1 00:00:00,330 --> 00:00:06,540 Now, types of hackers, now we have three types, actually, the black hat hackers, the white hat 2 00:00:06,720 --> 00:00:09,060 and the gray noted, start with the black hat. 3 00:00:09,060 --> 00:00:16,020 Hackers know the black hat hacker is individual who attempts to gain entry into a system or network 4 00:00:16,020 --> 00:00:17,880 to exploit them for many reasons. 5 00:00:18,480 --> 00:00:25,020 The black hat hacker doesn't have any permission or authority to compromise their target, and they 6 00:00:25,020 --> 00:00:30,840 try to inflict damage by compromising security systems and setting functions of websites and networks 7 00:00:31,020 --> 00:00:32,540 or shutting down systems. 8 00:00:32,570 --> 00:00:39,570 OK, and they often do so to steal or gain access to a password, financial information and other personal 9 00:00:39,570 --> 00:00:39,860 data. 10 00:00:41,040 --> 00:00:49,140 No, the white hat hackers, on the other hand, is or are they are deemed to be the good guy working 11 00:00:49,140 --> 00:00:52,170 with organization to strengthen the security of our system. 12 00:00:52,500 --> 00:00:59,610 And our white hat has a better mission to engage their targets and to compromise them within the prescribed 13 00:00:59,610 --> 00:01:00,820 rules of engagement. 14 00:01:01,020 --> 00:01:04,740 And a white hat handcuffs are often referred to as ethical. 15 00:01:04,740 --> 00:01:08,280 Hackers know the difference between white hat and the black hat. 16 00:01:08,550 --> 00:01:16,180 The white hat has permission and it is to strengthen the security of system for specific organizations. 17 00:01:16,770 --> 00:01:24,420 No, on the other hand, the black hat hacker actually to damage the system and to steal or do bad stuff. 18 00:01:24,450 --> 00:01:31,680 OK, so why tech doesn't mean that he's not skilled or it doesn't he doesn't have the skills or the 19 00:01:31,680 --> 00:01:31,920 white. 20 00:01:32,040 --> 00:01:36,570 The black hat means he is smarter or he do things better. 21 00:01:36,600 --> 00:01:41,360 No, actually the white hat and the black hat does interfere to that skills. 22 00:01:41,670 --> 00:01:45,390 He have no actually it refers to the intention. 23 00:01:45,570 --> 00:01:49,580 So a white hat, good intention, black hat, that information. 24 00:01:49,590 --> 00:01:50,070 And so. 25 00:01:51,090 --> 00:01:59,070 Now we have the great Pattakos now, actually these exploits networks and computer systems in a way 26 00:01:59,070 --> 00:02:03,670 that blackheads do, but do so without any malicious intent. 27 00:02:03,960 --> 00:02:10,950 So it is closing all loopholes and vulnerabilities, puno enforcement agencies or intelligence agencies. 28 00:02:11,190 --> 00:02:17,490 And it's really great that hackers served in it and hack into computer systems to Netiv to notify the 29 00:02:17,490 --> 00:02:24,450 administrator or the owner that their system contains one or more pertinent abilities that must be fixed 30 00:02:24,450 --> 00:02:25,080 immediately. 31 00:02:25,140 --> 00:02:31,110 OK, so the intention here is good, but they didn't have permission, so that's why we call them or 32 00:02:31,110 --> 00:02:32,720 they call them Aggrey hacks. 33 00:02:32,730 --> 00:02:33,180 Hackers.