What Are White Hat Hackers?

In my last article we spoke about Black Hat Hackers and what they do. Today you’re going to learn about White Hat Hackers and what they do.

If you read my last article about Black Hat Hackers then you already know that the main focus of Black Hats is to harm people  for laughs, monetary gain and sometimes for research purposes. Well, White Hats do the exact opposite of Black Hats and I’ll explain what I mean by this. White Hats are known as “Ethical Hackers”. Ethical Hackers practice and use their talents with hacking within legal means which means they do things by the book and ask for consent before doing anything involving hacking.

While Black Hats attack people, White Hats do the opposite by protecting people. A lot of White Hats work for security companies that make anti-viruses and anti malware programs. They also do a lot of work hacking into their own systems ( or a company that gave them permission ), in order for find and close the very same holes that Black Hats might use to break into your computer and harm you.

Most people who go to school for Information Technology, Cyber Security and Ethical Hacking usually start off as White Hat Hackers because they learn about network manipulation and things that hackers could use to potentially damage their system (s). 

If you haven’t already read about Black Hat hackers read about it here and for more information about other types of hackers checkout this video I made!

What Are Black Hat Hackers?

We all know what hackers are and what they do but did you know that there are different types of hackers? Yes, different types of hackers! Well today we’re going to learn about Black Hat hackers and some of the things that they do. 

When you think of the word “Hacker” one of the first things that comes to mind are the words “bad guy”. This is because the media and the internet have a tendency of promoting bad deeds more than good ones and it has completely ruined the hacker image. While many people believe there’s only one type of hacker there are actually a lot of different hackers and they are classified into two main groups, which are known as Black Hat hackers and White Hat hackers. To make things simple, White Hat hackers are the good guys and Black Hat hackers are the bad guys. 

The reason why Black Hat hackers are considered ” Bad Guys” is because they use their skillset and talents for financial gain ( at others expense ), to hurt others and sometimes they use their skillset and talents just for a laugh. Black Hat hackers are the ones that try to break to break into your computers and networks in order to steal secure information such as financial records, credit card numbers, pictures and more. 

Black Hat hackers are also behind some of the biggest cyber crimes in history such as the world’s largest DDOS attack, Ransomware, malicious files and much more. To find out more  about White Hat, Black Hat and other types of hackers checkout this video.  Different Type of Hackers

Protecting Your Phone From The NSA

Worried about the government, NSA, or Vault 7 leaks affecting your Windows Phone? Here’s how to tighten your security to prevent unauthorized access of your phone! ( This works with Windows Phone, Android and iPhone )

Okay, let’s be honest here…people have accused “big brother” of spying on us long before Edward Snowden or Vault 7 but people don’t really pay attention to these accusations until something major happens. Don’t be afraid of people spying or having access to your device because big brother only has access to what you allow and give to him/them.

The first thing people think of when someone mentions big brother is, “Recorded Phone Calls” or them “Listening/watching you without permission”. Let’s make this clear, they government does have access to your call logs, messages, voicemails and maybe a couple conversations based on who you’re talking to and what it’s about ( They usually tap your phone when you’re being a criminal ). Phone companies are obligated to hand over customer records for warranted investigations or undercover operations such as stings and or bust’s but that doesn’t mean we can’t control what they see and hear as far as apps and services.

On your Windows Phone ( and android ) you should have privacy options in your settings. These privacy options let you control what apps and services have access to your camera, microphone, calendar and just about everything else. What makes this so important is that fact that hackers and bad guys can take advantage of microphone and camera privileges based on the permissions that you’ve given their app(s) and this is no good. In your privacy settings you want to disable all access to your microphones and other things from apps that don’t need them. Apps that don’t require active internet connections shouldn’t have access to the internet, your calendar or anything else that it doesn’t utilize to enhance the users experience.

Eliminating access to these things prevent hackers and yes, even big brother from using known exploits and zero days to use certain permissions on your device. If you want to stay safe and secure please remember that privacy is a big part of your safety and security. With that being said you should also know that Windows Phones are the SAFEST mobile operating systems available but just because that’s true doesn’t mean you should be careless.

How I bricked/pwnd my PC.

First off, let me be the first to tell you that this is the first time I’ve written an article like this but it’s extremely helpful, which is why you should keep reading this.

Just a couple of days ago I was doing some work on my computer and decided that it was time for my weekly maintenance. After I got rid of all the unwanted software I had on the computer I started shredding small files, funny pictures and a few other things. Eventually, I worked my way to cleaning the registry and THAT’S when I bricked my computer.

Usually, whenever I clean my registry nothing bad happens and I usually see an increase in computer speed. Today was different… very different. After cleaning ( or purging in this case ) my computer and allowing it to reboot, the computer ended up being stuck in an infinite boot loop! I was perplexed as to why it kept rebooting and let it do so a couple of times before I tried troubleshooting the problem. Now, when you’re stuck in an infinite boot loop most people restore their computer from an earlier point in time, auto repair the computer, boot in safe mode or just re-install their operating system and keep their files. Before you jump the gun, NO, none of these methods worked. I even a tried a few “black hat” methods to get my computer up and running again only to fail ( I really didn’t feel like doing it ).

Now, the best part about this is that I ended up having to delete everything off of my computer and re-installing a fresh copy of Windows. Most people would be bummed out by this and I was for a moment, until I remembered that reinstalling Windows gives you to option to erase and or keep your files while reinstalling. If you remember, earlier I told you that I already tried re-installing Windows and keeping my files keeping my files but unfortunately it didn’t work. I started to realize that my Windows and Windows.old folders were on the main hard drive while my secondary internal hard drive was where all my significant files were.

What made this so special and important you ask? This is important because me putting all of my work files on a secondary hard dive saved me from deleting it all when my computer messed up. When you erase your files and restore your computer you only erase the files that were on the same drive that your version of Windows was installed on.