Illustration of how hackers can break int someone's persona computer or business network