Hacking Class 1 – Introduction to Hacking and Hackers

This is the Very First Tutorial Of Hacking . In this tutorial we will discuss what is hacking.. ethical hacking security…who are hackers…why we do hacking…and Introduction to some basic terms…
First of all I will try Explain what the Hacking really is….

What Is Hacking??

Everyone Here thinks that hacking is just stealing of data and information illegally but this perception is absolutely wrong. 
The below is definition from Wikipedia…. Itz clearly showing hacking as a negative thing…

“Hacking is unauthorized use of computer and network resources. (The term “hacker” originally meant a very gifted programmer. In recent years though, with easier access to multiple systems, it now has negative implications.)”

Hacking is not always unauthorized… Hacking also include Exploring the Things that are being Hidden from the general usage… So exploring things i.e being Hidden from general User is also hacking…

Hacking Definition by Me…
” Hacking is art of exploring the hidden things that are being hidden from general usage and finding loop holes in the security and use them to benefit the others”


Everybody here thinks thats hackers are criminals of the virtual world (i.e digital World ). But this thought is also wrong. Hackers are not always criminals.. It doesn’t have any doubt that Hackers are extremely genious peoples in the field of Computers…

I want to Categorize hackers in three Categories:
1. Crackers or Black Hat hackers or cheaters or simply criminals : They are called criminals because they are having the mindset of causing harm to security and they steals very useful data and use it in wrong ways. Phishers also some in this category who steals account info and steal your credit card nos. and money over the Net.

2. Ethical hackers : Ethical Hacking Means you think like Hackers. i.e First you Hack the Systems and find out the loop holes and then try to correct those Loop Holes..These type of hackers protect the cyberworld from every possible threat and fixes the future coming security loop holes. These peoples are also called as “GURU’s” of Computer Security.

3. Simply Prankers : The hackers who just do hacking for fun…play pranks to their friends..

Hacking Class 1 - Introduction to Hacking and Hackers


Threat –An action or event that might compromise security. A threat is a potential violation of

Vulnerability –Existence of a weakness, design, or implementation error that can lead to an unexpected, undesirable event compromising the security of the system.

Exploit –A defined way to breach the security of an system through vulnerability. i.e Use the vulnerability to damage the database or system.

Attack –An assault on system security that derives from an intelligent threat. An attack is any action that violates security.

Target of Evaluation –An IT system, product, or component that is identified/subjected as requiring security evaluation.

Security – A state of well-being of information and infrastructures in which the possibility of successful yet undetected theft, tampering, and disruption of information and services is kept low or tolerable.

Security rests on confidentiality, authenticity, integrity, and availability.

•Confidentiality –The concealment of information or resources.
•Authenticity –The identification and assurance of the origin of information.
•Integrity –The trustworthiness of data or resources in terms of preventing improper and     unauthorized changes.
•Availability –The ability to use the information or resource desired.


  • Introduction to Ethical hacking
  • Footprinting
  • Scanning
  • Hacking Systems and OS
  • Trojans and backdoors
  • Sniffers and DDOS(Denial of Service)
  • Social Enginnering
  • Hacking Websites
  • Hacking Web applcations and Softwares
  • Password Hacking and Cracking
  • Phising and fake pages
  • SQL Injection
  • Hacking Wireless (wifi’s)
  • virus and worms
  • Creating Viruses and trojan and Making them undetectable
  • Exploit Writing and virus source codes of very famous viruses
  • Cryptography
  • Hacking Webservers
  • …… And Much more… List is endless…

I think You all would have like this and want to see more.. I will regularly post material.
I think this deserves Comments and facts that Users want’s to ask about Hacking… 
So Don’t hesitate and ask your queries . I am there to reply them all…

Have Fun and Keep Learning…. As Hacking is the art of expertising Computers…

Author Bio

Lokesh Singh

Hello Friends, i am Lokesh Singh, certified Ethical hacker ( CEH, SSA, CSIF , CISSP). Have 8+ years of extensive experience in Ethical Hacking, Cyber Security and Penetration Testing domain.

  1. Navasai

    October 17, 2009 at 3:28 am

    Hey Lokesh
    ur doing a great job.Thanks for everything.Iam a big fan of u and ur website.

  2. Anonymous

    October 17, 2009 at 4:33 am

    thank’s man

  3. Danish

    October 17, 2009 at 7:45 am

    U r doing Great work …keep it up..

  4. Meghraj

    October 17, 2009 at 10:22 am

    Just wanna Say…Thank U ….

  5. Meghraj

    October 17, 2009 at 10:32 am

    I wanna ask one questions …
    Is it rubbish that hackers use some nick names like “acid burn” or like that.. or it is good to have a cool name…???


    October 17, 2009 at 11:50 am

    Itz just for funnnnnnnnnnnnn………
    Cool names look gooooooddddd..

  7. Jatin

    October 17, 2009 at 12:00 pm

    thanks .. keep it up bro.. Happy Diwali ! :)

  8. Anuj

    October 17, 2009 at 12:08 pm

    Great Step … Nice first class..

  9. Meghraj

    October 17, 2009 at 1:15 pm

    ok…can i know ur cool name plz.


    October 17, 2009 at 2:10 pm

    Lone Rusher and Dark-Master and ROFLMANiA and H@ck3R D3t3cted

  11. Meghraj

    October 18, 2009 at 2:03 am

    good names…
    Hei u told me to create a gmail account… what to do now with that….

    I have got one prob .. will u help me…??
    I have got one CD with my favs videos but when i insert it in my lappy , it says the disc is blank… but it runs smoothly in my CD Player.. plz.. help i want those videos….

  12. Lokesh Singh

    October 18, 2009 at 3:09 am

    Hey problem is just as simple as you think.. Generally copyrighted CD have 8bit security but now a days 8+1 bit security is being provided to cd’s so that original cd’s can’t be copied or seen on pc’s..

    Secondly there can be a problem with ur lens of computer cd writes…open the computer and clean up the lens…then it would read it…
    Enjoy and hav Fun..

  13. Anonymous

    November 11, 2009 at 5:45 pm

    good job,thanks

  14. Anonymous

    November 12, 2009 at 6:56 pm

    Xcelnt work

  15. Anonymous

    November 12, 2009 at 6:59 pm

    Hey. I was chating wid sum1on orkt? As sun as i replyd 1st scrap. .aftr sum tym it showd. .me login page. . .can ew tel me wat 2 du nd how to get my a/c bak!!plz help me dude

  16. Anonymous

    November 13, 2009 at 3:49 am

    Gud… Keep it up…

  17. Pulkit Bansal

    December 18, 2009 at 8:54 pm

    This comment has been removed by the author.

  18. Pulkit Bansal

    December 18, 2009 at 8:55 pm

    nice man I started going through the classes today itself ultimate job man and thanx a lot..!!!

  19. aShZ

    March 23, 2010 at 6:41 am

    superb……i was just waiting for a hacking site like this..jus mindblowing….i wld love to be a hacker with your guidance

  20. murali

    May 27, 2010 at 4:01 pm

    u’r site is superb lokesh

  21. Anonymous

    June 13, 2010 at 2:33 am

    Put a link to the next lesson in this series in every post.

  22. Anonymous

    July 8, 2010 at 9:56 am



    September 19, 2010 at 4:29 pm

    verry cooooool

  24. Anonymous

    October 21, 2010 at 4:49 am

    thank you. I’m a teen age kid and my account in an online game got hacked so i want to learn how to hack them back and prevent this from happening to me again. Thank you sir, I will read all your lessons. keep it up! :-*

  25. htag

    July 19, 2015 at 3:24 pm

    but we know their is nothing is safe dude, i mean no system is safe

  26. Martin

    September 3, 2015 at 12:45 pm

    In the midst of BAD guy a Hero is always born to save the world. Thanks to God at least I know one.

Leave a Comment