This document discusses how to securely, safely, and ethically manage computers. It defines computer security risks such as hackers, crackers, and viruses. It describes different types of internet attacks like worms, Trojan horses, and denial of service attacks. It discusses ways to prevent unauthorized access like passwords, firewalls, and intrusion detection software. It also covers issues like software piracy, hardware theft, system failure, backing up data, health concerns, and computer ethics. The overall goal is to help users understand and address security threats while using computers responsibly.