A horribly heinous sexual act in which a man (or woman) 'hacks' the females 'moodle'. Can occur in many different ways, for example:
Cindy: Ahmed's hacked my moodle!
Everyone: How could he! :O
Ahmed: Hey Cindy, I'm hacking your moodle.
Cindy: Where's your computer?
Everyone: How could he! :O
Ahmed: Hey Cindy, I'm hacking your moodle.
Cindy: Where's your computer?
by thesemendemon. November 29, 2011
Get the Hacking your moodle mug.To Stephen Hawking is to rectally ingest heroin by way of an opiate enema. A traditional Stephen Hawking consists of soaking a tampon in a White China/water blend (one should stay hydrated while traversing the universe) and simply inserting it into the rectum. Hawkinging is known to start with lower body paralysis while leading to a cationic/drooling state. Hawkinging is aptly named due to the heroin crossing through a "black hole" and then taking one to a different dimension.
Often practiced in a wheelchair with Cosmos or Dark Side of the Moon playing in the background, Stephen is alleged to prefer Jim Carey movies or N.W.A. Hawkinging has led to many similar methods such as the "Uranus" or "downer dog" where one assumes downward dog and has liquid heroin dripped into the anus. In order to relate to Hawkining, heroin must cross "the event horizon" through the "black hole". This is why "Sheening the Sphincter" falls under the Hawkinging umbrella despite the heroin being taken in powder form.
Hawkinging's alleged cultural impacts include the Phillip Seymour Hoffman's passing due to "black tar" substitution and Ted Cruz's smile.
Often practiced in a wheelchair with Cosmos or Dark Side of the Moon playing in the background, Stephen is alleged to prefer Jim Carey movies or N.W.A. Hawkinging has led to many similar methods such as the "Uranus" or "downer dog" where one assumes downward dog and has liquid heroin dripped into the anus. In order to relate to Hawkining, heroin must cross "the event horizon" through the "black hole". This is why "Sheening the Sphincter" falls under the Hawkinging umbrella despite the heroin being taken in powder form.
Hawkinging's alleged cultural impacts include the Phillip Seymour Hoffman's passing due to "black tar" substitution and Ted Cruz's smile.
by NotTheZodiacKiller June 29, 2016
Get the Stephen Hawking mug.Related Words
newest phenomena in Facebook profile picture photography where the subject is suspended from an inanimate and creative object. This is in response to the outbreak of "planking" photography that has swept Europe and the United States.
Gerald's hanking picture is so much better than the planking picture Brent made on the refrigerator, planking is so five minutes ago.
by McGerald July 7, 2011
Get the hanking mug.Hacking is a broad term used to describe many complex activities wherein the end goal is typically to obtain access to a computer system's servers, database(s), or stored files. This access may be any combination or desired or undesired, and legal or illegal.
Legal and condoned hacking is known as "white hat" hacking, and is used to test the security of a given computer network by hiring an individual or group of individuals to try to break in to it electronically, in order to determine the network's flaws or lack thereof.
Illegal or unwanted hacking is known as "black hat" hacking, however the term "cracking" is often used to describe malicious or malevolent hacking in which the end goal is to cause damage to the integrity of the targeted computers, whether to destroy, copy, or modify files, or possibly to install easy routes back into the system known as "backdoors".
Not all condoned hacking is legal, however. For example, if Jim's friend challenges him to hack or crack into his home computer, and Jim does so, it is still technically illegal despite the consent of his friend. Legal hacking (in the United States of America) needs to be approved with paperwork and status of employment; hobbyist hacking is generally always illegal.
Techniques for hacking vary intensely, and can incorporate activities including, but not limited to, creating pieces of software designed the circumvent (or falsely authenticate) the security in place in a given targeted computer network, creating pieces of hardware designed to do virtually the same thing known as "dongles", social engineering (a favored form of the famous hacker Kevin Mitnick), exploiting known or unknown (and subsequently discovered) bugs or flaws in the software that handles authentication to a given network, and other more obscure and clever methods.
Hacking can also refer simply to toying with computers and other electronic equipment in order to get them to do something they aren't supposed to do. This is the original and most true sense of the word, and is usually done for pleasure, amusement, proof of concept, or simply to exercise the brain. This type of hacking is generally harmless, and can even result in advances in current technology.
Unfortunately, the modern media has given hackers a poor portrayal, typically insinuating or outright stating that they are concerned with malicious destruction of electronic property, or even making accusations of cyber-terrorism. This sort of activity is more realistically descriptive of the cracking community (such as script kiddies), as true hackers do not typically ever hold the intent to cause harm, but engage in the activity for enjoyment, intellectual stimulation, or simply to surmount an obstacle. The goal is usually little more than obtaining access; once inside the system, a hacker's interests rapidly decline, as he or she has no intention to modify, copy, or destroy the files therein.
Hollywood has also given hackers an unrealistic image, portraying fancy graphics and unrealistic execution of the hacking in general. However, some movies have shown true tools or programs that real hackers have been known to use, such as the tool nmap.
Demographical data for true hackers is difficult to obtain, given their usually secretive nature, however the majority of hacking communities (such as 2600) indicate a much greater presence of males than females.
Legal and condoned hacking is known as "white hat" hacking, and is used to test the security of a given computer network by hiring an individual or group of individuals to try to break in to it electronically, in order to determine the network's flaws or lack thereof.
Illegal or unwanted hacking is known as "black hat" hacking, however the term "cracking" is often used to describe malicious or malevolent hacking in which the end goal is to cause damage to the integrity of the targeted computers, whether to destroy, copy, or modify files, or possibly to install easy routes back into the system known as "backdoors".
Not all condoned hacking is legal, however. For example, if Jim's friend challenges him to hack or crack into his home computer, and Jim does so, it is still technically illegal despite the consent of his friend. Legal hacking (in the United States of America) needs to be approved with paperwork and status of employment; hobbyist hacking is generally always illegal.
Techniques for hacking vary intensely, and can incorporate activities including, but not limited to, creating pieces of software designed the circumvent (or falsely authenticate) the security in place in a given targeted computer network, creating pieces of hardware designed to do virtually the same thing known as "dongles", social engineering (a favored form of the famous hacker Kevin Mitnick), exploiting known or unknown (and subsequently discovered) bugs or flaws in the software that handles authentication to a given network, and other more obscure and clever methods.
Hacking can also refer simply to toying with computers and other electronic equipment in order to get them to do something they aren't supposed to do. This is the original and most true sense of the word, and is usually done for pleasure, amusement, proof of concept, or simply to exercise the brain. This type of hacking is generally harmless, and can even result in advances in current technology.
Unfortunately, the modern media has given hackers a poor portrayal, typically insinuating or outright stating that they are concerned with malicious destruction of electronic property, or even making accusations of cyber-terrorism. This sort of activity is more realistically descriptive of the cracking community (such as script kiddies), as true hackers do not typically ever hold the intent to cause harm, but engage in the activity for enjoyment, intellectual stimulation, or simply to surmount an obstacle. The goal is usually little more than obtaining access; once inside the system, a hacker's interests rapidly decline, as he or she has no intention to modify, copy, or destroy the files therein.
Hollywood has also given hackers an unrealistic image, portraying fancy graphics and unrealistic execution of the hacking in general. However, some movies have shown true tools or programs that real hackers have been known to use, such as the tool nmap.
Demographical data for true hackers is difficult to obtain, given their usually secretive nature, however the majority of hacking communities (such as 2600) indicate a much greater presence of males than females.
Most of us around the café here are into hacking, although some just like to watch.
He was caught hacking into a major government computer system and is currently pending trial after being arrested that same day.
He was caught hacking into a major government computer system and is currently pending trial after being arrested that same day.
by JoshM September 1, 2008
Get the hacking mug.Cocktail, of such potent voracity it is known to render the consumer slack faced, unable to enunciate and generally in need of personal one on one care.
Must be served in a traditional dimpled English 'Pint Pot'
The Stephen Hawking is a base of mixed spirits :- Whisky, Gin, Malibu, Vodka. To serve you must up-end three bottles of alcopops (Smirnof Mule, White Lightening, WKD etc.) into the pot and let them syphon out as you consume the lot through a pink straw.
You'll be no closer to being a brillant astro and theoretical physicist but in every other aspect you'll be indistinguishable from the great man himself.
Must be served in a traditional dimpled English 'Pint Pot'
The Stephen Hawking is a base of mixed spirits :- Whisky, Gin, Malibu, Vodka. To serve you must up-end three bottles of alcopops (Smirnof Mule, White Lightening, WKD etc.) into the pot and let them syphon out as you consume the lot through a pink straw.
You'll be no closer to being a brillant astro and theoretical physicist but in every other aspect you'll be indistinguishable from the great man himself.
He was shitfaced after just one Stephen Hawking.
One Stephen Hawking is enough to put a lesser man in a coma.
On balance, it would be a bad idea for the Stephen Hawking to have a Stephen Hawking
One Stephen Hawking is enough to put a lesser man in a coma.
On balance, it would be a bad idea for the Stephen Hawking to have a Stephen Hawking
by Linnetfan November 4, 2011
Get the Stephen Hawking mug.by IBeenDrankinWatermelon September 1, 2014
Get the Hacking Your Twatter mug.A way to get through life by taking on obstacles and difficulties head-on and not giving up even in the face of repeated failures. A synonym for keep grinding. life, keep grinding, grinding, determination, challenge, grit, sticktoitiveness, persevere, never give up, banging
by joecoolthefool July 31, 2016
Get the Hacking and whacking mug.