DEEn Dictionary De - En
DeEs De - Es
DePt De - Pt
 Vocabulary trainer

Spec. subjects Grammar Abbreviations Random search Preferences
Search in Sprachauswahl
contain
Search for:
Mini search box
 
Proverbs, aphorisms, quotations (English) by Linux fortune

Plots are like girdles.  Hidden, they hold your interest; revealed, they're
of no interest except to fetishists. Like girdles, they attempt to contain
an uncontainable experience.
                -- R.S. Knapp
VMS Beer: Requires minimal user interaction, except for popping the top
and sipping.  However cans have been known on occasion to explode, or
contain extremely un-beer-like contents.
greenrd's law
        Evey post disparaging someone else's spelling or grammar, or lauding
        one's own spelling or grammar, will inevitably contain a spelling or
        grammatical error.
                -- greenrd in http://www.kuro5hin.org/comments/2002/4/16/61744/5230?pid=5#6
History books which contain no lies are extremely dull.
Advertisements contain the only truths to be relied on in a newspaper.
                -- Thomas Jefferson
Any circuit design must contain at least one part which is obsolete, two parts
which are unobtainable, and three parts which are still under development.
Besides the device, the box should contain:
        * Eight little rectangular snippets of paper that say "WARNING"
        * A plastic packet containing four 5/17 inch pilfer grommets and two
                club-ended 6/93 inch boxcar prawns.

YOU WILL NEED TO SUPPLY: a matrix wrench and 60,000 feet of tram cable.

IF ANYTHING IS DAMAGED OR MISSING: You IMMEDIATELY should turn to your spouse
and say: "Margaret, you know why this country can't make a car that can get
all the way through the drive-through at Burger King without a major
transmission overhaul?  Because nobody cares, that's why."

WARNING: This is assuming your spouse's name is Margaret.
                -- Dave Barry, "Read This First!"
A mighty creature is the germ,
Though smaller than the pachyderm.
His customary dwelling place
Is deep within the human race.
His childish pride he often pleases
By giving people strange diseases.
Do you, my poppet, feel infirm?
You probably contain a germ.
                -- Ogden Nash
The basic idea behind malls is that they are more convenient than cities.
Cities contain streets, which are dangerous and crowded and difficult to
park in.  Malls, on the other hand, have parking lots, which are also
dangerous and crowded and difficult to park in, but -- here is the big
difference -- in mall parking lots, THERE ARE NO RULES.  You're allowed to
do anything.  You can drive as fast as you want in any direction you want.
I was once driving in a mall parking lot when my car was struck by a pickup
truck being driven backward by a squat man with a tattoo that said "Charlie"
on his forearm, who got out and explained to me, in great detail, why the
accident was my fault, his reasoning being that he was violent and muscular,
whereas I was neither.  This kind of reasoning is legally valid in mall
parking lots.
                -- Dave Barry, "Christmas Shopping: A Survivor's Guide"
MAKE MONEY FAST FROM SLASHDOT!!!!!!

You are probably familiar with the Slashdot.org "News for Nerds" site.
You've probably heard about the "Slashdot Effect".  Now, we want to
introduce a new term that could change your life: "Slashdot Baiting".

The Slashdot Effect is a significant source of traffic.  Lots of traffic.
Thousands of visitors within hours.  Thousands of eyeballs looking and
clicking at YOUR banner advertisements.  In short, the Slashdot Effect, if
properly utilized, can produce a significant amount of advertising revenue.

That's where we at MoneyDot Lucrative Marketing International Group, Inc.
come in.  We know how to exploit the Slashdot Effect.  We call our strategy
"Slashdot Baiting".  It's quite painless.  We have formulated 101 easy ways
to get your site mentioned on Slashdot.

Interested in pursuing Slashdot Baiting and obtaining financial
independence? Want to make $50,000 (or more!) within 90 days?

Then purchase MLM's "Slashdot Baiting Kit", which will contain everything
you need to know to put this powerful marketing force to work for YOU! We
also throw in a warranty: if your site isn't mentioned on Slashdot within 90
days of using this Kit, we'll give you your money back guaranteed!
The War Against Linux

A significant obstacle on the path to Linux World Domination has emerged.  A
reactionary grass-roots movement has formed to fight, as they call it, "The
War Against Linux".  This movement, code-named "LinSux", is composed of
people (mostly Microsoft stockholders and commercial software developers)
who want to maintain the status quo.  They are fighting back against the
rise of Linux and free software which they see as a threat to their financial
independence.

The most damaging attack the LinSux folks have launched is "Three Mile
Island", a Windows macro virus designed to inflict damage on computers that
contain a partition devoted to a non-Microsoft OS.  When the victim computer
is booted into Windows, the virus activates and deletes any non-Microsoft
partitions. Ironically, the many security flaws in Windows allow the virus
to damage alternative operating systems but leave Windows unscathed.

"The War Against Linux" has also been fought in more subtle ways.
Time-tested methods of Linux advocacy have been turned into subtle forms of
anti-Linux advocacy by the LinSux crowd.  MSCEs are smuggling NT boxes into
companies that predominantly use Linux or Unix.  LinSux "freedom fighters"
are rearranging books and software boxes on store shelves so that Microsoft
offerings are displayed more prominently.
The GPL Is Not Y2K-Compliant!

BOSTON, MA -- Panic ensued earlier today at GNU Project Headquarters when
it was discovered that the GNU General Public License is not ready for the
year 2000. Thankfully, the panic quickly subsided when RMS posted an
emergency diff file to Usenet that patches the GPL to eliminate the
problem.

The non-Y2K compliant material appears on lines 295 and 316 of version 2.0
of the GPL. Both lines contain the text, "Copyright (C) 19yy ", a classic
example of unpreparedness for the year 2000.

Microsoft was quick to respond to the news, saying in a rushed press
release, "At least our license agreements don't contain any Y2K issues."
The GNU Project immediately countered Microsoft's statement with a press
release that said simply, "Whatever".
Is Linux A Finnish Conspiracy?

WASHINGTON, DISTRICT OF CORRUPTION -- According to a report recently
issued by the NSA (No Such Agency), Finland is now considered a national
economic and security risk. "We don't trust the Finns... software written
by these people could potentially contain backdoors that could undermine
domestic security," the report states. In response to the news, US Senator
Fatcatte (R-WA) has proposed a bill, the It's For The Children Act of
2000, that would ban all software written by native-born Finns.

"It's time we take the Finnish threat seriously," Fatcatte said at a press
conference. "Not only is Finn software a threat to domestic tranquility,
but it could radically alter the computer industry, costing us thousands
of jobs... and, more importantly, billions in tax revenue. We must prevent
the Finns from subverting our economy with so-called 'open-source
software'." He then asked, "Is anybody thinking of the children of
programmers who will become unemployed when Finnish software overruns the
country?"
Security Holes Found In Microsoft Easter Eggs

REDMOND, WA -- It's damage control time for the Microsoft Marketing
Machine. Not only have exploits been found in IE, Outlook, and even the
Dancing Paper Clip, but now holes have been uncovered in Excel's Flight
Simulator and Word's pinball game.

"If you enter Excel 97's flight simulator and then hit the F1, X, and
SysRq keys while reading a file from Drive A:, you automatically gain
Administrator rights on Windows NT," explained the security expert who
first discovered the problem. "And that's just the tip of the iceberg."

Office 97 and 2000 both contain two hidden DLLs, billrulez.dll and
eastereggs.dll, that are marked as "Safe for scripting" but are not.
Arbitrary Visual BASIC code can be executed using these files. More
disturbing, however, are the undocumented API calls
"ChangeAllPasswordsToDefault", "OpenBackDoor", "InitiateBlueScreenNow",
and "UploadRegistryToMicrosoft" within easter~1.dll.

Microsoft spokesdroids have already hailed the problem as "an
insignificant byproduct of Microsoft innovation."
Are you sick of wasting valuable seconds while ingesting caffeine or
eating a cold pizza? Is your programming project running behind because
you keep falling asleep? EyeOpener(tm) brand caffeinated beverages has the
solution. Our new ActiveIV product will provide a 24 hour supply of
caffeine via intravenous tube while you work -- so you can hack without
any interruptions at all (except going to the bathroom -- but our
Port-a-Urinal(tm) can help solve that problem as well).

EyeOpener(tm) beverages contain at least 5,000% of the daily recommended
dose of caffeine, a quantity that will surely keep you wide awake, alert,
and in Deep Hack Mode for weeks at a time. With EyeOpener and ActiveIV,
you won't waste your valuable time at a vendine machine.

EyeOpener(tm): You'll Never Waste Another Millisecond Ever Again.
Throwing Windows Out The Window

The Federal Bureau Of Missing Socks has banned the use of Microsoft Windows
and Office on all employee computers. But don't get too excited; they aren't
going to replace them with Linux. Instead, this government agency has decided
to go back to using abucusses, slide rules, and manual typewriters.

The banishment of Microsoft software stems from the agency's new policy
against computer games. MS Office, which contains several games in the form of
Easter Eggs, is now verboten on all agency computers. "Flight simulators,
pinball games, magic eight balls... they all violate our policy," said the
sub-adjunct administrator second-class. "So we can't use Office."

Windows is forbidden for the same reason. "We've had way too many
employees wasting time playing Solitaire," she said. "Unfortunately,
Solitaire is an integral part of Windows -- Microsoft executives said so
during the anti-trust trial. If Solitaire is removed, the operating system
won't function properly. Therefore, we have no choice but to banish all
Windows computers."

The Bureau's Assistant Technology Consultant, Mr. Reginald "Red" Taype,
asked,  "Have you ever seen an abucus crash? Have you ever seen anybody
have fun with a slide rule? Do adding machines contain undocumented easter
eggs? No! That's why we're ditching our PCs."
8GB Ought To Be Enough For Anybody

REDMOND, WA -- In a shocking move, Microsoft has revealed that the new
Xbox console will only contain an 8 gigabyte hard drive. This implies that
the machines will use a version of the Windows operating system that fits
within only 8GB. Squeezing Windows into such a small footprint must
certainly be one of the greatest technological achievements ever crafted
by Microsoft's Research & Assimilation Department.

"I can't believe it," said one industry observer who always happens to
show up when this Humorix reporter needs to quote somebody. "To think that
they were able to strip away the easter egg flight simulators, the
multi-gigabyte yet content-free Help files, and all of the other crap that
comes bundled with Windows is simply remarkable. I don't even want to
think about all of the manpower, blood, sweat, and tears required to
distill Windows into only 8 gigabytes of bare essentials. Wow!"

Hard drive manufacturers are deeply disturbed over the news. Explained one
PR flack at Eastern Analog, "We depend on Microsoft to continually produce
bloated software that becomes larger and larger with each passing day. We
can't sell huge 100GB drives if Microsoft Windows only occupies a measly 8
gigs! They will never buy a new drive if Microsoft doesn't force them!"
Press Release -- For Immediate Release
Microsoft Corporation, Redmond, WA

...Virtually all version of Linux (and Unix) contain a security hole that
allows unauthorized users to gain complete control over the machine. By
simply typing "root" at the login prompt and supplying a password from a
limited number of possibilities, a malicious user can easily gain
administrator privileges. This hole can be breached in seconds with only a
dozen or so keystrokes...

We suspect this issue has been known to Red Hat and other Linux
distributors for years and they have refused to acknowlege its existence
or supply a patch preventing users from exploiting the "root" login
loophole...

By ignoring the problem, the Linux community has proven that installing
Linux is a dangerous proposition that could get you fired. We would like
to point out that Windows XP does not suffer from this gaping hole...
Tests conducted by both Ziff-Davis and Mindcraft prove that Windows XP is
indeed the most secure operating system ever produced...
Important letters which contain no errors will develop errors in the mail.
Corresponding errors will show up in the duplicate while the Boss is reading
it.  Vital papers will demonstrate their vitality by spontaneously moving
from where you left them to where you can't find them.
Once, there was NO fun ... This was before MENU planning, FASHION
statements or NAUTILUS equipment ... Then, in 1985 ... FUN was
completely encoded in this tiny MICROCHIP ... It contain 14,768 vaguely
amusing SIT-COM pilots!!  We had to wait FOUR BILLION years but we
finally got JERRY LEWIS, MTV and a large selection of creme-filled
snack cakes!
No guarantee of accuracy or completeness!
©TU Chemnitz, 2006-2024
Your feedback:
Ad partners