Solved

language

Posted on 2004-10-06
2
281 Views
Last Modified: 2013-11-13
1337
Translation: leet
Short for elite (31337), which is the UDP (User Datagram Port) used by a hacker group called the Dead Cow Cult.

1337 is simply a language of symbols that look similar to the english alphabet.
Using this system,

"L=S"

L Replacing an english letter

S Replacing a leetian symbol

here is a list of the leetian characters.

A=4
B=8
C=(
D=|)
E=3
F=ph
G=6
H=|-|
I=!
J=_|
K=|<
L=1
M=/\/\
N=/\/
O=0
P=|>
Q=0,
R=|2,|-
S=5
T=7
U=|_|
V=\/
W=\/\/
X=><
Y=`/
Z=see

Notice their similarities to the alphabet.
"/\/" looks kind of like "N" and,
"\/" looks kind of like "V."

It's not too complicated. I'm confident anyone can learn. Please use it wisely though, for I hate when it substitutes that which should simply be english. Maybe google will add it to their Translator in Language Settings...
(use it to confuse old people)
0
Comment
Question by:IOException
2 Comments
 
LVL 22

Accepted Solution

by:
cookre earned 50 total points
ID: 12241987
1337  5|>33|<  :  puerile drivel used by KeWl DoOdZ who have finally figured out how to run scripts written by others to change the desktop wallpaper.  Frequency of use is most often in inverse proportion to need for facial depilation.
0
 
LVL 1

Expert Comment

by:Feldspar
ID: 12243603
http://www.google.com/intl/xx-hacker/ is a start.

l33t sp33k in one form or another has been around for a long time, and has slowly made its way from hackers to pirates to fps gamers to aolers.  it could have been derived from hexadecimal notation, beeper messaging, or being forced to l33t-ify your screen name to make it unique.  its popularity in hacker circles was probably origionally due to its difficulty to read and decipher, especially by programs that would search text for particular words.  eventually it spread to different subcultures on the internet, picking up specialized jargon on the way, and creating terms such as l33t h4x0r, g4m3z, w00t, eye r0x0r j00, and NOE I C4N7 1M t3h GR0UND3Dx0r!

Now, sadly, its mostly a tool used by tools, and the True Hackers can easily identify a poser by over-use or mis-use of teh l33t sp33k.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this post we will learn how to connect and configure Android Device (Smartphone etc.) with Android Studio. After that we will run a simple Hello World Program.
Although it can be difficult to imagine, someday your child will have a career of his or her own. He or she will likely start a family, buy a home and start having their own children. So, while being a kid is still extremely important, it’s also …
In this fourth video of the Xpdf series, we discuss and demonstrate the PDFinfo utility, which retrieves the contents of a PDF's Info Dictionary, as well as some other information, including the page count. We show how to isolate the page count in a…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now