Four methods hackers use to steal data from air-gapped computers