The shadowy world of hacking is a strange place. It's full with geeks, chasing glory. Some plunge into the Jav.com abyss of malicious code. Others just want a glimmer of that forbidden fruit. And then there's the curious side, where silicon companions and myriad streams of spam intersect in a absurd mix. Imagine a hacker, hunched over their glowin