Intrusion Prevention Techniques on Windows and Unix