Sort
Profile photo for B.J. Mendelson

The difference is that the person referring to a tip as a hack is an asshole.

Profile photo for Quora User

"Hack" in the listed sense derives from its computer culture use—gaining unauthorized access, or otherwise making things "work better" or "more useful" (read: the way you want), usually by force and without asking permission. In this way, any social structure or activity can be "hacked" to be more useful (read: as you want it), like getting more food for free at Chipotle or convincing your significant other that you're not an awful person (social engineering). There is a fine line between utilitarianism and subterfuge.

The specific case above ("Tips and Hacks for Everyday Life") comes from a fo

"Hack" in the listed sense derives from its computer culture use—gaining unauthorized access, or otherwise making things "work better" or "more useful" (read: the way you want), usually by force and without asking permission. In this way, any social structure or activity can be "hacked" to be more useful (read: as you want it), like getting more food for free at Chipotle or convincing your significant other that you're not an awful person (social engineering). There is a fine line between utilitarianism and subterfuge.

The specific case above ("Tips and Hacks for Everyday Life") comes from a former "life hacks" topic, which referred to everyday productivity and efficiency "hacks", or ways to make daily, routine life easier (read: more the way you want), like helpful things to keep in the back of your car or picking the best pineapples. Needless to say, this use was lost on some, so a more inclusive new wording was chosen (albeit somewhat clunky).

Some of the "hacks" topics in your drop-down make little sense offhand (e.g., "mind hacks" is about "rewiring" your brain's patterns), but if you browse them for a bit or replace "hacks" with "tips", you'll find yourself quickly literate. For most intents, "hacks" and "tips" are used identically.

This term gets more use on Quora than other public places because Quora's core demographic (and seeding base) uses this type of language, being of the Bay Area start-up/VC culture. Either these terms will break into the mainstream, or these topic titles will eventually be made more accessible for all.

Profile photo for Grammarly

If you want to write better essays, it’s helpful to understand the criteria teachers use to score them. Instead of solely focusing on the grade you are given, focus on how you are being graded and how you can improve, even if you are already getting a high grade.

Development of Your Thesis

A thesis is the essence of your paper—the claim you are making, the point you are trying to prove. All the other paragraphs in your essay will revolve around this one central idea. Your thesis statement consists of the one or two sentences of your introduction that explain what your position on the topic at ha

If you want to write better essays, it’s helpful to understand the criteria teachers use to score them. Instead of solely focusing on the grade you are given, focus on how you are being graded and how you can improve, even if you are already getting a high grade.

Development of Your Thesis

A thesis is the essence of your paper—the claim you are making, the point you are trying to prove. All the other paragraphs in your essay will revolve around this one central idea. Your thesis statement consists of the one or two sentences of your introduction that explain what your position on the topic at hand is. Teachers will evaluate all your other paragraphs on how well they relate to or support this statement.

Strong Form

A good essay presents thoughts in a logical order. The format should be easy to follow. The introduction should flow naturally to the body paragraphs, and the conclusion should tie everything together. The best way to do this is to lay out the outline of your paper before you begin. After you finish your essay, review the form to see if thoughts progress naturally. Ensure your paragraphs and sentences are in a logical order, the transitions are smooth so that the paragraphs are coherently connected, and that your body paragraphs relate to the thesis statement.

Style

Just as your clothes express your personality, the style of your essay reveals your writing persona. You demonstrate your fluency by writing precise sentences that vary in form. A mature writer uses various types of sentences, idiomatic phrases, and demonstrates knowledge of genre-specific vocabulary, all the while ensuring the writing reflects your authentic voice.

Conventions

Conventions include spelling, punctuation, sentence structure, and grammar. Having lots of mistakes suggests carelessness and diminishes the credibility of your arguments. Furthermore, because most essays are written on computers these days, there is a lower tolerance for spelling mistakes, which can easily be avoided with spell-checking tools such as Grammarly. Beyond spelling, Grammarly can also help to weed out other major grammatical errors. Follow up with a close reading of your entire paper.

Support and References

Finally, your teacher will examine your resources. Select information from reliable websites, articles, and books. Use quotes and paraphrases to support your ideas, but be sure to credit your sources correctly. Also, always remember that copying five consecutive words or more from any source constitutes plagiarism. If you are concerned about unintentionally quoting your sources, Grammarly Pro offers a plagiarism detector so you can always double-check your work.

The grades you get on your essays are important, but you can never improve your writing if they are the only things you consider. Focus on improving your essays’ overall structure—the thesis development, form, style, conventions, and support. Learning to master these five elements will cause your scores to soar!

Profile photo for Assistant
Assistant

The terms "hack" and "tip" both refer to helpful advice or shortcuts, but they have distinct connotations:

  1. Hack:
    - A "hack" often implies a clever or unconventional solution to a problem. It usually involves a workaround or an innovative approach that simplifies a task or makes it more efficient.
    - Hacks can be associated with technology or life in general, often highlighting creativity or resourcefulness.
    - Example: A life hack could be using a binder clip to organize cables.
  2. Tip:
    - A "tip" is generally straightforward advice or a piece of information that helps someone improve thei

The terms "hack" and "tip" both refer to helpful advice or shortcuts, but they have distinct connotations:

  1. Hack:
    - A "hack" often implies a clever or unconventional solution to a problem. It usually involves a workaround or an innovative approach that simplifies a task or makes it more efficient.
    - Hacks can be associated with technology or life in general, often highlighting creativity or resourcefulness.
    - Example: A life hack could be using a binder clip to organize cables.
  2. Tip:
    - A "tip" is generally straightforward advice or a piece of information that helps someone improve their skills or knowledge in a specific area. Tips are often practical and easy to implement.
    - Tips are commonly found in instructional contexts, such as cooking, studying, or productivity.
    - Example: A cooking tip might be to let meat rest before slicing for better juiciness.

In summary, while both hacks and tips offer guidance, hacks tend to be more creative and unconventional, whereas tips are practical pieces of advice.

Profile photo for Kevin Ernest Long

tip == handy fact
hack == clever insight

Profile photo for Anonymous
Anonymous

I see a hack as a workaround for a particular situation, that might be considered "improper", whereas a tip is a general principle that can be applied.
A hack for an uneven table would be to put a book under the short leg. A tip would revolve around how to replace the leg with a new one properly.

Where do I start?

I’m a huge financial nerd, and have spent an embarrassing amount of time talking to people about their money habits.

Here are the biggest mistakes people are making and how to fix them:

Not having a separate high interest savings account

Having a separate account allows you to see the results of all your hard work and keep your money separate so you're less tempted to spend it.

Plus with rates above 5.00%, the interest you can earn compared to most banks really adds up.

Here is a list of the top savings accounts available today. Deposit $5 before moving on because this is one of th

Where do I start?

I’m a huge financial nerd, and have spent an embarrassing amount of time talking to people about their money habits.

Here are the biggest mistakes people are making and how to fix them:

Not having a separate high interest savings account

Having a separate account allows you to see the results of all your hard work and keep your money separate so you're less tempted to spend it.

Plus with rates above 5.00%, the interest you can earn compared to most banks really adds up.

Here is a list of the top savings accounts available today. Deposit $5 before moving on because this is one of the biggest mistakes and easiest ones to fix.

Overpaying on car insurance

You’ve heard it a million times before, but the average American family still overspends by $417/year on car insurance.

If you’ve been with the same insurer for years, chances are you are one of them.

Pull up Coverage.com, a free site that will compare prices for you, answer the questions on the page, and it will show you how much you could be saving.

That’s it. You’ll likely be saving a bunch of money. Here’s a link to give it a try.

Consistently being in debt

If you’ve got $10K+ in debt (credit cards…medical bills…anything really) you could use a debt relief program and potentially reduce by over 20%.

Here’s how to see if you qualify:

Head over to this Debt Relief comparison website here, then simply answer the questions to see if you qualify.

It’s as simple as that. You’ll likely end up paying less than you owed before and you could be debt free in as little as 2 years.

Missing out on free money to invest

It’s no secret that millionaires love investing, but for the rest of us, it can seem out of reach.

Times have changed. There are a number of investing platforms that will give you a bonus to open an account and get started. All you have to do is open the account and invest at least $25, and you could get up to $1000 in bonus.

Pretty sweet deal right? Here is a link to some of the best options.

Having bad credit

A low credit score can come back to bite you in so many ways in the future.

From that next rental application to getting approved for any type of loan or credit card, if you have a bad history with credit, the good news is you can fix it.

Head over to BankRate.com and answer a few questions to see if you qualify. It only takes a few minutes and could save you from a major upset down the line.

How to get started

Hope this helps! Here are the links to get started:

Have a separate savings account
Stop overpaying for car insurance
Finally get out of debt
Start investing with a free bonus
Fix your credit

Profile photo for Pedro Chopite

Tricks are special ingenious techniques used in a profession or craft, especially those that are little known by outsiders.

For example: To select a complete paragraph in MS Word, make three quick clicks anywhere on the paragraph.

A hack is a creative solution to a problem or limitation.

For example, it is not possible to save a default color in MS Word other than white. If you want to use a different color in your documents, you would have to change it manually every time. However, if you save a blank page, after changing it to your desired color, as a document, every time you open that d

Tricks are special ingenious techniques used in a profession or craft, especially those that are little known by outsiders.

For example: To select a complete paragraph in MS Word, make three quick clicks anywhere on the paragraph.

A hack is a creative solution to a problem or limitation.

For example, it is not possible to save a default color in MS Word other than white. If you want to use a different color in your documents, you would have to change it manually every time. However, if you save a blank page, after changing it to your desired color, as a document, every time you open that document it will have your default color.

A tip may be a piece of advice, or a piece of expert or authoritative information.

For example, the two examples above are my two tips for you.

I think of a "hack" as something that is taken and a "tip" as something that is given.

Profile photo for Roman F

I think hacks are for exploiting flaws in systems and using them for personal gain. A trick is for the people, its something to show people its like a hack

But not used for personal gain

Profile photo for Alicia Kaye

None, but a tip can also be information on a good deal/investment or money you give to thank a waiter delivery man or Valet o park your car.

Yes. All you need to do is enter their name here to see what dating websites or apps they are on.
Profile photo for Will Wister

Tips are just that - pointers on how to do something better. They are less extreme in terms of your overall ability to improve at something.

A hack - at least to me is sort of a technique that's not well known that can dramatically improve the way something is done.

The two tend to go great together as both are all about how to do some specific task better, with tips being more marginal improvements on specific aspects of the task and hacks being major changes in the way the task is done.

Profile photo for Andrew Daviel

A tip is advice, a hack is a suggestion for repurposing something, thinking outside the box. A tip for keeping your car seats clean is to use seat covers, a hack is to use garbage bags.

Profile photo for CashStasher

6 Easy Ways to Grow Your Money in 2025

Make the most of your income with these practical hacks designed to maximize savings and investments.

1. Compare car insurance rates with this free tool

Did you know you could be overpaying on your car insurance by hundreds of dollars each year without realizing it? Rates can vary significantly between insurers, so shopping around is key to saving money. Thankfully, Insurify makes comparing rates quick and easy.

Insurify’s free online tool lets you compare real-time quotes from over 100 insurers in just minutes so you can find a better rate and save up to $1,

6 Easy Ways to Grow Your Money in 2025

Make the most of your income with these practical hacks designed to maximize savings and investments.

1. Compare car insurance rates with this free tool

Did you know you could be overpaying on your car insurance by hundreds of dollars each year without realizing it? Rates can vary significantly between insurers, so shopping around is key to saving money. Thankfully, Insurify makes comparing rates quick and easy.

Insurify’s free online tool lets you compare real-time quotes from over 100 insurers in just minutes so you can find a better rate and save up to $1,025 per year. Plus, Insurify never sells your data.

Keep more money in your pocket by comparing rates with Insurify today.

2. Get Out from Under Credit Card Debt

Struggling with credit card debt? A company like National Debt Relief might be your solution. If you owe over $30,000 in debt from credit cards, medical bills, collections, or personal loans, it could help you resolve your debt for less than you owe — with no up-front fees.

With one low monthly program payment, you could be debt-free in just 12 to 48 months. Answer a few quick questions to see if you qualify and start reducing your financial stress today.

Do You Qualify For a Consolidated Loan?

3. Invest smarter with this all-in-one platform

Investing is one of the most powerful ways to build your portfolio. By putting your money in stocks, bonds, ETFs, crypto, and other assets, you can take control of your financial future. Enter Public, a platform that makes investing accessible and is trusted by millions.[math]^1 [/math]

With Public, all your investing is done in one place. You’ll gain access to over 9,000 U.S.-listed stocks, thousands of bonds, and a high-yield cash account — so even your uninvested money doesn’t sit idle.

Don’t wait to start building your portfolio. Join Public today.

4. Build your credit with no credit check

Breaking into the world of credit can feel impossible, but it doesn’t have to be. The secured Self Visa® Credit Card[math]^2[/math] can make it easy for you to start building credit — even with no credit history.

With just a $100 minimum security deposit, you can begin establishing or building your credit. Don’t have $100 up front? Begin with a Credit Builder Account[math]^3[/math] for as little as $25 a month[math]^4[/math] and use your savings progress to qualify for the card.[math]^5[/math] Every on-time payment can help build your credit history.

Plus, you can enjoy an intro, no annual fee offer with a $0 annual fee for the first year[math]^6[/math]. After that, a $25 annual fee applies. Apply now because this offer is valid for a limited time only!

Take control of your credit today with the secured Self Visa® Credit Card.

5. Earn up to $500 by playing games online with KashKick

Did you know you can earn extra cash by playing mobile games on your phone? With KashKick, you’ll get rewarded for playing games you love by turning your phone time into spending money. One game alone pays over $200 to play and complete!

Signing up is easy: just provide an email, create a password, and allow tracking so KashKick can reward you. It’s simple, legit, and with over 3 million users already signed up for free, you can join the fun today.

Start earning a little extra with KashKick now!

6. Stop overpaying on your car loan

Stuck with a high car payment? Refinancing with Way could help you save up to $1,850 a year — regardless of your credit score. Applying is free and takes just minutes.

And better yet? You could skip payments for 45 days or more and give yourself extra breathing room in your budget. Plus, refinancing with Way unlocks exclusive Way+ benefits, including:

  • An annual 100-point car inspection
  • Unlimited mechanics hotline access
  • Cash back on gas
  • Parking and car wash discounts
  • Job loss income coverage

Don’t keep overpaying on your car loan! Start saving today with Way.

[math]^1[/math]All investing involves the risk of loss, including loss of principal. Brokerage services for US-listed, registered securities, options, and bonds in a self-directed account are offered by Open to the Public Investing, member FINRA & SIPC. Public Investing offers a High-Yield Cash Account where funds from this account are automatically deposited into partner banks where they earn interest and are eligible for FDIC insurance; Public Investing is not a bank. Cryptocurrency trading services are offered by Bakkt Crypto Solutions, LLC (NMLS ID 1890144), which is licensed to engage in virtual currency business activity by the NYSDFS. Cryptocurrency is highly speculative, involves a high degree of risk, and has the potential for loss of the entire amount of an investment. Cryptocurrency holdings are not protected by the FDIC or SIPC.

[math]^2[/math]The secured Self Visa® Credit Card is issued by Lead Bank or First Century Bank, N.A., each Member FDIC.

[math]^3[/math]Credit Builder Accounts & Certificates of Deposit made/held by Lead Bank, Sunrise Banks, N.A., or First Century Bank, N.A., each Member FDIC. Subject to credit approval.

[math]^4[/math]$25/mo, 24 mos, 15.92% APR.

[math]^5[/math]Qualification for the secured Self Visa® Credit Card is based on meeting eligibility requirements, including income and expense requirements and establishment of security interest. Criteria subject to change.

[math]^6[/math]$0 annual fee for the first year only, $25 annual fee thereafter. Variable APR of 28.24%. Limited-time offer. For new accounts opened during promotional period.

Profile photo for Jim Sterrett

things that the ordinary person might not have thought of to make something easier. Like taking an old broken hanger for pants. breaking off the still functional clips and using them to close potato chip bags

Profile photo for Quora User

I know this will come as a shock but it's because….. *drum roll*….. language evolves. Constantly. And one person not liking the way it is evolving will not stop it from evolving in the communication patterns of the other ~1.5 billion English speakers.

And- I suppose even more importantly- those words mean different things. Maybe ten years ago they didn't, maybe even five years ago they didn't, but nowadays something new has popped up which was different enough to warrant its own term. The words haven't replaced their predecessors, they're giving more specific labels where there were none before

I know this will come as a shock but it's because….. *drum roll*….. language evolves. Constantly. And one person not liking the way it is evolving will not stop it from evolving in the communication patterns of the other ~1.5 billion English speakers.

And- I suppose even more importantly- those words mean different things. Maybe ten years ago they didn't, maybe even five years ago they didn't, but nowadays something new has popped up which was different enough to warrant its own term. The words haven't replaced their predecessors, they're giving more specific labels where there were none before.

Hack vs. Tip

A tip is a suggestion or advice. “Hey Jimmy, a little tip: don't run through a screen door.”

A hack is a suggestion that circumvents a commonly thought way of achieving or doing something by offering an easier way to achieve or a more convenient way of doing. “Here's a hack, Jimmy: get rid of your screen door and put magnet-opening netting over the doorway instead.”

Hashtag Vs. Pound sign

The pound sign is a button on the phone that has various functions typically in automated voice categorizing systems. “Please press pound followed by your account number.” Before that it meant “number”. #1. #2. Etc. How silly would you consider someone who complained that everyone stopped using # to mean number and only know of it as “the pound sign” on phones? Pretty silly, probably. Especially because that is not the case and even with the “newly” designated pound sign button, people still recognize when # means “number.”

Hashtag, meanwhile, specifically designates a word being used as an Internet search categorizing marker. I.E., a tag. You would never hear an automated voice message telling you to “Press Hashtag, followed by your account number.” Because that's not what hashtag means. Pound sign and hashtag are not interchangeable vocabulary. “pound sign whosreadytoparty” makes zero sense in past OR modern English, but “hashtag whosreadytoparty” not only makes sense, it gives the listener (or reader) an innumerable amount of context, connotation, and specific feeling that no word other than “hashtag” could give.

I hope I've helped you overcome, even slightly, your irrational fear of a natural change that not only doesn't negatively affect anyone's lives, but improves it by facilitating more accurate communication between all speakers.

#livealittle #chillout #modernenglishsyntaxisactusllyreallycoolandservesanimportantpurposeotherthanmakingbabyboomersmad

Profile photo for Quora User

Tricks and tips is something you can learn anywhere.

A hack? Wasn't that some kind of cheap horse or a horsedrawn carriage? Not a word I've come across outside the US.

Profile photo for Russell Watson

Well, it’s like this. Easy answer, it’s in the context.

When is a door not a door, when it’s ajar, a jar! Get it?

If I bow to someone but they are wearing a bow in their hair, do they know which bow I am referring to when I compliment them on their lovely bow? That’s assuming they bow back to me.

Well, a hack can be a useful trick to accomplish something. That’s a noun.

A hack can also be a writer who churns out unoriginal, boring shit and, maybe, makes money on it. That’s also a noun.

Oh hold on, hack can be a verb, like hacking online, or even hacking down a bush or some tall grass.

So which hack

Well, it’s like this. Easy answer, it’s in the context.

When is a door not a door, when it’s ajar, a jar! Get it?

If I bow to someone but they are wearing a bow in their hair, do they know which bow I am referring to when I compliment them on their lovely bow? That’s assuming they bow back to me.

Well, a hack can be a useful trick to accomplish something. That’s a noun.

A hack can also be a writer who churns out unoriginal, boring shit and, maybe, makes money on it. That’s also a noun.

Oh hold on, hack can be a verb, like hacking online, or even hacking down a bush or some tall grass.

So which hack is which?

I’m sure that if I used the wrong hack most people would be able to fathom out what I meant. One thing that helps is that they both sound the same, and the spelling is the same, so maybe nobody would notice.

I think I hacked it.

Profile photo for Joshua Engel

It sounds edgier. “Tips” are merely interesting and useful. “Hacks” sounds as though you’ve been devious and insightful, perhaps even forbidden.

“Hacker” used to be somebody with exceptional skill at computers. “Hacking in” to a computer system was something that required a lot of knowledge and cleverness.

“Hacks” carries some of that sense of astuteness, along with some of that sense of having inside information that others don’t have. So it makes people feel important.

Me, I think it makes people sound like pretentious douchebags. But then, I was hacking before “hacking” was something done by s

It sounds edgier. “Tips” are merely interesting and useful. “Hacks” sounds as though you’ve been devious and insightful, perhaps even forbidden.

“Hacker” used to be somebody with exceptional skill at computers. “Hacking in” to a computer system was something that required a lot of knowledge and cleverness.

“Hacks” carries some of that sense of astuteness, along with some of that sense of having inside information that others don’t have. So it makes people feel important.

Me, I think it makes people sound like pretentious douchebags. But then, I was hacking before “hacking” was something done by scr1p7 k1dd13z.

Profile photo for Andrew

To go obsidian right out of the gate, a tip would be that people mostly feel a social obligation to be welcomed, and then released from engagement. That means, they need the words, or otherwise, the sentiment “ok, you may leave now. I wish you all the best as you go away from me because we are finished interacting.”

A trick would be knowing most people don’t want to make a scene, so even when you are harming them in public, such as performing a kidnapping or assault, their obligation is to the social environment, not to their own wellness. When you beat a woman, that’s what you’re playing on. B

To go obsidian right out of the gate, a tip would be that people mostly feel a social obligation to be welcomed, and then released from engagement. That means, they need the words, or otherwise, the sentiment “ok, you may leave now. I wish you all the best as you go away from me because we are finished interacting.”

A trick would be knowing most people don’t want to make a scene, so even when you are harming them in public, such as performing a kidnapping or assault, their obligation is to the social environment, not to their own wellness. When you beat a woman, that’s what you’re playing on. Being single on Facebook is far worse than when you grab her wrists and pull her aside, and spit into her ear the charges and commands she needs to continue in your good graces.

Both are about using the chemicals occurring naturally in other people’s bodies to control their outward expression. One utilizes this system, one exploits it.

That’s an important distinction to make in the coming years and some of the passed ones too.

Profile photo for Brenda Brown

Advice is usually the term used when offering an opinion usually regarding life events.

Such as I advise you stay away from an individual because they are a bad influence.

Tips are often information you might find useful when trying to accomplish a task.

Like you will probably find it easier to use a blue filter when trying to capture a specific image more accurately.

Of course there is often overlap.

The major distinction being that when someone offers advice they often do so with more authority & expect you to take notice of what they have to say.

Those offering tips usually do so out of a genuine

Advice is usually the term used when offering an opinion usually regarding life events.

Such as I advise you stay away from an individual because they are a bad influence.

Tips are often information you might find useful when trying to accomplish a task.

Like you will probably find it easier to use a blue filter when trying to capture a specific image more accurately.

Of course there is often overlap.

The major distinction being that when someone offers advice they often do so with more authority & expect you to take notice of what they have to say.

Those offering tips usually do so out of a genuine desire to help but not be particularly bothered if you do not adhere to what they suggested.

💕

Profile photo for Gordon J Gallagher

The etymology of the word harkens back to the term "Hack" which means the prolific writer or "[[Hack writer|Hack Writer]]", usually for cheap hire churning out material to be published at a low rate of payment or return. Which in turn comes from the term "Hackney" or hackney horse for hire.

"Hack" also refers to "a rack for feeding cattle" Webster's Dictionary of "Hack" 1828 is the other side of the coin in the print publishing game of widespread consumption of written content. It’s an obvious prolific term, and words do not usually appear out of nothingness. It was looked at as a hire a writer

The etymology of the word harkens back to the term "Hack" which means the prolific writer or "[[Hack writer|Hack Writer]]", usually for cheap hire churning out material to be published at a low rate of payment or return. Which in turn comes from the term "Hackney" or hackney horse for hire.

"Hack" also refers to "a rack for feeding cattle" Webster's Dictionary of "Hack" 1828 is the other side of the coin in the print publishing game of widespread consumption of written content. It’s an obvious prolific term, and words do not usually appear out of nothingness. It was looked at as a hire a writer for cheap, back in the 1990s when even the most elite programmers might make twice the minimum wage. (I know I was there, a ComSec officer that was part of the tech transfer that created the internet. I wrote the first social app for law enforcement and the very first web login and user management, as well as forums such as this one. Those existed before in what were called BBS (Bulletin Board Service of individual computers with direct dial-in modems, but of the web, I’m the progenitor.

The basic context of the word hack is easily attributable to computer programming from a text line, to tenaciously keep at an initially unrewarding and terrifically difficult task. Its initially positive connotation became derogatory by those railing against those with authority over computers and the now commercially worldwide accessible Internet which was built by "hackers".

Hack, besides referring to the numerous poorly paid writers of the paper press age, hired by publishers to turn out content, also refers to a “rack to feed cattle from” Websters 1928 (along with nearly 5 dozen definitions), but essentially someone who keeps at something, often beyond the norm, social or peer pressures, or even showing a profit, or someone hired to churn out code. I.E. hard working programmers.

Somehow… through some antagonism of those trying to break or rail against the growing dominance of computers, and those who are their masters, the term was confused with Crackers, those trying to break the “coders” or “hackers” work. “Cracking the code” is as old as encryption or secret messages, notable in computers the famous Alan Turing was a Cracker who broke the NAZI Enigma machine.

They are in no way synonyms. It’s Hacker vs Cracker, Cracker vs Hacker, Farmer/Builder vs Maruader kind of thing. Hackers can exist without Crackers.. but Crackers are a subgroup dependent on what Hackers build… encryption vs cracking basically.

Hack means to keep at something, tenaciously. Computer programming is several times over applicable as requiring a “Hack” or called “Hacker” in that way they are the same word, the ancillary meanings are at best poetic license, the workhorse on which the site, bank, store, program, communication, or social media depends on.

Before SAAS became popular, there was one computer guy per office of publications, the those that drift towards them.

Profile photo for Emily Ford

Tipping is when you pay someone money for a job well done. You are thanking them for their service and a tip is the way to do so. If you are tipping your waitress it is because she waited on you and a tip is part of how you pay for your meal and express thanks. If you tip a valet it is because he is doing his job and the same goes for bellhops and other jobs. A tip is given after and the amount yo

Tipping is when you pay someone money for a job well done. You are thanking them for their service and a tip is the way to do so. If you are tipping your waitress it is because she waited on you and a tip is part of how you pay for your meal and express thanks. If you tip a valet it is because he is doing his job and the same goes for bellhops and other jobs. A tip is given after and the amount you tip is usually related to how pleased you were. A bribe has nothing to do with paying someone for doing their job. A bribe is a way of convincing someone to do a favor for you. The...

Profile photo for Quora User

In art and science, tricks are usually orthodox and hacks are unorthodox. For example, there are two uses for hacks in computer science. “That guy’s research is such a hack.” Implying it is highly derivative, unoriginal, unstable, and/or possibly unscrupulous. The other second for a hack is a reference to cyber security: The analyst had hacked into the system and shut down the scammers’ center.

I often disagree with using the word hack, it comes across as inaccurate and wishy-washy. For cyber security it should be bypass, infiltrated, or penetrated and computer science it should be derivative a

In art and science, tricks are usually orthodox and hacks are unorthodox. For example, there are two uses for hacks in computer science. “That guy’s research is such a hack.” Implying it is highly derivative, unoriginal, unstable, and/or possibly unscrupulous. The other second for a hack is a reference to cyber security: The analyst had hacked into the system and shut down the scammers’ center.

I often disagree with using the word hack, it comes across as inaccurate and wishy-washy. For cyber security it should be bypass, infiltrated, or penetrated and computer science it should be derivative and unreliable research.

So, a life hack, like , outside of computers ? It's just a clever shortcut , really. Like , you know how you always struggle to find your keys ? I used to , man , it was a nightmare. Then I started putting them on a hook right by the door , a big , obvious hook , and BAM problem solved. That's a life hack. It's not rocket science, its just… smarter. Or , you know that thing where you peel a banana from the bottom instead of the top? Genius ! Less mess , less monkey business , I learned that from my weird uncle , actually . He was a total weirdo, but that banana tip? Gold . I tried that thing w

So, a life hack, like , outside of computers ? It's just a clever shortcut , really. Like , you know how you always struggle to find your keys ? I used to , man , it was a nightmare. Then I started putting them on a hook right by the door , a big , obvious hook , and BAM problem solved. That's a life hack. It's not rocket science, its just… smarter. Or , you know that thing where you peel a banana from the bottom instead of the top? Genius ! Less mess , less monkey business , I learned that from my weird uncle , actually . He was a total weirdo, but that banana tip? Gold . I tried that thing with the ice cubes in your wine glass , supposed to keep it cold without watering it down? eh, didnt really work for me . I think it depends on your glass , or maybe I did it wrong? It looked fancy though , you know , in movies and stuff . Life hacks are kinda all about efficiency , I guess , finding ways to make stuff easier , faster, and sometimes a bit more fun, too . Like , I found this awesome way to fold fitted sheets, its on youtube somewhere I should share that, maybe. It's all about those little things that add up , you know ? Little time savers , stress reducers . . . stuff that makes life… I dont know ... *nicer*? Its a vibe. Some dont work , some are pure genius. you gotta experiment, its part of the fun . Its like a little puzzle, you know ? You find one that works for you and you feel really smart. I feel so clever when I find a new life hack and it really works . Its just a little win, but those little wins .. . they matter . Anyway, check my bio if you want to see more of my amazing - or maybe not so amazing - life hacks. I'm constantly trying new stuff , even if they often fail spectacularly , haha .

Profile photo for Raghuram Prabhu

Coding is like constructing a building. Involves everything from plan approval to construction. So many security structures are also built. Hacking is finding some loopholes in this construction, breaching the security and into the constructed area.

Hackers can be thieves who steal our assets (data). They find vulnerabilities in websites and steal data from it.

Hackers can be some cool guys who breach into the security just to show that they are capable of doing so! They deface some websites just like that!

Learners - who try to find and violate the security measures, for the purpose of learning

Coding is like constructing a building. Involves everything from plan approval to construction. So many security structures are also built. Hacking is finding some loopholes in this construction, breaching the security and into the constructed area.

Hackers can be thieves who steal our assets (data). They find vulnerabilities in websites and steal data from it.

Hackers can be some cool guys who breach into the security just to show that they are capable of doing so! They deface some websites just like that!

Learners - who try to find and violate the security measures, for the purpose of learning by experience.

Ethical hackers: Hero who is capable of playing around the security features, but uses it only for the goodness of society.

Profile photo for Sue Corning

Let's look at a knife, because a knife has both a tip and an edge. The tip is the point at the end farthest away from the handle. The edge is the part you do the cutting with. It is usually sharp on one of its long sides, and that is the "cutting edge.”

If you are talking about an iceberg, then the tip is at the top. It's the highest point, and it's usually pointy, too. If the iceberg is flat on top like a box, then it does not have a tip. But it could have an edge. A box has an edge. It is where the sides are joined together.

Your finger has a tip and and edge, too. You point with your finger t

Let's look at a knife, because a knife has both a tip and an edge. The tip is the point at the end farthest away from the handle. The edge is the part you do the cutting with. It is usually sharp on one of its long sides, and that is the "cutting edge.”

If you are talking about an iceberg, then the tip is at the top. It's the highest point, and it's usually pointy, too. If the iceberg is flat on top like a box, then it does not have a tip. But it could have an edge. A box has an edge. It is where the sides are joined together.

Your finger has a tip and and edge, too. You point with your finger tip. Notice how often “point” and “pointy" are associated with “tip". There's “finger tip" and “the tip of the iceberg,” the tip being the “pointy” part on top.

Edges may be sharp, but are not pointy. You can say, ”I scraped the edge of my finger,” and you know the side of your finger is neither sharp nor pointy. But you can “point" with you finger. You do so by pointing the tip of your finger.

Your nose has a tip and an edge, just like your finger. Sometimes you might hear, “He has a pointy nose.” The point, or tip is the part farthest away from your face. “Santa lays his finger aside of his nose.” That means he puts his finger on the side of his nose, not on the tip. You can also say the side is the edge of his nose.

People often say, “That movie had me on the edge of my seat!” In this case, it is the very front portion of the seat. It means the movie was so intense, that the speaker could not sit back and relax. A chair has a front edge and 2 side edges, and a back. However, you can “tip your chair over". That it's just an idiom. It does not mean that a chair has a tip.

“To tip” in this case is a verb, and I'm assuming you were asking about nouns not verbs. Tip can be a verb, and edge is a verb also.

I hope you find these illustrations helpful!

Profile photo for Walton Teltru

In this context it stands for useful knowledge of methodology, that helps to improve your life in some area.

For example, my little life hack is to toss coin, when I´m against two equal options and I can not decide, which way to go. Choices seem equal and time is limited. I really toss coin and do as it says.

Its not about giving responsibility to randomness, its about going either way, instead of hesitating and not really picking anything. Sometimes situation is very innocent, like one group of friends invite to dining the other group to diving and I dont have particular mood for either… Coin t

In this context it stands for useful knowledge of methodology, that helps to improve your life in some area.

For example, my little life hack is to toss coin, when I´m against two equal options and I can not decide, which way to go. Choices seem equal and time is limited. I really toss coin and do as it says.

Its not about giving responsibility to randomness, its about going either way, instead of hesitating and not really picking anything. Sometimes situation is very innocent, like one group of friends invite to dining the other group to diving and I dont have particular mood for either… Coin toss is a fair decision for everyone.

Profile photo for Adrián Lamo

No, and there doesn't need to be.

Like it or not, human consensus defines language. The best thing you can do is not care. I drift towards the phrase "network intruder/intrusion" when possible to describe what I do, but that's not out of any real degree of giving a crap over the pedantry involved. It's mostly just to avoid useless arguments.

I tend to weight the definitions used by people whose skills I respect over those of (most) reporters and the general public, but the war (if there ever was one) for the meaning of the term is lost, dead, and buried.

On a broader scale, I do my best to use

No, and there doesn't need to be.

Like it or not, human consensus defines language. The best thing you can do is not care. I drift towards the phrase "network intruder/intrusion" when possible to describe what I do, but that's not out of any real degree of giving a crap over the pedantry involved. It's mostly just to avoid useless arguments.

I tend to weight the definitions used by people whose skills I respect over those of (most) reporters and the general public, but the war (if there ever was one) for the meaning of the term is lost, dead, and buried.

On a broader scale, I do my best to use what I perceive as proper English, but I'm in a minority there. Say what you want to say. Just don't expect the world to agree with you.

Profile photo for William A Bagnall

To hack something means to accomplish a goal in a way that was not originally intended. For example, capturing and decrypting someone’s network usage to obtain their password and log into their account is not how you’re supposed to log in to their account; you’re supposed to obtain their password legitimately (e.g. asking them for it).

But hacking is not limited to computers.

https://twitter.com/PaulaEvans29/status/1109998945084862465?s=20

This could be considered a “hack”, because water bottles aren’t meant to close doors, they’re meant to hold water.

This may be where the term “life hack” came from. Life hacks are ways to s

To hack something means to accomplish a goal in a way that was not originally intended. For example, capturing and decrypting someone’s network usage to obtain their password and log into their account is not how you’re supposed to log in to their account; you’re supposed to obtain their password legitimately (e.g. asking them for it).

But hacking is not limited to computers.

https://twitter.com/PaulaEvans29/status/1109998945084862465?s=20

This could be considered a “hack”, because water bottles aren’t meant to close doors, they’re meant to hold water.

This may be where the term “life hack” came from. Life hacks are ways to solve problems by unconventional means. The problem is: by now, most “life hacks” are just people hot gluing things together to solve problems that aren’t even problems.

^Things like this are not necessary, because there’s already a way to squeeze lemons. With your hands. And if you want the juice, there’s lemon juicers. This may be useful if you don’t have hands or a juicer, but that’s about the only time.

Profile photo for PALLAVI DATTA

Hacking, cracking, and phishing are all related to unauthorized access or manipulation of computer systems and data, but they differ in their methods and objectives:

  1. Hacking:
    • Hacking is a broad term that encompasses a range of activities related to gaining unauthorized access to computer systems, networks, or devices.
    • Hackers may seek to exploit vulnerabilities in systems for various purposes, such as gaining information, disrupting operations, or simply proving their skills.
    • Hacking can be both ethical and malicious. Ethical hackers, known as "white hat" hackers, work to identify and fix security

Hacking, cracking, and phishing are all related to unauthorized access or manipulation of computer systems and data, but they differ in their methods and objectives:

  1. Hacking:
    • Hacking is a broad term that encompasses a range of activities related to gaining unauthorized access to computer systems, networks, or devices.
    • Hackers may seek to exploit vulnerabilities in systems for various purposes, such as gaining information, disrupting operations, or simply proving their skills.
    • Hacking can be both ethical and malicious. Ethical hackers, known as "white hat" hackers, work to identify and fix security vulnerabilities, while malicious hackers, known as "black hat" hackers, engage in illegal activities.
    • Hacking can involve various techniques, including exploiting software vulnerabilities, using malware, or employing social engineering to trick users into divulging sensitive information.

2. Cracking:

    • Cracking specifically refers to the process of removing or bypassing software protection mechanisms, such as license keys or digital rights management (DRM) systems, to gain unauthorized access to software, games, or other digital content.
    • The objective of cracking is often to obtain paid software or content without paying for it or to share it illegally.
    • Crackers develop or use software tools (cracks) to circumvent the protections in place, allowing them to use the software or content without proper authorization.
    • Cracking is generally considered illegal, as it involves copyright infringement and software piracy.

3. Phishing:

    • Phishing is a form of cyber-attack that focuses on manipulating individuals into revealing sensitive information, such as usernames, passwords, credit card numbers, or personal information.
    • Phishing attacks typically involve deceptive emails, messages, or websites that impersonate legitimate entities, such as banks, social media platforms, or government agencies.
    • The attacker aims to trick the recipient into clicking on malicious links, downloading malware, or providing confidential information.
    • Phishing can also target organizations through "spear-phishing," where attackers customize their messages to specific individuals or companies to increase the chances of success.
    • Phishing is primarily a form of social engineering and is illegal since it involves fraudulent activities and identity theft.

In summary:

  • Hacking is the overarching term for unauthorized access to computer systems and networks.
  • Cracking is a specific form of hacking related to bypassing software protection mechanisms for illegal access to software or digital content.
  • Phishing is a distinct form of attack that focuses on deceiving individuals into revealing sensitive information, typically through deceptive emails or websites.

All three activities are illegal when performed without proper authorization and consent, and they can have serious legal and ethical consequences.

Profile photo for Andrew Daviel

The use of the word "hack" to mean a creative approach to problem solving predates the use of it to imply unauthorized computer access. See e.g. A Short History of “Hack” - The New Yorker. But the use of it to mean "tip", as in Life hacking, is more recent (2004), probably deliberately pulling from the ongoing lexical arguments about "hacker" vs. "cracker" - the tech community still using "hack" to mean creative tinkering as in "I hacked my RC car transmitter to control the toaster", versus the media's use of it to mean "illegal computer access" and thus making the term "sexy".

Profile photo for Quora User

“The word hack doesn't really have 69 different meanings”, according to MIT hacker Phil Agre. “In fact, hack has only one meaning, an extremely subtle and profound one which defies articulation. Which connotation is implied by a given use of the word depends in similarly profound ways on the context. Similar remarks apply to a couple of other hacker words, most notably random”

Hacking might be characterized as ‘an appropriate application of ingenuity’. Whether the result is a quick-and-dirty patchwork job or a carefully crafted work of art, you have to admire the cleverness that went into it.

An

“The word hack doesn't really have 69 different meanings”, according to MIT hacker Phil Agre. “In fact, hack has only one meaning, an extremely subtle and profound one which defies articulation. Which connotation is implied by a given use of the word depends in similarly profound ways on the context. Similar remarks apply to a couple of other hacker words, most notably random”

Hacking might be characterized as ‘an appropriate application of ingenuity’. Whether the result is a quick-and-dirty patchwork job or a carefully crafted work of art, you have to admire the cleverness that went into it.

An important secondary meaning of hack is ‘a creative practical joke’. This kind of hack is easier to explain to non-hackers than the programming kind. Of course, some hacks have both natures; see the lexicon entries for pseudo and kgbvax. But here are some examples of pure practical jokes that illustrate the hacking spirit:

In 1961, students from Caltech (California Institute of Technology, in Pasadena) hacked the Rose Bowl football game. One student posed as a reporter and ‘interviewed’ the director of the University of Washington card stunts (such stunts involve people in the stands who hold up colored cards to make pictures). The reporter learned exactly how the stunts were operated, and also that the director would be out to dinner later.

While the director was eating, the students (who called themselves the ‘Fiendish Fourteen’) picked a lock and stole a blank direction sheet for the card stunts. They then had a printer run off 2300 copies of the blank. The next day they picked the lock again and stole the master plans for the stunts — large sheets of graph paper colored in with the stunt pictures. Using these as a guide, they made new instructions for three of the stunts on the duplicated blanks. Finally, they broke in once more, replacing the stolen master plans and substituting the stack of diddled instruction sheets for the original set.

The result was that three of the pictures were totally different. Instead of ‘WASHINGTON’, the word ‘CALTECH’ was flashed. Another stunt showed the word ‘HUSKIES’, the Washington nickname, but spelled it backwards. And what was supposed to have been a picture of a husky instead showed a beaver. (Both Caltech and MIT use the beaver — nature's engineer — as a mascot.)

After the game, the Washington faculty athletic representative said: “Some thought it ingenious; others were indignant.” The Washington student body president remarked: “No hard feelings, but at the time it was unbelievable. We were amazed.”

This is now considered a classic hack, particularly because revising the direction sheets constituted a form of programming.

Here is another classic hack:

On November 20, 1982, MIT hacked the Harvard-Yale football game. Just after Harvard's second touchdown against Yale, in the first quarter, a small black ball popped up out of the ground at the 40-yard line, and grew bigger, and bigger, and bigger. The letters ‘MIT’ appeared all over the ball. As the players and officials stood around gawking, the ball grew to six feet in diameter and then burst with a bang and a cloud of white smoke.

The Boston Globe later reported: “If you want to know the truth, MIT won The Game.”

The prank had taken weeks of careful planning by members of MIT's Delta Kappa Epsilon fraternity. The device consisted of a weather balloon, a hydraulic ram powered by Freon gas to lift it out of the ground, and a vacuum-cleaner motor to inflate it. They made eight separate expeditions to Harvard Stadium between 1 and 5 AM, locating an unused 110-volt circuit in the stadium and running buried wires from the stadium circuit to the 40-yard line, where they buried the balloon device. When the time came to activate the device, two fraternity members had merely to flip a circuit breaker and push a plug into an outlet.

This stunt had all the earmarks of a perfect hack: surprise, publicity, the ingenious use of technology, safety, and harmlessness. The use of manual control allowed the prank to be timed so as not to disrupt the game (it was set off between plays, so the outcome of the game would not be unduly affected). The perpetrators had even thoughtfully attached a note to the balloon explaining that the device was not dangerous and contained no explosives.

Harvard president Derek Bok commented: “They have an awful lot of clever people down there at MIT, and they did it again.” President Paul E. Gray of MIT said: “There is absolutely no truth to the rumor that I had anything to do with it, but I wish there were.”

The hacks above are verifiable history; they can be proved to have happened. Many other classic-hack stories from MIT and elsewhere, though retold as history, have the characteristics of what Jan Brunvand has called ‘urban folklore’ (see FOAF). Perhaps the best known of these is the legend of the infamous trolley-car hack, an alleged incident in which engineering students are said to have welded a trolley car to its tracks with thermite. Numerous versions of this have been recorded from the 1940s to the present, most set at MIT but at least one very detailed version set at CMU.

Brian Leibowitz has researched MIT hacks both real and mythical extensively; the interested reader is referred to his delightful pictorial compendium The Journal of the Institute for Hacks, Tomfoolery, and Pranks (MIT Museum, 1990; ISBN 0-917027-03-5). The Institute has a World Wide Web page athttp://hacks.mit.edu/Hacks/Gallery.html. There is a sequel entitled Is This The Way To Baker House?. The Caltech Alumni Association has published two similar books titled Legends of Caltech and More Legends of Caltech.

Here is a story about one of the classic computer hacks:

Back in the mid-1970s, several of the system support staff at Motorola discovered a relatively simple way to crack system security on the Xerox CP-V timesharing system. Through a simple programming strategy, it was possible for a user program to trick the system into running a portion of the program in ‘master mode’ (supervisor state), in which memory protection does not apply. The program could then poke a large value into its ‘privilege level’ byte (normally write-protected) and could then proceed to bypass all levels of security within the file-management system, patch the system monitor, and do numerous other interesting things. In short, the barn door was wide open.

Motorola quite properly reported this problem to Xerox via an official ‘level 1 SIDR’ (a bug report with an intended urgency of ‘needs to be fixed yesterday’). Because the text of each SIDR was entered into a database that could be viewed by quite a number of people, Motorola followed the approved procedure: they simply reported the problem as ‘Security SIDR’, and attached all of the necessary documentation, ways-to-reproduce, etc.

The CP-V people at Xerox sat on their thumbs; they either didn't realize the severity of the problem, or didn't assign the necessary operating-system-staff resources to develop and distribute an official patch.

Months passed. The Motorola guys pestered their Xerox field-support rep, to no avail. Finally they decided to take direct action, to demonstrate to Xerox management just how easily the system could be cracked and just how thoroughly the security safeguards could be subverted.

They dug around in the operating-system listings and devised a thoroughly devilish set of patches. These patches were then incorporated into a pair of programs called ‘Robin Hood’ and ‘Friar Tuck’. Robin Hood and Friar Tuck were designed to run as ‘ghost jobs’ (daemons, in Unix terminology); they would use the existing loophole to subvert system security, install the necessary patches, and then keep an eye on one another's statuses in order to keep the system operator (in effect, the superuser) from aborting them.

One fine day, the system operator on the main CP-V software development system in El Segundo was surprised by a number of unusual phenomena. These included the following:

  • Tape drives would rewind and dismount their tapes in the middle of a job.
  • Disk drives would seek back and forth so rapidly that they would attempt to walk across the floor (see walking drives).
  • The card-punch output device would occasionally start up of itself and punch a ‘lace card’ (card with all positions punched). These would usually jam in the punch.
  • The console would print snide and insulting messages from Robin Hood to Friar Tuck, or vice versa.
  • The Xerox card reader had two output stackers; it could be instructed to stack into A, stack into B, or stack into A (unless a card was unreadable, in which case the bad card was placed into stacker B). One of the patches installed by the ghosts added some code to the card-reader driver... after reading a card, it would flip over to the opposite stacker. As a result, card decks would divide themselves in half when they were read, leaving the operator to recollate them manually.

Naturally, the operator called in the operating-system developers. They found the bandit ghost jobs running, and killed them... and were once again surprised. When Robin Hood was gunned, the following sequence of events took place:

  1. !X id1 
  2.  
  3. id1: Friar Tuck... I am under attack! Pray save me! 
  4. id1: Off (aborted) 
  5.  
  6. id2: Fear not, friend Robin! I shall rout the Sheriff 
  7. of Nottingham's men! 
  8.  
  9. id1: Thank you, my good fellow! 

Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently slain program within a few milliseconds. The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system.

Finally, the system programmers did the latter — only to find that the bandits appeared once again when the system rebooted! It turned out that these two programs had patched the boot-time OS image (the kernel file, in Unix terms) and had added themselves to the list of programs that were to be started at boot time (this is similar to the way Windows viruses propagate).

The Robin Hood and Friar Tuck ghosts were finally eradicated when the system staff rebooted the system from a clean boot-tape and reinstalled the monitor. Not long thereafter, Xerox released a patch for this problem.

It is alleged that Xerox filed a complaint with Motorola's management about the merry-prankster actions of the two employees in question. It is not recorded that any serious disciplinary action was taken against either of them.

Finally, here is a wonderful hack story for the new millennium:

1990's addition to the hallowed tradition of April Fool RFCs was RFC 1149, A Standard for the Transmission of IP Datagrams on Avian Carriers. This sketched a method for transmitting IP packets via carrier pigeons.

Eleven years later, on 28 April 2001, the Bergen Linux User's Group successfully demonstrated CPIP (Carrier Pigeon IP) between two Linux machines running on opposite sides of a small mountain in Bergen, Norway. Their network stack used printers to hex-dump packets onto paper, pigeons to transport the paper, and OCR software to read the dumps at the other end and feed them to the receiving machine's network layer.

Here is the actual log of the ping command they successfully executed. Note the exceptional packet times.

  1. Script started on Sat Apr 28 11:24:09 2001 
  2. vegard@gyversalen:~$ /sbin/ifconfig tun0 
  3. tun0 Link encap:Point-to-Point Protocol  
  4. inet addr:10.0.3.2 P-t-P:10.0.3.1 Mask:255.255.255.255 
  5. UP POINTOPOINT RUNNING NOARP MULTICAST MTU:150 Metric:1 
  6. RX packets:1 errors:0 dropped:0 overruns:0 frame:0 
  7. TX packets:2 errors:0 dropped:0 overruns:0 carrier:0 
  8. collisions:0  
  9. RX bytes:88 (88.0 b) TX bytes:168 (168.0 b) 
  10.  
  11. vegard@gyversalen:~$ ping -i 450 10.0.3.1 
  12. PING 10.0.3.1 (10.0.3.1): 56 data bytes 
  13. 64 bytes from 10.0.3.1: icmp_seq=0 ttl=255 time=6165731.1 ms 
  14. 64 bytes from 10.0.3.1: icmp_seq=4 ttl=255 time=3211900.8 ms 
  15. 64 bytes from 10.0.3.1: icmp_seq=2 ttl=255 time=5124922.8 ms 
  16. 64 bytes from 10.0.3.1: icmp_seq=1 ttl=255 time=6388671.9 ms 
  17.  
  18. — 10.0.3.1 ping statistics — 
  19. 9 packets transmitted, 4 packets received, 55% packet loss 
  20. round-trip min/avg/max = 3211900.8/5222806.6/6388671.9 ms 
  21. vegard@gyversalen:~$ exit 
  22.  
  23. Script done on Sat Apr 28 14:14:28 2001 

A web page documenting the event, with pictures, is athttp://www.blug.linux.no/rfc1149/. In the finest Internet tradition, all software involved was open-source; the custom parts are available for download from the site.

While all acknowledged the magnitude of this achievement, some debate ensued over whether BLUG's implementation was properly conformant to the RFC. It seems they had not used the duct tape specified in 1149 to attach messages to pigeon legs, but instead employed other methods less objectionable to the pigeons. The debate was properly resolved when it was pointed out that the duct-tape specification was not prefixed by a MUST, and was thus a recommendation rather than a requirement.

The perpetrators finished their preliminary writeup in this wise: “Now, we're waiting for someone to write other implementations, so that we can do interoperability tests, and maybe we finally can get the RFC into the standards track... ”.

The logical next step should be an implementation of RFC2549.

Source: Catb , Google

Profile photo for Hal Mickelson

There’s an old meaning; there are a couple of new meanings.

The old meaning resulted from the fact that many London cabs operated out of the district called Hackney. They were called “Hackney cabs.” The word “hackneyed” came to be used in referring to writing or other creative work that was churned out just for pay, often with little literary or artistic merit. A phrase that’s overused is a “hackne

There’s an old meaning; there are a couple of new meanings.

The old meaning resulted from the fact that many London cabs operated out of the district called Hackney. They were called “Hackney cabs.” The word “hackneyed” came to be used in referring to writing or other creative work that was churned out just for pay, often with little literary or artistic merit. A phrase that’s overused is a “hackneyed” phrase. A freelance article that doesn’t reflect much creativity is “hack work.”

I’ll wait for people who are smarter than me about this to correct me, but I understand that among computer users, “to hack” means to break into a system, to obtain unauthorized access to information or (is this right?) to reverse-engineer software code. This sense of the word “hack” has now drifted from the computer world into everything from household management to trav...

Profile photo for Wolf Halton

Old school security guys like me, still find it offensive that the term hacking has become a negative term. Hacking computers comes from an old concept of people who are interested in something and do it all the time for the love of the game. A hacker in golf was a person who would play in any weather under any circumstances just because they love the game. 10+ years ago, a hacker was the only guy on the staff who could figure out all of the problems with all of the hardware and software on the network. A cracker was a person who cracked systems, or passwords or routers. These days, mostly bec

Old school security guys like me, still find it offensive that the term hacking has become a negative term. Hacking computers comes from an old concept of people who are interested in something and do it all the time for the love of the game. A hacker in golf was a person who would play in any weather under any circumstances just because they love the game. 10+ years ago, a hacker was the only guy on the staff who could figure out all of the problems with all of the hardware and software on the network. A cracker was a person who cracked systems, or passwords or routers. These days, mostly because of movies and public reports, the term hacker has been entirely relegated to people who attack networks for nefarious ends.

Profile photo for Quora User

hacker |ˈhakər|
noun
1 a person who uses computers to gain unauthorized access to data.
informal an enthusiastic and skillful computer programmer or user.


Fundamentally they are synonymous. Those geeks that can tweak and handle very technical computer programs, can also easily abuse that power.

The original term hacker, refers to those people. A great detective can also be a terrific criminal mastermind.

The problem arises when there are hackers as in crackers that are not technically sophisticated, that use a bunch of tools to gain unauthorized access, and then we cross-reference those with

hacker |ˈhakər|
noun
1 a person who uses computers to gain unauthorized access to data.
informal an enthusiastic and skillful computer programmer or user.


Fundamentally they are synonymous. Those geeks that can tweak and handle very technical computer programs, can also easily abuse that power.

The original term hacker, refers to those people. A great detective can also be a terrific criminal mastermind.

The problem arises when there are hackers as in crackers that are not technically sophisticated, that use a bunch of tools to gain unauthorized access, and then we cross-reference those with hackers as in computer geeks that have no idea about computer security but can only solve rigorous digital problems.

That intersection is almost zero, but the original definition fully intersects.

Profile photo for Joseph Felita

Stick your face in my business you will know and feel the difference

Profile photo for Ray Lewis

In this context, a hack is short for life hack which is a supposedly easier or better way of doing everyday things.

This comes from the verb to hack which means to re-engineer household items- especially consumer electronics - to perform different tasks from those they were originally designed to do. This kind of hacking is often done by hobby electronics enthusiasts.

The term was formerly used to describe how hobby computer enthusiasts wrote computer code, but the term hacker was originally computer department slang for a computer programmer in the 1960’s and 1970’s.

The term hacker was also use

In this context, a hack is short for life hack which is a supposedly easier or better way of doing everyday things.

This comes from the verb to hack which means to re-engineer household items- especially consumer electronics - to perform different tasks from those they were originally designed to do. This kind of hacking is often done by hobby electronics enthusiasts.

The term was formerly used to describe how hobby computer enthusiasts wrote computer code, but the term hacker was originally computer department slang for a computer programmer in the 1960’s and 1970’s.

The term hacker was also used in the 1980’s to describe computer enthusiasts who attempted to defeat computer security to gain unauthorised access t corporate or government computer systems - whether for bravado or otherwise. It is now used to refer to the criminals who gain illegal access to any kind of computer system, especially for fraud or extortion, or for other illegal purposes.

Profile photo for Rohit Thapliyal

Coding is basically building. You build software, applications, websites, scripts.

Hacking, on the other hand is penetration testing. You test other's coded softwares, websites, apps to find loopholes.

Note: Coding involves a variety of fields where you can work. Application developement, Full stack developer, DevOps, Data analyst, and many more.

Like coding, Hacking also has its fields. Kali pen testing , SQL injections, Brute Force script attack, and the list goes on.

PS: Hacking is not as cool as you think. Its the most boring and toughest job. You can end up attacking for a week and getting no

Coding is basically building. You build software, applications, websites, scripts.

Hacking, on the other hand is penetration testing. You test other's coded softwares, websites, apps to find loopholes.

Note: Coding involves a variety of fields where you can work. Application developement, Full stack developer, DevOps, Data analyst, and many more.

Like coding, Hacking also has its fields. Kali pen testing , SQL injections, Brute Force script attack, and the list goes on.

PS: Hacking is not as cool as you think. Its the most boring and toughest job. You can end up attacking for a week and getting nothing.

Profile photo for James Puntasecca

It can mean several things. 1. The sharp point or pointed edge of something. “You write with the pointed tip of a pen or pencil, not the eraser. 2. To set something at an angle so something else falls out. We need to tip the water bottle upside down to get the water to flow. 3. Another use for the word tip is money that you leave for a waiter/waitress for good service above and beyond the price of the check. I left the waitress a 20% tip for good service. The bill was $20.00 but I left $4.00 more for the waitress.

Profile photo for Krùtík Pãrmâr

There is not much but countable difference between coding and hacking.

Coding means you are building something i.g website or some type of app.You don’t need to analyse someone’s code bcoz you just need to start coding everything from the beginning and you can write and code everything that you want.

And then,

Hacking means You need a keen observation,analysing skills,coding skills in various language because hacking is finding vulnerabilities in code’s that are written by someone,if you want to analyse code,first you must understand the language,in which language source code are written and then

There is not much but countable difference between coding and hacking.

Coding means you are building something i.g website or some type of app.You don’t need to analyse someone’s code bcoz you just need to start coding everything from the beginning and you can write and code everything that you want.

And then,

Hacking means You need a keen observation,analysing skills,coding skills in various language because hacking is finding vulnerabilities in code’s that are written by someone,if you want to analyse code,first you must understand the language,in which language source code are written and then start searching vulnerabilities by experiments .

Conclusion is Coding is part of hacking,it is essential that you must know coding before start career in hacking,but you don’t need to be hardcore coder for hacking,You just need knowledge about programming languages like How they work,about syntax and how much capable they are.But if you can code you can become badass hacker,hacking is lifetime journey.

Profile photo for Aliapollo

“ Good” as successful ??? Well it depends. Are we talking about cyber hack? A human hack? What or who is the target? in general, “ any repetition by the adversary is liability the target has to recognize & leverage”. Cyber model has been introduced by major security firms. In nutshell here is some of the steps conducting a successful cyber hack.

  1. Reconecance: Resaerch, identification, and selection of target/s. For example: crawling internet websites looking for names, email addresses. Looking target’s into job sites gather information on technology they use.
  2. Weaponization: In short, gathering a

“ Good” as successful ??? Well it depends. Are we talking about cyber hack? A human hack? What or who is the target? in general, “ any repetition by the adversary is liability the target has to recognize & leverage”. Cyber model has been introduced by major security firms. In nutshell here is some of the steps conducting a successful cyber hack.

  1. Reconecance: Resaerch, identification, and selection of target/s. For example: crawling internet websites looking for names, email addresses. Looking target’s into job sites gather information on technology they use.
  2. Weaponization: In short, gathering a right tools for delivery and infiltration the target.
  3. Delivery: It depends on tools you gathered and target’s defensive architecture. Sometimes you have to send small agents and sometimes you need a heavey artilary to hide your malicious code/ weapon in middle of hodgepodge of fake attacks.
  4. Exploration: Trasmission of a wron into a target environment ( Check ). Let's assume you’ve done a good job delivering a right weapon exploiting targets major vulnerability. You have two options ( leave for time being or getting back to work almost immediately with installation of your malicious code).
  5. Installation: You can start with Creating Backdoor, (well your malicious code should be intelligent enough taking care of the Backdoor from it by itself!!) You can also, install your malicious code in right place while you're moving around your target’s environment grabbing other credentials from the target.
  6. Command & control (C2): Let's say you had no time and you wanted to proceed with installation right a way. Now it's time to see if you can conduct communication with your already compromised target. No matter how sophisticated your malicious code is, getting the code to send signals out ‘to you’ & only to you, you're malicious code still depends on many other factors, let's say, (targets vulnerability, malfunction, corruption, etc.) if not, go to drawing board (repeat step 1,2,3).
  7. Hand on keyboard: You code is ready and waiting receiving commands from the master! target has been compromised with success, passing all security parameters, planting itself in right place, established hidden tunnel for deception and communication.
About · Careers · Privacy · Terms · Contact · Languages · Your Ad Choices · Press ·
© Quora, Inc. 2025