Computer Hacking Methods and Protection