Random
Source Code

hacked

to have one's personal information compromised over the internet. this can include passwords, contact information, and even cred card numbers.

1. Alec had his Facebook account hacked, and now he's posting spam all over my wall.

2. Damn it! Some hacker just took my bank information. My credit score is screwed!

by wpk914 May 12, 2011

44πŸ‘ 25πŸ‘Ž


HACK

All the definitions here plus:
As an acronymn for Horses Ass Carrying Keys. Prison slang referring to a prison guard.

Put your pig sticker away. The HACK is coming!

by Dohmnuill December 30, 2005

298πŸ‘ 219πŸ‘Ž


hacks on

A phrase that derives from hackers in online gaming. It is used when someone accomplishes the seemingly impossible. Usually it's meant to be a compliment to the "hacker."

The phrase can be applied to all aspects of life, not just video games.

A: Did that guy really just catch a squrriel with his bare hands?
B: yeah man, hacks on.

by Shiny Zebra June 21, 2011

5πŸ‘ 1πŸ‘Ž


Hack

1) A writer/artist/movie director/etc. who does not give a shit about what they do, who just pumps it out to make a living, thus the work is uninspired and usually not very interesting.

2) To choke on something.

3) Sound made when someone chokes.

1) Some people consider Charles Bukowski to have been a hack. I say phooey to them.

2) Tom hacked on a peach pit.

3) "Hack! Hack! Hack!", Tom went.

by Dimestoreman December 28, 2010

13πŸ‘ 6πŸ‘Ž


hacking

continual play of drum licks after instructor has cut off group.

Quit hacking on those drums so we can go on!

by blueberry29 June 28, 2010

24πŸ‘ 14πŸ‘Ž


Hack

1. A person who has job so notorious to have faux experience and education they immediately qualify as a hack such as an aroma therapist, massage therapist, wedding planner, quantum physicist, self-prophicized shaman, sociologist adviser, color profiler or even those suspiciously expensive caterers.

2. Someone who couldn't get a job in the real world and overcharges for their self-employed services.

"No, you don't need magic lava rocks or green tea oil from some hackΒ - go see a real doctor."

"Why don't you just ask your group what they want instead of hiring some hack to do 'psychographic research'?"

"I am not going to wear a lemon-chartreuse dress just because some hack said it was good for my aura."

"If the yoga instructor feels you up again, you should just admit he's a hack looking for an excuse to get closer to you."

"So, the fortune teller said she could give you more information about your future, and all she needed were the numerological vibes from your social security card – that's not insight – that's called a hack."

"Featuring who? The girl's already got the cords to sing – she doesn't need some token hack rhyming in the background."

"You paid $200 a session for some vibrating hack to play the flute over your 'sacred crystal?!' If I paid $200 for a musician, they better well have studied at Julilliard and bring the entire New York Philharmonic with them… and I'm not going to be smoking no crystal!"

by NoHSDrama February 22, 2010

15πŸ‘ 8πŸ‘Ž


hacking

Hacking is a broad term used to describe many complex activities wherein the end goal is typically to obtain access to a computer system's servers, database(s), or stored files. This access may be any combination or desired or undesired, and legal or illegal.

Legal and condoned hacking is known as "white hat" hacking, and is used to test the security of a given computer network by hiring an individual or group of individuals to try to break in to it electronically, in order to determine the network's flaws or lack thereof.

Illegal or unwanted hacking is known as "black hat" hacking, however the term "cracking" is often used to describe malicious or malevolent hacking in which the end goal is to cause damage to the integrity of the targeted computers, whether to destroy, copy, or modify files, or possibly to install easy routes back into the system known as "backdoors".

Not all condoned hacking is legal, however. For example, if Jim's friend challenges him to hack or crack into his home computer, and Jim does so, it is still technically illegal despite the consent of his friend. Legal hacking (in the United States of America) needs to be approved with paperwork and status of employment; hobbyist hacking is generally always illegal.

Techniques for hacking vary intensely, and can incorporate activities including, but not limited to, creating pieces of software designed the circumvent (or falsely authenticate) the security in place in a given targeted computer network, creating pieces of hardware designed to do virtually the same thing known as "dongles", social engineering (a favored form of the famous hacker Kevin Mitnick), exploiting known or unknown (and subsequently discovered) bugs or flaws in the software that handles authentication to a given network, and other more obscure and clever methods.

Hacking can also refer simply to toying with computers and other electronic equipment in order to get them to do something they aren't supposed to do. This is the original and most true sense of the word, and is usually done for pleasure, amusement, proof of concept, or simply to exercise the brain. This type of hacking is generally harmless, and can even result in advances in current technology.

Unfortunately, the modern media has given hackers a poor portrayal, typically insinuating or outright stating that they are concerned with malicious destruction of electronic property, or even making accusations of cyber-terrorism. This sort of activity is more realistically descriptive of the cracking community (such as script kiddies), as true hackers do not typically ever hold the intent to cause harm, but engage in the activity for enjoyment, intellectual stimulation, or simply to surmount an obstacle. The goal is usually little more than obtaining access; once inside the system, a hacker's interests rapidly decline, as he or she has no intention to modify, copy, or destroy the files therein.

Hollywood has also given hackers an unrealistic image, portraying fancy graphics and unrealistic execution of the hacking in general. However, some movies have shown true tools or programs that real hackers have been known to use, such as the tool nmap.

Demographical data for true hackers is difficult to obtain, given their usually secretive nature, however the majority of hacking communities (such as 2600) indicate a much greater presence of males than females.

Most of us around the cafΓ© here are into hacking, although some just like to watch.

He was caught hacking into a major government computer system and is currently pending trial after being arrested that same day.

by JoshM June 15, 2006

48πŸ‘ 35πŸ‘Ž