How To Protect Your Network From Intruders