Creating a Hack-Proof Computer