DEEn Dictionary De - En
DeEs De - Es
DePt De - Pt
 Vocabulary trainer

Spec. subjects Grammar Abbreviations Random search Preferences
Search in Sprachauswahl
source
Search for:
Mini search box
 
Proverbs, aphorisms, quotations (English) by Linux fortune

Another possible source of guidance for teenagers is television, but
television's message has always been that the need for truth, wisdom and
world peace pales by comparison with the need for a toothpaste that offers
whiter teeth *___and* fresher breath.
                -- Dave Barry, "Kids Today: They Don't Know Dum Diddly Do"
Avoid the Gates of Hell.  Use Linux
(Unknown source)
"I would rather spend 10 hours reading someone else's source code than
10 minutes listening to Musak waiting for technical support which isn't."
(By Dr. Greg Wettstein, Roger Maris Cancer Center)
Microsoft is not the answer.
Microsoft is the question.
NO (or Linux) is the answer.
(Taken from a .signature from someone from the UK, source unknown)
There are no threads in a.b.p.erotica,  so there's no  gain in using a
threaded news reader.
(Unknown source)
Running Windows on a Pentium is like having a brand new Porsche but only
be able to drive backwards with the handbrake on.
(Unknown source)
We use Linux for all our mission-critical applications. Having the source code
means that we are not held hostage by anyone's support department.
(Russell Nelson, President of Crynwr Software)
The secret source of humor is not joy but sorrow; there is no humor in Heaven.
                -- Mark Twain
At the source of every error which is blamed on the computer you will find
at least two human errors, including the error of blaming it on the computer.
        It is a period of system war.  User programs, striking from a hidden
directory, have won their first victory against the evil Administrative Empire.
During the battle, User spies managed to steal secret source code to the
Empire's ultimate program: the Are-Em Star, a privileged root program with
enough power to destroy an entire file structure.  Pursued by the Empire's
sinister audit trail, Princess _LPA0 races ~ aboard her shell script,
custodian of the stolen listings that could save her people, and restore
freedom and games to the network...
                -- DECWARS
It turned out that the worm exploited three or four different holes in the
system.  From this, and the fact that we were able to capture and examine
some of the source code, we realized that we were dealing with someone very
sharp, probably not someone here on campus.
                -- Dr. Richard LeBlanc, associate professor of ICS, in
                   Georgia Tech's campus newspaper after the Internet worm.
Life would be so much easier if we could just look at the source code.
        -- Dave Olson
Okay, Okay -- I admit it.  You didn't change that program that worked
just a little while ago; I inserted some random characters into the
executable.  Please forgive me.  You can recover the file by typing in
the code over again, since I also removed the source.
SCCS, the source motel!  Programs check in and never check out!
                -- Ken Thompson
        Something mysterious is formed, born in the silent void.  Waiting
alone and unmoving, it is at once still and yet in constant motion.  It is
the source of all programs.  I do not know its name, so I will call it the
Tao of Programming.
        If the Tao is great, then the operating system is great.  If the
operating system is great, then the compiler is great.  If the compiler is
greater, then the applications is great.  The user is pleased and there is
harmony in the world.
        The Tao of Programming flows far away and returns on the wind of
morning.
                -- Geoffrey James, "The Tao of Programming"
The tao that can be tar(1)ed
is not the entire Tao.
The path that can be specified
is not the Full Path.

We declare the names
of all variables and functions.
Yet the Tao has no type specifier.

Dynamically binding, you realize the magic.
Statically binding, you see only the hierarchy.

Yet magic and hierarchy
arise from the same source,
and this source has a null pointer.

Reference the NULL within NULL,
it is the gateway to all wizardry.
"We invented a new protocol and called it Kermit, after Kermit the Frog,
star of "The Muppet Show." [3]

[3]  Why?  Mostly because there was a Muppets calendar on the wall when we
were trying to think of a name, and Kermit is a pleasant, unassuming sort of
character.  But since we weren't sure whether it was OK to name our protocol
after this popular television and movie star, we pretended that KERMIT was an
acronym; unfortunately, we could never find a good set of words to go with the
letters, as readers of some of our early source code can attest.  Later, while
looking through a name book for his forthcoming baby, Bill Catchings noticed
that "Kermit" was a Celtic word for "free", which is what all Kermit programs
should be, and words to this effect replaced the strained acronyms in our
source code (Bill's baby turned out to be a girl, so he had to name her Becky
instead).  When BYTE Magazine was preparing our 1984 Kermit article for
publication, they suggested we contact Henson Associates Inc. for permission
to say that we did indeed name the protocol after Kermit the Frog.  Permission
was kindly granted, and now the real story can be told.  I resisted the
temptation, however, to call the present work "Kermit the Book."
                -- Frank da Cruz, "Kermit - A File Transfer Protocol"
The more a man is imbued with the ordered regularity of all events, the firmer
becomes his conviction that there is no room left by the side of this ordered
regularity for causes of a different nature.  For him neither the rule of
human nor the rule of divine will exists as an independent cause of natural
events.  To be sure, the doctrine of a personal God interfering with natural
events could never be refuted, in the real sense, by science, for this
doctrine can always take refuge in those domains in which scientific knowledge
has not yet been able to set foot.

But I am persuaded that such behavior on the part of the representatives
of religion would not only be unworthy but also fatal.  For a doctrine which
is able to maintain itself not in clear light, but only in the dark, will
of necessity lose its effect on mankind, with incalculable harm to human
progress.  In their struggle for the ethical good, teachers of religion
must have the stature to give up the doctrine of a personal God, that is,
give up that source of fear and hope which in the past placed such vast
powers in the hands of priests.  In their labors they will have to avail
themselves of those forces which are capable of cultivating the Good, the
True, and the Beautiful in humanity itself.  This is, to be sure, a more
difficult but an incomparably more worthy task.
- Albert Einstein
To write good code is a worthy challenge, and a source of civilized delight.
-- stolen and paraphrased from William Safire
"The fundamental purpose animating the Faith of God and His Religion is to
safeguard the interests and promote the unity of the human race, and to foster
the spirit of love and fellowship amongst men. Suffer it not to become a source
of dissension and discord, of hate and enmity."

"Religion is verily the chief instrument for the establishment of order in the
world and of tranquillity amongst it's peoples...The greater the decline of
religion, the more grievous the waywardness of the ungodly. This cannot but
lead in the end to chaos and confusion."
-- Baha'u'llah, a selection from the Baha'i scripture
The Seventh Edition licensing procedures are, I suppose, still in effect,
though I doubt that tapes are available from AT&T.  At any rate, whatever
restrictions the license imposes still exist.  These restrictions were and
are reasonable for places that just want to run the system, but don't allow
many of the things that Minix was written for, like study of the source in
classes, or by individuals not in a university or company.

I've always thought that Minix was a fine idea, and competently done.

As for the size of v7, wc -l /usr/sys/*/*.[chs] is 19271.

-- Dennis Ritchie, 1989
A people living under the perpetual menace of war and invasion is very easy to
govern.  It demands no social reforms.  It does not haggle over expenditures
on armaments and military equipment.  It pays without discussion, it ruins
itself, and that is an excellent thing for the syndicates of financiers and
manufacturers for whom patriotic terrors are an abundant source of gain.
                -- Anatole France
brain, v: [as in "to brain"]
        To rebuke bluntly, but not pointedly; to dispel a source
        of error in an opponent.
                -- Ambrose Bierce, "The Devil's Dictionary"
comment:
        A superfluous element of a source program included so the
        programmer can remember what the hell it was he was doing
        six months later.  Only the weak-minded need them, according
        to those who think they aren't.
Reliable source, n.:
        The guy you just met.
The three biggest software lies:
        (1) *Of course* we'll give you a copy of the source.
        (2) *Of course* the third party vendor we bought that from
            will fix the microcode.
        (3) Beta test site?  No, *of course* you're not a beta test site.
Q:        How many IBM types does it take to change a light bulb?
A:        Fifteen.  One to do it, and fourteen to write document number
        GC7500439-0001, Multitasking Incandescent Source System Facility,
        of which 10% of the pages state only "This page intentionally
        left blank", and 20% of the definitions are of the form "A:.....
        consists of sequences of non-blank characters separated by blanks".
Lucas is the source of many of the components of the legendarily reliable
British automotive electrical systems.  Professionals call the company "The
Prince of Darkness".  Of course, if Lucas were to design and manufacture
nuclear weapons, World War III would never get off the ground.  The British
don't like warm beer any more than the Americans do.  The British drink warm
beer because they have Lucas refrigerators.
The energy produced by the breaking down of the atom is a very poor kind
of thing.  Anyone who expects a source of power from the transformation
of these atoms is talking moonshine.
                -- Ernest Rutherford, after he had split the atom for
                   the first time
Nine megs for the secretaries fair,
Seven megs for the hackers scarce,
Five megs for the grads in smoky lairs,
Three megs for system source;

One disk to rule them all,
One disk to bind them,
One disk to hold the files
And in the darkness grind 'em.
"No program is perfect,"
They said with a shrug.
"The customer's happy--
What's one little bug?"

But he was determined,                        Then change two, then three more,
The others went home.                        As year followed year.
He dug out the flow chart                And strangers would comment,
Deserted, alone.                        "Is that guy still here?"

Night passed into morning.                He died at the console
The room was cluttered                        Of hunger and thirst
With core dumps, source listings.        Next day he was buried
"I'm close," he muttered.                Face down, nine edge first.

Chain smoking, cold coffee,                And his wife through her tears
Logic, deduction.                        Accepted his fate.
"I've got it!" he cried,                Said "He's not really gone,
"Just change one instruction."                He's just working late."
                -- The Perfect Programmer
We don't need no indirection                We don't need no compilation
We don't need no flow control                We don't need no load control
No data typing or declarations                No link edit for external bindings
Hey! did you leave the lists alone?        Hey! did you leave that source alone?
Chorus:                                        (Chorus)
        Oh No. It's just a pure LISP function call.

We don't need no side-effecting                We don't need no allocation
We don't need no flow control                We don't need no special-nodes
No global variables for execution        No dark bit-flipping for debugging
Hey! did you leave the args alone?        Hey! did you leave those bits alone?
(Chorus)                                (Chorus)
                -- "Another Glitch in the Call", a la Pink Floyd
        "What happened to the crewman?"
        "The M-5 computer needed a new power source, the crewman merely got in
the way."
                -- Kirk and Dr. Richard Daystrom, "The Ultimate Computer",
                   stardate 4731.3.
"But the most reliable indication of the future of Open Source is its past: in just a few years, we have gone from nothing to a robust body of software that solves many different problems and is reaching the million-user count. There's no reason for us to slow down now."

  -- Bruce Perens, on the future of Open Source software. (Open Sources, 1999 O'Reilly and Associates)
"The reason for the success of this somewhat communist-sounding strategy, while the failure of communism itself is visible around the world, is that the economics of information are fundamentaly different from those of other products."

  -- Bruce Perens, on Open Source software. (Open Sources, 1999 O'Reilly and Associates)
"The open-source approach is not a magic bullet for every type of software development project."

  -- Brian Behlendorf on OSS (Open Sources, 1999 O'Reilly and Associates)
"Open Standars, Open Documents, and Open Source"

  -- Scott Bradner (Open Sources, 1999 O'Reilly and Associates)
If Microsoft Owned McDonald's
Source: Unknown

1. Every order would come with fries whether you asked for them or not.
2. When they introduce McPizza, the marketing makes it seem that they invented
    pizza.
3. "A McDonald's on every block" -- Bill Gates.
4. You'd be constantly pressured to upgrade to a more expensive burger.
5. Sometimes you'll find that the burger box is empty. For some strange reason
    you'll accept this and purchase another one.
6. They'd claim the burgers are the same size as at other fast food chains,
    but in reality it's just a larger bun hiding the small beef patty.
7. Straws wouldn't be available until after you finish your drink.
8. "Push" technology -- they have McD employees come to your door and sell you
    Happy Meals.
9. Your order would never be right but the cash register would work perfectly
    for taking your money.
10. The "Special Sauce" cannot be reverse engineered, decompiled, or placed on
    more than 1 Big Mac.
You Might be a Microsoft Employee If...

1. Every night you dream of torturing Linus Torvalds
2. Every morning you say, "I pledge allegiance to the logo of the United
    Corporation of Microsoft. And to the stock options for which it stands, one
    company, under Bill, with headaches and buggy software for all."
3. Your favorite pick-up line is, "Hey baby...do you want to see a little
    ActiveX?"
4. Everytime you see a website with "Best viewed with Netscape" on it you
    feel like filing a lawsuit against its webmaster
5. You feel that all Anti-Microsoft websites should be censored because they
    are on the Internet, something Bill "invented."
6. You've set a goal to invent at least one new buzzword or acronym per day
7. You've ever been nervous because you haven't registered your Microsoft
    software yet.
8. You've trained your parrot to say "Unix sucks!" and "All hail Bill Gates!"
9. You own a limited edition Monopoly game in which Boardwalk is Microsoft and
    Jail is replaced by Justice Department Investigation
10. You've spent countless hours tracking down the source of the "Microsoft
    Acquires Vatican Church" rumor
The linuX Files -- The Source is Out There.
Windows NT source code now available... download WIN2000.BAS now!

   -- From a Slashdot.org post
It's ten o'clock. Do you know where your source code is?

   -- From a Slashdot.org post
"I took the initiative in creating the Internet."
   -- Al Gore
  
"Today I am one of the senior technical cadre that makes the Internet
work, and a core Linux and open-source developer. I have closely studied
the history of the Internet technical culture."
   -- Eric S. Raymond
It's ten o'clock. Do you know where your source code is?
Top Ten Changes If Linus Torvalds Achieves World Domination

10. That annoying Linus character from the Peanuts cartoons would be killed off
9. New fashion style: Scantily clad females, even in twenty below weather
8. Forget Disney World, say hello to Penguin World!
7. Late Show with Linus Torvalds
6. High schools offer classes on kernel hacking
5. Microsoft stock certificates traded as rare collectors' items, along with
    Confederate money and Roman coins
4. Beowolf Clusters for everyone!
3. Computers no longer come with reset buttons
2. United States of Linusia
1. Three words: Open Source Beer
Open Source Beer Revolution

Yesterday, Red Hat introduced an 'open source' beer called Red Brew. The
recipes for making the beer are available for free over the Net, and
microbrewery kits are available at low cost from Red Hat. Says a Red Hat
spokesman, "With the proliferation of free (open source) software, it was only
a matter of time before open source beer became reality. After all, the only
thing hackers like more than free software is free beer!"

Following the Red Hat annoucement, other companies are racing to launch their
own beer 'distribution'. Caldera is developing an OpenBrew beer. Meanwhile,
Patrick Volkerding is working on a SlackBeer distribution, and DebianBrew is
expected soon.

Traditional breweries and beer distributors are not thrilled about open source
beer. "This is ludicrous! People want beer that comes from time-tested, secret
recipes -- not beer from recipes invented overnight! Open source is a fad," a
spokesman for Buddwizzer Beer, Inc. said. In addition, other beverage
distributors are nervous. "First open source beer, and soon open source soft
drinks! Before we know it, we'll have RedCoke and SlackPepsi! This open source
plague must be stopped before it eats into our bottom line! Don't quote me on
that last sentence," the CEO of Croak-a-Cola said.
Operation Desert Slash

WASHINGTON, D.C. -- High officials in the US military are planning on putting
the  'Slashdot Effect' to use against Iraq. Pentagon computer experts think
that the Slashdot Effect could topple key Net-connected Iraqi computer
systems.  Such a Denial of Service attack could prove instrumental when the
US invades.

One Pentagon official said, "If I had a million dollars for every server that
crashed as a result of being linked on Slashdot, I'd be richer than Bill
Gates.  The Slashdot Effect is a very powerful weapon that the US military
wants to tap into."

Rob Malda has been contacted by top military brass.  According to anonymous
sources, Malda will play a key part in the so-called "Operation Desert
Slash".  Supposedly Malda will post several Slashdot articles with links to
critical Iraqi websites right when the US invasion is set to begin.
Meanwhile, Pentagon operatives will begin a series of Denial of Service
attacks on other key Iraqi computer systems. One source notes, "Since many
Iraqi systems rely on Microsoft software, this task should be relatively
simple."
Linux Dominates Academic Research

A recent survey of colleges and high school reveals that Linux, Open Source
Software, and Microsoft are favorite topics for research projects.  Internet
Censorship, a popular topic for the past two years, was supplanted by Biology
of Penguins as another of this year's most popular subjects for research
papers.

"The Internet has changed all the rules," one college professor told
Humorix.  "Nobody wants to write papers about traditional topics like the
death penalty, freedom of speech, abortion, juvenile crime, etc. Most of the
research papers I've seen the past year have been computer related, and most
of the reference material has come from the Net.  This isn't necessarily
good; there's a lot of crap on the Net.  One student tried to use 'Bob's
Totally Wicked Anti-Microsoft Homepage of Doom' and 'The Support Group for
People Used by Microsoft' as primary sources of information for his paper
about Microsoft."

A high school English teacher added, "Plagarism is a problem with the Net.
One of my students 'wrote' a brilliant piece about the free software
revolution. Upon further inspection, however, almost everything was stolen
from Eric S. Raymond's website.  I asked the student, "What does noosphere
mean?"  He responded, 'New-what?'  Needless to say, he failed the class."
The Movement Formerly Known As Open Source

The battle over the Open Source trademark is heating up.  Software in the
Public Interest and the Open Source Initiative both hold competing claims to
the trademark.  In order to put an end to the infighting, a group of free
software advocates have founded the Association for the Movement Formerly
Known as Open Source (AMFKOS)

One AMFKOS founder said, "I find it ironic that a trademark representing free
software is itself proprietary.  This situation must change.  We propose that
the free software movement adopt another name besides 'Open Source'.
Hopefully then we can all Get-Back-To-Coding(tm) instead of fighting over
Bruce Perens' and Eric Raymond's egos."

Rumor has it that Richard Stallman plans to mount a campaign to
promote the phrase "GNU/Free Software" in place of "Open Source".
In addition, the terms "Ajar Source", "Unlocked Source", "Nude Source",
"Unclosed Source", and "Just-Type-make Software" have all
been proposed by various Usenet or Slashdot posters.
Humorix Holiday Gift Idea #2

Nerd Trading Cards
Price: $10/pack
Producer: Bottomms; 1-800-NRDS-ROK

Forget baseball, nerd trading cards are the future.  Now your kids can
collect and trade cards of their favorite open source hackers and computer
industry figures.  Some of the cards included feature Linus Torvalds, Richard
M. Stallman, and Larry Wall.  Also contains cards for companies (Red Hat,
Netscape, Transmeta, etc.), specific open source programs (Apache, Perl,
Mozilla, etc.), and well-known websites (Slashdot, Freshmeat, etc.).  Each
card features a full-color picture on the front and complete information and
statistics on back. Some of the cards have even been autographed.  Quit
trying to search eBay.com for a Mark McGwire rookie card and collect nerd
cards instead!
Humorix Holiday Gift Idea #9

Dial-A-Detective
$499.95/year; 1-888-BYE-SPAM

This detective firm is not what you'd expect. Instead of tracking murderers or
unfaithful husbands, this band of rogue private investigators goes after
something just as sinister -- spammers. For a modest annual retainer fee,
these spam detectives will track down the source of every piece of spam you
receive.

Using the latest in forensic technology, they will bring you the virtual scalp
of the spammer -- their name, home address, social-security number, and, more
importantly, credit card numbers. At this point you are free to pursue the
evil spammer as you see fit.

If your friend or relative is sick of receiving wave after wave of "Find Out
Anything About Anyone" spams, give them a subscription to Dial-A-Detective,
and they'll find out anything about any spammer -- for real.
Microsoft Open Source Solitaire

REDMOND, WA -- In a first attempt at "embrace-and-extend" of open source
software, Microsoft will release its popular Solitaire and FreeCell games as
open source under the MILA (Microsoft Innovative License Agreement).
According to a Microsoft press release, the Visual C++ source code for the
two games will be available from the Microsoft website "in the first quarter"
(no year was specified).

Industry pundits hail the move as revolutionary.  "Microsoft's release of its
most popular Windows feature as open source software demonstrates just how
innovative the company really is.  The DoJ is clearly barking up the wrong
tree," wrote one Ziff-Davis flunkie. One executive at a large company said,
"Freely available source code is the best idea Microsoft has ever invented."

One Linux developer told Humorix, "Let's just hope some fool doesn't try to
port this thing to Linux.  Imagine the havoc that could ensue if a bunch of
core Linux contributors downloaded Solitaire and became addicted to it.  It
would be a disaster!  Linux and open source development would grind to a halt
while the hackers wasted their time playing Solitaire or FreeCell.  'Just one
more game...' they would say."
MAKE MONEY FAST FROM SLASHDOT!!!!!!

You are probably familiar with the Slashdot.org "News for Nerds" site.
You've probably heard about the "Slashdot Effect".  Now, we want to
introduce a new term that could change your life: "Slashdot Baiting".

The Slashdot Effect is a significant source of traffic.  Lots of traffic.
Thousands of visitors within hours.  Thousands of eyeballs looking and
clicking at YOUR banner advertisements.  In short, the Slashdot Effect, if
properly utilized, can produce a significant amount of advertising revenue.

That's where we at MoneyDot Lucrative Marketing International Group, Inc.
come in.  We know how to exploit the Slashdot Effect.  We call our strategy
"Slashdot Baiting".  It's quite painless.  We have formulated 101 easy ways
to get your site mentioned on Slashdot.

Interested in pursuing Slashdot Baiting and obtaining financial
independence? Want to make $50,000 (or more!) within 90 days?

Then purchase MLM's "Slashdot Baiting Kit", which will contain everything
you need to know to put this powerful marketing force to work for YOU! We
also throw in a warranty: if your site isn't mentioned on Slashdot within 90
days of using this Kit, we'll give you your money back guaranteed!
Open Source Irrational Constant

BREEZEWOOD, PA -- In a revelation that could rock the foundations of
science, a researcher in Pennsylvania has discovered that the digits of the
irrational constant PI encode a version of the Linux kernel.  "I can't
believe it," the researcher, Neil Hoffman, exclaimed.  "And yet, here I am
staring at what appears to be the source code for Linux kernel 5.0.0.
Needless to say, my whole world-view has changed..."

Hoffman explained, "My algorithm, which applies several dozen conversions and
manipulations to each digit of PI, spits out plain vanilla ASCII characters
that happen to form the source code for the Linux kernel."

Many members of the scientific community are skeptical.  One One
mathematician who has memorized the digits of PI to 10,000 places said,
"This is the kind of nonsense one would expect to find in a tabloid such as
the National Mathematics Enquirer.  Or a Linux fortune(6) file.  Hoffman's
'discovery' is obviously a hoax designed to secure government research
grants."

In a related matter, we have received an unconfirmed report that a region of
the Mandelbrot fractal contains what appear to be the words "LINUS TORVALDS
WAS HERE".  In addition, the words "TRANSMETA: THIS SECRET MESSAGE IS NOT
HERE YET" supposedly appear within the depths of the Julia Set.
Attack of the Tuxissa Virus

What started out as a prank posting to comp.os.linux.advocacy yesterday has
turned into one of the most significant viruses in computing history.
The creator of the virus, who goes by the moniker "Anonymous Longhair",
modified the Melissa virus to install Linux on infected machines.

"It's a work of art," one Linux advocate told Humorix after he looked
through the Tuxissa virus source code.  "This virus goes well beyond the
feeble troublemaking of Melissa.  It actually configures a UMSDOS partition
on the user's hard drive and then downloads and installs a stripped-down
version of Slackware Linux."

The email message that the virus is attached to has the subject "Important
Message About Windows Security".  The text of the body says, "I want to let
you know about some security problems I've uncovered in Windows 95/98/NT,
Office 95/97, and Outlook. It's critically important that you protect your
system against these attacks.  Visit these sites for more information..."
The rest of the message contains 42 links to sites about Linux and free
software.

Details on how the virus started are a bit sketchy.  The "Anonymous
Longhair" who created it only posted it to Usenet as an early April Fool's
gag, demonstrating how easy it would be to mount a "Linux revolution".
Actual Snippet of Windows Source Code!  Honest!

NOTE: The following snippet of the Windows 95 source code was sent to us via
'unofficial' channels.  Don't tell anyone you saw this!  We really don't
feel like being visited by the Microsoft Intellectual Property Police.

void BusyLoop()
/* Do nothing loop to kill CPU cycles; added at the
   request of Intel */
{
DisplayRandomSubliminalMessage();
for( int i = 0; i < BIG_INT; i++ )
  for( int j = 0; j < BIG_INT; j++ )
   for( int k = 0; k < BIG_INT; k++ )
    for( int l = 0; l < BIG_INT; l++ )
     if( STACK_SPACE_PERCENTAGE_FREE > .05 )
     /* There's plenty of stack space left -- let's
        eat up some more CPU cycles, recursively! */
      BusyLoop();
}
Microsoft Mandatory Survey (#13)

Customers who want to upgrade to Windows 98 Second Edition must now fill
out a Microsoft survey online before they can order the bugfix/upgrade.

Question 13: Which of the following new Microsoft products do you plan on
             buying within the next 6 months?

A. Windows For Babies(tm) - Using an enhanced "click-n-drool" interface,
   babies will be able to learn how to use a Wintel computer, giving them
   a head start in living in a Microsoft-led world.

B. Where In Redmond Is Carmen Sandiego?(tm) - The archvillian Sandiego has
   stolen the Windows source code and must be stopped before she can
   publish it on the Net.

C. ActiveKeyboard 2000(tm) - An ergonomic keyboard that replaces useless
   keys like SysRq and Scroll Lock with handy keys like "Play Solitaire"
   and "Visit Microsoft.com".

D. Visual BatchFile(tm) - An IDE and compiler for the MS-DOS batch file
   language. MSNBC calls it "better than Perl".
Jargon Coiner (#4)

An irregular feature that aims to give you advance warning of new jargon
that we've just made up.

* FREE LECTURE: Attempting to explain the concepts of Linux, Open Source
  software, free software, and gift cultures to someone who is not
  familiar with them. Made extra difficult if the explainee has been
  misled by superficial mainstream news articles about the subject.

  Example: "Eric gave an hour-long free lecture to his mother-in-law after
  she asked him about this Linux thingy she read about in USA Today."

* LEXICON LAZINESS:  Filling a fortune file with a list of fake jargon
  instead of publishing something more substantive (and funny) that would
  take more effort to write.

* FOR(;;)TUNE LOOP: Repeatedly running fortune(6) for cheap entertainment.

  Example: "During a coffee break, Bob became bored and started a
  for(;;)tune loop. His boss had to issue a SIGTERM to get him to resume
  working."
Jargon Coiner (#8)

An irregular feature that aims to give you advance warning of new jargon
that we've just made up.

* STAR SPINOFFS: Applying themes and ideas from "Star Wars" and "Star
  Trek" to contemporary events.

  Examples: "Let the Source be with you!", "Microsoft is the Evil Empire",
  "Resistance is futile. You will be assimilated by Microsoft".

* TRADEMARKIZATION(tm): Giving a phrase special meaning by appending a
  trademark symbol to it.

  Examples: "Think Free Speech, Not Free Beer(tm)", "Real Soon Now(tm)",
  "Blue Screen of Death(tm)"
Bill Gates Passes Turing Test

LONDON, ENGLAND -- Microsoft proclaimed that they have passed the Turing
Test by creating a Bill Gates multimedia simulacrum that crack BBC
interviewer Jeremy Paxman couldn't distinguish from the real thing. "I
never would have expected this," Paxman said about the Gates AI program.
"After all, this Microsoft program actually worked for an extended period
of time, something you don't see very often."

Microsoft has plans to mass-produce the Bill Gates holographic simulation
by 2010 or so. "The hardware just isn't there yet for home use," a
Microserf explained. "By then, though, Intel's Itanium 6 Super Pro Plus
III CPU running at 600 Ghz or whatever should be sufficient." Windows 2010
is expected to include the Bill Gates simulation, making the World's
Richest Man(tm) accessible to the entire world.

A newly printed brochure for the faux-Gates advertises, "Need help running
Windows 2010? Bill Gates will sit beside you and guide you through the
system. Have a question for the world's sexiest and smartest nerd? He'll
answer it. Wondering if free and open source software is a plot by
Communists freaks to overthrow the free market system? He'll be there to
explain. Want to ask for a personal loan? Sorry, won't happen."          
Is Linux A Finnish Conspiracy?

WASHINGTON, DISTRICT OF CORRUPTION -- According to a report recently
issued by the NSA (No Such Agency), Finland is now considered a national
economic and security risk. "We don't trust the Finns... software written
by these people could potentially contain backdoors that could undermine
domestic security," the report states. In response to the news, US Senator
Fatcatte (R-WA) has proposed a bill, the It's For The Children Act of
2000, that would ban all software written by native-born Finns.

"It's time we take the Finnish threat seriously," Fatcatte said at a press
conference. "Not only is Finn software a threat to domestic tranquility,
but it could radically alter the computer industry, costing us thousands
of jobs... and, more importantly, billions in tax revenue. We must prevent
the Finns from subverting our economy with so-called 'open-source
software'." He then asked, "Is anybody thinking of the children of
programmers who will become unemployed when Finnish software overruns the
country?"
Linux World Domination: Not A Joke!

WASHINGTON, D.C. -- Senator Fattecat (R-WA) is pushing for a ban on
Finnish-produced software. His chief of staff, Ms. Dee Septive, has
published a 200-page report revealing "the Helsinkian Underground", a
Finnish world domination plot hatched in 1943.

The Fattecat expose describes Finland's recent scheme involving free
software. "Linux, originally called Freix (FREIX Retrieves Electronic
Intelligence X), is a scheme to infiltrate the Western world with a 'free'
operating system with nasty backdoors hidden within its obfuscated source
code. IRC (Intelligence Relaying Code) is another Finnish innovation
designed for spying purposes."

Linus Torvalds plays a prominent role in the conspiracy. "That old story
about Linus developing a Unix clone in his spare time while at University
is a lark," the report states. "Indeed, the name Linux ("Line X") was
coined because the kernel can extract any arbitrary line of intelligence
from any document it has access to."
New Linux Companies Hope To Get Rich Quick (#1)

Adopt-A-Beowulf: the latest company to hop the Linux bandwagon
as it tramples down Wall Street.

Every geek dreams of owning their own Beowulf supercomputer. Very few
people (except for dotcom billionnaires) can afford to build one, but the
folks at Adopt-a-Beowulf can provide the next best thing: a virtual
beowulf. For US$49.95, you can "adopt" your own 256-node Beowulf cluster.
You won't own it, or even get to see it in person, but you will receive
photos of the cluster, a monthly newsletter about its operation, and a
limited shell account on it.

The company hopes to branch out into other fields. Some slated products
include Adopt-A-Penguin, Lease-A-Camel (for Perl mongers), and
Adopt-A-Distro (in which your name will be used as the code-name for a
beta release of a major Linux distribution or other Open Source project).
New Linux Companies Hope To Get Rich Quick (#3)

In the "Cathedral and the Bazaar", ESR mentions that one motivation behind
Open Source software is ego-gratification. That's where OpenEgo, Inc.
comes in. For a fee, the hackers at OpenEgo will produce a piece of Open
Source software and distribute it in your name, thus building up your
reputation and ego. You can quickly become the envy of all your friends --
without lifting a finger. Want a higher-paying tech job? With OpenEgo's
services, you'll look like an Open Source pro in no time, and have dozens
of hot job offers from across the country.

Says the OpenEgo sales literature, "Designing, implementing, maintaining,
and promoting a successful Open Source project is a pain. However, at
OpenEgo, we do all the work while you reap all the rewards..." A page on
the OpenEgo site claims, "We produced a Linux kernel patch for one
customer last year that was immediately accepted by Linus Torvalds...
Within days the person gained employment at Transmeta and is now on the
road to IPO riches..."

Prices range from $1,000 for a small program to $5,000 for a kernel patch.
New Linux Companies Hope To Get Rich Quick (#4)

The buzz surrounding Linux and Open Source during 1999 has produced a
large number of billionnaires. However, people who weren't employed by Red
Hat or VA Linux, or who didn't receive The Letter, are still poor. The
visionaries at The IPO Factory want to change all that.

As the name suggests, this company helps other businesses get off the
ground, secure investments from Venture Capitalists, and eventually hold
an IPO that exits the stratosphere. "You can think of us as meta-VCs," the
IPO Factory's founder said. "You provide the idea... and we do the rest.
If your company doesn't hold a successful IPO, you get your money back,
guaranteed!" He added quickly, "Of course, if you do undergo a billion
dollar IPO, we get to keep 25% of your stock."

The company's first customer, LinuxOne, has been a failure. "From now on
we're only going to service clients that actually have a viable product,"
an IPO Factory salesperson admitted. "Oh, and we've learned our lesson:
it's not a good idea to cut-and-paste large sections from Red Hat's S-1
filing."
Excerpts From The First Annual Nerd Bowl (#6)

JOHN SPLADDEN: We're back. The players have assumed their positions and
are ready to answer computer-related questions posed by referree Eric S.
Raymond. Let's listen in...

RAYMOND: Okay, men, you know the rules... And now here's the first
question: Who is the most respected, sexy, gifted, and talented spokesmen
for the Open Source movement? [Bzzz] Taco Boy, you buzzed in first.

ROB MALDA: The answer is me.

RAYMOND: No, you egomaniacal billionaire. Anybody else want to answer?
[Bzzz] Yes, Alan Cox?

ALAN COX: Well, duh, the answer has to be Eric Raymond.

RAYMOND: Correct! That answer is worth 10 million points.

ROB MALDA: Protest! Who wrote these questions?!
Excerpts From The First Annual Nerd Bowl (#6)
(Round 4, the Who Wants To Be A Billionaire? Round)

ERIC RAYMOND (Moderator): Here's the second question: Who is the primary
author of the world-renowned fetchmail program? [Bzzz] Yes, Hemos?

HEMOS: Mr. Eric... Fetch of Cincinnati, Ohio.

RAYMOND: No, no, no! The answer is me, me, me, you idiots! Sheesh. I'm
resetting your points to zero for that.

ALAN COX: Are you going to ask any questions that are not about you?

RAYMOND: Um... let's see... yeah, there's one or two here... Okay, here's
  question three... What loud-mouthed hippie-spirtualist founder of the
  GNU Project keeps demanding that everybody use the crappy term "Free
  Software" instead of "Open Source"? [Bzzz] Yes, Anonymous Coward?

ANONCOW: Eric Raymond!

RAYMOND: Why you little [expletive]! I'm going to...
Affordable Virtual Beowulf Cluster

Every nerd drools over Beowulf clusters, but very few have even seen one,
much less own one. Until now, that is. Eric Gylgen, the open source hacker
famous for EviL (the dancing ASCII paperclip add-on to vi), is working on
a program that will emulate Beowulf clusters on a standard desktop PC.

"Of course," he added candidly, "the performance of my virtual cluster
will be many orders of magnitude less than a real cluster, but that's not
really the point. I just want to be able to brag that I run a 256 node
cluster. Nobody has to know I only spent $500 on the hardware it uses."

Eric has prior experience in this field. Last month he successfully built
a real 32 node Beowulf cluster out of Palm Pilots, old TI-8x graphing
calculators, various digital cameras, and even some TRS-80s.

He demonstrated a pre-alpha version of his VirtualEpicPoem software to us
yesterday. His Athlon machine emulated a 256 node Beowulf cluster in which
each node, running Linux, was emulating its own 16 node cluster in which
each node, running Bochs, was emulating VMWare to emulate Linux running
old Amiga software. The system was extremely slow, but it worked.
Brief History Of Linux (#2)
Hammurabi's Open-Source Code

Hammurabi became king of Babylonia around 1750BC. Under his reign, a
sophisticated legal code developed; Version 1, containing 282 clauses, was
carved into a large rock column open to the public. However, the code
contained several errors (Hammurabi must have been drunk), which numerous
citizens demanded be fixed.

One particularly brave Babylonian submitted to the king's court a stack of
cloth patches that, when affixed to the column, would cover up and correct
the errors. With the king's approval, these patches were applied to the
legal code; within a month a new corrected rock column (Version 2.0) was
officially announced. While future kings never embraced this idea (who
wanted to admit they made a mistake?), the concept of submitting patches
to fix problems is now taken for granted in modern times.
Brief History Of Linux (#15)
Too many hyphens: Traf-O-Data and Micro-soft

Bill Gates and Paul Allen attended an exclusive private school in Seattle.
In 1968, after raising $3,000 from a yard sale, they gained access to a
timeshare computer and became addicted. After depleting their money
learning BASIC and playing Solitaire, they convinced a company to give
them free computer time in exchange for reporting bugs -- ironically, an
early form of Open Source development!

The two then founded a small company called Traf-O-Data that collected and
analyzed traffic counts for municipalities using a crude device based on
the Intel "Pretanium" 8008 CPU. They had some success at first, but ran
into problems when they were unable to deliver their much hyped
next-generation device called "TrafficX". An engineer is quoted as saying
that "Traf-O-Data is the local leader in vaporware", the first documented
usage of the term that has come to be synonymous with Bill Gates.

Soon thereafter, the two developed their own BASIC interpreter, and sold
it to MITS for their new Altair computer. April 4, 1975 is the fateful day
that Micro-soft was founded in Albuquerque, NM as a language vendor.
Brief History Of Linux (#16)
Closed source, opened wallets

In 1976 Bill Gates wrote the famous letter to Altair hobbyists accusing
them of "stealing software" and "preventing good software from being
written". We must assume Bill's statement was true, because no good
software was being written at Micro-soft.

Bill Gates did not innovate the concept of charging megabucks for
software, but he was the first to make megabucks from peddling commercial
software.
Brief History Of Linux (#21)
The GNU Project

Meet Richard M. Stallman, an MIT hacker who would found the GNU Project
and create Emacs, the operating-system-disguised-as-a-text-editor. RMS,
the first member of the Three Initials Club (joined by ESR and JWZ),
experienced such frustration with software wrapped in arcane license
agreements that he embarked on the GNU Project to produce free software.

His journey began when he noticed this fine print for a printer driver:

   You do not own this software. You own a license to use one copy of this
   software, a license that we can revoke at any time for any reason
   whatsoever without a refund. You may not copy, distribute, alter,
   disassemble, or hack the software. The source code is locked away in a
   vault in Cleveland. If you say anything negative about this software
   you will be in violation of this license and required to forfeit your
   soul and/or first born child to us.

The harsh wording of the license shocked RMS. The computer industry was in
it's infancy, which could only mean it was going to get much, much worse.
Brief History Of Linux (#29)

"The Cathedral and the Bazaar" is credited by many (especially ESR
himself) as the reason Netscape announced January 22, 1998 the release of
the Mozilla source code. In addition, Rob Malda of Slashdot has also
received praise because he had recently published an editorial ("Give us
the damn source code so we can fix Netscape's problems ourselves!")

Of course, historians now know the true reason behind the landmark
decision: Netscape engineers were scared to death that a large
multi-national corporation would acquire them and crush Mozilla. Which
indeed did happen much later, although everybody thought the conqueror
would be Microsoft, not AOL (America's Online Lusers).

The Netscape announcement prompted a strategy session among Linux bigwigs
on February 3rd. They decided a new term to replace 'free software' was
needed; some rejected suggestions included "Free Source", "Ajar Source",
"World Domination Source", "bong-ware" (Bong's Obviously Not GNU), and
"Nude Source". We can thank Chris Peterson for coining "Open Source",
which became the adopted term and later sparked the ugly "Free Software
vs. Open Source", "Raymond vs. Stallman" flame-a-thons.
DeCSS T-Shirt Used To Commit Piracy!

College student Cody Potter stunned the world yesterday when he used a
T-shirt with the printed DeCSS source code to illegally copy a DVD of
"Star Trek XXI: We Promise This Is The Last One". Well, it wasn't the
actual DeCSS source code. The shirt contained a Perl script which spits
out a bash shell script which produces a GW-BASIC program which outputs a
ROT13-encoded Python script that manufactures a Pig-Latin-encoded Java
program that finally produces the real DeCSS C source code when executed.
The Next Big Thing: "Clairvoyant Consultants"

Nobody likes to deal with tech support or customer service reps. A growing
number of people are getting sick of being put on hold for three hours and
then paying ridiculous "per incident" fees so some Microserf can tell them
to "reinstall the operating system!"

Desperate users are turning to an unlikely source to diagnose and fix
software problems: psychics. Palm[Pilot] readers, 1-900 number operators,
and clairvoyant consultants are quickly becoming the hottest careers in
the tech sector.

Explained Madam Cosmos, owner of the Main Street Mysticism Temple in
Keokuk, Iowa, "With my special powers, I can track down the source of any
problem. Got a rogue Registry entry that's causing Bluescreens? I'll find
it. Missing a curly bracket in your Perl program but can't locate it
because the error messages are so unhelpful? I'll know where it is even
before you walk in my door."
Microsoft Fights Linux -- By Contributing Kernel Patches

If you can't beat 'em, join 'em... and then destory 'em. That seems to be the
new Microsoft strategy for dealing with Linux. Instead of fighting a FUD or
patent war, Microsoft operatives are doing something totally out of character:
they are contributing patches for the Linux kernel and other programs.

Don't worry, Microsoft is still evil. It's all part of a massive denial of
service attack against Linus Torvalds designed to bring kernel development to
a standstill. By sending over 10,000 patches per minute by email to Linus and
other top kernel hackers, Microsoft has exposed Linux's Achilles heel.

"I can't believe this is happening!" one stressed-out kernel hacker said at a
press conference on IRC. "If this goes on, we may have to conduct kernel
development over some other network protocol, like avian carriers... Aw crap,
there's smoke coming from my email server! Ahh... it can't handle the load!"
At this point the developer cut off and we haven't heard from him since.

At first Linus was unsure where the deluge of patches was coming from. But
when he saw one patch to replace kernel panics with bluescreens, the source
was pretty obvious. "Oh, and the fact that all of the patches are covered by
Microsoft's GPL [Grossly Private License] was a dead giveaway, too,"
"Oops," Says MPAA President

Recently, the United States filed a legal brief in support of the MPAA's
argument that linking to the DeCSS source code is not protected by the
First Amendment.

At the time, the MPAA was ecstatic. But not any longer. The tables have
turned: the Federal government has filed a lawsuit against the movie
industry, arguing that many Hollywood-produced movies 'link' to illegal
content. The MPAA is now desperately wrapping itself up in the Bill of
Rights.

"Murder is illegal. Showing a murder in a movie -- or, rather, 'linking'
to it -- is also illegal," explained a spokesperson for the Coalition Of
Angry Soccer Moms In Support Of Brow-Beating Movie Industry Executives, an
interest group that has backed the government's lawsuit.
As Easy As /usr/src/linux

Wiping the sweat from his brow, the contestant diligently continues to
recite, "'i' equals 'NR' underscore 'TASKS' semicolon newline 'p' equals
ampersand 'task' bracket 'NR' underscore 'TASKS' close-bracket semicolon
newline while parens minus minus 'i' parens brace if parens star minus..."

Bzzzt! One of the judges says, "You missed an exclamation point. Ten point
penalty for that error."  The contestant realizes it's all over. He had
spent 500 hours memorizing the source code to the Linux 0.01 kernel and
then blew it all by forgetting one stupid ASCII character in sched.c.

Welcome to the First Annual Linux Kernel Memorization Contest in New
Haven, Connecticut, where the stakes are high and the frustration is
simply unbearable. Linuxer longhairs from all over the globe have
descended on the Offramp Motel to show off their memorization skills in
front of a crowd of... dozens.

"Those math freaks can memorize PI and other irrational constants all they
want. I'll stick with the Linux 0.01 kernel source code thank you very
much," said Bob Notmyrealname, the organizer of the event. %
We prefer to believe that the absence of inverted commas guarantees the
originality of a thought, whereas it may be merely that the utterer has
forgotten its source.
                -- Clifton Fadiman, "Any Number Can Play"
"I hold open source people to higher standards. They are supposed to be
the people who do programming because it's an art-form, not because it's
their job."

         - Linus Torvalds
/* strangest things ever said, #6, to alan cox: "...and remember, alan
* - no monkeybusiness.  remember, i sleep nude and we dont want to
* give rachel the shock of her life..." */

        - comment in the Crack 5 source, file src/util/kickdict.c
Bruno Avila wrote:
>        I can't find this anywhere. What is the version of the tools to
> compile linux kernel 0.0.0.1 (../Historic)? And where can i find them?  

Well, first you have to find a good source of obsidean, a couple of sharp
rocks, and some flint...

        - Alan Olsen on linux-kernel
I'd rather listen to Newton than to Mundie.
He may have been dead for almost three hundred years,
but despite that he stinks up the room less.

        - Linus Torvalds on Craig Mundie's "shared source" speech.
As you point out below, contract law is also involved.  Add the DMCA,
UCITA, and Bush 2.0 to the mix, and any lawyer who says he actually
knows what's legal is lying.

        - Ian Pilcher on Microsoft "shared source" licensing
> ...  but i could not found any source code or
> information in Internet.

How strange. The kernel source code is definitely on the internet, and
definitely contains drivers that implement internal layering -
nrdev, shaper, the sync cards, isdn

        - Alan Cox on linux-kernel
> Sorry, at this point we are not allowed to publish the source code of the
> lcs and qeth drivers (due to the use of confidential hardware interface
> specifications).  We make those modules available only in binary form
> on our developerWorks web site.
>
Gosh. I didn't know you guys were so advanced that you didn't use
an electronic hardware interface! Your 'hardware interface specifications'
use magnetohydrodynamics, and they are top-secret, right?

        - Richard B. Johnson on linux-kernel
Alexander Viro wrote:
> You mean that you are unable to read any of the core kernel source?
> That would explain a lot...

Were you born rude, or did you have to practice it?

        - Richard Gooch on linux-kernel
indent does _not_ solve the problem of:
        * buggers who use typedefs like WORD, DWORD, BYTE, IMANIDIOTSHOOTME
        and other crap from the same source (OK, they don't write the last one
        explicitly - not that it wasn't obvious from the rest of their,
        ahem, code).

        - Alexander Viro on coding style
The Tao that can be told is not the eternal Tao.
The name that can be named is not the eternal name.
The nameless is the beginning of heaven and Earth.
The named is the mother of the ten thousand things.
Ever desireless, one can see the mystery.
Ever desiring, one sees the manifestations.
These two spring from the same source but differ in name; this appears as darkness.
Darkness within darkness.
The gate to all mystery.
The Tao is an empty vessel; it is used, but never filled.
Oh, unfathomable source of ten thousand things!
Blunt the sharpness,
Untangle the knot,
Soften the glare,
Merge with dust.
Oh, hidden deep but ever present!
I do not know from whence it comes.
It is the forefather of the gods.
Empty yourself of everything.
Let the mind become still.
The ten thousand things rise and fall while the Self watches their return.
They grow and flourish and then return to the source.
Returning to the source is stillness, which is the way of nature.
The way of nature is unchanging.
Knowing constancy is insight.
Not knowing constancy leads to disaster.
Knowing constancy, the mind is open.
With an open mind, you will be openhearted.
Being openhearted, you will act royally.
Being royal, you will attain the divine.
Being divine, you will be at one with the Tao.
Being at one with the Tao is eternal.
And though the body dies, the Tao will never pass away.
Tao is source of the ten thousand things.
It is the treasure of the good man, and the refuge of the bad.
Sweet words can buy honor;
Good deeds can gain respect.
If a man is bad, do not abandon him.
Therefore on the day the emperor is crowned,
Or the three officers of state installed,
Do not send a gift of jade and a team of four horses,
But remain still and offer the Tao.
Why does everyone like the Tao so much at first?
Isn't it because you find what you seek and are forgiven when you sin?
Therefore this is the greatest treasure of the universe.
MEMORIES OF MY FAMILY MEETINGS still are a source of strength to me.  I
remember we'd all get into the car -- I forget what kind it was -- and
drive and drive.

I'm not sure where we'd go, but I think there were some bees there. The
smell of something was strong in the air as we played whatever sport we
played.  I remember a bigger, older guy whom we called "Dad."  We'd eat
some stuff or not and then I think we went home.

I guess some things never leave you.
                -- Jack Handley, The New Mexican, 1988.
"This is the element_data structure for elements whose *element_type =
FORM_TYPE_SELECT_ONE, FORM_TYPE_SELECT_MULT. */ /* * nesting deeper
and deeper, harder and harder, go, go, oh, OH, OHHHHH!! * Sorry, got
carried away there. */ struct lo_FormElementOptionData_struct."
        -- Mozilla source code
<toor> netgod: what do you have in your kernel??? The compiled source for
       driving a space shuttle???
<Spoo> time to make a zip drive your floppy drive then. if the kernel
       doesn fit on that, the kernel is an AI
<Chalky> gcc is the best compressor ever ported to linux. it can turn
         12MB of kernel source (and that's .debbed) into a 500k kernel
Due to the closed source development model of XFree it is impossible
to support, or even speculate about, features in pre- or beta releases
of XFree.
        -- Marcus Sundberg
// Minor lesson: don't fuck about with something you don't fully understand
        -- the dosdoom source code
Operating Systems Installed:
  * Debian GNU/Linux 2.1 4 CD Set ($20 from www.chguy.net; price includes
    taxes, shipping, and a $3 donation to FSF). 2 CDs are binaries, 2 CDs
    complete source code;
  * Windows 98 Second Edition Upgrade Version ($136 through Megadepot.com,
    price does not include taxes/shipping). Surprisingly, no source code
    is included.

        -- Bill Stilwell, http://linuxtoday.com/stories/8794.html
<knghtbrd> Solver_: add users who should be messing with sound to group
           audio..  Make sure the devices are all group audio (ls -l
           /dev/dsp will give you the fastest indication if it's probably
           set right) and build a kernel with sound support for your card
<knghtbrd> OR optionally install alsa source and build modules for that
           with make-kpkg
<knghtbrd> OR (not recommended) get and install evil OSS/Linux evil
           non-free evil binary only evil drivers---but those are evil.
           And did I mention that it's not recommended?
* cesarb wonders if in less than a week Carmack will end up receiving in
  e-mail a courtesy copy of a version of the Quake source which is four
  times faster than what went out of his virtual hands...
<Knghtbrd> JHM: I'm not putting quake in the kernel source
<Knghtbrd> but we should put quake in the boot floppies to one-up
           Caldera's tetris game..  ;>
I would rather spend 10 hours reading someone else's source code than 10
minutes listening to Musak waiting for technical support which isn't.
        -- Dr. Greg Wettstein, Roger Maris Cancer Center
<Deek> you GPL your homework? :)
<knghtbrd> yah  =D
<knghtbrd> Anyone is permitted to use or modify my homework, but if they
           distribute changes they must include the full machine-readable
           source code ;>
It's not usually cost effective time wise to go do it. But if something's
really pissing you off, you just go find the code and fix it and that's
really cool.
        -- John Carmack, on the advantages of open source
* Equivalent code is available from RSA Data Security, Inc.
* This code has been tested against that, and is equivalent,
* except that you don't need to include two pages of legalese
* with every copy.
        -- public domain MD5 source
Never underestimate the power of somebody with source code, a text editor,
and the willingness to totally hose their system.
        -- Rob Landley <telomerase@yahoo.com>
<Knghtbrd> It is when the example source won't compile ...
<``Erik> then you fucked something up
<Knghtbrd> Nope, I followed their instructions
<``Erik> that may've been your problem :}
The sourceforge approach is to place all of the projects in some bland
"open source surburbia", where all of the houses are alike, with only the
colors and minor style variations (which building plan was used for which
particular house) are allowed by the restrictive covenants and local
zoning laws.  Sourceforege is the open source equivalent of the
subdivision in the movie "Edward Scissorhands".
        -- Terry Lambert
Perhaps the remembrance of these things will prove a source of future
pleasure.
                -- Virgil
Win95 is not a virus; a virus does something.
        -- unknown source
Microsoft is not the answer.
Microsoft is the question.
NO (or Linux) is the answer.
        -- Taken from a .signature from someone from the UK, source unknown
Avoid the Gates of Hell.  Use Linux
        -- unknown source
I would rather spend 10 hours reading someone else's source code than
10 minutes listening to Musak waiting for technical support which isn't.
        -- Dr. Greg Wettstein, Roger Maris Cancer Center
We use Linux for all our mission-critical applications.  Having the source code
means that we are not held hostage by anyone's support department.
        -- Russell Nelson, President of Crynwr Software
Never trust an operating system you don't have sources for. ;-)
        -- Unknown source
panic("Foooooooood fight!");
        -- In the kernel source aha1542.c, after detecting a bad segment list
Those who don't understand Linux are doomed to reinvent it, poorly.
        -- unidentified source
N: Phil Lewis
E: beans@bucket.ualr.edu
D: Promised to send money if I would put his name in the source tree.
S: PO Box 371
S: North Little Rock, Arkansas 72115
S: US
        -- /usr/src/linux/CREDITS
Besides, its really not worthwhile to use more than two times your physical
ram in swap (except in a select few situations). The performance of the system
becomes so abysmal you'd rather heat pins under your toenails while reciting
Windows95 source code and staring at porn flicks of Bob Dole than actually try
to type something.
        -- seen on c.o.l.development.system, about the size of the swap space
The linuX Files -- The Source is Out There.
        -- Sent in by Craig S. Bell, goat@aracnet.com
If Bill Gates is the Devil then Linus Torvalds must be the Messiah.
        -- Unknown source
Vini, vidi, Linux!
        -- Unknown source
Linux - Where do you want to fly today?
        -- Unknown source
The easiest way to get the root password is to become system admin.
        -- Unknown source
Also another major deciding factor is availability of source code.
It just gives everybody a warm fuzzy feeling knowing that there is
source code available to the product you are using.  It allows everybody
to improve on the product and fix bugs etc. sooner that the author(s)
would get the time/chance to.
        -- Atif Khan
> Also another major deciding factor is availability of source code.
> It just gives everybody a warm fuzzy feeling knowing that there is
> source code available to the product you are using.  It allows everybody
> to improve on the product and fix bugs etc. sooner that the author(s)
> would get the time/chance to.

I think this is one the really BIG reasons for the snowball/onslaught
of Linux and the wealth of stuff available that gets enhanced faster
than the real vendors can keep up.
        -- Norman
>       Yeah, Linus is in the US.
>
>       His source trees are in Finland.

        OK, someone give him access -fast- ...... ;-)
        -- babydr@nwrain.net, because of problems with the kernel
A feature is nothing more than a bug with seniority.
        -- Unknown source
* Linux Viruscan.....
  Windows 95 found.  Remove it? (Y/y)
        -- Unknown source
There are 3 kinds of people: those who can count & those who can't.
        -- Unknown source
Q: How does a Unix guru have sex?
A: unzip;strip;touch;finger;mount;fsck;more;yes;umount;sleep
        -- unknown source
/* And you'll never guess what the dog had */
/*   in its mouth... */
             -- Larry Wall in stab.c from the perl source code
break;                          /* don't do magic till later */
             -- Larry Wall in stab.c from the perl source code
/* dbmrefcnt--;  */     /* doesn't work, rats */
             -- Larry Wall in hash.c from the perl source code
#define NULL 0           /* silly thing is, we don't even use this */
             -- Larry Wall in perl.c from the perl source code
#define SIGILL 6         /* blech */
             -- Larry Wall in perl.c from the perl source code
double value;                /* or your money back! */
short changed;               /* so triple your money back! */
             -- Larry Wall in cons.c from the perl source code
echo $package has manual pages available in source form.
echo "However, you don't have nroff, so they're probably useless to you."
             -- Larry Wall in Configure from the perl distribution
#else /* !STDSTDIO */     /* The big, slow, and stupid way */
             -- Larry Wall in str.c from the perl source code
if (instr(buf,sys_errlist[errno]))  /* you don't see this */
             -- Larry Wall in eval.c from the perl source code
if (rsfp = mypopen("/bin/mail root","w")) {     /* heh, heh */
             -- Larry Wall in perl.c from the perl source code
It won't be covered in the book.  The source code has to be useful for
something, after all...  :-)
             -- Larry Wall in <10160@jpl-devvax.JPL.NASA.GOV>
/* now make a new head in the exact same spot */
             -- Larry Wall in cons.c from the perl source code
pos += screamnext[pos]  /* does this goof up anywhere? */
             -- Larry Wall in util.c from the perl source code
s = (char*)(long)retval;                /* ouch */
             -- Larry Wall in doio.c from the perl source code
signal(i, SIG_DFL); /* crunch, crunch, crunch */
             -- Larry Wall in doarg.c from the perl source code
stab_val(stab)->str_nok = 1;    /* what a wonderful hack! */
             -- Larry Wall in stab.c from the perl source code
str->str_pok |= SP_FBM;                     /* deep magic */
s = (unsigned char*)(str->str_ptr);         /* deeper magic */
             -- Larry Wall in util.c from the perl source code
/* This bit of chicanery makes a unary function followed by
a parenthesis into a function with one argument, highest precedence. */
             -- Larry Wall in toke.c from the perl source code
tmps_base = tmps_max;                /* protect our mortal string */
             -- Larry Wall in stab.c from the perl source code
/* we have tried to make this normal case as abnormal as possible */
             -- Larry Wall in cmd.c from the perl source code
No guarantee of accuracy or completeness!
©TU Chemnitz, 2006-2024
Your feedback:
Ad partners