1. If an attacker can convince you run his program on your computer, then the computer is no longer you.
2. If an attacker can change the operating system on your computer, the computer is no longer you.
3. If an attacker can access your computer unrestricted, the computer will no longer belong to you.
4. If you allow attacks to get this uploader to your Web site, then the site is no longer you belong.
5. Rapid security will also be buried in the fragile password.
6. The safety of the computer is subject to the reliability of the administrator.
7. The security of encrypted data is subject to the security of the decryption key.
8. Outdated virus scanners are not much better than no virus scanning program.
9. Absolute anonymity is not practical in the real truth or in the Web.
10. Technology is not a million drug.
I hope that the above ten must have a good remember.