System Hacking Guide