This document provides an overview of computer security, including the results of a penetration test on a virtual machine. It discusses the vulnerabilities found and provides recommendations for improving security. The document also covers information gathering, IP and MAC address identification, virtual hosting, scanning, and web scanning. The methodology, scope, and tools used are explained in detail.