# _ _ _ __ ______
# | | | | __ _ ___| | _____ _ __ ___ \ \ / / ___|
# | |_| |/ _` |/ __| |/ / _ \ '__/ __| \ \ / /\___ \
# | _ | (_| | (__| < __/ | \__ \ \ V / ___) |
# |_| |_|\__,_|\___|_|\_\___|_| |___/ \_/ |____/
#
# ____ _
# / ___|_ __ __ _ ___| | _____ _ __ ___
# | | | '__/ _` |/ __| |/ / _ \ '__/ __|
# | |___| | | (_| | (__| < __/ | \__ \
# \____|_| \__,_|\___|_|\_\___|_| |___/
#
ATTENTION: Please be advised. The term “hacker” or “haxor” is ambiguious in meaning, and refers to many things. More accurately, all it means to hack something is to use it in a way in which it was not intended. For example, hacking a spatula could be something as mundane as using a spatula to scrape ice from a windshield. There are hacking groups throughout the world, they primarily have nothing to do with hacking things in which hollywood would have you think. In fact, they are rather boring and mostly deal with reverse engineering some product or software.
Phreaks are those who specialize in obtainning access or information from voice communications, primarily phone systems.
Crackers are those who spcialize in cracking passwords and gaining access to accounts or services that employ cryptography.