How to fend off aggressive white-hat hackers Recently, a former student of mine wrote me asking how to handle an overzealous white-hat hacker. In this case, the hacker had probed the publically exposed computer networks and assets of my friend’s company, then left multiple copies of a document describing the weaknesses he found — and asked to be hired to close the holes and locate more weaknesses.