-
Notifications
You must be signed in to change notification settings - Fork 0
1337 5934¢#
Even several years before Tim Berners-Lee’s World Wide Web saw its first light of day back in 1991, leet speak was born. Back then when the internet was young, most search functionalities simply looked for keywords in text to show relevant documents. However, hackers weren’t very keen on having their information displayed on websites, bulletin boards, newsgroups or any other place, so they started to replace certain letters in words to obfuscate their communications… It started out with simple vowel substitutions like a
4
instead of anA
, or a3
instead of anE
. This made it more likely for postings related to cracking or hacking to remain undetected.
- Alternatively, there is a conspiracy theory is that
1337
speak was invented as a way to beat automatic government surveillance programs, such as the legendary Echelon program‽ - Initially, “leet speak” was only known within small circles, and was only used when necessary; it originated within bulletin boards subcultures, wherein someone having an “élite” status meant that person was allowed special access to file folders, games, or chat rooms… but the use of “leet speech” increased with expansions of internet connectivity into one of the most influential titles in the history of videogames: Doom and Doom II…
- In summary, “leet speak” evolved from a simple substitutions method to mislead search functionalities into a subcultural vernacular language for online gamers to describe formidable prowess or accomplishment. Phrases such as “1 4m 3l33t!” (“I am elite!”) were used by braggadocios experienced gamers (or hackers).
4 /\ @ /-\ ^ aye (L Д
I3 8 13 |3 ß !3 (3 /3 )3 |-] j3 6
[ ¢ { < ( ©
) |) (| [) I> |> ? T) I7 cl |} > |]
3 & £ € ë [- |=-
|= ƒ |# ph /= v
& 6 (_+ 9 C- gee (?, [, {, <- (.
# /-/ [-] ]-[ )-( (-) :-: |~| |-| ]~[ }{ !-! 1-1 \-/ I+I /-\
1 [] | ! eye 3y3 ][
,_| _| ._| ._] _] ,_] ] ; 1
>| |< /< 1< |c |( |{
1 £ 7 |_ |
/\/\ /V\ JVI [V] []V[] |\/| ^^ <\/> {V} (v) (V) |V| nn IVI |\|\ ]\/[ 1^1 ITI JTI
^/ |\| /\/ [\] <\> {\} |V /V И ^ ท
0 Q () oh [] p <> Ø
|* |o |º ? |^ |> |" 9 []D |° |7
(_,) 9 ()_ 2 0_ <| &
I2 |~ |? /2 |^ lz |9 2 12 ® [z Я .- |2 |-
5 $ z § ehs es 2
7 + -|- '][' † "|" ~|~
(_) |_| v L| µ บ
\/ |/ \|
\/\/ VV \N '// \\' \^/ (n) \V/ \X/ \|/ \_|_/ \_:_/ Ш Щ uu 2u \\//\\// พ v²
>< Ж }{ ecks × ? )( ][
j Ч 7 \|/ ¥ \//
2 7_ -/_ % >_ s ~/_ -\_ -|_
🐧
UNIX
is a multiuser, multitasking operating system designed for flexibility&adaptability. It was first developed in the 1970ₛ by Ken Thompson, Dennis Ritchie, et al. (in theAT&T
Laboratories). However, “Unix” has long since more commonly come to refer to the “family” of related operating‑systems that all derive from the original AT&T Unix. Considering its roots as a command‑line‑interface, “Unix” was originally designed&intended for skilled programmers developing software rather than casual or non‑technical users. Nonetheless, because Unix and theC
programming language were both so widely distributed to governmental&academic institutions, which ultimately led to both being ported onto a wider variety of machine families than any other operating‑system, it’s become one of the “interfaces” most ubiquitously available across an extremely broad variety of computers to at least some degree, or in a sometimes surprising amount of aspects… Technically, Unix is a stable, multi‑user, multi‑tasking system suitable for servers, desktops, or laptops. Its main features include simplicity, portability, versatility, multitasking&multiuser capabilities, an extensive library of (mostly free!) software, and a hierarchical file system.