The document describes various tricks, tools, and techniques that hackers use to gain unauthorized access to computer systems. It focuses on Solaris Operating Environment systems and outlines basic port scanners, vulnerability scanners, rootkits, and sniffers that are commonly used by hackers, even those with limited technical expertise. The document provides examples of how easily available tools can be used to scan for vulnerabilities and compromise unsecured systems.