If it's IT related, it can be exploited.
Rule 1337 includes, but is not limited to:
Software
Internet
Commands
Hardware
Protocols
Encryption
by Buy $AMD January 13, 2020
Get the Rule 1337 mug.