Start with the basics. "No longer does a hacker have to huddle in front of a glowing monitor. Today's hacker has at his disposal a literal arsenal of fully automated tools, through which he can gain access to your system without . . .
Start with the basics. "No longer does a hacker have to huddle in front of a glowing monitor. Today's hacker has at his disposal a literal arsenal of fully automated tools, through which he can gain access to your system without lifting so much as a finger. These are known as "exploits."

The link for this article located at ZDNet is no longer available.