Hackers and You: How Do Hackers Compromise Servers?