Someone who violates computer security for malicious reasons, kudos or personal gain.
A function that converts one value to another. Hashing data is a common practice in computer science and is used for several different purposes. Examples include cryptography, compression, checksum generation, and data indexing.
Store (a website or other data) on a server or other computer so that it can be accessed over the Internet.