Hacking includes, but is not limited to, the following activities: illegally or without authorization, accessing computers, accounts or networks, penetrating or attempting to penetrate security measures, port scans, stealth scans, and other activities designed to assist in hacking.