Demystifying Technology without Jargon

  1. API
  2. Binary Code
  3. Cache
  4. Compiling
  5. Cookie
  6. Database
  7. Defragmenting
  8. Exploit
  9. IP Address
  10. Open Source
  11. Phishing
  12. Router
  13. Server
  14. VPN
  15. Web Browser


An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur...


An Exploit is the Thermal Exhaust Port on the Death Star

In Star Wars, the Rebel Alliance took advantage of their technical readout of the Death Star in order to find it's one weakness: a small, two-meter-wide port that could cause the whole station to explode. Only when the attach commenced did the Empire find the vulnerability, and even then they didn't consider it a threat to their massive space station.

The same is true of servers and other systems. Brilliant inddividuals with intensely intimate knowledge can launch a successful attacks on susceptible systems, even when the administrators of those systems consider them safe. This often results in the leaking of information, (credit cards, passwords, etc) or even complete annihilation of the system itself.


Hear a term that you wish had a metaphor? Tweet us, post it to Facebook, or, if you're feeling geeky, open a new task on Github!

Created by Clint Andrew Hall, licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.