![]() The person involved in doing so is called an ethical hacker. ![]() Nonetheless, if it is done under intimation and approval to identify the weaknesses and threats to either a network of computers or a single unit to help solve someone’s networking issues, it would then be termed as ethical. Hacking is forcibly entering into someone’s system with a fraudulent mindset to breach his privacy or steal his system data. Hacking, as the word suggests, has nothing to do with anything ethical. ![]()
0 Comments
Leave a Reply. |