Computer Security Breaches and Trojan Horse Backdoors