This document discusses hacking and provides information on various types of hackers. It defines hacking as attempting unauthorized access to computer resources and notes hackers seek weaknesses in systems. The document outlines different types of hacking like website and online banking hacking. It also describes the history of hacking and different types of hackers, including black hat, gray hat, and white hat hackers. Lastly, it provides advice on what to do if a system is hacked, such as shutting it down and restoring from backups.