from Wiktionary, Creative Commons Attribution/Share-Alike License

  • n. Plural form of haxor.
  • v. Third-person singular simple present indicative form of haxor.


Sorry, no etymologies found.


  • Now that a certain Three Letter Agency has changed the name of their principle spyware from Carnivore to the much spookier-sounding DCS1000, some open-source art-haxors have appropriated the name and made whacky cyber-art out of it.

    Boing Boing: March 10, 2002 - March 16, 2002 Archives

  • Hey, you perl haxors, someone should make this: A widget that runs once an hour, looking through the last 24h worth of httpd logs, identifying pages that have been arrived at through search engine referrers (i.e., pages that people are looking for right now, using means other than the existing navigation for your site).

    Boing Boing: March 3, 2002 - March 9, 2002 Archives

  • Apple is excluding under-age open-source haxors from their development efforts.

    Boing Boing: March 24, 2002 - March 30, 2002 Archives

  • Or will smart Pixo haxors start writing organizer apps for their iPods?

    Boing Boing: November 11, 2001 - November 17, 2001 Archives

  • Computing pioneers and super-leet haxors tape a TV public service announcement pleading with "patriot hackers" to stop screwing around with the Arab world's computers.

    Boing Boing: September 23, 2001 - September 29, 2001 Archives

  • Now, the leet haxors want to sue the company that publishes BugTraq, despite the fact that the exploit is circulating all over the net in the usual places -- irc, gnutella, etc. -- because they're worried that publication of their exploit exposes them to liabiity if it's used to trash a server.

    Boing Boing: July 29, 2001 - August 4, 2001 Archives

  • Tapioco demonstrated how JavaScript could be injected into the page, causing a popup dialog box to display the message "Verified by haxors, LOL".


  • Well, friends, there are actually four different kinds of hackers/haxors in the universe, and they are not all evil. Internet for Beginners

  • Even though “security through obscurity” is probably not the best protection, if it’s obvious to everyone where key functionality lives in your application, it’s gotta be easier for bad haxors to zero in on it.

    Zach Copley » 2007 » March


Log in or sign up to get involved in the conversation. It's quick and easy.