In the minds of many hackers they are using Internet Communication Technology (ICTs) for purposes contrary to law. The term “hacker” is not only a single definition.
a. A person who users computers to try and break into the computer systems of a company or government.
b. A computer hacker is also a clever programmer and someone who enjoys spending a lot of time computing.
The term comes from the verb hack hacker, to hack, which means the penetration into a computer system or computer. The hacker can be seen as “a person who takes pleasure in exploring in detail a system programmable and is always looking to expand their knowledge in this area.” The New Hacker’s Dictionary explains the term hacking as meaning: (a) anyone interested in exploring computer systems, (b) an expert in a particular language (C +, C + +) or in a field of operating system ( c) a person that has firm knowledge in programming details, (d) a person who is interested in the intellectual challenge, and (e) a person who tries to discover sensitive information. It has two acts: pass the time before a system computer and go inside the system. This sense seems used originally in the 1960s at the Massachusetts Institute of Technology, to characterise hackers. At the time, this term refers to programmers passionate about their work.”
Now the term hacking is synonymous with piracy, or counterfeiting. Thus giving the term “hacker” two key concepts: the first designates the person entering or breaking within computer systems and the second designates the infringer, when committed within the meaning of “piracy.” To this end, the polysemic character of the word “piracy” seems to be confirmed with the definition of hacker that offers the Office of the French Language in Quebec (OLF). The latter defines hacker as “the criminal that exploits flaws in an access procedure to break a computer system that violates the integrity of the system by stealing, destroying or altering information, copy or fraudulently software “.
Under this definition, we can distinguish three forms of software piracy: (a) the penetration of computer systems and networks, (b) fraudulent copying of software, and (c) the use of programs such as Trojan to access the systems.