DEEn Dictionary De - En
DeEs De - Es
DePt De - Pt
 Vocabulary trainer

Spec. subjects Grammar Abbreviations Random search Preferences
Search in Sprachauswahl
Search for:
Mini search box
 
Proverbs, aphorisms, quotations (English) by Linux fortune

World Domination, One CPU Cycle At A Time

Forget about searching for alien signals or prime numbers. The real
distributed computing application is "Domination@World", a program to advocate
Linux and Apache to every website in the world that uses Windows and IIS.

The goal of the project is to probe every IP number to determine what kind of
platform each Net-connected machine is running. "That's a tall order... we
need lots of computers running our Domination@World clients to help probe
every nook and cranny of the Net," explained Mr. Zell Litt, the project head.

After the probing is complete, the second phase calls for the data to be
cross-referenced with the InterNIC whois database. "This way we'll have the
names, addresses, and phone numbers for every Windows-using system
administrator on the planet," Zell gloated. "That's when the fun begins."

The "fun" part involves LART (Linux Advocacy & Re-education Training), a plan
for extreme advocacy. As part of LART, each Linux User Group will receive a
list of the Windows-using weenies in their region. The LUG will then be able
to employ various advocacy techniques, ranging from a soft-sell approach
(sending the target a free Linux CD in the mail) all the way to "LARTcon 5"
(cracking into their system and forcibly installing Linux).
Linux Distro To Include Pre-Installed Security Holes

Proactive Synergy Paradigm, the Linux distro targeted at Pointy Haired
Bosses, will now include built-in security flaws to better compete with
Microsoft programs.

"The sheer popularity of Windows, Outlook, and IIS clearly shows that
people demand security holes large enough to drive a truck through," said
Mr. Bert Dill of P.S.P. Inc. "We're going to do our best to offer what the
consumer wants. Just as Microsoft stole ideas from Apple during the
1980's, we're stealing ideas from Microsoft today."

Future releases of Proactive Synergy Linux will feature "LookOut! 1.0", a
mail reader that automatically executes (with root privileges) e-mail
attachments coded in Perl, JavaScript, Python, and Visual Basic.

"Hey, if it works for Microsoft, it can work for us," boasted Mr. Dill.
"Now PHBs won't have to stick with Windows in order to have their
confidential files secretly emailed to their colleagues by a worm. Better
yet, this capability allows viruses to automagically delete unnecessary
files to save disk space without wasting the PHB's valuable time.
The Humorix Oracle explains how to get a job at a major corporation:

1. Find an exploit in Microsoft IIS or another buggy Microsoft product to
   which large corporations rarely apply security patches.
2. Create a virus or worm that takes advantage of this exploit and then
   propogates itself by selecting IP numbers at random and then trying to
   infect those machines.
3. Keep an eye on your own website's server logs. When your virus starts
   propogating, your server will be hit with thousands of attacks from
   other infected systems trying to spread the virus to your machine.
4. Make a list of the IP numbers of all of the infected machines.
5. Perform a reverse DNS lookup on these IP numbers.
6. Make a note of all of the Fortune 500 companies that appear on the list
   of infected domains.
7. Send your resume to these companies and request an interview for a
   system administrator position. These companies are hiring -- whether
   they realize it or not.
8. Use your new salary to hire a good defense lawyer when the FBI comes
   knocking.
No guarantee of accuracy or completeness!
©TU Chemnitz, 2006-2024
Your feedback:
Ad partners