Different Types of X-Hat Hackers : Simply Explained!