The subversion of [[computer]]s or their unauthorized use is referred to using the terms ''[[cyberwarfare]]'', ''[[cybercrime]]'', or ''[[Security hacker|security hacking]]'' (later shortened to ''hacking'' for further references in this article due to issues with ''[[hacker]]'', ''[[hacker culture]]'' and differences in [[White hat (computer security)|white]]/[[Grey hat|grey]]/[[Black hat (computer security)|black]] 'hat' color identification).
==Common Programsprograms orand Utilityutility [[Application software|Apps]]appplications==
Programs that are generalized enough they are commonly applied whether a user identifies themselves as white, grey, or black. Often referred to as utility applications, utility apps in this context are programs that enhance a user's experience in traditional display devices, [[augmented reality]] (AR), or [[virtual reality]] (VR); with a few options for support programs. Often referred to outside the context of hacking specifically, yet the potential for hacking uses depends on the way that they modify the experience, as they may provide the equivalent of enhancements directed towards hacking and subversion goals.
===[[Booting#Modern boot loaders|Bootloader]]===
An [[Information technology|IT]] tool used working with the boot code of a device. When most computers are turned on, they don't possess an operating system, or applications, and need to load a series of progressively greater complexity programs to enable their operation. When healthy, a [[bootloader]] simply loads the correct programs, and the computer functions normally. However, compromised bootloaders allow commands (often hidden in the hacking context) to be input into the device after the next reboot. Popular options include announcing the ___location of the device when it connects to a network, adjusting the processing of the device so that the default device attributes are the choice of the hacker, annoying the owner of the device, and making a record of every action on the device. These programs allow for a variety of tasks to be set up in the boot record rather than just destroying the functionality of the device.
===[[Web browser|Browser]]browsers and [[Web search engine|Search Engines]]engines===
Browser[[Web browser]]s and [[web search engine|search combosengine]]s reduce the time for relevant information searches on most web hosts by exploring the data structure of the host, building some form of hierarchical information representation, and then allowing for rapid retrieval of information from specific leaf nodes. From a 2020 computing perspective, this exploration is usually performed much prior to the interaction with an endpoint user, and often involves significant corporate expenditures for [[Google data centers|data centers]]<ref>{{cite web |title=How Many Servers Does Google Have? |url=https://www.datacenterknowledge.com/archives/2017/03/16/google-data-center-faq |website=Data Center Knowledge |access-date=20 September 2018}}</ref> with extended costs<ref>{{cite news |last1=Sattiraju |first1=Nikitha |title=The Secret Cost of Google's Data Centers: Billions of Gallons of Water to Cool Servers |url=https://time.com/5814276/google-data-centers-water/ |access-date=22 October 2020 |agency=Bloomberg |publisher=Time Magazine |date=2 April 2020}}</ref> devoted to building and maintaining the hierarchical representation of the semantic web. A physical comparison to the challenge these systems face could be made to a blind and deaf person starting from a random position on Earth and attempting to find a specific piece of paper without knowing the searcher's ___location or the target's ___location and then solving for a [[Shortest path problem|minimal distance]] path to the desired object while providing relevant navigation information along the route.
===[[Configurator]] ([[Hot swapping|Hot Swap]])===
|