DEEn Dictionary De - En
DeEs De - Es
DePt De - Pt
 Vocabulary trainer

Spec. subjects Grammar Abbreviations Random search Preferences
Search in Sprachauswahl
file
Search for:
Mini search box
 
Proverbs, aphorisms, quotations (English) by Linux fortune

Actually, typing random strings in the Finder does the equivalent of
filename completion.
(Discussion in comp.os.linux.misc on the intuitiveness of commands: file
completion vs. the Mac Finder.)
Once upon a time there was a DOS user who saw Unix, and saw that it was
good. After typing cp on his DOS machine at home, he downloaded GNU's
unix tools ported to DOS and installed them. He rm'd, cp'd, and mv'd
happily for many days, and upon finding elvis, he vi'd and was happy. After
a long day at work (on a Unix box) he came home, started editing a file,
and couldn't figure out why he couldn't suspend vi (w/ ctrl-z) to do
a compile.
(By ewt@tipper.oit.unc.edu (Erik Troan)
The file system is full of it
Stale file handle (next time use Tupperware(tm)!)
You can tune a file system, but you can't tune a fish (from most tunefs man pages)
microelectronic Riemannian curved-space fault in write-only file system
Dyslexics retyping hosts file on servers
===  ALL CSH USERS PLEASE NOTE  ========================

Set the variable $LOSERS to all the people that you think are losers.  This
will cause all said losers to have the variable $PEOPLE-WHO-THINK-I-AM-A-LOSER
updated in their .login file.  Should you attempt to execute a job on a
machine with poor response time and a machine on your local net is currently
populated by losers, that machine will be freed up for your job through a
cold boot process.
As part of an ongoing effort to keep you, the Fortune reader, abreast of
the valuable information the daily crosses the USENET, Fortune presents:

News articles that answer *your* questions, #1:

        Newsgroups: comp.sources.d
        Subject: how do I run C code received from sources
        Keywords: C sources
        Distribution: na

        I do not know how to run the C programs that are posted in the
        sources newsgroup.  I save the files, edit them to remove the
        headers, and change the mode so that they are executable, but I
        cannot get them to run.  (I have never written a C program before.)

        Must they be compiled?  With what compiler?  How do I do this?  If
        I compile them, is an object code file generated or must I generate
        it explicitly with the > character?  Is there something else that
        must be done?
Dear Emily:
        I collected replies to an article I wrote, and now it's time to
summarize.  What should I do?
                -- Editor

Dear Editor:
        Simply concatenate all the articles together into a big file and post
that.  On USENET, this is known as a summary.  It lets people read all the
replies without annoying newsreaders getting in the way.  Do the same when
summarizing a vote.
                -- Emily Postnews Answers Your Questions on Netiquette
/earth: file system full.
fortune: No such file or directory
Help me, I'm a prisoner in a Fortune cookie file!
        It is a period of system war.  User programs, striking from a hidden
directory, have won their first victory against the evil Administrative Empire.
During the battle, User spies managed to steal secret source code to the
Empire's ultimate program: the Are-Em Star, a privileged root program with
enough power to destroy an entire file structure.  Pursued by the Empire's
sinister audit trail, Princess _LPA0 races ~ aboard her shell script,
custodian of the stolen listings that could save her people, and restore
freedom and games to the network...
                -- DECWARS
Making files is easy under the UNIX operating system.  Therefore, users
tend to create numerous files using large amounts of file space.  It has
been said that the only standard thing about all UNIX systems is the
message-of-the-day telling users to clean up their files.
                -- System V.2 administrator's guide
Okay, Okay -- I admit it.  You didn't change that program that worked
just a little while ago; I inserted some random characters into the
executable.  Please forgive me.  You can recover the file by typing in
the code over again, since I also removed the source.
The disks are getting full; purge a file today.
The fountain code has been tightened slightly so you can no longer dip
objects into a fountain or drink from one while you are floating in mid-air
due to levitation.
        Teleporting to hell via a teleportation trap will no longer occur
if the character does not have fire resistance.
                -- README file from the NetHack game
The sendmail configuration file is one of those files that looks like someone
beat their head on the keyboard.  After working with it... I can see why!
                -- Harry Skelton
There has also been some work to allow the interesting use of macro names.
For example, if you wanted all of your "creat()" calls to include read
permissions for everyone, you could say

        #define creat(file, mode)        creat(file, mode | 0444)

        I would recommend against this kind of thing in general, since it
hides the changed semantics of "creat()" in a macro, potentially far away
from its uses.
        To allow this use of macros, the preprocessor uses a process that
is worth describing, if for no other reason than that we get to use one of
the more amusing terms introduced into the C lexicon.  While a macro is
being expanded, it is temporarily undefined, and any recurrence of the macro
name is "painted blue" -- I kid you not, this is the official terminology
-- so that in future scans of the text the macro will not be expanded
recursively.  (I do not know why the color blue was chosen; I'm sure it
was the result of a long debate, spread over several meetings.)
                -- From Ken Arnold's "C Advisor" column in Unix Review
        There was once a programmer who worked upon microprocessors.  "Look at
how well off I am here," he said to a mainframe programmer who came to visit,
"I have my own operating system and file storage device.  I do not have to
share my resources with anyone.  The software is self-consistent and
easy-to-use.  Why do you not quit your present job and join me here?"
        The mainframe programmer then began to describe his system to his
friend, saying: "The mainframe sits like an ancient sage meditating in the
midst of the data center.  Its disk drives lie end-to-end like a great ocean
of machinery.  The software is a multi-faceted as a diamond and as convoluted
as a primeval jungle.  The programs, each unique, move through the system
like a swift-flowing river.  That is why I am happy where I am."
        The microcomputer programmer, upon hearing this, fell silent.  But the
two programmers remained friends until the end of their days.
                -- Geoffrey James, "The Tao of Programming"
This file will self-destruct in five minutes.
Today is a good day for information-gathering.  Read someone else's mail file.
Usage: fortune -P [-f] -a [xsz] Q: file [rKe9] -v6[+] file1 ...
Usage: fortune -P [] -a [xsz] [Q: [file]] [rKe9] -v6[+] dataspec ... inputdir
"We invented a new protocol and called it Kermit, after Kermit the Frog,
star of "The Muppet Show." [3]

[3]  Why?  Mostly because there was a Muppets calendar on the wall when we
were trying to think of a name, and Kermit is a pleasant, unassuming sort of
character.  But since we weren't sure whether it was OK to name our protocol
after this popular television and movie star, we pretended that KERMIT was an
acronym; unfortunately, we could never find a good set of words to go with the
letters, as readers of some of our early source code can attest.  Later, while
looking through a name book for his forthcoming baby, Bill Catchings noticed
that "Kermit" was a Celtic word for "free", which is what all Kermit programs
should be, and words to this effect replaced the strained acronyms in our
source code (Bill's baby turned out to be a girl, so he had to name her Becky
instead).  When BYTE Magazine was preparing our 1984 Kermit article for
publication, they suggested we contact Henson Associates Inc. for permission
to say that we did indeed name the protocol after Kermit the Frog.  Permission
was kindly granted, and now the real story can be told.  I resisted the
temptation, however, to call the present work "Kermit the Book."
                -- Frank da Cruz, "Kermit - A File Transfer Protocol"
You will lose an important disk file.
You will lose an important tape file.
The fountain code has been tightened slightly so you can no longer dip objects
into a fountain or drink from one while you are floating in mid-air due to
levitation.

Teleporting to hell via a teleportation trap will no longer occur if the
character does not have fire resistance.

- README file from the NetHack game
"It's my cookie file and if I come up with something that's lame and I like it,
it goes in."
-- karl (Karl Lehenbauer)
"If you weren't my teacher, I'd think you just deleted all my files."
-- an anonymous UCB CS student, to an instructor who had typed "rm -i *" to
   get rid of a file named "-f" on a Unix system.
Trailing Edge Technologies is pleased to announce the following
TETflame programme:

1) For a negotiated price (no quatloos accepted) one of our flaming
   representatives will flame the living shit out of the poster of
   your choice. The price is inversly proportional to how much of
   an asshole the target it. We cannot be convinced to flame Dennis
   Ritchie. Matt Crawford flames are free.

2) For a negotiated price (same arrangement) the TETflame programme
   is offering ``flame insurence''. Under this arrangement, if
   one of our policy holders is flamed, we will cancel the offending
   article and flame the flamer, to a crisp.

3) The TETflame flaming representatives include: Richard Sexton, Oleg
   Kisalev, Diane Holt, Trish O'Tauma, Dave Hill, Greg Nowak and our most
   recent aquisition, Keith Doyle. But all he will do is put you in his
   kill file. Weemba by special arrangement.

-- Richard Sexton
Give all orders verbally.  Never write anything down that might go into a
"Pearl Harbor File".
You first have to decide whether to use the short or the long form. The
short form is what the Internal Revenue Service calls "simplified", which
means it is designed for people who need the help of a Sears tax-preparation
expert to distinguish between their first and last names.  Here's the
complete text:

"(1) How much did you make?  (AMOUNT)
(2) How much did we here at the government take out?  (AMOUNT)
(3) Hey!  Sounds like we took too much!  So we're going to
     send an official government check for (ONE-FIFTEENTH OF
     THE AMOUNT WE TOOK) directly to the (YOUR LAST NAME)
     household at (YOUR ADDRESS), for you to spend in any way
     you please! Which just goes to show you, (YOUR FIRST
     NAME), that it pays to file the short form!"

The IRS wants you to use this form because it gets to keep most of your
money.  So unless you have pond silt for brains, you want the long form.
                -- Dave Barry, "Sweating Out Taxes"
File cabinet:
        A four drawer, manually activated trash compactor.
Have you locked your file cabinet?
SMOKING IS NOW ALLOWED !!!
        Anyone wishing to smoke, however, must file, in triplicate, the
        U.S. government Environmental Impact Narrative Statement (EINS),
        describing in detail the type of combustion proposed, impact on
        the environment, and anticipated opposition.  Statements must be
        filed 30 days in advance.
        Reporters like Bill Greider from the Washington Post and Him
Naughton of the New York Times, for instance, had to file long, detailed,
and relatively complex stories every day -- while my own deadline fell
every two weeks -- but neither of them ever seemed in a hurry about
getting their work done, and from time to time they would try to console
me about the terrible pressure I always seemed to be laboring under.
        Any $100-an-hour psychiatrist could probably explain this problem
to me, in thirteen or fourteen sessions, but I don't have time for that.
No doubt it has something to do with a deep-seated personality defect, or
maybe a kink in whatever blood vessel leads into the pineal gland...  On
the other hand, it might be something as simple & basically perverse as
whatever instinct it is that causes a jackrabbit to wait until the last
possible second to dart across the road in front of a speeding car.
                -- Hunter S. Thompson, "Fear and Loathing on the Campaign Trail"
An Hacker there was, one of the finest sort
Who controlled the system; graphics was his sport.
A manly man, to be a wizard able;
Many a protected file he had sitting on his table.
His console, when he typed, a man might hear
Clicking and feeping wind as clear,
Aye, and as loud as does the machine room bell
Where my lord Hacker was Prior of the cell.
The Rule of good St Savage or St Doeppnor
As old and strict he tended to ignore;
He let go by the things of yesterday
And took the modern world's more spacious way.
He did not rate that text as a plucked hen
Which says that Hackers are not holy men.
And that a hacker underworked is a mere
Fish out of water, flapping on the pier.
That is to say, a hacker out of his cloister.
That was a text he held not worth an oyster.
And I agreed and said his views were sound;
Was he to study till his head wend round
Poring over books in the cloisters?  Must he toil
As Andy bade and till the very soil?
Was he to leave the world upon the shelf?
Let Andy have his labor to himself!
                -- Chaucer
                [well, almost.  Ed.]
Are there those in the land of the brave
Who can tell me how I should behave
        When I am disgraced
        Because I erased
        A file I intended to save?
Come live with me and be my love,
And we will some new pleasures prove
Of golden sands and crystal brooks
With silken lines, and silver hooks.
There's nothing that I wouldn't do
If you would be my POSSLQ.

You live with me, and I with you,
And you will be my POSSLQ.
I'll be your friend and so much more;
That's what a POSSLQ is for.

And everything we will confess;
Yes, even to the IRS.
Some day on what we both may earn,
Perhaps we'll file a joint return.
You'll share my pad, my taxes, joint;
You'll share my life - up to a point!
And that you'll be so glad to do,
Because you'll be my POSSLQ.
Once there was a little nerd who loved to read your mail,
And then yank back the i-access times to get hackers off his tail,
And once as he finished reading from the secretary's spool,
He wrote a rude rejection to her boyfriend (how uncool!)
And this as delivermail did work and he ran his backfstat,
He heard an awful crackling like rat fritters in hot fat,
And hard errors brought the system down 'fore he could even shout!
        And the bio bug'll bring yours down too, ef you don't watch out!
And once they was a little flake who'd prowl through the uulog,
And when he went to his blit that night to play at being god,
The ops all heard him holler, and they to the console dashed,
But when they did a ps -ut they found the system crashed!
Oh, the wizards adb'd the dumps and did the system trace,
And worked on the file system 'til the disk head was hot paste,
But all they ever found was this:  "panic: never doubt",
        And the bio bug'll crash your box too, ef you don't watch out!
When the day is done and the moon comes out,
And you hear the printer whining and the rk's seems to count,
When the other desks are empty and their terminals glassy grey,
And the load is only 1.6 and you wonder if it'll stay,
You must mind the file protections and not snoop around,
        Or the bio bug'll getcha and bring the system down!
What segment's this, that, laid to rest
On FHA0, is sleeping?
What system file, lay here a while        This, this is "acct.run,"
While hackers around it were weeping?        Accounting file for everyone.
                                        Dump, dump it and type it out,
                                        The file, the highseg of login.
Why lies it here, on public disk
And why is it now unprotected?
A bug in incant, made it thus.                Mount, mount all your DECtapes now
And copy the file somehow, somehow.        The problem has not been corrected.
                                        Dump, dump it and type it out,
                                        The file, the highseg of login.
                -- to Greensleeves
Did you know about the -o option of the fortune program?  It makes a
selection from a set of offensive and/or obscene fortunes.  Why not
try it, and see how offended you are?  The -a ("all") option will
select a fortune at random from either the offensive or inoffensive
set, and it is suggested that "fortune -a" is the command that you
should have in your .profile or .cshrc. file.
"So right now the only vendor that does such a stupid thing is Microsoft."

  -- Linus Torvalds on bad file system interface design. (Open Sources , 1999 O'Reilly and Associates.)
Windows Tip of the Day:
Add DEVICE=FNGRCROS.SYS to your CONFIG.SYS file.
Why doesn't DOS ever say "EXCELLENT command or filename!"
DOS Tip of the Day:
Add BUGS=OFF to your CONFIG.SYS file.
Open Source Irrational Constant

BREEZEWOOD, PA -- In a revelation that could rock the foundations of
science, a researcher in Pennsylvania has discovered that the digits of the
irrational constant PI encode a version of the Linux kernel.  "I can't
believe it," the researcher, Neil Hoffman, exclaimed.  "And yet, here I am
staring at what appears to be the source code for Linux kernel 5.0.0.
Needless to say, my whole world-view has changed..."

Hoffman explained, "My algorithm, which applies several dozen conversions and
manipulations to each digit of PI, spits out plain vanilla ASCII characters
that happen to form the source code for the Linux kernel."

Many members of the scientific community are skeptical.  One One
mathematician who has memorized the digits of PI to 10,000 places said,
"This is the kind of nonsense one would expect to find in a tabloid such as
the National Mathematics Enquirer.  Or a Linux fortune(6) file.  Hoffman's
'discovery' is obviously a hoax designed to secure government research
grants."

In a related matter, we have received an unconfirmed report that a region of
the Mandelbrot fractal contains what appear to be the words "LINUS TORVALDS
WAS HERE".  In addition, the words "TRANSMETA: THIS SECRET MESSAGE IS NOT
HERE YET" supposedly appear within the depths of the Julia Set.
The GPL Is Not Y2K-Compliant!

BOSTON, MA -- Panic ensued earlier today at GNU Project Headquarters when
it was discovered that the GNU General Public License is not ready for the
year 2000. Thankfully, the panic quickly subsided when RMS posted an
emergency diff file to Usenet that patches the GPL to eliminate the
problem.

The non-Y2K compliant material appears on lines 295 and 316 of version 2.0
of the GPL. Both lines contain the text, "Copyright (C) 19yy ", a classic
example of unpreparedness for the year 2000.

Microsoft was quick to respond to the news, saying in a rushed press
release, "At least our license agreements don't contain any Y2K issues."
The GNU Project immediately countered Microsoft's statement with a press
release that said simply, "Whatever".
Microsoft Mandatory Survey (#13)

Customers who want to upgrade to Windows 98 Second Edition must now fill
out a Microsoft survey online before they can order the bugfix/upgrade.

Question 13: Which of the following new Microsoft products do you plan on
             buying within the next 6 months?

A. Windows For Babies(tm) - Using an enhanced "click-n-drool" interface,
   babies will be able to learn how to use a Wintel computer, giving them
   a head start in living in a Microsoft-led world.

B. Where In Redmond Is Carmen Sandiego?(tm) - The archvillian Sandiego has
   stolen the Windows source code and must be stopped before she can
   publish it on the Net.

C. ActiveKeyboard 2000(tm) - An ergonomic keyboard that replaces useless
   keys like SysRq and Scroll Lock with handy keys like "Play Solitaire"
   and "Visit Microsoft.com".

D. Visual BatchFile(tm) - An IDE and compiler for the MS-DOS batch file
   language. MSNBC calls it "better than Perl".
Jargon Coiner (#4)

An irregular feature that aims to give you advance warning of new jargon
that we've just made up.

* FREE LECTURE: Attempting to explain the concepts of Linux, Open Source
  software, free software, and gift cultures to someone who is not
  familiar with them. Made extra difficult if the explainee has been
  misled by superficial mainstream news articles about the subject.

  Example: "Eric gave an hour-long free lecture to his mother-in-law after
  she asked him about this Linux thingy she read about in USA Today."

* LEXICON LAZINESS:  Filling a fortune file with a list of fake jargon
  instead of publishing something more substantive (and funny) that would
  take more effort to write.

* FOR(;;)TUNE LOOP: Repeatedly running fortune(6) for cheap entertainment.

  Example: "During a coffee break, Bob became bored and started a
  for(;;)tune loop. His boss had to issue a SIGTERM to get him to resume
  working."
Jargon Coiner (#5)

An irregular feature that aims to give you advance warning of new jargon
that we've just made up.

* DUKE OF URL: A person who publishes their Netscape bookmark file on
  their homepage.

* WWWLIZE (pronounced wuh-wuh-wuh-lize): Habit of unconsciously appending
  www. in front of URLs, even when it's not necessary.

* DUBYA-DUBYA-DUBYA: Common pronounciation of "double-u double-u double-u"
  when orally specifying a wwwlized address.

* ADVOIDANCE: iding a particularly annoying advertising banner by dragging
  another window over it, or by placing your hand on the monitor to cover
  it up.

  Example: "Bob advoided any Microsoft banners he came across."
Jargon Coiner (#7)

An irregular feature that aims to give you advance warning of new jargon
that we've just made up.

* O'REILLY O'WRITING: Going to a bookstore and copying down notes from an
  O'Reilly computer book that you can't afford.

* DEEP WRITE MODE: Similar to "deep hack mode", but applies to people
  writing editorials or (very rarely) Slashdot comments. The author
  of this fortune file sometimes experiences "deep humor mode".

* EDITORIAL WAR: Skirmishes between two or more parties carried out via
  strongly-worded editorials published to sites like Slashdot, Linux
  Today, etc. ESR and RMS are frequently engaged in this.

* THREENYM: Referring to someone by the first letter of their three names.
  Used by some people (RMS and ESR), but not others (has anybody ever
  tried to refer to Linus Torvalds as "LBT"?).
Security Holes Found In Microsoft Easter Eggs

REDMOND, WA -- It's damage control time for the Microsoft Marketing
Machine. Not only have exploits been found in IE, Outlook, and even the
Dancing Paper Clip, but now holes have been uncovered in Excel's Flight
Simulator and Word's pinball game.

"If you enter Excel 97's flight simulator and then hit the F1, X, and
SysRq keys while reading a file from Drive A:, you automatically gain
Administrator rights on Windows NT," explained the security expert who
first discovered the problem. "And that's just the tip of the iceberg."

Office 97 and 2000 both contain two hidden DLLs, billrulez.dll and
eastereggs.dll, that are marked as "Safe for scripting" but are not.
Arbitrary Visual BASIC code can be executed using these files. More
disturbing, however, are the undocumented API calls
"ChangeAllPasswordsToDefault", "OpenBackDoor", "InitiateBlueScreenNow",
and "UploadRegistryToMicrosoft" within easter~1.dll.

Microsoft spokesdroids have already hailed the problem as "an
insignificant byproduct of Microsoft innovation."
Brief History Of Linux (#18)
There are lies, damned lies, and Microsoft brochures

Even from the very first day, the Microsoft Marketing Department was at
full throttle. Vaporware has always been their weapon of choice. Back when
MS-DOS 1.25 was released to OEMs, Microsoft handed out brochures touting
some of the features to be included in future versions, including:
Xenix-compatible pipes, process forks, multitasking, graphics and cursor
positioning, and multi-user support.

The brochure also stated, "MS-DOS has no practical limit on disk size.
MS-DOS uses 4-byte Xenix compatible pointers for file and disk capacity up
to 4 gigabytes." We would like to emphasize in true Dave Barry fashion
that we are not making this up.

Big vaporous plans were also in store for Microsoft's "Apple Killer"
graphical interface. In 1983 Microsoft innovated a new marketing ploy --
the rigged "smoke-and-mirrors" demo -- to showcase the "overlapping
windows" and "multitasking" features of Interface Manager, the predecessor
to Windows. These features never made it into Windows 1.0 -- which,
incidentally, was released 1.5 years behind schedule.
This nation is sinking into the quicksand of the Paperwork Age, a
postmodern world in which judges issue meta-injuctions against other
judges who issue injuctions against lawyers who file lawsuits every 3.2
minutes. It's an age where lawyers design ballots forms and then proceed
to argue over how to count them.

The United States has bluescreened. A fatal exception error occured on
Election Night, and now all of our unsaved work has been lost.

  -- Jon Splatz, Humorix's Pundit and Social Commentator, ranting about
     the 2000 US Presidential Election From Hell and the dreaded
     "Lawyerclysm"
">So what is The Big Difference(tm) that make file streams
>so much better than directories and so much different?

I'll talk really slowly."

        - Linus Torvalds
/* strangest things ever said, #6, to alan cox: "...and remember, alan
* - no monkeybusiness.  remember, i sleep nude and we dont want to
* give rachel the shock of her life..." */

        - comment in the Crack 5 source, file src/util/kickdict.c
> That is reimplementing file system functionality in user space.
> I'm in doubts that this is considered good design...

Keeping things out of the kernel is good design. Your block indirections
are no different to other database formats. Perhaps you think we should
have fsql_operation() and libdb in kernel 8)

        - Alan Cox on linux-kernel
..... using XML would just be shooting birds with tactical nukes. E.g.
lots of fun, but a little expensive and not really necessary.

        - Jakob Østergaard about using XML in /proc file on linux-kernel
From: Alan Cox <alan@lxorguk.ukuu.org.uk>
Subject: Re: Yet another design for /proc. Or actually /kernel.

> Here's my go at a new design for /proc. I designed it from a userland
> point of view and tried not to drown myself into details.

Did you have to change the subject line. It makes it harder to kill file
when people keep doing that
<cas> well there ya go.  say something stupid in irc and have it
      immortalised forever in someone's .sig file
<Overfiend> The Unix way -- everything is a file
<Overfiend> The Linux way -- everything is a filesystem :)
Once upon a time there was a DOS user who saw Unix, and saw that it was
good.  After typing cp on his DOS machine at home, he downloaded GNU's
unix tools ported to DOS and installed them.  He rm'd, cp'd, and mv'd
happily for many days, and upon finding elvis, he vi'd and was happy.  After
a long day at work (on a Unix box) he came home, started editing a file,
and couldn't figure out why he couldn't suspend vi (w/ ctrl-z) to do
a compile.
        -- Erik Troan, ewt@tipper.oit.unc.edu
Actually, typing random strings in the Finder does the equivalent of
filename completion.
        -- Discussion on file completion vs. the Mac Finder
-  long    f_ffree;    /* free file nodes in fs */
+  long    f_ffree;    /* freie Dateiknoten im Dateisystem */
        -- Seen in a translation
> I thing you're missing the capability of Makefiles.

        It takes several _hours_ to do `make' a second time on my
machine with the latest glibc sources (and no files are recompiled a
second time).  I think I'll remove `build' after changing one file if
I want to recompile it.
        -- Juan Cespedes <cespedes@debian.org>
/*
*     Please skip to the bottom of this file if you ate lunch recently
*                             -- Alan
*/
        -- from Linux kernel pre-2.1.91-1
The term "fire" brings up visions of violence and mayhem and the ugly scene
of shooting employees who make mistakes.  We will now refer to this process
as "deleting" an employee (much as a file is deleted from a disk).  The
employee is simply there one instant, and gone the next.  All the terrible
temper tantrums, crying, and threats are eliminated.
                -- Kenny's Korner
Just don't create a file called -rf.  :-)
             -- Larry Wall in <11393@jpl-devvax.JPL.NASA.GOV>
And we can always supply them with a program that makes identical files
into links to a single file.
             -- Larry Wall in <199709292012.NAA09616@wall.org>
Xerox your lunch and file it under "sex offenders"!
No guarantee of accuracy or completeness!
©TU Chemnitz, 2006-2024
Your feedback:
Ad partners