In eleven pages this paper provides solutions to problems of system security compromising such as the infiltration of hackers. Seven sources are cited in the bibliography.