How Hacking Occurs