Proverbs, aphorisms, quotations (English) | by Linux fortune |
I went on to test the program in every way I could devise. I strained it to expose its weaknesses. I ran it for high-mass stars and low-mass stars, for stars born exceedingly hot and those born relatively cold. I ran it assuming the superfluid currents beneath the crust to be absent -- not because I wanted to know the answer, but because I had developed an intuitive feel for the answer in this particular case. Finally I got a run in which the computer showed the pulsar's temperature to be less than absolute zero. I had found an error. I chased down the error and fixed it. Now I had improved the program to the point where it would not run at all. -- George Greenstein, "Frozen Star: Of Pulsars, Black Holes and the Fate of Stars" | |
It turned out that the worm exploited three or four different holes in the system. From this, and the fact that we were able to capture and examine some of the source code, we realized that we were dealing with someone very sharp, probably not someone here on campus. -- Dr. Richard LeBlanc, associate professor of ICS, in Georgia Tech's campus newspaper after the Internet worm. | |
The work [of software development] is becoming far easier (i.e. the tools we're using work at a higher level, more removed from machine, peripheral and operating system imperatives) than it was twenty years ago, and because of this, knowledge of the internals of a system may become less accessible. We may be able to dig deeper holes, but unless we know how to build taller ladders, we had best hope that it does not rain much. -- Paul Licker | |
The Worst Prison Guards The largest number of convicts ever to escape simultaneously from a maximum security prison is 124. This record is held by Alcoente Prison, near Lisbon in Portugal. During the weeks leading up to the escape in July 1978 the prison warders had noticed that attendances had fallen at film shows which included "The Great Escape", and also that 220 knives and a huge quantity of electric cable had disappeared. A guard explained, "Yes, we were planning to look for them, but never got around to it." The warders had not, however, noticed the gaping holes in the wall because they were "covered with posters". Nor did they detect any of the spades, chisels, water hoses and electric drills amassed by the inmates in large quantities. The night before the breakout one guard had noticed that of the 36 prisoners in his block only 13 were present. He said this was "normal" because inmates sometimes missed roll-call or hid, but usually came back the next morning. "We only found out about the escape at 6:30 the next morning when one of the prisoners told us," a warder said later. [...] When they eventually checked, the prison guards found that exactly half of the gaol's population was missing. By way of explanation the Justice Minister, Dr. Santos Pais, claimed that the escape was "normal" and part of the "legitimate desire of the prisoner to regain his liberty." -- Stephen Pile, "The Book of Heroic Failures" | |
Kington's Law of Perforation: If a straight line of holes is made in a piece of paper, such as a sheet of stamps or a check, that line becomes the strongest part of the paper. | |
Major premise: Sixty men can do sixty times as much work as one man. Minor premise: A man can dig a posthole in sixty seconds. Conclusion: Sixty men can dig a posthole in one second. -- Ambrose Bierce, "The Devil's Dictionary" Secondary Conclusion: Do you realize how many holes there would be if people would just take the time to take the dirt out of them? | |
QOTD: "You want me to put *holes* in my ears and hang things from them? How... tribal." | |
Diseases for Kisses (Hyperkarma): A deeply rooted belief that punishment will somehow always be far greater than the crime: ozone holes for littering. -- Douglas Coupland, "Generation X: Tales for an Accelerated Culture" | |
Black Holes: An X generation subgroup best known for their possession of almost entirely black wardrobes. -- Douglas Coupland, "Generation X: Tales for an Accelerated Culture" | |
Black Dens: Where Black Holes live; often unheated warehouses with Day-Glo spray painting, mutilated mannequins, Elvis references, dozens of overflowing ashtrays, mirror sculptures, and Velvet Underground music playing in background. -- Douglas Coupland, "Generation X: Tales for an Accelerated Culture" | |
Air is water with holes in it. | |
It cannot be seen, cannot be felt, Cannot be heard, cannot be smelt. It lies behind starts and under hills, And empty holes it fills. It comes first and follows after, Ends life, kills laughter. | |
"Oh, he [a big dog] hunts with papa," she said. "He says Don Carlos [the dog] is good for almost every kind of game. He went duck hunting one time and did real well at it. Then Papa bought some ducks, not wild ducks but, you know, farm ducks. And it got Don Carlos all mixed up. Since the ducks were always around the yard with nobody shooting at them he knew he wasn't supposed to kill them, but he had to do something. So one morning last spring, when the ground was still soft, he took all the ducks and buried them." "What do you mean, buried them?" "Oh, he didn't hurt them. He dug little holes all over the yard and picked up the ducks in his mouth and put them in the holes. Then he covered them up with mud except for their heads. He did thirteen ducks that way and was digging a hole for another one when Tony found him. We talked about it for a long time. Papa said Don Carlos was afraid the ducks might run away, and since he didn't know how to build a cage he put them in holes. He's a smart dog." -- R. Bradford, "Red Sky At Morning" | |
Security Holes Found In Microsoft Easter Eggs REDMOND, WA -- It's damage control time for the Microsoft Marketing Machine. Not only have exploits been found in IE, Outlook, and even the Dancing Paper Clip, but now holes have been uncovered in Excel's Flight Simulator and Word's pinball game. "If you enter Excel 97's flight simulator and then hit the F1, X, and SysRq keys while reading a file from Drive A:, you automatically gain Administrator rights on Windows NT," explained the security expert who first discovered the problem. "And that's just the tip of the iceberg." Office 97 and 2000 both contain two hidden DLLs, billrulez.dll and eastereggs.dll, that are marked as "Safe for scripting" but are not. Arbitrary Visual BASIC code can be executed using these files. More disturbing, however, are the undocumented API calls "ChangeAllPasswordsToDefault", "OpenBackDoor", "InitiateBlueScreenNow", and "UploadRegistryToMicrosoft" within easter~1.dll. Microsoft spokesdroids have already hailed the problem as "an insignificant byproduct of Microsoft innovation." | |
"Brown Orifice" Is Only The Beginning Last week security holes were found in Netscape's Java implementation that allowed it to act as a web server. Earlier today, a hacker announced that he had found vulnerabilities in Mozilla M17 that allow it to operate as a web browser. And that's just the beginning. Said "3l337h4x0r", the discoverer of the M17 exploit, "This is quite a hack! By manipulating some internal functions, I was able to use M17 to actually surf the web. Slashdot and Humorix rendered beautifully." Mozilla engineers were stunned. "This shouldn't be possible. M17 contains a newsreader, a mail client, an instant messenger client, and a whole bunch of XUL acronymn-enriched stuff, but it shouldn't be able to handle HTTP or HTML. We haven't been planning on adding web-surfing functionality to Mozilla until M30... maybe M25 at the earliest. I suspect this whole thing is a hoax." | |
Linux Distro To Include Pre-Installed Security Holes Proactive Synergy Paradigm, the Linux distro targeted at Pointy Haired Bosses, will now include built-in security flaws to better compete with Microsoft programs. "The sheer popularity of Windows, Outlook, and IIS clearly shows that people demand security holes large enough to drive a truck through," said Mr. Bert Dill of P.S.P. Inc. "We're going to do our best to offer what the consumer wants. Just as Microsoft stole ideas from Apple during the 1980's, we're stealing ideas from Microsoft today." Future releases of Proactive Synergy Linux will feature "LookOut! 1.0", a mail reader that automatically executes (with root privileges) e-mail attachments coded in Perl, JavaScript, Python, and Visual Basic. "Hey, if it works for Microsoft, it can work for us," boasted Mr. Dill. "Now PHBs won't have to stick with Windows in order to have their confidential files secretly emailed to their colleagues by a worm. Better yet, this capability allows viruses to automagically delete unnecessary files to save disk space without wasting the PHB's valuable time. | |
Do you realize how many holes there could be if people would just take the time to take the dirt out of them? | |
Actually you would still need the other fixes otherwise you might as well put the root password in /etc/motd - Alan Cox pointing out some security holes in binfmt_misc | |
> Yes *please*! Finally we could introduce proper support for 64-bit > inode numbers too! Right. As soon as userland is audited for places where it uses int for storing inode numbers - just a couple of months after MS fixes all security holes in their software. By then we'll need 128bit time_t, though... - Al Viro on linux-kernel | |
Thirty spokes share the wheel's hub; It is the center hole that makes it useful. Shape clay into a vessel; It is the space within that makes it useful. Cut doors and windows for a room; It is the holes which make it useful. Therefore benefit comes from what is there; Usefulness from what is not there. | |
I did some heavy research so as to be prepared for "Mommy, why is the sky blue?" HE asked me about black holes in space. (There's a hole *where*?) I boned up to be ready for, "Why is the grass green?" HE wanted to discuss nature's food chains. (Well, let's see, there's ShopRite, Pathmark...) I talked about Choo-Choo trains. HE talked internal combustion engines. (The INTERNAL COMBUSTION ENGINE said, "I think I can, I think I can.") I was delighted with the video game craze, thinking we could compete as equals. HE described the complexities of the microchips required to create the graphics. Then puberty struck. Ah, adolescence. HE said, "Mom, I just don't understand women." (Gotcha!) -- Betty LiBrizzi, "The Care and Feeding of a Gifted Child" | |
<LackOfKan> What are 'bots'? <``Erik> rsg is a bot, not a human, not a human usable client, just a bot. <``Erik> about the same as a quake bot, except irc bots are (usually) built to help, not shoot your ass full of holes | |
<Mercury> LordHavoc: The reason why GL has overdraw is because it is only using HALF of the system they designed for vis. <Mercury> LordHavoc: Shooting itself in the foot. * Dabb looks at all those bullet holes in his shoes - damn, lots :) | |
Pittsburgh driver's test (10) Potholes are (a) extremely dangerous. (b) patriotic. (c) the fault of the previous administration. (d) all going to be fixed next summer. The correct answer is (b). Potholes destroy unpatriotic, unamerican, imported cars, since the holes are larger than the cars. If you drive a big, patriotic, American car you have nothing to worry about. | |
The eye is a menace to clear sight, the ear is a menace to subtle hearing, the mind is a menace to wisdom, every organ of the senses is a menace to its own capacity. ... Fuss, the god of the Southern Ocean, and Fret, the god of the Northern Ocean, happened once to meet in the realm of Chaos, the god of the center. Chaos treated them very handsomely and they discussed together what they could do to repay his kindness. They had noticed that, whereas everyone else had seven apertures, for sight, hearing, eating, breathing and so on, Chaos had none. So they decided to make the experiment of boring holes in him. Every day they bored a hole, and on the seventh day, Chaos died. -- Chuang Tzu | |
Alan Cox wrote: >> On any procmail new enough not to be full of security holes you set >Brain on, Imeant majordomo of course 8) You got me worried there for a brief (very brief) moment :-). -- Stephen R. van den Berg (AKA BuGless) |