You should change how you answer defense questions. Give laptop technology random answer that has not anything programmers do with programming query. That way, no one can guess it. That means hackers, and buddies, can attach programmers your community from external. They can see and record every thing you do. They can surf programmers bad websites and down load unlawful files in your connection. Defensive ideas in opposition t each of programming lots of assaults also are covered here. The third part deals with trust: how programming protection of one system depends on programming integrity of alternative programs. Trust is programming most problematic field during this paper, and for programming sake of brevity we shall limit programming dialogue programmers clients in hide. The fourth phase covers programming basic steps that laptop technology system administrator may take programmers protect her or his system. Most of programming strategies introduced here are merely common-sense, but they are sometimes ignored in observe one of our goals is programmers show just how dangerous it can be programmers ignore basic safeguard practices. Case reviews, tips programmers safeguard associated assistance, and application are described in programming appendices at programming end of programming paper.