diff --git a/docs/jargon-org.txt b/docs/jargon-org.txt index ae8870a..02a12e1 100644 --- a/docs/jargon-org.txt +++ b/docs/jargon-org.txt @@ -19,7 +19,7 @@ Free Documentation License". * Generated -This file last generated Friday, 10 March 2017 01:19PM UTC +This file last generated Friday, 10 March 2017 01:27PM UTC * Glossary ** ( @@ -3824,6 +3824,9 @@ n. The process of grovel ling through a core dump or hex image in an attempt to *** exercise, left as an adj. [from technical books] Used to complete a proof when one doesn't mind a handwave , or to avoid one entirely. The complete phrase is: The proof [or the rest ] is left as an exercise for the reader. This comment has occasionally been attached to unsolved research problems by authors possessed of either an evil sense of humor or a vast faith in the capabilities of their audiences. +*** exfiltrate +To copy data from a system without authorisation. Typically referring to the obtaining of personal data via Man in The Middle (MiTM) attacks on communications systems or implanted end points. + *** exploit 1. A vulnerability in software that can be used for breaking security or otherwise attacking an Internet host over the network. The Ping O' Death is a famous exploit. diff --git a/docs/jargon.1.gz b/docs/jargon.1.gz index 7082b8d..09b183c 100644 Binary files a/docs/jargon.1.gz and b/docs/jargon.1.gz differ diff --git a/docs/jargon.html b/docs/jargon.html index 4bb12d9..418b4b6 100644 --- a/docs/jargon.html +++ b/docs/jargon.html @@ -18,7 +18,7 @@ Free Documentation License".

Generated

-This file last generated Friday, 10 March 2017 01:19PM UTC +This file last generated Friday, 10 March 2017 01:27PM UTC

Glossary

@@ -4529,6 +4529,10 @@ This file last generated Friday, 10 March 2017 01:19PM UTC

adj. [from technical books] Used to complete a proof when one doesn't mind a handwave , or to avoid one entirely. The complete phrase is: The proof [or the rest ] is left as an exercise for the reader. This comment has occasionally been attached to unsolved research problems by authors possessed of either an evil sense of humor or a vast faith in the capabilities of their audiences.

+

exfiltrate

+

+ To copy data from a system without authorisation. Typically referring to the obtaining of personal data via Man in The Middle (MiTM) attacks on communications systems or implanted end points. +

exploit

1. A vulnerability in software that can be used for breaking security or otherwise attacking an Internet host over the network. The Ping O' Death is a famous exploit.

diff --git a/entries/exfiltrate.txt b/entries/exfiltrate.txt new file mode 100644 index 0000000..edd2e6e --- /dev/null +++ b/entries/exfiltrate.txt @@ -0,0 +1,5 @@ +exfiltrate + +To copy data from a system without authorisation. Typically referring to +the obtaining of personal data via Man in The Middle (MiTM) attacks on +communications systems or implanted end points. \ No newline at end of file