How Hackers Hack into Secure Systems – zSecurity