tly hidden on anetwork. The sniffer is programmed to record, in a secret file, logos and passwords. In the span of a week, these tiny, planted programs can record hundreds of usernames and code words and their associated passwords. This information is then sent back to the hacker. Last year an advisory from Carnegie Mellon University'sComputer Emergency Response Team warned that, because of a rash of sniffing attacks, tens of thousands of passwords had been stolen and were presumed to becompromised. 4 Another tool a hacker has is a technique not a program or device. It is called Spoofing. The hacker must attempt to gain the highest level of access that a particularcomputer can give. From inside the computer the hacker can place a hidden program which will give him/her a "back door" allowing the hacker free access into thecomputer whenever he or she desires. 4 One viable future method of prevention, which is constantly being improved upon is the dongle. It was devised and developed by Bell Labs. The "dongle" is acalculator-sized machine, which gives a new password to the user every time he or she logs onto the Internet. 4 Personal Encryption devices turn normal text into aseries of illegible words and codes. These devices would protect your personal computer from any outside intruder who wouldn't want to spend their time breakingdown your information. Though, eventually hackers would want to be able to break those codes. It still is an important stride in the right direction. An annoying, andtime-consuming idea is encrypting all transmissions from computer to computer. One thing is for sure, all these devices will not keep a determined hacker out of asystem, and these defenses won't be cheap to buy. It will be a constant battle in the future. Unless people take responsibility into there own hands to protectthemselves from prying eyes, their lives can and will be intruded upon. We can take precautions with current software like Black Ice,...