High-profile celebrities, multinational corporations, and military institutions all share one thing in common: They were all compromised before or have their accounts and networks infiltrated by computer hackers. However, never assume that hackers only aim at prominent and valuable targets. Hacking of computers and Internet accounts for personal and financial information is becoming more prevalent and more and more computer users and Web surfers are at risk of falling victim to them. News media has recently reported of increasing attempts by hackers to take control of e-mail accounts and social network webpages such as Twitter and Facebook. More and more computer users have enlisted the help of purchased or free antivirus solutions and professional advice to help them deal with hacking intrusions. Before we continue on with this article, we will need to define clearly what "hacking" really means and what actions do it constitutes or covers. Hacking is the general term that is used to identify attempts by persons or users to make off with your e-mail records, computer system, network connections, and Internet security settings. Simply put, it is any effort by hackers and other shady individuals to use the Web or local network to intrude in your PC or laptop and steal your important information. To the accomplished hacker or to any computer expert in general, hacking can be a relatively basic action that can be accomplished with minimum effort. With the right skill set and attitude, basically anyone can get into computer and Internet accounts illegally and pilfer away critical personal information. A computer user can be called a hacker if he or she somehow gets the e-mail account password or Facebook account name of other individuals and uses them to steal personal information. They often take advantage of the fact that many passwords can easily be guessed; many computer and Internet users sadly only use "1234" or the term "password" as their password for important personal computer and online accounts. E-mail accounts and addresses are often targeted by hackers because they are often used as access points to your confidential Internet data. Hackers can also use other more complicated means and tools to gain control of computer files and make off with critical personal data such as Trojan horses, spam, spyware, and phishing; oftentimes, they can bypass the protective screen that is provided by most paid or free antivirus applications. There are some hacking techniques that are so complicated and difficult to understand that only professional computer users and experts are able to follow them. They are used by skilled hackers to infiltrate and compromise the computerized networks of private corporations and government institutions, despite the high level of security that are provided for them.