I recently read this article and wanted to re-post it here for you to read.

Sidebar Blog 2

Hacker Anatomy