Preventing Computer Eavesdropping and Hijacking