Solved

language

Posted on 2004-10-06
2
282 Views
Last Modified: 2013-11-13
1337
Translation: leet
Short for elite (31337), which is the UDP (User Datagram Port) used by a hacker group called the Dead Cow Cult.

1337 is simply a language of symbols that look similar to the english alphabet.
Using this system,

"L=S"

L Replacing an english letter

S Replacing a leetian symbol

here is a list of the leetian characters.

A=4
B=8
C=(
D=|)
E=3
F=ph
G=6
H=|-|
I=!
J=_|
K=|<
L=1
M=/\/\
N=/\/
O=0
P=|>
Q=0,
R=|2,|-
S=5
T=7
U=|_|
V=\/
W=\/\/
X=><
Y=`/
Z=see

Notice their similarities to the alphabet.
"/\/" looks kind of like "N" and,
"\/" looks kind of like "V."

It's not too complicated. I'm confident anyone can learn. Please use it wisely though, for I hate when it substitutes that which should simply be english. Maybe google will add it to their Translator in Language Settings...
(use it to confuse old people)
0
Comment
Question by:IOException
2 Comments
 
LVL 22

Accepted Solution

by:
cookre earned 50 total points
ID: 12241987
1337  5|>33|<  :  puerile drivel used by KeWl DoOdZ who have finally figured out how to run scripts written by others to change the desktop wallpaper.  Frequency of use is most often in inverse proportion to need for facial depilation.
0
 
LVL 1

Expert Comment

by:Feldspar
ID: 12243603
http://www.google.com/intl/xx-hacker/ is a start.

l33t sp33k in one form or another has been around for a long time, and has slowly made its way from hackers to pirates to fps gamers to aolers.  it could have been derived from hexadecimal notation, beeper messaging, or being forced to l33t-ify your screen name to make it unique.  its popularity in hacker circles was probably origionally due to its difficulty to read and decipher, especially by programs that would search text for particular words.  eventually it spread to different subcultures on the internet, picking up specialized jargon on the way, and creating terms such as l33t h4x0r, g4m3z, w00t, eye r0x0r j00, and NOE I C4N7 1M t3h GR0UND3Dx0r!

Now, sadly, its mostly a tool used by tools, and the True Hackers can easily identify a poser by over-use or mis-use of teh l33t sp33k.
0

Featured Post

Master Your Team's Linux and Cloud Stack!

The average business loses $13.5M per year to ineffective training (per 1,000 employees). Keep ahead of the competition and combine in-person quality with online cost and flexibility by training with Linux Academy.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Weather Research and Forecasting (WRF) model 1 54
How to setup Redhat on HP server? 3 33
SQL Insert parts by customer 12 34
backup program with robocopy 6 22
A short article about a problem I had getting the GPS LocationListener working.
This article will inform Clients about common and important expectations from the freelancers (Experts) who are looking at your Gig.
Viewers will learn how to properly install Eclipse with the necessary JDK, and will take a look at an introductory Java program. Download Eclipse installation zip file: Extract files from zip file: Download and install JDK 8: Open Eclipse and …
In this fifth video of the Xpdf series, we discuss and demonstrate the PDFdetach utility, which is able to list and, more importantly, extract attachments that are embedded in PDF files. It does this via a command line interface, making it suitable …

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question