How Hackers access Vulnerabilities in Computer | for Education Purp...