Report Hackers to Facebook
According to the third article of the Safety section in Facebook's Statement of Rights and Responsibilities, willfully compromising a user's account on the social networking constitutes a violation of Facebook's user agreement.
Reporting such violations may be performed in a number of ways, depending on the situation. If either you or your friend's Facebook account has been hacked, file a report through Facebook's Help Center.
If you are aware of a specific user on Facebook who is engaged in hacking other accounts, file a report regarding his activity through his profile page.
Go to Facebook.com, type the email and password associated with your account in the corresponding text fields and press "Enter."
Click "Account" in the top menu bar and select "Help Center."
Click "Security" in the "Popular Topics" section.
Click "I Think My Account is Compromised" in the Account Security menu.
Click either of the two security questions, depending on your situation, and click "Secure it here."
Click "Secure Account" and click "Continue."
Complete each of the steps for securing your account, including changing your password, changing your email password, reviewing your changes and unlocking your account.
Click "Done" to complete the process.
The developers at Facebook receive a notification regarding your account being compromised.
Report Your Friend's Compromised Profile
Sign into Facebook, click "Account" in the top menu bar and select "Help Center."
Click the "Security" icon in the "Popular Topics" section.
Click "I Think My Friend's Account is Compromised" in the Account Security menu.
Click any of the three questions depending on your circumstances and click "File a Report."
Click your friend's full name, his birthday, the email associated with his account and a description of the situation in the corresponding text fields.
Click "Submit" to send the report to the developers at Facebook.
Report a Profile on Facebook
Log into Facebook, click the "Search" text field and type the name of the profile you want to report for hacking.
Scroll down and click "Report/Block This Person" in the left side bar.
Click "Unfriend" or "Block" depending on the situation and click "This Person is Bullying or Harassing Me," click the drop-down menu and select "Other."
Facebook does not offer an option in this drop-down menu that applies specifically to hacking, but selecting this option is the best fit for that form of violation.
Click the user's name at the top of the page, type a report regarding the account hacking in the text field and press "Enter."
The report is sent to the Facebook developers.
How to Hack
A hacker is a person who legally breaks into a computer system to identify the security flaws in that system.
A hacker is someone companies hire to enter such systems and resolve these issues.
People who hack into computer systems with malicious intent are actually known as "crackers" this is not hacking.
Read on to learn more.
Learn how to program.
Start with a program such as "Python," but learn many programs and the basics of programming.
Install Unix on your computer.
There are many operating systems out there, but this one is the easiest and best to use if you're going to hack.
Teach yourself how a computer system works.
There are no schools to learn to hack.
There is a site called Hack this Site where you can go to train and test your hacking skills.
Practice your skills on a project.
Rewrite the program with subtle changes.
You should be able to gain access to a file, program or data base that is protected while remaining oblivious to others working on this project.
Submit your resumes to companies that need hackers.
Some choices are large companies, banks and government agencies but this list is not all inclusive.
Hack into the computer system of the company you work for after it hires you.
Attempt to access records that are password protected.
Your company contract outlines exactly what hacking duties you must perform for the company.
Report your findings to the company.
You must hack the computer system while remaining totally invisible to others working in the system.
Identify the security flaws and ways to patch these flaws so not even you can hack into the computer system again.