Stands for Eleet. This is the original form of pointing out one's greatness from any standpoint, beit athletic skills, academics, or even hacking or cracking processes.
It was coined by a cdc group when they listened on a port :31337 and pointed out the Eleet-31337 - ness of their exploits.
It was coined by a cdc group when they listened on a port :31337 and pointed out the Eleet-31337 - ness of their exploits.
Dude you're true 31337.
1337 is a later variant used mostly by trendy kids who like to taunt others in online video game play.
1337 is a later variant used mostly by trendy kids who like to taunt others in online video game play.
by LarstaiT February 21, 2005

Hacker code of morality that was originally formed by the MIT hackers in the late 1950s to the late 1960s and articulated by Steven Levy in his book HACKERS: HEROES OF THE COMPUTER REVOLUTION. The creed is as follows:
1)Always yield the Hands-On Imperative! Access to computers-- and andything else which might teach you about the way the world works-- should be unlimited and total.
2) All information should be free.
3) Mistrust Authority-- Promote Decentralization.
4) Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
5) You can create art and beauty on a computer.
6) Computers can change your life for the better.
While many of the 1960s hackers claim that modern hackers have rejected this code, it has actually strongly influenced all hackers for the last thirty years.
1)Always yield the Hands-On Imperative! Access to computers-- and andything else which might teach you about the way the world works-- should be unlimited and total.
2) All information should be free.
3) Mistrust Authority-- Promote Decentralization.
4) Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
5) You can create art and beauty on a computer.
6) Computers can change your life for the better.
While many of the 1960s hackers claim that modern hackers have rejected this code, it has actually strongly influenced all hackers for the last thirty years.
by LarstaiT November 06, 2003

1. Ready and willing to be taught; tactable.
2. Disposed to be taught; tractable; easily managed; as, a docile child.
2. Disposed to be taught; tractable; easily managed; as, a docile child.
by larstait October 11, 2003


Although impossible to completey shut out because so many million remote servers around the world contain it's entirity, it is possible to trace it's independent providers and commence butt raping and incarceration.
by larstait October 10, 2003

by larstait October 30, 2003
