From what I've read, you're basically asking for information about how a machine could be broken into by various tools, exploits, and whatnot. Nothing's wrong with that but you should know that this...