![](https://seccdn.libravatar.org/avatar/4d0f6f93171d5cb967a4ee0d74b7efea.jpg?s=120&d=mm&r=g)
On Monday 13 January 2003 10:16, The Purple Tiger wrote:
On Monday 13 January 2003 5:34 pm, James Mohr wrote:
Hi All! In the past couple of days, I have seen a number of references to h4x0red. I googled on it, but found only sites that have been hacked
h4x0red is "hacked" in "leet speak" or "l337 sp34k" where numbers replace letters due to a similarity in shape [3 is E mirrored ;o)] The ones I know of are: 0 O 1 I 2 3 E 4 A 5 S 6 7 T 8 9 G
Oh, and the "x" tends to refer to a "ck" or "cks" and "0red" or "0r" is just kind of a slang extenstion. :o) Look up "leet speak" on google - it may provide more of an insite.
HTH :o)
Jon
So, as an avid online gamers I'm faced with this constantly. My call sign "Crusher-1" would appear as Cru5h3r-1 and L33t 5p84k is commonly used by script kiddies and people that have some ablility to compromise systems or Hack (Hax) a system, game/game file. Most likely I would avoid any indepth involvement from such individuals because they are generally adolescent and mailcious by nature. The are commonly associated in the gaming world as cheaters. One such case I found particularly distastful was one individual that was playing on a popular Counter-Strike sever. This person would spam the ingame chat line with "BYE" repeatedly and then execute a script that would crash each persons game AND the game server (which coincidently was a Linux server). They tend to pride themselves in defacing, control, and otherwise screwing up indisciminant end-users' systems, most exclusively (of course) Windblows. They are known for planting trojans and consider it a point of honor to brag about how many "zombies" they have control over. More sophisticated H4x0r5 can do some pretty substantial damage and have been know to have, at least, some unix admin skills and may have the knowledge related to spoofing IP addresses, email address, etc... Of course a real malicious "hacker" will generally keep their identity unkown and perfers to operate in stealth and in the shadows. One such case of a group of H4xo5s can be found on Steve Gibson site: www.grc.com Wherein he discusses a DDoS attack his server suffered at the hands of a known script kiddie (13 or 14 y.o) from Wisconsin (my own backyard) and how he got his hands on one of Trojans, re-engineered it to return to it home (place of origin) and covertly send information about the site back to him (as well as the owner/admin responsible). Seems he discovered a series of "secret" (aka non-listed) IRC channels frequented by script kiddies. It's a long but interesting read. Cheers, Curtis. -- The reasons behind the DMCA, TCPA, and Palladium that are presented to the public are only secondary to their real purpose. That is to lock in markets, stiffle competition and pidgeon hole consumers from any viable alternatives that the sponsers see as competitive and a threat to their market shares and business models.