This document discusses hacking, including what it is, why people hack, the types of hackers, and how hacking is carried out. It defines hacking as the unauthorized intrusion into a network or computer, normally by one or more hackers. Hackers can hack for profit, protest, or challenge. There are three main types of hackers: black hat hackers who hack maliciously, white hat hackers who hack ethically with permission to find vulnerabilities, and grey hat hackers who hack without permission but disclose vulnerabilities. The document also discusses common hacking attacks, tools used for hacking like Kali Linux and Backtrack, and notes that information on how to hack is widely available online.