With all the talk of computers being hacked, here are some of the basic FYI to understand what all the talk is about, and to keep you protected from becoming a victim. The term hacked Is a taking control of a computer or a network of computing machines by means of malicious code or program that enters the computing machine through an external source into an open vulnerable internal port with in the computer. When the malicious code, program or Denial of Service DDoS (DoS) attack, through a live hacker or automated code is enabled, the malicious code or program scans files looking for the Kernel of the computer or mainframe network computer daisy chained to a network of computers, this in order to take complete live control of a computer network system. Note most hacking takes effect through an external live real time hacker Denial of Service DDoS (DoS) attacking. Closed computers and networks without internet connections cannot be hacked they can be compromised through direct malicious tampering. Open local computers connected to the internet not linked or with daisy chained network connections, can be compromised with viruses or malware by means of e-mail or suspicious internet sites, which will mess up various computer programs, functions, computers, networks computer screens and communications but can be detected and eliminated and quarantined in real time by means of standard security and anti-mallwear performance software.