What are White Hats?

Don Von Alpha Dom
by Don Von Alpha Dom · 33 posts
8 years ago in White Hat Activities
Posted 8 years ago · Author
White hat describes a h4c|<7r who instead of destroying or stealing data, instead uses his / hers skills to protect and create data. This section of our forums is dedicated to white hat hacking; constructive and protective skills. These skills are based in computer security, computer programming, and data mining.

Destroying and thieving data is not tolerated by The IMVU Mafias. Such activities are the evils we protect against. As white hats, we protect and nurture the IMVU community. Together we are strong.
Posted 8 years ago
Don Von Alpha Dom wrote:
White hat describes a h4(k3r who instead of destroying or plundering data, instead uses his / hers skills to protect and create data. This section of our forums is dedicated to white hat h4(k1n9; constructive and protective skills. These skills are based in computer security, computer programming, and data mining.

Destroying and thieving data is not tolerated by The IMVU Mafias. Such activities are the evils we protect against. As white hats, we protect and nurture the IMVU community. Together we are strong.

And will remain strong Keep up the Awesome work guys :clap: :clap: :clap: :clap: :clap:
Posted 7 years ago
awesome work keep it going clap clap clap clap clap good job
Posted 7 years ago
I had never heard of this! We need more White Hats-

This site really has me in awe.. Im so glad I found this group and it's really good to hear that people want to protect others in a virtual world that leans towards the opposite killing peoples fun. Keep up the hard work!
Posted 7 years ago
they're doing a good job
Posted 7 years ago
i always had a doubt what actually is a red hat.....There's also a Linux Red hat OS...is it for penetration testing purpose like backtrack?
Posted 7 years ago
This seems interesting
Posted 6 years ago
back track?

-- Sat Feb 03, 2018 9:44 pm --

whay no try Wifislax 4.14 version
Posted 6 years ago
I thought that the main difference between white hat, and black hat hackers had to do with permissions. White hat hackers are usually given some knowledge where black hat hackers infiltrate

Create an account or sign in to comment

You need to be a member in order to leave a comment

Sign in

Already have an account? Sign in here

SIGN IN NOW

Create an account

Sign up for a new account in our community. It's easy!

REGISTER A NEW ACCOUNT