Four basic steps can get hackers into most computers