Were Are Hackers ... ?
Were are hackers
Were do they live
What do they do
What for they do
What is there aim
Hacker are everywhere on the net. There are two types of hacker:
1. White hat
2. Black hat
White hat hackers are the one who fight lack hat hacker. Companies especially online company hire white hat hackers for them to fight and protect their online business. Hacking is an illegal act, it is a way of stealing on the internet.
Very smart people with a high level of intelligence(s) definitely within the concept of multiple intelligence theory of Howard Gardner. Definitely high in Visual-Linguistic, Logial-mathematical, and intrapersonal. Maybe Musical-rhythmic and harmonic and questionable regarding Existential.
The different (abilities) Intelligences
Musical–rhythmic and harmonic
The purist, IMHO, is an artist. They do 'hacking' with the same dedication and fortitude as does the sculptor, the painter, and even the writer. Understanding aesthetics would offer maybe appreciation and assuredly motive. For instance with meaning;
Artist as an adjective - concerned with beauty or the appreciation of beauty
Artist as a noun - a set of principles underlying and guiding the work of a particular artist or artistic movement.
One may appreciate the artist as an adjective describing a person's being while at question is an artist as a noun being a type of person with consequences as pointed out by KenDeanAgudo relating to Black and White Hat Hackers.
It is a matter of perspective objectively and perceptions subjectively.
by Alissa Roberts 3 years ago
What are some helpful tips to protecting your smartphone from viruses and hackers?To obtain internet access at my house, I often tether my android to my laptop. Does anyone have any helpful tips to safeguarding my smartphone from potential viruses and hackers?
by manpreetkainth 5 years ago
Hackers are commonly known for being internet predators, identity thefts and all-around creators of online chaos. But did you know that the term 'hacker' has been used since the 1960s, and was typically a nickname for any computer programmer? Hackers could hack any computer code and were considered...
Copyright © 2018 HubPages Inc. and respective owners. Other product and company names shown may be trademarks of their respective owners. HubPages® is a registered Service Mark of HubPages, Inc. HubPages and Hubbers (authors) may earn revenue on this page based on affiliate relationships and advertisements with partners including Amazon, Google, and others.
|HubPages Device ID||This is used to identify particular browsers or devices when the access the service, and is used for security reasons.|
|Login||This is necessary to sign in to the HubPages Service.|
|HubPages Traffic Pixel||This is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.|
|Remarketing Pixels||We may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.|
|Conversion Tracking Pixels||We may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.|