Introduction to the Most Common Security Vulnerabilities in Computers in 2025 and How to Resolve Them