Holes are in hardware, software, agreement or system security strategy implementation on defects, which can make the attacker can in unauthorized access to or damage the system. Specific for example, for instance in the Intel Pentium chip exist in logic errors, in earlier versions of Sendmail programming errors in NFS authentication protocol approach weaknesses, in the Unix system administrator Settings anonymous Ftp service to misconfiguration problems may be attacked the use, threat to the security of the system. So these can be considered systems exist security vulnerabilities.