Proverbs, aphorisms, quotations (English) | by Linux fortune |
Another possible source of guidance for teenagers is television, but television's message has always been that the need for truth, wisdom and world peace pales by comparison with the need for a toothpaste that offers whiter teeth *___and* fresher breath. -- Dave Barry, "Kids Today: They Don't Know Dum Diddly Do" | |
Avoid the Gates of Hell. Use Linux (Unknown source) | |
"I would rather spend 10 hours reading someone else's source code than 10 minutes listening to Musak waiting for technical support which isn't." (By Dr. Greg Wettstein, Roger Maris Cancer Center) | |
Microsoft is not the answer. Microsoft is the question. NO (or Linux) is the answer. (Taken from a .signature from someone from the UK, source unknown) | |
There are no threads in a.b.p.erotica, so there's no gain in using a threaded news reader. (Unknown source) | |
Running Windows on a Pentium is like having a brand new Porsche but only be able to drive backwards with the handbrake on. (Unknown source) | |
We use Linux for all our mission-critical applications. Having the source code means that we are not held hostage by anyone's support department. (Russell Nelson, President of Crynwr Software) | |
The secret source of humor is not joy but sorrow; there is no humor in Heaven. -- Mark Twain | |
At the source of every error which is blamed on the computer you will find at least two human errors, including the error of blaming it on the computer. | |
It is a period of system war. User programs, striking from a hidden directory, have won their first victory against the evil Administrative Empire. During the battle, User spies managed to steal secret source code to the Empire's ultimate program: the Are-Em Star, a privileged root program with enough power to destroy an entire file structure. Pursued by the Empire's sinister audit trail, Princess _LPA0 races ~ aboard her shell script, custodian of the stolen listings that could save her people, and restore freedom and games to the network... -- DECWARS | |
It turned out that the worm exploited three or four different holes in the system. From this, and the fact that we were able to capture and examine some of the source code, we realized that we were dealing with someone very sharp, probably not someone here on campus. -- Dr. Richard LeBlanc, associate professor of ICS, in Georgia Tech's campus newspaper after the Internet worm. | |
Life would be so much easier if we could just look at the source code. -- Dave Olson | |
Okay, Okay -- I admit it. You didn't change that program that worked just a little while ago; I inserted some random characters into the executable. Please forgive me. You can recover the file by typing in the code over again, since I also removed the source. | |
SCCS, the source motel! Programs check in and never check out! -- Ken Thompson | |
Something mysterious is formed, born in the silent void. Waiting alone and unmoving, it is at once still and yet in constant motion. It is the source of all programs. I do not know its name, so I will call it the Tao of Programming. If the Tao is great, then the operating system is great. If the operating system is great, then the compiler is great. If the compiler is greater, then the applications is great. The user is pleased and there is harmony in the world. The Tao of Programming flows far away and returns on the wind of morning. -- Geoffrey James, "The Tao of Programming" | |
The tao that can be tar(1)ed is not the entire Tao. The path that can be specified is not the Full Path. We declare the names of all variables and functions. Yet the Tao has no type specifier. Dynamically binding, you realize the magic. Statically binding, you see only the hierarchy. Yet magic and hierarchy arise from the same source, and this source has a null pointer. Reference the NULL within NULL, it is the gateway to all wizardry. | |
"We invented a new protocol and called it Kermit, after Kermit the Frog, star of "The Muppet Show." [3] [3] Why? Mostly because there was a Muppets calendar on the wall when we were trying to think of a name, and Kermit is a pleasant, unassuming sort of character. But since we weren't sure whether it was OK to name our protocol after this popular television and movie star, we pretended that KERMIT was an acronym; unfortunately, we could never find a good set of words to go with the letters, as readers of some of our early source code can attest. Later, while looking through a name book for his forthcoming baby, Bill Catchings noticed that "Kermit" was a Celtic word for "free", which is what all Kermit programs should be, and words to this effect replaced the strained acronyms in our source code (Bill's baby turned out to be a girl, so he had to name her Becky instead). When BYTE Magazine was preparing our 1984 Kermit article for publication, they suggested we contact Henson Associates Inc. for permission to say that we did indeed name the protocol after Kermit the Frog. Permission was kindly granted, and now the real story can be told. I resisted the temptation, however, to call the present work "Kermit the Book." -- Frank da Cruz, "Kermit - A File Transfer Protocol" | |
The more a man is imbued with the ordered regularity of all events, the firmer becomes his conviction that there is no room left by the side of this ordered regularity for causes of a different nature. For him neither the rule of human nor the rule of divine will exists as an independent cause of natural events. To be sure, the doctrine of a personal God interfering with natural events could never be refuted, in the real sense, by science, for this doctrine can always take refuge in those domains in which scientific knowledge has not yet been able to set foot. But I am persuaded that such behavior on the part of the representatives of religion would not only be unworthy but also fatal. For a doctrine which is able to maintain itself not in clear light, but only in the dark, will of necessity lose its effect on mankind, with incalculable harm to human progress. In their struggle for the ethical good, teachers of religion must have the stature to give up the doctrine of a personal God, that is, give up that source of fear and hope which in the past placed such vast powers in the hands of priests. In their labors they will have to avail themselves of those forces which are capable of cultivating the Good, the True, and the Beautiful in humanity itself. This is, to be sure, a more difficult but an incomparably more worthy task. - Albert Einstein | |
To write good code is a worthy challenge, and a source of civilized delight. -- stolen and paraphrased from William Safire | |
"The fundamental purpose animating the Faith of God and His Religion is to safeguard the interests and promote the unity of the human race, and to foster the spirit of love and fellowship amongst men. Suffer it not to become a source of dissension and discord, of hate and enmity." "Religion is verily the chief instrument for the establishment of order in the world and of tranquillity amongst it's peoples...The greater the decline of religion, the more grievous the waywardness of the ungodly. This cannot but lead in the end to chaos and confusion." -- Baha'u'llah, a selection from the Baha'i scripture | |
The Seventh Edition licensing procedures are, I suppose, still in effect, though I doubt that tapes are available from AT&T. At any rate, whatever restrictions the license imposes still exist. These restrictions were and are reasonable for places that just want to run the system, but don't allow many of the things that Minix was written for, like study of the source in classes, or by individuals not in a university or company. I've always thought that Minix was a fine idea, and competently done. As for the size of v7, wc -l /usr/sys/*/*.[chs] is 19271. -- Dennis Ritchie, 1989 | |
A people living under the perpetual menace of war and invasion is very easy to govern. It demands no social reforms. It does not haggle over expenditures on armaments and military equipment. It pays without discussion, it ruins itself, and that is an excellent thing for the syndicates of financiers and manufacturers for whom patriotic terrors are an abundant source of gain. -- Anatole France | |
brain, v: [as in "to brain"] To rebuke bluntly, but not pointedly; to dispel a source of error in an opponent. -- Ambrose Bierce, "The Devil's Dictionary" | |
comment: A superfluous element of a source program included so the programmer can remember what the hell it was he was doing six months later. Only the weak-minded need them, according to those who think they aren't. | |
Reliable source, n.: The guy you just met. | |
The three biggest software lies: (1) *Of course* we'll give you a copy of the source. (2) *Of course* the third party vendor we bought that from will fix the microcode. (3) Beta test site? No, *of course* you're not a beta test site. | |
Q: How many IBM types does it take to change a light bulb? A: Fifteen. One to do it, and fourteen to write document number GC7500439-0001, Multitasking Incandescent Source System Facility, of which 10% of the pages state only "This page intentionally left blank", and 20% of the definitions are of the form "A:..... consists of sequences of non-blank characters separated by blanks". | |
Lucas is the source of many of the components of the legendarily reliable British automotive electrical systems. Professionals call the company "The Prince of Darkness". Of course, if Lucas were to design and manufacture nuclear weapons, World War III would never get off the ground. The British don't like warm beer any more than the Americans do. The British drink warm beer because they have Lucas refrigerators. | |
The energy produced by the breaking down of the atom is a very poor kind of thing. Anyone who expects a source of power from the transformation of these atoms is talking moonshine. -- Ernest Rutherford, after he had split the atom for the first time | |
Nine megs for the secretaries fair, Seven megs for the hackers scarce, Five megs for the grads in smoky lairs, Three megs for system source; One disk to rule them all, One disk to bind them, One disk to hold the files And in the darkness grind 'em. | |
"No program is perfect," They said with a shrug. "The customer's happy-- What's one little bug?" But he was determined, Then change two, then three more, The others went home. As year followed year. He dug out the flow chart And strangers would comment, Deserted, alone. "Is that guy still here?" Night passed into morning. He died at the console The room was cluttered Of hunger and thirst With core dumps, source listings. Next day he was buried "I'm close," he muttered. Face down, nine edge first. Chain smoking, cold coffee, And his wife through her tears Logic, deduction. Accepted his fate. "I've got it!" he cried, Said "He's not really gone, "Just change one instruction." He's just working late." -- The Perfect Programmer | |
We don't need no indirection We don't need no compilation We don't need no flow control We don't need no load control No data typing or declarations No link edit for external bindings Hey! did you leave the lists alone? Hey! did you leave that source alone? Chorus: (Chorus) Oh No. It's just a pure LISP function call. We don't need no side-effecting We don't need no allocation We don't need no flow control We don't need no special-nodes No global variables for execution No dark bit-flipping for debugging Hey! did you leave the args alone? Hey! did you leave those bits alone? (Chorus) (Chorus) -- "Another Glitch in the Call", a la Pink Floyd | |
"What happened to the crewman?" "The M-5 computer needed a new power source, the crewman merely got in the way." -- Kirk and Dr. Richard Daystrom, "The Ultimate Computer", stardate 4731.3. | |
"But the most reliable indication of the future of Open Source is its past: in just a few years, we have gone from nothing to a robust body of software that solves many different problems and is reaching the million-user count. There's no reason for us to slow down now." -- Bruce Perens, on the future of Open Source software. (Open Sources, 1999 O'Reilly and Associates) | |
"The reason for the success of this somewhat communist-sounding strategy, while the failure of communism itself is visible around the world, is that the economics of information are fundamentaly different from those of other products." -- Bruce Perens, on Open Source software. (Open Sources, 1999 O'Reilly and Associates) | |
"The open-source approach is not a magic bullet for every type of software development project." -- Brian Behlendorf on OSS (Open Sources, 1999 O'Reilly and Associates) | |
"Open Standars, Open Documents, and Open Source" -- Scott Bradner (Open Sources, 1999 O'Reilly and Associates) | |
If Microsoft Owned McDonald's Source: Unknown 1. Every order would come with fries whether you asked for them or not. 2. When they introduce McPizza, the marketing makes it seem that they invented pizza. 3. "A McDonald's on every block" -- Bill Gates. 4. You'd be constantly pressured to upgrade to a more expensive burger. 5. Sometimes you'll find that the burger box is empty. For some strange reason you'll accept this and purchase another one. 6. They'd claim the burgers are the same size as at other fast food chains, but in reality it's just a larger bun hiding the small beef patty. 7. Straws wouldn't be available until after you finish your drink. 8. "Push" technology -- they have McD employees come to your door and sell you Happy Meals. 9. Your order would never be right but the cash register would work perfectly for taking your money. 10. The "Special Sauce" cannot be reverse engineered, decompiled, or placed on more than 1 Big Mac. | |
You Might be a Microsoft Employee If... 1. Every night you dream of torturing Linus Torvalds 2. Every morning you say, "I pledge allegiance to the logo of the United Corporation of Microsoft. And to the stock options for which it stands, one company, under Bill, with headaches and buggy software for all." 3. Your favorite pick-up line is, "Hey baby...do you want to see a little ActiveX?" 4. Everytime you see a website with "Best viewed with Netscape" on it you feel like filing a lawsuit against its webmaster 5. You feel that all Anti-Microsoft websites should be censored because they are on the Internet, something Bill "invented." 6. You've set a goal to invent at least one new buzzword or acronym per day 7. You've ever been nervous because you haven't registered your Microsoft software yet. 8. You've trained your parrot to say "Unix sucks!" and "All hail Bill Gates!" 9. You own a limited edition Monopoly game in which Boardwalk is Microsoft and Jail is replaced by Justice Department Investigation 10. You've spent countless hours tracking down the source of the "Microsoft Acquires Vatican Church" rumor | |
The linuX Files -- The Source is Out There. | |
Windows NT source code now available... download WIN2000.BAS now! -- From a Slashdot.org post | |
It's ten o'clock. Do you know where your source code is? -- From a Slashdot.org post | |
"I took the initiative in creating the Internet." -- Al Gore "Today I am one of the senior technical cadre that makes the Internet work, and a core Linux and open-source developer. I have closely studied the history of the Internet technical culture." -- Eric S. Raymond | |
It's ten o'clock. Do you know where your source code is? | |
Top Ten Changes If Linus Torvalds Achieves World Domination 10. That annoying Linus character from the Peanuts cartoons would be killed off 9. New fashion style: Scantily clad females, even in twenty below weather 8. Forget Disney World, say hello to Penguin World! 7. Late Show with Linus Torvalds 6. High schools offer classes on kernel hacking 5. Microsoft stock certificates traded as rare collectors' items, along with Confederate money and Roman coins 4. Beowolf Clusters for everyone! 3. Computers no longer come with reset buttons 2. United States of Linusia 1. Three words: Open Source Beer | |
Open Source Beer Revolution Yesterday, Red Hat introduced an 'open source' beer called Red Brew. The recipes for making the beer are available for free over the Net, and microbrewery kits are available at low cost from Red Hat. Says a Red Hat spokesman, "With the proliferation of free (open source) software, it was only a matter of time before open source beer became reality. After all, the only thing hackers like more than free software is free beer!" Following the Red Hat annoucement, other companies are racing to launch their own beer 'distribution'. Caldera is developing an OpenBrew beer. Meanwhile, Patrick Volkerding is working on a SlackBeer distribution, and DebianBrew is expected soon. Traditional breweries and beer distributors are not thrilled about open source beer. "This is ludicrous! People want beer that comes from time-tested, secret recipes -- not beer from recipes invented overnight! Open source is a fad," a spokesman for Buddwizzer Beer, Inc. said. In addition, other beverage distributors are nervous. "First open source beer, and soon open source soft drinks! Before we know it, we'll have RedCoke and SlackPepsi! This open source plague must be stopped before it eats into our bottom line! Don't quote me on that last sentence," the CEO of Croak-a-Cola said. | |
Operation Desert Slash WASHINGTON, D.C. -- High officials in the US military are planning on putting the 'Slashdot Effect' to use against Iraq. Pentagon computer experts think that the Slashdot Effect could topple key Net-connected Iraqi computer systems. Such a Denial of Service attack could prove instrumental when the US invades. One Pentagon official said, "If I had a million dollars for every server that crashed as a result of being linked on Slashdot, I'd be richer than Bill Gates. The Slashdot Effect is a very powerful weapon that the US military wants to tap into." Rob Malda has been contacted by top military brass. According to anonymous sources, Malda will play a key part in the so-called "Operation Desert Slash". Supposedly Malda will post several Slashdot articles with links to critical Iraqi websites right when the US invasion is set to begin. Meanwhile, Pentagon operatives will begin a series of Denial of Service attacks on other key Iraqi computer systems. One source notes, "Since many Iraqi systems rely on Microsoft software, this task should be relatively simple." | |
Linux Dominates Academic Research A recent survey of colleges and high school reveals that Linux, Open Source Software, and Microsoft are favorite topics for research projects. Internet Censorship, a popular topic for the past two years, was supplanted by Biology of Penguins as another of this year's most popular subjects for research papers. "The Internet has changed all the rules," one college professor told Humorix. "Nobody wants to write papers about traditional topics like the death penalty, freedom of speech, abortion, juvenile crime, etc. Most of the research papers I've seen the past year have been computer related, and most of the reference material has come from the Net. This isn't necessarily good; there's a lot of crap on the Net. One student tried to use 'Bob's Totally Wicked Anti-Microsoft Homepage of Doom' and 'The Support Group for People Used by Microsoft' as primary sources of information for his paper about Microsoft." A high school English teacher added, "Plagarism is a problem with the Net. One of my students 'wrote' a brilliant piece about the free software revolution. Upon further inspection, however, almost everything was stolen from Eric S. Raymond's website. I asked the student, "What does noosphere mean?" He responded, 'New-what?' Needless to say, he failed the class." | |
The Movement Formerly Known As Open Source The battle over the Open Source trademark is heating up. Software in the Public Interest and the Open Source Initiative both hold competing claims to the trademark. In order to put an end to the infighting, a group of free software advocates have founded the Association for the Movement Formerly Known as Open Source (AMFKOS) One AMFKOS founder said, "I find it ironic that a trademark representing free software is itself proprietary. This situation must change. We propose that the free software movement adopt another name besides 'Open Source'. Hopefully then we can all Get-Back-To-Coding(tm) instead of fighting over Bruce Perens' and Eric Raymond's egos." Rumor has it that Richard Stallman plans to mount a campaign to promote the phrase "GNU/Free Software" in place of "Open Source". In addition, the terms "Ajar Source", "Unlocked Source", "Nude Source", "Unclosed Source", and "Just-Type-make Software" have all been proposed by various Usenet or Slashdot posters. | |
Humorix Holiday Gift Idea #2 Nerd Trading Cards Price: $10/pack Producer: Bottomms; 1-800-NRDS-ROK Forget baseball, nerd trading cards are the future. Now your kids can collect and trade cards of their favorite open source hackers and computer industry figures. Some of the cards included feature Linus Torvalds, Richard M. Stallman, and Larry Wall. Also contains cards for companies (Red Hat, Netscape, Transmeta, etc.), specific open source programs (Apache, Perl, Mozilla, etc.), and well-known websites (Slashdot, Freshmeat, etc.). Each card features a full-color picture on the front and complete information and statistics on back. Some of the cards have even been autographed. Quit trying to search eBay.com for a Mark McGwire rookie card and collect nerd cards instead! | |
Humorix Holiday Gift Idea #9 Dial-A-Detective $499.95/year; 1-888-BYE-SPAM This detective firm is not what you'd expect. Instead of tracking murderers or unfaithful husbands, this band of rogue private investigators goes after something just as sinister -- spammers. For a modest annual retainer fee, these spam detectives will track down the source of every piece of spam you receive. Using the latest in forensic technology, they will bring you the virtual scalp of the spammer -- their name, home address, social-security number, and, more importantly, credit card numbers. At this point you are free to pursue the evil spammer as you see fit. If your friend or relative is sick of receiving wave after wave of "Find Out Anything About Anyone" spams, give them a subscription to Dial-A-Detective, and they'll find out anything about any spammer -- for real. | |
Microsoft Open Source Solitaire REDMOND, WA -- In a first attempt at "embrace-and-extend" of open source software, Microsoft will release its popular Solitaire and FreeCell games as open source under the MILA (Microsoft Innovative License Agreement). According to a Microsoft press release, the Visual C++ source code for the two games will be available from the Microsoft website "in the first quarter" (no year was specified). Industry pundits hail the move as revolutionary. "Microsoft's release of its most popular Windows feature as open source software demonstrates just how innovative the company really is. The DoJ is clearly barking up the wrong tree," wrote one Ziff-Davis flunkie. One executive at a large company said, "Freely available source code is the best idea Microsoft has ever invented." One Linux developer told Humorix, "Let's just hope some fool doesn't try to port this thing to Linux. Imagine the havoc that could ensue if a bunch of core Linux contributors downloaded Solitaire and became addicted to it. It would be a disaster! Linux and open source development would grind to a halt while the hackers wasted their time playing Solitaire or FreeCell. 'Just one more game...' they would say." | |
MAKE MONEY FAST FROM SLASHDOT!!!!!! You are probably familiar with the Slashdot.org "News for Nerds" site. You've probably heard about the "Slashdot Effect". Now, we want to introduce a new term that could change your life: "Slashdot Baiting". The Slashdot Effect is a significant source of traffic. Lots of traffic. Thousands of visitors within hours. Thousands of eyeballs looking and clicking at YOUR banner advertisements. In short, the Slashdot Effect, if properly utilized, can produce a significant amount of advertising revenue. That's where we at MoneyDot Lucrative Marketing International Group, Inc. come in. We know how to exploit the Slashdot Effect. We call our strategy "Slashdot Baiting". It's quite painless. We have formulated 101 easy ways to get your site mentioned on Slashdot. Interested in pursuing Slashdot Baiting and obtaining financial independence? Want to make $50,000 (or more!) within 90 days? Then purchase MLM's "Slashdot Baiting Kit", which will contain everything you need to know to put this powerful marketing force to work for YOU! We also throw in a warranty: if your site isn't mentioned on Slashdot within 90 days of using this Kit, we'll give you your money back guaranteed! | |
Open Source Irrational Constant BREEZEWOOD, PA -- In a revelation that could rock the foundations of science, a researcher in Pennsylvania has discovered that the digits of the irrational constant PI encode a version of the Linux kernel. "I can't believe it," the researcher, Neil Hoffman, exclaimed. "And yet, here I am staring at what appears to be the source code for Linux kernel 5.0.0. Needless to say, my whole world-view has changed..." Hoffman explained, "My algorithm, which applies several dozen conversions and manipulations to each digit of PI, spits out plain vanilla ASCII characters that happen to form the source code for the Linux kernel." Many members of the scientific community are skeptical. One One mathematician who has memorized the digits of PI to 10,000 places said, "This is the kind of nonsense one would expect to find in a tabloid such as the National Mathematics Enquirer. Or a Linux fortune(6) file. Hoffman's 'discovery' is obviously a hoax designed to secure government research grants." In a related matter, we have received an unconfirmed report that a region of the Mandelbrot fractal contains what appear to be the words "LINUS TORVALDS WAS HERE". In addition, the words "TRANSMETA: THIS SECRET MESSAGE IS NOT HERE YET" supposedly appear within the depths of the Julia Set. | |
Attack of the Tuxissa Virus What started out as a prank posting to comp.os.linux.advocacy yesterday has turned into one of the most significant viruses in computing history. The creator of the virus, who goes by the moniker "Anonymous Longhair", modified the Melissa virus to install Linux on infected machines. "It's a work of art," one Linux advocate told Humorix after he looked through the Tuxissa virus source code. "This virus goes well beyond the feeble troublemaking of Melissa. It actually configures a UMSDOS partition on the user's hard drive and then downloads and installs a stripped-down version of Slackware Linux." The email message that the virus is attached to has the subject "Important Message About Windows Security". The text of the body says, "I want to let you know about some security problems I've uncovered in Windows 95/98/NT, Office 95/97, and Outlook. It's critically important that you protect your system against these attacks. Visit these sites for more information..." The rest of the message contains 42 links to sites about Linux and free software. Details on how the virus started are a bit sketchy. The "Anonymous Longhair" who created it only posted it to Usenet as an early April Fool's gag, demonstrating how easy it would be to mount a "Linux revolution". | |
Actual Snippet of Windows Source Code! Honest! NOTE: The following snippet of the Windows 95 source code was sent to us via 'unofficial' channels. Don't tell anyone you saw this! We really don't feel like being visited by the Microsoft Intellectual Property Police. void BusyLoop() /* Do nothing loop to kill CPU cycles; added at the request of Intel */ { DisplayRandomSubliminalMessage(); for( int i = 0; i < BIG_INT; i++ ) for( int j = 0; j < BIG_INT; j++ ) for( int k = 0; k < BIG_INT; k++ ) for( int l = 0; l < BIG_INT; l++ ) if( STACK_SPACE_PERCENTAGE_FREE > .05 ) /* There's plenty of stack space left -- let's eat up some more CPU cycles, recursively! */ BusyLoop(); } | |
Microsoft Mandatory Survey (#13) Customers who want to upgrade to Windows 98 Second Edition must now fill out a Microsoft survey online before they can order the bugfix/upgrade. Question 13: Which of the following new Microsoft products do you plan on buying within the next 6 months? A. Windows For Babies(tm) - Using an enhanced "click-n-drool" interface, babies will be able to learn how to use a Wintel computer, giving them a head start in living in a Microsoft-led world. B. Where In Redmond Is Carmen Sandiego?(tm) - The archvillian Sandiego has stolen the Windows source code and must be stopped before she can publish it on the Net. C. ActiveKeyboard 2000(tm) - An ergonomic keyboard that replaces useless keys like SysRq and Scroll Lock with handy keys like "Play Solitaire" and "Visit Microsoft.com". D. Visual BatchFile(tm) - An IDE and compiler for the MS-DOS batch file language. MSNBC calls it "better than Perl". | |
Jargon Coiner (#4) An irregular feature that aims to give you advance warning of new jargon that we've just made up. * FREE LECTURE: Attempting to explain the concepts of Linux, Open Source software, free software, and gift cultures to someone who is not familiar with them. Made extra difficult if the explainee has been misled by superficial mainstream news articles about the subject. Example: "Eric gave an hour-long free lecture to his mother-in-law after she asked him about this Linux thingy she read about in USA Today." * LEXICON LAZINESS: Filling a fortune file with a list of fake jargon instead of publishing something more substantive (and funny) that would take more effort to write. * FOR(;;)TUNE LOOP: Repeatedly running fortune(6) for cheap entertainment. Example: "During a coffee break, Bob became bored and started a for(;;)tune loop. His boss had to issue a SIGTERM to get him to resume working." | |
Jargon Coiner (#8) An irregular feature that aims to give you advance warning of new jargon that we've just made up. * STAR SPINOFFS: Applying themes and ideas from "Star Wars" and "Star Trek" to contemporary events. Examples: "Let the Source be with you!", "Microsoft is the Evil Empire", "Resistance is futile. You will be assimilated by Microsoft". * TRADEMARKIZATION(tm): Giving a phrase special meaning by appending a trademark symbol to it. Examples: "Think Free Speech, Not Free Beer(tm)", "Real Soon Now(tm)", "Blue Screen of Death(tm)" | |
Bill Gates Passes Turing Test LONDON, ENGLAND -- Microsoft proclaimed that they have passed the Turing Test by creating a Bill Gates multimedia simulacrum that crack BBC interviewer Jeremy Paxman couldn't distinguish from the real thing. "I never would have expected this," Paxman said about the Gates AI program. "After all, this Microsoft program actually worked for an extended period of time, something you don't see very often." Microsoft has plans to mass-produce the Bill Gates holographic simulation by 2010 or so. "The hardware just isn't there yet for home use," a Microserf explained. "By then, though, Intel's Itanium 6 Super Pro Plus III CPU running at 600 Ghz or whatever should be sufficient." Windows 2010 is expected to include the Bill Gates simulation, making the World's Richest Man(tm) accessible to the entire world. A newly printed brochure for the faux-Gates advertises, "Need help running Windows 2010? Bill Gates will sit beside you and guide you through the system. Have a question for the world's sexiest and smartest nerd? He'll answer it. Wondering if free and open source software is a plot by Communists freaks to overthrow the free market system? He'll be there to explain. Want to ask for a personal loan? Sorry, won't happen." | |
Is Linux A Finnish Conspiracy? WASHINGTON, DISTRICT OF CORRUPTION -- According to a report recently issued by the NSA (No Such Agency), Finland is now considered a national economic and security risk. "We don't trust the Finns... software written by these people could potentially contain backdoors that could undermine domestic security," the report states. In response to the news, US Senator Fatcatte (R-WA) has proposed a bill, the It's For The Children Act of 2000, that would ban all software written by native-born Finns. "It's time we take the Finnish threat seriously," Fatcatte said at a press conference. "Not only is Finn software a threat to domestic tranquility, but it could radically alter the computer industry, costing us thousands of jobs... and, more importantly, billions in tax revenue. We must prevent the Finns from subverting our economy with so-called 'open-source software'." He then asked, "Is anybody thinking of the children of programmers who will become unemployed when Finnish software overruns the country?" | |
Linux World Domination: Not A Joke! WASHINGTON, D.C. -- Senator Fattecat (R-WA) is pushing for a ban on Finnish-produced software. His chief of staff, Ms. Dee Septive, has published a 200-page report revealing "the Helsinkian Underground", a Finnish world domination plot hatched in 1943. The Fattecat expose describes Finland's recent scheme involving free software. "Linux, originally called Freix (FREIX Retrieves Electronic Intelligence X), is a scheme to infiltrate the Western world with a 'free' operating system with nasty backdoors hidden within its obfuscated source code. IRC (Intelligence Relaying Code) is another Finnish innovation designed for spying purposes." Linus Torvalds plays a prominent role in the conspiracy. "That old story about Linus developing a Unix clone in his spare time while at University is a lark," the report states. "Indeed, the name Linux ("Line X") was coined because the kernel can extract any arbitrary line of intelligence from any document it has access to." | |
New Linux Companies Hope To Get Rich Quick (#1) Adopt-A-Beowulf: the latest company to hop the Linux bandwagon as it tramples down Wall Street. Every geek dreams of owning their own Beowulf supercomputer. Very few people (except for dotcom billionnaires) can afford to build one, but the folks at Adopt-a-Beowulf can provide the next best thing: a virtual beowulf. For US$49.95, you can "adopt" your own 256-node Beowulf cluster. You won't own it, or even get to see it in person, but you will receive photos of the cluster, a monthly newsletter about its operation, and a limited shell account on it. The company hopes to branch out into other fields. Some slated products include Adopt-A-Penguin, Lease-A-Camel (for Perl mongers), and Adopt-A-Distro (in which your name will be used as the code-name for a beta release of a major Linux distribution or other Open Source project). | |
New Linux Companies Hope To Get Rich Quick (#3) In the "Cathedral and the Bazaar", ESR mentions that one motivation behind Open Source software is ego-gratification. That's where OpenEgo, Inc. comes in. For a fee, the hackers at OpenEgo will produce a piece of Open Source software and distribute it in your name, thus building up your reputation and ego. You can quickly become the envy of all your friends -- without lifting a finger. Want a higher-paying tech job? With OpenEgo's services, you'll look like an Open Source pro in no time, and have dozens of hot job offers from across the country. Says the OpenEgo sales literature, "Designing, implementing, maintaining, and promoting a successful Open Source project is a pain. However, at OpenEgo, we do all the work while you reap all the rewards..." A page on the OpenEgo site claims, "We produced a Linux kernel patch for one customer last year that was immediately accepted by Linus Torvalds... Within days the person gained employment at Transmeta and is now on the road to IPO riches..." Prices range from $1,000 for a small program to $5,000 for a kernel patch. | |
New Linux Companies Hope To Get Rich Quick (#4) The buzz surrounding Linux and Open Source during 1999 has produced a large number of billionnaires. However, people who weren't employed by Red Hat or VA Linux, or who didn't receive The Letter, are still poor. The visionaries at The IPO Factory want to change all that. As the name suggests, this company helps other businesses get off the ground, secure investments from Venture Capitalists, and eventually hold an IPO that exits the stratosphere. "You can think of us as meta-VCs," the IPO Factory's founder said. "You provide the idea... and we do the rest. If your company doesn't hold a successful IPO, you get your money back, guaranteed!" He added quickly, "Of course, if you do undergo a billion dollar IPO, we get to keep 25% of your stock." The company's first customer, LinuxOne, has been a failure. "From now on we're only going to service clients that actually have a viable product," an IPO Factory salesperson admitted. "Oh, and we've learned our lesson: it's not a good idea to cut-and-paste large sections from Red Hat's S-1 filing." | |
Excerpts From The First Annual Nerd Bowl (#6) JOHN SPLADDEN: We're back. The players have assumed their positions and are ready to answer computer-related questions posed by referree Eric S. Raymond. Let's listen in... RAYMOND: Okay, men, you know the rules... And now here's the first question: Who is the most respected, sexy, gifted, and talented spokesmen for the Open Source movement? [Bzzz] Taco Boy, you buzzed in first. ROB MALDA: The answer is me. RAYMOND: No, you egomaniacal billionaire. Anybody else want to answer? [Bzzz] Yes, Alan Cox? ALAN COX: Well, duh, the answer has to be Eric Raymond. RAYMOND: Correct! That answer is worth 10 million points. ROB MALDA: Protest! Who wrote these questions?! | |
Excerpts From The First Annual Nerd Bowl (#6) (Round 4, the Who Wants To Be A Billionaire? Round) ERIC RAYMOND (Moderator): Here's the second question: Who is the primary author of the world-renowned fetchmail program? [Bzzz] Yes, Hemos? HEMOS: Mr. Eric... Fetch of Cincinnati, Ohio. RAYMOND: No, no, no! The answer is me, me, me, you idiots! Sheesh. I'm resetting your points to zero for that. ALAN COX: Are you going to ask any questions that are not about you? RAYMOND: Um... let's see... yeah, there's one or two here... Okay, here's question three... What loud-mouthed hippie-spirtualist founder of the GNU Project keeps demanding that everybody use the crappy term "Free Software" instead of "Open Source"? [Bzzz] Yes, Anonymous Coward? ANONCOW: Eric Raymond! RAYMOND: Why you little [expletive]! I'm going to... | |
Affordable Virtual Beowulf Cluster Every nerd drools over Beowulf clusters, but very few have even seen one, much less own one. Until now, that is. Eric Gylgen, the open source hacker famous for EviL (the dancing ASCII paperclip add-on to vi), is working on a program that will emulate Beowulf clusters on a standard desktop PC. "Of course," he added candidly, "the performance of my virtual cluster will be many orders of magnitude less than a real cluster, but that's not really the point. I just want to be able to brag that I run a 256 node cluster. Nobody has to know I only spent $500 on the hardware it uses." Eric has prior experience in this field. Last month he successfully built a real 32 node Beowulf cluster out of Palm Pilots, old TI-8x graphing calculators, various digital cameras, and even some TRS-80s. He demonstrated a pre-alpha version of his VirtualEpicPoem software to us yesterday. His Athlon machine emulated a 256 node Beowulf cluster in which each node, running Linux, was emulating its own 16 node cluster in which each node, running Bochs, was emulating VMWare to emulate Linux running old Amiga software. The system was extremely slow, but it worked. | |
Brief History Of Linux (#2) Hammurabi's Open-Source Code Hammurabi became king of Babylonia around 1750BC. Under his reign, a sophisticated legal code developed; Version 1, containing 282 clauses, was carved into a large rock column open to the public. However, the code contained several errors (Hammurabi must have been drunk), which numerous citizens demanded be fixed. One particularly brave Babylonian submitted to the king's court a stack of cloth patches that, when affixed to the column, would cover up and correct the errors. With the king's approval, these patches were applied to the legal code; within a month a new corrected rock column (Version 2.0) was officially announced. While future kings never embraced this idea (who wanted to admit they made a mistake?), the concept of submitting patches to fix problems is now taken for granted in modern times. | |
Brief History Of Linux (#15) Too many hyphens: Traf-O-Data and Micro-soft Bill Gates and Paul Allen attended an exclusive private school in Seattle. In 1968, after raising $3,000 from a yard sale, they gained access to a timeshare computer and became addicted. After depleting their money learning BASIC and playing Solitaire, they convinced a company to give them free computer time in exchange for reporting bugs -- ironically, an early form of Open Source development! The two then founded a small company called Traf-O-Data that collected and analyzed traffic counts for municipalities using a crude device based on the Intel "Pretanium" 8008 CPU. They had some success at first, but ran into problems when they were unable to deliver their much hyped next-generation device called "TrafficX". An engineer is quoted as saying that "Traf-O-Data is the local leader in vaporware", the first documented usage of the term that has come to be synonymous with Bill Gates. Soon thereafter, the two developed their own BASIC interpreter, and sold it to MITS for their new Altair computer. April 4, 1975 is the fateful day that Micro-soft was founded in Albuquerque, NM as a language vendor. | |
Brief History Of Linux (#16) Closed source, opened wallets In 1976 Bill Gates wrote the famous letter to Altair hobbyists accusing them of "stealing software" and "preventing good software from being written". We must assume Bill's statement was true, because no good software was being written at Micro-soft. Bill Gates did not innovate the concept of charging megabucks for software, but he was the first to make megabucks from peddling commercial software. | |
Brief History Of Linux (#21) The GNU Project Meet Richard M. Stallman, an MIT hacker who would found the GNU Project and create Emacs, the operating-system-disguised-as-a-text-editor. RMS, the first member of the Three Initials Club (joined by ESR and JWZ), experienced such frustration with software wrapped in arcane license agreements that he embarked on the GNU Project to produce free software. His journey began when he noticed this fine print for a printer driver: You do not own this software. You own a license to use one copy of this software, a license that we can revoke at any time for any reason whatsoever without a refund. You may not copy, distribute, alter, disassemble, or hack the software. The source code is locked away in a vault in Cleveland. If you say anything negative about this software you will be in violation of this license and required to forfeit your soul and/or first born child to us. The harsh wording of the license shocked RMS. The computer industry was in it's infancy, which could only mean it was going to get much, much worse. | |
Brief History Of Linux (#29) "The Cathedral and the Bazaar" is credited by many (especially ESR himself) as the reason Netscape announced January 22, 1998 the release of the Mozilla source code. In addition, Rob Malda of Slashdot has also received praise because he had recently published an editorial ("Give us the damn source code so we can fix Netscape's problems ourselves!") Of course, historians now know the true reason behind the landmark decision: Netscape engineers were scared to death that a large multi-national corporation would acquire them and crush Mozilla. Which indeed did happen much later, although everybody thought the conqueror would be Microsoft, not AOL (America's Online Lusers). The Netscape announcement prompted a strategy session among Linux bigwigs on February 3rd. They decided a new term to replace 'free software' was needed; some rejected suggestions included "Free Source", "Ajar Source", "World Domination Source", "bong-ware" (Bong's Obviously Not GNU), and "Nude Source". We can thank Chris Peterson for coining "Open Source", which became the adopted term and later sparked the ugly "Free Software vs. Open Source", "Raymond vs. Stallman" flame-a-thons. | |
DeCSS T-Shirt Used To Commit Piracy! College student Cody Potter stunned the world yesterday when he used a T-shirt with the printed DeCSS source code to illegally copy a DVD of "Star Trek XXI: We Promise This Is The Last One". Well, it wasn't the actual DeCSS source code. The shirt contained a Perl script which spits out a bash shell script which produces a GW-BASIC program which outputs a ROT13-encoded Python script that manufactures a Pig-Latin-encoded Java program that finally produces the real DeCSS C source code when executed. | |
The Next Big Thing: "Clairvoyant Consultants" Nobody likes to deal with tech support or customer service reps. A growing number of people are getting sick of being put on hold for three hours and then paying ridiculous "per incident" fees so some Microserf can tell them to "reinstall the operating system!" Desperate users are turning to an unlikely source to diagnose and fix software problems: psychics. Palm[Pilot] readers, 1-900 number operators, and clairvoyant consultants are quickly becoming the hottest careers in the tech sector. Explained Madam Cosmos, owner of the Main Street Mysticism Temple in Keokuk, Iowa, "With my special powers, I can track down the source of any problem. Got a rogue Registry entry that's causing Bluescreens? I'll find it. Missing a curly bracket in your Perl program but can't locate it because the error messages are so unhelpful? I'll know where it is even before you walk in my door." | |
Microsoft Fights Linux -- By Contributing Kernel Patches If you can't beat 'em, join 'em... and then destory 'em. That seems to be the new Microsoft strategy for dealing with Linux. Instead of fighting a FUD or patent war, Microsoft operatives are doing something totally out of character: they are contributing patches for the Linux kernel and other programs. Don't worry, Microsoft is still evil. It's all part of a massive denial of service attack against Linus Torvalds designed to bring kernel development to a standstill. By sending over 10,000 patches per minute by email to Linus and other top kernel hackers, Microsoft has exposed Linux's Achilles heel. "I can't believe this is happening!" one stressed-out kernel hacker said at a press conference on IRC. "If this goes on, we may have to conduct kernel development over some other network protocol, like avian carriers... Aw crap, there's smoke coming from my email server! Ahh... it can't handle the load!" At this point the developer cut off and we haven't heard from him since. At first Linus was unsure where the deluge of patches was coming from. But when he saw one patch to replace kernel panics with bluescreens, the source was pretty obvious. "Oh, and the fact that all of the patches are covered by Microsoft's GPL [Grossly Private License] was a dead giveaway, too," | |
"Oops," Says MPAA President Recently, the United States filed a legal brief in support of the MPAA's argument that linking to the DeCSS source code is not protected by the First Amendment. At the time, the MPAA was ecstatic. But not any longer. The tables have turned: the Federal government has filed a lawsuit against the movie industry, arguing that many Hollywood-produced movies 'link' to illegal content. The MPAA is now desperately wrapping itself up in the Bill of Rights. "Murder is illegal. Showing a murder in a movie -- or, rather, 'linking' to it -- is also illegal," explained a spokesperson for the Coalition Of Angry Soccer Moms In Support Of Brow-Beating Movie Industry Executives, an interest group that has backed the government's lawsuit. | |
As Easy As /usr/src/linux Wiping the sweat from his brow, the contestant diligently continues to recite, "'i' equals 'NR' underscore 'TASKS' semicolon newline 'p' equals ampersand 'task' bracket 'NR' underscore 'TASKS' close-bracket semicolon newline while parens minus minus 'i' parens brace if parens star minus..." Bzzzt! One of the judges says, "You missed an exclamation point. Ten point penalty for that error." The contestant realizes it's all over. He had spent 500 hours memorizing the source code to the Linux 0.01 kernel and then blew it all by forgetting one stupid ASCII character in sched.c. Welcome to the First Annual Linux Kernel Memorization Contest in New Haven, Connecticut, where the stakes are high and the frustration is simply unbearable. Linuxer longhairs from all over the globe have descended on the Offramp Motel to show off their memorization skills in front of a crowd of... dozens. "Those math freaks can memorize PI and other irrational constants all they want. I'll stick with the Linux 0.01 kernel source code thank you very much," said Bob Notmyrealname, the organizer of the event. % | |
We prefer to believe that the absence of inverted commas guarantees the originality of a thought, whereas it may be merely that the utterer has forgotten its source. -- Clifton Fadiman, "Any Number Can Play" | |
"I hold open source people to higher standards. They are supposed to be the people who do programming because it's an art-form, not because it's their job." - Linus Torvalds | |
/* strangest things ever said, #6, to alan cox: "...and remember, alan * - no monkeybusiness. remember, i sleep nude and we dont want to * give rachel the shock of her life..." */ - comment in the Crack 5 source, file src/util/kickdict.c | |
Bruno Avila wrote: > I can't find this anywhere. What is the version of the tools to > compile linux kernel 0.0.0.1 (../Historic)? And where can i find them? Well, first you have to find a good source of obsidean, a couple of sharp rocks, and some flint... - Alan Olsen on linux-kernel | |
I'd rather listen to Newton than to Mundie. He may have been dead for almost three hundred years, but despite that he stinks up the room less. - Linus Torvalds on Craig Mundie's "shared source" speech. | |
As you point out below, contract law is also involved. Add the DMCA, UCITA, and Bush 2.0 to the mix, and any lawyer who says he actually knows what's legal is lying. - Ian Pilcher on Microsoft "shared source" licensing | |
> ... but i could not found any source code or > information in Internet. How strange. The kernel source code is definitely on the internet, and definitely contains drivers that implement internal layering - nrdev, shaper, the sync cards, isdn - Alan Cox on linux-kernel | |
> Sorry, at this point we are not allowed to publish the source code of the > lcs and qeth drivers (due to the use of confidential hardware interface > specifications). We make those modules available only in binary form > on our developerWorks web site. > Gosh. I didn't know you guys were so advanced that you didn't use an electronic hardware interface! Your 'hardware interface specifications' use magnetohydrodynamics, and they are top-secret, right? - Richard B. Johnson on linux-kernel | |
Alexander Viro wrote: > You mean that you are unable to read any of the core kernel source? > That would explain a lot... Were you born rude, or did you have to practice it? - Richard Gooch on linux-kernel | |
indent does _not_ solve the problem of: * buggers who use typedefs like WORD, DWORD, BYTE, IMANIDIOTSHOOTME and other crap from the same source (OK, they don't write the last one explicitly - not that it wasn't obvious from the rest of their, ahem, code). - Alexander Viro on coding style | |
The Tao that can be told is not the eternal Tao. The name that can be named is not the eternal name. The nameless is the beginning of heaven and Earth. The named is the mother of the ten thousand things. Ever desireless, one can see the mystery. Ever desiring, one sees the manifestations. These two spring from the same source but differ in name; this appears as darkness. Darkness within darkness. The gate to all mystery. | |
The Tao is an empty vessel; it is used, but never filled. Oh, unfathomable source of ten thousand things! Blunt the sharpness, Untangle the knot, Soften the glare, Merge with dust. Oh, hidden deep but ever present! I do not know from whence it comes. It is the forefather of the gods. | |
Empty yourself of everything. Let the mind become still. The ten thousand things rise and fall while the Self watches their return. They grow and flourish and then return to the source. Returning to the source is stillness, which is the way of nature. The way of nature is unchanging. Knowing constancy is insight. Not knowing constancy leads to disaster. Knowing constancy, the mind is open. With an open mind, you will be openhearted. Being openhearted, you will act royally. Being royal, you will attain the divine. Being divine, you will be at one with the Tao. Being at one with the Tao is eternal. And though the body dies, the Tao will never pass away. | |
Tao is source of the ten thousand things. It is the treasure of the good man, and the refuge of the bad. Sweet words can buy honor; Good deeds can gain respect. If a man is bad, do not abandon him. Therefore on the day the emperor is crowned, Or the three officers of state installed, Do not send a gift of jade and a team of four horses, But remain still and offer the Tao. Why does everyone like the Tao so much at first? Isn't it because you find what you seek and are forgiven when you sin? Therefore this is the greatest treasure of the universe. | |
MEMORIES OF MY FAMILY MEETINGS still are a source of strength to me. I remember we'd all get into the car -- I forget what kind it was -- and drive and drive. I'm not sure where we'd go, but I think there were some bees there. The smell of something was strong in the air as we played whatever sport we played. I remember a bigger, older guy whom we called "Dad." We'd eat some stuff or not and then I think we went home. I guess some things never leave you. -- Jack Handley, The New Mexican, 1988. | |
"This is the element_data structure for elements whose *element_type = FORM_TYPE_SELECT_ONE, FORM_TYPE_SELECT_MULT. */ /* * nesting deeper and deeper, harder and harder, go, go, oh, OH, OHHHHH!! * Sorry, got carried away there. */ struct lo_FormElementOptionData_struct." -- Mozilla source code | |
<toor> netgod: what do you have in your kernel??? The compiled source for driving a space shuttle??? <Spoo> time to make a zip drive your floppy drive then. if the kernel doesn fit on that, the kernel is an AI | |
<Chalky> gcc is the best compressor ever ported to linux. it can turn 12MB of kernel source (and that's .debbed) into a 500k kernel | |
Due to the closed source development model of XFree it is impossible to support, or even speculate about, features in pre- or beta releases of XFree. -- Marcus Sundberg | |
// Minor lesson: don't fuck about with something you don't fully understand -- the dosdoom source code | |
Operating Systems Installed: * Debian GNU/Linux 2.1 4 CD Set ($20 from www.chguy.net; price includes taxes, shipping, and a $3 donation to FSF). 2 CDs are binaries, 2 CDs complete source code; * Windows 98 Second Edition Upgrade Version ($136 through Megadepot.com, price does not include taxes/shipping). Surprisingly, no source code is included. -- Bill Stilwell, http://linuxtoday.com/stories/8794.html | |
<knghtbrd> Solver_: add users who should be messing with sound to group audio.. Make sure the devices are all group audio (ls -l /dev/dsp will give you the fastest indication if it's probably set right) and build a kernel with sound support for your card <knghtbrd> OR optionally install alsa source and build modules for that with make-kpkg <knghtbrd> OR (not recommended) get and install evil OSS/Linux evil non-free evil binary only evil drivers---but those are evil. And did I mention that it's not recommended? | |
* cesarb wonders if in less than a week Carmack will end up receiving in e-mail a courtesy copy of a version of the Quake source which is four times faster than what went out of his virtual hands... | |
<Knghtbrd> JHM: I'm not putting quake in the kernel source <Knghtbrd> but we should put quake in the boot floppies to one-up Caldera's tetris game.. ;> | |
I would rather spend 10 hours reading someone else's source code than 10 minutes listening to Musak waiting for technical support which isn't. -- Dr. Greg Wettstein, Roger Maris Cancer Center | |
<Deek> you GPL your homework? :) <knghtbrd> yah =D <knghtbrd> Anyone is permitted to use or modify my homework, but if they distribute changes they must include the full machine-readable source code ;> | |
It's not usually cost effective time wise to go do it. But if something's really pissing you off, you just go find the code and fix it and that's really cool. -- John Carmack, on the advantages of open source | |
* Equivalent code is available from RSA Data Security, Inc. * This code has been tested against that, and is equivalent, * except that you don't need to include two pages of legalese * with every copy. -- public domain MD5 source | |
Never underestimate the power of somebody with source code, a text editor, and the willingness to totally hose their system. -- Rob Landley <telomerase@yahoo.com> | |
<Knghtbrd> It is when the example source won't compile ... <``Erik> then you fucked something up <Knghtbrd> Nope, I followed their instructions <``Erik> that may've been your problem :} | |
The sourceforge approach is to place all of the projects in some bland "open source surburbia", where all of the houses are alike, with only the colors and minor style variations (which building plan was used for which particular house) are allowed by the restrictive covenants and local zoning laws. Sourceforege is the open source equivalent of the subdivision in the movie "Edward Scissorhands". -- Terry Lambert | |
Perhaps the remembrance of these things will prove a source of future pleasure. -- Virgil | |
Win95 is not a virus; a virus does something. -- unknown source | |
Microsoft is not the answer. Microsoft is the question. NO (or Linux) is the answer. -- Taken from a .signature from someone from the UK, source unknown | |
Avoid the Gates of Hell. Use Linux -- unknown source | |
I would rather spend 10 hours reading someone else's source code than 10 minutes listening to Musak waiting for technical support which isn't. -- Dr. Greg Wettstein, Roger Maris Cancer Center | |
We use Linux for all our mission-critical applications. Having the source code means that we are not held hostage by anyone's support department. -- Russell Nelson, President of Crynwr Software | |
Never trust an operating system you don't have sources for. ;-) -- Unknown source | |
panic("Foooooooood fight!"); -- In the kernel source aha1542.c, after detecting a bad segment list | |
Those who don't understand Linux are doomed to reinvent it, poorly. -- unidentified source | |
N: Phil Lewis E: beans@bucket.ualr.edu D: Promised to send money if I would put his name in the source tree. S: PO Box 371 S: North Little Rock, Arkansas 72115 S: US -- /usr/src/linux/CREDITS | |
Besides, its really not worthwhile to use more than two times your physical ram in swap (except in a select few situations). The performance of the system becomes so abysmal you'd rather heat pins under your toenails while reciting Windows95 source code and staring at porn flicks of Bob Dole than actually try to type something. -- seen on c.o.l.development.system, about the size of the swap space | |
The linuX Files -- The Source is Out There. -- Sent in by Craig S. Bell, goat@aracnet.com | |
If Bill Gates is the Devil then Linus Torvalds must be the Messiah. -- Unknown source | |
Vini, vidi, Linux! -- Unknown source | |
Linux - Where do you want to fly today? -- Unknown source | |
The easiest way to get the root password is to become system admin. -- Unknown source | |
Also another major deciding factor is availability of source code. It just gives everybody a warm fuzzy feeling knowing that there is source code available to the product you are using. It allows everybody to improve on the product and fix bugs etc. sooner that the author(s) would get the time/chance to. -- Atif Khan | |
> Also another major deciding factor is availability of source code. > It just gives everybody a warm fuzzy feeling knowing that there is > source code available to the product you are using. It allows everybody > to improve on the product and fix bugs etc. sooner that the author(s) > would get the time/chance to. I think this is one the really BIG reasons for the snowball/onslaught of Linux and the wealth of stuff available that gets enhanced faster than the real vendors can keep up. -- Norman | |
> Yeah, Linus is in the US. > > His source trees are in Finland. OK, someone give him access -fast- ...... ;-) -- babydr@nwrain.net, because of problems with the kernel | |
A feature is nothing more than a bug with seniority. -- Unknown source | |
* Linux Viruscan..... Windows 95 found. Remove it? (Y/y) -- Unknown source | |
There are 3 kinds of people: those who can count & those who can't. -- Unknown source | |
Q: How does a Unix guru have sex? A: unzip;strip;touch;finger;mount;fsck;more;yes;umount;sleep -- unknown source | |
/* And you'll never guess what the dog had */ /* in its mouth... */ -- Larry Wall in stab.c from the perl source code | |
break; /* don't do magic till later */ -- Larry Wall in stab.c from the perl source code | |
/* dbmrefcnt--; */ /* doesn't work, rats */ -- Larry Wall in hash.c from the perl source code | |
#define NULL 0 /* silly thing is, we don't even use this */ -- Larry Wall in perl.c from the perl source code | |
#define SIGILL 6 /* blech */ -- Larry Wall in perl.c from the perl source code | |
double value; /* or your money back! */ short changed; /* so triple your money back! */ -- Larry Wall in cons.c from the perl source code | |
echo $package has manual pages available in source form. echo "However, you don't have nroff, so they're probably useless to you." -- Larry Wall in Configure from the perl distribution | |
#else /* !STDSTDIO */ /* The big, slow, and stupid way */ -- Larry Wall in str.c from the perl source code | |
if (instr(buf,sys_errlist[errno])) /* you don't see this */ -- Larry Wall in eval.c from the perl source code | |
if (rsfp = mypopen("/bin/mail root","w")) { /* heh, heh */ -- Larry Wall in perl.c from the perl source code | |
It won't be covered in the book. The source code has to be useful for something, after all... :-) -- Larry Wall in <10160@jpl-devvax.JPL.NASA.GOV> | |
/* now make a new head in the exact same spot */ -- Larry Wall in cons.c from the perl source code | |
pos += screamnext[pos] /* does this goof up anywhere? */ -- Larry Wall in util.c from the perl source code | |
s = (char*)(long)retval; /* ouch */ -- Larry Wall in doio.c from the perl source code | |
signal(i, SIG_DFL); /* crunch, crunch, crunch */ -- Larry Wall in doarg.c from the perl source code | |
stab_val(stab)->str_nok = 1; /* what a wonderful hack! */ -- Larry Wall in stab.c from the perl source code | |
str->str_pok |= SP_FBM; /* deep magic */ s = (unsigned char*)(str->str_ptr); /* deeper magic */ -- Larry Wall in util.c from the perl source code | |
/* This bit of chicanery makes a unary function followed by a parenthesis into a function with one argument, highest precedence. */ -- Larry Wall in toke.c from the perl source code | |
tmps_base = tmps_max; /* protect our mortal string */ -- Larry Wall in stab.c from the perl source code | |
/* we have tried to make this normal case as abnormal as possible */ -- Larry Wall in cmd.c from the perl source code |