How to Prevent Hacking

Introduction :

Technology makes a lot of things in life easier – but it also opens the door to hackers. You don’t have to be a multi-millionaire or a major corporation to be vulnerable to hacking. Hackers exploit vulnerabilities at a relatively low cost, so  hackingeven a small payoff is worth the comparatively minimal effort. To prevent hacking, you must secure your devices and your information, as well as take caution when using the internet. In this article we are going to read about hacking and  types of hackers  and  different ways to prevent hacking.

What is Hacking?

In the 1990s, the term “hacker” originally came for a skilled programmer proficient in machine code and computer OS. These individuals could always hack on an unsatisfactory system to solve problems and engage in a little software company espionage by interpreting a competitor’s code.


Hacking is finding defect in computer systems or networks to exploit its weaknesses to get access. Example of Hacking: Using password cracking algorithm to get access to a system.

Now a days computers have become mandatory to run a successful businesses. It is not enough to have isolated computers systems ,they need to be networked to facilitate communication with external businesses. This exposes them to the outside world and hacking. Hacking means using computers to commit fraudulent acts such as fraud, privacy invasion, stealing corporate/personal data, etc. Cyber crimes cost many organizations millions of dollars every year. Businesses need to protect themselves against such attacks.

Types of Hackers

Hackers are classified according to the intent of their actions. The following list classifies hackers according to their intent.




White Hat: A White Hat hacker also called (Ehtical hacker )is a computer network security professional and has non-malicious intent whenever he breaks into security systems. A White Hat hacker has deep knowledge in Computer Networking, Network Protocols and System Administration (at least three or four Operating Systems and very good skills in Scripting and Programming). White Hat hacker has also good knowledge in hacking tools and know how to program hacking tools


Black Hat: A Black Hat hacker, also known as a cracker is a computer professional with deep knowledge in Computer Networking, Network Protocols and System Administration (at least three or four Operating Systems and very good skills in Scripting and Programming). Black Hat hacker has also good knowledge in many hacking tools and know how to program hacking tools. A Black Hat hacker uses his skills for unethical reasons. A Black Hat hacker always has malicious intention for intruding a network. Example: To steal research data from a company, To steal money from credit cards, Hack Email Accounts etc.

software Company

Grey Hat: A Grey Hat hacker is someone who is between White Hat hacker and Black Hat hacker  grey Hat normally do the hacking without the permissions from the administrators of the network he/she is hacking. But he will expose the network vulnerabilities to the network admins and offer a fix for the vulnerability for money.

scriptkiddleScript Kiddie: A Script Kiddie is basically a hacker amateur who doesn’t has much knowledge to program tools to breaks into computer networks. He often use downloaded hacking tools from internet written by other hackers/security experts.
hackerHacktivist: A Hacktivist is a hacker with political intentions. The hacktivist has the same skills as that of a hacker and uses the same tools as the hacker. The primary intention of an hacktivist is to bring public attention to a political matter.
Phreaker: A hacker who identifies and exploits weaknesses in telephones instead of computers.
bluehathackerBlue Hat hacker:If a Script Kiddie took revenge, he/she might become a Blue Hat. Blue Hat hackers will seek vengeance on those who’ve them angry. Most Blue Hats are good, but like the Script Kiddies, they have no desire to learn.

An increase in cyber-attacks and identity theft make the Internet seem like a scary place these days.The hacking of Sony Pictures led the news for some time. The U.S. State Department public email system was shut down. Even the White House was a target of cyber-attack.It raises a question:

How can individuals protect or make it more difficult for hackers to access their information?

Here are some tips or ways to protect your data from hackers….


Passwords and Password Managers: A strong password is first step to protect/ secure your data from hackers . But the combination of characters and numbers is not enough for secure your data. To reduce the chances of having your password guessed or brute forced, you can used password managers. They are not only suggest you strong password but they will warn you when you use same password on multiple sites. When you use the same password everywhere, when one site or service is compromised, suddenly the hackers have access to your entire digital life.

Two-Factor Authentication: Two-factor authentication acts as stop-gap when a new device tries to log into a service or site. For example, with Gmail’s two-factor authentication feature enabled, when you try to log into your account with a new device, it sends you a text message with a temporary password. In other words, you can’t log into an account without your phone and the temporary password sent to that phone.

Don’t Link Accounts: In a world where Facebook Login is common place and some apps and services only work if you use your Facebook Login credentials, it’s difficult to keep accounts separated. Facebook does offer two-factor authentication so there’s at least a stop-gap for the entry into all those linked accounts. But if it’s possible, use a separate account for everything each with its own unique login and password information. It’s also a good idea to see which apps you have linked to your Facebook and Twitter accounts and remove ones that you no longer use.

Install Firewall or turn On : If you’re running Windows or Mac, make sure firewall is turned on. A firewall prevents hackers from gaining access to your computer by limiting the number of ports that are open to the public. Also, when buying a wireless router, make sure it has a built in firewall. Having a software and hardware firewall is better than just having one or the other.

Delete unknown Mails:  If you receive emails from random people, do not bother to open the email, just delete it. If you have any doubts after reading the name and the subject, it’s probably not someone you know. Never download or open attachments unless you are sure it’s from someone you know. Also, be aware of any emails from sites pretending to be banks, auction sites, etc. asking for you to verify bank account info or address info. No bank ever does that.

Scan all of the files on your computer regularly: If you’re not in the mood to scan every day, at least run a scan once a week. Actually, setup a schedule for your computer in your anti-virus software to run a scan late at night or whenever you don’t use your computer and that way you won’t be bothered with a slow computer.

Security Questions: At some point these made sense. Probably before social networks had us sharing all our personal information with friends, family and then eventually the world. Now security questions like “What’s your mom’s maiden name?” and “What’s the name of your favorite movie?” Make sure it’s something memorable that has nothing to do with the actual question.

If you follow all the steps above, you can rest assured that you will be able to avoid 99% of the Internet threats that are out there. It’s really a matter of being disciplined and careful rather than being completely carefree when using your computer.





©[2017] Copyright Reserved FM Software

Log in with your credentials

Forgot your details?