most common ones are by sending a single packet to your machine and slipping in, getting access through an open port, or if your computer is a server flooding your server and then taking advantage of the down time to sneak in. To ensure maximum security you should have a firewall, close ports you don't need, and have traffic moniters.