This document provides an overview of hacking, including definitions of common hacking terms, a brief history of hacking, types of hacking activities, reasons why people hack, and tips for protecting systems from hackers. It defines hackers and crackers, describes early forms of hacking like phone and computer hacking. It also outlines common hacker activities after gaining access like installing backdoors, and how system administrators can help prevent hacking by patching systems, using encryption, and installing firewalls and intrusion detection systems.