Proverbs, aphorisms, quotations (English) | by Linux fortune |
Be warned that typing \fBkillall \fIname\fP may not have the desired effect on non-Linux systems, especially when done by a privileged user. (From the killall manual page) | |
Microsoft Corp., concerned by the growing popularity of the free 32-bit operating system for Intel systems, Linux, has employed a number of top programmers from the underground world of virus development. Bill Gates stated yesterday: "World domination, fast -- it's either us or Linus". Mr. Torvalds was unavailable for comment ... (rjm@swift.eng.ox.ac.uk (Robert Manners), in comp.os.linux.setup) | |
'Mounten' wird fuer drei Dinge benutzt: 'Aufsitzen' auf Pferde, 'einklinken' von Festplatten in Dateisysteme, und, nun, 'besteigen' beim Sex. (Christa Keil in a German posting: "Mounting is used for three things: climbing on a horse, linking in a hard disk unit in data systems, and, well, mounting during sex".) | |
Someone was smoking in the computer room and set off the halon systems. | |
Computer room being moved. Our systems are down for the weekend. | |
A large number of installed systems work by fiat. That is, they work by being declared to work. -- Anatol Holt | |
A little retrospection shows that although many fine, useful software systems have been designed by committees and built as part of multipart projects, those software systems that have excited passionate fans are those that are the products of one or a few designing minds, great designers. Consider Unix, APL, Pascal, Modula, the Smalltalk interface, even Fortran; and contrast them with Cobol, PL/I, Algol, MVS/370, and MS-DOS. -- Fred Brooks | |
A novice asked the master: "I perceive that one computer company is much larger than all others. It towers above its competition like a giant among dwarfs. Any one of its divisions could comprise an entire business. Why is this so?" The master replied, "Why do you ask such foolish questions? That company is large because it is so large. If it only made hardware, nobody would buy it. If it only maintained systems, people would treat it like a servant. But because it combines all of these things, people think it one of the gods! By not seeking to strive, it conquers without effort." -- Geoffrey James, "The Tao of Programming" | |
Computer Science is merely the post-Turing decline in formal systems theory. | |
Eudaemonic research proceeded with the casual mania peculiar to this part of the world. Nude sunbathing on the back deck was combined with phone calls to Advanced Kinetics in Costa Mesa, American Laser Systems in Goleta, Automation Industries in Danbury, Connecticut, Arenberg Ultrasonics in Jamaica Plain, Massachusetts, and Hewlett Packard in Sunnyvale, California, where Norman Packard's cousin, David, presided as chairman of the board. The trick was to make these calls at noon, in the hope that out-to-lunch executives would return them at their own expense. Eudaemonic Enterprises, for all they knew, might be a fast-growing computer company branching out of the Silicon Valley. Sniffing the possibility of high-volume sales, these executives little suspected that they were talking on the other end of the line to a naked physicist crazed over roulette. -- Thomas Bass, "The Eudaemonic Pie" | |
IBM Advanced Systems Group -- a bunch of mindless jerks, who'll be first against the wall when the revolution comes... -- with regrets to D. Adams | |
**** IMPORTANT **** ALL USERS PLEASE NOTE **** Due to a recent systems overload error your recent disk files have been erased. Therefore, in accordance with the UNIX Basic Manual, University of Washington Geophysics Manual, and Bylaw 9(c), Section XII of the Revised Federal Communications Act, you are being granted Temporary Disk Space, valid for three months from this date, subject to the restrictions set forth in Appendix II of the Federal Communications Handbook (18th edition) as well as the references mentioned herein. You may apply for more disk space at any time. Disk usage in or above the eighth percentile will secure the removal of all restrictions and you will immediately receive your permanent disk space. Disk usage in the sixth or seventh percentile will not effect the validity of your temporary disk space, though its expiration date may be extended for a period of up to three months. A score in the fifth percentile or below will result in the withdrawal of your Temporary Disk space. | |
It appears that PL/I (and its dialects) is, or will be, the most widely used higher level language for systems programming. -- J. Sammet | |
Making files is easy under the UNIX operating system. Therefore, users tend to create numerous files using large amounts of file space. It has been said that the only standard thing about all UNIX systems is the message-of-the-day telling users to clean up their files. -- System V.2 administrator's guide | |
Many companies that have made themselves dependent on [the equipment of a certain major manufacturer] (and in doing so have sold their soul to the devil) will collapse under the sheer weight of the unmastered complexity of their data processing systems. -- Edsger W. Dijkstra, SIGPLAN Notices, Volume 17, Number 5 | |
MVS Air Lines: The passengers all gather in the hangar, watching hundreds of technicians check the flight systems on this immense, luxury aircraft. This plane has at least 10 engines and seats over 1,000 passengers; bigger models in the fleet can have more engines than anyone can count and fly even more passengers than there are on Earth. It is claimed to cost less per passenger mile to operate these humungous planes than any other aircraft ever built, unless you personally have to pay for the ticket. All the passengers scramble aboard, as do the 200 technicians needed to keep it from crashing. The pilot takes his place up in the glass cockpit. He guns the engines, only to realise that the plane is too big to get through the hangar doors. | |
New systems generate new problems. | |
OS/2 Skyways: The terminal is almost empty, with only a few prospective passengers milling about. The announcer says that their flight has just departed, wishes them a good flight, though there are no planes on the runway. Airline personnel walk around, apologising profusely to customers in hushed voices, pointing from time to time to the sleek, powerful jets outside the terminal on the field. They tell each passenger how good the real flight will be on these new jets and how much safer it will be than Windows Airlines, but that they will have to wait a little longer for the technicians to finish the flight systems. Maybe until mid-1995. Maybe longer. | |
Overall, the philosophy is to attack the availability problem from two complementary directions: to reduce the number of software errors through rigorous testing of running systems, and to reduce the effect of the remaining errors by providing for recovery from them. An interesting footnote to this design is that now a system failure can usually be considered to be the result of two program errors: the first, in the program that started the problem; the second, in the recovery routine that could not protect the system. -- A.L. Scherr, "Functional Structure of IBM Virtual Storage Operating Systems, Part II: OS/VS-2 Concepts and Philosophies," IBM Systems Journal, Vol. 12, No. 4. | |
Real computer scientists don't write code. They occasionally tinker with `programming systems', but those are so high level that they hardly count (and rarely count accurately; precision is for applications). | |
Real software engineers don't like the idea of some inexplicable and greasy hardware several aisles away that may stop working at any moment. They have a great distrust of hardware people, and wish that systems could be virtual at *___all* levels. They would like personal computers (you know no one's going to trip over something and kill your DFA in mid-transit), except that they need 8 megabytes to run their Correctness Verification Aid packages. | |
Seems a computer engineer, a systems analyst, and a programmer were driving down a mountain when the brakes gave out. They screamed down the mountain, gaining speed, but finally managed to grind to a halt, more by luck than anything else, just inches from a thousand foot drop to jagged rocks. They all got out of the car: The computer engineer said, "I think I can fix it." The systems analyst said, "No, no, I think we should take it into town and have a specialist look at it." The programmer said, "OK, but first I think we should get back in and see if it does it again." | |
Systems have sub-systems and sub-systems have sub-systems and so on ad infinitum -- which is why we're always starting over. -- Epigrams in Programming, ACM SIGPLAN Sept. 1982 | |
Systems programmers are the high priests of a low cult. -- R.S. Barton | |
The algorithm for finding the longest path in a graph is NP-complete. For you systems people, that means it's *real slow*. -- Bart Miller | |
The misnaming of fields of study is so common as to lead to what might be general systems laws. For example, Frank Harary once suggested the law that any field that had the word "science" in its name was guaranteed thereby not to be a science. He would cite as examples Military Science, Library Science, Political Science, Homemaking Science, Social Science, and Computer Science. Discuss the generality of this law, and possible reasons for its predictive power. -- Gerald Weinberg, "An Introduction to General Systems Thinking" | |
The use of anthropomorphic terminology when dealing with computing systems is a symptom of professional immaturity. -- Edsger Dijkstra | |
To the systems programmer, users and applications serve only to provide a test load. | |
Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (10) Sorry, but that's too useful. (9) Dammit, little-endian systems *are* more consistent! (8) I'm on the committee and I *still* don't know what the hell #pragma is for. (7) Well, it's an excellent idea, but it would make the compilers too hard to write. (6) Them bats is smart; they use radar. (5) All right, who's the wiseguy who stuck this trigraph stuff in here? (4) How many times do we have to tell you, "No prior art!" (3) Ha, ha, I can't believe they're actually going to adopt this sucker. (2) Thank you for your generous donation, Mr. Wirth. (1) Gee, I wish we hadn't backed down on 'noalias'. | |
Truly simple systems... require infinite testing. -- Norman Augustine | |
Unix is a lot more complicated (than CP/M) of course -- the typical Unix hacker can never remember what the PRINT command is called this week -- but when it gets right down to it, Unix is a glorified video game. People don't do serious work on Unix systems; they send jokes around the world on USENET or write adventure games and research papers. -- E. Post "Real Programmers Don't Use Pascal", Datamation, 7/83 | |
UNIX Trix For those of you in the reseller business, here is a helpful tip that will save your support staff a few hours of precious time. Before you send your next machine out to an untrained client, change the permissions on /etc/passwd to 666 and make sure there is a copy somewhere on the disk. Now when they forget the root password, you can easily login as an ordinary user and correct the damage. Having a bootable tape (for larger machines) is not a bad idea either. If you need some help, give us a call. -- CommUNIXque 1:1, ASCAR Business Systems | |
What the hell is it good for? -- Robert Lloyd (engineer of the Advanced Computing Systems Division of IBM), to colleagues who insisted that the microprocessor was the wave of the future, c. 1968 | |
When we understand knowledge-based systems, it will be as before -- except our fingertips will have been singed. -- Epigrams in Programming, ACM SIGPLAN Sept. 1982 | |
X windows: Accept any substitute. If it's broke, don't fix it. If it ain't broke, fix it. Form follows malfunction. The Cutting Edge of Obsolescence. The trailing edge of software technology. Armageddon never looked so good. Japan's secret weapon. You'll envy the dead. Making the world safe for competing window systems. Let it get in YOUR way. The problem for your problem. If it starts working, we'll fix it. Pronto. It could be worse, but it'll take time. Simplicity made complex. The greatest productivity aid since typhoid. Flakey and built to stay that way. One thousand monkeys. One thousand MicroVAXes. One thousand years. X windows. | |
You can bring any calculator you like to the midterm, as long as it doesn't dim the lights when you turn it on. -- Hepler, Systems Design 182 | |
Do not allow this language (Ada) in its present state to be used in applications where reliability is critical, i.e., nuclear power stations, cruise missiles, early warning systems, anti-ballistic missle defense systems. The next rocket to go astray as a result of a programming language error may not be an exploratory space rocket on a harmless trip to Venus: It may be a nuclear warhead exploding over one of our cities. An unreliable programming language generating unreliable programs constitutes a far greater risk to our environment and to our society than unsafe cars, toxic pesticides, or accidents at nuclear power stations. - C. A. R. Hoare | |
A little retrospection shows that although many fine, useful software systems have been designed by committees and built as part of multipart projects, those software systems that have excited passionate fans are those that are the products of one or a few designing minds, great designers. Consider Unix, APL, Pascal, Modula, the Smalltalk interface, even Fortran; and contrast them with Cobol, PL/I, Algol, MVS/370, and MS-DOS. - Fred Brooks, Jr. | |
Software entities are more complex for their size than perhaps any other human construct because no two parts are alike. If they are, we make the two similar parts into a subroutine -- open or closed. In this respect, software systems differ profoundly from computers, buildings, or automobiles, where repeated elements abound. - Fred Brooks, Jr. | |
Digital computers are themselves more complex than most things people build: They hyave very large numbers of states. This makes conceiving, describing, and testing them hard. Software systems have orders-of-magnitude more states than computers do. - Fred Brooks, Jr. | |
It is important to note that probably no large operating system using current design technology can withstand a determined and well-coordinated attack, and that most such documented penetrations have been remarkably easy. -- B. Hebbard, "A Penetration Analysis of the Michigan Terminal System", Operating Systems Review, Vol. 14, No. 1, June 1980, pp. 7-20 | |
Overall, the philosophy is to attack the availability problem from two complementary directions: to reduce the number of software errors through rigorous testing of running systems, and to reduce the effect of the remaining errors by providing for recovery from them. An interesting footnote to this design is that now a system failure can usually be considered to be the result of two program errors: the first, in the program that started the problem; the second, in the recovery routine that could not protect the system. -- A. L. Scherr, "Functional Structure of IBM Virtual Storage Operating Systems, Part II: OS/VS-2 Concepts and Philosophies," IBM Systems Journal, Vol. 12, No. 4, 1973, pp. 382-400 | |
...it still remains true that as a set of cognitive beliefs about the existence of God in any recognizable sense continuous with the great systems of the past, religious doctrines constitute a speculative hypothesis of an extremely low order of probability. - Sidney Hook | |
We're fighting against humanism, we're fighting against liberalism... we are fighting against all the systems of Satan that are destroying our nation today...our battle is with Satan himself. - Jerry Falwell | |
Ill-chosen abstraction is particularly evident in the design of the ADA runtime system. The interface to the ADA runtime system is so opaque that it is impossible to model or predict its performance, making it effectively useless for real-time systems. -- Marc D. Donner and David H. Jameson. | |
"There's always been Tower of Babel sort of bickering inside Unix, but this is the most extreme form ever. This means at least several years of confusion." -- Bill Gates, founder and chairman of Microsoft, about the Open Systems Foundation | |
"In corporate life, I think there are three important areas which contracts can't deal with, the area of conflict, the area of change and area of reaching potential. To me a covenant is a relationship that is based on such things as shared ideals and shared value systems and shared ideas and shared agreement as to the processes we are going to use for working together. In many cases they develop into real love relationships." -- Max DePree, chairman and CEO of Herman Miller Inc., "Herman Miller's Secrets of Corporate Creativity", The Wall Street Journal, May 3, 1988 | |
UNIX Shell is the Best Fourth Generation Programming Language It is the UNIX shell that makes it possible to do applications in a small fraction of the code and time it takes in third generation languages. In the shell you process whole files at a time, instead of only a line at a time. And, a line of code in the UNIX shell is one or more programs, which do more than pages of instructions in a 3GL. Applications can be developed in hours and days, rather than months and years with traditional systems. Most of the other 4GLs available today look more like COBOL or RPG, the most tedious of the third generation lanaguages. "UNIX Relational Database Management: Application Development in the UNIX Environment" by Rod Manis, Evan Schaffer, and Robert Jorgensen. Prentice Hall Software Series. Brian Kerrighan, Advisor. 1988. | |
"Flight Reservation systems decide whether or not you exist. If your information isn't in their database, then you simply don't get to go anywhere." -- Arthur Miller | |
...I don't care for the term 'mechanistic'. The word 'cybernetic' is a lot more apropos. The mechanistic world-view is falling further and further behind the real world where even simple systems can produce the most marvellous chaos. -- Peter da Silva | |
"(The Chief Programmer) personally defines the functional and performance specifications, designs the program, codes it, tests it, and writes its documentation... He needs great talent, ten years experience and considerable systems and applications knowledge, whether in applied mathematics, business data handling, or whatever." -- Fred P. Brooks, _The Mythical Man Month_ | |
To the systems programmer, users and applications serve only to provide a test load. | |
Democracy is good. I say this because other systems are worse. -- Jawaharlal Nehru | |
My own life has been spent chronicling the rise and fall of human systems, and I am convinced that we are terribly vulnerable. ... We should be reluctant to turn back upon the frontier of this epoch. Space is indifferent to what we do; it has no feeling, no design, no interest in whether or not we grapple with it. But we cannot be indifferent to space, because the grand, slow march of intelligence has brought us, in our generation, to a point from which we can explore and understand and utilize it. To turn back now would be to deny our history, our capabilities. -- James A. Michener | |
Arbitrary systems, pl.n.: Systems about which nothing general can be said, save "nothing general can be said." | |
Computer science: (1) A study akin to numerology and astrology, but lacking the precision of the former and the success of the latter. (2) The protracted value analysis of algorithms. (3) The costly enumeration of the obvious. (4) The boring art of coping with a large number of trivialities. (5) Tautology harnessed in the service of Man at the speed of light. (6) The Post-Turing decline in formal systems theory. | |
Johnson's law: Systems resemble the organizations that create them. | |
Steinbach's Guideline for Systems Programming: Never test for an error condition you don't know how to handle. | |
system-independent, adj.: Works equally poorly on all systems. | |
The rules: (1) Thou shalt not worship other computer systems. (2) Thou shalt not impersonate Liberace or eat watermelon while sitting at the console keyboard. (3) Thou shalt not slap users on the face, nor staple their silly little card decks together. (4) Thou shalt not get physically involved with the computer system, especially if you're already married. (5) Thou shalt not use magnetic tapes as frisbees, nor use a disk pack as a stool to reach another disk pack. (6) Thou shalt not stare at the blinking lights for more than one eight hour shift. (7) Thou shalt not tell users that you accidentally destroyed their files/backup just to see the look on their little faces. (8) Thou shalt not enjoy cancelling a job. (9) Thou shalt not display firearms in the computer room. (10) Thou shalt not push buttons "just to see what happens". | |
An architect's first work is apt to be spare and clean. He knows he doesn't know what he's doing, so he does it carefully and with great restraint. As he designs the first work, frill after frill and embellishment after embellishment occur to him. These get stored away to be used "next time." Sooner or later the first system is finished, and the architect, with firm confidence and a demonstrated mastery of that class of systems, is ready to build a second system. This second is the most dangerous system a man ever designs. When he does his third and later ones, his prior experiences will confirm each other as to the general characteristics of such systems, and their differences will identify those parts of his experience that are particular and not generalizable. The general tendency is to over-design the second system, using all the ideas and frills that were cautiously sidetracked on the first one. The result, as Ovid says, is a "big pile." -- Frederick Brooks, "The Mythical Man Month" | |
Back in the early 60's, touch tone phones only had 10 buttons. Some military versions had 16, while the 12 button jobs were used only by people who had "diva" (digital inquiry, voice answerback) systems -- mainly banks. Since in those days, only Western Electric made "data sets" (modems) the problems of terminology were all Bell System. We used to struggle with written descriptions of dial pads that were unfamiliar to most people (most phones were rotary then.) Partly in jest, some AT&T engineering types (there was no marketing in the good old days, which is why they were the good old days) made up the term "octalthorpe" (note spelling) to denote the "pound sign." Presumably because it has 8 points sticking out. It never really caught on. | |
If you haven't enjoyed the material in the last few lectures then a career in chartered accountancy beckons. -- Advice from the lecturer in the middle of the Stochastic Systems course. | |
Lucas is the source of many of the components of the legendarily reliable British automotive electrical systems. Professionals call the company "The Prince of Darkness". Of course, if Lucas were to design and manufacture nuclear weapons, World War III would never get off the ground. The British don't like warm beer any more than the Americans do. The British drink warm beer because they have Lucas refrigerators. | |
The only justification for our concepts and systems of concepts is that they serve to represent the complex of our experiences; beyond this they have no legitimacy. -- Albert Einstein | |
There are two kinds of solar-heat systems: "passive" systems collect the sunlight that hits your home, and "active" systems collect the sunlight that hits your neighbors' homes, too. -- Dave Barry, "Postpetroleum Guzzler" | |
Our little systems have their day; They have their day and cease to be; They are but broken lights of thee. -- Tennyson | |
"In a way they were right the basics of operating systems, and by extension the Linux kernel, were well understood by the early 70s; anything after that has been to some degree an exercise in self-gratification." -- Linus Torvalds (Open Sources, 1999 O'Reilly and Associates) | |
I used to be interested in Windows NT, but the more I see of it the more it looks like traditional Windows with a stabler kernel. I don't find anything technically interesting there. In my opinion MS is a lot better at making money than it is at making good operating systems. -- Linus Torvalds | |
Linux Rally Held in Pennsylvania HARRISBURG, PA -- Thousands of Linux advocates gathered at the Pennsylvania state capitol building earlier today. They were protesting the state's recent three year deal with Microsoft to install Windows NT on all state computer systems. "Whatever pointy haired boss made this deal ought to be shot on sight," one protestor exclaimed. "Windows NT is a piece of [expletive] compared to Linux. The taxpayers of Pennsylvania are going to be sorry three years from now when this 'deal' concludes. The state has sold its soul to Satan [Bill Gates]." Brief hostilities broke out when a group of police officers armed with riot gear descended on the protestors. After the police threatened to use tear gas, the protestors threw thousands of Linux CDs at them. Once the supply of CDs was depleted, the protest became peaceful again. "I saw several policemen pick up Linux CDs and put them in their pockets," one protestor noted. The protest broke up a few minutes later once it was realized that the state legislature wasn't in session. "We may have wasted our time today," one advocate said, "But we'll be back later." State and Microsoft officials were unavailable for comment at press time. How typical. | |
Operation Desert Slash WASHINGTON, D.C. -- High officials in the US military are planning on putting the 'Slashdot Effect' to use against Iraq. Pentagon computer experts think that the Slashdot Effect could topple key Net-connected Iraqi computer systems. Such a Denial of Service attack could prove instrumental when the US invades. One Pentagon official said, "If I had a million dollars for every server that crashed as a result of being linked on Slashdot, I'd be richer than Bill Gates. The Slashdot Effect is a very powerful weapon that the US military wants to tap into." Rob Malda has been contacted by top military brass. According to anonymous sources, Malda will play a key part in the so-called "Operation Desert Slash". Supposedly Malda will post several Slashdot articles with links to critical Iraqi websites right when the US invasion is set to begin. Meanwhile, Pentagon operatives will begin a series of Denial of Service attacks on other key Iraqi computer systems. One source notes, "Since many Iraqi systems rely on Microsoft software, this task should be relatively simple." | |
Red Hat Linux 10.0 RALEIGH-DURHAM, NC -- HypeNewsWire -- Red Hat, the producer of the most popular Linux distribution with over 25 million estimated users, is proud to announce the availability of Red Hat Linux 10.0. The latest version contains the new Linux 6.2 kernel, the Z Window System 2.0, full support for legacy Windows 3.x/9x/200x/NT software apps, and more. Copies of Red Hat Linux 10.0 will be available in stores on CD-ROM, DVD-ROM, or GNUDE (GNU Digital Encoding) disks within the next week. Compaq, Dell, Gateway, and several other large computer manufacturers have announced that they will offer computer systems with Red Hat 10.0 pre-installed. "We can sell systems with Red Hat pre-installed for considerably less than systems with Microsoft ActiveWindows 2001. Overall, Red Hat Linux's superior quality, low price, and modest system requirements puts Windows to shame," one Dell spokesperson said at last week's LinDex convention. | |
Microsoft ActivePromo Campaign: "Windows Competitive Upgrade Offer" Microsoft's PR masterminds are planning a massive marketing campaign, code-named "ActivePromo 2000", to promote the upcoming release of Windows 2000 (scheduled for February 2001). This marketing campaign will include a "Windows Competitive Upgrade Offer" promotion. Users of non-Microsoft operating systems (Linux in particular) will be given the opportunity to trade-in their present OS for a free copy of Windows 98 (or NT 4.0) and Office 97. People (all three of them) who want to participate in this program will have to: 1. Mail their operating system's floppy disks or CD-ROMs to Microsoft 2. Agree to a two year contract with the Microsoft Network. 3. Agree (in writing) to the Competitive Upgrade License Agreement; one of the terms of which is that the user may not install, copy, or otherwise use a non-Microsoft OS for five years. | |
Microsoft ActivePromo Campaign: "State Innovation Day" Microsoft has successfully lobbied for the State of Washington to declare August 24th as State Innovation Day. Efforts are underway to lobby the US Congress to decree a similar designation nationally. Several events are scheduled on August 24, 1999 to showcase "innovation" in the computer industry (in other words, Microsoft), including: * An "Innovation Day Parade" held in downtown Seattle, featuring floats and helium-filled balloons representing various Microsoft products (Dancing Paper Clip, Microsoft Bob, Flying Windows Logo, etc.) * An "Innovation is Cool" essay contest for high school and college students. Possible topics include "Why IE Should Be Integrated in Windows", "Why Bill Gates Is My Hero", "Government Intervention is Evil", and "Why Monopolies Improve Product Quality and Lower Prices". * A 24-hour "Innovation in Education" telethon on NBC to raise money for school districts nationwide to buy new Wintel computer systems and Internet access through the Microsoft Network. | |
New Crime Identified: "Tech Rage" HARRISBURG, IL -- The police department in this Illinois town has coined a new term for a growing trend in crime: "tech rage". Tech rage shares many similarities with another modern crime, "road rage", but instead of affecting drivers, tech rage is experienced by disgruntled computer users. The first documented case of tech rage involves a Microsoft salesman, Bob Glutzfield, who convinced the local TV station to "upgrade" its computer systems from Macintosh to Wintel. While the migration seemed successful at first, the Blue Screen became more prevalent during the following months. Then, in January, the entire computer system crashed in the middle of the weather forecast during the 10 o'clock evening news. Viewers could plainly see the Blue Screen of Death showing in the monitors behind James Roland, the chief meteorologist. The instability of Windows 98 stretched Roland's patience until he snapped last week and succumbed to tech rage. Roland tracked down the Microsoft salesman and followed him one evening to his apartment. The weatherman yelled at the bewildered Microserf, "You [expletive]! Because of you, I'm the [expletive] laughing stock of Southern Illinois!" and then proceeded to beat him up. Roland is currently out on bond pending trial next month. | |
The War Against Linux A significant obstacle on the path to Linux World Domination has emerged. A reactionary grass-roots movement has formed to fight, as they call it, "The War Against Linux". This movement, code-named "LinSux", is composed of people (mostly Microsoft stockholders and commercial software developers) who want to maintain the status quo. They are fighting back against the rise of Linux and free software which they see as a threat to their financial independence. The most damaging attack the LinSux folks have launched is "Three Mile Island", a Windows macro virus designed to inflict damage on computers that contain a partition devoted to a non-Microsoft OS. When the victim computer is booted into Windows, the virus activates and deletes any non-Microsoft partitions. Ironically, the many security flaws in Windows allow the virus to damage alternative operating systems but leave Windows unscathed. "The War Against Linux" has also been fought in more subtle ways. Time-tested methods of Linux advocacy have been turned into subtle forms of anti-Linux advocacy by the LinSux crowd. MSCEs are smuggling NT boxes into companies that predominantly use Linux or Unix. LinSux "freedom fighters" are rearranging books and software boxes on store shelves so that Microsoft offerings are displayed more prominently. | |
Microsoft Mandatory Survey (#1) Customers who want to upgrade to Windows 98 Second Edition must now fill out a Microsoft survey online before they can order the bugfix/upgrade. Question 1: What is your opinion of the Microsoft antitrust trial? A. The DoJ is wasting taxpayer's money. Now, if the DOJ were to upgrade all of its computer systems to Windows, then the department would be making wise use of tax dollars. B. All of the Microsoft email messages that the evil government has presented as evidence are obviously taken out of context or have been completely twisted around. I mean... Bill Gates would never say "let's cut off their air supply" in a memo; it's an obvious fabrication. C. Judge Jackson is obviously biased in favor of the DOJ's vigilante persecution of Microsoft. D. If Microsoft loses, it will be the gravest miscarriage of justice in all the history of mankind. | |
Microsoft Mandatory Survey (#5) Customers who want to upgrade to Windows 98 Second Edition must now fill out a Microsoft survey online before they can order the bugfix/upgrade. Question 5: Where do you want to go today?(tm) A. To Washington, D.C. to meet Janet Reno and cuss her out for persecuting Microsoft B. To Redmond, WA to take a tour of the Microsoft campus C. To the software store to purchase a new piece of Microsoft software D. To my local school district to convince the administration to upgrade the Macintoshes in the computer labs to Wintel systems E. I don't know about myself, but I'd like to see so-called "consumer advocates" like Ralph Nader go to Hell. | |
Right now hundreds of Anonymous Cowards are cheering the fact that only Windows boobs are victims of ILOVEYOU and other email viruses. I realize Outlook is so insecure that using it is like posting a sign outside your door saying, "DOOR UNLOCKED -- ROB ME!". However, Linux isn't immune. If I had a dollar for every pine buffer overflow uncovered, I could buy a truckload of fresh herring. I expect the next mass email virus to spread will be cross-platform. If the recipient is a Windows/Outlook luser, they'll get hit. If the recipient is a Linux/pine user, they'll find themselves staring at a self-executing bash script that's has just allocated 1 petabyte of memory and crashed the system (or worse). Either that or the next mass email virus will only damage Linux systems. I can just see Bill Gates assigning some junior programmer that very task. Be afraid. Be very afraid. -- A speech given at the First Annual Connecticut Conspiracy] Convention (ConConCon) by an anonymous creature said to be "wearing what appeared to be a tuxedo". | |
Brief History Of Linux (#23) Linus Torvalds certainly wasn't the only person to create their own operating system from scratch. Other people working from their leaky basements did create their own systems and now they are sick that they didn't become an Alpha Geek like Torvalds or a Beta Geek like Alan Cox. Linus had one advantage not many else did: Internet access. The world was full of half-implemented-Unix-kernels at the time, but they were sitting isolated on some hacker's hard drive, destined to be destroyed by a hard drive crash. Thankfully that never happened to Linux, mostly because everyone with Net access could download a copy instead of paying shipping charges to receive the code on a huge stack of unreliable floppy disks. Indeed, buried deep within a landfill in Lansing, Michigan sits a stack of still-readable 5-1/4 floppies containing the only known copy of "Windows Killer", a fully functional Unix kernel so elegant, so efficient, so easy-to-use that Ken Thompson himself would be jealous of its design. Unfortunately the author's mother threw out the stack of floppies in a bout of spring cleaning. The 14 year old author's talents were lost forever as his parents sent him to Law School. | |
The Humorix Oracle explains how to get a job at a major corporation: 1. Find an exploit in Microsoft IIS or another buggy Microsoft product to which large corporations rarely apply security patches. 2. Create a virus or worm that takes advantage of this exploit and then propogates itself by selecting IP numbers at random and then trying to infect those machines. 3. Keep an eye on your own website's server logs. When your virus starts propogating, your server will be hit with thousands of attacks from other infected systems trying to spread the virus to your machine. 4. Make a list of the IP numbers of all of the infected machines. 5. Perform a reverse DNS lookup on these IP numbers. 6. Make a note of all of the Fortune 500 companies that appear on the list of infected domains. 7. Send your resume to these companies and request an interview for a system administrator position. These companies are hiring -- whether they realize it or not. 8. Use your new salary to hire a good defense lawyer when the FBI comes knocking. | |
"I think it's wrong any of us should claim ideas for stuff that has been done already by other people. It's time to put away the wheel reinvention kit and LEARN FROM OTHER SYSTEMS and even from *shudder* books ;)" - Rik van Riel | |
The last time I looked, Solaris and AIX and all the rest of the "scalable" systems were absolute pigs on smaller hardware, and the "scalability" in them often translates into "we scale linearly to many CPU's by being really bad even on one". - Linus Torvalds | |
Using a cluster to hide the fact that the underlying systems crash regularly is an extremely dangerous way to manage a computing environment. - Matt Dillon in http://www.osnews.com/story.php?news_id=153 | |
"and i actually like debian 2.0 that much i completely revamped the default config of the linux systems our company sells and reinstalled any of the linux systems in the office and here at home.." | |
Operating Systems Installed: * Debian GNU/Linux 2.1 4 CD Set ($20 from www.chguy.net; price includes taxes, shipping, and a $3 donation to FSF). 2 CDs are binaries, 2 CDs complete source code; * Windows 98 Second Edition Upgrade Version ($136 through Megadepot.com, price does not include taxes/shipping). Surprisingly, no source code is included. -- Bill Stilwell, http://linuxtoday.com/stories/8794.html | |
Technology is a constand battle between manufacturers producing bigger and more idiot-proof systems and nature producing bigger and better idiots. -- Slashdot signature | |
Be warned that typing \fBkillall \fIname\fP may not have the desired effect on non-Linux systems, especially when done by a privileged user. -- From the killall manual page | |
'Mounting' is used for three things: climbing on a horse, linking in a hard disk unit in data systems, and, well, mounting during sex. -- Christa Keil | |
Microsoft Corp., concerned by the growing popularity of the free 32-bit operating system for Intel systems, Linux, has employed a number of top programmers from the underground world of virus development. Bill Gates stated yesterday: "World domination, fast -- it's either us or Linus". Mr. Torvalds was unavailable for comment ... -- Robert Manners, rjm@swift.eng.ox.ac.uk, in comp.os.linux.setup | |
Plumbing is one of the easier of do-it-yourself activities, requiring only a few simple tools and a willingness to stick your arm into a clogged toilet. In fact, you can solve many home plumbing problems, such as annoying faucet drip, merely by turning up the radio. But before we get into specific techniques, let's look at how plumbing works. A plumbing system is very much like your electrical system, except that instead of electricity, it has water, and instead of wires, it has pipes, and instead of radios and waffle irons, it has faucets and toilets. So the truth is that your plumbing systems is nothing at all like your electrical system, which is good, because electricity can kill you. -- Dave Barry, "The Taming of the Screw" | |
XLI: The more one produces, the less one gets. XLII: Simple systems are not feasible because they require infinite testing. XLIII: Hardware works best when it matters the least. XLIV: Aircraft flight in the 21st century will always be in a westerly direction, preferably supersonic, crossing time zones to provide the additional hours needed to fix the broken electronics. XLV: One should expect that the expected can be prevented, but the unexpected should have been expected. XLVI: A billion saved is a billion earned. -- Norman Augustine | |
... I want FORTY-TWO TRYNEL FLOATATION SYSTEMS installed within SIX AND A HALF HOURS!!! | |
I'm thinking about DIGITAL READ-OUT systems and computer-generated IMAGE FORMATIONS ... | |
OKAY!! Turn on the sound ONLY for TRYNEL CARPETING, FULLY-EQUIPPED R.V.'S and FLOATATION SYSTEMS!! |