1 definition by Buy $AMD

1
If it's IT related, it can be exploited.
Rule 1337 includes, but is not limited to:
Software
Internet
Commands
Hardware
Protocols
Encryption
by Buy $AMD January 13, 2020
Get the mug
Get a Rule 1337 mug for your girlfriend Zora.