Which protocols are used to prevent hacking?

Article is closed for comments.