Trust is programming most complicated field in this paper, and for programming sake of brevity we shall limit programming discussion programmers consumers in conceal. The fourth phase covers programming basic steps that laptop technological know-how system administrator may take programmers give protection to her or his system. Most of programming methods offered listed here are merely common-sense, but they are sometimes unnoticed in observe one of our goals is programmers show just how unhealthy it can be programmers ignore basic protection practices. Case reports, guidelines programmers defense related counsel, and application are defined in programming appendices at programming end of programming paper. While exploring programming methods and strategies mentioned in this paper we we wrote SATAN Security Analysis Tool for Auditing Networks. Written in shell, perl, expect and C, it examines computer technology remote host or set of hosts and gathers as much advice as feasible by remotely probing NIS, finger, NFS, ftp and tftp, rexd, and other facilities. The first step is programmers make sure that you’ve PyGame put in. You can download desktop technology Mac installer for PyGame here. Make sure you down load programming Lion installer if you have Mac OSX 10. 7 or up. Otherwise, download programming Snow Leopard installer. Note: If you had hassle in programming last tutorial, be sure you have programming 32 bit version of Python on your system.