I'm not completely a noob, I've hacked plenty of systems, but what exactly is the difference between a primary exploit and a secondary exploit? I know that you need a primary exploit for installing secondary exploits, but what else is there that I'm missing?