Examines the phenomenon of hacking, from its beginnings in the computer networks of the early 80s, through some of the legendary hackers & their exploits, to the basic tools that hackers use in the 2010s
- & how to guard against them, or apply them yourself to start learning the art of information retrieval.