DEEn Dictionary De - En
DeEs De - Es
DePt De - Pt
 Vocabulary trainer

Spec. subjects Grammar Abbreviations Random search Preferences
Search in Sprachauswahl
Administrator
Search for:
Mini search box
 
Proverbs, aphorisms, quotations (English) by Linux fortune

"sic transit discus mundi"
(From the System Administrator's Guide, by Lars Wirzenius)
I am a computer. I am dumber than any human and smarter than any administrator.
>>> Internal error in fortune program:
>>>        fnum=2987  n=45  flag=1  goose_level=-232323
>>> Please write down these values and notify fortune program administrator.
Making files is easy under the UNIX operating system.  Therefore, users
tend to create numerous files using large amounts of file space.  It has
been said that the only standard thing about all UNIX systems is the
message-of-the-day telling users to clean up their files.
                -- System V.2 administrator's guide
Robot, n.:
        University administrator.
Security Holes Found In Microsoft Easter Eggs

REDMOND, WA -- It's damage control time for the Microsoft Marketing
Machine. Not only have exploits been found in IE, Outlook, and even the
Dancing Paper Clip, but now holes have been uncovered in Excel's Flight
Simulator and Word's pinball game.

"If you enter Excel 97's flight simulator and then hit the F1, X, and
SysRq keys while reading a file from Drive A:, you automatically gain
Administrator rights on Windows NT," explained the security expert who
first discovered the problem. "And that's just the tip of the iceberg."

Office 97 and 2000 both contain two hidden DLLs, billrulez.dll and
eastereggs.dll, that are marked as "Safe for scripting" but are not.
Arbitrary Visual BASIC code can be executed using these files. More
disturbing, however, are the undocumented API calls
"ChangeAllPasswordsToDefault", "OpenBackDoor", "InitiateBlueScreenNow",
and "UploadRegistryToMicrosoft" within easter~1.dll.

Microsoft spokesdroids have already hailed the problem as "an
insignificant byproduct of Microsoft innovation."
Throwing Windows Out The Window

The Federal Bureau Of Missing Socks has banned the use of Microsoft Windows
and Office on all employee computers. But don't get too excited; they aren't
going to replace them with Linux. Instead, this government agency has decided
to go back to using abucusses, slide rules, and manual typewriters.

The banishment of Microsoft software stems from the agency's new policy
against computer games. MS Office, which contains several games in the form of
Easter Eggs, is now verboten on all agency computers. "Flight simulators,
pinball games, magic eight balls... they all violate our policy," said the
sub-adjunct administrator second-class. "So we can't use Office."

Windows is forbidden for the same reason. "We've had way too many
employees wasting time playing Solitaire," she said. "Unfortunately,
Solitaire is an integral part of Windows -- Microsoft executives said so
during the anti-trust trial. If Solitaire is removed, the operating system
won't function properly. Therefore, we have no choice but to banish all
Windows computers."

The Bureau's Assistant Technology Consultant, Mr. Reginald "Red" Taype,
asked,  "Have you ever seen an abucus crash? Have you ever seen anybody
have fun with a slide rule? Do adding machines contain undocumented easter
eggs? No! That's why we're ditching our PCs."
World Domination, One CPU Cycle At A Time

Forget about searching for alien signals or prime numbers. The real
distributed computing application is "Domination@World", a program to advocate
Linux and Apache to every website in the world that uses Windows and IIS.

The goal of the project is to probe every IP number to determine what kind of
platform each Net-connected machine is running. "That's a tall order... we
need lots of computers running our Domination@World clients to help probe
every nook and cranny of the Net," explained Mr. Zell Litt, the project head.

After the probing is complete, the second phase calls for the data to be
cross-referenced with the InterNIC whois database. "This way we'll have the
names, addresses, and phone numbers for every Windows-using system
administrator on the planet," Zell gloated. "That's when the fun begins."

The "fun" part involves LART (Linux Advocacy & Re-education Training), a plan
for extreme advocacy. As part of LART, each Linux User Group will receive a
list of the Windows-using weenies in their region. The LUG will then be able
to employ various advocacy techniques, ranging from a soft-sell approach
(sending the target a free Linux CD in the mail) all the way to "LARTcon 5"
(cracking into their system and forcibly installing Linux).
The Humorix Oracle explains how to get a job at a major corporation:

1. Find an exploit in Microsoft IIS or another buggy Microsoft product to
   which large corporations rarely apply security patches.
2. Create a virus or worm that takes advantage of this exploit and then
   propogates itself by selecting IP numbers at random and then trying to
   infect those machines.
3. Keep an eye on your own website's server logs. When your virus starts
   propogating, your server will be hit with thousands of attacks from
   other infected systems trying to spread the virus to your machine.
4. Make a list of the IP numbers of all of the infected machines.
5. Perform a reverse DNS lookup on these IP numbers.
6. Make a note of all of the Fortune 500 companies that appear on the list
   of infected domains.
7. Send your resume to these companies and request an interview for a
   system administrator position. These companies are hiring -- whether
   they realize it or not.
8. Use your new salary to hire a good defense lawyer when the FBI comes
   knocking.
Press Release -- For Immediate Release
Microsoft Corporation, Redmond, WA

...Virtually all version of Linux (and Unix) contain a security hole that
allows unauthorized users to gain complete control over the machine. By
simply typing "root" at the login prompt and supplying a password from a
limited number of possibilities, a malicious user can easily gain
administrator privileges. This hole can be breached in seconds with only a
dozen or so keystrokes...

We suspect this issue has been known to Red Hat and other Linux
distributors for years and they have refused to acknowlege its existence
or supply a patch preventing users from exploiting the "root" login
loophole...

By ignoring the problem, the Linux community has proven that installing
Linux is a dangerous proposition that could get you fired. We would like
to point out that Windows XP does not suffer from this gaping hole...
Tests conducted by both Ziff-Davis and Mindcraft prove that Windows XP is
indeed the most secure operating system ever produced...
Sic transit discus mundi
        -- From the System Administrator's Guide, by Lars Wirzenius
No guarantee of accuracy or completeness!
©TU Chemnitz, 2006-2024
Your feedback:
Ad partners