See… from a kernel perspective… there are no hackers. It’s all processes. User discretion is advised.


On another note, I find this article quick and interesting to read: Black hat, white hat & gray hat hackers

Trying to help… the pieces are there but this much shouldn’t close the thread. I’ll stick to the “about” in such threads.