This document discusses various internet security issues such as web spoofing, denial of service attacks, trojans, and SQL injection attacks. It provides details on how each attack works from the perspective of a hacker, including how web spoofing allows monitoring of a victim's online activities, how SYN flooding can be used in DoS attacks, how trojans can hide in a system's registry and startup folders to gain remote access, and how SQL injection can exploit poorly designed database queries. The intention is to help system administrators understand these threats to better secure their systems.