This document defines hacking and different types of hackers. It discusses website, network, email, password and computer hacking. It also covers advantages like finding security weaknesses, and disadvantages like privacy harm. Preventive measures include strong antivirus and unique passwords. The document provides steps to take after being hacked like shutting down systems, and restoring from backups. It concludes that while hackers have innovative spirits, their actions should not harm others.