Which of the following is NOT mentioned in the passage as an instance of attack by a hacker
A.Deleting information in the computer's memory. B.Shutting down the computer whenever he wishes. C.Entering your house to steal. D.Spoiling a system for air traffic.