Guy1: Hey, is someone trying to screw with our server?
Guy2: Don't worry, it's just some h4x0r kids from geocities.
Guy2: Don't worry, it's just some h4x0r kids from geocities.
by JiaXue December 22, 2003
Get the h4x0r5 mug.
Get the h4x0r5 mug.Related Words
h4x0r5 • 1337 H4x0r5 • h4x0r • h4x0rz • h4X0r3d • h4x0r1z4t10n • h4x0rd • h4x0rm4573r • h4x0rn • h4x0r r3l4x0r
Get the h4x0r5 mug.H4x0r1: WTF??? No way... ur 2 good, ur a H4x0r, i know it
H4x0r2: stfu ur H4xing 2, and btw im 1337
H4x0r1: so
H4x0r2: I guess that makes us 1337 H4x0r5
H4x0r2: stfu ur H4xing 2, and btw im 1337
H4x0r1: so
H4x0r2: I guess that makes us 1337 H4x0r5
by Drüd October 19, 2008
Get the 1337 H4x0r5 mug.by Jose Ole May 21, 2004
Get the 1337 H4x0r5 mug.l33t is internet slang for "Elite", supa is shortened from "Super" and h4x0r is again internet speak for "Hacker" so you end up with Elite Super Hacker which is a person who is really good at hacking (consult dictionary for definition of hacking) l33t supa h4x0r is actually a cheat in a game called Age Of Mythology which allows unit production, building and peasant gathering to speed up immensly
by Nightbringr December 26, 2009
Get the l33t supa h4x0r mug.Commonly known as a "script kiddie", the work 'h4x0r' implies 'hacker'. People lame enough to use this word are generally not serious hackers, and are most likely using ready-made and easily-found tools on the internet. They generally have little knowledge of the tools that they use or how they work. Usually of little harm, they will probably trojan your computer, steal all of your CD-keys, mess with your email, and steal any online-gaming accounts that you have. They do have some use, as they are commonly found sending AOL pedofiles trojaned software, and then deleting all of their images.
The more serious of this group will spend hours and hours a day scanning the internet for computers that are vulnerable to a security hole. They will then exploit that hole (using some pre-made tool) and use what is known as a 'rootkit' to give them 'root' (or total control) over a computer. This most commonly happens to Linux and Unix computers, although there was a flurry when the Microsoft RPC vulnerability was announced (see slammer worm).
Commonly-used tools include:
Sub7, BioNet, Net-Devil, NetBus, RAT,Optix, Optix Pro.
The more serious of this group will spend hours and hours a day scanning the internet for computers that are vulnerable to a security hole. They will then exploit that hole (using some pre-made tool) and use what is known as a 'rootkit' to give them 'root' (or total control) over a computer. This most commonly happens to Linux and Unix computers, although there was a flurry when the Microsoft RPC vulnerability was announced (see slammer worm).
Commonly-used tools include:
Sub7, BioNet, Net-Devil, NetBus, RAT,Optix, Optix Pro.
Not applicable.
by Uhh December 29, 2003
Get the h4x0r mug.