This document summarizes the history and types of hacking, the effects of hacking, and ways to avoid being hacked. It discusses how hacking started as a study of computers and how some well-known hackers gained notoriety. It describes academic, hobby, and security hackers. It also outlines the malicious intents of some hackers, such as stealing personal or business information, and how they can infect systems with viruses or trojans. Finally, it recommends using a firewall and up-to-date antivirus software to help prevent hacking.