This text shows how security is implemented in the computer world, and the ways in which those checkpoints can be side-stepped by trespassers intent on doing harm. It also shows ways of cutting your losses, catching hackers and limiting their access.