"These goals are impossible to realize without solving the following problems: The first problem is that experiments with software that is related to network security such as software that tests the security of a network and experiments with different software and hardware configurations may compromise the network security of an institution. ??? The rest of this article is only available to active" . . . .