"From there, the hacker can do much damage by issuing system-level commands that can erase huge chunks of data, or retrieve passwords and other important information." . . . .