hackers
  3.   Gray Hat Hackers
  4.   Script Kiddies
  5.   Red Hat Hackers
  6.   Blue Hat Hackers l

  1. White Hat Hackers

   
White hat hackers, also known add ethical  hackers are the cybersecurity experts who help the Govt and organizations by performing penetration testing and identifying loopholes in their cybersecurity. They even do other methodologies and ensure protection from black hat hackers and other malicious cyber crimes.
        
   They will hack into your system with the good intention of finding vulnerabilities and help you remove virus and malware from your system.

2. Black Hat Hackers 
The negative persona around “hacking,” these guys are your culprits. A black hat hacker is the type of hacker you should be worried.
 
Using any loopholes they may find, they can hack into your network and get access to your personal, business and financial information.
 
3. Grey Hat Hackers

Grey hat hackers fall somewhere in between white hat and black hat hackers. While they may not use their skills for personal gain, they can, however, have both good and bad intentions.
        
  A gray hat hacker doesn’t use his skills for personal gain, he is not a black hat hacker. Also, because he is not legally authorized to hack the organization’s cybersecurity, he can’t be considered a white hat either.

4. Script kiddies
 A derogatory term often used by amateur hackers who don’t care much about the coding skills. These hackers usually download tools or use available hacking codes written by other developers and hackers. Their primary purpose is often to impress their friends or gain attention.

By using off-the-shelf codes and tools, these hackers may launch some attacks without bothering for the quality of the attack. Most common cyber attacks by script kiddies might include DoS and DDoS attacks.

5. Red Hat Hackers 
       Red Hat Hackers have an agenda similar to white hat hackers which in simple words is halting the acts of Blackhat hackers. However, there is a major difference in the way they operate. They are ruthless when it comes to dealing with black hat hackers.
       Red hat hacker will launch a series of aggressive cyber attacks and malware on the hacker that the hacker may as well have to replace the whole system.
 
6. Blue Hat Hackers 

        These are another form of novice hackers much like script kiddies whose main agenda is to take revenge on anyone who makes them angry. They have no desire for learning and may use simple cyber attacks like flooding your IP with overloaded packets which will result in DoS attacks.

These are a few types of hacker 
Hey guys thanks for reading this article and don't forget to subscribe (its free) and the  subscribe button is at the top

The next artical is about operating system use by most of the hackers.


Comments

Popular posts from this blog

Base64 Algorithm

Linux termux 2.0

Operating System used by Hackers

Social