This document discusses hacking and methods for defending against it. It provides background on common hacking techniques like smurfing and spoofing. It also lists estimated costs of major computer worms and viruses. The document demonstrates hacking methodology, including gathering target information, identifying services, exploiting vulnerabilities, and preventing attacks. It recommends defenses like firewalls, intrusion detection systems, and keeping software patched.