??????????? ??????????? ? ??????: ??????????? ?????? ???????? ??? ?????? ???????The programmer subculture of hackers sees secondary circumvention of protection mechanisms as legitimate if it is done for getting functional obstacles away from the way for accomplishing genuine perform. In special sorts, that will even be an expression of playful clev