Not all hackers are hackers who are going to be hacking into a system in order to gain access to your personal information. In fact, there are several very famous hackers that have come out of history that have given us the technology that we currently have. Three that come to mind are Steve Wozniak, Steve Jobs, and Captain Crunch.
These very well-known men began their career hacking and then have given us some of the technology that we know and enjoy today. All they did was take the knowledge that they had and applied it to technology and found new ways to create things.
In order to start your career as an ethical hacker, it is wise that you have some sort of computer science degree that will allow you to do this. Many big companies are hiring hackers to find the flaws in their systems so that they are able to keep their company secrets, secrets.
You can also use your hacking skills to be able to make your own technology like Wozniak and Jobs did. You are able to create programs and computers or whatever it is you are wanting to create in order to help people protect themselves from hackers.
If you are wanting to go to a company and work for them, then you are going to need to find the companies that are hiring people for their IT teams. You will be doing more than finding the security flaws in their systems, but it will put you in a step in the right direction.
It is important for you to remember that hacking is illegal unless it is done ethically. Here are some of the ways that hackers are punished if they are caught.
In India if you are found tampering with a computer source document which includes the destruction, concealment or event he alteration of the documents source code will end up getting the hacker at least three years in prison or a fine of 20000 rupees.
Also in India, if you are found just having hacked into a website or various other sources, you will be imprisoned for up to three years and possibly get a fine of 50000 rupees.
The Netherlands defines hacking as an intruding an automated work or part thereof with intention against the law. Intrusion would be considered defeating any security measures, false signals or false cryptographic keys, using stolen usernames or passwords. Any of these can get you at least one-year imprisonment along with a fine of the fourth category.
The United States prohibits any unauthorized use or damage of a protected computer. A protected computer would be a computer that is used by a financial institute or the US Government.
The computer can also be used in affecting interstate or foreign commerce or even communication. The computer does not have to be located in the United States if it is used for any type of interstate or foreign commerce.
The maximum imprisonment can be one year in a federal prison or a fine that is not more than $5,000.