2- Anything relating to malicious use of the internet.
2- since the software's ony use was generating registration keys for legitamite software, it was considered balck hat software.
In addition, it is often assumed that he is in someway affiliated with the group of hackers also known as blackhat, it is said that this name is used not in attempts to copy these people, but is rather for personal reasons.
Examples of blackhat techniques are cloaking, stuffing pages with keywords or links and using unnatural redirects.
The term was inspired by old western movies' villains always using a black cowboy hat.