HackingCredit: http://www.google.com/imgres?q=hacker+behind+a+computer&hl=en&biw=1366&bih=643&gbv=2&tbm=isch&tbnid=K5tI-s6bJJ-IZM:&imgrefurl=http://blog.aacriminallaw.com/%3Fp%3D1451&docid=NkQAWa3MffnnKM&w=500&h=394&ei=lpVcTvfDL6fjiALTvMmzBQ&zoom=1Credit: http://www.google.com/imgres?q=hacker+behind+a+computer&hl=en&biw=1366&bih=643&gbv=2&tbm=isch&tbnid=K5tI-s6bJJ-IZM:&imgrefurl=http://blog.aacriminallaw.com/%3Fp%3D1451&docid=NkQAWa3MffnnKM&w=500&h=394&ei=lpVcTvfDL6fjiALTvMmzBQ&zoom=1

What is Hacking?

Hacking, a definition in its simplest form, is described as an unauthorized use of computer and network resources. After some research I found that the term "hacker" originally meant an exceptionally, talented programmer. That definition has changed in recent years with easier access to multiple systems, it now has destructive consequences.

Hacking is a felony in most parts of the world, with the punishment being a criminal conviction. When it is conducted by request and under a agreement between an ethical hacker (A good guy who hack system/s to discover vulnerabilities for the purpose of protecting computers against illicit entry, abuse, and misuse) and an organization, only then it is ok for hacking to be carried out. The significant difference is that the ethical hacker has authorization to analyse and exploit the target.

I work within a corporation, as an ethical hacker, and my job is to design and execute thorough evaluations of the computer and network security. As we learn more about the target, its affiliates and network connectivity, we begin to probe for weaknesses.  Once found we attack the weakest point. 

Examples of weaknesses I have come across include poor configuration of Web servers, old or unpatched software, disabled security controls, poorly chosen or default passwords and attempt from the inside to attack the systems. As we find and exploit vulnerabilities, we take note on how we gained access, as well as if anyone at the organization noticed our unauthorized entry. In almost all the cases, the Information Systems department is not informed of these planned attacks, thereby I am testing their detection abilities. Then I work with the IT department to address the issues we've discovered.

The number of really gifted hackers in the world is considerable small, but there are lots of wannabes hackers. When I do an ethical hack, and once access is gained, I hold the keys to that company. It's too great a risk for our corporation to be put in a compromising position. With access to so many systems and so much information stored on these computers, the temptation for a hacker could be too great. Therefore it is essential I find these holes