The Case of the Breech of Security of Trespassing Possessors at the Computer, Possessing Arms, Hands, Eyes, Face, Breathe, etc. Sabotaging My Work on the Computer.