Abstract
Computer break-ins are getting more common every day. Log files and even program
binaries are changed, making it very hard for the system administratiors to assess the
damage and track down the intruders. This paper describes the "modus operandi" of
hackers based on mulitiple hacking attempts that occurred during this year at some
department computers. Special attention is paid to the methods they use to break into
computer systems and what they do once they are in.