Proverbs, aphorisms, quotations (English) | by Linux fortune |
Actually, typing random strings in the Finder does the equivalent of filename completion. (Discussion in comp.os.linux.misc on the intuitiveness of commands: file completion vs. the Mac Finder.) | |
Once upon a time there was a DOS user who saw Unix, and saw that it was good. After typing cp on his DOS machine at home, he downloaded GNU's unix tools ported to DOS and installed them. He rm'd, cp'd, and mv'd happily for many days, and upon finding elvis, he vi'd and was happy. After a long day at work (on a Unix box) he came home, started editing a file, and couldn't figure out why he couldn't suspend vi (w/ ctrl-z) to do a compile. (By ewt@tipper.oit.unc.edu (Erik Troan) | |
The file system is full of it | |
Stale file handle (next time use Tupperware(tm)!) | |
You can tune a file system, but you can't tune a fish (from most tunefs man pages) | |
microelectronic Riemannian curved-space fault in write-only file system | |
Dyslexics retyping hosts file on servers | |
=== ALL CSH USERS PLEASE NOTE ======================== Set the variable $LOSERS to all the people that you think are losers. This will cause all said losers to have the variable $PEOPLE-WHO-THINK-I-AM-A-LOSER updated in their .login file. Should you attempt to execute a job on a machine with poor response time and a machine on your local net is currently populated by losers, that machine will be freed up for your job through a cold boot process. | |
As part of an ongoing effort to keep you, the Fortune reader, abreast of the valuable information the daily crosses the USENET, Fortune presents: News articles that answer *your* questions, #1: Newsgroups: comp.sources.d Subject: how do I run C code received from sources Keywords: C sources Distribution: na I do not know how to run the C programs that are posted in the sources newsgroup. I save the files, edit them to remove the headers, and change the mode so that they are executable, but I cannot get them to run. (I have never written a C program before.) Must they be compiled? With what compiler? How do I do this? If I compile them, is an object code file generated or must I generate it explicitly with the > character? Is there something else that must be done? | |
Dear Emily: I collected replies to an article I wrote, and now it's time to summarize. What should I do? -- Editor Dear Editor: Simply concatenate all the articles together into a big file and post that. On USENET, this is known as a summary. It lets people read all the replies without annoying newsreaders getting in the way. Do the same when summarizing a vote. -- Emily Postnews Answers Your Questions on Netiquette | |
/earth: file system full. | |
fortune: No such file or directory | |
Help me, I'm a prisoner in a Fortune cookie file! | |
It is a period of system war. User programs, striking from a hidden directory, have won their first victory against the evil Administrative Empire. During the battle, User spies managed to steal secret source code to the Empire's ultimate program: the Are-Em Star, a privileged root program with enough power to destroy an entire file structure. Pursued by the Empire's sinister audit trail, Princess _LPA0 races ~ aboard her shell script, custodian of the stolen listings that could save her people, and restore freedom and games to the network... -- DECWARS | |
Making files is easy under the UNIX operating system. Therefore, users tend to create numerous files using large amounts of file space. It has been said that the only standard thing about all UNIX systems is the message-of-the-day telling users to clean up their files. -- System V.2 administrator's guide | |
Okay, Okay -- I admit it. You didn't change that program that worked just a little while ago; I inserted some random characters into the executable. Please forgive me. You can recover the file by typing in the code over again, since I also removed the source. | |
The disks are getting full; purge a file today. | |
The fountain code has been tightened slightly so you can no longer dip objects into a fountain or drink from one while you are floating in mid-air due to levitation. Teleporting to hell via a teleportation trap will no longer occur if the character does not have fire resistance. -- README file from the NetHack game | |
The sendmail configuration file is one of those files that looks like someone beat their head on the keyboard. After working with it... I can see why! -- Harry Skelton | |
There has also been some work to allow the interesting use of macro names. For example, if you wanted all of your "creat()" calls to include read permissions for everyone, you could say #define creat(file, mode) creat(file, mode | 0444) I would recommend against this kind of thing in general, since it hides the changed semantics of "creat()" in a macro, potentially far away from its uses. To allow this use of macros, the preprocessor uses a process that is worth describing, if for no other reason than that we get to use one of the more amusing terms introduced into the C lexicon. While a macro is being expanded, it is temporarily undefined, and any recurrence of the macro name is "painted blue" -- I kid you not, this is the official terminology -- so that in future scans of the text the macro will not be expanded recursively. (I do not know why the color blue was chosen; I'm sure it was the result of a long debate, spread over several meetings.) -- From Ken Arnold's "C Advisor" column in Unix Review | |
There was once a programmer who worked upon microprocessors. "Look at how well off I am here," he said to a mainframe programmer who came to visit, "I have my own operating system and file storage device. I do not have to share my resources with anyone. The software is self-consistent and easy-to-use. Why do you not quit your present job and join me here?" The mainframe programmer then began to describe his system to his friend, saying: "The mainframe sits like an ancient sage meditating in the midst of the data center. Its disk drives lie end-to-end like a great ocean of machinery. The software is a multi-faceted as a diamond and as convoluted as a primeval jungle. The programs, each unique, move through the system like a swift-flowing river. That is why I am happy where I am." The microcomputer programmer, upon hearing this, fell silent. But the two programmers remained friends until the end of their days. -- Geoffrey James, "The Tao of Programming" | |
This file will self-destruct in five minutes. | |
Today is a good day for information-gathering. Read someone else's mail file. | |
Usage: fortune -P [-f] -a [xsz] Q: file [rKe9] -v6[+] file1 ... | |
Usage: fortune -P [] -a [xsz] [Q: [file]] [rKe9] -v6[+] dataspec ... inputdir | |
"We invented a new protocol and called it Kermit, after Kermit the Frog, star of "The Muppet Show." [3] [3] Why? Mostly because there was a Muppets calendar on the wall when we were trying to think of a name, and Kermit is a pleasant, unassuming sort of character. But since we weren't sure whether it was OK to name our protocol after this popular television and movie star, we pretended that KERMIT was an acronym; unfortunately, we could never find a good set of words to go with the letters, as readers of some of our early source code can attest. Later, while looking through a name book for his forthcoming baby, Bill Catchings noticed that "Kermit" was a Celtic word for "free", which is what all Kermit programs should be, and words to this effect replaced the strained acronyms in our source code (Bill's baby turned out to be a girl, so he had to name her Becky instead). When BYTE Magazine was preparing our 1984 Kermit article for publication, they suggested we contact Henson Associates Inc. for permission to say that we did indeed name the protocol after Kermit the Frog. Permission was kindly granted, and now the real story can be told. I resisted the temptation, however, to call the present work "Kermit the Book." -- Frank da Cruz, "Kermit - A File Transfer Protocol" | |
You will lose an important disk file. | |
You will lose an important tape file. | |
The fountain code has been tightened slightly so you can no longer dip objects into a fountain or drink from one while you are floating in mid-air due to levitation. Teleporting to hell via a teleportation trap will no longer occur if the character does not have fire resistance. - README file from the NetHack game | |
"It's my cookie file and if I come up with something that's lame and I like it, it goes in." -- karl (Karl Lehenbauer) | |
"If you weren't my teacher, I'd think you just deleted all my files." -- an anonymous UCB CS student, to an instructor who had typed "rm -i *" to get rid of a file named "-f" on a Unix system. | |
Trailing Edge Technologies is pleased to announce the following TETflame programme: 1) For a negotiated price (no quatloos accepted) one of our flaming representatives will flame the living shit out of the poster of your choice. The price is inversly proportional to how much of an asshole the target it. We cannot be convinced to flame Dennis Ritchie. Matt Crawford flames are free. 2) For a negotiated price (same arrangement) the TETflame programme is offering ``flame insurence''. Under this arrangement, if one of our policy holders is flamed, we will cancel the offending article and flame the flamer, to a crisp. 3) The TETflame flaming representatives include: Richard Sexton, Oleg Kisalev, Diane Holt, Trish O'Tauma, Dave Hill, Greg Nowak and our most recent aquisition, Keith Doyle. But all he will do is put you in his kill file. Weemba by special arrangement. -- Richard Sexton | |
Give all orders verbally. Never write anything down that might go into a "Pearl Harbor File". | |
You first have to decide whether to use the short or the long form. The short form is what the Internal Revenue Service calls "simplified", which means it is designed for people who need the help of a Sears tax-preparation expert to distinguish between their first and last names. Here's the complete text: "(1) How much did you make? (AMOUNT) (2) How much did we here at the government take out? (AMOUNT) (3) Hey! Sounds like we took too much! So we're going to send an official government check for (ONE-FIFTEENTH OF THE AMOUNT WE TOOK) directly to the (YOUR LAST NAME) household at (YOUR ADDRESS), for you to spend in any way you please! Which just goes to show you, (YOUR FIRST NAME), that it pays to file the short form!" The IRS wants you to use this form because it gets to keep most of your money. So unless you have pond silt for brains, you want the long form. -- Dave Barry, "Sweating Out Taxes" | |
File cabinet: A four drawer, manually activated trash compactor. | |
Have you locked your file cabinet? | |
SMOKING IS NOW ALLOWED !!! Anyone wishing to smoke, however, must file, in triplicate, the U.S. government Environmental Impact Narrative Statement (EINS), describing in detail the type of combustion proposed, impact on the environment, and anticipated opposition. Statements must be filed 30 days in advance. | |
Reporters like Bill Greider from the Washington Post and Him Naughton of the New York Times, for instance, had to file long, detailed, and relatively complex stories every day -- while my own deadline fell every two weeks -- but neither of them ever seemed in a hurry about getting their work done, and from time to time they would try to console me about the terrible pressure I always seemed to be laboring under. Any $100-an-hour psychiatrist could probably explain this problem to me, in thirteen or fourteen sessions, but I don't have time for that. No doubt it has something to do with a deep-seated personality defect, or maybe a kink in whatever blood vessel leads into the pineal gland... On the other hand, it might be something as simple & basically perverse as whatever instinct it is that causes a jackrabbit to wait until the last possible second to dart across the road in front of a speeding car. -- Hunter S. Thompson, "Fear and Loathing on the Campaign Trail" | |
An Hacker there was, one of the finest sort Who controlled the system; graphics was his sport. A manly man, to be a wizard able; Many a protected file he had sitting on his table. His console, when he typed, a man might hear Clicking and feeping wind as clear, Aye, and as loud as does the machine room bell Where my lord Hacker was Prior of the cell. The Rule of good St Savage or St Doeppnor As old and strict he tended to ignore; He let go by the things of yesterday And took the modern world's more spacious way. He did not rate that text as a plucked hen Which says that Hackers are not holy men. And that a hacker underworked is a mere Fish out of water, flapping on the pier. That is to say, a hacker out of his cloister. That was a text he held not worth an oyster. And I agreed and said his views were sound; Was he to study till his head wend round Poring over books in the cloisters? Must he toil As Andy bade and till the very soil? Was he to leave the world upon the shelf? Let Andy have his labor to himself! -- Chaucer [well, almost. Ed.] | |
Are there those in the land of the brave Who can tell me how I should behave When I am disgraced Because I erased A file I intended to save? | |
Come live with me and be my love, And we will some new pleasures prove Of golden sands and crystal brooks With silken lines, and silver hooks. There's nothing that I wouldn't do If you would be my POSSLQ. You live with me, and I with you, And you will be my POSSLQ. I'll be your friend and so much more; That's what a POSSLQ is for. And everything we will confess; Yes, even to the IRS. Some day on what we both may earn, Perhaps we'll file a joint return. You'll share my pad, my taxes, joint; You'll share my life - up to a point! And that you'll be so glad to do, Because you'll be my POSSLQ. | |
Once there was a little nerd who loved to read your mail, And then yank back the i-access times to get hackers off his tail, And once as he finished reading from the secretary's spool, He wrote a rude rejection to her boyfriend (how uncool!) And this as delivermail did work and he ran his backfstat, He heard an awful crackling like rat fritters in hot fat, And hard errors brought the system down 'fore he could even shout! And the bio bug'll bring yours down too, ef you don't watch out! And once they was a little flake who'd prowl through the uulog, And when he went to his blit that night to play at being god, The ops all heard him holler, and they to the console dashed, But when they did a ps -ut they found the system crashed! Oh, the wizards adb'd the dumps and did the system trace, And worked on the file system 'til the disk head was hot paste, But all they ever found was this: "panic: never doubt", And the bio bug'll crash your box too, ef you don't watch out! When the day is done and the moon comes out, And you hear the printer whining and the rk's seems to count, When the other desks are empty and their terminals glassy grey, And the load is only 1.6 and you wonder if it'll stay, You must mind the file protections and not snoop around, Or the bio bug'll getcha and bring the system down! | |
What segment's this, that, laid to rest On FHA0, is sleeping? What system file, lay here a while This, this is "acct.run," While hackers around it were weeping? Accounting file for everyone. Dump, dump it and type it out, The file, the highseg of login. Why lies it here, on public disk And why is it now unprotected? A bug in incant, made it thus. Mount, mount all your DECtapes now And copy the file somehow, somehow. The problem has not been corrected. Dump, dump it and type it out, The file, the highseg of login. -- to Greensleeves | |
Did you know about the -o option of the fortune program? It makes a selection from a set of offensive and/or obscene fortunes. Why not try it, and see how offended you are? The -a ("all") option will select a fortune at random from either the offensive or inoffensive set, and it is suggested that "fortune -a" is the command that you should have in your .profile or .cshrc. file. | |
"So right now the only vendor that does such a stupid thing is Microsoft." -- Linus Torvalds on bad file system interface design. (Open Sources , 1999 O'Reilly and Associates.) | |
Windows Tip of the Day: Add DEVICE=FNGRCROS.SYS to your CONFIG.SYS file. | |
Why doesn't DOS ever say "EXCELLENT command or filename!" | |
DOS Tip of the Day: Add BUGS=OFF to your CONFIG.SYS file. | |
Open Source Irrational Constant BREEZEWOOD, PA -- In a revelation that could rock the foundations of science, a researcher in Pennsylvania has discovered that the digits of the irrational constant PI encode a version of the Linux kernel. "I can't believe it," the researcher, Neil Hoffman, exclaimed. "And yet, here I am staring at what appears to be the source code for Linux kernel 5.0.0. Needless to say, my whole world-view has changed..." Hoffman explained, "My algorithm, which applies several dozen conversions and manipulations to each digit of PI, spits out plain vanilla ASCII characters that happen to form the source code for the Linux kernel." Many members of the scientific community are skeptical. One One mathematician who has memorized the digits of PI to 10,000 places said, "This is the kind of nonsense one would expect to find in a tabloid such as the National Mathematics Enquirer. Or a Linux fortune(6) file. Hoffman's 'discovery' is obviously a hoax designed to secure government research grants." In a related matter, we have received an unconfirmed report that a region of the Mandelbrot fractal contains what appear to be the words "LINUS TORVALDS WAS HERE". In addition, the words "TRANSMETA: THIS SECRET MESSAGE IS NOT HERE YET" supposedly appear within the depths of the Julia Set. | |
The GPL Is Not Y2K-Compliant! BOSTON, MA -- Panic ensued earlier today at GNU Project Headquarters when it was discovered that the GNU General Public License is not ready for the year 2000. Thankfully, the panic quickly subsided when RMS posted an emergency diff file to Usenet that patches the GPL to eliminate the problem. The non-Y2K compliant material appears on lines 295 and 316 of version 2.0 of the GPL. Both lines contain the text, "Copyright (C) 19yy ", a classic example of unpreparedness for the year 2000. Microsoft was quick to respond to the news, saying in a rushed press release, "At least our license agreements don't contain any Y2K issues." The GNU Project immediately countered Microsoft's statement with a press release that said simply, "Whatever". | |
Microsoft Mandatory Survey (#13) Customers who want to upgrade to Windows 98 Second Edition must now fill out a Microsoft survey online before they can order the bugfix/upgrade. Question 13: Which of the following new Microsoft products do you plan on buying within the next 6 months? A. Windows For Babies(tm) - Using an enhanced "click-n-drool" interface, babies will be able to learn how to use a Wintel computer, giving them a head start in living in a Microsoft-led world. B. Where In Redmond Is Carmen Sandiego?(tm) - The archvillian Sandiego has stolen the Windows source code and must be stopped before she can publish it on the Net. C. ActiveKeyboard 2000(tm) - An ergonomic keyboard that replaces useless keys like SysRq and Scroll Lock with handy keys like "Play Solitaire" and "Visit Microsoft.com". D. Visual BatchFile(tm) - An IDE and compiler for the MS-DOS batch file language. MSNBC calls it "better than Perl". | |
Jargon Coiner (#4) An irregular feature that aims to give you advance warning of new jargon that we've just made up. * FREE LECTURE: Attempting to explain the concepts of Linux, Open Source software, free software, and gift cultures to someone who is not familiar with them. Made extra difficult if the explainee has been misled by superficial mainstream news articles about the subject. Example: "Eric gave an hour-long free lecture to his mother-in-law after she asked him about this Linux thingy she read about in USA Today." * LEXICON LAZINESS: Filling a fortune file with a list of fake jargon instead of publishing something more substantive (and funny) that would take more effort to write. * FOR(;;)TUNE LOOP: Repeatedly running fortune(6) for cheap entertainment. Example: "During a coffee break, Bob became bored and started a for(;;)tune loop. His boss had to issue a SIGTERM to get him to resume working." | |
Jargon Coiner (#5) An irregular feature that aims to give you advance warning of new jargon that we've just made up. * DUKE OF URL: A person who publishes their Netscape bookmark file on their homepage. * WWWLIZE (pronounced wuh-wuh-wuh-lize): Habit of unconsciously appending www. in front of URLs, even when it's not necessary. * DUBYA-DUBYA-DUBYA: Common pronounciation of "double-u double-u double-u" when orally specifying a wwwlized address. * ADVOIDANCE: iding a particularly annoying advertising banner by dragging another window over it, or by placing your hand on the monitor to cover it up. Example: "Bob advoided any Microsoft banners he came across." | |
Jargon Coiner (#7) An irregular feature that aims to give you advance warning of new jargon that we've just made up. * O'REILLY O'WRITING: Going to a bookstore and copying down notes from an O'Reilly computer book that you can't afford. * DEEP WRITE MODE: Similar to "deep hack mode", but applies to people writing editorials or (very rarely) Slashdot comments. The author of this fortune file sometimes experiences "deep humor mode". * EDITORIAL WAR: Skirmishes between two or more parties carried out via strongly-worded editorials published to sites like Slashdot, Linux Today, etc. ESR and RMS are frequently engaged in this. * THREENYM: Referring to someone by the first letter of their three names. Used by some people (RMS and ESR), but not others (has anybody ever tried to refer to Linus Torvalds as "LBT"?). | |
Security Holes Found In Microsoft Easter Eggs REDMOND, WA -- It's damage control time for the Microsoft Marketing Machine. Not only have exploits been found in IE, Outlook, and even the Dancing Paper Clip, but now holes have been uncovered in Excel's Flight Simulator and Word's pinball game. "If you enter Excel 97's flight simulator and then hit the F1, X, and SysRq keys while reading a file from Drive A:, you automatically gain Administrator rights on Windows NT," explained the security expert who first discovered the problem. "And that's just the tip of the iceberg." Office 97 and 2000 both contain two hidden DLLs, billrulez.dll and eastereggs.dll, that are marked as "Safe for scripting" but are not. Arbitrary Visual BASIC code can be executed using these files. More disturbing, however, are the undocumented API calls "ChangeAllPasswordsToDefault", "OpenBackDoor", "InitiateBlueScreenNow", and "UploadRegistryToMicrosoft" within easter~1.dll. Microsoft spokesdroids have already hailed the problem as "an insignificant byproduct of Microsoft innovation." | |
Brief History Of Linux (#18) There are lies, damned lies, and Microsoft brochures Even from the very first day, the Microsoft Marketing Department was at full throttle. Vaporware has always been their weapon of choice. Back when MS-DOS 1.25 was released to OEMs, Microsoft handed out brochures touting some of the features to be included in future versions, including: Xenix-compatible pipes, process forks, multitasking, graphics and cursor positioning, and multi-user support. The brochure also stated, "MS-DOS has no practical limit on disk size. MS-DOS uses 4-byte Xenix compatible pointers for file and disk capacity up to 4 gigabytes." We would like to emphasize in true Dave Barry fashion that we are not making this up. Big vaporous plans were also in store for Microsoft's "Apple Killer" graphical interface. In 1983 Microsoft innovated a new marketing ploy -- the rigged "smoke-and-mirrors" demo -- to showcase the "overlapping windows" and "multitasking" features of Interface Manager, the predecessor to Windows. These features never made it into Windows 1.0 -- which, incidentally, was released 1.5 years behind schedule. | |
This nation is sinking into the quicksand of the Paperwork Age, a postmodern world in which judges issue meta-injuctions against other judges who issue injuctions against lawyers who file lawsuits every 3.2 minutes. It's an age where lawyers design ballots forms and then proceed to argue over how to count them. The United States has bluescreened. A fatal exception error occured on Election Night, and now all of our unsaved work has been lost. -- Jon Splatz, Humorix's Pundit and Social Commentator, ranting about the 2000 US Presidential Election From Hell and the dreaded "Lawyerclysm" | |
">So what is The Big Difference(tm) that make file streams >so much better than directories and so much different? I'll talk really slowly." - Linus Torvalds | |
/* strangest things ever said, #6, to alan cox: "...and remember, alan * - no monkeybusiness. remember, i sleep nude and we dont want to * give rachel the shock of her life..." */ - comment in the Crack 5 source, file src/util/kickdict.c | |
> That is reimplementing file system functionality in user space. > I'm in doubts that this is considered good design... Keeping things out of the kernel is good design. Your block indirections are no different to other database formats. Perhaps you think we should have fsql_operation() and libdb in kernel 8) - Alan Cox on linux-kernel | |
..... using XML would just be shooting birds with tactical nukes. E.g. lots of fun, but a little expensive and not really necessary. - Jakob Østergaard about using XML in /proc file on linux-kernel | |
From: Alan Cox <alan@lxorguk.ukuu.org.uk> Subject: Re: Yet another design for /proc. Or actually /kernel. > Here's my go at a new design for /proc. I designed it from a userland > point of view and tried not to drown myself into details. Did you have to change the subject line. It makes it harder to kill file when people keep doing that | |
<cas> well there ya go. say something stupid in irc and have it immortalised forever in someone's .sig file | |
<Overfiend> The Unix way -- everything is a file <Overfiend> The Linux way -- everything is a filesystem :) | |
Once upon a time there was a DOS user who saw Unix, and saw that it was good. After typing cp on his DOS machine at home, he downloaded GNU's unix tools ported to DOS and installed them. He rm'd, cp'd, and mv'd happily for many days, and upon finding elvis, he vi'd and was happy. After a long day at work (on a Unix box) he came home, started editing a file, and couldn't figure out why he couldn't suspend vi (w/ ctrl-z) to do a compile. -- Erik Troan, ewt@tipper.oit.unc.edu | |
Actually, typing random strings in the Finder does the equivalent of filename completion. -- Discussion on file completion vs. the Mac Finder | |
- long f_ffree; /* free file nodes in fs */ + long f_ffree; /* freie Dateiknoten im Dateisystem */ -- Seen in a translation | |
> I thing you're missing the capability of Makefiles. It takes several _hours_ to do `make' a second time on my machine with the latest glibc sources (and no files are recompiled a second time). I think I'll remove `build' after changing one file if I want to recompile it. -- Juan Cespedes <cespedes@debian.org> | |
/* * Please skip to the bottom of this file if you ate lunch recently * -- Alan */ -- from Linux kernel pre-2.1.91-1 | |
The term "fire" brings up visions of violence and mayhem and the ugly scene of shooting employees who make mistakes. We will now refer to this process as "deleting" an employee (much as a file is deleted from a disk). The employee is simply there one instant, and gone the next. All the terrible temper tantrums, crying, and threats are eliminated. -- Kenny's Korner | |
Just don't create a file called -rf. :-) -- Larry Wall in <11393@jpl-devvax.JPL.NASA.GOV> | |
And we can always supply them with a program that makes identical files into links to a single file. -- Larry Wall in <199709292012.NAA09616@wall.org> | |
Xerox your lunch and file it under "sex offenders"! |