. . "By Neil J. Rubenking Hackers take advantage of weaknesses in your operating system, your browser, or other software." . .