DEEn Dictionary De - En
DeEs De - Es
DePt De - Pt
 Vocabulary trainer

Spec. subjects Grammar Abbreviations Random search Preferences
Search in Sprachauswahl
secure
Search for:
Mini search box
 
Proverbs, aphorisms, quotations (English) by Linux fortune

**** IMPORTANT ****  ALL USERS PLEASE NOTE ****

Due to a recent systems overload error your recent disk files have been
erased.  Therefore, in accordance with the UNIX Basic Manual, University of
Washington Geophysics Manual, and Bylaw 9(c), Section XII of the Revised
Federal Communications Act, you are being granted Temporary Disk Space,
valid for three months from this date, subject to the restrictions set forth
in Appendix II of the Federal Communications Handbook (18th edition) as well
as the references mentioned herein.  You may apply for more disk space at any
time.  Disk usage in or above the eighth percentile will secure the removal
of all restrictions and you will immediately receive your permanent disk
space.  Disk usage in the sixth or seventh percentile will not effect the
validity of your temporary disk space, though its expiration date may be
extended for a period of up to three months.  A score in the fifth percentile
or below will result in the withdrawal of your Temporary Disk space.
To those accustomed to the precise, structured methods of conventional
system development, exploratory development techniques may seem messy,
inelegant, and unsatisfying.  But it's a question of congruence:
precision and flexibility may be just as disfunctional in novel,
uncertain situations as sloppiness and vacillation are in familiar,
well-defined ones.  Those who admire the massive, rigid bone structures
of dinosaurs should remember that jellyfish still enjoy their very
secure ecological niche.
                -- Beau Sheil, "Power Tools for Programmers"
We the Users, in order to form a more perfect system, establish priorities,
ensure connective tranquility, provide for common repairs, promote preventive
maintenance, and secure the blessings of liberty for ourselves and our
processes, do ordain and establish this Software of The Unixed States
of America.
"The strength of the Constitution lies entirely in the determination of each
citizen to defend it.  Only if every single citizen feels duty bound to do
his share in this defense are the constitutional rights secure."
-- Albert Einstein
Windows 2000 is more secure than Linux...

Since the machine is offline half of the time because of crashes, it
cannot be accessed globally, therefore producing higher security.

   -- From a Slashdot.org post
Open Source Irrational Constant

BREEZEWOOD, PA -- In a revelation that could rock the foundations of
science, a researcher in Pennsylvania has discovered that the digits of the
irrational constant PI encode a version of the Linux kernel.  "I can't
believe it," the researcher, Neil Hoffman, exclaimed.  "And yet, here I am
staring at what appears to be the source code for Linux kernel 5.0.0.
Needless to say, my whole world-view has changed..."

Hoffman explained, "My algorithm, which applies several dozen conversions and
manipulations to each digit of PI, spits out plain vanilla ASCII characters
that happen to form the source code for the Linux kernel."

Many members of the scientific community are skeptical.  One One
mathematician who has memorized the digits of PI to 10,000 places said,
"This is the kind of nonsense one would expect to find in a tabloid such as
the National Mathematics Enquirer.  Or a Linux fortune(6) file.  Hoffman's
'discovery' is obviously a hoax designed to secure government research
grants."

In a related matter, we have received an unconfirmed report that a region of
the Mandelbrot fractal contains what appear to be the words "LINUS TORVALDS
WAS HERE".  In addition, the words "TRANSMETA: THIS SECRET MESSAGE IS NOT
HERE YET" supposedly appear within the depths of the Julia Set.
New Linux Companies Hope To Get Rich Quick (#4)

The buzz surrounding Linux and Open Source during 1999 has produced a
large number of billionnaires. However, people who weren't employed by Red
Hat or VA Linux, or who didn't receive The Letter, are still poor. The
visionaries at The IPO Factory want to change all that.

As the name suggests, this company helps other businesses get off the
ground, secure investments from Venture Capitalists, and eventually hold
an IPO that exits the stratosphere. "You can think of us as meta-VCs," the
IPO Factory's founder said. "You provide the idea... and we do the rest.
If your company doesn't hold a successful IPO, you get your money back,
guaranteed!" He added quickly, "Of course, if you do undergo a billion
dollar IPO, we get to keep 25% of your stock."

The company's first customer, LinuxOne, has been a failure. "From now on
we're only going to service clients that actually have a viable product,"
an IPO Factory salesperson admitted. "Oh, and we've learned our lesson:
it's not a good idea to cut-and-paste large sections from Red Hat's S-1
filing."
Press Release -- For Immediate Release
Microsoft Corporation, Redmond, WA

...Virtually all version of Linux (and Unix) contain a security hole that
allows unauthorized users to gain complete control over the machine. By
simply typing "root" at the login prompt and supplying a password from a
limited number of possibilities, a malicious user can easily gain
administrator privileges. This hole can be breached in seconds with only a
dozen or so keystrokes...

We suspect this issue has been known to Red Hat and other Linux
distributors for years and they have refused to acknowlege its existence
or supply a patch preventing users from exploiting the "root" login
loophole...

By ignoring the problem, the Linux community has proven that installing
Linux is a dangerous proposition that could get you fired. We would like
to point out that Windows XP does not suffer from this gaping hole...
Tests conducted by both Ziff-Davis and Mindcraft prove that Windows XP is
indeed the most secure operating system ever produced...
An excellence-oriented '80s male does not wear a regular watch.  He wears
a Rolex watch, because it weighs nearly six pounds and is advertised
only in excellence-oriented publications such as Fortune and Rich
Protestant Golfer Magazine.  The advertisements are written in
incomplete sentences, which is how advertising copywriters denote excellence:

"The Rolex Hyperion.  An elegant new standard in quality excellence and
discriminating handcraftsmanship.  For the individual who is truly able
to discriminate with regard to excellent quality standards of crafting
things by hand.  Fabricated of 100 percent 24-karat gold.  No watch parts
or anything.  Just a great big chunk on your wrist.  Truly a timeless
statement.  For the individual who is very secure.  Who doesn't need to
be reminded all the time that he is very successful. Much more successful
than the people who laughed at him in high school.  Because of his acne.
People who are probably nowhere near as successful as he is now.  Maybe
he'll go to his 20th reunion, and they'll see his Rolex Hyperion.
Hahahahahahahahaha."
                -- Dave Barry, "In Search of Excellence"
We secure our friends not by accepting favors but by doing them.
                -- Thucydides
A small country has fewer people.
Though there are machines that can work ten to a hundred times faster than man, they are not needed.
The people take death seriously and do not travel far.
Though they have boats and carriages, no one uses them.
Though they have armor and weapons, no one displays them.
Men return to the knotting of rope in place of writing.
Their food is plain and good, their clothes fine but simple, their homes secure;
They are happy in their ways.
Though they live within sight of their neighbors,
And crowing cocks and barking dogs are heard across the way,
Yet they leave each other in peace while they grow old and die.
We the people of the Debian GNU/Linux distribution, in order to form a
more perfect operating system, establish quality, insure marketplace
diversity, provide for the common needs of computer users, promote
security and privacy, overthrow monopolistic forces in the computer
software industry, and secure the blessings of liberty to ourselves and
our posterity, do ordain and establish this Constitution for the Debian
GNU/Linux System.
>   1. is qmail as secure as they say?

Depends on what they were saying, but most likely yes.
        -- Seen on debian-devel
On Netscape GPLing their browser: ``How can you trust a browser that
ANYONE can hack? For the secure choice, choose Microsoft.''
        -- <oryx@pobox.com> in a comment on slashdot.org
This is an especially good time for you vacationers who plan to fly, because
the Reagan administration, as part of the same policy under which it
recently sold Yellowstone National Park to Wayne Newton, has "deregulated"
the airline industry.  What this means for you, the consumer, is that the
airlines are no longer required to follow any rules whatsoever.  They can
show snuff movies.  They can charge for oxygen.  They can hire pilots right
out of Vending Machine Refill Person School.  They can conserve fuel by
ejecting husky passengers over water.  They can ram competing planes in
mid-air.  These innovations have resulted in tremendous cost savings which
have been passed along to you, the consumer, in the form of flights with
amazingly low fares, such as $29.  Of course, certain restrictions do apply,
the main one being that all these flights take you to Newark, and you must
pay thousands of dollars if you want to fly back out.
                -- Dave Barry, "Iowa -- Land of Secure Vacations"
I want EARS!  I want two ROUND BLACK EARS to make me feel warm 'n secure!!
No guarantee of accuracy or completeness!
©TU Chemnitz, 2006-2024
Your feedback:
Ad partners