The document discusses how hackers can gain access to computer systems and the information within. It describes how hackers use tools like port scanners to find vulnerabilities, and how trojan horse viruses can be used to install remote access software onto a target system without the user's knowledge. Basic tips are provided on how to protect against these kinds of attacks, such as turning off file sharing and being wary of unexpected program files received from others.