White hat Hackers are good and Black hat hackers are bad.
Depends there are white and black hat hackers. White hat basically hack to to exploit problems and fix them. Black hat hackers hack for personal gain.
Not all, some are good some are bad. White hat hackers are good, and black hat hackers are bad.
There are three types of hackers. White Hats, Grey Hats and Black Hats. Black Hats are known to be the notorious ones and White Hats are kind of like ethical hackers. Grey Hats are a little bit of both. So "Evil" depends on the type of hacker.
Depends if they have better skills than a person you are comparing them too.
Black Hat: Criminal Hackers White Hat: Authorized Hackers Grey Hat: “Just for Fun” Hackers Script Kiddies: Ametuer Hackers Green Hat: Hackers-in-Training Blue Hat: Authorized Software Hackers Red Hat: Government-Hired Hackers State/Nation Sponsored Hackers: International Threat Prevention
Oh, dude, we've got your script kiddies who just copy and paste code, your black hat hackers causing chaos, your white hat heroes fixing stuff, and your grey hats who are like the rebellious teens of the hacking world. It's like a high school cafeteria, but with more computer screens and less actual food.
"...there is no ratio because the white peoples are just the same as the black people because there both hat hackers because they hack into peoples stuffs..." - crap answer!!! In proper english: The ratio to black hat and white hat hackers can not be determined. White hat hackers are employed by companies to test and develop ways to improve defence on a company network/system. Black hat hackers are those that hack for fun and for personal profit such as hacking into a facebook profile or hacking into a bank to embezzle funds. Many white hat hackers are past black hat hackers that have become famous for hacking, so employers want them to test the defence and improve their system, so would these black hat or white hat?? White hat hackers and black hat hackers are divided by a very thin line and so it is very hard to determine which hacker belongs to which group. Also, Black hat hackers are performing illegal acts breaking the codes of the computer misuse act. Because of this, they will lurk in shadows and may not freely admit to being a hacker. Therefore, it is unknown how many black hat hackers there are and so it can not be put into ratio. I like the correction above, One rule for 'white hatters' regards the use of correct spelling and punctuation ... vital for good code! So one might consider the first respondant above to be at least a 'grey hatter' but certainly not a 'white hatter'. Personnaly I think that in addition to the correction above this determination must consider the overall security of the web; in doing so we could see who is 'ruling' at that particular time and posibly, therefore determine, where the majority strength lies if not the actual numbers.
Hackers search computers and/or networks for weaknesses. Hackers that exploit these weaknesses are called Black Hats. The ones who try to fix this weaknesses are called White Hats. Grey Hats are both, usually they're White Hat Hackers by day, and Black Hats by night.
Before you can be a white-hat hacker, you must understand and commit to the legal and ethical framework that separates authorized security testing from wrongdoing—always obtain explicit written permission and follow responsible-disclosure practices. Technically, you need strong foundations in networking (TCP/IP, DNS, routing), operating systems (especially Linux and Windows internals), and one or more programming or scripting languages (Python, Bash, PowerShell, or C) to write and modify tools or exploit proofs-of-concept. Learn core security concepts—cryptography, authentication, access control, web and application vulnerabilities (OWASP Top 10), and common attack techniques such as SQL injection, XSS, and privilege escalation. Familiarize yourself with standard tools and platforms (e.g., Nmap, Metasploit, Burp Suite, Wireshark) and practice in safe, legal environments like CTFs, labs, and virtual testbeds. Obtain formal training or certifications (such as OSCP, CEH, or equivalent practical courses) to validate skills and best practices, and build strong reporting, documentation, and communication abilities so findings are clear, reproducible, and actionable for stakeholders. Finally, maintain continuous learning—security is dynamic—adhere to professional ethics, and never test systems without authorization.
there r four types of hackers .white hat hackers :- they do hacking only for ethics they trace and monitor the malicious activity.they have the legal rights to do hack or related to hacking . they are also called ethical hackers.Black hat hackers :- they do only malicious thing like making trojens ,hacking email id .they actually called crackers . they don't have the legal rights to do that. they are called non ethical hackers.grey hat hackers :-some time white hat hackers turn to black hat hackers those hackers are called grey hat hackers.suicide hackers :- that type of hackers do the illegal job without fear of police or law.for more practical knowledge regarding to ETHICAL HACKINGsubscribe the channel:http://labs.google.co.in/smschannels/subscribe/ethicalhackingTricks
Such hackers are formally called "ethical hackers", though they are also referred to as "white hat hackers".
there r four types of hackers .white hat hackers :- they do hacking only for ethics they trace and monitor the malicious activity.they have the legal rights to do hack or related to hacking . they are also called ethical hackers.Black hat hackers :- they do only malicious thing like making trojens ,hacking email id .they actually called crackers . they don't have the legal rights to do that. they are called non ethical hackers.grey hat hackers :-some time white hat hackers turn to black hat hackers those hackers are called grey hat hackers.suicide hackers :- that type of hackers do the illegal job without fear of police or law.for more practical knowledge regarding to ETHICAL HACKINGsubscribe the channel:http://labs.Google.co.in/smschannels/subscribe/ethicalhackingTricks