answersLogoWhite

0


Best Answer

A criminal.

A hacker in the original sense is just a very good programmer. So a very good programmer that gets paid would be called an "employee".

User Avatar

Wiki User

βˆ™ 14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What do you call a hacker that gets profit from the hacking?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Engineering

Why a hacker would break in to a computer?

a hacker is an intelligent person who an expert on programming languages and computer systems. Hackers enjoy breaking into computer systems and gaining unauthorized access to private networks for fun. They do not have evil intentions. They are copying data from your computer system and are less harmful whereas crackers are people who gets unauthorized access to an individual or organisation' s computer system to cause harm..


As the gauge number of sheet steel gets higher the sheet gets what?

Thicker.


What happens to the force as the mechanical advantages gets larger?

The force gets larger.


Why not sending arefrence to copy constructor will cause an infinite loop?

A copy constructor gets called any time an object needs to be copied. Unlike in some of the newer languages like Java, you can chose to pass objects either by reference or by value. When you pass by reference, only the address of the function is copied. However, if you pass by value, the whole object must be copied. In order to copy the object, the copy constructor will get called. If the copy constructor's parameter is not a reference, then the object will get passed by value. When the object gets passed by value, it needs to get copied so it will call the same copy constructor. Because the object is still being passed by value it'll call itself again to create a copy of itself. The copy constructor will continue to call itself until the stack overflows.


What is the difference between gets and puts?

Direction: gets: from standard input to memory puts: from memory to standard input note: 'gets' is unsafe, use 'fgets' instead

Related questions

What courses are needed to become an ethical hacker?

Ethical hacking is where you are hired by a company and you attempt to hack into their system to expose flaws, which are then fixed before a real hacker gets in. You need good computer skills and have to take an ethical hacking course.


How can virus cause hacking?

A virus doesn't cause hacking. If anything hacking causes virus's. Sometimes a hacker may put a virus on a system to cover up his presence. Once a virus is on a system, it usually gets the blame for any strange activity.


What is the meaning of phone hacking?

Phone hacking occurs when someone else gets into your phone. Depending on their motives, the hacker may simply view data stored on the phone, broadcast your location or send messages to your contacts under your name.


What do a hacker do?

A Hacker is a person that gets into someone's account.


What is an example of hacker?

A hacker is a person that steals information from the computer. An example of this is, a hacker breaks into a bank and gets access to everyone's account and steals their money.


Who is boris from goldeneye?

Boris is a Level 2 Hacker in Russia. At the end he gets frozen.


What is it called when your Bluetooth-enabled device gets hacked?

Bluesnarf of Blue-Hacking


How can you control computer hacking?

I highly suggest Anti-virus programs. It makes it a LOT harder for the hacker to get through. But If the 'hacker' has enough technology to get through anti-virus programs, there is no way to stop them. If the hacker gets through the anti-virus system (if you have one) then the game is over, they can access all the details that you have used on your computer. Your address, your phone number, your credit card details (if you use your credit card online) and every single thing you have put on your computer. They can also see everything you do and monitor conversations if they have the technology to. This is why you always keep any of your details a secret.


What happens if your Twitter gets hacked?

It depends on the hacker. A hacker would probably post things on your profile (advertisements, spam) and could change your password preventing you from accessing your account again.


What do you call a person who gets the benefit?

Beneficiary: one who receives or is designated to receive a benefit, profit or advantage Benefactor: one who confers or bestows a benefit upon another


What techniques do hackers use to steal information?

Top 10 Common Hacking Techniques. Bait and Switch Using Bait and Switch hacking technique, an attacker can buy advertising spaces on the websites. Later, when a user clicks on the ad, he might get directed to a page that’s infected with malware. This way, they can further install malware or adware on your computer. The ads and download links shown in this technique are very attractive and users are expected to end up clicking on the same. The hacker can run a malicious program that the user believes to be authentic. This way, after installing the malicious program on your computer, the hacker gets unprivileged access to your computer.


What do mean by profit prior to incorporation?

Profit prior to incorporation is that profit which a company gets between the period of date of buying and date of incorporation