answersLogoWhite

0


Best Answer

HACKER-A Hacker is generally someone who just likes to know exactly how things work or how things can be done. They don't want to cause any harm, but rather explore, experiment, and gain knowledge

A Hacker enters your computer and views all your personal files without your permission

ATTACKER-Attacker is someone who wants to actually attack your computer or cause harm. Attacker also enters your computer without permission but not only he views them , he will cause serious damage to your computer as well as your profiles on other networks.

User Avatar

Wiki User

10y ago
This answer is:
User Avatar
More answers
User Avatar

Anonymous

Lvl 1
3y ago

W

This answer is:
User Avatar

User Avatar

Anonymous

Lvl 1
3y ago

D

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is the difference between a hacker and attacker?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Difference between active and passive threats?

Passive attack: So in passive attack a hacker intrudes your system, and waits for some valuable information. An example could be: A keylogger which sends the input given by the victim to a hacker via a network(LAN or Internet whatever). Active attack: In an active attack a hacker tries to get the valuable information by using his abilities rather than depending on the stupidity of the victim. An example could be: Using Brute force to crack the password of a system. Answered by: 21st Ninja GOD


What is the difference between muhammed ali and Mike Tyson?

Tyson was a hard punching aggressive attacker. Ali was a cool and calculating counter puncher, with more heart and stamina.


What is the difference between Man in the Middle attack and a replay attack?

Man-In-The-Middle: An attack in which communications between two hosts are routed through the attacker's host. The attacker can observe, modify, and/or block selected traffic before relaying to the intended host. Communications between the target hosts appear normal.Replay: An attack in which a copy of communications between two hosts is obtained by the attacker. The attacker retransmits selected portions of the copied communications at a later time for nefarious purposes such as creating duplicate transactions, circumventing authentication, etc.diffrent: a replay attack is a more specific type of man-in-the-middle attack. I view the biggest difference in the intent. In the man-in-the-middle attack the intent is simply to capture the data, but in a replay attack the intent is to reuse the data in an an attack.


Is it possible to get hacked if the hacker doesnt know any of your info?

First of all, the hacker has no reason to hack you unless some important files are on your computer, and we're talking about super-important sensitive government documents, not school projects. And no, the hacker can't hack you if he doesn't have any of your information. The only way you can get hacked is when you get a rootkit/backdoor virus which gives the attacker control over your computer or if a hacker is messing around with random IP adresses and attacks yours.


What is the difference between an attacker and a defender?

the difference is that an attacker tries to get the ball of the other team to score a goal or pas to their other team members,as the defenders defend the attackers to try to stop them get the ball to pass or score a goal. so if the defenders does a good job and get the ball, they will be able to pass to their other team mates and successfully score a goal and archive their goals an possibly win the game!:)


What is the difference between survivors and the rest of duel master creatures?

Survivors share their abilities.For eg. Blazosaur Q has power attacker +1000 Gigaling Q has Slayer Gallia Lohl Iron Gaurdian Q has blocker. If all of them are in the battle zone three of them have Power attacker+1000,Slayer and Blocker


What is the difference between hackers and cyber vandalism?

Hackers are individuals who use their technical skills to gain unauthorized access to computer systems or networks for various purposes, which can include cyber vandalism. Cyber vandalism specifically refers to the act of intentionally disrupting or damaging computer systems, networks, or data, often for malicious or destructive purposes. In essence, hackers can engage in cyber vandalism, but not all hackers necessarily do so.


What is the receiver attacker?

A receiver attacker is a type of cybersecurity threat where an attacker intercepts or captures data transmitted between a sender and a receiver. This attack can lead to sensitive information being stolen or manipulated by the attacker. It is important to implement encryption and secure communication protocols to protect against receiver attacks.


What is the difference between a cracker and hacker?

A hacker is a programmer who enjoys the challenge of breaking into other computers but does no harm, true hackers have a code of ethics and look down upon crackers.A Cracker is a programmer who cracks (gain unauthorized access to) computers to do malicious things such as steal information or delete information.


What is the difference between a pirate and hacker?

The hackers are more interested in gaining knowledge about computer systems and possibly using this knowledge for playful pranks, While Pirate is a criminal or robber at sea.


What are the difference between attacker and stricker in football game?

the attaker location is not in the goal keeper zone ,but the striker always in the front and he tries to not be offside that why the striker scores a lot of goals more than the attaker.


What does a port scanner tell an attacker?

Now if you mean how does it catch a attacker: If a large amount of packets are being sent through ports that are above normal, or above the standards sent, it would assume its a attacker and posibly close the port until future action is stated. If you mean how a attacker finds a port: The attacker merely sends multiple small packets to multiple ports and sees which comes with a received message, stating it is a open port prone to attack.