What common characteristics do computer hackers share?
QUESTION:
What common characteristics do computer hackers share? Do the things they have in common help explain their motivations for hacking activity? What, do you believe, is the best defense against hackers?