Real Threats to Computer Security, how Users can Protect Themselves