???????? ?????????? ??????? ? ?????: ???????? ????? ?????????? ??? ?????? ???????The programmer subculture of hackers sees secondary circumvention of security mechanisms as reputable if it is finished to have sensible boundaries away from the way for carrying out true work. In special types, that may even be an expression of playful cleverness.[28]