All other conclusion should be introduced according to local criteria or even the particular hacker directions