Term used to describe the unauthorised access of a computer as a means to gain information that the hacker is not entitled to or to access services and facilities for malicious purposes.
— Computer ScienceAn expert programmer who likes to spend a lot of time figuring out the finer details of computer systems or networks, as opposed to those who learn only the minimum necessary.
— Computer Science