The rules for this problem are well defined and sim ple, yet the answer eludes m any. Like the solution to this problem (shown on the last page of this book), hacked solutions follow the rules of the system , but they use those rules in counterintuitive ways. This gives hackers their edge, allowing them to solve problem s in ways unim aginable for those confined to conventional thinking and m ethodologies.