??????????? ??????????? ? ?????: ???????? ????? ?????????? ??? ???????Several hackers purpose to breach defenses by exploiting either complex or social weaknesses. Technological weaknesses contain vulnerabilities in software package or other exploitable weak spots. To take advantage of social weaknesses, hackers endeavor to manipulate social outcom