Skip to main content
The anime series about twin siblings named Shugo and Rena, who both won Kite and Blackrose (The Legendary dot hackers) from a Character Campaign that wasn't created by the CC corporation. When Shugo died for the 1st time, he gets the Twilight Bracelett from Aura. His Bracelete does "Data Drain".
Shugo is much more cool than Komiyana the 3rd.
by Tsukasa431 November 19, 2004
mugGet the .hack//Legend of the Twilight mug.

Hood C.Hacker

A computer hacker from the ghetto, projects also known as the hood's computer genius. This guy is usually very thuggish looking and not what you would expect in a computer hacker. Hood C. Hacker is not the average nerd you want to start pushing around , but a mixture of rapper Dmx meets Bill Gates in one person.
Hood C.Hacker needs to help me crack this password to that website yo!
by Jimmini Spittit September 25, 2011
mugGet the Hood C.Hacker mug.

Black Hack

The name given, in Glasgow at least, to a Black Hackney Taxi Cab. You know, the stereo-typical taxi that you see in London. They are the biggest rip off you'll encounter after a night out on the town, charging at least £20 for a 4 mile journey, claiming that there is a "Boundary Charge" and you've just travelled through three boundaries. Which is complete bollocks, and I should know, as my wee brother works for the company that paints them, and he knows FOR A FACT that there is no legal precedence for the "Boundary Charge". So if you're ever in the UK, NEVER get a Black Hack. Go for a local firm, they're usually half price.
"Man, I ended up walking half-way home last night, the Black Hack raped a hole in my wallet before I left the city centre!"
by Unwept, the Lone Magpie September 11, 2005
mugGet the Black Hack mug.

Old Lady Hack

Old Lady Hack - (also called Tonsilith or Tonsil Stone) are caused by of any of the following getting stuck in the tonsils:

* food particles
* dead white blood cells
* oral bacteria

They are described as having a nasty odor like halitosis concentrated into a small stone. They look like cottage cheese in color and texture.
Small white pellets from back of throat being coughed/appearing up in your mouth these are old lady hacks.
by SamEureka October 31, 2008
mugGet the Old Lady Hack mug.

Hacking your moodle

A horribly heinous sexual act in which a man (or woman) 'hacks' the females 'moodle'. Can occur in many different ways, for example:
Cindy: Ahmed's hacked my moodle!
Everyone: How could he! :O

Ahmed: Hey Cindy, I'm hacking your moodle.
Cindy: Where's your computer?
by thesemendemon. November 29, 2011
mugGet the Hacking your moodle mug.

Hack is Wack

Snoop dog's desperate attempt to resist a changing market place by starting a rap competition to write a song about the horrors of file sharing.
Considering Hack is Wack, Snoop Dog might be the biggest music industry sell-out since Metallica.
by WackHack September 1, 2010
mugGet the Hack is Wack mug.

hacking

Hacking is a broad term used to describe many complex activities wherein the end goal is typically to obtain access to a computer system's servers, database(s), or stored files. This access may be any combination or desired or undesired, and legal or illegal.

Legal and condoned hacking is known as "white hat" hacking, and is used to test the security of a given computer network by hiring an individual or group of individuals to try to break in to it electronically, in order to determine the network's flaws or lack thereof.

Illegal or unwanted hacking is known as "black hat" hacking, however the term "cracking" is often used to describe malicious or malevolent hacking in which the end goal is to cause damage to the integrity of the targeted computers, whether to destroy, copy, or modify files, or possibly to install easy routes back into the system known as "backdoors".

Not all condoned hacking is legal, however. For example, if Jim's friend challenges him to hack or crack into his home computer, and Jim does so, it is still technically illegal despite the consent of his friend. Legal hacking (in the United States of America) needs to be approved with paperwork and status of employment; hobbyist hacking is generally always illegal.

Techniques for hacking vary intensely, and can incorporate activities including, but not limited to, creating pieces of software designed the circumvent (or falsely authenticate) the security in place in a given targeted computer network, creating pieces of hardware designed to do virtually the same thing known as "dongles", social engineering (a favored form of the famous hacker Kevin Mitnick), exploiting known or unknown (and subsequently discovered) bugs or flaws in the software that handles authentication to a given network, and other more obscure and clever methods.

Hacking can also refer simply to toying with computers and other electronic equipment in order to get them to do something they aren't supposed to do. This is the original and most true sense of the word, and is usually done for pleasure, amusement, proof of concept, or simply to exercise the brain. This type of hacking is generally harmless, and can even result in advances in current technology.

Unfortunately, the modern media has given hackers a poor portrayal, typically insinuating or outright stating that they are concerned with malicious destruction of electronic property, or even making accusations of cyber-terrorism. This sort of activity is more realistically descriptive of the cracking community (such as script kiddies), as true hackers do not typically ever hold the intent to cause harm, but engage in the activity for enjoyment, intellectual stimulation, or simply to surmount an obstacle. The goal is usually little more than obtaining access; once inside the system, a hacker's interests rapidly decline, as he or she has no intention to modify, copy, or destroy the files therein.

Hollywood has also given hackers an unrealistic image, portraying fancy graphics and unrealistic execution of the hacking in general. However, some movies have shown true tools or programs that real hackers have been known to use, such as the tool nmap.

Demographical data for true hackers is difficult to obtain, given their usually secretive nature, however the majority of hacking communities (such as 2600) indicate a much greater presence of males than females.
Most of us around the café here are into hacking, although some just like to watch.

He was caught hacking into a major government computer system and is currently pending trial after being arrested that same day.
by JoshM September 1, 2008
mugGet the hacking mug.

Share this definition

Sign in to vote

We'll email you a link to sign in instantly.

Or

Check your email

We sent a link to

Open your email