In this chapter we have shown examples of how host and network security is compromised using methods described previously. This brings an end to our discussion of problems with security on a host and network level. This concludes the syshackadminer's ``hacker training'' part of our technical problems of host and firewall security. With the problems covered, we now need solutions. In the next chapter, we start our discussion of providing technical solutions to the problems presented in the last three chapters. The next chapter is the beginning of the syshackadminer's ``system administrator training.''