The hint makes them easy again. You may need this to follow the hint, I used the jumbo version of JtR.
wget -O 41-rules.txt http://contest-2010.korelogic.com/rules.txt
sudo bash -c "cat 41-rules.txt >> /etc/john/john.conf"
john --wordlist=/usr/share/dict/words --rules=KoreLogicRulesL33t 41-hashes.txt
With as result:
?:u$e
?:Th3
?:l4$t
?:0f
?:3@ch
?:w0rd
6 password hashes cracked, 1 left
John didn't crack the hash for "letter", but we can guess it.