An individual capable of solving complex non-intuitive problems in a seemingly intuitive manner. The processes and techniques used are not necessarily methodical to the observer, but yet achieve results significantly and consistently faster than known experience would predict. A hacker is not defined in terms of intention or purpose, but rather by the talented single-mindedness of method. A hacker is not a hack.
Hackers are not limited to computer hacking.
Commentary: The movies "Tron" (1982) and "War Games" (1983) significantly influenced the common use of "hacker" (by non-hackers) in reference to computer hackers. The widespread use of the Internet beginning around 1993 made millions of unwitting parents concerned that their adolescent child was turning into a hacker. Some of the twit kids even believed it themselves. Please see reference to "lacker" for a more appropriate name for these individuals.
A hacker typically uses genius or intuitive methodology to solve complex problems.
A Computer Hacking ProGram
I.P. Flooder, I.P. Scanner, I.P. Bomber, E-Mail Flooder, E-Mail Bomber.
If I Wanted To Create A Lot Of Lag And Send It To A Persons I.P. Address, I Would Use Divine Intervention.
Which I Have Hosted At My WebSite.
(verb) Kick From Clan. A common punishment in computer gaming clans, especially if the player has damaged the clan's reputation by cheating.
I'm going to KFC him for hacking.
Is a 1337 underground hacking group
owned by a powerful leader
Also heard to be with Anonymous
Very dangerous people
Person 1: My myspace got hacked by Esmay
Person 2: They fried my computer!
Person 3: Don't download there stuff!!!!
Using a computer to dial telephone numbers within a given range, usually with the intention of finding a modem carrier signal. The practice largely predated the widespread penetration of broadband Internet connectivity; at the time, many businesses, agencies, and individuals operated computer systems "on-demand" through telephone-based modems, each of which might (or might not) offer a unique (and possibly privileged) selection of information, as well as possibly offering access to powerful hardware or a platform for reaching other networks and systems. Usually, the wardialer would be covertly planted on a public, shared, or corporate phone line, left to operate for a limited time, then retrieved so that any "positives" (phone lines returning a modem carrier signal) could be investigated later from yet another location. The practice often went hand-in-hand with phreaking, for obvious reasons.more...
Today, some telemarketing and social research firms use similar programs (usually working from a digital phone book) to reach residential numbers in search of sales or social information. Also, on rare occasions, people engaged in social engineering have used a form of this process to explore "gaps" in corporate phone listings to discover (and iden...
One who is skilled in the art of h4xlng(hacking). A real hacker does not commit malicious acts. One who does that is known as a cracker(this is not a lie) or a black hat h4x0rz.
Whats wrong with my computer! I need to call some h4x0rz!
|21.||hacking the system|
1. Something one does when one is fed up with the corporate machine / the establishment/ the man raping the world.
One may Hack the System by:
1. Hitting random keys on the keyboard for an extended period of time
2.Typing in "hack the system" anywhere on a computer
3. Pretending to be doing something on the computer during a montage
Dude, I totally brought down the establishment when I was hacking the system last night.