This represents the Good Guys most of the time for they are the ones who search for these exploits to prevent crackers use a method called cracking(opposite of hacking).
Hacking and hackers are commonly mistaken to be the bad guys most of the time. Crackers are the ones who screw things over as far as creating virus, cracks, spyware, and destroying data.
Cracker - Person who gains unauthorized access to a computer with the intention of causing damage.
Cracking - Method by which a person who gains unauthorized access to a computer with the intention of causing damage.
Hacker - Person who gains authorized/unauthorized access to a computer WITHOUT the intention of causing damage.
Spyware - A Program that was created by a person(most frequently a cracker) to watch the computer and it's actions and report the details to the origional maker.
Virus - A maliciously made program that is used to destroy data, or hurt the performance of the computer. Makes copies of itself and sends it to more p...
Commonly used in the opensource communety becose every one can (re)use eatch other source code.
Confusing a computer program to give you access to that machine is also a hack. Doing this becose you want to test securety is a white hat
Intendedly useing a hack to take over that pc to do your bidding is a cracker or black hat.
Downloading hacks and try them to gain access to a computer with out knowing that it realy does is a script kiddy
the DS was not intended to do it but they made it do it.
Legal and condoned hacking is known as "white hat" hacking, and is used to test the security of a given computer network by hiring an individual or group of individuals to try to break in to it electronically, in order to determine the network's flaws or lack thereof.
Illegal or unwanted hacking is known as "black hat" hacking, however the term "cracking" is often used to describe malicious or malevolent hacking in which the end goal is to cause damage to the integrity of the targeted computers, whether to destroy, copy, or modify files, or possibly to install easy routes back into the system known as "backdoors".
Not all condoned hacking is legal, however. For example, if Jim's friend challenges him to hack or crack into his home computer, and Jim does so, it is still technically illegal despite the consent of his friend. Legal hacking (in the United States of America) needs to be approved with paperwork and status of employment; hobbyist hacking is generally always illegal.
Techniques for hacking vary intensely, and can incorporate...
2. posting "i'm gay." or "i'm so hot." in a facebook account of a person who forgot to log out.
2. OMG you hacked my facebook! You fiend!