complicated to replicate
but easy to understand. Its
nothing more than getting
access to carry out any task
which is against the
allowed permission. The
tack can be creating,
editing or deleting data,
and may even further go
up-to manipulation of data
to accomplish own goal. A
hacker is not a god sent or
devil commissioned entity,
lets just keep that debate
to the religious clergy. The
truth is that a hacker is the
same average individual
just like you and me, the
only difference in existence
is that he knows more
about system loopholes
while we know more about
system functionality.