Which of the following is NOT mentioned in the passage as an instance of attack by a hacker?
A. Deleting information in the computer’s memory.
B. Shutting down the computer whenever he wishes.
C. Entering your house to steal.
D. Spoiling a system for air traffic.