0mfg s0m30n3 wh0 us3s g4y h4x0rz 1n g4m3s l1k3 CS s0 th3y c4n w1n b3c4us3 th3y 4r3 n00bs
h4x0rz 4r3 t3h gh3y
h4x0rz 4r3 t3h gh3y
by a kid w/ no life August 9, 2004
Get the h4x0rz t0 t3h m4x0rz mug.l33t is internet slang for "Elite", supa is shortened from "Super" and h4x0r is again internet speak for "Hacker" so you end up with Elite Super Hacker which is a person who is really good at hacking (consult dictionary for definition of hacking) l33t supa h4x0r is actually a cheat in a game called Age Of Mythology which allows unit production, building and peasant gathering to speed up immensly
by Nightbringr December 26, 2009
Get the l33t supa h4x0r mug.Related Words
h4x0rz • h4x0rz t0 t3h m4x0rz • h4x0r • h4X0r3d • h4x0r5 • h4x0r1z4t10n • h4x0rd • h4x0rm4573r • h4x0rn • h4x0r r3l4x0r
Commonly known as a "script kiddie", the work 'h4x0r' implies 'hacker'. People lame enough to use this word are generally not serious hackers, and are most likely using ready-made and easily-found tools on the internet. They generally have little knowledge of the tools that they use or how they work. Usually of little harm, they will probably trojan your computer, steal all of your CD-keys, mess with your email, and steal any online-gaming accounts that you have. They do have some use, as they are commonly found sending AOL pedofiles trojaned software, and then deleting all of their images.
The more serious of this group will spend hours and hours a day scanning the internet for computers that are vulnerable to a security hole. They will then exploit that hole (using some pre-made tool) and use what is known as a 'rootkit' to give them 'root' (or total control) over a computer. This most commonly happens to Linux and Unix computers, although there was a flurry when the Microsoft RPC vulnerability was announced (see slammer worm).
Commonly-used tools include:
Sub7, BioNet, Net-Devil, NetBus, RAT,Optix, Optix Pro.
The more serious of this group will spend hours and hours a day scanning the internet for computers that are vulnerable to a security hole. They will then exploit that hole (using some pre-made tool) and use what is known as a 'rootkit' to give them 'root' (or total control) over a computer. This most commonly happens to Linux and Unix computers, although there was a flurry when the Microsoft RPC vulnerability was announced (see slammer worm).
Commonly-used tools include:
Sub7, BioNet, Net-Devil, NetBus, RAT,Optix, Optix Pro.
Not applicable.
by Uhh December 29, 2003
Get the h4x0r mug.Elite/l33t/31337 hax0rz are hackers. If they really talk like this, they're probably not elite nor hackers at all. But play along with them.
by Jagfire March 10, 2003
Get the hax0rz mug.One who is new a hacking into computer information. One who uses popular, cheap, and easy programs to hack into information.
by Jimmy Lindley May 24, 2005
Get the noob h4x0r mug.by Face April 16, 2006
Get the L337 H4x0r mug.