The document discusses the history and types of hackers. It notes that originally the term "hacker" simply referred to an adept computer user, but media began using it to refer only to computer criminals when cracking systems became popular. It categorizes hackers into different groups based on their motivations, from security experts and script kiddies to criminal hackers and disgruntled employees. It also outlines US laws regarding illegal computer access and spamming. Finally, it provides advice on protecting networks from the four main ways hackers can access systems: over the internet, directly on a network, via remote access, or on a wireless network.