... previouspositions as a database administrator; Cisco,Web, mail, and security adminis-trator at an ISP; and as a freelance Web architect. David would like to thankMindseye for lending resources and time to the ... typing, and a programming markup language easily accessible to nonpro-grammers—are attractive attributes to hackers. The purpose of this chapter to is to introduce you to the hackers who willtry to ... problem; a hacker can be someone who is enthusiastic about anactivity. Similarly, in the IT world, not every hacker is malicious, and hackingisn’t always done to harm someone.Within the IT...