verb or action.
1. Any complex task, often that requires monumental manual dexterity. ALT: Can be used sarcasticlly when a task is so easy that even an idiot can complete it.
2. When a person types really fast, often in a faux important or funny way.
1. Any complex task, often that requires monumental manual dexterity. ALT: Can be used sarcasticlly when a task is so easy that even an idiot can complete it.
2. When a person types really fast, often in a faux important or funny way.
1. Can I get my cup of black coffee now!? I mean, I'm not asking you to hack the Matrix or anything.
2. Person A: Dude, he looks like he's really doing a lot of work.
Person B: Yeah, you'd think he was hacking the Matrix the way he's typing.
2. Person A: Dude, he looks like he's really doing a lot of work.
Person B: Yeah, you'd think he was hacking the Matrix the way he's typing.
by PJPlayer1 April 5, 2006
Get the hacking the matrix mug.when one person cuts a small incision in a male's ball sack, then inserts a straw in the incision and slowly sucks out small amounts of sperm at a time.
"dude why is evan walking weird?"
"i heard Karla was hacking his sack last night and hacked to much out of him."
"niiiice."
Ashleigh: "Omg Brittney did you SEE how small Johnny's balls where during swimming?"
Brittney: "yahh i could totally see that thu his speedo"
Jessica: "dude no it's usually a lot bigger but yesturday when i was hacking his sack, his mom walked in and i hacked waaay too hard!"
Brittney and Ashleigh: "Oh Brittney you just love hacking the sack!!"
"i heard Karla was hacking his sack last night and hacked to much out of him."
"niiiice."
Ashleigh: "Omg Brittney did you SEE how small Johnny's balls where during swimming?"
Brittney: "yahh i could totally see that thu his speedo"
Jessica: "dude no it's usually a lot bigger but yesturday when i was hacking his sack, his mom walked in and i hacked waaay too hard!"
Brittney and Ashleigh: "Oh Brittney you just love hacking the sack!!"
by Hackey Sackers691 March 26, 2010
Get the hacking the sack mug.Related Words
Hackio
• hacking
• hackin
• hacking the mainframe
• HackForums
• hacksor
• HACIOUS
• HackBook Pro
• Hackis
• hackingminecraft
Hacking.rs is a hacking forum using vBulletin based around the popular MMORPG game: Runescape. This site is full of little skids who think they are tough enough to crack the CIA. However, all they seem to do is steal Runescape currency and sell it for an in real life for a personal gain.
Their most popular feature is their Shoutbox. The shoutbox is full of new comers to the website screaming and spamming on how to hack RuneScape for infinite money and level hacks. And they dont take "It isnt possible" for an answer.
The current owner of Hacking.rs :Legend,who was previously only a moderator, bought the domain after leaving Hacking.rs to run another website, which didn't take off to well. Previous owners such as Jare, and Hawx: were disgusting owners, scamming and deceiving their members for high value giveaways. Jare tried to scam the website from co-owner (or so i am told): Hawx. However, he was unsuccessful. Apparently, Hawx then scammed many people who tried to buy the domain.
In a recent popularity thread (Unsure if this is actually 100% true or not) Some members were voted on a scale from best (Being #1) to worst (#10). This list is:
1.Nefarious
2.Tomynho
3.Legend
4.AutoJizzerPro
5.VariedSkill
6.Mjau
7.Hentai
8.ChooChoo
9.Parashite
10.Jare
The forum is usually DDoS attacked by members using Jay's Booter (a free tool from a popular hacking website) who get banned. Hacking.rs competes along side sites such as BA, and WeHack.RS (LOL!)
Their most popular feature is their Shoutbox. The shoutbox is full of new comers to the website screaming and spamming on how to hack RuneScape for infinite money and level hacks. And they dont take "It isnt possible" for an answer.
The current owner of Hacking.rs :Legend,who was previously only a moderator, bought the domain after leaving Hacking.rs to run another website, which didn't take off to well. Previous owners such as Jare, and Hawx: were disgusting owners, scamming and deceiving their members for high value giveaways. Jare tried to scam the website from co-owner (or so i am told): Hawx. However, he was unsuccessful. Apparently, Hawx then scammed many people who tried to buy the domain.
In a recent popularity thread (Unsure if this is actually 100% true or not) Some members were voted on a scale from best (Being #1) to worst (#10). This list is:
1.Nefarious
2.Tomynho
3.Legend
4.AutoJizzerPro
5.VariedSkill
6.Mjau
7.Hentai
8.ChooChoo
9.Parashite
10.Jare
The forum is usually DDoS attacked by members using Jay's Booter (a free tool from a popular hacking website) who get banned. Hacking.rs competes along side sites such as BA, and WeHack.RS (LOL!)
Person 1: Bro, im gonna go on Hacking.RS and see if they will heck my RoonSkaypez account n givez me unlimit moniez if i give them $1 Paypal
Person 2: Get dem to heck myn account 2 m8 ill give u 250k rsgp
person 1: fuk u mudda fukka get dem 2 heck ur own account
Person 2: no cos Jare banned me cause i was a member of WeHack.rs
Person 1: too bad noob
Person 2: Get dem to heck myn account 2 m8 ill give u 250k rsgp
person 1: fuk u mudda fukka get dem 2 heck ur own account
Person 2: no cos Jare banned me cause i was a member of WeHack.rs
Person 1: too bad noob
by I <3 HRS August 17, 2012
Get the Hacking.rs mug.Used in place of h4xx0r.
1) Used when you don't feel like being l337 or if you go for the minimalist charm eg: "lawl" "roffle".
2) When something that was good gets ruined.
1) Used when you don't feel like being l337 or if you go for the minimalist charm eg: "lawl" "roffle".
2) When something that was good gets ruined.
by dj_blueshift May 2, 2004
Get the hacksor mug.by blueberry29 July 1, 2010
Get the hacking mug.A horribly heinous sexual act in which a man (or woman) 'hacks' the females 'moodle'. Can occur in many different ways, for example:
Cindy: Ahmed's hacked my moodle!
Everyone: How could he! :O
Ahmed: Hey Cindy, I'm hacking your moodle.
Cindy: Where's your computer?
Everyone: How could he! :O
Ahmed: Hey Cindy, I'm hacking your moodle.
Cindy: Where's your computer?
by thesemendemon. November 29, 2011
Get the Hacking your moodle mug.Hacking is a broad term used to describe many complex activities wherein the end goal is typically to obtain access to a computer system's servers, database(s), or stored files. This access may be any combination or desired or undesired, and legal or illegal.
Legal and condoned hacking is known as "white hat" hacking, and is used to test the security of a given computer network by hiring an individual or group of individuals to try to break in to it electronically, in order to determine the network's flaws or lack thereof.
Illegal or unwanted hacking is known as "black hat" hacking, however the term "cracking" is often used to describe malicious or malevolent hacking in which the end goal is to cause damage to the integrity of the targeted computers, whether to destroy, copy, or modify files, or possibly to install easy routes back into the system known as "backdoors".
Not all condoned hacking is legal, however. For example, if Jim's friend challenges him to hack or crack into his home computer, and Jim does so, it is still technically illegal despite the consent of his friend. Legal hacking (in the United States of America) needs to be approved with paperwork and status of employment; hobbyist hacking is generally always illegal.
Techniques for hacking vary intensely, and can incorporate activities including, but not limited to, creating pieces of software designed the circumvent (or falsely authenticate) the security in place in a given targeted computer network, creating pieces of hardware designed to do virtually the same thing known as "dongles", social engineering (a favored form of the famous hacker Kevin Mitnick), exploiting known or unknown (and subsequently discovered) bugs or flaws in the software that handles authentication to a given network, and other more obscure and clever methods.
Hacking can also refer simply to toying with computers and other electronic equipment in order to get them to do something they aren't supposed to do. This is the original and most true sense of the word, and is usually done for pleasure, amusement, proof of concept, or simply to exercise the brain. This type of hacking is generally harmless, and can even result in advances in current technology.
Unfortunately, the modern media has given hackers a poor portrayal, typically insinuating or outright stating that they are concerned with malicious destruction of electronic property, or even making accusations of cyber-terrorism. This sort of activity is more realistically descriptive of the cracking community (such as script kiddies), as true hackers do not typically ever hold the intent to cause harm, but engage in the activity for enjoyment, intellectual stimulation, or simply to surmount an obstacle. The goal is usually little more than obtaining access; once inside the system, a hacker's interests rapidly decline, as he or she has no intention to modify, copy, or destroy the files therein.
Hollywood has also given hackers an unrealistic image, portraying fancy graphics and unrealistic execution of the hacking in general. However, some movies have shown true tools or programs that real hackers have been known to use, such as the tool nmap.
Demographical data for true hackers is difficult to obtain, given their usually secretive nature, however the majority of hacking communities (such as 2600) indicate a much greater presence of males than females.
Legal and condoned hacking is known as "white hat" hacking, and is used to test the security of a given computer network by hiring an individual or group of individuals to try to break in to it electronically, in order to determine the network's flaws or lack thereof.
Illegal or unwanted hacking is known as "black hat" hacking, however the term "cracking" is often used to describe malicious or malevolent hacking in which the end goal is to cause damage to the integrity of the targeted computers, whether to destroy, copy, or modify files, or possibly to install easy routes back into the system known as "backdoors".
Not all condoned hacking is legal, however. For example, if Jim's friend challenges him to hack or crack into his home computer, and Jim does so, it is still technically illegal despite the consent of his friend. Legal hacking (in the United States of America) needs to be approved with paperwork and status of employment; hobbyist hacking is generally always illegal.
Techniques for hacking vary intensely, and can incorporate activities including, but not limited to, creating pieces of software designed the circumvent (or falsely authenticate) the security in place in a given targeted computer network, creating pieces of hardware designed to do virtually the same thing known as "dongles", social engineering (a favored form of the famous hacker Kevin Mitnick), exploiting known or unknown (and subsequently discovered) bugs or flaws in the software that handles authentication to a given network, and other more obscure and clever methods.
Hacking can also refer simply to toying with computers and other electronic equipment in order to get them to do something they aren't supposed to do. This is the original and most true sense of the word, and is usually done for pleasure, amusement, proof of concept, or simply to exercise the brain. This type of hacking is generally harmless, and can even result in advances in current technology.
Unfortunately, the modern media has given hackers a poor portrayal, typically insinuating or outright stating that they are concerned with malicious destruction of electronic property, or even making accusations of cyber-terrorism. This sort of activity is more realistically descriptive of the cracking community (such as script kiddies), as true hackers do not typically ever hold the intent to cause harm, but engage in the activity for enjoyment, intellectual stimulation, or simply to surmount an obstacle. The goal is usually little more than obtaining access; once inside the system, a hacker's interests rapidly decline, as he or she has no intention to modify, copy, or destroy the files therein.
Hollywood has also given hackers an unrealistic image, portraying fancy graphics and unrealistic execution of the hacking in general. However, some movies have shown true tools or programs that real hackers have been known to use, such as the tool nmap.
Demographical data for true hackers is difficult to obtain, given their usually secretive nature, however the majority of hacking communities (such as 2600) indicate a much greater presence of males than females.
Most of us around the café here are into hacking, although some just like to watch.
He was caught hacking into a major government computer system and is currently pending trial after being arrested that same day.
He was caught hacking into a major government computer system and is currently pending trial after being arrested that same day.
by JoshM September 1, 2008
Get the hacking mug.