??????,??????,?????,????,??????,??????????,???????,??????,??????,?????,??????,??????,??????,????????,?????,?????,?????Several hackers aim to breach defenses by exploiting possibly specialized or social weaknesses. Technical weaknesses include vulnerabilities in computer software or other exploitable weak spots. To exploit social weaknesses, hackers