Topics Related to Activation, Authentication and Vulnerability: