Cracker: malicious meddler who tries to discover sensitive information by poking around. One who breaks security on a system. Coined ca. 1985 by hackers in defense against journalistic misuse of the term "hacker," which more properly refers to the highly skilled computer programmers who enthusiastically enjoy programming and sharing their expertise [27,28].
Virus writer: Writer of a cracker program that searches out other programs and 'infects' them by embedding a copy of itself in them, so that they become Trojan horses (a malicious, security-breaking program that is disguised as something benign). When these programs are executed, the embedded virus is executed too, thus invisibly propagating the 'infection.' Unlike a worm, a virus cannot infect other computers without assistance [29].
Worm writer: writer of program that propagates itself over a network, reproducing itself as it goes. A worm can infect other computers without assistance. The term has taken on negative connotations, since it is assumed, nowadays, that only crackers write worms [30].
e-paparazzi, e-stalkerazzi: The Invasion of Privacy: Paparazzi bill [31] would have made it illegal to harass a person of media interest for commercial purposes including photographing, videotaping, or recording. "Cyberstalking" [32] refers to the stalker engaging in a pattern of conduct intended to follow, alarm, or harass, or making a credible threat or violating a restraining order. "Credible threat" includes threats made by means of an electronic communication device. In this context, e-paparazzi and e-stalkerazzi refers to journalists or crackers electronically gaining access to confidential information or harassing people via the Internet.
Online information brokers: This type of information broker is one who sells or exchanges specific information gathered on users to a Web site-often done without the users explicit knowledge. Permission is 'granted' somewhere within the fine print of the privacy policy for a Web site. These lists of specific user's demographics and preferences can be invaluable to a marketing person for targeted advertising, eg, online or mail.