A.I Love You Wiki
Register
Advertisement
Hacking1

Hacking is the practice of seeking and exploiting weaknesses in a computer system or computer network. Persons who indulge in such practices are known as "Hackers". Hackers may be motivated into hacking by a multitude of reasons, such as profit, protest, challenge, enjoyment, or to evaluate those weaknesses to assist in removing them.

Hacker Types[]

The subculture that has evolved around hacking is often referred to as the "Computer Underground". Within this culture are several subgroups with different attitudes towards how/why they hack.

White Hat

A "white hat" hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term "white hat" in Internet slang refers to an ethical hacker. This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement.
Hitoshi Kobe is a White Hat hacker

Black Hat

A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain". Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal". Black hat hackers break into secure networks to destroy, modify, or steal data; or to make the network unusable for those who are authorized to use the network.
Billy-G is a Black Hat hacker.

Grey Hat

A "grey hat" hacker lies between a black hat and a white hat hacker. A grey hat hacker may surf the Internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect, for example. They may then offer to correct the defect for a fee. Grey hat hackers sometimes find the defect of a system and publish the facts to the world instead of a group of people. Even though grey hat hackers may not necessarily perform hacking for their personal gain, unauthorized access to a system can be considered illegal and unethical.

Gallery[]


Items and Terminology
Programs A.I. Program No. 0A.I. Program No. 1A.I. Program No. 3A.I. Program No. 5A.I. Program No. 6A.I. Program No. 10A.I. Program No. 13A.I. Program No. 20A.I. Program No. 28A.I. Program No. 29A.I. Program No. 30 BetaA.I. Program No. 30A.I. Program No. 31A.I. Program No. 40Ma-kun
Computer Terms Artificial IntelligenceComputer VirusProgram OptionsHackingCHitoshi's Personal ComputerFloppy DiskLaptop ComputerComputer WormAssemblyInternetEmailReality Module
Fashion AhogeFrench Maid UniformHitoshi's SweaterSwimsuitKimonoUnderwearYukataHakamaBraCosplayNaked Apron
Food BeerCurry RiceCup NoodlesCookingSekihanSweet PotatoWatermelon
Items Adult MagazineElectromagnet Beach CombMoldSuper Nintendo Entertainment SystemEMP DeviceComet Shoemaker-Levy 9Anti-A.I. Delete Machine Mk IAnti-A.I. Delete Machine Mk IIHyper Linking SystemThe Tally-Whacker WhackerBear
Other Arcade VideogameAstronomy ClubBWH MeasurementsCherry BlossomDatingDating SimulationDietingExamsFerris WheelFighting Dolls 1996FishingFleming's Left Hand RuleHinamatsuriHot SpringsIkebanaJapanese BathingKnittingLimboLove HotelMaintenance DayMiss Hot Springs ContestNinin-baoriPeeping TomPrivate MemoryPyramid SchemeSchool ClubsSchool NewspaperSkiingSoccerStargazingSuper High School Girls 2SwimmingTennisThe Great Couple ContestThe Little MermaidThe Ultimate Beach Queen ContestUFO CatcherVolleyball
Advertisement