Again that is incorrect. You can not gain access or authenticate to an application, device or network without existing code. It simply does not work that way. Computers are told what to do and how to do it thru code. That includes authentication processes.