???????? ??????????? ? ?????: ??????????? ?????? ???????? ??? ?????? ???????Lots of hackers intention to breach defenses by exploiting either technological or social weaknesses. Complex weaknesses include vulnerabilities in program or other exploitable weak spots. To exploit social weaknesses, hackers try to manipulate social results through Wrong