"Since the restrictions are not in the software a hacker can use methods and other programs to manipulate and change parts of the open source software." . . . .