<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-3151033045260588471</id><updated>2024-09-27T18:18:09.259-07:00</updated><title type='text'>Hacking</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://newsecretofhacking.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3151033045260588471/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://newsecretofhacking.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>5</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-3151033045260588471.post-5539110163524499570</id><published>2012-08-06T02:52:00.002-07:00</published><updated>2012-09-09T11:42:17.465-07:00</updated><title type='text'>Samsung Secret Codes</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;color: black;&quot;&gt; &lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: #006600;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;#*4773# Incremental Redundancy&lt;br /&gt;
#*7785# Reset wakeup &amp;amp; RTK timer  cariables/variables&lt;br /&gt;
#*7200# &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD5&quot;&gt;Tone&lt;/span&gt; Generator Mute&lt;br /&gt;
#*3888# BLUETOOTH Test  mode&lt;br /&gt;
#*7828# Task screen&lt;br /&gt;
#*#8377466# S/W Version &amp;amp; H/W  Version&lt;br /&gt;
#*2562# Restarts Phone&lt;br /&gt;
#*2565# No Blocking? General  Defense.&lt;br /&gt;
#*3353# General Defense, Code Erased.&lt;br /&gt;
#*3837# Phone Hangs on  White screen.&lt;br /&gt;
#*3849# Restarts Phone&lt;br /&gt;
#*7337# Restarts Phone (Resets Wap  Settings)&lt;br /&gt;
#*2886# AutoAnswer ON/OFF&lt;br /&gt;
#*7288# GPRS  Detached/Attached&lt;br /&gt;
#*7287# GPRS Attached&lt;br /&gt;
#*7666# White Screen&lt;br /&gt;
#*7693#  Sleep Deactivate/Activate&lt;br /&gt;
#*2286# Databattery&lt;br /&gt;
#*2527# GPRS switching set  to (Class 4, 8, 9, 10)&lt;br /&gt;
#*2679# Copycat feature Activa/Deactivate&lt;br /&gt;
#*3940#  External looptest 9600 bps&lt;br /&gt;
#*4263# Handsfree mode  Activate/Deactivate&lt;br /&gt;
#*2558# Time ON&lt;br /&gt;
#*3941# External looptest 115200  bps&lt;br /&gt;
#*5176# L1 Sleep&lt;br /&gt;
#*7462# SIM Phase&lt;br /&gt;
#*7983# &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD2&quot;&gt;Voltage&lt;/span&gt;/Freq&lt;br /&gt;
#*7986#  Voltage&lt;br /&gt;
#*8466# Old Time&lt;br /&gt;
#*2255# Call Failed&lt;br /&gt;
#*5376# DELETE ALL  SMS!!!!&lt;br /&gt;
#*6837# Official Software Version: (0003000016000702)&lt;br /&gt;
#*2337#  Permanent Registration Beep&lt;br /&gt;
#*2474# Charging Duration&lt;br /&gt;
#*2834# Audio Path  (Handsfree)&lt;br /&gt;
#*3270# DCS Support Activate/Deactivate&lt;br /&gt;
#*3282# Data  Activate/Deactivate&lt;br /&gt;
#*3476# EGSM Activate/Deactivate&lt;br /&gt;
#*3676# FORMAT FLASH  VOLUME!!!&lt;br /&gt;
#*4760# GSM Activate/Deactivate&lt;br /&gt;
#*4864# White Screen&lt;br /&gt;
#*7326#  Accessory&lt;br /&gt;
#*7683# Sleep variable&lt;br /&gt;
#*3797# Blinks 3D030300 in RED&lt;br /&gt;
#*7372#  Resetting the time to DPB variables&lt;br /&gt;
#*3273# EGPRS multislot (Class 4, 8, 9,  10)&lt;br /&gt;
#*7722# RLC bitmap compression Activate/Deactivate&lt;br /&gt;
#*2351# Blinks  1347E201 in RED&lt;br /&gt;
#*2775# Switch to 2 inner speaker&lt;br /&gt;
#*7878# FirstStartup  (0=NO, 1=YES)&lt;br /&gt;
#*3838# Blinks 3D030300 in RED&lt;br /&gt;
#*2077# GPRS  Switch&lt;br /&gt;
#*2027# GPRS Switch&lt;br /&gt;
#*0227# GPRS Switch&lt;br /&gt;
#*0277# GPRS  Switch&lt;br /&gt;
#*22671# AMR REC START&lt;br /&gt;
#*22672# Stop AMR REC (File name:  /a/multimedia/sounds/voice list/ENGMODE.amr)&lt;br /&gt;
#*22673# Pause REC&lt;br /&gt;
#*22674#  Resume REC&lt;br /&gt;
#*22675# AMR Playback&lt;br /&gt;
#*22676# AMR Stop Play&lt;br /&gt;
#*22677# Pause  Play&lt;br /&gt;
#*22678# Resume Play&lt;br /&gt;
#*77261# PCM Rec Req&lt;br /&gt;
#*77262# Stop PCM  Rec&lt;br /&gt;
#*77263# PCM Playback&lt;br /&gt;
#*77264# PCM Stop Play&lt;br /&gt;
#*22679# AMR Get  Time&lt;br /&gt;
*#8999*364# Watchdog ON/OFF&lt;br /&gt;
*#8999*427# WATCHDOG signal route  setup&lt;br /&gt;
*2767*3855# = Full Reset (Caution every stored data will be  deleted.)&lt;br /&gt;
*2767*2878# = Custom Reset&lt;br /&gt;
*2767*927# = Wap  Reset&lt;br /&gt;
*2767*226372# = Camera Reset (deletes &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD12&quot;&gt;photos&lt;/span&gt;)&lt;br /&gt;
*2767*688# Reset  Mobile TV&lt;br /&gt;
#7263867# = RAM Dump (On or Off)&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://newsecretofhacking.blogspot.com/feeds/5539110163524499570/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://newsecretofhacking.blogspot.com/2012/08/samsung-secret-codes.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3151033045260588471/posts/default/5539110163524499570'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3151033045260588471/posts/default/5539110163524499570'/><link rel='alternate' type='text/html' href='http://newsecretofhacking.blogspot.com/2012/08/samsung-secret-codes.html' title='Samsung Secret Codes'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3151033045260588471.post-6260036611754762286</id><published>2012-08-06T02:47:00.000-07:00</published><updated>2012-08-06T02:47:03.272-07:00</updated><title type='text'>Nokia Secret Codes</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&lt;span lang=&quot;en-US&quot;&gt;Those who already heard of the  concept of &#39;Nokia Hacks&#39; or &#39;Nokia Secret Codes” are probably aware of  the fact that these tricks offer users interesting information about  their handset.&lt;/span&gt;&lt;span lang=&quot;en-US&quot;&gt;These codes have been  identified by people who are trying to improve their handsets with  tweaks. Using some of these codes can also enhance some of the functions  of the phone like the quality of the sound, as well as photos or even  videos recorded with the phone&#39;s camera.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span&gt;&lt;span lang=&quot;en-US&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #006600;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;*#7328748263373738# resets security code&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #006600;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Default security code is 12345&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #006600;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #006600;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Press *#3925538# to delete the contents and code of wallet.&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;
&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #006600;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;*#&lt;/span&gt;&lt;span style=&quot;color: black;&quot;&gt;92702689# - takes you to a secret menu where you may find some of the information below:&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #006600;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;1.&lt;/span&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;b&gt;Displays Serial Number&lt;/b&gt;.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #006600;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;2.&lt;/span&gt; &lt;span style=&quot;color: black;&quot;&gt;Displays the Month and Year of &lt;b&gt;Manufacture&lt;/b&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #006600;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;3.&lt;/span&gt; &lt;span style=&quot;color: black;&quot;&gt;Displays (if there) the date where the &lt;b&gt;phone was purchased&lt;/b&gt; (MMYY)&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #006600;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;4.&lt;/span&gt; &lt;span style=&quot;color: black;&quot;&gt;Displays the date of the &lt;b&gt;last repair&lt;/b&gt; - if found (0000)&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #006600;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;5.&lt;/span&gt; &lt;span style=&quot;color: black;&quot;&gt;Shows &lt;b&gt;life timer of phone&lt;/b&gt; (time passes since last start)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #006600;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: black;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #006600;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;*#3370# - Enhanced Full Rate Codec (EFR) &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD12&quot;&gt;activation&lt;/span&gt;. &lt;b&gt;Increase signal strength&lt;/b&gt;, better &lt;b&gt;signal reception&lt;/b&gt;. It also help if u want to use GPRS and the service is not responding or too slow. Phone battery will drain faster though.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #006600;&quot;&gt;*&lt;span style=&quot;color: black;&quot;&gt;#3370* - (EFR) deactivation. Phone will automatically restart. &lt;b&gt;Increase battery life&lt;/b&gt; by 30% because phone receives less signal from network.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: black;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: yellow;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #006600;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;*#4720# - Half Rate Codec activation.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #006600;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;*#4720* -&lt;/span&gt; &lt;span style=&quot;color: black;&quot;&gt;Half Rate Codec deactivation. The phone will automatically restart&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://newsecretofhacking.blogspot.com/feeds/6260036611754762286/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://newsecretofhacking.blogspot.com/2012/08/nokia-secret-codes.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3151033045260588471/posts/default/6260036611754762286'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3151033045260588471/posts/default/6260036611754762286'/><link rel='alternate' type='text/html' href='http://newsecretofhacking.blogspot.com/2012/08/nokia-secret-codes.html' title='Nokia Secret Codes'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3151033045260588471.post-7691505996042862311</id><published>2012-08-05T10:38:00.000-07:00</published><updated>2012-08-05T10:38:04.953-07:00</updated><title type='text'>How to Become an Ethical Hacker</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Do viruses, DDoS attacks, or buffer overflows tickle your fancy? If  so, you might consider becoming a legal hacker, aka an ethical hacker, &quot;white hat&quot; hacker, or penetration tester. &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Businesses and government-related organizations that are serious about  their network security hire ethical hackers and penetration testers to  help probe and improve their networks, applications, and other computer  systems with the ultimate goal of preventing data theft and fraud. You  may not get the same adrenaline rush that you might with underground  hacking, but you can earn a good and honest living--and not end up  facing prison time, as some illegal &quot;black hat&quot; hackers do. &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;How does the job market look like for ethical hackers? Extremely good!  The IT market overall continues to grow despite the current economic  turmoil. Research firm Gartner estimates that worldwide enterprise IT  spending grew by 5.9 percent between 2009 and 2010, to a total of $2.7  trillion. At the same time, security is becoming a more pressing  concern. Gartner expects to see an increase of nearly 40 percent in  spending on worldwide security services during the five-year period from  2011 to 2015, eventually surpassing $49.1 billion. &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;In your first years as an ethical hacker, you&#39;ll be in a position to  earn anywhere from $50,000 to $100,000 per year, depending on the  company that hires you, and on your IT experience and education. With  several years of professional experience, you could command $120,000 or  more per year, especially if you do your own independent consulting. &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;You can&#39;t just dive into an ethical hacker position, however. Without IT  security experience, you won&#39;t get very far, even with degrees and  certifications. As is true for other IT jobs, employers typically want  candidates who have college degrees, but related experience is king. And  experience with certifications can typically take the place of some  degree requirements. &lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://newsecretofhacking.blogspot.com/feeds/7691505996042862311/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://newsecretofhacking.blogspot.com/2012/08/how-to-become-ethical-hacker.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3151033045260588471/posts/default/7691505996042862311'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3151033045260588471/posts/default/7691505996042862311'/><link rel='alternate' type='text/html' href='http://newsecretofhacking.blogspot.com/2012/08/how-to-become-ethical-hacker.html' title='How to Become an Ethical Hacker'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3151033045260588471.post-8133827426418059946</id><published>2012-08-05T10:35:00.002-07:00</published><updated>2012-08-05T10:35:18.779-07:00</updated><title type='text'>Ethical hacker</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;An ethical hacker is a computer and network expert who attacks a  security system on behalf of its owners, seeking vulnerabilities that a  malicious hacker  could exploit. To test a security system, ethical hackers use the same  methods as their less principled counterparts, but report problems  instead of taking advantage of them.  Ethical hacking is also known as &lt;i&gt;penetration testing&lt;/i&gt;, &lt;i&gt;intrusion testing&lt;/i&gt; and &lt;i&gt;red teaming&lt;/i&gt;. An ethical hacker is sometimes called a white hat, a term that comes from old Western movies, where the &quot;good guy&quot; wore a white hat and the &quot;bad guy&quot; wore a black hat.  &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;One of the first examples of ethical hackers at work was in the 1970s,  when the United States government used groups of experts called &lt;i&gt;red teams&lt;/i&gt;  to hack its own computer systems. According to Ed Skoudis, Vice  President of Security Strategy for Predictive Systems&#39; Global Integrity  consulting practice, ethical hacking has continued to grow in an  otherwise lackluster IT industry, and is becoming increasingly common  outside the government and technology sectors where it began.  Many  large companies, such as IBM, maintain employee teams of ethical  hackers. &lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://newsecretofhacking.blogspot.com/feeds/8133827426418059946/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://newsecretofhacking.blogspot.com/2012/08/ethical-hacker.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3151033045260588471/posts/default/8133827426418059946'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3151033045260588471/posts/default/8133827426418059946'/><link rel='alternate' type='text/html' href='http://newsecretofhacking.blogspot.com/2012/08/ethical-hacker.html' title='Ethical hacker'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3151033045260588471.post-5266520398520284964</id><published>2012-06-12T03:51:00.000-07:00</published><updated>2012-06-12T03:51:01.507-07:00</updated><title type='text'>Hack</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;strong&gt;Hacking&lt;/strong&gt; means finding out weaknesses in a computer or computer network and exploiting them, though the term can also refer to someone with an advanced understanding of computers and computer networks. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge.&lt;sup&gt; &lt;/sup&gt;The subculture that has evolved around hackers is often referred to as the computer underground but it is now an open community. While other uses of the word hacker exist that are not related to computer security, they are rarely used in mainstream context. They are subject to the long standing hacker definition controversy about the true meaning of the term hacker. &amp;nbsp;In this controversy, the term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a &lt;b&gt;cracker&lt;/b&gt;, not making a difference between computer criminals (black hats) and computer security experts (white hats). Some white hat hackers claim that they also deserve the title hacker, and that only black hats should be called crackers.&lt;/div&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://newsecretofhacking.blogspot.com/feeds/5266520398520284964/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://newsecretofhacking.blogspot.com/2012/06/hack.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3151033045260588471/posts/default/5266520398520284964'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3151033045260588471/posts/default/5266520398520284964'/><link rel='alternate' type='text/html' href='http://newsecretofhacking.blogspot.com/2012/06/hack.html' title='Hack'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>