What is Hacking: Definition and 25 Discussions

A computer hacker is a computer expert who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term hacker has become associated in popular culture with a security hacker – someone who utilizes their technical know-how of bugs or exploits to break into computer systems and access data which would otherwise be unavailable to them – hacking can also be utilized by legitimate figures in legal situations. For example, law enforcement agencies sometimes use hacking techniques in order to collect evidence on criminals and other malicious actors. This could include using anonymity tools (such as a VPN, or the dark web) to mask their identities online, posing as criminals themselves. Likewise, covert world agencies can employ hacking techniques in the legal conduct of their work. Oppositely, hacking and cyber-attacks are used extra- and illegally by law enforcement and security agencies (conducting warrantless activities), and employed by State actors as a weapon of both legal and illegal warfare.

View More On Wikipedia.org
  1. W

    Just received a Hacking Threat by email

    Here's an email I received today, from
  2. W

    More Hacking Threats. NSA Reports....

    I was trying to post this in a similar recent related, but could not find it: https://www.forbes.com/sites/daveywinder/2019/06/07/nsa-warns-microsoft-windows-users-update-now-or-face-devastating-damage/?utm_source=quora&utm_medium=referral#75ea7ef93aa0 I am not tech--savvy-enough to make a...
  3. jedishrfu

    SmarterEveryDay on Youtube Video Algorithm Hacking

    SmarterEveryDay is posting a series of videos (this is the first one) on Youtube Video Identification hacking, what it is and how it affects what we see online. Its really good even though the notion of manipulating the Youtube algorithm is very disturbing.
  4. BillTre

    Biological Hacking of Computers

    I didn't know whether to put this in Biology and Medical or in Programing and Computer Science so I am putting it in General Discussion. This article from Wired describes U. of Washington group that has produced a piece of DNA that when sequenced in a particular sequencing machine can produce a...
  5. nomadreid

    Why doesn't public key encryption stop hackers?

    This is a question from a total non-specialist: I can't write or even read code; I just follow the mathematical underpinnings. The public key encryption schemes seem almost unbreakable, theoretically (until quantum computers come along), so what is it that allows hackers to hack one's email, for...
  6. ISamson

    Anyone know any good basic hacking books?

    Hello. I have been looking for some learn-to-hack resources. I have Kali-linux VM, firewall, proxy and terminal. My teacher tells me that he learned to hack and technology by reading hacking books. He did not mention any. I had a google around for some. Some cost too much or do not have many...
  7. ISamson

    Hacking: Legal and Ethical Problems

    On the weekend I have participated in a hacking and cybersecurity competition. We were assigned some capture the flag challenges in teams and we had an awesome weekend of hacking! My teammate and I have won the high school division and as a prize we get a Wi-fi Pineapple Nano Basic. This is a...
  8. ISamson

    Can Anyone Hack? Exploring the Truth Behind Hacking

    Hello. During a session at my Coderdojo club at my school I asked a teacher if he could hack. He answered "Easy, many people can...". Is this true? I was also wondering if most hacking is done with the application 'Terminal'.:smile: Thanks.
  9. D

    Studying Learning programming from scratch for phone apps

    I wish to be able to create android and iphone games and apps but currently know nothing about programming. With this in mind, what do you suggest doing first in a form that you suggest the programming language i start learning first, textbook that i should use and program that i will write on...
  10. Astronuc

    News China hacking US government emails

    Read more: http://www.businessinsider.com/china-reading-top-obama-administration-emails-since-2010-2015-8#ixzz3iemYeAUS China Read Emails of Top U.S. Officials http://www.nbcnews.com/news/us-news/china-read-emails-top-us-officials-n406046
  11. S

    Double the Protection: 3-D Printed Robot Cracks Combination Locks in 30 Seconds

    If any PF members use combination locks to secure valuables, you might want to re-think your security measures protecting those treasures: http://www.wired.com/2015/05/little-3-d-printed-robot-cracks-combination-locks-30-seconds/ A hacker has developed an Arduino-based combo-lock picker which...
  12. A

    What is hacking in networking?

    I understand some of the things that hackers can do like sending a malicious application when I download something. That application can steal me data, mess with my computer etc. Is this the only way hacking can be done? You can't really access someone's else's server and look at their data...
  13. O

    Hi all, i have been a member of a few IT and hacking forums but they

    Hi all, i have been a member of a few IT and hacking forums but they always get full of arrogant little kids who seem to have nothing better to do than to wind me up. Then I found this place, by no means am I a physicist (got A* in science GCSE then joined the army...) however I am hoping to...
  14. J

    How to start hacking electronics

    got my hands on a keychain-lcd-picture frame thingy there are 30 pins! how do i figure out what pin does what? thanks!
  15. S

    NES Soundcard Hacking: 8/16 Step Sequencer?

    How hard would it be to pull the sound card out of an old NES game system and build a 8 or 16 step sequencer for it. Building the sequencer would be no prob, but I'm just curious as to how complicated that NES sound card is. I have a couple of NESs at my parents house, but I don't want to make...
  16. M

    Is it possible to stop hacking?

    Is it theoretically possible to make software and hardware that is completely hacker proof? Why do we have this problem? Is it the architecture of the hardware that allows hacking or is it purely software? I don't understand why this problem is allowed to continue. Hackers cause immense damage...
  17. V

    Hacking Quantum Unbreakable Randomness Scrambler

    According to Nick Herbert in Quantum Reality: "Even if we believe (with the support of Bell's theorem) in universal superluminal links, we must face the possibility that such links are private lines accessible to the workings of nature alone, and are blocked to human use by an undecipherable...
  18. J

    Hack an Old Chiller: Is It Possible?

    I'm considering using an old chiller for a research project. It's a simple application, maintaining a bath of water at various constant or slowly varying temperatures. Unfortunately, since it's an http://www.thermo.com/com/cda/product/detail/1,,1000001155238,00.html", it doesn't have any...
  19. T

    Curious questions about comptuer hacking

    I am not a computer hacker, and have absolutely no idea how to do so. I was wondering just how mathematically mind-boggling that computer hacking is. Don't you have to make extremely complex and fast mental calculations and type in thousands of odd numbers at some kind of prompt? Do you have to...
  20. C

    Net Security & Encoding/Decoding Algorithms Explained

    Does anyone know how to? I don't mean crackers. Its hackers I want to talk to. Those who get it, know the difference. Whats net security all about? How do encoding/decoding algoithms work? How can you compress information and still retain the quality of it? I know avi/mpeg/vcd/wmp are all...
  21. E

    After hacking my school network, I have been offered an unofficial job

    I attend an Alternative school, which is a computer based curriculum. There have been several times where I was messing with their network in miscilanious ways :smile: I have been supspended, and even temporary transferred to another school for my activities. But everyone seems sympathetic...
  22. exequor

    Hacking applicants turned down by Stanford

    I still don't get the reason for turning down their applications, maybe if they did something to influence their admissions decision I would understand.
  23. D

    Learn Hacking Bluetooth This Summer

    I saw this and I thought that just learning about bluetooth and how to mess with it would be really fun this summer. maybe its just the sniper rifle, but it made learning about bluetooth sound really fun :biggrin: Anyway, I was wondering if anyone could point me in the right direction to...
  24. Loren Booda

    Does Changing Alphanumeric Passwords Frequently Deter Random Hacking Attempts?

    I have been told to change alphanumeric passwords every so often to avoid someone hacking into a website. Suppose hacking occurs only by trying randomly sequences of numbers and letters to break into the site. Would my changing passwords have any effect, on average, of the site being hacked...
  25. E

    Is There a Universal Algorithm for Hacking the Female Mind?

    Recently, I was sent a SPAM entitled learn the kiss test. Apparently, these people believe they have a universal algorithm for determining the right time to kiss a girl. Although, I believe there exists a certain algorithm for getting intimate with any female, I believe all females are unique...