How Hackers Break In. . . and how they are Caught