AKA: BrEeEzAh (from the Bacardi Breezer drink)
- Terms used by hacker community
- Text reformatted to look similar to its original language but using different characters
- 1 1. Terms used by the hacker community
- 2 2. Reformatted text
- 3 Related
1. Terms used by the hacker community
- Sploit – short for “exploit,” software that will cause harm to a vulnerable program
- Zero day – a ‘sploit’ very recently discovered
- Spoofing (see page)
- Sniff – to look at information passing through a network
- SATAN – originally a network attack system, now a legitimate system-audit tool used by most security-consious admins. O’Reilly publishing even wrote a book about it
- Smurf – a variation on spoofing
There are a variety of other terms including:
- patriot hacker
- ethical hacker
- dark-side/black hat hacker
- white hat hacker
- Hacking and Hackers
- war chalking
- packet monkey
- back hacking
Although most hackers consider themselves above warez, this term is also considered hackerspeak because, while most words have a core word from which they come, most hackerspeak was created by adolescents and therefore reference much more modern origins.
2. Reformatted text
Replacing normal characters with similar-looking alternates.
- very good to hear would translate to: v3ry g00d 2 h33r
- no bad news about the car would translate to: .n0 bad n3w5 ab0ut ht3 k@r.
by preventing a search of text for dangerous words
- Making one’s self less visible when communicating on the Internet, especially with e-mail reading tools like Carnivore and commercial services like Google. The format can also vary wildly with W’s appearing as // (a series of slashes) or “S” appearing as “$”, among others.
- This change-of-text can go to very strong extremes with whole new languages based around keyboard characters. Hackerspeak, like many languages, may one day have its own dialects and cultural variations. This communication could be in any range of complexity due to the assumed language-adept, high-intelligence of most hackers.
- Some users of reformatted text are considered to be script kiddies while the 3l33t3 use cryptography to be obscure. While some Hackers consider Hackerspeak moronic or childish, the phenominon is not limited to a few people or one sector. As information is power, keeping your communications secure through obscurity can be wise.
Use in Passwords
- Because there is no dictionary for hackerspeak and its use is sufficiently random, it can be used for most passwords, as long as the core word is not predictable, such as a play on your name or one of the above-listed hacker terms like “sploit” and “smurf.”
Variation: Mixed-up inner words
- ‘Aoccdrnig to a rscheearch at an Elingsh uinervtisy, it deosn’t mttaer in waht oredr the ltteers in a wrod are, the olny iprmoetnt tihng is taht frist and lsat ltteer is at the rghit pclae. The rset can be a toatl mses and you can sitll raed it wouthit porbelm. Tihs is bcuseae we do not raed ervey lteter by it slef but the wrod as a wlohe. ceehiro.’
- The New Hacker Dictionary – Eric Raymond
- degraeve.com‘s Hackerspeak Translater (sort of) … also includes a nifty ROT-13 tool.
TakeDown.NET -> “Hackerspeak”