Today, the number of people using a computer or smartphone that can connect to the Internet is quite high. We have very little knowledge about the safety of these types of technological devices. With the introduction of technology into our daily life and its rapid development, many innovations came with it. In fact, even words related to the development of technology can sometimes be insufficient. Of course, again, the young generation was the one who had the most impact on these developments. Just a few years ago, while the action-crime movies were in the place that many people considered as legendary, in 2016, the Golden Globe 'Best TV Series' award, a hacker's life was told. When the robot series got bought, it became clear that there would be great changes in the digital world and the focus of people would shift. Hacking, which has caused confusion and a little anxiety by affecting almost everyone's daily life, from internet addicts to passive users, has begun to affect the way people live. Because as a result of a successful hacking attack on phones or computers, we can lose all of our assets, and we can sink debt to our throat. This is true not only on a personal basis, but also for companies. Companies may experience million dollar losses as a result of an attack on the network. valid for companies. Companies may experience million dollar losses as a result of an attack on the network. valid for companies. Companies may experience million dollar losses as a result of an attack on the network.
Hacking attacks are not only experienced financially. The publication of Wikileaks, Anonymus attacks such as the takeover of Turkey's official government account can carry the purpose of the protest. Hacker groups like Anonymus and RedHack have the most talented hackers in the world. Of course, their attacks ensure that they are on the world agenda. Nowadays, when it comes to hackers, hackers often have malicious purposes and possess destructive power. However, the same is not the case for every hacker. It literally means hacker, a hacker. Some of these pirates may be bad and some may be good. In other words, hackers can confront in certain environments. Hackers who leak into security systems of personal or company computers and networks, or warn firms or individuals by determining how to infiltrate these security systems, are called hackers. By entering other people's systems, they can steal their personal information and damage their systems. Hacking is seen as one of the coolest things to do at the computer. It is seen that the people who perform the best hacking are in their 20s. Although it seems like a job that everyone can do, hacking is harder than you think. It definitely requires a lot of talent, patience and effort. is seen as one of the coolest things to do at the computer. It is seen that the people who perform the best hacking are in their 20s. Although it seems like a job that everyone can do, hacking is harder than you think. It definitely requires a lot of talent, patience and effort. is seen as one of the coolest things to do at the computer. It is seen that the people who perform the best hacking are in their 20s. Although it seems like a job that everyone can do, hacking is harder than you think. It definitely requires a lot of talent, patience and effort.

Hacker Types
White Hat
They are the most harmless and constructive hackers. White hackers, like other hackers, can take over any computer, network, mobile phone in seconds. However, hackers with white hats share the system vulnerabilities with the developer firm in detail before sharing the vulnerabilities with the public. It proposes to shut down the system to eliminate these gaps. Then, a statement is made about the vulnerability encountered on the internet in order to inform the public. In short, hackers with white hats find system vulnerabilities and repair them against malicious hackers. In short, they defend. This hacker group is called 'Ethical Hacker' today.
Black Hat
Contrary to hackers with white hats, they are hackers who aim to harm. By entering security systems without permission, they can carry out all kinds of harmful activities such as information theft, terrorism and fraud. They can realize these operations by accessing the computer remotely or by breaking a software.
Gray Hat
Hackers walking around the border of legality are called gray-hat hackers. Sometimes they may be well-intentioned and sometimes they may take illegal actions.
Lamer
This concept is used for people who care about hacking but are not capable. Their working principle is to venture into websites or documents with a few techniques they memorize over the internet. But when asked about the working principle of the technique they memorized, they cannot answer. The main purpose of lamers, whose level of knowledge can be determined by the people at the moment they speak, is to show off the people around them. They want the people around him to respect themselves. They perform their actions in front of everyone, but they cannot explain when asked because they do not know how.
Cracker
Crackers have a good command of programming language and change programs in the form of application files called reverse engineering. For example, they create a crack by editing the files of a newly released game and ensure that the game runs smoothly. There are a lot of crackers, especially in the game industry. These individuals charge a fee for the person or company they agree with for each crack they make.
Security Administrator
This group, defined as anti-hacker, is the people who are called hackers on at least one shirt. Job descriptions are mostly to solve the hackers' methods and applications and to carry out anti-hacking. Security administrators, who work in various institutions and organizations, act as protection rather than harm. Thanks to the measures they take with a series of codes and applications, they almost build a wall against hackers. In the hacking attack, these walls act as protection by preventing leakage into the system. Of course, every security administrator is not a professional and high-level hackers can easily find the vulnerabilities behind it.

Vulnerable
The origin of the word, vulnerability, which means 'unprotected, weak', refers to vulnerabilities on the system. This concept, which is also used as 'security hole' in the sector, is the general definition of the deficits that occur today. For example, a php page might have vulnerability with unfiltered HTML tags. Thanks to the bug that occurred, hackers can easily enter the system. Hackers who take advantage of such vulnerabilities are called vulnerable.
Exploit
Hackers who use the vulnerability on my site for malicious purposes are called exploits. Exploit which means 'to exploit' is usually URL, written code, application or keylogger style content. In short, the intermediary who prepares the system to use the vulnerabilities is called the person. The people who write the exploit give these harmful applications to the hands of the lamers. Hackers are also defined as people who write these exploits, that is, find deficits.
Hacktivist
They are people who hack to raise a social or political problem. Their main goal is to make a message to the concerned people by announcing something that is bad or wrong for them. Anonymus is the best example of hacktivists who should not be supported because stealing information from unauthorized access to systems is a crime.
Script Kiddie
These people, who are much more knowledgeable than laminates, are extremely dangerous for the digital world, although they are not hackers. Script threats often aim to attack, damage and misuse the information they have acquired. Infiltration into a security system is not a tool for these people, but a purpose. They can be described as the anarchists of the hacker world. Many of the attacks on personal computers or mobile phones are carried out by script ankles. They identify themselves as hackers in their environment and are proud of it.