Parasitic computing refers to a form of distributed computing where a user's computer resources are exploited by others without their knowledge, diminishing the user's connection speed for unauthorized purposes. The document explains the mechanisms behind this phenomenon, emphasizing the role of standard communication protocols like TCP and HTTP in exploiting computational tasks through specially crafted TCP packets. It raises ethical concerns about the potential future vulnerabilities and considers the impact on server performance and service denial due to this exploitation.