answersLogoWhite

0


Best Answer

It's a very good possibility, ethical hackers are usually employed by a company to attempt to hack into security to check defenses. Definitely.

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Do ethical hackers break into someone else's computer?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

What are the types of ethical hacking?

Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them. For example, a bank may pay a hacker to hack their systems to see if it is hackable. If he gets in, then they know there is potential for other people to hack in, and usually they will work with this ethical hacker to patch these holes. If he doesn't get in, then they pray that nobody is better at hacking than him. Let me add this. Hacking is simply exploring a computer's designed features, and learning how to exploit or take advantage of those features. As an example. a computer is designed to load instructions into memory using clearly defined rules, outlined in an RFC that spells out how to load something into memory. A hacker (white, grey, or black) looks at it this way. The RFC says to load an instruction into memory, use 8 bits of data, and two bits of instruction, then 8 more bits of data, and two more bits of instruction. A hacker looks at this and wonders, what if I pass 9 bits of data, what if I pass ten bits. etc. Sooner or later the computer will not be able to deal with the amount of data being passed in a manner it understands. Maybe it can accept 9 bits, 10 bits, and just ignore the discrepencies from the RFC, but sooner or later, the computer will not know how to interpret the instructions. When a computer does not know what to do next, it gives up and passes control to the SYSTEM, which is all powerful. This is a very basic description of a bufffer overflow. The hacker wants to force the computer to give up, and pass control to the SYSTEM. Once this happens, the hacker has administrative control and can now start passing commands to the computer that it will follow without question. There are three levels of hackers. White Hats spend all their time trying to break the system, to prove it can ge broke, so they can get the manufacurer to address the problem and fix it. Grey hats do the same thing, but perhaps will try to gain from their new way of breaking the system. They may expect payment for finding a way to break the system, and they may even try to get financial gain from their knowledge or silence. Black hats want to take the knowledge of how to break a system and use it for financial gain. They may use it to hack systems or write code that allows others to hack systems, and sell that code. All three are doing the same thing, trying to break the systems. The difference is what they intend to DO with the information once they discover it. Script Kiddies take the information that hackers discover, and try to use it for their own gain. They discover nothing, they just use what others have discovered, and try to copy it for their own gain.


What happens when a computer falls on the floor?

It breaks so buy a new one or it will not break mine fell and its ok


Is it acceptable to conduct your private business on your government computer as long as you do it on your break or during lunch time?

It is acceptable to conduct your private business on your government computer as long as you do it on your break or during lunch time


What kinds of challenges do computers bring to a digital society and how does becoming computer fluent help you deal with these challenges?

The main 'challenge' is security ! Experts are in a constant battle to keep peoples personal information secure, and only accessible by those authorised to see it. Hackers think it's funny to break into a persons computer - they don't realise (or don't care) how violated it makes someone feel to find out their personal information is now broadcast all over the internet. Stealing someone's 'identity' Is worse than being burgled (and I speak from experience) !


Is hacking always wrong?

Nope, hacking is always not bad things. There's a way of hacking which is known as "White Hat Hacking" or "Ethical Hacking." This type of hackers helps an organization to find out their vulnerabilities and helps them to patch it up. The white hat hackers earned a handsome amount by helping organizations.

Related questions

What do computer hackers have to do with computers?

they break into computers for information


The difference and similarity between hackers and crackers?

The crackers are malicious programmers who break into secure systems. The hackers are more interested in gaining knowledge about computer systems and possibly using this knowledge for playful pranks. Similarity is that both break laws but intention of hackers are not bad while intention of crackers are not good.


Why are bad hackers considered more advanced that the good ethical hackers?

It is much easier to explore the various methods to enter or destroy when you are unbound by ethics. Good ethical hackers are not likely to break into CIA, FBI, DOJ, etc sites for fear of prosecution. A bad hacker (black hat) would do so for the thrill, the challenge, the revenge, etc.


What are two definitions for hacking?

* note these 2 aren't the official definitions, just what they are. * 1. The media says that hackers are cyber-criminals who break into your computer, plant viruses, and steal government secrets. * 2. Really(and this most people do not know) hackers are just incredibly computer talented people who may break into computers, but just for the challenge of it. A true hacker doesn't steal secrets or plant viruses, hackers are good people who wouldn't dream of doing this kind of stuff. * The action of hacking is breaking into a computer. Nothing else.This part is just an extra sort of thing but people that break into computers to plant viruses and steal very important info are actually called crackers. And there are hackers who break into computers, discover all the vulnerabilities, and then tell the person who owns the computer or network these vulnerabilities and helps them fix these weakness before crackers can get in and cause damage. These hackers are Ethical Hackers. And some people think that a firewall can keep a cracker out. WRONG!!! Firewalls can block some forms of hacking but not all.And this might help you trust what I have said, but I am actually learning how to be an Ethical Hacker, so I know.


Ethical in a sentence?

Ethical implications of computer network attack central to theargument is whether computer network attack is a use of force atall.


A person who uses one computer to break into another is a?

Cracker. Hackers are people who enjoy using computers, generally to make them do things they were not intended to do - like running Linux on a playstation. Crackers are a subset of hackers that use their skills to get into computer systems, generally without consent.


What is a hacker how can you can learn the hackers from the company?

The term hacker has a double meaning within the field of computing. A hacker can be a genuine expert of computer software and hardware. The other known meaning of hacker is someone who breaks into computer security networks for a reason of their own, basically they break the law in doing so.


What the different between cracker and hackers?

Crackers are individuals who break into computer systems without authorization, often for malicious purposes such as stealing information or causing damage. Hackers, on the other hand, are individuals who use their technical skills to solve problems and improve systems, often with a focus on ethical behavior. In popular culture, the term "hacker" is sometimes used interchangeably with "cracker," but there is a distinction between the two in the cybersecurity community.


What do you call someone who creates a program to break into someone else's computer?

hacker


What is the definition of computer hacker?

someone who illegally uses technological methods to break into a computer system


What do you think motivates a hacker to attemp to break into computers to probe their defenses?

Hackers sometimes can be referred to what are known as Trolls who simply wish to break the defenses of your computer and cause havoc just for the simple amusement of it. Other hackers have more practical motives such as planting worms and spyware in your computer to steal your personal information such as bank account and credit card information and to steal password logins and usernames for various functions.


What is a silly thing to say?

Hackers fix things, crackers break them.