Conclusion
In this chapter, you learned that some trivial things, such as computer file systems, or common actions, such as browsing the Internet, are highly vulnerable to intruders. Every freshly installed system is like a house with all doors and windows open. It is the user's duty to close all these doors and windows.